Effectiveness of Actions to Reduce Harm from Nuisance Calls in Scotland

Total Page:16

File Type:pdf, Size:1020Kb

Effectiveness of Actions to Reduce Harm from Nuisance Calls in Scotland NINE OUT OF TEN Effectiveness of actions to reduce harm from nuisance calls in Scotland As part of A Response to Scotland’s Nuisance Calls Commission – An Action Plan, the Scottish Government commissioned this research to analyse the impact of actions set out there and to examine the outcomes of past interventions. This was carried out by Antelope Consulting. Antelope Consulting [email protected] http://www.antelope.org.uk TheScottishGovernment @ScotGov March 2018 www.gov.scot Effectiveness of actions to reduce harm from nuisance calls in Scotland As part of A Response to Scotland’s Nuisance Calls Commission – An Action Plan, the Scottish Government commissioned this research to analyse the impact of actions set out there and to examine the outcomes of past interventions. This was carried out by Antelope Consulting. Antelope Consulting [email protected] http://www.antelope.org.uk January 2018 Dedication This report is dedicated to the memory of our good colleague and friend Brian Smith of Angus Trading Standards. He fought valiantly against nuisance calls in Angus, and supported the commissioning and carrying out of this study, but left us far too soon. Acknowledgements Too many people have helped with producing this report to thank everyone individually. Members of staff at both ICO and Ofcom were generous with their time, and some network operators in the Nuisance Calls Memorandum of Understanding group also made significant inputs. In Scotland, Trading Standards and Police staff were particularly supportive. Independent experts also made valuable comments on the Working Paper that underlies part of this report. We thank all these and many others, not forgetting the Scottish Government who commissioned the work. Responsibility for views expressed, errors and omissions remains with us. We will be pleased to hear from any interested reader. Claire Milne [email protected] Contents Abbreviations ............................................................................................................... 8 Executive summary ..................................................................................................... 9 1 Introduction ....................................................................................................... 13 2 The situation in the UK ...................................................................................... 16 2.1 Reducing the number of nuisance calls made to UK recipients ................ 16 2.2 Preventing recipients from receiving nuisance calls made to them........... 22 2.3 Minimising harm caused by nuisance calls received ................................ 31 2.4 Summary of possible effectiveness of actions .......................................... 41 3 The situation in Scotland ................................................................................... 43 3.1 Introduction ............................................................................................... 43 3.2 Nuisance calls to Scotland compared with the rest of the UK ................... 44 3.3 Call centres in Scotland ............................................................................ 48 3.4 Energy efficiency schemes in Scotland .................................................... 49 3.5 Legal and organisational features of Scotland .......................................... 50 3.6 Behaviour and characteristics of Scottish consumers ............................... 53 3.7 Expected effectiveness of actions in Scottish Nuisance Call Action Plan . 54 4 Future monitoring of effectiveness of actions .................................................... 57 4.1 Measuring the underlying level of nuisance calls ...................................... 59 4.2 Measuring nuisance calls received ........................................................... 59 4.3 Measuring consumer harm resulting from nuisance calls ......................... 62 5 Conclusions and recommendations .................................................................. 67 5.1 Conclusions .............................................................................................. 67 5.2 Recommendations .................................................................................... 68 Annex A What is a nuisance call? ........................................................................... 72 A.1 Terminology .............................................................................................. 72 A.2 Estimates of the number of calls of each type .......................................... 72 Annex B Regulatory actions .................................................................................... 76 B.1 The institutional and legal framework ....................................................... 76 B.2 Regulation in practice ............................................................................... 79 Annex C Estimates of the level of nuisance calling ................................................. 86 C.1 Summary .................................................................................................. 86 C.2 Estimation techniques ............................................................................... 86 C.3 The relative contributions of landline and mobile calls .............................. 90 Annex D Independent factors influencing future levels of nuisance calls ................ 91 3 Annex E Evidence on consumer attitudes to nuisance calls ................................... 93 Annex F Evidence on vulnerable consumers and telephone scams ....................... 96 F.1 Summary tables ........................................................................................ 