What is unauthorized porting?

An unauthorized port happens when a telephone number is transferred to a new service provider without the proper permission from the customer. According to the FCC, the new service provider is responsible for ensuring that the customer has authorized the port request per the rules, guidelines, and policies set by the commission.

To ensure competition and freedom of choice for end users, regulations limit the ability of the old or losing carrier to confirm that port-out requests are properly authorized. Thus, to facilitate porting, TSG Global mandates that its customers obtain a legally valid authorization from end users, which is recorded through a Letter of Authorization (LOA) containing the necessary information in accordance with the regulations set forth by the FCC and industry standards.

What is the proper procedure to report an unauthorized port?

TSG Global can provide port-out notifications so customers can review and validate phone numbers that the end users have ported out. If your end user reports that a number has ported without valid authorization, your TSG Global Porting Team will work with the other carrier to determine the validity of the request and, if the port wasn't authorized, return the number as quickly as possible.

It is important to note that any disagreement about a port-out that was not authorized must be reported by the end-user within 24 hours of the occurrence or no later than one week after. If an unauthorized port-out request is reported later than one week after it happened, it is considered a win back and will be subject to standard porting policies and timelines. Any unauthorized port requests over one week old will not be processed as unauthorized port-outs.

To facilitate the verification of an unapproved port-out request and/or restore a number that has been unlawfully ported, kindly follow the given instructions to assist the TSG Global Porting Team:

  • If you suspect an unauthorized port may have occurred, you can report it to your provider by opening a support ticket.
  • Please ensure that the accurate end-user information required for approval has been included as per your available records.
  • Please ensure that you attach or have available a Letter of Authorization (LOA) that is within the 30-day limit, as your provider may request it. Additionally, they require an LOA signed by the end user, indicating their chosen carrier.

If the port wasn't properly requested, your provider will review the information you provided for your end user against the information used to port the TN away. If there is an information mismatch, we will immediately begin working with the other carrier to return the number. This may require further cooperation or input from you or the end user. 

Unauthorized ports can have severe consequences for computer systems. It is important to have proper knowledge regarding these unauthorized

When it comes to unauthorized ports, keep the below factors in mind:

Rephrase

  • The authorization of phone numbers is determined by the validation criteria of the new or "winning" carrier.
  • An outstanding invoice from a customer is not considered an invalid port. The FCC has clarified that service providers cannot obstruct porting because of billing disputes or unsettled accounts.
  • Despite the measures implemented by carriers to validate, unintended or unauthorized phone number transfer is still possible.
  • If a user suspects that a phone number has been transferred without proper authorization, they can submit a complaint to the Federal Communications Commission (FCC).
  • If you seek to enhance the security of your on-net phone numbers and prevent unauthorized ports, it is advisable to include a port-out passcode to provide an additional layer of protection.


Need Some Help Getting Messages Delivered?

Sign Up