COAI Backs MeitY on OTT Spam Regulation and Cybersecurity

COAI has endorsed MeitY's move to address spam and scam communication from OTT apps. While telecom operators follow strict UCC rules, OTT platforms remain loosely regulated. COAI is advocating for uniform cybersecurity standards and clear regulatory roles to ensure user safety, particularly with emerging threats like steganography.
COAI Backs MeitY on OTT Spam Regulation and Cybersecurity

COAI Backs MeitY’s Crackdown on OTT Spam and Scam Calls

The Cellular Operators Association of India (COAI) has welcomed the Ministry of Electronics and Information Technology’s (MeitY) decision to lead stakeholder discussions on tackling spam and scam communications originating from Over-The-Top (OTT) platforms. This step was announced during the recent meeting of the Joint Committee of Regulators (JCoR).


COAI noted that while spam and fraudulent communication over traditional telecom networks is being actively managed through initiatives by the Department of Telecommunications (DoT) and Telecom Service Providers (TSPs), the threat is now shifting toward OTT communication apps. As TSPs face increasing scrutiny and compliance requirements for Unsolicited Commercial Communications (UCC), spam actors are finding new ways to exploit less-regulated OTT platforms.

Clarifying Regulatory Roles Between OTT Apps and Telecom Operators

The association stressed the importance of clearly assigning regulatory responsibility. According to COAI, if an application runs over a telecom network, the oversight should fall under the relevant ministry governing that service—not the TSPs.

To illustrate the gap, COAI offered an example: A TSP-issued mobile number may be used to register on an OTT communication app. While TSPs remain accountable for the number and can support law enforcement when required, the same app could be used independently on a different handset, even in another state or city, making it hard to trace misuse. This disconnect arises because OTT apps aren’t tightly coupled with the original SIM card after installation.

Legal Challenges in Tracking Spam Through OTT Communication Apps

This gap in traceability raises serious concerns. Once an OTT communication app is set up, users can continue using it across devices without the original SIM, bypassing geographical or network-based controls. That makes enforcement and tracking more complex for legal agencies, putting a disproportionate burden on TSPs despite their limited control over OTT app behavior.

COAI Flags Steganography as a Growing Cybersecurity Risk

COAI also highlighted the emerging risk of steganography, a technique where hidden messages are embedded in seemingly benign files like images or documents. This technique allows bad actors to conceal malicious scripts, making detection harder and aiding in fraudulent activities. According to the association, this practice deserves urgent regulatory focus due to its ability to facilitate digital fraud.

COAI Calls for Unified Cybersecurity Rules for OTTs and TSPs

COAI called for a level playing field where both TSPs and OTT communication platforms are subject to similar cybersecurity and regulatory standards. The group emphasized that this is the only way to effectively protect users from spam and fraud.

The association concluded by stressing the need for clear cybersecurity mandates that aim to minimize spam and scam calls or messages. In their view, regulations must evolve to reflect today’s communication landscape, where OTT apps play an increasingly central role.


Recent Content

Nokia, Honeywell Aerospace Technologies, and Numana have teamed up to develop quantum-safe networks, a pivotal move for global cybersecurity. This partnership leverages technology from each entity to secure data communications against future threats. Learn about their strategic roles and the potential impacts on both private and national security frameworks.
OneLayer and Ericsson have partnered to launch a scalable Zero Trust Network Access (ZT-ZTNA) solution for private LTE and 5G networks. Tailored for industries like utilities and manufacturing, this solution simplifies device onboarding, eliminates manual provisioning, and enforces zero trust policies to enhance security across connected assets.
Looking to learn AI in 2025 without breaking the bank? This blog breaks down the best free AI courses and certifications from top platforms like Google, IBM, and Harvard. Whether you’re a beginner, teacher, or tech professional, you’ll find career-relevant learning paths, direct course links, and tips to get certified and start building AI projects today.
Explore the transformative potential of Open Radio Access Networks (O-RAN) as it integrates AI, enhances security, and fosters interoperability to reshape mobile network infrastructure. In this article, we explore the advancements and challenges of O-RAN, revealing how it sets the stage for future mobile communications with smarter, more secure, and highly adaptable network solutions. Dive into the strategic implications for the telecommunications industry and learn why O-RAN is critical for the next generation of digital connectivity.
Nvidia’s Open Power AI Consortium is pioneering the integration of AI in energy management, collaborating with industry giants to enhance grid efficiency and sustainability. This initiative not only caters to the rising demands of data centers but also promotes the use of renewable energy, illustrating a significant shift towards environmentally sustainable practices. Discover how this synergy between technology and energy sectors is setting new benchmarks in innovative and sustainable energy solutions.
SK Telecom’s AI assistant, adot, now features Google’s Gemini 2.0 Flash, unlocking real-time Google search, source verification, and support for 12 large language models. The integration boosts user trust, expands adoption from 3.2M to 8M users, and sets a new standard in AI transparency and multi-model flexibility for digital assistants in the telecom sector.
Whitepaper
This 5G network assurance white paper, sponsored by RADCOM covers critical requirements, technologies, and approaches that assurance solutions must support....

It seems we can't find what you're looking for.

Download Magazine

With Subscription

Subscribe To Our Newsletter

Scroll to Top