KC Broadband Network Management Practices Disclosure Last Updated: January 15, 2026
KC Broadband is committed to providing reliable, high-quality fixed wireless broadband Internet access service to our customers in and around Kansas City, and surrounding areas. This disclosure explains our network management practices, consistent with the Federal Communications Commission’s (FCC) Open Internet transparency requirements (47 CFR § 8.1 et seq.) and related rules. It helps consumers make informed choices and allows edge providers, application developers, and others to understand how we manage our network.
We do not engage in blocking, throttling, paid prioritization, affiliated prioritization, or unreasonable interference with lawful Internet traffic. Our network management is reasonable, application-agnostic where possible, and focused on maintaining overall network performance, security, and reliability for all users.
1. Service Description and Performance Characteristics
We deliver fixed wireless broadband Internet access service using licensed and unlicensed spectrum to transmit data between our towers/access points and customer premises equipment (CPE, such as outdoor antennas and indoor modems/routers).
Typical Performance: Actual speeds and latency vary based on factors including distance to our tower, line-of-sight, terrain, foliage, weather, local RF interference, customer equipment condition, in-home Wi-Fi setup, and network congestion. See your specific plan’s Broadband Consumer Label for advertised “up to” speeds and typical ranges (based on real-world measurements).
Latency: Generally low to moderate (typically under 50 ms round-trip under normal conditions), suitable for web browsing, email, streaming, VoIP, online gaming, and video conferencing. Latency may increase during peak usage or adverse conditions.
Data Usage: All plans feature unlimited data with no hard caps or overage fees.
2. Network Management Practices
We use reasonable network management practices to optimize performance, ensure fair access for all customers, protect network security, and comply with legal obligations. These practices are applied in a non-discriminatory, technology-neutral manner unless necessary for security or emergency purposes.
A. Congestion Management
Our fixed wireless network is shared among customers on each sector/tower. During periods of heavy usage (e.g., peak evening hours), congestion may occur naturally due to finite radio spectrum and backhaul capacity.
To promote fairness and maintain acceptable performance for all users during congestion, we employ fair queuing software on our network equipment. This software maintains separate queues for individual customer flows (or sessions) and services them in a manner that approximates equal sharing of available bandwidth among active flows on a congested link.
Fair queuing helps prevent any single heavy user or flow from disproportionately consuming bandwidth, which could otherwise degrade service for others.
It is applied equally to all lawful traffic types without regard to content, application, protocol, source, or destination (except as needed for security).
This is a passive, per-flow scheduling mechanism—no artificial throttling based on application type occurs. Unused capacity is dynamically allocated to active flows.
We monitor aggregate usage and performance in real time. Fair queuing is our primary tool to manage congestion; we do not use additional techniques like deep throttling or content-specific de-prioritization.
We plan capacity upgrades proactively based on usage trends to minimize the need for congestion management.
B. Application-Specific or Protocol-Specific Practices
None. We do not favor, degrade, or block any lawful applications, services, ports, or protocols. All lawful Internet traffic is treated equally for routing and forwarding purposes.
C. Device Attachment Rules
Customers may attach any lawful, compatible device to their service after our CPE (e.g., personal routers, computers, phones, smart devices).
We provide and own the CPE (antenna, radio, modem). Tampering with or bypassing our CPE will violate our Terms of Service and result in service suspension.
No restrictions on the number or type of devices connected behind your router, though performance depends on your internal network and total bandwidth demand.
D. Security Practices
We employ industry-standard measures to protect our network and customers, including:
Firewall rules and intrusion detection/prevention systems to block known malicious traffic (e.g., DDoS attacks, malware command-and-control, port scans).
Filtering of obviously harmful or illegal traffic (e.g., certain phishing/malware domains if identified via threat intelligence feeds).
Rate limiting or temporary blocking of traffic from compromised customer devices that are generating abuse (with notice where feasible).
These measures are applied narrowly to mitigate threats and do not inspect or block lawful content.
E. Other Practices
No paid prioritization or zero-rating of specific content/apps.
No commercial agreements that prioritize affiliated or third-party traffic over others.
During emergencies or force majeure events (e.g., natural disasters), we may prioritize emergency communications (e.g., 911, government alerts) as required by law.
We do not use deep packet inspection (DPI) for non-management purposes (e.g., no content-based advertising or selling user data).
3. Commercial Terms Related to Network Practices
All plans are prepaid, month-to-month, with no contracts or early termination fees.
Pricing, speeds, and features are detailed on our website and Broadband Consumer Labels.
No usage-based throttling or de-prioritization beyond the fair queuing congestion management described above.
4. Changes to Practices
We may update our network management practices as technology, threats, or usage patterns evolve. Material changes will be posted here with the updated date and may be communicated via email, website notice, or bill message.
5. Contact and Complaints
For questions about this disclosure, network performance issues, or suspected violations: KC Broadband Email: support@kcbroadband.com Phone: 816-608-1100
You may also file complaints with the FCC at consumercomplaints.fcc.gov or learn more at fcc.gov/openinternet.
This disclosure is publicly available on our website and linked from our Broadband Consumer Labels and Terms of Service.