COAI Backs MeitY on OTT Spam Regulation and Cybersecurity

COAI has endorsed MeitY's move to address spam and scam communication from OTT apps. While telecom operators follow strict UCC rules, OTT platforms remain loosely regulated. COAI is advocating for uniform cybersecurity standards and clear regulatory roles to ensure user safety, particularly with emerging threats like steganography.
COAI Backs MeitY on OTT Spam Regulation and Cybersecurity

COAI Backs MeitY’s Crackdown on OTT Spam and Scam Calls

The Cellular Operators Association of India (COAI) has welcomed the Ministry of Electronics and Information Technology’s (MeitY) decision to lead stakeholder discussions on tackling spam and scam communications originating from Over-The-Top (OTT) platforms. This step was announced during the recent meeting of the Joint Committee of Regulators (JCoR).


COAI noted that while spam and fraudulent communication over traditional telecom networks is being actively managed through initiatives by the Department of Telecommunications (DoT) and Telecom Service Providers (TSPs), the threat is now shifting toward OTT communication apps. As TSPs face increasing scrutiny and compliance requirements for Unsolicited Commercial Communications (UCC), spam actors are finding new ways to exploit less-regulated OTT platforms.

Clarifying Regulatory Roles Between OTT Apps and Telecom Operators

The association stressed the importance of clearly assigning regulatory responsibility. According to COAI, if an application runs over a telecom network, the oversight should fall under the relevant ministry governing that service—not the TSPs.

To illustrate the gap, COAI offered an example: A TSP-issued mobile number may be used to register on an OTT communication app. While TSPs remain accountable for the number and can support law enforcement when required, the same app could be used independently on a different handset, even in another state or city, making it hard to trace misuse. This disconnect arises because OTT apps aren’t tightly coupled with the original SIM card after installation.

Legal Challenges in Tracking Spam Through OTT Communication Apps

This gap in traceability raises serious concerns. Once an OTT communication app is set up, users can continue using it across devices without the original SIM, bypassing geographical or network-based controls. That makes enforcement and tracking more complex for legal agencies, putting a disproportionate burden on TSPs despite their limited control over OTT app behavior.

COAI Flags Steganography as a Growing Cybersecurity Risk

COAI also highlighted the emerging risk of steganography, a technique where hidden messages are embedded in seemingly benign files like images or documents. This technique allows bad actors to conceal malicious scripts, making detection harder and aiding in fraudulent activities. According to the association, this practice deserves urgent regulatory focus due to its ability to facilitate digital fraud.

COAI Calls for Unified Cybersecurity Rules for OTTs and TSPs

COAI called for a level playing field where both TSPs and OTT communication platforms are subject to similar cybersecurity and regulatory standards. The group emphasized that this is the only way to effectively protect users from spam and fraud.

The association concluded by stressing the need for clear cybersecurity mandates that aim to minimize spam and scam calls or messages. In their view, regulations must evolve to reflect today’s communication landscape, where OTT apps play an increasingly central role.


Recent Content

ETSI has published its first ISAC report for 6G—ETSI GR ISC 001—highlighting 18 use cases across healthcare, public safety, automation, and mobility. The report dives into deployment scenarios, sensing modalities, and KPIs like fine motion accuracy and sensing latency. It also outlines security, privacy, and sustainability guidelines for real-world ISAC integration into 6G networks.
In 2025, 5G surpasses 2.25 billion global connections, marking a pivotal shift toward mainstream adoption. While North America leads in performance and per capita usage, challenges in spectrum policy and enterprise integration remain. This in-depth report from 5G Americas explores the rise of Standalone 5G, the promise of 5G-Advanced, the reality of private network deployments, and the need for smart, forward-looking spectrum strategy.
AI is transforming the gaming industry, and Sierra ANN is leading the charge. With failure rates historically as high as 75%, game development has long relied on costly, trial-and-error processes. Now, AI is optimizing every stage—from graphics and animations to math balancing, audio, and QA. Sierra ANN’s AI-powered suite promises to double success rates and cut production costs in half, making game development faster, smarter, and more profitable.
SuperAI Singapore 2025 will bring together over 7,000 global leaders in AI, robotics, healthcare, finance, and climate tech at Marina Bay Sands on June 18–19. With three stages, a hackathon, and a $200K startup competition, the event unites Eastern and Western AI ecosystems to spotlight frontier breakthroughs. Speakers include Emad Mostaque, Balaji Srinivasan, and Sharon Zhou, with more than 150 tech visionaries expected to appear.
Confidencial.io will unveil its unified AI data governance platform at RSAC 2025. Designed to secure unstructured data in AI workflows, the system applies object-level Zero Trust encryption and seamless compliance with NIST/ISO frameworks. It protects AI pipelines and agentic systems from sensitive data leakage while supporting safe, large-scale innovation.
Qubrid AI unveils Version 3 of its AI GPU Cloud, featuring smarter model tuning, auto-stop deployment, and enhanced RAG UI—all designed to streamline AI workflows. The company also teased its upcoming Agentic Workbench, a new toolkit to simplify building autonomous AI agents. Along with App Studio and data provider integration, Qubrid is positioning itself as the go-to enterprise AI platform for 2025.
Whitepaper
As VoLTE becomes the standard for voice communication, its rapid deployment exposes telecom networks to new security risks, especially in roaming scenarios. SecurityGen’s research uncovers key vulnerabilities like unauthorized access to IMS, SIP protocol threats, and lack of encryption. Learn how to strengthen VoLTE security with proactive measures such as...
Whitepaper
Dive into the comprehensive analysis of GTPu within 5G networks in our whitepaper, offering insights into its operational mechanics, strategic importance, and adaptation to the evolving landscape of cellular technologies....

It seems we can't find what you're looking for.

Download Magazine

With Subscription

Subscribe To Our Newsletter

Scroll to Top