Open Internet Statement

The Federal Communications Commission issued rules to preserve the Internet as an open platform. These rules went into effect on June 12, 2015 and can be found at this All Internet service providers are required to post information regarding various issues so that consumers, both residential and business, can make informed choices about choosing an Internet service provider. This document contains information regarding our services and in compliance with the FCC’s rules. The policies contained herein serve as a supplement to the existing terms of service.

The FCC’s rules focus on these “bright lines”

  • No Blocking: broadband providers may not block access to legal content, applications, services, or non-harmful devices.
  • No Throttling: broadband providers may not impair or degrade lawful Internet traffic on the basis of content, applications, services, or non-harmful devices.
  • No Paid Prioritization: broadband providers may not favor some lawful Internet traffic over other lawful traffic in exchange for consideration of any kine – in other words, no “fast lanes.” This rule also bans ISPs from prioritizing content and services of their affiliates.

Reasonable Network Management: For the purposes of these rules, other than paid prioritization, an ISP may engage in reasonable network management. This recognizes the need of broadband providers to manage the technical and engineering aspects of their networks.

Some data services do not go over the public Internet, and therefore are not “broadband Internet access” services.


ISPs must disclose their network practices, specifically in the four general areas listed below. ISPs may not block lawful content, applications, services, or non-harmful devices, subject to reasonable network management. An ISP may not block consumers from accessing lawful Web sites, subject to reasonable network management; nor shall the ISP block applications that compete with the provider’s voice or video telephony services, subject to reasonable network management. ISPs may not unreasonably discriminate in transmitting lawful network traffic over a consumer’s broadband Internet access service, although, reasonable network management shall not constitute unreasonable discrimination. The FCC’s rules state that a network management practice is reasonable if it is appropriate and tailored to achieving a legitimate network management purpose, taking into account the particular network architecture and technology of the broadband Internet access service.

Congestion Management: Congestion is managed primarily by measuring the used capacity of We network and pro-actively adding bandwidth before saturation occurs. Beyond that, We manages some network activity out of necessity to ensure that real time applications perform as expected. To that end, We prioritizes certain traffic that is native to the newtwork. Since it is not possible to prioritize voice traffic from other networks, that traffic is treated the same as all other traffic after our shaping for performance. If the network reaches saturation of bandwidth itself due to some extraordinarily high usage, We will prioritize traffic that we recognize based on standard port usage.

Application-Specific Behavior: We will only employ rate control if bandwidth consumption would otherwise cause unacceptable performance for other traffic. File sharing applications are low priority traffic and other applications, out of necessity, have a higher priority such as ssh, telnet, and web traffic.

Device Attachment Rules: At this time, We does not have any restrictions other than that third party CPE devices must be able to authenticate to our network.

Security: The network is monitored 24 hours per day and unusual activity notifies appropriate personnel. Other security measures include account lockout policies, and encryption of sensitive traffic.


ISPs must disclose the following network performance characteristics:

Service Description: We services are delivered via company owned “layer 1” technologies such as our fiber optic network or our wireless network. In addition We provides some of its services utilizing last mile facilities from other carriers. The underlying carrier in essence rents to us this facility and we deploy our service over it. These technologies include T1, Metro Ethernet, ADSL, fiber, and Coaxial Cable. We uses a combination of copper and fiber circuits for the service delivery. The data center is owned by We and supplies services such as authentication, email, web services, email filtering. We owns a series of routers and switches that attach to our network and these facilities are a combination of owned and leased facilities from other carriers. We makes no guarantees as to the suitability of its broadband service for any particular real time application with the exception of the voice service sold by We on it’s “on net” facilities. “On Net” facilities are those facilities that We owns for the actual last mile delivery of our service. Also, certain leased circuits are also “On Net” in the sense that they offer a Layer 3 connection directly to our customers. We does prioritize our voice traffic when it is “On Net” and is not technically a “broadband access service” subject to paid prioritization bands since it is not actually traversing the public Internet.

Impact of Specialized Services: We sells a variety of VoIP services. The network reserves anywhere from 5-20% of available bandwidth to prioritize voice services sold by We in order to give maximum performance of the voice service to the end user. This will in some cases reduce available bandwidth for other applications.


ISPs must disclose the commercial terms of its broadband Internet access service including those listed below.

Pricing: All broadband services are sold on a contract basis and a variety of variables go into pricing for each account including: the distance to reach the customer from our nearest POP; which underlying carriers we must use to deliver the service, the term of the service, the bandwidth required. Questions about contract terms should be emailed to us via our website contact process at

Privacy Policies: Browsing information is not stored. Authentication information is stored for a period of 30 days. Email is stored for a maximum of 30 days for POP accounts and is set individually by the customer for webmail accounts. No information is provided to third parties unless proper legal authorization is received.

Pursuant to FCC rules, We does have the ability to capture customer information in real time and deliver it to law enforcement with proper legal requirements met by law enforcement to us.

Redress Options: Call or email us at our contact numbers listed at


If a customer believes that these open Internet rules are not being met, the customer may file an informal complaint at the Federal Communications Commission. The FCC urges customers to submit any complaints via its website at the following address: Customers may also file a formal complaint at the FCC using Part 76 of the Commission’s rules.

DMCA Procedure


Any original material created by an individual or group is protected by copyright or intellectual property rights under United States and international law. Put broadly, this means that anything original that you have written down, or created as an original recording or an original image, etc., is protected from infringement by others.

