Legal

Welcome to DRN’s Internet Service! DRN requires that all users read and comply with the terms of DRN’s Acceptable Use Policy (AUP). DRN’s AUP helps ensure a high quality and enjoyable connection for all DRN Internet users. Thank you for your cooperation.

This policy applies to all DRN Internet subscribers. Subscribers are responsible for compliance with the AUP and for use of their account, address, circuit, line, terminal or service by non-subscribers such as relatives, friends, guests, employees, independent contractors, agents, customers, visitors and others who access the Internet via a subscriber’s account, address, circuit, line, terminal or service.

DRN does not typically monitor or exercise editorial control over the use of its Internet services. However, DRN is in compliance with the federally mandated CALEA Act and will investigate, or cooperate with investigations by legal authorities of instances or patterns of reasonably suspected unlawful or unacceptable use that are brought to its attention.

Violation of this AUP may result in the immediate suspension or termination of a subscriber’s service/account and forfeiture of all fees paid to date. Further, the imposition of additional administrative and/or reactivation charges or the institution of legal actions to enjoin violations and/or collect damages may also be imposed. DRN management will review all alleged violations of this policy on a case by case basis. All Internet usage is under the discretion of DRN.

DRN reserves the right to revise, amend or modify this AUP at any time and in any manner. DRN will label each changed AUP with a new adoption date, and will include a copy of the current AUP on its web site.

Please report violations of this AUP to DRN by mail, E-mail or telephone. Reports should include the following information:

  • IP address used to commit the alleged violation
  • Date and time of alleged violation
  • Description and evidence of the alleged violation
Mailed reports to:Email reports to:Telephone reports to:
Internet Abuse
Dickey Rural Networks
9628 Highway 281
Ellendale, ND 58436
abuse@drtel.net (701)344-5000
(877)-559-4692

 

Click here for DRN's Acceptable Use Policy

Dickey Rural Networks
Network Management Practices Policy

Pursuant to the Federal Communications Commission’s newly enacted Open Internet Rules found in Part 8 of Title 47 of the Code of Federal Regulations, the policies of Dickey Rural Networks (“Provider”) regarding network management practices, performance characteristics, and commercial terms are provided in entirety so that Provider’s current customers, prospective customers, third-party content providers and other interested parties can make informed choices regarding the broadband Internet access services offered by Provider, and the extent Provider’s network management practices may affect those services.

Network Management Practices

In the interest of providing the best online experience possible for all of Provider’s customers, Provider utilizes reasonable network management practices tailored to achieve legitimate network management purposes. Because bandwidth is a limited resource for broadband Internet service providers, it is essential that Provider reasonably manages its network to promote the use and enjoyment of the Internet by all of Provider’s customers. By engaging in reasonable and responsible network management, Provider prevents its customers from being subjected to the negative effects of spam, viruses, security attacks, network congestion, and other risks that threaten to degrade service. The network management practices employed by Provider are consistent with industry standards.

Congestion Management

Provider periodically monitors aggregate traffic usage on its network. If congestion emerges on the network, Provider will take measures to identify and address the cause, including identifying high volume bandwidth users. In order to reduce instances of congestion, Provider adds capacity to its network when utilization has reached a specific level.

On Provider’s network, all customers have access to all legal services, applications and content online and, in the event of congestion, most Internet activities will be unaffected. Some customers, however, may experience longer download or upload times, or slower surf speeds on the web if instances of congestion do occur on Provider’s network.

Customers using conduct that abuses or threatens the Provider network or which violates the company’s Acceptable Use Policy, Internet service Terms and Conditions, or the Internet Service Agreement will be asked to stop any such use immediately. A failure to respond or to cease any such conduct could result in service suspension or termination.

Application-Specific Behavior

Provider does not make use of any application-specific network management practices. Provider does not modify protocol fields in ways not prescribed by the protocol standard. Provider does not inhibit or favor certain applications or classes of applications. Provider does not block or rate-control specific protocols or protocol ports, with the exception of blocking certain outbound Transmission Control Protocol (“TCP”) Port 25 or Simple Mail Transfer Protocol (“SMTP”) as a protection and security control mechanism against unsolicited commercial email (“UCE”).

Device Attachment Rules

In order for a device to be approved for use on the Provider’s network, the device must conform to publicly available industry standards and be non-harmful to Provider’s network.

For Internet service delivered through Provider’s Fiber-to-the-Home (“FTTH”) technology, connectivity between the subscriber’s device and Provider’s network with either Static Internet Protocol address assignment or Dynamic Host Configuration Protocol (“DHCP”) is available for an additional monthly fee.

Security

Provider offers its customers unrestricted access to all of the lawful content, services, and applications available on the Internet. Provider uses industry standard tools and generally accepted best practices and policies to protect our customers from spam, phishing, and other unwanted or harmful online content and activities. In the instances where these tools and policies identify online content as harmful or unwanted, the content may be prevented from reaching customers, or customers may be permitted to identify or inspect content to determine if it is harmful or unwanted.

To protect the integrity of its network and the safety of its users, Provider engages in filtering practices of inbound and outbound email against unsolicited commercial email (“UCE”). Provider also utilizes an Intrusion Prevention System (“IPS”) and Intrusion Detection System (“IDS”) to detect Distributed Denial of Service (“DDoS”) and other denial of service, flooding-type attacks. Additionally, Provider imposes an Access Control List (“ACL”) on bad remote host IP addresses when a response from the remote administer is not forthcoming. The security measures employed by Provider are triggered upon network detection of attacks or malicious activity which could adversely affect customer activity or shared network infrastructure. The security measures employed by Provider to prevent the spread of viruses, malware, spam, harmful and unwanted content or other threats to consumers are intended solely to protect the reliability and safety of Provider’s network and do not prevent end-users from running certain applications.

