A Plan For Robocalls: Robosmelter

Size: px
Start display at page:

Download "A Plan For Robocalls: Robosmelter"

Transcription

1 A Plan For Robocalls: Robosmelter Ben Klang, Sene Sorrow Mojo Lingo LLC January 17, 2013 Submitted to the Federal Trade Commission s Robocall Challenge Abstract The rise of Voice over IP (VoIP) technologies has lead to an explosion in the utility and ease of communication offered by the telephone network. However, every powerful tool has the potential to become a powerful weapon. Illegal robocall telemarketers have seized on this and are using the dramatically low cost of VoIP calling to barrage consumers with illegal robotic calls. This document outlines an approach, called Robosmelter, using software and machine learning techniques to dramatically reduce the number of such illegal calls that ring the consumer s phone, while not interfering with the consumer s normal use and enjoyment of his or her phone.

2 Terms Consumer: An individual (not a business or other organization) who has telephone service, whether landline or mobile User: A consumer who has activated our proposed software application to filter their calls Carrier: A telecommunications service provider, including landline telephone, mobile telephone, or Voice over IP (VoIP) telephone service. Illegal Robocalls: Illegal automated telephone calls directed at Consumers. This excludes legal automated telephone calls, such as those by political candidates, charities, surveys, and other legally permissible calls. Robosmelter: Our proposed software system for identifying, learning, and blocking illegal robocalls. Robosmelter Proposal Summary Illegal robocalling is a complex problem that will be impossible to solve completely without sweeping changes to the technology, public policy, and cost/revenue structures that underpin

3 the public telephone network. However, using modern technology, we can enable consumers to more quickly identify and block illegal robocalls before the call rings the consumer s device. The decision to block any given call is made using a combination of technologies that are familiar to those who have worked to fight unsolicited commercial honeypots, statistical and crowdsourced analyses, rolling blacklists, exempting whitelists, and tarpitting. Just as is true with , for the technology to be effective it must be accurate and it must be very easy to use for the consumer. This proposal focuses on the following four goals: 1. It should be easy for the consumer to adopt and use 2. It should not require unreasonable effort by telephone carriers to install and maintain 3. It should work on any telephone connected to the PSTN (landline, mobile, voip) 4. It should stop a large percentage of illegal / spam calls today The blocking mechanism is designed to be under the full control of the user;; he or she may enable or disable it at any time. Control of Robosmelter by the user may be via text message

4 interaction (if using a mobile phone) or via web browser from any internet connected computer. Further, several optional blocking measures may be selected or deselected to change how calls are selected to be blocked. But even if the user takes no further action than simply enabling the service (which will be no more difficult than adding a number to the FTC s Do Not Call Registry), the application will still be able to stop a significant portion of illegal robocalls. Because the information about illegal robocalls is shared anonymously throughout the system, the entire system benefits from the activities of the active users. The proposed software works by analyzing the behavior of all calls that reach the users. Based on their behavior, we assign a score indicating the probability that each individual call is an illegal robocall. The scores for all users of Robosmelter are collected and merged in real-time to calculate a score indicating the probability that calls from a given telephone number are likely to be a illegal robocall. Once the score rises above a predetermined (and adjustable) threshold, further calls from that number to users of the application are stopped by the application. The authors of this proposal realize that most countermeasures are possible to circumvent by organizations which have no regard for the law. In the section Closing the Loopholes we discuss longer term solutions to mitigate the weaknesses that are left by this proposal. We have not included them in the body of the main proposal because of the effort required to deploy them. The focus is on improving the current situation, while opening the door to deeper, more fundamental changes that may eliminate illegal robocalls entirely in the future. One last note on the validity of using caller ID as a blocking source: based on complaint data gathered by the FTC and shared as a part of this Robocall Challenge, we, the authors of this document, observed that most robocallers reuse caller ID extensively. Of approximately 701,821 complaints during the year 2012, approximately 57,000 reported no caller ID. This may be because the consumer failed to report the information, or because the robocaller made the call without supplying caller ID. For the top 100 individual caller IDs, there were more than 1,000 complaints made for each number. The top 10 individual caller IDs accounted for over 50,000 complaints, with the absolute top offender single-handledly being responsible for 16,234 complaints alone. Since we know that not all consumers report illegal robocalls, just blocking these top 100 caller IDs would result in more than a 60% reduction of the number of robocalls received by consumers. Based on this information (as seen in the graph) the majority of complaints came from a strong minority of distinct caller IDs.

5 Assumptions 1. While Caller ID is trivially spoofed, it remains the only method by which calls may be identified at the terminating telephone carrier before they reach the consumer. Further, empirical evidence and data from the FTC indicates that Caller ID spoofing is used today primarily to hide the identity of the caller, and is often not changed from one individual call to the next. Thus, if we can determine the current Caller ID for a given illegal robocall campaign, we can stop a large number of calls from reaching consumers by blocking calls from that number for a period of time. 2. Originating carriers have little incentive to stop calls leaving their network, and in fact may open themselves to liability for failing to complete calls as required by contract or law. Thus, the most effective place to install a call block is within the consumer s telephone carrier (where the consumer/call recipient may directly authorize such blocking) or in the consumer s device. 3. Due to the requirements of scale, illegal robocall telemarketers are vulnerable to any increase in the per-call or per-minute costs associated with their operation. Any measures taken to drive up those costs negatively impact their ability to function. Technical Description The central goal of the service is to block a call before it rings the consumer s device. To make such a decision requires collecting a large amount of information and processing that information in real-time. There are several ways we can collect information about whether a given call is an illegal robocall or not: By asking the consumer (either during or after a call has taken place) By examining patterns in call behavior (call source, duration) By examining the call contents (identifying audio characteristics, repetitive phrases) To collect the required information and take the appropriate action, we propose installing software that runs inside the carrier s network. This software may be operated by the carrier itself, or by a third party service provider. In both cases, it is important to note that the software is operating at the direction of the consumer, not the carrier or the third party service provider. This distinction allows the software to act in the consumer s best interest and alleviates any potential liability concerns that may be raised by carriers refusing to connect any calls. The application works in three phases: 1. Identification 2. Learning 3. Blocking (with optional Tarpitting) In the first phase, Identification, the application is attached to the user s account and begins observing phone calls that the user receives. When a call comes in, the application looks for several behaviors during the course of that call which may indicate an illegal robocall. Several

