In the digital age, our identities extend far beyond our physical selves. They encompass our online personas, shaped by our activities and interactions on the internet. However, the rise of online identity fraud has cast a shadow over the security of our online identities. This article will delve into the top five online identity fraud trends, providing an in-depth understanding of each problem,…, The 5 types of online identity fraud you need to know , 1. Phishing attacks , Phishing attacks, sometimes referred to as phishing emails, are everywhere. These online identity fraud attacks cleverly disguise themselves as legitimate communications, tricking users into revealing sensitive personal information. What’s worse is that these attacks are becoming more sophisticated, making it harder for individuals to distinguish between genuine and fraudulent communications. …, 2. Data breaches , Data breaches pose a significant threat to online identity security. These incidents occur when unauthorized individuals gain access to confidential data, often leading to the exposure of sensitive personal information. The consequences of data breaches can be severe, resulting in financial losses, reputational damage, and a breach of trust between businesses and their customers. Data breaches…, 3. SIM swap fraud , SIM swap fraud is a type of identity theft has the potential to compromise a wide range of personal information and services. In a SIM swap fraud , a bad actor tricks a mobile carrier into transferring a victim's phone number to a new SIM card. Once the fraudster has control of the phone number, they can bypass security measures such as two-factor authentication , gaining access to the victim's…, 4. Bots , Bots, automated software applications that perform tasks on the internet, can pose a significant problem for businesses. While many bots are beneficial, others have been used for malicious activities such as spamming, scraping websites, and carrying out distributed denial-of-service (DDoS) attacks. In the context of online identity fraud, bots can be used to create fake accounts, skew analytics…, 5. Account takeovers , Account takeovers occur when a fraudster gains access to a user's account and takes control. This can happen through various methods, including phishing attacks, data breaches, and brute force attacks. Once the fraudster has control of the account, they can carry out fraudulent transactions, send spam, and even lock the legitimate user out of their account. Account takeovers underscore the need…, Sinch's Unified Verification , While the problems of online identity fraud are complex and multifaceted, with many of the issues stemming from weak identity and authentication, solutions are available that can help businesses protect their customers and themselves. One such solution is Sinch's Unified Verification API, an online identity fraud prevention solution. Although consumer applications often rely on limited SMS 2FA,…
Type: Blog Article
This agreement (together with Appendix A, the “Agreement”) applies to the Microsoft Teams Products, Services or Subscriptions provided as provided or resold by Inteliquent, Inc. (and its affiliates providing the Services below, “Seller”) to the customer (“Customer”) (the “Parties”) using or reselling such Products, Services or Subscriptions. If the Parties have signed a Master Services Agreement…, Description of Products, Services or Subscriptions, MS Teams Direct Routing connects Microsoft Teams users (“Subscribers” or “End Users”) to Inteliquent Voice Services as described in the Inteliquent Direct Routing Agreement. Users may utilize Microsoft Teams to make and receive calls to the Public Switched Telephone Network (PSTN) with Inteliquent Direct Routing Services. Microsoft Office 365 licensing necessary to enable voice features within…, Fees, Fees for the Products, Services or Subscriptions shall be provided to Customer in a Service Order, or similar document., Territory, Customer shall limit its activities under this Agreement to the following regions, countries, locations, and/or End Users (the “Territory”): All 50 states of the United States of America plus its territories, Washington, D.C. and Puerto Rico (except U.S. federal government). Customer acknowledges that its appointment under this Agreement is nonexclusive and that it obtains no exclusive rights in…, Trademarks, Customer is hereby prohibited from otherwise copying and from translating, modifying or adapting the software portion of the Products or incorporating in whole or any part in any other product or creating derivative works based on all or any part of the Products. Customer is not authorized to license others to reproduce any copies of the software portion of the Products, except as expressly…, Payment terms, For Subscriptions, Customer agrees to complete the appropriate order form (“Order Form”) for the Subscriptions as provided by Seller. Subscriptions will commence upon receipt and acceptance by Seller of a Subscription Order Form., Sublicense of Software Products and Firmware, Subject to the provisions of this section, Seller duly possesses and grants to Customer a nonexclusive, nontransferable