A Plan For Robocalls: Robosmelter
|
|
- Alexandra Townsend
- 5 years ago
- Views:
Transcription
1 A Plan For Robocalls: Robosmelter Ben Klang, Sene Sorrow Mojo Lingo LLC January 17, 2013 Submitted to the Federal Trade Commission s Robocall Challenge Abstract The rise of Voice over IP (VoIP) technologies has lead to an explosion in the utility and ease of communication offered by the telephone network. However, every powerful tool has the potential to become a powerful weapon. Illegal robocall telemarketers have seized on this and are using the dramatically low cost of VoIP calling to barrage consumers with illegal robotic calls. This document outlines an approach, called Robosmelter, using software and machine learning techniques to dramatically reduce the number of such illegal calls that ring the consumer s phone, while not interfering with the consumer s normal use and enjoyment of his or her phone.
2 Terms Consumer: An individual (not a business or other organization) who has telephone service, whether landline or mobile User: A consumer who has activated our proposed software application to filter their calls Carrier: A telecommunications service provider, including landline telephone, mobile telephone, or Voice over IP (VoIP) telephone service. Illegal Robocalls: Illegal automated telephone calls directed at Consumers. This excludes legal automated telephone calls, such as those by political candidates, charities, surveys, and other legally permissible calls. Robosmelter: Our proposed software system for identifying, learning, and blocking illegal robocalls. Robosmelter Proposal Summary Illegal robocalling is a complex problem that will be impossible to solve completely without sweeping changes to the technology, public policy, and cost/revenue structures that underpin
3 the public telephone network. However, using modern technology, we can enable consumers to more quickly identify and block illegal robocalls before the call rings the consumer s device. The decision to block any given call is made using a combination of technologies that are familiar to those who have worked to fight unsolicited commercial honeypots, statistical and crowdsourced analyses, rolling blacklists, exempting whitelists, and tarpitting. Just as is true with , for the technology to be effective it must be accurate and it must be very easy to use for the consumer. This proposal focuses on the following four goals: 1. It should be easy for the consumer to adopt and use 2. It should not require unreasonable effort by telephone carriers to install and maintain 3. It should work on any telephone connected to the PSTN (landline, mobile, voip) 4. It should stop a large percentage of illegal / spam calls today The blocking mechanism is designed to be under the full control of the user;; he or she may enable or disable it at any time. Control of Robosmelter by the user may be via text message
4 interaction (if using a mobile phone) or via web browser from any internet connected computer. Further, several optional blocking measures may be selected or deselected to change how calls are selected to be blocked. But even if the user takes no further action than simply enabling the service (which will be no more difficult than adding a number to the FTC s Do Not Call Registry), the application will still be able to stop a significant portion of illegal robocalls. Because the information about illegal robocalls is shared anonymously throughout the system, the entire system benefits from the activities of the active users. The proposed software works by analyzing the behavior of all calls that reach the users. Based on their behavior, we assign a score indicating the probability that each individual call is an illegal robocall. The scores for all users of Robosmelter are collected and merged in real-time to calculate a score indicating the probability that calls from a given telephone number are likely to be a illegal robocall. Once the score rises above a predetermined (and adjustable) threshold, further calls from that number to users of the application are stopped by the application. The authors of this proposal realize that most countermeasures are possible to circumvent by organizations which have no regard for the law. In the section Closing the Loopholes we discuss longer term solutions to mitigate the weaknesses that are left by this proposal. We have not included them in the body of the main proposal because of the effort required to deploy them. The focus is on improving the current situation, while opening the door to deeper, more fundamental changes that may eliminate illegal robocalls entirely in the future. One last note on the validity of using caller ID as a blocking source: based on complaint data gathered by the FTC and shared as a part of this Robocall Challenge, we, the authors of this document, observed that most robocallers reuse caller ID extensively. Of approximately 701,821 complaints during the year 2012, approximately 57,000 reported no caller ID. This may be because the consumer failed to report the information, or because the robocaller made the call without supplying caller ID. For the top 100 individual caller IDs, there were more than 1,000 complaints made for each number. The top 10 individual caller IDs accounted for over 50,000 complaints, with the absolute top offender single-handledly being responsible for 16,234 complaints alone. Since we know that not all consumers report illegal robocalls, just blocking these top 100 caller IDs would result in more than a 60% reduction of the number of robocalls received by consumers. Based on this information (as seen in the graph) the majority of complaints came from a strong minority of distinct caller IDs.
