Feeds

Online criminals threatened with sex offenders' register

Web of offences widened

Providing a secure and efficient Helpdesk

Internet and email users can be added to the sex offenders' register for a whole slew of new offences after the Home Office drastically increased the number of relevant offences.

An unspecified range of offences related to internet and phone use has been added. Now people committing a crime that involves improper use of public electronic communications networks can be made to be subject to the strict conditions imposed by being on the sex offenders' register.

A judge or the police can decide if someone committing one of these crimes should be made the subject of a Sexual Offence Prevention Order (SOPO), which means that they are added to the register.

"We have not listed all the offences, this is an overarching offence," said a Home Office spokeswoman. "What we are talking about is nuisance calls, obscene comments or obscene use of the internet where there is a sexual nature to it."

Some crimes involving computers could previously involve someone being given a SOPO, but this new order from the Home Office, which is to be put to Parliament, would widen the range of crimes which could qualify.

"We are talking about things that are not already an offence – harassment emails to a colleague of a sexual nature, for example," said the spokeswoman. "The best example is nuisance calls, heavy breathing, obscene sexual comments."

Home Office minister Vernon Coaker said that the expansion was a question of protecting the public. "The offences may not seem inherently sexual, but could have had a sexual motive," said Coaker. "These changes are necessary to strengthen the monitoring and management of sex offenders."

Police and the courts are instructed to issue a SOPO if they believe an offender might commit a sex crime if not issued with a SOPO.

The Home Office has also increased the number of crimes which automatically result in someone being put on the register. Inciting or causing child pornography; controlling a child in prostitution or pornography; and arranging child prostitution or pornography now guarantee a SOPO, the Home Office said. The changes are to section three of the Sex Offenders' Act.

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

New hybrid storage solutions

More from The Register

next story
Google recommends pronounceable passwords
Super Chrome goes into battle with Mr Mxyzptlk
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
Reddit wipes clean leaked celeb nudie pics, tells users to zip it
Now we've had all THAT TRAFFIC, we 'deplore' this theft
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
TorrentLocker unpicked: Crypto coding shocker defeats extortionists
Lousy XOR opens door into which victims can shove a foot
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.