The KMTelecom Internet Services Acceptable Use Policy has been formulated with the following goals in mind:

  • Ensure security, reliability and privacy of KMTelecom systems and network, and the networks and systems of others.
  • Avoid situations that may cause KMTelecom to incur civil liability.
  • Maintain the image and reputation of KMTelecom as a responsible content provider.
  • Preserve the value of Internet resources as a conduit for free expression.
  • Encourage the responsible use of net resources, discouraging practices which degrade the usability of network resources and thus the value of Internet services.
  • Preserve the privacy and security of individual users.

The Acceptable Use Policy below defines the actions which KMTelecom considers to be abusive, and thus, strictly prohibited. The examples named in this list are non-exclusive, and are provided solely for guidance to KMTelecom Customers. If you are unsure whether any contemplated use or action is permitted, please email and we will assist you.


Customers are prohibited from transmitting on or through any of KMTelecom services, any material that is, in KMTelecom’s sole discretion, unlawful, obscene, threatening, abusive, libelous, or hateful, or encourages conduct that would constitute a criminal offense, gives rise to civil liability, or otherwise violates any local, state, national or international law.

KMTelecom services may only be used for lawful purposes. Transmission, distribution, or storage of any information, data or material in violation of United States or state or local regulation or law, or by the common law, is prohibited. This includes, but is not limited to, material protected by copyright, trademark, trade secret, or any other statute. KMTelecom reserves the right to remove such illegal material from its servers.

The customer is responsible for keeping his billing data with KMTelecom up-to-date and accurate. Furnishing false data on the signup form, contract, or online application, including fraudulent use of credit card numbers, is grounds for immediate termination, and may subject the offender to civil or criminal liability.

The resale or sharing of KMTelecom products and services on or off premises is not permitted, unless specifically permitted and documented in a written agreement. Example: Sharing one HSI plan between two households.


Customers may not attempt to circumvent user authentication or security of any host, network, or account (“hacking”). This includes, but is not limited to, accessing data not intended for the Customer, logging into a server or account the Customer is not expressly authorized to access, or probing the security of other networks (such as running a scan or similar tool).

Customers may not attempt to interfere with service to any user, host, or network (“denial of service attacks”). This includes, but is not limited to, “flooding” of networks, deliberate attempts to overload a service, and attempts to “crash” a host.

Customers may not use any kind of program/script/command, or send messages of any kind, designed to interfere with a user’s terminal session, via any means, locally or by the Internet.

KMTelecom reserves the right to enforce user session time limits during periods of activity and inactivity.

Users who violate systems or network security may incur criminal or civil liability. KMTelecom will cooperate fully with investigations of violations of systems or network security at other sites, including cooperating with law enforcement authorities in the investigation of suspected criminal violations.


Harassment, whether through language, frequency, or size of messages, is prohibited.

Customers may not send email to any person who does not wish to receive it. If a recipient asks to stop receiving email, the customer must not send that person any further email.

Customers are explicitly prohibited from sending unsolicited bulk mail messages (“junk mail” or “spam”). This includes, but is not limited to, bulk-mailing of commercial advertising, informational announcements, and political tracts. Such material may only be sent to those who have explicitly requested it.

Malicious email, including but not limited to “mailbombing” (flooding a user or site with very large or numerous pieces of email), is prohibited.

Forging of e-mail header information is not permitted.

KMTelecom accounts or services may not be used to collect replies to messages sent from another Internet Service Provider, where those messages violate this Acceptable Use Policy or the Acceptable Use Policy of that other provider.


KMTelecom exercises no control whatsoever over the content of information, products or services passing through the Company’s equipment or facilities.  The acquisition or procurement of information occurs solely at the risk of the Customer.  Furthermore, KMTelecom’s maximum liability to Customer is limited to no more than the amount paid by the Customer to the Company for Internet monthly charges during the six month period preceding the claim.


In no event shall KMTelecom be liable to or through the Customer or anyone else for direct, indirect damages of any nature whatsoever.


The Customer agrees to indemnify, defend and hold KMTelecom harmless from and against any damages, loss, proceeding, liability, judgment of every kind.


Services provided by KMTelecom are AS IS with no warranty of service or failure to provide.


KMTelecom enforces its Acceptable Use Policies in the manner described below. For more details about these policies and the procedure for filing a formal letter of complaint, please email us at

Prohibited Uses of Email

Upon the first violation of one of these policies, and two formal letters of complaint, KMTelecom will issue a written warning to the customer. Upon the second violation of one of these policies, and two formal letters of complaint, KMTelecom will suspend the customer’s service until the customer submits to KMTelecom, in writing, an agreement to cease-and-desist. Upon the third violation of one of these policies, and two formal letters of complaint, KMTelecom will terminate the customer’s service. At KMTelecom discretion, any major violation will result in termination of service without warning.

