Solving the SMS Revenue Leakage Challenge

Size: px
Start display at page:

Download "Solving the SMS Revenue Leakage Challenge"

Transcription

1 Whitepaper Table of Contents 1 Background 2 SMS fraud technical overview 3 Affected parties 4 Common methodologies 5 Ways to control the different types of SMS fraud Solving the SMS Revenue Leakage Challenge Background As mobile device usage became ubiquitous, marketing efforts to reach this population segment exploded. Companies burst onto the mobile marketing scene attempting to carve out a unique position, niche or vertical. Venture Capital funds fuelled such a growth of players in this arena so that keeping track of who was doing what became difficult. The Lumascape below from Luma Partners illustrates this sudden complexity in the mobile advertising or mobile marketing ecosystem. Figure 1 Sample of the complexity of companies in the mobile marketing ecosystem SMS messages are typically read almost immediately and responded to very quickly which is normal user behaviour on the mobile. However, for mobile marketers, this makes SMS-based marketing a very powerful tool to exploit. As a result, there has been a wide range of activity to provide SMS based marketing across the entire mobile marketing ecosystem. The majority of this activity has been legitimate and within acceptable standards of behaviour, but sometimes it crosses the line of legitimacy or blurs the distinction of what is acceptable and what is not. This is especially true when it comes to the area of low-cost, bulk SMS delivery. 1

2 Low-cost SMS delivery providers are known as SMS aggregators and there are many legitimate companies in this area. Their primary business model is to send message traffic at a lower price that the network operator s themselves offer. Typically, these companies partner with existing mobile operators to purchase wholesale SMS services at a reduced price that they can then offer to their customers. Mobile operators get a new revenue stream by selling bandwidth on their SS7 network to SMS aggregators and the SMS aggregators re-sell that bandwidth to their customers. The quality of service (such as SMS delivery success rate) is not always guaranteed, as these companies offer different levels of price/performance, depending on the type of connection and agreement they have with the mobile operators. This puts tremendous pricing pressure on the aggregators to seek every opportunity to optimise wherever they can. While this does not always result in illegal activities, sometimes the pressure does result in pushing the boundaries of what is lawfully allowed. Figure 2 Bulk SMS equipment for sale on Alibaba SMS fraud technical overview Let s outline the technical aspects behind SMS fraud to help set the stage on how it occurs and can be addressed. At the highest quality level, SMS aggregators may have a direct connection to the mobile operator s SS7 network via a special signalling gateway. This direct connection to the SS7 network is what enables SMS aggregators to provide a level of quality assurance to their customers. SMS aggregators may also have an indirect connection to the SS7 network via a mobile operator s SMS centre. This kind of SMS connection is typically less expensive than a direct connection but provides a lower delivery rate or less delivery assurance. 2

3 Affected parties As a result of the tremendous pricing pressure on the aggregators to be able to provide up to 75% discount SMS pricing or even free SMS, some SMS aggregators rely on indirect connectivity known as grey routes or make use of SIM farms. The SIM farm is explained a bit further on. SMS marketers may be lured into using an SMS aggregator that may not have a proven track record or simply provide low quality services. For the SMS marketers, the consequences of using an unproven aggregator may be: Marketing funds might result in messages not being sent and the funds be unrecoverable if the SMS service provider is secretly blocked for fraudulent activities The SMS delivery rate may not be constant or even worse, sporadic if the service provider is not able to provide a service level guarantee that they can deliver The SMS service provider may actually pirate the marketer s own customer list and expose them to uncontrolled fake, fraud or spam activity. Mobile operators, on the other side, might also suffer depending on network infrastructure and interconnect agreements with consequences such as: An imbalance in SMS interconnect traffic, resulting in high costs caused by the volume of targeted subscribers exceeding the volume of the operator s subscriber base SMS revenue leakage as a result of SMS traffic not being properly charged due to the exploited interconnect routes Negatively affected brand image caused by unsolicited volumes of SMS traffic addressed to either its own subscribers or towards the other mobile operators. The subscriber or end-user is also negatively affected by: Unsolicited messages in the form of fakes; fraud or spam is considered harassment and intimidation Fraudulent fees or charges by mistakenly engaging premium rate services Mistakenly led to divulge or make use of the subscriber s contact list Having the subscriber s handset taken out of service by being flooded or subjected to denial-ofservice techniques. The two major vectors of fraud in the SMS world are where the majority of activity and headaches originate are grey routes attacks and SIM farms attacks. 3

