Network Management Policy & Internet Transparency Statement

XIT Communications provides this Policy in order to disclose its network management practices in accordance with the FCC’s Open Internet Rules. Information about XIT Communication’s other policies and practices are available at www.xit.net.

XIT Communications manages its network to ensure that all of its customers experience a safe and secure broadband Internet environment that is fast, reliable and affordable. XIT wants its customers to indulge in all that the Internet has to offer, whether it is social networking, streaming videos and music, or communicating through email and video conferencing.
 
XIT Communications manages its network for a number of reasons, including optimization, as well as congestion and security-protocol-management. Very few of the company’s customers are impacted by the protocols and practices that XIT uses to manage its network.

XIT Communications’ Network Management Practices

XIT uses various tools and industry standard techniques to manage its network and deliver fast, secure and reliable Internet service. Such management tools and practices include the following:

  1. Blocking

    As its normal practice, XIT does not block any protocols, content, or traffic for purposes of network management except that the company may block or limit such traffic as spam, viruses, malware, or denial of service attacks to protect network integrity and the security of our customers.

  2. Throttling

    XIT Communications does not engage in throttling, a practice that degrades or impairs access to lawful Internet traffic on the basis of content, application, service, user, or use of a non-harmful device.

  3. Affiliated Prioritization

    XIT Communications does not engage in affiliated prioritization, a practice that directly or indirectly favors some traffic over other traffic, including through use of techniques such as traffic shaping, prioritization, or resource reservation, to benefit an affiliate, including identification of the affiliate.

  4. Paid Prioritization

    XIT Communications does not engage in paid prioritization, a practice that directly or indirectly favors some traffic over other traffic, including through use of techniques such as traffic shaping, prioritization, or resource reservation, in exchange for consideration, monetary or otherwise.

  5. Managing Congestion

    XIT Communications periodically monitors the connections on its network in the aggregate to determine the rate of utilization. If congestion emerges on the network the company will engage in the re-routing of Internet traffic to relieve congestion. On our core and access networks, XIT may increase capacity by adding bandwidth, as needed.

    On XIT’s network, all customers have access to all legal services, applications, and content online. In the event of congestion, most Internet activities will be unaffected.

    Some customers, however, may experience long download or upload times, or slower surf speeds on the web if instances of congestion do occur in XIT’s network.

    Customers using conduct that abuses or threatens the company network or which violates the company’s Acceptable Use Policy or Internet service Terms and Conditions will be asked to stop any such use immediately. A failure to respond or to cease any such conduct could result in service suspension or termination.

    XIT’s network and congestion management practices are ‘application-agnostic’, based on current network conditions, and are not implemented on the basis of customers’ online activities, protocols or applications. XIT’s network management does not relate to any particular customer’s aggregate monthly data usage.

  6. Application-Specific Behavior

    Except as may be provided elsewhere, herein, XIT does not currently engage in any application-specific behaviors that block or control the rate of specific protocols or protocol ports, modify protocols in any way not prescribed by the protocol standard, or otherwise inhibit or favor certain applications or classes of applications.

  7. Device Attachment Rules

    XIT does not employ any device attachment rules that place restrictions on the types of devices or require approval procedures for devices to connect to the network. For technical restrictions, please refer to our Acceptable Use Policy.

  8. Network Security

    XIT knows the importance of securing its network and customers from network threats and annoyances. The company promotes the security of its network and patrons by providing resources to its customers for identifying and reporting such threats as spam, viruses, firewall issues, and phishing schemes. The company also deploys spam filters in order to divert spam from an online customer’s email inbox while allowing the customer to control which emails are identified as spam.

  9. Technology

    XIT’s network management employs a variety of industry-standard tools, applications, and devices to monitor, secure and maintain its network. Software to measure and monitor traffic usage is employed as well as software for spam filtering and denial of service attacks.

  10. Monitoring Schedule

    XIT uses network management software to conduct periodic monitoring of the network in order to detect abnormal traffic flows, congestion, network security breaches, malware, loss, and damage to the network. Monitoring techniques include hourly threshold monitoring.

  11. Network Performance

    XIT takes measurements of various components for network performance, analysis of the measurements to determine normal levels, and determination of appropriate threshold values to ensure required levels of performance for its network. The company measures such components as upload/download speeds, latency, internal testing, and consumer speed tests to gauge network performance. XIT provides specific network performance measurements on actual vs. advertised upload and download speeds and periodically performs round trip latency measurement. The following performance measurements are collected and evaluated on a regular basis:

    • Actual Download Speeds
    • Actual Upload Speeds
    • Latency

  12. Impact of Non-BIAS Services

    The company does not currently offer any non-BIAS services, Accordingly, customers’ broadband experiences will not be impacted.

  13. Commercial Terms

    A description of XIT Communication’s service offerings, rates, and Privacy Policy may be found on XIT’s website at the following link: www.xit.net.

    For questions, complaints or requests for additional information, please contact XIT Communications by calling (806) 384-3311.

    The privacy policy concerning the inspection of network traffic includes only authorized personnel within the company and law enforcement entities. Redress options regarding end-user and edge provider complaints are conducted by telephone or premises trips, with infringement rights leading to permanent disconnects.