Our network management policy.
The purpose of Three’s Network Management Policy is to communicate to its customers those steps that Three may take to ensure that all of its customers have access to Three’s data services (Services) on an equitable basis.
Three continuously monitors network performance to ensure that all of its customers have a positive Service experience. Three endeavours to ensure that the Service received by its customers is not impacted through a minority of users placing excessive demand on network resources (e.g. large bandwidths over long periods) or using the Services in a manner that adversely affects the delivery of the Services. To ensure a good functioning Service is received by all users, Three may implement, measures to shape traffic so to avoid filling or overfilling a network link or node. Should a customer’s data usage become so excessive so as to risk affecting other network users, Three reserves the right to limit the customer’s Service to a level to avoid any adverse affect on others. Furthermore, if any usage related to particular data-types or protocols may adversely affect customers’ access to Services generally Three may restrict access to those protocols. For example, Three reserves the right to throttle peer to peer traffic at busy locations within our network during hours of high usage by our customers using our network management tools.
In the event that Three becomes aware or is notified that a customer’ has or is using the Service in a manner that breaches Three’s terms and conditions for ‘Responsible use of Three Services’ as outlined in Section 6.4 -6.6 of the Terms and Conditions (including for, hacking, spamming, denial of service or any fraudulent activities) or in a manner which interferes with Three’s network, or causes problems for Three and / or impedes other users’ experience, then the Service to customer may be suspended by Three.
For the avoidance of doubt, if the activity is due to a Virus, Malware or a Botnet on the customer’s PC, mobile or other terminal device - the account will remain suspended until the customer has demonstrated that the malicious software has been removed and an up to date Virus checker has been installed on the device.
Three continuously monitors quality of service (QoS) parameters such as delay, jitter and packet loss in order to maintain a positive Service experience. Three has a capacity management process in place to address and resolve these QoS parameters if they exceed certain thresholds (above which Service may be affected) agreed with the manufacturers of our network equipment. These thresholds are under constant review with our manufacturers and are subject to change.
Three will, on an ongoing basis, review, and where required, update its Network Management Policy to ensure that all of its customers can access data Services. Customers should review this Network Management Policy periodically to familiarise themselves with the current policy.
Glossary of terms:
Security breach - a security breach is when Three’s Services are being used for, hacking, spamming, denial of service. Also any unauthorised hacking or infiltration of Three network infrastructure would also constitute a security breach.
Any data capable device (Data Modem or Handset) can be used to cause a security breach.
A Botnet - a collection of compromised computers (including data enabled-handsets) connected to the Internet (these are also known as 'bots'). When a computer becomes compromised, it becomes a part of a botnet." As per above there is no distinction as to whether an individual is using a modem or tethering via a handset.
A Virus/Malware - a computer program that can replicate itself and spread from one computer data enabled handset or terminal device to another, including but not limited to adware and spyware programs that do not have the reproductive ability. A virus is spread from one device to another (in some form of executable code) over a network or the Internet. Malware includes, computer worms, Trojan horses, spyware, dishonest adware and other malicious and unwanted software.
Hacking - when a unauthorised person attempts to access another computer, network or system. Infringing on the privacy of others or damage to computer-based property such as files, web pages or software.
Spamming - the distribution of unsolicited commercial advertisements online.
Denial of service - an attempt to make a computer or network resource unavailable to its intended users usually by saturating the target machine with external communications requests, such that it cannot respond to legitimate traffic.
peer to peer traffic - In peer to peer (P2P) network, the "peers" are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server. In other words, each computer on a P2P network becomes a file server as well as a client. The only requirements for a computer to join a peer-to-peer network are an Internet connection and P2P software. Common P2P software programs include Bit-torrent and eDonkey.
Network Management Tools:
Tools used by Three to monitor data traffic and to implement measures to manage traffic including in accordance with Three’s Network Management Policy.
Delay - the time it takes for a piece of data (a “packet”) to travel across the network from one node or endpoint to another.
Jitter - metric for the variation in delay of packets that flow from one node or endpoint to another through the network
Packet loss - the proportion of packets lost in transit from a node or endpoint to another during a specified time interval.