Feeds

'Extreme porn' law could criminalise millions

Here come illegal pictures of legal activity

The essential guide to IT transformation

As matters stand, there are two serious issues with the proposal. The first is the wholly uncertain scope of the offence. A Ministry of Justice impact assessment suggested that in the first year, there might be 30 prosecutions under the extreme porn provisions (Criminal Justice And Immigration Bill Regulatory Impact Assessments, Ministry of Justice, June 2007).

If true, this is unlikely to make the slightest dent on an industry worth billions of pounds in the UK alone.

On the other hand, experts reckon that up to two million people could have such images on their computers – often unaware that they breach the law. In many instances, pictures could be downloaded to cache the moment an individual opens a blog. They might not even be aware of what they had downloaded: but they would have a very hard time proving that. This raises the spectre of police unable to prosecute someone on another unrelated matter taking a peek at their hard drive to see if they can get them for possession of porn.

The second issue is the role of the Internet Watch Foundation (IWF) – and an almost inevitable increase in "prior restraint" on websites. At present, a degree of low-level internet censorship is carried out by the IWF. This is a shadowy and unelected industry body. The IWF has taken it upon itself to lead the fight against child porn, by maintaining watch lists of websites that are potential sources of such material.

Sites on these lists are incorporated into blocking software, such as Cleanfeed: and they are then blocked by most ISPs. The ordinary user will be told simply that the site is now "unavailable". Meanwhile, the site owner will only be aware that something is up when traffic to their site drops off. Fair enough if they are indeed disseminating child porn. Not so fair, if their business is perfectly legitimate: for they are effectively guilty until they can prove themselves innocent – and this may take weeks.

If child porn leads the IWF to recommend blocking a few thousand sites, stand by for that list to grow by many tens of thousands. At least the subject mattter of child porn is reasonably objectively defined. But "extreme"? Particularly when the IWF guiding principle seems to be: when in doubt, recommend a ban. Many small site owners will find themselves closed down and if they are not aware of the role of the IWF – and many are not – they will never know why. ®

The essential guide to IT transformation

More from The Register

next story
GCHQ protesters stick it to British spooks ... by drinking urine
Activists told NOT to snap pics of staff at the concrete doughnut
Britain's housing crisis: What are we going to do about it?
Rent control: Better than bombs at destroying housing
What do you mean, I have to POST a PHYSICAL CHEQUE to get my gun licence?
Stop bitching about firearms fees - we need computerisation
Top beak: UK privacy law may be reconsidered because of social media
Rise of Twitter etc creates 'enormous challenges'
Redmond resists order to hand over overseas email
Court wanted peek as related to US investigation
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
NZ Justice Minister scalped as hacker leaks emails
Grab your popcorn: Subterfuge and slur disrupts election run up
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.