Taylor Telecom provides this Policy in order to disclose its network management practices in accordance with the FCC’s Open Internet Rules. Information about Taylor Telecom’s other policies and practices concerning broadband are available at www.taylortel.net.
Taylor Telecom manages its network to ensure that all of its customers experience a safe and secure broadband Internet environment that is fast, reliable and affordable. Taylor Telecom wants its customers to indulge in all that the Internet has to offer, whether it is social networking, streaming videos and music, to communicating through email and videoconferencing.
Taylor Telecom manages its network for a number of reasons, including optimization, as well as congestion- and security-protocol-management. Taylor Telecom’s customers generally will not be impacted by the protocols and practices that Taylor Telecom uses to manage its network.
Taylor Telecom’s Network Management Practices
Taylor Telecom uses various tools and industry standard techniques to manage its network and deliver fast, secure and reliable Internet service. Such management tools and practices include the following:
Taylor Telecom monitors the connections on its network in the aggregate on a weekly basis to determine the rate of utilization. Taylor Telecom takes appropriate measures to address congestion when its utilization threshold reached a level of at least 85%. Taylor Telecom increased capacity on its network by deploying FTTH technology and current projects are underway to deploy more. Network equipment is also upgraded when feasible.
On Taylor Telecom’s network, all customers have access to all legal services, applications and content online and, in the event of congestion, most Internet activities will be unaffected. Some customers, however, may experience longer download or upload times, or slower surf speeds on the web if instances of congestion do occur on Taylor Telecom’s network.
Customers using conduct that abuses or threatens the Taylor Telecom network or which violates the company’s Acceptable Use Policy, Internet service Terms and Conditions, or the Internet Service Agreement will be asked to stop any such use immediately. A failure to respond or to cease any such conduct could result in service suspension or termination.
Taylor Telecom’s network and congestion management practices are ‘application-agnostic’, based on current network conditions, and are not implemented on the basis of customers’ online activities, protocols or applications. Taylor Telecom’s network management practices do not relate to any particular customer’s aggregate monthly data usage.
Taylor Telecom knows the importance of securing its network and customers from network threats and annoyances. The company promotes the security of its network and patrons by providing resources to its customers for identifying and reporting such threats as spam, viruses, firewall issues, and phishing schemes. Taylor Telecom also deploys spam filters in order to divert spam from an online customer’s email inbox into a quarantine file while allowing the customer to control which emails are identified as spam. Customers may access the spam files through the email. Spam files are automatically deleted if not accessed within 14 days (this is a default setting but customer can change the number of days to the number they want).
As its normal practice, Taylor Telecom does not block any protocols, content or traffic for purposes of network management except that the company may block or limit such traffic as spam, viruses, malware, or denial of service attacks to protect network integrity and the security of our customers. Taylor Telecom also has a port filtering practice applied only to dynamic IP customers aimed at reducing the spread of computer-related viruses and protecting your computer from intruder access. Incoming mail is not filtered for any server. Outgoing mail server access can be requested. This is for spam/virus identification and filtering purposes only. No other filtering/shaping is done on Internet traffic.
Device Attachment Rules/Application-Specific Behaviors
Except as may be provided elsewhere herein, Taylor Telecom does not currently engage in any application-specific behaviors nor does it employ any device attachment rules for its network.
Taylor Telecom monitors its network on a weekly basis in the aggregate to determine utilization on its network. When utilization reaches 85%, Taylor Telecom takes the appropriate measures to relieve congestion. Taylor Telecom also checks for abnormal traffic flows, network security breaches, malware, loss, and damage to the network. If a breach is detected or high volume users are brought to light by complaint, Taylor Telecom provides notification to the customer via email or phone. If a violation of Taylor Telecom’s policies has occurred and such violation is not remedied, Taylor Telecom will seek to suspend or terminate that customer’s service.
Network Management Technology
Taylor Telecom employs a variety of industry-standard tools, applications and devices to monitor, secure and maintain its network, including network graphing solutions.
Taylor Telecom offers broadband service over ADSL and FTTH facilities. The Taylor Telecom service offerings and rates may be found by clicking the INTERNET button on the right. Although not guaranteed, generally, services having speeds of at least 3mb are suitable for real time applications such as video streaming.
Taylor Telecom does not provide any Specialized Services.
For questions, complaints or requests for additional information, please contact Taylor Telecom at:
INTERNET TECHNICAL SUPPORT
866-944-8456 (24 hours)
PO Box 370, Merkel, Texas 79536
325-846-4111 or 800-238-4155 (24 hours)