Feeds

E-commerce law update includes ISP hate speech exemption

Dispensation granted for 'mere conduits'

Maximizing your infrastructure through virtualization

The Government has published Regulations that will absolve internet service providers (ISPs) and other digital service providers of responsibility for religion or sexuality-related hate speech transmitted over their networks.

The E-Commerce Directive protects service providers from liability for material that they neither create nor monitor but simply store or pass on to users of their service. The Directive is implemented in the UK by the E-Commerce Regulations.

In 2008 the Criminal Justice and Immigration Act extended the offence of stirring up hatred on the grounds of religion to include the stirring up of hatred on the grounds of someone's sexuality. That Act amended 1986's Public Order Act.

The change to the Public Order Act required a new set of Regulations reflecting that change in the exemptions enjoyed by service providers. The Government's draft Electronic Commerce Directive (Hatred against Persons on Religious Grounds or the Grounds of Sexual Orientation) Regulations contain those changes and will replace 2007's The Electronic Commerce Directive (Racial and Religious Hatred Act 2006) Regulations.

"Articles 12 to 14 of the [E-Commerce] Directive require the UK to limit, in specified circumstances, the liability of intermediary service providers who carry out certain activities essential for the operation of the Internet, namely those who act as 'mere conduits' and those who 'cache' or 'host' information," said a Government explanatory note to the proposed Regulations.

"In the Government’s view there may be scope to argue over whether conduits, caches and hosts could ever have the necessary intent to stir up religious hatred or hatred on the grounds of sexual orientation and so Regulations 5 to 7 of these Regulations create specific exceptions from liability for the new offences for mere conduits, caches and hosts in the circumstances set out in the Directive and reflected in the E-Commerce Regulations," it said.

"In practice, intermediary service providers are very unlikely to be liable for the offences because of the requirement for intent. However, the 2007 Regulations clarified the position regarding the liability of conduits, caches and hosts in respect of the religious hatred offences. That aspect of those Regulations, which these Regulations revoke and replace, was considered by intermediary service providers to be of real significance," said that explanatory note.

Copyright © 2010, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Reducing security risks from open source software

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
Bring back error correction, say Danish 'net boffins
We don't need no steenkin' TCP/IP retransmission and the congestion it causes
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.