Feeds

UK.gov to warn tweeting twits, celebs 'n' pals on court case comments

OMG, you can't SAY that #contempt

The Essential Guide to IT Transformation

The UK's attorney general is going to publish social media guidance on Twitter and the government's website to stop tweeters, Facebookers and other social media types from committing contempt of court when talking about legal cases.

Dominic Grieve QC said that the guidance would help to ensure fair trials for people.

Anyone commenting publicly about an ongoing case or defendant in a way that could prejudice the outcome of a trial could be prosecuted for contempt and put in prison, but many folks on social media don't realise they're held to the same standard as traditional media outlets when talking about criminal cases.

The social media guidelines come after celebrity Peaches Geldof was recently forced to apologise for tweets relating to the case of Lostprophets singer Ian Watkins, where she named his two female co-defendants, the mothers whose babies had been abused.

Publishing details that can lead to the identification of sex offence victims is a criminal offence, as the A-G warned at the time.

"Blogs and social media sites like Twitter and Facebook mean that individuals can now reach thousands of people with a single tweet or post. This is an exciting prospect, but it can pose certain challenges to the criminal justice system," Grieve said today.

"In days gone by, it was only the mainstream media that had the opportunity to bring information relating to a court case to such a large group of people that it could put a court case at risk. That is no longer the case, and is why I have decided to publish the advisories that I have previously only issued to the media."

Grieve said it was not about telling people what they should be talking about, but just about stopping people from "inadvertently breaking the law" and making sure that people were tried on the evidence presented in court, not what could be read online.

Social media, particularly Twitter, has run afoul of a number of legal cases recently. Police are investigating Geldof's tweets over concerns that they identified people who should have been protected. The HM Courts and Tribunals Service mistakenly published their names online, which were then picked up and published on Twitter.

Last year, several people were fined for tweets that named a woman raped by footballer Ched Evans in a case that generated thousands of posts on Twitter. ®

Build a business case: developing custom apps

More from The Register

next story
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.