6 key behaviors have already been identified, including audio characteristics of the call, short call duration resulting from the user hanging up, and others. The information and metrics applied to the call come from a shared database of all users of the application. In this way users will be able to share information about illegal robocalls quickly and effortlessly. Robosmelter then assigns a score for the call, based on these and other criteria, as to how confident it believes the current call is likely to be an illegal robocall. In the second phase, Learning, users may provide feedback to the application to correct and improve the scores assigned by the application to individual calls. For example, if a user receives a call from caller ID and the application assigns a score of 40% (below the blocking threshold of 65%), the user may notify the application that the call was, in fact, an illegal robocall. The application takes this information and updates its database to indicate that the observed call characteristics and the caller ID was associated with an illegal robocall. As other users do the same, the score for calls coming from that caller ID will go up. Over time this will cause the score to rise above the blocking threshold, and the application will no longer allow calls from this number to reach users. By using crowdsourcing techniques, we can determine which calls to block from reaching users of Robosmelter. In the third phase, Blocking, the combined score from all users within the system is consulted each time a call is attempted to a user. If the score is above a predetermined threshold (or, a threshold as specified directly by the user), the call is blocked. Optionally, Robosmelter may tarpit the call. This means that the line will be answered by the application (without passing the call along to the user), and the line will be left open as long as it is not disconnected by the caller. In this way, illegal robocallers are forced to use more time and more channels talking to dead air. This has the effect of raising their incremental cost and consuming channels, reducing the number of calls they are able to make. Advanced users may wish to enable additional, more aggressive blocking features. While we anticipate that the default choices will dramatically reduce the number of illegal robocalls that actually make it to a consumer s device, there are additional policies that consumers may elect to more aggressively block calls. These options include: Blocking toll-free numbers Blocking calls without caller ID information Blocking calls from foreign countries Honeypots and Fully Automatic Detection Since illegal robocallers often dial sequential telephone numbers looking for more targets, we may use this behavior to help identify certain illegal robocallers. Carriers may assign unallocated numbers to be handled by Robosmelter. Whenever the system receives a call to one of these parked numbers, it can emulate a human and listen to the call. By analyzing the call audio, a fully automatic decision may be made as to whether the call is robotic. By using speech recognition technologies, keywords within the call may be identified which can be used

7 to influence the determination whether the call is an illegal robotic sales call. For example: If a particular parked number has been out of service for more than 18 months, which corresponds to the legal robotic calling period for legal robocalls from business that have a relationship with the consumer, and the system can detect a sales attempt, it can assign a high probability that the call is illegal and assign a score to the caller ID appropriately. Alternatively, Robosmelter can look for the same recording to be played to many parked telephone numbers. Once identified, such recordings may be reviewed by a human (either a person responsible for the maintenance of the system, or perhaps even by enlisting support from users of the system directly) and use their determination to raise or lower the score of that call. Exempting Legal Robotic Calls A careful read of the above paragraphs may lead to the conclusion that users will begin to block legal robocalls, such as those by political candidates or charitable organizations. This is definitely possible, as the system as described lacks an ability to tell the difference. To prevent it from blocking legal calls, a whitelist mechanism would be instituted. In order to ensure that legal robocalls are passed through the application, legitimate robocallers would be required to register their caller ID and then to make all their calls from the registered number. The application s whitelist would take precedence over the score and over-all user-activated blocking options, allowing these legal robocalls to be completed. Deployment Considerations The easiest place to gather the information described above is within the consumer s direct telephone service provider. Collecting this information usually requires the consent of the consumer so as not to run afoul of wiretap laws. It is our proposal that software be installed into the carrier s network to enable consumer-approved monitoring of phone calls to collect that information. Such software is already commercially available;; in the United States, AT&T has already deployed what they term Call Management APIs which provide sufficient access to mobile phone calls to enable this kind of service. Small mobile phone networks, known in the industry as Mobile Virtual Network Operators (MVNOs) also have the ability to add applications that interact directly with the consumer s telephone calls. The advantage of MVNOs is one of size and agility: new services may be prototyped and deployed within months or even weeks. While not as seamless, other commercial services such as Google Voice and over-the-top services such as Tropo and Twilio allow applications to broker telephone calls, enabling similar analysis. Closing the Loopholes The proposed solution relies heavily on caller ID as the mechanism by which calls may be identified. Data from the Federal Trade Commission backs up the assertion that caller ID is a valid way to identify likely illegal robocalls. However, as caller ID is easy to spoof, further measures (beyond the technology-based focus of this proposal) should be considered in an effort to reduce ease of falsifying caller ID. These measures may include: 1. Fines for carriers who do not take reasonable measures to ensure that valid caller ID is

8 transmitted by telephone calls originating in their network. This shifts some liability to originating carriers, providing financial incentive to ensure that caller ID is valid at the point it enters the network 2. Stronger, possibly cryptographic, verification for Voice over IP calls. Several proposals exist here. See the slides from the FTC Robocall Summit Panel for an overview of some options: f 3. Adding additional secured metadata to telephone calls to reduce the dependence on caller ID as the only information about the source of a call. This mostly applies to Voice over IP calling (potentially in the form of SIP headers or other in-band information) Contact Information Ben Klang, Principal/Technology Architect Sene Sorrow, General Manager Mojo Lingo LLC

