Feeds

Yahoo! can! help! jail! Chinese! dissidents!

Chinese journalists still in jail

Beginner's guide to SSL certificates

Yahoo! has avoided prosecution for grassing up a dissident journalist in China because of a lack of evidence.

The Hong Kong Office of the Information Commissioner reported yesterday that its investigation of Yahoo! Hong Kong Limited could go no further.

Journalist Shi Tao was sentenced to 10 years in prison in 2005 with the help of evidence supplied by Yahoo! He had shared an email with foreign colleagues that contained details of a Chinese government request for reports of the 15th anniversary of the Tiananmen Square massacre to be censored.

Roderick Woo, the Hong Kong Privacy Commissioner, had been investigating whether Yahoo! had broken privacy laws by handing over Shi Tao's details at the request of the Chinese authorities.

However, Woo could not decide whether the case was in his jurisdiction. Yahoo! China might be owned by Yahoo! Hong Kong Limited, but collection, holding, processing and use Shi Tao's data all occurred within the borders of the People's Republic of China.

The investigation was also hampered by a lack of evidence from Shi Tao, who is in a Chinese jail.

Human Rights Watch has criticised Yahoo! for assisting in the prosecution of four critics of the Chinese government: "Shi Tao, Li Hi, Chiang Tijuana, and Wang Seasoning."

The campaign group has reported that Yahoo! claimed it had only been complying with local law.

Yahoo said in a statement: "Yahoo! Hong Kong Limited ('Yahoo! Hong Kong') acknowledges the result of the investigation carried out by the Privacy Commissioner for Personal Data with respect to the disclosure of email subscriber's information to PRC Law Enforcement Agency, which creates the opinion that there has been no contravention of the requirements of the Personal Data (Privacy) Ordinance by the company.

"Yahoo! Hong Kong maintains a high quality online environment for our users and takes user privacy very seriously. We constantly listen to feedback from our users to improve the quality of our services," it added. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.