Data Protection Regulation in the Republic of Kosovo and Compliance by the Companies: a Proposed Model for Kosovo

Total Page:16

File Type:pdf, Size:1020Kb

Data Protection Regulation in the Republic of Kosovo and Compliance by the Companies: a Proposed Model for Kosovo International In-house Counsel Journal Vol. 2, No. 8, Summer 2009, 1227–1238 Data Protection Regulation in the Republic of Kosovo and Compliance by the Companies: A proposed Model for Kosovo MERITA KOSTANICA Head of Legal and Regulatory Affairs, IPKO Telecommunications, Republic of Kosovo I. Introduction Most companies cannot survive without storing personal information of individuals in different forms. In today‟s information society the flow of this information is becoming of fundamental importance for different purposes of companies. Present trends the way information flows around include widespread outsourcing arrangements, providing services from where companies find best skills and productivity, working far away from the employer, companies‟ split-up functions in many different countries who transfer information between themselves online. Considering these scenarios, it is easy to see how the ability to process and transfer personal information can in effect be a company‟s lifeblood.1 Whilst the use of personal data for such purposes may make commercial and political sense, companies should not overlook the fact that the use of personal data is increasingly regulated.2 Data protection regulations exist to make a balance between the rights of individuals to privacy and ability of the companies to use personal data for the purpose of their business.3 Any company processing and controlling personal data must comply with significant data protection regulations. However, companies often take no notice of the ever-increasing regulation of data protection that might affect their functionality in the market. While in the European Economic Area (EEA) the flow and the protection of personal information is complex and fluid, and its regulation is continually developing, outside EEA data protection is relatively new issue. The Republic of Kosovo, for instance, is the case where data protection is not yet regulated as an issue on its own; consequently, this paper will outline the immediate need for data protection regulation in Kosovo. The paper will begin by underlining the current status of regulation of privacy and data protection in Kosovo and will analyze whether this regulation is adequate. However, at this point, it should be noted that the aim of this paper is to outline the problems arising from the lack of regulation of data protection in Kosovo rather than privacy in general. Attempts of the policy makers to bring a specific law on this issue will be emphasized. 1 C. Kuner, European Data Protection Law, Corporate Compliance and Regulation, (Oxford: University Press, 2nd ed. 2007) p152. 2 Louise Townsend and Victoria Southern, “The cost of non-compliance with data protection law”, Privacy and Data Protection Journal, Volume 6 (07 August 2006) p1. 3 Ibid. International In-house Counsel Journal ISSN 1754-0607 print/ISSN 1754-0607 online 1228 Merita Kostanica The second part of this paper will focus on the problematic revolution as a consequence of an inadequate level of regulation of data protection in Kosovo, its impact on how companies process, control and transfer personal data inside the territory of Kosovo and the impact that the absence of this regulation may have on international business transactions as well as international investment in Kosovo, especially in the light of the restrictions of data from EEA to third countries. Emphasis will be given on legal matters as well as potential economic and reputation consequences that might arise from non regulation of this issue. Further, the third part of this paper will emphasize the comprehensiveness of the EU regime in data protection. At this point it should be noted that it is beyond the scope this paper to analyze the EU regime on data protection as a whole, rather this part of the paper will discuss the effect that the implementation of the EU Data Protection Directive had on the business activities through EU.4 In its fourth part this paper‟s focus will continue with the consideration of the regulatory studies which would lead to the adoption of an adequate data protection law in Kosovo and an adequate authority to ensure the law is complied with. The paper will conclude with the call on imperative need of adequate data protection regulation in Kosovo. However, it should be emphasized that this paper does not aim to solve the problems that arise from inadequate regulation of data protection rather to underline them and also to provide awareness among competent authorities and business organizations of the importance of adequate legislation on this issue. II. General Rules That Currently Govern Data Protection in Kosovo There is no specific legislation on data protection, consequently, no independent data protection authority has been set up. However, it seems like policy makers attempted to make a difference of the two concepts, „privacy‟ and „data protection‟. Firstly, Article 36 of the Constitution of the Republic of Kosovo considers privacy as a fundamental human right and also attempts to regulate data protection by stating as follows: “Every person enjoys the right of protection of personal data. Collection, preservation, access, correction and use of personal data are regulated by law”. 