Other Prohibited Uses
KMTelecom will generally follow a procedure of issuing a written warning after the first violation, suspending service until a written agreement of cease-and-desist is received after the second violation, and terminating service after the third violation.

KMTelecom reserves the right to suspend or terminate any KMTelecom account and services in accordance with the provisions of this Acceptable Use Policy or for any reason not prohibited by law.


KMTelecom reserves the right to modify this policy at any time. Current copies of this and other KMTelecom policies are available at

Network Management Practices, Performance Characteristics, and Commercial Terms and Conditions for Fixed Services

KMTelecom (“the Company”) has adopted the following network management practices, performance characteristics, and commercial terms and conditions for its broadband Internet access services in compliance with the Federal Communications Commission’s (“FCC’s) Open Internet Framework requirements (GN Docket No. 09-191 and WC Docket No. 07-52).

These practices, characteristics, terms and conditions are intended to help preserve the Internet as an open framework that enables consumer choice, freedom of expression, end-user control, competition, and freedom to innovate without permission, while permitting the Company to manage its network reasonably.

These practices, characteristics, terms and conditions are effective as of November 20, 2011.

The Company may add, delete, or modify certain practices, performance characteristics, terms and conditions from time to time at its discretion.  It will provide clear written notice of these changes on this website, but will not notify customers, content providers, applications providers, service providers or device providers individually of such changes by bill inserts, e-mails, telephone calls or other direct communications unless specifically required to do so by federal or state authorities.  The Company will provide as much advance notice as practicable of such changes.  It will normally endeavor to furnish written notice on this website thirty (30) days before changes become effective, but reserves the right to use a shorter notice period when regulatory, operational, technical or other circumstances warrant.

I.  Network Management Practices

The Company manages its network with the goal of providing the best practicable broadband Internet experience to all of its customers.  Within the scope of its resources, it attempts to deploy and maintain adequate capacity and facilities within its own network, and to acquire sufficient Middle Mile capacity or facilities outside its service area to connect with the Internet.  The Company and its staff use their best efforts to monitor, address and minimize (but do not guarantee that they can prevent) the effects of spam, viruses, security attacks, network congestion, and other phenomena that can degrade the service of affected customers.

A. Congestion Management Practices

Congestion is an Internet access service problem that can slow web browsing, downloading, and other activities of the customers during certain peak usage periods.   Congestion may be caused by capacity limits and bottlenecks in a service provider’s own network, or by limitations in the capacity of the Middle Mile transport facilities and services that many rural service providers must purchase from unrelated entities to carry the traffic of their customers between their service areas and the closest Internet nodes.

If significant congestion problems arise in the future, the Company’s most desired approach is to determine the source of the problem, and to increase the capacity of the affected portions of its network and/or of its Middle Mile routes where warranted.  However, network and Middle Mile upgrades often cannot be accomplished instantaneously because they require negotiations, authorizations and agreements with multiple unrelated entities such as lenders, government agencies, equipment vendors, property owners and other carriers.

If or when network and/or Middle Mile upgrades are not able to be deployed on a timely or reasonable basis, the Company reserves the right to monitor and identify which customer accounts are using the greatest amount of bandwidth during periods of heavy congestion, and to contact those “high-volume customers” to work out a solution to the problem.  The Company’s preferred solution will be to help such “high-volume customers” find acceptable times during non-peak periods to engage in the same activities.

If that preferred solution is not possible, the Company reserves the right to manage temporarily the Internet traffic of “high-volume customers” during periods of significant congestion until such periods of congestion pass.  This temporary traffic management will be accomplished by technically and commercially feasible methods that are available or that become available in the future.  Affected “high-volume customers” will still be able to access the Internet and engage in any and all online activities they desire.  However, during periods of congestion they may experience conditions such as longer times to download or upload files, slower Web surfing, and/or slower movements during online game playing.

Customers should note that any temporary traffic management practices employed by the Company will impact only identified and notified “high-volume customers” during periods when congestion problems are experienced, and will not be based upon the types of content, applications, services, or devices such customers use.  On the basis of its knowledge and experience as of November 2011, the Company expects that periods of temporary traffic management, if any, will be brief and infrequent.

For purposes of its congestion management practices, the Company will consider a period in which a “congestion problem” arises and exists to be one where middle mile usage exceeds 90% capacity of contracted middle mile usage.

B.  Application-Specific Behavior Practices

The Company does not favor or inhibit certain applications or classes of applications.   Customers may use any lawful and commercially available application which they desire on the Company’s network.

