SlideShare a Scribd company logo
1 of 22
Download to read offline
Telecommunications Revenue Assurance
By Lindy Do
ACC 626
Page 2 of 21
Table of Contents
Note to Practitioner ...................................................................................................................................... 3
Introduction................................................................................................................................................... 4
Telecommunications Industry....................................................................................................................... 4
Revenue Leakage........................................................................................................................................... 5
Poor Operational Processes and Procedures............................................................................................ 5
Poor Systems Integration .......................................................................................................................... 6
External and Internal Fraud....................................................................................................................... 6
Average Amount of Revenue Leakage ...................................................................................................... 6
Revenue Assurance Strategies ...................................................................................................................... 7
Outsourcing Revenue Assurance............................................................................................................... 7
Fixing Root Causes of Revenue Leakage ................................................................................................... 8
Revenue Assurance Process Maturity....................................................................................................... 8
Implementation of Strategies ................................................................................................................... 9
Challenges Facing Revenue Assurance.......................................................................................................... 9
IP-Based Services..................................................................................................................................... 10
Billing Complexities ................................................................................................................................. 10
Interconnection Arrangements............................................................................................................... 11
Future of Revenue Assurance ..................................................................................................................... 11
Revenue Operations Center.................................................................................................................... 12
Key Performance Indicators.................................................................................................................... 12
Revenue Assurance Market..................................................................................................................... 12
Conclusion ................................................................................................................................................... 12
Appendix 1 – List of Revenue Assurance Providers .................................................................................... 14
Appendix 2 – Revenue Assurance Maturity Levels ..................................................................................... 15
Appendix 3 – Specific VoIP Issues ............................................................................................................... 16
Appendix 4 – The Revenue Operations Center........................................................................................... 17
Glossary....................................................................................................................................................... 18
Bibliography................................................................................................................................................. 20
Page 3 of 21
Note to Practitioner
This paper will provide an overview of one of the largest issues facing the telecommunications industry which
is revenue assurance. Billions of dollars are lost annually through revenue leakage because of faulty internal control
processes, systems and fraud. As an auditor of a telecom company, you will need to understand the industry and
the factors that affect their revenue cycle in order to design audit procedures and to gain sufficient and appropriate
evidence that supports the fact that revenues recorded are not materially misstated. After reading this paper, you
should be able to identify the environmental and company-specific risk factors to account for in your audit plan.
Revenue assurance is the umbrella term that describes the activities that a telecom company will undertake in
order to ensure that their processes and procedures minimize revenue leakage. Global spending on revenue
assurance services and products is expected to grow to $934 million in 2008 up from $508 million in 2003 (Hankins,
2004). Much of this money will be spent on outsourcing the revenue assurance function to third party vendors
since 68% of telecom companies are using such vendors (SubexWorld, 2007). Because you will be relying on these
outside parties’ performance in your audit, a section 5970 report would be required which reports on the
operational effectiveness of the controls at that third party. If a section 5970 report cannot be obtained, you will
have to perform more substantive audit work on the client. The audit plan should be adjusted accordingly.
This paper will alternate between using the terms telecommunications company, telco, service provider,
operator, and carrier, which all mean the same thing. Also, please refer to the glossary for a definition of terms
used in the paper.
Page 4 of 21
Introduction
Revenue assurance is the umbrella term that describes the activities that a telecommunications company will
undertake in order to ensure that their processes and procedures minimize revenue leakage. This leakage occurs
when revenue that has been earned by the company, such as when services are rendered to the customer, but lost
on its way to the billing systems so that the customer never gets invoiced. Many telecom companies do not like to
talk openly about revenue assurance. This is because it is a process that can identify the amount of money they
lose as caused by their inaccurate BSS/OSS networks. In the past, the problem was largely ignored; because trying
to assess the problem would only point out to a telecom executive that the errors in the systems were wasting
their shareholders' money (Wieland, 2005).
However, some of the myths that surrounded the revenue leakage issue such as that the problem is too big
and complex to address or that the amount of revenue lost is not really that much (Geppert, 1998), that allowed
executives to ignore the problem have been proven to be not true. Today, there are many revenue assurance
providers and products which can help minimize losses. SubexAzure's fifth annual “2007 Global Operator Attitudes
to Revenue Management Survey” estimated that the average leakage rate was 13.6% of revenues (SubexWorld,
2007). Since the 2007 global telecom market revenue is estimated at $2.3 trillion (Business Wire, 2007), this
represents a $313 billion annual loss for the market. Even for an average company making only $6 billion annually,
that's a loss of $816 million that could be prevented. Telecom service providers know that they cannot continue to
ignore this problem and thus a market for revenue assurance products has developed.
This demonstrates the significance of the revenue leakage problem and indicates that companies will need to
actively seek a solution in order to minimize their operational losses. This paper will describe some of the strategies
that have been proposed to combat the problem but before that, an overview of the telecom industry is provided
along with details regarding the sources of revenue leakage. The actual corporate implementation of these
strategies is then discussed followed by current challenges facing revenue assurance and lastly, a section describing
the future of revenue assurance is provided.
Telecommunications Industry
Historically, the telecom industry has been globally regulated with significant barriers to entry. Carriers were
guaranteed certain profit regardless of their operational expenditures so they could afford high cost processes,
including revenue leakage, and still make money (Levine, 2005). As a result, the carriers did not prioritize the
development of efficient or accurate processes that control the data flows through their systems (Pratt, 2006)
which contributes to the current high rates of revenue leakage reported by telcos. Also, the volatility of the
telecom industry resulting from privatisation, merger and acquisition activities, continuously changing technologies
(Evans, 2004), along with intense competition, which really only began in the last five to ten years due to the
Page 5 of 21
Telecommunications Act of 1996 deregulating the industry (Pratt, 2006), has forced managers to revaluate their
system processes for leaks and find ways to plug the holes to improve performance and maximize revenues.
Another major factor that increased the demand for revenue assurance was the 2002 Sarbanes-Oxley Act.
This required the CEO and CFO to sign off on the integrity of the financial statements, which includes assuring that
revenue is measured accurately (Stanislaw, 2005). Other external drivers for revenue assurance are the customers
who require accurate, complete and timely invoices and shareholders who demand effective controls over business
operations (Evans, 2004) to increase their shares’ value. To meet all these demands, a company must identify the
sources of their revenue leakages and provide for a solution to patch up the holes.
Revenue Leakage
Due to the massive volumes of low-dollar and complex micro-transactions that stream through the multiple
processing systems of a typical telecom company and then trying to meter the information at various control points
and recombining them into coherent, personalized billings without any errors is basically impossible (Lombardi,
2000). Although leakage may be inevitable, identifying the main sources can help find solutions to minimize them.
There are three primary revenue assurance problems; they are the unbilled customer (which occurs when the
system does not recognize them), the mis-billed customer (those who are billed the wrong amount for services
consumed), and stranded network resources (the false identification that equipment is unavailable which then
causes unnecessary investment in new equipment, i.e. stranded terabytes of unused but potentially billable traffic)
(Aginsky, 2006). In a typical telecom company, there are many specific sources of revenue leakage; they are
described below followed by a discussion regarding the average of amount of revenue leakage.
Poor Operational Processes and Procedures
There are many sources of leakages, most of which stem from poor operational processes and procedures.
For example, leakage can occur even before a single call is made by the customer when there are human errors in
the service activation process where the order details are first entered into the billings system (Pratt, 2006). Human
errors can also impact the invoicing system by having incorrect information entered into the rating engine (Pratt,
2006), for example, long distance charges of 9 cents per minute are entered as 8 cents per minute or by entering
the wrong termination date for pricing promotions. Such errors would affect many customers and cause the
telecom company to lose large amounts of unbilled revenue. Also due to poor operational processes, a carrier may
be oversupplied with connectivity. For example, there may be unallocated resources that are not being recycled
from customers who have left and cancelled services (Morisy, 2007).
Another source of leakage is due to errors in the usage processes (the mediation and billing systems) involving
call detail records (CDRs). Considering that a typical telecom company handles around 170-200 million CDRs a day
(Evans, 2004), leakage can occur anywhere along the network as the CDR is transported from the switch to the
mediation system to the billing system, whereby the CDR is misrouted, corrupted or misidentified (Pratt, 2006).
Page 6 of 21
Poor Systems Integration
Another reason why leakage is such a large issue is related to a company’s network of systems. Most telecom
systems were built based on 1970s technology to support a very structured and rigorous regulated market
(Lombardi, 2000) and does not work well in today's environment due to the required flexibility to accommodate
the fast-paced changes occurring with technology and in the industry. Large telecom networks are not actually one
system but a set of different disaggregate legacy systems that have either evolved over time or are the result of
merger and acquisition activities (Ryan, 2000). Integration of the different back office systems is often done poorly
because management do not have the resources to undertake such a project and also because they were not made
to work with each other in the first place. The gaps between the systems are usually handled manually so the
potential for inconsistencies, errors and leakage is especially high (Srivastava, 2005).
Other times, revenue leakage occurs due to errors occurring during upgrades and changes to the network
systems. Telecom carriers are under pressure to introduce new, complex services and pricing promotions quickly,
without fully resolving back office issues in order to properly bill for them, which creates further weaknesses in the
system (Levine, 2003; Cronin, 2004). Many errors also occur at the point of interconnection between two carriers
since the interfacing systems were not designed to work with each other (Tulloch, 2003). This can also cause the
problem of phantom traffic whereby revenue can be lost due to the inability to identify the originating carrier and
therefore interconnection fees cannot be billed (Dell, 2006).
External and Internal Fraud
Telecom fraud involves the theft of services or deliberate abuse of the network because the perpetrator
intends to avoid or reduce charges for services used (Jacobs, 2008) and has been cited as the number one factor for
operator losses in 2007 (SubexWorld, 2007). Fraud can occur externally by other carriers (intentional phantom
traffic) or other outside sources (Guerra, 2005) or internally by a carrier’s own employees (by providing discount
rates to friends and family) (McClelland, 2004). This is a big problem because it can erode margins, consume
network capacity and jeopardize customer relationships. The main type of fraud is subscription fraud whereby
users sign up for services and use the account for national and international calls with no intention to pay. Another
type is premium rate service fraud where operators of those 900 number lines organize fraudulent calls to their
numbers to inflate incoming traffic and increase their revenues (Johnson, 2002).
Other scams involve cloned mobile SIM cards where an existing customer’s hardware is replicated and used to
make calls on their account without them knowing until they get their monthly bill (Johnson, 2002). Another
problem is that many telcos set up offshore are to launder money (by charging low rates and then closed down)
which would affect interconnection revenues because these companies are usually shut down quickly without
paying those fees (Global Telecoms Business, 2004).
Average Amount of Revenue Leakage
Some telecom executives want to know what the average amount of leakage is so that they can compare their
companies to that figure. However, actual leakage reflects peaks and valleys rather than a steady flow and ideally
Page 7 of 21
over time, the peaks should become less severe but given the continuous changes in the industry, companies have
not been able to focus on driving down leakage (Shaw, 2006). Expected leakage varies and is based on many
factors, such as customer segment, organization maturity, changes to the network and sector specific risks. Most
leakage is correctable; the challenge lies in its initial detection and identification (Shaw, 2006). The next section will
discuss some revenue assurance strategies can help with this process.
Revenue Assurance Strategies
A revenue assurance strategy includes all the activities that a telco does to ensure that aspects of systems,
policies, process, and procedures that impact revenue is addressed. The core elements of a good revenue
assurance strategy includes performing a risk assessment in order to prioritize high risk areas, integrating revenue
maximization techniques and implementing key automated tools, creating a revenue responsible organization,
embedding quantifiable monitoring mechanisms and having committed champions (Browning, 2003).
The strategy should emphasize having a holistic, end-to-end approach, meaning that a review of the full
revenue cycle is done to capture more leakage events than when doing separate and disjointed assessments (Shaw,
2006). There should also be an independent and dedicated revenue assurance team consisting of cross-functional
team members. Revenue leakage is usually treated as a billing issue, however one department is not responsible
for all elements on the invoice (Lombardi, 2000), and therefore, an organization-wide charter for revenue
management is required rather than treating it as the sole responsibility of that single group. The long term
effectiveness of revenue assurance strategies will depend on the enterprise’s mindset as cultivated by the
champions (Shaw, 2006). The right leadership team and corporate culture which have accountabilities do not
tolerate revenue leakage is crucial to success of revenue maximization strategies (Browning, 2003).
The first step to providing revenue assurance would be the development of clear, measured, and accountable
day-to-day processes along with key automated tools that can prevent leakage, such as training employees on data
entry and change control procedures. Reactive controls should also be developed for those problems that cannot
be prevented (Lombardi, 2000), for example, software can build alarms into the systems so that errors can be
detected as they occur. Quantifiable monitoring mechanisms should also be embedded into the system, such as
tools that can provide for trending analysis, reconciliation to control totals and performance of recalculations to
confirm accuracy of data derived from the system (Sobol, 2003). Automated software tools are keys to a revenue
