Based on the preliminary results of our ongoing investigation, Commission staff is of the belief that Rogers Communications Inc. (â€œRogersâ€) applies a technical ITMP to unidentified traffic using default peer-to-peer (â€œP2Pâ€) ports. On the basis of our evidence to date, any traffic from an unidentified time-sensitive application making use of P2P ports will be throttled resulting in noticeable degradation of such traffic.
The CRTC notes that prior approval is required for degradation of time sensitive traffic and gives Rogers two weeks to rebut the evidence or become compliant with the law. The case highlights a newfound willingness by the CRTC to investigate and enforce the net neutrality rules with full research into the effect of Rogers’ traffic shaping practices. This represents a major step forward as it sends a clear message – after several years of doubt – that the CRTC is prepared to enforce the net neutrality rules. Given the recent announcement that Bell is abandoning traffic shaping, the question is whether Rogers will follow suit or drag out the process by facing CRTC enforcement and further user complaints.