5Secondly, according to Article 22 of the Constitution, the provisions of the European Convention for the Protection of Human Rights and Fundamental Freedoms consequently, provisions on privacy as a fundamental human right are directly applied in Kosovo. Further, Article 168 of the Criminal Code of Kosovo provides a provision on Infringing Privacy in Correspondence and Computer Databases.6 Given the current regulation of privacy and data protection in Kosovo, one might ask a question whether in today‟s information society general privacy rights and obligations enshrined in a Constitution and other instruments are considered adequate regulation of 4 Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data [1995] OJ L281/31. 5 Constitution of the Republic of Kosovo, adopted on 15 June 2008, available in English version at: www.kushtetutakosoves.info/repository/docs/Constitution.of.the.Republic.of.Kosovo.pdf (last visited on 01 June 2009). 6 Criminal Code of Kosovo, UNMIK Regulation, 2003/25, 06 July, 2003, available at:www.unmikonline.org/regulations/2003/RE2003_25_criminal_code.pdf (last visited on 02 June, 2009). Data Protection Regulation 1229 data protection or whether policy makers intended to regulate data protection as a subject on its own based on Article 36 (4) of the Constitution stated above. These two concerns will be analyzed subsequently. Firstly, in today‟s society it is generally known that privacy legislation is not considered adequate in regulating data protection. Privacy and data protection concepts are not the same, „On one hand the concept of data protection is narrower than privacy since privacy encompasses more than personal data, on the other hand, it encompasses a wider area, since personal data are protected not only to enhance the privacy of the subject but also to guarantee other fundamental rights, such as the right not to be discriminated against‟.7 Secondly, it looks like the policy makers intended to regulate data protection as a subject on its own based on Article 36 (4) of the Constitution quoted above. From the first part of this provision it is clear that all persons have the right to the protection of their data. Whereas, the second part, on one hand provides that the collection, preservation, access, correction and use of personal data are regulated by law and on the other hand, there is no law protecting these rights. So far, the policy makers have not taken the necessary steps to bring a specific law in order to transpose the data protection directive obligations.8 As per the Criminal Code provisions on „Infringing Privacy in Correspondence and Computer Databases‟ provided above, it is clear that these provisions more or less regulate the secrecy of correspondence and do not even touch the regulation on how one can process and handle others personal data. Given that there are no rules on protection of personal data in Kosovo, and consequently no data protection authority to ensure these rules, if an individual‟s personal data are breached, they may only seek to realize their rights before the applicable courts based on the general provisions outlined and analyzed above. However, Kosovo‟s judicial institutions remain week and unable to deliver a proper service, both in the civil and criminal sectors thus, individuals have additional reasons as to why they do not seek to realize their rights before the courts. Thus, the absence of the appropriate regulation creates a disorder on how organisations process individual‟s data in one hand, and leaves individuals with no means on realising their rights in the other. Attempts to specific regulation on data protection - It is of utmost importance to emphasize that on 22 July 2005 the policy makers adopted the Law on Information Societies Services, section 7 of which attempted regulation of data protection and the creation of data protection authority.9 However, these provisions were never complied with and the provisions were abrogated accordingly. At the present, there are indications that policy makers are working on a draft of data protection law which would transpose obligations that arise from the EU Data Protection Directive, however, there are no indications for any regulatory studies which would bring adequate regulation. 7 See: European Data Protection Supervisor, „Public access to the documents and data protection‟ (July 2005) 15, available at: http://www.edps.europa.eu/EDPSWEB/ (last visited on 06 August 7, 2008). 8 Commission of the European Communities report: Kosovo under (UNSCR 1244), 2007 Progress Report, Brussels, 6 November 2007, SEC (2007) 1433, p 48. 9 Law No.