assurance strategy due to the scale and complexity of telecom billings. They can catch errors and proactively
address them before they move downstream to leak revenue or cause customer dissatisfaction (Srivastava, 2005).
Outsourcing Revenue Assurance
To keep costs under control and not sacrifice performance, many telcos are working with third party revenue
assurance providers instead of performing activities in-house. The benefits include that they will always have up-to-
date, sophisticated systems and expertise while charging only on a pay-as-you-go basis (either by percentage of
savings or transaction volume). It is also always quicker to implement because the IT facilities, operations and
Page 8 of 21
support team are already in place (Cronin, 2004) and there are many quality vendors offering their services (please
see Appendix 1 for a list of vendors). SubexAzure’s 2007 survey reported that 68% of operators use third parties
and would lose 30% less compared to those who perform revenue assurance in-house (SubexWorld, 2007).
However, many third party vendors just identify the leakages by collecting data from the network and comparing
with information generated by the billing system and do not actually work to prevent the errors (Levine, 2003).
Suggestions on how a telco can eliminate the root causes of revenue leakage are described below.
Fixing Root Causes of Revenue Leakage
A major task is to ensure that the data integrity of CDRs and IPDRs are maintained throughout the end-to-end
processes. In order to do this, a telco must fully understand their organization’s usage data management
requirement and network topology and how it delivers its services. They must be able to quantify the scale of the
problem, have a method to resolve the discrepancies, and a way to measure and report periodically along with a
coordination of changes required (Ibbett, 2003). An example of an audit methodology to ensure integrity would be
test-calling procedures. Frauds are difficult to prevent but if telcos have good procedures in place to detect unusual
account activity, they can at least cancel those subscriptions.
The BSS/OSS systems also need to be integrated and streamlined in order to reduce errors and increase
efficiency (Wieland, 2004). The mediation systems are especially important now, because with IP-switched
networks (which is discussed in more detail in the next section) instead of the old circuit-switched networks, a telco
must pull call and event data from different network elements in the distributed IP environment (Guerra, 2005).
The system needs to be able to identify and isolate erroneous data, inspect and correct it and then recycle the
exception back for re-processing (Guerra, 2005). Some international companies have advanced mediation systems
which help them cut down on revenue leakage. For example, South Korea’s SK Telecom performs value-based
billing whereby they charge the subscriber what they are willing to pay by tweaking content rates so price sensitive
subscribers can download an otherwise expensive movie at an off-peak time, say 3 am with a hot bill available
within five minutes of the subscriber’s session (Baker, 2005). Buying an advanced off-the-shelf mediation tool from
these international companies can be helpful. Another way to improve a telco’s BSS/OSS systems is to decrease the
number of different systems in their infrastructure to cut down on errors due to poor systems integration. For
example, Verizon’s executive director of strategy says his company currently has 18 different billing systems serving
72 lines of business but plans to bring it down to only five billing systems in the future (Wickham, 2003).
Revenue Assurance Process Maturity
The typical revenue assurance maturity pattern seems to place early efforts on “low-hanging fruit” (i.e.
validity of interconnection fees) followed by identification and repairing root cause of leakages (i.e. data integrity
and process optimization) (Finegold, 2006). This is an important note because revenue leakage is inversely related
to the maturity level of a telco’s operational control infrastructure; as the control environment becomes more
Page 9 of 21
comprehensive and preventative in nature, the potential for finding sizable revenue leakage declines (Shaw, 2003).
Please see Appendix 2 for a chart that identifies the characteristics of a telco’s maturity level.
In the end, a good revenue assurance system should have a broad range of applications in order to act as a
flexible toolbox, capable of handling current and future needs and must support the growing requirements for
commercial and financial transparency and ability to respond quickly to regulatory changes (Stanislaw, 2005).
Implementation of Strategies
Revenue assurance programs provide many benefits, most obviously by increasing revenues, but leakage is
still accepted in the industry. The problem is that every telco is in the same boat, as Keith Willetts, chairman of TM
Forum states, “operators benchmark against each other but not against Dell or Wal-Mart” (Limbach, 2006). Other
reasons include the monopolistic heritage of the industry where accountability is low priority, falling margins are
causing operators to try to reduce costs instead of focusing attention on revenue leakage, and are busy trying to
comply with Sarbanes-Oxley that they may not see the link between it and revenue assurance (Limbach, 2006).
Historically, many operators did not have a dedicated revenue assurance department or even a dedicated
budget (Limbach, 2006) with reasons being that no one likes to admit to revenue collection deficiencies or fraud on
their networks and many saw the revenue assurance functions as a cost centre instead of a an earnings generator
(Cronin, 2004). However, today’s views of revenue assurance is more of a board level discussion than before
because they can see the recovered revenue hitting the bottom line numbers much faster than by introducing a
new service (Global Telecoms Business, 2007). The trend now is that there is more of an enterprise versus project
approach now. Even though multi-disciplinary teams were encouraged from the beginning, many companies still
viewed revenue assurance as a project by the IT department that targets a single business function without
thinking about how it may other areas of the company. However, many C-suite executives are now sponsoring
revenue assurance efforts and having it span the entire organization from human resources to processing as well as
networking and billing (Hankins, 2004). For example, CIOS are also now more focused on corporate financial
performance more on top-line, by increasing revenue, and not just bottom-line cost savings (Karpinski, 2008) so
they will work to ensure the BSS/OSS systems are functioning properly.
Challenges Facing Revenue Assurance
Carriers are not just the telephone company anymore but a communications company (Hutton, 2004). With
data of multiple types, in various formats, and including various third party content (such as ringtones and games),
crossing a variety of disparate platforms, BSS/OSS and operating systems, it is very difficult for telcos to converge it
all into one form (Aginsky, 2006). In order for these next generation providers who deliver voice, video, data, and
internet, to properly and reliably bill customers (Hill, 2006), revenue assurance is required. Some specific issues
related to these challenges are discussed in the following.
Page 10 of 21
IP-Based Services
The rapid development of broadband makes revenue assurance even more important now. This is the largest
growth area for every telecom operators since it includes services such as VoIP (please see Appendix 3 for specific
VoIP issues) and online gaming, which use data packets or IPDRs and not CDRs (Global Telecoms Business, 2007).
CDRs are largely homogenous and standardized while IPDR usage records have more complex elements such as
transport medium, data volume, packet originator, destination and quality of service metrics (Levine, 2005). This
makes it more difficult to track and bill, especially for incumbents who built their entire billing and accounting
infrastructure around circuit-switched voice calls and because many CDR concepts are irrelevant in the IP world
(Vasquez, 1999). Telcos will need sophisticated mediation tools such as the architecture called IP Multimedia
Subsystem (IMS). IMS can unify the networks of the future and is designed to bring all services (voice, video, and
data) under one IP based delivery platform and enable precise control over service delivery (Milner, 2006).
With IP based networks and internet based services, telcos will also have to face additional threats such as
hacking, denial of service attacks, spam and viruses, worms and Trojans (Johnson, 2002) and provide for mitigating
controls to prevent their networks from going down.
Billing Complexities
Not only must a telco be able to track usage, but they must also juggle complex billing rules around individual
prices (Levine, 2005). The speed of new technology and marketing does not afford time for processes to improve
and keep up with new and pricing promotions (Hankins, 2004). In the past, companies would offer two new
services per year but now it is more like ten new services launcher per month (Nairn, 2004) and many operators
offered picture messaging for free because they could not bill for it (Tulloch, 2003). An example of further
complexities in billing for price promotions is when bundling different services together, there is a sophisticated
pricing schemes such as a discounts sliding scale based on how many services are subscribed to (Wilson, 2005).
Bundling is complicated by the multiple billing systems and provides more opportunities for losses if a telco’s
BSS/OSS systems cannot properly bill for services rendered (Hankins, 2004). In order to properly bill for services,
telcos must ensure that their billing systems are integrated. For example, consolidated or aggregated billing is
rarely complete because it is difficult to reduce the weak links in a provider’s fragmented systems environment.
Telcos must also work at integrating their product-oriented legacy systems with new customer-oriented
systems (Lombardi, 2000); because pricing regimes are very complex nowadays, they must manage the risk of
overcharging customers which if exposed can be very damaging to reputation (Lee, 2007). Revenue assurance
processes have usually been centered around products but now have a customer focus whereby their satisfaction is
very important to companies now. If customers can be kept satisfied, a telco can reduce their churn rates, lost of
future revenue and customer acquisition costs (Hankins, 2004).
Billing systems that are customizable will become competitive tools, enabling service providers to react more
rapidly to changing market and technology conditions in building new service bundles and getting them into the
network quickly (Wilson, 2005).
Page 11 of 21
Interconnection Arrangements
As business models become more complicated, so do interconnection arrangements. This includes roaming
agreements and third party content provider contracts. With regards to third party content providers, who provide
services such as ringtones and music downloads, telcos can lose revenues when they cannot collect revenue from
the customer but still have to pay content provider for their services (Lucas, 2004).
The potential for leakage increases exponentially with proliferation of content offerings, the number of
suppliers, different arrangements and rapidly changing products. Reconciliation of data is important because as
data volumes increase, the risk of inaccuracy increases as well (Global Telecoms Business, 2006). Content owners
also need quality management at the BSS/OSS network level because if their content is delivered defective to
customers, their reputation is damaged as well. They will also seek more transparent reporting regarding
information such as subscriber uptake and impact of cross-platform marketing (Finegold, 2006). Revenue assurance
products are required in order to ensure that a telco’s revenue stream is properly disaggregated so that the
amount belonging to the telco and the amount owed to each third party content provider is allocated properly.
Problems occur for roaming contracts when international calls are made on the network and interconnection
fees are paid but that carrier does not actually have a roaming agreement with roamer’s home network and so
there is no way to recover the revenue for those calls (Wieland, 2005). Roaming revenue (about 10% of total
operator revenue) is very difficult to manage due to constant changes of contracts between countries, the high
volume of data traffic and the complexity of information transfer. However, the roaming business processes must
be accurate and up-to-date in order to protect roaming margins, which are already lowered by intense competition
(Ferrerira, 2006). Another problem that occurs with mobile networks involves prepaid cards because credit
deductions are not always done in real-time and customer can continue using the card even after they have
expired. Revenue assurance products should be able to address these issues in the future as well.
A key question many telcos are asking themselves is whether they should focus their revenue assurance
activities on their biggest current market (voice) or on growth area (IP-based content) which will generate greater
revenues in the future. BSS/OSS systems need to be able to reconcile information such as IP address, network
topology, data packets with billing schemes, pricing tables and information about customers. If flexible revenue
assurance procedures are not implemented now, it will be challenging to retro-fit them once problems occur
(Global Telecoms Business, 2007). The last section of this paper will discuss the future of revenue assurance.
Future of Revenue Assurance
The telecom industry is constantly changing making it more difficult to perform revenue assurance. However,
there are new developments such as the “revenue operations center” (ROC) for the CFO which is akin to the
network operations center to the CTO (Burkitt-Gray, 2006), IMS, which was described earlier, and key performance
indicators which will assist in stopping revenue leakage.
Page 12 of 21
Revenue Operations Center
It is not a product but a concept where different software solutions come together along with the people,
processes and hardware to form a facility whereby revenue integrity can be ensured through continually
automated tracking of KPIs (Milner, 2006). It can allow the telco to address abnormalities, process throughput
problems, and revenue leakage before they impact profit (Nicholson, 2008). The drive behind ROC is its focus on
financial performance versus the network and could show the impact of different departments on a product
thereby tracking operational efficiency across the entire organization, not just department by department. ROC can
monitor functions and resources in a company’s control and also those that are included in the supply chain, such
as content providers and other third party resources (Gerwig, 2008). Revenue assurance used to happen after the
event but now, given the competitive landscape and tight margins, it needs to be as real-time and proactive as
possible (Aginsky, 2006) which is where the ROC fits in the picture. Please refer to Appendix 4 for more details on
the ROC concept.
Key Performance Indicators
Due to the TM Forum, some operators have started benchmarking. When it used to be that no one wanted to
share their leakage information, now an industry standard can be specified (Global Telecoms Business, 2007). This
standardization of measuring leakage required because operators measure different ways. There are two types of
KPIs, the business ones such as average revenue per bill cycle and trending of bill revenue per geographical region,
and operational ones such as quality of service and CDR/IPDR volume tracking (Hankins, 2004). The TM Forum
requires corporate membership but once joined, a full list of KPIs can be assessed on their site.
Revenue Assurance Market
As ownership of services move from operators to third parties, the telco will become the medium whereby
these services are provided to the customers. Operators will spend less time on the development of products and
more time on the development of the infrastructure to support those products. This new generation of networks
means that operators are now just a bridge to all these services which means very low profit margins. This ensures
that revenue assurance function is going to grow ever more important (Global Telecoms Business, 2007).
As operators realize the value of a more holistic, enterprise-wide approach to revenue assurance, they are
looking for integrated platforms and frameworks which include not only software but also services that identify and
resolve problems and modify processes to minimize further leaks. Until recently, vendors offered only single-
purpose tools that solved an operator’s specific problem but with the advent of the ROC, it is predicted that once
the market stabilizes, takeovers will occur in the highly fragmented market, and vendors will be able to provide
more comprehensive solutions for their clients (Levine, 2005).
Conclusion
Revenue leakage will continue to increase due to the dynamic telecom environment; however, if companies
can implement a successful revenue assurance program, any revenues found internally will have an immediate
Page 13 of 21
impact on bottom line numbers. If not, telcos will be throwing away shareholders’ money and investors will price
this risk into valuations or will move elsewhere. Operators should make sure they are setting the right, flexible
technology to cope with current and future business and technological requirements in order to compete and
survive into the future.
Page 14 of 21
Appendix 1 – List of Revenue Assurance Providers
The auditor of a telecom company should be aware of the various vendors that their client may engage. This list is
taken directly from the Billing & OSS World directory of revenue assurance providers. Please refer to their website
at BillingWorld.com for more details.
Revenue Assurance Providers
Business intelligence Compliance monitoring Cost management Risk management
Accenture
Alliance Telecom Solutions
BusinessFusion Inc.
Comarch Information
Technology
CSG Systems
DataZA System International Ltd.
Element Customer Care
ENABIL Solutions
Equinox Information Systems
Focus On Telecom
Omniware Solutions Inc.
SDD
Subex Inc.
Tekno Telecom LLC
Vertek
Accenture
Comarch Information
Technology
DataZA System International
Ltd.
Element Customer Care
Focus On Telecom
Omniware Solutions Inc.
Subex Inc.
Tekno Telecom LLC
Vertek
Accenture
Advanced Software Concepts
(ASC)
BusinessFusion Inc.
Comarch Information Technology
DataZA System International Ltd.
DCA Services Inc.
Equinox Information Systems
Focus On Telecom
Omniware Solutions Inc.
SDD
Subex Inc.
TTI Telecom
Vertek
