Feeds

Sex in the Noughties: How was it for you?

Politically correct mainly

High performance access to file storage

Time to spank hit back

When it comes to charting the sexual history of this decade, perhaps two events will stand out. The first relates to a report that slightly pre-dates New Labour’s coming to power. In 1995, the Law Commission tentatively suggested that unless serious social harm was being done, sado-masochistic acts ought not to be the subject of criminal law.

Their proposal was duly considered by SORT – and duly shelved. For when it came to issues of consent, the Law Commission was interested in the question of when it was permissible for an individual to say Yes – without expecting the heavy hand of the state to intervene. Not so SORT, for whom the central questions of consent were about when the state should back an individual’s right to say No.

Both questions need to be addressed: but under New Labour, the second has taken priority.

Last observation, though, to Law Professor Stephen Guest. A recent debate in the Lords considered whether to permit a "freedom of expression" exemption in respect of a proposed new law on "stirring up homophobic hatred".

On behalf of the government, opposing the freedom of speech clause, Justice minister Claire Ward stated that the problem with having such a clause was that people would use that "freedom of speech" clause to attack gays.

Professor Guest writes: "It was clear she had no grasp of the fundamental importance of freedom. That stance, that freedom of speech was a hindrance to freedom, will eventually backfire. If you are claiming legitimacy for your view that the rights to freedom of gays, of minority religions, and of racial minorities is fundamental, as I do, it is not in your interest to try to achieve this by attacking the idea of freedom in general."

In the end, that may well serve as an epitaph for the entire decade when it comes to revision to the laws on sexuality: on the one hand, an acitivity that is being practiced in more and more outlandish ways by individuals whose primary motivation is about having fun; on the other, a protectionist government, whose gut reaction to this situation - as many others - is a desire to impose a level of top-down nit-picking control which is in the end wholly at odds with that activity. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.