QR code, an abbreviation for Quick Response code was invented in Japan in the 1990's for use in the automobile industry to aid production but have since spread to other areas of commerce. QR Code is used by multiple web applications to authenticate users based on a technology known as QR Login (QRL).

Users only need to scan the QR codes displayed on the web applications to log in, instead of

A consumer’s Quality of Experience sometimes goes beyond the Quality of Service (QoS) offered by telecom operators as a lot can depend on some minor changes and an upgrade of the Subscriber Identity Module (SIM) card. It is therefore important that consumers who are complaining about QoS check their phones to ensure that they are optimally set to enjoy the current generation of mobile services in their service areas – 3G and 4G services.

The following are some of the steps a subscriber can take

The COVID-19 pandemic has limited physical interactions such that the use of the internet/cyberspace has become more prevalent in our work and social lives. This increased reliance on the internet and cyberspace exposes our personal data as well threatens privacy and online safety. The internet, while a great tool for innovation, social interactions, work and many more, also harbours some rouge elements determined to perpetrate cybercrime. 

Cybercrime is any unlawful activity that is conducted in cyberspace, these include but are not limited to stealing personal data, spying, deception, bullying. To stay safe online it is important to practice good cyber habits.

Good Cyber habits are

An eSIM is a SIM card that is embedded in a mobile device and can connect a consumer/customer to any operator that offers eSIM service(s). It is pre-installed in a device (could be a mobile phone) and can be activated by installing an “eSIM profile” on it when a customer who has a phone with eSIM facility visits his or her Service Provider’s customer care centre.

The drive towards eSIM came in part from the Internet of Things (IoT) industry. ESIM does not require extra room for a slot because it is built into devices like mobile phones, tablets, drones, wearables, sensors, and location trackers, where miniaturised size of the device is a concern but not in all cases as some

Understanding DND

On many occasions, Nigerians had complained about the menace of unwanted messages from service providers. As a result of the persistent complaints from the consumers, the Commission directed telecom operators to incorporate Do not Disturb (DND) in their service provision. This is done to give a subscriber the choice to receive or not receive such messages from network providers. 

Below is how DND works.

What is DND?

DND simply means,

Cyberbullying is the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature. Adult and children are often bullied online. Children may be reluctant to admit to being the victims of cyberbullying.

The ten types of Cyberbullying: In today’s cyber world we need to stand up against cyberbullying and educate our children about this menace. How best do we prevent cyberbullying to our vulnerable children? It is also very important to understand what cyber bullying is all about.

Nations are presently grappling with the impact of COVID-19, including the fact that young people are compelled to spend more time at home which implies more screen time (offline and online). The impact of COVID-19 pandemic has brought to bear a shift in the norms,putting more activities, including education of children, online. This has leapfrogged Nigerian children into the future. Online activities have acquired new meaning and become the reality of Nigerian parents and children. Screen time and screen activities are the new normal. Parents are constantly searching for online learning platforms, TV stations are providing more child-based educational content and schools are teaching via Zoom, Google Classroom and YouTube. Cyberspace, the internet and online activities are here to stay.

Data Rollover is one of the consumer-centric initiatives of the Nigerian Communications Commission (NCC) put in place to protect the consumers and ensure they have value for their money. Data Rollover is simply a process that allows service providers to add consumer’s unused data from one billing cycle to the next billing cycle instead of losing the data entirely.

This implies that if a consumer has a monthly data plan of 2.5GB and uses only 1GB during the billing cycle, the remaining 1.5GB will be added or rolled over into the next month’s billing cycle, giving the consumer 4GB (remaining 1.5GB + 2.5 GB monthly plan). This can also be possible if the renewal of data plan is within the approved stipulated timeframe by the NCC.

What is Telecom Infrastructure? Telecom Infrastructure essentially connotes physical assets designed for telecommunications networks that connect and link cities, towns, highways in countries to ensure seamless telecom services.

Telecom infrastructure has been identified as an important Critical National Asset and it comprises base transceiver stations (BTS) telephone wires, fibers, cables (including submarine cables), satellites, microwaves, and mobile technology such as fifth-generation (5G) mobile networks.

  1. NCC DIRECTION ON DO-NOT-DISTURB

    Pursuant to Section 53 of the Nigerian Communications Act 2003: That Service Providers shall on or before June 30, 2016 dedicate the short code 2442 on their networks to enable consumers opt into the do not disturb database to restrict receiving unsolicited messages (Voice & SMS)
    • Text STOP to 2442 for FULL DND
    • Text HELP to 2442 for Partial DND. This brings a menu of options.
    • Text STATUS to 2442 to enable you confirm if your line on the DND Database as Full or Partial.