How does GVEC manage congestion with respect to its broadband internet access services?

GVEC strives to provide a high-quality internet experience for our customers. Because the internet consists of multiple interconnected networks and most internet end points (e.g., websites and other content providers) are not directly connected to the GVEC network, GVEC must connect to and exchange traffic with other networks to provide its subscribers the capability of uploading data to or downloading data from internet end points that are connected to those networks. To that end, GVEC has entered commercially negotiated agreements to exchange traffic with those networks (and the networks with which those networks are connected) on mutually agreeable terms. The links GVEC and other networks use to exchange such traffic may become congested at times. Consistent with its agreements with those other networks and its long-standing practice, GVEC may establish or expand the connections between its network and other networks, but only on mutually agreeable terms. If GVEC is unable to reach agreement on terms of interconnection or network expansion with these other networks, it could affect customers’ ability to upload or download data to internet endpoints connected to those networks. GVEC does not guarantee that it will establish or expand the connections between its network and other networks, or that subscribers will be able to upload data to or download data from internet end points connected to other networks at any specific speed.

In addition, like the other networks that make up the internet, the GVEC network is a shared network, which means that the transmission links and other network resources used to provide broadband services are shared among GVEC’s subscribers, as well as among the various services offered by GVEC. Temporary congestion may occur when a large number of customers in a concentrated area access the network at the same time or when some customers consume a large amount of network capacity during busy periods, during peak usage times, or during planned network maintenance.

GVEC invests millions of dollars annually to address potential congestion in its broadband networks. As is common in the industry, we use network management practices and other tools to manage network resources for the benefit of all GVEC broadband customers, especially during periods when network demand exceeds available network resources (also known as “contention-congestion” or “congestion”). As you would expect, our network management practices, and our service offerings have evolved over time to benefit our customers and take advantage of the billions we have spent to expand and augment our networks.

Does GVEC limit data usage? Does GVEC provide any tools to help customers monitor and control their data usage?

We have developed speed tiers for our wired and fixed wireless internet access services so that our customers can choose from a variety of speed tiers or rate plans that best reflect their own usage levels, and how they intend to use their service.

How does GVEC handle alleged copyright infringement by subscribers to its broadband internet access services?

Content owners may notify GVEC of alleged copyright infringement based on the IP address of a user. GVEC then will attempt to identify a subscriber account based on that IP address and forward a copyright alert to the subscriber account, advising the account holder of the allegation and providing information about online copyright infringement. If a subscriber continues to receive additional alerts, GVEC may take action consistent with Section 512(i) of the Digital Millennium Copyright Act, which may result in termination of the subscriber/account holder broadband internet access service. Account holder personally identifiable information is protected throughout this process — GVEC will not provide such information to content owners unless required to do so by court order.

Does GVEC favor certain websites or internet applications by blocking, throttling, or modifying particular protocols on its broadband internet access service?

No, GVEC does not favor certain websites or internet applications by blocking or throttling lawful internet traffic based on content, application, service, user, or use of nonharmful devices on its broadband internet access services. We do not modify particular protocols, protocol ports, or protocol fields in ways not prescribed by the protocol standards. However, in response to a specific security threat against our network or our customers, GVEC may occasionally need to limit the flow of traffic from certain locations or take other appropriate actions. In addition, we may prevent the use of certain ports on our broadband internet access services to help protect our customers and network against malicious activity.

Does GVEC directly or indirectly favor some traffic over other traffic (such as through prioritization, resource reservation, or traffic shaping) in its provision of broadband Internet access service either (1) in exchange for consideration (monetary or otherwise) from a third party, or (2) to benefit an affiliate?

No, in its provision of broadband internet access services, GVEC does not directly or indirectly favor some traffic over other traffic in exchange for consideration from a third party or to benefit an affiliate.

What practices has GVEC adopted to manage network security?

GVEC takes the security of our customers and our network very seriously. We proactively monitor network activity to help guard against a wide range of security threats, including viruses, botnets, worms, distributed denial of service attacks, SPAM, and other harmful activity. We encourage customers to adopt their own security practices.

We use a variety of network tools to monitor network activity and health to maintain its stability and functionality, to protect the network against threats, and for other operational purposes. We store the information we gather through this monitoring for only as long as we have a business purpose to maintain it.

If we detect a security threat, we will typically attempt to isolate the threat and minimize the impact to network service. We may use a variety of security measures to protect the network, including blocking malicious or unlawful traffic, redirecting the flow of traffic over some portions of our network, or taking other actions to address the threat. For example, we may block certain ports that transfer malicious or disruptive traffic (such as Ports 25, 135, 139, 445, and 1900). We attempt to limit actions to the specific portions of our network or customer base impacted by the security threat and only for as long as necessary to mitigate the threat.

GVEC may scan or analyze network addresses that are registered through GVEC, including addresses that may have been delegated to customers, and/or routes that originate from GVEC-provided networks to detect vulnerabilities that might be used to compromise GVEC or customer assets or might be used in attacks against others. In doing so, we seek to avoid disrupting network service to customers. We may use information derived from these activities to identify and address security issues or to notify customers of issues.

Does GVEC restrict the types of devices that customers can use with its mass market broadband internet access services?

GVEC makes available to its customers a variety of network interface equipment for use with the broadband internet access services we deliver to homes and businesses, many of which are Wi-Fi enabled. We also make available a variety of additional tools, equipment and services to assist our customers in configuring the local network access in their home or business to meet their individual needs. This allows GVEC customers to use devices of their choice (PCs, Smartphones, Tablets, Smart TVs, etc.) to connect to the broadband internet access services at their home or business via Wi-Fi, via the existing wiring at their premises or via such other compatible local networking technology as they may choose to select.