5 Assumptions 1. While Caller ID is trivially spoofed, it remains the only method by which calls may be identified at the terminating telephone carrier before they reach the consumer. Further, empirical evidence and data from the FTC indicates that Caller ID spoofing is used today primarily to hide the identity of the caller, and is often not changed from one individual call to the next. Thus, if we can determine the current Caller ID for a given illegal robocall campaign, we can stop a large number of calls from reaching consumers by blocking calls from that number for a period of time. 2. Originating carriers have little incentive to stop calls leaving their network, and in fact may open themselves to liability for failing to complete calls as required by contract or law. Thus, the most effective place to install a call block is within the consumer s telephone carrier (where the consumer/call recipient may directly authorize such blocking) or in the consumer s device. 3. Due to the requirements of scale, illegal robocall telemarketers are vulnerable to any increase in the per-call or per-minute costs associated with their operation. Any measures taken to drive up those costs negatively impact their ability to function. Technical Description The central goal of the service is to block a call before it rings the consumer s device. To make such a decision requires collecting a large amount of information and processing that information in real-time. There are several ways we can collect information about whether a given call is an illegal robocall or not: By asking the consumer (either during or after a call has taken place) By examining patterns in call behavior (call source, duration) By examining the call contents (identifying audio characteristics, repetitive phrases) To collect the required information and take the appropriate action, we propose installing software that runs inside the carrier s network. This software may be operated by the carrier itself, or by a third party service provider. In both cases, it is important to note that the software is operating at the direction of the consumer, not the carrier or the third party service provider. This distinction allows the software to act in the consumer s best interest and alleviates any potential liability concerns that may be raised by carriers refusing to connect any calls. The application works in three phases: 1. Identification 2. Learning 3. Blocking (with optional Tarpitting) In the first phase, Identification, the application is attached to the user s account and begins observing phone calls that the user receives. When a call comes in, the application looks for several behaviors during the course of that call which may indicate an illegal robocall. Several
6 key behaviors have already been identified, including audio characteristics of the call, short call duration resulting from the user hanging up, and others. The information and metrics applied to the call come from a shared database of all users of the application. In this way users will be able to share information about illegal robocalls quickly and effortlessly. Robosmelter then assigns a score for the call, based on these and other criteria, as to how confident it believes the current call is likely to be an illegal robocall. In the second phase, Learning, users may provide feedback to the application to correct and improve the scores assigned by the application to individual calls. For example, if a user receives a call from caller ID and the application assigns a score of 40% (below the blocking threshold of 65%), the user may notify the application that the call was, in fact, an illegal robocall. The application takes this information and updates its database to indicate that the observed call characteristics and the caller ID was associated with an illegal robocall. As other users do the same, the score for calls coming from that caller ID will go up. Over time this will cause the score to rise above the blocking threshold, and the application will no longer allow calls from this number to reach users. By using crowdsourcing techniques, we can determine which calls to block from reaching users of Robosmelter. In the third phase, Blocking, the combined score from all users within the system is consulted each time a call is attempted to a user. If the score is above a predetermined threshold (or, a threshold as specified directly by the user), the call is blocked. Optionally, Robosmelter may tarpit the call. This means that the line will be answered by the application (without passing the call along to the user), and the line will be left open as long as it is not disconnected by the caller. In this way, illegal robocallers are forced to use more time and more channels talking to dead air. This has the effect of raising their incremental cost and consuming channels, reducing the number of calls they are able to make. Advanced users may wish to enable additional, more aggressive blocking features. While we anticipate that the default choices will dramatically reduce the number of illegal robocalls that actually make it to a consumer s device, there are additional policies that consumers may elect to more aggressively block calls. These options include: Blocking toll-free numbers Blocking calls without caller ID information Blocking calls from foreign countries Honeypots and Fully Automatic Detection Since illegal robocallers often dial sequential telephone numbers looking for more targets, we may use this behavior to help identify certain illegal robocallers. Carriers may assign unallocated numbers to be handled by Robosmelter. Whenever the system receives a call to one of these parked numbers, it can emulate a human and listen to the call. By analyzing the call audio, a fully automatic decision may be made as to whether the call is robotic. By using speech recognition technologies, keywords within the call may be identified which can be used
