Have You Ever Heard of the Do Not Call Implementation Act?

  • By David Lukic
  • Published: Nov 16, 2020
  • Last Updated: Mar 18, 2022

You may or may not have heard of the National Do Not Call Implementation Act. The do not call list is a database of consumer phone numbers who have requested that telemarketers not call them. Per the Do Not Call Implementation Act of 2003, these salespeople must comply by law. Other laws govern robocalls and even wireless phone numbers.

As of June of 2003, Americans were able to add their phone numbers to the Federal Trade Commission do not call list. Initially, phone numbers only stayed on the list for five years, but now they stay on there indefinitely. Telemarketers have 31 days to remove a new number added to the do not call list from their call base. You can add either your landline or cell phone number to the do not call list at any time.

How to Add Your Phone Number to the Registry

According to the FTC, to get on the list, you only need to “go to donotcall.gov  or call 1-888-382-1222 (TTY: 1-866-290-4236) from the phone you want to register. It’s free.” If you register online, you will receive a confirmation email and must click the link to confirm it. You can register as many numbers as you want.

do not call implementation act

How to Block Other Unwanted “Spam” Calls

If you have added your number to the do not call list but are still getting a lot of unwanted calls, these are scammers. It is not that the do not call list is not working. Scammers do not follow the law or respect the registry. It is 100% illegal for a scammer or telemarketer to call your cell phone, so each time you receive one of these calls, the fraudster is breaking the law. Unfortunately, aside from blocking the calls and reporting them to the FCC, there isn’t much you can do about them.

To block unwanted calls from your iPhone, go to Phone > Recents and then tap the Info button next to the caller you want to block. Tap Block this Caller and then tap Block Contact. Although effective, many spammers use automated dialers that cycle through dozens of phone numbers, so this may not be a permanent fix.

iOS 13 ships with a new feature called Silence Unknown Callers. To activate this feature, go to Settings > Phone and use the toggle switch to turn on Silence Unknown Callers.

To block calls on an Android phone, go to Phone > Recent Calls. Tap on the number that called you and look for and tap the Block or Report as Spam item. Confirm you want to block that number.

Android's security features also the option to block unknown callers. Go to Settings > Block Unknown Callers. Turn the feature on.

You can also contact your phone carrier (AT&T, Verizon, Sprint, and T-Mobile) to use their call-blocking services. Some are free and some you will have to pay for.

Another option to block spam calls are using one of the top call blocking apps such as:

  • Nomorobo.
  • Hiya Caller ID and Block.
  • RoboKiller.
  • Truecaller.
  • YouMail Voicemail and Spam Blocker.

What Types of Calls are Allowed by the FTC Do Not Call Registry?

The FTC warns that a few types of calls are still allowed even with your number safely on the list. They are:

  • political calls.
  • charitable calls.
  • debt collection calls. 
  • purely informational calls.
  • surveys.

If you have not provided permission, any robocall you receive is illegal. You should report those immediately to the FTC. To file a do not call list complaint, you can also use the donotcall.gov form here. If caught, the perpetrators could be fined up to $42,530 per call.

How to Remove Your Phone Number from the List

You can also check to see if your number is already on the list by calling: 1-888-382-1222, or visiting donotcall.gov.

If, for some reason, you want to remove your phone number from the do not call registry, you can, by calling 1-888-382-1222. When you call, make sure you are calling from the number you want to be removed.

federal trade commission do not call list

What are the Rules Telemarketers Must Follow?

By law, telemarketers must follow strict FTC rules. Per their consumer web page regarding the do not call list:

Telemarketers can’t:

  • Call before 8 a.m. or after 9 p.m.
  • Be deceptive or abusive or lie about any terms of their offer.
  • Ask you to pay with a cash-to-cash money transfer, by giving the PIN from a cash reload card like MoneyPak and Vanilla Reload.
  • Ask for your bank account information through which you risk bank account takeover or create a type of check that you never see or sign, called a remotely created payment order.

Telemarketers must:

  • Connect their call to a sales representative within two seconds after you answer.
  • Transmit their telephone number and, if possible, their name, to your caller ID service.
  • Tell you right away what seller or charitable organization they represent and that the call is a sales call or a charitable solicitation.
  • Disclose all material information about the goods or services they’re offering and the terms of the sale.
  • Get your permission to charge you and to use a particular account number.

 

 
About the Author
IDStrong Logo

Related Articles

4 Most Common Bitcoin Scams

Scams are creeping into all areas of life these days. Any new type of technology is at risk. Bitco ... Read More

Romance Scams, The Love to Escape from

Scams have been around a long time, that’s nothing new. One of the most disturbing and heartbrea ... Read More

Top 6 Craigslist Scams and How To Avoid It

Craigslist is a website used for localized classified ads. It was founded in 1995 by Craig Newmark ... Read More

Common PayPal Scams & How to Prevent Them

PayPal is one of the top digital currency exchanges in the world. Nearly everyone has heard of Pay ... Read More

Cash App Fraud: What to do if You've Got Scammed Through Cash App

Peer-to-peer payment apps like Cash App, Venmo, Zelle, Apple Pay, Google Pay, and Facebook Payment ... Read More

Latest Articles

Google Voice Scams: What They Are and How to Stay Safe

Google Voice Scams: What They Are and How to Stay Safe

Google Voice scams continue to pose a risk for users of this service. Scammers continuously attempt to lure users into divulging their verification PIN code.

What Are Pretexting Attacks: Scam Types and Security Tips?

What Are Pretexting Attacks: Scam Types and Security Tips?

Have you ever received a text from someone you do not know? Did you become alarmed by the message? Did the message contain information about you and the people you know?

What is a Time-based One-time Password (TOTP)?

What is a Time-based One-time Password (TOTP)?

Authentication is the process that verifies the user's identity to control access to resources, prevent unauthorized users from gaining access to the system, and record user activities (to hold them accountable for their activities).

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close