Type: Product
Type: Product
Type: Product
Orange, a multinational telecommunications giant, has secured its position as an industry leader through consistent innovation and an unwavering commitment to customer satisfaction. With a vast customer base of 287 million across 26 countries, Orange has carved out a significant presence in the telecommunications industry. , Challenge: Leverage Black Friday to re-connect with customers , Orange recognized the need to re-engage customers and saw the upcoming Black Friday sales event as the perfect opportunity to do so. With a strong focus on enhancing customer experience and loyalty, the primary goal was to design a campaign that would drive customer retention and foster strong customer connections. The aim was to achieve this by leveraging customer data to craft a personalized…, Solution: Creating a personalized, interactive experience using Rich SMS and Campaigns , Orange partnered with Sinch to create a unique and highly personalized experience. Together, they came up with a strategy to offer personalized deals, like new smartphones and tailored mobile packages, that aligned with the customers' preferences. The solution used the Sinch Rich SMS, offering creative possibilities and effective hyper-personalization of messages to increase their impact. At the…, , Result: Boosts in engagement, conversion and redirection rates , Sinch's innovative and hyper-personalized solution delivered impressive outcomes for Orange. By leveraging the power of Rich SMS and the interactive padlock campaign, Orange was able to offer its customers an exclusive and tailored experience like never before. "I'm thrilled to have collaborated with Sinch, who consistently comes up with innovative ideas,” said Stephanie Souvignon, Marketing…
Type: Customer Story
Anyone can fall for a scam. And SMS spoofing is yet another cybersecurity problem that companies and individuals must learn about to avoid becoming the next victim. If you miss the warning signs of an SMS spoof, the implications go far beyond an inconvenience. You could find yourself dealing with identity theft, ransomware, or a huge financial loss. Or you may even be the employee responsible for…, What is SMS spoofing?, Spoofing is bigger than just SMS. It can also happen over email and even through fake online ads. This broader idea of spoofing refers to situations where a cyberscammer masquerades as a trusted entity to trick end users into doing something that benefits the hacker – like clicking a link, downloading a file, or opening an attachment. SMS spoofing refers to the specific scenarios possible on your…, As with other forms of spoofing, the spoof SMS will usually include some kind of link they want you to click on. , And if you take the bait, you may end up giving them access to valuable personal information, or downloading malware onto your device that will cause trouble later., How does SMS spoofing work?, Spoofing is all about hiding the true identity of the person behind an act. With SMS spoofing, the scammer finds a way to make it seem as though their text message is coming from a different number or sender ID – often a real business or a person you may know whose device has already been compromised. To be clear, the spoofed SMS can come from another victim’s physical mobile phone, or as an SMS…, How can spoofing impact businesses?, Businesses are at risk of SMS spoofing in a few different ways. The first and most publicized problem is that when an employee at a company clicks on a malicious link in an SMS spoof, the fraudsters may be gaining access to company systems and customer data. This can lead to customers being defrauded, or the scammer could use their access to implant viruses and crash a company’s entire digital…, Companies may suffer lost consumer trust, costs to repair any internal damage to their databases, privacy leaks, and leaks of proprietary or potentially confidential information about employees, vendors, or competition can cause long-term, very expensive trouble., Needless to say, in addition to the real costs of lost time and money trying to repair all this damage, the company’s reputation may also suffer a serious blow, which can impact future sales if customers decide it’s safer to do business elsewhere., Six types of SMS spoofing, Here are a few common types of SMS spoofing that you might encounter on your smartphone device. , 1. Fake sender ID, This common type of SMS spoof uses a trusted sender ID to mask the real sender. Typically, the trusted sender will appear to be a business, which will increase the likelihood of the victim clicking on whatever the text is telling them to do. Fake sender IDs can also be masked as someone else in your contact list, including fellow employees if the fraudsters are attempting to infiltrate a company’…, 2. Unsolicited bulk messages, This is what most people think of when it comes to spam emails. But