Skip to main content

Network Management Practices

The Federal Communications Commission (“FCC”) requires that Boundless and other providers of broadband Internet access services disclose certain information regarding those services. We believe that all of the information required for disclosure under the FCC’s rules is found in this Agreement and on Boundless’ website. This section provides information on Boundless’ network management practices required by the FCC’s rules.

Blocking

Boundless does not prevent, other than for reasonable network management, end user access to lawful content, applications, services, or non-harmful devices.

Throttling

Boundless does not, other than for reasonable network management, degrade or impair access to lawful Internet traffic on the basis of content, application, service, user or use of a non-harmful device.

Affiliated Prioritization

Boundless does not prioritize or favor any traffic over other traffic, nor does it reserve bandwidth for any traffic. Boundless utilizes industry standard peering and CDN practices which optimize connectivity for its customers to provide the best network experience. All Internet traffic is treated equally across our network.

Paid Prioritization

Boundless is not paid to prioritize or favor any traffic over other traffic, nor does it reserve bandwidth for any traffic in exchange for any type of consideration. Boundless utilizes industry standard peering and CDN practices which optimize connectivity for its customers to provide the best network experience. All Internet traffic is treated equally across our network.

Congestion Managements

Boundless uses reasonable network management practices that are consistent with industry standards to manage congestion in its fiber network.

Application-Specific Behavior

Boundless does not engage in any practice to block or rate-control specific protocols or protocol ports, modify protocol fields in ways not prescribed by the protocol standard, or otherwise inhibit or favor certain applications or classes of applications.

Device Attachment Rules

Boundless requires devices to be compatible with IPv4, IPv6, and its Wi-Fi. Boundless limits the number of devices that can be attached but, generally, not the type of device.

Security

Boundless employs several practices to help prevent unwanted communications, such as spam, and protects the security of Boundless customers and network. Traffic volume and flows are monitored to manage capacity, detect malicious activity (i.e., DDoS or malware), and maintain regulatory compliance. Devices may be blocked if they are found to be participating in a DDoS attack or contain malware.

If you believe that Boundless is not meeting these terms, in addition to submitting a complaint to Boundless under the procedure in the Terms of Service, you may file a formal or informal complaint at the FCC. Informal complaints can be submitted by following the instructions here.