Feeds

Ofcom smites silent callers

No more than one pointless call a day, alright?

Combat fraud and increase customer satisfaction

Ofcom plans to tighten up the rules on silent calling, proposing that pestering companies to wait 24 hours between calls and tell people by whom they're being pestered.

A silent call is where you pick up the phone and there's no one there. A small proportion are weirdos or nervous secret admirers (or perhaps a happy combination of the two), but the vast majority are caused by Automatic Call Services (ACS) and Automatic Machine Detection (AMD) which apparently both exist to make our lives better.

Ofcom's consultation (pdf) explains at some length how ACS and AMD can make products cheaper by reducing the costs of call centres. The consultation points out that they're not all trying to sell us stuff (though that's invariably our experience), but could be used "when a bank needs to contact customers about a potential fraud" or by "an online shopping company arranging delivery of purchases".

ACS phones the next person on its programmed list in the expectation that a call centre drone will be available at the moment the call is answered - if none is available the ACS abandons the call. AMS is supposed to detect if an answer phone is being used, in which case the call is similarly abandoned.

The problem comes if you've got a dodgy phone line. Having decided you're a machine, the system will automatically call you back again in an hour or two when you might be home - at which point it will again decide that you're a machine and hang up on you.

Ofcom reckons that 70 per cent of complaints it receives are from people getting repeated calls in this way, often half a dozen calls in a day, sometimes more.

Thus the new rules, which require a 24-hour break between recalls after being flagged by the AMD - the industry reckons that will apply to as many as half of all the outgoing calls made. Ofcom reckons that's a price worth paying, and we'd have to agree.

Ofcom has also reiterated its requirement that any abandoned call must be identifiable through a working Caller ID, and play a recording naming the company and explaining what's happened - it seems companies are having trouble with those details.

None of this applies to calls made by foreign companies originating from outside the UK of course, so we'll continue to get silent calls, inaccurate AMDs and pestering from salespeople - just with different accents and from unfamiliar companies. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T dangles gigabit broadband plans over 100 US cities
So soon after a mulled Google Fiber expansion, fancy that
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
Turnbull gave NBN Co NO RULES to plan blackspot upgrades
NBN Co faces huge future Telstra bills and reduces fibre footprint
NBN Co plans fibre-to-the-basement blitz to beat cherry-pickers
Heading off at the pass operation given same priority as blackspot fixing
NBN Co in 'broadband kit we tested worked' STUNNER
Announcement of VDSL trial is not proof of concept for fibre-to-the-node
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.