Feeds

AOL France fined for misleading advertising

Sacre bleu!

  • alert
  • submit to reddit

High performance access to file storage

AOL France has been found guilty of misleading advertising over its flat-rate Internet access service.

A court upheld a complaint by the consumer group UCF, acting on behalf of two Net users, which claimed that AOL France's decision to impose restrictions on the service was contrary to the ISP's ads.

AOL France was forced to impose 30 minute timeouts when its offer for flat rate unmetered access attracted too many users.

UCF claimed this was a breach of contract.

AOL France claimed the timers were only a temporary measure until it could increase capacity.

The ISP has been ordered to pay damages of FF250,000 (£24,000) and print an apology in four national newspapers.

The court also ruled that the ISP should be fined FF50,000 (£4,800) a day for every day the restrictions remain imposed.

AOL France has reacted angrily to the ruling made earlier this week and will appeal.

In a statement AOL France said that it "strongly disagrees with the ruling" and that the issue is "largely moot since we are lifting the session timers that are at the centre of the case".

The statement continued: "AOL has always acted in the best interest of its members, and our flat-rate offer has been a great success in delivering the Internet to a broad new segment of consumers who did not come online before because of the high price of metered Internet access.

"We implemented session timers as a fair, equitable and temporary measure that helped us maximise the number of members who could get online while we accelerated expansion of our network in response to high demand for our service.

"We invested FF 600 million (£57 million) adding nearly 60,000 new modems and doubling our member service team. As a result, we are able to discontinue the session timers, effective Wednesday," it said.

Coincidentally (and it had nothing to do with this court case) it was always AOL France's intention to discontinue the session timers this week. Ho hum. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.