2. Page 2 of 21
Table of Contents
Note to Practitioner ...................................................................................................................................... 3
Introduction................................................................................................................................................... 4
Telecommunications Industry....................................................................................................................... 4
Revenue Leakage........................................................................................................................................... 5
Poor Operational Processes and Procedures............................................................................................ 5
Poor Systems Integration .......................................................................................................................... 6
External and Internal Fraud....................................................................................................................... 6
Average Amount of Revenue Leakage ...................................................................................................... 6
Revenue Assurance Strategies ...................................................................................................................... 7
Outsourcing Revenue Assurance............................................................................................................... 7
Fixing Root Causes of Revenue Leakage ................................................................................................... 8
Revenue Assurance Process Maturity....................................................................................................... 8
Implementation of Strategies ................................................................................................................... 9
Challenges Facing Revenue Assurance.......................................................................................................... 9
IP-Based Services..................................................................................................................................... 10
Billing Complexities ................................................................................................................................. 10
Interconnection Arrangements............................................................................................................... 11
Future of Revenue Assurance ..................................................................................................................... 11
Revenue Operations Center.................................................................................................................... 12
Key Performance Indicators.................................................................................................................... 12
Revenue Assurance Market..................................................................................................................... 12
Conclusion ................................................................................................................................................... 12
Appendix 1 – List of Revenue Assurance Providers .................................................................................... 14
Appendix 2 – Revenue Assurance Maturity Levels ..................................................................................... 15
Appendix 3 – Specific VoIP Issues ............................................................................................................... 16
Appendix 4 – The Revenue Operations Center........................................................................................... 17
Glossary....................................................................................................................................................... 18
Bibliography................................................................................................................................................. 20
3. Page 3 of 21
Note to Practitioner
This paper will provide an overview of one of the largest issues facing the telecommunications industry which
is revenue assurance. Billions of dollars are lost annually through revenue leakage because of faulty internal control
processes, systems and fraud. As an auditor of a telecom company, you will need to understand the industry and
the factors that affect their revenue cycle in order to design audit procedures and to gain sufficient and appropriate
evidence that supports the fact that revenues recorded are not materially misstated. After reading this paper, you
should be able to identify the environmental and company-specific risk factors to account for in your audit plan.
Revenue assurance is the umbrella term that describes the activities that a telecom company will undertake in
order to ensure that their processes and procedures minimize revenue leakage. Global spending on revenue
assurance services and products is expected to grow to $934 million in 2008 up from $508 million in 2003 (Hankins,
2004). Much of this money will be spent on outsourcing the revenue assurance function to third party vendors
since 68% of telecom companies are using such vendors (SubexWorld, 2007). Because you will be relying on these
outside parties’ performance in your audit, a section 5970 report would be required which reports on the
operational effectiveness of the controls at that third party. If a section 5970 report cannot be obtained, you will
have to perform more substantive audit work on the client. The audit plan should be adjusted accordingly.
This paper will alternate between using the terms telecommunications company, telco, service provider,
operator, and carrier, which all mean the same thing. Also, please refer to the glossary for a definition of terms
used in the paper.
4. Page 4 of 21
Introduction
Revenue assurance is the umbrella term that describes the activities that a telecommunications company will
undertake in order to ensure that their processes and procedures minimize revenue leakage. This leakage occurs
when revenue that has been earned by the company, such as when services are rendered to the customer, but lost
on its way to the billing systems so that the customer never gets invoiced. Many telecom companies do not like to
talk openly about revenue assurance. This is because it is a process that can identify the amount of money they
lose as caused by their inaccurate BSS/OSS networks. In the past, the problem was largely ignored; because trying
to assess the problem would only point out to a telecom executive that the errors in the systems were wasting
their shareholders' money (Wieland, 2005).
However, some of the myths that surrounded the revenue leakage issue such as that the problem is too big
and complex to address or that the amount of revenue lost is not really that much (Geppert, 1998), that allowed
executives to ignore the problem have been proven to be not true. Today, there are many revenue assurance
providers and products which can help minimize losses. SubexAzure's fifth annual “2007 Global Operator Attitudes
to Revenue Management Survey” estimated that the average leakage rate was 13.6% of revenues (SubexWorld,
2007). Since the 2007 global telecom market revenue is estimated at $2.3 trillion (Business Wire, 2007), this
represents a $313 billion annual loss for the market. Even for an average company making only $6 billion annually,
that's a loss of $816 million that could be prevented. Telecom service providers know that they cannot continue to
ignore this problem and thus a market for revenue assurance products has developed.
This demonstrates the significance of the revenue leakage problem and indicates that companies will need to
actively seek a solution in order to minimize their operational losses. This paper will describe some of the strategies
that have been proposed to combat the problem but before that, an overview of the telecom industry is provided
along with details regarding the sources of revenue leakage. The actual corporate implementation of these
strategies is then discussed followed by current challenges facing revenue assurance and lastly, a section describing
the future of revenue assurance is provided.
Telecommunications Industry
Historically, the telecom industry has been globally regulated with significant barriers to entry. Carriers were
guaranteed certain profit regardless of their operational expenditures so they could afford high cost processes,
including revenue leakage, and still make money (Levine, 2005). As a result, the carriers did not prioritize the
development of efficient or accurate processes that control the data flows through their systems (Pratt, 2006)
which contributes to the current high rates of revenue leakage reported by telcos. Also, the volatility of the
telecom industry resulting from privatisation, merger and acquisition activities, continuously changing technologies
(Evans, 2004), along with intense competition, which really only began in the last five to ten years due to the
5. Page 5 of 21
Telecommunications Act of 1996 deregulating the industry (Pratt, 2006), has forced managers to revaluate their
system processes for leaks and find ways to plug the holes to improve performance and maximize revenues.
Another major factor that increased the demand for revenue assurance was the 2002 Sarbanes-Oxley Act.