7 to influence the determination whether the call is an illegal robotic sales call. For example: If a particular parked number has been out of service for more than 18 months, which corresponds to the legal robotic calling period for legal robocalls from business that have a relationship with the consumer, and the system can detect a sales attempt, it can assign a high probability that the call is illegal and assign a score to the caller ID appropriately. Alternatively, Robosmelter can look for the same recording to be played to many parked telephone numbers. Once identified, such recordings may be reviewed by a human (either a person responsible for the maintenance of the system, or perhaps even by enlisting support from users of the system directly) and use their determination to raise or lower the score of that call. Exempting Legal Robotic Calls A careful read of the above paragraphs may lead to the conclusion that users will begin to block legal robocalls, such as those by political candidates or charitable organizations. This is definitely possible, as the system as described lacks an ability to tell the difference. To prevent it from blocking legal calls, a whitelist mechanism would be instituted. In order to ensure that legal robocalls are passed through the application, legitimate robocallers would be required to register their caller ID and then to make all their calls from the registered number. The application s whitelist would take precedence over the score and over-all user-activated blocking options, allowing these legal robocalls to be completed. Deployment Considerations The easiest place to gather the information described above is within the consumer s direct telephone service provider. Collecting this information usually requires the consent of the consumer so as not to run afoul of wiretap laws. It is our proposal that software be installed into the carrier s network to enable consumer-approved monitoring of phone calls to collect that information. Such software is already commercially available;; in the United States, AT&T has already deployed what they term Call Management APIs which provide sufficient access to mobile phone calls to enable this kind of service. Small mobile phone networks, known in the industry as Mobile Virtual Network Operators (MVNOs) also have the ability to add applications that interact directly with the consumer s telephone calls. The advantage of MVNOs is one of size and agility: new services may be prototyped and deployed within months or even weeks. While not as seamless, other commercial services such as Google Voice and over-the-top services such as Tropo and Twilio allow applications to broker telephone calls, enabling similar analysis. Closing the Loopholes The proposed solution relies heavily on caller ID as the mechanism by which calls may be identified. Data from the Federal Trade Commission backs up the assertion that caller ID is a valid way to identify likely illegal robocalls. However, as caller ID is easy to spoof, further measures (beyond the technology-based focus of this proposal) should be considered in an effort to reduce ease of falsifying caller ID. These measures may include: 1. Fines for carriers who do not take reasonable measures to ensure that valid caller ID is
8 transmitted by telephone calls originating in their network. This shifts some liability to originating carriers, providing financial incentive to ensure that caller ID is valid at the point it enters the network 2. Stronger, possibly cryptographic, verification for Voice over IP calls. Several proposals exist here. See the slides from the FTC Robocall Summit Panel for an overview of some options: f 3. Adding additional secured metadata to telephone calls to reduce the dependence on caller ID as the only information about the source of a call. This mostly applies to Voice over IP calling (potentially in the form of SIP headers or other in-band information) Contact Information Ben Klang, Principal/Technology Architect Sene Sorrow, General Manager Mojo Lingo LLC
Bob Gnapp Director Member Training & Network Analysis
Robocalls and Spoofing Bob Gnapp Director Member Training & Network Analysis rgnapp@neca.org 303-893-4415 This presentation may be used by attendees for informational purposes only. No part of this presentation
More informationThe Spoofing/Authentication Threat
The Spoofing/Authentication Threat An Analysis of the Spoofing/Authentication Threat in Voice Network Security A Whitepaper From SecureLogix Corporation Introduction Spoofing refers to the act of intentionally
More informationRobocalls and Rural Call Completion Issues
Robocalls and Rural Call Completion Issues Bob Gnapp Director Member Training & Network Analysis rgnapp@neca.org 303-893-4415 Copyright 2018 National Exchange Association, Inc. All rights reserved. This
More informationCLIENT MEMORANDUM. Federal Trade Commission s Rule for Prerecorded Message Telemarketing Calls
CLIENT MEMORANDUM From: West Corporation Re: New Federal Trade Commission Rule for Prerecorded Message Telemarketing Calls Existing Federal Communication Commission Rule for Prerecorded Message Calls to
More informationJanuary 14, Dear Commissioner Rosenworcel:
David C. Bartlett Vice President Federal Government Affairs 1099 New York Ave., NW, Suite 250 Washington, DC 20001 202-429-3101 January 14, 2019 Hon. Jessica Rosenworcel Commissioner Federal Communications
More information2008 NASCIO Recognition Award Nomination
2008 NASCIO Recognition Award Nomination Category: Information Communications Technology (ICT) Title of Nomination: CORIS Inmate Phone System State: Maine TABLE OF CONTENTS B. EXECUTIVE SUMMARY... 3 C.
More informationVoter Contact Registry
Voter Contact Registry How to contact Canadians the right way This Guidebook is for general information only. You should always seek independent legal advice for any specific problem or issue. Respecting
More informationIn this Policy the following terms shall have the following meanings:
NJR TRADING LTD understands that your privacy is important to you and that you care about how your personal data is used. We respect and value the privacy of everyone who visits this website, https://bar-tonic.
