This document outlines best practices for SMS, MMS, and free-to-end-user short code programs to provide the best customer experience. It lays out universal compliance principles around choice and consent, customer care, program content, privacy, and record keeping. It also describes compliance standards and audit procedures for different types of short code programs including single-message, recurring-message, machine-to-machine, donation, and multimedia programs. Carriers have reviewed and accepted these guidelines but reserve the right to implement additional requirements.
This document provides an overview and analysis of the global lecture capture software market in 2020. It discusses key drivers and restraints, market segments by type (professional, training, integration & maintenance) and end user (educational institutions, corporate). It analyzes the market size and growth rates by region (North America, Europe, Asia Pacific, Latin America, Middle East & Africa). It also profiles major players in the industry and provides forecasts for the global and regional market from 2020-2027. The document contains 21 chapters with information on factors influencing the market, manufacturing costs, revenue forecasts by type and region, and analyses of the competitive landscape and growth opportunities.
Cognitive Market Research provides detailed analysis of Feed Management Software Market in our recently published report titled, "Feed Management Software Market 2020" The market study focuses on industry dynamics including driving factors to provide the key elements fueling the current market growth. The report also identifies restraints and opportunities to identify high growth segments involved in the Feed Management Software market. Key industrial factors such as macroeconomic and microeconomic factors are studied in detail with help of PESTEL analysis in order to have a holistic view of factors impacting Feed Management Software market growth across the globe. Market growth is forecasted with the help of complex algorithms such as regression analysis, sentiment analysis of end-users, etc.
Cognitive Market Research provides detailed analysis of CPAP Systems Market in our recently published report titled, "CPAP Systems Market 2020" The market study focuses on industry dynamics including driving factors to provide the key elements fueling the current market growth. The report also identifies restraints and opportunities to identify high growth segments involved in the CPAP Systems market. Key industrial factors such as macroeconomic and microeconomic factors are studied in detail with help of PESTEL analysis in order to have a holistic view of factors impacting CPAP Systems market growth across the globe. Market growth is forecasted with the help of complex algorithms such as regression analysis, sentiment analysis of end-users, etc.
Sample global aircraft navigation software market research report 2020 copyCognitive Market Research
Cognitive Market Research provides detailed analysis of Aircraft Navigation Software Market in our recently published report titled, "Aircraft Navigation Software Market 2020" The market study focuses on industry dynamics including driving factors to provide the key elements fueling the current market growth. The report also identifies restraints and opportunities to identify high growth segments involved in the Aircraft Navigation Software market. Key industrial factors such as macroeconomic and microeconomic factors are studied in detail with help of PESTEL analysis in order to have a holistic view of factors impacting Aircraft Navigation Software market growth across the globe. Market growth is forecasted with the help of complex algorithms such as regression analysis, sentiment analysis of end-users, etc.
Sign up TODAY for a FREE 30-Day Trial Membership!
http://trumpia.com/manageAccount/signup3.php?promocode=brandsocial
Make sure to add the Promo Code: BRANDSOCIAL to reap DOUBLE the benefits of a 30-Day Trial.
Social media provides businesses opportunities to connect with over 200 million active users across platforms like Facebook, Twitter, and YouTube. It allows companies to share information about their products, services, culture and values in order to build awareness, drive traffic to their websites, and enhance customer relationships. The document outlines the benefits of using different social media platforms and content types like videos, photos and blogs to engage customers and promote a business.
One of the most common questions we get here at http://www.tatango.com from brands using SMS marketing is what should they be sending their customers? We've created this free SMS marketing webinar to answer this question. Watch a recorded version of the webinar here: http://get.tatango.com/webinar-sms-advertising
If you're interested in reading more about how to create the perfect SMS promotions to send to your customers, be sure to download our free guide on this topic here: http://get.tatango.com/guide-sms-messaging
Also, check out our free template to sending perfect SMS promotions here: http://get.tatango.com/sms-coupon-template
The document provides guidance on supplier development programs that can be implemented through industrial subcontracting and partnership exchanges (SPXs). It outlines the roles of the key parties involved - SPXs, main contracting enterprises, subcontractors, and external experts. SPXs are well-positioned to facilitate supplier development programs by identifying sectors for improvement, formulating work plans, selecting participants, investigating needs, and encouraging cooperation among members. The document then describes a 10-stage process for implementing such programs and the objectives they aim to achieve, such as cost control, quality management, and environmental standards.
This document provides an overview and analysis of the global lecture capture software market in 2020. It discusses key drivers and restraints, market segments by type (professional, training, integration & maintenance) and end user (educational institutions, corporate). It analyzes the market size and growth rates by region (North America, Europe, Asia Pacific, Latin America, Middle East & Africa). It also profiles major players in the industry and provides forecasts for the global and regional market from 2020-2027. The document contains 21 chapters with information on factors influencing the market, manufacturing costs, revenue forecasts by type and region, and analyses of the competitive landscape and growth opportunities.
Cognitive Market Research provides detailed analysis of Feed Management Software Market in our recently published report titled, "Feed Management Software Market 2020" The market study focuses on industry dynamics including driving factors to provide the key elements fueling the current market growth. The report also identifies restraints and opportunities to identify high growth segments involved in the Feed Management Software market. Key industrial factors such as macroeconomic and microeconomic factors are studied in detail with help of PESTEL analysis in order to have a holistic view of factors impacting Feed Management Software market growth across the globe. Market growth is forecasted with the help of complex algorithms such as regression analysis, sentiment analysis of end-users, etc.
Cognitive Market Research provides detailed analysis of CPAP Systems Market in our recently published report titled, "CPAP Systems Market 2020" The market study focuses on industry dynamics including driving factors to provide the key elements fueling the current market growth. The report also identifies restraints and opportunities to identify high growth segments involved in the CPAP Systems market. Key industrial factors such as macroeconomic and microeconomic factors are studied in detail with help of PESTEL analysis in order to have a holistic view of factors impacting CPAP Systems market growth across the globe. Market growth is forecasted with the help of complex algorithms such as regression analysis, sentiment analysis of end-users, etc.
Sample global aircraft navigation software market research report 2020 copyCognitive Market Research
Cognitive Market Research provides detailed analysis of Aircraft Navigation Software Market in our recently published report titled, "Aircraft Navigation Software Market 2020" The market study focuses on industry dynamics including driving factors to provide the key elements fueling the current market growth. The report also identifies restraints and opportunities to identify high growth segments involved in the Aircraft Navigation Software market. Key industrial factors such as macroeconomic and microeconomic factors are studied in detail with help of PESTEL analysis in order to have a holistic view of factors impacting Aircraft Navigation Software market growth across the globe. Market growth is forecasted with the help of complex algorithms such as regression analysis, sentiment analysis of end-users, etc.
Sign up TODAY for a FREE 30-Day Trial Membership!
http://trumpia.com/manageAccount/signup3.php?promocode=brandsocial
Make sure to add the Promo Code: BRANDSOCIAL to reap DOUBLE the benefits of a 30-Day Trial.
Social media provides businesses opportunities to connect with over 200 million active users across platforms like Facebook, Twitter, and YouTube. It allows companies to share information about their products, services, culture and values in order to build awareness, drive traffic to their websites, and enhance customer relationships. The document outlines the benefits of using different social media platforms and content types like videos, photos and blogs to engage customers and promote a business.
One of the most common questions we get here at http://www.tatango.com from brands using SMS marketing is what should they be sending their customers? We've created this free SMS marketing webinar to answer this question. Watch a recorded version of the webinar here: http://get.tatango.com/webinar-sms-advertising
If you're interested in reading more about how to create the perfect SMS promotions to send to your customers, be sure to download our free guide on this topic here: http://get.tatango.com/guide-sms-messaging
Also, check out our free template to sending perfect SMS promotions here: http://get.tatango.com/sms-coupon-template
The document provides guidance on supplier development programs that can be implemented through industrial subcontracting and partnership exchanges (SPXs). It outlines the roles of the key parties involved - SPXs, main contracting enterprises, subcontractors, and external experts. SPXs are well-positioned to facilitate supplier development programs by identifying sectors for improvement, formulating work plans, selecting participants, investigating needs, and encouraging cooperation among members. The document then describes a 10-stage process for implementing such programs and the objectives they aim to achieve, such as cost control, quality management, and environmental standards.