Bob Gnapp Director Member Training & Network Analysis

Bob Gnapp Director Member Training & Network Analysis Robocalls and Spoofing Bob Gnapp Director Member Training & Network Analysis rgnapp@neca.org 303-893-4415 This presentation may be used by attendees for informational purposes only. No part of this presentation

More information

The Spoofing/Authentication Threat

The Spoofing/Authentication Threat The Spoofing/Authentication Threat An Analysis of the Spoofing/Authentication Threat in Voice Network Security A Whitepaper From SecureLogix Corporation Introduction Spoofing refers to the act of intentionally

More information

Robocalls and Rural Call Completion Issues

Robocalls and Rural Call Completion Issues Robocalls and Rural Call Completion Issues Bob Gnapp Director Member Training & Network Analysis rgnapp@neca.org 303-893-4415 Copyright 2018 National Exchange Association, Inc. All rights reserved. This

More information

CLIENT MEMORANDUM. Federal Trade Commission s Rule for Prerecorded Message Telemarketing Calls

CLIENT MEMORANDUM. Federal Trade Commission s Rule for Prerecorded Message Telemarketing Calls CLIENT MEMORANDUM From: West Corporation Re: New Federal Trade Commission Rule for Prerecorded Message Telemarketing Calls Existing Federal Communication Commission Rule for Prerecorded Message Calls to

More information

January 14, Dear Commissioner Rosenworcel:

January 14, Dear Commissioner Rosenworcel: David C. Bartlett Vice President Federal Government Affairs 1099 New York Ave., NW, Suite 250 Washington, DC 20001 202-429-3101 January 14, 2019 Hon. Jessica Rosenworcel Commissioner Federal Communications

More information

2008 NASCIO Recognition Award Nomination

2008 NASCIO Recognition Award Nomination 2008 NASCIO Recognition Award Nomination Category: Information Communications Technology (ICT) Title of Nomination: CORIS Inmate Phone System State: Maine TABLE OF CONTENTS B. EXECUTIVE SUMMARY... 3 C.

More information

Voter Contact Registry

Voter Contact Registry Voter Contact Registry How to contact Canadians the right way This Guidebook is for general information only. You should always seek independent legal advice for any specific problem or issue. Respecting

More information

In this Policy the following terms shall have the following meanings:

In this Policy the following terms shall have the following meanings: NJR TRADING LTD understands that your privacy is important to you and that you care about how your personal data is used. We respect and value the privacy of everyone who visits this website, https://bar-tonic.

More information

Robocall signaling draft-sipcore-callinfo-spam. Henning Schulzrinne IETF 98

Robocall signaling draft-sipcore-callinfo-spam. Henning Schulzrinne IETF 98 Robocall signaling draft-sipcore-callinfo-spam Henning Schulzrinne IETF 98 Background (for the un-stired and un-shaken) Unwanted calls are typically some are illegal, some are just unwanted (by many) example:

More information

Shaken 101: Mitigating Illegal Robocalling and Caller ID Scams Webinar

Shaken 101: Mitigating Illegal Robocalling and Caller ID Scams Webinar Shaken 101: Mitigating Illegal Robocalling and Caller ID Scams Webinar Panelists: Dr. Eric Burger Chief Technology Officer FCC Jim McEachern Principal Technologist ATIS Moderator: Brent Struthers STI-GA

More information

MailChimp Basics. A step by step guide to MailChimp Course developed by Virginia Ridley

MailChimp Basics. A step by step guide to MailChimp Course developed by Virginia Ridley MailChimp Basics A step by step guide to MailChimp Course developed by Virginia Ridley By the end of this course you will: Know why a newsletter is important Have a brief understanding of Canada s Anti

More information

Frequently Asked Questions. About The Do Not Contact Rules

Frequently Asked Questions. About The Do Not Contact Rules Updated as of March 2015 Frequently Asked Questions About The Do Not Contact Rules These Frequently Asked Questions should be read in conjunction with NRT s Do Not Contact Policy and will be updated from

More information

PUBLIC NOTICE FCC ENFORCEMENT ADVISORY TELEPHONE CONSUMER PROTECTION ACT ROBOCALL AND TEXT RULES

PUBLIC NOTICE FCC ENFORCEMENT ADVISORY TELEPHONE CONSUMER PROTECTION ACT ROBOCALL AND TEXT RULES PUBLIC NOTICE Federal Communications Commission 445 12 th St., S.W. Washington, D.C. 20554 News Media Information 202 / 418-0500 Internet: http://www.fcc.gov TTY: 1-888-835-5322 DA 16-264 March 14, 2016

More information

BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, D.C ) ) ) ) ) REPLY COMMENTS OF THE USTELECOM ASSOCIATION

BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, D.C ) ) ) ) ) REPLY COMMENTS OF THE USTELECOM ASSOCIATION BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, D.C. 20554 In the Matter of Call Authentication Trust Anchor ) ) ) ) ) CG Docket No. 17-97 REPLY COMMENTS OF THE USTELECOM ASSOCIATION The USTelecom

More information

Robocall and fake caller-id detection

Robocall and fake caller-id detection Technical Disclosure Commons Defensive Publications Series December 01, 2017 Robocall and fake caller-id detection Junda Liu Naveen Kalla Shi Lu Follow this and additional works at: http://www.tdcommons.org/dpubs_series

More information

Permission At A Glance: DMA s Consumer Preferences & Choice Guidance

Permission At A Glance: DMA s Consumer Preferences & Choice Guidance Permission At A Glance: DMA s Consumer Preferences & Choice Guidance *Please note: this document is not intended to provide you with specific legal advice. You should ensure you review your compliance

More information

incontact Auto Attendant Admin Reference Manual

incontact Auto Attendant Admin Reference Manual incontact Auto Attendant Admin Reference Manual incontact Auto Attendant Admin Reference Manual Title incontact Auto Attendant Admin Reference Manual Revision 04052011 Copyright About incontact 2011 incontact,

