Pedagogy and Cold Calling… Teaching Students How to Make “Gold Calls”
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Advertising to Children
By Lorraine Conway 22 September 2021 Advertising to children Summary 1 Regulation of advertising 2 Scope of the ASA’s remit 3 British advertising Codes 4 ASA monitoring and compliance 5 ASA as an adjudicator 6 Protecting children 7 Specific issues 8 In focus: advertising and childhood obesity commonslibrary.parliament.uk Number 8198 Advertising to children Image Credits Cover page image copyright: Watching tv / image cropped. Licensed under CC0 Creative Commons – no copyright required. Disclaimer The Commons Library does not intend the information in our research publications and briefings to address the specific circumstances of any particular individual. We have published it to support the work of MPs. You should not rely upon it as legal or professional advice, or as a substitute for it. We do not accept any liability whatsoever for any errors, omissions or misstatements contained herein. You should consult a suitably qualified professional if you require specific advice or information. Read our briefing ‘Legal help: where to go and how to pay’ for further information about sources of legal advice and help. This information is provided subject to the conditions of the Open Parliament Licence. Feedback Every effort is made to ensure that the information contained in these publicly available briefings is correct at the time of publication. Readers should be aware however that briefings are not necessarily updated to reflect subsequent changes. If you have any comments on our briefings please email [email protected]. Please note that authors are not always able to engage in discussions with members of the public who express opinions about the content of our research, although we will carefully consider and correct any factual errors. -
Telemarketing Registration Application
COMMONWEALTH OF PENNSYLVANIA OFFICE OF ATTORNEY GENERAL Bureau of Consumer Protection 15th Floor Strawberry Square Harrisburg, PA 17120 Phone: (717) 783-1992 http://www.attorneygeneral.gov Telemarketing Registration Application PART I: Identification Name of Telemarketer Location of Telemarketer (Preferred mailing address for notices? Yes No) City State Zip Code County Name of Corporation, LLC, Partnership or Individual Owner Address (Preferred mailing address for notices? Yes No) City State Zip Code County Name of Contact Person Fax Number Telephone Number Email Address Name & Addresses of Registered Agent (If Owner is located outside of PA) Current Registration Number (if applicable) This Form is (check one): A registration for a new telemarketing entity not previously registered in PA A change to the registered telemarketer’s ownership or address information A change to a different Bond or Letter of Credit for a registered telemarketer Other (please indicate): Please submit the original copy of the bond or letter of credit. Location(s) of Call Centers for calls placed to PA residents Name Address – Line 1 Address – Line 2 City State Zip Code Name Address – Line 1 Address – Line 2 City State Zip Code Name Address – Line 1 Address – Line 2 City State Zip Code Page 1 of 4 PART II: Telemarketing Campaign On whose behalf will the telemarketing entity make calls into Pennsylvania? What name and number will be displayed on the consumer’s caller id? List the names of all telemarketers currently employed by the telemarketing entity. (Attach additional sheets, if necessary.) Name Title Home Address City State Zip Code Name Title Home Address City State Zip Code Name Title Home Address City State Zip Code Name Title Home Address City State Zip Code Name Title Home Address City State Zip Code Name Title Home Address City State Zip Code Name Title Home Address City State Zip Code Page 2 of 4 PART III: Ownership Information 1. -
How “Social Selling” Is Reinventing Cold Calling
