Legal

This institution is an equal opportunity provider and employer.

This contract provides the terms and conditions under which Cross Companies or its affiliates (“CimTel, Pottawatomie Telephone, Cross Telephone, Cross Wireless, Bravado”) will provide internet access to the accountholder.

  1. Formation of Contract. By electronically acknowledging this document, you indicate your acceptance of this contract.
  2. Services. Cross will provide internet access to the service address on your account. Terms and conditions for Cross’ telephone services are set forth in tariffs instead of this document.
  3. Term and Termination. This contract takes effect when you accept it and continues until your account is closed.
    a. Termination by you. You may cancel service at any time upon notice to Cross. Early termination charges may apply as provided in section 3(c) below.
    b. Termination by Cross. Cross may terminate any or all services if you: (i) breach any provision of this contract; (ii) violate any policies related to services (see section 14); (iii) fail to pay for services as provided in this contract; (iv) have provided false or materially misleading information to Cross; or (v) use any service in violation of applicable law. Early termination charges may apply as provided in section 3(c).
    c. Early termination charges. If Cross waives, defers, or discounts charges based on your commitment to maintain service for a fixed term and either you terminate your services before the end of the term or Cross terminates your services under section 3(b), then you are responsible for an early termination charge in addition to any outstanding charges due at the time of termination. The early termination charge will equal the lesser of (i) the value of the discounted, deferred, or waived charges for the months that your service was active, or (ii) the discounted monthly service charge multiplied by the number of months remaining in your fixed term at the time of termination.
    d. Survival of provisions. The provisions of sections 1, 3(c), 3(d), 4, 5, 10, 12, 15, 16, and 17 will survive the termination of this contract.
  4. Billing and Payment Related Provisions.
    a. Billing. Cross bills monthly service charges in advance and one-time charges in arrears.
    b. Payment terms. By using Cross services, you agree to pay all billed charges by the due date listed on your bill. Late fees and interest charges may apply to any payment not received by the due date. Returned check fees may apply for any check returned unpaid.
    c. Rates and rate changes. Advertised rates do not include taxes or other government fees and surcharges. You are responsible for taxes and other government fees and surcharges. Cross may change rates for a variety of reasons and will notify you of rate changes via website, bill messages, or other means.
    d. Billing disputes. You must report any billing discrepancies to Cross within 20 days of the date of the bill to allow necessary adjustments before the next bill cycle.
    e. Credit and Deposits. You authorize Cross to obtain a credit report or other credit information. Cross may require a deposit to activate or reconnect services. Upon determination of satisfactory payment history, or as required by law, Cross may refund deposits through bill credits. Deposits may be applied to any charges due on your account. After termination of service, Cross will apply your deposit to any outstanding amounts due, then return any remaining balance to you.
    f. Collections. Cross may take collection action for any unpaid charges. You agree to reimburse Cross for fees paid to any collection agency, and any other costs and expenses, including reasonable attorneys’ fees, incurred to collect on your account.
  5. Lifeline Enrollment. Lifeline benefit enrollment via NLAD and/or the National Verifier may require use of applicable account or personal information provided to Cross that is required by the program to verify enrollment and apply the Lifeline discount to your Cross services.
  6. Equipment, Devices, and Wiring. Depending on the services you subscribe to, Cross may provide one or more modems, residential gateways, routers, backup batteries, and more (“Equipment”).
    a. Ownership. Ownership of Cross Equipment always remains with Cross. You are responsible for the safekeeping of Cross Equipment on your premises. If any Cross Equipment is destroyed, damaged, lost, or stolen while in your possession, you are responsible for the cost of repair or replacement.
    b. Use. You may use Cross Equipment only for its intended purpose and consistent with the manufacturers or Cross’ instructions.
    c. Return of Cross Equipment. Upon termination of service, you must return all Cross Equipment in normal working condition within 10 business days.
    d. Customer-provided equipment. Customer can supply their own modem, router, or other equipment (“Customer Provided Equipment”) as long as it is downstream or on the LAN side of the Cross equipment, which is required to ensure network performance. You are responsible for the compatibility of Customer Provided Equipment with the service. You may contact Cross to determine if Customer Provided Equipment is compatible. Cross may apply a service charge to test Customer Provided Equipment for compatibility. Changes to Cross’ network may affect the compatibility of Customer Provided Equipment with the service.
    e. Customer wwwices. You are responsible for the compatibility of your own computers, tablets, streaming wwwices, televisions, phones, or other wwwices (“Customer Devices”) through which you will use the services.
    f. In-home wiring. You are generally responsible for maintenance and repair of wiring and equipment on the customer side of the demarcation point (i.e., inside the home).
  7. Service and Support. Cross’ service and support personnel are available to assist you with questions or service issues. Cross may apply a service charge if your issue arises from (a) your acts or omissions, (b) Customer Provided Equipment or Customer Devices, or (c) wiring inside your home. Cross is not obligated to support, maintain, repair, or replace Customer Provided Equipment or Customer Devices.
  8. Accountholder Responsibilities. You are responsible for activities occurring through your account. You are responsible for compliance with this contract and applicable policies by anyone using the service through your account.
  9. Account Security. You are responsible for the security of Customer Provided Equipment, Customer Devices, and your online communications. You are solely responsible for backing up computer or data files and implementing virus, malware, and intrusion prevention measures to protect equipment, wwwices, communications, and files.
  10. Restrictions. No resale of service. You may not resell or redistribute Cross’ services, including via Wi-Fi hot spots, without Cross’ prior written consent.
  11. Right of Entry. By accepting this contract, you are granting Cross the rights to enter and use your property to construct, install, maintain, or disconnect all the wiring, equipment, and facilities used to provide services, which may include entry into your home. Ownership of all wiring (other than inside wiring) and facilities will always remain with Cross. If you do not own the property, your acceptance of this contract indicates that you have obtained the consent of the property owner for Cross to enter the property for the purposes described above, and you agree to indemnify and hold Cross harmless from and against any claims of the property owner arising out of entry on or use of the property for the purposes described above.
  12. Technology and Service Changes. Cross may change services or technology platforms at any time. Cross may discontinue providing any or all services in your area. Cross will make commercially reasonable efforts to notify you of any such changes, discontinuations, substitutions, or modifications.
  13. No Responsibility for Content. Cross is not responsible for content provided over or accessed through the internet.
  14. Service Interruptions. While Cross makes best effort to provide services uninterrupted and at advertised speeds, service may be interrupted or limited for a variety of reasons outside our control. Accordingly, Cross provides services on an as-is and as-available basis.
  15. Additional Policies and Disclosures. Cross’ Privacy Policy, Acceptable Use Policy, Repeat Copyright Infringer Policy, Broadband Internet Service Disclosures, Backup Battery Disclosures, and other documents related to provision or use of the services can be viewed at www.cimtel.net, www.potelco.net, www.crosstel.net or www.bravadowireless.com or by contacting Cross. Violation of any policy may result in termination of service.
  16. Software License. By providing services or Cross Equipment to you, Cross grants to you a revocable, limited, nonexclusive, nontransferable license to use software provided as part of the services or Cross Equipment (collectively, the “Licensed Software”) in connection with, and only in connection with, your use of the services. As between you and Cross, all rights, title, and interest in and to the Licensed Software, including associated intellectual property rights, remain with Cross and its licensors. You are responsible for compliance with all end-user software license agreements accompanying any Licensed Software. You may not translate, decompile, reverse engineer, distribute, remarket, modify, or otherwise attempt to alter or dispose of any Licensed Software or any part it. Your rights to use Licensed Software terminate upon termination of service.
  17. Disclaimer of Warranties. Cross’ service is provided on an “as is” and “as available” basis without warranties of title or non-infringement or implied warranties of merchantability or fitness for a particular purpose. All such warranties are hereby expressly disclaimed. Cross does not warrant that (a) the service will be uninterrupted or error free, (b) internet service will operate at a particular speed, or (c) the service will work with any particular equipment or wwwice.
  18. Limitation of Liability. In addition to the limitations provided elsewhere in this contract, Cross is not liable for any indirect, incidental, special, consequential, exemplary, or punitive damages, even if Cross is advised of the possibility of such damages.
  19. Changes to Terms and Conditions. Cross may change these terms and conditions by giving notice to you. If you continue to use the services after receiving notice of the changes, you are accepting the changes.
  20. Miscellaneous. This contract, including the documents referenced in it, is the entire agreement between you and Cross with respect to Cross’ services. Nothing in this contract is intended to limit any rights or remedies available at law or in equity.

