Nuisance Call Blocking
|
|
- Magdalene Harris
- 7 years ago
- Views:
Transcription
1 Nuisance Call Blocking A Telsis White Paper January 2016
2 Introduction Nuisance calls are broadly defined as calls that are unsolicited or unwanted. They can include cold calls from telemarketers, prank or fraudulent calls and even threatening calls. In the UK, the Telecoms regulator Ofcom indicates that 86% of people receive nuisance calls and that the number of nuisance calls they re receiving is increasing every month. Clearly this is a growing problem that consumers want addressed. There are several techniques for dealing with the issue of nuisance calls. This white paper looks at the problem, how consumers feel about it, how it can be effectively dealt with and the role network operators must play. In addition, this white paper offers practical steps that network operators can take in order to protect their customers from such calls. The white paper concludes with a brief look at how Telsis helps network operators address the problem of nuisance calls for their customers. Nuisance Call Blocking Unwanted calls are an annoyance to most people who receive them. In the UK alone, the Information Commissioner s Office received 175,000 complaints relating to nuisance calls and texts in Existing solutions for tackling cold callers such as the Telephone Preference Service (TPS) are ineffective and leave users frustrated by a lack of options to block these unwanted interruptions to their lives. By providing an effective way of blocking nuisance calls, network operators can improve their customers experience which can help attract new customers and keep existing customers that might otherwise look elsewhere for a solution. Nuisance Calls Nuisance calls cover a wide range of different types of call ranging from silent calls and telemarketing calls through to malicious and obscene calls. The majority of nuisance calls are some form of telemarketing made from call centres that attempt large volumes of calls each day. Although not malicious, these calls can be a source of frustration to people as they cause an unnecessary disturbance. Most nuisance calls offer products or services which are of no interest to the people that they call. Some calls even attempt to trick people into giving over personal details or to sign up for a service that they do not want or need. Such calls can be particularly difficult for vulnerable people who may be more willing to buy services or fall for scams of this type. An example of this type of scam is boiler room fraud. This uses dishonest, high pressure sales techniques to sell investments, such as penny shares, with the promise of high returns and minimal risk. By pushing such shares the fraudster creates artificial demand for the shares, thus increasing their price. The fraudster then sells the shares that they initially bought at a low price, making large profits for themselves. A Problem of Consent One way in which the industry has tried to cut out nuisance calls is to set up opt out lists, such as the Telephone Preference Service (TPS) list in the UK. Users can express a preference that they are not interested in receiving telemarketing calls. Telemarketing companies are obliged to check the TPS list before making calls to telephone numbers on the list or else they risk being fined by the regulator. While this may appear to be a good solution to the problem, there are a number of issues with this approach: 1. Dishonest Callers Not every nuisance caller is an honest telemarketing caller. Legitimate telemarketing companies do check opt out lists but there are many other types of nuisance callers that simply ignore the list and operate outside of the regulator s gaze. 2. International Callers Research has shown that in the UK, 16% of all nuisance calls originate from overseas. Since the traffic is international in origin, it is outside of the remit of the regulators and as such the originators cannot be fined.
3 3. Consent Has Been Given Another source of nuisance calls to numbers on the TPS list is where people have given their consent to be called. Most forms that people fill include consent to have their details shared and be contacted by other companies in the small print. Unless the person completing the form explicitly states that they do not want to be contacted, they give their consent to be contacted by telemarketing companies. Often the wording on the consent statement is deliberately confusing so that people give their consent without realising. Other Disturbed Unnecessarily They Keep Phoning Silent Calls The net result of these is that opt-out lists are less than effective and despite them, people still receive nuisance calls. Customer Frustration With Nuisance Calls According to Ofcom research in the UK (March 2015), 86% of people receive nuisance calls, averaging 9.7 calls over a 4 week period increasing year-on-year from 8.4 in The biggest source of nuisance calls in the UK in 2015 relate to claims for payment protection insurance (PPI). These account for almost 1 in 4 calls. 85% of people find nuisance calls either annoying or distressing with only 1% finding them useful. Caller DoesnIt Listen To Me Scam Call Caller Hung Up After Answer Subject/Product Of No Interest Time Wasting Reasons for Attitude to Nuisance Calls Nuisance calls are annoying to people because they continue receiving calls that they don t want and have to interrupt what they are doing to deal with them. Distressing Useful Annoying Not a Problem Other PPI Unspecified Market Research Feelings about nuisance calls Solar Panels Energy Companies Insurance Accident Claims/Compensation Home Improvements Product/service being offered by nuisance calls
