SlideShare a Scribd company logo
1 of 4
Download to read offline
The Neustar Guide to TCPA Risk Mitigation
Neustar®
Insights | Whitepaper
The Neustar Guide to TCPA Risk Mitigation
2Neustar, Inc.
Navigate TCPA Auto Dialing Restrictions with Authoritative
Phone Data
The Telephone Consumer Protection Act (TCPA) and its recent interpretations by the U.S. Court of Appeals for the Seventh
Circuit1
present a unique challenge to organizations that rely on autodialers to call or send text messages. Organizations must
now go beyond identifying wireless phone numbers to further verify the current subscriber before auto dialing. However, this is
increasingly difficult because phone data is constantly changing and wireless phone data is particularly difficult to verify.
As background, the United States Federal Communications Commission (FCC) implemented the TCPA in 1991 to restrict the
use of autodialers from calling or sending text messages to wireless phone numbers, unless there is prior consent provided
by the subscriber. Even with prior subscriber consent, new interpretations impose strict liability for TCPA violations if an
organization autodials a phone number that has been reassigned to a new subscriber as a wireless phone number.This
underscores the need to verify both the current phone type and owner of a phone number before auto dialing.Those who are
unable to authoritatively verify this phone data risk TCPA violations, which can lead to costly fines, litigation and negative press.
How Phone Data is Changing Today
Phone data changes every day, from the device type to the subscriber. Phone
numbers can be ported from wireline to wireless devices and vice versa. Phone
numbers can also be reassigned from one subscriber to another.This presents a
unique challenge to organizations, as what they believe to be a landline belonging
to consumer “A” today, may be a cell phone belonging to consumer “B” tomorrow.
Authoritatively verifying that a wireless number still belongs to a consumer is
extremely difficult, given that wireless phone numbers are typically private. What’s
more, as a result of the ever-increasing migration away from wireline to wireless
devices and that 35.8%2
of households are now wireless-only, this pool of hard-
to-verify and strictly regulated wireless phone data will only continue to grow.This
makes it all the more difficult to comply with TCPA auto dialing restrictions.
1 Source: http://www.ca7.uscourts.gov/tmp/OQ0U1VT0.pdf	
2 Source: Centers for Disease Control and Prevention (CDC) Wireless Substitution: Early Release of Estimates
The Percentage of Wireless-Only US Households Has Doubled Since 2008:
To confidently navigate
TCPA auto dialing restrictions
without sacrificing
operational efficiency,
organizations must rely on
current and authoritative
phone data insights.
0
5
10
15
20
25
30
35
40
PercentageofWireless-Only
USHouseholds
Jan-Jun
2012
Jan-Jun
2008
Jan-Jun
2009
Jan-Jun
2010
Jan-Jun
2011
Jul-Dec
2008
Jul-Dec
2009
Jul-Dec
2010
Jul-Dec
2011
35.8%
34%
31.6%
29.7%
26.6%
24.5%
22.7%
20.2%
17.5%
The Neustar Guide to TCPA Risk Mitigation
3Neustar, Inc.
Autodial Wireless Numbers without Violating TCPA
To autodial phone numbers in a TCPA compliant manner, organizations must first correctly identify the current phone type
as either wireline or wireless. If a phone number is wireless and no prior consumer consent exists to call or text message
that number, then it must be manually dialed. Where prior consumer consent exists for a wireless phone number, it can only
be autodialed if it is verified that the current subscriber of that phone number has not changed. When a number has been
reassigned to a different subscriber then the organization will be liable for auto dialing a consumer’s wireless phone number
without consent.
