Legal

Coalfields Telphone Legal Section

Coalfields Telphone would like you to know that we are dedicated to bringing you quality services. This section illustrates with importance our services and what we as a provider, and you, as a subscriber are obligated too. (Contract Agreements, Assurance Plans, Maintenance Agreements, etc.)

In this section you will find:

  • Privacy Information and what we do with your personal information.
  • Contracts between you, the consumer, and Coalfields Telphone (as well as other companies in the Gearheart Family of services that may be bundled with a service we provide).
  • Terms of Service (AUP – Acceptable Usage Policy) agreements between you, the consumer, and Coalfields Telphone
  • Information regarding some of our additional insurance/protection plans that we provide (for a small fee) to you, the consumer, to protect you while you are using our leased equipment.

Terms & Policies

Credit Card Charge Back & Refund Policy

REFUND POLICY - Any adjustment and/or refund shall determined by Coalfields Telephone and Broadband on a case by case basis. You can contact our Coalfields Telephone & Broadband office by dialing: 1.606.478.9401 or email us.

DSL TERMS

DSL MODEM OWNERSHIP/LEASE USE: The DSL MODEM (DM), if leased, shall at all times remain in the sole and exclusive property of LESSOR even if attached to real property. CUSTOMER shall have no rights in the DM except for a right of use for reception of the SERVICE at the PREMISES of the CUSTOMER, herein and after referred to as PREMISES. LESSOR’S ownership of the DM may be displayed by notice contained on the SYSTEM. In no event shall CUSTOMER remove, alter or obliterate any such notice. CUSTOMER shall not remove the DM from the PREMISES, give possession or control of the DM to any other party, ….. , sell or mortgage the DM in any manner.

For purposes of this AGREEMENT, the DM shall be valued at $50.00 or the area retail market price at the time of installation. The Parties hereby mutually agree that the CUSTOMER shall be liable for this amount in the event the DM, if leased, is not returned by the CUSTOMER or if the DM becomes damaged through negligence or abuse by CUSTOMER, as liquidated damages for the cost of the DM. All maintenance and repair of the DM shall be performed by LESSOR, if such required service is the fault of CUSTOMER, the Parties mutually agree that CUSTOMER shall pay for the cost thereof, including a service fee. CUSTOMER shall not attach any electrical or other devices to the SYSTEM without prior written consent of LESSOR. During the term of this AGREEMENT, LESSOR shall have the right, upon reasonable prior notice, to enter the PREMISES for an inspection of the DM.

CUSTOMER shall make no modifications or alterations to the DM without the prior written consent of LESSOR. CUSTOMER hereby acknowledges that any modifications or alteration of the DM to permit the unauthorized recepton of the programming is a violation of Federal and State Law and/or may subject CUSTOMER TO CIVIL AND/OR CRIMINAL PROSECUTION.

CUSTOMER shall notify LESSOR promptly of any defect in, or damage or accident to, the DM. LESSOR’S sole and exclusive liability for any defective item of DM shall be replacement of such item.

LIMITATION ANY IMPLIED WARRANTY OF MERCHANTABILTIY OR FITNESS FOR A PARTICULAR PURPOSE

LESSOR shall have the right to make such filings as are necessary to evidence LESSOR’S ownership rights in the CUSTOMER agrees to execute any and all documents as are necessary for such filings.

2. PREMISES: CUSTOMER represents and warrants to LESSOR that the PREMISES is legally in the control and dominion of the CUSTOMER, and that he/she/it is the owner of record of the PREMISES or, if CUSTOMER is a tenant of the PREMISES, that she/he/it has obtained the written consent of the owner of record of the PREMISES to the transactions contemplated by this AGREEMENT in accordance with its terms. CUSTOMER shall provide LESSOR with proof of such ownership or consent in a form satisfactory to LESSOR upon request.

3. INSTALLATION OF THE DSL MODEM SYSTEM: CUSTOMER shall install or arrange for the installation of the SYSTEM on the PREMISES, in accordance with LESSOR’S construction and services specifications, within a reasonable time after this AGREEMENT has been accepted by LESSOR. LESSOR shall not be responsible for any damage to the PREMISES arising from the installations of the DM, including, but not limited to, the burial of underground service cables, except in cases of negligence or improper workmanship, and then only to the extent of the actual damages thereof. CUSTOMER hereby grants LESSOR an easement in gross covering the routing necessary for installation, operation, and removal of the DM on, across, through, and in the PREMISES at no cost or charge to LESSOR. CUSTOMER shall be responsible for any necessary permits, licenses or other authorization required for installation of the DM. Any reinstallation or change in the location of the DM shall be at CUSTOMER’S expense. CUSTOMER, or an appointed representative over the age of eighteen, must sign the AGREEMENT as well as any SERVICE AGREEMENT.

