Feeds

Users shut down Italian Wikipedia to protest Wiretapping Act

Wikimedia consigliere backs them up as mooks in Parliament debate law

SANS - Survey on application security programs

Italian Wikipedia has been hidden in protest at a new Act making its way through the Italian Parliament. The Wiretapping Act or "DDL intercettazioni" could make Wikipedia legally untenable in Italy if it passes into law.

Visitors to any page of the Italian Wikipedia site yesterday were redirected to a letter signed "from the users of Wikipedia" which outlines Wikipedia's objections to the proposed law and threatens the permanent deletion of Italian Wikipedia pages:

"Today, unfortunately, the very pillars on which Wikipedia has been built - neutrality, freedom, and verifiability of its contents - are likely to be heavily compromised by paragraph 29 of a law proposal, also known as "DDL intercettazioni" (Wiretapping Act)."

According to Wikipedia, the core problem with the new legislation is its requirement for websites to publish a correction of any content that an applicant deems to be detrimental to his/her image. The correction must be made within 48 hours of the complaint being received and requires no 3rd party to judge the validity of the request.

Wikipedia state that they have their own processes for achieving balance and accuracy:

During all these years, the users of Wikipedia (and we want, once more, to point out that Wikipedia does not have an editorial staff) have always been available to review – and modify, if needed – any content deemed to be detrimental to anyone, without harm to the Project's neutrality and independence. In the very rare instances it was not possible to reach a mutually satisfactory solution, the entire page has been removed.

They added that being required to write certain things as demanded by complainants was "an unacceptable restriction of the freedom and independence of Wikipedia". They argued that it would leave a neutered website which avoided covering controversial or troublesome people and topics.

The Wikimedia organisation has issued a statement in support of the Italian Wikipedia community.

Freedom of "communication" is guaranteed under Article 21 of Italy's constitution. ®

3 Big data security analytics techniques

More from The Register

next story
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
Reprieve for Weev: Court disowns AT&T hacker's conviction
Appeals court strikes down landmark sentence
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.