Feeds

Fines rise for premium-rate phone offences

'No longer sufficient'

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

Parliament has approved an increase in the maximum fine that can be imposed on premium-rate rogues. The cap on the fines that can be imposed by Britain's premium-rate services regulator is going up to £250,000 from 30 December 2005.

The current limit is £100,000, but this has been found to be ineffective as a deterrent, particularly against fraudsters using rogue internet dialler services.

A rogue dialler is software that installs a premium rate number as the default dial-up number on a victim's computer without his knowledge, resulting in an unexpectedly expensive call every time the computer connects to the internet. According to ICSTIS, this type of scam has caused far more widespread consumer harm than any other premium rate services to date.

But rogue diallers have not been the only scam. There has been a proliferation of ‘spam and scam’ text and voicemail promotions claiming that consumers have won 'prizes' and urging them to call expensive premium rate numbers to make a claim. Such phone prize scams frequently rely on automated calling equipment to make the promotional calls – a practice that can be illegal.

All of these supposed ‘services’ could generate significant sums of money beyond ICSTIS’ existing £100,000 fine limit, says the watchdog.

The increased maximum fine limit follows one of the recommendations in the Ofcom Review of the Regulation of Premium Rate Services. The Review, conducted by Ofcom with ICSTIS, was carried out at the Department of Trade and Industry's request, and secured Ministerial approval in December 2004.

“Our current fine limit of £100,000 is no longer sufficient to deal with the worst services we see. A new fine limit, combined with the other proposals in the Ofcom review to strengthen consumer protection, should ensure that the relatively small number of rogues out there do not continue to damage trust and confidence in the entire premium rate industry,” said ICSTIS Director George Kidd.

He warned that ICSTIS was reviewing its sanctions policy, and expected to publish a new, tougher, version early in 2006.

According to ICSTIS, this could include the power to apply the new fine limit on a per breach basis, in certain tightly defined circumstances. ICSTIS is considering the matter, following a recent ruling by the Independent Appeals Body.

Copyright © 2005, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Choosing a cloud hosting partner with confidence

More from The Register

next story
Of COURSE Stephen Elop's to blame for Nokia woes, says author
'Google did have some unique propositions for Nokia'
FCC, Google cast eye over millimetre wireless
The smaller the wave, the bigger 5G's chances of success
It's even GRIMMER up North after MEGA SKY BROADBAND OUTAGE
By 'eck! Eccles cake production thrown into jeopardy
Mobile coverage on trains really is pants
You thought it was just *insert your provider here*, but now we have numbers
Don't mess with Texas ('cos it's getting Google Fiber and you're not)
A bit late, but company says 1Gbps Austin network almost ready to compete with AT&T
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.