4. RELEASE AND LIMITATION LIABILITY:
 CUSTOMER hereby releases and holds harmless LESSOR and each of their employees, agents, or representatives, officials, and partners, and all other related persons from all claims, demands, causes of action, or suits of any nature or kind, and hereby assumes all risks of damages in any way related to the use or operation of the DM or the SERVICE.

(a) LESSOR shall have no liability for any interruptions of the DM, which results form causes beyond the reasonable control of the LESSOR.
(b) In no event shall LESSOR be liable for any incidental, consequential, punitive or special damages for any claim arising from this agreement or the performance of lessor hereunder.

5. INSURANCE: CUSTOMER shall keep the DM insured against all loss or damage, from any cause, whatsoever. The Insurance shall be in the form and amount satisfactory to lessor.

6. TAXES: During the term, CUSTOMER shall pay all taxes, charges or assessments imposed by an federal, state, or local governments arising from the use of the DM or the providing of the SERVICE, other than federal, state, or local income taxes of LESSOR.

7. ASSIGNMENT: LESSOR shall have the right to assign this AGREEMENT and to delegate all or any part of its rights, duties, and obligations hereunder, to any third party. Neither this AGREEMENT, nor any interest-herein, may be assigned by CUSTOMER without first obtaining the written consent of LESSOR.

8. TERMINATION: This LEASE cannot be cancelled or terminated, except as expressly provided, herein, CUSTOMER hereby agrees that their obligation to pay all charges for service and perform all other obligation hereunder shall be absolute, irrevocable, unconditional and independent and shall be paid and performed without the abatement, deduction or offset of any kind or nature whatsoever. To the extent permitted by applicable law, CUSTOMER also hereby waives any rights now of hereafter conferred by stature or otherwise which may require LESSOR to sell, lease, or otherwise use any DM in mitigation of LESSOR’S damages as set forth in this LEASE or which may otherwise limit or modify any of LESSOR’S rights or remedies under this LEASE. Any action the CUSTOMER has against LESSOR for any default by LESSOR under this LEASE, including breach of warranty or indemnity, must be commenced within one fourteen months after any such cause of action allegedly occurs or is claimed to have occurred (1) If CUSTOMER (i) fails to make any payment when due hereunder, (ii) fails to fulfill or perform any of the promises, covenants, or agreements set forth herein, (iii) breaches any of the representations or warranties set forth herein, or (iv) files or has filed against it a petition in bankruptcy or makes an assignment for the benefit of creditors, then upon the occurrence of any such event, LESSOR shall have the right, at its option, to terminate the delivery of the SERVICES and to remove and take possession of the DM. (c) Within seventy-two (72) hours of any termination of the AGREEMENT, CUSTOMER shall promptly return the DM to LESSOR in the same condition as at the time of its installation, normal wear and tear excepted. In the event CUSTOMER fails to return the DM within said period, LESSOR shall have the right to enter the PREMISES and take possession of and remove the DM within thirty (30) days of the date of termination. In connection with such removal of the DM, LESSOR shall have no obligation to remove any wires, cables, or outlets constituting a part of the DM, LESSOR shall have no obligation to repair or restore property damaged by such removal, if any.

IN ANY EVENT, THE PARTIES HERETO MUTUALLY AGREE THAT IF DSL SERVICE IS TERMIATED FOR ANY REASON, INCLUDING, BUT NOT LIMITED TO CUSOMTER’S FAILURE TO PAY ITS/HER/HIS ACCOUNT WITH CTC,. UPON SUCH CANCELLATION, AND WITHOUT PRIOR NOTICE, THE DSL MODEM HEREIN REFERRED TO IN SCHEDULE A IS TO BE RETURNED TO LESSOR, OR ITS DESIGNEE OR ASSIGN, IMMEDIATELY BY CUSTOMER, AT ITS/HER/HIS EXPENSE; BUT IN ANY CASE WITHIN 72 HOURS OF SUCH TERMINATION OF SERVICES FOR DSL MODEM SERVICES, THE DM, IF LEASED, SHALL BE RETURNED.

To contact us about terminating your Coalfields Telephone & Broadband Service(s) please dial: 1.606.478.9401 or email us.

9. COST AND ATTORNEY FEES: The CUSTOMER agrees to pay reasonable costs and attorney’s fees arising out of any course of action to collect any monies due by the CUSTOMER or to repossess the DM, if leased, as a result of a breach of this AGREEMENT.

