In addition to the Consumer Bill of Rights, telecoms service providers in Nigeria are obliged under the Consumer Code of Practice Regulations (CCPR), 2007 to do the following for their subscribers and/or consumers:
- Provide information on products and services that is complete, accurate, and up-to-date in simple and clear language.
- Ensure timely response to requests for information on products and services, and such information must be provided free of charge.
- Provide consumers with billing rates and terms and conditions for all services on offer to the public. The information must be in both electronic and print format and must be available on the operator's website and all retail outlets.
- Communicate promptly any change in tariff rates and conditions for services communicated to consumers.
- On request, service providers must make available to consumers a contract or agreement for provision of services, which must be written in simple and plain language. 4
Have you lost a phone or had it stolen? How did you handle the situation? Losing/misplacing a phone can make a person feel almost empty in modern times. These days, phones are used for so much more than making phone calls, and the thought of a stranger having access to all that data on your phone can make you feel as if you were stripped off of everything. Here are some steps you can take immediately when you lose your Phone.
Credit card fraud across the internet is one of the more common examples of this type of crime. Some people fall prey to this type of scam because they are careless with their debit or credit cards whilst others are duped by clever phishing schemes (this is a way that criminals get sensitive information like usernames or passwords). These quick tips may help you lessen the risk of credit card fraud;
- Do not ever allow the card out of your possession
- Check your payment receipt every time and make sure the amount is correct
- Try not to write the pin number anywhere and memorize it well
- Get the card canceled if misplaced in any situation
- Be careful while making big transactions
- Be careful while responding to special offers online
- When making purchases online, ensure that the vendor is credible with a strong track record of reliability.
- Ensure that the website of the vendor uses the secure HTTP protocol - the address of the website (URL) where you are making the purchase must begin with https://
Internet fraud is the use of internet services to defraud victims or to otherwise take advantage of them. Such schemes have led to the loss of millions of dollars each year from victims and continue to plague internet users in various forms.It usually involves a criminal or group of criminals attempting to trick or scam a target using the Internet, leading to the person who is being tricked sending money to the criminals. Internet fraud can take place using internet applications such as chat rooms, e-mail, message boards, or simple web sites. Advertisements that pop up on the internet have a big risk of being scams.
Types of Internet Fraud
Types of internet fraud include but are not limited to;
- Stolen credit/debit card.
- Emails.
- Lotteries.
- Fake Auctions.
- Fake Websites.
Mobile Handsets offer a wide range of functions such as voice calls, text messages, chats, emails, internet browsing and business/ financial transactions.
The word Counterfeit according to Oxford Advanced Learners Dictionary (7th Edition) means something that is made to look exactly like the original with the intent of tricking people into thinking that they are getting the real thing. Consumers often opt for counterfeit phones because they are cheap and look original. It is however important to know of some of the hazards of using counterfeit Handsets.
We all come in contact with liquids in the course of our day to day lives. We are also prone to the danger of having our mobile phones fall into these liquids; water, oil, solvents, etc. With the present prevalent high cost of mobile handsets, it is pertinent that we learn some easy tips that we can use in protecting our handsets from liquid damage.Here are some easy steps to protect the phone from damaging as soon as it comes in contact with liquids.
On a daily basis, people are exposed to various forms of online threats and attacks such as malware, spyware, adware, phishing, viruses, worms, Trojan horses, rootkits, ransomware, etc. To further minimize the vulnerability of online threats and attacks, these information below explains security tips to consumers on actionable steps to take to protect themselves while online.
Wi-Fi hotspots are often a source of joy for most smartphone/device users in need of some free Web browsing or social media time. The benefits of free Wi-Fi access such as the ease of connectivity and opportunity to conserve cellular data makes it a common occurrence for most users to seek out these free connections in public locations such as parks, banks, hotels, restaurants, etc.
According to Yudala, Nigeria's fastest growing composite e-commerce outfit, it states that caution must, however, be exercised when accessing sensitive personal information and/or carrying out online shopping or mobile banking activities over a free public Wi-Fi connection as this could pre-dispose you to grave losses from hackers.
Have you ever been expecting a call only to find out it was unsolicited tele-marketing? Or maybe you have experienced the frustration of receiving incessant unsolicited messages? Well, don't despair as the Nigerian Communications Commission (NCC) is committed to protecting, informing and educating all telecom Consumers on their rights and obligations.
Cybersecurity can be defined as the protection of computer systems from theft or damage of their hardware, software or electronic data. It also involves protecting the systems services from being manipulated or disrupted.The need to be Cybersecurity conscious is of growing importance due to increasing reliance on computer systems, the Internet, wireless networks and smart devices.
There are no smartphones that are entirely secure or "hack-proof", though some are better than others. In fact, many companies focus on creating phones that are more secure and difficult for hackers to access. However it is not necessary to go out and buy a special phone to protect your privacy and secure your data.