XINTEC SA
Accenture
Advanced Software Concepts
(ASC)
BusinessFusion Inc.
Comarch Information
Technology
DataZA System International
Ltd.
Element Customer Care
ENABIL Solutions
Focus On Telecom
Omniware Solutions Inc.
Subex Inc.
Vertek
Credit monitoring Fraud Interconnect billing Sarbanes-Oxley compliance
Accenture
BusinessFusion Inc.
DataZA System International Ltd.
Element Customer Care
Focus On Telecom
Fusion BPO Services Inc.
Omniware Solutions Inc.
Subex Inc.
Vertek
XINTEC SA
Accenture
Alliance Telecom Solutions
Comarch Information
Technology
Comptel Corp.
DataZA System International
Ltd.
ENABIL Solutions
Equinox Information Systems
Focus On Telecom
Omniware Solutions Inc.
SDD
Subex Inc.
Tekno Telecom LLC
XINTEC SA
Accenture
Alliance Telecom Solutions
BusinessFusion Inc.
Cerillion Technologies
Comarch Information Technology
Communications Data Group
Comptel Corp.
CustomCall Data Systems
DataZA System International Ltd.
Element Customer Care
ENABIL Solutions
Equinox Information Systems
Focus On Telecom
FTS - Formula Telecom Solutions
Ltd.
Intec Billing
Omniware Solutions Inc.
SDD
Subex Inc.
SunTec Business Solutions
Suntech
Tekno Telecom LLC
Vertek
Accenture
BusinessFusion Inc.
Comptel Corp.
DataZA System International
Ltd.
Element Customer Care
Focus On Telecom
FTS - Formula Telecom
Solutions Ltd.
Intec Billing
MetraTech
Omniware Solutions Inc.
Subex Inc.
Tekno Telecom LLC
Vertek
Page 15 of 21
Appendix 2 – Revenue Assurance Maturity Levels
Revenue Assurance Maturity Models (RAMMs) are useful as evaluative tools and can provide a company the basis
on how to set up their own revenue assurance program. The table below lists the details of the five phases of the
metamorphosis of a typical revenue assurance lifecycle. The practitioner can perform an evaluation of their client’s
revenue assurance maturity level and set audit risk accordingly.
The table is taken directly from the Billing & OSS World article, “Making Revenue Assurance Maturity Models
Practical.” Please refer to this article for more information.
The Five Stages of Maturity
Level 0 No revenue assurance practices, processes, policies or tools are in place.
Level 1 Basic revenue recovery consists of ad hoc, manual audits, generally driven by a small, voluntary team or
by individual efforts. Some revenue is recovered.
Level 2 Basic project and process management involving repeatable tasks is implemented. Point solutions are
installed to detect and correct certain types of revenue leakage. Business rules and audits are defined.
A project-level team is in place, but project prioritization remains best-guess.
Level 3 Revenue recovery shifts to revenue assurance, where greater automation is introduced to move from
auditing to continuous monitoring of revenue streams. Business rules for detecting and correcting
leakage are implemented systematically into existing processes. Teams are focused more on analysis
and correction than simple identification, driven by technology tools that help prioritize areas of
greatest leakage and potential ROI. Business analytics and dashboards are implemented to quantify and
forecast revenue assurance performance.
Level 4 Leakage is quantitatively understood and controlled. Formal processes and controls are in place.
Financial streams undergo regular, systematic analysis. Tools are expanded across the enterprise. An
expert revenue assurance team is in place, and it educates and builds participation with other product
and functional groups across the enterprise. Operational assurance metrics and dashboards track root
causes of leakage, rather than just leakage itself.
Level 5 Revenue assurance shifts to revenue management. Revenue assurance practices, processes and tools
are analyzed for performance and continuous improvement. The focus is on cross-functional, cross-
organizational efficiencies and communication. Tools and processes are enhanced to identify potential
problems and take preventive action. All new services are designed with revenue assurance controls
built in or factored in.
Page 16 of 21
Appendix 3 – Specific VoIP Issues
VoIP services produce many revenue assurance issues for telecom companies. Practitioners should be aware of
these issues when they are auditing their client. The following is a table of the main issues as summarized from the
Billing & OSS World article, “Top 10 Revenue Assurance Problems with VoIP.” Please refer to this article for more
information.
Top 10 Revenue Assurance Problems with VoIP
1 It's More Than Just
Switch-to-Bill
For VoIP, the RA model will have to be network-to-bill; scattered network elements
need to be collected and into a next generation, more complex mediation systems,
rating engine and billing system.
2 Order-to-Network
management
A bundled package is ordered and delivered; however, some services weren't
received by the customer so they are not willing to pay that portion of the fee. How
does the network know what was missing and how does collections account for this?
3 Order-to-collections Also known as fraud and credit management; user authentication in a VoIP mobile
setting is weak plus user self-provisioning, unauthorized Wi-Fi access.
4 Access charges "VoIP currently does not pay access charges to terminating carriers; but once this
loophole is closed, the terminating carrier will charge at the highest rate, as is done
today for terminating traffic with calls that lack origination information. A future
potential for fraud is that if a VoIP phone is cloned and calls made, the company will
have no revenue but a large access charges bill.”
5 Taxes VoIP is not currently taxed but once the government starts, a RA issues arises
because the provider won't be able to accurately determine whether traffic is
intrastate or interstate because of the VoIP non-geographically based phone
number. It is a lose-lose situation if taxes cannot be calculated correctly (i.e. the
government will be after the company if undercharging but if overcharging,
customers may launch a class-action lawsuit).
6 IP-based content
trading partners
If end users do not pay for the services (either intentional or because they didn't
order it or the QoS was poor), the company still has to pay the content provider and
incur the expenses from customer service calls and collection calls.
7 Enterprise market Large billings with corporate customers will abound with the proliferation of IP-
based services.
8 Sarbanes-Oxley CEOs/CFOs must certify to the integrity of internal controls (i.e. the billing systems);
RA will become an issue if companies start charging VoIP services by usage instead of
today's flat-fees, auditing the elements from network-to-bill will be difficult and
expensive.
9 Regulation VoIP regulation uncertainties related to E-911 and CALEA mandates.
10 Rush to market Revenue assurance problems are more difficult to solve after than before a new
product is launched.
Page 17 of 21
Appendix 4 – The Revenue Operations Center
The revenue operations center brings together different software solutions along with the people, processes and
hardware to form a facility whereby revenue integrity can be ensured through continually automated tracking of
KPIs. Auditors will have to obtain a section 5970 report from these third party vendors. The table below details the
various components of a typical center.
The table is taken directly from the Billing & OSS World article “ROC On: Creating the Revenue Operations Center to
Maximize Profit.” Please refer to this article for more information.
ROC consists of the following key functional areas:
Fraud management Monitor, detect, and correct unauthorized consumption of resources.
Risk Management Decreasing risk of subscriber default and other A/R issues.
Service Provisioning &
Inventory Assurance
Ensuring services are provisioned as required to meet subscriber commitments, that
fulfillment processes are accurate and efficient, and that resources are consumed and
documented with greater precision.
Usage Integrity
Assurance
Employing revenue assurance techniques to ensure service usage is properly accounted
for and reflected in a range of planning and operations management processes.
Billing Assurance Ensuring billing accurately represents all expected revenue and can be tied to resource
utilization to maximize the monetization of network resources.
Margin Management Tracking transaction-based costs and revenue to understand overall business
performance of individual products and services in order to identify other margin-
affecting and cost issues, such as out-payments, SLA penalty payments, customer
rebates, bad debt write-offs, etc.
Tracking and Analysis of
Data Collected
This framework must also have functions that can track and trend the data collected,
calculate thresholds and targets, mine for profitability profiles and KPI analysis and
tracking, and reporting and dashboard abilities tailored to the particular users' needs.
Page 18 of 21
Glossary
Broadband - refers to data being transmitted where multiple pieces of data are sent simultaneously over a
telephone or cable line.
BSS (Business Support Systems) - this term refers to dealings with customers with activities such as taking orders,
processing bills, and collecting payments.
Bundling - a price discount promotion which prices together a number of different services which if subscribed to
separately would attract a higher price.
C-suite - This refers to the corporate titles conferred on individuals identifying their function within the
organization. Common titles are Chief Executive Officer (CEO) and Chief Financial Officer (CFO).
CDRs - records of telephone exchanges made on the network, including call start time, duration of the call, and
receiving and calling number along with other information required for the company to properly bill the customer.
Churning - describes customer loss; the different types of churn are voluntary, involuntary and internal.
Interconnection - the physical linking of a carrier’s network with that of other carriers in order to exchange traffic.
IPDRs (IP Detail Records) - provides information about IP-based service usage that can be used by the BSS/OSS
billing systems to charge customers for services rendered.
IMS (IP Multimedia Subsystem) - architectural framework for delivering IP multimedia to mobile users.
KPIs (Key Performance Indicators) - financial and non-financial metrics used to help an organization define and
measure progress toward organizational goals.
Mediation systems - converts CDRs and IPDRs into a data type that is usable by the billing systems.
OSS (Operations Support Systems) - computer systems used by telecommunications service providers to describes
functions dealing with the telecom network itself, such as configuring network components and managing faults.
Phantom traffic - unidentifiable and un-billable network traffic sent to a carrier that lacks information to identify
the originating carrier.
SubexAzure – it is now called just Subex; it is an information technology company providing BSS/OSS and fraud
management solutions for telecom operators. They commission an annual revenue leakage survey called “Global
Operator Attitudes to Revenue Management Survey.”
Test calls - is a revenue assurance technique that replicates events on a teleco’s network to identify potential
revenue leakage areas.
TM (TeleManagement) Forum – this is the telecommunications industry’s association of web and media companies
focused on end-end service management.
Page 19 of 21
Trending – a technique used for comparing summary value of data element over specified period of time. Amount
of change is statistically evaluated to determine normal ranges with abnormal results scrutinized for possible
process or content errors.
VoIP (Voice-over Internet Protocol) - a protocol optimized for the transmission of voice through the internet.
Page 20 of 21
Bibliography
"Azure service bureau provides hired billing help." Telecommunications Americas. 40 (2006).
“Fraud at the heart of telecoms.” Global Telecoms Business. July (2004).
“How to avoid the double-dip risk.” Global Telecoms Business. 15 May (2007).
“Losing revenue by the packet.” Global Telecoms Business. Apr. (2004).
“New generation assurance: revenue assurance roundtable discussion.” Global Telecoms Business. 1 Nov. (2007).
“Revenue assurance: improving processes tops up the bottomline.” Global Telecoms Business. 1 Sept. (2006).
"Revenue Assurance KPI Metrics Workbook." TM Forum. 7 Feb. 2008. <http://www.tmforum.org/page33544.aspx>
11 June 2008.
“Revenue leakage rises among global telecom players.” SubexWorld.com. 17 Sept. 2007.
<www.subexworld.com/downloads/survey2007/release.pdf> 11 June 2008.
“You can trust the operators too much.” Global Telecoms Business. 9 Nov. (2006).
Aginsky, Alon. “Uncovering revenue leakage problems in broadband and data services.” Billing & OSS World. 1 Aug.
2006. <www.Billingworld.com/articles/feature/Uncovering-Revenue-Leakage-Problems-in.html> 11 June
2008.
Baker, Dan. “Latest mediation tools can boost profitability for wireless operators.” America’s Network. (2005).
Browning, Randy. "Revenue to the max." Optimize. (2003).
Burkitt-Gray, Alan. “Towards the revenue operations centre.” Global Telecoms Business. May (2006).
Cronin, John. “Rest assured on revenue.” Telecommunications International. 38 (2004).
Dell, Stephanie. “Phantom Menace Lingers.” Telephony. (2006).
Dunetz, Kevin. “Telecom Bills: An Untapped Gold Mine.” Network Magazine. 20 (2005).
Evans, John. “Revenue Assurance in the Communications Sector.” Credit Control. 25 (2004).
Ferrerira, Ines. “Revenue Leakage in the Telecoms Market.” Credit Control. 27 (2006).
Finegold, Edward J. “Revenue assurance takes on a new name.” Billing & OSS World. 1 Sept. 2006.
<www.Billingworld.com/articles/feature/Revenue-Assurance-Takes-on-a-New-Name.html> 11 June 2008.
Finegold, Edward J. “Making revenue assurance maturity models practical.” Billing & OSS World. 1 July 2006.
<www.Billingworld.com/articles/feature/Making-Revenue-Assurance-Maturity-Models.html> 11 June 2008.
Page 21 of 21
Gerwig, Kate. “Next-gen OSS may include revenue operations centers (ROCs) to monitor business processes.” 4 Apr.
2008. <http://searchtelecom.techtarget.com/news/interview/0,289202,sid103_gci1308428,00.html> 11
June 2008.
Guerra, John L. ‘Mediation systems halt revenue leakage.” Billing & OSS World. 1 Apr. 2005.
<www.Billingworld.com/articles/feature/mediation-systems-halt-revenue-leakage.html> 11 June 2008.
Gundavelli, Veena. “Deductions management.” Business Credit. 106 (2004).
Hankins, Michelle L. “Revenue assurance trends: Providers get down to business.” Billing & OSS World. 1 May 2004.
<www.Billingworld.com/articles/feature/Revenue-Assurance-Trends-Providers-Get-Down.html> 11 June
2008.
Hill, Kelly. “Bundling brings opportunities for more revenue leakage.” RCR Wireless News. 11 Sept. 2006.
Hill, Kelly. “Fraud: A total drag (on revenues).” RCR Wireless News. 1 Oct. 2007.
Hutton, Roger. “Revving up revenue streams.” Rural telecommunications. 23 (2004).
Ibbett, Geoff. “Usage data integrity and revenue assurance.” Credit Control. 24 (2003).
Jacobs, Riaan. “Telecommunications fraud.” Dimensiondata.com. <www.dimensiondata.com/NR/rdonlyres/
85DC1F7A-0B17-4A87-84F9-328ACF33A670/409/TelecommunicationsFraudWhitePaper1.pdf>. 11 June
2008.
Johnson, Mark. “Revenue Assurance, Fraud & Security in 3G Telecom Services.” Journal of Economic Crime
Management. 1 (2002).
Karpinski, Rich. “Back office on the hot seat.” Telephony. 249 (2008).
Lee, Wei Lian. “Good governance demands proper risk management, vigilance.” The Edge Malaysia. 5 July (2007).
Levine, Shira. “How big is your revenue hole?” America’s Network. 1 Apr. (2003).
Levine, Shira and L. Pratt. “Revenue assurance stops the leak.” Telecommunications Americas. 39 (2005).
Limbach, Ian. “Failing to look after the pennies.” Financial Times. 12 July 2006.
Lombardi, Rosie and D. Henderson. “Are your systems leaking revenues?” CIO Canada. 8 (2000).
Lopes, Miguel. “Where revenue assurance is headed for 2006 and beyond.” Credit Control. 27 (2006).
Lucas, Dr. Jerry. “10 Take-Aways from Revenue Assurance 2005.” Billing & OSS World. 1 Nov. 2005.
<www.Billingworld.com/articles/feature/10-Take-Aways-from-Revenue-Assurance-2005.html> 11 June
2008.
Lucas, Dr. Jerry. “Top 10 Revenue Assurance Problems with VoIP.” Billing & OSS World. 1 Nov. 2004.
<www.Billingworld.com/articles/feature/Top-10-Revenue-Assurance-Problems-with-VoIP.html> 11 June
2008.
Marek, Sue. “Plugging revenue leaks.” Wireless Week. 15 Aug. (2004).
Page 22 of 21
McClelland, Stephen. “Plumbing network leaks.” Telecommunications International. 37 (2003).
McElligott, Tim. “Revenue leakage: Are carriers raising the white flag?” Telephony. 248 (2007).
Milner, Nick. “Waste not, want not?” Telecommunications International. 40 (2006).
Morisy, Michael. “Revenue assurance a critical tool for telecom success.” 13 Nov. 2007. Searchtelecom.com.
<http://searchtelecom.techtarget.com/news/article/0,289142,sid103_gci1281779,00.html> 11 June 2008.
Nairn, Geoff. “Operators make more out of less legacy systems.” Financial Times. 14 April 2004.
Nicholson, Mark and A. Boone. “ROC On: Creating the Revenue Operations Center to Maximize Profit.” Billing &
OSS World. 28 Apr. 2008. <www.Billingworld.com/articles/creating-revenue-operations-center.html> 11
June 2008.
Nolle, Tom. “Service provider billing system fundamentals.” 13 July 2007. Searchtelecom.com.
<http://searchtelecom.techtarget.com/tip/0,289483,sid103_gci1264196,00.html> 11 June 2008.
Pratt, Lorien and N. Ruzicka. “Building back office brawn.” Telecommunications Americas. 40 (2006).
Shaw, Vince and M. Ravin. “The Myth of Constant Revenue Leakage.” Billing & OSS World. 1 Sept. 2006.
<http://www.billingworld.com/articles/feature/The-Myth-of-Constant-Revenue -Leakage .html> 11 June
2008.
Sobol, Craig and R. Short. “Maximizing your broadband bucks.” Telecommunications Americas. 37 (2003).
Srivastava, Sanjay. “Using technology to trim revenue and receivables leakage.” Financial Executive. 21 (2005).
Stanislaw, Stephen. “Rest assured on IMS?” Telecommunications International. 39 (2005).
Suppa, Carly. “Syndesis uploads way to revenue assurance.” Network World Canada. 13 (2003).
Tulloch, James. “Plugging the gaps.” Mobile Communications International. 106 (2003).
Vasquez, Oscar. “Billing for IP services remains a challenge.” Business Communications Review. 29 (1999).
Walter, Derek. “From porous to profitable.” Telephony. 244 (2003).
Wickham, Rhonda. “Pressures force closer look at revenue leakage.” Wireless Week. 1 July 2003.
Wieland, Ken. “Opening doors to profit.” Telecommunications International. 38 (2004).
Wieland, Ken. “Plumbers required.” Telecommunications International. 39 (2005).
Wieland, Ken. “Report: Revenue leaks continue.” Telecommunications Americas. 38 (2004).
Wieland, Ken. “The last taboo?” Telecommunications International. 38 (2004).
Wieland, Ken. “US$170 bn “wasted” this year, says Azure.” Telecommunications International. 39 (2005).
Wilson, Carol. “VoIP poses billing challenge.” Telephony. 246 (2005).

