Language Selection

English French German Italian Portuguese Spanish

Cingular, AT&T Wireless ring up most complaints

Filed under
Sci/Tech

Cingular Wireless and Redmond-based AT&T Wireless, which merged late last year to form the nation's largest cellular carrier, together had the worst complaint record in 2004, according to information obtained by Consumers Union and released yesterday.

What's more, AT&T Wireless Services Inc., formerly based in Redmond, had the worst complaint record for two consecutive years, according to the data, which was obtained from the Federal Communications Commission through the Freedom of Information Act.

The total number of complaints filed about wireless phone service increased 38 percent: to 29,478 in 2004, from 21,357 in 2003.

"The staggering increase in complaints is further evidence that reform is needed in the wireless phone market so consumers can get a fair shake," said Janee Briesemeister, senior policy analyst for Consumers Union, the non-profit publisher of Consumer Reports, in a prepared statement.

"Since the cell-phone industry brought out its 'voluntary consumer code,' consumer complaints have skyrocketed, which shoots down their claim that the marketplace is working and consumer rights' laws aren't needed."

Of the more than 29,000 complaints filed in 2004, Cingular-AT&T Wireless ranked first -- i.e., worst -- among the top eight carriers both on a total-complaint basis (combining each company's complaint record before and after the merger), and in complaints adjusted for differences in the number of subscribers.

The combined complaints for Cingular-AT&T Wireless came in at 289 per 1 million customers. Of the national wireless companies, Verizon had the fewest complaints per 1 million, at 76.

One major factor behind AT&T Wireless' poor showing last year: complaints about problems with number portability, or moving a cell-phone number to another carrier. It was reported widely last year that AT&T Wireless customers had an especially difficult time moving numbers.

"That is what happened then. Here we are now," Cingular spokeswoman Anne Marshall said. "We're taking action to improve customer service."

She said the combined companies have simplified billing and have begun providing detailed online mapping of coverage areas and printouts explaining all fees and charges at the time of sign-up.

They have also introduced a 30- day grace period during which customers can cancel their plans, paying only for services used to date, Marshall said.

Smaller regional carriers, such as Alltel and U.S. Cellular, had some of the lowest complaint rates. Among all wireless companies, regional carrier US Cellular has the lowest number of complaints per 1 million subscribers, at 39. But Cellular One, another regional company, had the second-worst rate for total complaints and for billing problems.

Alltel in January agreed to buy Bellevue-based Western Wireless Corp., a deal set to close midyear.

For all of the major cell-phone companies, consumers complained the most about billing problems. Complaints about transferring their phone numbers, service quality, contracts and marketing were close behind.

The FCC is the only regulatory agency overseeing wireless service. It fields consumer complaints but does not disclose that information to help shoppers make informed decisions.

Consumers Union said it is supporting legislation in several states, most notably California, that would give state regulators, not just the FCC, the ability to deal with customer complaints about the wireless industry.

Source.

More in Tux Machines

Security News

  • Wednesday's security updates
  • Secure your Elasticsearch cluster and avoid ransomware
    Last week, news came out that unprotected MongoDB databases are being actively compromised: content copied and replaced by a message asking for a ransom to get it back. As The Register reports: Elasticsearch is next. Protecting access to Elasticsearch by a firewall is not always possible. But even in environments where it is possible, many admins are not protecting their databases. Even if you cannot use a firewall, you can secure connection to Elasticsearch by using encryption. Elasticsearch by itself does not provide any authentication or encryption possibilities. Still, there are many third-party solutions available, each with its own drawbacks and advantages.
  • Resolve to Follow These 8 Steps for Better Data Security in 2017
    Getting physically fit is a typical New Year's resolution. Given that most of us spend more time online than in a gym, the start of the new year also might be a great time to improve your security “fitness.” As with physical fitness challenges, the biggest issue with digital security is always stagnation. That is, if you don't move and don't change, atrophy sets in. In physical fitness, atrophy is a function of muscles not being exercised. In digital fitness, security risks increase when you fail to change passwords, update network systems and adopt improved security technology. Before long, your IT systems literally become a “sitting duck.” Given the volume of data breaches that occurred in 2016, it is highly likely that everyone reading this has had at least one breach of their accounts compromised in some way, such as their Yahoo data account. Hackers somewhere may have one of the passwords you’ve used at one point to access a particular site or service. If you're still using that same password somewhere, in a way that can connect that account to you, that's a non-trivial risk. Changing passwords is the first of eight security resolutions that can help to improve your online security fitness in 2017. Click through this eWEEK slide show to discover the rest.
  • Pwn2Own 2017 Takes Aim at Linux, Servers and Web Browsers
    10th anniversary edition of Pwn2Own hacking contest offers over $1M in prize money to security researchers across a long list of targets including Virtual Machines, servers, enterprise applications and web browsers. Over the last decade, the Zero Day Initiative's (ZDI) annual Pwn2Own competition has emerged to become one of the premiere events on the information security calendar and the 2017 edition does not look to be any different. For the tenth anniversary of the Pwn2Own contest, ZDI, now owned and operated by Trend Micro, is going farther than ever before, with more targets and more prize money available for security researchers to claim by successfully executing zero-day exploits.
  • 'Factorio' is another game that was being hit by key scammers
    In another case of scammers trying to buy keys with often stolen credit cards to sell on websites like G2A, the developers of 'Factorio' have written about their experience with it (and other stuff too).

Red Hat News

Development News: LLVM, New Releases, and GCC

PulseAudio 10 and Virtual GPU in Linux

  • PulseAudio 10 Coming Soon, Using Memfd Shared Memory By Default
    It's been a half year since the debut of PulseAudio 9.0 while the release of PulseAudio 10 is coming soon. PulseAudio 9.99.1 development release was tagged earlier this month, then usually after x.99.2 marks the official release, so it won't be much longer now before seeing PulseAudio 10.0 begin to appear in Linux distributions.
  • Experimenting With Virtual GPU Support On Linux 4.10 + Libvirt
    With the Linux 4.10 kernel having initial but limited Intel Graphics Virtualization Tech support, you can begin playing with the experimental virtual GPU support using the upstream kernel and libvirt.