Policies and Forms

Terms and policies when doing business with Nunn Telephone Company

10 Digit Dialing

The Federal Communications Commission (FCC) has adopted 988 as a new three-digit number to be used nationwide to reach the National Suicide Prevention and Mental Health Crisis Lifeline, starting July 16, 2022. Customers must continue to dial 1-800-273-TALK to reach the Lifeline until July 16, 2022.

For 897 to work in the 970 area code, 10-digit local dialing must first be implemented. You will need to change the way you dial local calls.

What will be the new dialing procedure?

To complete all local calls, you will now need to dial area code + telephone number. This applies to all calls within the 970 area code that are currently dialed with seven digits.

Who will be affected?

Anyone with a telephone number from the 970 area code will need to make this change from 7-digit local dialing to 10-digit local dialing.

When will the change begin?

Beginning April 24, 2021, you should begin dialing 10 digits (area code + telephone number) for all local calls. If you forget and dial just 7 digits, your call will still be completed.

Beginning October 24, 2021, you must dial 10-digits (area code + telephone number) for all local calls. On and after this date, local calls dialed with only 7-digits may not be completed, and a recording will inform you that your call cannot be completed as dialed. You must hang up and dial again using the area code and the 7-digit number.

Beginning July 16, 2022, dialing “988” will route your call to National Suicide Prevention and Mental Health Crisis Lifeline.

What will you need to do?

In addition to changing the way you dial local calls, all services, automatic dialing equipment, or other types of equipment that are programmed to complete calls to 7-digit local numbers will need to be reprogrammed to complete calls to 10-digit numbers. Some examples are life safety systems or medical monitoring devices, PBXs, fax machines, Internet dial-up numbers, fire or burglar alarm and security systems or gates, speed dialers, mobile or other wireless phone contact lists, call forwarding settings, voicemail services and other similar functions. Be sure to check your website, personal and business stationery, advertising materials, personal and business checks, contact information, your personal or pet ID tags, and other such items to ensure the area code is included.

What will remain the same?

  • Your telephone number, including current area code, will not change.
  • The price of a call, coverage area, or other rates and services will not change due to the dialing change.
  • What is a local call now will remain a local call regardless of the number of digits dialed.
  • You will continue to dial 1+ area code + telephone number for all long distance calls.
  • You can still dial just three digits to reach 711 (relay services) and 911 (emergency services).
  • The National Suicide Prevention Lifeline can still be reached by dialing 1-800-273-TALK (8255).

Who may you contact with questions?

If you have any questions regarding information provided in this notice, please call our offices at 970-897-2200 for more information. You can also visit the FCC website at https://www.fcc.gov/suicide-prevention-hotline.

911 Regulations

Kari’s Law and Section 506 of RAY BAUM’s Act

As companies increasingly adopt innovative communications platform capabilities in the workplace, it has become increasingly imperative that their 911 calling capabilities keep pace as well. As a result, the FCC has adopted two federal laws aimed to make it easier for callers to reach 911 and for emergency services to locate callers regardless of the technological platform used.

Kari’s Law – Direct Dialing and Notification for MLTS

Congress enacted Kari’s Law in 2018 which requires direct 911 dialing and notification capabilities in multi-line telephone systems (MLTS), that are typically found in enterprises such as office buildings, campuses, and hotels.

Kari’s Law and the federal rules apply only with respect to MLTS that are manufactured, imported, offered for first sale or lease, first sold or leased, or installed after February 16, 2020. Under the statute and the Commission’s rules, MLTS manufacturers and vendors must pre-configure these systems to support direct dialing of 911— to enable the user to dial 911 without having to dial any prefix or access code, such as the number 9. In addition, MLTS installers, managers, and operators must ensure that the systems support 911 direct dialing.

The Commission’s rules also implement the notification requirement of Kari’s Law, which is intended to facilitate building entry by first responders. When a 911 call is placed on a MLTS system, the system must be configured to notify a central location on-site or off-site where someone is likely to see or hear the notification. Examples of notification include conspicuous on-screen messages with audible alarms for security desk computers using a client application, text messages for smartphones, and email for administrators. Notification shall include, at a minimum, the following information:

  1. The fact that a 911 call has been made;
  2. A valid callback number; and
  3. The information about the caller’s location that the MLTS conveys to the public safety answering point (PSAP) with the call to 911; provided, however, that the notification does not have to include a callback number or location information if it is technically infeasible to provide this information. (47 CFR § 9.3.)

RAY BAUM’S Act – Dispatchable Location for MLTS

Named in honor of Ray Baum, RAY BAUM’s Act is also an acronym that stands for Repack Airwaves Yielding Better Access for Users of Modern Services.  While the Act in its entirety includes many different communications related initiatives, Section 506 of the Act is what Nunn Telephone Company is particularly focused on with its 911 emergency services for businesses. 

Under Section 506 of RAY BAUM’S Act, the FCC states “dispatchable location means a location delivered to the public safety answering point (PSAP) with a 911 call that consists of the validated street address of the calling party, plus additional information such as suite, apartment or similar information.” The act emphasizes the importance of sharing precise location information when calling 911, which is invaluable to first responders in locating callers and can dramatically increase the potential for better emergency outcomes.

How is RAY BAUM’S Act related to Kari’s Law?

Both Kari’s Law and Section 506 of RAY BAUM’S Act deal with E911 and MLTS. Kari’s Law focuses on ensuring that end-users can make calls to 911 in enterprise environments while notifying the enterprise of the emergency. Section 506 of RAY BAUM’S Act is concerned with the quality of the information that is sent to public safety operators when the call is made. Together, they are all about providing better, faster, more reliable access to emergency services when dialing 911.

The FCC is the definitive and official authority on compliance and requirements. If more information is needed, please visit the FCC website for additional guidance.

 

 

REFERENCES

Information provided by:

Acceptable Use Policy

This is Nunn Telephone Company’s Acceptable Use Policy (AUP). Nunn Telephone Company is referred to as EzLink Internet by Nunn Telephone Company, us, we, Company, or our. Users of our Internet related products are referred to as customer, you or your. This AUP is part of each customer’s contract with us, whether the contract is electronic or paper. Modifications to the AUP can be found on our website at www.nunntel.com/. By continuing to use our products, you agree to be bound by this AUP as modified. Your End Users and their customers are also bound by this AUP.

You expressly understand that the evolving nature of the Internet and on-line commerce makes it necessary for us to reserve the right to make changes to this AUP at any time, and without notice. For this reason as well, this AUP may not represent all possible ways in which you or an End User (as defined in your contract) engage in unacceptable behavior. We reserve the right to determine, in our sole and exclusive judgment, what activities are unacceptable.

This AUP incorporates, either explicitly, or by reference, other policies from entities providing products through us to you. These policies must be “passed through” to you and apply to you through this AUP. You are strongly encouraged to review these policies prior to agreeing to be bound by this AUP. They are listed under Legal Notices on our website.

You violate this AUP when you, or your End Users, engage in activities prohibited by the AUP. It is your responsibility and contractual obligation to ensure that End Users comply with this AUP, and cooperate with us in the enforcement and administration of this AUP.

  1. Lawful Purpose – The Services may be used for lawful purposes only. Transmission, storage, or presentation of any information, data or material in violation of any applicable law, regulation, this AUP, or any agreement for services, is prohibited. You may not use our products to directly facilitate the violation of any particular law or regulation.