Mobile Service Addendum

Customer agrees to comply with the following additional terms and conditions.

Minute Increment Billing and Usage

Airtime and other measured usage are billed in full-minute increments, and actual airtime and usage are rounded up to the next full increment at the end of each call for billing purposes. CimTel charges a full-minute increment of usage for every fraction of the last minute used on each wireless call. For charges based on the amount of time used or data sent or received, CimTel will round up any fraction to the next full minute or, depending on how you’re billed for data usage, the next full kilobyte. Calls placed on networks served by other CimTel may take longer to be processed, and billing for these calls may be delayed.

Unlimited Mobility Data Service Usage

CimTel reserves the right to define and determine data usage abuses.  If a user’s mobile data service usage exceeds the standard defined usage allowance, CimTel may, at its option, slow data speeds, change the user’s plan to one imposing additional usage charges, or may even suspend or terminate the user’s service. Depending on the severity of the usage abuse, CimTel may or may not provide advance notice that it intends to take any of the above actions including terminating the service agreement.

Tethering – Hotspot Usage (Generation of a WiFI Signal by the Mobile Device)

Using a mobile wwwice on an Unlimited data plan for the use of Tethering, Hot spotting or generating a WiFi link for PC’s, Smart TV’s, Gaming consoles or any large data consumption type wwwice is not allowed on the CimTel’s network and violation of this rule is grounds for immediate service termination.

Device Financing / Credit Installments

The user may be invoiced for wwwice and other installment plan payments if the user purchased a wwwice under a CimTel installment plan.  The terms and conditions of financing are set forth in a separate contract.  If the user defaults, CimTel may reclaim the wwwice, but the user remains responsible for paying off the remaining balance.  Once the wwwice is paid off, CimTel relinquishes all ownership interest in the wwwice.

Caller ID Blocking: The user’s billing name may be displayed along with the user’s wireless number on outbound calls to other wireless and landline phones with Caller ID capability. The user’s telephone number and location may also be transmitted to public safety officials if the user dials 911 or other emergency service numbers. The user may contact customer service for information about blocking the display of the user’s name and number, except to the extent the display of such information is necessary to assist emergency responders or is otherwise required by law.

Basic & Enhanced Voicemail: Unless the user subscribes to an unlimited voice plan, airtime charges apply to calls to the user’s voicemail service, including calls where the caller does not leave a message because the call has been completed, calls to listen to, send, reply to, or forward messages, or to perform other activities with the user’s voicemail service, including calls forwarded from other phones to the user’s voicemail service. The user is solely responsible for establishing and maintaining security passwords to protect against unauthorized use of the user’s voicemail service. Upon notice to the user, CimTel may change the number of voicemails the user can store, the length of time the user can store those messages, and other voicemail features. CimTel may deactivate the user’s voicemail service if the user does not initialize it within a reasonable period after activation. CimTel will reactivate the service upon the user’s request.

Wireless Protection: Wireless Protection may be added to a plan for wwwice replacement purposes only. Deductible rates apply to both voice and data 4G LTE wwwices. Rates are subject to change. The following restrictions and requirements will apply: Replacement for like-wwwice only. Replacement equipment may be new or refurnished. If the same make or model is not available, a like-kind make or model may be substituted. All replacements will be made at CimTel’s discretion. This coverage is void in the case of fraud, intentional concealment, intentional physical damage or misrepresentation of a material fact at any time concerning the requested claim. The customer is required to retain insurance for a minimum of one year after filing a claim. After the one-year requirement, the customer may cancel without penalty. If the customer cancels data protection before the one is completed, customer is responsible for paying the retail value of the wwwice. Deductibles are non-refundable on each approved claim. No new contract is required. If the customer is within 6 months of a completed contract, they may have the option of purchasing a new wwwice at the upgrade pricing with a 2-year contract. The remainder of the existing contract will be added to the new 2-year extension.  One claim per year, the year begins after the first claim. Insurance must be added within 30 days of purchase. If added after the customer leaves the store, the wwwice must be brought back to the corporate retail location for inspection to insure there is no damage to the wwwice. Wireless protection is not provided on wwwices that are purchased from an Authorized Agent other than CimTel. Exclusions are: Accessories, Local Lifeline Accounts and, Prepaid Accounts. Eligibility is subject to change. Covered Incidents: Lost, stolen (must provide a police report within 30 days), physical damage (liquid damage is excluded) and mechanical and or electrical failure after the manufacturer’s warranty has expired.   How to file a claim: Must be an active CimTel customer, account must be in good standing, must be the account holder or authorized user with valid identification and the claim must be filed within 30 days of the reported incident.

Data Plans:. Eligible data plans cover data usage in the U.S. and do not cover international data usage and charges. Tethering of a wwwice is expressly prohibited.

Numbers: CimTel will assign a phone number (the “Number”) to the user’s wireless wwwice including data wwwices. The user does not own the Number or any other personal identification number (“PIN”) assigned to the user or that user may use in connection with the service. Upon notice to the user, CimTel can change, reassign or eliminate any Number or PIN. If the user’s account is deactivated, CimTel can reassign the Number without giving any notice. The user may not assign the Number to any wireless wwwice or other equipment except as approved by CimTel or otherwise required by law. In order for the user to “port” or keep its Number when changing telephone service providers, the user must have an active account with CimTel. The user may be required to purchase a new wireless phone or other equipment in order to change service to or from CimTel service and may be without service for some period of time. CimTel may charge a fee to reimburse CimTel for the costs it incurs to meet the equipment, technology and infrastructure requirements necessary to enable number porting. CimTel may also charge a fee to reimburse it for the cost it incurs to perform a port.

SIM CARDS: 4G LTE wwwices require a SIM card to enable use of the LTE wwwice. If the user damages, loses, or misplaces the SIM card, CimTel may access a charge to the user to replace the SIM Card. The CimTel-SIM card is not warranted to work correctly in any wwwice not expressly noted by CimTel.

