How does TDS manage its network?
TDS uses a variety of tools and techniques to manage its network. During times of congestion, TDS uses these tools and techniques to optimize overall customer experience. Specifically, TDS deploys tools that evaluate traffic based on its tolerance for latency and prioritizes traffic types that are more sensitive to latency than others. These tools are deployed only during times of congestion. They focus first on disproportionate users of bandwidth and are applied more broadly only if their initial application does not alleviate the congestion. In all events, these congestion management tools and techniques are temporary and last only as long as congestion occurs. Customers could experience longer times to download or upload files or slower web surfing during these periods of congestion. TDS also attempts to identify abuse and prevent other harm to the TDS network, including detecting malicious Internet traffic and preventing the distribution of viruses or other harmful code or content.
Does TDS Telecom employ network security practices that affect traffic?
Yes. TDS Telecom takes security very seriously and employs a number of network security practices to ensure the security, integrity, and availability of our network. We proactively monitor our network to guard against a wide range of security threats, including viruses, denial-of-service attacks, spoofing, and other harmful activity. Due to the dynamic nature of the Internet, new threats are constantly emerging and as a result, TDS Telecom’s security practices are constantly evolving to mitigate the risk of those threats to our network and customers. If TDS detects a threat, we will work to isolate that threat and prevent it from spreading throughout the network. TDS Telecom attempts to limit this action to the specific portion of our network or customer base impacted by the security threat and for only as long as necessary to mitigate the threat. However, in general, none of our on-going security practices will prevent or limit a typical customer’s use of their broadband services as long as their activities are not a threat to the network or other customers. TDS Telecom also makes available to our residential broadband customers an additional security tool for a fee. Information about this product is available here.
Online activity that violates our terms of service, acceptable use policy, or threatens the integrity, availability or security of our networks or customers may result in suspension or termination of service. In addition, we reserve the right to take any necessary actions to ensure the integrity, availability and security of our networks and customers against Internet threats, including fraud and abuse. If you feel your account or service is being threatened in any way, please send an email to the TDS Abuse Team at firstname.lastname@example.org.
If you are using a Wi-Fi router provided by TDS or another party, we strongly encourage you to ensure that it is securely configured to ensure proper encryption and that authentication is being utilized. For instructions on securing your wireless router, please see the following instructions: https://tdstelecom.com/support/internet/setup-secure-wifi-network.html.