96 F.2 Groups targeted by scams ........................................................................ 97 F.3 Use of telephone for scamming ................................................................ 98 F.4 National statistics and reporting ................................................................ 99 F.5 Amounts lost to scam calls ....................................................................... 99 F.6 Consumer behaviour on receiving a scam call ....................................... 102 F.7 Overall incidence of scam calls............................................................... 103 F.8 Information from North America .............................................................. 104 Annex G Debt collection guidelines ....................................................................... 105 G.1 Debt Collection Guidance: OFT664rev ................................................... 105 G.2 Sample letter provided by StepChange Debt Charity ............................. 105 G.3 Guidelines focusing on specific reasons for vulnerability ........................ 106 Annex H Comparison of UK data from Ofcom and trueCall ................................... 107 H.1 Ofcom surveys ........................................................................................ 107 H.2 The proportion of people receiving nuisance calls .................................. 107 H.3 The frequency of nuisance calls ............................................................. 109 H.4 Comparisons between sources of data ................................................... 111 Annex I Nuisance call complaints systems .......................................................... 114 Annex J Analysis of trueCall data for Scotland ..................................................... 117 J.1 Introduction ............................................................................................. 117 J.2 Nuisance calls into the UK and Scotland ................................................ 118 J.3 Nuisance calls to standard trueCall users in Scotland and rest of UK .... 120 J.4 Nuisance calls received by standard and vulnerable trueCall users in Scotland .......................................................................................................... 126 J.5 Investigation of a peak in nuisance calls ................................................. 130 J.6 Investigation of the calling pattern for one particular calling number ...... 131 Annex K Analysis of Ofcom data for Scotland ....................................................... 133 K.1 Proportion of people receiving nuisance calls ......................................... 133 K.2 The frequency of nuisance calls ............................................................. 136 Annex L Telephone area codes and local authority areas in Scotland ................. 140 L.1 Telephone area codes ............................................................................ 140 L.2 TPS and census data ............................................................................. 141 L.3 The mapping ........................................................................................... 141 4 Figure 1 Nuisance calls complaints trends ............................................................................... 14 Figure 2 Key features of selected data sources ....................................................................... 15 Figure 3 Numbers of nuisance calls received in four weeks, 2013-2017 ................................. 16 Figure 4 TPS registrations, 2016-2017 ..................................................................................... 18 Figure 5 TPS registrations of mobile numbers, 2016-2017 ...................................................... 18 Figure 6 Classes of relevant call suppression technology .......................................................
Recommended publications
  • COMBATTING NUISANCE CALLS and TEXTS a Comparative Policy Study of Practices in Multiple Countries Claire Milne Contents
    COMBATTING NUISANCE CALLS AND TEXTS A comparative policy study of practices in multiple countries Claire Milne Contents Nuisance calls – a growing problem 4 A form of pollution 5 Telemarketers’ rights versus consumers’ rights 6 Variations among countries’ experiences 7 Scope for better regulation and enforcement 11 Do not call registers – a common route to addressing the problem 13 How to run a do not call register 17 How effective are do not call registers? 18 Other measures to combat nuisance calls and texts 19 Infl uencing telemarketers’ behaviour directly 19 Working with networks that carry nuisance calls 21 Disciplining data handlers 22 Helping consumers to protect themselves 23 Regulation and enforcement 25 Which authorities regulate nuisance calls? 25 Tools and resources for enforcement 27 Conclusions 29 Endnotes 31 Acknowledgements: Thanks are due to Isabel Kuhn of LSE (German country review), Nabiha Mahmood of PTA (India and Pakistan country reviews), Paul Moura of Hunton Williams (support on the United States TCPA), Julia Cornwell McKean of ACMA (Australia), Jan Evert Hummelen of ACM (Netherlands), Tom Lowry of CRTC (Canada), Hilde Merethe Berg of the Norwegian Ministry of Children, Equality and Social Inclusion, Steve Smith of trueCall, Nick Ireland of NICC, Yashraj Jain of TPS, Anna Fielder of Privacy International, and others, too many to mention or who prefer not to be named, but to whom the author is nonetheless very grateful. The author remains responsible for all errors and omissions as well as for views expressed. She will be glad to receive corrections and additions. The study undertook detailed country situation reviews for the USA, Australia, Germany, India/Pakistan and the UK, and situation outlines for Norway, the Netherlands and Canada, as well as the broader overview refl ected in this report, whose sources are given in the Endnotes.