Lifeline Certification: CimTel is a designated eligible Lifeline carrier within certain areas of the State of Oklahoma. CimTel follows the established USAC guidelines for eligibility of Lifeline service. CimTel requires annual re-certification to maintain existing user Lifeline benefits. A user that fails to re-certify by the required date will be moved to a non-lifeline plan and the Lifeline credit removed on a contract Lifeline Plan and will be disconnected if on a local non-contract plan. The user will be responsible for any charges that may occur. Additional information regarding Lifeline service is set forth in CimTel’s Lifeline policy, available at its official website (http://www.cimtel.net).

Scope of Service: CimTel reserves the right to manage its wireless systems and the use of its services. As a result, CimTel may deny a request for service from any subscriber or potential subscriber or discontinue a subscriber’s service for any lawful reason. CimTel may offer different services and different rates at different times. CimTel may block access to a number and/or certain categories of numbers (for example, 900 numbers), certain websites, or certain messages, including text, video, photo, and audio messages, in its sole discretion and to the extent legally permitted. Services are generally available within the operating range of CimTel’s wireless system in the user’s service area. The user’s service area is the area depicted in the coverage that is posted on our official website (http://www.cimtel.net) and may change from time to time. Any statements by CimTel, its employees, representatives or agents about the coverage of CimTel’s wireless system are only intended to describe CimTel’s approximate coverage in the user’s service area. The user should not interpret any such statement to mean that services will be available under all circumstances, at all times, or without interruption in the user’s service area.

Limitation of Liability: CimTel strives to provide continuous service, however, CimTel cannot guarantee error-free service. The services depend on over-the-air radio transmissions. Many factors beyond CimTel’s control affect the user’s ability to make and receive calls and/or

transmit and receive data on the user’s wireless wwwice and the quality of those calls, including but not limited to the user’s location, the conditions of the atmosphere, the terrain, nearby buildings (and other structures) and the user’s wireless wwwice. CimTel takes no responsibility for service interruptions or problems caused by factors beyond its control. As a result, sometimes service, including calls or attempted calls to emergency services like 911, maybe interrupted or fail, and/or the quality of calls may be poor. The liability of CimTel for losses or damages arising out of errors, omissions, interruptions, delays or defects in any of the services or facilities provided by CimTel shall be limited to a pro-rata abatement of the charges payable by user for the period during which the services or facilities were affected by the error, omission, interruptions, delay, or defect. CimTel will have no liability for service interruptions or outages of service of 24 hours or less. To the maximum extent permitted by law, the user agrees to limit claims for damages or other monetary relief against CimTel to the lesser of the user’s direct damages and one month’s service charges.

Under no circumstances will CimTel be liable for lost profits, loss of business, cost of replacement or any other incidental, indirect, special, punitive or consequential damages of any kind arising out of or related to the provision or failure to provide service or the user’s use of the service. CimTel’s performance shall be excused if caused by failure of any equipment used in providing the service, acts of God, labor disputes, facility shortages, changes in service caused by regulatory requirements or other causes beyond CimTel’s reasonable control.

CimTel is not liable for any damages resulting from, or in connection with, any interruption or failure of 911 or E911 emergency services or the identification of the number, address or name associated with any person accessing such emergency service from user wwwice.

The above limitations of liability will apply regardless of the theory of liability, whether fraud, misrepresentation, breach of contract, personal injury, negligence, products liability, or any other theory. By using the services, the user agrees that the remedies provided under this Agreement are exclusive and the user waives its right to any other remedies that may be available to it at law or in equity.

The user agrees to release, indemnify, defend and hold harmless CimTel from and against all claims, losses, demands, actions and/or damages (including actions by third parties or those who use the user’s wireless handset or wwwice) arising out of or resulting from the use or attempted use of CimTel services.

User Rights: User must be at least 18 years of age and have legal capacity to accept this agreement. Proper identification is required. The user’s number will be unlisted and unpublished. CimTel will take reasonable steps to protect the user’s privacy. CimTel will not provide the user’s number to a third party unless required by law. CimTel will not disclose calling records to any parties without proper legal documentation. CimTel’s privacy policy, which describes its privacy practices, can be found at its official website (http://www.cimtel.net ).

911: Customers should not disable location services on their wireless handsets.  Customers who disable location services on their wireless handset risk delays in first responders responding to 911 calls. 

There are circumstances that could prevent E911 service from being  available to the Customer or could be in some ways limited by comparison to traditional E911 service.  Circumstances that could potentially  affect VoIP service are loss of electrical power, broadband connection  fails, Customer is using a non-native telephone number, relocation of  the Customer’s IP-compatible telephone or other equipment, and delays  that may occur in making a Registered Location available in or through  the Automatic Location Identification database . This list is not  exhaustive. VoIP 911 calls may not connect to the Public Safety  Answering Point (“PSAP”), or may improperly ring to the administrative  line of the PSAP, which may not be staffed after hours, or by trained  911 operators.  VoIP 911 calls may correctly connect to the PSAP, but  not automatically transmit the user’s phone number and/or location  information.

Cross Telephone values your privacy and strives to ensure that your interaction with this web site is a positive one. To better protect your privacy, this notice has been posted to explain our online information practices and the way information about you is collected and used.

I. Collection of Personal Information

This web site has been created for our mutual benefit. Accordingly, you may use this site to communicate with us, request information about Cross Telephone products and services, search and apply for Cross Telephone jobs, and register for contests, among other things. When you avail yourself of these services, you may voluntarily provide information to Cross Telephone. Typically, this information will include your name, email address and postal address. In addition, depending upon the service you access, the information collected by Cross Telephone might also include your telephone number, fax number, birth date, gender, credit card information, demographic information, occupation and information about your interests and behaviors.

Cross Telephone may also collect certain non-personally identifiable information when you visit our web site such as the type of operating system you use (e.g. Windows 2000, Macintosh OS), the type of browser you use (e.g. Internet Explorer, Netscape), and the domain name of your Internet service provider (e.g. America Online). In addition, in order to serve you better, Cross Telephone may log your preferences and other data when you visit our web site, as well as log other web sites you visit.

II. Privacy of Your Personal Information
Cross Telephone shall, within commercially reasonable standards, safeguard the personal information you provide to Cross Telephone from unauthorized access. Specifically, the information you provide to Cross Telephone on this web site will not be released to, shared with, sold, or otherwise made available to unaffiliated third-parties for commercial purposes or other purposes unrelated to your dealings with Cross Telephone, except with your permission, as ordered by a court of law, as required by applicable law, or to survey customer satisfaction. Cross Telephone does use outside vendors to ship or fulfill orders placed on our site and a credit card processing company to bill users for goods and services.

III. Use of Personal Information
Information that you provide to Cross Telephone may be used by Cross Telephone, its affiliates, or an authorized agent, to inform you about services and products that may interest you. You may be contacted by telephone, direct mail, or email about these services and products. For example, Cross Telephone occasionally directs emails to visitors who provide us with their email addresses for purposes such as receiving our email newsletters or notifying visitors that they have won a contest for which they registered. In some circumstances, the contact may come from an agent of Cross Telephone which has been entrusted specifically for such purposes. In that case, Cross Telephone will require its authorized agent to hold the information you have provided in confidence. Such agent will be prohibited from using your information for any purpose(s) other than that which has been approved by Cross Telephone. When registering for certain services and products, you will have a choice whether to receive email newsletters and/or other direct offerings from Cross Telephone or whether to opt-out and not receive such information from Cross Telephone.