On the other hand, to prevent TCPA violations, organizations could manually dial all wireless phone numbers, even where they
believe they have prior consent.This would, however, significantly decrease operational efficiency and increase costs due to
the prevalence of wireless phones and the higher costs associated with manual dials.
Mitigate Risk While Driving Top and Bottom Line Growth
Complying with new TCPA auto dialing restrictions does not have to compromise operational efficiency. Authoritative phone
data can deliver powerful insights in real time to help mitigate TCPA risk and streamline operations as well as increase
productivity and sales by:
•	 Instantly identifying the current phone type — efficiently and accurately filtering wireless phone numbers without prior
consent out of an autodialer to mitigate TCPA compliance risk.
•	 Instantly verifying the current owner of a phone number — freeing up valuable resources, decreasing time spent on manual
review and increasing right-party contact rates.
•	 Instantly updating and appending the most accurate address and phone information — shortening the number of attempts
it takes to reach subscribers with better contact information and increasing contact rates.
•	 Instantly identifying active phone numbers and understanding recent phone activity — enabling organizations to prioritize
phone numbers with recent activity, filter out inactive phone numbers and increase dialer efficiency and response rates.
The Importance of Authoritative Phone Data
Access to authoritative phone data—which is the most current, complete and
accurate wireline and wireless data available—is essential for mitigating TCPA
compliance risk without sacrificing operational efficiency. Due to the constantly
changing and hard-to-verify nature of this data, organizations must now correctly
verify both the current phone type and subscriber before auto dialing wireless
phone numbers. Fortunately, with authoritative phone data insights it’s possible
to both mitigate TCPA compliance risk while also increasing operational efficiency
and productivity.
About Neustar Information Services
Neustar sets the industry bar for data accuracy, currency and coverage — instantly providing organizations with exceptionally
accurate phone data intelligence to mitigate the risk of violating TCPA auto dialing restrictions.Through our exclusive,
proprietary relationships with the nation’s telecommunications providers, Neustar is uniquely positioned to deliver
authoritative phone data insights — in real time — that cannot be found anywhere else.
For a Wireline Number For a Wireless Number
Where Prior
Consent Exists
Yes, these numbers can be autodialed —
if it is a verified wireline phone number.
Yes, these numbers can be autodialed — if it
is verified that the phone number has not been
reassigned to a new subscriber.
Where No Prior
Consent Exists
Yes, these numbers can be autodialed —
if it is a verified wireline phone number.
No, these numbers cannot be autodialed —
this action puts an organization at risk for
TCPA violations.
Guide to Navigating TCPA Auto Dialing Restrictions:
Leveraging authoritative
phone data insights in
real time streamlines the
manual review process by
instantly and accurately
verifying phone data.
For More Information
Online www.neustarinfoservices.biz
About Neustar
Neustar, Inc., (NYSE: NSR) is a trusted, neutral provider
of real-time information and analysis to the Internet,
telecommunications, information services, financial
services, retail, media and advertising sectors. Neustar
applies its advanced, secure technologies in location,
identification, and evaluation to help its customers promote
and protect their businesses. More information is available
at www.neustar.biz.
21575 Ridgetop Circle, Sterling, VA 20166 / +1 571 434 5400 / www.neustar.biz
© 2012 Neustar, Inc. All rights reserved.
V1-01/23/13

