Website, Use & Network Management Terms
Acceptable Use Policy
Effective October 18, 2011
The following terms apply to your use of and access to any Sprint Nextel together with its subsidiaries, affiliates, agents, and licensors (collectively "Sprint ") owned or operated website ("Website"), as well as any electronic transmission
sent, received, posted, accessed, or stored via any network ("Network").
COVERAGE OF THIS POLICY
In addition to other agreements between you and Sprint, these terms explain the policies that govern your access to and use of our Website and Network. By accessing or using our Website or Network, you agree to these terms (collectively
the "Policy"), as Sprint may modify it from time to time. Modifications to this Policy are effective upon its posting on our Website. If you do not agree to accept and comply with the Policy, then do not access or use our Website or
ILLEGAL OR HARMFUL USE
You may access and use our Website and Network only for lawful purposes. You are responsible for any transmission you send, receive, post, access, or store via our Network, including the content of any communication. Transmitting, distributing,
or storing any material that violates any applicable law is prohibited. Additionally, the following non-exhaustive list details the kinds of illegal or harmful conduct that is prohibited:
- Infringement: Infringement of intellectual property rights or other proprietary rights including, without limitation, material protected by copyright, trademark, patent, trade secret, or other intellectual property
right. Infringement may result from the unauthorized copying, distribution, and/or posting of pictures, logos, software, articles, musical works, and videos.
- Offensive Materials: Disseminating or posting material that is unlawful, libelous, defamatory, obscene, indecent, lewd, harassing, threatening, harmful, invasive of privacy or publicity rights, abusive, inflammatory,
or otherwise objectionable. Without limiting the foregoing, you may not access or use our Website or Network in any manner for the transmission or dissemination of images containing child pornography.
- Excessive Utilization of Network Resources: Consuming a disproportionate amount of available Network resources resulting in the potential to disrupt or degrade the Network or Network usage by others. The determination
of what constitutes excessive use depends on the specific state of the Network at any given time. Excessive use is determined by resource consumption relative to that of a typical individual user of the Network and not by the use
of any particular application.
- Traffic Pumping/Access Stimulation: Using the Network to dial telephone numbers associated with free conference calls, free chat lines, or similar services that are used for traffic pumping/access stimulation. Traffic
pumping/access stimulation, for this purpose, is defined as any and all activities that are designed to generate traffic to increase the intercarrier compensation billed to Sprint.
- Export Violations: Violations of export laws, regulations, and rules, including, without limitation, violations of the Export Administration Act and the Export Administration Regulations administered by the Department
- Fraudulent Conduct: (1) Conducting fraudulent business operations and practices; (2) offering or disseminating fraudulent goods, services, schemes, or promotions (e.g., make-money-fast schemes, chain letters, and
pyramid schemes); and (3) individual or business representation as an authorized 3rd party affiliation or agent for a business entity (e.g., Sprint) without the business' prior consent.
- Falsification/Impersonation: Using the Network to impersonate any person or entity; falsely state or otherwise misrepresent your affiliation with any person or entity; or create a false identity for the purpose of
misleading others. Without limiting the foregoing, you may not use invalid or forged headers, invalid or non-existent domain names, or other means of deceptive addressing.
- Failure to Abide by Third-Party Network or Website Policies: Violating the rules, regulations, or policies that apply to any third-party network, server, computer database, or website that you access.
- Harmful Content: Disseminating or posting content that is harmful to the Network or other users of the Network including, without limitation, viruses, Trojan horses, worms, time bombs, zombies, cancelbots, or any other
computer programming routines that may damage, interfere with, secretly intercept or seize any system, program, data, or personal information.
You may not distribute, publish, or send through our Network: (1) any spam, including any unsolicited advertisements, solicitations, commercial e-mail messages, informational announcements, or promotional messages of any kind; (2) chain
mail; (3) numerous copies of the same or substantially similar messages; (4) empty messages; (5) messages that contain no substantive content; (6) very large messages or files that disrupt a server, account, newsgroup, or chat service;
or (7) any message that is categorized as "phishing."