More information

Canadian Anti Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS

Canadian Anti Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS Canadian Anti Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS Note: This FAQ is intended to assist OC staff and faculty members to understand their obligations under the CASL. It summarizes and simplifies

More information

Full Moon Fest Privacy Policy

Full Moon Fest Privacy Policy Last Updated: May 3rd, 2017 Full Moon Fest Privacy Policy Thank you for visiting the Full Moon Fest website located at www.matteprojects.com (the Website ). The Website is an Internet property of Full

More information

Automated Call Quality, CLI and Performance Testing

Automated Call Quality, CLI and Performance Testing . Automated Call Quality, CLI and Performance Testing 2 itest The most comprehensive test platform available. itest is a testing and performance monitoring platform designed specifically for the 21st Century

More information

Response of Microsoft Corporation to Ofcom s consultation document. Guidelines for CLI Facilities. 14 November 2017

Response of Microsoft Corporation to Ofcom s consultation document. Guidelines for CLI Facilities. 14 November 2017 Response of Microsoft Corporation to Ofcom s consultation document Guidelines for CLI Facilities 14 November 2017 14 November 2017 Microsoft s response to Ofcom s consultation on changes to the CLI guidelines

More information

SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam

SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam 2016 IEEE Symposium on Security and Privacy SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam Huahong Tu, Adam Doupé, Ziming Zhao, and Gail-Joon Ahn Arizona State University

More information

NWQ Capital Management Pty Ltd. Privacy Policy. March 2017 v2

NWQ Capital Management Pty Ltd. Privacy Policy. March 2017 v2 NWQ Capital Management Pty Ltd Privacy Policy March 2017 Page 1 of 8 Privacy and Spam Policy NWQ Capital Management Pty Ltd s Commitment NWQ Capital Management Pty Ltd (NWQ) is committed to providing you

More information

IS FEDERATION LYNC S SECRET WEAPON?

IS FEDERATION LYNC S SECRET WEAPON? IS FEDERATION LYNC S SECRET WEAPON? by Michael Greenlee, Clarity Consulting 1 OF 5 INTRODUCTION Microsoft Lync, Microsoft s contribution to the enterprise Unified Communications market, has undergone a

More information

Contents Overview... 4 Install AT&T Toggle Voice... 4 Sign in to AT&T Toggle Voice... 5 Define your Location for Emergency Calls...

Contents Overview... 4 Install AT&T Toggle Voice... 4 Sign in to AT&T Toggle Voice... 5 Define your Location for Emergency Calls... Contents 1. Overview... 4 2. Install AT&T Toggle Voice... 4 Requirements... 4 3. Sign in to AT&T Toggle Voice... 5 4. Define your Location for Emergency Calls... 7 Update Your Registered Location for Emergency

More information

TCPA Compliance. Best Practices for Two-Way Texting

TCPA Compliance. Best Practices for Two-Way Texting TCPA Compliance Best Practices for Two-Way Texting When selecting a business-texting solution, companies must consider the potential for legal exposure under the Telephone Consumer Protection Act of 1991

More information

Mobile TeleSystems (MTS) Converges Fixed and Mobile Telephony

Mobile TeleSystems (MTS) Converges Fixed and Mobile Telephony Mobile TeleSystems (MTS) Converges Fixed and Mobile Telephony MTS creates new revenue opportunities with new services. EXECUTIVE SUMMARY Mobile TeleSystems (MTS) Industry: Telecommunications BUSINESS CHALLENGE

More information

Terms and Conditions of Mobile Phone Service (Post-Paid) Between Operator and Subscriber

Terms and Conditions of Mobile Phone Service (Post-Paid) Between Operator and Subscriber Terms and Conditions of Mobile Phone Service (Post-Paid) Between Operator and Subscriber Section 1 General 1.1 This Terms and Conditions of Mobile Phone Service shall be effective between Advanced Wireless

More information

Allworx User s Guide (Release x)

Allworx User s Guide (Release x) Allworx User s Guide (Release 6.8.1.x) -PAGE INTENTIONALLY LEFT BLANK- Table of Contents 1 VOICEMAIL...1 1.1 ACCESSING YOUR MESSAGE CENTER INBOX...1 1.2 LISTENING TO YOUR VOICEMAIL...2 1.3 SENDING VOICEMAIL

More information

The Center for Affiliated Learning ( the CAL ) Privacy Policy

The Center for Affiliated Learning ( the CAL ) Privacy Policy The Center for Affiliated Learning ( the CAL ) Privacy Policy Welcome to the Center for Affiliated Learning ( the CAL ) an education and training platform owned and operated by Affiliates Risk Management

More information

NATIONAL CERTIFICATION EXAMINATION FOR EMERGENCY COMMUNICATIONS

NATIONAL CERTIFICATION EXAMINATION FOR EMERGENCY COMMUNICATIONS NATIONAL CERTIFICATION EXAMINATION FOR EMERGENCY COMMUNICATIONS "CNET" Certified National Emergency Telecommunicator Handbook for Level I Telecommunicator CERTIFICATION The NECC is a private testing organization

More information

VoiceAccess Users Guide

VoiceAccess Users Guide Users Guide Table of Contents GETTING STARTED...1 Device Configuration...1 Connecting to a PBX...2 Plus Features...2 VoiceMail...2 Call Forwarding...2 Caller ID...3 MANAGING CALLING FEATURES FROM THE PHONE...4

More information

VETS FIRST CHOICE PRIVACY POLICY FOR PARTICIPATING VETERINARY PRACTICES

VETS FIRST CHOICE PRIVACY POLICY FOR PARTICIPATING VETERINARY PRACTICES VETS FIRST CHOICE PRIVACY POLICY FOR PARTICIPATING VETERINARY PRACTICES PLEASE READ THIS PRIVACY POLICY CAREFULLY BEFORE USING THIS SITE. Last Updated: January 01, 2015 Direct Vet Marketing, Inc. (hereinafter,

More information

Acceptable Use Policy (AUP)

Acceptable Use Policy (AUP) Acceptable Use Policy (AUP) Questions regarding this policy and complaints of violations of this policy by PLAINS INTERNET users can be directed to support@plainsinternet.com. Introduction Plains Internet

More information

Contact Center Compliance Seminar Bringing you the ANSWERS you need about compliance in your call center.