10. NOTICES: ALL notices required or desired to be given under this AGREEMENT shall be delivered in person or mailed, postage prepaid, to the CUSTOMER at the PREMISES, or such other place as is designated in writing by CUSTOMER, and to LESSOR at he address specified in this AGREEMENT or at such other address as LESSOR may designate.

11. WAIVER: The waiver by either Party of the breach of any provision hereof shall not operate or be construed as a waiver of any other provision or the same provision at another time.

12. SEVERABILITY: If any one or more of the clauses, covenants or provisions of this AGREEMENT should be held to be invalid or unenforceable for any reason, such invalidity or shall not affect the remainder of the AGREEMENT, which shall remain in full force in effect in accordance with its terms.

13. MISCELLANEOUS:

This AGREEMENT shall be interrupted, construed, and enforced in accordance with the laws of the Commonwealth of Kentucky.
The provisions of this AGREEMENT shall not be changed, amended or supplemented, except by an AGREEMENT in writing signed by LESSOR and CUSTOMER
This AGREEMENT constitutes the entire AGREEMENT between the Parties and supersedes any and all previous agreements or understandings between them with respect to the subject matter hereof.

14. AMENDMENTS TO SCHEDULE: In the event it is necessary to amend the terms of Schedule A to reflect a change in one or more of the following conditions:

CUSTOMER’S actual cost of procuring the DM or
LESSOR’S actual cost of providing DM to the CUSTOMER; or
A change in lease payments as a result of (a) and/or (1) above; or
Description of the leased DM, CUSTOMER agrees that such amendment shall be described in a letter from LESSOR to the CUSTOMER, and unless the CUSTOMER objects thereto in a writing delivered to LESSOR within fifteen (15) days of the mailing such letter from LESSOR to the CUSTOMER, Schedule A shall be deemed amended and such amendment(s) shall be incorporated herein.

16. AVAILABILITY OF DSL MODEM: The Parties mutually agree that this AGREEMENT is conditioned upon the availability of the DM or any part hereof to the LESSOR.

17. CREDIT VERIFICATION: CUSTOMER hereby grants to LESSOR the right to make a thorough investigation of CUSTOMER’S CREDIT HISTORY and releases from all liability all persons, companies, schools, and corporations supplying such information. CUSTOMER does indemnify LESSOR against any liability, which might result from making such investigation. CUSTOMER agrees that LESSOR may obtain a consumer report of other information regarding them and may consult its own files for the credit report. CUSTOMER understands that any false answers or statements or implications made by them in this application or other required documents shall be considered sufficient cause for denial of service.

18. CUSTOMER’S WARRANTY OF UNDERSTANDING: CUSTOMER represents and warrants that it/she/her has read the entire AGREEEMENT and fully understands the same.

Subscribers to CTC dsl modem service access the internet through Mikrotec Internet Service. Users that access the Internet through Mikrotec services must comply not only with Mikrotec’s AUP as well as the AUPs of the Network Service Providers whose networks they access. To view a copy of Mikrotec’s AUP go to www.mikrotec.com.

AUP

This Acceptable Use Policy document, including the following list of Prohibited Activities, is an integral part of your Hosting Agreement with Coalfields Telephone Company. If you engage in any of the activities prohibited by this AUP document Coalfields Telephone Company may suspend or terminate your account.

Coalfields Telephone Company’s Acceptable Use Policy (the "Policy") for Coalfields Telephone Company Services is designed to help protect Coalfields Telephone Company, Coalfields Telephone Company’s customers and the Internet community in general from irresponsible or, in some cases, illegal activities. The Policy is a non-exclusive list of the actions prohibited by Coalfields Telephone Company. Coalfields Telephone Company reserves the right to modify the Policy at any time, effective upon posting our Coalfields Telephone Legal Page.

Prohibited Uses of Coalfields Telephone Company Systems and Services:

1. Transmission, distribution or storage of any material in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property right used without proper authorization, and material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws.

2. Sending Unsolicited Bulk Email ("UBE", "spam"). The sending of any form of Unsolicited Bulk Email through Coalfields Telephone Company’s servers is prohibited. Likewise, the sending of UBE from another service provider advertizing a web site, email address or utilizing any resource hosted on Coalfields Telephone Company’s servers, is prohibited. Coalfields Telephone Company accounts or services may not be used to solicit customers from, or collect replies to, messages sent from another Internet Service Provider where those messages violate this Policy or that of the other provider.

