Feeds

EU TV laws are coming

Parliament says yes, oui, si, sim, tak

High performance access to file storage

The European Parliament yesterday passed the Audiovisual Directive, which aims to modernise and consolidate laws governing video content however it is transmitted.

The "Audiovisual Media Services Without Frontiers Directive" covers all media services and grants citizens certain rights to "access extracts of important events for new purposes" and better access for hearing or visually-impaired people. It aims to provide converged regulation for an increasingly converged media world.

Under the new laws, broadcasters will have to make clear when and where product placement is taking place. But product placement in childrens' TV is still not allowed.

EU member states now have 24 months to move the provisions into national law so they will apply by 2009. The law keeps the country of origin rule - that you must obey the laws of the country where the broadcaster is based not all the countries in which programmes are subsequently broadcast.

Viviane Reding, EU Commissioner for Information Society and Media, said: "With these modernised rules that improve legal certainty and reaffirm the country of establishment principle... There will be less regulation, better financing for content and greater visibility to cultural diversity and the protection of minors."

Daily limits for advertising remain at 12 minutes per hour, but total daily limits have been removed.

Yesterday also saw the commission call for a more inclusive digital society. It is launching an awareness campaign under the banner "e-Inclusion, be part of it!" to improve access to the internet and other digital services. This aims to "enable everyone to take part in the information society", to give access to those currently excluded more quickly and integrate actions across Europe to improve their effectiveness.

The EU release on the Audiovisual Directive is here and the e-inclusion stuff is here. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.