OCTOBER 2013 How “Social Selling” Is Reinventing Cold Calling Ralf VonSosen (LinkedIn), interviewed by Robert Berkman REPRINT NUMBER 55203 MIT SLOAN MANAGEMENT REVIEW How “Social Selling” Is Reinventing Cold Calling At LinkedIn, the sales staff has become well-versed in the use of social media tools to open doors for new sales, says Ralf VonSosen, the com- pany’s head of marketing for sales solutions. RALF VONSOSEN (LINKEDIN), INTERVIEWED BY ROBERT BERKMAN ocial media has opened up entirely new ways of communicating with colleagues and strangers as well as with family and friends. Ralf VonSosen, the head of marketing for sales solutions for the online professional net- working company LinkedIn, thinks a lot about using social media, particularly for communicating with sales targets. VonSosen calls this "social selling" — utilizing the relationships, connections and in- sights available in social channels to facilitate a better experience in both buying and selling. S"It's really utilizing all this fantastic data that's out there that helps us gain visibility to the connections and relationships we have," says VonSosen. "We can take that data and combine it with the branding and infor- mation that we as professionals are sharing, and create a more meaningful experience and conversation." Done right, social selling "moves our contact from a traditional cold call to either a warm introduction or at least a warm conversation," he says. In a conversation with MIT Sloan Management Review's Robert Berkman, VonSosen talked about free ways to build a personal online brand and about how LinkedIn's Sales Navigator product is being used by both large and small companies. -
Cold-Call Investment Fraud How Organised Crime Is Targeting Your Money
July 2016 HANG ST U P JU O N S R C O LE L D C A L Cold-call investment fraud How organised crime is targeting your money Cold-call investment fraud generally What you should know starts with a phone call that offers the • Historically cold-call investment fraud had been committed by opportunity to be part of a lucrative criminal networks operating from overseas, mostly Asia, but investment. In most cases, it ends this type of crime is now being set up and operated from with the company shutting up shop, within Australia. only to re-emerge somewhere else • Cold-call investment fraud is a complex crime type involving under another name, looking for new criminal, consumer and corporate law, making it difficult to prospective clients. And the investor? pursue and prosecute. In most cases they lose all the money • The main targets for this type of fraud are middle-aged and they put into the venture, with no older Australians with good jobs or recently retired. means of recouping their losses. • As criminal groups quickly withdraw the funds in cash or transfer the money offshore, you are unlikely to get your Make no mistake – cold-call fraud is money back. organised crime, costing Australians • Investor or public awareness is the best response to this type millions of dollars each year. But it of fraud – an informed public can recognise the signs of can be stopped if people just hang up criminal intent behind a seemingly legitimate investment offer. the phone. • Cold-call investment fraud is one crime type in which prevention is undoubtedly better than cure. -
Internet Security Threat Report VOLUME 21, APRIL 2016 TABLE of CONTENTS 2016 Internet Security Threat Report 2
Internet Security Threat Report VOLUME 21, APRIL 2016 TABLE OF CONTENTS 2016 Internet Security Threat Report 2 CONTENTS 4 Introduction 21 Tech Support Scams Go Nuclear, 39 Infographic: A New Zero-Day Vulnerability Spreading Ransomware Discovered Every Week in 2015 5 Executive Summary 22 Malvertising 39 Infographic: A New Zero-Day Vulnerability Discovered Every Week in 2015 8 BIG NUMBERS 23 Cybersecurity Challenges For Website Owners 40 Spear Phishing 10 MOBILE DEVICES & THE 23 Put Your Money Where Your Mouse Is 43 Active Attack Groups in 2015 INTERNET OF THINGS 23 Websites Are Still Vulnerable to Attacks 44 Infographic: Attackers Target Both Large and Small Businesses 10 Smartphones Leading to Malware and Data Breaches and Mobile Devices 23 Moving to Stronger Authentication 45 Profiting from High-Level Corporate Attacks and the Butterfly Effect 10 One Phone Per Person 24 Accelerating to Always-On Encryption 45 Cybersecurity, Cybersabotage, and Coping 11 Cross-Over Threats 24 Reinforced Reassurance with Black Swan Events 11 Android Attacks Become More Stealthy 25 Websites Need to Become Harder to 46 Cybersabotage and 12 How Malicious Video Messages Could Attack the Threat of “Hybrid Warfare” Lead to Stagefright and Stagefright 2.0 25 SSL/TLS and The 46 Small Business and the Dirty Linen Attack Industry’s Response 13 Android Users under Fire with Phishing 47 Industrial Control Systems and Ransomware 25 The Evolution of Encryption Vulnerable to Attacks 13 Apple iOS Users Now More at Risk than 25 Strength in Numbers 47 Obscurity is No Defense -