Just as your original material is protected from unauthorized use by others, their material is their property and you may not use it without permission. Doing so may invite lawsuits claiming infringement. This includes written works, email, images, sounds, etc., whether online or on paper.

As an Internet Service Provider and under the provisions of the DMCA We, Inc. DBA DBA may be obligated to take down materials that our users have posted if a claim of infringement is received.


Section 512 (c)(3)(A) of the Digital Millennium Copyright Act requires that a claim of copyright infringement must be sent to our designated agent. The claim must provide certain information (detailed below) in order for it to be considered a valid claim.

DMCA SECTION 512 (C)(3)(A)

Elements of Notification

(A) To be effective under this subsection, a notification of claimed infringement must be a written communication provided to the designated agent of a service provider that includes substantially the following:

(i) A physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.

(ii) Identification of the copyrighted work claimed to have been infringed, or, if multiple copyrighted works at a single online site are covered by a single notification, a representative list of such works at that site.

(iii) Identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate the material.

(iv) Information reasonably sufficient to permit the service provider to contact the complaining party, such as an address, telephone number, and, if available, an electronic mail address at which the complaining party may be contacted.

(v) A statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law.

(vi) A statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.

When filing an infringement claim, include all of the information required under Section 512 (c)(3)(A). Your claim must include any URLs or other information identifying the material, and the dates and times the material was observed.

Web and Peer-to-Peer claims must include, at a minimum:

  • An exact URL or IP address
  • Date the content was first observed
  • Information sufficient to identify the specific content which is the subject of the complaint

Email, fax or postal-mail the information to our Designated Agent.

Upon receipt of a valid claim, i.e., a claim in which the requested information is substantially provided, We, Inc. DBA, DBA, will undertake to have the disputed material removed from public view until a counter-claim is filed or until a court ruling determining the disposition of the disputed material is received. Under the provisions of the DMCA We, Inc DBA DBA, as an Internet Service Provider, has no other role to play either in prosecuting or defending a claim of infringement, and cannot be held accountable in any case for damages regardless of whether a claim of infringement is found to be true or false.

Section (512) (f) of the DMCA defines penalties for intentional misrepresentation of a claim.

Designated Agent:

Slappey Communications
4260 Cahaba Heights Court Birmingham, AL 35243
Phone: 205-970-4209

Privacy Policy

Collection of Information

We collect non-personally identifiable information about you in a number of ways, including tracking your activities through your IP address or most-recently-visited URL. However, we do not collect any personally identifiable information about you unless you voluntarily submit contact information to us, such as name, phone, email address, and mailing address by filling out a form or survey, registering your email address with us or emailing us. We may also collect personal information from you at other points on our site that state that personal information is being collected.

Disclosure of Information

We do not sell or rent your personally identifiable information to any third parties.

Use of Information

We use personally identifiable and non-personally identifiable information for internal marketing purposes, for trend analysis, for pattern detection, and for site administration. However, we do not use personally identifiable information collected from the website to send unsolicited mailings to you. Of course, if applicable, we do use personally identifiable information to perform the services for which such data was collected (i.e., if you sign up for an email newsletter, we will send the email newsletter to the address you provide us).

We provide you the opportunity to ‘opt-out’ of having your personally identifiable information used for certain purposes, when we ask for this information. For example, if you purchase a product/service but do not wish to receive any additional marketing material from us, you can indicate your preference on by clicking on the unsubscribe link contained in the footer of the email.

If you no longer wish to receive our newsletter and promotional communications, you may opt-out of receiving them by clicking on the unsubscribe link in the footer included in each newsletter or communication or by emailing us at the reply address of the email or you may contact us by phone at 205-970-4209.

Third Party Sites

This policy only addresses our activities from our servers. Other sites (including those that we link to within an advertisement, article or otherwise, and third party sites or services with which we offer or co-brand) may have their own policies, which we do not control, and thus are not addressed by this policy.

The forms referenced for on our site will connect directly with websites owned and operated by who have their own corporate privacy policy, and the policies contained herein do not apply to the data collected by them.

Review and Removal of Your Personally Identifiable Data

If you provide us with personally identifiable information to have us perform ongoing services to you, we will provide you with a way to review the information we have on file and either change or remove such data. To do so, please notify us via post or email at the address above and we will provide you with your contact information for review. To make changes, send us the changes and we will respond to your request for access within thirty (30) days of the request. Unfortunately, to the extent that such information is also stored in other databases, we cannot always ensure that such corrections or deletions will reach the other databases. If you wish to have information you provided to us online removed from our records, please provide us with the information as you submitted it to us at the address above. We will use all reasonable efforts to ensure that your information is removed from our records.

Cookies and Other Tracking Methods

When you view our website, we might store some information on your computer. This information will be in the form of a “cookie” or similar file. Cookies are small pieces of information stored on your hard drive, not on our site. Cookies, which are tied to personal information, do not spy on you or otherwise invade your privacy, and they cannot invade your hard drive and steal information. Rather, they help you navigate a website as easily as possible. Cookies can help us provide information that is targeted to your interests and they allow us to better understand how users use our site, which in turn helps us focus our resources on features that are most popular with our users. You are always free to decline our cookies if your browser permits, but some parts of our site, including our registered customer account web sites may not work properly in that case.