More Related Content

What's hot

Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENAlan Percy
 
Managing Future Telematics Regulatory Environment
Managing Future Telematics Regulatory EnvironmentManaging Future Telematics Regulatory Environment
Managing Future Telematics Regulatory EnvironmentArief Gunawan
 
Waterfall Client Webinar: Information on the October 16 TCPA Rules Changes
Waterfall Client Webinar: Information on the October 16 TCPA Rules ChangesWaterfall Client Webinar: Information on the October 16 TCPA Rules Changes
Waterfall Client Webinar: Information on the October 16 TCPA Rules ChangesWaterfall Mobile
 
365squared Presentation - FASG
365squared Presentation - FASG365squared Presentation - FASG
365squared Presentation - FASGRoneel Prasad
 
It was wrong to sell wireless spectrum (1)
It was wrong to sell wireless spectrum (1)It was wrong to sell wireless spectrum (1)
It was wrong to sell wireless spectrum (1)Abraham Paul
 
14.9.20 steubenville herald star area code overlay
14.9.20 steubenville herald star   area code overlay14.9.20 steubenville herald star   area code overlay
14.9.20 steubenville herald star area code overlayhmhollingsworth
 
The third generation of mobile voice recording smart guide
The third generation of mobile voice recording smart guideThe third generation of mobile voice recording smart guide
The third generation of mobile voice recording smart guidemParticle
 
5 Ways to Win over Wholesale SMS Fraud
5 Ways to Win over Wholesale SMS Fraud 5 Ways to Win over Wholesale SMS Fraud
5 Ways to Win over Wholesale SMS Fraud Claire Cassar
 
Final hh - 14.3.10 - msv-uverse columbus biz release - 03 10 14v2
Final   hh - 14.3.10 - msv-uverse columbus biz release - 03 10 14v2Final   hh - 14.3.10 - msv-uverse columbus biz release - 03 10 14v2
Final hh - 14.3.10 - msv-uverse columbus biz release - 03 10 14v2hmhollingsworth
 
The Legality of Call Recording
The Legality of Call RecordingThe Legality of Call Recording
The Legality of Call RecordingShoreTel
 
Secure Networks Key to A2P Monetisation
Secure Networks Key to A2P MonetisationSecure Networks Key to A2P Monetisation
Secure Networks Key to A2P MonetisationSamantha Warren, MBA
 
Top 10 Inbound And Outbound Calling Compliance Issues
Top 10 Inbound And Outbound Calling Compliance IssuesTop 10 Inbound And Outbound Calling Compliance Issues
Top 10 Inbound And Outbound Calling Compliance IssuesRyan Thurman
 
Wholesale Fraud - Jason Lane-Sellers of cVidya
Wholesale Fraud - Jason Lane-Sellers of cVidyaWholesale Fraud - Jason Lane-Sellers of cVidya
Wholesale Fraud - Jason Lane-Sellers of cVidyacVidya Networks
 
Monetization of Portability and Verification
Monetization of Portability and VerificationMonetization of Portability and Verification
Monetization of Portability and VerificationSamantha Warren, MBA
 
Granite Introduction 11
Granite   Introduction 11Granite   Introduction 11
Granite Introduction 11tnorenberg
 
From Acquisition to Monetization—Chat Apps Connect the Next
From Acquisition to Monetization—Chat Apps Connect the NextFrom Acquisition to Monetization—Chat Apps Connect the Next
From Acquisition to Monetization—Chat Apps Connect the Nexttyntec
 
NIS - Risk Verification-SolutionSheet (1)
NIS - Risk Verification-SolutionSheet (1)NIS - Risk Verification-SolutionSheet (1)
NIS - Risk Verification-SolutionSheet (1)David Krasinski
 
The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...cVidya Networks
 

What's hot (20)

Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKEN
 
Managing Future Telematics Regulatory Environment
Managing Future Telematics Regulatory EnvironmentManaging Future Telematics Regulatory Environment
Managing Future Telematics Regulatory Environment
 
Waterfall Client Webinar: Information on the October 16 TCPA Rules Changes
Waterfall Client Webinar: Information on the October 16 TCPA Rules ChangesWaterfall Client Webinar: Information on the October 16 TCPA Rules Changes
Waterfall Client Webinar: Information on the October 16 TCPA Rules Changes
 
northampton
northamptonnorthampton
northampton
 
365squared Presentation - FASG
365squared Presentation - FASG365squared Presentation - FASG
365squared Presentation - FASG
 
It was wrong to sell wireless spectrum (1)
It was wrong to sell wireless spectrum (1)It was wrong to sell wireless spectrum (1)
It was wrong to sell wireless spectrum (1)
 
14.9.20 steubenville herald star area code overlay
14.9.20 steubenville herald star   area code overlay14.9.20 steubenville herald star   area code overlay
14.9.20 steubenville herald star area code overlay
 