This required the CEO and CFO to sign off on the integrity of the financial statements, which includes assuring that
revenue is measured accurately (Stanislaw, 2005). Other external drivers for revenue assurance are the customers
who require accurate, complete and timely invoices and shareholders who demand effective controls over business
operations (Evans, 2004) to increase their shares’ value. To meet all these demands, a company must identify the
sources of their revenue leakages and provide for a solution to patch up the holes.
Revenue Leakage
Due to the massive volumes of low-dollar and complex micro-transactions that stream through the multiple
processing systems of a typical telecom company and then trying to meter the information at various control points
and recombining them into coherent, personalized billings without any errors is basically impossible (Lombardi,
2000). Although leakage may be inevitable, identifying the main sources can help find solutions to minimize them.
There are three primary revenue assurance problems; they are the unbilled customer (which occurs when the
system does not recognize them), the mis-billed customer (those who are billed the wrong amount for services
consumed), and stranded network resources (the false identification that equipment is unavailable which then
causes unnecessary investment in new equipment, i.e. stranded terabytes of unused but potentially billable traffic)
(Aginsky, 2006). In a typical telecom company, there are many specific sources of revenue leakage; they are
described below followed by a discussion regarding the average of amount of revenue leakage.
Poor Operational Processes and Procedures
There are many sources of leakages, most of which stem from poor operational processes and procedures.
For example, leakage can occur even before a single call is made by the customer when there are human errors in
the service activation process where the order details are first entered into the billings system (Pratt, 2006). Human
errors can also impact the invoicing system by having incorrect information entered into the rating engine (Pratt,
2006), for example, long distance charges of 9 cents per minute are entered as 8 cents per minute or by entering
the wrong termination date for pricing promotions. Such errors would affect many customers and cause the
telecom company to lose large amounts of unbilled revenue. Also due to poor operational processes, a carrier may
be oversupplied with connectivity. For example, there may be unallocated resources that are not being recycled
from customers who have left and cancelled services (Morisy, 2007).
Another source of leakage is due to errors in the usage processes (the mediation and billing systems) involving
call detail records (CDRs). Considering that a typical telecom company handles around 170-200 million CDRs a day
(Evans, 2004), leakage can occur anywhere along the network as the CDR is transported from the switch to the
mediation system to the billing system, whereby the CDR is misrouted, corrupted or misidentified (Pratt, 2006).
6. Page 6 of 21
Poor Systems Integration
Another reason why leakage is such a large issue is related to a company’s network of systems. Most telecom
systems were built based on 1970s technology to support a very structured and rigorous regulated market
(Lombardi, 2000) and does not work well in today's environment due to the required flexibility to accommodate
the fast-paced changes occurring with technology and in the industry. Large telecom networks are not actually one
system but a set of different disaggregate legacy systems that have either evolved over time or are the result of
merger and acquisition activities (Ryan, 2000). Integration of the different back office systems is often done poorly
because management do not have the resources to undertake such a project and also because they were not made
to work with each other in the first place. The gaps between the systems are usually handled manually so the
potential for inconsistencies, errors and leakage is especially high (Srivastava, 2005).
Other times, revenue leakage occurs due to errors occurring during upgrades and changes to the network
systems. Telecom carriers are under pressure to introduce new, complex services and pricing promotions quickly,
without fully resolving back office issues in order to properly bill for them, which creates further weaknesses in the
system (Levine, 2003; Cronin, 2004). Many errors also occur at the point of interconnection between two carriers
since the interfacing systems were not designed to work with each other (Tulloch, 2003). This can also cause the
problem of phantom traffic whereby revenue can be lost due to the inability to identify the originating carrier and
therefore interconnection fees cannot be billed (Dell, 2006).
External and Internal Fraud
Telecom fraud involves the theft of services or deliberate abuse of the network because the perpetrator
intends to avoid or reduce charges for services used (Jacobs, 2008) and has been cited as the number one factor for
operator losses in 2007 (SubexWorld, 2007). Fraud can occur externally by other carriers (intentional phantom
traffic) or other outside sources (Guerra, 2005) or internally by a carrier’s own employees (by providing discount
rates to friends and family) (McClelland, 2004). This is a big problem because it can erode margins, consume
network capacity and jeopardize customer relationships. The main type of fraud is subscription fraud whereby
users sign up for services and use the account for national and international calls with no intention to pay. Another
type is premium rate service fraud where operators of those 900 number lines organize fraudulent calls to their
numbers to inflate incoming traffic and increase their revenues (Johnson, 2002).
Other scams involve cloned mobile SIM cards where an existing customer’s hardware is replicated and used to
make calls on their account without them knowing until they get their monthly bill (Johnson, 2002). Another
problem is that many telcos set up offshore are to launder money (by charging low rates and then closed down)
which would affect interconnection revenues because these companies are usually shut down quickly without
paying those fees (Global Telecoms Business, 2004).
Average Amount of Revenue Leakage
Some telecom executives want to know what the average amount of leakage is so that they can compare their
companies to that figure. However, actual leakage reflects peaks and valleys rather than a steady flow and ideally
7. Page 7 of 21
over time, the peaks should become less severe but given the continuous changes in the industry, companies have
not been able to focus on driving down leakage (Shaw, 2006). Expected leakage varies and is based on many
factors, such as customer segment, organization maturity, changes to the network and sector specific risks. Most
leakage is correctable; the challenge lies in its initial detection and identification (Shaw, 2006). The next section will
discuss some revenue assurance strategies can help with this process.
Revenue Assurance Strategies
A revenue assurance strategy includes all the activities that a telco does to ensure that aspects of systems,
policies, process, and procedures that impact revenue is addressed. The core elements of a good revenue
assurance strategy includes performing a risk assessment in order to prioritize high risk areas, integrating revenue
maximization techniques and implementing key automated tools, creating a revenue responsible organization,
embedding quantifiable monitoring mechanisms and having committed champions (Browning, 2003).
