Feeds

Vodafone Ireland faces ski spam allegations

Taking the piste

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Vodafone customers in Ireland have complained that the mobile phone company is spamming their friends.

As part of a competition to win a €3,000 skiing trip customers have been asked to enter the email addresses of three friends who would accompany them on the holiday.

But according to one Vodafone customer: "Shortly afterwards myself, and the three friends received email...from myself…advertising Vodafone.

"It looked like I was now working for Vodafone and trying to advertise for them. It's a bit much," he said.

A spokeswoman for Vodafone Ireland that the email was merely a confirmation notice that they had been included into the competition, although she admitted that it also included an advert for one of the company's services.

She added that everything was above board as set out in the Ts&Cs.

She reassured those taking part that Vodafone was not harvesting these emails and they would not be used for any other marketing initiatives. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.