Internet Services Providers’ Association, “ISPA Code of Practice,” http://www.ispa.org.uk/about_us/page_16.html, accessed March 30, 2009.
The Internet Watch Foundation (IWF) website is located at http://www.iwf.org.uk/.
IWF, “IWF Facilitation of the Blocking Initiative,” http://www.iwf.org.uk/public/page.148.htm, accessed March 30, 2009.
Chris Williams, “Home Office Backs Down on Net Censorship Laws,” Register, October 16, 2009, http://www.theregister.co.uk/2009/10/16/home_office_iwf_legislation/.
Sean O’Neill, “Government Ban on Internet Firms That Do Not Block Child Sex Sites,” Times, March 10, 2010, http://technology.timesonline.co.uk/tol/news/tech_and_web/the_web/article7055882.ece; Office of Government UNITED KINGDOM FREEDOM HOUSE Freedom on the Net The IWF’s blocking and removal actions are not transparent, the blocking criteria lack clarity, and the internal appeals process is inadequate. There is no judicial or governmental oversight. The organization has issued several controversial blocking decisions in recent times. In December 2008, the IWF blocked a Wikipedia page devoted to a album by the rock band Scorpions due to an image of a nude young girl on its cover, leaving many British users temporarily unable to edit any Wikipedia content.15 The IWF subsequently revoked its decision after protests from the Wikimedia Foundation.16 In January 2009, the IWF blocked access to controversial images in the Internet Archive’s Wayback Machine, but technical faults in ISPs’ implementation of the decision resulted in inability of some users to access any of the 85 billion pages stored, including archives of the British Broadcasting Corporation (BBC) and Parliament.The Terrorism Act of 2006 allows for the takedown of terrorist material hosted in the United Kingdom.18 ISPs reportedly take down material voluntarily when contacted by the authorities, though there are no statistics available on the practice.Users in the United Kingdom continue to enjoy wide access to free or low-cost blogging services, allowing them to express their views on the internet. Users and nongovernmental organizations also employ various forms of online communication to organize political activities, protests, and campaigns. Civil society organizations maintain a significant presence online and have used internet platforms to promote various causes. In a notable case in 2010, bloggers used Twitter to defeat a court’s “super-injunction” forbidding the Guardian newspaper from publishing an article on the company Trafigura’s dumping of toxic waste in Ivory Coast.20 The injunction was broad enough to apply even to parliamentary debates. Bloggers also played a key role in reviewing evidence in the libel case brought against author Simon Singh by the British Chiropractic Association.Commerce, “Procurement Policy Note—Blocking Access to Web Pages Depicting Child Sexual Abuse,” March 5, 2010, http://www.ogc.gov.uk/documents/PPN_05_10_Blocking_illegal_sites.pdf.
“Wikipedia Child Image Censored,” British Broadcasting Corporation (BBC), December 8, 2008, http://news.bbc.co.uk/2/hi/uk_news/7770456.stm; Antony Savvas, “Wikipedia Founder Considers Action Against IWF over Scorpions Image Ban,” ComputerWeekly.com, December 9, 2008, http://www.computerweekly.com/Articles/2008/12/09/233807/Wikipedia-founder-considers-action-against-IWF-overScorpions-image.htm.
Steven Musil, “Internet Watchdog U-Turns on Wikipedia Ban,” ZDNet UK, December 10, 2008, http://www.zdnet.co.uk/news/networking/2008/12/10/internet-watchdog-u-turns-on-wikipedia-ban-39574751/.
Terrorism Act 2006 (c. 11), §3, available at Office of Public Sector Information, http://www.opsi.gov.uk/acts/acts2006/ukpga_20060011_en_1.
Chris Williams, “Terrorism Chiefs Don’t Know What They’ve Censored Online,” Register, November 12, 2009, http://www.theregister.co.uk/2009/11/12/west_terror/.
Steve Bell, “Trafigura Drops Bid to Gag Guardian over MP’s Question,” Guardian, October 13, 2003, http://www.guardian.co.uk/world/cartoon/2009/oct/14/trafigura-gag-steve-bell-cartoon.
Robert Dougans and David Allen Green, “Virtual Veracity,” The Lawyer, July 5, 2010, http://www.thelawyer.com/virtualveracity/1004911.article.
UNITED KINGDOM FREEDOM HOUSE Freedom on the Net VIOLATIONS OF USER RIGHTS The United Kingdom has no written constitution or comprehensive bill of rights. The European Convention on Human Rights is incorporated into UK law through the Human Rights Act of 1998, and British courts have increasingly recognized freedom of expression and other human rights.