Likewise, you may not: (1) participate in spidering, harvesting, or any other unauthorized collection of e-mail addresses, screen names, or other identifiers of others or participate in using software (including "spyware") designed to
facilitate such activity; (2) collect responses from unsolicited messages; or (3) use any of our mail servers or another site's mail server to relay mail without the express permission of the account holder or the site.
NETWORK SECURITY AND INTEGRITY
You may not violate the security of our Network in any way. Such violations may result in criminal or civil liability. Sprint may, but is not obligated to, investigate any violation of our Network. Sprint may cooperate with law enforcement
where criminal or unauthorized activity is suspected. By using Sprint products and services or sending, receiving, posting, accessing, or storing any electronic transmission via our Network, you agree to cooperate in any such investigation.
Examples of Network security violations include, without limitation:
- Hacking: Unauthorized access to or use of data, systems, or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without the
express prior authorization of the owner of the system or network.
- Interception: Unauthorized monitoring of data or traffic on any network or system without the express prior authorization of the owner of the system or network.
- Intentional Interference: Interference with service to any user, host, or network including, without limitation, denial-of-service attacks, mail bombing, news bombing, other flooding techniques, deliberate attempts
to overload a system, and broadcast attacks.
- Falsification of Origin or Routing Information: Using, selling, or distributing in conjunction with the Network, any computer program designed to conceal the source or routing information of electronic mail messages
in a manner that falsifies an Internet domain, header information, date or time stamp, originating e-mail address, or other identifier.
- Avoiding System Restrictions: Using manual or electronic means to avoid any limitations established by Sprint or attempting to gain unauthorized access to, alter, or destroy any information that relates to any Sprint
customer or other end-user. Sprint may, but is not obligated to, take any action it deems necessary to (1) protect its Network, its rights, or the rights of its customers or third parties, or (2) optimize or improve its Network,
services, systems, and equipment. You acknowledge that such action may include, without limitation, employing methods, technologies, or procedures to filter or block messages sent through the Network. Sprint may, in its sole discretion
and at any time, filter "spam" or prevent "hacking," "viruses," or other potential harms without regard to any preference you may have communicated to us.
INVESTIGATION AND ENFORCEMENT OF THE POLICY
We have the right, but are not obligated, to strictly enforce this Policy through self-help, active investigation, litigation, and prosecution.
Sprint reserves the right to act immediately and without notice to restrict, suspend, or terminate your use of the Network if it reasonably determines that your conduct may: (1) expose Sprint to sanctions, prosecution, civil action, or
other liability; (2) cause harm to or interfere with the integrity or normal operations of Sprint's Network or networks with which Sprint is interconnected; (3) interfere with another Sprint customer's use of the Network; (4) violate
any applicable law, rule, or regulation; or (5) otherwise present an imminent risk of harm to Sprint or its customers.
Sprint has the right, but not the obligation, to monitor or restrict any uses of the Network that Sprint reasonably believes in its sole discretion violate this AUP. You are solely responsible for all content that you transmit or receive
utilizing the Network, and you are responsible for abuse of your account by others.
We may also access and disclose any information (including transactional information) related to your access and use of our Network for any lawful reason, including but not limited to: (1) responding to emergencies; (2) complying with
the law (e.g., a lawful subpoena); (3) protecting our rights or property and those of our customers; or (4) protecting users of those services and other carriers from fraudulent, abusive, or unlawful use of or subscription to such
services. INDIRECT OR ATTEMPTED BREACHES OF THIS POLICY AND ACTUAL OR ATTEMPTED BREACHES BY A THIRD PARTY ON BEHALF OF A COMPANY, CUSTOMER, OR USER MAY BE CONSIDERED BREACHES OF THIS POLICY BY SUCH COMPANY, CUSTOMER, OR USER.
