Policies and guidelines
Guidance for tech support scams
Unfortunately, we continue to receive complaints from individuals who say some of the calls they receive are from people claiming to represent Red Hat. Often, these calls are actually coming from unknown third party companies or individuals, trying to take advantage of unsuspecting people. Sometimes these scammers claim to see their caller's computer doing malicious things and they offer to provide technical support, while other times they try to charge money for services that Red Hat only offers to its customers. Additionally, the scammers often change (spoof) the number that appears on a phone’s caller ID display to a legitimate number, such as one that belongs to Red Hat. That said, these scams are frustrating for everyone and challenge us to take action to stop them.
We will continue to take action against these scams and the companies behind them by evolving our products and systems to identify bad actors, making policy changes, making law enforcement referrals and taking appropriate legal action when warranted. However, we can’t do this alone. In addition to our efforts, here are a few things you can do immediately to protect yourself:
- If you receive an unwanted, and unexpected call, from someone claiming to represent Red Hat, hang up the phone. Do not press any key, even if the voice prompts you to in order to speak with a live person or to be taken off the call list.
- Report unwanted callers to the FTC, the FCC or your local authorities.
- Register your personal number with the National Do Not Call Registry (1-888-382-1222) or similar country do-not-call listing.