4 < 1/month < 3/month Would use if free Not interested How much would you be willing to pay for a nuisance call blocking service? Customers are willing to change provider to stop receiving nuisance calls According to research carried out by Telsis, 86% of respondents would be interested in subscribing to a nuisance call blocking service, however only 6% of respondents would be willing to pay more than 1 per month for such a service. Despite this, 43% of respondents indicated that they would be willing to switch networks in order to change to a provider which offered an effective nuisance call blocking service. Strategies For Blocking Nuisance Calls Any strategy for blocking nuisance calls needs to strike a balance between protecting against nuisance calls whilst still making it easy for other calls to be completed. Strategies for blocking nuisance calls include: Blocking all calls with a withheld Calling Line Identification (CLI) Most nuisance callers withhold their CLI so that they cannot be identified. By blocking all calls without a CLI the majority of nuisance calls can be blocked. Unfortunately there are a number of legitimate calls that withhold their CLI such as people worried about their privacy and many businesses that you may be dealing with. Blocking withheld CLIs can be a heavy handed solution that prevents calls that consumers may actually want. Would you be prepared to switch operator to one that provides nuisance call blocking? Blacklisting numbers Rather than simply blocking withheld CLIs, another option is to blacklist certain numbers screening out nuisance callers. While this may be by the consumer using their handset, handset apps do not let you discriminate between different callers that withhold their CLI. Alternatively the network can block callers based on their network CLI (that is not visible to handsets), however there then becomes an issue with how the list is managed by the end user. Whitelisting numbers For vulnerable people an alternative approach is to block all callers unless they are on a whitelist. This approach is heavy handed but does protect people that need extra protection. Manual screening Improving on the whitelisting approach is to have a whitelist and then allow someone else to screen calls made by people not on the whitelist. For example, a parent may wish to screen calls made to their children in order to protect them from unwanted or nuisance callers. Once a call has been screened, the caller may be placed on the whitelist and transferred to their intended destination or the call may be rejected by the person screening their calls.
5 Making it time consuming for nuisance callers Most nuisance callers are working towards time or customer volume related targets. If there are obstacles in place that prevent them from communicating with people quickly or give people an opportunity to screen their calls before speaking to them, then they are likely to hang up before disturbing the person they have called with a nuisance call. Consumer vs Network Centric Approach to Dealing with Nuisance Calls There are two main ways that nuisance calls can be prevented. Either by the user managing this themselves with their device or at the network level. User level solutions rely on the user signing up to (ineffective) lists or by them purchasing an appliance which plugs into a phone line, or a smartphone app. Calls made to the user are intercepted and screened. Network level solutions perform the screening within the network and do not require an appliance or app. Feature Consumer Network Fine control of call screening parameters Screening of calls from individual calls where CLI is withheld Manual installation of app/ appliance Ease of use accessible to all users Crowdsourced learning Network analytics for subscriber profiling and future revenue opportunities Adaptive service tweaked to offer greater protection Where CLI is available Comparison between consumer and network based nuisance call blocking While device level solutions are able to provide good levels of protection against nuisance calls and do not have any impact on the telecoms network, there are several advantages of network level solutions which make them attractive to operators. Network level solutions: 1. Are easier for consumers they do not require the installation of an appliance or smartphone app 2. Are able to offer greater protection calls can be screened using their network CLI, even if their customer facing CLI is withheld 3. Provide network analytics it allows network operators to look where nuisance calls are coming from, and where applicable block all calls from those callers 4. Provides promotional advantages network layer solutions provide network operators opportunities for positive advertising and news coverage. The Telsis Solution to Preventing Nuisance Calls The Telsis solution to preventing nuisance calls is to provide a network based solution which consists of personalised blacklist and whitelists combined with measures to frustrate potential nuisance callers such that they do not disturb users. The first time a new caller makes a call to the user, they are asked to say who they are and press the star key. Providing that they do so, a call is made to the user to introduce the caller. The user can then choose to accept the call, always accept calls from this caller, reject the call, or reject all calls from that caller. (The network operator may choose which options are available to users.) Once a user had chose to always accept calls from a caller, subsequent calls will go straight to the users. If the caller is a nuisance caller they are unlikely to leave their name and will simply hang up and move onto the next number on their list. The Telsis solution detects speech patterns to determine if the caller has left their name. An increasing number of nuisance calls rely on recorded messages and then only connect to a live agent if the person they have called presses a key. Since recorded messages will not contain key presses they will not be passed through, preventing users from being interrupted. Users may also manage their personalised blacklist and whitelist using a web interface or smartphone app. Although the service provides personalised configuration for users, it also provides analytics for network operators allowing them to monitor potential nuisance callers and take action where appropriate. The Telsis nuisance call blocking solution is a next generation solution that requires minimal network integration.