Recommended publications
  • Grameen Telecom and Voxiva Two Cases That Bridge the Digital Divide Through Telecommunication
    Grameen Telecom and Voxiva Two cases that bridge the digital divide through telecommunication By Tabitha Bonilla and Theresa Eugenio 1 Outline • Grameen Phones – Telephone connectivity in Bangladesh – Introducing phone systems to rural villages • Voxiva – Healthcare concerns in Peru – Producing a system that promotes more urgent care 2 Case 1: Grameen Village Phone Program • Problem – 97% of Bangladesh homes have no telephone – 0.34 telephone lines per 100 people – 2 day trip to make a call 3 Grameen Solution • Twofold 1. Non-profit Grameen Telecom (GT) 2. For-profit Grameen Phone (GP) • Both branches of Grameen bank 4 Grameen Telecom • Village Phone Program – Started in 1997 – Pay-per-call system – Gives villages easily accessible mobile phone stations – Grameen Bank provides loans and training 5 GT Benefits • Financial – City calls cost 1.94 to 8.44 times as much – 2.64% to 9.8% of monthly income – 86% of calls used for financial purposes – 8% used explicitly to improve prices • Social – Empowers village women 6 Grameen Phone • National mobile phone service – Won license in 1996 – Began operations on March 26, 1997 – Primarily urban areas – Individually-owned systems 7 GP-GT Interaction • Demonstrates how complementary profit and non-profit organizations feed into one another • GP profits offset GT costs » -allows GT calls to be 50% off • Economic growth could lead to an eventual rise in GP customers 8 Measures of Success-GT • 165,000 subscribers as of August 2005 • Low cancellation rate- 2.18% 9 Measures of Success-GP 10 • About 63%
    [Show full text]
  • Termination Rates at European Level January 2021
    BoR (21) 71 Termination rates at European level January 2021 10 June 2021 BoR (21) 71 Table of contents 1. Executive Summary ........................................................................................................ 2 2. Fixed networks – voice interconnection ..................................................................... 6 2.1. Assumptions made for the benchmarking ................................................................ 6 2.2. FTR benchmark .......................................................................................................... 6 2.3. Short term evolution of fixed incumbents’ FTRs (from July 2020 to January 2021) ................................................................................................................................... 9 2.4. FTR regulatory model implemented and symmetry overview ............................... 12 2.5. Number of lines and market shares ........................................................................ 13 3. Mobile networks – voice interconnection ................................................................. 14 3.1. Assumptions made for the benchmarking .............................................................. 14 3.2. Average MTR per country: rates per voice minute (as of January 2021) ............ 15 3.3. Average MTR per operator ...................................................................................... 18 3.4. Average MTR: Time series of simple average and weighted average at European level .................................................................................................................
    [Show full text]
  • AFG- 0.45 $ 9370 Afghanistan-Mobile-AWCC
