The Foundation of a Trusted Network:
Our KYC/KYT Program
A clean, high-performance network is not an accident; it is the result of rigorous, uncompromising diligence. The NGN ICS Know Your Customer (KYC) and Know Your Traffic (KYT) program is the foundational pillar of our commitment to security and quality. This is more than a process—it is a legal and ethical obligation we embrace to protect our partners, their customers, and the integrity of the global communications ecosystem. By ensuring every partner and every use case meets the highest standards, we create a network with less fraud, higher call completion rates, and absolute trust.
Part 1: Know Your Customer (KYC) — Verifying Identity
Our relationship begins with a comprehensive pre-activation review to verify the identity and legitimacy of every prospective partner. This is our first and most important line of defense. Our process includes the mandatory validation of:
- Full Legal Name & Trade Names: Confirming the legal entity and any “doing business as” (DBA) names.
- Physical Place of Business: Verifying a genuine operational address, not a virtual office or mail forwarding service.
- Company Registration & Tax ID: Validating the company’s registration number and relevant tax IDs in its country of incorporation.
- Ownership Structure: Identifying all individuals with significant direct or indirect ownership to ensure transparency.

Part 2: Know Your Traffic (KYT) — Verifying Intent
Understanding the “why” behind the traffic is as critical as knowing the “who.” Our KYT process ensures that all services are used for their intended, legitimate purpose. We work in partnership with our clients to document and validate:
- Traffic Use Case: A clear description of the service (e.g., corporate telephony, contact center, conferencing platform).
- Jurisdictional Compliance: A list of all jurisdictions where traffic will originate and terminate, along with the partner’s compliance practices for each.
- Evidence of Licensing: Proof of any legal authorizations required for the specific use case in the relevant jurisdictions.
- Procedure for Obtaining Consent: For traffic like telemarketing or notifications, a description of the process for obtaining consent from recipients.

Part 3: Post-Activation Monitoring
Compliance is a continuous commitment. Our systems actively monitor post-activation traffic for anomalies or deviations from the approved use case, such as unusual call patterns, short-duration calls, or low answer-seizure ratios, allowing us to proactively address potential misuse.

Ready to scale your telecom infrastructure?
Interconnect with the NGN ICS global network — the privately operated infrastructure trusted by Tier-1 carriers, platforms, and enterprises worldwide.