Print

Print


Roland Perry wrote:
[log in to unmask]" type="cite">In message <[log in to unmask]>, at 06:40:24 on Sat, 20 Sep 2008, Tim Trent <[log in to unmask]> writes
I was hoping we might distill some thoughts over it.
In summary, I'm not against permission based marketing, but people should understand what they are giving permission for - which might end up being rather more than the "move on, nothing to see here" material of which there have been several examples.
As you might imagine, Roland, I take the "Permission" part of Permission Based Marketing very seriously.  My own ISP is "none of those currently deploying/intending to deploy OIX" so I have, today, only an academic interest in it, but I am checking whether, for example, Spybot Search and Destroy will rid me of any cookies (etc and prevent their installation) this thing place son my machines because I do not and will not give my permission for tracking my online behaviour.

Since most of us tune out adverts anyway, and, even when we see them we tend not to click them (ComplianceAndPrivacy.Com is funded from adverts and I know what a small proportion of visitors click), I am not sure that this is anything other than a mixture of trade puffery and back door surveillance.

I am speaking at ad:tech on Wednesday.  This is how I was made to discover this thing.  I've asked ad:tech for their comments since OIX is an event sponsor.  Depending upon those comments I may withdraw from the engagement.
--

Tim Trent - Consultant
Tel: +44 (0)7710 126618
web: ComplianceAndPrivacy.com - where busy executives go to find the news first
personal blog: timtrent.blogspot.com/

Marketing by Permission

Important: This message is private and confidential. If you have received this message in error, please notify us and remove it from your system. This email and any attachment(s) are believed to be virus-free, but it is the responsibility of the recipient to make all the necessary virus checks. This email and any attachments to it are copyright of Meadowood Associates, owners of Compliance And Privacy, unless otherwise stated. Their copying, transmission, reproduction in whole or in part may only be undertaken with the express permission, in writing, of Meadowood Associates, at Meadowood House, 30 Redditch, Bracknell, Berkshire, RG12 0TT.


All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html

Selected commands (the command has been filled in below in the body of the email if you are receiving emails in HTML format):

All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm and are sent in the body of an otherwise blank email to [log in to unmask]

Any queries about sending or receiving messages please send to the list owner [log in to unmask]

(Please send all commands to [log in to unmask] not the list or the moderators, and all requests for technical help to [log in to unmask], the general office helpline)