The Company does not normally monitor the contents of the traffic or applications of its customers.  It undertakes no obligation to monitor or investigate the lawfulness of the applications used by its customers.  If any party contacts the Company with a substantial allegation that an application being used by a customer is unlawful, the Company will investigate the matter (including consultation, as it deems appropriate, with attorneys, consultants, federal or state regulators, and/or federal, state or local law enforcement agencies), and will take appropriate actions to deal with the use of applications that are demonstrated to be unlawful.

Customers may occasionally develop their own applications, or modify commercially available applications.  The Company will not prohibit the use of customer-developed or modified applications unless there is a reasonable belief that such applications will cause harm to its network.

The Company does not block or rate-control specific protocols or protocol ports.

The Company does not modify protocol fields in ways that are not prescribed by the applicable protocol standards.

C. Device Attachment Rules

The Company does not have any approval procedures that must be satisfied before a device can be connected to its network.  Customers may use any lawful, compatible, type-accepted (if necessary) and commercially available device which they desire on the Company’s network, as long as such device does not harm the network.

The Company undertakes no obligation to monitor or investigate the lawfulness of the devices used by its customers.  If any party contacts the Company with a substantial allegation that a device being used by a customer is unlawful, the Company will investigate the matter (including consultation, as it deems appropriate, with attorneys, consultants, federal or state regulators, and/or federal, state or local law enforcement agencies), and will take appropriate actions to deal with the use of a device that is demonstrated to be unlawful.

Customers may occasionally develop their own devices, or modify commercially available devices.  The Company will not prohibit the use of lawful customer-developed or modified devices unless there is a reasonable belief that such devices will cause harm to its network, or vice versa.

D. Security Practices

The Company does not normally monitor the traffic of its customers.  It undertakes no obligation to monitor or protect such customer traffic from spam, viruses, denial-of-service attacks, or other malicious, unlawful or unwanted activities.

The Company recognizes that customers can purchase spam filtering and anti-virus software from commercial vendors to meet their needs.  The Company may from time to time offer anti-spam and/or anti-virus software or services to customers who desire to purchase them from the Company.  When offered, these software or services will be described and priced in other sections of this website and in the Company’s sales and marketing materials.  Customers are free to obtain anti-spam and/or anti-virus software or services from any source they desire, as long as such software or services do not disrupt or degrade the traffic of other customers of the Company or harm the network.

A customer that is subjected to a denial-of-service attack, or similar malicious, unlawful or unwanted activity, is urged to notify the Company as soon as possible.  The Company will work with the customer, other service providers, federal and state regulators, and/or law enforcement to determine the source of such activity, and to take appropriate, and technically and economically reasonable efforts to address the matter.

The Company employs commercially appropriate security procedures to protect its network and its customer records from unauthorized access by third parties.  The Company does not guarantee that it can protect customers from any and/or all security breaches.

E. Traffic Blocking

The Company does not block any lawful content, applications, devices, and/or non-harmful devices.

The Company does not knowingly and intentionally impair, degrade or delay the traffic on its network so as to render effectively unusable certain content, applications, services and/or non-harmful devices.  However, the Company notes that congestion may from time to time impair, degrade, or delay some traffic.

The Company does not charge edge service providers of content, applications, services and/or devices any fees simply for transporting traffic between them and its customers.

II. Performance Characteristics

Many of the service and performance characteristics of the Company’s broadband Internet access services are contained in the service offering portions of this website.  The Company offers different tiers of service at different prices, and changes these from time to time.

A. General Service Description

The Company delivers services either via a copper digital subscriber line (“DSL”) network or a fiber-to-the-home network (“FTTH”).   The expected access speeds in the DSL portions of the network range from 1 megabit per second (“Mbps”) to 5 Mbps, depending upon the actual lengths of the respective copper lines.  The expected access speeds in the FTTH portion of the network range from 1 Mbps to 20 Mbps, depending upon the service provisioned.

Actual access speeds and time delays (latency) are impacted by the length, capacity and congestion of Middle Mile transport facilities (between the Company’s service area and Internet nodes) as well as the characteristic of the Company’s own network.  Because conditions on these facilities and routes can change frequently, the Company can provide estimated actual access speed and latency information only for specific recent time periods requested by a customer.

The Company’s service is suitable for real-time applications. The Company does not impose any necessary conditions or exceptions.

B. Impact of Specialized Services

The Company offers both facilities-based VoIP and IP video services to end-users.

As of November 2011, these specialized services have not adversely affected the last-mile capacity available for the Company’s broadband Internet access services, or the performance of such services.  Customer should note that significantly heavier use of specialized services (particularly IP video services) may impact the available capacity for and/or the performance of its broadband Internet access services. The Company will monitor this situation, and appreciates feedback from its customers.

