Comcast Corporation (NASDAQ:CMCSA) is still having less than-consumer-friendly practices even though it has been striving to recover on its reputation. Some of these practices include capping data for its broadband customers. However, the Company is telling people that it doesn’t cap data while at the same time explaining that its practices.
More often than not, these practices will either reduce data after the usage of a specified amount or charge more for the surpassing threshold. Speaking to Ars Technician David Cohen, the Executive Vice President said that the Company was not doing the cap business anymore.
Comcast’s approach then was very clear, and it was to successfully offer unlimited usage of its services which would enable its customers who to purchase as much data as they wanted.
Apparently even as the Company claims that data caps do not exist, its Florida Customers can buy their way round them after a monthly payment of $30 for unlimited data.
Now, the big question is, how does Comcast use data caps yet they aren’t widespread? Different markets are in the testing phase event though the rules do not apply equally to the markets.
As part of their monthly pay, Comcast Corporation (NASDAQ:CMCSA) is offering its data caps users 250 to 300GB of data and in the event one exceeds the access is charged an additional fee or it’s shut off. Nevertheless, the Company has not been implementing the caps hence a majority of customers have been exceeding the cap even up to three months.
The Company is now planning to expand its data caps across the entire territory even though it still insists that they are not data caps. Cohen says that the Company is optimistic that in five years’ time, it will have developed a billing model that will be rolled out across the region.
The new plan of offering unlimited data is silently being tried in Florida. However, Comcast Corporation (NASDAQ:CMCSA) would consider dropping the caps in the event customers do not exceed the data allocations. Instead, it should probably devise another way of handling network abusers.