In The Stix Broadband - Open Internet Disclosures

In The Stix Broadband strives to provide consumers with accessible, easy-to-understand information about the services we provide, so they can make informed decisions about which services best meet their needs. Consistent with that goal, we have established this page as a single place where consumers and others can access and review the relevant policies, agreements, and other information about our services.

Additionally, the Federal Communications Commission ("FCC") requires that In The Stix Broadband and other Internet providers disclose certain information regarding those services. The information required for disclosure under the FCC's rules is found below and in the various policies and documents listed and linked on this page. To assist you in finding the information you're looking for, we highlight below information that the FCC specifically calls for in the Open Internet Disclosures.

Network Practices

In The Stix Broadband does not discriminate against lawful Internet content, applications, services, or non-harmful devices. The points below provide an overview of our network practices with respect to its Internet access services.

Blocking

In The Stix Broadband does not block or otherwise prevent end user access to lawful content, applications, services, or non-harmful devices. In The Stix Broadband does engage in reasonable network management practices that limit and potentially block network flooding using applications like Bittorrent that may affect users network-wide, or affect network performance for other customers on an access point.

Throttling

In The Stix Broadband does not degrade or impair access to lawful Internet traffic on the basis of content, application, service, user, or use of a non-harmful device. In The Stix Broadband does engage in reasonable network management practices that limit network flooding using applications like Bittorrent that may affect users network-wide, or affect network performance for other customers on an access point.

Affiliated Prioritization

In The Stix Broadband does not directly or indirectly favor some traffic over other traffic, including through use of techniques such as traffic shaping, prioritization, or resource reservation, to benefit an affiliate.

Paid Prioritization

In The Stix Broadband does not directly or indirectly favor some traffic over other traffic, including through use of techniques such as traffic shaping, prioritization, or resource reservation, in exchange for consideration, monetary or otherwise although Business-class services take priority in times of congestion.

Network Management

In The Stix Broadband manages its network with one goal: to deliver the best possible fixed-wireless Internet access service to all of its customers. To further this effort, In The Stix Broadband uses reasonable network management practices that are consistent with industry standards. In The Stix Broadband uses various tools and techniques to manage its network, deliver its service, and ensure compliance with the Acceptable Use Policy and the Customer Agreement for Internet services. These tools and techniques are dynamic meaning they can and do change frequently. Network management activities may include identifying spam and preventing its delivery to customer email accounts, and detecting malicious Internet traffic and preventing the distribution of, or inadvertent access to, malware, phishing, viruses, or other harmful code or content.

Application-Specific Behavior

In The Stix Broadband provides its Internet access service customers with full access to all the lawful content, services, and applications that the Internet has to offer. In The Stix Broadband does not block or rate-control specific protocols or protocol ports (except to prevent spam, malicious attacks, flooding, and identity theft), does not modify protocol fields in ways not prescribed by protocol standards, and does not otherwise inhibit or favor certain applications or classes of applications.

Security

In The Stix Broadband employs a number of practices to help prevent unwanted communications, such as spam, and protect the security of our customers and network. We limit the number of login, SMTP, DNS, and DHCP transactions per second (at levels far above “normal” rates) that customers can send to our servers in order to protect them from Denial of Service (DoS) attacks. (We do not disclose exact rate limits in order to maintain the effectiveness of these measures.)

In order to further protect our customers, In The Stix Broadband blocks a limited number of ports that are commonly used to send spam, launch malicious attacks, or steal a customer’s information.

Performance Characteristics

Service Description

In The Stix Broadband provides an average latency from end user to our gateway of under 50ms, and plans meet or exceed the best effort "Up-to" speeds listed on our website. In The Stix Broadband has always prided itself on providing state-of-the-art Internet services at the highest possible speeds.

Commercial Terms

Pricing and Other Fees

In The Stix Broadband’s Internet access services may be subject to promotional rates. Additional fees, such as for equipment rental, installation, and early termination, may apply. For more information about pricing and fees for our various services, please contact a representative by phone at 814-472-2662 during business hours.

Data Usage Plans

All of our plans are truly unlimited with no throttling or data capping in any way. We do not plan to change this, and we pride ourselves on being able to do so in areas where other providers simply cannot or will not reach.

Privacy Policies

In The Stix Broadband's privacy policies with respect to Internet service are explained in the Privacy Policy.

Redress Options

If you have any questions about these disclosures, cannot find what you are looking for, or have any other concerns about In The Stix Broadband Internet service, please contact In The Stix Broadband at support@itxbb.net. In The Stix Broadband will review and promptly respond to all submissions.