Feeds

Canoodling women and PC components don't mix

'Gratuitous' says ad watchdog

  • alert
  • submit to reddit

7 Elements of Radically Simple OS Migration

Using images of women kissing and fondling one another while trying to flog PC components is a big no-no, watchdogs ruled today.

The Advertising Standards Authority (ASA) upheld a complaint against Darlington-based SSG Technology after it ran a saucy ad for PC components in Computer Trade Only magazine.

The full-page ad featured a close up of two women embracing one another and kissing, with one woman touching the other's breast outside of her dress.

The text read: "Time for a change?"

"Life is too short to hesitate. Whatever is on your mind regarding PC components and peripherals - call us. If you are considering the benefits of a new distribution partner, we are the right choice. All other desires will remain confidential...".

SSG denied that the ad was offensive (risqué maybe, but not offensive) arguing that it appeared in a trade magazine available only to people in the IT industry.

However, this was not enough for the ASA.

"The image of two women kissing in an advertisement for PC components was gratuitous and likely to cause serious or widespread offence," sniffed the ASA.

SSG has been asked not to use the image in future. ®

Boost IT visibility and business value

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?