Feeds

EU telco reform trips over Three Strikes

Back to the drawing board?

Secure remote control for conventional and virtual desktops

Two years of negotiation and compromises to craft a giant EU telecomms package ended in recrimination this afternoon, after the Parliament fell out over disconnecting hardcore internet downloaders.

The bumper package addressed spectrum usage and technical regulation, but at the last minute, "three strikes" proved a stumbling block. The French had pushed the hardest for a disconnection policy. In the end, greens and socialists failed to vote for the compromise, which saw introduced judicial oversight. Despite passing by 407 votes for - 57 against, with 171 MEPs abstaining - the amendment means the entire package is blocked.

"We're in uncharted territory," Professor Martin Cave, telco regulation expert told us today. Cave was in Strasbourg to witness the vote.

Political consensus unraveled at the last moment, he said, with Parliamentarians reluctant to be seen taking an "anti consumer" stance so close to the election.

The package now moves to a conciliation process. But when the EU returns to the issue, it will be with an entirely new Commission, and a Parliament (after next month's elections) of a different character.

"We're going to be in trench warfare for anything up to fifteen months," said Cave. "It's a pity - spectrum policy and the streaming of regulation have been suspended. Everybody will be spending their time arguing over that instead of developing a broadband strategy for Europe, for example, or looking ahead to what comes after the Lisbon agenda".

One contentious issue that fell off the agenda on the road to Strasbourg was "net neutrality". Google had lobbied for Green MPs to introduce technical regulation of the internet - but that fell by the wayside with sensible compromises eventually agreed.

Networks feared they would be hampered from legitimate network management practices by activists. They now have to make these clear and transparent to end users, and while the regulator could inquire why a technique is being used, there are acceptable uses: such as stopping the network from collapsing. ®

Beginner's guide to SSL certificates

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.