Feeds

Pressure group demands UK apes China net filter plan

Without the political censorship...obviously

Providing a secure and efficient Helpdesk

"All computers should be provided with net filtering software loaded - and the default position for such filters should be on." That is the view of Miranda Suit, one of the organisers of Mediamarch - a voluntary group seeking to reduce the harmful effects of the media on our children, families and society.

Ms Suit was speaking to the Reg about the Chinese government’s decision to enforce the fitting of mandatory blocking software on all new PCs supplied within China from July 1. The stated aim of this software would be to block user access to pornography; although many commentators fear that once the capability was in place, it could be used for political censorship as well.

She felt that a filter based on a government-sponsored list of undesirable websites ran the inevitable risk of deteriorating into state censorship and might be a step too far. However it is probably preferable to doing nothing about such a serious problem.

Moreover, the fact that one approach had drawbacks was not a reason to abandon the search for a solution - or to give up hope that something could be done.

"Porn addiction is a serious issue, which neither government nor computer suppliers are currently taking seriously enough," she said.

"At Mediamarch, we are hearing from a growing number of couples whose entire relationship is being put under enormous pressure through what can only be described as an addiction by one partner to internet porn.

"Porn has always existed in one form or another - but the ease with which it can be accessed through the internet completely changes the rules of the game."

This conclusion is backed up with evidence cited on the Mediamarch site that "exposure to pornographic material puts one at an increased risk for developing sexually deviant tendencies, committing sexual offences, experiencing difficulties in one's intimate relationships, and accepting the rape myth".

John Beyer, director of related pressure group, Mediawatch is less convinced. While agreeing that steps need to be taken to restrict the flow of pornography across the globe, he feels that the Chinese solution is overly bureaucratic.

His preferred solution is for a global agreement on what constitutes acceptable content, combined with an ever-growing set of interlocking voluntary agreements by ISPs to restrict access to extreme material. As reported by El Reg earlier this year: this solution also happens to be the solution favoured by Derek Wyatt, MP, Co-Chair of the All Party Parliamentary Group on Communications. ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.