The strategy should emphasize having a holistic, end-to-end approach, meaning that a review of the full
revenue cycle is done to capture more leakage events than when doing separate and disjointed assessments (Shaw,
2006). There should also be an independent and dedicated revenue assurance team consisting of cross-functional
team members. Revenue leakage is usually treated as a billing issue, however one department is not responsible
for all elements on the invoice (Lombardi, 2000), and therefore, an organization-wide charter for revenue
management is required rather than treating it as the sole responsibility of that single group. The long term
effectiveness of revenue assurance strategies will depend on the enterprise’s mindset as cultivated by the
champions (Shaw, 2006). The right leadership team and corporate culture which have accountabilities do not
tolerate revenue leakage is crucial to success of revenue maximization strategies (Browning, 2003).
The first step to providing revenue assurance would be the development of clear, measured, and accountable
day-to-day processes along with key automated tools that can prevent leakage, such as training employees on data
entry and change control procedures. Reactive controls should also be developed for those problems that cannot
be prevented (Lombardi, 2000), for example, software can build alarms into the systems so that errors can be
detected as they occur. Quantifiable monitoring mechanisms should also be embedded into the system, such as
tools that can provide for trending analysis, reconciliation to control totals and performance of recalculations to
confirm accuracy of data derived from the system (Sobol, 2003). Automated software tools are keys to a revenue
assurance strategy due to the scale and complexity of telecom billings. They can catch errors and proactively
address them before they move downstream to leak revenue or cause customer dissatisfaction (Srivastava, 2005).
Outsourcing Revenue Assurance
To keep costs under control and not sacrifice performance, many telcos are working with third party revenue
assurance providers instead of performing activities in-house. The benefits include that they will always have up-to-
date, sophisticated systems and expertise while charging only on a pay-as-you-go basis (either by percentage of
savings or transaction volume). It is also always quicker to implement because the IT facilities, operations and
8. Page 8 of 21
support team are already in place (Cronin, 2004) and there are many quality vendors offering their services (please
see Appendix 1 for a list of vendors). SubexAzure’s 2007 survey reported that 68% of operators use third parties
and would lose 30% less compared to those who perform revenue assurance in-house (SubexWorld, 2007).
However, many third party vendors just identify the leakages by collecting data from the network and comparing
with information generated by the billing system and do not actually work to prevent the errors (Levine, 2003).
Suggestions on how a telco can eliminate the root causes of revenue leakage are described below.
Fixing Root Causes of Revenue Leakage
A major task is to ensure that the data integrity of CDRs and IPDRs are maintained throughout the end-to-end
processes. In order to do this, a telco must fully understand their organization’s usage data management
requirement and network topology and how it delivers its services. They must be able to quantify the scale of the
problem, have a method to resolve the discrepancies, and a way to measure and report periodically along with a
coordination of changes required (Ibbett, 2003). An example of an audit methodology to ensure integrity would be
test-calling procedures. Frauds are difficult to prevent but if telcos have good procedures in place to detect unusual
account activity, they can at least cancel those subscriptions.
The BSS/OSS systems also need to be integrated and streamlined in order to reduce errors and increase
efficiency (Wieland, 2004). The mediation systems are especially important now, because with IP-switched
networks (which is discussed in more detail in the next section) instead of the old circuit-switched networks, a telco
must pull call and event data from different network elements in the distributed IP environment (Guerra, 2005).
The system needs to be able to identify and isolate erroneous data, inspect and correct it and then recycle the
exception back for re-processing (Guerra, 2005). Some international companies have advanced mediation systems
which help them cut down on revenue leakage. For example, South Korea’s SK Telecom performs value-based
billing whereby they charge the subscriber what they are willing to pay by tweaking content rates so price sensitive
subscribers can download an otherwise expensive movie at an off-peak time, say 3 am with a hot bill available
within five minutes of the subscriber’s session (Baker, 2005). Buying an advanced off-the-shelf mediation tool from
these international companies can be helpful. Another way to improve a telco’s BSS/OSS systems is to decrease the
number of different systems in their infrastructure to cut down on errors due to poor systems integration. For
example, Verizon’s executive director of strategy says his company currently has 18 different billing systems serving
72 lines of business but plans to bring it down to only five billing systems in the future (Wickham, 2003).
Revenue Assurance Process Maturity
The typical revenue assurance maturity pattern seems to place early efforts on “low-hanging fruit” (i.e.
validity of interconnection fees) followed by identification and repairing root cause of leakages (i.e. data integrity
and process optimization) (Finegold, 2006). This is an important note because revenue leakage is inversely related
to the maturity level of a telco’s operational control infrastructure; as the control environment becomes more
9. Page 9 of 21
comprehensive and preventative in nature, the potential for finding sizable revenue leakage declines (Shaw, 2003).
Please see Appendix 2 for a chart that identifies the characteristics of a telco’s maturity level.
In the end, a good revenue assurance system should have a broad range of applications in order to act as a
flexible toolbox, capable of handling current and future needs and must support the growing requirements for
commercial and financial transparency and ability to respond quickly to regulatory changes (Stanislaw, 2005).
Implementation of Strategies
Revenue assurance programs provide many benefits, most obviously by increasing revenues, but leakage is
still accepted in the industry. The problem is that every telco is in the same boat, as Keith Willetts, chairman of TM
Forum states, “operators benchmark against each other but not against Dell or Wal-Mart” (Limbach, 2006). Other
reasons include the monopolistic heritage of the industry where accountability is low priority, falling margins are
causing operators to try to reduce costs instead of focusing attention on revenue leakage, and are busy trying to
comply with Sarbanes-Oxley that they may not see the link between it and revenue assurance (Limbach, 2006).