More Related Content

What's hot

TIM - Meeting with Investors, Aug 2020
TIM - Meeting with Investors, Aug 2020TIM - Meeting with Investors, Aug 2020
TIM - Meeting with Investors, Aug 2020TIM RI
 
2012_GTM Recommendation
2012_GTM Recommendation2012_GTM Recommendation
2012_GTM RecommendationRick VARGAS
 
Oliver Wyman Infocom Review 2010
Oliver Wyman Infocom Review 2010Oliver Wyman Infocom Review 2010
Oliver Wyman Infocom Review 2010skripnikov
 
What does Industrialization really mean for Banking
What does Industrialization really mean for BankingWhat does Industrialization really mean for Banking
What does Industrialization really mean for BankingCapco
 
A Playbook for Contending with the Medical Devices Excise Tax
A Playbook for Contending with the Medical Devices Excise TaxA Playbook for Contending with the Medical Devices Excise Tax
A Playbook for Contending with the Medical Devices Excise TaxCognizant
 
UK Business Payments Barometer
UK Business Payments BarometerUK Business Payments Barometer
UK Business Payments BarometerJacqui Powell
 
Market Analysis and Business Plan for Residential Energy Efficiency Services
Market Analysis and Business Plan for Residential Energy Efficiency ServicesMarket Analysis and Business Plan for Residential Energy Efficiency Services
Market Analysis and Business Plan for Residential Energy Efficiency ServicesAlbert Graells Vilella
 
Forrester whos hot in bsm
Forrester whos hot in bsmForrester whos hot in bsm
Forrester whos hot in bsmIBM_BSM
 
alltel 3Q05_EarningsRelease
alltel  3Q05_EarningsReleasealltel  3Q05_EarningsRelease
alltel 3Q05_EarningsReleasefinance27
 
HCIT Market Research October 2011
HCIT Market Research October 2011HCIT Market Research October 2011
HCIT Market Research October 2011MMMTechLaw
 
Bilateral Margining - Consequences beyond methodology
Bilateral Margining -  Consequences beyond methodologyBilateral Margining -  Consequences beyond methodology
Bilateral Margining - Consequences beyond methodologyCatalyst Development Ltd
 
WHITE PAPER: building the foundation for LTE revenue
WHITE PAPER: building the foundation for LTE revenueWHITE PAPER: building the foundation for LTE revenue
WHITE PAPER: building the foundation for LTE revenueCorine Suscens
 
Tem Event London 12th November 2009 Copy
Tem Event London 12th November 2009   CopyTem Event London 12th November 2009   Copy
Tem Event London 12th November 2009 CopyPaul Hughes
 
"The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
 "The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"  "The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
"The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk" cVidya Networks
 

What's hot (17)

Redefining ETRM
Redefining ETRMRedefining ETRM
Redefining ETRM
 
TIM - Meeting with Investors, Aug 2020
TIM - Meeting with Investors, Aug 2020TIM - Meeting with Investors, Aug 2020
TIM - Meeting with Investors, Aug 2020
 
2012_GTM Recommendation
2012_GTM Recommendation2012_GTM Recommendation
2012_GTM Recommendation
 
Oliver Wyman Infocom Review 2010
Oliver Wyman Infocom Review 2010Oliver Wyman Infocom Review 2010
Oliver Wyman Infocom Review 2010
 
JRE300 - Assignment 1 - V2.2
JRE300 - Assignment 1 - V2.2JRE300 - Assignment 1 - V2.2
JRE300 - Assignment 1 - V2.2
 
What does Industrialization really mean for Banking
What does Industrialization really mean for BankingWhat does Industrialization really mean for Banking
What does Industrialization really mean for Banking
 
A Playbook for Contending with the Medical Devices Excise Tax
A Playbook for Contending with the Medical Devices Excise TaxA Playbook for Contending with the Medical Devices Excise Tax
A Playbook for Contending with the Medical Devices Excise Tax
 
UK Business Payments Barometer
UK Business Payments BarometerUK Business Payments Barometer
UK Business Payments Barometer
 
Market Analysis and Business Plan for Residential Energy Efficiency Services
Market Analysis and Business Plan for Residential Energy Efficiency ServicesMarket Analysis and Business Plan for Residential Energy Efficiency Services
Market Analysis and Business Plan for Residential Energy Efficiency Services
 
Forrester whos hot in bsm
Forrester whos hot in bsmForrester whos hot in bsm
Forrester whos hot in bsm
 
alltel 3Q05_EarningsRelease
alltel  3Q05_EarningsReleasealltel  3Q05_EarningsRelease
alltel 3Q05_EarningsRelease
 
HCIT Market Research October 2011
HCIT Market Research October 2011HCIT Market Research October 2011
HCIT Market Research October 2011
 
Bilateral Margining - Consequences beyond methodology
Bilateral Margining -  Consequences beyond methodologyBilateral Margining -  Consequences beyond methodology
Bilateral Margining - Consequences beyond methodology
 
WHITE PAPER: building the foundation for LTE revenue
WHITE PAPER: building the foundation for LTE revenueWHITE PAPER: building the foundation for LTE revenue
WHITE PAPER: building the foundation for LTE revenue
 
Tem Event London 12th November 2009 Copy
Tem Event London 12th November 2009   CopyTem Event London 12th November 2009   Copy
Tem Event London 12th November 2009 Copy
 
ABTL
ABTLABTL
ABTL
 
"The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
 "The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"  "The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
"The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
 

Viewers also liked

A_Holistic_Approach_To_Revenue_Assurance_Reviews_(Speaker_Version)[1]
A_Holistic_Approach_To_Revenue_Assurance_Reviews_(Speaker_Version)[1]A_Holistic_Approach_To_Revenue_Assurance_Reviews_(Speaker_Version)[1]
A_Holistic_Approach_To_Revenue_Assurance_Reviews_(Speaker_Version)[1]fbalfour
 
Sharpening revenue assurance_july 2015
Sharpening revenue assurance_july 2015Sharpening revenue assurance_july 2015
Sharpening revenue assurance_july 2015Silas Musakali
 
The Impact Data Traffic Explosion and LTE on Revenue Assurance
The Impact Data Traffic Explosion and LTE on Revenue AssuranceThe Impact Data Traffic Explosion and LTE on Revenue Assurance
The Impact Data Traffic Explosion and LTE on Revenue AssurancecVidya Networks
 
Revenue Assurance & Improvement
Revenue Assurance & ImprovementRevenue Assurance & Improvement
Revenue Assurance & ImprovementPaulo Pantigoso
 
Kpmg global revenue-assurance-survey-march2012
Kpmg global revenue-assurance-survey-march2012Kpmg global revenue-assurance-survey-march2012
Kpmg global revenue-assurance-survey-march2012Tina Vandenbosch
 
Risk Based Approach to RA
Risk Based Approach to RARisk Based Approach to RA
Risk Based Approach to RAXINTEC
 
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue Assurance
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue AssuranceSmart Margin Analytics: Adding Margin Assurance Capability to Revenue Assurance
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue AssurancecVidya Networks
 
Revenue assurance 101
Revenue assurance 101Revenue assurance 101
Revenue assurance 101ntel
 
Gaurav Gupta Resume
Gaurav Gupta ResumeGaurav Gupta Resume
Gaurav Gupta ResumeGaurav Gupta
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017LinkedIn
 

Viewers also liked (12)

A_Holistic_Approach_To_Revenue_Assurance_Reviews_(Speaker_Version)[1]
A_Holistic_Approach_To_Revenue_Assurance_Reviews_(Speaker_Version)[1]A_Holistic_Approach_To_Revenue_Assurance_Reviews_(Speaker_Version)[1]
A_Holistic_Approach_To_Revenue_Assurance_Reviews_(Speaker_Version)[1]
 
