Now that is a matter for correct contracts with the outsourced marketing
agency. A good Data Processor contract that insists on standards to be
maintained would solve your concerns because the Data Controller then has
correct and full control.
We always recommend to our clients correct and binding contracts with their
subcontractors that include financial penalties for breach. This should be
a no brainer. However it is amazing how many heavyweight corporations
exhibit no brain.
-----Original Message-----
From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]] On Behalf Of Graham Hadfield
Sent: 19 August 2005 10:37
To: [log in to unmask]
Subject: Re: [data-protection] Silent Calls - are the DMA's new rules right?
"It is the imbecilic, poor, or cowboy operations that need to go. Those do
not generally join the DMA"
I totally agree with the first sentence. Unfortunately I'm not so sure about
the second.
I just searched the DMA web site for references to the insurance company I
mentioned and identified the agency they use. The agency's statement on the
web site includes the following:
"XXXXX is a creative database marketing agency; we build marketing databases
to drive new business, increase retention and improve 'the customer
experience'. Clients include
............................................................................
...............
XXXXX manages all aspects of marketing campaigns from creative concept,
inbound/outbound calls and on and off-line campaign deployment, including
fulfilment, print production and response handling."
I hope their "outbound calls" procedure is superior to their "off-line
campaign deployment" but there is nothing to indicate that is so.
Regards,
Graham
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|