Feeds

Sony's PS3 firmware update shows how retailers can be exposed

No compensation from manufacturers

Build a business case: developing custom apps

Though that places them at risk, Parkinson said that retailers will be used to such situations. "Retailers already take risks, such as with defective products that are outside the guarantee period," he said. "Some even negotiate to buy goods with fewer rights of recourse against the supplier to get a cheaper price."

There are other laws that could apply to the changing of goods after the sale, but are unlikely to in this instance, said Parkinson. Though some users will feel that the ability to use other operating systems is desirable, it is not a vital part of using a PlayStation3 for the average consumer, he said.

But if manufacturers did change major elements of goods after the fact they themselves could run into trouble, he said.

"The Consumer Protection From Unfair Trading Regulations have a criminal sanction for unfair practices," he said. "It can be unfair to say something about a product's characteristics that is untrue, but that's got to affect the buying decision of the 'average' consumer, so wouldn't really apply in the PlayStation3 case."

"In any event, the retailer in those circumstances has a defence that the acts of the supplier are outside their control," said Parkinson. "The consumer has no specific rights to bring an action under the Regulations, but Trading Standards could do it and try to enforce criminal sanctions against the manufacturer."

Retailers could try to change their contracts with manufacturers so that they could recoup payouts to consumers, but Parkinson doubted whether many would have the influence to take on major electronics makers.

"Ideally you would seek to include a provision in your contract stating that you would be able to have recourse if the supplier did something of this nature that led to you having consumer complaints against you," he said. "But I would query whether or not many retailers would have sufficient power to make that stick and get it into the contract."

Copyright © 2010, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

The essential guide to IT transformation

More from The Register

next story
Reg man looks through a Glass, darkly: Google's toy ploy or killer tech specs?
Tip: Put the shades on and you'll look less of a spanner
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
One step closer to ROBOT BUTLERS: Dyson flashes vid of VACUUM SUCKER bot
Latest cleaner available for world+dog in September
Samsung Gear S: Quick, LAUNCH IT – before Apple straps on iWatch
Full specs for wrist-mounted device here ... but who'll buy it?
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Now that's FIRE WIRE: HP recalls 6 MILLION burn-risk laptop cables
Right in the middle of Burning Mains Man week
Apple's iWatch? They cannae do it ... they don't have the POWER
Analyst predicts fanbois will have to wait until next year
HUGE iPAD? Maybe. HUGE ADVERTS? That's for SURE
Noo! Hand not big enough! Don't look at meee!
AMD unveils 'single purpose' graphics card for PC gamers and NO ONE else
Chip maker claims the Radeon R9 285 is 'best in its class'
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.