Feeds

Research firm emails 20,000 addresses in the clear

Don't they teach BCC at PR school?

Eight steps to building an HP BladeSystem

We've almost got bored of stories about people sending emails to lots of subscribers without using the BCC field, but not when the mail is sent to 20,000 people.

Today's doofus is investor research company Digital Look. It sent a mail yesterday morning which revealed 22,129 email addresses. Whoops.

Two hours later Digital Look sent an apology email and asked users to delete the offending missive. The email reads:

It has come to our notice that a small number of people received an erroneous email from us this morning containing a random list of email addresses.

We are extremely sorry for the human error that caused this problem and we are currently taking steps to ensure that this can never happen again. We take your privacy very seriously and our team are working hard to put in additional safety measures right now.

Pointy hat and corner-standing duty for someone, we think.

The mail continued reassuringly:

The other investors who received the email were all private investors who use the Digital Look website, and I would like to think that, like yourself, they are sensible and responsible people and won't misuse the email details that they received.

Such faith in users is truly touching in this day and age.

The email also said only a small number of people received the mail. We could of course test this by sending our own email and waiting for bounce-backs, but that would probably annoy a lot of people.

The mail ends with a further apology and an address for formal complaints. ®

Maximizing your infrastructure through virtualization

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
Price cuts, new features coming for Office 365 small biz customers
New plans for companies with up to 300 staff to launch in fall
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.