Feeds

Europe bites Hungary over media and internet censorship

Content-bash provokes protests

High performance access to file storage

A rumble of protest is spreading across Europe in reaction to a new media censorship law in Hungary.

Yesterday, Europe’s Digital agenda commissioner Neelie Kroes told an Extraordinary meeting of the European Parliament's Civil Liberties, Justice and Home Affairs Committee that the EU had been in touch with the Hungarian government and had deep concerns about the nature of a new media law, which came into force on 1 January 2011.

The law made those responsible for material published in Hungary - both through traditional channels and online - subject to heavy fines and sanctions if their coverage is deemed to be "unbalanced or immoral".

Ms Kroes said that in addition to writing to the Hungarian authorities in December, raising specific concerns regarding their compliance with the EU Audiovisual and Media Services (AVMS) Directive, she has also visited Budapest to discuss the matter with the competent Minister.

She believes that the Media Law may risk jeopardising fundamental rights in a number of ways, including its requirement that all media - including online media such as forums and blogs - be registered, and by making the Media Authority subject to political control through the appointment process.

The Media Law "seems to raise a problem under the AVMS Directive because its provisions appear to apply also to media firms established in other Member States, which would be contrary to the "country of origin" principle," she said. The comments largely echoed a similar speech to MEPs she made to MEPs the previous week.

The Reg was first alerted to the issue by Liberal Democrat European justice and human rights spokeswoman and London MEP Baroness Ludford, who told us: “The EU cannot stand idly by while fundamental liberties are being undermined within its borders.”

Debates were organised by the Liberal group in the European Parliament (ALDE) earlier this month.

Martin Schulz, the leader of the European parliament's socialist group, has decried the media law as "not compatible with EU principles”.

The Greens want Hungary to be stripped of its right to hold the EU presidency for the next six months. The EU Commission President has raised the issue with Hungary’s Prime Minister Viktor Orban, and Luxembourg's Foreign Minister Jean Asselborn has warned that if Hungary does not change the law "it will be very difficult to talk to China or Iran about human rights".

Meanwhile, there were protests in Budapest at the weekend, as an estimated 10,000 Hungarians gathered in the square in front of Hungary's parliament building late on Friday.

Legal adviser to Hungary’s media council Gyorgy Ocsko insists this is not a return to the days of communist control. "This has nothing to do with the old style censorship that prevailed in the communist times. The legislator had one goal namely to make journalists respect human dignity. And this is our aim with the possible fining and possible sanctioning of, let's say, newspapers.”

Hungarian Prime Minister Vikto Orban also denies that the law violates EU Rules, and that he will only accept changes to the legislation if the European Commission can prove that the law is not in line with European standards.

"The text is very European. There is no special regulation, no special Hungarian legislation in this law. All paragraphs and elements of this [legislation] are imported from EU Countries. So I think it is a European regulation.”

While the new law may be bad news for free speech, there was better news this week for rapper Ice-T, whose songs Warning It's On [NSFW] had looked like being the law’s first victim, even though they were broadcast last September.

Following reports that an investigation would be launched into broadcasts put out by Tilos Rádió, which included the Ice-T tracks, the media council last week announced they wre dropping their investigation on the grounds that the radio station’s audience was mostly grown up. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Big Content goes after Kim Dotcom
Six studios sling sueballs at dead download destination
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
Jack the RIPA: Blighty cops ignore law, retain innocents' comms data
Prime minister: Nothing to see here, go about your business
Singapore decides 'three strikes' laws are too intrusive
When even a prurient island nation thinks an idea is dodgy it has problems
Banks slap Olympus with £160 MEEELLION lawsuit
Scandal hit camera maker just can't shake off its past
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.