IV. How to Opt-Out
If you have registered to receive Cross Telephone email newsletters, each email newsletter includes an “unsubscribe” link at the bottom of the newsletter. Simply click on this link or reply to the newsletter with the word “unsubscribe” as the subject of the reply, and you will no longer receive Cross Telephone emails, except at your subsequent direction.

V. Other Sites
Cross Telephone’s web site contains links to other web sites. Cross Telephone is not responsible for the content or privacy policies of other web sites.

VI. Correcting and Updating Personal Information
You can edit your Cross Telephone account information at any time. You can also delete, add or renew features, subject to the corresponding charges, if any, by calling 1-800-828-6567 or *611 from your Cross Telephone wireless phone.

VII. Changes to Policy
As technologies and business practices change, Cross Telephone may update this privacy policy from time to time. Visitors should review Cross Telephone’s privacy policy from time to time for recent updates.

VIII. Questions
If you have questions, comments, or concerns regarding Cross Telephone’s privacy policy, your use of the Cross Telephone web site, your receipt of Cross Telephone email newsletters, or the use or accuracy of information you have submitted to Cross Telephone, please feel free to contact us.

As a provider of Internet access, Internet email, web site hosting,  Google Apps, and other Internet-related services, Cross Telephone and  CrossTel.net (“the Provider”) offers its subscribers (and their  customers and users), the means to access and disseminate a wealth of  information. The Provider respects that the Internet provides a forum  for free and open discussion and dissemination of information. However,  there are competing interests at issue. The Provider reserves the right  to take certain preventative or corrective actions as deemed necessary.  In order to protect these competing interests, the Provider has  wwweloped an Acceptable Use Policy (“AUP”), which supplements and  explains certain terms of each customer’s respective service agreement  and is intended as a guide to the customer’s rights and obligations when utilizing the Provider’s services. This AUP will be revised from time  to time. A customer’s use of the Provider’s services after changes to  the AUP are posted on the Provider’s web site, www.cimtel.net, will  constitute the customer’s acceptance of any changes to the AUP.

Email: Email accounts not accessed in 90 days will be archived for  deletion. Once an email account has not been accessed in 120 days, that  account will be purged from the system.

Email and Apps: Provider’s email platform, and certain other  applications may be provided by third parties.. A customer’s use of  third-party email or other applications may be governed by both  Provider’s AUP and the third-party application provider’s AUP or terms  of service, and subscribers are responsible for compliance with all AUPs or terms of service applicable to the service and applications being  used. Prohibited Activities: When subscribers disseminate information  through the Internet, they also must keep in mind that the Provider does not review, edit, censor, or take responsibility for any information  its subscribers may create. When users place information on the  Internet, they have the same liability as other authors for copyright  infringement, defamation, and other harmful speech. Also, information  created and carried over the Provider’s network may reach a large number of people, including both subscribers and nonsubscribers of the  Provider, possibly affecting other subscribers and may harm the  Provider’s goodwill, business reputation, and operations. For these and  other reasons, the Provider has wwweloped an AUP to define prohibited  activities:

Spamming: Spamming is sending unsolicited bulk and/or commercial  messages over the Internet. It is harmful not only because of its  negative impact on consumer attitudes toward the Provider, but also  because it can overload the Provider’s network and disrupt service to  the Provider’s subscribers. Such behavior could result in the Provider’s mailservers being blacklisted by various anti-spamming organizations  subscribed to by other Internet service providers, thus denying the  Provider’s subscribers access to other parts of the Internet. Also,  creating, operating or maintaining an open SMTP relay is prohibited. The only acceptable method for creating and maintaining a mailing list for  unsolicited commercial e-mail (UCE) or unsolicited bulk e-mail (UBE) is  to have subscribers opt in to the list using secure sockets layer (SSL)  authentication, or other means where the user can be positively  identified by means of a digital “signature” and the user’s choice to  receive the bulk or commercial mailings is clear. Opt-out lists, and  double-negative lists are specifically prohibited. The existence of a  “business relationship” between the entity sending and the individual  receiving UCE or UBE is not an acceptable justification for the  dissemination of UCE or UBE, unless the customer has specifically  “opted-in” via verifiable SSL webpage or specific, verifiable request  via e-mail. When a complaint is received, the Provider has the  discretion to determine from all of the evidence whether the email  recipients were from an acceptable “opt-in” email list. Maintainers of  such bulk mailing lists are required to keep verifiable evidence, to  include logs for SSL-verified opt-in webpages, or complete headers and  text for e-mail requests for a period of 120 days after the addition of  each e-mail address to the list. The maintainer of such lists must  present this evidence to the Provider upon request. Any domains hosted  by the Provider must have working, active mailboxes maintained for  “abuse” and “postmaster” aliases. Failure of a responsible party in the  company hosted to answer e- mail received by either the postmaster or  abuse aliases shall be grounds for termination of the account concerned. The Provider proactively opposes spamming in all forms, and it is the  Provider’s policy to immediately interrupt traffic in progress, and  terminate subscriber service that may potentially pose harm to the  Provider’s business reputation and operations. The Provider reserves the right to terminate, with or without notice, the account of any  webhosted service whose website is advertised by or referred to in UCE  or UBE. This activity, known as “spamvertising” or the site, known as a  “spamvertised website” is specifically prohibited under the terms of  this policy.

Intellectual Property Violations: Intellectual property violations  include engaging in any activity that infringes or misappropriates the  intellectual property rights of others, including copyrights,  trademarks, service marks, trade secrets, software piracy, and patents  held by individuals, corporations, or other entities. Also, engaging in  activity that violates privacy, publicity, or other personal rights of  others. We comply with the Online Copyright Infringement Liability Limitation  Act of 1998 (“Act”). As required by the Act, we have adopted a policy to suspend or terminate services to account holders or subscribers who  repeatedly infringe copyrights. We reserve the right to terminate  service to a subscriber or account holder after receiving repeat notices of copyright infringement on the account. We accommodate and do not  interfere with standard technical measures to identify and protect  copyrighted works, subject to the limitations of the Act. In accordance with the Online Copyright Infringement Liability  Limitation Act, 17 USC § 512(c)(2), we have filed with the United States Copyright Office the necessary designated agent information to  facilitate notice of alleged online copyright infringement on our  network. Our designated agent for notification of alleged copyright  infringement and counter notification is:

JSI DMCA Agent
John Staurulakis, Inc.
7852 Walker Drive
Suite 200
Greenbelt,  MD  20770
Phone: 301-459-7590
Email: copywright@mbo.one

Obscene Speech or Materials: Obscene speech or materials can include  using the Provider’s network to advertise, transmit, store, post,  display, or otherwise make available child pornography or obscene speech or material. The Provider is required by law to notify law enforcement  agencies when it becomes aware of the presence of child pornography on  or being transmitted through the Provider’s network. Using the  Provider’s network as a means to transmit or post defamatory, harassing, abusive, or threatening language is also prohibited and grounds for  immediate termination of the account concerned, as well as the release  of all logs containing such language to the proper investigative  government authorities.

Forging of Headers: Forging or misrepresenting message headers, whether  in whole or in part, to mask the originator of the message.