Any failure to insist upon or enforce performance of any provision in this Policy will not be construed as a waiver of any provision or right. Neither the course of conduct between the parties nor trade practice will act to modify
any provision in this Policy. Sprint may assign its rights and duties under these terms to any party at any time without notice to you. If any provision of this Policy is deemed unlawful, void, or for any reason unenforceable,
then that provision will be deemed severable from these terms and conditions so that it does not affect the validity and enforceability of any remaining provisions.
QUESTIONS, COMMENTS & ABUSE
If you want to report any violations of this Policy, other than those concerning child pornography, please email us at firstname.lastname@example.org. To make a report concerning child pornography, please go
to the following Web link: http://www.sprint.net/index.php?p=support_ce_request.
Return to Top
Effective June 15, 2011
Welcome to Sprint Nextel's website, a service of Sprint Nextel, together with its subsidiaries, affiliates, agents, and licensors (collectively "Sprint"). The following terms apply to your use of and access to any Sprint owned or operated
website ("Website"). Certain products or services offered through our Website may have additional terms and conditions, which govern in the event of any inconsistency with the terms below.
COVERAGE OF THIS AGREEMENT
In addition to other agreements between you and Sprint, these terms explain the policies that govern your access to and use of our Website. By accessing or using our Website, you agree to these terms (collectively the " Visitors Agreement"),
as Sprint may modify it from time to time, and you agree to comply with our Acceptable Use Policy (AUP), which can be found on our Website. If you do not agree to accept and comply with the Visitors Agreement and AUP, then do not
access or use our Website.
LINKS TO THIRD-PARTY SITES
The Website may contain links to other websites that are maintained by third parties over which Sprint has no control. These links are provided for convenience only. Use of these links will cause you to leave this Website and use of
third-party websites is entirely at your own risk. Sprint makes no representation or warranty concerning any other site or the information, products or services offered or appearing on or through these sites. Sprint does not sponsor
or endorse the operators of the sites or the content, products, or services they provide. Sprint is not responsible or liable for the conduct of the sites' operators, the content, the availability, the accuracy, the quality, the
advertising, the products, the services, or other materials offered at the sites. You are responsible for complying with the rules, regulations, or policies that apply to any third-party network, server, computer database, or website
that you access.
UNSOLICITED SUBMISSION OF IDEAS
Although Sprint welcomes questions or feedback about your use of our Website and Sprint's services and products, Sprint does not accept, invite, or consider under any circumstances unsolicited submissions of ideas, creative suggestions,
or proposals ("Ideas") relating to its business, including Ideas for services, products, technologies, processes, materials, product names, advertising campaigns, promotions, or marketing plans. This policy is intended to avoid
disputes in the event that Sprint's products or marketing strategies seem similar to ideas submitted to Sprint or its employees. Therefore, unless otherwise explicitly stated by Sprint, all ideas and intellectual property included
in any unsolicited submission of Ideas will automatically be treated as non-confidential and as the sole property of Sprint, without any compensation whatsoever to you. Sprint will have no obligations to you with respect to such
Ideas and has the right to destroy submissions of Ideas upon receipt.
ILLEGAL OR HARMFUL USE
You may access and use our Website only for lawful purposes and purposes that are not intended to cause harm. You are responsible for any transmission you send, receive, post, access, or store via our Website, including the content
of any communication, as further provided in our AUP.
WEBSITE SECURITY AND INTEGRITY
You may not violate the security of our Website in any way. Such violations may result in criminal or civil liability. Sprint may, but is not obligated to, investigate any violation of our Website. Sprint may cooperate with law enforcement
where criminal or unauthorized activity is suspected. By using Sprint Website, you agree to cooperate in any such investigation. Sprint may, but is not obligated to, take any action it deems necessary to (1) protect its Website,
its rights, or the rights of its customers or third parties; or (2) optimize or improve its Website. You acknowledge that such action may include, without limitation, employing methods, technologies, or procedures to filter or
block messages sent through the Website.