Historically, many operators did not have a dedicated revenue assurance department or even a dedicated
budget (Limbach, 2006) with reasons being that no one likes to admit to revenue collection deficiencies or fraud on
their networks and many saw the revenue assurance functions as a cost centre instead of a an earnings generator
(Cronin, 2004). However, today’s views of revenue assurance is more of a board level discussion than before
because they can see the recovered revenue hitting the bottom line numbers much faster than by introducing a
new service (Global Telecoms Business, 2007). The trend now is that there is more of an enterprise versus project
approach now. Even though multi-disciplinary teams were encouraged from the beginning, many companies still
viewed revenue assurance as a project by the IT department that targets a single business function without
thinking about how it may other areas of the company. However, many C-suite executives are now sponsoring
revenue assurance efforts and having it span the entire organization from human resources to processing as well as
networking and billing (Hankins, 2004). For example, CIOS are also now more focused on corporate financial
performance more on top-line, by increasing revenue, and not just bottom-line cost savings (Karpinski, 2008) so
they will work to ensure the BSS/OSS systems are functioning properly.
Challenges Facing Revenue Assurance
Carriers are not just the telephone company anymore but a communications company (Hutton, 2004). With
data of multiple types, in various formats, and including various third party content (such as ringtones and games),
crossing a variety of disparate platforms, BSS/OSS and operating systems, it is very difficult for telcos to converge it
all into one form (Aginsky, 2006). In order for these next generation providers who deliver voice, video, data, and
internet, to properly and reliably bill customers (Hill, 2006), revenue assurance is required. Some specific issues
related to these challenges are discussed in the following.
10. Page 10 of 21
IP-Based Services
The rapid development of broadband makes revenue assurance even more important now. This is the largest
growth area for every telecom operators since it includes services such as VoIP (please see Appendix 3 for specific
VoIP issues) and online gaming, which use data packets or IPDRs and not CDRs (Global Telecoms Business, 2007).
CDRs are largely homogenous and standardized while IPDR usage records have more complex elements such as
transport medium, data volume, packet originator, destination and quality of service metrics (Levine, 2005). This
makes it more difficult to track and bill, especially for incumbents who built their entire billing and accounting
infrastructure around circuit-switched voice calls and because many CDR concepts are irrelevant in the IP world
(Vasquez, 1999). Telcos will need sophisticated mediation tools such as the architecture called IP Multimedia
Subsystem (IMS). IMS can unify the networks of the future and is designed to bring all services (voice, video, and
data) under one IP based delivery platform and enable precise control over service delivery (Milner, 2006).
With IP based networks and internet based services, telcos will also have to face additional threats such as
hacking, denial of service attacks, spam and viruses, worms and Trojans (Johnson, 2002) and provide for mitigating
controls to prevent their networks from going down.
Billing Complexities
Not only must a telco be able to track usage, but they must also juggle complex billing rules around individual
prices (Levine, 2005). The speed of new technology and marketing does not afford time for processes to improve
and keep up with new and pricing promotions (Hankins, 2004). In the past, companies would offer two new
services per year but now it is more like ten new services launcher per month (Nairn, 2004) and many operators
offered picture messaging for free because they could not bill for it (Tulloch, 2003). An example of further
complexities in billing for price promotions is when bundling different services together, there is a sophisticated
pricing schemes such as a discounts sliding scale based on how many services are subscribed to (Wilson, 2005).
Bundling is complicated by the multiple billing systems and provides more opportunities for losses if a telco’s
BSS/OSS systems cannot properly bill for services rendered (Hankins, 2004). In order to properly bill for services,
telcos must ensure that their billing systems are integrated. For example, consolidated or aggregated billing is
rarely complete because it is difficult to reduce the weak links in a provider’s fragmented systems environment.
Telcos must also work at integrating their product-oriented legacy systems with new customer-oriented
systems (Lombardi, 2000); because pricing regimes are very complex nowadays, they must manage the risk of
overcharging customers which if exposed can be very damaging to reputation (Lee, 2007). Revenue assurance
processes have usually been centered around products but now have a customer focus whereby their satisfaction is
very important to companies now. If customers can be kept satisfied, a telco can reduce their churn rates, lost of
future revenue and customer acquisition costs (Hankins, 2004).
Billing systems that are customizable will become competitive tools, enabling service providers to react more
rapidly to changing market and technology conditions in building new service bundles and getting them into the
network quickly (Wilson, 2005).
11. Page 11 of 21
Interconnection Arrangements
As business models become more complicated, so do interconnection arrangements. This includes roaming
agreements and third party content provider contracts. With regards to third party content providers, who provide
services such as ringtones and music downloads, telcos can lose revenues when they cannot collect revenue from
the customer but still have to pay content provider for their services (Lucas, 2004).
The potential for leakage increases exponentially with proliferation of content offerings, the number of
suppliers, different arrangements and rapidly changing products. Reconciliation of data is important because as
data volumes increase, the risk of inaccuracy increases as well (Global Telecoms Business, 2006). Content owners
also need quality management at the BSS/OSS network level because if their content is delivered defective to
customers, their reputation is damaged as well. They will also seek more transparent reporting regarding
information such as subscriber uptake and impact of cross-platform marketing (Finegold, 2006). Revenue assurance
products are required in order to ensure that a telco’s revenue stream is properly disaggregated so that the
amount belonging to the telco and the amount owed to each third party content provider is allocated properly.
Problems occur for roaming contracts when international calls are made on the network and interconnection
fees are paid but that carrier does not actually have a roaming agreement with roamer’s home network and so
there is no way to recover the revenue for those calls (Wieland, 2005). Roaming revenue (about 10% of total
operator revenue) is very difficult to manage due to constant changes of contracts between countries, the high
volume of data traffic and the complexity of information transfer. However, the roaming business processes must
be accurate and up-to-date in order to protect roaming margins, which are already lowered by intense competition
(Ferrerira, 2006). Another problem that occurs with mobile networks involves prepaid cards because credit
deductions are not always done in real-time and customer can continue using the card even after they have
expired. Revenue assurance products should be able to address these issues in the future as well.