3. Running Unconfirmed Mailing Lists. Subscribing email addresses to any mailing list without the express and verifiable permission of the email address owner is prohibited. All mailing lists run by Coalfields Telephone Company customers must be Closed-loop ("Confirmed Opt-in"). The subscription confirmation message received from each address owner must be kept on file for the duration of the existence of the mailing list. Purchasing lists of email addresses from 3rd parties for mailing to from any Coalfields Telephone Company-hosted domain, or referencing any Coalfields Telephone Company account, is prohibited.

4. Advertising, transmitting, or otherwise making available any software, program, product, or service that is designed to violate this AUP or the AUP of any other Internet Service Provider, which includes, but is not limited to, the facilitation of the means to send Unsolicited Bulk Email, initiation of pinging, flooding, mail-bombing, denial of service attacks.

5. Operating an account on behalf of, or in connection with, or reselling any service to, persons or firms listed in the Spamhaus Register of Known Spam Operations (ROKSO) database at www.spamhaus.org/rokso.

6. Unauthorized attempts by a user to gain access to any account or computer resource not belonging to that user (e.g., "cracking").

7. Obtaining or attempting to obtain service by any means or device with intent to avoid payment.

8. Unauthorized access, alteration, destruction, or any attempt thereof, of any information of any Coalfields Telephone Company customers or end-users by any means or device.

9. Knowingly engage in any activities designed to harass, or that will cause a denial-of-service (e.g., synchronized number sequence attacks) to any other user whether on the Coalfields Telephone Company network or on another provider’s network.

10. Using Coalfields Telephone Company’s Services to interfere with the use of the Coalfields Telephone Company network by other customers or authorized users.

Customer Responsibility for Customer’s Users

Each Coalfields Telephone Company customer is responsible for the activities of its users and, by accepting service from Coalfields Telephone Company, is agreeing to ensure that its customers/representatives or end-users abide by this Policy. Complaints about customers/representatives or end-users of an Coalfields Telephone Company customer will be forwarded to the Coalfields Telephone Company customer’s postmaster for action. If violations of the Coalfields Telephone Company Acceptable Use Policy occur, Coalfields Telephone Company reserves the right to terminate services with or take action to stop the offending customer from violating Coalfields Telephone Company’s AUP as Coalfields Telephone Company deems appropriate, without notice.

Network Management Practices

Disclosure of Broadband Internet Access Service Network Management Practices, Performance and Commercial Terms

Introductory Note

This disclosure applies solely to the broadband services offered by Coalfields Telephone Company (CTC) on a standardized basis to residential customers, small businesses and other end-user customers. This disclosure does not apply to any other broadband service (e.g., specialized or enterprise services) or to any dial-up Internet access service. CTC may revise this disclosure from time to time without notice by posting a new version of this disclosure on the CTC website at http://www.coalfields.net/legal/. Accordingly, users of CTC’s Internet access services should consult this document regularly to ensure that they remain aware of changes to the practices described in this disclosure. In the event of a conflict between any subscriber agreement or the Acceptable Use Policy and this disclosure, the terms of the subscriber agreement or Acceptable Use Policy shall govern. This disclosure does not create enforceable rights in the subscriber or any third party edge provider.

Introduction to Our Broadband Services
Coalfields Telephone Company (CTC) operates a robust and modern ip based network, which spans portions of Eastern Kentucky. CTC provides several services over this ip network including Voice and Broadband Internet Access. CTC contracts with Mikrotec Internet and the East Kentucky Network for access to the outside world via redundant fiber optic rings, then peering with major internet providers in Lexington, KY.

Core Network Overview
CTC utilizes a 10Gig core network to transport all broadband services to the rest of the world. No prioritization or discrimination of forwarding traffic is performed, either within a service type or between service categories.
Distribution Network Overview

CTC utilizes 1Gig distribution switches to transport broadband services. No prioritization or discrimination of forwarding traffic is performed, either within a service type or between service categories.

Access Network Overview

CTC operates 2 access networks with only 1 service type, Broadband Internet.
• An ADSL network which utilizes Asynchronous Transfer Mode (ATM) for the last mile loop.
• This is the legacy network, which is being overbuilt by our ethernet access network.
• This network transports strictly broadband internet and performs no prioritization or discrimination of forwarding traffic.
• Available Bandwidth packages available range from 256Kbit to 4Mbit download speeds.

An ADSL2+ network which utilizes Ethernet and Virtual LAN technologies for the last mile loop.

• This network transports strictly broadband internet and performs no prioritization or discrimination of forwarding traffic.
• Available bBandwidth packages available range from 256Kbit to 6Mbit download speeds.