license to use the object code form of the software Products only as necessary to carry out the following activities in accordance with this Agreement: (i) market and distribute the software Products solely for use in conjunction with Seller’s Products, (ii) demonstrate the…, Indemnification, Customer shall defend any third-party claim, suit or proceeding, and indemnify and hold Seller and its affiliates harmless from and against any settlement amounts, damages, liabilities, penalties, fines and reasonable expenses (including, but not limited to, reasonable attorneys’ fees) arising out of or in connection with (i) the sale, license, servicing and related activities pursuant to this…, Independent Contractor Status, Customer shall conduct its business under this Agreement as a principal for its own account at its own expense and risk. The relationship between the Parties is that of independent contractors. This Agreement creates no relationship of principal and agent, Customer, joint venturer or any similar relationship between Seller and Customer. The grant of the right to sell the Products, Services and…, Termination, This Agreement may be terminated by either Party in the event it notifies in writing the other Party of a material breach under this Agreement and the other Party does not cure such breach within thirty (30) days of receipt of such notice. Seller may immediately suspend the Services if it reasonably suspects the Services are used for improper purposes (as Seller’s sole discretion. Further, Seller…, Export Controls and Compliance with Law, Export Laws., Customer acknowledges that the exportation or re-exportation of Seller Product(s), Confidential Information, and related technical data is subject to local country export laws and regulations. Customer agrees to comply with all applicable export and import laws and regulations., U.S. Export Laws., For Seller Product exports from the United States of America (“U.S.”), Customer acknowledges that the exportation of Seller Product(s), confidential information, and related technical data from the U.S. is subject to U.S. export laws including without limitation the U.S. Bureau of Industry and Security (“BIS”) Export Administration Regulations and the U.S. Office of Foreign Assets Control (“OFAC…, Prohibited Countries., Customer shall not sell, license or distribute, directly or indirectly, any of the Products (including any part of a Product or any direct product of such Products) or related technical data into any of those countries or to a national of any country listed in the then-current applicable United States export regulations as “embargoed, prohibited or restricted” countries (collectively, the “…, Proliferation Controls., Customer agrees not to sell, license or distribute and Products (including any part of a Product or any direct product of such Products) or related technical data, directly or indirectly, for use in nuclear, chemical, biological warfare or missile activities or facilities engaged in such activities or to any entity listed in the U.S. BIS Entities List, without first obtaining written…, Prohibited Parties., Customer agrees not to sell, license or distribute and Products (including any part of a Product or any direct product of such Products) or related technical data, directly or indirectly, to any individual or entity listed on a “prohibited” list issued by any U.S. government agency, including without limitation the U.S. BIS Denied Persons List, the U.S. OFAC Specially Designated Nationals List,…, End User Certification., Upon Seller’s request before shipment of Products and materials for U.S. export to certain designated countries as identified by Seller from time to time, Customer agrees to obtain from its End-User a signed End User Certification (EUC) for the End User to certify that it is the final recipient of the exported Products and materials and it has no intention of re-exporting such Products and…, Export License., If an export license is required before Seller can sell or transfer any of the Product(s) or related technical data to Customer, Customer acknowledges and agrees that Seller shall be under no obligation to effect such sale or transfer until the required export license is obtained. Seller shall use reasonable efforts to expeditiously obtain such required export licenses or approvals., Anti-Bribery and Anti-Corruption Laws., Each Party represents and warrants to the other Party that the first Party is familiar with all applicable domestic and foreign antibribery or anticorruption laws, including the Foreign Corrupt Practices Act and the U.K. Bribery Act, which prohibit such Party, and, if applicable, its officers, employees, agents and others working on its behalf, from taking corrupt actions in furtherance of an…, Records., Customer shall maintain complete records of its disposition of all Products and technical data, showing the user name, ultimate destination, product model, serial number, and date of sale, lease or license, including contract documents, and to make these records available to Seller or any representatives of the U.S. government upon request., Indemnification., In addition to any other