The following list of prohibited uses is a partial list of uses prohibited by this AUP, and does not represent all unlawful uses of our products by you or End Users:

instructing others in unlawful activities;

forging, misrepresenting, omitting or deleting message headers (aka “spoofing”), return mailing information, internet protocol addresses to conceal or misidentify the origin of a message or to impersonate another person;

creating or sending Internet viruses, worms or Trojan horses, flood or mail bombs, or other harmful components, or attempting to interfere with the service of others including users, hosts, and networks by engaging in denial of service attacks, “flooding” of networks, or deliberate attempts to overload a service and attempts to “crash” any host;

attempting to obtain unauthorized access to any network or account, or engaging in any activity which would compromise customer privacy or gain access to any system or data without required permission, whether through hacking, and/or subverting, or assisting others in subverting, the security or integrity of our products, data, or systems;

soliciting, or instructing in, the performance of any illegal activity, even if the activity itself is not performed;

transmitting, posting or receiving material that is threatening, abusive, libelous, defamatory, obscene, pornographic, or otherwise in violation of any local, state, federal or international law or regulation;

engaging in any activity which would result in third-party charges to Company;

reselling or otherwise sharing Company’s Internet service, account information or passwords;

distributing Company’s Internet services beyond the scope of your end-user account;

attaching equipment, accessory, apparatus, circuit or devices that are harmful to the network and are attached to or connected with our facilities;

using Internet service for web or email hosting without making special written subscription arrangements with Company.

You and End Users may not engage in activity that transmits, downloads, or infringes or misappropriates the intellectual property rights of others. This includes but is not limited to, copyrights, trademarks, service marks, trade secrets, software piracy and patents. You and End Users may not use our products to defame, harass, abuse or threaten third parties; and/or acting in any manner that might subject us to unfavorable regulatory action, subject us to any liability for any reason, or adversely affect our public image, reputation or goodwill, as determined by us in our sole and exclusive discretion.

  1. SPAM – We have a zero tolerance approach to SPAM. This zero tolerance policy extends both to your using our products to disseminate SPAM, and the use of our products to send SPAM to our customers.

Customers, who send, disseminate or support SPAM will have their accounts suspended. We consider SPAM to be the sending or receipt of 200 or more email messages at one time. However, we reserve the right to determine, in our sole and absolute discretion, what constitutes SPAM. We also prohibit you, or End Users, from relaying email. In addition, should your use of our products cause us to be “black listed,” your account may be suspended.

We filter email for SPAM. We are not responsible for refused, expired or misdirected email as a result of this filtering. It is your sole and exclusive responsibility to properly configure your SPAM filter. Quarantined email will not be available to you indefinitely. It is your obligation to review your SPAM mailbox regularly.

  1. Violations of Rights, Other than Copyright – Complaints about such activity by our customers or End Users may be directed to Nunn Telephone Company and can be reached at 970-897-2200 or customerservice@ezlink.com.
  2. Child Pornography, Child Erotica and Bestiality – We take a zero-tolerance approach to using our products to disseminate or display images classified under U.S. law as child pornography, child erotica and/or bestiality. The contracts of customers who are themselves, or whose End Users are, using our products to disseminate or display child erotica, regardless of its literary merit, will be terminated.
  3. U.S. Export Laws – You may not use the services to engage in a violation of U.S. export laws. Violation of these laws may include selling products that may be legal to sell in the U.S., but illegal to export. You may not use our products to provide products to End Users with whom U.S. citizens may not do business.
  4. IP Addresses – We administer the network on which our products are provided. You cannot use IP addresses which were not assigned to you by us. If it is determined that you are using IP addresses which were not officially assigned by us, you will be suspended from network access until such time as the IP address overlap can be corrected. We own the IP numbers and addresses that may be assigned to you by us. These addresses may not be assigned or transferred, and are recycled by us on termination of your use of the products. We may, in our sole discretion, change these addresses.
  5. Suspension and/or Termination of Products, and Credits – Your or an End User’s failure to abide by any of the items set out in this AUP is grounds for suspension or termination of your services. Any termination or suspension may be undertaken with, or without, notice to you or an End User.

We do not issue credits for outages incurred as a result of our decision to suspend or terminate service for a violation of this AUP.

You agree to indemnify and hold us harmless for any and all claims, damages, losses, expenses (including attorneys’ fees and other legal expenses) resulting from your use (or misuse), including any suspension or termination, of our Internet service whether or not such use is found to be in violation of any statute, regulation or rule.

  1. Monitoring Products, Cooperation with Law Enforcement and Legal Documents – We may disclose information, including information that you or End Users may consider confidential, in order to comply with a court order, subpoena, summons, discovery request, warrant, regulation, or governmental request. We assume no obligation to inform you or an End User that information has been so provided, and in some cases may be prohibited by law from giving such notice. We may also disclose such information when it is necessary for us to protect our business, or others, from harm.
  2. Security – You are solely responsible for ensuring that your data is secure, that confidential information remains confidential, and that you do not expose your business to risks you are not prepared to assume. Use of information accessed by the Internet is at customer’s own risk. Company disclaims any responsibility for the accuracy, privacy or quality of the information. By using the Internet service, the customer agrees to hold Company harmless for content accessed using the Internet service. We reserve the right to take immediate action to suspend or terminate your account if, in our sole and exclusive discretion, you or an End User is engaging in activities that jeopardize our security, the security of other customers, or of the Internet in general. You may not be provided with advance notice that we are taking such action.

Network Management Practices Policy

Pursuant to the Federal Communications Commission’s Open Internet Rules found in Parts 1, 8 and 20 of Title 47 of the Code of Federal Regulations, the policies of Nunn Telephone Company (“Provider”) regarding network management practices, performance characteristics, and commercial terms are provided in entirety so that Provider’s current customers, prospective customers, third-party content providers and other interested parties can make informed choices regarding the broadband Internet access services offered by Provider, and the extent Provider’s network management practices may affect those services.

Network Management Practices

In the interest of providing the best online experience possible for all of Provider’s customers, Provider utilizes reasonable network management practices tailored to achieve legitimate network management purposes. Because bandwidth is a limited resource for broadband Internet service providers, it is essential that Provider reasonably manages its network to promote the use and enjoyment of the Internet by all of Provider’s customers. By engaging in reasonable and responsible network management,

Provider prevents its customers from being subjected to the negative effects of spam, viruses, security attacks, network congestion, and other risks that threaten to degrade service. The network management practices employed by Provider are consistent with industry standards.

Congestion Management

It is possible that a relatively small number of customers may place a disproportionate demand on the network bandwidth resources, causing network congestion and an overall degradation in service quality for other end users. For this reason, if Provider’s network nears a state of congestion, Provider may use congestion management practices to ensure all of Provider’s customers retain access to a “fair share” of bandwidth resources.

When Provider’s network nears a state of congestion, the congestion management tools, practices and/or software employed by Provider will identify segments of the Provider network which have a predetermined, aggregated level of bandwidth usage. From there, the congestion management tools will ascertain which customer account in the identified network segment is using a disproportionate share of the bandwidth. The Internet traffic of the identified customer account may be temporarily managed until the period of network congestion passes. Customers whose Internet traffic is temporarily managed by Provider will still be able to access online content, and many activities will be unaffected; however, these customers may experience slower downloads and uploads and Internet/website response times.

The congestion management practices utilized by Provider are “protocol-agnostic” meaning that the network does not manage congestion based on the online activities, protocols or applications a customer uses. Rather, Provider’s congestion management practices focus only on the heaviest bandwidth users in real time.

Application-Specific Behavior

Provider does not make use of any application-specific network management practices. Provider does not modify protocol fields in ways not prescribed by the protocol standard. Provider does not inhibit or favor certain applications or classes of applications. Provider does not block or rate-control specific protocols or protocol ports, with the exception of malformed or non-standard protocol traffic as identified by Provider and outbound Simple Mail Transfer Protocol (“SMTP”) as a protection and security control mechanism against unsolicited commercial email (“UCE”).

Device Attachment Rules

Customer-provided DSL, FTTH, and Cable Modem Customer Premise Equipment (“CPE”) are incompatible with Provider’s network due to customization of service activation processes by the Provider. Provider deploys compatible CPE device to customer upon service activation and remains the property of the Provider after service deactivation. In order for a device to be approved for use on the Provider’s network, the device must conform to publicly available industry standards, be non-harmful to Provider’s network, and be connected on the local area network (“LAN” or “private side”) of the above mentioned CPE.

