Internet Practices

iDEN INTERNET PRACTICES

Southern Linc's ("we" or "our") Internet Practices address our efforts to preserve the principles of open Internet access for customers subscribing to plans with Internet access on our Internet-equipped phones ("Unit(s)") through either our regional Motorola Integrated Digital Enhanced Network ("iDEN") or our high-speed data and nationwide service vendor's 2G/3G data network ("Vendor's Network"). When describing our Internet Practices, we use "System" to describe practices that apply to both our iDEN Network and the Vendor's Network, and we use either "iDEN Network" or "Vendor's Network" to describe practices that apply to that specific network. Not all customers will have Internet-accessible plans or phones. Additionally, only customers using select Units (with two SIM cards that are designed to work on both the iDEN Network and the Vendor's Network) will have access to the Vendor's Network. Questions regarding whether your Unit operates on iDEN or the Vendor's Network should be directed to the Customer Solution at 1-800-818-LINC (5462), a Southern Linc Authorized Dealer, Retail Store, or Direct Sales Representative. Here are more details on how we seek to manage our System:

Network Practices

  • Optimization: Your Unit and the System may have built-in optimization technologies. These may include a proxy server that automatically compresses media files and websites. When a file is capable of compression, the file may be compressed regardless of source and content. Compression may result in reduced resolution and color accuracy, but it facilitates faster loading and uses less memory, resulting in less consumption of your data usage allowance.
    • Websites: When you visit a website on your browser, the site may automatically optimize so that it consumes less memory and loads more quickly. Any website, including our sites, may undergo this optimization process.
    • Image and Video Files: Your Unit may automatically optimize outgoing images, and the System may automatically optimize uncompressed incoming files. Any video files, regardless of content or source, may be automatically optimized via buffering, transcoding, caching, or duration limitation in order to function. Optimization removes bits of data, such as colors, in order to decrease file size while maintaining sufficient quality for viewing on a mobile device screen.
    • Network Monitoring: We monitor the network to make sure that it is operating at the high standards you expect. Some performance elements we monitor are: (1) packet loss (errors and discards) within the core network and over the links to the Internet; (2) the quality of the backhaul links between our core network and each cell site; and (3) the radiofrequency conditions, through statistical analysis, at each cell site to give you the best available coverage and customer experience. In addition, we block traffic that would be harmful to our network through firewall rules and other intrusion prevention tools. We do not prioritize, throttle, or shape traffic in an effort to save bandwidth, track the "observed" data throughput of live customers on the network, or continuously test the throughput capabilities of our core network elements.
  • Devices and Applications:
    • We do not block devices that have properly provisioned SIM card(s), but only our iDEN compatible devices are designed to function on the System. If you insert SIM card(s) from another wireless provider, you may experience minimal or no functionality on the Unit, and we take no responsibility for poor performance in such situations. Devices compatible with our System may be purchased through a Southern Linc Authorized Dealer, Retail Store, Direct Sales Representative, or our website. To connect a device to our System, you will need to obtain SIM card(s) from us by subscribing to a plan, which may require payment of an activation fee and other charges, subject to terms and conditions. If you have questions about connecting a particular device, please contact a dealer, Retail Store, Direct Sales Representative, or our Customer Solution.
    • Content and applications developed by third parties (e.g., downloadable or networked applications, wallpaper, ringtones, games, and productivity tools) ("Content & Apps") may be preloaded on your device, or you may purchase Content & Apps for your device. Some Content & Apps may not be compatible with or function on your Unit. We are not responsible for any third party Content & Apps preloaded on your device, or any Content & Apps that you download, and we make no warranties they will function on your Unit. In general, we do not block downloads of any Content & Apps, subject to the limitations described below under "Security and Extreme Congestion Procedures." For more information regarding Content & Apps, please see the "Content and Applications" section of our Acceptable Use Policy.
    • Apps are available for download from third parties via our Web site and other third party app stores or sites. We are not responsible for any apps you download, and we make no warranties that any apps will function on your Unit.
  • No Blocking of Websites:
    • If your data plan offers Web browser access, you can generally go to any website supported by your Unit and the System. Website access may be blocked according to the limitations described below under "Security and Extreme Congestion Procedures." Website access may also be limited by Unit design and network architecture.
    • If your Unit is a feature phone (not a smartphone), it may be designed to access only wireless application protocol ("WAP") websites rather than standard Internet protocol "HTTP" websites, which means you can visit simplified sites configured to load via the WAP gateway (formatted Web content for small phone screens).
    • Please contact our Customer Solution if you have questions about the websites your Unit supports. We enable access to the Internet via our System, but we do not provide Wi-Fi® service. Most smartphones allow users to connect to third party Wi-Fi systems. If you plan to access the Internet through a third party Wi-Fi system using a smartphone, please check with the Wi-Fi provider for information about their network management practices.
  • Usage Type and Allowances: Your use of the System is subject to our Acceptable Use Policy. Please see our Acceptable Use Policy for a description of prohibited content and transmission structures as well as current monthly data usage maximum allowances. If your usage violates the Acceptable Use Policy or adversely affects the System, network performance, or the experience of other customers, we reserve the right to restrict your data usage or services.
  • Security and Extreme Congestion Procedures:
    • If we determine that the operation, stability, or security of our System is threatened, subject to interference or penetration, or is otherwise experiencing an emergency situation, we reserve the right to take any and all actions we deem appropriate to secure and protect the System. Such actions could include, but are not limited to, blocking websites, programs, and/or apps we believe are associated with the threat. Examples of such threats include, but are not limited to, Internet sources of spam and sources that aggressively scan Internet addresses. Moreover, access to a limited number of Internet addresses may be blocked from the Vendor's Network if those addresses are disruptive or malicious and typically persistent as determined by review of third party industry-wide intelligence.
    • You are responsible for taking security measures to protect your Unit from the spread of viruses, malware, spam, or other threats.

