top of page

What is STIR/SHAKEN?

​Ensuring Caller ID Integrity for a Safer Calling Experience

​

STIR/SHAKEN are industry standards designed to authenticate caller ID information using digital certificates and cryptographic techniques, aiming to reduce unwanted robocalls and combat caller ID spoofing. Specifically, STIR stands for Secure Telephone Identity Revisited, and SHAKEN stands for Signature-based Handling of Asserted Information Using toKENs. Together, these protocols allow telecommunications providers to sign and verify caller ID information as legitimate, so that consumers can have greater trust in the calls they receive.

​

The Federal Communications Commission (FCC) is leading efforts in the USA to implement STIR/SHAKEN across the telecom industry to protect consumers from fraudulent robocalls. At String Telecom, we are committed to aligning with these standards to ensure our network provides a reliable, secure calling experience for our clients and their customers.

​

How STIR/SHAKEN Works

STIR/SHAKEN functions by embedding a unique certificate of authenticity in the call data. When a call is placed, its digital signature travels along with it, allowing other carriers to verify that the call originates from a legitimate source. This verification process occurs in a series of steps:

​

Attestation Levels

Each call receives an attestation level based on the service provider’s ability to verify its source:

 

Full Attestation: The originating service provider has confirmed the identity of the customer and authorized their use of the calling number.

Partial Attestation: The provider has verified the call origin but cannot confirm that the customer is authorized to use the specific number.

Gateway Attestation: The provider cannot verify the source of the call but has confirmed its network entry point, common in international calls.

Authentication and Verification

As the call is routed across the network, the Identity header, containing the caller ID information, is encrypted and securely transmitted across the Public Switched Telephone Network (PSTN). The receiving carrier then decrypts and verifies the caller’s authenticity, which aids in flagging potential robocalls or spoofed calls and protecting the end recipient.

​

Consumer Assurance

When the terminating carrier successfully verifies the call, it can mark the caller ID as trustworthy, signaling to the consumer that the call is likely from a legitimate source. This transparent verification helps consumers identify calls they can trust.

 

The Role of STIR vs. SHAKEN

STIR technology identifies and determines whether a call is spoofed or legitimate. SHAKEN, on the other hand, manages the practical application of this verification process by ensuring that authenticated calls are handled correctly across networks. In essence, STIR identifies the trustworthiness of a call, and SHAKEN enables network providers to route those calls more effectively, minimizing the impact of robocalls on consumers.

​

International Call Compatibility

STIR/SHAKEN is currently implemented primarily within the United States and Canada, with plans for international adoption as other countries develop compatible standards. As the global telecom community aligns with these protocols, STIR/SHAKEN will expand to provide even broader protection against robocalls.

​

String Telecom’s Commitment to STIR/SHAKEN Compliance

At String Telecom, we take STIR/SHAKEN compliance seriously, going beyond the basic standards to enhance the security and reliability of our network. Our systems are equipped with industry-leading, FCC-compliant technology to authenticate calls effectively and protect our clients from spam and fraudulent calls. We also employ additional proprietary measures, such as String CallGuard, an advanced interactive voice response (IVR) technology.

​

String CallGuard uses simple interactive commands to verify if the caller is human. For instance, callers are prompted to respond with specific inputs, like “Press 2 to continue,” filtering out unwanted robocalls without requiring the intervention of your customer service or sales teams. This additional layer of protection means your business receives cleaner, more accurate call data, allowing your team to focus on genuine, high-value calls and reducing the time wasted on spam.

​

Partner with String Telecom for a Trusted Connection

With String Telecom’s STIR/SHAKEN-compliant services, you can trust that our network is designed to reduce robocalls and caller ID spoofing, creating a safer, more reliable experience for both businesses and consumers. Our commitment to STIR/SHAKEN compliance, combined with our advanced anti-robocall technology, empowers your business to maintain seamless, trustworthy communication with your customers.

Network Operations Centers (NOCs)

At String Telecom LLC, we take pride in our state-of-the-art Network Operations Centers (NOCs), which serve as the backbone of our communication services. Our NOCs are not just a technical necessity; they embody our commitment to delivering exceptional support and service reliability to our customers. Here’s how our amazing NOCs enhance your experience and ensure that your voice communications are always seamless and effective.