    COUNTRYCODE DESCRIPTION RATE 93 Afghanistan-:-AFG- $ 0.45 9370 Afghanistan-Mobile-AWCC-:-AFG-MOBW $ 0.43 93711 Afghanistan-Mobile-AWCC-:-AFG-MOBW $ 0.43 9378 Afghanistan-Mobile-Etisalat-:-AFG-MOBE $ 0.40 9376 Afghanistan-Mobile-MTN-:-AFG-MOBA $ 0.50 9377 Afghanistan-Mobile-MTN-:-AFG-MOBA $ 0.50 937 Afghanistan-Mobile-Others-:-AFG-MOBZ $ 0.47 93744 Afghanistan-Mobile-Others-:-AFG-MOBZ $ 0.47 93747 Afghanistan-Mobile-Others-:-AFG-MOBZ $ 0.47 9372 Afghanistan-Mobile-Roshan-:-AFG-MOBR $ 0.38 9379 Afghanistan-Mobile-Roshan-:-AFG-MOBR $ 0.38 355 Albania-:-ALB- $ 0.35 35568 Albania-Mobile-AMC-:-ALB-MOBA $ 0.87 35567 Albania-Mobile-Eagle-:-ALB-MOBE $ 0.83 35566 Albania-Mobile-Others-:-ALB-MOBZ $ 0.86 35569 Albania-Mobile-Vodafone-:-ALB-MOBV $ 0.82 355422 Albania-Tirana-:-ALB-TIR $ 0.35 355423 Albania-Tirana-:-ALB-TIR $ 0.35 3554240 Albania-Tirana-:-ALB-TIR $ 0.35 3554241 Albania-Tirana-:-ALB-TIR $ 0.35 3554242 Albania-Tirana-:-ALB-TIR $ 0.35 3554243 Albania-Tirana-:-ALB-TIR $ 0.35 3554244 Albania-Tirana-:-ALB-TIR $ 0.35 3554245 Albania-Tirana-:-ALB-TIR $ 0.35 3554246 Albania-Tirana-:-ALB-TIR $ 0.35 3554247 Albania-Tirana-:-ALB-TIR $ 0.35 3554248 Albania-Tirana-:-ALB-TIR $ 0.35 3554249 Albania-Tirana-:-ALB-TIR $ 0.35 213 Algeria-:-DZA- $ 0.13 21321 Algeria-Algiers-:-DZA-ALG $ 0.13 2137 Algeria-Mobile-Djezzy-:-DZA-MOBD $ 0.78 2136 Algeria-Mobile-Mobilis-:-DZA-MOBM $ 0.78 2131 Algeria-Mobile-Others-:-DZA-MOBZ $ 0.78 2139 Algeria-Mobile-Others-:-DZA-MOBZ $ 0.78 2135 Algeria-Mobile-Wataniya-:-DZA-MOBW $ 1.37 376 Andorra-:-AND- $ 0.04 3763 Andorra-Mobile-:-AND-MOB
    [Show full text]
  • The Promise of Ubiquity Mobile As Media Platform in the Global South
    EUROPE THE PROMISE OF UBIQUITY MOBILE AS MEDIA PLATFORM IN THE GLOBAL SOUTH 7 2 2 8 2 8 INTERNEWS EUROPE 3 EUROPE THE PROMISE OF UBIQUITY MOBILE AS MEDIA PLATFORM IN THE GLOBAL SOUTH INTERNEWS EUROPE THE PROMISE OF UBIQUITY Credits Produced by John West for Internews Europe © 2008. All rights reserved. This report is available in PDF online at http://www.internews.eu This publication was generously supported by the Dutch Ministry of Foreign Affairs and Internews Network. 2 CONTENTS Table of Contents 1. Executive Summary 1 2. Reach – mobile now matches TV in the South 5 2.1. 2006-8 Explosion 5 2.2. Predicted continued growth 6 2.3. Generalised pattern 7 2.4. South not G7, East or Middle East 8 2.5. Least-Developed Countries 9 2.6. The decision-maker’s bubble 10 2.7. A BOP business 11 a) MNOs and the decline of ARPU 11 b) Handset manufacturers 13 c) Government: critical mass of competition 13 3. Case Studies 15 3.1. Ken Banks – FrontlineSMS 15 3.2. Paul Meyer – Voxiva LLC 16 3.3. Jasmine News Service 17 3.4. Emmanuel de Dinechin – Altai Consulting 18 3.5. Jonathan Marks, Critical Distance 19 3.6. Mike Grenville – 160Characters.org 20 3.7. Bobby Soriano – mobile in the Philippines 21 3.8. Illico Elia, Thomson Reuters Mobile Products 22 3.9. Jan Blom, designer, Nokia, Bangalore 23 4. The implications for southern media 25 4.1. Working Conclusions 25 a) If you don’t do it, someone else will 25 b) It’s only just beginning 25 c) Text is everywhere, voice is (surprisingly) nowhere 25 d) Know what you’re offering 25 e) Know Your Market 26 f) It’s tough down the food chain – strike out on your own if you can 26 g) Look Everywhere for the Business Model 26 h) Broadcast point of departure: participation 26 i) Print point of departure: the right snippet of data 26 5.
