Feeds

Find Aussie criminals on the Web

Did your next-door neighbour do bird? Find out here

  • alert
  • submit to reddit

Top 10 endpoint backup mistakes

Strewth! These days you just don't know if your babysitter, neighbour or football coach is actually a crazed, evil and malicious criminal (welcome modern alienation and paranoia). But an Australia Web site wants to change all that. It has built a database of criminals based on newspaper reports of convictions and invites you to check up on anyone you're not too sure about. A small fee will get the information you're after. Helpfully organised into categories like Wanted Persons, Unsolved Crimes, Conmen & Scams, and featuring a search engine and rewards section, the site opens a big can of worms marked "privacy". The site aims to supply you with "the information you need to protect yourself". It points out quite rightly that court judgments are a matter of public record and argues that making this information readily accessible is a service to the public good. The problem though - as it always is when dealing with internet issues - is that this information is so easy to get hold of. The argument - "if you've done nothing wrong, then you have nothing to worry about" - is disturbing in its apparent logic and is often used to hide a multitude of privacy-invading measures. Aside from the fact that newspaper reports are not always 100 per cent accurate, the concept of rehabilitation is a very strong element of our justice system. If someone does their time, are they not entitled to a second chance without prejudice? Also, by supplying information on paedophiles, the site is left open to accusations that it will encourage vigilantes. Ironically, the site lists a strict privacy policy. including a ban on cookies and information gathering on visitors. Whatever the outcome or success of the site, it is a clear indication that international and domestic law is dangerously lagging technological progress. ® Jeff the xenophobic dustman says: "That's bleedin' rich coming from the Aussies. Bunch of bloody school teachers coming over all high and mighty. Tell you what though - probably be easier to list the non-criminals. After all, they all come from criminals off the prison ships ain't they? Harr harr harr"

A new approach to endpoint data protection

More from The Register

next story
Amazon says Hachette should lower ebook prices, pay authors more
Oh yeah ... and a 30% cut for Amazon to seal the deal
Philip K Dick 'Nazi alternate reality' story to be made into TV series
Amazon Studios, Ridley Scott firm to produce The Man in the High Castle
Nintend-OH NO! Sorry, Mario – your profits are in another castle
Red-hatted mascot, red-colored logo, red-stained finance books
Sonos AXES support for Apple's iOS4 and 5
Want to use your iThing? You can't - it's too old
Joe Average isn't worth $10 a year to Mark Zuckerberg
The Social Network deflates the PC resurgence with mobile-only usage prediction
Feel free to BONK on the TUBE, says Transport for London
Plus: Almost NOBODY uses pay-by-bonk on buses - Visa
Twitch rich as Google flicks $1bn hitch switch, claims snitch
Gameplay streaming biz and search king refuse to deny fresh gobble rumors
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?