The third generation of mobile voice recording smart guide
The third generation of mobile voice recording smart guideThe third generation of mobile voice recording smart guide
The third generation of mobile voice recording smart guide
 
5 Ways to Win over Wholesale SMS Fraud
5 Ways to Win over Wholesale SMS Fraud 5 Ways to Win over Wholesale SMS Fraud
5 Ways to Win over Wholesale SMS Fraud
 
Final hh - 14.3.10 - msv-uverse columbus biz release - 03 10 14v2
Final   hh - 14.3.10 - msv-uverse columbus biz release - 03 10 14v2Final   hh - 14.3.10 - msv-uverse columbus biz release - 03 10 14v2
Final hh - 14.3.10 - msv-uverse columbus biz release - 03 10 14v2
 
The Legality of Call Recording
The Legality of Call RecordingThe Legality of Call Recording
The Legality of Call Recording
 
Secure Networks Key to A2P Monetisation
Secure Networks Key to A2P MonetisationSecure Networks Key to A2P Monetisation
Secure Networks Key to A2P Monetisation
 
Top 10 Inbound And Outbound Calling Compliance Issues
Top 10 Inbound And Outbound Calling Compliance IssuesTop 10 Inbound And Outbound Calling Compliance Issues
Top 10 Inbound And Outbound Calling Compliance Issues
 
Wholesale Fraud - Jason Lane-Sellers of cVidya
Wholesale Fraud - Jason Lane-Sellers of cVidyaWholesale Fraud - Jason Lane-Sellers of cVidya
Wholesale Fraud - Jason Lane-Sellers of cVidya
 
Monetization of Portability and Verification
Monetization of Portability and VerificationMonetization of Portability and Verification
Monetization of Portability and Verification
 
Intro to SHAKEN/STIR
Intro to SHAKEN/STIRIntro to SHAKEN/STIR
Intro to SHAKEN/STIR
 
Granite Introduction 11
Granite   Introduction 11Granite   Introduction 11
Granite Introduction 11
 
From Acquisition to Monetization—Chat Apps Connect the Next
From Acquisition to Monetization—Chat Apps Connect the NextFrom Acquisition to Monetization—Chat Apps Connect the Next
From Acquisition to Monetization—Chat Apps Connect the Next
 
NIS - Risk Verification-SolutionSheet (1)
NIS - Risk Verification-SolutionSheet (1)NIS - Risk Verification-SolutionSheet (1)
NIS - Risk Verification-SolutionSheet (1)
 
The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...
 

Viewers also liked

Apps for the library 2015
Apps for the library 2015Apps for the library 2015
Apps for the library 2015Willie Miller
 
Computer Science
Computer ScienceComputer Science
Computer ScienceWendy Lile
 
Internet Librarian International
Internet Librarian InternationalInternet Librarian International
Internet Librarian InternationalWillie Miller
 
Final Project Master In Computer Sciences
Final Project Master In Computer SciencesFinal Project Master In Computer Sciences
Final Project Master In Computer SciencesMohammad Qureshi
 
Kuldeep Singh Project on C language and Visual Basic ,Final Year BCA ,Dezyne ...
Kuldeep Singh Project on C language and Visual Basic ,Final Year BCA ,Dezyne ...Kuldeep Singh Project on C language and Visual Basic ,Final Year BCA ,Dezyne ...
Kuldeep Singh Project on C language and Visual Basic ,Final Year BCA ,Dezyne ...dezyneecole
 
Final Year Project - Computer System Sample Slide
Final Year Project - Computer System Sample SlideFinal Year Project - Computer System Sample Slide
Final Year Project - Computer System Sample SlideSuhailan Safei
 
Final Year Project
Final Year ProjectFinal Year Project
Final Year Projectz060204
 
Synopsis for Online Railway Railway Reservation System
Synopsis for Online Railway Railway Reservation SystemSynopsis for Online Railway Railway Reservation System
Synopsis for Online Railway Railway Reservation SystemZainabNoorGul
 

