Internet
Transparency Policy
Beginning June 11, 2018, all internet service providers (“ISPs”) were required to publicly disclose information about the network management practices, performance characteristics, and commercial terms of their broadband Internet services in one of two ways:
- By providing disclosures on publicly available, easily accessible websites of their choosing
- By submitting them to the Federal Communications Commission (“FCC”) for posting.
Lakeshore Fiber LLC (LSF) has elected to post our Internet Transparency Disclosure on our website at: https://Lakeshorefiber.com
1. Blocking
Any practice, other than reasonable network management elsewhere disclosed, that blocks or otherwise prevents end user access to lawful content, applications, service, or non-harmful devices, including a description of what is blocked.
LSF does not block or otherwise prevent end user access to lawful content, applications, service, or non-harmful devices.
2. Throttling
Any practice, other than reasonable network management elsewhere disclosed, that degrades or impairs access to lawful internet traffic based on content, application, service, user, or use of a non-harmful device, including a description of what is throttled.
LSF does not intentionally degrade or impair access to lawful internet traffic.
3. Affiliated Prioritization
Any practice that directly or indirectly favors some traffic over other traffic, including through use of techniques such as traffic shaping, prioritization, or resource reservation, to benefit an affiliate of an ISP, including identification of the affiliate.
LSF does not favor some traffic over other traffic.
4. Paid Prioritization
Any practice that directly or indirectly favors some traffic over other traffic, including through use of techniques such as traffic shaping, prioritization, or resource reservation, in exchange for consideration, monetary or otherwise.
LSF does not engage in Paid Prioritization
ISPs must also continue to disclose, as they have been required to since 2010, the following network management practices, performance characteristics, and commercial terms:
5. Congestion Management
Descriptions of congestion management practices, if any. These descriptions should include the types of traffic subject to the practices; the purposes served by the practices; the practices’ effects on end users’ experience; criteria used in practices, such as indicators of congestion that trigger a practice, including any usage limits triggering the practice, and the typical frequency of congestion; usage limits and the consequences of exceeding them; and references to engineering standards, where appropriate.
LSF monitors and proactively reinforces our network with additional throughput in areas where growth trends identify a need. If network congestion occurs, LSF uses various techniques to ensure a positive customer experience and fair distribution of network resources.
6. Application-Specific Behavior
Whether and why the ISP blocks or rate-controls specific protocols or protocol ports, modifies protocol fields in ways not prescribed by the protocol standard, or otherwise inhibits or favors certain applications or classes of applications.
LSF Internet customers receive full access to all the lawful content, services, and applications that the internet has to offer.
LSF does not otherwise block, prioritize, or degrade any internet sourced or destined traffic based on application, source, destination, protocol, or port unless it does so in connection with a security practice described in the Acceptable Use Policy.
7. Device Attachment Rules
Any restrictions on the types of devices and any approval procedures for devices to connect to the network.
LSF customers may attach devices of their choice to the LSF provided Optical Network Terminal. Any attached devices must be used in a manner consistent with our Acceptable Use Policy.
8. Security
Any practices used to ensure end-user security or security of the network, including types of triggering conditions that cause a LSF mechanism to be invoked (but excluding information that could reasonably be used to circumvent network security).
When malicious behavior is identified by LSF Engineers, LSF employs various techniques to help provide a positive customer experience. Our security management techniques ensure that customer equipment is not being exploited for DDoS attacks, malicious port scans, or engaging in other malicious behavior.
9. Service Description
A general description of the service, including the service technology, expected and actual access speed and latency, and the suitability of the service for real-time applications.
- High speed internet service is provided via a 10-gigabit uplink, and a redundant geographically diversified 10-gigabit uplink. Latency to LSF internet backbone providers is between 4ms and 9ms.
- G-PON Fiber-To-The-Home/Premise technologies are utilized to deliver service to the end user premises (customer). Under normal circumstances, a customer should expect to receive the speed of the service purchased. Latency on LSF’s network is less than 15ms.
- The internet access speeds quoted are the maximum rates by which downstream/upstream internet access data may be transferred between LSF facilities and the network interface device at Member prem The maximum rate is not guaranteed and may vary. The quoted speeds should not be confused with the speed at which LSF receives and sends internet access data through the public internet as such speeds are impacted by many factors beyond control of LSF. Actual internet speeds vary due to many factors including the capacity or performance of your equipment and its configuration, wiring and any wireless configuration, destination and traffic on the internet, internal network, or other factors at the internet site with which you are communicating, congestion on the network and the general speed of the public internet. Except as otherwise provided by law, LSF reserves the right to implement network management controls to optimize and ensure that adequate speed and data transfer is available to all LSF internet service subscribers.
10. Impact of Non-Broadband Internet Access Service Data Services
If applicable, what non-broadband Internet access service data services, if any, are offered to end users, and whether and how any non-broadband Internet access service data services may affect the last-mile capacity available for, and the performance of, broadband Internet access service.
LSF is not offering any non-internet access on their network at this time.
11. Price
For example, monthly prices, usage-based fees, and fees for early termination or additional network services.
Current information on pricing may be obtained by visiting the LSF website at https://www.lakeshorefiber.com
12. Privacy Policies
A complete and accurate disclosure of the ISP’s privacy practices, if any. For example, whether any network management practices entail inspection of network traffic, and whether traffic is stored, provided to third parties, or used by the ISP for non-network management purposes.
- LSF does not inspect, store, or share any customer network traffic on its ISP infrastructure.
- Like most other websites, LSF maintains web logs that automatically record basic information about visitors. This information consists of:
- Internet domain from which you access our website (i.e., aol.com, yourschool.edu, yourcompany.com).
- IP address. An IP address is automatically assigned to your computer when you surf the web. In some cases, these addresses may be individually identifiable. However, even when an IP address is identifiable, it usually takes additional effort to link a particular IP address to a specific individual.
- For many users, an IP address cannot be linked to a specific individual.
- Type of browser and operating system used to access our website.
- Date and time of access.
- Pages visited.
- Address of the website (if any) from which you linked to LSF Internet.
- LSF normally only uses web log information in aggregate form to enable us to make our site more useful. LSF likes to know which features are popular and how visitors locate the site. Web logs may be used to identify visitors who seek to damage the website, use the website in unauthorized ways, or interfere with operations. Information about users who try to engage in any unapproved activities may be shared with law enforcement agencies. LSF does not collect any personal information about a routine visitor unless the visitor provides it to LSF.
13. Redress Options
Practices for resolving complaints and questions from consumers, entrepreneurs, and other small businesses.
Please contact Lakeshore Fiber Customer Service at (989) 321-9889 to discuss any issues or concerns.