More informationRobocall signaling draft-sipcore-callinfo-spam. Henning Schulzrinne IETF 98
Robocall signaling draft-sipcore-callinfo-spam Henning Schulzrinne IETF 98 Background (for the un-stired and un-shaken) Unwanted calls are typically some are illegal, some are just unwanted (by many) example:
More informationShaken 101: Mitigating Illegal Robocalling and Caller ID Scams Webinar
Shaken 101: Mitigating Illegal Robocalling and Caller ID Scams Webinar Panelists: Dr. Eric Burger Chief Technology Officer FCC Jim McEachern Principal Technologist ATIS Moderator: Brent Struthers STI-GA
More informationMailChimp Basics. A step by step guide to MailChimp Course developed by Virginia Ridley
MailChimp Basics A step by step guide to MailChimp Course developed by Virginia Ridley By the end of this course you will: Know why a newsletter is important Have a brief understanding of Canada s Anti
More informationFrequently Asked Questions. About The Do Not Contact Rules
Updated as of March 2015 Frequently Asked Questions About The Do Not Contact Rules These Frequently Asked Questions should be read in conjunction with NRT s Do Not Contact Policy and will be updated from
More informationPUBLIC NOTICE FCC ENFORCEMENT ADVISORY TELEPHONE CONSUMER PROTECTION ACT ROBOCALL AND TEXT RULES
PUBLIC NOTICE Federal Communications Commission 445 12 th St., S.W. Washington, D.C. 20554 News Media Information 202 / 418-0500 Internet: http://www.fcc.gov TTY: 1-888-835-5322 DA 16-264 March 14, 2016
More informationBEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, D.C ) ) ) ) ) REPLY COMMENTS OF THE USTELECOM ASSOCIATION
BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, D.C. 20554 In the Matter of Call Authentication Trust Anchor ) ) ) ) ) CG Docket No. 17-97 REPLY COMMENTS OF THE USTELECOM ASSOCIATION The USTelecom
More informationRobocall and fake caller-id detection
Technical Disclosure Commons Defensive Publications Series December 01, 2017 Robocall and fake caller-id detection Junda Liu Naveen Kalla Shi Lu Follow this and additional works at: http://www.tdcommons.org/dpubs_series
More informationPermission At A Glance: DMA s Consumer Preferences & Choice Guidance
Permission At A Glance: DMA s Consumer Preferences & Choice Guidance *Please note: this document is not intended to provide you with specific legal advice. You should ensure you review your compliance
More informationincontact Auto Attendant Admin Reference Manual
incontact Auto Attendant Admin Reference Manual incontact Auto Attendant Admin Reference Manual Title incontact Auto Attendant Admin Reference Manual Revision 04052011 Copyright About incontact 2011 incontact,
More informationCanadian Anti Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS
Canadian Anti Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS Note: This FAQ is intended to assist OC staff and faculty members to understand their obligations under the CASL. It summarizes and simplifies
More informationFull Moon Fest Privacy Policy
Last Updated: May 3rd, 2017 Full Moon Fest Privacy Policy Thank you for visiting the Full Moon Fest website located at www.matteprojects.com (the Website ). The Website is an Internet property of Full
More informationAutomated Call Quality, CLI and Performance Testing
. Automated Call Quality, CLI and Performance Testing 2 itest The most comprehensive test platform available. itest is a testing and performance monitoring platform designed specifically for the 21st Century
More informationResponse of Microsoft Corporation to Ofcom s consultation document. Guidelines for CLI Facilities. 14 November 2017
Response of Microsoft Corporation to Ofcom s consultation document Guidelines for CLI Facilities 14 November 2017 14 November 2017 Microsoft s response to Ofcom s consultation on changes to the CLI guidelines
More informationSoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam
2016 IEEE Symposium on Security and Privacy SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam Huahong Tu, Adam Doupé, Ziming Zhao, and Gail-Joon Ahn Arizona State University
More informationNWQ Capital Management Pty Ltd. Privacy Policy. March 2017 v2
NWQ Capital Management Pty Ltd Privacy Policy March 2017 Page 1 of 8 Privacy and Spam Policy NWQ Capital Management Pty Ltd s Commitment NWQ Capital Management Pty Ltd (NWQ) is committed to providing you
More informationIS FEDERATION LYNC S SECRET WEAPON?
IS FEDERATION LYNC S SECRET WEAPON? by Michael Greenlee, Clarity Consulting 1 OF 5 INTRODUCTION Microsoft Lync, Microsoft s contribution to the enterprise Unified Communications market, has undergone a
More informationContents Overview... 4 Install AT&T Toggle Voice... 4 Sign in to AT&T Toggle Voice... 5 Define your Location for Emergency Calls...
