Company

How Deutsche Telekom's information service works

Each month, Deutsche Telekom's abuse team receives more than two million indications of suspected abuse of Internet services.

Relevant abuse is occurring, for example, when a customer's malware-infected computer is attacking other computers, or sending spam, via a Deutsche Telekom Internet access.

The abuse team's methods
The most important sources of tips regarding abuse include security organizations, Internet service providers and Deutsche Telekom's own "honeypots." The abuse team checks tips for relevance, identifies affected customers and then sends them a guide, via both e-mail and regular mail, that explains how to remove the malware from their computers. When a customer's computer continues to launch attacks, in spite of such measures, the abuse teams takes additional steps. For example, it might temporarily block certain services, such as e-mail, in order to protect other users.

Responding within seven days
In each case, the abuse team has a seven-day period in which to follow up on external indications and identify affected customers. At the end of the seven days, pertinent stored IP addresses are deleted. This practice conforms to the German Telecommunications Act, and it has been upheld – most recently, on July 3, 2014 – by the Bundesgerichtshof (Germany's Federal Court of Justice) in Karlsruhe.

FAQ

Cookies and similar technologies

We use cookies and similar technologies on our website to save, read out and process information on your device. In doing so, we enhance your experience, analyze site traffic, and show you content and ads that interest you. User profiles are created across websites and devices for this purpose. Our partners use these technologies as well.


By selecting “Only Required”, you only accept cookies that make our website function properly. “Accept All” means that you allow access to information on your device and the use of all cookies for analytics and marketing purposes by Deutsche Telekom AG and our partners. Your data might then be transferred to countries outside the European Union where we cannot ensure the same level of data protection as in the EU (see Art. 49 (1) a GDPR). Under “Settings”, you can specify everything in detail and change your consent at any time.


Find more information in the Privacy Policy and Partner List.