- Blocking
As its normal practice, XIT does not block any protocols, content, or traffic for purposes of network management except that the company may block or limit such traffic as spam, viruses, malware, or denial of service attacks to protect network integrity and the security of our customers.
- Throttling
XIT Communications does not engage in throttling, a practice that degrades or impairs access to lawful Internet traffic on the basis of content, application, service, user, or use of a non-harmful device.
- Affiliated Prioritization
XIT Communications does not engage in affiliated prioritization, a practice that directly or indirectly favors some traffic over other traffic, including through use of techniques such as traffic shaping, prioritization, or resource reservation, to benefit an affiliate, including identification of the affiliate.
- Paid Prioritization
XIT Communications does not engage in paid prioritization, a practice that directly or indirectly favors some traffic over other traffic, including through use of techniques such as traffic shaping, prioritization, or resource reservation, in exchange for consideration, monetary or otherwise.
- Managing Congestion
XIT Communications periodically monitors the connections on its network in the aggregate to determine the rate of utilization. If congestion emerges on the network the company will engage in the re-routing of Internet traffic to relieve congestion. On our core and access networks, XIT may increase capacity by adding bandwidth, as needed.
On XIT’s network, all customers have access to all legal services, applications, and content online. In the event of congestion, most Internet activities will be unaffected.
Some customers, however, may experience long download or upload times, or slower surf speeds on the web if instances of congestion do occur in XIT’s network.
Customers using conduct that abuses or threatens the company network or which violates the company’s Acceptable Use Policy or Internet service Terms and Conditions will be asked to stop any such use immediately. A failure to respond or to cease any such conduct could result in service suspension or termination.
XIT’s network and congestion management practices are ‘application-agnostic’, based on current network conditions, and are not implemented on the basis of customers’ online activities, protocols or applications. XIT’s network management does not relate to any particular customer’s aggregate monthly data usage.
- Application-Specific Behavior
Except as may be provided elsewhere, herein, XIT does not currently engage in any application-specific behaviors that block or control the rate of specific protocols or protocol ports, modify protocols in any way not prescribed by the protocol standard, or otherwise inhibit or favor certain applications or classes of applications.
- Device Attachment Rules
XIT does not employ any device attachment rules that place restrictions on the types of devices or require approval procedures for devices to connect to the network. For technical restrictions, please refer to our Acceptable Use Policy.
- Network Security
XIT knows the importance of securing its network and customers from network threats and annoyances. The company promotes the security of its network and patrons by providing resources to its customers for identifying and reporting such threats as spam, viruses, firewall issues, and phishing schemes. The company also deploys spam filters in order to divert spam from an online customer’s email inbox while allowing the customer to control which emails are identified as spam.
- Technology
XIT’s network management employs a variety of industry-standard tools, applications, and devices to monitor, secure and maintain its network. Software to measure and monitor traffic usage is employed as well as software for spam filtering and denial of service attacks.
- Monitoring Schedule
XIT uses network management software to conduct periodic monitoring of the network in order to detect abnormal traffic flows, congestion, network security breaches, malware, loss, and damage to the network. Monitoring techniques include hourly threshold monitoring.
- Network Performance
XIT takes measurements of various components for network performance, analysis of the measurements to determine normal levels, and determination of appropriate threshold values to ensure required levels of performance for its network. The company measures such components as upload/download speeds, latency, internal testing, and consumer speed tests to gauge network performance. XIT provides specific network performance measurements on actual vs. advertised upload and download speeds and periodically performs round trip latency measurement. The following performance measurements are collected and evaluated on a regular basis:
- Actual Download Speeds
- Actual Upload Speeds
- Latency
- Impact of Non-BIAS Services
The company does not currently offer any non-BIAS services, Accordingly, customers’ broadband experiences will not be impacted.
- Commercial Terms
A description of XIT Communication’s service offerings, rates, and Privacy Policy may be found on XIT’s website at the following link: www.xit.net.
For questions, complaints or requests for additional information, please contact XIT Communications by calling (806) 384-3311.
The privacy policy concerning the inspection of network traffic includes only authorized personnel within the company and law enforcement entities. Redress options regarding end-user and edge provider complaints are conducted by telephone or premises trips, with infringement rights leading to permanent disconnects.