Feeds

Online criminals threatened with sex offenders' register

Web of offences widened

Providing a secure and efficient Helpdesk

Internet and email users can be added to the sex offenders' register for a whole slew of new offences after the Home Office drastically increased the number of relevant offences.

An unspecified range of offences related to internet and phone use has been added. Now people committing a crime that involves improper use of public electronic communications networks can be made to be subject to the strict conditions imposed by being on the sex offenders' register.

A judge or the police can decide if someone committing one of these crimes should be made the subject of a Sexual Offence Prevention Order (SOPO), which means that they are added to the register.

"We have not listed all the offences, this is an overarching offence," said a Home Office spokeswoman. "What we are talking about is nuisance calls, obscene comments or obscene use of the internet where there is a sexual nature to it."

Some crimes involving computers could previously involve someone being given a SOPO, but this new order from the Home Office, which is to be put to Parliament, would widen the range of crimes which could qualify.

"We are talking about things that are not already an offence – harassment emails to a colleague of a sexual nature, for example," said the spokeswoman. "The best example is nuisance calls, heavy breathing, obscene sexual comments."

Home Office minister Vernon Coaker said that the expansion was a question of protecting the public. "The offences may not seem inherently sexual, but could have had a sexual motive," said Coaker. "These changes are necessary to strengthen the monitoring and management of sex offenders."

Police and the courts are instructed to issue a SOPO if they believe an offender might commit a sex crime if not issued with a SOPO.

The Home Office has also increased the number of crimes which automatically result in someone being put on the register. Inciting or causing child pornography; controlling a child in prostitution or pornography; and arranging child prostitution or pornography now guarantee a SOPO, the Home Office said. The changes are to section three of the Sex Offenders' Act.

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.