Telstra switches on Android app billing
- 04 December, 2012 09:53
Telstra will allow its customers to bill paid apps from Google's Play Store to their mobile phone account, the carrier has announced.
The company switched on the service today, allowing Android smartphone users with a post-paid or pre-paid Telstra account to bill app purchases of up to $20 to their account. Users previously required a credit card to purchase paid apps and content from the Google Play Store.
"Aussies love their mobile apps," said Telstra's Director of Consumer Applications and Services, Freddie Jansen Van Nieuwenhuizen."With more than 700,000 games, apps, books, movies and magazines now available on Google Play – including a wide selection of paid titles – many of our customers have told us they would like a simpler way to buy," he said.
"So we've teamed up with Google to allow our customers to place Google Play purchases of up to $20 per transaction on their Telstra mobile bill."
To bill apps to a Telstra mobile phone service, users are required to enter a billing address to be stored in their Google account. Telstra confirmed that a monthly limit of $100 applies for app and content purchases for post-paid customers, though the limit can be increased if requested. The overall limit can be increased to a maximum of $500 per month but has to be done in $100 increments.
Pre-paid customers have a $500 per month content spend limit and will have the funds taken from their main account balance, providing there are sufficient funds available.
To prevent unintended purchases, Telstra customers can set a PIN code in the settings menu of the Google Play Store on their smartphone. Customers who don't wish to charge apps to their bill can turn the service off if they wish by requesting the spend limit be set to $0. This will grey out the 'Bill my Telstra account' option and prevent unauthorised purchases.
As part of the new billing service, Telstra and Google are offering a selected list of apps for half price until Tuesday 18 December. These half-price apps include popular titles like HD Widgets, the Swiftkey 3 keyboard, Endomondo Pro, World of Goo and Sketchbook Mobile.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Governance For All - Empowering IT and Business Content Owners
Governance for all is more than an IT initiative or a goal written in a plan document; it’s a strategy that unites IT and business content owners to achieve their SharePoint goals. At its best, governance means empowering self-governance, with tools like delegated access, effective reporting, and automated policy enforcement. This white paper explains how to create a “governance for all” strategy that will enhance SharePoint adoption and its benefits to the organization. Read now.
Saving Time and Money with Savvy Use of Flash in Automated Storage Tiering
In a sluggish economy, getting the best ROI on every IT dollar spent is the top priority for almost every business. Storage budgets in most IT environments continue to remain flat or are capped as a percentage of the overall IT spend, while data storage requirements continue to grow at an unsustainable pace. Download now to learn about the benefits of using flash in automated storage tiering.
New Demands for Real-time Threat Management
Many organisations are evaluating a new security model based upon IT risk management best practices. This is a good idea, but not enough for today’s dynamic and malevolent threat landscape. To keep up with IT changes and external threats, large organisations need to embrace two new security practices: real-time risk management for day-to-day security adjustments and real-time threat management to detect and remediate sophisticated, stealthy, and damaging security breaches (i.e., advanced persistent threats, or APTs). Learn more.