Viewers also liked (12)

Report
ReportReport
Report
 
Presentation v2
Presentation v2Presentation v2
Presentation v2
 
Stock market with nn
Stock market with nnStock market with nn
Stock market with nn
 
Apps for the library 2015
Apps for the library 2015Apps for the library 2015
Apps for the library 2015
 
Computer Science
Computer ScienceComputer Science
Computer Science
 
FYP Thesis
FYP ThesisFYP Thesis
FYP Thesis
 
Internet Librarian International
Internet Librarian InternationalInternet Librarian International
Internet Librarian International
 
Final Project Master In Computer Sciences
Final Project Master In Computer SciencesFinal Project Master In Computer Sciences
Final Project Master In Computer Sciences
 
Kuldeep Singh Project on C language and Visual Basic ,Final Year BCA ,Dezyne ...
Kuldeep Singh Project on C language and Visual Basic ,Final Year BCA ,Dezyne ...Kuldeep Singh Project on C language and Visual Basic ,Final Year BCA ,Dezyne ...
Kuldeep Singh Project on C language and Visual Basic ,Final Year BCA ,Dezyne ...
 
Final Year Project - Computer System Sample Slide
Final Year Project - Computer System Sample SlideFinal Year Project - Computer System Sample Slide
Final Year Project - Computer System Sample Slide
 
Final Year Project
Final Year ProjectFinal Year Project
Final Year Project
 
Synopsis for Online Railway Railway Reservation System
Synopsis for Online Railway Railway Reservation SystemSynopsis for Online Railway Railway Reservation System
Synopsis for Online Railway Railway Reservation System
 

Similar to Neustar guide to_tcpa_risk_mitigation

Your Top 10 TCPA Questions Answered
Your Top 10 TCPA Questions AnsweredYour Top 10 TCPA Questions Answered
Your Top 10 TCPA Questions AnsweredExperian
 
Can I Give You a Call? Telephone Consumer Protection Act (TCPA) Dos, Don'ts, ...
Can I Give You a Call? Telephone Consumer Protection Act (TCPA) Dos, Don'ts, ...Can I Give You a Call? Telephone Consumer Protection Act (TCPA) Dos, Don'ts, ...
Can I Give You a Call? Telephone Consumer Protection Act (TCPA) Dos, Don'ts, ...Quarles & Brady
 
Report telemarketers and annoying callers. Trace any phone number.
Report telemarketers and annoying callers. Trace any phone number.Report telemarketers and annoying callers. Trace any phone number.
Report telemarketers and annoying callers. Trace any phone number.pleasure16
 
My Original "Business Plan"
My Original "Business Plan"My Original "Business Plan"
My Original "Business Plan"John Cochrane
 
Contact Center Compliance Webinar 10 26 11 Direct From The Ftc And Fcc
Contact Center Compliance Webinar 10 26 11 Direct From The Ftc And FccContact Center Compliance Webinar 10 26 11 Direct From The Ftc And Fcc
Contact Center Compliance Webinar 10 26 11 Direct From The Ftc And FccRyan Thurman
 
Leveraging Telecom Network Data with Alteryx
Leveraging Telecom Network Data with AlteryxLeveraging Telecom Network Data with Alteryx
Leveraging Telecom Network Data with AlteryxTridant
 
Do You Know How Virtual Numbers Can Help You.pdf
Do You Know How Virtual Numbers Can Help You.pdfDo You Know How Virtual Numbers Can Help You.pdf
Do You Know How Virtual Numbers Can Help You.pdfUSDSI
 
The Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersThe Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersEckoh
 
Real time data services
Real time data servicesReal time data services
Real time data servicesRelevate
 
NetMotion Wireless Strategies For Managing Cellular Network Performance
NetMotion Wireless Strategies For Managing Cellular Network PerformanceNetMotion Wireless Strategies For Managing Cellular Network Performance
NetMotion Wireless Strategies For Managing Cellular Network PerformanceNetMotion Wireless
 