Illegal or Unauthorized Access to Other Computers or Networks: Accessing illegally or without proper authorization, any computers, accounts, or  networks belonging to another party, or attempting to penetrate security measures of another individual’s system (often known as “hacking”).  This includes any activity that might be used as a precursor to an  attempted system penetration (i.e. port scan, stealth scan, or other  information gathering activity). Knowingly engaging in any activities  that will cause a denial-of-service (e.g., synchronized number sequence  attacks) to any of the Provider customers or end-users whether on the  Provider’s network or on another provider’s network. Accessing services  not included or not paying for. This includes but is not limited to  circumventing security, interfering with a service, overloading a  service, disabling a host, encumbering disk space processors or other  system resources.

Distribution of Internet Viruses, Worms, Trojan Horses, or Other  Destructive Activities: Distributing information regarding the creation  of, and sending Internet viruses, worms, Trojan horses, pinging,  flooding, mailbombing, or denial of service attacks. Also, activities  that disrupt the use of or interfere with the ability of others to  effectively use the network or any connected network, system, service,  or equipment. The Provider may suspend activity of any account whose  computer(s) have become infected by a worm or trojan horse type virus,  causing the computer to generate unsolicited e-mails, or where the  danger of infecting other users on the Provider’s network or any other  network is present.

Facilitating a Violation of this AUP: Advertising, transmitting, or  otherwise making available any software, program, product, or service  that is designed to violate this AUP, which includes the facilitation of the means to spam, initiation of pinging, flooding, mailbombing, denial of service attacks, and piracy of software.

Export Control Violations: Exporting software over the Internet or  otherwise to points outside the United States in violation of export  control laws or regulations.

Usenet Groups: The Provider reserves the right not to accept postings or deliver messages from newsgroups where we have actual knowledge that  the content of the newsgroup violates the Provider’s AUP.

Other Illegal Activities: Engaging in activities that are determined to  be illegal, including advertising, transmitting, or otherwise making  available ponzi schemes, pyramid schemes, fraudulently charging credit  cards, and pirating software. Internet connections and all other services provided to the subscriber  may only be used for lawful purposes. Transmission or storage of any  information, data or material in violation of any U.S. Federal or state  regulation or law is prohibited.

Other Activities: Engaging in activities, whether lawful or unlawful,  that the Provider determines to be harmful to its subscribers,  operations, reputation, goodwill, or customer relations.

IRC: The Provider does not allow, maintain, provide, nor support Internet Relay Chat services.

Account Security: You are also solely and fully responsible and liable  for all activities that occur under your account. You have sole  responsibility for ensuring that anyone who uses the Services through  your account understands and complies with this AUP. You further  acknowledge and agree that you are solely responsible and liable for any violations of the terms of this AUP, whether by you or by any other  user of the Services through your account.

Grant of License: The Provider is granted world-wide, royalty free and  non-exclusive license(s) to any content you submit or make available for inclusion on publicly accessible areas of Provider’s website (“the  Site”). With respect to content, photos, graphics, audio or video you  submit or make available for inclusion on publicly accessible areas you  grant the license to use, distribute, reproduce, modify, adapt, publicly perform and publicly display such content, photos, graphics, audio or  video only for as long as you elect to continue to include such content, photos, graphics, audio or video and will terminate at the time you  disconnect service.

Policy Enforcement: The Provider will not, as an ordinary practice,  monitor the communications of its subscribers to ensure that they comply with this AUP or applicable law. When the Provider becomes aware of  unauthorized activities, however, it may take any action to stop the  unauthorized activity, including but not limited to, removing  information, shutting down a web site, implementing screening software  designed to block offending transmissions, denying access to the  Internet, or take any other action it deems appropriate. If such  violation is a criminal offense, the Provider will notify the  appropriate law enforcement department of such violation.

Third Party: It is a violation of this AUP for a subscriber to resell or redistribute Provider’s services, including via wi-fi hot spots,  without Provider’s prior written consent. Any subscriber who, with  Provider’s written consent, resells or redistributes Provider’s services is responsible for violations of this AUP by anyone receiving the  services from the subscriber. The use of private IP addressing behind a  public IP by a customer is done so at the customer’s risk. Any malicious activity originating from a public IP may result in the Provider  shutting down that IP, regardless of the number of users behind that  address. This can include any activity that impacts the Provider’s  network or violates the Provider’s AUP and can result in an interruption of service. It is the responsibility of the customer to trace private  IP traffic for, but not limited to, the enforcement of the provider’s  Internet AUP and tracing illegal activity.

Privacy: The Provider also is concerned with the privacy of on-line  communications and web sites. In general, the Internet is neither more  nor less secure than other means of communication, including mail,  facsimile, and voice telephone service, all of which can be intercepted  and otherwise compromised. As a matter of prudence, however, the  Provider urges its subscribers to assume that all of their on-line  communications are insecure. The Provider cannot take any responsibility for the security, accuracy, or delivery of information transmitted over the Provider’s facilities.

Legal: The Provider cannot monitor, verify, warrant, or vouch for the  accuracy and quality of the information that subscribers may acquire.  For this reason, the subscriber must exercise his or her best judgment  in relying on information obtained from the Internet, and also should be aware that some material posted to the Internet is sexually explicit or otherwise offensive. Because the Provider cannot monitor or censor the  Internet, and will not attempt to do so, the Provider cannot and does  not accept any responsibility for damages or injury that result from  information or communications on the Internet.

We hope this AUP is helpful in clarifying the obligations of Internet  users, including the Provider and its subscribers, as responsible  members of the Internet. Any complaints about a subscriber’s violation  of this AUP should be sent to abuse@crosstel.net.

Interest Rate 2023 = 4.28%

Deposits are held as a security on the account until good credit has been established.

Accounts are reviewed at the end of January and July.

Deposits are refunded to the customer’s account, regardless who pays the deposit, only when the following requirements are met.

  • Service must be active for 12 months.
  • Payment is due upon receipt of bill and no later than the 15th of each month.
  • No Negative Activity
  • No Returned Checks
  • No Final Notices

Deposits are automatically applied to the customer’s account if the  account is disconnected, once ALL long distance toll/remaining charges  has been billed, usually within 60 days, any balance remaining will be  refunded to the customer on the account.

Interest is paid on the deposit and applied quarterly to the account.  This is shown on your bill under “OTHER CHARGES AND CREDITS” as  “Interest on Deposit of $ amount for # days.”

Once a deposit is posted to a customer’s account, the customer will be  able to see said deposit amount on their Cross Telephone or Cross Cable  invoice.

CROSS TELEPHONE COMPANY
BROADBAND INTERNET SERVICE DISCLOSURES

Updated November 19, 2011

Consistent with FCC regulations, Cross Telephone Company provides this information about our broadband Internet access services. We call these services our “High Speed Internet Service.” We welcome questions or comments about this information. You may contact us at:


Cross Telephone

P.O. Box 9

704 3rd Ave.

Warner, OK 74469

918-463-2921

Email: staff@crosstel.net

NETWORK PRACTICES

General description. We provide a variety of High Speed Internet Service offerings to our residential and business customers. We provide the service over our broadband network and through our affiliates’ and third-parties’ fiber optic lines connecting to the Internet. We also contract with one or more companies for certain network monitoring and management services. We monitor our network and traffic patterns and make changes we deem necessary to manage and improve overall network performance. We use reasonable, nondiscriminatory, network management practices to improve overall network performance to ensure a high-quality online experience for all users. Our network management practices do not target any specific content, application, service, or wwwice. As network management issues arise and as technology wwwelops, we may employ additional or new network management practices. We will update these disclosures as necessary.

