News Feed Item

Alberta Federation of Labour pays $50,000 for violating the Unsolicited Telecommunications Rules

OTTAWA-GATINEAU, Aug. 13, 2014 /CNW/ - The Canadian Radio-television and Telecommunications Commission (CRTC) announced today that the Alberta Federation of Labour (AFL) has paid $50,000 in administrative monetary penalties as part of a settlement over violations of the Unsolicited Telecommunications Rules. The company also agreed to end its previous telemarketing practices and help promote awareness of the Rules. The AFL is a voluntary organization consisting of 29 union affiliates and representing 160,000 workers in Alberta.

Acting on complaints submitted by Canadians, the CRTC investigated the AFL for alleged violations of the Unsolicited Telecommunications Rules. The CRTC found that through a third-party firm, the AFL made unsolicited telemarketing calls via an automatic dialing-announcing device (ADAD). These calls did not comply with the Rules. Specifically, the ADAD messages did not provide a local or toll-free phone number and mailing address where the AFL could be reached.

In addition to paying the administrative monetary penalty, the AFL has committed to ensure future compliance with the Rules. They will ensure ADAD communications made on its behalf begin with a clear message identifying the AFL as the organization for which the call is made and indicating the purpose of the call. This identification message shall include an email address or postal address, and a local or toll-free phone number where an AFL representative can be reached. As well, the AFL will develop and implement a comprehensive program to comply with the Rules. The program shall include:

  • written policies and procedures that address compliance with the Rules
  • education and training programs for people involved in initiating unsolicited telecommunications
  • record-keeping procedures to help AFL and Commission staff verify compliance
  • registration and tracking of complaints related to unsolicited telecommunications, and resolutions
  • disciplinary procedures for compliance failures
  • third-party telemarketer arrangements that address compliance and assign responsibility for obligations
  • communications with CRTC staff as necessary to determine compliance

The CRTC is continuing to enhance its monitoring to ensure telemarketers follow the Unsolicited Telecommunications Rules and to reduce the number of unwanted calls to Canadians. The CRTC can discuss corrective actions with individuals, firms or organizations engaged in telemarketing, which may lead to a settlement that includes an administrative monetary penalty and other corrective measures. The CRTC can also issue warnings and citations, conduct inspections and issue notices of violation.

To date, the CRTC's enforcement actions have yielded over $4 million in administrative monetary penalties, which are remitted to the Receiver General for Canada, and $741,000 in other payments.

About the National Do Not Call List

The National Do Not Call List was launched in 2008 to protect Canadians from unsolicited telecommunications. Canadians may register on the National Do Not Call at no charge. Over 12 million numbers are currently registered on the List.

Canadians can register their numbers, verify whether a number is on the List or file a complaint about a telemarketer by calling 1-866-580-DNCL (3625) or visiting www.lnnte-dncl.gc.ca.

Quick Facts

  • The Alberta Federation of Labour (AFL) has paid $50,000 as part of a settlement over violations of the Unsolicited Telecommunications Rules.
  • The Unsolicited Telecommunications Rules are a set of strict rules that individuals, companies and organizations must follow when making telemarketing calls.
  • The CRTC is committed to protecting Canadians and is continuing to enhance its monitoring to ensure that all telemarketers follow the rules.
  • To date, the CRTC's enforcement efforts have yielded over $4 million in penalties, which are remitted to the Receiver General for Canada, and $741,000 in other payments.


"Canadians deserve to know the purpose of an ADAD call and how to contact the organization behind it. The Unsolicited Telecommunications Rules make those obligations clear for all individuals and groups involved in telemarketing. Our settlement with the AFL reflects the organization's cooperation with our investigation and willingness to work with the CRTC to promote awareness of the Rules."

Tom Lowry, Director, Telecommunications Enforcement, CRTC

Associated Link

Notices of Violation

This document is available in alternative format upon request.


SOURCE Canadian Radio-television and Telecommunications Commission

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
@DevOpsSummit has been named the ‘Top DevOps Influencer' by iTrend. iTrend processes millions of conversations, tweets, interactions, news articles, press releases, blog posts - and extract meaning form them and analyzes mobile and desktop software platforms used to communicate, various metadata (such as geo location), and automation tools. In overall placement, @DevOpsSummit ranked as the number one ‘DevOps Influencer' followed by @CloudExpo at third, and @MicroservicesE at 24th.
Established in 1998, Calsoft is a leading software product engineering Services Company specializing in Storage, Networking, Virtualization and Cloud business verticals. Calsoft provides End-to-End Product Development, Quality Assurance Sustenance, Solution Engineering and Professional Services expertise to assist customers in achieving their product development and business goals. The company's deep domain knowledge of Storage, Virtualization, Networking and Cloud verticals helps in delivering ...
Most of us already know that adopting new cloud applications can boost a business’s productivity by enabling organizations to be more agile and ready to change course in our fast-moving and connected digital world. But the rapid adoption of cloud apps and services also brings with it profound security threats, including visibility and control challenges that aren’t present in traditional on-premises environments. At the same time, the cloud – because of its interconnected, flexible and adaptable...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Arch...
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Service consists of a public key service and a private key escrow service. 

WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, will discuss the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docke...
@ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this ...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
In the next five to ten years, millions, if not billions of things will become smarter. This smartness goes beyond connected things in our homes like the fridge, thermostat and fancy lighting, and into heavily regulated industries including aerospace, pharmaceutical/medical devices and energy. “Smartness” will embed itself within individual products that are part of our daily lives. We will engage with smart products - learning from them, informing them, and communicating with them. Smart produc...
Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his general session at @DevOpsSummit at 19th Cloud Expo, Eric Robertson, General Manager at CollabNet, will discuss how customers are able to achieve a level of transparency that e...