Network Management Practices Policy Disclosure

Pursuant to the Federal Communications Commission’s (“FCC’s”) Open Internet Rules found in Part 8 of Title 47 of the Code of Federal Regulations, the policies of S&T Communications, LLC. (“Provider”) regarding network management practices, performance characteristics and commercial terms are provided in entirety so that Provider’s current customers, prospective customers, third-party content providers and other interested parties can make informed choices regarding Provider’s broadband Internet access services and the extent to which Provider’s network management practices may affect those services.

  1. Network Management Practices. In the interest of providing the best online experience possible for all of Provider’s customers, Provider utilizes reasonable network management practices tailored to achieve legitimate network management purposes. Because bandwidth is a limited resource for broadband Internet service providers, it is essential that Provider reasonably manages its network to promote the use and enjoyment of the Internet by all of Provider’s customers. By engaging in reasonable and responsible network management, Provider prevents its customers from being subjected to the negative effects of spam, viruses, security attacks, network congestion and other risks that threaten to degrade service. The network management practices employed by Provider are consistent with industry standards.

1.1 Blocking, Throttling, and Prioritization. Provider does not block or otherwise prevent customer access to lawful content, applications, services, or non-harmful devices. Provider does not degrade or impair customer access to lawful Internet traffic on the basis on content, application, services, user, or use of a non-harmful device. Provider does not directly or indirectly favor some traffic over other traffic to benefit an affiliate’s content, services, or applications. Provider does not directly or indirectly favor some traffic over other traffic in exchange for monetary consideration or other value.

1.2 Congestion Management. It is possible that a relatively small number of customers may place a disproportionate demand on the network bandwidth resources, causing network congestion and an overall degradation in service quality for other end users. For this reason, if Provider’s network nears a state of congestion, Provider will use congestion management practices to ensure all of Provider’s customers retain access to a “fair share” of bandwidth resources. When Provider’s network nears a state of congestion, the congestion management tools, practices and/or software employed by Provider will identify segments of Provider’s network which have a predetermined, aggregated level of bandwidth usage. From there, the congestion management tools will ascertain which customer account in the identified network segment is using a disproportionate share of the bandwidth. The Internet traffic of the identified customer account may be temporarily managed until the period of network congestion passes. Customers whose Internet traffic is temporarily managed by Provider will still be able to do anything they want online, and many activities will be unaffected; however, these customers may experience slower downloads and uploads and Internet/website response times. The congestion management practices utilized by Provider are “protocol agnostic” meaning that the network does not manage congestion based on the online activities, protocols or applications a customer uses. Rather, Provider’s congestion management practices focus only on the heaviest bandwidth users in real time.

1.3 Application-Specific Behavior. Provider does not make use of any application- specific network management practices. Provider does not favor, modify, inhibit, rate control or block any specific protocols, protocol ports or fields, or any applications or classes of applications.

1.4 Device Attachment Rules. In order for a device to be approved for use on Provider’s network, the device must conform to lawfully publicly available industry standards and be non-harmful to Provider’s network.

General restrictions on types of devices to connect to network. Our broadband Internet service works with most PCs and laptops including Macs, and other Internet compatible devices like game systems and Internet-enabled TVs. If a password-protected wireless router is connected to our broadband Internet service, wireless Internet compatible devices properly connected to the router including computers, tablets, smartphones, and other devices can connect to our network. If a customer or potential customer believes they have an unusual configuration, our customer service department will help determine if there is a compatibility problem.

  • Cable Modems. S&T Communications Cable Modem broadband Internet services requires connection of a cable modem to our network which will be obtained from us.
  • Wireless Internet Customer Premise Equipment. S&T Communications wireless Internet service requires connection from specific wireless customer premise receivers to our network which will be obtained from us.

All users are fully responsible for securing their equipment, including wireless routers, to prevent unauthorized access to the network by third parties and will be held fully responsible for the actions of such third parties that gain unauthorized access to the network through unsecured end user equipment.

1.5 Security. Provider offers its customers unrestricted access to all of the lawful content, services and applications available on the Internet. Provider uses industry standard tools and generally accepted best practices and policies to protect our customers from spam, phishing and other unwanted or harmful online content and activities. In the instances where these tools and policies identify online content as harmful or unwanted, the content may be prevented from reaching customers, or customers may be permitted to identify or inspect content to determine if it is harmful or unwanted. Provider currently utilizes a custom built application for spam and virus filtering.