Contact Center Compliance Seminar Bringing you the ANSWERS you need about compliance in your call center. Contact Center Compliance Seminar Bringing you the ANSWERS you need about compliance in your call center. Outbound Prerecorded Messages Mitchell N. Roth, Esq. Partner, Business and Communications Practices

More information

Terms and Conditions of Mobile Phone Service (Pre-Paid) Between Operator and Subscriber

Terms and Conditions of Mobile Phone Service (Pre-Paid) Between Operator and Subscriber Terms and Conditions of Mobile Phone Service (Pre-Paid) Between Operator and Subscriber Section 1 General 1.1 This Terms and Conditions of Mobile Phone Service shall be effective between Advanced Wireless

More information

ABSTRACT. that it avoids the tolls charged by ordinary telephone service

ABSTRACT. that it avoids the tolls charged by ordinary telephone service ABSTRACT VoIP (voice over IP - that is, voice delivered using the Internet Protocol) is a term used in IP telephony for a set of facilities for managing the delivery of voice information using the Internet

More information

Eagles Charitable Foundation Privacy Policy

Eagles Charitable Foundation Privacy Policy Eagles Charitable Foundation Privacy Policy Effective Date: 1/18/2018 The Eagles Charitable Foundation, Inc. ( Eagles Charitable Foundation, we, our, us ) respects your privacy and values your trust and

More information

NASD NOTICE TO MEMBERS 97-58

NASD NOTICE TO MEMBERS 97-58 NASD NOTICE TO MEMBERS 97-58 NASD Regulation Requests Comment On Proposed Interpretive Material 1031 Regarding Cold Calling Activity; Comment Period Expires October 31, 1997 Suggested Routing Senior Management

More information

Depending on the Services or information you request from us, we may ask you to provide the following personal information:

Depending on the Services or information you request from us, we may ask you to provide the following personal information: LINK HUNGARY PRIVACY POLICY PROTECTING YOUR DATA 1. Who are Link Asset Services and Link Hungary? Link Asset Services ( Link ) is a trading name of companies which offer a range of services, principally

More information

The Telephony Denial of Service (TDoS) Threat

The Telephony Denial of Service (TDoS) Threat The Telephony Denial of Service (TDoS) Threat An Analysis of the TDoS Threat in Voice Network Security A Whitepaper From SecureLogix Corporation Telephony Denial-of-Service (TDoS) and The Public Voice

More information

SIP and VoIP What is SIP? What s a Control Channel? History of Signaling Channels

SIP and VoIP What is SIP? What s a Control Channel? History of Signaling Channels Network Security - ISA 656 Voice Over IP (VoIP) Security Simple SIP ing Alice s Bob Session Initiation Protocol Control channel for Voice over IP (Other control channel protocols exist, notably H.323 and

More information

Our Privacy Policy. Last modified: December 12th Summary of changes can be consulted at the bottom of this Privacy Policy.

Our Privacy Policy. Last modified: December 12th Summary of changes can be consulted at the bottom of this Privacy Policy. Our Privacy Policy Last modified: December 12th 2014. Summary of changes can be consulted at the bottom of this Privacy Policy. The aim of this Privacy Policy is to provide an overview on the privacy practices

More information

Application Notes for OneAccess-Telstra Business SIP with Avaya IP Office Release 11 SIP Trunking - Issue 1.0

Application Notes for OneAccess-Telstra Business SIP with Avaya IP Office Release 11 SIP Trunking - Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for OneAccess-Telstra Business SIP with Avaya IP Office Release 11 SIP Trunking - Issue 1.0 Abstract These Application Notes illustrate a sample

More information

World Wide Jobs Ltd t/a Findmyexpert.com Privacy Policy 12 th April 2018

World Wide Jobs Ltd t/a Findmyexpert.com Privacy Policy 12 th April 2018 World Wide Jobs Ltd t/a Findmyexpert.com Privacy Policy 12 th April 2018 We understand that you are aware of and care about your own personal privacy interests and we take that seriously. This Privacy

More information

PRIVACY POLICY. 1. Definitions and Interpretation In this Policy the following terms shall have the following meanings:

PRIVACY POLICY. 1. Definitions and Interpretation In this Policy the following terms shall have the following meanings: PRIVACY POLICY BACKGROUND: Leaman Mattei Limited (LM) understands that your privacy is important to you and that you care about how your personal data is used. We respect and value the privacy of everyone

More information

PRIVACY STATEMENT Last Updated: January 1, 2017

PRIVACY STATEMENT Last Updated: January 1, 2017 PRIVACY STATEMENT Last Updated: January 1, 2017 The General Motors Family of Companies (including General Motors Company, OnStar, LLC ( OnStar ), and affiliates) (collectively, "GM" or "we") provides this

More information

Canadian Anti-Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS

Canadian Anti-Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS Canadian Anti-Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS 1. General Questions 1.1 What is the Canadian Anti-Spam Legislation? The primary purpose of the Canadian Anti-Spam Legislation (called CASL;

More information

Allworx User s Guide. (Release 7.3)

Allworx User s Guide. (Release 7.3) Allworx User s Guide (Release 7.3) No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy, recording,

More information

Bend Mailing Services, LLC, dba BMS Technologies ( us, we, or our ) operates the website (the Service ).

