NPTech Open Internet Policies and FCC disclosure statements:

Effective November 18, 2011 and ongoing

NPTech (the assumed name of New Paris Telephone), and its subsidiaries and divisions, including Simplify Tech, Community Fiber Network, and Quality Cablevision collectively (“NPT”) commits to the open and non-discriminatory use of the Internet by its customers and commits to use reasonable network management practices to ensure an open Internet.

NPT will manage its network and provide access in accordance with the Federal Communications Commission’s (FCC’s) Open Internet Rules (adopted December 21, 2010) and in compliance with any future rules adopted by the FCC.

  1. Transparency: NPT shall make available public information on its website (www.nptel.com/neutrality) regarding its network management practices, performance and commercial terms of its service sufficient for consumers to make an informed choice regarding their use of such services.
  2. Blocking: NPT will not block or otherwise prevent end user access to lawful content, applications, services, or non-harmful devices, (other than reasonable network management elsewhere disclosed). NPT will not unjustly or unreasonably prevent or interfere with competition among Content, Applications, Service, or Device Providers.
  3. Throttling: NPT will not degrade or impair access to lawful Internet traffic on the basis of content, application, service, user, or use of a non-harmful device, (other than reasonable network management elsewhere disclosed).
  4. Affiliated Prioritization. NPT will not engage in any practice that directly or indirectly favors some traffic over other traffic, including the use of techniques such as traffic shaping, prioritization, or resource reservation to benefit an affiliate.
  5. Paid Prioritization. NPT will not engage in any practice that directly or indirectly favors some traffic over other traffic, including the use of techniques such as traffic shaping, prioritization, or resource reservation, in exchange for consideration, monetary or otherwise.
  6. Congestion Management and Security. NPT uses generally accepted technical measures to provide acceptable service levels to all customers, such as application-neutral bandwidth allocation, as well as measures to address service attacks, illegal content and other harmful activities to protect network integrity and reliability.NPT reserves the right to prioritize traffic based on real time and non-real time applications during heavy congestion periods based on generally accepted technical measures.NPT sets speed thresholds on the amount of data you as a customer can upload and download based upon the level of service based on your subscription arrangement and service type.NPT may use other traffic management and prioritization tools to help ensure equitable access to the NPT network for all customers.NPT monitors customer usage to efficiently manage the performance of the network to ensure a sustainable quality of service is provided. During peak usage times, priority may be given to applications such as browsing, email, streaming, instant messaging, gaming and VoIP. Congestion due to malfunctioning hardware and/or software will be remedied as quickly as network engineers can diagnose and identify the offending network element.Congestion due to malice will be remedied using any technique available, including protocol-aware filtering and rate-limiting to control and limit the offending source.
  7. Application-Specific Behavior. NPT may block or rate-control specific protocols or protocol ports, or modify protocol fields in ways prescribed by IETF protocol standards. These actions will be related to the security of the Internet service or to maintain adequate levels of security for other subscribers. These actions to inhibit certain applications or classes of applications are limited to congestion and security measures.
  8. Device Attachment Rules. NPT does not place restrictions on FCC type approved devices that may be used with Internet service. Devices that are not FCC type approved for use in the US are prohibited, and may not be connected to the network provided by NPT.
  9. Security. NPT follows industry standard practices to ensure end-user security or security of the network, including types of triggering conditions that would cause an imminent security risk. NPT will invoke mechanisms to limit these risks, including those actions by parties seeking to circumvent network security measures.These security risks could include traffic subject to spam or network intrusion practices or the use of NPTs service in such a way to circumvent US law or oversight agency orders.Implementation by NPT of security measure and practices could affect end users’ experience. Practices could extend to the suspension of Internet service if as indicators such as congestion or malfeasance are identified. Other security risks could include excessive usage limits that would result in congestion; or violation of industry engineering standards.NPT may seek criminal charges against those who inflict network malice.NPT may also attempt to recover costs incurred from network malice. It is not acceptable to use NPT’s network for any purpose that violates local, state or federal laws or to transmit communications that might be highly offensive or damaging to any recipients or to use the service in a manner that is unintended.It is not acceptable to interfere with, violate, circumvent, misuse, distribute or disrupt network users, equipment or services, which include but are not limited to:
    • Attempting to obtain unauthorized access to any network or account. This includes accessing data not intended for end user customers, logging into a server or account without being expressly authorized to access or probing the security of other networks.
    • Attempts to interfere with the Service of others including users, hosts and networks. This includes “denial of service” attacks, “flooding” of networks, and deliberate attempts to overload any Services.
    • Reselling any NPT Internet services without written consent.
    • Distribution of NPT Internet services beyond the scope of your end-user account.
    • Equipment, accessory, apparatus, circuit or devices that are harmful to the network, and are not FCC type accepted for connection to NPT facilities.
    • Circumventing copyright laws and regulation, including the unauthorized download of music, video, images, books, software or content and/or other copyright protected works.
    • NPT will not ask for your password in an unsolicited telephone call or email. If you believe your password has been compromised, you should immediately change your password to prevent the unauthorized use of it.
  10. Discrimination: NPT will not unreasonably discriminate in transmitting lawful network traffic over a consumer’s broadband Internet access service, subject to reasonable network management practices.
  11. Commercial Pricing & Acceptable Use Policy: Please review our website (www.np-tech.com) for pricing information, acceptable use policy or additional network services.
  12. Privacy Policies. NPT complies with all FCC regulations and orders regarding your privacy. Network management practices prohibit the inspection of network traffic. Network payload data is not stored, provided to any third parties, or used by NPT for non-network management purposes.

Redress Options. To resolve complaints and questions about your service, or if you have any questions regarding these policies, please contact customer service at: NPTech 19066 Market ST / PO Box 47; New Paris, IN 46553