This document provides a guide for supplier development programs implemented through industrial subcontracting and partnership exchanges (SPXs). It outlines the roles of the various parties involved, including the SPXs, main contracting enterprises, subcontractors, and external experts. The guide also describes a 10-stage process for applying a supplier development program and lists objectives such as cost control, pricing policy, technological improvements, quality management, and environmental practices. Annexes provide examples of existing supplier development programs.
Vss wht paper sustainable sox c ompliance made easyLaurie LeBlanc
The document discusses sustainable compliance with the Sarbanes-Oxley Act (SOX) using automated tools. It provides an overview of SOX and its impact on IT. It then reviews past compliance efforts and new guidance from the SEC and PCAOB aimed at reducing costs. This includes allowing benchmarking of automated controls to reduce unnecessary testing. The document promotes achieving sustainable compliance by integrating controls and using technology for continuous monitoring and improvement.
0859 - Update White Paper Choosing Linux for Medical Devices_NO_cover Ken Herold
This document provides a table of contents for a white paper discussing the advantages and challenges of using Linux in medical devices. The table of contents lists eight sections that will be covered in the white paper, including executive summary, advantages of open source Linux, regulatory perspectives, cybersecurity concerns, security best practices, intellectual property assurance, implementation support options, and conclusions.
The document provides an overview of the California Solar Initiative (CSI) Program, which is administered by the California Public Utilities Commission. The CSI Program has a budget of $2.167 billion over 10 years to install 1,940 megawatts of solar capacity by 2016. This includes incentives for photovoltaic and other solar electric technologies through the general market CSI Program and dedicated funding for low-income residential incentives. The CSI Program Handbook outlines the requirements for receiving incentives for solar energy system projects in Pacific Gas and Electric, Southern California Edison, and San Diego Gas & Electric service territories.
The document establishes mandatory and advisory security controls for SWIFT users to help secure their local environments and foster a more secure financial ecosystem. The mandatory controls establish a security baseline that all users must implement on their local SWIFT infrastructure. Advisory controls are good security practices that SWIFT recommends users implement. The controls are designed to meet three objectives: secure the environment, limit and monitor access, and detect and respond to issues. The controls are intended to align with industry standards and are based on cyber threat intelligence analysis.
MMA mobile advertising white paper englishBrian Crotty
This document provides guidelines for mobile advertising across different mobile media channels including mobile web, text messaging, multimedia messaging, mobile video/TV, and mobile applications. It defines common advertising units for each channel, provides specifications for ad sizes and technical requirements, and recommends best practices for creative design and ad delivery. The guidelines are intended to standardize mobile advertising practices and ensure ads are effective and provide a good user experience across different devices.
Guidelines For The Issuance And Management Of EV Code Signing CertificateCodeSigningStore
The Guidelines for the Issuance and Management of Extended Validation Code Signing Certificates present criteria established by the CA/Browser Forum for use by certification authorities when issuing, maintaining, and revoking certain digital certificates for use in signing digital objects.
Teams documents 1_equal-assurance-assurance-charter-issue-12EqulAssuranceThailan
This document outlines the Equal Assurance Management System (TEAMS), which includes requirements for providing assurance and certification services. TEAMS is comprised of a series of charters and other documents, with the central component being an online data operating system called Qdos. Partners can access TEAMS through a partner agreement to provide assurance services and maintain accreditation. TEAMS defines the organizational components of Equal Assurance, Partners, Practices, and Clients and how they interact through ownership, delivery, and support of assurance programs. Observance of the TEAMS requirements is intended to ensure competent and impartial certification that facilitates recognition and acceptance of certifications.
Microsoft Word - Quocirca - Managed Hosting in Europe - June 2009webhostingguy
Managed hosting describes the provision of ready-to-use IT infrastructure by providers to host customer applications. While traditionally each customer had dedicated servers, virtualization now allows infrastructure sharing between customers. The report analyzes the European managed hosting market, identifying four main provider types and reviewing major suppliers. It finds that while charging models vary, services typically adhere to standards for security and management and are driven by demand for Windows and Linux infrastructure.
Emerging patent thickets and standards in the medical devices and telehealth ...Quentin Tannock
The UK IP Office commissioned research with CambridgeIP to examine some of the
questions raised by the UK government's Hargreaves Review of IP and Growth. The study focuses on two broad issues: a) the
effects of patent thickets on innovation and market dynamics; and b) the role of technology
standards and patent pools as a possible response to the emergence of patent thickets. Our
research was based on a case study of the emerging space of Telehealth, and particularly
on the use of patents for wireless-‐enabled medical devices. Our methodology used a
combination of patent landscaping around 5 technology areas, interviews with industry
experts, and scholarly literature review.
Whitepaper MEDINA Continuous Life Cycle Management of Cloud Security Certific...MEDINA
This document provides an overview of the MEDINA framework for continuous life cycle management of cloud security certifications. It describes the key components, including the Continuous Certification Evaluation component that aggregates assessment results, the Risk Assessment and Optimization Framework that evaluates risk, and the Automated Certificate Life Cycle Manager that determines certificate status and publishes certificates using a self-sovereign identity system. The framework aims to enable automated, continuous assessment and management of certifications to address the dynamic nature of cloud environments.
This document provides guidance on failure mode and effects analyses (FMEAs) for the marine industry. It discusses what an FMEA is, its objectives, and when they are carried out. FMEAs are used to identify potential failure modes and their effects on systems to improve safety. They follow standards from classification societies. The document outlines the FMEA process, including defining the system boundaries, identifying failure modes and detection/correction methods. It provides information on vessel audits, testing, and incorporating additional analyses like criticality and risk assessments to strengthen FMEAs. The goal is to identify unacceptable failure modes and ensure corrective actions are implemented to improve safety.
This document provides guidance on establishing antimicrobial stewardship (AMS) programs in health care facilities in low- and middle-income countries. It outlines the core elements needed for national and facility-level AMS programs, including structures, planning, interventions, assessment, and education/training. The document emphasizes that AMS is an integral part of health systems and aims to optimize antibiotic use and slow the emergence of antibiotic resistance through multidisciplinary collaboration at all levels.
This document provides an overview and user guide for the Open Payments system. It explains that Open Payments is a national disclosure program mandated by the Affordable Care Act to increase transparency of financial relationships between healthcare industry and providers. Applicable manufacturers, GPOs, physicians, and teaching hospitals participate by registering and reporting or reviewing certain payments and ownership interests. The guide outlines registration processes, data submission requirements, and review/dispute functions to help users comply with Open Payments reporting.
This document summarizes a whitepaper from the Interactive Advertising Bureau (IAB) that evaluates alternative approaches to cookies for managing user data and privacy across devices. It defines guiding principles for key stakeholders and assesses solution classes based on how well they meet stakeholder needs. The classes include server-issued state, device-inferred state, client-generated state, network-inserted state, and cloud-synchronized state. The paper aims to educate readers and establish principles for measuring current and future state management mechanisms.
This document provides an overview and user guide for the Open Payments (Sunshine Act) program. It explains that Open Payments promotes transparency in financial relationships between healthcare industry and providers by publishing payment data. Applicable manufacturers, GPOs, physicians, and teaching hospitals participate by registering, reporting applicable payment data, and reviewing/disputing data. Key deadlines and a two-phase registration/reporting process applied to the first reporting year of 2013. The guide details each step of the Open Payments process.
British Water Guide: Monitoring Products and Services Ken Ogura
This is the 1st edition of British Water’s ‘Guide to Monitoring Products and Services’. The guide has benefited from consultation and input from designers, manufacturers, practitioners and regulators of environmental and water solutions.
Blue Dwarf is seeking funding to develop products focused on the emerging Application Service Provider (ASP) and wireless internet markets. They are developing a personalized internet portal called AnytimeFromAnywhere.com for consumers and an enterprise solution called E2B@YourCompany. These products will allow users to access applications and services from any device. Blue Dwarf sees significant opportunity in combining ASP hosted applications with wireless access as mobile users will increasingly access services remotely. They believe their technology and products are well positioned to capitalize on the trends of outsourcing IT services to ASPs and the growth of wireless internet access.
If you are looking to setup an text message marketing campaign, then it's important that you understand the Telephone Consumer Protection Act (TCPA) or you could face some hefty fines for SMS spam. Watch a recorded version of the webinar here: http://get.tatango.com/webinar-tcpa-sms-marketing-laws
Want to learn more about how the TCPA impacts text message marketing, download our guide to TCPA SMS marketing here: http://get.tatango.com/guide-understanding-tcpa-compliance
Also, check out our free template to TCPA text message marketing compliance here: http://get.tatango.com/blueprint-tcpa-ctia-template
What You'll Learn In This Webinar:
* What is a keyword?