Bend Mailing Services, LLC, dba BMS Technologies ( us, we, or our ) operates the   website (the Service ). Privacy Policy online-billpay.com Effective date: May 18, 2018 Bend Mailing Services, LLC, dba BMS Technologies ( us, we, or our ) operates the https://www.online-billpay.com/ website (the Service ). This

More information

White Paper Subcategory. Overview of XML Communication Technologies

White Paper Subcategory. Overview of XML Communication Technologies Subcategory Overview of XML Communication Technologies Executive Summary A significant shift has occurred in the communications infrastructures deployed today. This shift is the result of the acceptance

More information

YADTEL - Privacy Information INFORMATION WE COLLECT

YADTEL - Privacy Information INFORMATION WE COLLECT YADTEL - Privacy Information As a customer of Yadtel, you are entitled to know what we do with personal information about you that we receive. We consider our treatment of such information to be a part

More information

About Us. Privacy Policy v1.3 Released 11/08/2017

About Us. Privacy Policy v1.3 Released 11/08/2017 Privacy Policy v1.3 Released 11/08/2017 About Us THIS PRIVACY POLICY, OUR VIEWER TERMS (hellopupil.com/viewerterms) AND HEALTH & SAFETY GUIDANCE (hellopupil.com/advice) COLLECTIVELY FORM THE TERMS GOVERNING

More information

Canada s Anti-Spam Legislation: What It Means to Hit Send

Canada s Anti-Spam Legislation: What It Means to Hit Send Canada s Anti-Spam Legislation: What It Means to Hit Send Presented to the Canadian Vintners Association by Wendy Mee May 28, 2014 Overview Key Dates Overview of the Law Liability and Penalties Compliance

More information

Untraceable Nym Creation on the Freedom 2.0 Network

Untraceable Nym Creation on the Freedom 2.0 Network Russell Samuels Ed Hawco November 1, 2000 Untraceable Nym Creation on the Freedom 2.0 Network Version 2.0 This whitepaper, targeted at users with a basic understanding of Freedom, describes the Freedom

More information

Short Codes - Social and Public Services. Web Portal. Please visit our website at

Short Codes - Social and Public Services. Web Portal. Please visit our website at Service Electric Cable TV and Communications Telephone Guide Service Electric offers a variety of features with their state of the art telephone service. This brochure will guide you through the basic

More information

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP)

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP) Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP) All customers should read this document. You are responsible for the policy written here, and your account WILL BE DISABLED WITHOUT WARNING

More information

1 Page. Digital Voice Services Business User Guide

1 Page. Digital Voice Services Business User Guide 1 Page Digital Voice Services Business User Guide Feature Access Codes *62 Voice Portal *86 Direct Voice Mail Retrieval *77 Anonymous Call Rejection Activation *87 Anonymous Call Rejection Deactivation

More information

CENTREX service. user reference guide. Clearly different.

CENTREX service. user reference guide. Clearly different. CENTREX service user reference guide Clearly different. TABLE OF CONTENTS This user s guide provides instructions for using Centrex features. A check in the circle next to a feature means that your Centrex

More information

Paper on Handling Menace of International Grey Traffic

Paper on Handling Menace of International Grey Traffic Paper on Handling Menace of International Grey Traffic White Paper 01 of 2012 PiRRC In this paper discussion is only about the conventional international voice telephony requiring a license to bring in

More information

Spree Privacy Policy

Spree Privacy Policy Spree Privacy Policy Effective as at 21 November 2018 Introduction Spree respects your privacy and it is important to us that you have an enjoyable experience buying and selling with us but also that you

More information

VERSION 1.3 MAY 1, 2018 SNOWFLY PRIVACY POLICY SNOWFLY PERFORMANCE INC. P.O. BOX 95254, SOUTH JORDAN, UT

VERSION 1.3 MAY 1, 2018 SNOWFLY PRIVACY POLICY SNOWFLY PERFORMANCE INC. P.O. BOX 95254, SOUTH JORDAN, UT VERSION 1.3 MAY 1, 2018 SNOWFLY PRIVACY POLICY SNOWFLY PERFORMANCE INC. P.O. BOX 95254, SOUTH JORDAN, UT 84095-9998 SNOWFLY PRIVACY POLICY This Privacy Policy describes Snowfly s practices regarding the

More information

PRIVACY POLICY Let us summarize this for you...

PRIVACY POLICY Let us summarize this for you... PRIVACY POLICY Let us summarize this for you... We promise to never sell your personal information. This site collects usage information to provide a better web experience for our users. If you purchase

More information

Customer Proprietary Network Information

Customer Proprietary Network Information Customer proprietary network information (CPNI) means information that relates to the quantity, technical configuration, type, destination, location, and amount of use of our service by you and information

More information

To review material modifications and their effective dates scroll to the bottom of the page.

To review material modifications and their effective dates scroll to the bottom of the page. PRIVACY POLICY Effective Date: October 1, 2016 To review material modifications and their effective dates scroll to the bottom of the page. Cobra Trading, Inc. ("Cobra") owns and operates this cobratrading.com

More information

Office Properties Income Trust Privacy Notice Last Updated: February 1, 2019

Office Properties Income Trust Privacy Notice Last Updated: February 1, 2019 General Office Properties Income Trust Privacy Notice Last Updated: February 1, 2019 Office Properties Income Trust ( OPI ) is committed to your right to privacy and to keeping your personal information

More information

BPA Worldwide Guide to Outbound Telemarketing Recording

BPA Worldwide Guide to Outbound Telemarketing Recording BPA Worldwide Guide to Outbound Telemarketing Recording Operating Guidelines for Publishing Companies and Telemarketing Agencies Involved in the Acquisition and Requalification of Telecommunication Requests

More information

Shaw Privacy Policy. 1- Our commitment to you

Shaw Privacy Policy. 1- Our commitment to you Privacy Policy last revised on: Sept 16, 2016 Shaw Privacy Policy If you have any questions regarding Shaw s Privacy Policy please contact: privacy@shaw.ca or use the contact information shown on any of

More information

QueueMetrics by Loway

QueueMetrics by Loway QueueMetrics by Loway Your Way to Asterisk Call Centers management Feature Overview A monitoring and reporting system is the most important component of any call center. The fine adjustment and balancing

More information

Privacy and Cookies Policy

Privacy and Cookies Policy Sohn Foundation London Privacy and Cookies Policy The Sohn Foundation London (company number: 08075575, charity number: 1148454) is a wholly owned subsidiary of The Ira Sohn Conference Foundation, Inc.