C. Impact of Middle Mile Capacity Constraints

The Company provides both its own Middle Mile facilities and must purchase Middle Mile capacity and/or services from other entities for routes approximately 0 to 70 miles long between the Company’s service area and the closest Internet nodes.

The Company cannot guarantee that it will be able to obtain additional Middle Mile capacity at commercially reasonable prices if and when needs for additional Middle Mile capacity arise.

III. Commercial Terms and Conditions

The commercial terms and conditions of the Company’s broadband Internet access services are contained in greater detail in the service offering and acceptable use portions of this website.   This section provides a brief overview or reference to terms and conditions detailed elsewhere, plus discussions of other terms and conditions required by the FCC’s Open Internet Framework.

A. Pricing Terms and Conditions

The Company offers different tiers and levels of service at different prices, and changes these from time to time.  These service tiers and prices are detailed in the service offering portion of this website.

The Company does not impose usage-based fees upon certain tiers or levels of its service.

The Company does not impose fees for early termination with respect to certain of its service arrangements.

The Company assesses fees for additional network services as indicated in the Broadband Plans section under the Internet tab on the first page of the Company’s website.  In addition, the Company is willing to consider and negotiate prices for customized additional network services requested by specific business customers if such services can be designed, developed and furnished in a commercially reasonable manner.  If and when such customized services are developed and furnished, the Company reserves the right to adapt and provide them to other customers on a non-discriminatory basis so long as such subsequent provision does not entail disclosure of proprietary or confidential information of the initial customer.

B. No Unreasonable Discrimination

The Company does not unreasonably discriminate in its transmission of traffic over the broadband Internet access services of its customers.  It endeavors to give its customers as much choice and control as practicable among its different service offerings and among the content, application, service and device offerings of edge service providers.  When reasonable network management practices entail differential treatment of traffic, the Company does not discriminate among specific uses, or classes of uses, of its network.

The Company does not impair, degrade or delay VoIP applications or services that compete with its voice services and those of its affiliates.

The Company does not impair, degrade, delay or otherwise inhibit access by its customers to lawful content, applications, services or non-harmful devices.

The Company does not impair free expression by actions such as slowing traffic from particular websites or blogs.

The Company does not use or demand “pay-for-priority” or similar arrangements that directly or indirectly favor some traffic over other traffic.

The Company does not prioritize its own content, application, services, or devices, or those of its affiliates.

C. Privacy Policies

As indicated above, the Company’s network management practices do not generally entail inspection of network traffic.

The Company retains and stores certain traffic information (such as the identity of the customer using a particular IP address during a specific period) for time periods required by federal or state law.

The Company retains, stores and provides to law enforcement any traffic information requested pursuant to the procedures of the Communications Assistance for Law Enforcement Act (“CALEA”), the Foreign Intelligence Surveillance Act (“FISA”) or other applicable national security or criminal statutes.

The Company does not collect, store or use traffic information to profile its customers in order to sell additional services to them, or for similar non-network management purposes.

D. Redress Options

Questions and complaints regarding the foregoing matters should be addressed to the Company’s Customer Service Department at (507) 634-2511 or at

The Company strongly desires to resolve questions, complaints and other problems of its customers and edge service providers in an informal and direct manner that satisfies all interested parties to the greatest extent practicable.

Customers and edge service providers that are not able to obtain satisfaction from the Company have the option of invoking the FCC’s informal and formal complaint procedures regarding Open Internet Framework disputes.


  1. Subject to KMTelecom’s acceptable use policy.
  2. Monthly charge includes unlimited Internet access. Telephone service is required for these rates.
  3. Minimum hardware requirements:
    • PC or Macintosh with an Ethernet adapter installed. A 10 Mbps or 10/100 Mbps adapter will work.
    • PC must have Windows XP or newer operating systems and 256 Mb of memory. Older Windows operating systems may work but they are not supported.
    • Macintosh must have Operating System 7.5 or higher and 32 Mb of memory.
  4. HSI is installed on the telephone wall outlet specified by the customer. The High Speed Internet line cannot be moved by the customer. If you need to relocate your computer to a different room or change the wall outlet used for HSI, you must contact KMTelecom and setup a service order.
  5. With a router you can connect more than one computer to the HSI line.
  6. Static IP addresses available for an extra charge:
    • $10/month for 1st static IP address
    • $1.95/month for additional IP addresses
  7. Email boxes have a 15GB capacity.
  8. Inactive email addresses that have not been used in 270 days will be purged from the system. Internet service will not be affected however, purged emails will not be available after 270 days of inactivity.