    [Show full text]
  • NASA Contractor Report 172501 I/ --- / 5 '7"12.-I
    NASA Contractor Report 172501 |_&SA-CB-172501} VO_S_A_: A C£#._DTEH _87- 18329 }}CGBAM FOR CALC_LATIBG LA_£BAI-DIRECTIGNAL S_ABIII_Y DEBIIAII_ES WITH VC£_X FLOW £1_ECI (Kansas _niv. Center fez _esearch, Unclas 43373 Inc.} 260 p CSCL 09B G3/61 VORSTAB - A COMPUTER PROGRAM FOR CALCULATING LATERAL-DIRECTIONAL STABILITY DERIVATIVES WITH VORTEX FLOW EFFECT C. Edward Lan i/_---_ / THE UNIVERSITY OF KANSAS CENTER FOR RESEARCH, INC. Flight Research Laboratory Lawrence, Kansas 5 _'7"12.-I i Grant NAG1-134 January 1985 January 31, 1987 Date for general release National Aeronautics and Space Administration Langley Research Center Hampton, Virginia 23665 TABLE OF CONTENTS Section Introduction i Summary of the Theoretical Method i Program Capabilities 5 Input Data Format 7 Output Variables 26 Program Job Control Set-Up 31 Sample Input and Output 32 References 84 Appendix Fortran Program Listing 86 INTRODUCTION This report describes the usage of a computer program for calculating lateral-directional stability and control derivatives as described in reference i. The method is applicable to wing- body combinations in subsonic flow. In the following, a summary of the theoretical method, program capabilities, input format, output variables and program job control set-up are described. Then, input data of sample test cases and the corresponding output are given. The program listing is presented at the end. SUMMARY OF THE THEORETICAL METHOD The method is based on the Prandtl-Glauert equation in subsonic flow. The wing is assumed to be thin, so that thickness effect is not included. In the following, theoretical representation of the effects of wings, vortex flow and fuselage is summarized.
    [Show full text]
  • Comodo Threat Intelligence
    Comodo Threat Intelligence Lab SPECIAL REPORT: AUGUST 2017 – IKARUSdilapidated Locky Part II: 2nd Wave of Ransomware Attacks Uses Your Scanner/Printer, Post Office Billing Inquiry THREAT RESEARCH LABS Locky Ransomware August 2017 Special Report Part II A second wave of new but related IKARUSdilapidated Locky ransomware attacks has occurred, building on the attacks discovered by the Comodo Threat Intelligence Lab (part of Comodo Threat Research Labs) earlier in the month of August 2017. This late August campaign also uses a botnet of “zombie computers” to coordinate a phishing attack which sends emails appearing to be from your organization’s scanner/printer (or other legitimate source) and ultimately encrypts the victims’ computers and demands a bitcoin ransom. SPECIAL REPORT 2 THREAT RESEARCH LABS The larger of the two attacks in this wave presents as a scanned image emailed to you from your organization’s scanner/printer. As many employees today scan original documents at the company scanner/printer and email them to themselves and others, this malware-laden email will look very innocent. The sophistication here includes even matching the scanner/printer model number to make it look more common as the Sharp MX2600N is one of the most popular models of business scanner/printers in the market. This second wave August 2017 phishing campaign carrying IKARUSdilapidated Locky ransomware is, in fact, two different campaigns launched 3 days apart. The first (featuring the subject “Scanned image from MX-2600N”) was discovered by the Lab to have commenced primarily over 17 hours on August 18th and the second (a French language email purportedly from the French post office featuring a subject including “FACTURE”) was executed over a 15-hour period on August 21st, 2017.