Spam Practices

Provider also deploys spam filters in order to divert spam from an online customer’s email inbox into a quarantine file while allowing the customer to control which emails are identified as spam. Customers may access the spam files through the email. Spam files are automatically deleted if not accessed within 14 days.

To ensure additional security protection for network users, Provider has SecureIT Plus services available for a minimal monthly fee. The SecureIT Plus services available from Provider include automated spyware protection, automated virus protection, automated Windows updates, firewall protection, parental controls, and pop-up blockers for Internet Explorer.

Performance Characteristics

Provider offers broadband Internet access service via Fiber-to-the-Home (“FTTH”) and Digital Subscriber Line (“DSL”) technologies. FTTH utilizes fiber optic cable to deliver telephone, data and video services. With the capacity for an indefinite amount of data, FTTH technology allows subscribers to receive better quality voice, data and video services in their homes. DSL technologies are not limitless but can achieve high rates of data transfer. All speed tiers may not be available on locations severed by DSL technologies.

The download and upload speeds achievable by a subscriber will depend on the selected service tier. Provider guarantees that, at all times, a subscriber’s actual speed throughput from their premises to Provider’s core network will be the advertised speed of the selected service tier. Beyond the core network, Provider measures availability, latency, and aggregate utilization on the network and strives to meet internal service level targets close to advertized speeds. Provider continually monitors to eliminate opportunities for traffic congestion during peak usage periods (i.e., between 7:00 p.m. and 11:00 p.m. on weeknights) which may impact subscribers’ service speed. However, customer’s service performance may also be affected by one or more of the following that are outside the Provider’s network: (1) the particular websites being accessed; (2) capacity in the public Internet beyond Provider’s network; (3) customer’s computer and equipment (including wireless router); and (4) inside wiring at customer’s premise.

Provider is in the process of developing additional systems that will allow us to measure these indicators out to test points at each major network aggregation site on the edge of our last mile network. Once these systems are developed, Provider will be able to measure system metrics on a network-wide basis and will disclose the results on its website. Prior to implementing these procedures, Provider’s customers may utilize the speed test is available at: drtel.com/residential-services/internet/

The actual speeds achieved with Provider’s Internet service offering make Provider’s Internet service suitable for real-time applications.

Provider does not offer any specialized services.

Commercial Terms

Pricing

In order to meet the usage and budgetary needs of all of our customers, Provider offers a wide selection of broadband Internet access plan options, including promotional offerings, bundled service choices, and ala carte alternatives.

To see Provider’s current promotions and pricing on broadband Internet access service, please visit our website at: http://drtel.com/internet/high-speed-options/ or call 701-344-5000 or 1-877-559-4692 to speak with a customer service representative.

Early Termination Fees

If a customer previously entered into a service agreement with Provider for broadband Internet access service for a Minimum Service Period, and customer desires to terminate the service agreement prior to the expiration of the Minimum Service Period, Provider may charge a reasonable early termination fee if such fee is clearly indicated in the service agreement.

Usage-Based Fees

Provider’s Internet service is priced on a flat-fee basis (plus taxes). Provider does not charge end users a usage-based fee for Internet service.

Privacy Policy

To ensure optimal network performance, Provider uses industry standard software tools that collects IP traffic information for traffic monitoring. Provider monitors traffic up to layer 3, or the network layer, which is responsible for packet forwarding and routing. Provider does not routinely engage in deep packet inspection; however, for troubleshooting purposes, Provider will engage in deep packet inspection, including the payload, or the essential data carried within a packet, but only upon request and with permission of the subscriber.

As part of its network management practices, Provider does not store, provide information on network activity and/or traffic to any third party, or use network traffic information for any non-network management purpose.

Network activity, performance information, and equipment information monitored or collected by Provider is done so for the sole purpose of reasonable network management purposes.

Provider is required to comply with relevant laws, regulations or other governmental requests. Some of these requests may require the Providers to perform deep packet inspection and provide payload information to law enforcement.

The Provider’s network management practices as discussed herein are intended solely to provide the best online experience possible for all of Provider’s customers by safeguarding our network and its users from spam, viruses, phishing, and other unwanted or harmful online content and activities. Provider’s network management practices are not intended, nor implemented, to block consumers from accessing any legal content and applications of their choice, deprive consumers of their entitlement to competition, or discriminate against or in favor of certain network traffic. End users with questions, concerns or complaints regarding Provider’s network management practices are encouraged to contact Provider for issue resolution.

Contact Us

If you have any questions regarding Provider’s Network Management Practices Policy or would like to file a complaint with Provider regarding its network management practices, please contact Provider at:

Dickey Rural Networks
9628 Highway 281
PO Box 69
Ellendale, ND 58436
Telephone Number: 1-701-344-5000 or 1-877-559-4692

Contact DRN Online

Further, if you believe that Provider is in violation of the FCC’s Open Internet Rules, you may file either an informal or formal complaint with the FCC.

http://esupport.fcc.gov/complaints.htm

Additional Disclaimers

The Open Internet Rules, as adopted, and Provider’s Network Management Practices Policy are not intended to affect, alter or otherwise supersede the legal status of cooperative efforts by broadband Internet access service providers and other service providers that are designed to curtail infringement in response to information provided by rights holders in a manner that is timely, effective, and accommodates the legitimate interests of providers, rights holders, and end users.

Furthermore, the Open Internet Rules, as adopted, and Provider’s Network Management Practices Policy do not prohibit Provider from making reasonable efforts to address the transfer of unlawful content or unlawful transfers of content.

For additional information, please review Provider’s Acceptable Use Policy on this page.