SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Data Protection in Electronic Communications Sector




               Özgür Fatih AKPINAR
       Head of Consumer Rights Department
                  20, June, 2011
Content of the Presentation
 A few words

 Role of the NRA

 Legislation in Turkey
     By-Law on Personal Data Processing and Protection of Privacy in The
      Telecommunications Sector
     By-Law on Security of Electronic Communications


 Regulatory Experiences of the ICT Authority
     Breach of personal data: Unauthorized access to itemised bills
     Preventing unlawful processing of personal data : Anonymous SMS
     Exceptions for personal data processing: Emergency Calls


 Conclusion
A few words:


 One of the firms says that we have 1/3 of world populations
  personal data ranging from their bank accounts to GSM
  numbers.
A few words:


 Personal Information/Data: Any information related with natural
  and/or legal persons which can be defined directly or indirectly by
  using one or more elements of identity card number or physical,
  psychological, intellectual, economic, cultural and social identities
  or health related, genetic, ethnic, religious, family related and
  political information.

 Modification of the Constitution (2010) Article 20: Everybody can
  request protection of their personal data …..
Role of the NRA



 Since protection of personal data is a fundamental right, it is
  necessary for ICT Authority to regulate processing and protection
  of personal data.

 Why is it necessary?
Role of the NRA




 Is it the beginning or to the end?
Legislation


 Legislation in Turkey

     By-Law on Personal Data Processing and Protection of Privacy in the
      Telecommunications Sector enacted in 2004.


     By-Law on Security of Electronic Communications enacted in 2008.
Regulatory Experiences


   Regulatory Experiences of the ICT Authority show us if NRAs have
    provisions to protect consumers from processing of their personal data
     Communication with confidently,
     Either people or firms can benefit from processing of personal data,
     Restriction of calling and connected line identification
   If NRAs do not care processing of personal data
     What you are talking,
     Which parties you are communicating,
     Unsolicited communications,
     Somebody can communicate on behalf of you.
Current case in Turkey
Unauthorized access to itemised
               bills-1

 Newspaper named “Taraf”- It is argued that “Personal data of
  subscribers of one of the operators can be accessed by third
  parties.”

 A thouroughful investigation had been carried out, and



 1.250.000 TL (almost $800.000) penalty was charged.
Unauthorized access to
             itemised bills-2


 An argument about unauthorized access of former soccer
  player Rıdvan DİLMEN to call detailed record (CDR) of his
  former girl friend.

 A detailed investigation had been carried out,

 During the investigation, NRA also benefits from indictment of
  high courts,

 Police statements and written records.

 13.000.000 TL (almost $9.000.000) penalty was charged.
Anonymous SMS

 Argument regarding presence of a security risk in one of the
  mobile operators’ network which makes it possible to send an
  SMS in the name of another subscriber,

 Precautions:

     Preventing SMS messages coming from abroad for the subscribers who are
      not using international roaming and

     Preventing SMS messages from international locations which are sent using
      an alfa-numeric identity.
Preventing presentation of Calling Line
  Identification (CLI) and right of blocking
             the call without CLI

 With the By-Law on Personal Data Processing and Protection of Privacy in The
  Telecommunications Sector

      Preventing the presentation of the calling line identification is a consumer right,
       however

      In such cases, called subscribers must be able to reject incoming calls where
       the presentation of the calling line identification has been prevented.
Processing of Location Data for
          Urgent call

 Location data can be processed for emergency call purposes
  without prior consent of the subscriber.
Conclusion


  Ensuring privacy of the personal data is crucial for;

 Subscribers,
 Creating secure communications environment and
 Achieving maximum benefit from electronic communications
  services.

  Hence it is necessary for NRAs and operators to cooperate
  with ensuring data privacy so as to describe the period as a
  beginning.
 You can decide which one is correct.

