Top Up Pay Bill

To enrich our future, digitally.

We are committed to guiding our diverse society towards an increasingly digital future, to connect, grow and advance, whilst minimising our impact on the environment, so that our future is one to look forward to.

Our mission & values

Our mission is to deliver communication products that delight our customers and would rank top tier in Europe for price/performance ratio and for Customer Service quality.

Together

We collaborate enthusiastically and respectfully, across teams, customers and community.  We value diversity.

Inspiring

We share new things to do, read, watch, discuss.

Forward Thinking

We're hungry for new ideas and how to make them work.

Clear

Simple to understand and honest.

Our four ESG pillars and our goals

Awards & certifications

Melita's ESG / CSR Strategy Contributes to 12 of 17 of the UN Sustainable Development Goals

The Melita Foundation

The Melita Foundation supports non-profit organisations, individuals and other stakeholders to enable the development of the digital skills and creativity which Malta needs for future growth. We do this whilst respecting and preserving our cultural heritage and environment.

Digital Skills

Developing digital skills to thrive in and navigate our digital world is vital for all of us, regardless of age or background.

Creativity

Creative skills will drive our future entertainment – we want Malta to be at the forefront and support projects across the full range of creativity.

Heritage

Conserving our heritage is fundamental to preserve what our forebears left behind so we, and future generations can understand our past.

Environment

The Melita Foundation supports projects that reduce carbon emissions, waste and water usage, or help the environment in other ways.

Corporate donations

These are some of the organisations we have supported in recent years.

Interested to know more about what we did, in terms of our ESG KPIs and more?

Download our 2022 ESG Report, we hope it is interesting reading, please let us know your feedback.

Keeping children safe online

Cookies

What are Cookies?

Computer cookies (no, not the ones you eat) are text files that contain information about your activity online. Whenever you visit a website, a cookie is downloaded on your device, containing information the name of the website and your unique user ID.

What is the Main Concern?

With cookies recording so much information, advertisers get to know more about you, and subsequently, target adverts tailored to your preferences. Cookies record how long you’ve spent on a particular page, what you clicked on and perhaps what you’ve added to your shopping cart before discarding it. That information will allow that website to recognise you once you visit the website again.

What is the Solution?

The law requires every website to ask for your permission to use cookies. You have the option to accept or decline. You can also choose to ban all cookies from your browser settings to protect your privacy.

Parental Controls

What are Parental Controls?

You can’t keep your child from using the internet nowadays. But you can help keep them safe, by making use of parental control tools, which are available on all devices and platforms, including social media, entertainment programmes (such as Netflix), smartphones and gaming consoles.

What Do Such Tools Do?

Parental controls allow you to limit or block specific websites with adult content, limit what they can search for online and prevent them from using certain programmes. Monitoring tools can give you information about their online behaviour and send you alerts when they visit certain websites. You can also limit the extent of their use by turning off the ability for them to download videos or to share any content with others. Time limits can allow you to control how long they use the internet for and what time of day they can access it.

What Tools are Available?

The Plume App allows you to create profiles for each member of the family and set permissions for each individual, while filtering content, restricting time use and blocking ads. This app is available to you through Melita’s Stellar Wifi. You can find out more here.

Privacy Settings for Social Media

What are Social Media Privacy Settings?

In the past few years, there has been a lot of talk on the news about social media and privacy. It is important to understand what it is you are sharing and how it may be used.

What is the Main Concern?

If you fail to use privacy settings to your advantage, your information can end up in the wrong hands. You can have your own information/content used against you or worse, end up a victim of identity theft. Research shows that 78% of burglars use social networking sites to target vacant homes to burglarise – so be careful what you share and with who!

What is the Solution?

You can control which personal information you want to share and with whom, just as you can limit your posts to be viewed only by some of your friends/ followers but not others.

Facebook allows you to choose whether you want to limit who can view content that you’ve shared in the past and to approve or hide posts in which you are tagged. You also have the ability to control whether people can look you up using your email address or phone number and whether search engines can link searches to your profile. Instagram also allows you to control whether your profile is public/private, block users or choose to link other accounts to your profile.

Cyber Crime Unit

What is the Cyber Crime Unit?

The Cyber Crime Unit within The Malta Police Force investigates, assists and works to prevent crime through which technological devices are used as a method of attack. The Unit was set up in 2003 and the number of cases reported increased significantly over the years, with 1,000 cases being investigated in 2018.

What Crimes Does it Investigate?

The unit investigates crimes related to cyberbullying (harassing, insulting or threatening someone), fraud and forgery or hacking. It also deals with cases of child pornography, prostitution and cyber terrorism (the use of the internet and devices that result in fear, harm and violence). The unit also provides awareness and training of how to be safe online.

How Can you Reach Out?

If you are a victim of cybercrime, or suspect something out of place, you can seek help by calling on 22942231 or sending an email on computer.crime@gov.mt.

Viruses

What are viruses?

A virus is a harmful software that can harm your computer and your sensitive information. Like human viruses, it has the ability to reproduce itself and transfer from one host (computer or device) to another. Most viruses are spread online, through email attachments, infected websites or banner adverts.  It can also get to your device through removable storage devices, such as USB.

What is the main concern?

Once a virus gets into a device, it will start infecting all other applications through malicious coding. You can tell that your device is infected if you notice frequent crashes, unknown programmes starting up with no command, files being deleted or if mass emails are being sent from your account without your permission.

What is the solution?