INVESTIGATION AND ENFORCEMENT OF THE VISITORS AGREEMENT
We have the right, but are not obligated, to strictly enforce this Visitors Agreement through self-help, active investigation, litigation, and prosecution.
Sprint reserves the right to act immediately and without notice to restrict, suspend, or terminate your use of the Website, if it reasonably determines that your conduct may: (1) expose Sprint to sanctions, prosecution, civil action
or other liability; (2) cause harm to or interfere with the integrity or normal operations of Sprint's Website; (3) interfere with another Sprint customer's use of the Website; (4) violate any applicable law, rule, or regulation;
or (5) otherwise present an imminent risk of harm to Sprint or its customers.
Sprint has the right, but not the obligation, to monitor or restrict any uses of the Website that Sprint reasonably believes in its sole discretion violate this Visitors Agreement or applicable law. You are solely responsible for all
content that you transmit or receive utilizing the Website, and you are responsible for abuse of your account by others.
We may also access and disclose any information (including transactional information) related to your access and use of our Website for any lawful reason, including but not limited to: (1) responding to emergencies; (2) complying with
the law (e.g., a lawful subpoena); (3) protecting our rights or property and those of our customers; or (4) protecting users of those services and other carriers from fraudulent, abusive, or unlawful use of or subscription to such
services. INDIRECT OR ATTEMPTED BREACHES OF THIS VISITORS AGREEMENT AND ACTUAL OR ATTEMPTED BREACHES BY A THIRD PARTY ON BEHALF OF A COMPANY, CUSTOMER, OR USER MAY BE CONSIDERED BREACHES OF THIS VISITORS AGREEMENT BY SUCH COMPANY,
CUSTOMER, OR USER.
DISCLAIMER OF WARRANTIES AND LIABILITY
YOU UNDERSTAND THAT YOU ARE SOLELY RESPONSIBLE FOR ANY DAMAGE TO YOUR COMPUTER SYSTEM OR LOSS OF DATA THAT RESULTS FROM ANY MATERIAL DOWNLOADED FROM OR OTHERWISE PROVIDED THROUGH A SPRINT WEBSITE. ANY CONTENT OR INFORMATION ACCESSED
BY OR PROVIDED TO YOU THROUGH A SPRINT WEBSITE IS PROVIDED "AS IS," "WITH ALL FAULTS," AND "AS AVAILABLE." SPRINT, ITS AGENTS, AND ITS LICENSORS DO NOT WARRANT THE ACCURACY, COMPLETENESS, CURRENTNESS, NONINFRINGEMENT, MERCHANTABILITY,
OR FITNESS FOR A PARTICULAR PURPOSE OF ANY CONTENT OR INFORMATION AVAILABLE THROUGH ITS WEBSITE. YOU ACCESS SUCH CONTENT OR INFORMATION AT YOUR OWN RISK. SPRINT DOES NOT GUARANTEE THAT ITS WEBSITES WILL BE ERROR-FREE, CONTINUOUSLY
AVAILABLE, OR FREE OF VIRUSES OR OTHER HARMFUL COMPONENTS. UNDER NO CIRCUMSTANCES WILL SPRINT, ITS AFFILIATES, ITS AGENTS OR ITS LICENSORS BE LIABLE TO YOU OR ANYONE ELSE FOR ANY DAMAGES THAT ARISE FROM THE USE OF ITS WEBSITE.
