Feeds

Business guru tries to silence bloggers over 'misleading' mailshot

ASA aware and investigating

The essential guide to IT transformation

A marketing mailshot, similar to one described as misleading by the Advertising Standards Authority in April, is reappearing in British offices across the country - and bloggers who complain are getting hit with threatening legal letters.

The missive from Cardell Media looks like a handwritten envelope containing an article torn from a newspaper and a Post-It note. The note says: "David, I saw this and thought of you. This guy is brilliant. Have a look at his website". The guy in question is Chris Cardell whose website describes him "as one of the world’s leading authorities on Entrepreneurial Success and Advanced Thinking".

The ASA ruled in April that a similar letter was misleading because it did not make clear it was marketing guff. The ASA told Cardell Media not to use the ad again.

But bloggers writing about any of this have been hit with cease and desist notices from Cardell's US lawyers. The threatening letter is enough for most to remove their posts - a quick Google will reveal various missing stories, some still cached by the search giant.

One such letter seen by the Reg claims copyright over any use of the name Chris Cardell and warns about "your website's post 'Junk Mail by Chris Cardell' which unlawfully infringes upon the intellectual property of rights of the Cardell Media Family".

The letter, sent from San Diego lawyers Preovolos & Associates, demands that posts mentioning Cardell be removed and no further postings made.

A spokesman for the ASA told us that it was well aware that Cardell Media was ignoring its earlier ruling.

He said: "We've not had complaints but our investigators do follow up to check companies are following our rulings. We're working with various partners to try and get this stopped.

"We can also look at other sanctions - like getting their mass mailing discounts removed and work with other regulators and trade bodies."

We've emailed and left messages at Cardell Media with no success.

The ASA ruling is here.

Thank you to Garve Scott-Lodge from Plexus Media for the tip-off. ®

Boost IT visibility and business value

More from The Register

next story
Assange™: Hey world, I'M STILL HERE, ignore that Snowden guy
Press conference: ME ME ME ME ME ME ME (cont'd pg 94)
Premier League wants to PURGE ALL FOOTIE GIFs from social media
Not paying Murdoch? You're gonna get a right LEGALLING - thanks to automated software
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
Ballmer quits Microsoft board to spend more time with his b-balls
From Clippy to Clippers: Hi, I see you're running an NBA team now ...
Online tat bazaar eBay coughs to YET ANOTHER outage
Web-based flea market struck dumb by size and scale of fail
Amazon takes swipe at PayPal, Square with card reader for mobes
Etailer plans to undercut rivals with low transaction fee offer
Call of Duty daddy considers launching own movie studio
Activision Blizzard might like quality control of a CoD film
US regulators OK sale of IBM's x86 server biz to Lenovo
Now all that remains is for gov't offices to ban the boxes
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.