* How to select keywords that are relevant, simple and short.
* Understanding and planning for the autocorrect.
* What is typoglycemia, and why you should care.
* A dozen great keyword examples, and why they're so great!
More Related Content
Similar to Ctia Short Code Compliance Handbook v1.4.2
This document provides a guide for supplier development programs implemented through industrial subcontracting and partnership exchanges (SPXs). It outlines the roles of the various parties involved, including the SPXs, main contracting enterprises, subcontractors, and external experts. The guide also describes a 10-stage process for applying a supplier development program and lists objectives such as cost control, pricing policy, technological improvements, quality management, and environmental practices. Annexes provide examples of existing supplier development programs.
Vss wht paper sustainable sox c ompliance made easyLaurie LeBlanc
The document discusses sustainable compliance with the Sarbanes-Oxley Act (SOX) using automated tools. It provides an overview of SOX and its impact on IT. It then reviews past compliance efforts and new guidance from the SEC and PCAOB aimed at reducing costs. This includes allowing benchmarking of automated controls to reduce unnecessary testing. The document promotes achieving sustainable compliance by integrating controls and using technology for continuous monitoring and improvement.
0859 - Update White Paper Choosing Linux for Medical Devices_NO_cover Ken Herold
This document provides a table of contents for a white paper discussing the advantages and challenges of using Linux in medical devices. The table of contents lists eight sections that will be covered in the white paper, including executive summary, advantages of open source Linux, regulatory perspectives, cybersecurity concerns, security best practices, intellectual property assurance, implementation support options, and conclusions.
The document provides an overview of the California Solar Initiative (CSI) Program, which is administered by the California Public Utilities Commission. The CSI Program has a budget of $2.167 billion over 10 years to install 1,940 megawatts of solar capacity by 2016. This includes incentives for photovoltaic and other solar electric technologies through the general market CSI Program and dedicated funding for low-income residential incentives. The CSI Program Handbook outlines the requirements for receiving incentives for solar energy system projects in Pacific Gas and Electric, Southern California Edison, and San Diego Gas & Electric service territories.
The document establishes mandatory and advisory security controls for SWIFT users to help secure their local environments and foster a more secure financial ecosystem. The mandatory controls establish a security baseline that all users must implement on their local SWIFT infrastructure. Advisory controls are good security practices that SWIFT recommends users implement. The controls are designed to meet three objectives: secure the environment, limit and monitor access, and detect and respond to issues. The controls are intended to align with industry standards and are based on cyber threat intelligence analysis.
MMA mobile advertising white paper englishBrian Crotty
This document provides guidelines for mobile advertising across different mobile media channels including mobile web, text messaging, multimedia messaging, mobile video/TV, and mobile applications. It defines common advertising units for each channel, provides specifications for ad sizes and technical requirements, and recommends best practices for creative design and ad delivery. The guidelines are intended to standardize mobile advertising practices and ensure ads are effective and provide a good user experience across different devices.
Guidelines For The Issuance And Management Of EV Code Signing CertificateCodeSigningStore
The Guidelines for the Issuance and Management of Extended Validation Code Signing Certificates present criteria established by the CA/Browser Forum for use by certification authorities when issuing, maintaining, and revoking certain digital certificates for use in signing digital objects.
Teams documents 1_equal-assurance-assurance-charter-issue-12EqulAssuranceThailan
This document outlines the Equal Assurance Management System (TEAMS), which includes requirements for providing assurance and certification services. TEAMS is comprised of a series of charters and other documents, with the central component being an online data operating system called Qdos. Partners can access TEAMS through a partner agreement to provide assurance services and maintain accreditation. TEAMS defines the organizational components of Equal Assurance, Partners, Practices, and Clients and how they interact through ownership, delivery, and support of assurance programs. Observance of the TEAMS requirements is intended to ensure competent and impartial certification that facilitates recognition and acceptance of certifications.
Microsoft Word - Quocirca - Managed Hosting in Europe - June 2009webhostingguy
Managed hosting describes the provision of ready-to-use IT infrastructure by providers to host customer applications. While traditionally each customer had dedicated servers, virtualization now allows infrastructure sharing between customers. The report analyzes the European managed hosting market, identifying four main provider types and reviewing major suppliers. It finds that while charging models vary, services typically adhere to standards for security and management and are driven by demand for Windows and Linux infrastructure.
Emerging patent thickets and standards in the medical devices and telehealth ...Quentin Tannock
The UK IP Office commissioned research with CambridgeIP to examine some of the
questions raised by the UK government's Hargreaves Review of IP and Growth. The study focuses on two broad issues: a) the
effects of patent thickets on innovation and market dynamics; and b) the role of technology
standards and patent pools as a possible response to the emergence of patent thickets. Our
research was based on a case study of the emerging space of Telehealth, and particularly
on the use of patents for wireless-‐enabled medical devices. Our methodology used a
combination of patent landscaping around 5 technology areas, interviews with industry
experts, and scholarly literature review.
Whitepaper MEDINA Continuous Life Cycle Management of Cloud Security Certific...MEDINA
This document provides an overview of the MEDINA framework for continuous life cycle management of cloud security certifications. It describes the key components, including the Continuous Certification Evaluation component that aggregates assessment results, the Risk Assessment and Optimization Framework that evaluates risk, and the Automated Certificate Life Cycle Manager that determines certificate status and publishes certificates using a self-sovereign identity system. The framework aims to enable automated, continuous assessment and management of certifications to address the dynamic nature of cloud environments.
This document provides guidance on failure mode and effects analyses (FMEAs) for the marine industry. It discusses what an FMEA is, its objectives, and when they are carried out. FMEAs are used to identify potential failure modes and their effects on systems to improve safety. They follow standards from classification societies. The document outlines the FMEA process, including defining the system boundaries, identifying failure modes and detection/correction methods. It provides information on vessel audits, testing, and incorporating additional analyses like criticality and risk assessments to strengthen FMEAs. The goal is to identify unacceptable failure modes and ensure corrective actions are implemented to improve safety.
This document provides guidance on establishing antimicrobial stewardship (AMS) programs in health care facilities in low- and middle-income countries. It outlines the core elements needed for national and facility-level AMS programs, including structures, planning, interventions, assessment, and education/training. The document emphasizes that AMS is an integral part of health systems and aims to optimize antibiotic use and slow the emergence of antibiotic resistance through multidisciplinary collaboration at all levels.
This document provides an overview and user guide for the Open Payments system. It explains that Open Payments is a national disclosure program mandated by the Affordable Care Act to increase transparency of financial relationships between healthcare industry and providers. Applicable manufacturers, GPOs, physicians, and teaching hospitals participate by registering and reporting or reviewing certain payments and ownership interests. The guide outlines registration processes, data submission requirements, and review/dispute functions to help users comply with Open Payments reporting.
This document summarizes a whitepaper from the Interactive Advertising Bureau (IAB) that evaluates alternative approaches to cookies for managing user data and privacy across devices. It defines guiding principles for key stakeholders and assesses solution classes based on how well they meet stakeholder needs. The classes include server-issued state, device-inferred state, client-generated state, network-inserted state, and cloud-synchronized state. The paper aims to educate readers and establish principles for measuring current and future state management mechanisms.
This document provides an overview and user guide for the Open Payments (Sunshine Act) program. It explains that Open Payments promotes transparency in financial relationships between healthcare industry and providers by publishing payment data. Applicable manufacturers, GPOs, physicians, and teaching hospitals participate by registering, reporting applicable payment data, and reviewing/disputing data. Key deadlines and a two-phase registration/reporting process applied to the first reporting year of 2013. The guide details each step of the Open Payments process.
British Water Guide: Monitoring Products and Services Ken Ogura
This is the 1st edition of British Water’s ‘Guide to Monitoring Products and Services’. The guide has benefited from consultation and input from designers, manufacturers, practitioners and regulators of environmental and water solutions.
Blue Dwarf is seeking funding to develop products focused on the emerging Application Service Provider (ASP) and wireless internet markets. They are developing a personalized internet portal called AnytimeFromAnywhere.com for consumers and an enterprise solution called E2B@YourCompany. These products will allow users to access applications and services from any device. Blue Dwarf sees significant opportunity in combining ASP hosted applications with wireless access as mobile users will increasingly access services remotely. They believe their technology and products are well positioned to capitalize on the trends of outsourcing IT services to ASPs and the growth of wireless internet access.
