Policy

Home Telecom: 'Telecom 2020: A Vision for the Future'

“Any Content, Every Device, All Networks”

Imagine that you wake up tomorrow and want to watch your favorite TV show. The program will not play. You don’t have the specified device that the content owner now requires this program to be played on. It is only available on a particular device per an exclusive agreement between the content owner and the device manufacturer. Not only is your device prohibiting your viewing, but you also have the “wrong” video provider. The TV program you want to watch is owned by a video provider you don’t wish to use, but the show you want to watch can now only be seen on the video system that owns the program. Bad things can happen if content, devices, and networks are all controlled by the same party.

Scenarios like the nightmare described above is what Home Telecom is constantly fighting to avoid. As an industry leader, we keep our finger on the heartbeat of events that would directly impact our customers. Rules and laws impacting how we communicate are constantly changing. In addition, it seems mega mergers are announced several times a year; the big just keep getting bigger. Home Telecom is constantly monitoring the communication environment, working with our lawmakers and regulators to make sure that any changes in communications laws and regulations are for the better, not the worse.

Rural Broadband Providers Discuss Cybersecurity Issues

Ransomware, distributed denial of service (DDOS) attacks, phishing campaigns – is your company prepared to address and mitigate current cyber threats? Within the last few years, cyberattacks have intensified in frequency, sophistication and severity. Corporations, networks and individuals are under constant attack from cyberthreats originating within the United States and abroad. Bad actors are targeting all organizations, regardless of their size or business mission. A cyberattack could adversely affect the continued viability of your company. 

Bad actors typically target credit card information, employee data, customer data, intellectual property—often information that is found on your “enterprise” or company network(s). Additionally, those that operate a telecom network may face broader exposure. A bad actor may desire to infiltrate a telecom voice and/or data network(s) to access and exploit networking gear, disrupt communications or reach the networks of your business customers. 

I Skirted a Privacy Disaster in Ohio

                                                                                                                                                                                                                                                                                                            

Graeter's Ice Cream - excellent ice cream, impeccable privacy.
Graeter's - excellent ice cream, impeccable privacy.

 

Last week I travelled to Columbus to participate in the Ohio Telecommunications Association meeting. I grew up in the area, and took the opportunity to do some wandering. In what should have been a routine trip for ice cream at Graeter’s, I narrowly avoided disaster, twice.

I avoided the first potential mishap by asking for a sample spoon of Cheese Crown, which the young lady at the counter described as a having a somewhat cinnamon/cheesecake flavor. Not my cup of tea. I went for the Toffee Chocolate Chip, instead (and recommend it highly).

The second near-mishap occurred when I paid for the cone. The cashier asked if I was a member of the store’s “Sweet Rewards” program. As part of the application process, I was asked to provide my birthday. And I balked.