Feeds

European network will target email and internet scams

Joined-up enforcement

Beginner's guide to SSL certificates

Email, phone, prize draw and web shopping scams are being targeted by a new coalition of European consumer groups for the first time. The bulk of the Consumer Protection Co-Operation (CPC) Regulation came into force across Europe on 29th December.

Designed to tackle cross-border schemes to defraud consumers, the CPC Regulation focuses on some emerging scams, such as those using email and phone calls to mislead consumers.

"Crooks and fraudsters who prey on unsuspecting consumers are the lowest of the low," said Ian McCartney, the Consumer Minister at the Department of Trade and Industry (DTI). "No longer will they be able to rip off large numbers of people and then hide behind borders, beyond the reach of the enforcers."

The CPC Regulation was passed in 2004 in order to create a network of consumer protection and public enforcement bodies to prevent people using borders as a barrier to their discovery, though it applies only to intra-Community infringements of consumer protection legislation.

In the UK the Office of Fair Trading (OFT) has been chosen as the authority which will be the UK's arm of the network. Each body has new powers to engage in cross border investigations of rogue traders. The OFT performs that function in the UK already.

"We believe that CPC will improve the effectiveness and enforcement of consumer legislation across Europe," John Fingleton, OFT chief executive, said when it was appointed the UK's authority. "We particularly welcome the fact that member states will now find it easier to request action overseas on behalf of consumers. This is all the more important as a great many consumers make cross-border purchases over the internet, or buy goods when travelling abroad."

The network will investigate traditional activity such as the dishonest selling of time share and holiday club products, but many of the target activities depend on new communication methods, such as email and phone scams and illegal prize draws that can be advertised and conducted online.

"Joined up enforcement across the EU will help to stamp out scams and leave the sharks with nowhere to hide," said McCartney. "Consumers can then have greater confidence, while legitimate businesses are protected from rogues in the marketplace."

Copyright © 2007, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Related link

The Regulation

Secure remote control for conventional and virtual desktops

More from The Register

next story
Crouching tiger, FAST ASLEEP dragon: Smugglers can't shift iPhone 6s
China's grey market reports 'sluggish' sales of Apple mobe
Sea-Me-We 5 construction starts
New sub cable to go live 2016
EE coughs to BROKEN data usage metrics BLUNDER that short-changes customers
Carrier apologises for 'inflated' measurements cockup
Comcast: Help, help, FCC. Netflix and pals are EXTORTIONISTS
The others guys are being mean so therefore ... monopoly all good, yeah?
Surprise: if you work from home you need the Internet
Buffer-rage sends Aussies out to experience road rage
EE buys 58 Phones 4u stores for £2.5m after picking over carcass
Operator says it will safeguard 359 jobs, plans lick of paint
MOST iPhone strokers SPURN iOS 8: iOS 7 'un-updatening' in 5...4...
Guess they don't like our battery-draining update?
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.