 It is clear that it depends on NRAs performance.
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Law
Cyber LawCyber Law
Cyber Law
ihah
 
Legal awareness
Legal awarenessLegal awareness
Legal awareness
lkantwani
 
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
ClubHack
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Maxwell Ranasinghe
 

Was ist angesagt? (20)

IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
 
It act,2000
It act,2000It act,2000
It act,2000
 
Regulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformRegulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platform
 
It law ecommerce
It law ecommerceIt law ecommerce
It law ecommerce
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
Right to privacy with special reference to marriage [ppt]
Right to privacy with special reference to marriage [ppt]Right to privacy with special reference to marriage [ppt]
Right to privacy with special reference to marriage [ppt]
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008
 
Protect Your Phone Records
Protect Your Phone RecordsProtect Your Phone Records
Protect Your Phone Records
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
The Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and RegulationsThe Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and Regulations
 
Legal awareness
Legal awarenessLegal awareness
Legal awareness
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 Report
 
2 g spectrum scam
2 g spectrum scam2 g spectrum scam
2 g spectrum scam
 
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
 
Cyber law
Cyber lawCyber law
Cyber law
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
 
PG in Cyber Law
PG in Cyber LawPG in Cyber Law
PG in Cyber Law
 

Andere mochten auch (8)

Türk bankaları Facebook'da başarılı mı
Türk bankaları Facebook'da başarılı mıTürk bankaları Facebook'da başarılı mı
Türk bankaları Facebook'da başarılı mı
 
Antalya itibar yonetimi
Antalya itibar yonetimiAntalya itibar yonetimi
Antalya itibar yonetimi
 
Privacy
PrivacyPrivacy
Privacy
 
Gelecek on yılın sosyal ağı nasıl planlanır?
Gelecek on yılın sosyal ağı nasıl planlanır?Gelecek on yılın sosyal ağı nasıl planlanır?
Gelecek on yılın sosyal ağı nasıl planlanır?
 
E i̇ş ve e-ticaret'te başarının yolları
E i̇ş ve e-ticaret'te başarının yollarıE i̇ş ve e-ticaret'te başarının yolları
E i̇ş ve e-ticaret'te başarının yolları
 
Tene istanbul
Tene istanbulTene istanbul
Tene istanbul
 
Tv Technologies
Tv TechnologiesTv Technologies
Tv Technologies
 
Dünyada eticaret...
Dünyada eticaret...Dünyada eticaret...
Dünyada eticaret...
 

Ähnlich wie Btk fatih akpinar

California Privacy Law: Resources & Protections
California Privacy Law: Resources & ProtectionsCalifornia Privacy Law: Resources & Protections
California Privacy Law: Resources & Protections
ipspat
 
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Ben Allen
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-law
Md Aktar
 
Data protection act
Data protection act Data protection act
Data protection act
Iqbal Bocus
 

Ähnlich wie Btk fatih akpinar (20)

California Privacy Law: Resources & Protections
California Privacy Law: Resources & ProtectionsCalifornia Privacy Law: Resources & Protections
California Privacy Law: Resources & Protections
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in Kenya
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sector
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commerce
 
CASE STUDY ON CYBER CRIME and characteristics .pptx
CASE STUDY ON CYBER CRIME and characteristics .pptxCASE STUDY ON CYBER CRIME and characteristics .pptx
CASE STUDY ON CYBER CRIME and characteristics .pptx
 
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
 
Presentation Nairobi 9 September 2013. Joint workshop on spam(law) of African...
Presentation Nairobi 9 September 2013. Joint workshop on spam(law) of African...Presentation Nairobi 9 September 2013. Joint workshop on spam(law) of African...
Presentation Nairobi 9 September 2013. Joint workshop on spam(law) of African...
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-law
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
PC213.L3.pdf
PC213.L3.pdfPC213.L3.pdf
PC213.L3.pdf
 
Data protection act
Data protection act Data protection act
Data protection act
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 