Contents 1. Overview... 4 2. Install AT&T Toggle Voice... 4 Requirements... 4 3. Sign in to AT&T Toggle Voice... 5 4. Define your Location for Emergency Calls... 7 Update Your Registered Location for Emergency
More informationTCPA Compliance. Best Practices for Two-Way Texting
TCPA Compliance Best Practices for Two-Way Texting When selecting a business-texting solution, companies must consider the potential for legal exposure under the Telephone Consumer Protection Act of 1991
More informationMobile TeleSystems (MTS) Converges Fixed and Mobile Telephony
Mobile TeleSystems (MTS) Converges Fixed and Mobile Telephony MTS creates new revenue opportunities with new services. EXECUTIVE SUMMARY Mobile TeleSystems (MTS) Industry: Telecommunications BUSINESS CHALLENGE
More informationTerms and Conditions of Mobile Phone Service (Post-Paid) Between Operator and Subscriber
Terms and Conditions of Mobile Phone Service (Post-Paid) Between Operator and Subscriber Section 1 General 1.1 This Terms and Conditions of Mobile Phone Service shall be effective between Advanced Wireless
More informationAllworx User s Guide (Release x)
Allworx User s Guide (Release 6.8.1.x) -PAGE INTENTIONALLY LEFT BLANK- Table of Contents 1 VOICEMAIL...1 1.1 ACCESSING YOUR MESSAGE CENTER INBOX...1 1.2 LISTENING TO YOUR VOICEMAIL...2 1.3 SENDING VOICEMAIL
More informationThe Center for Affiliated Learning ( the CAL ) Privacy Policy
The Center for Affiliated Learning ( the CAL ) Privacy Policy Welcome to the Center for Affiliated Learning ( the CAL ) an education and training platform owned and operated by Affiliates Risk Management
More informationNATIONAL CERTIFICATION EXAMINATION FOR EMERGENCY COMMUNICATIONS
NATIONAL CERTIFICATION EXAMINATION FOR EMERGENCY COMMUNICATIONS "CNET" Certified National Emergency Telecommunicator Handbook for Level I Telecommunicator CERTIFICATION The NECC is a private testing organization
More informationVoiceAccess Users Guide
Users Guide Table of Contents GETTING STARTED...1 Device Configuration...1 Connecting to a PBX...2 Plus Features...2 VoiceMail...2 Call Forwarding...2 Caller ID...3 MANAGING CALLING FEATURES FROM THE PHONE...4
More informationVETS FIRST CHOICE PRIVACY POLICY FOR PARTICIPATING VETERINARY PRACTICES
VETS FIRST CHOICE PRIVACY POLICY FOR PARTICIPATING VETERINARY PRACTICES PLEASE READ THIS PRIVACY POLICY CAREFULLY BEFORE USING THIS SITE. Last Updated: January 01, 2015 Direct Vet Marketing, Inc. (hereinafter,
More informationAcceptable Use Policy (AUP)
Acceptable Use Policy (AUP) Questions regarding this policy and complaints of violations of this policy by PLAINS INTERNET users can be directed to support@plainsinternet.com. Introduction Plains Internet
More informationContact Center Compliance Seminar Bringing you the ANSWERS you need about compliance in your call center.
Contact Center Compliance Seminar Bringing you the ANSWERS you need about compliance in your call center. Outbound Prerecorded Messages Mitchell N. Roth, Esq. Partner, Business and Communications Practices
More informationTerms and Conditions of Mobile Phone Service (Pre-Paid) Between Operator and Subscriber
Terms and Conditions of Mobile Phone Service (Pre-Paid) Between Operator and Subscriber Section 1 General 1.1 This Terms and Conditions of Mobile Phone Service shall be effective between Advanced Wireless
More informationABSTRACT. that it avoids the tolls charged by ordinary telephone service
ABSTRACT VoIP (voice over IP - that is, voice delivered using the Internet Protocol) is a term used in IP telephony for a set of facilities for managing the delivery of voice information using the Internet
More informationEagles Charitable Foundation Privacy Policy
Eagles Charitable Foundation Privacy Policy Effective Date: 1/18/2018 The Eagles Charitable Foundation, Inc. ( Eagles Charitable Foundation, we, our, us ) respects your privacy and values your trust and
More informationNASD NOTICE TO MEMBERS 97-58
NASD NOTICE TO MEMBERS 97-58 NASD Regulation Requests Comment On Proposed Interpretive Material 1031 Regarding Cold Calling Activity; Comment Period Expires October 31, 1997 Suggested Routing Senior Management
More informationDepending on the Services or information you request from us, we may ask you to provide the following personal information:
LINK HUNGARY PRIVACY POLICY PROTECTING YOUR DATA 1. Who are Link Asset Services and Link Hungary? Link Asset Services ( Link ) is a trading name of companies which offer a range of services, principally
More informationThe Telephony Denial of Service (TDoS) Threat
The Telephony Denial of Service (TDoS) Threat An Analysis of the TDoS Threat in Voice Network Security A Whitepaper From SecureLogix Corporation Telephony Denial-of-Service (TDoS) and The Public Voice
More informationSIP and VoIP What is SIP? What s a Control Channel? History of Signaling Channels
Network Security - ISA 656 Voice Over IP (VoIP) Security Simple SIP ing Alice s Bob Session Initiation Protocol Control channel for Voice over IP (Other control channel protocols exist, notably H.323 and
More informationOur Privacy Policy. Last modified: December 12th Summary of changes can be consulted at the bottom of this Privacy Policy.
