ASPIRE FIBER
POLICIES
This page contains Aspire Fiber's official policies governing use of our services and our network management practices. Please review these documents for information about your rights and responsibilities as a subscriber.
​​
Jump to section:
1. Broadband Internet Service Disclosures
Consistent with FCC regulations, Aspire Fiber OpCo Inc. (“Aspire”) provides this information about our broadband Internet access service. We welcome questions or comments about this information, including any questions about any portions that you do not understand. You may contact us at (805) 322-0086 or visit us at:
11943 Discover Ct.
Moorpark, CA, 93021
NETWORK PRACTICES
General description. We provide a variety of Internet offerings to our residential and business customers over our broadband network and through other communications facilities connecting to the Internet, including but not limited to High Speed Internet Access, Dedicated Internet access, Managed Services, web hosting, data center hosting, Enterprise hosting, or Unified Messaging (“Aspire Broadband Service”). Through our central Network Operations Center, we monitor our network and traffic patterns and make changes we deem necessary to manage and improve overall network performance. We use reasonable, nondiscriminatory, network management practices to improve overall network performance to ensure a high-quality online experience for all users. We use various tools and techniques to manage our network, deliver our service, and ensure compliance with our Acceptable Use Policy and our Terms and Conditions of Service. We also contract with one or more third-party companies for certain network monitoring and management services. Our network management activities may include identifying spam and preventing its delivery to customer email accounts, detecting malicious traffic and preventing the distribution of viruses or other harmful code or content and using other tools and techniques in order to meet our goal of delivering the best possible Internet experience to our customers. Our network management practices do not target any specific content, application, service or device. As network management issues arise and as technology develops, we may employ additional or new network management practices.
​
We will update these disclosures as necessary.
​
Related documents and disclosures. Use of our broadband Internet access service is also governed by:
-
Aspire Acceptable Use Policy, available at: https://aspirefiber.com/policies#acceptable-use-policy
-
Aspire Privacy Notice, available at: https://www.aspirefiber.com/privacy-policy
These documents contain important information regarding Aspire Broadband Service and its use and may be subject to updates and revisions. Subscribers are encouraged to review them on a regular basis.
​
Blocking. Aspire does not engage in any practice, other than reasonable network management disclosed herein, that blocks or otherwise prevents end user access to lawful content, applications, service, or non- harmful devices.
Throttling. Aspire does not engage in any practice, other than reasonable network management disclosed herein, that degrades or impairs access to lawful Internet traffic on the basis of content, application, service, user, or use of a non-harmful device.
Affiliated or Paid Prioritization. Aspire does not engage in any practice that directly or indirectly favors some Internet traffic over other traffic to benefit an affiliate or in exchange for consideration, monetary or otherwise.
Congestion management. This section describes our network management practices used to address congestion on our network.
__________________________________________
[1] 47 C.F.R. § 8.1; Preserving the Open Internet, Broadband Industry Practices, Report and Order, 22 FCC Rcd 17905 (2010); Protecting and Promoting the Open Internet, Report and Order on Remand, Declaratory Ruling, and Order, 30 FCC Rcd 5601 (2015); Restoring Internet Freedom, Declaratory Ruling, Report and Order, and Order, 33 FCC Rcd 311 (2017).​
Congestion management practices used.
Network monitoring. We monitor our network for utilization trends. We receive regular reports showing changes in network traffic and congestion. We use this information to plan increases in available bandwidth, port additions or additional connectivity to the Internet. Should new technologies or unforeseen developments in the future make it necessary to implement an active congestion management program, we will update these disclosures and otherwise notify our customers of the scope and specifics of this program.
Potential heavy bandwidth users. Through our third-party provider, we receive reports showing end user usage for identification and management of potential heavy bandwidth users. If a reasonable solution is not found and usage remains excessive, Aspire reserves the right to limit, suspend, or terminate the high volume user’s Internet service.
Types of traffic affected. Our congestion management practices do not target any specific content, applications, services, or devices, or otherwise inhibit or favor certain applications or classes of applications.
Purpose of congestion management practices. Our broadband Internet network is a shared network. This means that our customers share upstream and downstream bandwidth. The goal of our congestion management practices is to enable better network availability and speeds for all users. Our congestion management practices serve to:
-
Help us adapt and upgrade our network to maintain or improve network performance as demand for our broadband Internet network increases.
-
Help us adapt and upgrade our network to maintain or improve network performance as demand for higher bandwidth applications increases. Some examples of higher bandwidth applications are gaming, streaming movies, and streaming high definition video.
