It seems that there is one law for (eg) Masons, and one law for George Hudson.
Plus your members, it seems, do not agree with you.
Look back in your own archives and see that they all seem to WANT blatant commercial advertising messages. If this is against your AUP, then disallow it ALL.
-----Original Message-----
From: [log in to unmask]
Sent: Mon, 15 Oct 2001 09:06:53 +0100
To: [log in to unmask]
CC: [log in to unmask]
Subject: RE: Wondering about boundaries here
Please do not use this list for any blatant commercial
advertising which is strictlty against our AUP.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Sally Justice PHONE : 020 7815 6509
List Owner (Data Protection) FAX : 020 7815 6599
South Bank University
Computer Services Department
Borough Road London SE1 0AA Email | [log in to unmask]
http://www.jiscmail.ac.uk/lists/data-protection.html
http://www.sbu.ac.uk/dpa/
http://www.sbu.ac.uk/dpforum/
http://www.dataprotection.gov.uk/
From: MX%"[log in to unmask]" 13-OCT-2001 14:27:13.79
To: MX%"[log in to unmask]"
CC:
Subj: Wondering about boundaries here
I looked through the archives, mainly because I was wondering if I could legitimately use this list to offer my own services for sale to the group. I came across the ballot at http://dpvotes.tripod.com which seems to be a representative sample of the vie
Even so, I admit to being nervous of making an offer. It still seems to me to be a liberty to use a discussion group for my benefit.
What I was considering doing was to offer my web address in my signature file as a shop window for my services, though I am sorely tempted to email the list. So I ask "What are the rules, please?"
___________________________________________________________________________
Visit http://www.visto.com.
Find out how companies are linking mobile users to the
enterprise with Visto.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
___________________________________________________________________________
Visit http://www.visto.com.
Find out how companies are linking mobile users to the
enterprise with Visto.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|