Feeds

Kent police bring obscenity charge over online chat

Court hearing next week

Designing a Defense for Mobile Applications

Kent Police have charged an individual with nine offences under the Obscene Publications Act 1959 (OPA) in a case that could potentially see online chat in the UK subjected to a much stricter regulation regime.

A Kent Police spokeswoman confirmed to The Register it had brought the charges against the individual, and that these charges relate to online chat.

The individual is also charged with two offences of making indecent images of children and four of possessing indecent images of children. They have been bailed pending their next court appearance at Dartford magistrates on 6 May.

The implications of this case, if it proceeds, could be legal dynamite. At present, under the Obscene Publications Act (pdf), a publication is obscene if its overall effect is to "tend to deprave and corrupt persons who are likely ... to read, see or hear" it. For the purposes of the law, publication appears to involve distribution, circulation, selling or giving an article to a third party.

The idea that a conversation – albeit one embodied in text chat – can be considered to be "published" would be fairly radical. The Kent case could ultimately be more significant than last year’s controversial prosecution in respect of Girls (Scream) Aloud.

It may be no coincidence that this case has surfaced in the Kent area.

During consultations on the extreme porn law (pdf), a number of police forces argued that the provisions proposed by government be made more strict. One police force in particular stood out, arguing that the new law should apply not simply to images, but to written material as well.

A Detective Sergeant wrote at the time (p.297): "There remains a legislative gap in terms of written fantasy material specifically about child rape and murder, which is now commonplace. The legislation should include the possession of written or printed material of this nature as it is equally as disturbing as the images and equally contributes to an offender’s motivation and fantasy behaviour."

The force in question was none other than Kent. ®

Bootnote

We have asked both Kent Police and the CPS for further comment on these charges, but they have declined to add anything to the above.

Application security programs and practises

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.