    [Show full text]
  • Community Development District
    Rivers Edge II Community Development District September 18, 2019 Rivers Edge II Community Development District 475 West Town Place, Suite 114, St. Augustine, Florida 32092 Phone: 904-940-5850 - Fax: 904-940-5899 September 17, 2019 Board of Supervisors Rivers Edge II Community Development District Dear Board Members: The Rivers Edge II Community Development District Board of Supervisors Meeting is scheduled for Wednesday, September 18, 2019 at 10:30 a.m. at the RiverTown Amenity Center, 156 Landing Street, St. Johns, Florida. Following is the revised agenda for the meeting: I. Call to Order II. Public Comment III. Affidavits of Publication IV. Approval of the Minutes of the August 21, 2019 Meeting V. Public Hearing on the Imposition of Special Assessments A. Consideration of Resolution 2019-15, Equalizing and Levying Debt Assessments VI. Consideration of Amendment #1 to the Traffic Control Agreement with St. Johns County VII. Staff Reports A. District Counsel B. District Engineer C. District Manager D. General Manager – Report VIII. Financial Reports A. Balance Sheet and Income Statement B. Consideration of Funding Request No. 12 C. Check Register IX. Supervisors’ Requests and Audience Comments X. Next Scheduled Meeting – October 16, 2019 at 10:30 a.m. at the RiverTown Amenity Center XI. Adjournment Enclosed under the third order of business are the affidavits of publication for the public hearing equalizing and levying special assessments. Enclosed under the fourth order of business is a copy of the minutes of the August 21, 2019 meeting for your review and approval. The fifth order of business is the public hearing on the imposition of special assessments.
    [Show full text]
  • Prepared for Upload GCD Wls Networks
    LTE‐ LTE‐ Region Country Operator LTE Advanced 5G Advanced Pro Eastern Europe 92 57 4 3 Albania Total 32 0 0 Albania ALBtelecom 10 0 0 Albania Telekom Albania 11 0 0 Albania Vodafone Albania 11 0 0 Armenia Total 31 0 0 Armenia MTS Armenia (VivaCell‐MTS) 10 0 0 Armenia Ucom (formerly Orange Armenia) 11 0 0 Armenia VEON Armenia (Beeline) 10 0 0 Azerbaijan Total 43 0 0 Azerbaijan Azercell 10 0 0 Azerbaijan Azerfon (Nar) 11 0 0 Azerbaijan Bakcell 11 0 0 Azerbaijan Naxtel (Nakhchivan) 11 0 0 Belarus Total 42 0 0 Belarus A1 Belarus (formerly VELCOM) 10 0 0 Belarus Belarusian Cloud Technologies (beCloud) 11 0 0 Belarus Belarusian Telecommunications Network (BeST, life:)) 10 0 0 Belarus MTS Belarus 11 0 0 Bosnia and Total Herzegovina 31 0 0 Bosnia and Herzegovina BH Telecom 11 0 0 Bosnia and Herzegovina HT Mostar (HT Eronet) 10 0 0 Bosnia and Herzegovina Telekom Srpske (m:tel) 10 0 0 Bulgaria Total 53 0 0 Bulgaria A1 Bulgaria (Mobiltel) 11 0 0 Bulgaria Bulsatcom 10 0 0 Bulgaria T.com (Bulgaria) 10 0 0 Bulgaria Telenor Bulgaria 11 0 0 Bulgaria Vivacom (BTC) 11 0 0 Croatia Total 33 1 0 Croatia A1 Hrvatska (formerly VIPnet/B.net) 11 1 0 Croatia Hrvatski Telekom (HT) 11 0 0 Croatia Tele2 Croatia 11 0 0 Czechia Total 43 0 0 Czechia Nordic Telecom (formerly Air Telecom) 10 0 0 Czechia O2 Czech Republic (incl. CETIN) 11 0 0 Czechia T‐Mobile Czech Republic 11 0 0 Czechia Vodafone Czech Republic 11 0 0 Estonia Total 33 2 0 Estonia Elisa Eesti (incl.
