Feeds

BT escapes with caution after abuse complaints

Promises OFTEL it won't let Internet sales staff look at customers' phone records

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

British Telecom has escaped with a rap on the knuckles after being caught in an absolutely outrageous piece of malpractice (writes an absolutely outraged Register). UK telecoms watchdog OFTEL has let the giant off with a caution after some of its sales staff were found to have been using billing information to swipe rival ISPs' customers. OFTEL had received complaints that telesales staff for BT's Click Internet service were studying phone records which only BT and the customer had access to, finding the phone numbers of rival ISPs and then cold-calling them customers to sell them Click instead. OFTEL says this "appeared to OFTEL to be an abuse of BT's dominant position, in contravention of the Fair Trading Condition in their licence." From BT's point of view, the upshot of OFTEL's investigation seems to be a score draw. The company has promised to ensure that staff selling Internet services don't have access to customer calling information, and that telesales staff with access to such information do not market Internet products. According to Director General of Telecommunications David Edmonds "I have made it clear to BT that if any further incidents of this kind occur I will consider further action which could include the issuing of an Order against BT. We will continue to protect consumers' interest by ensuring that there is fair competition in the provision of information services." But this arrangement leaves matters nicely fuzzy. Could it just have been a case of a few isolated incidents involving rogue staff? And could BT explain why telesales staff had (and some will apparently still have) access to customer calling records? Perhaps some of the complaining ISPs or cold-called customers might consider having a word with the Data Protection Registrar, who is responsible for regulating the use of confidential data in the UK. ® Click for more stories

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
'Cowardly, venomous trolls' threatened with TWO-YEAR sentences for menacing posts
UK government: 'Taking a stand against a baying cyber-mob'
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.