Network Edge Overview

Currently CTC contracts with Mikrotec Internet Services (MIS) and the East Kentucky Network (EKN) to fulfill its edge network requirements:
• EKN provides a 10G redundant fiber optic loop from our Harold location to EKN’s facility in Winchester KY.
• MIS provides a 10G redundant fiber optic loop from EKN’s Winchester facility to MIS’s Lexington facility.

General Network Principles

CTC, as much as reasonably possible, designs and operates its network based off on the following guiding principals:
• For security purposes network traffic is categorized into discreet service types via separate VLAN segments. Specifically this references segmenting management traffic from broadband internet traffic.
• All subscriber broadband Internet packages should be provisioned slightly larger than advertised to allow for protocol overhead so that the customers expectations are exceeded whenever possible.
• Maintaining the security of the network is a top priority and, to this end, we implement commonly accepted security best practices subject to cost and technical considerations.

Network Practices

Congestion Management Practices
While CTC does not currently utilize any form of congestion management. CTC may in the future use various tools and techniques to manage its network, deliver its service, and ensure compliance with the Acceptable Use Policy available at http://www.coalfields.net/legal/aup. These tools and techniques may be dynamic, like the network and its usage, and may change frequently. For example, these network management activities may include identifying spam and preventing its delivery to customer email accounts, detecting malicious Internet traffic and preventing the distribution of viruses or other harmful code or content and using other tools and techniques that CTC may implement in order to meet its goal of delivering a high quality broadband Internet experience to its customers.

Non-Discrimination Practices
CTC does not currently have any policy in place theat would prefer one type of Broadband Internet traffic, protocol, provider, service, application, or site over another. Subject to the AUP and the security practices listed below, the customer is free to choose any device type, protocol, service, provider, application, etc., without experiencing any type of service degradation or slow down. CTC reserves the right (but does not undertake the responsibility) to block or degrade content, applications and services that are unlawful, that may violate the rights of third parties (e.g., copyright infringement) or that may pose a harm to our network or other customers.

Device Attachment Rules
CTC does not restrict what types of devices are eligible to connect to our network, however we can only provide direct end user support for devices for which we are familiar. In addition all attached devices must be capable of making a valid access request (DHCP). At each DSL modem we provide a single ethernet port for Broadband Internet and if a customer wishes to use multiple devices, the customer will need to provide their own router, which will provide NAT. For residential service, each cable modem customer is dynamically assigned a single public IPv4 address. For commercial service, multiple IPs are available if needed. CTC reserves the right (but does not undertake the responsibility) to prohibit devices that may pose a harm to our network or other customers.

Security Practices

In an effort to maintain the security of the CTC network and our subscribers as well as to abide by good Internet Citizenship, CTC utilizes the following listed security practices, which affect forwarded traffic delivered to our subscribers. In addition to this list, CTC utilizes multiple other mechanisms to promote the Confidentiality, Integrity and Availability of the CTC network,; however, only those having a direct bearing on customer forwarded traffic are listed here.

Access Network
• In order to assist in the world wide fight against unsolicited commercial email (SPAM), commonly accepted network practices dictate that ISP’s block outbound traffic destined for the SMTP service (port 25). This doesn’t preclude a customer from being able to run a mail server at their site, but does require a simple change to the normal configuration, i.e. using our mail server as a smart relay host.
• Only traffic destined for a valid IP/mac address pairing is terminated to a subscriber,; broadcast flooded traffic is not delivered to the end user.
• DHCP broadcast requests destined to UDP port 67 (attempting to connect to a DHCP server) are not permitted to terminate to a subscriber end point.
• Traffic entering our access network sourced from RFC1918 address space is denied.
• In the event of malicious activity, CTC may implement a temporary block at this network level restricting traffic, which may be harmful to the network as a whole. If such activity is necessary, the affected customer(s) would be contacted and worked with in an effort to remove the underlying threat.
• CTC collects performance characteristics in the aggregate at thise net level (link level utilization), which allows us to proactively plan in advance proper network scaling.
• If needed, when working with a subscriber to troubleshoot a problem, properly trained staff within CTC may perform real time traffic analysis of subscriber traffic.

Distribution Network
• In the event of malicious activity, CTC may implement a temporary block at this network level restricting traffic, which may be harmful to the network as a whole. If such activity is necessary, the affected customer(s) would be contacted and worked with in an effort to remove the underlying threat.
• CTC collects performance characteristics in the aggregate at this level (link level utilization), which allows us to proactively plan in advance proper network scaling.
• If needed, when working with a subscriber to troubleshoot a problem, properly trained staff within CTC may perform real time traffic analysis of subscriber traffic.