Security

Provider offers its customers unrestricted access to all of the lawful content, services, and applications available on the Internet. Provider uses industry standard tools and generally accepted best practices and policies to protect our customers from spam, phishing, and other unwanted or harmful online content and activities. In the instances where these tools and policies identify online content as harmful or unwanted, the content may be prevented from reaching customers, or customers may be permitted to identify or inspect content to determine if it is harmful or unwanted.

The security measures employed by Provider to prevent the spread of viruses, malware, spam, harmful and unwanted content or other threats to consumers do not prevent end-users from running certain applications.

Performance Characteristics

Provider offers broadband Internet access service via a Digital Subscriber Line (“DSL”), or Fiber to the Home (“FTTH”). DSL is a wireline transmission technology that transmits data faster over traditional copper telephone lines already installed to homes and businesses. FTTH utilizes fiber optic cable to deliver telephone, data and video services to customer locations.

The advertised speed of Provider’s Internet service is the maximum speed achievable with the technology utilized by Provider. While the maximum advertised speed is attainable for end users, several factors may affect the actual speed of Provider’s Internet service offerings, including, but not limited to: the distance of the consumer’s home or office from Provider’s central office (i.e., the further away the customer is from the central office, the slower the broadband speed), the end user’s computer, modem or router, activity during peak usage periods, and other Internet traffic.

Based on internal RFC2544 back-to-back testing measuring throughput and latency, the expected mean upload and download access speeds are typically plus or minus 15% of the advertised access speeds during peak usage periods (i.e., between 7:00 p.m. and 11:00 p.m. on weeknights) with a mean round trip latency of 10ms.

The actual speeds achieved with Provider’s Internet service offering may not make Provider’s Internet service suitable for real-time applications, such as Voice over Internet Protocol (“VoIP”). Some real-time services may require more stringent protocol performance metrics including low latency, low jitter, and high throughput. Customer may choose to query Provider to be better informed about their specific performance requirements before purchasing real-time services.

Provider does not offer any specialized services. Please click here to see our service offerings.

Commercial Terms

Pricing

In order to meet the usage and budgetary needs of all of our customers, Provider offers a wide selection of broadband Internet access plan options, including promotional offerings and bundled service choices.

To see Provider’s current promotions and pricing on broadband Internet access service, please visit our website https://nunntel.com/internet/ or call 970-897-2200 to speak with a customer service representative.

For network security purposes, businesses and/or other customers utilizing Provider’s network, but not Provider’s email service with the corresponding security measures, may be required to purchase a Static Internet Protocol (“IP”) address for an additional monthly fee.

Early Termination Fees

If a customer previously entered into a service agreement with Provider for broadband Internet access service for a defined service term, and customer desires to terminate the service agreement prior to the expiration of that term, Provider may charge a reasonable early termination fee if such fee is clearly indicated in the service agreement.

Upon service deactivation, failure to return Provider-owned equipment such as DSL Modem or FTTH ONT devices will result in a fee charged to the customer.

Customers may call 970-897-2200 to speak with a customer service representative about Early Termination Fees in the event of service deactivation with the Provider.

Usage-Based Fees

Provider’s Internet service is priced on a flat-fee basis (plus taxes). Provider does not charge end users a usage-based fee for Internet service at this time.

Privacy Policy

Provider affords full access to all lawful content, services and applications available on the Internet and does not routinely monitor, inspect or store the network activity and traffic of its Internet service users. However, Provider reserves the right to monitor bandwidth, usage, transmissions and content for purposes of protecting the integrity of the network and Provider’s Internet access service through reasonable network management practices.

For troubleshooting purposes, Provider may collect equipment information to identify the equipment customer is using on the network, including, but not limited to: equipment type, serial number, settings, configuration and software. Provider may also collect performance information to examine the operation of the equipment, services and applications the customer may use on the network, including, but not limited to: IP addresses, URLs, data transmission rates and latencies, location information, security characteristics, and information about the amount of bandwidth and other network resources customer is using in connections with uploading, downloading or streaming data to and from the Internet.

Network traffic, activity, performance information, and equipment information monitored or collected by Provider is done so for the sole purpose of reasonable network management purposes.

Provider is required to comply with relevant laws, regulations and governmental requests, including supplying relevant information to law enforcement agencies which may be collected as part of network management practice outlined above. Provider does not distribute information on network activity and/or traffic to any other third party, or use network traffic information for any non-network management purpose.

Provider strives to respect a customer’s desire for privacy and therefore obtains and uses individual customer information for business purposes only. The information is used to enable Provider to provide customers with the best service possible. Customer information may also be used to protect customers, employees, and property against fraud, theft, or abuse and to maintain good customer relations. All Provider personnel are aware of and protect the privacy of all forms of customer communications and information.

No personal information obtained on-line is released outside of Provider or by its authorized agent, except with the customer’s permission, as required by law, for safety reasons, or to survey customer satisfaction. Provider uses the information provided when placing an order to complete that order. Any information asked for on our website will only be used to process a customer’s request. Provider does not sell customer information to any outside party.

Customer Proprietary Network Information (CPNI). It is Provider’s policy to maintain and protect the confidential and proprietary network information we possess of our customers. Unless required to do so by law or unless such information will assist us in providing telecommunications services, no customer confidential or proprietary information will be given to any third parties. For the purposes of this policy, “customer confidential or proprietary information” does not include any information published in any telephone directory.

An individual can visit and use Provider’s website with complete privacy. A web site visitor can choose to provide customer-specific information by ordering a product or service, sending Provider an email or using our convenient on-line tools. Any information provided by a web site visitor is held strictly confidential and will not be sold or provided to any other organization or business, Provider web sites may contain links to other web sites. Provider is not responsible for the content or privacy policies of other sites. Even though Provider will use its best efforts to assure privacy and confidentiality, material on the web, e-mail, or other electronic communications cannot be guaranteed to be protected against access by unauthorized persons.

The Provider’s network management practices as discussed herein are intended solely to provide the best online experience possible for all of Provider’s customers by safeguarding our network and its users from spam, viruses, phishing, and other unwanted or harmful online content and activities. Provider’s network management practices are not intended, nor implemented, to block consumers from accessing the content and applications of their choice, deprive consumers of their entitlement to competition, or discriminate against or in favor of certain network traffic. End users with questions, concerns or complaints regarding Provider’s network management practices are encouraged to contact Provider for issue resolution.

Contact Us

If you have any questions regarding Providers Network Management Practices Policy or would like to file a complaint with Provider regarding its network management practices, please contact Provider at:

Nunn Telephone Company

Attn: Adam Rislov, Manager

PO Box 249, 285 Logan Avenue, Nunn, Colorado 80648

970-897-2200 / customerservice@ezlink.com

Further, if you believe that Provider is in violation of the FCC’s Open Internet Rules, you may file either an informal or formal complaint with the FCC. www.consumercomplaints.fcc.gov

FCC Establishes Portal for ISP Transparency Disclosures

On May 21, 2018, the FCC released a Public Notice announcing the establishment of a portal for Internet service provider (ISP) transparency disclosures. The portal will be available for both ISPs submitting their disclosures to the FCC and consumers searching for any disclosures submitted to the FCC on May 29, 2018. The Restoring Internet Freedom Order, wherein the FCC adopted ISP transparency reporting requirements, becomes effective on June 11, 2018.

The revised transparency rule – 47 CFR § 8.3 – requires ISPs to publicly disclose information about their service in one of two ways – by providing the disclosure on a publicly available, easily accessible website or by submitting it to the FCC for posting. ISPs choosing to submit their required disclosures to the FCC should do so electronically, in a format that is accessible to people with disabilities, through https://www.fcc.gov/isp-disclosures.

An ISP that does not submit its required disclosure to the FCC through this portal will be deemed as having elected to provide it on a publicly available, easily accessible website of its choosing. An ISP that submits its required disclosure to the FCC and later elects to provide it on a publicly available, easily accessible website of its choosing should inform the FCC of this change by filing via the FCC portal a clear statement of the change, including the website where consumers can find the required disclosure.