Telemarketing Guide Contents
Telemarketing guide Contents Acknowledgements 5 Introduction 6 Business practice Compliance 8 Regulation, compliance and standards 8 Regulatory enforcement 8 Industry standards 8 Verification 8 Verifiers 9 Quality assurance 10 Quality assurance tools 10 Corporate and social responsibility 12 Customer satisfaction 12 Complaints procedure 13 Complaints policy 13 Complaints process 14 Complaints reporting 14 Complaints analysis 15 Complaint-handling training 15 Customer behaviour 17 Inclusivity and vulnerable consumers 17 Human resources 19 Key principles 19 Roles 19 Recruitment 19 Contracts 20 Remuneration 21 Training 22 Supervision and support of agents 26 Ongoing competency 26 Note for agents 26 Supplier–client relationships 27 Responsibilities 27 2 Contents Campaign creation Campaign objectives 29 Questions to consider: 29 Campaign strategy 29 Key principles 29 Add value to your customer and brand 30 Conversion rates 30 Campaign planning 31 Brief your front-line staff 31 Call and after-call process 32 1. Disclosure 32 2. Structure 32 3. Summary 33 4. Post-call process 33 Data 34 Sourcing data 34 Handling data 35 Using data 38 Campaign delivery Call scheduling 41 Key considerations 41 Reasonable hours 41 Ring time 42 Call retrying 43 Retry handling 43 Nuisance calls 43 Call-backs 44 Call abandonment 45 Abandoned call handling 45 Abandoned call information message 45 Technology and testing 46 Dialler operations 46 Predictive dialling 47 Answer machine detection (AMD) 50 3 Contents Campaign response Results and ROI 53 Campaign monitoring -
Mass-Marketing Fraud
Mass-Marketing Fraud A Report to the Attorney General of the United States and the Solicitor General of Canada May 2003 ��� Binational Working Group on Cross-Border Mass-Marketing Fraud Table of Contents Executive Summary ......................................................... ii Introduction ...............................................................viii Section I: Mass-Marketing Fraud Today ........................................1 Section II: The Response to Mass-Marketing Fraud, 1998-2003 .................... 26 Section III: Current Challenges in Cross-Border Fraud - Towards A Binational Action Plan .................................................................56 Appendix - Selected Cross-Border Mass-Marketing Fraud Enforcement Actions ..... 69 i Executive Summary Section I: Mass-Marketing Fraud Today Telemarketing Fraud ! Cross-border telemarketing fraud remains one of the most pervasive forms of white-collar crime in Canada and the United States. The PhoneBusters National Call Centre estimates that on any given day, there are 500 to 1,000 criminal telemarketing boiler rooms, grossing about $1 billion a year, operating in Canada. (3) ! Several types of cross-border telemarketing fraud have increased substantially from 1997 to 2002: fraudulent prize and lottery schemes; fraudulent loan offers; and fraudulent offers of low-interest credit cards or credit-card protection. (3) ! Seven trends in cross-border telemarketing fraud since 1997 are especially noteworthy: • (1) Types of Telemarketing Fraud “Pitches”. The most prevalent among Canadian-based telemarketing fraud operations are fraudulent offers of prizes or lotteries; fraudulent loan offers; and fraudulent offers of low- interest credit cards or credit-card protection. (5) • (2) Methods of Transmitting Funds. Criminal telemarketers generally prefer their victims to use electronic payment services, such as Western Union and Travelers Express MoneyGram, to send funds for the promised goods or services. -
CTC Sentinel Welcomes Submissions
