Feeds

China pinches thousands for pron

Vows more action in 2010

5 things you didn’t know about cloud backup

Chinese authorities have arrested over five thousand people in a continuing crackdown on internet pornography.

The news came at the end of a year of action against online smut which saw a volunteer army recruited to monitor naughtiness on the net. But 2009 also saw China shelve plans for compulsory net filters for all its citizens, which were seen by many as no more than an excuse to improve overall web censorship.

It moved instead to prevent individuals registering web addresses unless they hold a business licence. It is also creating a blacklist of people not ever allowed to hold a Chinese domain.

China arrested 5,394 people during the crackdown in 2009 - four times more than in 2008, Reuters reports.

The Ministry of Pubic Security promised even more action this year. It promised to increase monitoring, push ISPs to provide filtering technology and: "intensify punishments for Internet operations that violate laws and regulations".

The country now has more internet-connected citizens than any other, but is still struggling with the social and political implications this brings. ®

5 things you didn’t know about cloud backup

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?