Performance

  • The System generally prioritizes voice calls over data transmissions by design, promoting quality voice services. Although performance may be slower during peak usage times, we generally do not take action to restrict Internet or media usage during times of high usage, except as discussed above under "Security and Extreme Congestion Procedures." If your Unit allows access to third party Wi-Fi, you may experience faster download and upload speeds while on Wi-Fi.
  • The System is not designed to handle programs, systems, apps, or other usage that drive continuously heavy traffic or data sessions, and such use is prohibited because it would impair System functionality and delivery of service to you and other customers. Please refer to our Acceptable Use Policy for further information.
  • "Speed" describes the capacity at which an Internet access service can transmit data. Capacity is usually measured in the number of kilobits or megabits that can be transmitted in one second (Kbps or Mbps). Some applications, such as email, do not need a high rate of speed to function optimally, while other applications do, such as the transfer of large data files. The actual speeds you experience on the System will vary depending on a variety of factors, including, but not limited to, signal strength and signal quality between the cell tower and your Unit, cell site utilization by other callers and data session users, and availability of the third party Internet server being accessed. Speeds of data transmissions on iDEN are generally considered 2G data transmissions. If you are a single user of a channel on a cell tower, you may experience data rates between 17-19 Kbps, but if you are one of several users on a channel, your data rates may be slower. Speeds of data transmission on the Vendor's 3G network are generally expected to range between 400-700 Kbps for downloading and 100-250 Kbps for uploading. Depending on network availability in the area, you may use the Vendor's 2G network, which is generally expected to have speeds ranging between 114-236 Kbps. We do not guarantee that you will experience data rates of these speeds or that you will be able to engage in any data usage at any particular location or point in time on the System. The speed and coverage information for the Vendor's Network is based on third party information, and the accuracy and the availability of performance, coverage, and service is dependent on the Vendor.
  • Another measure of a network's speed is latency, which is the amount of time it takes a message to traverse the system end-to-end. On Internet Protocol networks, latency is commonly measured as round-trip time (RTT). RTT is the time, usually reported in milliseconds (ms), taken for a data packet to reach its destination and then return to the sender. Latency in the iDEN Network usually averages about 500 ms, or one-half second. Latency in the Vendor's Network is approximately 100-450 ms on its 3G network and 400-900 ms on its 2G network. This measure varies widely because of the myriad of conditions and scenarios that any given transmission may experience at any given moment over a wireless network. We cannot guarantee the degree of latency you will encounter at any given location or time on the System.
  • In accordance with applicable regulations, we provide Wireless Priority Service ("WPS") only on iDEN during national security and emergency preparedness (NS/EP) events by giving voice call priority to qualifying law enforcement and first responders. Generally, WPS has the same impact on data performance as other phone and dispatch calls.