THIS IS A COMPREHENSIVE LIMITATION OF LIABILITY THAT APPLIES TO ALL DAMAGES OF ANY KIND. FOR EXAMPLE, COMPENSATORY, SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES; LOSS OF DATA, INCOME, OR PROFIT; LOSS OF OR DAMAGE TO PROPERTY;
AND CLAIMS OF THIRD PARTIES, EVEN IF WE ARE ADVISED BEFOREHAND OF THE POSSIBILITY OF SUCH DAMAGES. YOU AGREE THAT THE AGGREGATE LIABILITY OF SPRINT, ITS AGENTS, AND ITS LICENSORS, IF ANY, ARISING OUT OF ANY KIND OF LEGAL CLAIM
IN ANY WAY CONNECTED TO ANY SPRINT WEBSITE WILL NOT EXCEED $100.00. BECAUSE SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF CERTAIN CATEGORIES OF DAMAGES OR IMPLIED WARRANTIES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU.
IN SUCH STATES, THE LIABILITY OF SPRINT AND ITS AFFILIATES, AGENTS, AND LICENSORS IS LIMITED TO THE FULLEST EXTENT PERMITTED BY SUCH STATE LAW.
This Visitors Agreement is governed by and must be construed under the laws of the Commonwealth of Virginia. The federal and state courts of Fairfax County, Virginia, have exclusive jurisdiction over and venue of any suit that relates
to this Visitors Agreement.
You agree to indemnify, defend, and hold harmless Sprint from and against all claims, liabilities, losses, expenses, damages, and costs (including reasonable attorneys' fees) that arise from: (1) any violation of this Visitors Agreement
by you; (2) any violation of any rights of a third party by you; (3) any violation of applicable law; (4) information or content that you submit, post, transmit, or make available through our Website; or (5) your use of our Website.
MODIFICATION OF THE VISITORS AGREEMENT
We reserve the right to modify this Visitors Agreement at any time, effective upon its posting, as modified, on www.sprint.com.
Any failure to insist upon or enforce performance of any provision in this Visitors Agreement will not be construed as a waiver of any provision or right. Neither the course of conduct between the parties nor trade practice will act
to modify any provision in this Visitors Agreement. Sprint may assign its rights and duties under these terms to any party at any time without notice to you. If any provision of this Visitors Agreement is deemed unlawful, void,
or for any reason unenforceable, then that provision will be deemed severable from these terms and conditions so that it does not affect the validity and enforceability of any remaining provisions.
QUESTIONS, COMMENTS & ABUSE
We invite you to send in your questions or comments about our site or to bring to our attention any material you believe to be inaccurate. Please send such comments, including a copy of any material you wish to discuss, to Customer
Care. If you want to report any violations of this Visitors Agreement, other than those concerning child pornography, please email us at email@example.com. To make a report concerning child pornography, please
go to the following Web link: http://www.sprint.net/index.php?p=support_ce_request.
FREQUENTLY ASKED QUESTIONS ABOUT NETWORK MANAGEMENT
Sprint is committed to providing the best wireless broadband Internet access service experience possible for all of its customers. To ensure that all Sprint customers enjoy the best possible network experience, Sprint uses reasonable
network management practices that are consistent with industry standards. Sprint also prohibits certain wireless data customers from engaging in certain data uses. Information concerning these prohibited uses can be found in our
point-of-sale materials and online in our Important Service Terms located at sprint.com.
The following Frequently Asked Questions are intended to help clarify for Sprint’s retail customers what Sprint means by network management and explain Sprint’s (and its providers’) network management techniques and
Why does Sprint manage its network?
Sprint manages its network with the goal of delivering the best possible wireless broadband Internet access experience to all of its customers. Wireless network resources are not infinite. Managing the network is essential to promote
the use and enjoyment of wireless data by all of our customers. We use reasonable network management practices that are consistent with industry standards. Just as the Internet continues to change and evolve, so too, will our network
management practices to address the challenges and threats on the Internet.
If Sprint didn’t manage its network, our customers would be subject to the negative effects of spam, viruses, security attacks, network congestion, and other risks and degradations of the service. By engaging in reasonable and
responsible network management, Sprint can deliver the best possible broadband Internet access experience to all of its customers.
How does Sprint manage its network?