4 Common methodologies SIM Farms By definition, a SIM Farm is a computer connected to a bank of hundreds of mobile phones SIM cards. Each of the SIM cards is an account on mobile network operator that offers the tariff needed by the SMS service provider. Routinely the tariff exploited is an unlimited SMS bundle. The SIM farm computer then cycles through the bank of SIM cards to send bulk the SMS traffic exploiting the operator s consumer based tariffs. Figure 3 Sample SIM farm appliance The use of SIM Farms is an example of how bulk SMS service providers push the limits of the law. This method of SMS delivery is not technically illegal but clearly a breach of the operator s intent with a consumer based tariff. In many cases, the term and conditions forbid unlimited SMS bundles being used for advertising, marketing or bulk delivery campaigns. But, the low prices of these tariffs make it attractive for intermediate entities to provide bulk SMS delivery service to SMS aggregators. Grey Routes Mobile operators in different countries use a variety of international telecoms routes to send traffic to each over. These can be grouped into three types known as white routes, black routes and grey routes. White Route A white route is where both the source and destination are standardised legally agreed upon terminations. This generally means the operators have an agreement which outlines the charges and the manner in which SMS traffic will be conveyed over their networks. Black Route Opposed to a white route, a black route is illegal on both source and destination ends. This means that there has not been a contractual agreement between the parties involved to provide SMS traffic and traffic from either party is therefore unlawful over such a route. Grey Route The last route type is referred to as grey route but also referred to as special carrier arrangements, settlement by-pass or other unclear terms used by different groups. A grey route is generally defined as a legal connection on one end but prohibited at the other end i.e. origination or termination. Grey routes are another way that bulk SMS service providers push the limits of the law. Not only do they present legal issues, they are difficult to evaluate, monitor and control and come with a number of hidden costs. But, due to the low costs involved, they are very appealing to bulk SMS providers. Grey routes are non-interconnected routes currently unused and typically owned by telecommunication providers. Bulk SMS providers exploit the difference in settlement rates, and route traffic via intermediate networks while also re-originating the message to the network it terminates in, making the message appear as national as opposed to international. This allows the bulk SMS provider to incur the lowest cost possible and achieve their delivery needs. 4