​

1. 24/7 Monitoring and Support

Our NOCs operate around the clock, 365 days a year. This continuous monitoring allows us to proactively identify and address any potential issues before they affect your service. Whether it’s the middle of the night or during peak business hours, our dedicated team is always on standby, ready to respond to any alerts and ensure that your communications remain uninterrupted.

​

2. Real-Time Traffic Analysis

We understand that voice quality is paramount in telecommunications. Our NOCs utilize advanced monitoring tools to analyze voice traffic in real time, ensuring optimal call quality. By tracking key performance indicators—such as latency, jitter, and packet loss—our NOCs can quickly identify any anomalies and make necessary adjustments. This proactive approach guarantees that you receive clear, uninterrupted calls, enhancing your overall communication experience.

 

3. Rapid Incident Response

In the rare event of a service disruption, our NOCs are equipped to respond swiftly and effectively. Our trained technicians can diagnose issues promptly, whether they stem from network congestion, equipment malfunctions, or external threats. By coordinating with our engineering and technical teams, our NOCs ensure that any disruptions are resolved as quickly as possible, minimizing downtime and maintaining service continuity.

​

4. Expertise and Training

Our NOC staff are highly trained professionals with extensive experience in network management and voice communications. They stay current with industry trends and technologies, ensuring that they have the skills needed to handle any situation. Regular training sessions and knowledge sharing within the team empower our NOC personnel to provide informed support and solutions tailored to your needs.

​

5. Quality Assurance Commitment

Quality assurance is a fundamental part of our NOC operations. We continuously monitor the performance of our services and gather customer feedback to identify areas for improvement. Our team conducts routine audits and performance assessments to ensure that we consistently meet and exceed the standards you expect. This relentless focus on quality means that you can trust String Telecom for reliable, high-quality voice services.

​

6. Scalability and Flexibility

As your business grows, so do your communication needs. Our NOCs are designed with scalability in mind, allowing us to adapt quickly to increasing demands. Whether you’re expanding your workforce or launching new services, our NOCs are equipped to scale up operations efficiently, ensuring that you never experience a drop in service quality.

​

7. Security and Compliance

In today’s digital landscape, security is paramount. Our NOCs employ robust security measures to protect your data and ensure compliance with industry regulations. Continuous monitoring for potential threats and vulnerabilities helps us safeguard your communications, allowing you to focus on your business with peace of mind.

​

8. Customer-Centric Approach

At String Telecom, our customers are at the heart of everything we do. Our NOCs are designed to provide not only technical support but also a customer-centric experience. We value your feedback and work closely with you to understand your unique needs. This partnership allows us to tailor our services to better serve you and enhance your overall satisfaction.

​

In summary, our amazing Network Operations Centers (NOCs) are integral to our mission of providing outstanding VoIP services. With 24/7 monitoring, expert incident response, quality assurance, and a commitment to security, we ensure that your voice communications remain seamless and reliable. At String Telecom VoIP Solutions, we’re dedicated to leveraging our NOCs to support your business and help you achieve your communication goals. Experience the difference of working with a provider that truly values your success!

​

String Telecom LLC Privacy Policy
Effective Date: November, 13, 2024

​​

At String Telecom LLC, your privacy is our top priority. This Privacy Policy outlines how we collect, use, disclose, and protect your information when you use our services. By accessing or using our services, you agree to the terms of this policy.

 

Information We Collect:

​​

1. Personal Information
We may collect personal information that you provide to us directly, including but not limited to:

Name
Email address
Phone number
Billing address
Payment information

 

2. Usage Data
We automatically collect certain information about your interactions with our services, which may include:

IP address
Device type
Browser type
Pages visited
Time and date of visits
Call logs and usage data

 

3. Cookies and Tracking Technologies
We use cookies and similar tracking technologies to enhance your experience and analyze usage patterns. You can control cookies through your browser settings, but this may affect your ability to use certain features of our services.

 

How We Use Your Information
We may use the information we collect for various purposes, including:

Providing and maintaining our services
Processing transactions and managing accounts
Communicating with you regarding your account or our services
Improving our services and customer experience
Sending promotional and marketing materials (with your consent)
Complying with legal obligations and protecting our rights

 

Information Sharing and Disclosure
We do not sell or rent your personal information to third parties. We may share your information in the following circumstances:

Service Providers: We may share information with third-party vendors who assist us in providing our services, such as payment processors and customer support.
Legal Compliance: We may disclose your information to comply with applicable laws, regulations, or legal requests.
Business Transfers: If we are involved in a merger, acquisition, or sale of assets, your information may be transferred as part of that transaction.