Our Privacy Policy Last modified: December 12th 2014. Summary of changes can be consulted at the bottom of this Privacy Policy. The aim of this Privacy Policy is to provide an overview on the privacy practices
More informationApplication Notes for OneAccess-Telstra Business SIP with Avaya IP Office Release 11 SIP Trunking - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for OneAccess-Telstra Business SIP with Avaya IP Office Release 11 SIP Trunking - Issue 1.0 Abstract These Application Notes illustrate a sample
More informationWorld Wide Jobs Ltd t/a Findmyexpert.com Privacy Policy 12 th April 2018
World Wide Jobs Ltd t/a Findmyexpert.com Privacy Policy 12 th April 2018 We understand that you are aware of and care about your own personal privacy interests and we take that seriously. This Privacy
More informationPRIVACY POLICY. 1. Definitions and Interpretation In this Policy the following terms shall have the following meanings:
PRIVACY POLICY BACKGROUND: Leaman Mattei Limited (LM) understands that your privacy is important to you and that you care about how your personal data is used. We respect and value the privacy of everyone
More informationPRIVACY STATEMENT Last Updated: January 1, 2017
PRIVACY STATEMENT Last Updated: January 1, 2017 The General Motors Family of Companies (including General Motors Company, OnStar, LLC ( OnStar ), and affiliates) (collectively, "GM" or "we") provides this
More informationCanadian Anti-Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS
Canadian Anti-Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS 1. General Questions 1.1 What is the Canadian Anti-Spam Legislation? The primary purpose of the Canadian Anti-Spam Legislation (called CASL;
More informationAllworx User s Guide. (Release 7.3)
Allworx User s Guide (Release 7.3) No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy, recording,
More informationBend Mailing Services, LLC, dba BMS Technologies ( us, we, or our ) operates the website (the Service ).
Privacy Policy online-billpay.com Effective date: May 18, 2018 Bend Mailing Services, LLC, dba BMS Technologies ( us, we, or our ) operates the https://www.online-billpay.com/ website (the Service ). This
More informationWhite Paper Subcategory. Overview of XML Communication Technologies
Subcategory Overview of XML Communication Technologies Executive Summary A significant shift has occurred in the communications infrastructures deployed today. This shift is the result of the acceptance
More informationYADTEL - Privacy Information INFORMATION WE COLLECT
YADTEL - Privacy Information As a customer of Yadtel, you are entitled to know what we do with personal information about you that we receive. We consider our treatment of such information to be a part
More informationAbout Us. Privacy Policy v1.3 Released 11/08/2017
Privacy Policy v1.3 Released 11/08/2017 About Us THIS PRIVACY POLICY, OUR VIEWER TERMS (hellopupil.com/viewerterms) AND HEALTH & SAFETY GUIDANCE (hellopupil.com/advice) COLLECTIVELY FORM THE TERMS GOVERNING
More informationCanada s Anti-Spam Legislation: What It Means to Hit Send
Canada s Anti-Spam Legislation: What It Means to Hit Send Presented to the Canadian Vintners Association by Wendy Mee May 28, 2014 Overview Key Dates Overview of the Law Liability and Penalties Compliance
More informationUntraceable Nym Creation on the Freedom 2.0 Network
Russell Samuels Ed Hawco November 1, 2000 Untraceable Nym Creation on the Freedom 2.0 Network Version 2.0 This whitepaper, targeted at users with a basic understanding of Freedom, describes the Freedom
More informationShort Codes - Social and Public Services. Web Portal. Please visit our website at
Service Electric Cable TV and Communications Telephone Guide Service Electric offers a variety of features with their state of the art telephone service. This brochure will guide you through the basic
More informationGlenwood Telecommunications, Inc. Acceptable Use Policy (AUP)
Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP) All customers should read this document. You are responsible for the policy written here, and your account WILL BE DISABLED WITHOUT WARNING
More information1 Page. Digital Voice Services Business User Guide
1 Page Digital Voice Services Business User Guide Feature Access Codes *62 Voice Portal *86 Direct Voice Mail Retrieval *77 Anonymous Call Rejection Activation *87 Anonymous Call Rejection Deactivation
More informationCENTREX service. user reference guide. Clearly different.
CENTREX service user reference guide Clearly different. TABLE OF CONTENTS This user s guide provides instructions for using Centrex features. A check in the circle next to a feature means that your Centrex
More informationPaper on Handling Menace of International Grey Traffic
Paper on Handling Menace of International Grey Traffic White Paper 01 of 2012 PiRRC In this paper discussion is only about the conventional international voice telephony requiring a license to bring in
More informationSpree Privacy Policy
Spree Privacy Policy Effective as at 21 November 2018 Introduction Spree respects your privacy and it is important to us that you have an enjoyable experience buying and selling with us but also that you
More informationVERSION 1.3 MAY 1, 2018 SNOWFLY PRIVACY POLICY SNOWFLY PERFORMANCE INC. P.O. BOX 95254, SOUTH JORDAN, UT
VERSION 1.3 MAY 1, 2018 SNOWFLY PRIVACY POLICY SNOWFLY PERFORMANCE INC. P.O. BOX 95254, SOUTH JORDAN, UT 84095-9998 SNOWFLY PRIVACY POLICY This Privacy Policy describes Snowfly s practices regarding the
More informationPRIVACY POLICY Let us summarize this for you...
PRIVACY POLICY Let us summarize this for you... We promise to never sell your personal information. This site collects usage information to provide a better web experience for our users. If you purchase
More informationCustomer Proprietary Network Information
Customer proprietary network information (CPNI) means information that relates to the quantity, technical configuration, type, destination, location, and amount of use of our service by you and information
More informationTo review material modifications and their effective dates scroll to the bottom of the page.