5 In order to achieve the price advertised through a grey route, dispatches are run on a single delivery option with no back up, which can ultimately compromise both the message quality and successful delivery. These routes are used without the telecommunications company s knowledge and as a result can be terminated and turned off at any time. This means that any other traffic carried along these routes, even if it is legitimate, may not be delivered to the recipients. Grey routes also present an even bigger threat to business a risk to customer data. Due to the temporary nature of grey routes, it is impossible to guarantee the security of customer data or to track any data breaches. Essentially using a grey route compromises your customer database and puts your company at risk of breaching the data protection act. Ways to control the different types of SMS fraud Understanding the complexity of the mobile marketing ecosystem, Acision provides a holistic approach to address the multitude of SMS fraud techniques. The comprehensive solution provides 16 levels of fraud, fakes, spoof and spam control that range from basic functionalities such as blacklisting and whitelisting of originators identifications on various layers of SS7 protocols, to more sophisticated engines that address the volumetric control of SMS traffic based on multiple message parameters. Acision s solution also offers intelligent analytical tools based on traffic patterns detection to help operators minimise their revenue leakage. This allows the operator to quickly respond to the continuous exploitation of weaknesses in the mobile network and mobile devices, Copyright Acision BV All rights reserved. This document is protected by international copyright law and may not be reprinted, reproduced, copied or utilised in whole or in part by any means including electronic, mechanical, or other means without the prior written consent of Acision BV. Whilst reasonable care has been taken by Acision BV to ensure the information contained herein is reasonably accurate, Acision shall not, under any circumstances be liable for any loss or damage (direct or consequential) suffered by any party as a result of the contents of this publication or the reliance of any party thereon or any inaccuracy or omission therein. The information in this document is therefore provided on an as is basis without warranty and is subject to change without further notice and cannot be construed as a commitment by Acision BV. An important element of the mechanisms offered with Acision s SMS Revenue Assurance proposition is the accuracy of fraud detection, reducing the chance of false positives. Improving accuracy further that is achieved via online detection, off-line reporting gives additional insights. Using both the off and online detection mechanisms, provides a comprehensive protection from revenue leakage. Operator experience and our research clearly demonstrate that closing fraudulent access allows the operator to: Minimise direct revenue leakage Encourage legitimate channels improving revenue potential Ensure market pricing is enforced and maintained Revenue potential is greatly improved when SMS marketers interested in quality of service start accessing the network infrastructure directly. The products mentioned in this document are identified by the names, trademarks, service marks and logos of their respective companies or organisations and may not be used in any advertising or publicity or in any other way whatsoever without the prior written consent of those companies or organisations and Acision BV. 5714/v3 5

Control Traffic from Grey Routes and Boost Enterprise Messaging Revenue

Control Traffic from Grey Routes and Boost Enterprise Messaging Revenue SAP Brief SAP Mobile Services SAP SMS Firewall 365 Objectives Control Traffic from Grey Routes and Boost Enterprise Messaging Revenue Cloud-based managed service helps control messaging abuse Cloud-based

More information

Two-Factor Authentication: Tailor-Made for SMS

Two-Factor Authentication: Tailor-Made for SMS SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication: Tailor-Made for SMS Exploring Myths, Misconceptions, and Best Practices for SMS-Based 2FA Table of Contents 4 Understanding Two-Factor

More information

Opportunies in IP Messaging

Opportunies in IP Messaging Whitepaper Opportunies in IP Messaging Table of Contents 1 Changing one thing changes everything 2 Competing for the new customer 3 Enabling SMS and MMS in LTE and networks 4 Enabling SMS in IP networks

More information

Protecting Mobile Networks from SS7 Attacks. Telesoft White Papers

Protecting Mobile Networks from SS7 Attacks. Telesoft White Papers Protecting Mobile Networks from SS7 Attacks Telesoft White Papers Christian Feest 23rd June 2015 SS7 Networks The Challenge The problem with the current SS7 system is that messages can be altered, injected

More information

GOSFIELD NORTH COMMUNICATIONS CO-OPERATIVE LIMITED ( GOSFIELD ) ACCEPTABLE USE POLICY

GOSFIELD NORTH COMMUNICATIONS CO-OPERATIVE LIMITED ( GOSFIELD ) ACCEPTABLE USE POLICY GOSFIELD NORTH COMMUNICATIONS CO-OPERATIVE LIMITED ( GOSFIELD ) ACCEPTABLE USE POLICY 1. Introduction This acceptable use policy ("Policy") sets out the principles, terms and conditions that govern the

More information

As threat actors target various types of networks, companies with improperly configured network infrastructures risk the following repercussions:

As threat actors target various types of networks, companies with improperly configured network infrastructures risk the following repercussions: TrendLabs Targeted attacks often employ tools and routines that can bypass traditional security and allow threat actors to move deeper into the enterprise network. Threat actors do this to access data

More information

29.09.2015. Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy

29.09.2015. Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy 29.09.2015 Digital Communications Exploring SS7 signaling fraud that threatens mobile Mobile communications is a prime target for hackers who desire to penetrate critical infrastructures and businesses

More information

Web Drive Limited STANDARD TERMS AND CONDITIONS FOR THE SUPPLY OF SERVICES

Web Drive Limited STANDARD TERMS AND CONDITIONS FOR THE SUPPLY OF SERVICES Web Drive Limited STANDARD TERMS AND CONDITIONS FOR THE SUPPLY OF SERVICES Web Drive Limited trading is herein referred to as "Web Drive". 1. Definitions a) Web Drive includes its employees and directors.