Commercial Terms

  • We respect our customers' privacy. We and our Vendor's Network use network traffic information for network-related purposes and do not sell that information to third parties.
  • We protect certain usage-related information about the quantity, type, and usage patterns, called your Customer Proprietary Network Information ("CPNI"), as required by federal law and FCC regulations. Please see our CPNI Guidelines for more information.
  • We offer multiple calling plans and add-on options, with pricing information available at Service Plans and Add-on Packages.
  • Service terms applicable to all plans and promotions, including, but not limited to, termination fees and services limitations, are available at Promotion Details. Our Acceptable Use Policy can be found at Acceptable Use Policy.
  • If you have a complaint or questions, including questions about our Internet Practices as described above, please contact our Customer Solution.

BusinessLinc™ Internet Practices

The BusinessLinc Internet Practices address efforts to preserve the principles of open Internet access for customers subscribing to plans with Internet access on Internet-equipped phones ("Unit(s)") through the BusinessLinc Network (the "System"). Services on the System are provided utilizing the voice and data network of an underlying wireless service provider ("Underlying Provider"). Questions regarding whether your Unit operates on the System should be directed to the Customer Solution at 1-866-530-5462, a Southern Linc Authorized Dealer, Retail Store, or Direct Sales Representative. Here are more details on how the System will be managed:

Network Practices

  • Optimization: Your Unit and the System may have built-in optimization technologies. These may include caching less data, using less capacity, and sizing files more appropriately for mobile devices. The optimization process is agnostic as to the content itself and to the website that provides it.
    • Websites: When you visit a website on your browser, the site may automatically optimize so that it consumes less memory and loads more quickly. Any website, including our sites, may undergo this optimization process.
    • Image and Video Files: Much effort is invested to avoid changing text, image, and video files in the compression process and changes to the files are likely to be indiscernible; however, the optimization process may minimally impact the appearance of the file as displayed on your Unit.
    • Network Monitoring: The System is monitored to protect you and the network, and to provide you with the high quality services that you expect. Steps are taken to protect the network and users from harm such as denial of service attacks, spam, outside attacks, tampering, malicious activity, and network events that may disrupt or degrade your ability to use the System. Traffic that would be harmful to you or the network, such as traffic patterns that appear to be associated with disruptive or malicious intent, may be blocked. Lawful traffic based on content or subject is not blocked, unless part of an opted-in customer service.
  • Devices and Applications:
    • Devices compatible with the System may be purchased through a Southern Linc Authorized Dealer, Retail Store, Direct Sales Representative, or our website. You may also bring your own device for use on the System subject to our Bring Your Own Device Policy. Any device provided by you must be eligible and technologically compatible for use on the System, which may be determined by us in our sole discretion. If you have questions about connecting a particular device, please contact a Southern Linc Authorized Dealer, Retail Store, Direct Sales Representative, or our Customer Solution.
    • Content and applications developed by third parties (e.g., downloadable or networked applications, wallpaper, ringtones, games, and productivity tools) ("Content & Apps") may be preloaded on your device, or you may purchase Content & Apps for your device. You should investigate the capabilities and functions of any device before buying it to determine whether it supports the application that you want to you. Some Content & Apps may not be compatible with or function on your Unit. We are not responsible for any third party Content & Apps preloaded on your device or any Content & Apps that you download, and we make no warranties they will function on your Unit. In general, we do not block downloads of any Content & Apps, subject to the limitations described below under "Security." For more information regarding Content & Apps, please see the "Content and Applications" section of our Acceptable Use Policy
    • You may access any lawful application for use on the System, subject to your BusinessLinc Customer Agreement and our Terms and Conditions, Acceptable Use Policy, and Privacy Policy. We and our Underlying Provider reserve the right at all times to intervene to protect the integrity of the System.
  • No Blocking:
    • You can access and use the legal content, applications, and services of your choice, regardless of their source, as long as they are legal and do not harm the network of the provision of service, facilitate theft of service, or harm other users of the service. Some access may be blocked according to the limitations described below under "Security." Some website access may also be limited by Unit design and network architecture.
    • Please contact our Customer Solution if you have questions about any websites your Unit supports. Most smartphones allow users to connect to third party Wi-Fi systems. If you plan to access the Internet through a third party Wi-Fi system using a smartphone, please check with the Wi-Fi provider for information about their network management practices.
  • Usage Type and Allowances:
    • Your use of the System is subject to your BusinessLinc Customer Agreement, and our Terms and Conditions, Acceptable Use Policy, and Privacy Policy. Please see our Acceptable Use Policy for a description of prohibited content and transmission structures as well as current monthly data usage maximum allowances. If your usage violates the Acceptable Use Policy or adversely affects the System, network performance, or the experience of other customers, we reserve the right to restrict your data usage or services.
  • Security:
    • Cases may arise where the value of protecting the entire customer base from malicious or other adverse network-impacting traffic outweighs access issues experienced by a few. Examples include Internet sources or destinations that are major sources of spam and sources that aggressively scan Internet addresses or those that have attempted attaches against network infrastructure or customer end-points.
    • A limited number of Internet addresses that are disruptive or malicious and typically persistent are blocked. This list of blocked Internet addresses is reviewed and modified regularly and any addresses that are no longer perceived as a threat are removed from the list.
    • Where practical, measures are taken to block instructions malicious software, or "malware," receives from the outside to limit the impact on the network and to prevent high unexpected usage. However, you are responsible for taking security measures to protect your Unit from the spread of viruses, malware, spam, or other threats.