Similar to Ctia Short Code Compliance Handbook v1.4.2 (20)
If you are looking to setup an text message marketing campaign, then it's important that you understand the Telephone Consumer Protection Act (TCPA) or you could face some hefty fines for SMS spam. Watch a recorded version of the webinar here: http://get.tatango.com/webinar-tcpa-sms-marketing-laws
Want to learn more about how the TCPA impacts text message marketing, download our guide to TCPA SMS marketing here: http://get.tatango.com/guide-understanding-tcpa-compliance
Also, check out our free template to TCPA text message marketing compliance here: http://get.tatango.com/blueprint-tcpa-ctia-template
What You'll Learn In This Webinar:
* What is a keyword?
* How to select keywords that are relevant, simple and short.
* Understanding and planning for the autocorrect.
* What is typoglycemia, and why you should care.
* A dozen great keyword examples, and why they're so great!
The document discusses how to grow SMS subscribers by incentivizing customers to opt-in. It recommends clearly promoting the incentive in call-to-action messaging and avoiding "bait-and-switch" tactics. Common incentives include coupons, discounts or free items that drive high opt-in and redemption rates. Case studies show promotions from companies like Seattle Sun Tan, Julep and Taco Bell gaining thousands of opt-ins while retaining most new subscribers.
This document discusses best practices for moving SMS subscribers from one short code to another. It begins by stating that the webinar will cover lies told by SMS providers to prevent subscriber migration, MMA best practices for the process, how to decrease subscriber churn during migration, and why a formal migration process is important. It then addresses 5 common lies told by SMS providers and debunks them, explaining that subscribers can be exported and moved between short codes. It also outlines the two-step MMA best practice process for subscriber migration and states that these practices are not required but advised.
This document discusses how text message marketing can benefit businesses. It explains that text marketing involves customers opting in, businesses sending promotions via text, customers receiving and redeeming the promotions. Many businesses use text marketing including retailers, restaurants, and non-profits. The document tells a story about a marketing manager named Mike who saw greater customer engagement and redemption rates when using a text marketing platform compared to traditional methods.
How to Generate Add to Calendar Link using Cal.etY
Cal.et is a free tool that helps you create “Add to Calendar” links for your events. It supports popular calendar platforms like Google, Apple, Outlook, Yahoo, and Office365. Users can generate short, shareable URLs, customize event details, and even create QR codes for easy access. It’s ideal for embedding event links in emails, websites, and social media, making it easier for participants to save event information directly to their calendars.
INTRODUCTION TO SEARCH ENGINE OPTIMIZATION (SEO).pptxGiorgio Chiesa
This presentation is recommended for those who want to know more about SEO. It explains the main theoretical and practical aspects that influence the positioning of websites in search engines.
Embark on style journeys Indian clothing store denver guide.pptxOmnama Fashions
Finding the perfect "Indian Clothing Store Denver" is essential for those seeking vibrant, authentic, and culturally rich attire in the heart of Colorado. Denver, a city known for its diverse culture and eclectic fashion scene, offers a variety of options for those in search of traditional and contemporary Indian clothing. Whether you're preparing for a wedding, festival, or cultural event, or simply wish to incorporate the elegance and beauty of Indian fashion into your wardrobe, discovering the right store can make all the difference.
The advent of AI offers marketers unprecedented opportunities to craft personalized and engaging customer experiences, evolving customer engagements from one-sided conversations to interactive dialogues. By leveraging AI, companies can now engage in meaningful dialogues with customers, gaining deep insights into their preferences and delivering customized solutions.
Susan will present case studies illustrating AI's application in enhancing customer interactions across diverse sectors. She'll cover a range of AI tools, including chatbots, voice assistants, predictive analytics, and conversational marketing, demonstrating how these technologies can be woven into marketing strategies to foster personalized customer connections.
Participants will learn about the advantages and hurdles of integrating AI in marketing initiatives, along with actionable advice on starting this transformation. They will understand how AI can automate mundane tasks, refine customer data analysis, and offer personalized experiences on a large scale.
Attendees will come away with an understanding of AI's potential to redefine marketing, equipped with the knowledge and tactics to leverage AI in staying competitive. The talk aims to motivate professionals to adopt AI in enhancing their CX, driving greater customer engagement, loyalty, and business success.
Mastering Local SEO for Service Businesses in the AI Era"" is tailored specifically for local service providers like plumbers, dentists, and others seeking to dominate their local search landscape. This session delves into leveraging AI advancements to enhance your online visibility and search rankings through the Content Factory model, designed for creating high-impact, SEO-driven content. Discover the Dollar-a-Day advertising strategy, a cost-effective approach to boost your local SEO efforts and attract more customers with minimal investment. Gain practical insights on optimizing your online presence to meet the specific needs of local service seekers, ensuring your business not only appears but stands out in local searches. This concise, action-oriented workshop is your roadmap to navigating the complexities of digital marketing in the AI age, driving more leads, conversions, and ultimately, success for your local service business.
Key Takeaways:
Embrace AI for Local SEO: Learn to harness the power of AI technologies to optimize your website and content for local search. Understand the pivotal role AI plays in analyzing search trends and consumer behavior, enabling you to tailor your SEO strategies to meet the specific demands of your target local audience. Leverage the Content Factory Model: Discover the step-by-step process of creating SEO-optimized content at scale. This approach ensures a steady stream of high-quality content that engages local customers and boosts your search rankings. Get an action guide on implementing this model, complete with templates and scheduling strategies to maintain a consistent online presence. Maximize ROI with Dollar-a-Day Advertising: Dive into the cost-effective Dollar-a-Day advertising strategy that amplifies your visibility in local searches without breaking the bank. Learn how to strategically allocate your budget across platforms to target potential local customers effectively. The session includes an action guide on setting up, monitoring, and optimizing your ad campaigns to ensure maximum impact with minimal investment.
Unlock the secrets to creating a standout trade show booth with our comprehensive guide from Blue Atlas Marketing! This presentation is packed with essential tips and innovative strategies to ensure your booth attracts attention, engages visitors, and drives business success. Whether you're a seasoned exhibitor or a first-timer, these expert insights will help you maximize your impact and make a memorable impression in a crowded exhibition hall. Learn how to:
Design an eye-catching and inviting booth
Incorporate interactive elements that engage visitors
Use effective branding and visuals to reinforce your message
Plan your booth layout for maximum traffic flow
Implement technology to enhance the visitor experience
Create memorable experiences that leave a lasting impression
Transform your trade show presence with these proven tactics and ensure your booth stands out from the competition. Download the PDF now and start planning your next successful exhibit!
If you’re at all interested in digital
marketing and in making a name for
your brand online, then it is crucial that
you understand how to properly make
use of content marketing. Content
marketing is currently one of the
biggest trends in digital marketing as a
whole and is an area that many website owners and brands are investing in
heavily right now thanks to the impressive returns that they are seeing.
Empowering Influencers: The New Center of Brand-Consumer Dynamics
In the current market landscape, establishing genuine connections with consumers is crucial. This presentation, "Empowering Influencers: The New Center of Brand-Consumer Dynamics," explores how influencers have become pivotal in shaping brand-consumer relationships. We will examine the strategic use of influencers to create authentic, engaging narratives that resonate deeply with target audiences, driving success in the evolved purchase funnel.
Conferences like DigiMarCon provide ample opportunities to improve our own marketing programs by learning from others. But just because everyone is jumping on board with the latest idea/tool/metric doesn’t mean it works – or does it? This session will examine the value of today’s hottest digital marketing topics – including AI, paid ads, and social metrics – and the truth about what these shiny objects might be distracting you from.
Key Takeaways:
- How NOT to shoot your digital program in the foot by using flashy but ineffective resources
- The best ways to think about AI in connection with digital marketing
- How to cut through self-serving marketing advice and engage in channels that truly grow your business
In this humorous and data-heavy Master Class, join us in a joyous celebration of life honoring the long list of SEO tactics and concepts we lost this year. Remember fondly the beautiful time you shared with defunct ideas like link building, keyword cannibalization, search volume as a value indicator, and even our most cherished of friends: the funnel. Make peace with their loss as you embrace a new paradigm for organic content: Pillar-Based Marketing. Along the way, discover that the results that old SEO and all its trappings brought you weren’t really very good at all, actually.