Sharpening revenue assurance_july 2015
Sharpening revenue assurance_july 2015Sharpening revenue assurance_july 2015
Sharpening revenue assurance_july 2015
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
 
The Impact Data Traffic Explosion and LTE on Revenue Assurance
The Impact Data Traffic Explosion and LTE on Revenue AssuranceThe Impact Data Traffic Explosion and LTE on Revenue Assurance
The Impact Data Traffic Explosion and LTE on Revenue Assurance
 
Revenue Assurance & Improvement
Revenue Assurance & ImprovementRevenue Assurance & Improvement
Revenue Assurance & Improvement
 
Kpmg global revenue-assurance-survey-march2012
Kpmg global revenue-assurance-survey-march2012Kpmg global revenue-assurance-survey-march2012
Kpmg global revenue-assurance-survey-march2012
 
Risk Based Approach to RA
Risk Based Approach to RARisk Based Approach to RA
Risk Based Approach to RA
 
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue Assurance
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue AssuranceSmart Margin Analytics: Adding Margin Assurance Capability to Revenue Assurance
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue Assurance
 
revenue assurance
revenue assurancerevenue assurance
revenue assurance
 
Revenue assurance 101
Revenue assurance 101Revenue assurance 101
Revenue assurance 101
 
Gaurav Gupta Resume
Gaurav Gupta ResumeGaurav Gupta Resume
Gaurav Gupta Resume
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017
 

Similar to Lindy do telecommunications_revenueassurance

Tech M White Paper Revenue Assurance D0 9 180612 (1)
Tech M White Paper Revenue Assurance D0 9 180612 (1)Tech M White Paper Revenue Assurance D0 9 180612 (1)
Tech M White Paper Revenue Assurance D0 9 180612 (1)aprasoon
 
Top Ten Challenges for Investment Banks 2015: Revolution: Challenge 10
Top Ten Challenges for Investment Banks 2015: Revolution: Challenge 10Top Ten Challenges for Investment Banks 2015: Revolution: Challenge 10
Top Ten Challenges for Investment Banks 2015: Revolution: Challenge 10accenture
 
Employing Telematics to Transform Workers' Compensation
Employing Telematics to Transform Workers' CompensationEmploying Telematics to Transform Workers' Compensation
Employing Telematics to Transform Workers' CompensationCognizant
 
Telecom Billing Market Landscape
Telecom Billing Market LandscapeTelecom Billing Market Landscape
Telecom Billing Market LandscapeSaurabh Jain
 
Telecom Billing Market Landscape
Telecom Billing Market LandscapeTelecom Billing Market Landscape
Telecom Billing Market LandscapeSaurabh Jain
 
How to manage and reduce network Capex and Opex while maintaining profitabil...
How to manage and reduce network Capex and Opex while maintaining profitabil...How to manage and reduce network Capex and Opex while maintaining profitabil...
How to manage and reduce network Capex and Opex while maintaining profitabil...Subex
 
Marmore Bulletin 1Q15 article EN
Marmore Bulletin 1Q15 article ENMarmore Bulletin 1Q15 article EN
Marmore Bulletin 1Q15 article ENJeff Youssef
 
Making Connections
Making ConnectionsMaking Connections
Making ConnectionsTina Jordan
 
Forrester total-economic-impact-of-ca-release-automation
Forrester total-economic-impact-of-ca-release-automationForrester total-economic-impact-of-ca-release-automation
Forrester total-economic-impact-of-ca-release-automationSathish Nagarajan
 
Forrester total-economic-impact-of-ca-release-automation
Forrester total-economic-impact-of-ca-release-automationForrester total-economic-impact-of-ca-release-automation
Forrester total-economic-impact-of-ca-release-automationSathish Nagarajan
 
SEC in Focus - January 2019
SEC in Focus - January 2019SEC in Focus - January 2019
SEC in Focus - January 2019Azhar Qureshi
 
A fitness program for gcc telcos
A fitness program for gcc telcosA fitness program for gcc telcos
A fitness program for gcc telcossharingpublications
 
Tri-Solve client presentation
Tri-Solve client presentationTri-Solve client presentation
Tri-Solve client presentationcspearce
 
Week 3 General Electric ReportChad Uhler, Chaka Birde.docx
Week 3 General Electric ReportChad Uhler, Chaka Birde.docxWeek 3 General Electric ReportChad Uhler, Chaka Birde.docx
Week 3 General Electric ReportChad Uhler, Chaka Birde.docxcockekeshia
 
Consulting Report 2012: Improving Monetisation in UK Telco Sector
Consulting Report 2012: Improving Monetisation in UK Telco SectorConsulting Report 2012: Improving Monetisation in UK Telco Sector
Consulting Report 2012: Improving Monetisation in UK Telco SectorChris Corbishley
 
Advance spectrum management for mobile telecommunications finalproject
Advance spectrum management for mobile telecommunications finalprojectAdvance spectrum management for mobile telecommunications finalproject
Advance spectrum management for mobile telecommunications finalprojectAntonino Galo
 
Automating the Petroleum Industry, from Wells to Wheels
Automating the Petroleum Industry, from Wells to WheelsAutomating the Petroleum Industry, from Wells to Wheels
Automating the Petroleum Industry, from Wells to WheelsCognizant
 

Similar to Lindy do telecommunications_revenueassurance (20)

Tech M White Paper Revenue Assurance D0 9 180612 (1)
Tech M White Paper Revenue Assurance D0 9 180612 (1)Tech M White Paper Revenue Assurance D0 9 180612 (1)
Tech M White Paper Revenue Assurance D0 9 180612 (1)
 
Top Ten Challenges for Investment Banks 2015: Revolution: Challenge 10
Top Ten Challenges for Investment Banks 2015: Revolution: Challenge 10Top Ten Challenges for Investment Banks 2015: Revolution: Challenge 10
Top Ten Challenges for Investment Banks 2015: Revolution: Challenge 10
 
Employing Telematics to Transform Workers' Compensation
Employing Telematics to Transform Workers' CompensationEmploying Telematics to Transform Workers' Compensation
Employing Telematics to Transform Workers' Compensation
 
Telecom Billing Market Landscape
Telecom Billing Market LandscapeTelecom Billing Market Landscape
Telecom Billing Market Landscape
 
Telecom Billing Market Landscape
Telecom Billing Market LandscapeTelecom Billing Market Landscape
Telecom Billing Market Landscape
 
How to manage and reduce network Capex and Opex while maintaining profitabil...
How to manage and reduce network Capex and Opex while maintaining profitabil...How to manage and reduce network Capex and Opex while maintaining profitabil...
How to manage and reduce network Capex and Opex while maintaining profitabil...
 
Using real-time data in the energy sector
Using real-time data in the energy sectorUsing real-time data in the energy sector
Using real-time data in the energy sector
 
Marmore Bulletin 1Q15 article EN
Marmore Bulletin 1Q15 article ENMarmore Bulletin 1Q15 article EN
Marmore Bulletin 1Q15 article EN
 
2016 investor presentation
2016 investor presentation2016 investor presentation
2016 investor presentation
 
Making Connections
Making ConnectionsMaking Connections
Making Connections
 
Huawei Award Write Up
Huawei Award Write UpHuawei Award Write Up
Huawei Award Write Up
 
Forrester total-economic-impact-of-ca-release-automation
Forrester total-economic-impact-of-ca-release-automationForrester total-economic-impact-of-ca-release-automation
Forrester total-economic-impact-of-ca-release-automation
 
Forrester total-economic-impact-of-ca-release-automation
Forrester total-economic-impact-of-ca-release-automationForrester total-economic-impact-of-ca-release-automation
Forrester total-economic-impact-of-ca-release-automation
 
SEC in Focus - January 2019
SEC in Focus - January 2019SEC in Focus - January 2019
SEC in Focus - January 2019
 
A fitness program for gcc telcos
A fitness program for gcc telcosA fitness program for gcc telcos
A fitness program for gcc telcos
 
Tri-Solve client presentation
Tri-Solve client presentationTri-Solve client presentation
Tri-Solve client presentation
 
Week 3 General Electric ReportChad Uhler, Chaka Birde.docx
Week 3 General Electric ReportChad Uhler, Chaka Birde.docxWeek 3 General Electric ReportChad Uhler, Chaka Birde.docx
Week 3 General Electric ReportChad Uhler, Chaka Birde.docx
 
Consulting Report 2012: Improving Monetisation in UK Telco Sector
Consulting Report 2012: Improving Monetisation in UK Telco SectorConsulting Report 2012: Improving Monetisation in UK Telco Sector
Consulting Report 2012: Improving Monetisation in UK Telco Sector
 
Advance spectrum management for mobile telecommunications finalproject
Advance spectrum management for mobile telecommunications finalprojectAdvance spectrum management for mobile telecommunications finalproject
Advance spectrum management for mobile telecommunications finalproject
 
Automating the Petroleum Industry, from Wells to Wheels
Automating the Petroleum Industry, from Wells to WheelsAutomating the Petroleum Industry, from Wells to Wheels
Automating the Petroleum Industry, from Wells to Wheels
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Lindy do telecommunications_revenueassurance