6 Conclusion Nuisance call volumes are increasing year-on-year and affect almost 9 out of 10 people. The majority of people on the receiving end of nuisance calls find them annoying - only 1 in 100 calls are found to be useful. In this white paper we ve examined the different types of nuisance calls and the impact they have on consumers. In addition we ve looked at the different approaches for dealing with nuisance calls including those reliant on the user and those available through the network itself. Current approaches to blocking nuisance calls, such as opt-out lists, are ineffective due to nuisance callers either ignoring the opt-out or by gaining consent from people filling in forms for a variety of companies. Network based solutions for preventing nuisance calls offer significant advantages to network operators, both in terms of the level of protection offered and being seen to address a problem users face every day and gaining positive press and media coverage as a result. The Telsis nuisance call blocking solution is a personalised network call screening solution which is designed to offer the best level of protection against annoying nuisance calls with the minimal impact on genuine callers. It s easy to deploy and delivers a very quick return for the network and its users. For more information, please visit contactus@telsis.com UK t: +44 (0) Germany t: +49 (0) Copyright 2016 Telsis Communication Systems Limited Telsis products are subject to continual development and specifications may change. Prospective buyers should exercise their own independent judgement to confirm the suitability of our products for their particular application. Telsis, Ocean and NODAL are registered trademarks of Telsis Communication Systems Ltd. All other trademarks and registered trademarks are the property of their respective holders.
No more nuisance phone calls! Internet Control Panel & Weblink Guide
No more nuisance phone calls! Internet Control Panel & Weblink Guide truecall Ltd 2009 2 Contents Welcome! 3 Weblink 4 Your Internet Control Panel 5 Frequently asked questions 15 Support/Data Protection
More informationAll Party Parliamentary Group (APPG) on Nuisance Calls inquiry into Nuisance Telephone Calls. Written evidence from BT.
All Party Parliamentary Group (APPG) on Nuisance Calls inquiry into Nuisance Telephone Calls Written evidence from BT September 2013 1 The Culture, Media and Sport Committee inquiry into Nuisance Telephone
More informationNo more nuisance phone calls! Reference Guide
No more nuisance phone calls! Reference Guide truecall Ltd 2009 2 Contents/Introduction Introduction 2 How truecall handles your calls Intelligent call screening 3 Putting numbers onto your Zap and Star
More informationDERBYSHIRE COUNTY COUNCIL MEETING OF CABINET MEMBER HEALTH AND COMMUNITIES. Report of the Strategic Director Economy, Transport and Environment
Agenda Item No.3 DERBYSHIRE COUNTY COUNCIL MEETING OF CABINET MEMBER HEALTH AND COMMUNITIES Report of the Strategic Director Economy, Transport and Environment USE OF CALL BLOCKERS TO PREVENT FRAUDULENT
More informationIntroduction and contact details
Introduction and contact details This document is the Government s response to the outcome of the consultation on Requiring direct marketing callers to provide Calling Line Identification. It covers: the
More informationThe Ethical Marketing Charter
The Ethical Marketing Charter In this document we aim to give you an overview of the Ethical Marketing Charter and its aims and protocols, along with definitions of what we mean by the terms referenced
More informationCommunication Choices
Communication Choices Dealing with unwanted calls on your BT line Call control Peace of mind bt.com/unwantedcalls Contents Dealing with unwanted phone calls... 3 Marketing and sales calls... 4 Silent calls...
More informationJunk Mail, Phone, Fax, Text etc
Junk Mail, Phone, Fax, Text etc How to fight back and get results Section 12 of the Data Protection Act states that an individual is entitled at any time by notice in writing to a data controller to require
More informationRequiring direct marketing callers to provide Calling Line Identification. January 2016
Requiring direct marketing callers to provide Calling Line Identification January 2016 3 Department for Culture, Media & Sport 4 Department for Culture, Media & Sport Contents Ministerial Foreword...
