Feeds

The Times kills off blogger anonymity

And outs prize-winning blogger, well done lads

Internet Security Threat Report 2014

The Times has overturned a court order which sought to protect the anonymity of a police blogger known as NightJack.

The blog, which has now been deleted, detailed the life and views of a serving police detective. Earlier this year it won an Orwell prize for political writing.

The blogger is Richard Horton a 45-year old detective constable with Lancashire Constabulary. When contacted by Murdoch's organ he sought an injunction to protect his privacy. But Justice Eady ruled he had no right to anonymity.

Horton has received a written warning from Lancs police.

The judge said Horton could not expect to remain anonymous because “blogging is essentially a public rather than a private activity”.

According to The Times.Eady said: "I do not accept that it is part of the court’s function to protect police officers who are, or think they may be, acting in breach of police discipline regulations from coming to the attention of their superiors.”

The blog was critical of many aspects of police work, some serving policemen and politicians. It also discussed certain cases, although information was anonymised. The paper claimed that some individuals could be identified by a process of elimination.

Lancs Police said Horton's behaviour was unacceptable and he had been given a written warning. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Managing SSL certificates with ease
The lack of operational efficiencies and compliance pitfalls associated with poor SSL certificate management, and how the right SSL certificate management tool can help.