Feeds

Online criminals threatened with sex offenders' register

Web of offences widened

Build a business case: developing custom apps

Internet and email users can be added to the sex offenders' register for a whole slew of new offences after the Home Office drastically increased the number of relevant offences.

An unspecified range of offences related to internet and phone use has been added. Now people committing a crime that involves improper use of public electronic communications networks can be made to be subject to the strict conditions imposed by being on the sex offenders' register.

A judge or the police can decide if someone committing one of these crimes should be made the subject of a Sexual Offence Prevention Order (SOPO), which means that they are added to the register.

"We have not listed all the offences, this is an overarching offence," said a Home Office spokeswoman. "What we are talking about is nuisance calls, obscene comments or obscene use of the internet where there is a sexual nature to it."

Some crimes involving computers could previously involve someone being given a SOPO, but this new order from the Home Office, which is to be put to Parliament, would widen the range of crimes which could qualify.

"We are talking about things that are not already an offence – harassment emails to a colleague of a sexual nature, for example," said the spokeswoman. "The best example is nuisance calls, heavy breathing, obscene sexual comments."

Home Office minister Vernon Coaker said that the expansion was a question of protecting the public. "The offences may not seem inherently sexual, but could have had a sexual motive," said Coaker. "These changes are necessary to strengthen the monitoring and management of sex offenders."

Police and the courts are instructed to issue a SOPO if they believe an offender might commit a sex crime if not issued with a SOPO.

The Home Office has also increased the number of crimes which automatically result in someone being put on the register. Inciting or causing child pornography; controlling a child in prostitution or pornography; and arranging child prostitution or pornography now guarantee a SOPO, the Home Office said. The changes are to section three of the Sex Offenders' Act.

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Plug and PREY: Hackers reprogram USB drives to silently infect PCs
BadUSB instructs gadget chips to inject key-presses, redirect net traffic and more
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?