More information

PRIVACY POLICY. 1. Definitions and Interpretation In this Policy the following terms shall have the following meanings:

PRIVACY POLICY. 1. Definitions and Interpretation In this Policy the following terms shall have the following meanings: PRIVACY POLICY BACKGROUND: The World Freight Group ( WFG ) understands that your privacy is important to you and that you care about how your personal data is used. We respect and value the privacy of

More information

PRIVACY POLICY. 1. Definitions and Interpretation In this Policy the following terms shall have the following meanings:

PRIVACY POLICY. 1. Definitions and Interpretation In this Policy the following terms shall have the following meanings: PRIVACY POLICY BACKGROUND: Entod Research Cell UK Ltd understands that your privacy is important to you and that you care about how your personal data is used. We respect and value the privacy of everyone

More information

Pending U.S. Anti-spam Legislation: A Marketer's Guide

Pending U.S. Anti-spam Legislation: A Marketer's Guide Tactical Guidelines, W. Janowski Research Note 14 August 2003 Pending U.S. Anti-spam Legislation: A Marketer's Guide Nine anti-spam proposals are before the 108th U.S. Congress. Marketers must understand

More information

FINAL DRAFT A. GENERAL INFORMATION

FINAL DRAFT A. GENERAL INFORMATION Protecting the individual's privacy on the Internet is crucial to the future of Internet-based business and the move toward a true Internet economy. We have created this Privacy Statement to demonstrate

More information

Grandstream Networks, Inc. UCM6xxx Series IP PBX Lightweight Call Center Guide

Grandstream Networks, Inc. UCM6xxx Series IP PBX Lightweight Call Center Guide Grandstream Networks, Inc. UCM6xxx Series IP PBX Lightweight Call Center Guide Table of Contents INTRODUCTION... 4 UCM CALL CENTER FEATURES LIST... 5 Call Queues... 5 Virtual Queue... 7 Position Announcement...

More information

Information we collect about you: (Rewritten)

Information we collect about you: (Rewritten) Local Search Titan, LLC ( LST, "we", "us" or "our") respects the privacy of our users and has developed this Privacy Policy to demonstrate its commitment to protecting your privacy. The intention of this

More information

AT&T CLASSIC MAIL. Voice Messaging System Mailbox User Guide

AT&T CLASSIC MAIL. Voice Messaging System Mailbox User Guide AT&T CLASSIC MAIL Voice Messaging System Mailbox User Guide Copyright 1993 All Rights Reserved AT&T 585-321-101 Issue 1 December 1993 Notice Every effort was made to ensure that the information in this

More information

Adkin s Privacy Information Notice for Clients, Contractors, Suppliers and Business Contacts

Adkin s Privacy Information Notice for Clients, Contractors, Suppliers and Business Contacts Adkin s Privacy Information Notice for Clients, Contractors, Suppliers and Business Contacts POLICY STATEMENT Adkin is committed to protecting and respecting the privacy of all of our clients. This Policy

More information

Polycom RealAccess, Cloud Edition

Polycom RealAccess, Cloud Edition ADMINISTRATOR GUIDE January 2018 3725-47131-001E Polycom RealAccess, Cloud Edition Copyright 2017, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another

More information

Handling Complaints Tracy Bedwell Managing Director Sales Training International Ltd

Handling Complaints Tracy Bedwell Managing Director Sales Training International Ltd Handling Complaints By Tracy Bedwell Managing Director Sales Training International Ltd Handling Complaints Below is a procedure for handling complaints in small or large, manufacturing or service, private

More information

Dentons Canada LLP. Understanding CASL. Presented to the Alberta Chambers of. Craig T. McDougall and Thomas A. Sides

Dentons Canada LLP. Understanding CASL. Presented to the Alberta Chambers of. Craig T. McDougall and Thomas A. Sides Dentons Canada LLP Understanding CASL Presented to the Alberta Chambers of Commerce April 22, 2014 Craig T. McDougall and Thomas A. Sides Understanding CASL 1) Background and Key Dates 2) Commercial Electronic

More information

PART 7 - Central Office Optional Features 1st Revised Sheet 1 SECTION 2 - Advanced Custom Calling Features Replacing Original Sheet 1

PART 7 - Central Office Optional Features 1st Revised Sheet 1 SECTION 2 - Advanced Custom Calling Features Replacing Original Sheet 1 PART 7 - Central Office Optional Features 1st Revised Sheet 1 SECTION 2 - Advanced Custom Calling Features Replacing Original Sheet 1 CUSTOM CALLING SERVICES A. General Regulations Refer to paragraph A.

More information

Compass Consulting Group Terms of Use & Privacy Policy. Last Updated: 10/1/2018

Compass Consulting Group Terms of Use & Privacy Policy. Last Updated: 10/1/2018 Compass Consulting Group Terms of Use & Privacy Policy Last Updated: 10/1/2018 1. Introduction. At Compass Consulting Group LLC ( Compass, we, us, or our ), we recognize that your privacy is important.