More informationAn Easyread guide on how to deal with Nuisance phone calls and text messages. Northamptonshire Learning Disability Partnership Board
An Easyread guide on how to deal with Nuisance phone calls and text messages Northamptonshire Learning Disability Partnership Board Nuisance calls What are nuisance calls? Nuisance calls are unwanted phone
More informationUpdate on the ICO and Ofcom Joint Action Plan for tackling nuisance calls and messages
Update on the ICO and Ofcom Joint Action Plan for tackling nuisance calls and messages In July 2013, the Information Commissioner s Office (ICO) and the Office of Communications (Ofcom) published a joint
More informationYour Virgin phone guide
Important Numbers Here s a space to write down some of your important numbers. Voicemail PIN Call Barring PIN Quick Dial number Programmed number Quick Dial number Programmed number Your Virgin phone guide
More informationHow to get fewer phone calls you do not want
How to get fewer phone calls you do not want This is an EasyRead leaflet of: Nuisance calls and messages - Consumer guide. About us We are called the Office of Communications. Or Ofcom for short. We make
More informationø Landline Bolt Ons User Guide Make more of your phone
ø Landline Bolt Ons User Guide Make more of your phone Bolt Ons provided with your ø Landline Withhold number 141 1 Dialling 141 before you dial a number means that your number will be withheld This service
More informationsend and receive MMS
send and receive MMS 1 Contents Page 3 Page 4 Page 7 Page 8 Page 12 Page 13 Page 15 An introduction to MMS messaging How to send MMS messages How much does it cost to send MMS? Receiving MMS How much does
More informationProfessional Telesales Skills
Professional Telesales Skills This course is designed to improve the skills, techniques and confidence of those working in Telesales and Telemarketing. The type of individual who thrives in this type of
More informationNo more nuisance phone calls! Getting Started Guide
No more nuisance phone calls! Getting Started Guide (For people who don t read manuals!) truecall Ltd 2009 2 Your Getting Started guide Congratulations on your new purchase! Your Getting Started Guide
More informationConsultation Response Report. 25 February 2015. Chapter 1: Introduction
Proposal to lower the legal threshold for the Privacy and Electronic Communications (EC Directive) Regulations 2003 ( PECR ) for regulations 19-24, to tackle unsolicited direct marketing calls and SMS
More informationTelemarketing Code of Practice
The Code was reviewed and updated in October 2014 Telemarketing Code of Practice This Code of Practice and Guidelines has been developed by the Marketing Association for the purpose of promoting best practice
More informationTHE DO S AND DON TS OF SMS MARKETING
THE DO S AND DON TS OF SMS MARKETING 02 Firstly, if you are not already doing it, do consider text marketing! Mobile commerce is growing. This is simply because people like and prefer mobile phones and
More informationtruecall Ltd 2012 Call Recorder and Message Centre guide
truecall Ltd 2012 Call Recorder and Message Centre guide 2 Contents Overview 3 Plugging in the memory card 4 Using Call Recorder 5 Playing back recordings 6 Message Centre Installing truecall Message Centre
More informationBEL Business Exchange Line
BEL Business Exchange Line This e-pack user guide provides an overview of your product, identifies common user issues and outlines ways to resolve them. Contents Page Product Introduction Page 3 Common
More informationTackling abandoned and silent calls Statement
Tackling abandoned and silent calls Statement Statement Publication date: 1 October 2010 Contents Section Annex Page 1 Executive summary 1 2 Introduction 4 3 Repeat silent calls 9 4 Clarifying the abandoned
More informationTelephone Users Guide
Telephone Users Guide T A B L E O F C O N T E N T S 1 WELCOME TO ARMSTRONG TELEPHONE 2 Our Commitment to You Identifying Our Employees Dialing 911 - Your Safety Is Important 3 HOW TO MAKE CALLS Domestic
More informationCalling Features. Connected. Instructional Manual. Your pathway to the world
Calling Features Instructional Manual Connected Your pathway to the world 328 W Main St New Auburn, WI 54757 Phone (715)237-2605 Web: www.citizens-tel.net Call Waiting Allows you to never have to miss
More informationClaims Management Regulation. Marketing and Advertising Guidance Note
Claims Management Regulation Marketing and Advertising Guidance Note July 2013 Contents Introduction 1 Telemarketing 2 Making telesales calls 2 Data and third party compliance 4 Content of telesales calls
More informationtalk Our calls only phone service code of practice
talk Our calls only phone service code of practice Introduction This is our code of practice, which explains the services we offer for our calls only product, provides some general information and tells
More informationDelivering successful Interactive Voice Response (IVR)
Delivering successful Interactive Voice Response (IVR) Your customer s telephone journey starts as they dial. INTRODUCTION If you ve been focusing primarily on multichannel, you may have missed refreshing