Core Network
• In the event of malicious activity, CTC may implement a temporary block at this network level restricting traffic, which may be harmful to the network as a whole. If such activity is necessary, the affected customer(s) would be contacted and worked with in an effort to remove the underlying threat.
• CTC collects performance characteristics in the aggregate at this level (link level utilization), which allows us to proactively plan in advance proper network scaling.
• If needed, when working with a subscriber to troubleshoot a problem, properly trained staff within CTC may perform real time traffic analysis of subscriber traffic.

Edge Network
• In the event of malicious activity, CTC may implement a temporary block at this network level restricting traffic, which may be harmful to the network as a whole. If such activity is necessary, the affected customer(s) would be contacted and worked with in an effort to remove the underlying threat.
• CTC collects performance characteristics in the aggregate at this level (link level utilization), which allows us to proactively plan in advance proper network scaling.
• CTC collects netflow data on all external traffic flows to better understand network attacks.
• If needed, when working with a subscriber to troubleshoot a problem, properly trained staff within CTC may perform real time traffic analysis of subscriber traffic.
• Traffic entering our network edge from the external side, sourced from an IP address within one of our network ranges is denied.
• Traffic traversing our network edge sourced from RFC1918 address space is denied.
• Traffic traversing our network edge sourced from loopback, link local or ‘this’ address (as defined in RFC 3330) is denied.

Performance Characteristics

Service Description
1. CTC provides an ADSL2+ based DSL modem service. Data rates are available from 256k to 6Mbps depending on service needs. Our DSL service is based on a “best effort” technology. That means that all advertised speeds are an “up to” rating and is not a committed information rate.

2. The “actual” speed that a customer will experience while using the Internet depends upon a variety of conditions, many of which are beyond the control of an ISP such as CTC. These conditions include:
• Performance of a customer’s computer, including its age, processing capability, its operating system, the number of applications running simultaneously, and the presence of any adware and viruses.
• Type of connection between a customer’s computer and modem. For example, wireless connections may be slower than direct connections into a router or modem. Wireless connections also may be subject to greater fluctuations, interference and congestion. CTC does not recommend wireless modem connections for use with its higher speed tiers as many wireless connections do not perform at the speeds delivered by these tiers.
• The distance packets travel (round trip time of packets) between a customer’s computer and its final destination on the Internet, including the number and quality of the networks of various operators in the transmission path. The Internet is a “network of networks.” A customer’s connection may traverse the networks of multiple providers before reaching its destination, and the limitations of those networks will most likely affect the overall speed of that Internet connection.
• Congestion or high usage levels at the website or destination limit speed. If a large number of visitors are accessing a site or particular destination at the same time, your connection will be affected if the site or destination does not have sufficient capacity to serve all of the visitors efficiently.
• Gating of speeds or access by the website or destination limit speed. In order to control traffic or performance, many websites limit the speeds at which a visitor can download from their site. Those limitations will carry through to a customer’s connection.

For these reasons, CTC, like all other ISPs, advertises speeds as “up to” a particular level, and does not guarantee them.
• The customer premises is supplied one 10/100 meg ethernet port.
• Data obtained from our sampling of a hosted speedtest.net server has shown that our average performance speeds for the period from 08/01/2011 through 11/11/2011, including all customer locations and packages, were as follows (peak time is from 7:00pm until 11:00pm):
• Overall Download 3.32Mbps
• Overall Upload 451Kbps
• Overall Latency 29ms
• Peak Download 2.89Mbps
• Peak Upload 426Kbps
• Peak Latency 34ms

Impact of Specialized Services
• CTC does not currently offer any specialized network services that would negatively impact the last mile capacity or the performance of broadband internet access service.

Terms and Conditions of Service

Pricing
• In order to continually maintain current pricing in this area, we have chosen to provide a link to our most current pricing and promotions. Please see http://www.coalfields.net/pricing for complete pricing information.

Privacy Policies
• CTC reserves the right to inspect and analyze network traffic to assist in troubleshooting or service recovery, to evaluate our services, to provide our services and to detect unauthorized activity. Aggregate and specific analysis information may be shared with third parties to assist in said troubleshooting or, service recovery, evaluation, provision or detection, however no personally identifiable information would be included. except to the extent authorized by the customer, required by law or regulation, allowed by the privacy provisions of the AUP, allowed by our privacy statement available at http://www.coalfields.net/legal/privacy-policy or allowed by 47 USC 551.
• All subscribers are required to abide by our Terms of Agreement (TOA) available at http://www.coalfields.net/legal/toa and our Acceptable Use Policy (AUP) available at http://www.coalfields.net/legal/aup. In the event of a conflict between the Network Management Practices described in this document and the TOA or the AUP, the terms of the TOA or AUP shall govern. Section 1 of the AUP contains additional privacy policies.
Redress OptionsAll complaints should be addressed to abuse@imctv.com. Customers found to be acting in violation of the AUP will receive two warnings and service may be disrupted upon the third complaint.

