Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

ACMA warns of Do Not Call Register telephone scam

Members of the public targeted with calls saying they are entitled to compensation.

Australian consumers are being advised to hang up on scammers who claim they are owed money for receiving telemarketing calls while registered on the Australian Communications and Media Authority's (ACMA) Do Not Call Register.

An ACMA spokesman told Computerworld Australia that the scammers usually request an upfront payment of $149 in order to process the compensation funds which can vary from $300 up to $3000.

ACMA clients targeted with phishing emails

Security threats explained: Social engineering

ACMA takes on computer virus telemarketers

“The Do Not Call Register does not contact people to advise that they are entitled to compensation, or to confirm personal details,” he said in a statement.

"People should not provide any personal identification or financial details to scammers claiming to represent the Register."

He added that the Authority had been targeted in a variation of the scam during October 2011 where consumers received calls from people claiming to be from the Data Protection Council which is part of the ACMA.

In addition, the authority reported last year that callers were requesting fees to add a person’s number on the Do Not Register list.

Follow Hamish Barwick on Twitter: @HamishBarwick

Follow Computerworld Australia on Twitter: @ComputerworldAU, or take part in the Computerworld conversation on LinkedIn: Computerworld Australia

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

References show all
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: telemarketers, Do Not Call Register scam, do not call register, mobile technology, scams, ACMA
Latest Blog Posts
Whitepapers
  • The F5 DDoS Protection Reference Architecture part 1 of 3
    Distributed denial of service attacks (DDoS) attempt to make a machine or network resource unavailable to its intended users, with a wave of crippling attacks on enterprises since 2012. This whitepaper offers guidance to security and network architects in designing, deploying, and managing architecture to protect against increasingly sophisticated, application-layer DDoS attacks.
    Learn more »
  • Information Management
    Valuable data can be a needle in a haystack, but by leveraging the value in existing information assets, organisations can generate real and achievable gains in revenue generation, IT investments and productivity gains. This whitepaper discusses how Information Management (IM) is a multi-faceted discipline that can be employed to meet or exceed your business objectives.
    Learn more »
  • Migrating from BlackBerry? See Our Trusted Method.
    Are your business leaders demanding a migration plan from BlackBerry? Let the mobile experts at Good help you migrate without migraines. Our Professional Services team has deep experience supporting Fortune 500 organizations through the transition; read this sample planning chart and see our trusted method.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments