Open Internet Policy Statement

(as of July 2018)

TechBridge BNS (“TECHBRIDGE,” “we,” “our,” or “us”) provides Internet access.  We are committed to providing our Services as an open platform for innovation, investment, job creation, economic growth, competition, and free expression.  TECHBRIDGE BNS also supports the following Net Neutrality principles:

  • Transparency
  • NO Blocking of lawful Internet content, subject to reasonable network management as described below
  • NO Throttling of lawful Internet content, subject to reasonable network management as described below
  • NO Unreasonable Discrimination
  • NO Paid Prioritization of Internet content
  • Freedom of subscribers to access lawful Internet content
  • Freedom of subscribers to use non-harmful applications of their choice
  • Freedom of subscribers to attach non-harmful personal devices

This Open Internet Policy Statement sets forth certain information regarding the policies and practices of TechBridge and how we manage our networks for residential and business broadband internet access service (the “TechBridge Networks”).  This Open Internet Policy Statement is a supplement to and is incorporated by reference in the various legal terms and conditions of our Services, which are found at our Policies and Agreements page, including but not limited to TechBridge’s “Acceptable Use Policy” (collectively “Service Agreements”).  In the event of any inconsistency between this Open Internet Policy Statement and the Service Agreements, this Open Internet Policy Statement shall control.

TechBridge’s broadband access service is a fixed wireless service.  Generally, given the nature of fixed wireless services, certain circumstances may affect the speed and quality of the service, including but not limited to foliage, line-of-sight obstructions, the distance between a subscriber’s premises and the transmission point, as well as the subscriber’s connection of multiple devices to a TechBridge Network.  Although we have engineered the TechBridge Networks to provide consistent high-speed data services, some network management for these scenarios is required in order to provide the best online experience possible for all of our subscribers.  Very heavy data usage by even a few subscribers at times and places of competing TechBridge Network demands can affect the performance for all subscriber

I. NETWORK MANAGEMENT PRACTICES

Network management is only activated when congestion is detected on a TechBridge Network.  In regular intervals, TechBridge Network equipment is polled to identify what devices may be experiencing congestion.  When a specific device is determined to be congested, the subscribers serviced from that/those network device(s) are analyzed and then managed based on plan and usage thresholds until the congestion has been alleviated, as described more fully below.  Subscribers will still be able to do what they want online; in many cases activities may be unaffected.  In other cases, subscribers may see reduced speed in downloads or uploads.  No specific type of usage activity or subscriber aggregate monthly usage is targeted by these practices.  It is important to note that TechBridge Network management is temporary and based on constantly changing network conditions.

The network management practices described in this section are part of the “standard” TechBridge Network architecture.  As TechBridge acquires other broadband Internet networks, we implement these practices as quickly as possible.

  1. Blocking: Other than reasonable network management practices disclosed below, we do not block or otherwise prevent a subscriber from accessing lawful content, applications, services, or your use of non-harmful devices.
  2. Throttling: Other than reasonable network management practices disclosed below, we do not throttle or otherwise shape, slow, degrade or impair a subscriber from accessing lawful Internet traffic on the basis of content, application, service, user, or use of a non-harmful device. All lawful Internet use is handled identically.
  3. Affiliated Prioritization: We do not directly or indirectly favor some traffic over other traffic, including through use of techniques such as traffic shaping, prioritization, or resource reservation, to benefit any of our affiliates, defined as an entity that controls, is controlled by, or is under common control with TechBridge.
  4. Paid Prioritization: We do not directly or indirectly favor some traffic over other traffic, including through use of techniques such as traffic shaping, prioritization, or resource reservation, in exchange for consideration, monetary or otherwise.
  5. Congestion Management: Our Services are provided on a “best efforts” basis and our congestion management practices are in place to ensure that all subscribers experience as high quality a service. If our Network experiences congestion, it is typically between 7:00 pm and 11:00 pm local time.  Subscribers select how much high-speed data they receive under a designated service plan.  If a subscriber exceeds his/her/its selected high-speed allotment during a service cycle, we may reduce the subscriber’s data speed for the remainder of that service cycle.  We do not impose any additional usage limits for the Services unless part of our network management practices.

In a manner consistent with our Service Agreements and Privacy Policy, we may monitor network traffic to ensure capacity is sufficient to maintain an efficient network load, to perform diagnostics and to otherwise manage and enhance the TechBridge Networks.  To help manage traffic on the TechBridge Networks, during times of high demand, we may allocate available bandwidth among subscribers on an equal basis, by account level.  In addition, we may prioritize certain applications, such as public safety and voice, over other traffic types.