Edge Provider:

User / Customer
• All service concerns should initially be addressed to the billing office at 1.606.478.9401. Our customer support staff will take ownership of the issue and work with internal resources to resolve any problems.

Edge Provider
• All complaints should be addressed to abuse@coalfields.net. Customers found to be acting in violation of the AUP will receive two warnings and service may be disrupted or discontinued upon the third complaint.
• Customer information will only be released upon receipt of a bona fide subpoena or other legal requirement.

CTC Emergency Services / Voice and Broadband

Coalfields Telephone Company’s demonstration of ability to function in emergency situations for voice and broadband services:

Coalfields Telephone Company (“Company”) hereby certifies that it is able to function in emergency situations as set forth in the Code of Federal Regulations, Title 47, Part 54, Subpart C, §54.202(a)(2)1 and the Kentucky Administrative Regulations (KAR), 807 5:061, Section 24. The Company’s network is designed to remain functional in emergency situations without an external power source, is able to reroute traffic around damaged facilities, and is capable of managing traffic spikes resulting from emergency situations as required by Section 54.202(a)(2). The Company can change call routing translations as needed to reroute traffic around damaged facilities. Changing call routing translations will also allow the Company to manage traffic spikes throughout its network, as emergency situations require.

Specifically, Coalfields Telephone Company in accordance with 807 KAR 5:061. Telephone, Section 24, has a written plan in place to meet service emergencies resulting from failures of power service, sudden and prolonged increase in traffic, fire, storm, or acts of God, and has trained employees on emergency procedure. Each central office building is supplied with standby generators and battery back-up that enable the central office to keep running for at least the minimum of four (4) hours, or until system changes are made to reroute traffic. The Company has battery backup at all office locations and in its electronic equipment sites in accordance with the specifications identified in Section 24 of the 807 KAR, 5:061, Emergency Operations.

The company’s standby generators and battery back-up support both voice and broadband network equipment should an emergency situation occur.

Prohibition against the Use of Service for Illegal Robocalling

Definition
Illegal Robocalls are calls generated by autodialers for commercial purposes without the permission of the called party. These calls may be from a recorded voice or be auto transferred to a live agent; they will often appear from a disguised number; and they will either claim a pre-existing business relationship (“car warranty” or “Microsoft refund”) or disguise their commercial intent with false claims of fraudulent activity (“IRS notice” or “Amazon account hack”).

Robocalls for non-commercial reasons (school closings, political notices, for example) or for commercial reasons with the telephone owner’s prior consent (utility bill payment or appointment reminders, for example) are legal and permitted.

Screening of Use of Service – New Orders
To mitigate illegal robocalling, we will screen new service requests:
• We will not deploy large volume calling capability as a residential service or at an address shown in the company records as being residential
• Business requesting large volume calling capability must provide a tax ID and verification as to the nature of the business
• We verify addresses to look for overlapping / multiple deployed voice path subscriptions
• A company representative may visit the premise of the business to verify the number of users at the location is appropriate for the volume of calling paths requested

Screening of Use of Service – Existing Customers
We will monitor usage of our network to look for flags that suggest illegal robocalling is occurring and investigate as warranted. If notified by a third party that suspected illegal robocalling is occurring within our network, will investigate such complaints. Any such investigations will be at our sole discretion.

During the course of investigating any such complaints we may be required to review your calling patterns and release information about your calls or your service to third parties as required and permitted by law.

Investigation and Resolution of Illegal Robocalling
We are permitted but not required to investigate any claims of illegal robocalling in whatever manner we believe is appropriate based on the nature of the claim. Such investigation may include contacting the alleged robocaller to review and resolve, if possible, the complaint. If we are unable to resolve the complaint or you fail to respond to us, we may suspend or terminate your service with or without advanced notice. AT OUR SOLE DISCRETION, WE MAY CHOOSE TO REFUSE SERVICES THAT WE BELIEVE MAY BE USED FOR ILLEGAL ROBOCALLING.

DMCA Copyright Infringement Policy

COPYRIGHT INFRINGEMENT ENFORCEMENT POLICY

 

Gearheart Communications Company, Inc., including one or more of its affiliates (“Gearheart”), is committed to complying with U.S. copyright and related laws, and requires all customers and users of the Service to comply with these laws. Accordingly, you may not store any material or content on, or disseminate any material or content over, the Service (or any part of the Service) in any manner that constitutes an infringement of third-party intellectual property rights, including rights granted by U.S. copyright law. Owners of copyrighted works who believe that their rights under U.S. copyright law have been infringed may take advantage of certain provisions of the Digital Millennium Copyright Act of 1998 (the "DMCA") to report alleged infringements.