Performance

  • Speeds of data transmission on the System are generally expected to range between 5-12 Mbps for downloading and 2-5 Mbps for uploading. We do not guarantee that you will experience data rates of these speeds or that you will be able to engage in any data usage at any particular location or point in time on the System. The speed and coverage information for the System is based on information from the Underlying Provider, and the accuracy and the availability of performance, coverage, and service is dependent on the Underlying Provider.
  • Another measure of a network's speed is latency, which is the amount of time it takes a data packet to traverse the system end-to-end. With respect to latency for use of real-time data applications, network to device (one way) latency in the System is expected to be below 50 ms. We cannot guarantee the degree of latency you will encounter at any given location or time on the System.
  • Whether you experience these speeds depends on many factors, including among others, the type of device, the programs running on the device, your location, and how many other customers are attempting to use the same spectrum resources.

Commercial Terms

  • We respect our customers' privacy. We or our Underlying Provider may collect information about your use of our products and services. Information such as call records, websites visited, wireless location, application and feature usage, network traffic data, service options you choose, mobile and device number, and other similar information may be used for billing purposes, to deliver and maintain products and services, or to help you with service-related issues or questions. In addition, subject to any legal restrictions that may apply, this information may be used for other purposes such as providing you with information about product or service enhancements, determining your eligibility for new products and services, and marketing to you based on your use of your products and services. This information may also be used to: (1) manage and protect the System, services, and other users from fraudulent, abusive, or unlawful uses; and (2) help us improve our services, research and develop new products, and offer promotions and other services. This type of information may be aggregated or anonymized for business and marketing uses by us or by third parties.
  • We protect certain usage-related information about the quantity, type, and usage patterns, called your Customer Proprietary Network Information ("CPNI"), as required by federal law and FCC regulations. Please see our CPNI Guidelines for more information.
  • We offer multiple calling plans with pricing information available at Service Plans.
  • Service terms applicable to all plans and promotions, including, but not limited to, termination fees and services limitations, are available at Promotion Details. Additionally, our Acceptable Use Policy can be found at Acceptable Use Policy.
  • If you have a complaint or questions, including questions about our Internet Practices as described above, please contact our Customer Solution Center.

Back to Top