  • TechBridge deploys three types of “fair queuing” as a network management tool when congestion is present in TechBridge Networks, including (a) “fair split” where all users on a device get a fair share of bandwidth; (b) “fair factor” which allows for users on different service plans to get a proportion of bandwidth based on their plan (i.e. a 5Mbps user will get less bandwidth than a 50Mbps user); or (c) “borrowing” where TechBridge prioritizes types of traffic to deliver a higher quality of experience (i.e. VoIP has priority over streaming and streaming has priority over bulk file transfers/downloads). No traffic type is completely denied access.
  • TechBridge may also use specific traffic shaping software in order to manage our Network during periods of congestion.
  • TechBridge may also conduct deep packet inspection (“DPI”), which is a type of filtering that will examine the data and/or header part of Internet traffic for viruses, spam, intrusions, or protocol non-compliance that may harm a TechBridge Network; to determine the routing of Internet traffic; for internal statistical and performance purposes; for lawful intercept capabilities, and/or enforcement of our Service Agreements. We do not use DPI to conduct data mining for targeted marketing or advertising, or anti-competitive purposes.
  • If TechBridge determines, in our sole and reasonable discretion, that the manner in which a subscriber is using the service negatively impacts other subscribers or any TechBridge Network, we reserve the right to apply additional congestion management techniques.
  • Application-Specific Behavior: Subject to the qualification that TechBridge may reasonably limit or rate-control specific or classes of applications, or other specific protocols or protocol ports as set forth below, TechBridge generally treats all lawful applications identically. However, we reserve the right to block or limit access to any applications, ports, or protocols that we determine, in our sole and reasonable discretion, may expose any TechBridge Network to potential legal liability, harm any TechBridge Network or otherwise interfere with or impair the experience of other subscribers on TechBridge Networks.  TechBridge Networks also may not support certain high-bandwidth video and voice applications, or peer-to-peer applications that carry unlawful or harmful content/software.
  • Device Attachment Rules: Generally, you do not need approval to connect a third-party device to a TechBridge Network. TechBridge does not limit the types of devices that can be connected to any TechBridge Networks, provided they are used for lawful purposes and do not harm a TechBridge Network, violate our Service Agreements, or harm other users of TechBridge Networks. However, if we determine, in our sole and reasonable discretion, that the connection of a particular type of device to any TechBridge Network negatively impacts other users or the TechBridge Network, or may expose us to potential legal liability, we reserve the right to limit or restrict subscribers’ ability to connect such type of device to TechBridge Networks.  If you need technical support services to assist you in the installation and configuration of third party devices, please contact us or visit http://bns.techbridge.solutions/support/.  Depending on your level of service and your specific Service Agreement, there may be an additional monthly fee for our IT support services.
  • Security: TechBridge has taken reasonable physical, technical and administrative safeguards to protect the integrity and operations of TechBridge Networks and our subscribers from malicious and unwanted Internet traffic. We monitor the TechBridge Network for security threats and may prohibit certain activity on TechBridge Networks that we may deem, in our sole and reasonable discretion, poses a potential risk to any TechBridge Network and/or to other subscribers.  Triggering conditions include but are not limited to denial of service activity, IP address or port scanning, excessive account login failures; or certain Internet addresses that are disruptive, malicious and typically persistent.  If we notice excessive subscriber connections, including but not limited to Wi-Fi connections, that are harmful or are commonly used to disrupt the normal use of any TechBridge Network or use by other subscribers, we will attempt to notify the subscriber to work collaboratively to remedy the issue to the extent possible; however, we reserve the right as a reasonable security practice, without advance notice, to block any subscriber traffic, ports, protocols, devices, or applications (such as peer-to-peer applications that may carry malicious software or are known to be problematic) that we determine, in our sole and reasonable discretion, may cause harm to any TechBridge Network or to other subscribers, or may expose us to potential legal liability.

II. PERFORMANCE CHARACTERISTICS AND COMMERCIAL TERMS

Specific service fees and rates for an individual subscriber are set forth in the subscriber’s invoice. Various information regarding our Services, including additions, changes or modifications are also publicized on the TechBridge BNS Web site at http://bns.techbridge.solutions/.