indemnity under this Agreement, Customer shall defend, indemnify and hold Seller harmless from and against any and all third-party claims, damages and liabilities asserted by any person or entity against Seller connected directly or indirectly from a breach of this Agreement by Customer or its customers. Customer’s indemnification shall include the payment of all…, Insurance, Customer will carry the types and amounts of insurance coverage that would be customary for the types of activities to be performed by Customer hereunder., Appendix A: Subscription Services Usage Terms, 1. Terms., Seller will use commercially reasonable efforts to provide Customer Subscriptions Services as described under the applicable Seller Subscription Service Description (the “Subscription Service” or “Service”). The Subscription Services shall be subject to the Subscription Services Usage Terms, defined as the terms in this Appendix (“Subscription Services Usage Terms” or the “Terms”)., 2. Access Right., The access right provided by Seller to Customer for the Subscription Service is non-exclusive, non-transferable (and, if applicable, is limited within the Territory) for the duration of the Service Term. Customer is granted the right to authorize access to the Services to Subscribers as set forth in Section 4 below (Subscriber Rights). Seller reserves all rights not expressly granted hereunder.…, 3. Access and License Restrictions., Except as expressly permitted under the Subscription Service and any addendum thereto, Customer will not (i) grant access or use, sell, transfer, assign, distribute, rent, lease, time share or otherwise commercially exploit the Service or Seller Technology to any third party; (ii) modify or create derivative works based on the Service or Seller Technology; (iii) reverse assemble, reverse compile…, 4. Subscriber Rights., Customer, subject to the terms and conditions under these Terms, may grant to each Subscriber a limited, non-exclusive, nontransferable, revocable right to use the Services for such Subscriber’s internal business purposes, provided that such Subscribers have agreed to be bound contractually to terms and conditions consistent with those set forth in these Terms and any applicable Service…, 5. Downstream Service Providers., Customer, subject to these Terms, and if expressly permitted and authorized in the Order or the applicable Service Description: (a) may grant to Downstream Service Providers a right to grant to Subscribers within the territory a limited, non-exclusive, nontransferable, revocable right to use the Services for such Subscribers’ internal business purposes, provided that such Downstream Service…, 6. Emergency Services., Customer acknowledges that the Seller Service may be used as part of an interconnected VoIP service and if so used, will not support or facilitate calls to emergency services such as public safety answering points, medical care units, hospitals, fire departments, or law enforcement agencies (“Emergency Services”) and is not a replacement for an ordinary mobile or fixed line telephone (the “…, 7. Service Administration., Customer and each Downstream Service Provider shall be responsible for: (i) communicating with and invoicing its Subscribers and (ii) providing all Customer support obligations as set forth in the applicable Service Description to its Subscribers. Customer will be responsible and liable for any and all access to and use of the Service by any person logging in under a user ID registered under…, 8. Customer Data., Customer grants Seller and its subcontractors a non-exclusive, worldwide, royalty-free, paid-up, revocable, non-transferable (except as provided under an authorized assignment), limited right and license to host, cache, copy, process, store, display and retrieve information associated with the “Customer Data” for the purpose of and in conjunction with Customer’s use of the Service. Customer…, 9. Back Ups., Seller maintains the necessary data as needed by Seller in accordance with the applicable Service Description in order for Seller to provide the functionality of the Service including service emergency recovery purposes. Seller will not have any obligation to provide Customer or Subscriber with any backup of Customer Data, if any, nor will Seller be responsible for storing or maintaining data…, 10. Equipment., Customer is responsible for obtaining and maintaining any equipment and ancillary services such as establishing, maintaining and supporting all connectivity and access to Seller’s servers, systems and network (including the payment of any additional fees therefore) needed to connect to, access or otherwise use the Service (and, to the extent applicable, the Seller Technology), including, without…, 11. Third Party Applications., If Customer installs or enables any third party applications for use in connection with the Services, Customer acknowledges and agrees that Seller may allow the applicable third party to access the Customer Data as required for the interoperation of such third party applications with the Services. Seller will not be responsible for any disclosure, modification or deletion of Customer Data…
Type: Legal page