The Federal Communications Commission (“FCC”) requires that Internet service providers disclose the following information regarding any network management practices that Celerity Internet (“Celerity”) employs to manage it’s mass market, retail broadband Internet access service product, including the performance characteristics of our services, and the commercial terms of our service offerings. The disclosure is intended to provide current and prospective subscribers (“end users”) and providers of “edge” products (i.e., providers of content, applications, service and devices accessed over or connected to Celerity’s broadband Internet access service) with sufficient information to make informed choices regarding the use of such services. The information provided below applies solely to the portion of our network that provides mass market retail broadband Internet access service. Other portions of our network may be used to provide other services, such as telephone or television service, each of which are subject to their own terms and conditions of service. In addition, Celerity may enter into arrangements to provide Internet service to third party establishments (including coffee shops, bookstores, hotels, libraries, etc.) who then may offer such service to their customers, guests, or others. Nothing herein is intended to address the network management practices, performance characteristics, or commercial terms that may be adopted by such third party premises operators in connection with their provision of Internet service to others. The information provided herein may be revised from time to time as Celerity deems appropriate and should be read in conjunction with Celerity’s acceptable use policy as part of its Terms of Service.
I. NETWORK PRACTICES
A. Congestion Management
1. Celerity currently offers multiple levels of Residential and Commercial Internet service.
2. Celerity does not adjust or manage an individual end user’s use of their capacity, but the actual use by an end user can affect the user experience. Downstream refers to the information coming to you from the network and upstream refers to the information going from you to the network. End user experience can be negatively impacted when the end user attempts to run too many tasks simultaneously or by running individual tasks that utilize 100% of the end user’s upstream capacity. For example, uploading large files to cloud-based back up servers may occupy 100% of the end user’s upstream capacity. This could preclude the end user from running other network-related tasks while the file is uploading.
3. The Celerity’s network is engineered and, as a whole, is shared among its users and has a set capacity for downstream and upstream communication. While Celerity will not manage an individual end user’s capacity, Celerity may take action to manage the capacity of the entire network or part of the network if an end user’s actions unreasonably impact the ability of others to use the network. For example, Celerity may employ reasonable network management practices to protect against security or denial of service attacks that can negatively affect our network and may cause service degradation. End users can minimize the possibility of these problems by maintaining an up-to-date anti-virus program on their computer and following common sense practices like avoiding unsolicited attachments from unknown parties.
4. Celerity wants all end users and edge providers to be able to use the network for all legal purposes at all times. Measures are taken to avoid a single application from overwhelming the network and rendering some end users unable to use the application of their choice or reach the edge provider of their choice. If irregular usage is detected, Celerity will work with the individual customer to correct the issue.
B. Usage Limits
1. Celerity reserves the right to manage network usage to ensure that the activities of a small number of customers do not degrade, inhibit or interfere with the use of our network. The goal is to ensure that all users have reasonable access to the network at all times. Some Celerity packages may include data caps on usage, and overages will be billed at increments after cap is reached.
C. Application Specific Behavior
1. Celerity does not discriminate against or prevent users of its broadband Internet access service from accessing lawful content or services; running lawful applications and services of their choice; or connecting their choice of legal devices, so long as such applications, services and/or devices do not harm the network or the provision of broadband Internet access service, facilitate theft of service, or harm users of the service. Moreover, Celerity does not impair or degrade specific content, applications, services or non-harmful devices so as to render them effectively unusable, subject to any reasonable network management practices described herein.
2. Celerity reserves the right to employ reasonable network management practices to prevent specific harmful or illegal activity, such as the dissemination of viruses or other malicious code or the transfer of child pornography or other unlawful content.
D. Device Attachment Rules
1. Celerity requires customer to install a router when connecting to their Internet service. This provides the customer additional security and allows for IP address conservation.
2. Customers may use a Celerity-provided router by renting one from us or may use their own, approved router purchased from a retailer.
3. As technology changes, Celerity Networks reserves the right to update their list of approved models and require the customer to replace a previously-approved modem model that is no longer compatible.
1. Celerity employs certain practices to ensure the security of our customers and our right to protect our network. These include practices intended to protect Celerity’s network infrastructure against Denials of Service attacks and to prevent harmful elements such as viruses, spam and identity theft.
2. To that end, Celerity may permanently block a limited number of Internet TCP/UDP ports that are commonly used to send spam or perpetrate identity theft.
3. Celerity may, from time to time as needed to maintain network performance, temporarily block traffic to or from a limited number of Internet addresses participating in or being attacked.
II. PERFORMANCE CHARACTERISTICS
A. Service Description
1. Celerity offers residential and business customers a variety of levels of broadband Internet access service tiers with varying targeted speeds and features that may affect the suitability of such service for real-time applications. The features, pricing and other commercial terms of our service offerings are modified from time to time, and not all packages are available in all areas. Each package is priced to reflect the particular speed and features of that package.
2. Full descriptions and pricing information for all currently available packages are available at http://www.celerityinternet.com.
3. The FCC requires that we disclose information regarding the expected and actual speed and latency of our Internet access service offerings. Latency measures the average time it takes for a data packet to travel from one point on a network to another. It is typically measured by round-trip time utilizing milliseconds. While latency generally does not have a significant impact on day-to-day Internet usage, certain applications may be particularly affected by latency, such as high-definition multiplayer online games.
4. Our advertised speeds are estimates that Celerity targets to achieve for its customers. Celerity cannot guarantee that a customer will achieve those speeds at all times. The actual speeds achieved by customers may vary based on a number of factors, including, but not limited to: (a) the performance and capabilities of customer’s computer; (b) the connection between a customer’s computer and service demarcation, such as the use of wireless routers; (c) variances in network usage; (d) the distance a packet of information must travel from the customer’s computer to its final destination on the Internet; (e) congestion or variable performance at a particular website or destination; or (f) performance characteristics of transmissions over the Internet that are outside of Celerity’s control.
5. There are a number of available tools online that customers may utilize to measure Internet performance. Please note that all speed tests have biases and flaws and should be considered a guide rather than a conclusive measurement of performance.
B. Impact of Specialized Services
1. The FCC’s “Open Internet” rules distinguish between our mass-market retail broadband Internet access and “specialized services” that share capacity with our broadband Internet access services over our last-mile facilities. Examples of these “specialized services” may include Celerity’s home and business phone service, which utilize Voice over Internet Protocol (“VoIP”) technology. Use of these services, which are not subject to the same rules as our broadband Internet access services, share bandwidth with our Internet access service and because of the nature of the service may sometimes receive priority on our network. As a result, increased use of these services may affect our broadband Internet access service at certain times. Celerity monitors the impact of these services on our network to minimize their impact on our broadband Internet access service.
III. COMMERCIAL TERMS
1. Celerity offers multiple tiers of broadband Internet access service. The current pricing and other terms and conditions of the various tiers, including fees associated with early termination or additional network services is available at http://www.celerityinternet.com or by calling our office at 605-340-0641.
C. Redress Options
1. If you have any questions or concerns regarding your service, please contact our customer service department by calling our office at 605-340-0641. Customers may also email us at firstname.lastname@example.org
2. Written complaints may be sent via U.S. mail to: Celerity Internet, 909 Thompson St, Whitewood, SD 57793. The FCC has established procedures for addressing informal and formal complaints relating to its “Open Internet” rules. For information concerning these procedures, please refer to the FCC’s website at www.fcc.gov/consumers/guides/getting-broadband-qa.