Sprint uses various tools and techniques to manage its network, deliver its service and ensure compliance with its prohibited network use and related requirements, which are available in Sprint point-of-sale materials and online. These tools and techniques are dynamic, like the Sprint network and its usage, and Sprint may update the tools and techniques it uses. Sprint’s network management activities may include identifying
spam and preventing its delivery to customers, detecting malicious Internet traffic and preventing the distribution of viruses or other harmful code or content, and using other tools and techniques to deliver the best possible
broadband Internet experience to all of its customers.
Does network management change over time?
Yes. The wireless industry is highly dynamic. As the Internet and related technologies continue to evolve and advance, Sprint’s network management tools will evolve and keep pace to allow Sprint to deliver an excellent, reliable
and safer online experience to all of our customers. We will provide updates here and in other appropriate locations if we make important or significant changes to our network management techniques that impact customers.
How does congestion management work?
Network bandwidth isn’t infinite. In times of network congestion, the network segment or sector impacted doesn’t have enough bandwidth to fully serve all customers requesting it. The network is designed to dynamically
allocate available bandwidth in a way that is fair to all users. The fairness algorithms below describe the approach. The resulting impact to end user experience is that the user may temporarily experience slower-than-normal
data speeds until the congestion has passed.
- On the Sprint 3G network, a third generation network that follows the CDMA (Code Division Multiple Access) standard, Sprint uses a proportional fairness scheduler algorithm that allocates network resources based on radio frequency
signal quality and other metrics. During times of congestion, the proportional fairness scheduler algorithm ensures no one user is deprived of network resources.
- On the Sprint 4G network, a fourth generation network that follows the WiMAX (Worldwide Interoperability for Microwave Access) standard, Sprint may periodically measure a user’s bandwidth usage on a specific network segment
or sector, as well as measure the overall bandwidth usage for all users on that segment or sector. At times when an individual user is consuming high amounts of bandwidth and at the same time the overall bandwidth is being
used by all users on that network segment or sector at high levels, Sprint 4G customers may experience a temporary adjustment in available network resources until the conditions for network congestion have passed.
Sprint is continually upgrading networks. These network upgrades may include revised or improved tools and techniques to manage network congestion and ensure that all users have appropriate access to the network in times of congestion.
Does congestion management target peer-to-peer ("P2P") or other applications or make decisions about the content of my traffic?
No. However, Sprint’s terms and conditions prohibit some uses of Internet access. Sprint reserves the right to take action when customers violate these terms and conditions including blocking the traffic, slowing the customer’s
effective data speeds, or discontinuing a customer’s service. Below is the prohibit data use portion of the terms and conditions:
Sprint data services are provided solely for purposes of web surfing, sending and receiving email, photographs and other similar messaging activities, and the noncontinuous streaming of videos, downloading of files or online gaming.
P2P and other uses that may adversely affect our network are not permitted on Sprint’s network. Our wireless broadband Internet access services may not be used: (i) to generate excessive amounts of Internet traffic through
the continuous, unattended streaming, downloading or uploading of videos or other files or to operate hosting services including, but not limited to, web or gaming hosting; (ii) to maintain continuous active network connections
to the Internet, such as through a web camera or machine-to-machine connections that do not involve active participation by a person; (iii) to disrupt email use by others using automated or manual routines, including, but not
limited to “auto-responders” or cancel bots or other similar routines; (iv) to transmit or facilitate any unsolicited or unauthorized advertising, telemarketing, promotional materials, “junk mail,”
unsolicited commercial or bulk email, or fax; (v) for activities adversely affecting the ability of other people or systems to use either Sprint’s wireless services or other parties’ Internet-based resources, including,
but not limited to, “denial of service” (DoS) attacks against another network host or individual user; (vi) for an activity that connects any device to Personal Computers (including without limitation, laptops),
or other equipment for the purpose of transmitting wireless data over the network (unless customer is using a plan designated for such usage); or (vi) for any other reason that, in our sole discretion violates our policy of
providing service for individual use.
