Terms of Service
KL Broadband provides Broadband Internet Access Service on a best effort, month-to-month basis. Customers can cancel service at any time with no early termination fee. Equipment supplied by KL Broadband must be returned upon termination of service, or customer agrees to pay replacement cost.
Service includes maintenance of network equipment, which remains the property of KL Broadband, up to and including the Power Over Ethernet adapter and wireless router (when owned and provided by KL Broadband). Customer is responsible for network equipment such as wireless routers (unless owned and provided by KL Broadband), computers, printers, video devices, game consoles, tablets and smartphones.
Customer agrees that KL Broadband is not liable for consequential damages (e.g. you lose an eBay auction because of an outage) or the actions of third parties (e.g. you fall for an online scam).
You represent that you have read and agree to be bound by the Terms and Conditions and Acceptable Use Policy, and that you are at least eighteen years of age. KL Broadband may revise and update the Terms and Conditions and Acceptable Use Policy at any time by posting the amended terms to the KL Broadband web site.
Our Terms of Service may change from time to time, in which case the current version will be posted on our website. Continued use of the service constitutes agreement to these terms. If at any time you feel that you cannot follow these Terms or the Acceptable Use Policy, you are advised to stop using the service and call our office to cancel and receive a refund for any prepaid service.
Acceptable Use Policy
KL Broadband accounts may not be used for activities which are illegal or harmful to other Internet users or networks, including (but not limited to) activities listed below. KL Broadband may filter, suspend or terminate accounts as necessary to stop such activities.
- Sending unsolicited bulk email a.k.a “spam”.
- Hosting an “open mail relay” (open to spammers to relay mail).
- Attempts to break into other computers or networks (including network(s) of KL Broadband) including hacking, portscanning, rootkits, trojans, session hijacking, etc.
- Denial of service attacks.
- Intentionally transmitting malware.
- Faking IP addresses or email headers for malicious or fraudulent purposes.
- Transmitting, posting on a website, or sharing via P2P networks any of the following – bootleg software a.k.a. “warez”, pornography, or hate literature.
- Transmitting, posting or sharing copyrighted material without the approval of the copyright holder (see DMCA policy below).
- Libel or slander.
- Attempts to obtain products or services fraudulently.
Customer is responsible for ensuring that others with access to the service follow these rules. Service is not for resale without written authorization from KL Broadband. WiFi routers must be secured with a password and not open for use by the general public.
Internet services are provided on a best-effort basis. Outages or performance degradation can occur due to circumstances beyond our control, and we cannot be held responsible for consequential damages. Our liability is limited at most to a prorated refund. Services are not intended for “high risk use” where interruption of service can result in personal injury or damage to property.
Access to the Internet includes access to offensive material, spam, viruses, hackers, vice, get-rich-quick schemes, hoaxes and fraud. Even though services like spam and virus filtering exist, they are not foolproof. We just provide the connection to the Internet, you are responsible for how you use that connection. We cannot take responsibility if you are offended, cheated, infected or hacked by third parties on the Internet.
Please refer to the service plans listed on our website for available prices and speeds. Not all speed tiers are available at all locations, depending on equipment at the tower or POP and whether you have clear line of sight. Call or email us for additional information.
Open Internet Policy
KL Broadband supports an Open Internet. We do not block access to legal content on the Internet. We do not throttle or prioritize traffic for business reasons, although we may engage in reasonable network management for technical reasons or to protect the network from attack (see Network Management Policy below).
Note that we may block certain traffic for security reasons. We block packets destined to TCP ports 135, 137-139 and 445 which are for Windows LAN traffic and are not intended to propagate onto wide area networks. Packets to port 25 may be blocked to deal with spam issues. Packets from spoofed source addresses or to bogus destination addresses known as “bogons” may be blocked. We may also need to block malicious traffic in order to deal with amplification or denial of service attacks.
If a customer believes this Open Internet Policy is not in compliance with FCC regulations, the customer may file an informal complaint at the Federal Communications Commission. The FCC urges customers to submit any complaints via its website at the following address:
Customers may also file a formal complaint at the FCC using Part 76 of the Commission’s rules.
Network Management Policy
Our network consists of upstream connections to the Internet, backhaul connections between towers, and last mile connections to customers. Congestion can occur at any of these points when the traffic exceeds the available capacity. We plan our upstream and backhaul connections for sufficient capacity to carry peak traffic loads, and invest in upgrades when additional capacity becomes necessary. Unusual circumstances can increase traffic or decrease capacity, causing congestion. When traffic exceeds capacity, the excess packets must either be stored in a queue (introducing latency), or discarded (causing packet loss). Network management is a set of technical mechanisms to prioritize traffic that will be most affected by latency or packet loss, in order to provide the best user experience during periods of congestion.
Another type of congestion occurs when a customer tries to send or receive more traffic than the speed plan they are subscribed to. A lot of traffic (e.g. software updates, email, cloud backup, video previews) happens automatically. Video streaming services try to determine the available connection speed and use 100% of it. With multiple users in a household, it will happen that the amount of traffic will sometimes exceed the subscribed connection speed. If this happens constantly, the customer may need to upgrade to a faster tier of service.
Device Attachment Policy
Customers must use the POE adapter supplied by KL Broadband but may connect any compatible router and may connect any devices behind that router as long as they do not generate malicious traffic. Routers will need to have a WAN (Internet) port capable of 10/100/1000 Ethernet and must support DHCP. WiFi must be secured with a password. If router remote management is enabled, it must be secured with a non-default administrative password.
We do not use customer information trasferred via our service or Internet browsing data for marketing purposes, and we do not share or sell this information or share with third parties. We do not modify webpages or DNS lookups to insert ads, and we do not modify headers to allow advertisers to track you.
In rare circumstances, customer information may be requested by a law enforcement agency (LEA), and we will comply if presented with a valid subpoena, court order or national security letter. We reserve the right to make an exception if lives are in imminent danger, e.g. a hostage or suicide crisis.
We could be ordered to provide the equivalent of a wiretap under the CALEA Act. Any information provided will be restricted to the scope of the court order and avoid revealing information about any other customer.
As discussed below under DMCA Policy, we do not hand out customer information just because a copyright holder or their lawyers submit a notice of claimed infringement. They would have to obtain a valid subpoena or court order.
Digital Millennium Copyright Act (DMCA) Policy
If we receive a DMCA Notice of Claimed Infringement from a copyright holder, our policy is to make a reasonable effort to forward the notice to the customer who was using the stated IP address/port at the stated time. We do not disclose any customer information unless served with a subpoena or court order. In the case of frequent or repeated notices involving the same customer, we may warn the customer to cease any activities that violate the DMCA (these cases typically involve peer to peer filesharing). If we continue to receive notices of copyright infringement, this may lead to suspension of service or termination of the account.
Last updated November 1, 2020