}

Network Managment

Maxwire Inc Network Management Policy

1. Overview

o Our network management practices aim to provide all customers with high-quality, reliable internet access.

2. Congestion Management

o Network congestion may occur during periods of high demand. To maintain quality of service, we may prioritize certain types of time-sensitive traffic. Our practices include monitoring network usage patterns and adjusting bandwidth allocation as necessary to ensure all users have fair access to the network.

3. Congestion Management Practices

o We implement various techniques to mitigate congestion, including:

§ Traffic Shaping: We may temporarily adjust the flow of data for specific applications during peak times to prioritize essential services.

§ Load Balancing: Our network infrastructure distributes traffic evenly across available resources to prevent overload on any single point.

§ User Education: We provide information on best practices for usage during peak times to help customers optimize their experience.

§ Excessive Use Management: When congestion is identified beyond the company’s network capacity, we may limit or disconnect a customer’s use of the services if that customer is excessively using the services. It is anticipated that very small fractions of customers will excessively use the services, which may lead to these limitations. The company is committed to providing optimal services for all customers, so some limitations may occur.

4. Application-Specific Management

o We do not block or throttle any applications, except in cases of security threats or as required by law. Additionally, we do not prioritize affiliate traffic outside of standard network management practices.

5. Data Usage Thresholds

o Each rate plan includes a data usage threshold, which varies based on the selected plan. Once this threshold is exceeded, internet access speeds may be reduced to a level minimally sufficient to support very basic web browsing and email access. For customers who need additional data, we offer the option to purchase incremental blocks of data, with rates dependent on the selected plan. Unlimited capacity options are also available for continued full-speed access without usage restrictions.

6. Network Security

o We follow current industry standards for general internet security to maintain the integrity of our network infrastructure. While we protect the network itself from threats, we do not specifically secure end-user traffic. Customers are encouraged to implement their own security measures to protect personal devices and data.

7. Supported Devices

o We provide a complimentary consumer-grade edge device for internet access. Customers are welcome to use their own equipment, preferably a router, for connecting to our network. Please note that we are unable to offer support for customer-provided devices and reserve the right to limit network access for any device deemed a security or performance vulnerability.

8. Privacy and Data Collection

o Collected data is used solely to manage network quality and is not shared with third parties without consent.

9. Questions and Updates

o For more information or to submit questions and updates, please use the contact form available on our website. Policy changes will be updated on this page, and customers are encouraged to review this page regularly for the latest information.

Back to Homepage