If Gearheart continues to receive additional copyright infringement notices addressing account-holder infringement after this step, Gearheart may implement enforcement pursuant to its Repeat Infringer Policy and suspend or terminate the account with or without notice.

Copyright infringement is illegal and violates the Gearheart’s Service Terms and Conditions and Acceptable Use Policy. Subscribers should not engage in copyright infringement and should ensure that others using their Internet account do the same. Importantly, if the subscriber's home network is not protected or secured by a password or firewall, and unauthorized users are accessing the subscriber's network, they may be the source of the problem. You should contact any other individuals who have access to your Internet service and discuss the alert with them. Be sure to educate those that use your Internet service regarding copyright infringement. Explain that downloading copyrighted material without permission from the copyright holder is against the law.

Reporting Infringement

Copyright owners may report alleged infringements of their works that are stored on the Service or the Personal Web Features by sending Gearheart's DMCA Designated Agent a notification of claimed infringement that satisfies the requirements of the DMCA. Upon Gearheart's receipt of a satisfactory notice of claimed infringement for these works, Gearheart will respond expeditiously to either directly or indirectly (i) remove the allegedly infringing work(s) stored on the Service or the Personal Web Features or (ii) disable access to the work(s).  Gearheart will also notify the affected customer or user of the Service of the removal or disabling of access to the work(s).  If a customer is notified of alleged infringement four (4) or more times, regardless of whether the infringements are concurrent or sporadic, the customer is deemed to be a repeat infringer and Gearheart will proceed with throttling service speeds, suspending or terminating that customer’s Service account.

If you believe that your work has been copied and has been posted, stored, or transmitted to Gearheart’s website in a way that constitutes copyright infringement, please submit a notification pursuant to the DMCA by providing Gearheart’s DMCA Designated Agent (contact provided below) the following written information:

  1. A physical or electronic signature of a person authorized to act on behalf of the copyright owner of an exclusive right that is allegedly infringed.
  2. Identification of the copyrighted work claimed to have been infringed.
  3. Identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit Gearheart to locate the material.
  4. Information reasonably sufficient to permit Gearheart to contact the complaining party, such as an address, telephone number, and, if available, an electronic mail address at which the complaining party may be contacted.
  5. A statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law.
  6. A statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.

 

Gearheart has filed with the United States Copyright Office the necessary designated agent information to facilitate notice of alleged online copyright infringement on our network. Our designated agent for notification of alleged copyright infringement and counter notification is:

Designation of Agent to Receive Notification of Claimed Infringement

Full Legal Name of Service Provider: Gearheart Communications Company, Inc.

 

Alternative Name: Coalfields Telephone Company, East Kentucky Internet

 

Agent Name and Title, Designee to Receive Notification of Claimed Infringement: Joella Newsome

               

Full Address of Designated Agent to Which Notification Should Be Sent:

P.O. Box 160

Harold, KY 41635

 

Telephone of Designated Agent: 606.479.6156

 

E-mail of Designated Agent: copyright@gearheart.com

 

You should be aware that complainants who make false claims or misrepresentations concerning copyright infringement may be liable for damages under the DMCA.

Counter-Notification in Response to Claim of Copyright Infringement

If an affected customer or user believes in good faith that the allegedly infringing works have been removed or blocked by mistake or misidentification, then that person may send a counter notification to Gearheart’s designated agent at the address noted above. Upon Gearheart's receipt of a counter notification that satisfies the requirements of DMCA, Gearheart will provide a copy of the counter notification to the person who sent the original notification of claimed infringement and will follow the DMCA's procedures with respect to a received counter notification. This process will invoke a dispute between you and the complaining party. In all events, you expressly agree that Gearheart will not be a party to any disputes or lawsuits regarding alleged copyright infringement.

Your counter-notification must be in writing and contain the following information:

  1. A physical or electronic signature of an authorized person.
  2. Identification of the material that was removed or access to which was disabled and the location at which material appeared before it was removed or access to it was disabled.
  3. A statement under penalty of perjury that the alleged infringer has a good faith belief that the material was removed or disabled because of mistake or misidentification.
  4. Your name, address, and telephone number, and a statement that you consent to the jurisdiction of the federal district court for the federal district in which you are located and that you will accept service of process from the complainant

 

You should be aware that substantial penalties under U.S. law apply for a false counter-notice filed in response to a notice of copyright infringement.