Feeds

Bluetooth SIG gets serious

Chinese factory raided, 20,000 items seized

Seven Steps to Software Security

The Bluetooth SIG showed its muscle today when the manufacturing facility of Shenzhen Bluebird Hi-Tech. Co. in Shenzhen was raided by officers from the Shenzhen City Economic Crime Investigation Department of the Public Security Bureau (a unit which will never make for a snappy TV title).

Over 20,000 items were seized from the factory, all bearing the Bluetooth logo and ranging from headsets to manuals and boxes. The company was already under investigation for producing products infringing on the Bluetooth SIG trademarks. The Bluetooth SIG only allows kit which has passed their tests to bear their logo, which is protected under trademark law.

"By bypassing qualification and tests, it is unfair not only to Bluetooth SIG members who have conformed to the Bluetooth Qualification Program but also to consumers, who often end up buying poor quality grade products that have not met the Bluetooth specification requirements" said Micheal Foley, Bluetooth SIG director.

Far worse for the Bluetooth SIG is that customers who buy dodgy Bluetooth kit will end up blaming the technology rather than the device, devaluing the whole business as they tell their friends that Bluetooth devices don’t work.

"China is committed to the fight against IP and trademark infringement", stated Mr. Daoxin Ou, Head of Trademark & Advertisement Department, Shenzhen Administration for Industry & Commerce Futian Branch.

It’s a start, now if they could just work on their freedom of speech issues.®

The smart choice: opportunity from uncertainty

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.