Mehr von Atıf ÜNALDI

Mobil medya atıf ünaldı
Mobil medya   atıf ünaldıMobil medya   atıf ünaldı
Mobil medya atıf ünaldı
Atıf ÜNALDI
 
Turk internetinin kısa tarihi
Turk internetinin kısa tarihiTurk internetinin kısa tarihi
Turk internetinin kısa tarihi
Atıf ÜNALDI
 
Online İtibar Yönetimi
Online İtibar YönetimiOnline İtibar Yönetimi
Online İtibar Yönetimi
Atıf ÜNALDI
 
Mediacat
MediacatMediacat
Mediacat
Atıf ÜNALDI
 
Bilisim kurultayı - IPTV'nin gelişimi
Bilisim kurultayı - IPTV'nin gelişimiBilisim kurultayı - IPTV'nin gelişimi
Bilisim kurultayı - IPTV'nin gelişimi
Atıf ÜNALDI
 
Bulutunuz ne-kadar-temiz
Bulutunuz ne-kadar-temizBulutunuz ne-kadar-temiz
Bulutunuz ne-kadar-temiz
Atıf ÜNALDI
 

Mehr von Atıf ÜNALDI (20)

Nesnelerin İnterneti Barometresi 4.0
Nesnelerin İnterneti Barometresi 4.0Nesnelerin İnterneti Barometresi 4.0
Nesnelerin İnterneti Barometresi 4.0
 
Mastercard Finansal ve Dijital Tabana Yayılma Raporu
Mastercard Finansal ve Dijital Tabana Yayılma RaporuMastercard Finansal ve Dijital Tabana Yayılma Raporu
Mastercard Finansal ve Dijital Tabana Yayılma Raporu
 
e-ticaret ve yenilikçi yaklaşımlar
e-ticaret ve yenilikçi yaklaşımlare-ticaret ve yenilikçi yaklaşımlar
e-ticaret ve yenilikçi yaklaşımlar
 
Internet of things and the future
Internet of things and the futureInternet of things and the future
Internet of things and the future
 
İnternette nasıl davranmalıyız
İnternette nasıl davranmalıyızİnternette nasıl davranmalıyız
İnternette nasıl davranmalıyız
 
eTicaretSEM itibar yönetimi eğitimi
eTicaretSEM itibar yönetimi eğitimieTicaretSEM itibar yönetimi eğitimi
eTicaretSEM itibar yönetimi eğitimi
 
Driving the Consumer to Access Content Through Different Platforms
Driving the Consumer to Access Content Through Different PlatformsDriving the Consumer to Access Content Through Different Platforms
Driving the Consumer to Access Content Through Different Platforms
 
Siber Güvenlik İnisiyatifi
Siber Güvenlik İnisiyatifiSiber Güvenlik İnisiyatifi
Siber Güvenlik İnisiyatifi
 
Iptv Derneği
Iptv DerneğiIptv Derneği
Iptv Derneği
 
Trt tv+sosyal medya
Trt tv+sosyal medyaTrt tv+sosyal medya
Trt tv+sosyal medya
 
Stratosfer VPN
Stratosfer VPNStratosfer VPN
Stratosfer VPN
 
Mobil medya atıf ünaldı
Mobil medya   atıf ünaldıMobil medya   atıf ünaldı
Mobil medya atıf ünaldı
 
New media
New mediaNew media
New media
 
Turk internetinin kısa tarihi
Turk internetinin kısa tarihiTurk internetinin kısa tarihi
Turk internetinin kısa tarihi
 
Online İtibar Yönetimi
Online İtibar YönetimiOnline İtibar Yönetimi
Online İtibar Yönetimi
 
Facebook
FacebookFacebook
Facebook
 
Mediacat
MediacatMediacat
Mediacat
 
Bilisim kurultayı - IPTV'nin gelişimi
Bilisim kurultayı - IPTV'nin gelişimiBilisim kurultayı - IPTV'nin gelişimi
Bilisim kurultayı - IPTV'nin gelişimi
 