Additional Disclaimers

The Open Internet Rules, as adopted, and Provider’s Network Management Practices Policy are not intended to affect, alter or otherwise supersede the legal status of cooperative efforts by broadband Internet access service providers and other service providers that are designed to curtail infringement in response to information provided by rights holders in a manner that is timely, effective, and accommodates the legitimate interests of providers, rights holders, and end users.

Furthermore, the Open Internet Rules, as adopted, and Provider’s Network Management Practices Policy do not prohibit Provider from making reasonable efforts to address the transfer of unlawful content or unlawful transfers of content.

For additional information, please review Provider’s Acceptable Internet Use Policy/Subscriber Agreement at: https://www.goldenwest.com/support/policies-and-information/acceptable-use-policy/

EzLink Internet Access agrees to provide and the User agrees to receive access to the Internet service according to the following terms and conditions:

  • All provisions of EzLink’s Service Agreement (“Agreement”) apply to the User’s Principal Account and all Associate Accounts billed to the Principal Account.
  • The benefits of or rights conferred by this agreement are non-transferable. Use of EzLink accounts is expressly limited to the individual or business whose name appears on the account and dependents of the account holder living at the same address. This is to include the User re-selling of the services provided by EzLink without the express written consent of EzLink.
  • EzLink may enter into, upon and over user’s service premises periodically during the term of this Agreement to install connect, inspect, maintain, repair, alter, disconnect and remove our facilities and equipment used to provide service. To the extent the same is consistent with your ownership of the premises, you grant EzLink a temporary and permanent easement to construct, install, maintain, and/or replace service facilities and to install, connect, inspect, maintain, repair, alter, disconnect, and remove all facilities and equipment necessary to provide Service. In the event you are not the owner of the premises upon which installation is requested, you warrant to EzLink that you have obtained the consent of the owner of the premises for us to install and maintain facilities and equipment as contemplated herein. User shall ensure that the service premises is a safe working environment, free from Hazardous Materials or obstructions, interference from persons or pets, and reasonably suitable for the services. All pets, poultry, and livestock at the premises must be properly restrained prior to EzLink entry.
  • User agrees to use the service in a manner consistent with any and all applicable laws.
  • User agrees to follow the Acceptable Use Policy of any network that a user connects to, including EzLink’s system. Furthermore, the user agrees to hold harmless and indemnify EzLink for violations of any AUP policy by the User and/or any actions taken by EzLink in response to such violations.
  • If User is less than 18 years of age, this Agreement must be signed by a parent or legal guardian, who is responsible for all charges related to the use of the User’s account(s).
  • Use of EzLink for advertising or promotion of a commercial product or service without the express, written consent of EzLink is expressly prohibited. This includes and is not limited to the designed personal home pages site, ftp site, email or another service provided by EzLink.
  • The User is responsible for all use of the User’s account(s) and confidentiality of password(s). EzLink will suspend access or change password(s) for access to the User’s account(s) immediately upon notification by User that his/her password has been lost, stolen or otherwise compromised.
  • User is responsible for all local or long-distance telephone charges for connecting to EzLink.
  • The User agrees to pay EzLink all charges relating to the use of the User’s account(s) according to rates and prices published online at the time the service is used. Online rates and prices are incorporated into this agreement by reference. The User is also responsible for monthly storage charges as described online.
  • Access is subject to credit limits established by the issuer of User’s credit card and/or by EzLink. A credit limit is applied to all accounts. User’s access to service may be suspended if User exceeds his/her credit limit unless prior arrangements have been made.
  • The User is responsible for charges at the time the service is used and EzLink may apply the amount due to the User’s credit card at any time.
  • EzLink reserves the right to suspend access to service for a User’s account(s) upon an indication of credit problems including delinquent payments or rejection of any credit card charges.
  • EzLink reserves the right to change prices on 30 days’ notice as published online.
  • THE EzLink SERVICE IS PROVIDED ON AN “AS IS, AS AVAILABLE” BASIS. NO WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO THOSE OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE MADE WITH RESPECT TO EzLink OR ANY INFORMATION OR SOFTWARE THEREIN.THIS “NO WARRANTY” EXPRESSLY INCLUDES ANY REIMBURSEMENT FOR LOSSES OF INCOME DUE TO DISRUPTION OF SERVICE BY EzLink OR ITS PROVIDERS.
  • TO THE EXTENT PERMITTED BY LAW, EzLink’s TOTAL LIABILITY FOR ANY CLAIM CONCERNING SERVICES OR EQUIPMENT PROVIDED TO CUSTOMER, INCLUDING FOR ANY EXPRESS OR IMPLIED WARRANTIES, IS LIMITED TO THE EQUIVALENT OF THREE MONTH’S PAYMENT FOR THE AFFECTED SERVICES OR EQUPMENT WE PROVIDED, WHETHER SUCH CLAIM OR REMEDY IS SOUGHT IN CONTRACT OR TORT, INCLUDING NEGLIGENCE, STRICT LIABILITY OR OTHERWISE. TO THE EXTENT PERMITTED BY LAW, THE COMPANY SHALL NOT BE LIABLE FOR ANY CONSEQUENTIAL, INCIDENTIAL, INDIRECT, PUNITIVE, SPECIAL OR TREBLED OR ENHANCED DAMAGES, INCLUDING, BUT NOT LIMITED TO LOST PROFITS, LOST BUSINESS, OR OTHER COMMERICIAL OR ECONOMIC LOSS, WHETHER SUCH DAMAGES ARE CLAIMED FOR BREACH OF CONTRACT, NEGLIGENCE OR OTHERWISE AND WHETHER OR NOT WE HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
  • Neither EzLink nor its Information Providers are responsible for any damages arising from the User’s use of EzLink Internet services, or by the User’s inability to use EzLink ‘s access services.
  • EzLink reserves the right to change without notice the EzLink service, including, but not limited to, access procedures, hours of operation, menu structures, commands, documentation, vendors, and services offered.
  • EzLink is not responsible for the User’s personal files residing on EzLink. The User is responsible for independent backup of his/her data stored on EzLink.
  • EzLink reserves the right to delete User’s personal files after one or both parties terminate this agreement.
  • EzLink reserves the right in its sole discretion to delete any information entered into EzLink by User. EzLink and its authorized representatives shall have the right, but shall not be obligated, to edit publicly viewable information.
  • THE USER HEREBY AGREES THAT ANY MATERIAL SUBMITTED FOR PUBLICATION ON EzLink THROUGH USER’S ACCOUNT(S) DOES NOT VIOLATE OR INFRINGE ANY COPYRIGHT, TRADEMARK, PATENT, STATUTORY, COMMON LAW OR PROPRIETARY RIGHTS OF OTHERS, OR CONTAIN ANYTHING OBSCENE OR LIBELOUS.
  • EzLink, at its sole business judgment, may terminate this Agreement immediately or suspend the User’s access to the service upon any breach of this Agreement by the User, including, but not limited to, refusal or failure to pay for services provided or by sole judgement of EzLink that the User may be performing activities harmful to EzLink or its Users, employees, vendors, business relationships, or any other users of the Internet.
  • Due to the public nature of the Internet, all email is considered publicly accessible and important information should be treated carefully. EzLink is not liable for protection or privacy of electronic mail and information transferred through the Internet.
  • EzLink reserves the right to terminate access to service for any User account which has been inactive for 6 months.
  • This Agreement shall be governed by the laws of the State of Colorado.
  • EzLink may modify these terms and conditions upon notice published online via EzLink. The User’s use of EzLink services after such notice shall constitute User’s acceptance of the modifications to this Agreement.
  • Non-enforcement of any section of this Agreement does not constitute consent and EzLink reserves the right to enforce this Agreement at its sole discretion.
  • If any one or more paragraphs in this Agreement is found to be unenforceable or invalid, User’s and EzLink’s agreement on all other paragraphs shall remain valid.
  • Web pages included in accounts are specifically designated and shall be monitored by EzLink for compliance. EzLink reserves the right to assess appropriate account type fees in the event the user publishes pages contrary to the stated account web page type, e.g., personal pages used in a commercial manner.
  • EzLink provides unlimited access accounts to only one user at a time. If a user has logins that occur at the same time while being an unlimited account holder, this violates the condition of: one user, one account, one login at a time. Such violations will be detailed by date and time of each violation and the user may be responsible for payment of additional accounts to cover the additional or simultaneous logins for all month(s) applicable.
  • DSL/Wireless/Broadband/ISDN services are provided to the user under the following terms and conditions related to said services. a. Stated speeds, up and down, published per each service is not and cannot be guaranteed. b. All security needs, provisions and safeguards are the user’s full responsibility. c. Resale of access services is strictly prohibited unless there is written authorization duly executed between the user and provider.
  • Copyright Infringement – We are registered with the United States Copyright Office pursuant to the Digital Millennium Copyright Act (DMCA). If your site has been copied by our customer, or an End User, in a way that falls within the terms of the DMCA, you must provide us with proper notice of such an infringement. The DMCA contains very specific guidelines of what your notice must contain. Click here to view our DMCA policy.
Battery Backup Customer Notice

