Feeds

Oz anti-censorship site is censored

What's that Skippy? A satirical website's been taken down?

Top 5 reasons to deploy VMware with Tegile

The Australian company that runs the .com.au domain registry has been accused of abandoning its own procedures to censor a website satirising communications minister Stephen Conroy's ISP filtering regime.

On Friday afternoon, Sapia Pty Ltd, the company behind stephenconroy.com.au, was told by auDA that they had three hours to explain its use of the domain or it would be withdrawn.

"After several attempts at convincing them to give us reasonable time to reply we made a last-ditch attempt at 4.10pm stating that we provide a consultancy product with 'Stephen Conroy' in it's name," the firm said on its new site stephen-conroy.com.

"We hoped that this would at least enable us to stay up over the weekend, but they didn't want to know."

Stephenconroy.com.au was subsequently taken down by 5pm.

The move has prompted accusations of censorship against auDA. It denied any political interference.

"We were not contacted by anyone in the government," CEO Chris Disspain told ZDNet.com.au. "This was picked up by our normal checks and balances."

Groups opposed to the Australian government's ISP filtering regime were particularly outraged by the three-hour deadline imposed by auDA.

Sapia Pty noted it was an "unusually short period of time for domain eligibility complaints to be arbitrated". "This time frame was manifestly inadequate to obtain representation and prepare an appropriate response," it added.

Disspain said the domain had so far only been deactivated, and that the firm had two weeks to establish its eligibility to use the name again. He blamed the short initial deadline on the fact it was being checked on a Friday and auDA would not want an ineligible domain to remain in use for a further two days.

Stephen Conroy has been vilified by many in and around the Australian internet industry as the driving force behind the country's forthcoming ISP filtering programme, which will target material on "bestiality, sexual violence, detailed instruction in crime, violence or drug use and/or material that advocates the doing of a terrorist act".

On Sapia Pty's new site, outside auDA's control, Conroy is satirised as "minister for fascism". ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.