Repositioning your TCPA Strategies in a Post ACA World
Repositioning your TCPA Strategies in a Post ACA WorldRepositioning your TCPA Strategies in a Post ACA World
Repositioning your TCPA Strategies in a Post ACA WorldRyan Thurman
 
4 Reasons Why The TCPA Isn't A Threat
4 Reasons Why The TCPA Isn't A Threat 4 Reasons Why The TCPA Isn't A Threat
4 Reasons Why The TCPA Isn't A Threat Jornaya
 
Solving Real Business Problems with Big Data: Measuring Customer Loyalty in t...
Solving Real Business Problems with Big Data: Measuring Customer Loyalty in t...Solving Real Business Problems with Big Data: Measuring Customer Loyalty in t...
Solving Real Business Problems with Big Data: Measuring Customer Loyalty in t...Tanya Cashorali
 
Making agents bionic: The evolution of the call centre
Making agents bionic: The evolution of the call centreMaking agents bionic: The evolution of the call centre
Making agents bionic: The evolution of the call centreVizolution
 
TOPs Presentation V21
TOPs Presentation V21TOPs Presentation V21
TOPs Presentation V21jsargent
 
05S-30-cell phone summary
05S-30-cell phone summary05S-30-cell phone summary
05S-30-cell phone summaryBridget Butler
 

Similar to Neustar guide to_tcpa_risk_mitigation (20)

TCPA-Whitepaper
TCPA-WhitepaperTCPA-Whitepaper
TCPA-Whitepaper
 
Your Top 10 TCPA Questions Answered
Your Top 10 TCPA Questions AnsweredYour Top 10 TCPA Questions Answered
Your Top 10 TCPA Questions Answered
 
Can I Give You a Call? Telephone Consumer Protection Act (TCPA) Dos, Don'ts, ...
Can I Give You a Call? Telephone Consumer Protection Act (TCPA) Dos, Don'ts, ...Can I Give You a Call? Telephone Consumer Protection Act (TCPA) Dos, Don'ts, ...
Can I Give You a Call? Telephone Consumer Protection Act (TCPA) Dos, Don'ts, ...
 
Report telemarketers and annoying callers. Trace any phone number.
Report telemarketers and annoying callers. Trace any phone number.Report telemarketers and annoying callers. Trace any phone number.
Report telemarketers and annoying callers. Trace any phone number.
 
Robocalls
RobocallsRobocalls
Robocalls
 
My Original "Business Plan"
My Original "Business Plan"My Original "Business Plan"
My Original "Business Plan"
 
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQ
 
Contact Center Compliance Webinar 10 26 11 Direct From The Ftc And Fcc
Contact Center Compliance Webinar 10 26 11 Direct From The Ftc And FccContact Center Compliance Webinar 10 26 11 Direct From The Ftc And Fcc
Contact Center Compliance Webinar 10 26 11 Direct From The Ftc And Fcc
 
RPA in Number Portability
RPA in Number PortabilityRPA in Number Portability
RPA in Number Portability
 
Leveraging Telecom Network Data with Alteryx
Leveraging Telecom Network Data with AlteryxLeveraging Telecom Network Data with Alteryx
Leveraging Telecom Network Data with Alteryx
 
Do You Know How Virtual Numbers Can Help You.pdf
Do You Know How Virtual Numbers Can Help You.pdfDo You Know How Virtual Numbers Can Help You.pdf
Do You Know How Virtual Numbers Can Help You.pdf
 
The Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersThe Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact Centers
 
Real time data services
Real time data servicesReal time data services
Real time data services
 
NetMotion Wireless Strategies For Managing Cellular Network Performance
NetMotion Wireless Strategies For Managing Cellular Network PerformanceNetMotion Wireless Strategies For Managing Cellular Network Performance
NetMotion Wireless Strategies For Managing Cellular Network Performance
 