    [Show full text]
  • Dr. Neuhaus Telekommunikation Mobile Network Code
    Dr. Neuhaus Telekommunikation Mobile Network Code The Mobile Country Code (MCC) is the fixed country identification. The Mobile Network Code (MNC) defines a GSM‐, UMTS‐, or Tetra radio network provider. This numbers will be allocates June 2011 autonomus from each country. Only in the alliance of bothscodes (MCC + MNC) the mobile radio network can be identified. All informations without guarantee Country MCC MNC Provider Operator APN User Name Password Abkhazia (Georgia) 289 67 Aquafon Aquafon Abkhazia (Georgia) 289 88 A-Mobile A-Mobile Afghanistan 412 01 AWCC Afghan Afghanistan 412 20 Roshan Telecom Afghanistan 412 40 Areeba MTN Afghanistan 412 50 Etisalat Etisalat Albania 276 01 AMC Albanian Albania 276 02 Vodafone Vodafone Twa guest guest Albania 276 03 Eagle Mobile Albania 276 04 Plus Communication Algeria 603 01 Mobilis ATM Algeria 603 02 Djezzy Orascom Algeria 603 03 Nedjma Wataniya Andorra 213 03 Mobiland Servei Angola 631 02 UNITEL UNITEL Anguilla (United Kingdom) 365 10 Weblinks Limited Anguilla (United Kingdom) 365 840 Cable & Antigua and Barbuda 344 30 APUA Antigua Antigua and Barbuda 344 920 Lime Cable Antigua and Barbuda 338 50 Digicel Antigua Argentina 722 10 Movistar Telefonica internet.gprs.unifon.com. wap wap ar internet.unifon Dr. Neuhaus Telekommunikation Mobile Network Code The Mobile Country Code (MCC) is the fixed country identification. The Mobile Network Code (MNC) defines a GSM‐, UMTS‐, or Tetra radio network provider. This numbers will be allocates June 2011 autonomus from each country. Only in the alliance of bothscodes (MCC + MNC) the mobile radio network can be identified. All informations without guarantee Country MCC MNC Provider Operator APN User Name Password Argentina 722 70 Movistar Telefonica internet.gprs.unifon.com.
    [Show full text]
  • Ready for Upload GCD Wls Networks
    LTE‐ LTE‐ REGION COUNTRY OPERATOR LTE Advanced Advanced Pro Eastern Europe 92 55 2 Albania Total 320 Albania ALBtelecom 100 Albania Telekom Albania 110 Albania Vodafone Albania 110 Armenia Total 310 Armenia MTS Armenia (VivaCell‐MTS) 100 Armenia Ucom (formerly Orange Armenia) 110 Armenia VEON Armenia (Beeline) 100 Azerbaijan Total 430 Azerbaijan Azercell 100 Azerbaijan Azerfon (Nar) 110 Azerbaijan Bakcell 110 Azerbaijan Naxtel (Nakhchivan) 110 Belarus Total 420 Belarus Belarusian Cloud Technologies (beCloud) 110 Belarusian Telecommunications Network Belarus (BeST, life:)) 100 Belarus MTS Belarus 110 Belarus VELCOM (A1 Belarus) 100 Bosnia and Herzegovina Total 300 Bosnia and Herzegovina BH Telecom 100 Bosnia and Herzegovina HT Mostar (HT Eronet) 100 Bosnia and Herzegovina Telekom Srpske (m:tel) 100 Bulgaria Total 530 Bulgaria A1 Bulgaria (Mobiltel) 110 Bulgaria Bulsatcom 100 Bulgaria T.com (Bulgaria) 100 Bulgaria Telenor Bulgaria 110 Bulgaria Vivacom (BTC) 110 Croatia Total 321 Croatia A1 Croatia (VIPnet incl. B.net) 111 Croatia Hrvatski Telekom (HT) 110 Croatia Tele2 Croatia 100 Czech Republic Total 430 Czech Republic Nordic Telecom (formerly Air Telecom) 100 Czech Republic O2 Czech Republic (incl. CETIN) 110 Czech Republic T‐Mobile Czech Republic 110 Czech Republic Vodafone Czech Republic 110 Estonia Total 330 Estonia Elisa Eesti (incl. Starman) 110 Estonia Tele2 Eesti 110 Telia Eesti (formerly Eesti Telekom, EMT, Estonia Elion) 110 Georgia Total 630 Georgia A‐Mobile (Abkhazia) 100 Georgia Aquafon GSM (Abkhazia) 110 Georgia MagtiCom
    [Show full text]
  • Network List Addendum