A key question many telcos are asking themselves is whether they should focus their revenue assurance
activities on their biggest current market (voice) or on growth area (IP-based content) which will generate greater
revenues in the future. BSS/OSS systems need to be able to reconcile information such as IP address, network
topology, data packets with billing schemes, pricing tables and information about customers. If flexible revenue
assurance procedures are not implemented now, it will be challenging to retro-fit them once problems occur
(Global Telecoms Business, 2007). The last section of this paper will discuss the future of revenue assurance.
Future of Revenue Assurance
The telecom industry is constantly changing making it more difficult to perform revenue assurance. However,
there are new developments such as the “revenue operations center” (ROC) for the CFO which is akin to the
network operations center to the CTO (Burkitt-Gray, 2006), IMS, which was described earlier, and key performance
indicators which will assist in stopping revenue leakage.
12. Page 12 of 21
Revenue Operations Center
It is not a product but a concept where different software solutions come together along with the people,
processes and hardware to form a facility whereby revenue integrity can be ensured through continually
automated tracking of KPIs (Milner, 2006). It can allow the telco to address abnormalities, process throughput
problems, and revenue leakage before they impact profit (Nicholson, 2008). The drive behind ROC is its focus on
financial performance versus the network and could show the impact of different departments on a product
thereby tracking operational efficiency across the entire organization, not just department by department. ROC can
monitor functions and resources in a company’s control and also those that are included in the supply chain, such
as content providers and other third party resources (Gerwig, 2008). Revenue assurance used to happen after the
event but now, given the competitive landscape and tight margins, it needs to be as real-time and proactive as
possible (Aginsky, 2006) which is where the ROC fits in the picture. Please refer to Appendix 4 for more details on
the ROC concept.
Key Performance Indicators
Due to the TM Forum, some operators have started benchmarking. When it used to be that no one wanted to
share their leakage information, now an industry standard can be specified (Global Telecoms Business, 2007). This
standardization of measuring leakage required because operators measure different ways. There are two types of
KPIs, the business ones such as average revenue per bill cycle and trending of bill revenue per geographical region,
and operational ones such as quality of service and CDR/IPDR volume tracking (Hankins, 2004). The TM Forum
requires corporate membership but once joined, a full list of KPIs can be assessed on their site.
Revenue Assurance Market
As ownership of services move from operators to third parties, the telco will become the medium whereby
these services are provided to the customers. Operators will spend less time on the development of products and
more time on the development of the infrastructure to support those products. This new generation of networks
means that operators are now just a bridge to all these services which means very low profit margins. This ensures
that revenue assurance function is going to grow ever more important (Global Telecoms Business, 2007).
As operators realize the value of a more holistic, enterprise-wide approach to revenue assurance, they are
looking for integrated platforms and frameworks which include not only software but also services that identify and
resolve problems and modify processes to minimize further leaks. Until recently, vendors offered only single-
purpose tools that solved an operator’s specific problem but with the advent of the ROC, it is predicted that once
the market stabilizes, takeovers will occur in the highly fragmented market, and vendors will be able to provide
more comprehensive solutions for their clients (Levine, 2005).
Conclusion
Revenue leakage will continue to increase due to the dynamic telecom environment; however, if companies
can implement a successful revenue assurance program, any revenues found internally will have an immediate
13. Page 13 of 21
impact on bottom line numbers. If not, telcos will be throwing away shareholders’ money and investors will price
this risk into valuations or will move elsewhere. Operators should make sure they are setting the right, flexible
technology to cope with current and future business and technological requirements in order to compete and
survive into the future.
14. Page 14 of 21
Appendix 1 – List of Revenue Assurance Providers
The auditor of a telecom company should be aware of the various vendors that their client may engage. This list is
taken directly from the Billing & OSS World directory of revenue assurance providers. Please refer to their website
at BillingWorld.com for more details.
Revenue Assurance Providers
Business intelligence Compliance monitoring Cost management Risk management
Accenture
Alliance Telecom Solutions
BusinessFusion Inc.
Comarch Information
Technology
CSG Systems
DataZA System International Ltd.
Element Customer Care
ENABIL Solutions
Equinox Information Systems
Focus On Telecom
Omniware Solutions Inc.
SDD
Subex Inc.
Tekno Telecom LLC
Vertek
Accenture
Comarch Information
Technology
DataZA System International
Ltd.
Element Customer Care
Focus On Telecom
Omniware Solutions Inc.
Subex Inc.
Tekno Telecom LLC
Vertek
Accenture
Advanced Software Concepts
(ASC)
BusinessFusion Inc.
Comarch Information Technology
DataZA System International Ltd.
DCA Services Inc.
Equinox Information Systems
Focus On Telecom
Omniware Solutions Inc.
SDD
Subex Inc.
TTI Telecom
Vertek
XINTEC SA
Accenture
Advanced Software Concepts
(ASC)
BusinessFusion Inc.
Comarch Information
Technology
DataZA System International
Ltd.
Element Customer Care
ENABIL Solutions
Focus On Telecom
Omniware Solutions Inc.
Subex Inc.
Vertek
Credit monitoring Fraud Interconnect billing Sarbanes-Oxley compliance
Accenture
BusinessFusion Inc.
DataZA System International Ltd.
Element Customer Care
Focus On Telecom
Fusion BPO Services Inc.
Omniware Solutions Inc.
Subex Inc.
Vertek
XINTEC SA
Accenture
Alliance Telecom Solutions
Comarch Information
Technology
Comptel Corp.
DataZA System International
Ltd.
ENABIL Solutions
Equinox Information Systems
Focus On Telecom
Omniware Solutions Inc.
SDD
Subex Inc.
Tekno Telecom LLC
XINTEC SA
Accenture
Alliance Telecom Solutions
BusinessFusion Inc.
Cerillion Technologies
Comarch Information Technology
Communications Data Group
Comptel Corp.
CustomCall Data Systems
DataZA System International Ltd.