More information

Fighting the threat of SIM boxes to A2P SMS revenues

Fighting the threat of SIM boxes to A2P SMS revenues Fighting the threat of SIM boxes to A2P SMS revenues 02 INTRODUCTION Mobile operators increasingly find themselves having to compensate for declines in revenue streams that were once reliable. No greater

More information

Battling illegal call operations with Fraud Management Systems

Battling illegal call operations with Fraud Management Systems Battling illegal call operations with Fraud Management Systems 02/12 Battling illegal call operations with Fraud Management Systems Executive summary Contents 02 Executive summary 03 Compare: ratio of

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance

More information

CENTURY 21 CANADA LIMITED PARTNERSHIP WEBSITE TERMS OF USE

CENTURY 21 CANADA LIMITED PARTNERSHIP WEBSITE TERMS OF USE CENTURY 21 CANADA LIMITED PARTNERSHIP WEBSITE TERMS OF USE THESE TERMS OF USE CONTAIN LEGAL OBLIGATIONS. PLEASE READ THESE TERMS OF USE BEFORE USING THIS WEBSITE. Acceptance of these Terms of Use and any

More information

RELOCATEYOURSELF.COM B.V - TERMS OF USE OF SERVICES

RELOCATEYOURSELF.COM B.V - TERMS OF USE OF SERVICES RELOCATEYOURSELF.COM B.V - TERMS OF USE OF SERVICES The following constitute the terms and conditions of access and use of the Services, as defined hereunder, which shall be deemed to have been read and

More information

fraud & billing For example, Layer4 will identify: Compliance of telecom operators with service level agreements

fraud & billing For example, Layer4 will identify: Compliance of telecom operators with service level agreements TELECOM INSIGHT National Regulatory Authorities are faced with many challenges in establishing a national telecoms environment. Paramount is the need to protect revenue for legitimate local telecommunication

More information

Terms of Service. 1. Acceptance Of Terms. 2. Use Of Customer Information And Privacy Policy. 3. Ownership Of Site Content

Terms of Service. 1. Acceptance Of Terms. 2. Use Of Customer Information And Privacy Policy. 3. Ownership Of Site Content Terms of Service 1. Acceptance Of Terms IT4Professionals is an Internet-based Web site that offers webdesign, domain name registration, hosting, dynamic DNS, email and sms marketing, PC services and software

More information

MySeoNetwork Reseller Agreement -Revised June 2, 2006 www.myseonetwork.com (800)893-9750; (410)744-6512

MySeoNetwork Reseller Agreement -Revised June 2, 2006 www.myseonetwork.com (800)893-9750; (410)744-6512 MySeoNetwork Reseller Agreement -Revised June 2, 2006 www.myseonetwork.com (800)893-9750; (410)744-6512 This MySEONetwork Reseller Agreement ("Agreement") is between ICFX Designs, LLC. ("MySEONetwork"),

More information

43% Figure 1: Targeted Attack Campaign Diagram

43% Figure 1: Targeted Attack Campaign Diagram TrendLabs Data exfiltration is the final stage of a targeted attack campaign where threat actors steal valuable corporate information while remaining undetected. 1 43% of most serious threats to the company

More information

Acceptable Use Policy

Acceptable Use Policy Introduction This Acceptable Use Policy (AUP) sets forth the terms and conditions for the use by a Registrant of any domain name registered in the top-level domain (TLD). This Acceptable Use Policy (AUP)

More information

Agreeing to Shortcut Solutions,llc.. Acceptable Use Policy and Terms of Service is mandatory for Hosting signing up or using our services.