Backup Power for Residential Voice Telephone Services during Power Outages:  For many years, your home telephone would allow you to stay connected to emergency voice services during a power outage. However, if your residential voice telephone service is provided using fiber rather than the tradition copper-based line, the residential voice telephone service requires backup battery power to continue functioning during an outage. To avoid a disruption of home voice service during an outage – and to maintain the ability to connect to 911 emergency services – Nunn Telephone Company provides you with a battery for the backup power for your residential voice telephone service at the time of the initial installation at no additional cost.

What Your Battery Can – and Can’t – Do for You:  Nunn Telephone Company’s backup batteries for telephone will allow you to continue to use your home voice services during a power outage. Without a backup battery or alternate backup source such as a generator, customers with fiber based residential telephone service will not be able to make any calls, including emergency calls to 911. The only way to maintain the ability to use your telephone is by using some form of backup power.

Our backup battery does not provide power to any services other than voice. Home security systems, medical monitoring devices, cordless phones and other equipment will not run on a residential voice telephone backup battery.

Replacement Options:  As previously noted, a backup battery has been provided by Nunn Telephone Company during the initial installation. However, the battery provided by Nunn Telephone Company may need to be replaced every one or two years or when the battery is no longer functioning.

  • You can purchase replacements or additional backup batteries directly through Nunn Telephone Company. If you have any questions or simply want to purchase a backup battery through us, please call 970-897-2200, or visit our website at https://www.nunntel.com. Our replacement 24-hour backup battery solution cost approximately $15.00 and can be picked up at our main office at 285 Logan Ave. in Nunn, CO. If you do not feel comfortable installing your own battery, please call us to make an appointment, and we would be happy to assist you.

Expected Backup Power Duration:  Backup batteries are expected to last at least 24 hours on standby power. The backup battery should give you 8 hours of talk time. If you feel that is not enough time, you may extend your standby power by purchasing additional 24-hour batteries. Each additional 24-hour battery is expected to give an additional 8 hours of talk time in the correct battery environment.

Instructions for Proper Care and Use of Your Battery:  Please follow the more detailed instructions included with your battery for proper use, storage and care of your battery to ensure that it will function as needed during a power outage. If you do not store your battery correctly, it may shorten its useful life. Environmental factors such as temperature can shorten your battery’s useful life. We recommend that you store your battery above [41°F and below 104°F]. These batteries are not rechargeable. They will not last forever and should be replaced every 4 to 6 years, or when the indicator light for the battery shows that it is low or out of charge. See the instructions above for purchase and replacement options. You should also periodically, as be described in the instructions included with your battery, remove and test your battery to verify both the operation of the backup battery and its condition.

Customer Propriety Network Information (CPNI)

Effective December 2007, the Federal Communications Commission (FCC) adopted new rules for communication companies to protect their customer’s information. Customer Propriety Network Information (CPNI) is information that communication companies acquire about their subscribers. It includes not only what services are used but also the amount and type of usage. CPNI does not include your name, address, or phone number.

The FCC will be requiring all communication companies to:

  • Ask for a photo ID or the PIN/Password of all customers at a retail location.
  • Ask for a PIN/Password when a customer calls in with questions.
  • Provide password protection for online account access.
  • Notify customers when a password, online account information or address of record is created or changed.
  • Notify customers if there is an accidental disclosure of their CPNI.

What Does This Mean To Me?

When a customer walks into the Nunn Telephone Company’s office he/she will be asked for their photo ID or Personal Identification Number (PIN)/Password. The valid photo ID must match the name on the account. When a customer calls MHTC we will ask you for your name and your PIN/Password.

Who Can Access or Make Changes to the Account?

The person’s name that appears on the bill is the ONLY person authorized to access this account either in person or by phone. If you want to allow someone else to have access to this account you may do so by notifying NTC in writing that you wish to add or remove a specific person from your account, for example your spouse. Please include your name, account number and the name of the person that you are adding or removing. These changes will not be made if the request is not signed. (You can also add someone to your account when you initially setup your password during the CPNI registration.) NTC is prohibited from providing any information to anyone whose name is not listed on the account.

NTC is committed to respecting and protecting the privacy of our customers. NTC does not sell or provide customer information to third parties for sales or marketing purposes. For more detailed information please refer to our privacy policy. NTC is serious about keeping your information safe from pretexting (someone calling in pretending to be you). In accordance with the new FCC rules NTC will secure the privacy of your information.

You can read the FCC’s Guide to Protecting Your Telephone Calling Records here.

COPYRIGHT VIOLATION REPORTING INFORMATION

In compliance with the Digital Millennium Copyright Act of 1998, NTC offers the following information for the reporting of a copyright violation on, or using, NTC’s network Internet services:

Full Legal Name of ISP: Nunn Telephone Company
Address of ISP: 285 Logan Ave, PO Box 249, Nunn, CO 80648
All Other Business Names of ISP: Nunn Communications, LLC
Name of Agent to Receive Notification of Claimed Infringement: Adam Rislov
Address of Above Agent: 285 Logan Ave, PO Box 249, Nunn, CO 80648
Telephone Number of Above Agent: (970) 897-2200
Facsimile (FAX) Number of Above Agent: (970) 897-2727
E-mail Address of Above Agent: rislova@ezlink.com
Name of Person Signing this Notice: Adam Rislov
Title of Person Signing this Notice: General Manager
Signature of Person Signing this Notice: Signature on File at NTC
Date of Signature: February 6, 2023

Customer Propriety Network Information (CPNI) Registration Form

To view and download the CPNI registration form, click here.

Digital Millennium Copyright Act Notice “DMCA”

In accordance with the Online Copyright Infringement Liability Limitation Act of the Digital Millennium Copyright Act (17 U.S.C. § 512) (”DMCA”), if you are a copyright owner (or an agent of a copyright owner) and believe any user material posted on our sites infringes upon your copyrights, you may submit a Notification of Claimed Infringement. The written notice (the “DMCA Notice”) must include substantially the following:

  • Your physical or electronic signature.
  • Identification of the copyrighted work you believe to have been infringed or, if the claim involves multiple works on the Website, a representative list of such works.
  • Identification of the material you believe to be infringing in a sufficiently precise manner to allow us to locate that material.
  • Adequate information by which we can contact you (including your name, postal address, telephone number, and, if available, email address).
  • A statement that you have a good faith belief that use of the copyrighted material is not authorized by the copyright owner, its agent, or the law.
  • A statement that the information in the written notice is accurate.
  • A statement, under penalty of perjury, that you are authorized to act on behalf of the copyright owner.

Our designated copyright agent to receive DMCA Notices is:

Adam Rislov
Nunn Telephone Company
285 Logan Avenue, PO Box 249, Nunn, CO 80648
970.897.2200 / rislova@ezlink.com

If you fail to comply with all of the Notification requirements of Section 512(c)(3) of the DMCA, your DMCA Notice may not be effective.