you can get spam SMS messages too, and this type of SMS spoofing attack is sent for the same reason. The message could be on just about any topic and look like a promotional SMS message and may seem inane or absurd. It may also have misspellings. Millions of people might receive the text, but the scammers just hope for a handful…, 3. Harassment, Harassment SMS spoofing can take many forms. Typically, it happens after the scammer has obtained some of your information through other cybercrimes they’ve already committed. Now, with your contact information and other knowledge of your private life, they may threaten you with embarrassment or other outcomes if you don’t pay a ransom. Or they might lie and trick you into sending money for…, 4. Corporate espionage, This type of SMS spoof targets employees, usually within a larger company that may have valuable customer data, or the resources to pay a large ransom if the fraudsters can gain control over the company’s information. Usually, when you click on links in messages like these, you may not be aware that anything bad has happened, because the hackers are using malware from your device to then spread…, 5. Fake money transfers, Here, the scammer promises money that needs to be transferred to the victim’s account. The sender’s name could appear to be from their bank, PayPal, or other recognizable financial institution or service, and the message will resemble a typical transactional SMS . Their goal is to gain access to your bank account information. The message may refer to a cash back transaction that never took place…, 6. Identity theft, Scammers want whatever personal information about you they can get – anything like medical records, account information, passwords, Social Security numbers, credit card numbers, phone numbers, and more. They want it so they can look for a way to pretend to be you and steal money. The idea is to make you pay for their stuff. Spoof text messages can be used to collect this information in a variety…, What distinguishes SMS spoofing fraud from other forms of text fraud?, Smishing, phishing , spoofing, spamming – there are all sorts of ways for scammers to cause you trouble through digital technology. SMS spoofing is just one of them. But it’s distinct from the others in a couple of key ways. SMS spoofing is the only one where the scammer makes the sending name and number look like a person or business you trust. This makes it a bit harder to spot, and you really…, Would your friend, relative, or co-worker really send you this?, In SMS phishing attacks (aka smishing), most of the scammer’s goals are the same – get your sensitive information and use it against you or someone else. And many of their methods are the same – things like fake invoices, fake shipping notices, and many tactics listed earlier. But you can usually spot other scams because the sender’s ID and phone number – or the email address in email scams – is…, Prevent SMS spoofing, What can you do to protect yourself and others from falling victim to an SMS spoof? First, your organization needs to teach this to its employees so they know how to recognize the warning signs of a spoofed SMS. By teaching everyone in your sphere of influence what should never happen, they’ll be more able to spot it and delete it when it does. Here are the major indications that you’re looking…, Suspicious wording, . Is this how your friend, co-worker, or company would talk? Would they say this? , Unfamiliar numbers., Does the text cite an account number or something similar you should recognize? If they look strange or incorrect, you need to take a moment to consider its legitimacy. , Spelling and grammar mistakes., It’s well known that most scammers can’t write very well, and this remains a telltale sign of a spoofed SMS. , Strange hyperlinks., Is this how company links usually look? Does it have weird formatting? , Unsettling requests., Any SMS asking for money or account-level information should be treated with suspicion – banks and other companies don’t do this. , False sense of urgency., Think about if the person texting you would use text messages to reach out to you about something urgent, or if they’d call you directly. , Anything that sounds too good to be true., Unsolicited luck doesn’t happen very often. Don’t trust it when it lands on you. The main thing is, if you get a suspicious SMS,, stop, think, and check before you act., Scammers rely on you not spotting warning signs, so if it looks suspicious, don’t click any links and don’t reply. If it’s from your company or from an employee, show it to a supervisor or go check with the person who supposedly sent it. If it’s from a relative or friend, call them to confirm. As a business, consistency is key. Reinforce what actions your company will never take, like sending…, your business must prioritize education, consistency, and proactive measures, to enhance its resilience against SMS spoofing and other cyber threats and build trust in your operations. , Maintain your brand reputation by sending reliable SMS, As a business, make sure your messages are easily identifiable by your subscribers. Here are a few strategies to make this happen: Keep your branding consistent in all your texts. Give clear contact details like phone, email, website, or a ‘reply HELP’ message so subscribers can verify your messages. Tell subscribers how to opt out from your SMS list. Regularly remind customers that you…
