Bee Creek Communications Inc.
Open Internet Transparency Policy as of September___, 2021
Page 3 of 6
a Customer is using the Service negatively impacts the technical capability of
other Customers to receive the Services or the operations of the Bee Creek
Network, we reserve the right to apply additional congestion management
techniques.
H. Application-Specific Behavior: Subject to the qualification that Bee Creek may
reasonably limit or rate-control specific or classes of applications, or other specific
protocols or protocol ports as set forth below, Bee Creek generally treats all lawful
applications identically. However, we reserve the right to block or limit access to any
applications, ports or protocols that we determine, in our sole and reasonable discretion,
may harm the Bee Creek Network or otherwise interfere with or impair the experience of
other Customers on the Bee Creek Network.
I. Device Attachment Rules: Generally, you do not need approval to connect a third-party
device to the Bee Creek Network. Bee Creek does not limit the types of devices that can
be connected to the Bee Creek Network, provided they are used for lawful purposes and
do not harm the Bee Creek Network, violate our Service Agreement, or harm other users
of the Bee Creek Network. However, if we determine, in our sole and reasonable
discretion, that the connection of a particular type of device to the Bee Creek Network
negatively impacts other users or the Bee Creek Network such as causing interference or
other technical problems, creating a security risk, or violating our Service Agreement we
reserve the right to limit or restrict Customers’ ability to connect any such device to the
Bee Creek Network. If you need technical support services to assist you in the installation
and configuration of third party devices, please contact us or visit admin@beecreek.net.
Depending on your level of Service and your Customer Contract, here may be an additional
monthly fee for IT support services.
J. Security: We have taken reasonable physical, technical and administrative safeguards to
protect the integrity and operations of the Bee Creek Network. We monitor the Bee Creek
Network for security threats and may prohibit certain activity on the Bee Creek Network
that we may deem, in our sole and reasonable discretion, poses a potential risk to the Bee
Creek Network or to other Customers. Triggering conditions include but are not limited to
denial of service activity, IP address or port scanning, excessive account login failures; or
certain Internet addresses that are disruptive, malicious and typically persistent. If we
notice excessive Customer connections, including but not limited to Wi-Fi connections,
that are harmful or are commonly used to disrupt the normal use of the Bee Creek Network
or use by other Customers, we will attempt to notify the Customer to work collaboratively
to remedy the issue to the extent possible; however, we reserve the right as a reasonable
network management practice to protect our Customer’s security, without advance notice,
to lock any Customer traffic, ports, protocols, devices, or applications (such as peer-to-peer
applications that may carry malicious software or are known to disrupt the delivery of
Internet services to other Customers) that we determine, in our sole and reasonable
discretion, may cause harm to the Bee Creek Network or to other Customers due to
unlawful activity, devices, or content.