  • 2. Page 2 of 21 Table of Contents Note to Practitioner ...................................................................................................................................... 3 Introduction................................................................................................................................................... 4 Telecommunications Industry....................................................................................................................... 4 Revenue Leakage........................................................................................................................................... 5 Poor Operational Processes and Procedures............................................................................................ 5 Poor Systems Integration .......................................................................................................................... 6 External and Internal Fraud....................................................................................................................... 6 Average Amount of Revenue Leakage ...................................................................................................... 6 Revenue Assurance Strategies ...................................................................................................................... 7 Outsourcing Revenue Assurance............................................................................................................... 7 Fixing Root Causes of Revenue Leakage ................................................................................................... 8 Revenue Assurance Process Maturity....................................................................................................... 8 Implementation of Strategies ................................................................................................................... 9 Challenges Facing Revenue Assurance.......................................................................................................... 9 IP-Based Services..................................................................................................................................... 10 Billing Complexities ................................................................................................................................. 10 Interconnection Arrangements............................................................................................................... 11 Future of Revenue Assurance ..................................................................................................................... 11 Revenue Operations Center.................................................................................................................... 12 Key Performance Indicators.................................................................................................................... 12 Revenue Assurance Market..................................................................................................................... 12 Conclusion ................................................................................................................................................... 12 Appendix 1 – List of Revenue Assurance Providers .................................................................................... 14 Appendix 2 – Revenue Assurance Maturity Levels ..................................................................................... 15 Appendix 3 – Specific VoIP Issues ............................................................................................................... 16 Appendix 4 – The Revenue Operations Center........................................................................................... 17 Glossary....................................................................................................................................................... 18 Bibliography................................................................................................................................................. 20
  • 3. Page 3 of 21 Note to Practitioner This paper will provide an overview of one of the largest issues facing the telecommunications industry which is revenue assurance. Billions of dollars are lost annually through revenue leakage because of faulty internal control processes, systems and fraud. As an auditor of a telecom company, you will need to understand the industry and the factors that affect their revenue cycle in order to design audit procedures and to gain sufficient and appropriate evidence that supports the fact that revenues recorded are not materially misstated. After reading this paper, you should be able to identify the environmental and company-specific risk factors to account for in your audit plan. Revenue assurance is the umbrella term that describes the activities that a telecom company will undertake in order to ensure that their processes and procedures minimize revenue leakage. Global spending on revenue assurance services and products is expected to grow to $934 million in 2008 up from $508 million in 2003 (Hankins, 2004). Much of this money will be spent on outsourcing the revenue assurance function to third party vendors since 68% of telecom companies are using such vendors (SubexWorld, 2007). Because you will be relying on these outside parties’ performance in your audit, a section 5970 report would be required which reports on the operational effectiveness of the controls at that third party. If a section 5970 report cannot be obtained, you will have to perform more substantive audit work on the client. The audit plan should be adjusted accordingly. This paper will alternate between using the terms telecommunications company, telco, service provider, operator, and carrier, which all mean the same thing. Also, please refer to the glossary for a definition of terms used in the paper.
  • 4. Page 4 of 21 Introduction Revenue assurance is the umbrella term that describes the activities that a telecommunications company will undertake in order to ensure that their processes and procedures minimize revenue leakage. This leakage occurs when revenue that has been earned by the company, such as when services are rendered to the customer, but lost on its way to the billing systems so that the customer never gets invoiced. Many telecom companies do not like to talk openly about revenue assurance. This is because it is a process that can identify the amount of money they lose as caused by their inaccurate BSS/OSS networks. In the past, the problem was largely ignored; because trying to assess the problem would only point out to a telecom executive that the errors in the systems were wasting their shareholders' money (Wieland, 2005). However, some of the myths that surrounded the revenue leakage issue such as that the problem is too big and complex to address or that the amount of revenue lost is not really that much (Geppert, 1998), that allowed executives to ignore the problem have been proven to be not true. Today, there are many revenue assurance providers and products which can help minimize losses. SubexAzure's fifth annual “2007 Global Operator Attitudes to Revenue Management Survey” estimated that the average leakage rate was 13.6% of revenues (SubexWorld, 2007). Since the 2007 global telecom market revenue is estimated at $2.3 trillion (Business Wire, 2007), this represents a $313 billion annual loss for the market. Even for an average company making only $6 billion annually, that's a loss of $816 million that could be prevented. Telecom service providers know that they cannot continue to ignore this problem and thus a market for revenue assurance products has developed. This demonstrates the significance of the revenue leakage problem and indicates that companies will need to actively seek a solution in order to minimize their operational losses. This paper will describe some of the strategies that have been proposed to combat the problem but before that, an overview of the telecom industry is provided along with details regarding the sources of revenue leakage. The actual corporate implementation of these strategies is then discussed followed by current challenges facing revenue assurance and lastly, a section describing the future of revenue assurance is provided. Telecommunications Industry Historically, the telecom industry has been globally regulated with significant barriers to entry. Carriers were guaranteed certain profit regardless of their operational expenditures so they could afford high cost processes, including revenue leakage, and still make money (Levine, 2005). As a result, the carriers did not prioritize the development of efficient or accurate processes that control the data flows through their systems (Pratt, 2006) which contributes to the current high rates of revenue leakage reported by telcos. Also, the volatility of the telecom industry resulting from privatisation, merger and acquisition activities, continuously changing technologies (Evans, 2004), along with intense competition, which really only began in the last five to ten years due to the
  • 5. Page 5 of 21 Telecommunications Act of 1996 deregulating the industry (Pratt, 2006), has forced managers to revaluate their system processes for leaks and find ways to plug the holes to improve performance and maximize revenues. Another major factor that increased the demand for revenue assurance was the 2002 Sarbanes-Oxley Act. This required the CEO and CFO to sign off on the integrity of the financial statements, which includes assuring that revenue is measured accurately (Stanislaw, 2005). Other external drivers for revenue assurance are the customers who require accurate, complete and timely invoices and shareholders who demand effective controls over business operations (Evans, 2004) to increase their shares’ value. To meet all these demands, a company must identify the sources of their revenue leakages and provide for a solution to patch up the holes. Revenue Leakage Due to the massive volumes of low-dollar and complex micro-transactions that stream through the multiple processing systems of a typical telecom company and then trying to meter the information at various control points and recombining them into coherent, personalized billings without any errors is basically impossible (Lombardi, 2000). Although leakage may be inevitable, identifying the main sources can help find solutions to minimize them. There are three primary revenue assurance problems; they are the unbilled customer (which occurs when the system does not recognize them), the mis-billed customer (those who are billed the wrong amount for services consumed), and stranded network resources (the false identification that equipment is unavailable which then causes unnecessary investment in new equipment, i.e. stranded terabytes of unused but potentially billable traffic) (Aginsky, 2006). In a typical telecom company, there are many specific sources of revenue leakage; they are described below followed by a discussion regarding the average of amount of revenue leakage. Poor Operational Processes and Procedures There are many sources of leakages, most of which stem from poor operational processes and procedures. For example, leakage can occur even before a single call is made by the customer when there are human errors in the service activation process where the order details are first entered into the billings system (Pratt, 2006). Human errors can also impact the invoicing system by having incorrect information entered into the rating engine (Pratt, 2006), for example, long distance charges of 9 cents per minute are entered as 8 cents per minute or by entering the wrong termination date for pricing promotions. Such errors would affect many customers and cause the telecom company to lose large amounts of unbilled revenue. Also due to poor operational processes, a carrier may be oversupplied with connectivity. For example, there may be unallocated resources that are not being recycled from customers who have left and cancelled services (Morisy, 2007). Another source of leakage is due to errors in the usage processes (the mediation and billing systems) involving call detail records (CDRs). Considering that a typical telecom company handles around 170-200 million CDRs a day (Evans, 2004), leakage can occur anywhere along the network as the CDR is transported from the switch to the mediation system to the billing system, whereby the CDR is misrouted, corrupted or misidentified (Pratt, 2006).
  • 6. Page 6 of 21 Poor Systems Integration Another reason why leakage is such a large issue is related to a company’s network of systems. Most telecom systems were built based on 1970s technology to support a very structured and rigorous regulated market (Lombardi, 2000) and does not work well in today's environment due to the required flexibility to accommodate the fast-paced changes occurring with technology and in the industry. Large telecom networks are not actually one system but a set of different disaggregate legacy systems that have either evolved over time or are the result of merger and acquisition activities (Ryan, 2000). Integration of the different back office systems is often done poorly because management do not have the resources to undertake such a project and also because they were not made to work with each other in the first place. The gaps between the systems are usually handled manually so the potential for inconsistencies, errors and leakage is especially high (Srivastava, 2005). Other times, revenue leakage occurs due to errors occurring during upgrades and changes to the network systems. Telecom carriers are under pressure to introduce new, complex services and pricing promotions quickly, without fully resolving back office issues in order to properly bill for them, which creates further weaknesses in the system (Levine, 2003; Cronin, 2004). Many errors also occur at the point of interconnection between two carriers since the interfacing systems were not designed to work with each other (Tulloch, 2003). This can also cause the problem of phantom traffic whereby revenue can be lost due to the inability to identify the originating carrier and therefore interconnection fees cannot be billed (Dell, 2006). External and Internal Fraud Telecom fraud involves the theft of services or deliberate abuse of the network because the perpetrator intends to avoid or reduce charges for services used (Jacobs, 2008) and has been cited as the number one factor for operator losses in 2007 (SubexWorld, 2007). Fraud can occur externally by other carriers (intentional phantom traffic) or other outside sources (Guerra, 2005) or internally by a carrier’s own employees (by providing discount rates to friends and family) (McClelland, 2004). This is a big problem because it can erode margins, consume network capacity and jeopardize customer relationships. The main type of fraud is subscription fraud whereby users sign up for services and use the account for national and international calls with no intention to pay. Another type is premium rate service fraud where operators of those 900 number lines organize fraudulent calls to their numbers to inflate incoming traffic and increase their revenues (Johnson, 2002). Other scams involve cloned mobile SIM cards where an existing customer’s hardware is replicated and used to make calls on their account without them knowing until they get their monthly bill (Johnson, 2002). Another problem is that many telcos set up offshore are to launder money (by charging low rates and then closed down) which would affect interconnection revenues because these companies are usually shut down quickly without paying those fees (Global Telecoms Business, 2004). Average Amount of Revenue Leakage Some telecom executives want to know what the average amount of leakage is so that they can compare their companies to that figure. However, actual leakage reflects peaks and valleys rather than a steady flow and ideally
  • 7. Page 7 of 21 over time, the peaks should become less severe but given the continuous changes in the industry, companies have not been able to focus on driving down leakage (Shaw, 2006). Expected leakage varies and is based on many factors, such as customer segment, organization maturity, changes to the network and sector specific risks. Most leakage is correctable; the challenge lies in its initial detection and identification (Shaw, 2006). The next section will discuss some revenue assurance strategies can help with this process. Revenue Assurance Strategies A revenue assurance strategy includes all the activities that a telco does to ensure that aspects of systems, policies, process, and procedures that impact revenue is addressed. The core elements of a good revenue assurance strategy includes performing a risk assessment in order to prioritize high risk areas, integrating revenue maximization techniques and implementing key automated tools, creating a revenue responsible organization, embedding quantifiable monitoring mechanisms and having committed champions (Browning, 2003). The strategy should emphasize having a holistic, end-to-end approach, meaning that a review of the full revenue cycle is done to capture more leakage events than when doing separate and disjointed assessments (Shaw, 2006). There should also be an independent and dedicated revenue assurance team consisting of cross-functional team members. Revenue leakage is usually treated as a billing issue, however one department is not responsible for all elements on the invoice (Lombardi, 2000), and therefore, an organization-wide charter for revenue management is required rather than treating it as the sole responsibility of that single group. The long term effectiveness of revenue assurance strategies will depend on the enterprise’s mindset as cultivated by the champions (Shaw, 2006). The right leadership team and corporate culture which have accountabilities do not tolerate revenue leakage is crucial to success of revenue maximization strategies (Browning, 2003). The first step to providing revenue assurance would be the development of clear, measured, and accountable day-to-day processes along with key automated tools that can prevent leakage, such as training employees on data entry and change control procedures. Reactive controls should also be developed for those problems that cannot be prevented (Lombardi, 2000), for example, software can build alarms into the systems so that errors can be detected as they occur. Quantifiable monitoring mechanisms should also be embedded into the system, such as tools that can provide for trending analysis, reconciliation to control totals and performance of recalculations to confirm accuracy of data derived from the system (Sobol, 2003). Automated software tools are keys to a revenue assurance strategy due to the scale and complexity of telecom billings. They can catch errors and proactively address them before they move downstream to leak revenue or cause customer dissatisfaction (Srivastava, 2005). Outsourcing Revenue Assurance To keep costs under control and not sacrifice performance, many telcos are working with third party revenue assurance providers instead of performing activities in-house. The benefits include that they will always have up-to- date, sophisticated systems and expertise while charging only on a pay-as-you-go basis (either by percentage of savings or transaction volume). It is also always quicker to implement because the IT facilities, operations and