Agreeing to Shortcut Solutions,llc.. Acceptable Use Policy and Terms of Service is mandatory for Hosting signing up or using our services. WEB HOSTING AGREEMENT AND TERMS OF SERVICE Shortcut Solutions, llc. --June 2007-- Acceptable Use Policy and Web Hosting Terms of Service Agreeing to Shortcut Solutions,llc.. Acceptable Use Policy and Terms

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table

More information

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT. Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together

More information

Streamlining Web and Email Security

Streamlining Web and Email Security How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor

More information

HTC Communications Acceptable Use Policy High Speed Internet Service Page 1 of 5. HTC Communications

HTC Communications Acceptable Use Policy High Speed Internet Service Page 1 of 5. HTC Communications Page 1 of 5 HTC Communications ACCEPTABLE USE POLICY FOR HIGH SPEED INTERNET SERVICE This Acceptable Use Policy ( AUP ) governs high speed Internet service provided to you by HTC Communications (together

More information

8 Securities Limited ( 8Sec ) reserves the right to update and change the TOS from time to time without notice or acceptance by you.

8 Securities Limited ( 8Sec ) reserves the right to update and change the TOS from time to time without notice or acceptance by you. 1. Acceptance of Terms Welcome to s Social Trading (the Social Trading Features ). Social Trading Features provide an integrated solution of equity trading and exploration of interactions among investors

More information

Connect for new business opportunities

Connect for new business opportunities Connect for new business opportunities The world of connected objects How do we monitor the carbon footprint of a vehicle? How can we track and trace cargo on the move? How do we know when a vending machine

More information

SHORT MESSAGE SERVICE SECURITY

SHORT MESSAGE SERVICE SECURITY SHORT MESSAGE SERVICE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX )

ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX ) ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX ) 1. ACCEPTANCE OF TERMS THROUGH USE This website (the Site ) provides you (the Customer

More information

Terms and Conditions

Terms and Conditions Terms and Conditions 1. About Us 1.1 www.phonefinder.co.za ("the Website") Phonefinder is an online cellular lead generation website, which enables users ("you, your") to enter their contact information

More information

Acceptable Use Policy of UNWIRED Ltd.

Acceptable Use Policy of UNWIRED Ltd. Acceptable Use Policy of UNWIRED Ltd. Acceptance of Terms Through Use This site provides you the ability to learn about UNWIRED and its products and services as well as the ability to access our network

More information

Robinhood Terms & Conditions

Robinhood Terms & Conditions Robinhood Terms & Conditions Robinhood Financial LLC ( Robinhood Financial ), a wholly-owned subsidiary of Robinhood Markets, Inc. ( Robinhood Markets ), is a registered broker-dealer and member of FINRA

More information

Enabling Innovation with KPI-based Service Management Operator Key Performance Indicators (KPIs)

Enabling Innovation with KPI-based Service Management Operator Key Performance Indicators (KPIs) www.pipelinepub.com Volume 5, Issue 5 Enabling Innovation with KPI-based Service Management Operator Key Performance Indicators (KPIs) Operators encounter it daily: They work to provide their subscribers

More information

Nova ADSL Broadband Service Application Form

Nova ADSL Broadband Service Application Form Nova ADSL Broadband Service Application Form User ID (your access login; in lowercase, no more than 30 characters & no punctuation): Contact: Surname: Given Name: Company (optional): Charge Company Address:

More information

Terms and conditions of use

Terms and conditions of use Terms and conditions of use 1. Introduction 1.1 These terms and conditions govern your use of our website. 1.2 By using our website, you accept these terms and conditions in full; accordingly, if you disagree

More information

TERMS OF USE 1. Definitions

TERMS OF USE 1. Definitions TERMS OF USE 1. Definitions This website (website) is owned and operated by BATS Trading Limited a company applying to be authorised and regulated by the Financial Services Authority, whose registered

More information

FAX-TO-EMAIL END-USER LICENSE AGREEMENT

FAX-TO-EMAIL END-USER LICENSE AGREEMENT FAX-TO-EMAIL END-USER LICENSE AGREEMENT This Agreement, which governs the terms and conditions of your use of the Fax-to-Email Services, is between you ("you" or "End-User") and ( we, us, our or Company