-
Help us identify potential heavy bandwidth users.
Congestion management criteria.
Network monitoring. Our network monitoring provides data to help us plan upgrades to our network, equipment, technology, and connectivity to the Internet. As demand for our Internet service increases, and as demand for higher bandwidth applications increases, we monitor effects on network performance and plan upgrades as we deem necessary.
​
Potential heavy bandwidth users. We, in our sole reasonable discretion, determine the criteria for data consumption that is not characteristic of a typical residential user of Aspire Broadband Service.
Types of traffic affected. Our congestion management practices do not target any specific content, applications, services, or devices, or otherwise inhibit or favor certain applications or classes of applications.
Effects on end user experience. Because our broadband Internet network is a shared network, periods of high network demand may result in Internet traffic congestion. End users may experience reduced bandwidth or speed during these times. Although we work to engineer and implement solutions to eliminate congestion that affects the end user experience, new technologies or unforeseen developments may require implementation of an active congestion management program. Should it become necessary in the future to implement such programs, Aspire will notify its customers of the program and the criteria under which this congestion management will be implemented.
Application-Specific Practices. This section discloses any application-specific practices we use, if any.​
​​​​
Management of specific protocols or protocol ports. To protect the security of our network and our customers, we may block known hostile ports. In such cases, we may block that specific port until the attack ceases, at which time we remove the block.
Modification of protocol fields. Not applicable.
Applications or classes of applications inhibited or favored. Not applicable.
Device Attachment Rules.This section addresses any limitations on attaching lawful devices to our network.​
​​​​
General restrictions on types of devices to connect to network. We place no general restrictions on lawful devices that a customer may connect to our network, so long as the device is: (i) compatible with our network; and (ii) does not harm our network or other users. Our broadband Internet service works with most PCs and laptops including Macs, and other Internet compatible devices like game systems and Internet-enabled TVs. If a password-protected wireless router is connected to our broadband Internet service, wireless Internet compatible devices properly connected to the router including computers, tablets, smartphones, and other devices can connect to our network. If a customer or potential customer believes they have an unusual configuration, our customer service department will help determine if there is a compatibility problem.
FTTP Modems. Our Aspire Fiber to the Premise (FTTP) Modem broadband Internet service requires connection of a FTTP modem to our network. You can obtain an FTTP modem from us.
Network and End User Security. This section provides a general description of the practices we use to maintain security of our network. It is the responsibility of the Customer to ensure the security of their network and the equipment that connects to the Aspire Broadband Service. Customers are required to take all necessary steps to secure and manage the use of the Services received from Aspire in such a way to assure that network abuse and/or fraudulent activity is prevented. In addition, we use a number of tools and techniques to protect our network and end users from malicious and unwanted Internet traffic such as preventing the distribution of viruses or other harmful code and preventing the delivery of spam to customer email accounts.
Practices used to ensure end user security, including triggering conditions.
Web Hosting and Data Center Hosting Surveillance: We perform routine surveillance of our networks in connection with our web hosting, data center hosting, and related services. Although Aspire will not, as an ordinary practice, proactively monitor individual Customers’ activities for violations of its Acceptable Use Policy, there may be instances in which Aspire, through its routine surveillance, finds violations and responds with appropriate action to immediately stop further violations at its sole discretion.
Practices used to ensure security of the network, including triggering conditions.
Virus and Spam filtering: Our email and website traffic is filtered for virus activity and Spam using industry standard virus scanning and prevention techniques. Should an email message be found to contain a virus, the message will be deleted without notification given to either the sender or the intended recipient(s). All spam is quarantined, however the email customer has the option to delete.
Hostile port blocking: We block known hostile ports to prevent unwanted files, browser hacking and virus attacks.
Web Hosting and Data Center Hosting Surveillance: We perform routine surveillance of our networks in connection with our web hosting, data center hosting, and related services. Although Aspire will not, as an ordinary practice, proactively monitor individual Customers’ activities for violations of its Acceptable Use Policy, there may be instances in which Aspire, through its routine surveillance, finds violations and responds with appropriate action to immediately stop further violations at its sole discretion.
PERFORMANCE CHARACTERISTICS
General Service Description. Our broadband Internet service enables a customer to connect an Internet-enabled device through either a wired or wireless connection. Our Aspire broadband Internet access service includes wiring, an Optical Network Terminal (“ONT”) and we also offer a residential gateway device. Our broadband Internet access service enables residential and commercial subscribers to access all lawful content, applications, and services of their choice available on the Internet.