  • 8. Page 8 of 21 support team are already in place (Cronin, 2004) and there are many quality vendors offering their services (please see Appendix 1 for a list of vendors). SubexAzure’s 2007 survey reported that 68% of operators use third parties and would lose 30% less compared to those who perform revenue assurance in-house (SubexWorld, 2007). However, many third party vendors just identify the leakages by collecting data from the network and comparing with information generated by the billing system and do not actually work to prevent the errors (Levine, 2003). Suggestions on how a telco can eliminate the root causes of revenue leakage are described below. Fixing Root Causes of Revenue Leakage A major task is to ensure that the data integrity of CDRs and IPDRs are maintained throughout the end-to-end processes. In order to do this, a telco must fully understand their organization’s usage data management requirement and network topology and how it delivers its services. They must be able to quantify the scale of the problem, have a method to resolve the discrepancies, and a way to measure and report periodically along with a coordination of changes required (Ibbett, 2003). An example of an audit methodology to ensure integrity would be test-calling procedures. Frauds are difficult to prevent but if telcos have good procedures in place to detect unusual account activity, they can at least cancel those subscriptions. The BSS/OSS systems also need to be integrated and streamlined in order to reduce errors and increase efficiency (Wieland, 2004). The mediation systems are especially important now, because with IP-switched networks (which is discussed in more detail in the next section) instead of the old circuit-switched networks, a telco must pull call and event data from different network elements in the distributed IP environment (Guerra, 2005). The system needs to be able to identify and isolate erroneous data, inspect and correct it and then recycle the exception back for re-processing (Guerra, 2005). Some international companies have advanced mediation systems which help them cut down on revenue leakage. For example, South Korea’s SK Telecom performs value-based billing whereby they charge the subscriber what they are willing to pay by tweaking content rates so price sensitive subscribers can download an otherwise expensive movie at an off-peak time, say 3 am with a hot bill available within five minutes of the subscriber’s session (Baker, 2005). Buying an advanced off-the-shelf mediation tool from these international companies can be helpful. Another way to improve a telco’s BSS/OSS systems is to decrease the number of different systems in their infrastructure to cut down on errors due to poor systems integration. For example, Verizon’s executive director of strategy says his company currently has 18 different billing systems serving 72 lines of business but plans to bring it down to only five billing systems in the future (Wickham, 2003). Revenue Assurance Process Maturity The typical revenue assurance maturity pattern seems to place early efforts on “low-hanging fruit” (i.e. validity of interconnection fees) followed by identification and repairing root cause of leakages (i.e. data integrity and process optimization) (Finegold, 2006). This is an important note because revenue leakage is inversely related to the maturity level of a telco’s operational control infrastructure; as the control environment becomes more
  • 9. Page 9 of 21 comprehensive and preventative in nature, the potential for finding sizable revenue leakage declines (Shaw, 2003). Please see Appendix 2 for a chart that identifies the characteristics of a telco’s maturity level. In the end, a good revenue assurance system should have a broad range of applications in order to act as a flexible toolbox, capable of handling current and future needs and must support the growing requirements for commercial and financial transparency and ability to respond quickly to regulatory changes (Stanislaw, 2005). Implementation of Strategies Revenue assurance programs provide many benefits, most obviously by increasing revenues, but leakage is still accepted in the industry. The problem is that every telco is in the same boat, as Keith Willetts, chairman of TM Forum states, “operators benchmark against each other but not against Dell or Wal-Mart” (Limbach, 2006). Other reasons include the monopolistic heritage of the industry where accountability is low priority, falling margins are causing operators to try to reduce costs instead of focusing attention on revenue leakage, and are busy trying to comply with Sarbanes-Oxley that they may not see the link between it and revenue assurance (Limbach, 2006). Historically, many operators did not have a dedicated revenue assurance department or even a dedicated budget (Limbach, 2006) with reasons being that no one likes to admit to revenue collection deficiencies or fraud on their networks and many saw the revenue assurance functions as a cost centre instead of a an earnings generator (Cronin, 2004). However, today’s views of revenue assurance is more of a board level discussion than before because they can see the recovered revenue hitting the bottom line numbers much faster than by introducing a new service (Global Telecoms Business, 2007). The trend now is that there is more of an enterprise versus project approach now. Even though multi-disciplinary teams were encouraged from the beginning, many companies still viewed revenue assurance as a project by the IT department that targets a single business function without thinking about how it may other areas of the company. However, many C-suite executives are now sponsoring revenue assurance efforts and having it span the entire organization from human resources to processing as well as networking and billing (Hankins, 2004). For example, CIOS are also now more focused on corporate financial performance more on top-line, by increasing revenue, and not just bottom-line cost savings (Karpinski, 2008) so they will work to ensure the BSS/OSS systems are functioning properly. Challenges Facing Revenue Assurance Carriers are not just the telephone company anymore but a communications company (Hutton, 2004). With data of multiple types, in various formats, and including various third party content (such as ringtones and games), crossing a variety of disparate platforms, BSS/OSS and operating systems, it is very difficult for telcos to converge it all into one form (Aginsky, 2006). In order for these next generation providers who deliver voice, video, data, and internet, to properly and reliably bill customers (Hill, 2006), revenue assurance is required. Some specific issues related to these challenges are discussed in the following.
  • 10. Page 10 of 21 IP-Based Services The rapid development of broadband makes revenue assurance even more important now. This is the largest growth area for every telecom operators since it includes services such as VoIP (please see Appendix 3 for specific VoIP issues) and online gaming, which use data packets or IPDRs and not CDRs (Global Telecoms Business, 2007). CDRs are largely homogenous and standardized while IPDR usage records have more complex elements such as transport medium, data volume, packet originator, destination and quality of service metrics (Levine, 2005). This makes it more difficult to track and bill, especially for incumbents who built their entire billing and accounting infrastructure around circuit-switched voice calls and because many CDR concepts are irrelevant in the IP world (Vasquez, 1999). Telcos will need sophisticated mediation tools such as the architecture called IP Multimedia Subsystem (IMS). IMS can unify the networks of the future and is designed to bring all services (voice, video, and data) under one IP based delivery platform and enable precise control over service delivery (Milner, 2006). With IP based networks and internet based services, telcos will also have to face additional threats such as hacking, denial of service attacks, spam and viruses, worms and Trojans (Johnson, 2002) and provide for mitigating controls to prevent their networks from going down. Billing Complexities Not only must a telco be able to track usage, but they must also juggle complex billing rules around individual prices (Levine, 2005). The speed of new technology and marketing does not afford time for processes to improve and keep up with new and pricing promotions (Hankins, 2004). In the past, companies would offer two new services per year but now it is more like ten new services launcher per month (Nairn, 2004) and many operators offered picture messaging for free because they could not bill for it (Tulloch, 2003). An example of further complexities in billing for price promotions is when bundling different services together, there is a sophisticated pricing schemes such as a discounts sliding scale based on how many services are subscribed to (Wilson, 2005). Bundling is complicated by the multiple billing systems and provides more opportunities for losses if a telco’s BSS/OSS systems cannot properly bill for services rendered (Hankins, 2004). In order to properly bill for services, telcos must ensure that their billing systems are integrated. For example, consolidated or aggregated billing is rarely complete because it is difficult to reduce the weak links in a provider’s fragmented systems environment. Telcos must also work at integrating their product-oriented legacy systems with new customer-oriented systems (Lombardi, 2000); because pricing regimes are very complex nowadays, they must manage the risk of overcharging customers which if exposed can be very damaging to reputation (Lee, 2007). Revenue assurance processes have usually been centered around products but now have a customer focus whereby their satisfaction is very important to companies now. If customers can be kept satisfied, a telco can reduce their churn rates, lost of future revenue and customer acquisition costs (Hankins, 2004). Billing systems that are customizable will become competitive tools, enabling service providers to react more rapidly to changing market and technology conditions in building new service bundles and getting them into the network quickly (Wilson, 2005).
  • 11. Page 11 of 21 Interconnection Arrangements As business models become more complicated, so do interconnection arrangements. This includes roaming agreements and third party content provider contracts. With regards to third party content providers, who provide services such as ringtones and music downloads, telcos can lose revenues when they cannot collect revenue from the customer but still have to pay content provider for their services (Lucas, 2004). The potential for leakage increases exponentially with proliferation of content offerings, the number of suppliers, different arrangements and rapidly changing products. Reconciliation of data is important because as data volumes increase, the risk of inaccuracy increases as well (Global Telecoms Business, 2006). Content owners also need quality management at the BSS/OSS network level because if their content is delivered defective to customers, their reputation is damaged as well. They will also seek more transparent reporting regarding information such as subscriber uptake and impact of cross-platform marketing (Finegold, 2006). Revenue assurance products are required in order to ensure that a telco’s revenue stream is properly disaggregated so that the amount belonging to the telco and the amount owed to each third party content provider is allocated properly. Problems occur for roaming contracts when international calls are made on the network and interconnection fees are paid but that carrier does not actually have a roaming agreement with roamer’s home network and so there is no way to recover the revenue for those calls (Wieland, 2005). Roaming revenue (about 10% of total operator revenue) is very difficult to manage due to constant changes of contracts between countries, the high volume of data traffic and the complexity of information transfer. However, the roaming business processes must be accurate and up-to-date in order to protect roaming margins, which are already lowered by intense competition (Ferrerira, 2006). Another problem that occurs with mobile networks involves prepaid cards because credit deductions are not always done in real-time and customer can continue using the card even after they have expired. Revenue assurance products should be able to address these issues in the future as well. A key question many telcos are asking themselves is whether they should focus their revenue assurance activities on their biggest current market (voice) or on growth area (IP-based content) which will generate greater revenues in the future. BSS/OSS systems need to be able to reconcile information such as IP address, network topology, data packets with billing schemes, pricing tables and information about customers. If flexible revenue assurance procedures are not implemented now, it will be challenging to retro-fit them once problems occur (Global Telecoms Business, 2007). The last section of this paper will discuss the future of revenue assurance. Future of Revenue Assurance The telecom industry is constantly changing making it more difficult to perform revenue assurance. However, there are new developments such as the “revenue operations center” (ROC) for the CFO which is akin to the network operations center to the CTO (Burkitt-Gray, 2006), IMS, which was described earlier, and key performance indicators which will assist in stopping revenue leakage.
  • 12. Page 12 of 21 Revenue Operations Center It is not a product but a concept where different software solutions come together along with the people, processes and hardware to form a facility whereby revenue integrity can be ensured through continually automated tracking of KPIs (Milner, 2006). It can allow the telco to address abnormalities, process throughput problems, and revenue leakage before they impact profit (Nicholson, 2008). The drive behind ROC is its focus on financial performance versus the network and could show the impact of different departments on a product thereby tracking operational efficiency across the entire organization, not just department by department. ROC can monitor functions and resources in a company’s control and also those that are included in the supply chain, such as content providers and other third party resources (Gerwig, 2008). Revenue assurance used to happen after the event but now, given the competitive landscape and tight margins, it needs to be as real-time and proactive as possible (Aginsky, 2006) which is where the ROC fits in the picture. Please refer to Appendix 4 for more details on the ROC concept. Key Performance Indicators Due to the TM Forum, some operators have started benchmarking. When it used to be that no one wanted to share their leakage information, now an industry standard can be specified (Global Telecoms Business, 2007). This standardization of measuring leakage required because operators measure different ways. There are two types of KPIs, the business ones such as average revenue per bill cycle and trending of bill revenue per geographical region, and operational ones such as quality of service and CDR/IPDR volume tracking (Hankins, 2004). The TM Forum requires corporate membership but once joined, a full list of KPIs can be assessed on their site. Revenue Assurance Market As ownership of services move from operators to third parties, the telco will become the medium whereby these services are provided to the customers. Operators will spend less time on the development of products and more time on the development of the infrastructure to support those products. This new generation of networks means that operators are now just a bridge to all these services which means very low profit margins. This ensures that revenue assurance function is going to grow ever more important (Global Telecoms Business, 2007). As operators realize the value of a more holistic, enterprise-wide approach to revenue assurance, they are looking for integrated platforms and frameworks which include not only software but also services that identify and resolve problems and modify processes to minimize further leaks. Until recently, vendors offered only single- purpose tools that solved an operator’s specific problem but with the advent of the ROC, it is predicted that once the market stabilizes, takeovers will occur in the highly fragmented market, and vendors will be able to provide more comprehensive solutions for their clients (Levine, 2005). Conclusion Revenue leakage will continue to increase due to the dynamic telecom environment; however, if companies can implement a successful revenue assurance program, any revenues found internally will have an immediate
  • 13. Page 13 of 21 impact on bottom line numbers. If not, telcos will be throwing away shareholders’ money and investors will price this risk into valuations or will move elsewhere. Operators should make sure they are setting the right, flexible technology to cope with current and future business and technological requirements in order to compete and survive into the future.