Type: Blog Article
Type: Component Page
Type: Product
Type: Component Page
Effective February 1, 2020 These Terms of Service (these “Terms”) on this website (the “Site”) govern your access and use of the faxing services (the “Services”). By clicking on the “Accept” button on the Site or by using the Services, you acknowledge and agree that you have read, understood and agree to be bound by all of the Terms. References to “Inteliquent” in these Terms mean Phaxio, a…, Privacy Policy, Please refer to the Sinch Voice Privacy Policy for information on Inteliquent collects, uses and discloses personally identifiable information from its users. By using the Site or the Service, you are consenting to have your personal data (including financial transaction information) transferred to and processed in the United States or any other country in which Inteliquent operates., Pricing, Pricing will be defined per customer in a services and pricing addendum. All prices for the Service are shown in U.S. dollars. Inteliquent reserves the right to reject all or part of a request and to discontinue the Service without prior notice to you, even if you have already placed your order. All prices are subject to change without notice., Payment Method, You may pay by check, electronic funds transfer or by valid credit cards (“Payment Method”). By submitting your order, you represent and warrant that you are authorized to use the Payment Method and authorize us to charge or debit your order (including taxes and any other amounts described on the Site or Services) to that Payment Method. If the Payment Method cannot be verified, is invalid or is…, Cancellation and Refunds, There are no refunds or cancellations, except as granted by Inteliquent, in its sole discretion, as otherwise provided in these Terms or as required by law. Inteliquent reserves the right to refuse or cancel purchases or attempted purchases at any time and in its sole discretion., Taxes, You are responsible for any taxes that you are obligated to pay or that Inteliquent may collect from you in connection with your purchase. If you do not pay such sales or other taxes or fees on a transaction, you will be responsible for such taxes or fees in the event that they are later determined to be payable on such sale. Inteliquent reserves the right to collect such taxes or other fees from…, Grants and Restrictions, Subject to the Terms, Inteliquent hereby grants to Customer a non-exclusive, non-transferable and revocable right to access and use the Services. Customer hereby grants to Inteliquent a non-exclusive right to access, use, reproduce, modify and create derivative works of any and all documents and other materials uploaded by Customer to Inteliquent’s system in order to use the Services (“Customer…, Obligations, Inteliquent will use commercially reasonable efforts to provide the Services to Customer. Notwithstanding any terms to the contrary in these Terms, if Customer’s use of the Services overburdens or impairs the functioning of the Services in any manner, Inteliquent may prohibit Customer from using the Services on such occasion or entirely. Customer must use reasonable security precautions in…, Customer Data, Customer represents and warrants that: (a) all Customer Data is either the sole property of Customer or has been collected from a third party by Customer in accordance with Customer’s privacy guidelines; (b) Customer’s privacy guidelines comply with all applicable Laws; (c) Customer has obtained all consents required by the applicable Laws to transfer all of the Customer Data to Inteliquent for…, Ownership, As between the parties and subject to the grants in these Terms: (a) Customer owns all right, title and interest in and to the Customer Data and any and all patents, copyrights, moral rights, trademarks, trade secrets and any other form of intellectual property rights recognized in any jurisdiction, including applications and registrations for any of the foregoing embodied therein (“Intellectual…, Third Party Content, Inteliquent may provide third party content on the Site and may provide links to website and content of third parties (collectively the “Third Party Content”) as a service to those interested in this information. Inteliquent does not control, endorse or adopt any Third Party Content and makes no representation or warranties of any kind regarding the