Copyright owners may use their own notification of claimed infringement form that satisfies the requirements of Section 512(c)(3) of the U.S. Copyright Act. Under the DMCA, anyone who knowingly makes misrepresentations regarding alleged copyright infringement may be liable to Company, the alleged infringer, and the affected copyright owner for any damages (including costs and fees) incurred in connection with the removal, blocking, or replacement of allegedly infringing material under Section 512(f) of the DMCA.

Counter-Notification Procedures

If you believe that material you posted on the Website was removed or access to it was disabled by mistake or misidentification, you may file a counter-notification with us (a “Counter-Notice”) by submitting written notification to our copyright agent designated above. Pursuant to the DMCA, the Counter-Notice must include substantially the following:

  • Your physical or electronic signature.
  • An identification of the material that has been removed or to which access has been disabled and the location at which the material appeared before it was removed or access disabled.
  • Adequate information by which we can contact you (including your name, postal address, telephone number, and, if available, email address).
  • A statement under penalty of perjury by you that you have a good faith belief that the material identified above was removed or disabled as a result of a mistake or misidentification of the material to be removed or disabled.
  • A statement that you will consent to the jurisdiction of the Federal District Court for the judicial district in which your address is located (or if you reside outside the United States for any judicial district in which the Website may be found) and that you will accept service from the person (or an agent of that person) who provided the Website with the complaint at issue.

Upon receipt of a Counter Notice, Company shall promptly provide the complaining party with a copy of the Counter-Notice and inform the party we will replace the removed material or cease disabling access to it within 10 business days. The DMCA allows us to restore the removed content no less than 10, but not more than 14 business days after receipt of the Counter-Notice, if the party filing the original DMCA Notice does not file a court action against the alleged infringer.

Please be aware that if you knowingly materially misrepresent that material or activity on the Website was removed or disabled by mistake or misidentification, you may be held liable for damages (including costs and attorneys’ fees) under Section 512(f) of the DMCA.

Repeat Infringers

It is our policy in appropriate circumstances to disable and/or terminate the accounts of users who are repeat infringers. For additional information concerning termination of accounts due to DMCA violations, see DMCA Termination, below.

DMCA Termination

It is Nunn Telephone Company’s policy to comply with the “safe harbor” provisions for Internet Service Providers set forth in the DMCA. Without limiting any other rights or remedies available to any copyright owner or of Nunn Telephone under this AUP or applicable law, Nunn Telephone Company may terminate Service for repeated and willful violations of the DMCA.

When Nunn Telephone Company receives a notice from a copyright holder or its authorized representative regarding an alleged violation of law by someone using an IP address identified as belonging to Nunn Telephone, and the alleged offender is a customer of Nunn Telephone, the customer will be notified by telephone and email of the offense. If it is a first-time offense, the customer will be notified and advised that an alleged violation of copyright law has been received and that any further violations could affect the customer’s access to the Internet. Notification of a second offense will result in the same action. A third offense will result in notice that Internet service will be restricted of ninety (90) days to limit the ability to violate the law. A fourth offense will result in the termination of Internet service.

  1. Termination of Service (Residential Accounts). Nunn Telephone Company will suspend or disconnect Service if four (4) DMCA offenses are recorded on a residential account in any twelve (12) month period. Service will be suspended or disconnected for a minimum period of 12 months. If Service is suspended or disconnected under this Section, you will be responsible for all fees and/or recovery charges associated with termination of Service, as set forth in our Terms and Conditions of Service.
  2. Termination of Service (Business Accounts). Nunn Telephone Company will suspend or disconnect Service if any DMCA offenses are recorded on a business account. Service will be suspended or disconnected for a minimum period of 12 months. If Service is suspended or disconnected under this Section, you will be responsible for all fees and/or recovery charges associated with termination of Service, as set forth in our Terms and Conditions of Service.
Open Internet Policy

(as of November 2022)

Nunn Telephone Company (“NTC”) is committed to an open Internet and supports the following Net Neutrality principles:

  • Transparency
  • NO Blocking of Internet content, subject to reasonable network management as described below
  • NO Throttling of Internet content, subject to reasonable network management as described below
  • NO Unreasonable Discrimination
  • NO Paid Prioritization of Internet content
  • Freedom of Customers to access lawful content
  • Freedom of Customers to use non-harmful applications of their choice
  • Freedom of Customers to attach non-harmful personal devices

This Open Internet Policy sets forth certain information regarding the policies and practices of Nunn Telephone and how we manage our network for broadband internet access service. This Policy is a supplement to and is incorporated by reference in the Terms and Conditions available at: www.nunntel.com.

Nunn Telephone’s broadband access service is comprised of fiber and cable modem service, depending on the geographic area served. Generally, given the nature of satellite services, certain circumstances may affect the speed and quality of the Service, including but not limited to the Customer’s connection of multiple devices to the Nunn Telephone network.

I.          NETWORK MANAGEMENT PRACTICES

  1. Blocking: Other than reasonable network management practices disclosed below, we do not block or otherwise prevent a customer from lawful content.
  2. Throttling: Other than reasonable network management practices disclosed below, we do not throttle or otherwise degrade or impair access to lawful Internet traffic on the basis of content, application, service, user, or use of a non-harmful device.
  3. Congestion Management: Our Service is provided on a “best efforts” basis and our congestion management practices are in place to ensure that all Customers experience as high quality a service under varying usage periods. In a manner consistent with our Service Agreement and Privacy Policy, we may monitor network traffic to ensure capacity is sufficient to maintain an efficient network load, to perform diagnostics and to otherwise manage and enhance the network.
  4. Application-Specific Behavior: Nunn Telephone Company does not make use of any application-specific network management practices and does not modify protocol fields in ways not prescribed by the protocol standard. Nunn Telephone does not inhibit or favor certain applications or classes of applications or block or rate-control specific protocols or protocol ports, with the exception of malformed or non-standard protocol traffic as identified by Nunn Telephone and outbound Simple Mail Transfer Protocol (“SMTP”) as a protection and security control mechanism against unsolicited commercial email (“UCE”).
  5. Device Attachment Rules: Customer-provided FTTH and Cable Modem Customer Premise Equipment (“CPE”) are incompatible with our network due to customization of service activation processes by Nunn Telephone. Provider deploys compatible CPE device to Customer upon service activation and remains the property of Nunn Telephone after service deactivation. In order for a device to be approved for use on our network, the device must conform to publicly available industry standards, be non-harmful to Nunn Telephone’s network, and be connected on the local area network (“LAN” or “private side”) of the above mentioned CPE, provided they are used for lawful purposes, do not harm the Nunn Telephone Company, violate our Service Agreement, or harm other users. However, if we determine, in our sole and reasonable discretion, that the connection of a particular type of device negatively impacts other users or Nunn Telephone, or may expose us to potential legal liability, we reserve the right to limit or restrict Customers’ ability to connect such type of device. If you need technical support services to assist you in the installation and configuration of third party devices, please contact us at 970-897-2200. Depending on your Service Agreement, there may be an additional fee for IT support services if Customer does not have Nunn Telephone’s managed wi-fi router.
  6. Security: We have taken reasonable physical, technical and administrative safeguards to protect the integrity and operations of Nunn Telephone Company. We offer our customers unrestricted access to all of the lawful content, services, and applications available on the Internet. Nunn Telephone uses industry standard tools and generally accepted best practices and policies to protect our customers from spam, phishing and other unwanted or harmful online content and activities. In the instances where these tools and policies identify online or inspect content to determine if it is harmful or unwanted. We monitor for security threats and may prohibit certain activity that we may deem, in our sole and reasonable discretion, poses a potential risk to the Company or to other Customers. Triggering conditions include but are not limited to denial of service activity, IP address or port scanning, excessive account login failures; or certain Internet addresses that are disruptive, malicious and typically persistent. If we notice excessive Customer connections, including but not limited to Wi- Fi connections, that are harmful or are commonly used to disrupt the normal use by Nunn Telephone or use by other Customers, we will attempt to notify the Customer to work collaboratively to remedy the issue to the extent possible; however, we reserve the right as a reasonable security practice, without advance notice, to block any Customer traffic, ports, protocols, devices, or applications (such as peer-to-peer applications that may carry malicious software or are known to be problematic) that we determine, in our sole and reasonable discretion, may cause harm to the Nunn Telephone Company or to other Customers, or may expose us to potential legal liability. The security measures employed by Nunn Telephone Company to prevent the spread of viruses, malware, spam, harmful and unwanted content or other threats to consumers do not prevent end-users from running certain applications.

