Tek-1 Telecom Inc.
Effective Date: March 22, 2026
Overview
This notice describes the risks associated with telecommunications fraud and the responsibilities of customers using services provided by Tek-1 Telecom Inc. (“Tek-1 Telecom”).
Toll fraud is a significant risk within the telecommunications industry and can result in substantial unauthorized charges if systems are not properly secured.
1. What Is Toll Fraud
Toll fraud occurs when an unauthorized party gains access to a telecommunications system and uses it to place outbound calls or transmit communications without the customer’s permission.
Common targets include:
- VoIP phone systems
- SIP accounts
- Voicemail systems
- PBX administration portals
- Improperly secured network equipment
Fraudulent calls are frequently directed to high-cost international destinations.
2. Customer Financial Responsibility
Customers are responsible for all usage associated with their telecommunications services, including:
- authorized usage
- employee usage
- guest usage
- unauthorized usage resulting from compromised credentials or equipment
Unless otherwise agreed in writing, all call charges generated from the customer’s account are the responsibility of the customer, including charges resulting from fraud or system compromise.
3. Common Methods of Toll Fraud
Telecommunications fraud may occur through:
- compromised SIP credentials
- weak voicemail passwords
- unsecured remote PBX access
- exposed SIP ports on firewalls
- compromised user devices
- malware or network intrusion
Attackers may automate call generation and place thousands of calls in a short period of time.
4. Customer Security Responsibilities
Customers are responsible for maintaining reasonable security controls, including:
- using strong passwords for PBX and voicemail access
- restricting administrative access to authorized personnel
- securing firewalls and network equipment
- preventing public exposure of SIP services where possible
- restricting international calling where appropriate
- monitoring call activity and usage patterns
Customers should also ensure that network devices, routers, and firewalls are properly configured and maintained.
5. Fraud Monitoring
Tek-1 Telecom may implement fraud detection systems designed to identify unusual call activity.
However:
- monitoring systems cannot detect all fraudulent activity
- fraud may occur outside monitoring hours
- sophisticated attacks may bypass detection systems
Fraud monitoring is provided on a commercially reasonable basis and does not eliminate the risk of fraud.
6. Fraud Prevention Options
Tek-1 Telecom may offer optional protections including:
- international call blocking
- geographic call restrictions
- call spending thresholds
- outbound call limits
- account alerts
Customers are encouraged to enable appropriate controls for their environment.
7. Suspension of Services
If suspicious activity is detected, Tek-1 Telecom may temporarily restrict or suspend services in order to protect the customer or network integrity.
This action may occur without prior notice if immediate action is required.
8. Reporting Suspected Fraud
Customers should immediately report any suspected fraudulent activity to Tek-1 Telecom.
Prompt reporting may assist in limiting further unauthorized usage.
Support Contact
support@tek1telecom.com
416-869-3972
9. Limitation of Liability
Tek-1 Telecom is not responsible for losses or charges resulting from:
- unauthorized system access
- compromised credentials
- insecure customer networks
- delayed detection of fraudulent activity
- third-party carrier routing of fraudulent calls
Liability for telecommunications services is subject to the limitations described in the Tek-1 Telecom Master Services Agreement and Toll Fraud Addendum.
10. Customer Acknowledgment
By using Tek-1 Telecom telecommunications services, customers acknowledge that:
- toll fraud is an inherent risk in telecommunications systems
- reasonable security controls must be implemented by the customer
- the customer remains responsible for usage associated with their account