Third Party Content including, but not limited…, Trademarks, The Inteliquent logos and slogans contained in the Site (or made available via the Services) are trademarks of Inteliquent and its suppliers or licensors, and may not be copied, imitated or used, in whole or in part, without the prior written permission of Inteliquent or the applicable trademark holder. You may not use any metatags or any other “hidden text” utilizing “Inteliquent Fax” or any…, Disclaimer, CUSTOMER ACKNOWLEDGES AND AGREES THAT: (A) THE SERVICES REQUIRE ACCESS TO AND USE OF THE INTERNET; (B) INTELIQUENT IS NOT RESPONSIBLE FOR OPERATING OR MAINTAINING CUSTOMER SERVERS OR CUSTOMER’S CONNECTION TO THE INTERNET TO ACCESS AND UTILIZE THE SERVICES; AND (C) THERE ARE RISKS INHERENT IN INTERNET CONNECTIVITY THAT COULD RESULT IN THE LOSS OF CUSTOMER DATA. INTELIQUENT PROVIDES THE SERVICES…, Indemnification, Customer, at its sole expense, will defend, indemnify and hold Inteliquent and its directors, officers, attorneys, shareholders, employees, consultants, affiliates and agents (collectively, “Inteliquent Indemnitees”) harmless from and against any and all actual or threatened suits, actions, proceedings (at law or in equity), claims (groundless or otherwise), damages, payments, deficiencies, fines…, Limitation of Liability, IN NO EVENT WILL: (A) INTELIQUENT BE LIABLE TO CUSTOMER OR ANY THIRD PARTY FOR ANY LOSS OF PROFITS, LOSS OF USE, LOSS OF REVENUE, LOSS OF GOODWILL, ANY INTERRUPTION OF BUSINESS OR FOR ANY INDIRECT, SPECIAL, INCIDENTAL, EXEMPLARY, PUNITIVE OR CONSEQUENTIAL DAMAGES OF ANY KIND ARISING OUT OF OR IN CONNECTION WITH THESE TERMS, THE SERVICES, THE SITE OR THE THIRD PARTY CONTENT REGARDLESS OF THE FORM…, Miscellaneous, These Terms will be governed by and construed in accordance with the laws of the State of Delaware without resort to its conflict of law provisions. The parties agree that any action at law or in equity arising out of or relating to these Terms will be filed exclusively in the state and federal courts located in the State of Delaware and the parties hereby irrevocably and unconditionally consent…
Type: Legal page
This Acceptable Use Policy (the “Policy”) applies to Inteliquent, Inc., a Sinch company, and all of its affiliated entities, including Onvoy, LLC, which does business as Inteliquent (“Inteliquent”). This Policy sets forth those activities prohibited by Inteliquent to users of Inteliquent’s services (the “Services”). This Policy is applicable to each Customer of Inteliquent and any users gaining…, 1. Purpose., This Policy is designed to assist in protecting the Services provided by Inteliquent, the Inteliquent’s network, Users of the network, the Internet and the Internet community as a whole from improper and/or illegal activity and any activities contrary or in violation of this Policy are prohibited., 2. Prohibited Activities., A User’s failure to comply with this Policy constitutes a violation by Customer as determined in Inteliquent’s sole discretion (“Violation”), with each such failure constituting a separate Violation. A Violation of this Policy may result in suspension or termination of Service and/or termination of the Customer’s Agreement, as described below. Customer shall immediately notify Inteliquent if they…, 2.1. Illegal Use., Use of the Services in violation of any law is prohibited. This includes but is not limited to violations of e.g., the Telephone Consumer Protection Act, slamming or the like. Any use of the Services for the transmission, distribution, retrieval, or storage of material (“Transmission”) that violates any law or is in furtherance of any criminal enterprise is prohibited, including, without…, (i) Intellectual Property., Unauthorized Transmission of material protected by patent, copyright, trade secret, or another intellectual property right (including, without limitation, the Digital Millennium Copyright Act);, (ii) Inappropriate Content., Any Transmission of material that is obscene or constitutes child pornography, material that is libelous, defamatory, hateful, or that constitutes an illegal threat or abuse;, (iii) Export Control., Unauthorized Transmission of any material that may violate export control laws or other regulations;, (iv) Forging of Headers., Misrepresenting or forging message headers to mask the originator of a message;, (v) CAN-SPAM ACT., Failure to comply with all provisions of the CAN-SPAM Act (15 U.S.C 7701, et. seq., and 16 CFR Part 316) or, (vi) Use of Inteliquent provided Telephone Numbers., Telephone Numbers provided by Inteliquent may not be used by Customer or any downstream customer’s related to illegal robocalls, spam calls or messages, or any call or spam intended to harass, defraud, steal money or information from the receiving caller., 2.2. Services and Network Security., Inteliquent makes no guarantee regarding, and assumes no liability for, the security and integrity of