How does congestion management impact me and my use data services?
Most customers will notice no change in their wireless data experience due to Sprint’s congestion management. If a user notices it at all, congestion management will be experienced as a slowness of data speeds compared to
their normal experience. The goal of congestion management is to enable all users to have access to a fair share of the network at peak times, when congestion occasionally occurs.
How often does Sprint expect to use congestion management?
Because of the peaked nature of wireless data traffic, congestion management software is actively looking for network congestion at all times. When it detects congestion, the fairness algorithms described above allocate available
bandwidth to the users requesting services in an attempt to provide the best possible service to all users and to ensure that no user is starved of bandwidth.
Sprint monitors how user traffic is affected by congestion management and makes adjustments as reasonably necessary to ensure that our wireless data users have a high-quality wireless broadband Internet access experience. Sprint
also evaluates its overall network performance and enhances its network by adding capacity or making other network adjustments to address congestion and performance issues.
How much bandwidth would I have to consume to trigger Sprint’s network management? For example, how many movies would I have to download to be affected by congestion management?
Since congestion management is dynamic and works in real time, the answer depends on a number of factors including overall usage, time of day, and the number of customers trying to use wireless data on a given tower. First, the
local tower must be approaching a congested state before congestion management algorithms activate. On Sprint’s 3G CDMA network, the proportional fairness scheduler algorithm ensures no one user is deprived of network
On the Sprint 4G WiMAX network, when a user is consuming high amounts of bandwidth and the overall bandwidth being used on that network segment or sector is being used at high levels, Sprint 4G customers experience a temporary
adjustment in available network resources until the conditions for network congestion have passed. Just as on our 3G network, users during peak congestion might find certain high data usage applications, such as streaming video,
could be temporarily interrupted to ensure that other users have access to the network.
The point of the technique is to deliver the best overall online experience possible. The technique should help ensure that all customers get their fair share of bandwidth resources to enjoy all that the Internet has to offer and
that includes surfing the web, reading email, downloading movies, watching streaming video, gaming or listening to music.
How will customers know they are being managed?
In general, users won’t know when congestion management algorithms are being used. Wireless networks are shared resource networks meaning that customers on a specific cell site share the available bandwidth at the site.
Congestion management algorithms are active in the network 100 percent of the time to allocate available bandwidth to users in a way that benefits all users on the network.
Does congestion management apply to both Sprint 3G and 4G services?
How does congestion management relate to the various monthly data usage thresholds?
They are two separate issues. Congestion management works to optimize the experience of all users in the congested area. It works independent of any caps or overage charges that may apply based on the user’s price
plan and monthly usage.
Do Sprint labeled products such as Sprint Football Live or NASCAR Sprint Cup MobileSM have precedent over other applications?
No. They are treated just like any other data application on the network and traffic from these applications is subject to the same congestion management controls as any other Internet traffic.
Does Sprint discriminate against particular types of online content?
No. Sprint strives to deliver to its customers access to all the lawful , legitimate and non-infringing content that the Internet has to offer. However, we are committed to protecting customers from spam, phishing and other unwanted
or harmful online content and activities. Sprint uses industry standard tools and generally accepted best practices and policies to help it meet this customer commitment. In cases where these tools and policies identify certain
online content as harmful and unwanted, such as spam or phishing websites, this content is usually prevented from reaching customers. In other cases, these tools and policies may permit customers to identify certain content
that is not clearly harmful or unwanted, such as bulk email or websites with questionable security ratings, and enable those customers to inspect the content further if they want to do so.
Does Sprint employ network security practices in addition to the congestion management technique?
Yes. Sprint uses normal industry security practices to protect the Sprint network elements from unauthorized access and attack.
Does Sprint have rules regarding the attachment of devices to its network by customers?
Yes. Only Sprint-approved devices may be used on the Sprint network.
Back to top