COMPLIANCE STATEMENT AND DISCLOSURES FOR FCC “TRANSPARENCY RULE”
Max Internet Solutions, LLC (the “Company”) provides this information in its good faith effort to comply with the disclosures required by the Federal Communications Commission (“FCC”) revised “transparency” rules effective on June 11, 2018. With these disclosures we provide our subscribers with the information necessary for them to make informed choices about the purchase and use of the Company’s wireless broadband Internet services (the “Company’s Services”).
For your information, our summary1 of the FCC Transparency Rule states as follows:
(a) Any person providing broadband Internet access service shall publicly disclose accurate information regarding the network management practices, performance characteristics, and commercial terms of its broadband Internet access services sufficient to enable subscribers to make informed choices regarding the purchase and use of such services and entrepreneurs and other small businesses to develop, market, and maintain Internet offerings. Such disclosure shall be made via a publicly available, easily accessible website or through transmittal to the Commission.
(b) Broadband internet access service is a mass-market retail service by wire or radio that provides the capability to transmit data to and receive data from all or substantially all Internet endpoints, including any capabilities that are incidental to and enable the operation of the communications service, but excluding dial-up Internet access service.
(c) A network management practice is reasonable if it is appropriate and tailored to achieving a legitimate network management purpose, taking into account the particular network architecture and technology of the broadband Internet access service.
The Company reserves the right to update and modify these disclosures and our underlying policies, in a manner consistent with the FCC’s directives, including, but not limited to, the Company’s terms and conditions, network management practices and performance characteristics. To the extent such changes are made they will be reflected in the links provided below.
The rates, terms and conditions associated with the Company’s Service, including by way of example only, early termination and/or additional network service fees, can be accessed via the following links:
Service Descriptions and Rates can be found here:
When changes are made to the rates, terms and conditions of the Company’s Service, we will post them on our website using the links referenced above.
How to contact us:
If you believe that the Company’s Service is not meeting the rates, terms and conditions applicable to what you have ordered, please feel free to contact us so that we can address your concern:
Via Telephone – 928-243-7811
Via Email – email@example.com
Via Mail – PO Box 1008, Taylor, AZ 85939
We strongly encourage you to contact us in order to discuss your concerns. If, based on those discussions, there is some remedial action necessary we can work together to implement it.
Network Management Practices
In offering the Company’s Service, the Company recognizes that, at times, network issues will arise and, during those times, the Company will undertake actions that are appropriate and tailored to achieving a legitimate network management purpose. The Company notes specifically the following network management practices described in the following link:
Please note that each of the statements is subject to the Company’s “permitted use” policy. These policies may also be bypassed or otherwise changed upon notification to us by lawful authorities via subpoena or court order. Such orders could mandate action specific to one or more subscriber(s) which requires us to take action not in compliance with the items below.
- Blocking. The Company does not block or otherwise prevent end user customer access to lawful content, applications, services, or non-harmful devices.
- Throttling. Except where network congestion may occur, the Company strives to avoid any degradation or impairment of access to lawful Internet traffic on the basis of content, application, service, user, or use of a non-harmful device. Where service congestion occurs, the Company Service’s speed may be temporarily reduced. See “Congestion Management”, below.
- Affiliated Prioritization. The Company does not engage in any practice that directly or indirectly favors any of its affiliates’ traffic over other traffic.
- Paid Prioritization. The Company does not engage in any practice that directly or indirectly favors some traffic over other traffic in exchange for consideration, monetary or otherwise from the sources of that traffic. However, our subscribers can choose to pay for higher nominal data rate plans as described in our Services description.
- Congestion Management. Due to the nature of wireless services, service congestion may occur during peak hours. The network itself will minimize the impact on all subscribers through its built-in congestion controls which impact all subscribers on a non-discriminatory basis. In layman’s terms, when things get busy, everyone has to get in line and is treated equally; there are no ‘express lanes’ for some subscribers and not others. The Company’s congestion management policies are described in its Network Management Policy available in the FAQ.
- Application-Specific Behavior.The Company does not:
a. block or rate-control specific protocols or protocol ports;
b. modify protocol fields in ways not prescribed by the protocol standard; or,
c. otherwise inhibit or favor certain applications or classes of applications.
- Device Attachment Rules. Provided that an attachment does not cause network harm, including but not limited to interference with the Company’s network security measures, the Company does not restrict the types of devices that its subscribers may use and attach to the Company’s network nor does it have any approval procedures for devices to connect to the Company’s network. Notwithstanding the above, the Company may choose to sell certain types and brands of ancillary equipment, for example residential wireless routers, to its subscribers as a convenience. Those devices, through the technology built into the device, may allow for more efficient and effective services within the home, but otherwise provide the same function as other devices available on the open market.
- Security. We monitor the operability and security of our network. Subscribers are encouraged to be responsible and seek out ways to protect their own home and business networks. Such measures include, but are not limited to, firewalls within a wireless router, securing Wi-Fi connections against unauthorized use, PC virus protection, etc. If a subscriber is unlawfully compromising the integrity of our network, they will be notified and directed to discontinue such practices at once or face immediate disconnection. We are happy to work with end-users on legitimate special applications or other functions that require us to create specific policies which enhance our normal security measures.
- Service Description. The descriptions of the Company’s Services, including (1) the service technology; (2) expected and actual access speed and latency; and (3) the suitability of the service for real-time applications, can be accessed via the following links:
– Services for general information and
– FAQ for specific information under the “Coverage and Equipment” tab.
- Impact of Non-Broadband Internet Access Service Data Services.
- The Company’s Service offering does not currently include any non-broadband Internet access service data services.
1 The full text of the FCC Rules can
be found in Federal
Register / Vol. 83, No. 36 / Thursday, February 22,