Element Customer Care
ENABIL Solutions
Equinox Information Systems
Focus On Telecom
FTS - Formula Telecom Solutions
Ltd.
Intec Billing
Omniware Solutions Inc.
SDD
Subex Inc.
SunTec Business Solutions
Suntech
Tekno Telecom LLC
Vertek
Accenture
BusinessFusion Inc.
Comptel Corp.
DataZA System International
Ltd.
Element Customer Care
Focus On Telecom
FTS - Formula Telecom
Solutions Ltd.
Intec Billing
MetraTech
Omniware Solutions Inc.
Subex Inc.
Tekno Telecom LLC
Vertek
15. Page 15 of 21
Appendix 2 – Revenue Assurance Maturity Levels
Revenue Assurance Maturity Models (RAMMs) are useful as evaluative tools and can provide a company the basis
on how to set up their own revenue assurance program. The table below lists the details of the five phases of the
metamorphosis of a typical revenue assurance lifecycle. The practitioner can perform an evaluation of their client’s
revenue assurance maturity level and set audit risk accordingly.
The table is taken directly from the Billing & OSS World article, “Making Revenue Assurance Maturity Models
Practical.” Please refer to this article for more information.
The Five Stages of Maturity
Level 0 No revenue assurance practices, processes, policies or tools are in place.
Level 1 Basic revenue recovery consists of ad hoc, manual audits, generally driven by a small, voluntary team or
by individual efforts. Some revenue is recovered.
Level 2 Basic project and process management involving repeatable tasks is implemented. Point solutions are
installed to detect and correct certain types of revenue leakage. Business rules and audits are defined.
A project-level team is in place, but project prioritization remains best-guess.
Level 3 Revenue recovery shifts to revenue assurance, where greater automation is introduced to move from
auditing to continuous monitoring of revenue streams. Business rules for detecting and correcting
leakage are implemented systematically into existing processes. Teams are focused more on analysis
and correction than simple identification, driven by technology tools that help prioritize areas of
greatest leakage and potential ROI. Business analytics and dashboards are implemented to quantify and
forecast revenue assurance performance.
Level 4 Leakage is quantitatively understood and controlled. Formal processes and controls are in place.
Financial streams undergo regular, systematic analysis. Tools are expanded across the enterprise. An
expert revenue assurance team is in place, and it educates and builds participation with other product
and functional groups across the enterprise. Operational assurance metrics and dashboards track root
causes of leakage, rather than just leakage itself.
Level 5 Revenue assurance shifts to revenue management. Revenue assurance practices, processes and tools
are analyzed for performance and continuous improvement. The focus is on cross-functional, cross-
organizational efficiencies and communication. Tools and processes are enhanced to identify potential
problems and take preventive action. All new services are designed with revenue assurance controls
built in or factored in.
16. Page 16 of 21
Appendix 3 – Specific VoIP Issues
VoIP services produce many revenue assurance issues for telecom companies. Practitioners should be aware of
these issues when they are auditing their client. The following is a table of the main issues as summarized from the
Billing & OSS World article, “Top 10 Revenue Assurance Problems with VoIP.” Please refer to this article for more
information.
Top 10 Revenue Assurance Problems with VoIP
1 It's More Than Just
Switch-to-Bill
For VoIP, the RA model will have to be network-to-bill; scattered network elements
need to be collected and into a next generation, more complex mediation systems,
rating engine and billing system.
2 Order-to-Network
management
A bundled package is ordered and delivered; however, some services weren't
received by the customer so they are not willing to pay that portion of the fee. How
does the network know what was missing and how does collections account for this?
3 Order-to-collections Also known as fraud and credit management; user authentication in a VoIP mobile
setting is weak plus user self-provisioning, unauthorized Wi-Fi access.
4 Access charges "VoIP currently does not pay access charges to terminating carriers; but once this
loophole is closed, the terminating carrier will charge at the highest rate, as is done
today for terminating traffic with calls that lack origination information. A future
potential for fraud is that if a VoIP phone is cloned and calls made, the company will
have no revenue but a large access charges bill.”
5 Taxes VoIP is not currently taxed but once the government starts, a RA issues arises
because the provider won't be able to accurately determine whether traffic is
intrastate or interstate because of the VoIP non-geographically based phone
number. It is a lose-lose situation if taxes cannot be calculated correctly (i.e. the
government will be after the company if undercharging but if overcharging,
customers may launch a class-action lawsuit).
6 IP-based content
trading partners
If end users do not pay for the services (either intentional or because they didn't
order it or the QoS was poor), the company still has to pay the content provider and
incur the expenses from customer service calls and collection calls.
7 Enterprise market Large billings with corporate customers will abound with the proliferation of IP-
based services.
8 Sarbanes-Oxley CEOs/CFOs must certify to the integrity of internal controls (i.e. the billing systems);
RA will become an issue if companies start charging VoIP services by usage instead of
today's flat-fees, auditing the elements from network-to-bill will be difficult and
expensive.
9 Regulation VoIP regulation uncertainties related to E-911 and CALEA mandates.
10 Rush to market Revenue assurance problems are more difficult to solve after than before a new
product is launched.
17. Page 17 of 21
Appendix 4 – The Revenue Operations Center
The revenue operations center brings together different software solutions along with the people, processes and
hardware to form a facility whereby revenue integrity can be ensured through continually automated tracking of
KPIs. Auditors will have to obtain a section 5970 report from these third party vendors. The table below details the
various components of a typical center.
The table is taken directly from the Billing & OSS World article “ROC On: Creating the Revenue Operations Center to
Maximize Profit.” Please refer to this article for more information.
ROC consists of the following key functional areas:
Fraud management Monitor, detect, and correct unauthorized consumption of resources.
Risk Management Decreasing risk of subscriber default and other A/R issues.
Service Provisioning &
Inventory Assurance
Ensuring services are provisioned as required to meet subscriber commitments, that
fulfillment processes are accurate and efficient, and that resources are consumed and
documented with greater precision.