No Internet service provider can guarantee a specific speed at all times – the actual speed a customer will experience while using the Internet depends on a variety of conditions. These can include the customer’s computer, the customer’s home network configuration, or the performance of the website visited.
Service technology. We deliver our Aspire Fiber to the Premise broadband Internet service over our fiber optic network Gigabit Passive Optical Network (GPON). Customers subscribing to our fiber internet service access our network using fiber optical network terminals. To connect from our network to the Internet, we use equipment called an ONT that acts as a gateway to the Internet for our customers’ optical network terminals. This is a shared network, which means that our customers share upstream and downstream bandwidth.
Expected and actual speeds and latency.
Expected performance. We offer customers a variety of broadband Internet service levels. We provide a description of the expected maximum transfer speeds associated with each service level for both residential and business services on our website.
Speed. The speeds we identify for each broadband Internet service level are the maximum upload and download speeds that customers are likely to experience. We provision our customers’ modems and engineer our network to deliver the speeds to which our customers subscribe. However, we do not guarantee that a customer will actually achieve those speeds at all times. A variety of factors can affect upload and download speeds, including customer equipment, network equipment, congestion in our network, congestion beyond our network, performance issues with an Internet application, content, or service, and more.
​
​Latency. Latency is another measurement of Internet performance. Latency is a term that refers to the time it takes for information to travel between your computer and your Internet destination. High latency occurs when the time it should normally take for the information to make the trip becomes abnormally long. Latency is typically measured in milliseconds, and generally has no significant impact on typical everyday Internet usage. Most applications, such as email and websites, work well despite average latency. Highly interactive applications, such as multi-player games, do not work well with higher latency. As latency varies based on any number of factors, most importantly the distance between a customer's computer and the ultimate Internet destination (as well as the number and variety of networks your packets cross), it is not possible to provide customers with a single figure that will define latency as part of a user experience.
​
Actual speed and latency performance. The actual speed and latency experienced by individual users may vary depending upon network conditions and other factors. We strive to maintain 99.95% availability, also known as “up time,” and less than or equal to 50 milliseconds latency for our Aspire Broadband Service. Actual performance of our Fiber to the Premise service in most cases will conform to national wireline broadband Internet speed and latency levels reported by the FCC.[2]
__________________________________________
[2] See FCC’s Office of Engineering and Technology and Office of Strategic Planning & Policy Analysis, 2016 Measuring Broadband America Fixed Broadband Report, A Report on Consumer Fixed Broadband Performance in the United States, (Dec. 1, 2016) (available by clicking here) (“2016 Measuring Broadband America Report”).
The FCC has reported fiber subscribers receive mean download speeds that are 107.73% of advertised speeds, and mean upload speeds that are 149.53% of advertised speeds.[3] In addition, the FCC has reported mean latency[4] delays for cable ISPs at about 8 to 13 milliseconds milliseconds for fiber ISPs.[5]
Customer Speed Test. We provide an online speed test for our customers, available at https://www.speedtest.net/.
Suitability of the Service for Real-time Applications. Our broadband Internet access service is suitable for typical real-time applications, including messaging, voice applications, video chat applications, gaming, and Internet video. If users or developers have questions about particular real-time applications, please contact us at (731) 885-9212.
Non-Broadband Internet Access (BIAS) Data Services.
Non-BIAS Data services offered to end users. We offer several managed or “non-BIAS data” services over our network, sharing network capacity with other high speed Internet services. Managed non-BIAS data services include Voice over Internet Protocol (VoIP), Internet Protocol video, web hosting, data center hosting, Enterprise hosting, Unified Messaging and dedicated bandwidth to high volume business users.
Effects of non-BIAS data services on availability and performance of broadband Internet access service. Our provision of non-BIAS data services has no effect on the availability and performance of our broadband Internet access service.
COMMERCIAL TERMS
Prices. Monthly prices for our broadband Internet access services are available on our website here: [link]. For business broadband Internet access service pricing, please contact our commercial sales department.
Usage-based fees. None
Fees for early termination. An early termination fee may be charged if a customer disconnects while under a contracted agreement with Aspire.
Privacy Policies. We collect and store information from many sources as it relates to providing and maintaining service to our customers. Individually identifiable customer information, including usage data obtained in our role as your broadband Internet access service provider is only used to provide the service, improve your use of the service, manage our network, or as otherwise required or authorized by law.[6]
We do not disclose individually identifiable broadband Internet access service customer or use information to third parties except: (i) as necessary to provide our broadband Internet service and to manage our network; or (ii) in response to law enforcement requests, subpoenas, court orders, or as otherwise required or authorized by law.
