A. Blocking: Other than reasonable network management practices disclosed below, we do not block or otherwise prevent a Customer from lawful content.
B. Throttling: Other than reasonable network management practices disclosed below, we do not throttle or otherwise degrade or impair access to lawful Internet traffic on the basis of content, application, service, user, or use of a non-harmful device.
C. Affiliated Prioritization: We do not directly or indirectly favor some traffic over other traffic, including through use of techniques such as traffic shaping, prioritization, or resource reservation, to benefit any of our affiliates, defined as an entity that controls, is controlled by, or is under common control with Myakka.
D. Paid Prioritization: We do not directly or indirectly favor some traffic over other traffic, including through use of techniques such as traffic shaping, prioritization, or resource reservation, in exchange for consideration, monetary or otherwise.
i. We may conduct deep packet inspection (“DPI”), which is a type of filtering that will examine the data and/or header part of Internet traffic for viruses, spam, intrusions, or protocol non-compliance that may harm the Myakka Network; to determine the routing of Internet traffic; for internal statistical and performance purposes; for lawful intercept capabilities, and/or enforcement of our Service Agreement. We do not use DPI to conduct data mining for targeted marketing or advertising, or anti-competitive purposes.
ii. If we determine, in our sole and reasonable discretion, that the manner in which a Customer is using the Service negatively impacts other Customers or the Myakka Network, we reserve the right to apply additional congestion management techniques.
F. Application-Specific Behavior: Subject to the qualification that Myakka may reasonably limit or rate-control specific or classes of applications, or other specific protocols or protocol ports, Myakka generally treats all lawful applications identically. However, we reserve the right to block or limit access to any applications, ports or protocols that we determine, in our sole and reasonable discretion, may expose the Myakka Network to potential legal liability, harm the Myakka Network or otherwise interfere with or impair the experience of other Customers on the Myakka Network. The Myakka Network may also not support certain high-bandwidth video and voice applications, or peer-to-peer applications that carry unlawful or harmful content/software.
G. Device Attachment Rules: Generally, you do not need approval to connect a third-party device to the Myakka Network. Myakka does not limit the types of devices that can be connected to the Myakka Network, provided they are used for lawful purposes and do not harm the Myakka Network, violate our Service Agreement, or harm other users of the Network. However, if we determine, in our sole and reasonable discretion, that the connection of a particular type of device to the Myakka Network negatively impacts other users or the Myakka Network, or may expose us to potential legal liability, we reserve the right to limit or restrict Customers’ ability to connect such type of device to the Myakka Network. If you need technical support services to assist you in the installation and configuration of third party devices, please contact us at (941) 322-2828 or Mark Ackaway (firstname.lastname@example.org ). Depending on your level of Service and your Service Agreement, there may be an additional monthly fee for IT support services.
H. Security: We have taken reasonable physical, technical and administrative safeguards to protect the integrity and operations of the Myakka Network. We monitor the Myakka Network for security threats and may prohibit certain activity on the Myakka Network that we may deem, in our sole and reasonable discretion, poses a potential risk to the Myakka Network or to other Customers. Triggering conditions include but are not limited to denial of service activity, IP address or port scanning, excessive account login failures; or certain Internet addresses that are disruptive, malicious and typically persistent. If we notice excessive Customer connections, including but not limited to Wi-Fi connections, that are harmful or are commonly used to disrupt the normal use of the Myakka Network or use by other Customers, we will attempt to notify the Customer to work collaboratively to remedy the issue to the extent possible; however, we reserve the right as a reasonable security practice, without advance notice, to block any Customer traffic, ports, protocols, devices, or applications (such as peer-to-peer applications that may carry malicious software or are known to be problematic) that we determine, in our sole and reasonable discretion, may cause harm to the Myakka Network or to other Customers, or may expose us to potential legal liability.