    [Show full text]
  • Landline Free Ebook
    FREELANDLINE EBOOK Rainbow Rowell | 368 pages | 30 Jul 2015 | Orion Publishing Co | 9781409152125 | English | London, United Kingdom Landline () - IMDb A landline telephone also known as Landline lineland-linemain linehome phonelandlinefixed-lineand wireline is a phone that uses a metal wire or optical fiber Landline line for transmission as distinguished Landline a mobile cellular line Landline, which uses radio waves for transmission. China had more than any other country at million and the United States was second with million. The United Kingdom had The statistics show that the total number of fixed-telephone subscribers in the Landline was about 1. A fixed phone line a line that Landline not a mobile phone line can be hard-wired or cordless and typically refers to the operation of wireless devices or systems in fixed locations such as homes. Landline wireless devices usually derive their Landline power from the utility mains electricity, unlike mobile wireless or portable wireless, which tend to be battery- powered. Although mobile and portable systems can be used in Landline locations, efficiency and bandwidth are compromised Landline with fixed systems. Mobile or portable, battery-powered Landline systems can be used as Landline backups Landline fixed Landline in case of a power blackout or natural disaster. The term landline is also used Landline describe a connection between two or more points that consists Landline a Landline physical cable, as opposed to an always-available private link that is actually implemented as a circuit in a wired switched system usually the public switched telephone network. So-called leased lines are invariably of the latter type; Landline implications of a land line in this context are security and survivability.
    [Show full text]
  • Measures to Reduce Caller Identification Spoofing and to Determine the Origins of Nuisance Calls
    Compliance and Enforcement and Telecom Decision CRTC 2018-32 PDF version References: Compliance and Enforcement and Telecom Notice of Consultation 2017-4, as amended, and Compliance and Enforcement and Telecom Regulatory Policy 2016-442 Ottawa, 25 January 2018 Public record: 1011-NOC2017-0004 and 8665-C12-201507576 Measures to reduce caller identification spoofing and to determine the origins of nuisance calls In Compliance and Enforcement and Telecom Regulatory Policy 2016-442, the Commission indicated that it would initiate a proceeding to review the progress that is being made on caller identification (ID) authentication. Based on this review, the Commission determines that authentication and verification of caller ID information for Internet Protocol (IP) voice calls should be implemented by Canadian telecommunications service providers (TSPs) by no later than 31 March 2019 to empower Canadians to better protect themselves against nuisance calls. TSPs are required to report on their progress. The Commission requests that the CRTC Interconnection Steering Committee (CISC) submit a consolidated industry progress report to the Commission every six months, beginning six months from the date of this decision. The Commission also determines that the telecommunications industry should establish a Canadian administrator for the issuance of certificates that would be required for authentication and verification of IP-based voice calls. The Commission further determines that Canadian TSPs are to develop a call traceback process, and requests that CISC file a report regarding such a process with the Commission for its review and approval within nine months of the date of this decision. Once the Commission has reviewed the report, it will decide what further measures may be required, including whether to mandate TSPs’ participation in a call traceback process.
    [Show full text]
  • Second Report on Call Blocking CG Docket No
    Federal Communications Commission DA 21-772 Call Blocking Tools Available to Consumers: Second Report on Call Blocking CG Docket No. 17-59 A Report of the Consumer and Governmental Affairs Bureau Federal Communications Commission June 2021 Federal Communications Commission DA 21-772 TABLE OF CONTENTS Heading Paragraph # I. INTRODUCTION...................................................................................................................................1 II. BACKGROUND.....................................................................................................................................5 III. CALL BLOCKING SERVICES ...........................................................................................................26 A. Voice Service Providers’ Services..................................................................................................27 B. Third-party Analytics Companies’ Blocking Services ...................................................................75 C. Device Manufacturers’ Blocking Services ...................................................................................100 IV. EFFECTIVENESS OF CALL BLOCKING TOOLS .........................................................................102 A. False-Positive Blocks....................................................................................................................102 B. Issues from Callers Regarding False-Positive Blocks ..................................................................115 V. STATE OF DEPLOYMENT OF
    [Show full text]
  • Combatting Nuisance Calls and Texts
    Combatting nuisance calls and texts Appendix: A comparative policy study of practices in multiple countries Claire Milne 1 Contents United Kingdom 3 Situation in the UK Rules in the UK Enforcement Advice and technical support for consumers Australia 12 The situation in Australia Rules in Australia Enforcement Advice and technical support for consumers Germany 20 The situation in Germany Rules in Germany Enforcement Advice and technical support for consumers India and Pakistan 33 The situation in India and Pakistan Rules in India and Pakistan Enforcement Advice and technical support for consumers Norway 42 United States of America 45 Situation in the USA Rules in the USA Enforcement Advice and technical support for consumers 2 United Kingdom Situation in the UK The UK set up the Telephone Preference Scheme (TPS, the UK name for its Do Not Call List) in 1999. This was later the basis of UK compliance with the relevant parts of the European Union’s Privacy and Electronic Communications Directive 20021. Market research in 2005 into silent calls and in 2008 into nuisance calls2 showed some decline in the problem, presumably due to the TPS becoming a somewhat effective protection3, but later levels of nuisance calls started to rise again4. From late 2011 complaints to both the regulators involved (ICO and Ofcom) started to rise, and complaints got a big boost in 2012 when the ICO introduced an online complaints form (“snap survey”) which made complaining much easier. Figure 1 Complaints about nuisance calls5 1Implemented through the Privacy and Electronic Communications Regulations 2003. 2 Brookmead Consulting (2005), Silent Calls Research, http://www.truecall.co.uk/media/1933/Brookmead%20report%202005.pdf; Brookmead Consulting (2008), TPS report on unwelcome calls, http://www.truecall.co.uk/media/1934/Brookmead%20Report%202008.pdf.