PRIVACY POLICY Effective Date: October 1, 2016 To review material modifications and their effective dates scroll to the bottom of the page. Cobra Trading, Inc. ("Cobra") owns and operates this cobratrading.com
More informationOffice Properties Income Trust Privacy Notice Last Updated: February 1, 2019
General Office Properties Income Trust Privacy Notice Last Updated: February 1, 2019 Office Properties Income Trust ( OPI ) is committed to your right to privacy and to keeping your personal information
More informationBPA Worldwide Guide to Outbound Telemarketing Recording
BPA Worldwide Guide to Outbound Telemarketing Recording Operating Guidelines for Publishing Companies and Telemarketing Agencies Involved in the Acquisition and Requalification of Telecommunication Requests
More informationShaw Privacy Policy. 1- Our commitment to you
Privacy Policy last revised on: Sept 16, 2016 Shaw Privacy Policy If you have any questions regarding Shaw s Privacy Policy please contact: privacy@shaw.ca or use the contact information shown on any of
More informationQueueMetrics by Loway
QueueMetrics by Loway Your Way to Asterisk Call Centers management Feature Overview A monitoring and reporting system is the most important component of any call center. The fine adjustment and balancing
More informationPrivacy and Cookies Policy
Sohn Foundation London Privacy and Cookies Policy The Sohn Foundation London (company number: 08075575, charity number: 1148454) is a wholly owned subsidiary of The Ira Sohn Conference Foundation, Inc.
More informationPRIVACY POLICY. 1. Definitions and Interpretation In this Policy the following terms shall have the following meanings:
PRIVACY POLICY BACKGROUND: The World Freight Group ( WFG ) understands that your privacy is important to you and that you care about how your personal data is used. We respect and value the privacy of
More informationPRIVACY POLICY. 1. Definitions and Interpretation In this Policy the following terms shall have the following meanings:
PRIVACY POLICY BACKGROUND: Entod Research Cell UK Ltd understands that your privacy is important to you and that you care about how your personal data is used. We respect and value the privacy of everyone
More informationPending U.S. Anti-spam Legislation: A Marketer's Guide
Tactical Guidelines, W. Janowski Research Note 14 August 2003 Pending U.S. Anti-spam Legislation: A Marketer's Guide Nine anti-spam proposals are before the 108th U.S. Congress. Marketers must understand
More informationFINAL DRAFT A. GENERAL INFORMATION
Protecting the individual's privacy on the Internet is crucial to the future of Internet-based business and the move toward a true Internet economy. We have created this Privacy Statement to demonstrate
More informationGrandstream Networks, Inc. UCM6xxx Series IP PBX Lightweight Call Center Guide
Grandstream Networks, Inc. UCM6xxx Series IP PBX Lightweight Call Center Guide Table of Contents INTRODUCTION... 4 UCM CALL CENTER FEATURES LIST... 5 Call Queues... 5 Virtual Queue... 7 Position Announcement...
More informationInformation we collect about you: (Rewritten)
Local Search Titan, LLC ( LST, "we", "us" or "our") respects the privacy of our users and has developed this Privacy Policy to demonstrate its commitment to protecting your privacy. The intention of this
More informationAT&T CLASSIC MAIL. Voice Messaging System Mailbox User Guide
AT&T CLASSIC MAIL Voice Messaging System Mailbox User Guide Copyright 1993 All Rights Reserved AT&T 585-321-101 Issue 1 December 1993 Notice Every effort was made to ensure that the information in this
More informationAdkin s Privacy Information Notice for Clients, Contractors, Suppliers and Business Contacts
Adkin s Privacy Information Notice for Clients, Contractors, Suppliers and Business Contacts POLICY STATEMENT Adkin is committed to protecting and respecting the privacy of all of our clients. This Policy
More informationPolycom RealAccess, Cloud Edition
ADMINISTRATOR GUIDE January 2018 3725-47131-001E Polycom RealAccess, Cloud Edition Copyright 2017, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another
More informationHandling Complaints Tracy Bedwell Managing Director Sales Training International Ltd
Handling Complaints By Tracy Bedwell Managing Director Sales Training International Ltd Handling Complaints Below is a procedure for handling complaints in small or large, manufacturing or service, private
More informationDentons Canada LLP. Understanding CASL. Presented to the Alberta Chambers of. Craig T. McDougall and Thomas A. Sides
Dentons Canada LLP Understanding CASL Presented to the Alberta Chambers of Commerce April 22, 2014 Craig T. McDougall and Thomas A. Sides Understanding CASL 1) Background and Key Dates 2) Commercial Electronic
More informationPART 7 - Central Office Optional Features 1st Revised Sheet 1 SECTION 2 - Advanced Custom Calling Features Replacing Original Sheet 1
PART 7 - Central Office Optional Features 1st Revised Sheet 1 SECTION 2 - Advanced Custom Calling Features Replacing Original Sheet 1 CUSTOM CALLING SERVICES A. General Regulations Refer to paragraph A.
