This identifies the way of accessing the spectrum hole without interfering the communication of the primary users.
Harassment
Rules Violation
Spam