II.        PERFORMANCE CHARACTERISTICS AND COMMERCIAL TERMS

Nunn Telephone Company offers broadband Internet access service via Fiber to the Home (“FTTH”). FTTH utilizes fiber optic cable to deliver telephone, data and video services to Customer locations.

The advertised speed of Nunn Telephone’s Internet service is the maximum speed achievable with the technology utilized by us. While the maximum advertised speed is attainable for end users, several factors may affect the actual speed of the service offerings, including, but not limited to: the distance of the consumer’s home or office from Nunn Telephone’s central office (i.e., the further away the Customer is from the central office, the slower the broadband speed), the end user’s computer, router, and other Internet traffic.

The actual speeds achieved with Nunn Telephone’s Internet service offering may not make the service suitable for real-time applications, such as Voice over Internet Protocol (“VoIP”). Some real-time services may require more stringent protocol performance metrics including low latency, low jitter, and high throughput. Customer may choose to query Nunn Telephone to be better informed about their specific performance requirements before purchasing real-time services.

Provider does not offer any specialized services.

  1. Service Offerings and Pricing: Nunn Telephone offers multiple packages for both residential and business. Details of all plans are available at nunntel.com or by calling 970-897-2200.
  2. Various Fees. We will assess the following fees for our Service, where applicable. All fees are Individual Case Basis (ICB); fees will be based on service type, term of service, promotional terms if applicable, rental/lease agreement, degree of work activity required, etcetera. Please see our Service Agreement for pricing details.
    1. Installation Fee
    2. Equipment Rental/Lease Fee
  • Late Fee
  1. Reconnection Fee for Terminated Service Due to Non-Payment
  2. ACH Overdrawn/Return Check Fee
  1. Acceptable Use: All of Nunn Telephone Company’s offerings are subject to the Acceptable Use Policy (AUP), which we may from time to time establish or revise. The AUP is available here: nunntel.com
  2. Privacy Policy: Nunn Telephone Company’s current Privacy Policy is available here: nunntel.com
  3. Disputes and Arbitration: The Service Agreement requires the use of arbitration to resolve disputes and otherwise limits the remedies available to Customers in the event of a dispute.

III.     FCC REQUIREMENTS AND COMPLAINT PROCESS

The Federal Communications Commission (FCC) has adopted rules to preserve the Internet as an open platform (Rules). Information regarding these Rules is available on the FCC’s website at: https://www.fcc.gov/restoringinternetfreedom

If a customer believes that we are not in compliance with the FCC’s rules, the Customer may file an informal complaint with the FCC. The FCC urges Customers to submit any complaints via its website at the following address: https://consumercomplaints.fcc.gov/hc/en-us.

IV.      ADDITIONAL DISCLAIMERS

This Internet Policy does not affect, alter or otherwise supersede the legal status of cooperative efforts by Nunn Telephone that are designed to curtail copyright or trademark infringement in response to information provided by rights holders in a manner that is timely, effective, and accommodates the legitimate interests of the company, rights holders, our customers and other end users. Furthermore, this Open Internet Policy does not prohibit us from making reasonable efforts to address the transfer of unlawful content or unlawful transfers of content. For additional information, please review the Service Agreement and Privacy Policy.

 

Privacy Policy

Provider affords full access to all lawful content, services and applications available on the Internet and does not routinely monitor, inspect or store the network activity and traffic of its Internet service users. However, Provider reserves the right to monitor bandwidth, usage, transmissions and content for purposes of protecting the integrity of the network and Provider’s Internet access service through reasonable network management practices.

For troubleshooting purposes, Provider may collect equipment information to identify the equipment customer is using on the network, including, but not limited to: equipment type, serial number, settings, configuration and software. Provider may also collect performance information to examine the operation of the equipment, services and applications the customer may use on the network, including, but not limited to: IP addresses, URLs, data transmission rates and latencies, location information, security characteristics, and information about the amount of bandwidth and other network resources customer is using in connections with uploading, downloading or streaming data to and from the Internet.

Network traffic, activity, performance information, and equipment information monitored or collected by Provider is done so for the sole purpose of reasonable network management purposes.

Provider is required to comply with relevant laws, regulations and governmental requests, including supplying relevant information to law enforcement agencies which may be collected as part of network management practice outlined above. Provider does not distribute information on network activity and/or traffic to any other third party, or use network traffic information for any non-network management purpose.

Provider strives to respect a customer’s desire for privacy and therefore obtains and uses individual customer information for business purposes only. The information is used to enable Provider to provide customers with the best service possible. Customer information may also be used to protect customers, employees, and property against fraud, theft, or abuse and to maintain good customer relations. All Provider personnel are aware of and protect the privacy of all forms of customer communications and information.

No personal information obtained on-line is released outside of Provider or by its authorized agent, except with the customer’s permission, as required by law, for safety reasons, or to survey customer satisfaction. Provider uses the information provided when placing an order to complete that order. Any information asked for on our website will only be used to process a customer’s request. Provider does not sell customer information to any outside party.

Customer Proprietary Network Information (CPNI). It is Provider’s policy to maintain and protect the confidential and proprietary network information we possess of our customers. Unless required to do so by law or unless such information will assist us in providing telecommunications services, no customer confidential or proprietary information will be given to any third parties. For the purposes of this policy, “customer confidential or proprietary information” does not include any information published in any telephone directory.

An individual can visit and use Provider’s website with complete privacy. A web site visitor can choose to provide customer-specific information by ordering a product or service, sending Provider an email or using our convenient on-line tools. Any information provided by a web site visitor is held strictly confidential and will not be sold or provided to any other organization or business, Provider web sites may contain links to other web sites. Provider is not responsible for the content or privacy policies of other sites. Even though Provider will use its best efforts to assure privacy and confidentiality, material on the web, e-mail, or other electronic communications cannot be guaranteed to be protected against access by unauthorized persons.

The Provider’s network management practices as discussed herein are intended solely to provide the best online experience possible for all of Provider’s customers by safeguarding our network and its users from spam, viruses, phishing, and other unwanted or harmful online content and activities. Provider’s network management practices are not intended, nor implemented, to block consumers from accessing the content and applications of their choice, deprive consumers of their entitlement to competition, or discriminate against or in favor of certain network traffic. End users with questions, concerns or complaints regarding Provider’s network management practices are encouraged to contact Provider for issue resolution.

By using our Nunn Telephone Company site, you agree with our Privacy Statement and our policies and procedures contained herein regarding the collection and sharing of your information.

Robocall Blocking

Robocall Blocking is now included on all Nunn Telephone Company’s (NTC) phone lines free of charge.

What is Robocall Blocking?

Robocall Blocking does exactly what it says – it stops robocalls before your phone line ever rings. All phone calls made to your phone will be legitimate.

How Does Robocall Blocking Work?

NTC’s Robocall Blocking identifies high-risk “spam” callers or robocalls and stops them before your phone line even rings.

Please note, Robocall Blocking does not stop calls from legitimate fundraising organizations, political parties, or non-profit agencies that adhere to FCC guidelines. As an extra step, anyone can place their phone numbers on the national Do Not Call Registry. To do so, visit www.donotcall.gov or call 1-888-382-1222. Once registered, other types of organizations may still call, such as debt collectors, charities, political parties, and surveys.

Want To OPT OUT?

To opt out of NTC’s Robocall Blocking, please call us at 970-897-2200.

