Actually my point is that it is against the PECR as well as being inherently "wrong". -----Original Message----- From: This list is for those interested in Data Protection issues [mailto:[log in to unmask]] On Behalf Of Tim Turner Sent: 18 April 2007 13:50 To: [log in to unmask] Subject: Re: [data-protection] When is spam not spam? Tim Trent's point seems to be that Bluetooth spamming is wrong. However, English law usually says that you can do it if it's not illegal, so I think the point is whether it is legal. Bluetooth-enabled devices are connected with the device which transmits the message, and the connection between them is a "network" because that's what we call an interconnected arrangement of electronic things. We even use the same word for people who are connected. It's not conclusive just to identify a network. Bluetooth messages are transmitted over a network, but the PECR question is whether they are transmitted over a "public electronic communications network". We don't need to know what a network is, we need to know what a "public electronic communications network". If the connection between the Bluetooth broadcaster and Bluetooth devices is a PECN, and the transmitted message "can be stored in the network or in the recipient's terminal equipment until it is collected", then we're in business. But I don't think it's enough to concentrate solely on the word "network", ignoring what goes before it in the PECRs. If I have a Bluetooth "network" between a phone and a digital camera in my house, is it a "public electronic communications network"? No. So what makes it so? Is it simply that the network operates in public? I'm not sure. The other important thing is that if this gets tested in the courts, the defendant will be likely to put up a sturdy defence, unlike previous PECR cases. The "peril" is of a different order of magnitude if the company concerned is Nissan, HSBC, Motorola, Nokia or Smirnoff (according to New Media Age, they're all about to dip their toes). Call me old-fashioned, but I don't think that these big hitters would be trying out this technology blithely. I suspect that the reason why it's happening despite the advice on the IC website is that the big companies' lawyers don't agree with the Commissioner's interpretation. The way I read the regulations, I think there's a loophole and a gush of marketing is about to flow through it. Suddenly, my reliable old no-tooth mobile seems like such a good choice..... Tim Turner Data Protection / FOI Officer Legal and Property Services Wigan Council -----Original Message----- From: This list is for those interested in Data Protection issues [mailto:[log in to unmask]] On Behalf Of Tim Trent Sent: Wed 18 April 2007 12:49 To: [log in to unmask] Subject: Re: [data-protection] When is spam not spam? And I think that is the real point. It *is* a network, even though the connections are often ad hoc, and not necessarily wanted or consciously permitted. And, since it is a network, it falls within the various laws and directives and regulations which say "Spam me at your peril". We can, of course, come back to the argument about individual vs non-individual subscribers, but there is no way of telling here, and thus the transmission of an all embracing signal is counter to the law anyway, surely? -----Original Message----- From: This list is for those interested in Data Protection issues [mailto:[log in to unmask]] On Behalf Of Griffiths, Ian Sent: 18 April 2007 10:39 To: [log in to unmask] Subject: Re: [data-protection] When is spam not spam? One might also argue that the network is the Bluetooth 'space' in which devices roam about in and out of range. In fact as devices become more popular a busy area might have perhaps 5-10 devices in range, regardless of who is peered to who or who is actually transmitting data. Mere discover of other handsets on an ad-hoc basis would indicate to me that a network is certainly in place. The fact that the range of the devices is poor and they don't all see each other is a technicality. Ian -----Original Message----- From: This list is for those interested in Data Protection issues [mailto:[log in to unmask]] On Behalf Of Tim Trent Sent: 18 April 2007 09:47 To: [log in to unmask] Subject: Re: [data-protection] When is spam not spam? I have been doing some research, prompted also by a comment left on my blog and a reply to it: http://timtrent.blogspot.com/2007/04/blutooth-broadcast-is-bluespam.html is the specific blog message (tiny http://tinyurl.com/2z6smx ) and the comment included: "So where is the network? If device A connects directly to device B by Bluetooth there is no network between them. Any court would decide that the words were inserted with a purpose, and that the existence of the words in the regulations cannot be disregarded." This got me thinking hard about networks, but not enough to research, but the anon comment lower did: "....of course Bluetooth is a network. The answer to where the network is if device A connects directly to device B is a simple one: device A and B make the network. They are the two endpoints out of which the network is built." And anon is right. There will be some Computer Science definition of a network which confirms this. But the Wikipedia article on Bluetooth at http://en.wikipedia.org/wiki/Bluetooth (with all Wikipedia's faults acknowledged) is pretty compelling in its opening paragraph. The UKIC has acknowledged my enquiry and is passing it for answering. This is a slow process, so I have aimed them at their own guidance note. I hope to be able to report at least our regulator's opinion on Bluespam when I get a full reply. It seems to me that this is an area that is not entirely cut and dried, and where lawyers will make money. -----Original Message----- From: This list is for those interested in Data Protection issues [mailto:[log in to unmask]] On Behalf Of Roland Perry Sent: 12 April 2007 15:05 To: [log in to unmask] Subject: Re: [data-protection] When is spam not spam? In message <!&!AAAAAAAAAAAYAAAAAAAAAIfCFjaFV0BEsFq4L0YKekfCgAAAEAAAABf1HjlgMVRBlB9J x [log in to unmask]>, at 12:40:32 on Thu, 12 Apr 2007, Tim Trent <[log in to unmask]> writes >While you may well be right, Roland, the sentence " Marketing messages >transmitted using 'Bluetooth' technology, for example, messages sent to >all 'Bluetooth' enabled handsets within a given radius, are also >considered to be 'electronic mail'" does look compelling. It's just Guidance, and I agree it's compelling (or should that be "simply quite obvious") that they are emails. What's not compelling to me is that they are emails over a public network (which they need to be, to be caught by PECR). But we are just spinning our wheels here. I think I'll ask the chap who wrote the relevant section of the Comms Act (containing the definition of PECN upon which PECR relies) what he thinks! And let you know. -- Roland Perry ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm Any queries about sending or receiving messages please send to the list owner [log in to unmask] Full help Desk - please email [log in to unmask] describing your needs To receive these emails in HTML format send the command: SET data-protection HTML to [log in to unmask] (all commands go to [log in to unmask] not the list please) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm Any queries about sending or receiving messages please send to the list owner [log in to unmask] Full help Desk - please email [log in to unmask] describing your needs To receive these emails in HTML format send the command: SET data-protection HTML to [log in to unmask] (all commands go to [log in to unmask] not the list please) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm Any queries about sending or receiving messages please send to the list owner [log in to unmask] Full help Desk - please email [log in to unmask] describing your needs To receive these emails in HTML format send the command: SET data-protection HTML to [log in to unmask] (all commands go to [log in to unmask] not the list please) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm Any queries about sending or receiving messages please send to the list owner [log in to unmask] Full help Desk - please email [log in to unmask] describing your needs To receive these emails in HTML format send the command: SET data-protection HTML to [log in to unmask] (all commands go to [log in to unmask] not the list please) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm Any queries about sending or receiving messages please send to the list owner [log in to unmask] Full help Desk - please email [log in to unmask] describing your needs To receive these emails in HTML format send the command: SET data-protection HTML to [log in to unmask] (all commands go to [log in to unmask] not the list please) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm Any queries about sending or receiving messages please send to the list owner [log in to unmask] Full help Desk - please email [log in to unmask] describing your needs To receive these emails in HTML format send the command: SET data-protection HTML to [log in to unmask] (all commands go to [log in to unmask] not the list please) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^