Feeds

Euro guidelines will allow Bluetooth spam

But UK punters still protected

Choosing a cloud hosting partner with confidence

The Mobile Marketing Association has published its guidelines for advertising pushed over Bluetooth connections, and considers anyone who hasn't opted out to be fair game for spammers.

The guidelines are now available for public review until 26 September, and take a distinct step beyond the UK's Direct Marketing Association (DMA) rules in that they consider any handset left in "discoverable" mode to be implicitly giving permission for pushed adverts - something the DMA explicitly rejects.

The document (pdf) has been produced by the "Proximity Committee", a part of the Mobile Marketing Association (MMA), and is mostly concerned with an explanation of what Bluetooth is and how it can effectively be used. It says that IMS Research reckons that in the US more than 60 per cent of handsets sport Bluetooth and 70 per cent in Europe, making it an attractive channel for pushed advertising.

But while the DMA's 2005 recommendations state that punters must sign up to receive messages, perhaps by downloading an application or "pairing" with a promotional service, the MMA reckons it's fair to push messages out to them, then ask them to opt out if they're not interested.

The DMA only represents the UK's junk mailers (as they hate being called), but the MMA claims to have a global reach. Both organisations publish guidelines members conform to in the hope of avoiding governmental legislation.

In the UK, Bluetooth has been used in several venues with considerable success and following the DMA guidelines, but it's hard to imagine that having your phone bleep every time you walk into a cinema or shop is going to endear anyone to the protocol. Phones are increasingly supplied with Bluetooth discoverable mode switched off, but while the technically literate might be happy to manage their own connections it's possible that most users won't understand the difference and will just leave Bluetooth switched off rather than risk being hounded by messages.

If you think the MMA should be taking a more DMA-style approach, or just avoiding Bluetooth altogether, then they'd love to hear your comments before 26 September. ®

Intelligent flash storage arrays

More from The Register

next story
Mighty Blighty broadbanders beg: Let us lay cable in BT's, er, ducts
Complain to Ofcom that telco has 'effective monopoly'
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
Ofcom tackles complaint over Premier League footie TV rights
Virgin Media: UK fans pay the most for the fewest matches
FCC: Gonna need y'all to cough up $1.5bn to put broadband in schools
Kids need more fiber, says Wheeler, and you'll pay for it
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.