More informationCompass Consulting Group Terms of Use & Privacy Policy. Last Updated: 10/1/2018
Compass Consulting Group Terms of Use & Privacy Policy Last Updated: 10/1/2018 1. Introduction. At Compass Consulting Group LLC ( Compass, we, us, or our ), we recognize that your privacy is important.
More informationOfcom dialler compliance review
Helping you to verify and maintain compliant dialling campaigns rostrvm Prophet consulting services are based on focused analysis of an organisation s contact and relationship management capability. rostrvm
More informationProfessional Engineers Ontario. canada s anti-spam. Guidelines for Chapters
Professional Engineers Ontario canada s anti-spam legislation (CASL) Guidelines for Chapters Published by Association of Professional Engineers of Ontario, February 2015 Contents 1. Introduction... 3 2.
More informationIP Office Release 7.0 IP Office Essential Edition - Quick Version Embedded Voic User Guide
IP Office Essential Edition - Quick Version Embedded Voicemail User Guide 15-604067 Issue 09a - (21 February 2011) 2011 AVAYA All Rights Reserved. Notices While reasonable efforts have been made to ensure
More informationTelplex Communications Competitive Local Exchange and Interexchange Service Rates Ohio
Telplex Communications Competitive Local Exchange and Interexchange Service Rates Ohio The following rates apply to the furnishing of competitive local exchange and interexchange telecommunications services
More informationVistra International Expansion Limited PRIVACY NOTICE
Effective Date: from 25 May 2018 Vistra International Expansion Limited PRIVACY NOTICE This Privacy Notice explains how particular companies in the Vistra Group collect, use and disclose your personal
More informationInformation you give us when you sign up to the World Merit Hub. In addition, when you sign up to the World Merit Hub, we will usually ask for:
World Merit Website Privacy Policy Last updated: 17th July 2018 Introduction World Merit ( we, our, us ) are committed to protecting and respecting your privacy. We are a Charity established in England
More informationChoose your Price per Seat (no contracts): $79 per month Pay $237 for 3 months Save $30 quarterly
Make More Money in Less Time Move Instantly from Call to Call! Choose your Price per Seat (no contracts): $89 per month Pay month to month Truly Unlimited Calls to USA & Canada from virtually anywhere
More informationPrivacy Policy. Information about us. What personal data do we collect and how do we use it?
This privacy policy sets out the way in which your personal data is handled by Leeds Bradford Airport Limited (referred to as "we", "us" and "our") whether collected through one of the websites we operate,
More informationPurchasing Calling Card Services
Purchasing Calling Card Services Courtesy of Main Resource, Inc. Visit us at www.mainresource.com or call 800 362-6740 for all your telecom needs. PURCHASING CALLING CARD SERVICES Many times when a company
More informationThe Open Group Certification for People. Training Course Accreditation Requirements
The Open Group Certification for People Training Course Accreditation Requirements Version 1.1 February 2014 Copyright 2013-2014, The Open Group All rights reserved. No part of this publication may be
More informationWhitepaper. Jan 16, 2019 Version 2.0. R o b o c a l l s. i o Page 1
Whitepaper Jan 16, 2019 Version 2.0 R o b o c a l l s. i o Page 1 Table of Contents 1. Overview 1.1 Communications Market Overview 2. Previous Attempts to Eliminate Spam Calls That Failed 2.1 Do Not Call
More informationTHE CAN-SPAM ACT OF 2003: FREQUENTLY ASKED QUESTIONS EFFECTIVE JANUARY 1, December 29, 2003
THE CAN-SPAM ACT OF 2003: FREQUENTLY ASKED QUESTIONS EFFECTIVE JANUARY 1, 2004 This FAQ is not intended to provide specific advice about individual legal, business, or other questions. It was prepared
More informationTCPA Features Guide. 100 Enterprise Way, Suite A-300. Scotts Valley, CA
TCPA Features Guide West Corporation 100 Enterprise Way, Suite A-300 Scotts Valley, CA 95066 888-527-5225 www.schoolmessenger.com Table of Contents Introduction... 3 The Telephone Consumer Protection Act
More informationTELEPHONE FEATURES GUIDE Updated August 2018
TELEPHONE FEATURES GUIDE Updated August 2018 ourcontinuum.com/voice WELCOME. We value you as a customer and will continue to work to ensure you have a great experience. We are committed to offering a quality
More informationHow Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework
More informationPrivacy and Spam Policy Ten Tigers Grain Marketing Pty Ltd
Privacy and Spam Policy Ten Tigers Grain Marketing Pty Ltd Our Commitment Ten Tigers Grain Marketing Pty Ltd and Ten Tigers Pty Ltd are committed to providing you with the highest levels of client service.
More informationCanadian Anti-Spam Legislation (CASL) Campaign and Database Compliance Checklist
Canadian Anti-Spam Legislation (CASL) Campaign and Database Compliance Checklist Database Checklist Use this Checklist as a guide to assessing existing databases for compliance with Canada s Anti-Spam
More information