Related documents and disclosures.

Use of our High Speed Internet Service is also governed by:

  • Customer Agreement.
  • High Speed Internet Service Overview, available on our Packages and Pricing page.
  • Acceptable Use Policy, available on this page https://www.crosstel.net/pages-html/legal.html

Congestion management. We describe in this section network management practices used to address congestion on our network.

Congestion management practices used.

Network monitoring. We monitor our network for utilization trends. We receive regular reports showing changes in network traffic and congestion. We use this information to plan increases in bandwidth available, port additions, or additional connectivity to the Internet.

Types of traffic affected. Our congestion management practices potentially affect all network traffic, but do not target any specific content, application, service, or wwwice.

Purposes of congestion management practices. The goal of our congestion management practices is to enable better network availability and speeds for all users. Our congestion management practices serve to:

  • Help us adapt and upgrade our network to maintain or improve network performance as demand for our High Speed Internet Service increases.
  • Help us adapt and upgrade our network to maintain or improve network performance as demand for higher bandwidth applications increases. Some examples of higher bandwidth applications are gaming, streaming movies, and streaming high definition video.
  • Help us identify potential bandwidth abusers who use substantially disproportionate amounts of bandwidth.

Congestion management criteria.

Network monitoring: Our network monitoring provides data to help us plan upgrades to our network, equipment, technology, and connectivity to the Internet. As demand for our High Speed Internet Service increases, and as demand for higher bandwidth applications increases, we monitor effects on network performance and plan upgrades. We upgrade our capacity when network usage equals 80% of network capacity.

Effects on end user experience: Periods of high network demand may result in Internet traffic congestion. End users may experience reduced bandwidth availability or speed during these times. Our congestion management technique does not manage congestion based on the online activities, protocols, or applications that a customer uses; it only focuses on the heaviest users in real time, so the periods of congestion typically tend to be very fleeting and sporadic. It is important to note that the effect of this technique is temporary and is unrelated to a customer’s aggregate monthly data usage. Rather, it is dynamic and based on prevailing network conditions as well as a customer’s data usage over a very recent period. Large bandwidth users on the network segments targeted by our congestion management techniques will potentially experience slower transmission speeds or reception rates for affected modems until the period of congestion ceases. In these circumstances, the actual end user experience will largely depend upon the particular application in use at the time.

Typical frequency of congestion: Congestion tends to occur during periods of peak demand for higher bandwidth applications. Generally, the frequency of congestion tends to increase most days from 8 p.m. to 2 a.m.

Application-Specific Practices. This section discloses any application-specific practices we use.

  • Management of specific protocols or protocol ports. To protect the security of our network and our customers, we block known hostile ports.
  • Modification of protocol fields. Not applicable.
  • Applications or classes of applications inhibited or favored. Not applicable.

Device Attachment Rules. This section addresses any limitations on attaching lawful wwwices to our network.

General restrictions. We place no general restrictions on lawful wwwices that a customer may connect to our network, so long as the wwwice is: (i) compatible with our network; and (ii) does not harm our network or other users. Our High Speed Internet Service works with most types of PCs and laptops including Macs, and other Internet-compatible wwwices like game systems and Internet-enabled TVs. If a wireless router is connected to our High Speed Internet Service, wireless Internet compatible wwwices including computers, tablets, smartphones, and other wwwices can connect to our network. If a customer or potential customer believes they have an unusual configuration, a customer can contact us and we will use reasonable efforts to help determine if there is a compatibility problem.

Fiber-To-The-Home (FTTH) equipment. We install an Optical Network Terminal (ONT) at the customer’s premises to enable use of our High Speed Internet Service delivered via our FTTH network. The ONT then connects via Category 5 cable to a Residential Gateway wwwice (RG). The customer connects a computer or other Internet-enabled wwwice to the RG through a Network Interface Card (NIC) for a wired connection or through a wireless antenna for a wireless wwwice. We provide an RG to each High Speed Internet customer. Customers who wish to use a commercially available RG should consult our list of compatible wwwices. If a customer has a question about RG compatibility, the customer can contact us and we will help determine if there is a compatibility problem.

Digital Subscriber Line (DSL) equipment. To use our High Speed Internet Service delivered via DSL, a customer must have a DSL modem. The customer’s computer or other Internet-enabled wwwice is connected to the DSL modem through a NIC for a wired connection. Some DSL modems can also transmit a Wi-Fi signal for connecting wireless wwwices to our network. For DSL modems that do not transmit a Wi-Fi signal, a customer can attach a wireless router to the DSL modem for connecting wireless wwwices. We provide a DSL modem to each High Speed Internet customer. Customers who wish to use a commercially available DSL modem should consult our list of compatible wwwices. Customers may also obtain a wireless router from most local electronics stores. If a customer has a question about router compatibility, the customer can contact us and we will use reasonable efforts to help determine if there is a compatibility problem.

Network and End User Security. This section provides a general description of the practices we use to maintain security of our network. 

Practices used to ensure end user security, including triggering conditions.

  • Hostile port blocking: We block known hostile ports to prevent unwanted files, browser hacking, and virus attacks.
  • Virus and spam filtering: We filter email and website traffic for virus activity and spam using industry standard virus scanning and prevention techniques. Should an e-mail message be found to contain a virus or other harmful content, the message will be deleted without notification given to either the sender or any intended recipient.

Practices used to ensure security of the network, including triggering conditions.

  • Hostile port blocking: We block known hostile ports to prevent unwanted files, browser hacking, and virus attacks.
  • Virus and spam filtering: We offer email and personal web site hosting. We filter email and website traffic for virus activity and spam using industry standard virus scanning and prevention techniques.

PERFORMANCE CHARACTERISTICS

General Service Description. Through our High Speed Internet Service, we serve as a local Internet service provider. Our High Speed Internet Service enables residential and commercial subscribers to access all lawful content, applications, and services of their choice available on the Internet.

Service technology. We deliver our High Speed Internet Service by one of two service technologies – Fiber to the Home (FTTH) or Digital Subscriber Line (DSL).
FTTH. Our FTTH Internet service uses fiber optic lines, an Optical Network Terminal and a Residential Gateway wwwice that connects to a Network Interface Card for a wired connection or through a wireless antenna for a wireless wwwice. Parts of our FTTH network are shared, which means that customers may share upstream and downstream bandwidth with their neighbors.

DSL. Our DSL Internet service uses copper lines and a DSL compatible modem. The DSL modem connects to a customer’s computer or other Internet-enabled wwwice through a Network Interface Card for a wired connection. Some DSL modems can also transmit a Wi-Fi signal for connecting wireless wwwices to our network. For DSL modems that do not transmit a Wi-Fi signal, a customer can attach a wireless router to the DSL modem for connecting wireless wwwices.

Expected and actual speeds and latency:

Expected performance. We offer customers a variety of High Speed Internet Service levels. We provide a description of the expected maximum transfer speeds associated with each service level in our High Speed Internet Service Overview, available at https://www.crosstel.net/pages-html/crossilec.html.