More information

Terms of Use Table of Contents 1. General Information 2. Your Agreement to the Terms 3. Changes to the Terms 4. Provision of the Website

Terms of Use Table of Contents 1. General Information 2. Your Agreement to the Terms 3. Changes to the Terms 4. Provision of the Website Terms of Use Table of Contents 1. General Information. 2. Your Agreement to the Terms. 3. Changes to the Terms. 4. Provision of the Website. 5. Location of the Website. 6. User Conduct. 7. Terms Relating

More information

Web. Paul Pajares and Max Goncharov. Connection. Edition. ios platform are also at risk, as. numbers via browser-based social.

Web. Paul Pajares and Max Goncharov. Connection. Edition. ios platform are also at risk, as. numbers via browser-based social. RESEARCHBRIEF Fake Apps, Russia, and the Mobile Making the SMSS Fraud Connection Paul Pajares and Max Goncharov Web News of an SMS fraud service affecting many countries first broke out in Russia in 2010.

More information

The Advantages of a Firewall Over an Interafer

The Advantages of a Firewall Over an Interafer FIREWALLS VIEWPOINT 02/2006 31 MARCH 2006 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to the Centre for the Protection

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

Maximising supply chain throughput with existing infrastructure

Maximising supply chain throughput with existing infrastructure Maximising supply chain throughput with existing infrastructure Improve customer service without capital outlay 1 the CHALLENGE SUPPLY CHAIN AND LOGISTICS Increasing global complexity and uncertainty is

More information

Communications Fraud Control Association. 2013 Global Fraud Loss Survey

Communications Fraud Control Association. 2013 Global Fraud Loss Survey Communications Fraud Control Association 2013 Global Fraud Loss Survey Overview Survey Type & Methodology Executive Summary Results Fraud Management Snapshot Top Fraud Methods & Types Top Countries Where

More information

You must not: (a) Copy and republish material from this website (including republication on another website);

You must not: (a) Copy and republish material from this website (including republication on another website); Terms of Use (1) Introduction These terms of use govern your use of our website; by using our website, you accept these terms of use in full. If you disagree with these terms of use or any part of these

More information

Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law

Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law Terms and Conditions Acceptable Use Policy Introduction (hereafter called Hosted Developments) has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources, and the resources

More information

Symantec Protection Suite Add-On for Hosted Email and Web Security

Symantec Protection Suite Add-On for Hosted Email and Web Security Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication

More information

VERISIGN OPENHYBRID CLOUD SIGNALLING API SPECIFICATION

VERISIGN OPENHYBRID CLOUD SIGNALLING API SPECIFICATION TECHNICAL PAPER VERISIGN OPENHYBRID CLOUD SIGNALLING API SPECIFICATION Version 1.0 January 2015 VerisignInc.com LEGAL DISCLAIMER COPYRIGHT NOTIFICATION Copyright 2015 VeriSign, Inc. All rights reserved

More information

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer 1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright

More information

COLOCATION AGREEMENT. 1. Term and Payment for Services

COLOCATION AGREEMENT. 1. Term and Payment for Services COLOCATION AGREEMENT This Colocation Agreement ( Agreement ) governs your purchase and use of all colocation and related services (the Services ), as described in the Order Form, that you order and Oracast,

More information

STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES

STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES Star has adopted this Acceptable Use Policy ( AUP ) to outline the acceptable use of Star s Broadband Internet

More information

LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY

LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY 1. Introduction LETABA WIRELESS INTERNET CC is committed to complying with legislation and ensuring that all its customers have the ability to use its

More information

IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE.

IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE. Terms & conditions for the use of this Website IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE. By using this website you are deemed to have full

More information

INSTANT MESSAGING SECURITY

INSTANT MESSAGING SECURITY INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part

More information

Business User Agreement

Business User Agreement Business User Agreement Star Telephone Membership Corporation will provide Star Telephone FireLine DSL Service to on the terms and conditions listed below. Star Telephone FireLine DSL Service will be delivered

More information

Computer Scene Technical Ltd ("We") are committed to providing the best service and protecting & respecting all our customers.

Computer Scene Technical Ltd (We) are committed to providing the best service and protecting & respecting all our customers. Computer Scene Technical Ltd ("We") are committed to providing the best service and protecting & respecting all our customers. INFORMATION ABOUT US Our site is operated by Computer Scene Technical Ltd

More information

TRIPLE PLAY SERVICES ACCEPTABLE USE POLICY

TRIPLE PLAY SERVICES ACCEPTABLE USE POLICY TRIPLE PLAY SERVICES ACCEPTABLE USE POLICY 1. INTRODUCTION 2. GENERAL 3. USENET POSTINGS 4. ACCOUNT AND NETWORK SECURITY 5. ELECTRONIC MAIL 6. PROTECTION OF NETWORK PERFORMANCE 7 PERSONAL HOME PAGES 8.

More information

We suggest you retain a copy of these End User Terms of Use for your records.

We suggest you retain a copy of these End User Terms of Use for your records. END USER TERMS OF USE The use of Incident Response Technologies Inc. s ("IRT") Software is offered to you upon your acceptance of these End User Terms of Use. By using IRT s software (the Software ), you

More information

Acceptable Use Policy ("AUP")

Acceptable Use Policy (AUP) Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while

More information

IT IS IMPORTANT THAT YOU READ ALL THE TERMS AND CONDITIONS CAREFULLY.

IT IS IMPORTANT THAT YOU READ ALL THE TERMS AND CONDITIONS CAREFULLY. Master Terms of Use IT IS IMPORTANT THAT YOU READ ALL THE TERMS AND CONDITIONS CAREFULLY. This Terms of Use Agreement (this Agreement) states the terms and conditions under which you may access and use

More information

Virgin Media Business Acceptable Use Policy (Internet)

Virgin Media Business Acceptable Use Policy (Internet) Virgin Media Business Acceptable Use Policy (Internet) 1 Introduction 1.1 This Acceptable Use Policy ( AUP ) specifies actions prohibited by Virgin Media Business to users of the Internet Services (in

More information

TELECOM FRAUD CALL SCENARIOS

TELECOM FRAUD CALL SCENARIOS TELECOM FRAUD CALL SCENARIOS Contents Introduction to Telecom Fraud... 2 Three Major Categories of Telecom Fraud... 2 Premium Rate Numbers... 2 Traffic Pumping Schemes... 2 Call Forwarding Fraud... 3 Multiple

More information

Protect Your Customers and Brands with Multichannel Two-Factor Authentication

Protect Your Customers and Brands with Multichannel Two-Factor Authentication SAP Brief Mobile Services from SAP SAP Authentication 365 Objectives Protect Your Customers and Brands with Multichannel Two-Factor Authentication Protecting your most valuable asset your customers Protecting

More information

App Terms and Conditions!

App Terms and Conditions! 1. INTRODUCTION App Terms and Conditions Thank you for purchasing the App or Apps herein now referred to collectively or individually as (the App ). The App is published by or on behalf of Complexus (Pty)

More information

HP Agile and Innovative Solutions for Service Providers. Teaming with Microsoft for next-generation solutions. HP Services

HP Agile and Innovative Solutions for Service Providers. Teaming with Microsoft for next-generation solutions. HP Services HP Agile and Innovative Solutions for Service Providers Teaming with Microsoft for next-generation solutions HP Services Meeting the demands of a challenging market In competitive business environments,

More information

Acceptable Use Policy - NBN Services

Acceptable Use Policy - NBN Services OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 [email protected] www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:

More information

TERMS OF USE. Last Updated: October 8, 2015

TERMS OF USE. Last Updated: October 8, 2015 1666 K Street, N.W. Washington, DC 20006 Telephone: (202) 207-9100 Facsimile: (202) 862-8430 www.pcaobus.org TERMS OF USE Last Updated: October 8, 2015 This Terms of Use Agreement (this "Agreement") is

More information

A Review of Mobile Messaging Use Cases

A Review of Mobile Messaging Use Cases SAP Thought Leadership Paper SAP Mobile Services A Review of Mobile Messaging Use Cases Guidelines for Today s Ever-Changing Messaging Ecosystem Table of Contents 4 Introduction 5 Validation and Two-Factor

More information

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is. TrendLabs Everyone s online, but not everyone s secure. It s up to you to make sure that your family is. We live out our digital lives on the Internet. There, communication is quicker and easier, and our

More information

Definitions. Broker means Veda Advantage Information Systems and Solutions Limited;

Definitions. Broker means Veda Advantage Information Systems and Solutions Limited; Definitions Authorised Purposes means: (a) dealings with interests in land authorised by Law; or (b) a purpose directly related to such dealing provided that the purpose is not contrary to any Law; or

More information

WCCM XII & APCOM VI Secretariat is in Seoul. Your use of http://wccm2016.org will always be

WCCM XII & APCOM VI Secretariat is in Seoul. Your use of http://wccm2016.org will always be Terms & Conditions Table of Contents 1. General Information. 2. Your Agreement to the Terms. 3. Changes to the Terms. 4. Provision of the Website. 5. Location of the Website. 6. User Conduct. 7. Terms

More information

maintain and enforce on its user clients an acceptable use policy similar in scope and intent to this Acceptable Use Policy.

maintain and enforce on its user clients an acceptable use policy similar in scope and intent to this Acceptable Use Policy. CTC Acceptable Use Policy Consolidated Telephone Company doing business as Consolidated Telecommunications Company (CTC) has adopted this Acceptable Use Policy to encourage the use of its network and services

More information

The new role of billing systems in the Internet of Things

The new role of billing systems in the Internet of Things The new role of billing systems in the Internet of Things The Internet of Things (IoT) can be described as a multitude of connections between various computing devices connected to the Internet. A new

More information

1.2: The name the shellies includes theshellies.co.uk.

1.2: The name the shellies includes theshellies.co.uk. Welcome to our web site and blog. If you continue to browse and use our blog and web site you are agreeing to comply with and be bound by the following terms. Together with our Privacy Policy these terms

More information

MNI Networks Limited Acceptable Use Policy

MNI Networks Limited Acceptable Use Policy This Acceptable Use Policy ("AUP") sets out the actions prohibited to users of the MNINET Network ( MNINET ). Users are defined as anyone who uses or accesses the.ms domain registry, who has responsibility

More information

GlaxoSmithKline Single Sign On Portal for ClearView and Campaign Tracker - Terms of Use

GlaxoSmithKline Single Sign On Portal for ClearView and Campaign Tracker - Terms of Use GlaxoSmithKline Single Sign On Portal for ClearView and Campaign Tracker - Terms of Use IMPORTANT! YOUR REGISTRATION AND USE OF THIS GlaxoSmithKline Single Sign On Portal for ClearView and Campaign Tracker

More information

3. DUTIES: The following duties shall be required of Agent: No minimum production level set

3. DUTIES: The following duties shall be required of Agent: No minimum production level set Business Finance Agent Agreement This Agreement is between The Business Finance Store ("Company") a division of FinanceMark Inc. a Nevada Corporation and you, referred to as Agent from this point forth.

More information

Acceptable Usage Policy

Acceptable Usage Policy Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...

More information

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...

More information

When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher

When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher TrendLabs When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher Advanced persistent threats (APTs) refer to a category

More information

Reference Architecture: Enterprise Security For The Cloud

Reference Architecture: Enterprise Security For The Cloud Reference Architecture: Enterprise Security For The Cloud A Rackspace Whitepaper Reference Architecture: Enterprise Security for the Cloud Cover Table of Contents 1. Introduction 2 2. Network and application

More information