Combating Terrorism Center at West Point Objective • Relevant • Rigorous | April 2018 • Volume 11, Issue 4 FEATURE ARTICLE A VIEW FROM THE CT FOXHOLE Five Years After the NYPD vs. Revolution Muslim Boston Marathon Bombing The inside story of how the NYPD defeated the radicalization hub Jesse Morton and Mitchell Silber William Weinreb and Harold Shaw FEATURE ARTICLE Editor in Chief 1 NYPD vs. Revolution Muslim: The Inside Story of the Defeat of a Local Radicalization Hub Paul Cruickshank Jesse Morton and Mitchell Silber Managing Editor INTERVIEW Kristina Hummel 8 A View from the CT Foxhole: Five Years After the Boston Marathon Bombing EDITORIAL BOARD Nicholas Tallant Colonel Suzanne Nielsen, Ph.D. ANALYSIS Department Head Dept. of Social Sciences (West Point) 15 The Islamic State's Lingering Legacy among Young Men from the Mosul Area Scott Atran, Hoshang Waziri, Ángel Gómez, Hammad Sheikh, Lucía Lieutenant Colonel Bryan Price, Ph.D. López-Rodríguez, Charles Rogan, and Richard Davis Director, CTC 23 Challenging the ISK Brand in Afghanistan-Pakistan: Rivalries and Divided Loyalties Brian Dodwell Amira Jadoon, Nakissa Jahanbani, and Charmaine Willis Deputy Director, CTC 30 The British Hacker Who Became the Islamic State's Chief Terror Cyber- Coach: A Profile of Junaid Hussain CONTACT Nafees Hamid Combating Terrorism Center U.S. Military Academy Between 2006 and 2012, two men working on opposite sides of the strug- 607 Cullum Road, Lincoln Hall gle between global jihadis and the United States faced of in New York City. Jesse Morton was the founder of Revolution Muslim, a group that prosely- West Point, NY 10996 tized—online and on New York City streets—on behalf of al-Qa`ida. -
Financial Harm Tool Kit a Guide to Avoid Scams
Financial harm tool kit A guide to avoid scams Our Vision “To work together to empower our residents to avoid unnecessary personal and financial harm resulting from scams. We place particular emphasis on protecting residents in vulnerable situations. Our person centred scam prevention packages are made up of simple practical solutions and are proven to prevent loss.” 0141 577 8487 [email protected] eastrenfrewshire.gov.uk/prevention Copyright © 2020 East Renfrewshire Council Contents Introduction 3 Financial harm and scams defined 4 Types of financial harm and scams 5-6 Coronavirus scams 6 Scam risk checklist 7 Dementia and scams 8 Telephone scams and nuisance calls 9 Doorstep scams and crime prevention 10 Trusted Traders 11 Scam mail 12 Online scams 13 Safe online purchasing 14 Romance scams and sextortion 15-16 Banking and financial security 17 Neighbourhood Watch Scotland and alerts 18 Switch and save 18 Technology Enabled Care (TEC) 19 Power of Attorney 20 Carers and financial abuse 21 Trading standards advice 21 How Safe Are You Checklist 22 Useful links 23 P2 Introduction East Renfrewshire’s Prevention Services (Trading Standards) have put together this toolkit as a self-help area to empower our residents to avoid scams and unwanted nuisance sales contact. An estimated £9 billion is lost to scams annually in the UK. The national position in respect of financial harm is well illustrated in the “WithScotland” briefing on financial harm by the University of Stirling which states “Research conducted internationally but also in the UK highlights financial harm as one of the most common forms of elder abuse. -
Censorship by Proxy: the First Amendment, Internet Intermediaries, and the Problem of the Weakest Link Seth F
University of Pennsylvania Law School Penn Law: Legal Scholarship Repository Faculty Scholarship 11-21-2006 Censorship by Proxy: the First Amendment, Internet Intermediaries, and the Problem of the Weakest Link Seth F. Kreimer University of Pennsylvania, [email protected] Follow this and additional works at: http://scholarship.law.upenn.edu/faculty_scholarship Part of the Communications Law Commons, Communication Technology and New Media Commons, Computer Law Commons, Constitutional Law Commons, First Amendment Commons, Public Law and Legal Theory Commons, and the Science and Technology Commons Recommended Citation Kreimer, Seth F., "Censorship by Proxy: the First Amendment, Internet Intermediaries, and the Problem of the Weakest Link" (2006). Faculty Scholarship. Paper 127. http://scholarship.law.upenn.edu/faculty_scholarship/127 This Article is brought to you for free and open access by Penn Law: Legal Scholarship Repository. