Why does spam flagging or call blocking exist:
Over the past few years regulators and major carriers have set forth new rules that require all phone companies to implement caller ID authentication. The rules establish when a provider may block a voice call based on information provided by the call authentication framework, and establish a process to permit a calling party adversely affected by the framework to verify the authenticity of their calls. This coordinated effort protects consumers and helps reduce the occurrence of robocalling, illegal calls and unwanted calls. However, it also results in spam flagging.
Sources of spam flagging & call blocking
Phone carriers can block or flag specific numbers as spam based on certain call analytics. A number may be flagged by the receiving carrier, or in rare cases, your own carrier. The recently passed TRACED (Telephone Robocall Abuse Criminal Enforcement and Deterrence) Act is affecting legitimate businesses. Frequent outbound calling can lead to a telephone number being flagged as spam.
Another way your number could be blocked or flagged as spam is flagging by a consumer. Consumers can complain to their carrier and flag any number they deem is suspicious, spam, or spoofing their number.
What to do if your number is being flagged by the receiving carrier
If your business telephone number is being flagged as spam on the called party’s caller ID there is something you can do. You can contact their carrier (the receiving carrier) and discover your number’s status with them. After verification, the spam tag may be removed from your business phone number and your status may be updated. Below are quick links to sites that can help you verify your caller status to some of the top telecom carriers, should your number be flagged as spam.
Caller ID Spam Vendor List
- AT&T Mobile
- Lumen (formerly CenturyLink)
- Frontier Communications, Email: [email protected]
- US Cellular
- Verizon Wireless
- Note:If the provider is not listed above, try the Free Caller Registry.
- establish when a provider may block a voice call based on information provided by the call authentication framework, but also establish a process to permit a calling party adversely affected by the framework to verify the authenticity of their calls.