Repositioning your TCPA Strategies in a Post ACA World
Repositioning your TCPA Strategies in a Post ACA WorldRepositioning your TCPA Strategies in a Post ACA World
Repositioning your TCPA Strategies in a Post ACA World
 
4 Reasons Why The TCPA Isn't A Threat
4 Reasons Why The TCPA Isn't A Threat 4 Reasons Why The TCPA Isn't A Threat
4 Reasons Why The TCPA Isn't A Threat
 
Solving Real Business Problems with Big Data: Measuring Customer Loyalty in t...
Solving Real Business Problems with Big Data: Measuring Customer Loyalty in t...Solving Real Business Problems with Big Data: Measuring Customer Loyalty in t...
Solving Real Business Problems with Big Data: Measuring Customer Loyalty in t...
 
Making agents bionic: The evolution of the call centre
Making agents bionic: The evolution of the call centreMaking agents bionic: The evolution of the call centre
Making agents bionic: The evolution of the call centre
 
TOPs Presentation V21
TOPs Presentation V21TOPs Presentation V21
TOPs Presentation V21
 
05S-30-cell phone summary
05S-30-cell phone summary05S-30-cell phone summary
05S-30-cell phone summary
 

Neustar guide to_tcpa_risk_mitigation

  • 1. The Neustar Guide to TCPA Risk Mitigation Neustar® Insights | Whitepaper
  • 2. The Neustar Guide to TCPA Risk Mitigation 2Neustar, Inc. Navigate TCPA Auto Dialing Restrictions with Authoritative Phone Data The Telephone Consumer Protection Act (TCPA) and its recent interpretations by the U.S. Court of Appeals for the Seventh Circuit1 present a unique challenge to organizations that rely on autodialers to call or send text messages. Organizations must now go beyond identifying wireless phone numbers to further verify the current subscriber before auto dialing. However, this is increasingly difficult because phone data is constantly changing and wireless phone data is particularly difficult to verify. As background, the United States Federal Communications Commission (FCC) implemented the TCPA in 1991 to restrict the use of autodialers from calling or sending text messages to wireless phone numbers, unless there is prior consent provided by the subscriber. Even with prior subscriber consent, new interpretations impose strict liability for TCPA violations if an organization autodials a phone number that has been reassigned to a new subscriber as a wireless phone number.This underscores the need to verify both the current phone type and owner of a phone number before auto dialing.Those who are unable to authoritatively verify this phone data risk TCPA violations, which can lead to costly fines, litigation and negative press. How Phone Data is Changing Today Phone data changes every day, from the device type to the subscriber. Phone numbers can be ported from wireline to wireless devices and vice versa. Phone numbers can also be reassigned from one subscriber to another.This presents a unique challenge to organizations, as what they believe to be a landline belonging to consumer “A” today, may be a cell phone belonging to consumer “B” tomorrow. Authoritatively verifying that a wireless number still belongs to a consumer is extremely difficult, given that wireless phone numbers are typically private. What’s more, as a result of the ever-increasing migration away from wireline to wireless devices and that 35.8%2 of households are now wireless-only, this pool of hard- to-verify and strictly regulated wireless phone data will only continue to grow.This makes it all the more difficult to comply with TCPA auto dialing restrictions. 1 Source: http://www.ca7.uscourts.gov/tmp/OQ0U1VT0.pdf 2 Source: Centers for Disease Control and Prevention (CDC) Wireless Substitution: Early Release of Estimates The Percentage of Wireless-Only US Households Has Doubled Since 2008: To confidently navigate TCPA auto dialing restrictions without sacrificing operational efficiency, organizations must rely on current and authoritative phone data insights. 0 5 10 15 20 25 30 35 40 PercentageofWireless-Only USHouseholds Jan-Jun 2012 Jan-Jun 2008 Jan-Jun 2009 Jan-Jun 2010 Jan-Jun 2011 Jul-Dec 2008 Jul-Dec 2009 Jul-Dec 2010 Jul-Dec 2011 35.8% 34% 31.6% 29.7% 26.6% 24.5% 22.7% 20.2% 17.5%