Speed. The speeds we identify for each High Speed Internet Service level are the maximum upload and download speeds that customers are likely to experience. We provision our customers’ modems and engineer our network to deliver the speeds to which our customers subscribe. However, we do not guarantee that a customer will actually achieve those speeds at all times. A variety of factors can affect upload and download speeds, including customer equipment, network equipment, congestion in our network, congestion beyond our network, performance issues with an Internet application, content, or service, and more.

Latency. Latency is another measurement of Internet performance. Latency is the time delay in transmitting or receiving packets on a network. Latency is primarily a function of the distance between two points of transmission, but also can be affected by the quality of the network or networks used in transmission. Latency is typically measured in milliseconds, and generally has no significant impact on typical everyday Internet usage. As latency varies based on any number of factors, most importantly the distance between a customer’s computer and the ultimate Internet destination (as well as the number and variety of networks your packets cross), it is not possible to provide customers with a single figure that will define latency as part of a user experience.

Actual speed and latency performance. Actual speed and latency may vary depending upon network conditions and other factors. Actual performance of our High Speed Internet Service in most cases will conform to national wireline broadband Internet speed and latency levels reported by the FCC.

FTTH. The FCC has reported that customers of FTTH based broadband Internet services receive mean download speeds in excess of advertised speeds, with slightly higher speeds experienced during non-peak hours. In addition, the FCC has reported that these same customers experience average latency delays of 17 milliseconds, increasing by an average of 18 milliseconds during peak hours.

DSL. The FCC has reported that customers of DSL-based broadband Internet services receive mean download speeds that are within 82% of advertised speeds during non-peak hours, and 77.5% of advertised speeds during peak hours. In addition, the FCC has reported that these same customers experience average latency delays of 44 milliseconds, increasing by an average of 47 milliseconds during peak hours.

Suitability of the Service for Real-time Applications. Our High Speed Internet Service is suitable for typical real-time applications including messaging, voice applications, video chat applications, gaming, and Internet video. If users or wwwelopers have questions about particular real-time applications, please contact us at staff@crosstel.net.

Specialized Services

Specialized services offered to end users. We offer several managed services over our network, sharing network capacity with other high-speed Internet services. Managed services include Internet Protocol Television and dedicated bandwidth to high volume business users.

Effects of specialized services on availability and performance of broadband Internet access service. Because our Internet Protocol Television service uses the same network as our High Speed Internet Service, customers using both services simultaneously may experience slightly slower Internet speeds. This impact will be less apparent for customers using our fiber-to-the-home Internet service than for customers using our digital subscriber line network.

COMMERCIAL TERMS

Prices. Monthly prices for our High Speed Internet Service are available at https://www.crosstel.net/pages-html/crossilec.html.

Usage-based fees. Not applicable.

Fees for early termination. We may charge early termination fees under certain circumstances. See Customer Agreement.

Fees for additional network services. We offer additional e-mail accounts, static IP addresses, and web hosting for our residential customers. You can find fees for this service at https://www.crosstel.net/pages-html/crossilec.html.

Privacy Policies

Inspection of network traffic. We routinely monitor network and traffic patterns.

Virus and Spam filtering: We filter e-mail and website traffic for virus activity and spam using industry standard virus scanning and prevention techniques. Should an e-mail message be found to contain a virus or other harmful content, the message will be deleted without notification given to either the sender or any intended recipient.

Storage of network traffic information: Dynamic Host Configuration Protocol (DHCP) information is a code included in all network traffic that associates that traffic with a particular modem or residential gateway wwwice sending or receiving the traffic. We store DHCP information for at least 1 year.

Provision of network traffic information to third parties: We do not disclose High Speed Internet Service customer or use information to third parties except: (i) as necessary to provide our High Speed Internet Service and to manage our network; or (ii) in response to law enforcement requests, court order, or as otherwise required or authorized by law.

Use of network traffic information for non-network management purposes: We do not use network traffic information for non-network management purposes.

Redress Options

Practices for resolving end-user and edge provider complaints and questions: End users or edge providers with complaints or questions relating to these disclosures should contact: staff@crosstel.net.

Questions: We will endeavor to answer questions promptly via e-mail or telephone.

Complaints: We will provide an initial response in writing within 15 business days of receipt. We will attempt to resolve complaints informally, escalating the matter to senior management if needed.

Some of our voice services may need a backup battery to avoid disruption of service, and to maintain the ability to call 911, during a power outage. This notice provides information on battery backup requirements and options for obtaining backup batteries.

Which services need a backup battery?

Voice services provided over our fiber optic or fixed wireless networks need a backup battery to operate during a power outage.

Voice services provided over our copper network are line-powered, so they do not require a backup battery to operate during a power outage. Our fiber-to-the-home service uses Optical Network Terminals, or ONTs. Fiber customers with an indoor ONT will need a separate backup battery pack to power the ONT during a power outage. Some customers’ ONTs are installed on the outside of their home. Outdoor ONTs come with a backup battery pack installed, so fiber customers with an outdoor ONT do not need to buy a separate backup battery.

Our fixed wireless service uses Residential Gateways, or RGs and voice services may be delivered using the RG. Fixed wireless customers will need a separate backup battery pack to power the RG during a power outage.

What if I don’t have a backup battery?

For customers on our fiber network with an indoor ONT, and customers on our fixed wireless network who also purchase voice products, the service will not work when your home electricity is out. You would not be able to receive or make calls from your home phone, including calls to 911, unless you have a backup battery pack installed in your ONT or RG.

How do I get a backup battery?

You may buy or lease a backup battery pack from us or buy one from a third party.

What are my options for buying or leasing a backup battery?

If you want a backup battery pack for your home phone service, you have the option of buying or leasing one from us or buying one from a third party.

To buy or lease one from us:
Call us at 800-828-6567 or visit our office to talk to a customer service representative.
Cost. The costs to purchase or lease are listed below.
Delivery. If you want to install the backup solution yourself, we can ship the battery pack to you, or you may pick it up from us. If you would like our help installing the battery, we can bring it to your home for installation.
Warranty. The manufacturer’s warranty information, if any, should be in the documentation included with the battery.

To buy one from a third party: You may buy a battery pack from an electronics retail store or an online retailer. You must buy the correct battery pack model to ensure proper function. See below for battery pack models.

Which battery pack model do I need and how much does it cost?

We comply with the Online Copyright Infringement Liability Limitation Act of 1998 (“Act”). As required by the Act, we have adopted a policy to suspend or terminate services to account holders or subscribers who repeatedly infringe copyrights. We reserve the right to terminate service to a subscriber or account holder after receiving repeat notices of copyright infringement on the account. We accommodate and do not interfere with standard technical measures to identify and protect copyrighted works, subject to the limitations of the Act.


In accordance with the Online Copyright Infringement Liability Limitation Act, 17 USC § 512(c)(2), we have filed with the United States Copyright Office the necessary designated agent information to facilitate notice of alleged online copyright infringement on our network. Our designated agent for notification of alleged copyright infringement and counter notification is:


JSI DMCA Agent

John Staurulakis, Inc.