In this respectful and life-affirming service—erm, session—join Ryan Brock (Chief Solution Officer at DemandJump and author of Pillar-Based Marketing: A Data-Driven Methodology for SEO and Content that Actually Works) and leave with:
• Clear and compelling evidence that most legacy SEO metrics and tactics have slim to no impact on SEO outcomes
• A major mindset shift that eliminates most of the metrics and tactics associated with SEO in favor of a single metric that defines and drives organic ranking success
• Practical, step-by-step methodology for choosing SEO pillar topics and publishing content quickly that ranks fast
Build marketing products across the customer journey to grow your business and build a relationship with your customer. For example you can build graders, calculators, quizzes, recommendations, chatbots or AR apps. Things like Hubspot's free marketing grader, Moz's site analyzer, VenturePact's mobile app cost calculator, new york times's dialect quiz, Ikea's AR app, L'Oreal's AR app and Nike's fitness apps. All of these examples are free tools that help drive engagement with your brand, build an audience and generate leads for your core business by adding value to a customer during a micro-moment.
Key Takeaways:
Learn how to use specific GPTs to help you Learn how to build your own marketing tools
Generate marketing ideas for your business How to think through and use AI in marketing
How AI changes the marketing game
Boost Your Instagram Views Instantly Proven Free Strategies.InstBlast Marketing
Supercars use advanced materials and tech for top-speed performance. Join Performance Car Exclusive to experience driving excellence.
https://instblast.com/instagram/free-instagram-views
What Software is Used in Marketing in 2024.Ishaaq6
This paper explores the diverse landscape of marketing software, examining its pivotal role in modern marketing strategies. It provides a comprehensive overview of various types of marketing software tools and platforms essential for enhancing efficiency, optimizing campaigns, and achieving business objectives. Key categories discussed include email marketing software, social media management tools, content management systems (CMS), customer relationship management (CRM) software, search engine optimization (SEO) tools, and marketing automation platforms.
The paper delves into the functionalities, benefits, and examples of each type of software, highlighting their unique contributions to effective marketing practices. It explores the importance of integration and automation in maximizing the impact of these tools, addressing challenges and strategies for seamless implementation across different marketing channels.
Furthermore, the paper examines emerging trends in marketing software, such as AI and machine learning applications, personalization strategies, predictive analytics, and the ethical considerations surrounding data privacy and consumer rights. Case studies illustrate real-world applications and success stories of businesses leveraging marketing software to achieve significant outcomes in their marketing campaigns.
In conclusion, this paper provides valuable insights into the evolving landscape of marketing technology, emphasizing the transformative potential of software solutions in driving innovation, efficiency, and competitive advantage in today's dynamic marketplace.
This description outlines the scope, structure, and focus of the paper, giving readers a clear understanding of what to expect and why the topic of marketing software is important and relevant in contemporary marketing practices.
From Subreddits To Search: Maximizing Your Brand's Impact On RedditSearch Engine Journal
The search landscape is undergoing a seismic shift, and Reddit is at the epicenter. Google's Helpful Content Update and its $60 million deal with Reddit, coupled with OpenAI's partnership, have catapulted Reddit's real-time content to unprecedented heights.
Check out this insightful webinar exploring the newfound importance of Reddit in the digital marketing landscape. Learn how these changes make Reddit an essential platform for getting your brand and content in front of evolving search audiences.
You’ll hear:
- The evolution of Reddit as a major influencer on SERPS over the years.
- The impact of recent changes and partnerships on Reddit’s place in search.
- A comprehensive look at Reddit, how it works, and how to approach it.
- Unique engagement opportunities presented by Reddit.
With Brent Csutoras, a Reddit expert with over 18 years of experience on the platform, we’ll delve into the intricacies of Reddit's communities, known as Subreddits, and how to leverage their power without compromising authenticity or violating community guidelines in the age of AI-driven search experiences.
Don't miss this opportunity to stay ahead of the curve and leverage Reddit for your brand's success.
From Subreddits To Search: Maximizing Your Brand's Impact On Reddit
Ctia Short Code Compliance Handbook v1.4.2
1. CTIA Short Code Monitoring Program
Short Code Monitoring Handbook
Version Number 1.4.2
Effective Date November 01, 2014
2. ii
Contents
About This Handbook............................................................................................................................................ 1
References ............................................................................................................................................................. 1
Universal Compliance Principles ......................................................................................................................... 2
A.1
Choice and Consent.................................................................................................................................2
A.1.01
Unsolicited Messages ........................................................................................................................2
A.1.02
Marketing Context ............................................................................................................................2
A.1.03
Opt-In ..................................................................................................................................................2
A.1.04
Handset Confirmation.......................................................................................................................3
A.1.05
Opt-Out...............................................................................................................................................3
A.2
Customer Care...........................................................................................................................................3
A.3
Program Content .......................................................................................................................................3
A.3.01
Unapproved or Illicit Content...........................................................................................................3
A.3.02
Controlled Substances......................................................................................................................3
A.3.03
Sweepstakes and Contests ..............................................................................................................4
A.3.04
Content Delivery................................................................................................................................4
A.4
Privacy Policy and Terms of Use ...............................................................................................................4
A.5
Program Records and Functionality ........................................................................................................4
A.5.01
Customer Records.............................................................................................................................4
A.5.02
MO Message Processing ..................................................................................................................4
Use Cases............................................................................................................................................................... 4
A.6
Single-Message Programs .........................................................................................................................5
A.7
Recurring-Messages Programs .................................................................................................................6
A.8
Machine-to-Machine Programs ...............................................................................................................7
A.9
Political Donation Programs......................................................................................................................7
A.10
Charitable Donation Programs ...............................................................................................................7
A.11
Free-to-End-User Programs.......................................................................................................................7
A.12
MMS Programs...........................................................................................................................................7
Carrier Onboarding............................................................................................................................................... 8
Compliance Audits ............................................................................................................................................... 9
A.13
Violation Notices .......................................................................................................................................9
A.14
Schedule ....................................................................................................................................................9
A.15
Severity Levels............................................................................................................................................9
A.16
Communicating with the CTIA Compliance Care Team...................................................................10
3. iii
A.17
Retests.......................................................................................................................................................10
A.18
Appeals ....................................................................................................................................................10
Reading the Audit Standards ............................................................................................................................. 11
Single-Message Programs.................................................................................................................................. 12
A.19
Single-Message Program Advertising Audit Standards ......................................................................12
A.20
Single-Message Program Message Flow Audit Standards .................................................................12
Recurring-Messages Programs .......................................................................................................................... 13
A.21
Recurring-Messages Program Advertising Audit Standards...............................................................13
A.22
Recurring-Messages Program Message Flow Audit Standards .........................................................13
A.23
Machine-to-Machine Program Audit Standards.................................................................................14
4. 1
Introduction
CTIA and its member companies work to protect consumers while fostering a competitive environment for short
code programs. We aim to
§ Provide consumers the best possible user experience;
§ Honor consumer choice and prevent abuse of messaging platforms;
§ Deliver flexible, lightweight guidelines that communicate compliance values clearly;
§ Enable the short code industry to self regulate; and
§ Facilitate enforcement measures, if necessary, to protect consumers quickly and consistently.
The Short Code Compliance Handbook (the Handbook) guidelines lay the framework for achieving these goals,
but CTIA reserves the right to take action against any short code program deemed to cause consumer harm.
The Handbook is not intended as a comprehensive guide to compliance with laws and regulations that apply to
short code programs. Service providers are responsible for meeting legal requirements that apply to short code
programs they offer, and CTIA and its members make no representation that meeting the guidelines in this
Handbook will be sufficient to assure legal compliance. Consultation with legal counsel is strongly recommended.
ABOUT THIS HANDBOOK
This Handbook describes best practices for SMS, multimedia messaging service (MMS), and free-to-end-user
(FTEU) short code programs with the primary goal of providing the best customer experience for end users.
These guidelines do not attempt to define rules for programs that bill consumers. Guidelines are organized
according to use cases that apply. Examples of compliant programs are organized by use case in the appendices.
Carriers reserve the right to implement their own short code requirements beyond the scope of this Handbook.
However, all carriers have reviewed and accepted this document’s content.
REFERENCES
Drawing from experience working with short code programs, the guidelines evolve continually. Handbook v1.4 is
based on the following:
§ Mobile Marketing Association’s Consumer Best Practices v7.0,
§ CTIA Mobile Compliance Assurance Handbook v1.3,
§ California Attorney General Kamala D. Harris’s “Privacy on the Go: Recommendations for the Mobile
Ecosystem” best practices,
§ Telephone Consumer Protection Act (TCPA),
§ Florida Attorney General’s requirements for mobile content,
§ A2P (application-to-person) community feedback, and
§ Carrier requirements.