For more information on our additional broadband Internet access subscriber privacy policies, please visit our Aspire Privacy Policy.
__________________________________________
[3] 2016 Measuring Broadband America Report, Validated Data, Statistical Averages, Download Sustained and Upload Sustained, (Dec. 1, 2016) (available by clicking here) (data presented is unweighted mean percentage of advertised speeds, taken over a 24 hour, Saturday-Sunday period).
​
[4] The FCC has defined latency is the total length of time it takes a signal to travel from an origination point to the nearest server, plus the time for an acknowledgement of receipt to travel back to the origination point. The nearest server is the server providing the minimum round trip time.
[5] 2016 Measuring Broadband America Report, Validated Data, Statistical Averages, Latency, (Dec. 1, 2016) (available by clicking here) (data presented is unweighted mean latency in milliseconds, taken over a 24 hour, Saturday-Sunday period).
​
[6] See, e.g., 47 U.S.C. § 222.
Inspection of network traffic. We routinely monitor network and traffic patterns.
Virus and Spam filtering. Our email and website traffic is filtered for virus activity and Spam using industry standard virus scanning and prevention techniques. Should an email message be found to contain a virus the message will be deleted without notification given to either the sender or the intended recipient(s). All spam is quarantined, however the email customer has the option to delete.
Storage of network traffic information. Dynamic Host Configuration Protocol (DHCP) information is a code included in all network traffic that associates that traffic with a particular device sending or receiving the traffic. We store DHCP information for at least three years. The data generated on each customer’s usage is divided into broad categories for analysis to help us monitor and predict trends in usage for our customers as a whole.
Provision of aggregate or anonymized network traffic information to third parties. We may disclose aggregate or anonymized network traffic information to third parties for purposes of providing and managing our broadband Internet service or if required by law.
Use of network traffic information for non-network management purposes. We do not use network traffic information for non-network management purposes. However, data regarding a customer’s excessive data usage may be utilized for discussions to move that customer to a higher broadband plan.
Redress options. We welcome questions about our broadband Internet access service. This section discloses redress options for end users and edge providers.
End user and Edge Provider complaints and questions. End users and Edge Providers with complaints or questions relating to the Aspire Broadband Service or these disclosures should contact us at (805) 322-0086 or email us at admin@aspirefiber.com.
Questions. We will endeavor to answer questions promptly via email or voice.
Complaints. For written complaints, a customer service representative will contact the end user or edge provider via phone call. We will attempt to resolve complaints informally, escalating the matter to senior management if needed.
Updated February 1, 2026
2. Acceptable Use Policy
INTRODUCTION
Aspire Fiber OpCo Inc. (“Aspire”) is pleased that you have chosen Aspire’s broadband Internet access service (the “Service”). Our goal is to provide you and our other subscribers with a high-quality Internet experience. Each user of the Internet benefits by being able to share resources and communicate with other members of the Internet user community. As with any community, the benefits and information available through the Service and the Internet in general must be balanced with the duties, obligations and responsibilities and each user must consider that all users should be able to use the Service and Internet as they wish without disruption, interference or other negative consequences.
This Acceptable Use Policy (“AUP”) has been designed to protect our Service, our subscribers and the Internet community from inappropriate, illegal or otherwise objectionable activities. Please read this policy prior to accessing the Service. All users of the Service must abide by this AUP. This AUP should be read in conjunction with the terms and conditions contained in Aspire’s Broadband Internet Access Service Disclosures and other applicable policies. Violation of any term of this AUP may result, in the immediate suspension or termination of either your access to the Service and/or your Aspire account.
By using the Service, you agree to abide by, and require others using the Service through your account to abide by, the terms of this AUP. Aspire reserves the right to update the policy from time to time, effective upon posting of the modified policy to this page. You are encouraged to consult this document regularly to ensure that your activities conform to the most recent version. IF YOU DO NOT AGREE TO BE BOUND BY THESE TERMS, YOU SHOULD IMMEDIATELY STOP THE USE OF THE SERVICES AND NOTIFY ASPIRE CUSTOMER SUPPORT SO THAT YOUR ACCOUNT MAY BE CLOSED.
PROHIBITED USES
1. Illegal Use. Aspire’s Service may be used only for lawful purposes. Transmission, distribution or storage of any material in violation of any applicable law or regulation is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property right used without proper authorization, and material that is obscene, defamatory, constitutes an illegal threat or violates export control laws. The Service is designed for either personal, non-business-related use of the Internet (“Residential Service”) or for commercial (whether or not for profit) purposes (“Business Service”). Residential Service may not be used for commercial purposes and violation may result in either termination of the Service or the option to convert to Business Service. Subscribers may not resell, share or otherwise distribute the Aspire Service, or any portion thereof without the express written consent of Aspire.