 

Data Security
We implement a variety of security measures to protect your personal information from unauthorized access, disclosure, alteration, or destruction. However, no method of transmission over the internet or electronic storage is 100% secure, and we cannot guarantee absolute security.

 

Your Rights
You have certain rights regarding your personal information, including:

Access: You may request access to the personal information we hold about you.
Correction: You have the right to request correction of inaccurate or incomplete information.
Deletion: You may request the deletion of your personal information, subject to certain exceptions.
Opt-Out: You can opt-out of receiving promotional communications from us at any time.
To exercise these rights, please contact us using the contact information provided below.

 

Changes to This Privacy Policy
We may update this Privacy Policy from time to time. Any changes will be posted on this page with an updated effective date. We encourage you to review this policy periodically for any updates.

 

Contact Us
If you have any questions or concerns about this Privacy Policy or our data practices, please contact us at:

 

String Telecom LLC
3101 N. Central Ave, Ste 183 #5325,

Phoenix, Arizona 85012

 

Email: contact@stringtelecom.org
Phone: 251-332-0862

 

Thank you for choosing String Telecom LLC. We value your trust and are committed to protecting your privacy!

String Telecom LLC Acceptable Use Policy

Effective Date: November, 13, 2024

​​

This Acceptable Use Policy (AUP) outlines the acceptable practices for using the services provided by String Telecom LLC (hereinafter referred to as "String Telecom," "we," "us," or "our"). By using our services, you agree to comply with this AUP and ensure that all users of your account also adhere to its terms.

​​

1. Purpose

The purpose of this AUP is to maintain a safe and reliable environment for all users of our services, promote ethical behavior, and ensure compliance with applicable laws and regulations.

​

2. Prohibited Activities

You agree not to engage in any of the following prohibited activities while using our services:

a. Illegal Activities

  • Using our services for any unlawful purpose, including but not limited to fraud, harassment, or distributing illegal content.

b. Spam and Unsolicited Communications

  • Sending unsolicited bulk messages (spam) or engaging in any form of deceptive marketing practices.

  • Using our services to promote or facilitate the distribution of spam.

c. Network Abuse

  • Intentionally interfering with or disrupting the integrity or performance of our network or services.

  • Conducting denial-of-service (DoS) attacks or any other activities that may harm or disrupt the services of String Telecom or any third parties.

d. VoIP Misuse

  • Using our services for voice termination that violates our policies, including but not limited to bypassing tolls, using unauthorized gateways, or participating in call routing fraud.

  • Engaging in practices that degrade the quality of service or the experience for other users.

e. Unauthorized Access

  • Attempting to gain unauthorized access to any system, network, or account associated with String Telecom or any other third party.

f. Impersonation

  • Impersonating any person or entity, or falsely stating or misrepresenting your affiliation with any person or entity.

​

3. User Responsibilities

You are responsible for the actions of all users on your account and must ensure that they comply with this AUP. This includes:

  • Implementing security measures to protect your account credentials.

  • Monitoring your account for unauthorized use or activity.

  • Promptly reporting any suspected violations of this AUP to String Telecom.

​

4. Enforcement

String Telecom reserves the right to monitor the use of our services to ensure compliance with this AUP. We may take the following actions in the event of a violation:

  • Investigate any suspected violations.

  • Issue warnings to the offending user.

  • Suspend or terminate access to services without prior notice.

  • Pursue legal action if necessary.

​

5. Compliance with Laws

You agree to comply with all applicable local, state, federal, and international laws and regulations while using our services. This includes, but is not limited to, telecommunications laws and regulations.

​

6. Changes to the Acceptable Use Policy

String Telecom reserves the right to modify this AUP at any time. Any changes will be posted on our website with an updated effective date. Your continued use of our services after such modifications constitutes your acceptance of the revised AUP.

​

7. Contact Information

If you have any questions or concerns about this Acceptable Use Policy, please contact us at:

 

String Telecom LLC

3101 N. Central Ave, Ste 183 #5325, Phoenix, Arizona 85012
Email: contact@stringtelecom.org

Phone: 251-332-0862

​​

Thank you for your cooperation and for choosing String Telecom LLC. We are committed to providing a secure and reliable communication experience for all our users!

bottom of page