More informationHow to Avoid the 10 BIGGEST MISTAKES. in Voice Application Development
How to Avoid the 10 BIGGEST MISTAKES in Voice Application Development Are you building the next generation mobile app that provides users anytime, anywhere voice and messaging communication? Maybe you
More informationMake more of your phone
Make more of your phone YOUR GUIDE TO BT CALLING FEATURES Never miss another call Call Diversion* Lets you divert your calls to another number when you re away from your phone Call Diversion lets you divert
More informationYour Virgin Media phone guide. Get the most out of your phone service
Your Virgin Media phone guide Get the most out of your phone service Hello! Welcome to your Virgin Phone service. Now you re in, it s time to get talking! Before you do though, you might want to set up
More informationEverything you need to know to install and use your truecall Call Blocker unit
Everything you need to know to install and use your truecall Call Blocker unit 2 Contents Contents 2 Overview 3 Setting up truecall Call Blocker 4 How truecall handles your calls 6 Call handling profiles
More informationSCAMS BULLETIN. November 2014
November 2014 The purpose of this scams bulletin is to enable Isle of Wight Council residents to be aware, and therefore guard against the type of scams currently being reported to the Isle of Wight Council
More informationSMS SERVICE PROVISION
SMS SERVICE PROVISION Terms and Conditions and Privacy Policy Version 2.01 Aug 2015 Page 1 Contents TERMS & CONDITIONS... 3 Registration... 3 Your Personal Information... 3 Our Obligations to SMS Service
More informationNo more nuisance phone calls! Call Recorder and Message Centre Guide
No more nuisance phone calls! Call Recorder and Message Centre Guide truecall Ltd 2009 2 Contents Overview 3 Plugging in the memory card 4 Using Call Recorder 5 Playing back recordings 6 Message Centre
More informationWHITE PAPER. How to simplify and control the cardholder security environment
WHITE PAPER How to simplify and control the cardholder security environment Document Version V1-0 Document Set: QCC Information Security Prepared By Nick Prescot - QCC Information Security Ltd Sponsored
More informationSources of finance (Or where can we get money from?)
Sources of finance (Or where can we get money from?) Why do we need finance? 1. Setting up a business 2. Need to finance our day-to-day activities 3. Expansion 4. Research into new products 5. Special
More informationReport of the Nuisance Calls and Texts Task Force on Consent and Lead Generation
Report of the Nuisance Calls and Texts Task Force on Consent and Lead Generation Contents Summary of actions recommended by the Task Force 1 Introduction 4 Consumer consent and lead generation in the context
More informationRE: Telemarketing Review Comment. FTC File No. P994414
May 30, 2000 Office of the Secretary Federal Trade Commission Room 159 600 Pennsylvania Avenue, N.W. Washington, DC 20580 (Filed electronically in Word format at tsr@ftc.gov) RE: Telemarketing Review Comment.
More informationHome Phone. Features Guide. Features Guide. Find out how to use the Home Phone call features. Voicemail 1571. Contents.
Home Phone Find out how to use the Home Phone call features Contents Voicemail 1571 Three way calling Reminder Call Ring Back 1471 (Last Number Called) 141 Number Withhold 1471 Erasure Caller Display Call
More informationSALES & SALES MANAGEMENT TRAINING
SALES & SALES MANAGEMENT TRAINING Sales are the key to setting up and running a successful business. However, it is not sufficient just to have a passion for your particular product or service. You will
More informationRingCentral for Desktop. UK User Guide
RingCentral for Desktop UK User Guide RingCentral for Desktop Table of Contents Table of Contents 3 Welcome 4 Download and install the app 5 Log in to RingCentral for Desktop 6 Getting Familiar with RingCentral
More informationA Quick Reference to Telephone Features and Services
A Quick Reference to Telephone Features and Services Table of Contents I. Individual Features A. Call Waiting B. Cancel Call Waiting C. Three-Way Calling D. Speed Calling E. Call Return F. Repeat Dialing
More informationFive Steps Towards Effective Fraud Management
Five Steps Towards Effective Fraud Management Merchants doing business in a card-not-present environment are exposed to significantly higher fraud risk, costly chargebacks and the challenge of securing
More informationYour Virgin Media phone guide
Includes The Cloud SmartCall Your Virgin Media phone guide All the tips and tricks you need 2 Contents First things first 3 Let s go 3 Say hello to SmartCall 4 Making a SmartCall couldn t be easier 5 Take
More informationCalling Features User Guide
Calling Features User Guide Enjoy Great Pay-Per-Use Features No matter what TDS phone service you have, you can also enjoy these great pay-per-use features: *66 Repeat Dialing Tired of receiving a busy
More informationTOTAL DEFENSE MOBILE SECURITY USER S GUIDE
TOTAL DEFENSE MOBILE SECURITY USER S GUIDE Publication date 2015.04.09 Copyright 2015 Total Defense Mobile Security LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted
More informationKey #1 - Walk into twenty businesses per day.