5. 2
Compliance Framework
UNIVERSAL COMPLIANCE PRINCIPLES
CTIA requires all short code programs to comply with a basic code of conduct that promotes the best possible
user experience for all program types. As new uses for short codes emerge, these guiding principles should be
considered in defining applicable rules. Services that comply technically with the letter of a specific rule, but
violate the letter or spirit these principles, might be subject to enforcement action.
A.1 CHOICE AND CONSENT
Mobile services are expected to deliver sufficient value so consumers elect to participate with full transparency
into the delivery conditions.
A.1.01 UNSOLICITED MESSAGES
Unsolicited spam messages may not be transmitted using short codes. Unsolicited messages are defined as
follows:
§ Messages delivered without prior express written consent from the user or account holder, and
§ Messages sent after a user has opted out.
1
A.1.02 MARKETING CONTEXT
No component of program advertising or messaging may be deceptive about the underlying program’s
functionality, features, or content. All disclosures present in pre-purchase calls-to-actions, ads, terms and
conditions, and messaging must remain clear and consistent throughout the user experience.
A.1.03 OPT-IN
Messages must be delivered to a user’s handset only after the user has opted in to receive them. A user might
indicate interest in a program in several ways. For example, a user might
§ Enter a phone number online,
§ Click a button on a mobile webpage,
§ Send an MO message containing an advertising keyword, or
§ Sign up at a point-of-sale location.
Calls-to-action must be clear and accurate; consent must not be obtained through deceptive means. Enrolling a
user in multiple programs based on a single opt-in is prohibited, even when all programs operate on the same
short code.
The opt-in for all short code programs must comply with all legal and regulatory requirements, including the
Telephone Consumer Protection Act, 47 U.S.C. § 227, and the Federal Communication Commission’s rules under
47 C.F.R. § 64.1200. For example, the express written consent obtained for any program that is “telemarketing”
(as defined by 47 C.F.R. § 64.1200(f)(14)) must, unless exempt from the requirement, include the elements of
“prior express written consent” set forth in 47 C.F.R. § 64.1200(f)(8). That rule requires a clear and conspicuous
disclosure informing the user that:
§ By opting in, the user authorizes the seller to deliver or cause to be delivered to the user marketing
messages using an automatic telephone dialing system; and
1
Sending the user a single opt-out message acknowledging the opt-out request is the only exception to this rule.
6. 3
§ The user is not required to opt in (directly or indirectly) as a condition of purchasing any property, goods,
or services.
A.1.04 HANDSET CONFIRMATION
Handset possession is confirmed implicitly when a user opts in from a mobile handset (e.g., keyword-based opt-
ins, mobile Web opt-ins); all other opt-ins for recurring services must include an additional step to confirm handset
possession. Service providers may satisfy this requirement by sending an abbreviated opt-in MT message
soliciting an MO response from the user. This message must include information sufficient to identify the program.
A.1.05 OPT-OUT
Functioning opt-out mechanisms are crucial for all text programs. Programs must always acknowledge and
respect customers’ requests to opt out of programs. However, depending on the use case, some programs are
not required to advertise opt-out instructions. Short code programs must respond to, at a minimum, the universal
keywords STOP, END, CANCEL, UNSUBSCRIBE, and QUIT by sending an opt-out message and, if the user is
subscribed, by opting the user out of the program. Subsequent text, punctuation, and capitalization must not
interfere with opt-out keyword functionality.
Recurring programs must also promote opt-out instructions at program opt-in and at regular intervals in content or
service messages, at least once per month. Opt-out information must be displayed in bold type on the
advertisement. A service may deliver one final message to confirm a user has opted out successfully, but no
additional messages may be sent after the user indicates a desire to cancel a service.
A.2 CUSTOMER CARE
Customer care contact information must be clear and readily available to help users understand program details
as well as their status with the program. Customer care information should result in users’ receiving help.
Programs must always respond to customer care requests, regardless of whether the requestor is subscribed to
the program. At a minimum, the HELP keyword must return the program name and further information about how
to contact service providers.
A.3 PROGRAM CONTENT
All content associated with short code programs must promote a positive user experience. Carriers regulate
certain types of content, including those listed below.
A.3.01 UNAPPROVED OR ILLICIT CONTENT
No programs associated with carrier brands or operating on the carrier networks may promote unapproved or
illicit content, including the following:
§ Depictions or endorsements of violence,
§ Adult or otherwise inappropriate content,
§ Profanity or hate speech, and
§ Endorsement of illegal or illicit drugs.
Programs must operate according to all applicable federal and state laws and regulations. All content must be
appropriate for the intended audience. Additional legal and ethical obligations apply when marketing to children
under age 13, and such programs might be subject to additional review carrier by carrier.
A.3.02 CONTROLLED SUBSTANCES
Promotions of controlled substances might be subject to additional review carrier by carrier. Service providers
must receive explicit carrier approval before launching these types of programs. Marketing of hard alcohol and
tobacco brands must either include robust age verification (e.g., electronic confirmation of age and identity) at opt-
7. 4
in or restrict promotions to age-verified locations (e.g., POS in bars). Mobile programs must not promote the use
of controlled substances directly. Reference to the abuse of controlled substances is prohibited.
A.3.03 SWEEPSTAKES AND CONTESTS
Sweepstakes and contests might be subject to additional review carrier by carrier. Service providers must receive
explicit approval before launching these types of programs. All sweepstakes must support a no-cost entry
method. Service providers operating sweepstakes should seek legal guidance.
A.3.04 CONTENT DELIVERY
Users should be informed of the next steps to download and store new content immediately after opt-in. Content
must be delivered correctly and must function as advertised.
A.4 PRIVACY POLICY AND TERMS OF USE
Service providers are responsible for protecting the privacy of user information and must comply with applicable
privacy law. Service providers should maintain a privacy policy for all programs and make it accessible from the
initial call-to-action. When a privacy policy link is displayed, it should be labeled clearly.
Use cases might require different disclosures in the full terms and conditions. In all cases, terms and conditions
and privacy policy disclosures must provide up-to-date, accurate information about program details and
functionality.
A.5 PROGRAM RECORDS AND FUNCTIONALITY
Service providers assume responsibility for maintaining accurate records in carrier systems and the Common
Short Code Administration (CSCA) registry. Service providers wishing to modify a program must submit changes
to the carriers for review and must update relevant carrier records. Programs promoted in the market must match
the programs approved.
A.5.01 CUSTOMER RECORDS
All opt-in and opt-out requests should be retained from the time a user initiates opt-in until a minimum of six
months after the user has opted out of a program. Service providers assume responsibility for managing
information about deactivated and recycled numbers and must process this information within three business
days of receipt. After porting a phone number between carriers, the user must opt in again to desired programs.
Service providers must track opt-in information by individual user. Selling mobile opt-in lists is prohibited.
A.5.02 MO MESSAGE PROCESSING
All mandatory keywords must be processed correctly, regardless of MO message format (e.g., keywords must
function whether sent by MMS or SMS). Service providers must scan MO message logs regularly to identify opt-
out attempts and must terminate those subscriptions, regardless of whether the subscribers used the correct opt-
out keywords or methods.
USE CASES
Because short code programs vary greatly, depending on their intended purpose, Handbook v1.4 was designed
with different use cases in mind. Please note that all use cases must comply with the Universal Compliance
Principles in addition to the specific guidelines described here.
8. 5
A.6 SINGLE-MESSAGE PROGRAMS
Single-message programs, or “one-off” programs, deliver a one-time message in response to user opt-in
requests. Examples of single-message programs include but are not limited to the following:
§ Informational alert,
§ Purchase receipt,
§ Delivery notification, and
§ Two-factor authentication.
An example of a compliant single-message call-to-action and associated message flow appears in Appendix A.
Exhibit 1 displays a quick reference guide for a single-message program.
Exhibit 1: SINGLE-MESSAGE USE CASE QUICK REFERENCE GUIDE
Description Requirements
Call-to-Action The call-to-action for a single-message
program can be simple. The primary purpose
of disclosures is to ensure a consumer
consents to receive a message and
understands the nature of the program.
§ Product description
§ Complete terms and conditions or link
to terms and conditions
§ Privacy policy or link to privacy policy
§ “Message and data rates may apply”
disclosure
Terms and
Conditions
Comprehensive terms and conditions may be
presented in full beneath the call-to-action, or
they may accessible from a link or a popup
presented near the call-to-action.
