Feeds

MySpace seeks Judge's input on sex offenders purge

How to hand over the details

The Power of One Infographic

MySpace this week asked a Pennsylvania state court for advice on how it could hand over information about registered sex offenders without breaking US data protection and privacy laws.

The firm is responding to calls from state attorneys general who last month demanded that the social networking site provide any information it holds to the authorities.

The lawyers said the site should reveal how many sex offenders it has found on its website, and hand over contact details and logs of personal communications.

Specifically, they want information on subscribers who appear in Sentinel Safe, a database containing names, physical descriptions, and other identifiable characteristics of sex offenders in the United States that MySpace has worked to compile with Sentinel Tech. The aim of the database was to make it easy for the social networking site to remove known offenders.

"Sex offenders have no business being on this site," North Carolina Attorney General Roy Cooper said in a statement at the time. "We believe MySpace has a responsibility to get them off the site."

But MySpace refused, arguing that if it were to reveal this kind of information it would be in breach of federal and state privacy laws, as well as its own privacy policies.

Two weeks later, after sustained pressure from the legal bigwigs, MySpace did a u-turn and said it would deal with the requests on a state by state basis.

The firm says merely being positively identified on the Sentinel Safe database is not enough of a reason for it to hand over a subscriber's information. Under the Electronic Communications Privacy Act, authorities must provide search warrants.

According to reports, executive vice president and general counsel Michael Angus issued a statement on Monday this week saying he was "pleased with how this process is working". The firm notes that it wants to hand over the data, but wants to do so in a way that will not compromise any future prosecution. ®

The Power of One Brief: Top reasons to choose HP BladeSystem

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Sit back down, Julian Assange™, you're not going anywhere just yet
Swedish court refuses to withdraw arrest warrant
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
LightSquared backer sues FCC over spectrum shindy
Why, we might as well have been buying AIR
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.