Open Internet Disclosures
What’s Included

Interconnect Wireless Corp. strives to provide consumers with accessible, easy-to-understand information about the services we provide so they can make informed decisions about which services best meet their needs. Consistent with that goal, we have established this page as a single place where consumers and others can access and review the relevant policies, agreements, and other information about our Interconnect Wireless Corp. services.
Additionally, the Federal Communications Commission (“FCC”) requires that Interconnect Wireless Corp. and other internet providers disclose certain information regarding those services. The information required for disclosure under the FCC’s rules is found below and in the various policies and documents listed and linked on this page. To assist you in finding the information you’re looking for, we present the below information that the FCC specifically calls for in the Open Internet Disclosures. It has been highlighted for your convenience.
Get Started Now
Network Practices
Interconnect Wireless Corp. does not discriminate against lawful Internet content, applications, services, or non-harmful devices. The points below provide an overview of Interconnect Wireless Corp.’s network practices with respect to its Internet access services.
Affiliated Prioritization
Interconnect Wireless Corp. does not directly or indirectly favour some traffic over other traffic, including through the use of techniques such as traffic shaping, prioritization, or resource reservation, to benefit an affiliate.
Blocking
Interconnect Wireless Corp. does not block or otherwise prevent end-user access to lawful content, applications, services, or non-harmful devices. Interconnect Wireless Corp. does engage in reasonable network management practices that limit and potentially block network flooding using applications like BitTorrent that may affect users network-wide or affect network performance for other customers on an access point.
Throttling
Interconnect Wireless Corp. does not degrade or impair access to lawful internet traffic on the basis of content, application, service, user, or use of a non-harmful device. Interconnect Wireless Corp. does engage in reasonable network management practices that limit network flooding using applications like BitTorrent that may affect users network-wide or affect network performance for other customers on an access point.
Paid Prioritization
Interconnect Wireless Corp. does not directly or indirectly favour some traffic over other traffic, including through the use of techniques such as traffic shaping, prioritization, or resource reservation, in exchange for consideration, monetary or otherwise, although Business-class services take priority in times of congestion.
Application-Specific Behavior
Security
Interconnect Wireless Corp. employs a number of practices to help prevent unwanted communications, such as spam, and protect the security of Interconnect Wireless Corp. customers and network. We limit the number of logins, SMTP, DNS, and DHCP transactions per second (at levels far above “normal” rates) that customers can send to our servers in order to protect them from Denial of Service (DoS) attacks. (We do not disclose exact rate limits in order to maintain the effectiveness of these measures.)
In order to further protect our customers, Interconnect Wireless Corp. blocks a limited number of ports that are commonly used to send spam, launch malicious attacks, or steal a customer’s information.
Network Management
Interconnect Wireless Corp. manages its network with one goal: to deliver the best possible fixed-wireless internet access service to all of its customers. To further this effort, Interconnect Wireless Corp. uses reasonable network management practices that are consistent with industry standards. Interconnect Wireless Corp. uses various tools and techniques to manage its network, deliver its service, and ensure compliance with the Acceptable Use Policy and the Customer Agreement for Internet services. These tools and techniques are dynamic and can and do change frequently. Network management activities may include identifying spam and preventing its delivery to customer email accounts, detecting malicious Internet traffic and preventing the distribution of, or inadvertent access to, malware, phishing, viruses, or other harmful code or content.
As the internet and its related technologies continue to evolve, Interconnect Wireless Corp.’s network management tools will also keep pace so we can deliver an excellent, reliable, and safe experience to all of our customers. We will provide updates here as well as in other locations if we make significant changes to our network management techniques.
Interconnect Wireless Corp. does maintain a system to assist with managing times of congestion. As our network technologies and usage of the network continue to evolve, we reserve the right to implement a new congestion management system if necessary. This could be done for the performance of reasonable network management and in order to maintain a good internet access service experience for our customers. We will provide updates here as well as in other locations if a new system is introduced or changes are implemented.
Performance Characteristics
Service Description
Commercial Terms
Pricing and Other Fees
Interconnect Wireless Corp. Internet access services may be subject to promotional rates. Additional fees, such as for equipment rental, installation, and early termination, may apply. For information about pricing and fees for Interconnect Wireless Corp.’s various Internet tiers of service and all its Internet services, please contact a representative by phone at (833) 449-2677 during business hours.
Redress Options
Data Usage Plans
All of our plans are truly unlimited with no throttling after a soft limit has been reached. We do not plan to change this and pride ourselves on being one of the fastest unlimited-data fixed-wireless providers in the area.
Privacy Policies
Interconnect Wireless Corp.’s privacy policies with respect to Internet service are explained in the Privacy Policy.
Click here to view our Privacy Policy.