Private Network Check Readiness - TeckNexus Solutions

COAI Backs MeitY on OTT Spam Regulation and Cybersecurity

COAI has endorsed MeitY's move to address spam and scam communication from OTT apps. While telecom operators follow strict UCC rules, OTT platforms remain loosely regulated. COAI is advocating for uniform cybersecurity standards and clear regulatory roles to ensure user safety, particularly with emerging threats like steganography.
COAI Backs MeitY on OTT Spam Regulation and Cybersecurity

COAI Backs MeitY’s Crackdown on OTT Spam and Scam Calls

The Cellular Operators Association of India (COAI) has welcomed the Ministry of Electronics and Information Technology’s (MeitY) decision to lead stakeholder discussions on tackling spam and scam communications originating from Over-The-Top (OTT) platforms. This step was announced during the recent meeting of the Joint Committee of Regulators (JCoR).


COAI noted that while spam and fraudulent communication over traditional telecom networks is being actively managed through initiatives by the Department of Telecommunications (DoT) and Telecom Service Providers (TSPs), the threat is now shifting toward OTT communication apps. As TSPs face increasing scrutiny and compliance requirements for Unsolicited Commercial Communications (UCC), spam actors are finding new ways to exploit less-regulated OTT platforms.

Clarifying Regulatory Roles Between OTT Apps and Telecom Operators

The association stressed the importance of clearly assigning regulatory responsibility. According to COAI, if an application runs over a telecom network, the oversight should fall under the relevant ministry governing that service—not the TSPs.

To illustrate the gap, COAI offered an example: A TSP-issued mobile number may be used to register on an OTT communication app. While TSPs remain accountable for the number and can support law enforcement when required, the same app could be used independently on a different handset, even in another state or city, making it hard to trace misuse. This disconnect arises because OTT apps aren’t tightly coupled with the original SIM card after installation.

Legal Challenges in Tracking Spam Through OTT Communication Apps

This gap in traceability raises serious concerns. Once an OTT communication app is set up, users can continue using it across devices without the original SIM, bypassing geographical or network-based controls. That makes enforcement and tracking more complex for legal agencies, putting a disproportionate burden on TSPs despite their limited control over OTT app behavior.

COAI Flags Steganography as a Growing Cybersecurity Risk

COAI also highlighted the emerging risk of steganography, a technique where hidden messages are embedded in seemingly benign files like images or documents. This technique allows bad actors to conceal malicious scripts, making detection harder and aiding in fraudulent activities. According to the association, this practice deserves urgent regulatory focus due to its ability to facilitate digital fraud.

COAI Calls for Unified Cybersecurity Rules for OTTs and TSPs

COAI called for a level playing field where both TSPs and OTT communication platforms are subject to similar cybersecurity and regulatory standards. The group emphasized that this is the only way to effectively protect users from spam and fraud.

The association concluded by stressing the need for clear cybersecurity mandates that aim to minimize spam and scam calls or messages. In their view, regulations must evolve to reflect today’s communication landscape, where OTT apps play an increasingly central role.


Recent Content

BT’s global fabric redefines telecoms by collapsing legacy silos into a fully digital, AI-ready network. With virtualization, cloud agility, and NaaS, BT supports critical infrastructure at global scale while tackling data sovereignty, resilience, and modern skills challenges.
Tampnet has rolled out the world’s first fully autonomous private 5G network with Edge Compute offshore for Aker BP’s Edvard Grieg platform. This digital backbone provides real-time data processing, robust wireless coverage, and supports advanced offshore operations like autonomous drones, robotics, and predictive maintenance, setting a new standard for offshore oil and gas connectivity.
India’s Department of Telecommunications (DoT) has relaunched its plan to directly allocate spectrum for private 5G networks. The new demand study invites large enterprises and system integrators to signal interest in dedicated spectrum for captive 5G setups. If approved, this policy could enable Indian industries to run secure, high-speed networks without fully relying on telecom operators.
GFiber Labs and Nokia are partnering to shape the future of home internet with network slicing. Network Slicing lets customers customize bandwidth for gaming, work, and secure tasks. GFiber’s successful demo with Nokia shows how slices can create smoother gameplay, better video calls, and safer online banking – all while putting real-time control in users’ hands.
Generative AI is a whole new spearheading technologies paying into the healthcare to analyze massive data to prevent and manage diseases with a personal approach. Beyond treatment decisions, Generative AI is broadly applicable in wide range of healthcare tasks, including finance management.  Notably, with increasing adoption across healthcare, GenAI in healthcare industry is likely to gain momentum in the upcoming years. According to the Roots Analysis, Generative AI in health market is estimated to reach at USD 39.8 billion by 2035, expecting to grow at a CAGR of 28% during the forecast period. Let’s explore more about Generative AI across healthcare industry.
Panzura Symphony’s latest update introduces a first-of-its-kind solution to combat permission sprawl and enhance AI readiness. Unlike other security tools, Symphony proactively identifies, monitors, and automatically resolves permission inheritance problems, preventing exploitation by malicious actors and eliminating the need for manual intervention. This update also allows users to apply custom metadata to files, facilitating advanced policy automation and populating AI pipelines based on file attributes without needing content scanning.
Whitepaper
Dive deep into how Radisys Corporation is navigating the dynamic landscape of Open RAN and 5G technologies. With their innovative strategies, they are making monumental strides in advancing the deployment and implementation of scalable, flexible, and efficient solutions. Get insights into how they're leveraging small cells, private networks, and strategic...
Whitepaper
This whitepaper explores seven compelling use cases of AI-infused automated service assurance solutions, encompassing anomaly detection, automated root cause analysis, service quality enhancement, customer experience improvement, network capacity planning, network monetization, and self-healing networks. Each use case explains how AI, when embedded in a tailored assurance solution powered by extensive...
Radcom Logo

It seems we can't find what you're looking for.

Download Magazine

With Subscription

Subscribe To Our Newsletter

Private Network Awards 2025 - TeckNexus
Scroll to Top

Private Network Awards

Recognizing excellence in 5G, LTE, CBRS, and connected industries. Nominate your project and gain industry-wide recognition.
Early Bird Deadline: Sept 5, 2025 | Final Deadline: Sept 30, 2025