James Shepherd, CEO You can be successful in merchant services. You can build a residual income stream that you own. You can create lasting relationships with local business owners that will generate referrals
More informationPutting Telephone Scams... On Hold
Putting Telephone Scams... On Hold Federal Trade Commission Toll-free 1-877-FTC-HELP Federal Trade Commission Toll-free 1-877-FTC-HELP www.ftc.gov For the Consumer www.ftc.gov For the Consumer Telemarketing
More informationCustom Calling Features 3 DEF 5. Custom Calling Features User s Manual
Custom Calling Features 1 2 4 GHI 7 PQRS ABC 3 DEF 5 JKL 8 TUV * 0 6 MNO 9 WXYZ # Custom Calling Features User s Manual Table of Contents This user guide provides instruction for the following Custom-Advanced
More informationTHE COLMAR BRUNTON RESEARCH PANEL
THE COLMAR BRUNTON RESEARCH PANEL PRIVACY POLICY C O N T E N T S COOKIE POLICY TERMS & CONDITIONS PRIVACY POLICY Research work conducted via Colmar Brunton s Research Panel are professional studies for
More informationOfcom Response. Daviker
Ofcom Response Daviker Date: 07-11-2014 Table of Contents Daviker Background... 3 Question 1... 3 1. Repeat calls with no way to return the call... 3 2. Silent Calls... 3 3. Volume... 4 Evidence on time
More informationBroadband Acceptable Use Policy
Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2
More informationefolder White Paper: 5 Ways to Turn Office 365 into a Profitable Service Offering
efolder White Paper: 5 Ways to Turn Office 365 into a Profitable Service Offering January 2015 Introduction As Microsoft has aggressively responded to the encroachment of Google Apps into its productivity
More informationBT Cloud Phone. A simpler way to manage your business calls.
. A simpler way to manage your business calls. Make and receive calls from anywhere with a phone system that s hosted in the cloud. Save on set-up, maintenance and call charges. Have reassurance that we
More informationUnsolicited Electronic Messages Act 2007
Unsolicited Electronic Messages Act 2007 Prohibiting Spam and promoting good business practice This guide provides practical information so businesses can ensure they meet the requirements of the Unsolicited
More informationEvaluating the Perceptions of People towards Online Security
Section 2 Information Systems Security & Web Technologies and Security Evaluating the Perceptions of People towards Online Security Abstract N.K.Jayakumar and A.D.Phippen Network Research Group, University
More informationNuisance Calls and Texts. Neil Cook, Cloudmark Chief Technology Officer
Nuisance Calls and Texts Neil Cook, Cloudmark Chief Technology Officer Who is Cloudmark? Cloudmark develops messaging security software solutions for communications service providers to protect their networks
More informationMRS Regulations for Use of Predictive Diallers. January 2011
MRS Regulations for Use of Predictive Diallers January 2011 MRS is the world s largest association for people and organisations that provide or use market, social and opinion research, business intelligence
More informationFraud. Your guide to protecting yourself from fraud
Fraud Your guide to protecting yourself from fraud Kent Police is committed to protecting people from career criminals and fraudsters. This booklet has been designed to give you advice on how to protect
More informationCASH ISA SAVINGS CONDITIONS. For use from 2nd September 2016.
