COAI Backs MeitY on OTT Spam Regulation and Cybersecurity

COAI has endorsed MeitY's move to address spam and scam communication from OTT apps. While telecom operators follow strict UCC rules, OTT platforms remain loosely regulated. COAI is advocating for uniform cybersecurity standards and clear regulatory roles to ensure user safety, particularly with emerging threats like steganography.
COAI Backs MeitY on OTT Spam Regulation and Cybersecurity

COAI Backs MeitY’s Crackdown on OTT Spam and Scam Calls

The Cellular Operators Association of India (COAI) has welcomed the Ministry of Electronics and Information Technology’s (MeitY) decision to lead stakeholder discussions on tackling spam and scam communications originating from Over-The-Top (OTT) platforms. This step was announced during the recent meeting of the Joint Committee of Regulators (JCoR).


COAI noted that while spam and fraudulent communication over traditional telecom networks is being actively managed through initiatives by the Department of Telecommunications (DoT) and Telecom Service Providers (TSPs), the threat is now shifting toward OTT communication apps. As TSPs face increasing scrutiny and compliance requirements for Unsolicited Commercial Communications (UCC), spam actors are finding new ways to exploit less-regulated OTT platforms.

Clarifying Regulatory Roles Between OTT Apps and Telecom Operators

The association stressed the importance of clearly assigning regulatory responsibility. According to COAI, if an application runs over a telecom network, the oversight should fall under the relevant ministry governing that service—not the TSPs.

To illustrate the gap, COAI offered an example: A TSP-issued mobile number may be used to register on an OTT communication app. While TSPs remain accountable for the number and can support law enforcement when required, the same app could be used independently on a different handset, even in another state or city, making it hard to trace misuse. This disconnect arises because OTT apps aren’t tightly coupled with the original SIM card after installation.

Legal Challenges in Tracking Spam Through OTT Communication Apps

This gap in traceability raises serious concerns. Once an OTT communication app is set up, users can continue using it across devices without the original SIM, bypassing geographical or network-based controls. That makes enforcement and tracking more complex for legal agencies, putting a disproportionate burden on TSPs despite their limited control over OTT app behavior.

COAI Flags Steganography as a Growing Cybersecurity Risk

COAI also highlighted the emerging risk of steganography, a technique where hidden messages are embedded in seemingly benign files like images or documents. This technique allows bad actors to conceal malicious scripts, making detection harder and aiding in fraudulent activities. According to the association, this practice deserves urgent regulatory focus due to its ability to facilitate digital fraud.

COAI Calls for Unified Cybersecurity Rules for OTTs and TSPs

COAI called for a level playing field where both TSPs and OTT communication platforms are subject to similar cybersecurity and regulatory standards. The group emphasized that this is the only way to effectively protect users from spam and fraud.

The association concluded by stressing the need for clear cybersecurity mandates that aim to minimize spam and scam calls or messages. In their view, regulations must evolve to reflect today’s communication landscape, where OTT apps play an increasingly central role.


Recent Content

SoftBank has launched the Large Telecom Model (LTM), a domain-specific, AI-powered foundation model built to automate telecom network operations. From base station optimization to RAN performance enhancement, LTM enables real-time decision-making across large-scale mobile networks. Developed with NVIDIA and trained on SoftBank’s operational data, the model supports rapid configuration, predictive insights, and integration with SoftBank’s AITRAS orchestration platform. LTM marks a major step in SoftBank’s AI-first strategy to build autonomous, scalable, and intelligent telecom infrastructure.
Telecom providers have spent over $300 billion since 2018 on 5G, fiber, and cloud-based infrastructure—but returns are shrinking. The missing link? Network observability. Without real-time visibility, telecoms can’t optimize performance, preempt outages, or respond to security threats effectively. This article explores why observability must become a core priority for both operators and regulators, especially as networks grow more dynamic, virtualized, and AI-driven.
Selective transparency in open-source AI is creating a false sense of openness. Many companies, like Meta, release only partial model details while branding their AI as open-source. This article dives into the risks of such practices, including erosion of trust, ethical lapses, and hindered innovation. Examples like LAION 5B and Meta’s Llama 3 show why true openness — including training data and configuration — is essential for responsible, collaborative AI development.
As Open RAN moves from trials to large-scale adoption, telecom giants like NTT Docomo, AT&T, and TELUS share their real-world deployment strategies. From multivendor interoperability to automation and security, this article explores key operational insights, ecosystem collaborations, and future directions in Open RAN architecture.
5G and AI are transforming industries, but this convergence also brings complex security challenges. This article explores how Secure Access Service Edge (SASE), zero trust models, and solutions like Prisma SASE 5G are safeguarding enterprise networks. With real-world examples from telecom and manufacturing, learn how to secure 5G infrastructure for long-term digital success.
Connectivity convergence is redefining the Internet of Things by integrating legacy systems, cellular, Wi-Fi, LoRaWAN, BLE, and satellite networks. From agriculture to logistics, IoT ecosystems are evolving to prioritize seamless communication, modular hardware, and intelligent data handling with edge AI. This article explores how convergence is shifting the focus from hype to practical, scalable deployment—unlocking the true potential of IoT everywhere.

Currently, no free downloads are available for related categories. Search similar content to download:

  • Reset

It seems we can't find what you're looking for.

Download Magazine

With Subscription

Subscribe To Our Newsletter

Scroll to Top