The document was drafted based on the data submitted by telecommunications undertakings. It is divided into two parts. The first is descriptive and lists the ways in which telecommunications services can be used illegally and examples of breaches to the copyright and related rights. It also describes legal consequences of using telecommunications services in illegal ways. The second part is a Guide and contains a set of practical guidelines which, if applied, can contribute to enhanced security of users when using publicly available telecommunications services, help them to keep their privacy and protect themselves against unauthorised access to personal data.