    Network List Addendum IN-SITU PROVIDED SIM CELLULAR NETWORK COVERAGE COUNTRY NETWORK 2G 3G LTE-M NB-IOT COUNTRY NETWORK 2G 3G LTE-M NB-IOT (VULINK, (TUBE, (VULINK) (VULINK) TUBE, WEBCOMM) (VULINK, (TUBE, (VULINK) (VULINK) WEBCOMM) TUBE, WEBCOMM) WEBCOMM) Benin Moov X X Afghanistan TDCA (Roshan) X X Bermuda ONE X X Afghanistan MTN X X Bolivia Viva X X Afghanistan Etisalat X X Bolivia Tigo X X Albania Vodafone X X X Bonaire / Sint Eustatius / Saba Albania Eagle Mobile X X / Curacao / Saint Digicel X X Algeria ATM Mobilis X X X Martin (French part) Algeria Ooredoo X X Bonaire / Sint Mobiland Andorra X X Eustatius / Saba (Andorra) / Curacao / Saint TelCell SX X Angola Unitel X X Martin (French part) Anguilla FLOW X X Bosnia and BH Mobile X X Anguilla Digicel X Herzegovina Antigua and Bosnia and FLOW X X HT-ERONET X X Barbuda Herzegovina Antigua and Bosnia and Digicel X mtel X Barbuda Herzegovina Argentina Claro X X Botswana MTN X X Argentina Personal X X Botswana Orange X X Argentina Movistar X X Brazil TIM X X Armenia Beeline X X Brazil Vivo X X X X Armenia Ucom X X Brazil Claro X X X Aruba Digicel X X British Virgin FLOW X X Islands Australia Optus X CCT - Carribean Australia Telstra X X British Virgin Cellular X X Islands Australia Vodafone X X Telephone Austria A1 X X Brunei UNN X X Darussalam Austria T-Mobile X X X Bulgaria A1 X X X X Austria H3G X X Bulgaria Telenor X X Azerbaijan Azercell X X Bulgaria Vivacom X X Azerbaijan Bakcell X X Burkina Faso Orange X X Bahamas BTC X X Burundi Smart Mobile X X Bahamas Aliv X Cabo Verde CVMOVEL
    [Show full text]
  • Contents Volume 39 No
    contents Volume 39 No. 3 - August 2017 ISSN 1751-0791 Chartered Supporters commentary The SCTE is grateful to the following SCTE in Focus 2 chartered supporters for their continued Welcome to the August 2017 issue of Broadband Journal! support of Broadband Journal: ABOX42, Arcom, ARRIS, ATX Networks, Bridge Technologies, Corning, DCT Delta GmbH, from the scte DVEO, Qorvo, Teleste, Technetix and WISI. SCTE News 4 All the latest on news and events from the SCTE. SCTE - The Society SCTE India Round-Up: On a Digital Glidepath 12 for Broadband Professionals Rahul Nehra, Hon. National Secretary, SCTE India, chronicles India’s digital growth story. Officers and Members of the Executive Committee from the industry President Mike Thornton FSCTE Industry News 14 Vice President Mike Jones The latest global news from the industry. Chief Executive Dr. Roger Blakeway FIET, C.Eng Customer Pre-Churn Analysis of the Cable Television Industry 22 Hon. Treasurer Chris Swires While the reasons for churn are often known and reported, there is very little publicly Secretary Beverley Walker FIAM available information regarding the kinds of events that preceded the churn. Members Chris Bailey IEng MIMechIE; Laura Reliability in the Public Cloud is Achievable for Video Applications 36 Baskeyfield; Paul Broadhurst; John Callas; Costas This article explores the different types of cloud infrastructure, explaining why a video-specific Kyriacou MIEE BEng (Hons); Rien Baan; cloud isn’t the best option for media processing compared to the advantages of a generic Paul Smith; Frank Summerfield; Dave Hodges private or public cloud. and Owen Williams. Best Practices for OTT Video Delivery 40 This article discusses the key technical issues that cable and satellite operators face when SCTE deploying OTT services, as well as best practices for ensuring superior Quality of Experience Communications House, (QoE) and Quality of Service (QoS) for end-users.
    [Show full text]