Feeds

T-Mobile slip exposes 1,100 punters' email addresses

Telco sweats it in the Hothouse

Secure remote control for conventional and virtual desktops

Subscribers to T-Mobile's Hothouse - a focus group-like mailing list - got an added benefit this morning: the email addresses of everyone else on the list. The gaffe was swiftly followed by an apology and a request to delete the offending information.

The mistake was a failure to use our old friend Blind Carbon Copy (BCC) by Ipsos MORI, which runs the scheme to gather opinions and product ideas from punters. Instead the market research outfit accidentally pasted 1,100 addresses into the "To" field. So the messages were delivered along with the email addresses of all the other subscribers.

The leak was quickly followed by several "recall" attempts (four, at last count) and then a grovelling apology and request that users delete the message manually.

Not that Ipsos is the first to make such a mistake; Orange shared email addresses while polling customers about ways it could improve communications back in 2010, barely a year after Vodafone broadcast its email list of people it had accidentally over-billed. Even this esteemed organ isn't immune from hitting the wrong button on occasion, following which the only correct course of action is an abject apology.

"Please accept Ipsos MORI’s sincere apologies for this unfortunate occurrence," says the email sent to us by several readers. "We are currently conducting an internal investigation and we will taking corrective and preventative measures to ensure our data protection guidelines are adhered to", hopefully nothing more than a slap on the wrist and a lesson in email use.

Now we just have to wait for Three and O2 to make the same mistake and we'll have a royal flush. ®

Intelligent flash storage arrays

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.