CASH ISA SAVINGS CONDITIONS. For use from 2nd September 2016. WELCOME TO HALIFAX This booklet explains how your Halifax savings account works, and includes its main conditions. This booklet contains: information
More informationAustralian Communications Consumer Action Network
Australian Communications Consumer Action Network Website: www.accan.org.au E-mail: info@accan.org.au Telephone: +61 (0)2 9288 4000 TTY: +61 (0)2 9281 5322 ACCAN is the peak body that represents all consumers
More informationStandard Features What it does Price Exc VAT Price Inc VAT Page. Number Withhold Allows you to withhold your number Free Free 2
Feature Guide Zen Line Rental Included Features Summary: Standard Features What it does Price Exc VAT Price Inc VAT Page Last Number Called Tells you the number that called last and call return Free Free
More informationCreditCard Processing. Payment MadeEasier
CreditCard Processing Payment MadeEasier Buyers Guide for Credit Card Processing 1. A Brief Introduction of Credit Card Processing 2. Benefits of Credit Card Processing 3. How to Choose a Service Provider
More informationSeeing you through refinancing
REFINANCING GUIDE Seeing you through refinancing hether you re moving home, renovating, or simply looking for a different home loan, refinancing doesn t need to be complicated. At QuickSelect we are interested
More informationSTRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
More informationEE Broadband Network Terms for Small Business
Terms and conditions The legal terms You need to know about Your fixed line telephone and internet service. Version 01 dated October 2012. Here s a brief summary of some key points which We d like to draw
More informationof firms with remote users say Web-borne attacks impacted company financials.
Introduction As the number of users working from outside of the enterprise perimeter increases, the need for more efficient methods of securing the corporate network grows exponentially. In Part 1 of this
More informationInternational IPTV Consumer Readiness Study
International IPTV Consumer Readiness Study Methodology The Accenture International IPTV Study is based on structured telephone interviews using a standard questionnaire and quantitative analysis methods
More informationWHAT ELSE CAN YOUR HOME PHONE DO?
visit a Telstra store 13 2200 telstra.com/home-phone WHAT ELSE CAN YOUR HOME PHONE DO? Everything you need to know about the features that make your home phone more helpful, flexible and useful C020 FEB16
More informationE-mail Marketing ABSTRACT
E-mail Marketing * Mr. R. Vasudevan ABSTRACT E-MAIL MARKETING is a form of direct marketing which uses electronic mail as a means of communicating commercial or fundraising messages to an audience. E-Mail
More informationKevin Hayler. Where I m from
THE PROPOSITION Where I m from I ve worked in the Credit Card industry for over 17 years, starting in 1995 with Barclaycard as a Sales Manager, progressing through the ranks before moving to Bank of Scotland
More informationRespect at Work SN 2/03
Respect at Work SN 2/03 NERC Policy Covering Bullying and Harassment This Staff Notice replaces the following Notices: SN 17/89 - Sexual Harassment SN 7/99 - Harassment - an informal procedure SMPN 82
More informationProtecting your business from spam
Protecting your business from spam What is spam? Spam is the common term for electronic junk mail unwanted messages sent to a person s email account or mobile phone. Spam messages vary: some simply promote
More informationBringing value back to voice. Your Guide to Broadband for Business
BROADBAND FOR BUSINESS Bringing value back to voice. Your Guide to Broadband for Business TELEPHONE Service 1 Business Phone Services from LUS Fiber connect you to affordability and opportunity. You re
More informationMobile Security Threats: Apps. Tales from the real (Mobile Network) World
Mobile Security Threats: Apps Tales from the real (Mobile Network) World About Me Cathal Mc Daid Head of Data Intelligence & Analytics AdaptiveMobile World leader in Mobile Security Unique, Complete, Multi-bearer
More informationSolving the SMS Revenue Leakage Challenge
Whitepaper Table of Contents 1 Background 2 SMS fraud technical overview 3 Affected parties 4 Common methodologies 5 Ways to control the different types of SMS fraud Solving the SMS Revenue Leakage Challenge
More informationPrivacy Policy MacID. Document last updated Sunday, 28 December 2014 Property of Kane Cheshire
Privacy Policy MacID Privacy Policy We are committed to safeguarding the privacy of our website visitors and app users; this policy sets out how we will treat your personal information. Our website uses
More informationGlobarange Phones and joip Service. How does the Globarange phone work?
