Feeds

The Times kills off blogger anonymity

And outs prize-winning blogger, well done lads

Intelligent flash storage arrays

The Times has overturned a court order which sought to protect the anonymity of a police blogger known as NightJack.

The blog, which has now been deleted, detailed the life and views of a serving police detective. Earlier this year it won an Orwell prize for political writing.

The blogger is Richard Horton a 45-year old detective constable with Lancashire Constabulary. When contacted by Murdoch's organ he sought an injunction to protect his privacy. But Justice Eady ruled he had no right to anonymity.

Horton has received a written warning from Lancs police.

The judge said Horton could not expect to remain anonymous because “blogging is essentially a public rather than a private activity”.

According to The Times.Eady said: "I do not accept that it is part of the court’s function to protect police officers who are, or think they may be, acting in breach of police discipline regulations from coming to the attention of their superiors.”

The blog was critical of many aspects of police work, some serving policemen and politicians. It also discussed certain cases, although information was anonymised. The paper claimed that some individuals could be identified by a process of elimination.

Lancs Police said Horton's behaviour was unacceptable and he had been given a written warning. ®

Beginner's guide to SSL certificates

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.