  • 3. The Neustar Guide to TCPA Risk Mitigation 3Neustar, Inc. Autodial Wireless Numbers without Violating TCPA To autodial phone numbers in a TCPA compliant manner, organizations must first correctly identify the current phone type as either wireline or wireless. If a phone number is wireless and no prior consumer consent exists to call or text message that number, then it must be manually dialed. Where prior consumer consent exists for a wireless phone number, it can only be autodialed if it is verified that the current subscriber of that phone number has not changed. When a number has been reassigned to a different subscriber then the organization will be liable for auto dialing a consumer’s wireless phone number without consent. On the other hand, to prevent TCPA violations, organizations could manually dial all wireless phone numbers, even where they believe they have prior consent.This would, however, significantly decrease operational efficiency and increase costs due to the prevalence of wireless phones and the higher costs associated with manual dials. Mitigate Risk While Driving Top and Bottom Line Growth Complying with new TCPA auto dialing restrictions does not have to compromise operational efficiency. Authoritative phone data can deliver powerful insights in real time to help mitigate TCPA risk and streamline operations as well as increase productivity and sales by: • Instantly identifying the current phone type — efficiently and accurately filtering wireless phone numbers without prior consent out of an autodialer to mitigate TCPA compliance risk. • Instantly verifying the current owner of a phone number — freeing up valuable resources, decreasing time spent on manual review and increasing right-party contact rates. • Instantly updating and appending the most accurate address and phone information — shortening the number of attempts it takes to reach subscribers with better contact information and increasing contact rates. • Instantly identifying active phone numbers and understanding recent phone activity — enabling organizations to prioritize phone numbers with recent activity, filter out inactive phone numbers and increase dialer efficiency and response rates. The Importance of Authoritative Phone Data Access to authoritative phone data—which is the most current, complete and accurate wireline and wireless data available—is essential for mitigating TCPA compliance risk without sacrificing operational efficiency. Due to the constantly changing and hard-to-verify nature of this data, organizations must now correctly verify both the current phone type and subscriber before auto dialing wireless phone numbers. Fortunately, with authoritative phone data insights it’s possible to both mitigate TCPA compliance risk while also increasing operational efficiency and productivity. About Neustar Information Services Neustar sets the industry bar for data accuracy, currency and coverage — instantly providing organizations with exceptionally accurate phone data intelligence to mitigate the risk of violating TCPA auto dialing restrictions.Through our exclusive, proprietary relationships with the nation’s telecommunications providers, Neustar is uniquely positioned to deliver authoritative phone data insights — in real time — that cannot be found anywhere else. For a Wireline Number For a Wireless Number Where Prior Consent Exists Yes, these numbers can be autodialed — if it is a verified wireline phone number. Yes, these numbers can be autodialed — if it is verified that the phone number has not been reassigned to a new subscriber. Where No Prior Consent Exists Yes, these numbers can be autodialed — if it is a verified wireline phone number. No, these numbers cannot be autodialed — this action puts an organization at risk for TCPA violations. Guide to Navigating TCPA Auto Dialing Restrictions: Leveraging authoritative phone data insights in real time streamlines the manual review process by instantly and accurately verifying phone data.
  • 4. For More Information Online www.neustarinfoservices.biz About Neustar Neustar, Inc., (NYSE: NSR) is a trusted, neutral provider of real-time information and analysis to the Internet, telecommunications, information services, financial services, retail, media and advertising sectors. Neustar applies its advanced, secure technologies in location, identification, and evaluation to help its customers promote and protect their businesses. More information is available at www.neustar.biz. 21575 Ridgetop Circle, Sterling, VA 20166 / +1 571 434 5400 / www.neustar.biz © 2012 Neustar, Inc. All rights reserved. V1-01/23/13