Globarange Phones and joip Service How does the Globarange phone work? How is Globarange different from a conventional phone? It's like a conventional phone that also lets you simultaneously use an IP
More informationA guide to reducing the number of false alarms from fire-detection and fire-alarm systems
A guide to reducing the number of false alarms from fire-detection and fire-alarm systems Using this booklet If an automatic fire-detection and fire-alarm system is used and maintained properly, its fast
More informationSIP Trunks. The cost-effective and flexible alternative to ISDN
SIP Trunks The cost-effective and flexible alternative to ISDN A cost-effective alternative to ISDN that provides flexibility and continuity Reliable voice services SIP trunking is rapidly replacing ISDN
More informationTelemarketing Code of Practice
Telemarketing Code of Practice This Code of Practice and Guidelines has been developed by the Marketing Association for the purpose of promoting best practice by those engaged in telephone marketing. It
More informationMOBILE MALWARE REPORT
TRUST IN MOBILE MALWARE REPORT THREAT REPORT: H2/2014 CONTENTS At a Glance 03-03 Forecasts and trends 04-04 Current situation: 4.500 new Android malware instances every day 05-05 Third-party App-Stores
More informationBT Calling Features User Guide. Make more of your phone
BT Calling Features User Guide Make more of your phone Never miss another call Call Diversion* Lets you divert your calls to another number when you re away from your phone Call Diversion lets you divert
More informationvoicemail mobile looking after your calls while you re looking after yourself
voicemail mobile looking after your calls while you re looking after yourself welcome to the manx telecom voicemail service. The Voicemail messaging service can be activated on your line and provides you
More informationFurther and Faster Avaya Aura Contact Center helps Hillarys Blinds take its customer experience to the next level. Hillarys Blinds - CASE STUDY
Hillarys Blinds - CASE STUDY Further and Faster Avaya Aura Contact Center helps Hillarys Blinds take its customer experience to the next level. 2015 Maintel maintel.co.uk The Challenge At Hillarys Blinds,
More informationUNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
More informationTreating Customers Fairly. October 2015
Treating Customers Fairly October 2015 Our promise to treat you fairly At SSE we are committed to giving excellent service and treating customers fairly. Our 2015 Treating Customers Fairly Statement sets
More informationBT s code of practice for sales and marketing
BT s code of practice for sales and marketing The purpose of our code of practice 1 Ofcom is the regulator for the telecommunications (or phone as we will say here) industry. 2 Ofcom has told companies
More informationThe Stacks Approach. Why It s Time to Start Thinking About Enterprise Technology in Stacks
The Stacks Approach Why It s Time to Start Thinking About Enterprise Technology in Stacks CONTENTS Executive Summary Layer 1: Enterprise Competency Domains Layer 2: Platforms Layer 3: Enterprise Technology
More informationMobile Youth Around the World
Mobile Youth Around the World December 2010 Overview From texting to video to social networking, mobile phones are taking an ever-expanding role in our daily lives. And young people around the world are
More informationIndependent Report Review of Claims Management Regulation
Independent Report Review of Claims Management Regulation Response from the Motor Accident Solicitors Society November 2015 Introduction This response is prepared on behalf of the Motor Accident Solicitors
More informationIt starts like this...
Need help with your phone? No problem. Just get in touch with the store or website you bought it from. If you need a hand with your mobile service, one of our team will be happy to help. 789 on your mobile
More informationTop 40 Email Marketing Terms You Should Know
1601 Trapelo Road Phone 781-472-8100 Suite 246 Fax 781-472-8101 Waltham, MA 02451 www.constantcontact.com Top 40 Email Marketing Terms You Should Know If you have ever felt out of your depth in a discussion
More informationPersonal Information. About you. Personal information and your identity.
Personal Information About you. Personal information and your identity. 213301 Keeping you safe and stopping fraud. More and more people are worried about identity theft and fraud. We re working 24/7 to
More informationSPEAK TELEPHONY MANUAL
SPEAK TELEPHONY MANUAL telephony instruction manual contents Eftel speak has a great range of telephony options available to tailor your phone service to your needs and requirements. Eftel provides you
More informationGUIDANCE ON ESSENTIAL CONTRACT TERMS FOR CLOUD COMMUNICATION SERVICE PROVIDERS
GUIDANCE ON ESSENTIAL CONTRACT TERMS FOR CLOUD COMMUNICATION SERVICE PROVIDERS Disclaimer: This note is meant for general guidance only. No responsibility for loss arising to any person acting or refraining
More informationBuild Your Business with Mobile
Build Your Business with Mobile The 4 Essential Steps to Building Your Business with Mobile 2103 MoFuse Inc. 1-800-MOFUSE-8 www.mofuse.com We are addicted to our smartphones. Your customers are more likely
More information"Direct marketing" is not limited to advertising goods or services for sale. It also includes promoting an organisation s aims and ideals.
Direct Marketing Most direct marketing activities must comply with the requirements of the Data Protection Act 2002 (DPA) and, where that direct marketing is communicated by electronic mail, telephone
More informationMortgage & lifestyle Mortgage & lifestyle protection. Policy Summary
Mortgage & lifestyle Mortgage & lifestyle protection protection Policy Summary Mortgage and Lifestyle Protection Policy Summary In this summary, we try to help you by giving you the key facts of the plan.
More information