Usage Integrity
Assurance
Employing revenue assurance techniques to ensure service usage is properly accounted
for and reflected in a range of planning and operations management processes.
Billing Assurance Ensuring billing accurately represents all expected revenue and can be tied to resource
utilization to maximize the monetization of network resources.
Margin Management Tracking transaction-based costs and revenue to understand overall business
performance of individual products and services in order to identify other margin-
affecting and cost issues, such as out-payments, SLA penalty payments, customer
rebates, bad debt write-offs, etc.
Tracking and Analysis of
Data Collected
This framework must also have functions that can track and trend the data collected,
calculate thresholds and targets, mine for profitability profiles and KPI analysis and
tracking, and reporting and dashboard abilities tailored to the particular users' needs.
18. Page 18 of 21
Glossary
Broadband - refers to data being transmitted where multiple pieces of data are sent simultaneously over a
telephone or cable line.
BSS (Business Support Systems) - this term refers to dealings with customers with activities such as taking orders,
processing bills, and collecting payments.
Bundling - a price discount promotion which prices together a number of different services which if subscribed to
separately would attract a higher price.
C-suite - This refers to the corporate titles conferred on individuals identifying their function within the
organization. Common titles are Chief Executive Officer (CEO) and Chief Financial Officer (CFO).
CDRs - records of telephone exchanges made on the network, including call start time, duration of the call, and
receiving and calling number along with other information required for the company to properly bill the customer.
Churning - describes customer loss; the different types of churn are voluntary, involuntary and internal.
Interconnection - the physical linking of a carrier’s network with that of other carriers in order to exchange traffic.
IPDRs (IP Detail Records) - provides information about IP-based service usage that can be used by the BSS/OSS
billing systems to charge customers for services rendered.
IMS (IP Multimedia Subsystem) - architectural framework for delivering IP multimedia to mobile users.
KPIs (Key Performance Indicators) - financial and non-financial metrics used to help an organization define and
measure progress toward organizational goals.
Mediation systems - converts CDRs and IPDRs into a data type that is usable by the billing systems.
OSS (Operations Support Systems) - computer systems used by telecommunications service providers to describes
functions dealing with the telecom network itself, such as configuring network components and managing faults.
Phantom traffic - unidentifiable and un-billable network traffic sent to a carrier that lacks information to identify
the originating carrier.
SubexAzure – it is now called just Subex; it is an information technology company providing BSS/OSS and fraud
management solutions for telecom operators. They commission an annual revenue leakage survey called “Global
Operator Attitudes to Revenue Management Survey.”
Test calls - is a revenue assurance technique that replicates events on a teleco’s network to identify potential
revenue leakage areas.
TM (TeleManagement) Forum – this is the telecommunications industry’s association of web and media companies
focused on end-end service management.
19. Page 19 of 21
Trending – a technique used for comparing summary value of data element over specified period of time. Amount
of change is statistically evaluated to determine normal ranges with abnormal results scrutinized for possible
process or content errors.
VoIP (Voice-over Internet Protocol) - a protocol optimized for the transmission of voice through the internet.
20. Page 20 of 21
Bibliography
"Azure service bureau provides hired billing help." Telecommunications Americas. 40 (2006).
“Fraud at the heart of telecoms.” Global Telecoms Business. July (2004).
“How to avoid the double-dip risk.” Global Telecoms Business. 15 May (2007).
“Losing revenue by the packet.” Global Telecoms Business. Apr. (2004).
“New generation assurance: revenue assurance roundtable discussion.” Global Telecoms Business. 1 Nov. (2007).
“Revenue assurance: improving processes tops up the bottomline.” Global Telecoms Business. 1 Sept. (2006).
"Revenue Assurance KPI Metrics Workbook." TM Forum. 7 Feb. 2008. <http://www.tmforum.org/page33544.aspx>
11 June 2008.
“Revenue leakage rises among global telecom players.” SubexWorld.com. 17 Sept. 2007.
<www.subexworld.com/downloads/survey2007/release.pdf> 11 June 2008.
“You can trust the operators too much.” Global Telecoms Business. 9 Nov. (2006).
Aginsky, Alon. “Uncovering revenue leakage problems in broadband and data services.” Billing & OSS World. 1 Aug.
2006. <www.Billingworld.com/articles/feature/Uncovering-Revenue-Leakage-Problems-in.html> 11 June
2008.
Baker, Dan. “Latest mediation tools can boost profitability for wireless operators.” America’s Network. (2005).
Browning, Randy. "Revenue to the max." Optimize. (2003).
Burkitt-Gray, Alan. “Towards the revenue operations centre.” Global Telecoms Business. May (2006).
Cronin, John. “Rest assured on revenue.” Telecommunications International. 38 (2004).
Dell, Stephanie. “Phantom Menace Lingers.” Telephony. (2006).
Dunetz, Kevin. “Telecom Bills: An Untapped Gold Mine.” Network Magazine. 20 (2005).
Evans, John. “Revenue Assurance in the Communications Sector.” Credit Control. 25 (2004).
Ferrerira, Ines. “Revenue Leakage in the Telecoms Market.” Credit Control. 27 (2006).
Finegold, Edward J. “Revenue assurance takes on a new name.” Billing & OSS World. 1 Sept. 2006.
<www.Billingworld.com/articles/feature/Revenue-Assurance-Takes-on-a-New-Name.html> 11 June 2008.
Finegold, Edward J. “Making revenue assurance maturity models practical.” Billing & OSS World. 1 July 2006.
<www.Billingworld.com/articles/feature/Making-Revenue-Assurance-Maturity-Models.html> 11 June 2008.
21. Page 21 of 21
Gerwig, Kate. “Next-gen OSS may include revenue operations centers (ROCs) to monitor business processes.” 4 Apr.