​
2. System and Network Security. Violations of system or network security, engaging in unlawful conduct or otherwise violating the law through use of the Service is prohibited, and may result in criminal and civil liability. Aspire reserves the right to investigate incidents involving such violations and may involve and will cooperate with law enforcement if a criminal violation is suspected. Examples of violations include, without limitation, the following:
​
-
Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures.
-
Unauthorized attempts to gain access to the account of another subscriber of the Service, whether or not the attempt succeeds.
-
Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network.
-
Intentional interference with service to any user, host or network including, without limitation, port scanning, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks.
-
Engaging in fraudulent activities, such as impersonating another, forging a digital or manual signature, forging of any TCP/IP packet header or any part of the header information in an e-mail or newsgroup posting.
-
The use of any device, whether hardware or software, that artificially maintains a full- time connection to Aspire’s equipment.
-
Posting, transmitting, or distributing content that is unlawful, threatening, abusive, libelous, slanderous, defamatory, or promotes violence.
-
Restricting, inhibiting, or otherwise interfering with the ability of any other person to use or enjoy their equipment or the Service, including without limitation, by intentionally transmitting any file or material which contains a virus, worm, or other harmful component or feature.
-
Using the Service in any way that violates copyright, trademark or other laws protecting the intellectual property rights.
-
Using the Service to engage in any activity that is a violation of any U.S. law or regulation; state law or regulation; common law; or the laws and regulations of any jurisdiction in which Aspire does business and/or the violation emanates, is received and/or occurs, including but not limited to material protected by copyright, trademark, trade secret or any other proprietary rights statute.
​
Subscribers are solely responsible for the security of any device connected to the Service, including any files or data stored on the device. At a minimum, any files or service a subscriber elects to make available for remote access via the Internet should be password protected.
3. Email. The following email activities are strictly prohibited:
​
-
Sending unsolicited mail messages, including, without limitation, commercial advertising and informational announcements;
-
Forging, altering, or removing e-mail headers;
-
Sending unsolicited bulk mail messages ("junk mail" or "spam") which, in Aspire’s reasonable judgment, is disruptive or generates a significant number of user complaints:
-
Using another site's mail server to relay mail without the express permission of the site;
-
Harassment, whether through language, frequency or size of messages or sending e-mail to a person who does not wish to receive it.
​
By reserving these rights, Aspire is not undertaking any obligation to monitor the pool of e-mail addresses and has no liability for failing to do so.
UNSOLICITED BULK E-MAIL (SPAM) FILTERING SERVICES
Aspire may elect at any time to take appropriate measures to reduce the amount of unsolicited bulk email that enters its network. This may include the use of software that detects and deletes unsolicited bulk email and/or viruses from your inbox as applicable. This may also include the use of software from a third-party in combination with other filtering services. While you may be provided the ability to "opt-out" of some of these services, Aspire reserves the right to make the use of some means of filtering mandatory for all Aspire users. Due to the volatile nature of the Internet and its offerings, Aspire makes no guarantee of the accuracy to the performance of these filtering systems. Any email message that is identified by these filtering services as unsolicited bulk email may be deleted from the Aspire Network prior to delivery to you without notification to you or the message originator.
ASPIRE NETWORK SERVICES ASSUMES NO LIABILITY
Aspire assumes no liability to subscribers or others for any failure to enforce the terms of this Policy.
VIOLATION REPORTS
You may report a violation of this policy to us at admin@aspirefiber.com.
COPYRIGHT INFRINGMENT
The federal Digital Millennium Copyright Act (“DMCA” or “Act”) directs how online service providers like Aspire address claims of online copyright infringement. As required by the DMCA, Aspire has adopted a policy to suspend or terminate broadband services to account holders or subscribers who repeatedly infringe copyrights.
Aspire accommodates and does not interfere with standard technical measures to identify and protect copyrighted works, subject to the limitations of the Act.
Notices and counter-notices related to claimed copyright infringements should be directed to the following designated agent:
Name: Stephen Weatherford
Company: Aspire Fiber OpCo Inc.
Address: 11943 Discovery Ct.
Moorpark, CA, 93021
Phone: (805) 322-0086
Email: DMCA@aspirebroadband.com
QUESTIONS
If you have any questions concerning the policy, please contact Aspire at (805) 322-0086.
Updated February 1, 2026