any data or information transmitted by a User over the Internet. Use of the Services is subject to CALEA. Any attempt to breach the system and network security measures is a Violation and may result in criminal and civil liability. These Violations include, without limitation, the following:, (i) Unauthorized Access., Users may not attempt to gain unauthorized access to or attempt to interfere with the normal functioning and security of Inteliquent’s network or any other system, computers, accounts, or networks or purposely breach firewalls or security measures of another company’s or individual’s system (hacking);, (ii) Unauthorized Monitoring., Users may not attempt to monitor any information on any network or system without authorization from the network administrator;, (iii) Interference., Users may not attempt to intercept, redirect or otherwise interfere with communications intended for others;, (iv) Fraud/Forgery., Users may not impersonate another party by altering IP addresses or forging TCP-IP packet header information within an e-mail or newsgroup posting.;, (v) “Denial of Service Attacks”., Users may not cause or further a denial of service attack or otherwise flood or attempt to overload a system;, (vi) Virus Transmission., Users may not intentionally or negligently transmit files containing a computer virus, Trojan Horse, worms, corrupted data or other destructive activities., 2.3. E-mail and Usenet News., Customer agrees that it shall be responsible for monitoring the use of the Service and that Inteliquentshall not be obligated to monitor such use. Customer agrees that the following uses are Violations:, (i) Unsolicited E-mail., Customer may not allow the Services to be used to transmit SPAM or collect the responses from excessive volumes of unsolicited commercial e-mail messages.“SPAM” shall mean an unsolicited bulk e-mail sent to a recipient where: (a) the recipient’s personal identity or context are irrelevant because the message is equally applicable to other potential recipients and (b) the recipient has not…, (ii) E-mail Relay., The use of another party’s e-mail server to relay e-mail without express permission from such party is prohibited;, (iii) Usenet., All postings by Users to USENET groups must comply with that group’s charter and other applicable guidelines and Policy. Cross-posting and continuous posting of off-topic messages including commercial messages, is prohibited;, (iv) Bulk E-mail., Customer shall not allow the Service to be used to send bulk e-mails unless the recipient of such e-mail has verifiably confirmed permission for the address to be included on the specific mailing list, by confirming (responding to) the list subscription request verification (“Closed-Loop Opt-In”); and, (v) Blacklisted IP-Address., Customer may not allow an IP-Address that is registered to Inteliquent and used by Customer to become blacklisted, banned or blocked by a third-party that monitors improper or illegal use of the Internet., 2.4. Complaints., If Inteliquent receives any complaints from third parties with respect to a User’s use of the Services (“Complaints”), Customer shall, within twenty-four (24) hours, respond to such Complaints to the reasonable satisfaction of Inteliquent and any failure to so respond shall be deemed a Violation authorizing Inteliquent to take any of the actions described in Section 3. In addition, in the event…, 3. Warning/Suspension/Termination., In the event of a Violation, Inteliquent may, in its sole and absolute discretion, take any or all of the following actions:, (i) Warning., Inteliquent may issue a verbal, e-mail or written warning notifying the Customer of the Violation and the corrective action that must be taken. A warning may also provide that Inteliquent will suspend or terminate all or part of a Customer’s service in the event of any additional Violation;, (ii) Suspension., Inteliquent may suspend, with or without warning, all or part of a Customer’s Service and may condition restoration of such Service upon Customer affecting corrective action;, (iii) Termination., Inteliquent may, with or without warning, and with or without prior suspension terminate all or part of Customer’s service and may terminate Customer’s Agreement. The foregoing is not an exhaustive list of actions Inteliquent may take in the event of a Violation and suspension or termination of Customer’s Service is not an exclusive remedy and shall not affect any other rights Inteliquent may…, 4. Miscellaneous., Failure of Inteliquent to enforce this Policy or take any action with respect to a Violation shall not constitute a waiver of its right to enforce any other Violation. Inteliquent takes no responsibility for any material created or accessed via the Services and does not monitor, verify, warrant or validate the integrity, accuracy and quality of information it receives or transmits, but reserves…
Type: Legal page