2008. <http://searchtelecom.techtarget.com/news/interview/0,289202,sid103_gci1308428,00.html> 11
June 2008.
Guerra, John L. ‘Mediation systems halt revenue leakage.” Billing & OSS World. 1 Apr. 2005.
<www.Billingworld.com/articles/feature/mediation-systems-halt-revenue-leakage.html> 11 June 2008.
Gundavelli, Veena. “Deductions management.” Business Credit. 106 (2004).
Hankins, Michelle L. “Revenue assurance trends: Providers get down to business.” Billing & OSS World. 1 May 2004.
<www.Billingworld.com/articles/feature/Revenue-Assurance-Trends-Providers-Get-Down.html> 11 June
2008.
Hill, Kelly. “Bundling brings opportunities for more revenue leakage.” RCR Wireless News. 11 Sept. 2006.
Hill, Kelly. “Fraud: A total drag (on revenues).” RCR Wireless News. 1 Oct. 2007.
Hutton, Roger. “Revving up revenue streams.” Rural telecommunications. 23 (2004).
Ibbett, Geoff. “Usage data integrity and revenue assurance.” Credit Control. 24 (2003).
Jacobs, Riaan. “Telecommunications fraud.” Dimensiondata.com. <www.dimensiondata.com/NR/rdonlyres/
85DC1F7A-0B17-4A87-84F9-328ACF33A670/409/TelecommunicationsFraudWhitePaper1.pdf>. 11 June
2008.
Johnson, Mark. “Revenue Assurance, Fraud & Security in 3G Telecom Services.” Journal of Economic Crime
Management. 1 (2002).
Karpinski, Rich. “Back office on the hot seat.” Telephony. 249 (2008).
Lee, Wei Lian. “Good governance demands proper risk management, vigilance.” The Edge Malaysia. 5 July (2007).
Levine, Shira. “How big is your revenue hole?” America’s Network. 1 Apr. (2003).
Levine, Shira and L. Pratt. “Revenue assurance stops the leak.” Telecommunications Americas. 39 (2005).
Limbach, Ian. “Failing to look after the pennies.” Financial Times. 12 July 2006.
Lombardi, Rosie and D. Henderson. “Are your systems leaking revenues?” CIO Canada. 8 (2000).
Lopes, Miguel. “Where revenue assurance is headed for 2006 and beyond.” Credit Control. 27 (2006).
Lucas, Dr. Jerry. “10 Take-Aways from Revenue Assurance 2005.” Billing & OSS World. 1 Nov. 2005.
<www.Billingworld.com/articles/feature/10-Take-Aways-from-Revenue-Assurance-2005.html> 11 June
2008.
Lucas, Dr. Jerry. “Top 10 Revenue Assurance Problems with VoIP.” Billing & OSS World. 1 Nov. 2004.
<www.Billingworld.com/articles/feature/Top-10-Revenue-Assurance-Problems-with-VoIP.html> 11 June
2008.
Marek, Sue. “Plugging revenue leaks.” Wireless Week. 15 Aug. (2004).
22. Page 22 of 21
McClelland, Stephen. “Plumbing network leaks.” Telecommunications International. 37 (2003).
McElligott, Tim. “Revenue leakage: Are carriers raising the white flag?” Telephony. 248 (2007).
Milner, Nick. “Waste not, want not?” Telecommunications International. 40 (2006).
Morisy, Michael. “Revenue assurance a critical tool for telecom success.” 13 Nov. 2007. Searchtelecom.com.
<http://searchtelecom.techtarget.com/news/article/0,289142,sid103_gci1281779,00.html> 11 June 2008.
Nairn, Geoff. “Operators make more out of less legacy systems.” Financial Times. 14 April 2004.
Nicholson, Mark and A. Boone. “ROC On: Creating the Revenue Operations Center to Maximize Profit.” Billing &
OSS World. 28 Apr. 2008. <www.Billingworld.com/articles/creating-revenue-operations-center.html> 11
June 2008.
Nolle, Tom. “Service provider billing system fundamentals.” 13 July 2007. Searchtelecom.com.
<http://searchtelecom.techtarget.com/tip/0,289483,sid103_gci1264196,00.html> 11 June 2008.
Pratt, Lorien and N. Ruzicka. “Building back office brawn.” Telecommunications Americas. 40 (2006).
Shaw, Vince and M. Ravin. “The Myth of Constant Revenue Leakage.” Billing & OSS World. 1 Sept. 2006.
<http://www.billingworld.com/articles/feature/The-Myth-of-Constant-Revenue -Leakage .html> 11 June
2008.
Sobol, Craig and R. Short. “Maximizing your broadband bucks.” Telecommunications Americas. 37 (2003).
Srivastava, Sanjay. “Using technology to trim revenue and receivables leakage.” Financial Executive. 21 (2005).
Stanislaw, Stephen. “Rest assured on IMS?” Telecommunications International. 39 (2005).
Suppa, Carly. “Syndesis uploads way to revenue assurance.” Network World Canada. 13 (2003).
Tulloch, James. “Plugging the gaps.” Mobile Communications International. 106 (2003).
Vasquez, Oscar. “Billing for IP services remains a challenge.” Business Communications Review. 29 (1999).
Walter, Derek. “From porous to profitable.” Telephony. 244 (2003).
Wickham, Rhonda. “Pressures force closer look at revenue leakage.” Wireless Week. 1 July 2003.
Wieland, Ken. “Opening doors to profit.” Telecommunications International. 38 (2004).
Wieland, Ken. “Plumbers required.” Telecommunications International. 39 (2005).
Wieland, Ken. “Report: Revenue leaks continue.” Telecommunications Americas. 38 (2004).
Wieland, Ken. “The last taboo?” Telecommunications International. 38 (2004).
Wieland, Ken. “US$170 bn “wasted” this year, says Azure.” Telecommunications International. 39 (2005).
Wilson, Carol. “VoIP poses billing challenge.” Telephony. 246 (2005).