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of Penn Law: Legal Scholarship Repository. For more information, please contact [email protected]. KREIMER PENNUMBRA.DOC 11/21/2006 6:52:58 PM ARTICLES CENSORSHIP BY PROXY: THE FIRST AMENDMENT, INTERNET INTERMEDIARIES, AND THE PROBLEM OF THE WEAKEST LINK † SETH F. KREIMER The rise of the Internet has changed the First Amendment drama, for gov- ernments confront technical and political obstacles to sanctioning either speak- ers or listeners in cyberspace. Faced with these challenges, regulators have fallen back on alternatives, predicated on the fact that, in contrast to the usual free expression scenario, the Internet is not dyadic. The Internet’s resistance to di- rect regulation of speakers and listeners rests on a complex chain of connec- tions, and emerging regulatory mechanisms have begun to focus on the weak links in that chain. -
The Essential Guide to Cold Calling
The Essential Guide to Cold Calling Tips, Techniques, and Tools for Sales Reps that Want to Win 1 At a Glance Ten things you need to know about cold calling 03 Tips for cold calling like a boss 04 Common cold calling mistakes to avoid 09 Cold calling techniques and tools 11 Crunchbase Annual Review 2 Ten Things You Need to Know About Cold Calling Convinced that B2B cold calling is dead? Think again. If these facts and figures don’t change your mind, read on for common tips, mistakes, and techniques that will cement cold calling as an essential component of a winning sales strategy. 69% 57% 42% 69% of buyers have accepted 57% of C-level buyers prefer to Organizations that don’t cold cold calls from new providers be contacted via phone call experienced 42% less growth than those who used the tactic 6 hours 8 Calls 6 Calls Top sellers spend an average of On average, it takes 8 cold calls Once you’re talking to the 6 hours every week researching to reach a prospect decision maker, 6 is the ideal their prospects number of calls to win a sale 55:45 Wed. 4-5 Successful cold calls often have Wednesday is the best day of And the best time to call a 55:45 talk-to-listen ratio the week to make a cold call prospects is between 4 & 5 PM Fri. The worst time and day is make a call is Friday afternoon The Essential Guide to Cold Calling 3 Tips for Cold Calling Like a Boss Cold calling is a skill and the need for it is here to stay. -
Telemarketing Sales Rule Fees Should Additionally Be Submitted To: from Calling Consumers Who Have AGENCY: Federal Trade Commission
16238 Federal Register / Vol. 68, No. 64 / Thursday, April 3, 2003 / Proposed Rules FEDERAL TRADE COMMISSION through the Internet at the following compliance with the do-not-call address: http://www.ftc.gov. provisions of the Amended TSR is 16 CFR Part 310 Comments on proposed revisions required, on October 1, 2003, bearing on the Paperwork Reduction Act telemarketers will be required to refrain Telemarketing Sales Rule Fees should additionally be submitted to: from calling consumers who have AGENCY: Federal Trade Commission. Office of Information and Regulatory placed their numbers on this registry. 16 Affairs, Office of Management and CFR 310.4(b)(1)(iii)(B). To ensure ACTION: Revised notice of proposed Budget, New Executive Office Building, compliance with this requirement, rulemaking and request for public Room 10102, Washington, DC 20503, telemarketers will be required to access comment. ATTN.: Desk Officer for the Federal the national registry at least once every Trade Commission, as well as to the three months in order to remove from SUMMARY: The Federal Trade FTC Secretary at the address above. their telemarketing lists those Commission (the ‘‘Commission’’ or consumers who have placed their ‘‘FTC’’) is issuing a Revised Notice of FOR FURTHER INFORMATION CONTACT: telephone numbers on the national Proposed Rulemaking (‘‘Revised Fee David M. Torok, (202) 326–3075, registry. 16 CFR 310.4(b)(3)(iv). When it NPRM’’) to amend the FTC’s Division of Marketing Practices, Bureau issued the Amended TSR, the Telemarketing Sales Rule (‘‘TSR’’) by of Consumer Protection, Federal Trade Commission reserved its decision on the adding a new section that would impose Commission, 600 Pennsylvania Avenue, issues raised in the User Fee NPRM, fees on entities accessing the national NW, Washington, DC 20580.