7852 Walker Drive

Suite 200

Greenbelt, MD 20770
Phone:301-459-7590
Email: copywright@mbo.one

Exigent Contact Information
Law Enforcement Only

800-828-6567


This number is monitored 24x7x365 for Law Enforcement Exigent Circumstances Only (immediate danger of death or an immediate risk of serious bodily injury). This number should not be used for status requests or questions about Cross Telephone’s response.
For general information or questions regarding legal process, please call Cross’s legal department at 918-865-8518 or email regulatory@mbo.one

Requests for Subscriber Information

  • Legal Response Guidelines
  • Service of Process
  • Fee Schedule
  • Response Time
  • Cross’s Privacy Policy and Law Enforcement Disclosures
  • Information Required on All Requests
  • Account Identification
  • Testimony
  • Call Detail Records and Content Records

    Legal Response Guidelines
    Cross’s Legal department assists law enforcement agencies in their investigations while protecting subscriber privacy as required by law and applicable privacy policies. The main federal statutes that Cross must conform to when releasing subscriber information are: The Cable Communications Policy Act of 1984 (47 U.S.C. § 551); The Electronic Communications Privacy Act (18 U.S.C. §§ 2510-2522, 2701-2712, 3121-3127); Communications Assistance for Law Enforcement Act (47 U.S.C. § 1001-1010); and the Telecommunications Act of 1996 (particularly, 47 U.S.C. § 222 pertaining to customer proprietary network information or CPNI). Cross also complies with all applicable state and federal laws.

    Service of Process
    Our legal department accepts submissions of legal requests directly at regulatory@mbo.one
    Cross uses Barrow & Grimm as our registered agent. Barrow & Grimm accepts submission of legal requests for criminal and civil matters. Legal requests may be submitted to 110 W 7th St., Suite 900, Tulsa, OK 74119.

    Fee Schedule (18 U.S.C. § 2706)
    Cross does not charge for responses to legal process served by a government entity involving child exploitation. Cross reserves the right to seek reimbursement for processing and responding to all other legal process as permitted by law.
    Requesting parties will be provided with an invoice at the time of disclosure. Additional charges may apply for (i) requests that are voluminous in nature (ii) requests for information that are not retrievable in the ordinary course of business (iii) court orders requiring the installation of pen register/tap and trace wwwices, and (iv) court orders requiring interception of communications.
    Civil cases totaling over $500 require at least half of the invoice total to be paid before any information is released.

    Response Time
    We make every attempt to respond to requests by the date provided on the request. Should we not be able to provide our response by the date listed on the request we will contact the requestor and provide an update. If a request does not contain a deadline to respond, the response will generally be provided within 10 business days. Exigent responses are attempted to be made in real time. If you are requesting information in an exigent circumstance please call 918-463-2921.
    To assist in timely response, please do not request a status update for at least 10 business days form the date that you submitted your request. You may email status requests or other questions to regulatory@mbo.one, or call 918-865-7855.

    Cross’s Privacy Policy and Law Enforcement Disclosures
    For more information about Cross’s Privacy Policy and Acceptable Use Policy, please visit our website, which provides details on how Cross protects its customers’ Personally Identifiable Information (“PII”) from inappropriate use.

    Information Required on All Request
    Prior to the disclosure of any information, Cross is required to follow a proper and valid legal process. This process must be signed, dated, and addressed to a proper legal entity. All acceptable entities will be listed on the Oklahoma Secretary of State’s website. The request must also include contact information and the electronic method for the return of records produced (secure email is preferred; however, fax is also acceptable).
    If you are serving a court order or a warrant which is a follow-up to a prior request, you must include a copy of the original request in order for us to expedite the process.
    In all instances, please include as detailed a description as possible of the information being requested. For example: subscriber name, address, phone number, account number, email accounts, outgoing call logs, time frames, time zones etc.

    Account Identification
    When seeking customer information, please provide as much of the following information as possible.

Telephone Request

  • Target telephone number
  • The date and time of incident


IP Request

  • Targeted IP address
  • A specific date, time, and time zone

Misc. Request

  • Individual’s / Business name and/or
  • Account number and/or
  • Complete address (e.g. street address, Apt. #, city state & zip code) and/or
  • Email address


Note that Cross does not retain information indefinitely and that the Electronic Communications

NOTICE TO NEW AND EXISTING SUBSCRIBERS REGARDING TRANSMISSION OF WIRELESS EMERGENCY ALERTS (Commercial Mobile Alert Service):

Cross Wireless offers many wwwices that are Hearing Aid Compatible (HAC) for the hearing impaired.
The Federal Communications Commission (FCC) defines Hearing Aid Compatibility (HAC) for wireless wwwices in terms of radio-frequency (RF) emissions and telecoil coupling. Cell phones are tested to see if they comply with the FCC’s definition of hearing aid compatibility. For more information on hearing aid compatibility requirements for wireless phones please visit the FCC website or the Global Accessibility Reporting Initiative (GARI) website.
M refers to the RF emissions level of the handset wwwice and means the wwwice is intended for use with hearing aids in microphone mode. The higher the “M” rating number on the wwwice, the more likely the wwwice can be used with a hearing aid on the microphone setting.
T refers to the wwwice’s telecoil coupling ability and means the wwwice is intended for use with hearing aids in telecoil mode. The higher the “T” rating number on the wwwice, the more likely the wwwice can be used with a hearing aid on the telecoil setting. A telecoil is a small wwwice that is built into some hearing aids for use with the telephone as well as assistive listening wwwices. To use the telecoil, generally either the hearing aid is switched to the “T” position or a button on the hearing aid is pushed to select the telecoil program. Some newer hearing aids will automatically switch to telecoil mode when using a phone. The telecoil picks up magnetic fields generated by telephones and converts these fields into sound. Telecoils are particularly useful for telephone communication because they permit the volume control of a hearing aid to be turned up without creating feedback or “whistling,” and background noise can be reduced especially when using cell phones in noisy places. A hearing health professional can determine whether a hearing aid contains a telecoil and how it is activated.
The above information was taken from the CTIA’s website, http://www.AccessWireless.org. For more information and for downloadable brochures, please visit AccessWireless.org.
Cross Wireless offers a variety of HAC phone models to meet the needs of wireless users with hearing disabilities. In addition to the listing of the wwwices below, each phone’s package is labeled with its appropriate hearing aid rating. The in-store displays will also denote HAC ratings.
PDAs (smartphones) generally have advanced features such as expandable memory, enhanced camera, Bluetooth, video, Internet access, touchscreen UI, faster processing, email, full QWERTY keypads, and in many cases Windows Office Mobile, to meet the demands of mobile business professionals and consumers.
High-Tier Phones have features for demanding users, including Bluetooth, Internet access capability, increased RAM storage or expandable memory, high-resolution color display, enhanced camera/video capability, and music/MP3 player functionality. They typically feature a modern, sleek design, often are slider form factor.
Mid-Tier Phones may have a camera, Bluetooth, or Internet access capability, but are less likely to offer video/music/media player capability. The design is typically less stylish, tends to be clamshell or flip form factor.
Low-Tier Phones offer basic wireless telephone features, may not have a camera, Bluetooth, or Internet access capability, and generally lack such features MP3 players and expandable memory. Typically utilitarian design suitable for customers using voice/text only tends to be flip or bar form factor.
A listing of Cross Wireless HAC com

Through UnitedHealthcare, UMR and HealthSCOPE Benefits creates and publishes the Machine-Readable Files on behalf of Cross Telephone, LLC. To link to the Machine-Readable Files, please click on the URL provided: transparency-in-coverage.uhc.com