Mobile cramming: What's on the agenda

Law enforcers hate ‘em, legitimate businesses hate ‘em, and consumers — well, they really hate ‘em:  unauthorized charges that show up on people’s cell phone bills.  It’s called mobile cramming and The Good Guys are united in finding answers to the problem.

The FTC announced a roundtable for Wednesday, May 8, 2013, to address possible solutions and just released the agenda for the event.  After opening remarks from Commissioner Maureen Ohlhausen, the first panel will set the stage with a snapshot of the third-party billing system and how mobile cramming happens.  Next up:  representatives of state and federal agencies, consumers, and industry participants talking about current strategies for combating mobile cramming.  The conversation then turns to what else can be done to fight back.

If you have clients in the telecom industry or involved in mobile payments, make sure to be at the FTC Conference Center at 601 New Jersey Avenue, N.W., on May 8th.  The workshop is free and open to the public.  Registration begins at 8:30 AM.  Can't make it to DC?  Watch the live webcast.

FTC staff will tweet workshop highlights from the @FTC Twitter account.  Use the hashtag #FTCmobile.  You can post questions to the FTC’s Facebook page in the workshop status thread or email us at opa@ftc.gov.

In the meantime, the FTC's first law enforcement action addressing mobile cramming is pending in federal court in Georgia.

 

0 Comments

| Commenting Policy

Leave A Comment

Don't use this blog to report fraud or deceptive practices. To file a complaint with the Federal Trade Commission, please use the FTC Complaint Assistant.

PRIVACY ACT STATEMENT: It is your choice whether to submit a comment. If you do, you must create a user name, or we will not post your comment. The Federal Trade Commission Act and the Federal Information Security Management Act authorize this information collection for purposes of managing online comments. Comments and user names are part of our public records system, and user names are also part of our computer user records system. We may routinely use these records as described in our Privacy Act system notices. For more information on how we handle information that we collect, please read our privacy policy.