BTES Network Transparency Disclosure

Network Management Practices:

  • Blocking:  BTES blocks IP networks that have participated in Distributed Denial of Service attacks and other security events against our network or our customers’ networks. If it is brought to our attention that a legitimate network is blocked, BTES will review, verify and unblock the network.
  • Throttling:  BTES does not throttle traffic based on content, application, service, user, or use of a non-harmful device.
  • Affiliated Prioritization:  BTES does not use any practice that directly or indirectly favors some traffic over other traffic, including through use of techniques such as traffic shaping, prioritization, or resource reservation, to benefit an affiliate, including identification of the affiliate.
  • Paid Prioritization:  BTES does not use any practice that directly or indirectly favors some traffic over other traffic, including through use of techniques such as traffic shaping, prioritization, or resource reservation, in exchange for consideration, monetary or otherwise.
  • Congestion Management:  BTES uses traffic shaping on bandwidth profiles for congestion management. Commercial tiers have higher priority than residential tiers should congestion occur.
  • Application-Specific Behavior:  BTES blocks certain well-known exploitable protocols such as those used by Microsoft Active Directory, NetBIOS, and SNMP as well as other well-known exploit ports.
  • Device Attachment Rules:  BTES permits each customer to use one (1) IP address at any time. Customers found using multiple IP addresses will have their connection restricted to allow a single IP address. Additional IP addresses may be temporarily available for reasons of network troubleshooting and flexibility of hardware replacement. Any device found to cause network issues, including but not limited to congestion or flooding of servers, will result in the customer’s connection being suspended until the problem is corrected. Commercial customers may pay monthly for one (1) static IP address. If additional addresses are requested, BTES follows the same procedure as ARIN (American Registry for Internet Numbers) for justification for additional IP address requests.
  • Security:  Ultimately, security is the responsibility of the end-user. BTES does not warrant or accept responsibility for any security breaches or events on a customer connection. BTES does monitor for Distributed Denial of Service events and takes action when needed, including suspending specific customer connections as necessary until the event has subsided.

 

Performance Characteristics:

  • Service Description:  BTES services are Fiber to the User (FTTU). BTES utilizes an ITU GPON and NGPON2 architecture. Expected speeds vary based on the service selected by the customer. Services above 10Mbps should be suitable for real-time applications, though 4K video may require at least 16Mbps. A customer using multiple devices simultaneously may desire a higher tier of service to increase overall performance and improve the user experience.

 

Commercial Terms: