GVTC's Network Management Policy
GVTC Communications, ("GVTC" or "Company") provides this Policy in order to disclose its network management practices in accordance with the FCC's Open Internet Rules.
GVTC manages its network to ensure that all of its customers experience a safe and secure broadband Internet environment that is fast, reliable and affordable. GVTC wants its customers to indulge in all the Internet has to offer, whether it is social networking, streaming videos and music, or communicating through email and videoconferencing.
GVTC manages its network for a number of reasons, including optimization, as well as congestion- and security-protocol-management. Such practices are consistent with reasonable network management actions and are intended to improve the overall performance for customers.
GVTC's Network Management Practices
GVTC uses various tools and industry standard techniques to manage its network and deliver fast, secure and reliable Internet service. Such management tools and practices include the following:
I. Managing Congestion
GVTC manages the traffic on its network in the aggregate to determine the rate of utilization. GVTC manages its network to provide the most economical service with the highest quality. GVTC provides a multi-homed links in its backbone network to help protect against outages. GVTC adds capacity to its network before utilization has reaches full capacity. GVTC engineers the local facilities to fully meet the customer's traffic requirements. GVTC may increase capacity by upgrading to Fiber-To-The-Home (FTTH), splitting coax node, adding transport, adding Internet aggregation routers and adding bandwidth, as needed.
On GVTC's network, all customers have access to all legal services, applications and content online and, in the event of congestion, most Internet activities will be unaffected. Some customers, however, may experience longer download or upload times, or slower surf speeds on the web if instances of congestion occur on GVTC's network.
Customers using conduct that abuses or threatens the GVTC network or which violates the company's Acceptable Use Policy, Internet service Terms and Conditions, or the Internet Service Agreement will be asked to stop any such use immediately. A failure to respond or to cease any such conduct could result in service suspension or termination.
GVTC's network and congestion management practices are 'application-agnostic', based on current network conditions, and are not implemented on the basis of customers' online activities, protocols or applications. GVTC's network management practices do not relate to any particular customer's aggregate monthly data usage. GVTC does not prioritize or discriminate against any applications or protocols except for specialized networks.
II. Network Security
GVTC knows the importance of securing its network and customers from network threats and annoyances. The company promotes the security of its network and patrons by providing resources to its customers for identifying and reporting such threats as spam, viruses, firewall issues, and phishing schemes. The latest information is posted on our website under Web Scam Alert. GVTC also deploys spam filters in order to divert spam from an online customer's email inbox while allowing the customer to control which emails are identified as spam. Spam is quarantined in a separate file that the Customer may access.
As its normal practice, GVTC does not block any protocols, content or traffic for purposes of network management except that the company may block or limit such traffic as spam, viruses, malware, or denial of service attacks to protect network integrity and the security of our customers. GVTC does filter ports to reduce the spread of computer-related viruses and protecting your computer from intruder access. If GVTC suspects traffic originated by its customers is virus related, GVTC will contact the suspected party. If there is no response, the customer's service will be suspended until the issue can be resolved.
GVTC does not currently engage in any application-specific behaviors in its network, except as maybe listed in the Specialized Service section of this policy.
III. Monitoring Schedule
GVTC has deployed software that continuously monitors the network for performance and provides performance reports. In the backbone network, alarms or alerts are generated if the performance is degraded. In addition, traffic is analyzed and trended to insure peak performance. GVTC adds capacity to relieve congestion when thresholds are met. GVTC also uses industry standard software tools to check for abnormal traffic flows, network security breaches, malware, loss, and damage to the network. If a breach is detected or high volume users are brought to light by complaint, GVTC provides notification to the customer via email or phone. If a violation of GVTC's policies has occurred and such violation is not remedied, GVTC will seek to suspend or terminate that customer's service.
IV. Network Management Technology
GVTC employs a variety of industry-standard tools, applications and devices to monitor, secure and maintain its network, including the following:
-network graphing solutions;
-latency measurement software; and
-bandwidth and performance measurement platforms;
V. Service Descriptions
GVTC offers broadband service over Cable Modem, ADSL, FTTH facilities and leased transport. GVTC offers speeds ranging from 768 Kbps to 1 Gbps. Not all service tiers are offered on all technologies. Details of the service tiers and the rates are listed on the website.
All of GVTC's broadband service tiers above 1.5 M are capable of supporting real time applications.
VI. Network Performance
GVTC broadband services are best effort performance. GVTC makes every effort to support advertised speeds and will dispatch repair technicians to customer sites to perform speed tests as needed to troubleshoot and resolve speed and application performance issues that are caused by GVTC's network. GVTC measures availability, latency, and aggregate utilization on the network and strives to meet internal service level targets in its network. However, the customer's performance is also affected by the particular website being accessed, capacity in the public internet beyond the GVTC network and the customer's computer, inside wiring, wireless router, and other customer equipment.
VI. Specialized Services
GVTC does not offer any specialized services at this time.
VII. Device Attachment Rules
Customer will need a Network Interface Card (NIC) installed in the PC or a USB port in order to use the DSL Modem/Router. In addition, all customer equipment attached to the broadband service should meet standards for consumer electronics and not harm the network.
If GVTC discovers a customer device is harmful to its network, GVTC has the right to request that the customer remove such device.
VIII. Other Notices
In addition to this Network Management Policy, patrons may also find other notices As follows:
Acceptable Use Policy
Web Scam Alert
Internet Service Terms and Conditions
For questions, complaints or requests for additional information, please contact GVTC at (1-800-367-4882) or Contact Us.