An anti-virus programme can help prevent, detect and remove harmful software on your device. Just make sure your anti-virus is always up to date!   Anti-Virus software includes names such as McAfee, Norton, Kasperskey and many more.

Phishing

What is Phishing?

Phishing is an attempt to try to get you to hand over your personal data, by using deceptive emails and websites.  Phishing usually takes the form of an email or a message. It usually looks like it’s coming from someone or a corporation that you trust, including logos and telephone numbers of your trusted contacts.

What is the Main Concern?

Phishing a highly sophisticated form of cybercrime in which the attacker poses as an institution or individual that is known to you, for example a friend, a school or a bank asking you for personal details, such as account numbers, pins or passwords. A common example of phishing is receiving an email scaring you into believing that someone has hacked your account, instructing you to click a link to verify your account.

What is the Solution?

Under no circumstance trust an email that asks for your personal details like passwords, bank account.

Check the sender’s email address by clicking on the sender’s name.

Never reply.

Make sure to delete the email and report it to the relevant institution.

Cyber Bullying

What is Cyberbullying?

Cyberbullying is the use of electronic devices like computers, mobiles and tablets, to harass, threaten or embarrass someone. This can take the form of comments, messages and posts that are designed to hurt or upset a person. Cyberbullying can take place over text messages, social media, emails, forums or any applications. Examples include spreading rumours, sending mean or aggressive messages or posting photos or videos meant to humiliate a person.

What is the Main Concern?

Online, content can easily become viral, causing much distress and trauma to the victim and often at times, the bullies use fake profiles to keep themselves anonymous, making them hard to trace.

What is the Solution?

If you are a victim of cyberbullying, or notice someone who is, make sure to seek help immediately by speaking to an adult and/or professionals, calling 179 or contacting the Cyber Crime Unit.

The Cyber Crime Unit can be contacted by telephone on (+356) 2294 2231 or on e-mail address computer.crime@gov.mt

Sexting

What is Sexting?

Sexting is the act of sending sexually explicit messages, photos or videos through any electronic device, be it a computer or a mobile or any other device.  These can include provocative messages using vulgar words and/or sharing photos of people that are partially or fully naked.  They can also show simulated or real sex acts.

What is the Main Concern?

It is illegal to take, own or share sexual images of anyone under 18. Even if such messages are shared between lovers/partners, sexting can become a problem if one of the recipients chooses to share this content with others, which can cause it to become viral in no time.

What is the Solution?

It is recommended that you never share photos of sexual nature with anyone, irrespective of who they are and any cases should be reported immediately to the Cyber Crime Unit.

The Cyber Crime Unit can be contacted by telephone on (+356) 2294 2231 or on e-mail address computer.crime@gov.mt

Grooming

What is Grooming?

An individual with a sexual interest in a minor is likely to try and ‘groom’ the child into sexual abuse, making it seem as if this is normal. The offender carefully plans this and the process can last several weeks or months.

What is the Main Concern?

The most worrying aspect of sexual grooming is that the offender maliciously attempts to create a positive relationship with the child, causing the victim to trust him/her and fail to recognise the bad intent behind the relationship. Deceived, the young person might start looking up to, or believe they are “in love” with the person. Sexual grooming often takes place online, through social media, gaming chat rooms or live streaming platforms.

What is the Solution?

Make sure to speak to your child about online risks and teach them to be cautious on what information they share and who to trust. If you are concerned that your child is in danger, be sure to seek advice immediately.

Identity Theft

What is Identity Theft?

Identity theft happens when someone steals your personal information and makes of it without your permission, or without you being aware. This information may be used to create fake accounts, make purchases or engage in criminal activities.

How Does it Happen?

Your personal information can end up in the wrong hands through phishing through which a criminal attempts to get your information by pretending to be a trusted source, such as a bank or educational institution. A fake profile might also be created in order to get you to hand over personal data. Your personal identity might also be stolen if your device is hacked.

What is the Solution?

Limit what you share online and be vigilant on what information you pass on to strangers. Do not provide personal information to websites that you are not familiar with or trust emails that ask you for your personal data.

Screen Time Monitoring

What is Screen Time Monitoring?

It is perhaps most parents’ concern today – that their child is spending too much time on their device/s. If you want to limit your child’s ‘screen time’ and make sure they are getting other things done, there are tools that can help you.

What is the Solution?

First, make sure to set the right example – are you spending too much time on your phone/tablet? Do you spend enough time engaged in other activities with your child? You can create technology-free zones/times where all the family is restricted from using devices – for example at the dinner table.

What Tools are Available?

There are plenty of applications that allow you to keep track of your child’s online activities. The Plume App allows you to monitor and set restrictions according to your preferences. The app is available through Melita’s Stellar Wifi.

Browser History

What is Browser History?

When you browse on the internet, the search engine you use (Google Chrome, Internet Explorer or others) keeps record of all the websites and forms you have visited, together with the date and time when you visited. This is done by default by online browsers, but you can edit and modify the settings to your preferences.

What are the Implications?

Your web browsing history will not be shared publicly, however, it can be viewed by anyone making use of the device used. In addition, if you are connected to a network, for example at work or university, the network administrator will have access to your browsing history.

What is the Solution?

There are a number of ways in which you can protect your online activity history. Most search engines will allow you to switch to an ‘incognito’ or ‘anonymous’ profile, where your browsing history will not be recorded. You can also change your settings to limit the data that is recorded, such as your location. Make sure to clear your cookies and search history as often as you require.

Melita ESG in the news

Chat With Us

Connecting you to a live agent...

There was a problem connecting you to a live agent