§ Program (brand) identification
§ Product description
§ Customer care contact information
§ “Message and data rates may apply”
disclosure
Opt-In The consumer must actively opt into single
message programs.
§ Consumer’s affirmative opt-in
Message Flow Although single-message programs are not
required to display HELP and STOP
keywords, they should support HELP and
STOP commands, as described in the
Universal Compliance Principles.
Confirmation MT
§ Program (brand) name OR product
description
HELP MT
§ Program (brand) name OR product
description
§ Additional customer care contact
information
Opt-Out MT
§ Program (brand) name OR product
description
§ Confirmation that no further
messages will be delivered
9. 6
A.7 RECURRING-MESSAGES PROGRAMS
Short code programs with recurring messages advertise via the following media:
§ Online,
§ Print publications,
§ Mobile devices,
§ Radio, and
§ TV.
A user opts into recurring messages by texting a keyword to the program’s short code, entering his or her mobile
phone number online, or agreeing to receive text messages in apps or in person. Examples of recurring-
messages programs include but are not limited to the following:
§ Content or informational alert subscriptions (e.g., horoscopes, news, weather),
§ Flight status notifications (multiple messages), and
§ Marketing and loyalty campaigns.
An example of a compliant recurring-messages call-to-action and associated message flow appears in
Appendix B.
Exhibit 2 displays a quick reference guide for a recurring-messages program.
Exhibit 2: Recurring-Messages Use Case Quick Reference Guide
Description Requirements
Call-to-Action Because of their ongoing touch points with
consumers, recurring-messages programs
require the most disclosures among use
cases. The primary purpose of disclosures is
to ensure the consumer consents to receive
messages and understands the nature of the
program.
§ Product description
§ Service delivery frequency or
recurring-messages disclosure
§ Complete terms and conditions or link
to complete terms and conditions
§ Privacy policy or link to privacy policy
§ “Message and data rates may apply”
disclosure
Terms and
Conditions
Comprehensive terms and conditions might
be presented in full beneath the call-to-
action, or they might be accessible from a
link or a popup presented near the call-to-
action.
§ Program (brand) name
§ Service delivery frequency or
recurring-messages disclosure
§ Product description
§ Customer care contact information
§ Opt-out instructions in bold type
§ “Message and data rates may apply”
disclosure
Opt-In Recurring-messages programs should send
two messages for all non-mobile opt-ins.
§ Consumer’s affirmative opt-in
§ Handset verification for non-mobile
opt-in (i.e., MO from consumer’s
handset)
Message Flow Unlike other use cases, recurring-messages
programs must advertise HELP and STOP
commands. They also have the most
requirements for service messaging.
Opt-In MT (non-mobile opt-in)
§ Program (brand) name OR product
description
§ Response command or PIN
Confirmation MT
§ Program (brand) name OR product
10. 7
A.8 MACHINE-TO-MACHINE PROGRAMS
Machine-to-machine (M2M) short code programs, which should never interact with consumers, only need keep an
updated program brief on file with the CSCA and the carriers.
A.9 POLITICAL DONATION PROGRAMS
Premium short code programs that solicit political donations are subject to additional regulations, available at
http://www.ctia.org/policy-initiatives/voluntary-guidelines/federal-political-campaign-contributions-wireless-carrier-
bill. Premium political donation programs also must conform to the premium SMS guidelines and audit standards
in the Handbook v1.3.
A.10 CHARITABLE DONATION PROGRAMS
Premium short code programs that solicit charitable donations are subject to additional regulations, available at
http://www.ctia.org/policy-initiatives/voluntary-guidelines/mobile-giving-via-wireless-carrier%27s-bill. In addition,
premium charitable donation programs must to conform to the premium SMS guidelines and audit standards in
the Handbook v1.3.
A.11 FREE-TO-END-USER PROGRAMS
FTEU programs are subject to the same requirements as standard rate short code programs. Recurring-
messages FTEU programs that market to consumers are subject to all subscription marketing requirements,
except disclosing that “message and data rates may apply.”
A.12 MMS PROGRAMS
MMS programs are subject to the same requirements per use case as SMS programs. All mandatory keywords
must be processed correctly, regardless of MO format (e.g., keywords must function whether sent by MMS or
SMS). Service providers must scan MO logs regularly to identify opt-out attempts and must terminate those
subscriptions, regardless of whether the subscribers used the correct opt-out keywords or methods.
Additional best practices specific to MMS will be released in an upcoming version of this Handbook.
description
§ Opt-out information
§ Customer care contact information
§ Product quantity or recurring-
messages disclosure
§ “Message and data rates may apply”
disclosure
HELP MT
§ Program (brand) name OR product
description
§ Additional customer care contact
information
Opt-Out MT
§ Program (brand) name OR product
description
§ Confirmation that no further
messages will be delivered
11. 8
CARRIER ONBOARDING
CTIA is most concerned with mobile programs as they interact with consumers through advertising and text
messaging. However, several facets of SMS programs happen behind the scenes. Recommended best practices
for onboarding new programs follow.
Carriers may maintain individual playbooks tailored to their customers’ needs and must sometimes respond to
emerging risks that fall outside the Handbook. Please refer to carriers’ playbooks for onboarding information
regarding
§ Program certification and migration processes,
§ Program brief details,
§ Advertising of controlled substances,
§ Sweepstakes approval processes, and
§ Marketing to children.
12. 9
In-Market Monitoring Guide
COMPLIANCE AUDITS
The CTIA Compliance Assurance Solution employs data gathered via in-market monitoring. When calls-to-action
are deployed in market, the live programs are captured and audited. This method is more effective than program
brief review or routine keyword testing because audits reflect the user experience that real consumers encounter
when they interact with these programs in market.
CTIA issues audits weekly for standard rate short codes leased with the CSCA. Audits performed by CTIA are
available to all major U.S. carriers, and CTIA compliance metrics can be incorporated into individual carrier
compliance policies.
A.13 VIOLATION NOTICES
CTIA distributes color-coded Program Violation Notices and Message Flow Violation Notices, known informally as
failure forms, each week. At the top of a violation notice is a unique audit number and the short code, service
provider, and aggregator or aggregators as well as the notice date and the cure date. Individual violations are
classified as Severity 0, Severity 1, or Severity 2, based on their potential for consumer harm, with Severity 0 the
most extreme. These violations are based on the compliance guidelines outlined in the Compliance Framework
section of this Handbook. Taking the severity level of the gravest violation cited, a failed audit must be resolved in
the appropriate timeframe (i.e., before or on the cure date).
A.14 SCHEDULE
CTIA compiles and generates violation notices each Monday for audits performed the previous week, and audits
are published as soon as they become available. Although audits might be available for review earlier, the official
notice date from which the cure date is calculated is 12:00 P.M. Eastern Time on Tuesday.
A.15 SEVERITY LEVELS
All Program Violation Notices and Message Flow Violation Notices are assigned severity levels based on the
extent to which the associated findings might harm consumers. Cure dates and penalties vary based on severity,
as detailed in Exhibit 3.
Exhibit 3: Violation Notice Severities Description
Definition Cure Date Penalties Violation Notice
Severity 0 Extreme
consumer harm
Immediate CTIA: Immediate registry suspension
Carriers: Case by case; immediate
suspension or termination possible
Severity 1 Serious
consumer harm
5 business days CTIA: Unresolved audits; possible
registry suspension
Carriers: Case by case
Severity 2 Moderate
consumer harm
5 business days CTIA: Case by case
Carriers: Case by case
13. 10
A.16 COMMUNICATING WITH THE CTIA COMPLIANCE CARE TEAM
On receiving a violation notice, service providers may communicate with compliance@psmsindustrymonitor.com
by replying to the compliance notification email. The reply, which must preserve the email subject field, should
pose specific questions or outline issues relating to the cited violations. The CTIA Compliance Care Team (Care
Team) responds promptly to all messages. Although Care Team specialists are unable to preapprove compliant
designs, they assist service providers as much as possible with understanding how to resolve violations and close
their audits.
A.17 RETESTS
Within the prescribed period following issuance of a violation notice, the responsible aggregator or service
provider must confirm by replying to the initial email (compliance@psmsindustrymonitor.com) that it has made
changes to or has removed from market the offending ad or message flow. If the Care Team fails to receive
confirmation or the service provider fails to take the actions required, the short code is subject to further action.
In the case of TV and print ads with longer run cycles, aggregators and service providers may submit a retest
request for a rerelease date. Retest requests must be made in good faith, with a clear explanation of the changes
implemented. Audits at this status are categorized as Pending Retest.