  1. Performance Characteristics. Provider offers broadband Internet access service via Fiber-To-The-Premise (“FTTP”), Digital Subscriber Line (“DSL”), hybrid fiber-coax (cable modem), and fixed Wireless. The advertised speed of Provider’s Internet service are available at While the maximum advertised speed is attainable for end users, several factors may affect the actual speed of Provider’s Internet service offerings including, but not limited to: the distance of the consumer’s home or business from Provider’s Central Office (e.g., the further the customer is from the Central Office, the slower the broadband speed); wireless interference; the end user’s computer, modem or router; activity during peak usage periods; and other Internet traffic. Customer Speed Test. We provide an online speed test for our customers, available at
  2. Commercial Pricing. In order to meet the usage and budgetary needs of all of our customers, Provider offers a wide selection of broadband Internet access plan options, including promotional offerings, bundled service choices and ala carte alternatives. To see Provider’s current promotions and pricing on broadband Internet access service, please visit our website at or call 785-460-7300 to speak with a customer service representative.

3.1 Early Termination Fees. If a customer previously entered into a service agreement with Provider for broadband Internet access service for a defined service term, and customer desires to terminate the service agreement prior to the expiration of that term, Provider may charge a reasonable early termination fee if such fee is clearly indicated in the service agreement. Provider presently has an early termination fee.

3.2 Usage-Based Fees. Provider’s Internet service is priced on a flat-fee basis (plus taxes). Provider does not charge end users a usage-based fee for Internet service. For additional information on Provider’s fee schedule for additional network services, visit Provider’s website at

3.3 Privacy Policy. The various network management tools and techniques utilized by Provider do not monitor, inspect or store the network activity and traffic of its Internet service users. Furthermore, as part of its network management practices, Provider does not distribute information on network activity and/or traffic to any third party, or use network traffic information for any non-network management purpose. S&T Communications, LLC.’s Network Management Practices Policy November 2011 Provider affords full access to all lawful content, services and applications available on the Internet and does not routinely monitor, inspect or store the network activity and traffic of its Internet service users. However, Provider reserves the right to monitor bandwidth, usage, transmissions and content for purposes of protecting the integrity of the network and Provider’s Internet access service through reasonable network management practices. Provider may collect equipment information to identify the equipment customer is using on the network including, but not limited to, equipment type, serial number, settings, configuration and software. Provider may also collect performance information to examine the operation of the equipment, services and applications the customer may use on the network including, but not limited to, IP addresses, URLs, data transmission rates and latencies, location information, security characteristics, and information about the amount of bandwidth and other network resources customer is using in connection with uploading, downloading or streaming data to and from the Internet.  Network traffic, activity, performance information and equipment information monitored or collected by Provider is done so for the sole purpose of reasonable network management purposes. Provider is required to comply with relevant laws, regulations and judicial orders. Information covered under this Privacy Policy, as well as other categories of information, may be disclosed to third parties if Provider determines, in its sole discretion, that such a disclosure is necessary or required. Provider may also disclose this information if, in its sole discretion, such a disclosure is necessary or required to protect its interests or the interests of our customers. Provider may also disclose this information in connection with the sale of its business. The Provider’s network management practices as discussed herein are intended solely to provide the best online experience possible for all of Provider’s customers by safeguarding our network and its users from spam, viruses, phishing and other unwanted or harmful online content and activities. Provider’s network management practices are not intended, nor implemented, to block consumers from accessing the content and applications of their choice, deprive consumers of their entitlement to competition, or discriminate against or in favor of certain network traffic. End users with questions, concerns or complaints regarding Provider’s network management practices are encouraged to contact Provider for issue resolution.

3.4 Contact Us. If you have any questions regarding Provider’s Network Management Practices Policy or would like to file a complaint with Provider regarding its network management practices, please contact Provider at: 


S&T Communications, LLC.

Attn: Network Operations

PO Box 99

Brewster, KS 67732

(800) 432-8294

[email protected]



Furthermore, if you believe Provider is in violation of the FCC’s Open Internet Rules, you may file either an informal or formal complaint with the FCC (

3.5 Additional Disclaimers. The Open Internet Rules, as adopted, and Provider’s Network Management Practices Policy are not intended to affect, alter or otherwise supersede the legal status of cooperative efforts by broadband Internet access service providers and other service providers that are designed to curtail infringement in response to information provided by rights holders in a manner that is timely, effective and accommodates the legitimate interests of providers, rights holders and end users. Furthermore, the Open Internet Rules, as adopted, and Provider’s Network Management Practices Policy do not prohibit Provider from making reasonable efforts to address the transfer of unlawful content or unlawful transfers of content. For additional information, please review Provider’s Acceptable Internet Use Policy/Subscriber Agreement.