How Do I Report a Problem?

If you believe you are missing legitimate calls because of Robocall Blocking, please give us a call at 970-897-2200.

To report someone who is making robocalls or transmitting inaccurate Caller ID information, visit reportarobocall.com/trf or call us at 970-897-2200.

Spam and Phishing

Malicious Email

A malicious email can look just like it comes from a financial institution, an e-commerce site, a government agency or any other service or business.

It often urges you to act quickly, because your account has been compromised, your order cannot be fulfilled or there is another urgent matter to address.

If you are unsure whether an email request is legitimate, try to verify it with these steps:

  • Contact the company directly – using information provided on an account statement, on the company’s official website or on the back of a credit card.
  • Search for the company online – but not with information provided in the email.

Spam

Spam is the electronic equivalent of junk mail. The term refers to unsolicited, bulk – and often unwanted – email. Here are ways to reduce spam:

  • Enable filters on your email programs:Most internet service providers (ISPs) and email providers offer spam filters; however, depending on the level you set, you may end up blocking emails you want. It’s a good idea to occasionally check your junk folder to ensure the filters are working properly.
  • Report spam:Most email clients offer ways to mark an email as spam or report instances of spam. Reporting spam will also help to prevent the messages from being directly delivered to your inbox.
  • Own your online presence:Consider hiding your email address from online profiles and social networking sites or only allowing certain people to view your personal information.

Phishing

Phishing attacks use email or malicious websites (clicking on a link) to collect personal and financial information or infect your machine with malware and viruses.

Spear Phishing

Spear phishing involves highly specialized attacks against specific targets or small groups of targets to collect information or gain access to systems. For example, a cybercriminal may launch a spear phishing attack against a business to gain credentials to access a list of customers. From that attack, they may launch a phishing attack against the customers of the business. Since they have gained access to the network, the email they send may look even more authentic and because the recipient is already customer of the business, the email may more easily make it through filters and the recipient maybe more likely to open the email.

The cybercriminal can use even more devious social engineering efforts such as indicating there is an important technical update or new lower pricing to lure people.

Spam & Phishing on Social Networks

Spam, phishing and other scams aren’t limited to just email. They’re also prevalent on social networking sites. The same rules apply on social networks: When in doubt, throw it out. This rule applies to links in online ads, status updates, tweets and other posts. Here are ways to report spam and phishing on major social networks:

Tips for Avoiding Being a Victim

  • Don’t reveal personal or financial information in an email, and do not respond to email solicitations for this information. This includes following links sent in email.
  • Before sending or entering sensitive information online, check the security of the website.
  • Pay attention to the website’s URL.Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (e.g., .com versus .net).
  • If you are unsure whether an email request is legitimate, try to verify it by contacting the company directly. Contact the company using information provided on an account statement, not information provided in an email. Check out the Anti-Phishing Working Group(APWG) to learn about known phishing attacks and/or report phishing.
  • Keep a clean machine.Keep all software on internet-connected devices – including PCs, smartphones and tablets – up to date to reduce risk of infection from malware.

What to Do if You Are a Victim

  • Report it to the appropriate peoplewithin the organization, including network administrators. They can be alert for any suspicious or unusual activity.
  • If you believe your financial accounts may be compromised, contact your financial institution immediatelyand close the account(s).
  • Watch for any unauthorized chargesto your account.
  • Consider reporting the attackto your local police department, and file a report with the Federal Trade Commission or the Internet Crime Complaint Center.

Protect Yourself with These STOP. THINK. CONNECT.™ Tips

  • When in doubt, throw it out:Links in email, tweets, posts and online advertising are often how cybercriminals try to compromise your information. If it looks suspicious, even if you know the source, it’s best to delete or – if appropriate – mark it as junk.
  • Think before you act:Be wary of communications that implores you to act immediately, offers something that sounds too good to be true or asks for personal information.
  • Make your passphrase a sentence: A strong passphrase is a sentence that is at least 12 characters long. Focus on positive sentences or phrases that you like to think about and are easy to remember (for example, “I love country music.”). On many sites, you can even use spaces!
  • Unique account, unique passphrase:Having separate passphrases for every account helps to thwart cybercriminals. At a minimum, separate your work and personal accounts and make sure that your critical accounts have the strongest passphrases.
  • Lock down your login: Fortify your online accounts by enabling the strongest authentication tools available, such as biometrics, security keys or a unique one-time code through an app on your mobile device. Your usernames and passphrases are not enough to protect key accounts like email, banking and social media.

References:  https://staysafeonline.org/stay-safe-online/online-safety-basics/spam-and-phishing/

Statement of Non-Discrimination

In accordance with Federal civil rights law and U.S. Department of Agriculture (USDA) civil rights regulations and policies, the USDA, its Agencies, offices, and employees, and institutions participating in or administering USDA programs are prohibited from discriminating based on race, color, national origin, religion, sex, gender identity (including gender expression), sexual orientation, disability, age, marital status, family/parental status, income derived from a public assistance program, political beliefs, or reprisal or retaliation for prior civil rights activity, in any program or activity conducted or funded by USDA (not all bases apply to all programs). Remedies and complaint filing deadlines vary by program or incident.

Persons with disabilities who require alternative means of communication for program information (e.g., Braille, large print, audiotape, American Sign Language, etc.) should contact the responsible Agency or USDA’s TARGET Center at (202) 720-2600 (voice and TTY) or contact USDA through the Federal Relay Service at (800) 877-8339. Additionally, program information may be made available in languages other than English.

To file a program discrimination complaint, complete the USDA Program Discrimination Complaint Form, AD-3027, found online at How to File a Program Discrimination Complaint and at any USDA office or write a letter addressed to USDA and provide in the letter all of the information requested in the form. To request a copy of the complaint form, call (866) 632-9992. Submit your completed form or letter to USPA by: (1) mail: U.S. Department of Agriculture, Office of the Assistant Secretary for Civil Rights, 1400 Independence Avenue, SW, Washington, D.C. 20250-9410; (2) fax: (202) 690-7442; or (3) email: program.intake@usda.gov. USDA is an equal opportunity provider, employer, and lender.

Telecommunications Devices

Nunn Telephone Company works with its customers who are hearing-, vision-, or speech-impaired, or have mobility or cognitive impairments, or other disabilities, to ensure that their individual telecommunications needs are met. First, we will identify what special needs an individual customer has so that we can help design a telecommunications solution for that person.

View more information about telecommunications devices.

Unsafe Working Conditions Policy

The purpose of this policy is to provide a safe and healthy work environment for all employees and make every effort possible to ensure that each and every employee of Nunn Telephone Company (NTC) works in a clean and safe work environment.

Guidelines and Reporting Requirements

Any NTC employee making a determination that a work area (including a customer’s residence) is unclean, unhealthful, unsanitary, or that unsafe conditions exist, shall make the decision to halt work in that area immediately.

An unclean, unhealthful, unsanitary, or unsafe condition shall be deemed to exist if the work area:

  • Is known to harbor an individual with any communicable disease including tuberculosis
  • Is soiled with human or animal waste
  • Is contaminated with standing water or sewage due to a leak in a sewer/plumbing system
  • Is infested with excessive insects such as fleas and ticks
  • Is infested with animal or rodent feces
  • Harbors dangerous animals that are not properly secured
  • Is infested with mold
  • Has a presence of drugs or drug paraphernalia
  • Has unsecured weapons
  • Has person(s) under the influence of drugs and/or alcohol
  • Has person(s) menacing or threatening employees

This is not an exhaustive list of every situation. If the employee feels threatened or that the work area is unsafe for another reason they should leave the premises. Employees should use their best judgment to keep themselves safe.

Once an employee makes this determination, they should leave the work area immediately and notify their General Manager to advise of the unsafe conditions.

The Customer Relations Manager will be notified by the employee’s supervisor to inform them of the condition(s) of the customer’s premises. A letter will be prepared and sent to the customer addressing the issues that prevent NTC from completing service work.