These documents describe Proximus’ separated accounts. This publication is made after the adoption of a binding decision of the BIPT and is made without prejudice and any adverse recognition.
- Belgacom PLC under Belgian Public Law separated accounts 2012
- Belgacom PLC under Belgian Public Law separated accounts 2011
- Belgacom PLC under Belgian Public Law separated accounts 2000-2010
The documents in this section describe the technical interface characteristics of the Proximus network, according to the products and services involved. These specialized documents are mainly directed towards the manufacturers of terminal equipment, so as to guarantee its compatibility with our network.
These specifications describe the situation of the Proximus network and services. They will be subject to modifications for corrections or when the network or the services will be modified. Please take into account that modifications can appear at any moment. Therefore, the reader is requested to check regularly with the most recent list of available specifications that the document in one's possession is the latest version.
Proximus cannot be held responsible for any damages due to the use of a version of this specification which is not included in the most recent list of available specifications (list always available with a request to the e-mail address mentioned in the last paragraph).
Although every care has been taken in the preparation and publication of these documents, errors in content, typographical or other, may occur. If you have any remarks regarding their accuracy, please send a mail to email@example.com and your remark will be transmitted to the right Proximus department.
For any questions about the content of these specifications, don't hesitate to send a mail to firstname.lastname@example.org. We commit ourselves to give you an answer as soon as possible.
Considering the implementation of the R&TTE directive (directive n° 1999/5/EC of the European Parliament and the Council of 09/03/1999), Proximus publishes the updates of its UNI (User to Network Interface) specifications 6 months before their official validation.
Nevertheless for minor updates or redesign, after BIPT (Belgian Institute of Postal services and Telecommunications) consent, this publication delay could be less than 6 months.
|RFC 2350 Description||1.5||november 2019||English only|
Have you discovered a security problem? Let us know!
Why Proximus believes in Responsible Disclosure
Proximus is continuously working on improving the performance and security of its networks and IT systems. The privacy of our customers’ data is hereby respected at all times. Despite all the measures, a security vulnerability may occur in one of our systems or networks. Have you discovered such a security issue or found evidence of it, let us know. We would like to collaborate with you to solve this problem as quickly as possible.
To prevent any kind of abuse by others of the potential vulnerability, we ask you to always respect the following guidelines of our Responsible Disclosure policy when sending a notification :
- Report your findings to the Proximus Cyber Security Incident Response Team (CSIRT)
report a security problem (You can send this in 3 languages: Dutch, French or English.)
- If it concerns sensitive information and you wish therefore to send your message encrypted, please use the Key ID of PXS-CSIRT and send an e-mail to email@example.com
Key ID : 5D0B022A7CFBC5B3
Length : 2.048
Fingerprint: 8671 CBF3 C010 E4F0 676A 9CD7 5D0B 022A 7CFB C5B3
You prefer to stay anonymous? No problem, but we ask you nonetheless to mention an anonymous mailbox (gmail, hotmail, yahoo, etc.), so we can contact you for additional questions or feedback.
- Be complete and provide detailed information of the security issue (a clear description including IP addresses, log entries, visited pages and URLs, screenshots, how to recreate the problem, etc), so we can investigate it thoroughly.
- Don’t use any automatic scanners and do not change any data or system settings. Please ensure that any research you perform should not harm the operational performance of our systems. DDoS or social engineering attacks, installation of malware or viruses, password theft, fraud, phishing e-mails, spam, etc. will be considered as an offense and be transmitted to the judicial authorities.
- Do not misuse the encountered security problem and do not share concerning information with the media or other channels before or after it has been restored. Possible publications are only under explicit agreement and in collaboration with Proximus. Should this however happen, we will be forced to inform the judicial authorities.
What can you test?
Suspected security vulnerabilities that can be misused for illegal purposes and which occur:
- On our sites:
- Within our products and services, IT-systems and networks
What can you expect from Proximus?
Proximus appreciates your help in optimizing the security of its systems and networks. That's why we will do our utmost to have all contacts in a fair and respectful way:
If you report us a security problem, we will get in touch with you within 2 working days. It goes without saying that we can reach you via the e-mail address or other contact information you left behind. We also keep you informed of further developments.