  • 14. Page 14 of 21 Appendix 1 – List of Revenue Assurance Providers The auditor of a telecom company should be aware of the various vendors that their client may engage. This list is taken directly from the Billing & OSS World directory of revenue assurance providers. Please refer to their website at BillingWorld.com for more details. Revenue Assurance Providers Business intelligence Compliance monitoring Cost management Risk management Accenture Alliance Telecom Solutions BusinessFusion Inc. Comarch Information Technology CSG Systems DataZA System International Ltd. Element Customer Care ENABIL Solutions Equinox Information Systems Focus On Telecom Omniware Solutions Inc. SDD Subex Inc. Tekno Telecom LLC Vertek Accenture Comarch Information Technology DataZA System International Ltd. Element Customer Care Focus On Telecom Omniware Solutions Inc. Subex Inc. Tekno Telecom LLC Vertek Accenture Advanced Software Concepts (ASC) BusinessFusion Inc. Comarch Information Technology DataZA System International Ltd. DCA Services Inc. Equinox Information Systems Focus On Telecom Omniware Solutions Inc. SDD Subex Inc. TTI Telecom Vertek XINTEC SA Accenture Advanced Software Concepts (ASC) BusinessFusion Inc. Comarch Information Technology DataZA System International Ltd. Element Customer Care ENABIL Solutions Focus On Telecom Omniware Solutions Inc. Subex Inc. Vertek Credit monitoring Fraud Interconnect billing Sarbanes-Oxley compliance Accenture BusinessFusion Inc. DataZA System International Ltd. Element Customer Care Focus On Telecom Fusion BPO Services Inc. Omniware Solutions Inc. Subex Inc. Vertek XINTEC SA Accenture Alliance Telecom Solutions Comarch Information Technology Comptel Corp. DataZA System International Ltd. ENABIL Solutions Equinox Information Systems Focus On Telecom Omniware Solutions Inc. SDD Subex Inc. Tekno Telecom LLC XINTEC SA Accenture Alliance Telecom Solutions BusinessFusion Inc. Cerillion Technologies Comarch Information Technology Communications Data Group Comptel Corp. CustomCall Data Systems DataZA System International Ltd. Element Customer Care ENABIL Solutions Equinox Information Systems Focus On Telecom FTS - Formula Telecom Solutions Ltd. Intec Billing Omniware Solutions Inc. SDD Subex Inc. SunTec Business Solutions Suntech Tekno Telecom LLC Vertek Accenture BusinessFusion Inc. Comptel Corp. DataZA System International Ltd. Element Customer Care Focus On Telecom FTS - Formula Telecom Solutions Ltd. Intec Billing MetraTech Omniware Solutions Inc. Subex Inc. Tekno Telecom LLC Vertek
  • 15. Page 15 of 21 Appendix 2 – Revenue Assurance Maturity Levels Revenue Assurance Maturity Models (RAMMs) are useful as evaluative tools and can provide a company the basis on how to set up their own revenue assurance program. The table below lists the details of the five phases of the metamorphosis of a typical revenue assurance lifecycle. The practitioner can perform an evaluation of their client’s revenue assurance maturity level and set audit risk accordingly. The table is taken directly from the Billing & OSS World article, “Making Revenue Assurance Maturity Models Practical.” Please refer to this article for more information. The Five Stages of Maturity Level 0 No revenue assurance practices, processes, policies or tools are in place. Level 1 Basic revenue recovery consists of ad hoc, manual audits, generally driven by a small, voluntary team or by individual efforts. Some revenue is recovered. Level 2 Basic project and process management involving repeatable tasks is implemented. Point solutions are installed to detect and correct certain types of revenue leakage. Business rules and audits are defined. A project-level team is in place, but project prioritization remains best-guess. Level 3 Revenue recovery shifts to revenue assurance, where greater automation is introduced to move from auditing to continuous monitoring of revenue streams. Business rules for detecting and correcting leakage are implemented systematically into existing processes. Teams are focused more on analysis and correction than simple identification, driven by technology tools that help prioritize areas of greatest leakage and potential ROI. Business analytics and dashboards are implemented to quantify and forecast revenue assurance performance. Level 4 Leakage is quantitatively understood and controlled. Formal processes and controls are in place. Financial streams undergo regular, systematic analysis. Tools are expanded across the enterprise. An expert revenue assurance team is in place, and it educates and builds participation with other product and functional groups across the enterprise. Operational assurance metrics and dashboards track root causes of leakage, rather than just leakage itself. Level 5 Revenue assurance shifts to revenue management. Revenue assurance practices, processes and tools are analyzed for performance and continuous improvement. The focus is on cross-functional, cross- organizational efficiencies and communication. Tools and processes are enhanced to identify potential problems and take preventive action. All new services are designed with revenue assurance controls built in or factored in.
  • 16. Page 16 of 21 Appendix 3 – Specific VoIP Issues VoIP services produce many revenue assurance issues for telecom companies. Practitioners should be aware of these issues when they are auditing their client. The following is a table of the main issues as summarized from the Billing & OSS World article, “Top 10 Revenue Assurance Problems with VoIP.” Please refer to this article for more information. Top 10 Revenue Assurance Problems with VoIP 1 It's More Than Just Switch-to-Bill For VoIP, the RA model will have to be network-to-bill; scattered network elements need to be collected and into a next generation, more complex mediation systems, rating engine and billing system. 2 Order-to-Network management A bundled package is ordered and delivered; however, some services weren't received by the customer so they are not willing to pay that portion of the fee. How does the network know what was missing and how does collections account for this? 3 Order-to-collections Also known as fraud and credit management; user authentication in a VoIP mobile setting is weak plus user self-provisioning, unauthorized Wi-Fi access. 4 Access charges "VoIP currently does not pay access charges to terminating carriers; but once this loophole is closed, the terminating carrier will charge at the highest rate, as is done today for terminating traffic with calls that lack origination information. A future potential for fraud is that if a VoIP phone is cloned and calls made, the company will have no revenue but a large access charges bill.” 5 Taxes VoIP is not currently taxed but once the government starts, a RA issues arises because the provider won't be able to accurately determine whether traffic is intrastate or interstate because of the VoIP non-geographically based phone number. It is a lose-lose situation if taxes cannot be calculated correctly (i.e. the government will be after the company if undercharging but if overcharging, customers may launch a class-action lawsuit). 6 IP-based content trading partners If end users do not pay for the services (either intentional or because they didn't order it or the QoS was poor), the company still has to pay the content provider and incur the expenses from customer service calls and collection calls. 7 Enterprise market Large billings with corporate customers will abound with the proliferation of IP- based services. 8 Sarbanes-Oxley CEOs/CFOs must certify to the integrity of internal controls (i.e. the billing systems); RA will become an issue if companies start charging VoIP services by usage instead of today's flat-fees, auditing the elements from network-to-bill will be difficult and expensive. 9 Regulation VoIP regulation uncertainties related to E-911 and CALEA mandates. 10 Rush to market Revenue assurance problems are more difficult to solve after than before a new product is launched.
  • 17. Page 17 of 21 Appendix 4 – The Revenue Operations Center The revenue operations center brings together different software solutions along with the people, processes and hardware to form a facility whereby revenue integrity can be ensured through continually automated tracking of KPIs. Auditors will have to obtain a section 5970 report from these third party vendors. The table below details the various components of a typical center. The table is taken directly from the Billing & OSS World article “ROC On: Creating the Revenue Operations Center to Maximize Profit.” Please refer to this article for more information. ROC consists of the following key functional areas: Fraud management Monitor, detect, and correct unauthorized consumption of resources. Risk Management Decreasing risk of subscriber default and other A/R issues. Service Provisioning & Inventory Assurance Ensuring services are provisioned as required to meet subscriber commitments, that fulfillment processes are accurate and efficient, and that resources are consumed and documented with greater precision. Usage Integrity Assurance Employing revenue assurance techniques to ensure service usage is properly accounted for and reflected in a range of planning and operations management processes. Billing Assurance Ensuring billing accurately represents all expected revenue and can be tied to resource utilization to maximize the monetization of network resources. Margin Management Tracking transaction-based costs and revenue to understand overall business performance of individual products and services in order to identify other margin- affecting and cost issues, such as out-payments, SLA penalty payments, customer rebates, bad debt write-offs, etc. Tracking and Analysis of Data Collected This framework must also have functions that can track and trend the data collected, calculate thresholds and targets, mine for profitability profiles and KPI analysis and tracking, and reporting and dashboard abilities tailored to the particular users' needs.
  • 18. Page 18 of 21 Glossary Broadband - refers to data being transmitted where multiple pieces of data are sent simultaneously over a telephone or cable line. BSS (Business Support Systems) - this term refers to dealings with customers with activities such as taking orders, processing bills, and collecting payments. Bundling - a price discount promotion which prices together a number of different services which if subscribed to separately would attract a higher price. C-suite - This refers to the corporate titles conferred on individuals identifying their function within the organization. Common titles are Chief Executive Officer (CEO) and Chief Financial Officer (CFO). CDRs - records of telephone exchanges made on the network, including call start time, duration of the call, and receiving and calling number along with other information required for the company to properly bill the customer. Churning - describes customer loss; the different types of churn are voluntary, involuntary and internal. Interconnection - the physical linking of a carrier’s network with that of other carriers in order to exchange traffic. IPDRs (IP Detail Records) - provides information about IP-based service usage that can be used by the BSS/OSS billing systems to charge customers for services rendered. IMS (IP Multimedia Subsystem) - architectural framework for delivering IP multimedia to mobile users. KPIs (Key Performance Indicators) - financial and non-financial metrics used to help an organization define and measure progress toward organizational goals. Mediation systems - converts CDRs and IPDRs into a data type that is usable by the billing systems. OSS (Operations Support Systems) - computer systems used by telecommunications service providers to describes functions dealing with the telecom network itself, such as configuring network components and managing faults. Phantom traffic - unidentifiable and un-billable network traffic sent to a carrier that lacks information to identify the originating carrier. SubexAzure – it is now called just Subex; it is an information technology company providing BSS/OSS and fraud management solutions for telecom operators. They commission an annual revenue leakage survey called “Global Operator Attitudes to Revenue Management Survey.” Test calls - is a revenue assurance technique that replicates events on a teleco’s network to identify potential revenue leakage areas. TM (TeleManagement) Forum – this is the telecommunications industry’s association of web and media companies focused on end-end service management.
  • 19. Page 19 of 21 Trending – a technique used for comparing summary value of data element over specified period of time. Amount of change is statistically evaluated to determine normal ranges with abnormal results scrutinized for possible process or content errors. VoIP (Voice-over Internet Protocol) - a protocol optimized for the transmission of voice through the internet.
  • 20. Page 20 of 21 Bibliography "Azure service bureau provides hired billing help." Telecommunications Americas. 40 (2006). “Fraud at the heart of telecoms.” Global Telecoms Business. July (2004). “How to avoid the double-dip risk.” Global Telecoms Business. 15 May (2007). “Losing revenue by the packet.” Global Telecoms Business. Apr. (2004). “New generation assurance: revenue assurance roundtable discussion.” Global Telecoms Business. 1 Nov. (2007). “Revenue assurance: improving processes tops up the bottomline.” Global Telecoms Business. 1 Sept. (2006). "Revenue Assurance KPI Metrics Workbook." TM Forum. 7 Feb. 2008. <http://www.tmforum.org/page33544.aspx> 11 June 2008. “Revenue leakage rises among global telecom players.” SubexWorld.com. 17 Sept. 2007. <www.subexworld.com/downloads/survey2007/release.pdf> 11 June 2008. “You can trust the operators too much.” Global Telecoms Business. 9 Nov. (2006). Aginsky, Alon. “Uncovering revenue leakage problems in broadband and data services.” Billing & OSS World. 1 Aug. 2006. <www.Billingworld.com/articles/feature/Uncovering-Revenue-Leakage-Problems-in.html> 11 June 2008. Baker, Dan. “Latest mediation tools can boost profitability for wireless operators.” America’s Network. (2005). Browning, Randy. "Revenue to the max." Optimize. (2003). Burkitt-Gray, Alan. “Towards the revenue operations centre.” Global Telecoms Business. May (2006). Cronin, John. “Rest assured on revenue.” Telecommunications International. 38 (2004). Dell, Stephanie. “Phantom Menace Lingers.” Telephony. (2006). Dunetz, Kevin. “Telecom Bills: An Untapped Gold Mine.” Network Magazine. 20 (2005). Evans, John. “Revenue Assurance in the Communications Sector.” Credit Control. 25 (2004). Ferrerira, Ines. “Revenue Leakage in the Telecoms Market.” Credit Control. 27 (2006). Finegold, Edward J. “Revenue assurance takes on a new name.” Billing & OSS World. 1 Sept. 2006. <www.Billingworld.com/articles/feature/Revenue-Assurance-Takes-on-a-New-Name.html> 11 June 2008. Finegold, Edward J. “Making revenue assurance maturity models practical.” Billing & OSS World. 1 July 2006. <www.Billingworld.com/articles/feature/Making-Revenue-Assurance-Maturity-Models.html> 11 June 2008.
  • 21. Page 21 of 21 Gerwig, Kate. “Next-gen OSS may include revenue operations centers (ROCs) to monitor business processes.” 4 Apr. 2008. <http://searchtelecom.techtarget.com/news/interview/0,289202,sid103_gci1308428,00.html> 11 June 2008. Guerra, John L. ‘Mediation systems halt revenue leakage.” Billing & OSS World. 1 Apr. 2005. <www.Billingworld.com/articles/feature/mediation-systems-halt-revenue-leakage.html> 11 June 2008. Gundavelli, Veena. “Deductions management.” Business Credit. 106 (2004). Hankins, Michelle L. “Revenue assurance trends: Providers get down to business.” Billing & OSS World. 1 May 2004. <www.Billingworld.com/articles/feature/Revenue-Assurance-Trends-Providers-Get-Down.html> 11 June 2008. Hill, Kelly. “Bundling brings opportunities for more revenue leakage.” RCR Wireless News. 11 Sept. 2006. Hill, Kelly. “Fraud: A total drag (on revenues).” RCR Wireless News. 1 Oct. 2007. Hutton, Roger. “Revving up revenue streams.” Rural telecommunications. 23 (2004). Ibbett, Geoff. “Usage data integrity and revenue assurance.” Credit Control. 24 (2003). Jacobs, Riaan. “Telecommunications fraud.” Dimensiondata.com. <www.dimensiondata.com/NR/rdonlyres/ 85DC1F7A-0B17-4A87-84F9-328ACF33A670/409/TelecommunicationsFraudWhitePaper1.pdf>. 11 June 2008. Johnson, Mark. “Revenue Assurance, Fraud & Security in 3G Telecom Services.” Journal of Economic Crime Management. 1 (2002). Karpinski, Rich. “Back office on the hot seat.” Telephony. 249 (2008). Lee, Wei Lian. “Good governance demands proper risk management, vigilance.” The Edge Malaysia. 5 July (2007). Levine, Shira. “How big is your revenue hole?” America’s Network. 1 Apr. (2003). Levine, Shira and L. Pratt. “Revenue assurance stops the leak.” Telecommunications Americas. 39 (2005). Limbach, Ian. “Failing to look after the pennies.” Financial Times. 12 July 2006. Lombardi, Rosie and D. Henderson. “Are your systems leaking revenues?” CIO Canada. 8 (2000). Lopes, Miguel. “Where revenue assurance is headed for 2006 and beyond.” Credit Control. 27 (2006). Lucas, Dr. Jerry. “10 Take-Aways from Revenue Assurance 2005.” Billing & OSS World. 1 Nov. 2005. <www.Billingworld.com/articles/feature/10-Take-Aways-from-Revenue-Assurance-2005.html> 11 June 2008. Lucas, Dr. Jerry. “Top 10 Revenue Assurance Problems with VoIP.” Billing & OSS World. 1 Nov. 2004. <www.Billingworld.com/articles/feature/Top-10-Revenue-Assurance-Problems-with-VoIP.html> 11 June 2008. Marek, Sue. “Plugging revenue leaks.” Wireless Week. 15 Aug. (2004).
  • 22. Page 22 of 21 McClelland, Stephen. “Plumbing network leaks.” Telecommunications International. 37 (2003). McElligott, Tim. “Revenue leakage: Are carriers raising the white flag?” Telephony. 248 (2007). Milner, Nick. “Waste not, want not?” Telecommunications International. 40 (2006). Morisy, Michael. “Revenue assurance a critical tool for telecom success.” 13 Nov. 2007. Searchtelecom.com. <http://searchtelecom.techtarget.com/news/article/0,289142,sid103_gci1281779,00.html> 11 June 2008. Nairn, Geoff. “Operators make more out of less legacy systems.” Financial Times. 14 April 2004. Nicholson, Mark and A. Boone. “ROC On: Creating the Revenue Operations Center to Maximize Profit.” Billing & OSS World. 28 Apr. 2008. <www.Billingworld.com/articles/creating-revenue-operations-center.html> 11 June 2008. Nolle, Tom. “Service provider billing system fundamentals.” 13 July 2007. Searchtelecom.com. <http://searchtelecom.techtarget.com/tip/0,289483,sid103_gci1264196,00.html> 11 June 2008. Pratt, Lorien and N. Ruzicka. “Building back office brawn.” Telecommunications Americas. 40 (2006). Shaw, Vince and M. Ravin. “The Myth of Constant Revenue Leakage.” Billing & OSS World. 1 Sept. 2006. <http://www.billingworld.com/articles/feature/The-Myth-of-Constant-Revenue -Leakage .html> 11 June 2008. Sobol, Craig and R. Short. “Maximizing your broadband bucks.” Telecommunications Americas. 37 (2003). Srivastava, Sanjay. “Using technology to trim revenue and receivables leakage.” Financial Executive. 21 (2005). Stanislaw, Stephen. “Rest assured on IMS?” Telecommunications International. 39 (2005). Suppa, Carly. “Syndesis uploads way to revenue assurance.” Network World Canada. 13 (2003). Tulloch, James. “Plugging the gaps.” Mobile Communications International. 106 (2003). Vasquez, Oscar. “Billing for IP services remains a challenge.” Business Communications Review. 29 (1999). Walter, Derek. “From porous to profitable.” Telephony. 244 (2003). Wickham, Rhonda. “Pressures force closer look at revenue leakage.” Wireless Week. 1 July 2003. Wieland, Ken. “Opening doors to profit.” Telecommunications International. 38 (2004). Wieland, Ken. “Plumbers required.” Telecommunications International. 39 (2005). Wieland, Ken. “Report: Revenue leaks continue.” Telecommunications Americas. 38 (2004). Wieland, Ken. “The last taboo?” Telecommunications International. 38 (2004). Wieland, Ken. “US$170 bn “wasted” this year, says Azure.” Telecommunications International. 39 (2005). Wilson, Carol. “VoIP poses billing challenge.” Telephony. 246 (2005).