Miad
MiadMiad
Miad
 
Bulutunuz ne-kadar-temiz
Bulutunuz ne-kadar-temizBulutunuz ne-kadar-temiz
Bulutunuz ne-kadar-temiz
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Btk fatih akpinar

  • 1. Data Protection in Electronic Communications Sector Özgür Fatih AKPINAR Head of Consumer Rights Department 20, June, 2011
  • 2. Content of the Presentation  A few words  Role of the NRA  Legislation in Turkey  By-Law on Personal Data Processing and Protection of Privacy in The Telecommunications Sector  By-Law on Security of Electronic Communications  Regulatory Experiences of the ICT Authority  Breach of personal data: Unauthorized access to itemised bills  Preventing unlawful processing of personal data : Anonymous SMS  Exceptions for personal data processing: Emergency Calls  Conclusion
  • 3. A few words:  One of the firms says that we have 1/3 of world populations personal data ranging from their bank accounts to GSM numbers.
  • 4. A few words:  Personal Information/Data: Any information related with natural and/or legal persons which can be defined directly or indirectly by using one or more elements of identity card number or physical, psychological, intellectual, economic, cultural and social identities or health related, genetic, ethnic, religious, family related and political information.  Modification of the Constitution (2010) Article 20: Everybody can request protection of their personal data …..
  • 5. Role of the NRA  Since protection of personal data is a fundamental right, it is necessary for ICT Authority to regulate processing and protection of personal data.  Why is it necessary?
  • 6. Role of the NRA  Is it the beginning or to the end?
  • 7. Legislation  Legislation in Turkey  By-Law on Personal Data Processing and Protection of Privacy in the Telecommunications Sector enacted in 2004.  By-Law on Security of Electronic Communications enacted in 2008.
  • 8. Regulatory Experiences  Regulatory Experiences of the ICT Authority show us if NRAs have provisions to protect consumers from processing of their personal data  Communication with confidently,  Either people or firms can benefit from processing of personal data,  Restriction of calling and connected line identification  If NRAs do not care processing of personal data  What you are talking,  Which parties you are communicating,  Unsolicited communications,  Somebody can communicate on behalf of you.
  • 10. Unauthorized access to itemised bills-1  Newspaper named “Taraf”- It is argued that “Personal data of subscribers of one of the operators can be accessed by third parties.”  A thouroughful investigation had been carried out, and  1.250.000 TL (almost $800.000) penalty was charged.
  • 11. Unauthorized access to itemised bills-2  An argument about unauthorized access of former soccer player Rıdvan DİLMEN to call detailed record (CDR) of his former girl friend.  A detailed investigation had been carried out,  During the investigation, NRA also benefits from indictment of high courts,  Police statements and written records.  13.000.000 TL (almost $9.000.000) penalty was charged.
  • 12. Anonymous SMS  Argument regarding presence of a security risk in one of the mobile operators’ network which makes it possible to send an SMS in the name of another subscriber,  Precautions:  Preventing SMS messages coming from abroad for the subscribers who are not using international roaming and  Preventing SMS messages from international locations which are sent using an alfa-numeric identity.
  • 13. Preventing presentation of Calling Line Identification (CLI) and right of blocking the call without CLI  With the By-Law on Personal Data Processing and Protection of Privacy in The Telecommunications Sector  Preventing the presentation of the calling line identification is a consumer right, however  In such cases, called subscribers must be able to reject incoming calls where the presentation of the calling line identification has been prevented.
  • 14. Processing of Location Data for Urgent call  Location data can be processed for emergency call purposes without prior consent of the subscriber.
  • 15. Conclusion Ensuring privacy of the personal data is crucial for;  Subscribers,  Creating secure communications environment and  Achieving maximum benefit from electronic communications services. Hence it is necessary for NRAs and operators to cooperate with ensuring data privacy so as to describe the period as a beginning.
  • 16.  You can decide which one is correct.  It is clear that it depends on NRAs performance.