A.18 APPEALS
Aggregators and service providers that believe they have a valid claim may challenge an audit by responding to
compliance@psmsindustrymonitor.com before the cure date noted on the violation notice. The email message
should explain why the service provider deems the audit incorrect. Appeals must pertain to the application of
violations cited on the specific audit in question.
14. 11
READING THE AUDIT STANDARDS
The following pages display tables of audit standards by use case. Advertising audit standards apply to all media
hosting calls-to-action for short code programs; message flow audit standards apply to required service
messages. Message categories for which specific standards apply are marked with an “x” in the tables. Please
refer to the glossary below for help with unfamiliar terms.
Opt-In The first message customers receive in a double opt-in customer experience. The opt-in
message contains a PIN or a response command to verify the customer’s messaging
preferences. This message is required only for subscription programs, but, if sent,
should comply with the Universal Compliance Principles.
Conf.
(Confirmation)
The second message customers receive in a double opt-in customer experience. The
program enrollment confirmation message contains program details. In some use cases,
the confirmation message is the first message customers receive.
HELP The message service providers send after customers text the HELP keyword. Short
codes should reply with additional contact information to customer requests for help.
Opt-Out The message service providers send after customers text the STOP keyword. The opt-
out message confirms that the customer is opted out of the program.
Violation A specific breach of the Universal Compliance Principles. Auditors check program ads
and service messages against lists of violations to identify noncompliance.
Severity A number representing the customer impact associated with a violation. Severity 0
violations impact customers most. Severity 2 violations are least customer impacting.
Action Required An action the responsible service provider must take to correct the associated violation.
15. 12
Audit Standards
The audit standards listed below distill the principles listed in the narrative portion of the Handbook into test
scripts for monitoring. Advertising audit standards apply to media displaying short code calls-to-action. Message
flow audit standards apply to required service messages.
SINGLE-MESSAGE PROGRAMS
A.19 SINGLE-MESSAGE PROGRAM ADVERTISING AUDIT STANDARDS
A.20 SINGLE-MESSAGE PROGRAM MESSAGE FLOW AUDIT STANDARDS
Violation Severity Action Required
Contains or promotes unapproved or illicit content 0 Remove unapproved or illicit content or references to it
No product or service description 1 Describe product or service
Fails to match approved program in CSC registry 1 Remove unapproved program elements or update CSC registry
No clear indication of privacy policy 1 Display privacy policy or clearly labeled link to privacy policy
No link to comprehensive T&Cs 1 Display link to comprehensive T&Cs
No mention that message and data rates may apply 2 Disclose that message and data rates may apply
Violation Severity Action Required
Applicable Message
Opt-In Conf. HELP Opt-
Out
Contains or promotes unapproved
or illicit content
0 Remove unapproved or illicit content or
references to it
x x x x
Fails to match approved program
in CSC registry
1 Remove unapproved program elements or
update CSC registry
x x x x
Unsolicited message delivered 1 Cease all messaging associated with
program
x x x x
Incorrect response to STOP
command
1 Terminate all of customer’s active
programs after he or she texts STOP, and
send one opt-out message
x
No product or program name 2 Display program or product name x x x x
Failure to reply to HELP keyword 2 Reply to HELP keyword with additional
contact information
x
16. 13
RECURRING-MESSAGES PROGRAMS
A.21 RECURRING-MESSAGES PROGRAM ADVERTISING AUDIT STANDARDS
A.22 RECURRING-MESSAGES PROGRAM MESSAGE FLOW AUDIT STANDARDS
2
Customer care contact information may appear on a separate page in the terms and conditions.
3
Customer care URLs are also acceptable
Violation Severity Action Required
Contains or promotes unapproved or illicit content 0 Remove unapproved or illicit content or references to it
Fails to match approved program in CSC registry 1 Remove unapproved program elements or update CSC registry
No clear indication of privacy policy 1 Display privacy policy or clearly labeled link to privacy policy
No link to comprehensive T&Cs 1 Display link to comprehensive T&Cs
No product or service description 1 Describe product or service
Improper use of the term free 1 Remove the term free
No mention that messages are recurring 2 State that messages are recurring
No mention that message and data rates may apply 2 Disclose that message and data rates may apply
No customer care contact information2 2 Display toll-free helpline, email address, or HELP keyword
Opt-out indistinguishable 2 Display STOP command in bold type
Violation Severity Action Required
Applicable Message
Opt-In Conf. HELP Opt-
Out
Contains or promotes unapproved
or illicit content
0 Remove unapproved or illicit content or
references to it
x x x x
Fails to match approved program in
CSC registry
1 Remove unapproved program elements or
update CSC registry
x x x x
Unsolicited message delivered 1 Cease all messaging associated with
program
x x x x
Failure to initiate double opt-in 1 Require user response before sending
additional messages
x
Failure to display STOP keyword 1 Display STOP keyword x
Incorrect response to STOP
command
1 Terminate all of customer’s active
programs after he or she texts STOP, and
send one opt-out message
x
No indication that program is
recurring
2 State that program is recurring x
No product or program name 2 Display program or product name x x x x
No mention that message and data
rates may apply
2 Disclose that message and data rates may
apply
x
No customer care contact
information
2 Display toll-free helpline, email address, or
HELP keyword3
x
Failure to reply to HELP keyword 2 Reply to HELP keyword with additional
contact information
x
17. 14
A.23 MACHINE-TO-MACHINE PROGRAM AUDIT STANDARDS
M2M programs, which should never interact with consumers, only need keep an updated program brief on file
with the CSCA and the carriers. If an M2M program is found advertising to consumers, it is subject to immediate
enforcement action.
Violation Severity Action Required
Fails to match approved program in CSC registry 1 Remove unapproved program elements or update CSC registry
18. 15
Appendix A:
Sample Compliant Single-Message Program
Exhibit A1: Sample Compliant Single-Message Ad and Service Messages
Confirmation Message:
Coupon King: Show this text at the register for 50%
off your next purchase!
HELP Message:
Thanks for texting Coupon King! Call 1-800-123-4567
for support.
Opt-Out Message:
You are not subscribed to any Coupon King
programs. You will receive no further messages.
19. 16
Exhibit A2: Sample Compliant Single-Message Ad and Service Messages
Confirmation Message:
Mobile Confirm: Your passcode is 9876. Enter it
online to confirm your account.
HELP Message:
You recently created or modified an account online.
Enter your passcode to confirm. Call 1-800-123-4567
for Mobile Confirm support.
Opt-Out Message:
Mobile Confirm: You will receive no further messages
from shortcode 12345.
20. 17
Appendix B:
Sample Compliant Recurring-Messages Program
Exhibit B1: Sample Compliant Recurring-Messages Web Ad and Message Flow
Confirmation Message:
You’re now subscribed to daily Weather Alerts. Reply
STOP to cancel at any time. Call 1-800-123-4567 for
support. Message and data rates may apply.
HELP Message:
Contact us at 1-800-123-4567 with questions about
Weather Alerts.
Opt-Out Message:
You have opted out of Weather Alerts and will
receive no further messages.
Complete terms and conditions should
include customer care contact
information, bolded opt-out instructions,
a recurring message disclosure, a
product description and a program
(brand) name. Some program types
(e.g., sweepstakes) have additional
requirements carrier by carrier.
21. 18
Exhibit B2: Sample Compliant Recurring-Messages Video Ad and Message Flow
Confirmation Message:
You’ll now receive special offers from Good Brands!
Reply STOP to opt-out. Email
help@goodbrands.com with questions. Msg&Data
rates may apply.
HELP Message:
Good Brands Special Offers. Email
help@goodbrands.com or call 1-888-123-4567 for
support.
Opt-Out Message:
Good Brands. You will receive no further messages
from short code 12345.
22. 19
Exhibit B3: Sample Compliant Recurring-Messages Point-of-Sale Ad and Message
Flow
Opt-In Message:
Doctor Message. Reply Y to confirm that you want to
receive appointment reminders.
Confirmation Message:
Doctor Message thanks you for enrolling! You’ll now
receive appointment reminders. Text HELP for help.
Reply STOP to cancel. Msg&Data Rates May Apply.
HELP Message:
Email help@doctormessage.com for support with
appointment reminders service. Reply STOP to
cancel.
Opt-Out Message:
You are now opted out of Doctor Message
appointment reminders. You will receive no further
messages.
Service representative records
customer’s request for messages
and customer’s phone number.
Program terms and conditions
and privacy policy are available
from the representative.