  1. Service Description and Terms: Links to a current description of the categories of Internet access service offered to subscribers are available below, including service terms, expected and actual access speed and latency, and the suitability of the service for real-time applications. The service terms of our Services are subject to change at any time:
  2. Service Pricing and Fees: Links to the current rate card pricing and additional fees for Internet access service offered to residential and business subscribers are available below. TechBridge BNS offers a range of service plans and special promotions that may affect this pricing and the pricing for our Services are subject to change at any time:
  3. Usage MeteringTechBridge subscriptions include a specific amount of monthly Internet data usage (up and down transfer) as specified in each subscriber’s service plan. If usage exceeds the threshold, additional charges will apply.  Charges will be based on usage (up and down transfer) in 50 GB increments.  50 GB increments will be billed after the first bit of usage over the subscription threshold.  Additional 50 GB increments will be billed as usage dictates.

Subscribers will be notified when they have hit certain usage thresholds.  Email notification will be sent to the subscriber at the following events:

  • 75% of subscription usage has been consumed
  • 95% of subscription usage has been consumed
  • Every time a new 50 GB increment has been purchased
  1. Network Speeds: TECHBRIDGE BNS offers a range of download speeds to subscribers varying from 2 Mbps to 20 Mbps.  The network is designed to support these speeds to help ensure that every subscriber receives the speeds to which they have subscribed.  TechBridge BNS however cannot guarantee speeds at all times, as there are many factors and conditions beyond TechBridge BNS’s control that can affect Internet performance.  Some of these external factors and conditions are:
  • Performance of subscriber computer and/or router
  • Type of connection to TechBridge BNS Customer Premise Equipment (i.e., Wi-Fi)
  • Congestion of web sites and services on Internet
  • Web site or service limiting speeds on the Internet
  • Internet and equipment performance outside of the TechBridge BNS Network

TechBridge BNS Internet packages are advertised as “up to” certain speeds reflecting performance under ideal conditions.  Without purchasing an expensive “dedicated” Internet connection, no Internet Service Provider can guarantee package speeds at all times.

TechBridge BNS provides a Speed Test for our subscribers to use.  While the test results on this site provide information regarding service speeds, they are not definitive as they are highly dependent on equipment and configuration found in the home network.  Subscriber speed tests are collected from the TechBridge BNS Speed Test servers identified above.  These results are calculated by averaging all subscriber speed tests and latency, by plan, at peak periods of usage.  Peak periods of usage are defined as 7:00 pm to 11:00 pm on weeknights.

  1. Impact of Non-Broadband Internet Access Service Data Services (also known as “Specialized Services”): TECHBRIDGE BNS does not offer Specialized Services to subscribers that will affect the last-mile capacity available for, and the performance of, our broadband Internet access Service offering.
  2. Acceptable Use: As set forth in the Service Agreement, all of TechBridge BNS’s service offerings are subject to the Acceptable Use Policies (“AUP”) section of the Service Agreement, which we may from time to time establish or revise. The AUP is available here.
  3. Privacy Policy: TechBridge BNS’s current Privacy Policy is available here.
  4. Redress Options: TechBridge endeavors to respond to all subscriber concerns and complaints in a timely and fair manner. We encourage subscribers to contact us at 916-580-1485, or support@techbridge.solutions, or U.S. postal mail to discuss any complaints or concerns as relating to TechBridge BNS.  Our postal address is 7325 Roseville Road, Sacramento, CA 95842, Attention: Customer Care.
  5. Disputes and Arbitration: The Service Agreement requires the use of arbitration to resolve disputes and otherwise limits the remedies available to subscribers in the event of a dispute.

III. FCC REQUIREMENTS AND COMPLAINT PROCESS

The Federal Communications Commission (“FCC”) has adopted rules to preserve the Internet as an open platform (“Rules”).  Information regarding these Rules is available on the FCC’s website at: https://www.fcc.gov/restoring-internet-freedom

If a subscriber believes that we are not in compliance with the FCC’s rules, the subscriber may file an informal complaint with the FCC.  The FCC urges subscribers to submit any complaints via its website at the following address: https://consumercomplaints.fcc.gov/hc/en-us.

IV. ADDITIONAL DISCLAIMERS

This Open Internet Policy Statement does not affect, alter or otherwise supersede the legal status of cooperative efforts by TechBridge BNS that are designed to curtail copyright or trademark infringement in response to information provided by rights holders in a manner that is timely, effective, and accommodates the legitimate interests of the company, rights holders, our subscribers and other end users.  Furthermore, this Open Internet Policy Statement does not prohibit us from making reasonable efforts to address the transfer of unlawful content or unlawful transfers of content.  For additional information, please review the Service Agreements and Privacy Policy.