McDonald’s Australia served Spam Act warning
- 18 December, 2012 11:36
The Australian Communications and Media Authority (ACMA) has issued a formal warning to McDonald’s Australia for sending emails which did not meet the requirements of the Spam Act.
An ACMA investigation found that emails sent via the McDonald’s Happy Meal website using the ‘send to friends’ option were sent without ensuring friend’s consent. The emails had no unsubscribe option either, which is required under the Act.
According to ACMA chairman Chris Chapman, the case should alert businesses that they must think carefully before using what he referred to as `friend get friend’ marketing. This occurs when a friend promotes a business to people they know via email or social media messages.
“When sending your marketing messages, you must make sure that there is consent from the actual person who is going to receive your message,” he said in a statement. “You can’t just assume consent has been given.”
In response, a McDonald’s Australia spokeswoman told CIO Australia that the quick service restaurant takes its compliance obligations “very seriously” and fully respects the finding of the ACMA’s investigation.
“The `send to a friend’ function was removed from the Happy Meal website in February 2012 and McDonald’s has no intention of reinstating the function or any similar functions on its websites,” she said in a statement.
Follow Hamish Barwick on Twitter: @HamishBarwick
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Bouncing Back From CIO Unemployment
Union slams latest fibre-to-premise trial in Tasmania
2014 Foundations of Pathways | 9 Executive Core Business Competencies
CIOs who want to shift their leadership focus beyond the IT function need to cultivate and emphasise leadership competencies that will equip them to lead effectively at the enterprise level and at the business strategy table.
Evolving Threats Demand New Approaches to Security
As the world becomes increasingly hyperconnected, the opportunities for innovation are virtually limitless. At the same time, the complexity and risk associated with those opportunities is great. Security threats have the potential for enormous ramifications, but so does deploying a security strategy that compromises the user experience, performance, and the ability to innovate online. This paper will profile the emerging disruptive players, and identifies the essential steps to establishing a secure environment without compromising performance or experience.
The Total Cost of Ownership Benchmarking
This white paper provides business insight after an extensive analysis of Total Cost of Ownership (TCO) associated with IP and legacy TDM (Time Division Multiplexing) telephony systems in 236 different corporate environments worldwide.