    [Show full text]
  • Robocalling and Communication Id Spoofing
    ATIS REPORT ATIS-I-0000081 ATIS Report on – Robocalling and Communication ID Spoofing:ROBOCALLING Better Understanding Illicit and Unwanted CallsAND and How to Counter Them COMMUNICATION ID SPOOFING: Better Understanding Illicit and Unwanted Calls and How to Counter Them February 2021 It is well recognized within the telecommunications industry that illicit and nuisance calling, specifically illegal scam robocalls, has led to a significant loss of customer trust in the global telephone network. To restore this trust, carriers and service providers (SPs) have gone to considerable lengths to design and deploy services that will mitigate the impacts of these illicit calling campaigns. This report aims to provide a detailed summary of both the many types of illicit calling and the measures being deployed to counter them. It explains why there is no “silver bullet” that will instantly and forever eliminate all illicit robocalling and why, instead, the industry must deploy many separate components in combination to maximize mitigation with ABSTRACT minimal blocking of wanted calls. A summary is included of the various U.S. actions and some international regulators to assist carriers and SPs in this effort. As these bad actors continue to evolve their techniques, further countermeasures will need to be developed to cope with these new threats. Accordingly, this report concludes with recommendations for future action by the Alliance for Telecommunications Industry Solutions (ATIS) and other organizations. As a leading technology and solutions development organization, the Alliance for Telecommunications Industry Solutions (ATIS) brings together the top global ICT companies to advance the industry’s most pressing business priorities. ATIS’ nearly 200 member companies are currently working to address the all-internet protocol (IP) transition, 5G, network functions virtualization, big data analytics, cloud services, device solutions, emergency services, M2M, cyber security, network evolution, quality of service, billing support, operations, and much more.
    [Show full text]
  • Feb 14 Agenda Item, Anti-Spoofing Provisions of the RAY BAUM's Act
    Mail - [email protected] Page 1 of 1 Feb 14 Agenda item, Anti-Spoofing Provisions of the RAY BAUM'S Act Tony Rutkowski Fri 2/8/2019 6:42 AM To:[email protected] <[email protected]>; [email protected] <[email protected]>; [email protected] <[email protected]>; [email protected] <[email protected]>; Mike.O'[email protected] <Mike.O'[email protected]>; [email protected] <[email protected]>; [email protected] <[email protected]>; [email protected] <[email protected]>; [email protected] <[email protected]>; [email protected] <[email protected]>; [email protected] <[email protected]>; [email protected] <[email protected]>; Cc:Paul Najarian <[email protected]>; Eric Burger <[email protected]>; 1 attachments (95 KB) T17-SG02-C-0167!!MSW-E.docx; The Chairman and Commissioners should be aware that most of the actions called for in the Act and the Commission's proposed implementation are before the 19-28 February, Geneva, meeting of ITU-T Study Group 2, in the form of a draft Rec. M.rtafm, "Requirements for Telecom anti-Fraud Management in the TMN." See attached contribution from the Recommendation editor. Study Group 2 has global jurisdiction over the use of telephony services and especially the use of telephone numbers as they are allocated and managed pursuant to ITU-T Rec. E.164. It is therefore an essential venue for implementation of Sec. 503 of Ray Baum's Act.
    [Show full text]