More information

Ofcom dialler compliance review

Ofcom dialler compliance review Helping you to verify and maintain compliant dialling campaigns rostrvm Prophet consulting services are based on focused analysis of an organisation s contact and relationship management capability. rostrvm

More information

Professional Engineers Ontario. canada s anti-spam. Guidelines for Chapters

Professional Engineers Ontario. canada s anti-spam. Guidelines for Chapters Professional Engineers Ontario canada s anti-spam legislation (CASL) Guidelines for Chapters Published by Association of Professional Engineers of Ontario, February 2015 Contents 1. Introduction... 3 2.

More information

IP Office Release 7.0 IP Office Essential Edition - Quick Version Embedded Voic User Guide

IP Office Release 7.0 IP Office Essential Edition - Quick Version Embedded Voic User Guide IP Office Essential Edition - Quick Version Embedded Voicemail User Guide 15-604067 Issue 09a - (21 February 2011) 2011 AVAYA All Rights Reserved. Notices While reasonable efforts have been made to ensure

More information

Telplex Communications Competitive Local Exchange and Interexchange Service Rates Ohio

Telplex Communications Competitive Local Exchange and Interexchange Service Rates Ohio Telplex Communications Competitive Local Exchange and Interexchange Service Rates Ohio The following rates apply to the furnishing of competitive local exchange and interexchange telecommunications services

More information

Vistra International Expansion Limited PRIVACY NOTICE

Vistra International Expansion Limited PRIVACY NOTICE Effective Date: from 25 May 2018 Vistra International Expansion Limited PRIVACY NOTICE This Privacy Notice explains how particular companies in the Vistra Group collect, use and disclose your personal

More information

Information you give us when you sign up to the World Merit Hub. In addition, when you sign up to the World Merit Hub, we will usually ask for:

Information you give us when you sign up to the World Merit Hub. In addition, when you sign up to the World Merit Hub, we will usually ask for: World Merit Website Privacy Policy Last updated: 17th July 2018 Introduction World Merit ( we, our, us ) are committed to protecting and respecting your privacy. We are a Charity established in England

More information

Choose your Price per Seat (no contracts): $79 per month Pay $237 for 3 months Save $30 quarterly

Choose your Price per Seat (no contracts): $79 per month Pay $237 for 3 months Save $30 quarterly Make More Money in Less Time Move Instantly from Call to Call! Choose your Price per Seat (no contracts): $89 per month Pay month to month Truly Unlimited Calls to USA & Canada from virtually anywhere

More information

Privacy Policy. Information about us. What personal data do we collect and how do we use it?

Privacy Policy. Information about us. What personal data do we collect and how do we use it? This privacy policy sets out the way in which your personal data is handled by Leeds Bradford Airport Limited (referred to as "we", "us" and "our") whether collected through one of the websites we operate,

More information

Purchasing Calling Card Services

Purchasing Calling Card Services Purchasing Calling Card Services Courtesy of Main Resource, Inc. Visit us at www.mainresource.com or call 800 362-6740 for all your telecom needs. PURCHASING CALLING CARD SERVICES Many times when a company

More information

The Open Group Certification for People. Training Course Accreditation Requirements

The Open Group Certification for People. Training Course Accreditation Requirements The Open Group Certification for People Training Course Accreditation Requirements Version 1.1 February 2014 Copyright 2013-2014, The Open Group All rights reserved. No part of this publication may be

More information

Whitepaper. Jan 16, 2019 Version 2.0. R o b o c a l l s. i o Page 1

Whitepaper. Jan 16, 2019 Version 2.0. R o b o c a l l s. i o Page 1 Whitepaper Jan 16, 2019 Version 2.0 R o b o c a l l s. i o Page 1 Table of Contents 1. Overview 1.1 Communications Market Overview 2. Previous Attempts to Eliminate Spam Calls That Failed 2.1 Do Not Call

More information

THE CAN-SPAM ACT OF 2003: FREQUENTLY ASKED QUESTIONS EFFECTIVE JANUARY 1, December 29, 2003

THE CAN-SPAM ACT OF 2003: FREQUENTLY ASKED QUESTIONS EFFECTIVE JANUARY 1, December 29, 2003 THE CAN-SPAM ACT OF 2003: FREQUENTLY ASKED QUESTIONS EFFECTIVE JANUARY 1, 2004 This FAQ is not intended to provide specific advice about individual legal, business, or other questions. It was prepared

More information

TCPA Features Guide. 100 Enterprise Way, Suite A-300. Scotts Valley, CA

TCPA Features Guide. 100 Enterprise Way, Suite A-300. Scotts Valley, CA TCPA Features Guide West Corporation 100 Enterprise Way, Suite A-300 Scotts Valley, CA 95066 888-527-5225 www.schoolmessenger.com Table of Contents Introduction... 3 The Telephone Consumer Protection Act

More information

TELEPHONE FEATURES GUIDE Updated August 2018

TELEPHONE FEATURES GUIDE Updated August 2018 TELEPHONE FEATURES GUIDE Updated August 2018 ourcontinuum.com/voice WELCOME. We value you as a customer and will continue to work to ensure you have a great experience. We are committed to offering a quality

More information

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework

More information

Privacy and Spam Policy Ten Tigers Grain Marketing Pty Ltd

Privacy and Spam Policy Ten Tigers Grain Marketing Pty Ltd Privacy and Spam Policy Ten Tigers Grain Marketing Pty Ltd Our Commitment Ten Tigers Grain Marketing Pty Ltd and Ten Tigers Pty Ltd are committed to providing you with the highest levels of client service.

More information

Canadian Anti-Spam Legislation (CASL) Campaign and Database Compliance Checklist

Canadian Anti-Spam Legislation (CASL) Campaign and Database Compliance Checklist Canadian Anti-Spam Legislation (CASL) Campaign and Database Compliance Checklist Database Checklist Use this Checklist as a guide to assessing existing databases for compliance with Canada s Anti-Spam

More information