The Digital Economy Act was adopted in April 2010,22 during the final parliamentary “wash-up” session—featuring limited debate—prior to Parliament’s dissolution for national elections. The law gives the government the power to impose rules requiring ISPs to take “technical measures” against users who are reported (but not proven in a court or independent hearing) to be infringing copyright. The technical measures can include limiting their access speed, blocking their access to sites, and suspending their internet service altogether. ISPs will be required to track users accused of infringements, and copyright holders can apply for a court order to obtain the identification of users. Web sites that are found to have or likely to have “substantial” violations of copyright can be blocked by a court order. Ofcom has already begun developing the regulations for the law, initially only to apply to the larger ISPs.23 There is significant concern that this will also have the effect of limiting public access though libraries, pubs, hotels, and other locations. The ISPs British Telecom and TalkTalk have begun a legal challenge of the law.The threat of libel suits has a significant chilling effect on both content producers and ISPs. English libel law is expansive in its restrictions on allegedly libelous material, and places a heavy financial and evidentiary burden on defendants.25 The United Kingdom has implemented the EU 2002 E-Commerce Directive, which states that hosts can be held liable if they are found to have had knowledge of illicit material, including defamatory content, but failed to remove it.26 This often results in hosting companies quickly taking down material when asked, with little inquiry as to the legality of the demand. There is also concern over “libel tourism,” a practice in which overseas litigants with little or no The Digital Economy Act 2010 (c. 24), available at Office of Public Sector Information, http://www.opsi.gov.uk/acts/acts2010/ukpga_20100024_en_1.
Ofcom, “Online Infringement of Copyright and the Digital Economy Act 2010,” May 28, 2010, http://stakeholders.ofcom.org.uk/consultations/copyright-infringement/.
“ISPs Take Digital Economy Act to the Courts,” Out-Law.com, July 8, 2010, http://www.outlaw.com/default.aspxpage=11211.
Section 1, Defamation Act 1996; see Jo Glanville and Jonathan Heawood, eds., Free Speech Is Not for Sale: The Impact of English Libel Law on Freedom of Expression (London: Index on Censorship/English PEN, 2009), http://libelreform.org/our-report#.
Electronic Commerce (EC Directive) Regulations 2002 (SI 2002/2013). See Metropolitan International Schools Ltd v. (1) Designtechnica Corporation (2) Google UK Ltd & (3) Google Inc  EWHC 1765 (QB) (search engine not liable for excerpts); Bunt v. Tilly  EWHC 407 (QB) (ISP not liable if just provides connection); Twentieth Century Fox Film Corporation v. Newzbin  EWHC 608 (Ch) (company that provides indexing of copyrighted files liable); Kaschke v. Gray & Anor  EWHC (QB) (host that moderates user comments liable). See also Electronic Commerce Directive (Hatred against Persons on Religious Grounds or the Grounds of Sexual Orientation) Regulations.
UNITED KINGDOM FREEDOM HOUSE Freedom on the Net connection to the country exploit the ubiquity of online content to invoke plaintiff-friendly English libel laws against their critics.In the past year there has been considerable debate over the scope of the libel laws, and the current government, like its predecessor, has promised to review and amend them to better protect freedom of expression. A bill introduced in the House of Lords by Lord Lester specifically includes greater protections for ISPs to limit their liability for usergenerated content.28 The government has committed to introduce its own reform bill in 2011.
In an effort to combat terrorism, the government has taken measures against users who post or download information perceived as a security treat. For example, two students, one of whom was taking a course on the subject, were detained in 2008 under the Terrorism Act of 2000 for downloading material deemed to be terrorist in nature. In another case, a man was convicted in 2010 under the Communications Act of 2003 for using the Twitter microblogging service to express dismay at the closing of the local airport and writing that he would blow up the airport if it did not reopen within a week, which an airport manager—reading the message several days later—considered to be a threat.London’s Metropolitan Police Service has begun asking cybercafe owners to voluntarily monitor their users’ activities as part of the antiterrorism effort, and to put up posters warning patrons not to access “inappropriate or offensive content.” Laws such as the Obscene Publications Act and the Protection of Children Act (extended in 2009) restrict possession or access to sexually oriented materials. In 2009, a man was prosecuted under the Obscene Publications Act for writing and posting online a violent sex fantasy involving the pop band Girls Aloud; the case, which ended in acquittal, had been prompted by an IWF complaint to the police.30 Kent police in April 2010 initiated the first prosecution of a person under the law for an online chat-room conversation. The outcome of the case is expected to set an important precedent on application of the obscenity law to internet communications.There is continued concern about surveillance, as authorities have increasingly used or misused the powers granted under the Regulation of Investigatory Powers Act (RIPA).The law covers the interception of communications; the acquisition of communications data, “Writ Large,” Economist, January 8, 2009, http://www.economist.com/world/international/displaystory.cfmstory_id=12903058.
Defamation Bill 2010, available at Index on Censorship, http://www.indexoncensorship.org/wpcontent/uploads/2010/05/draft-bill-lester-libel.pdf.
David Allen Green, “Paul Chambers: A Disgraceful and Illiberal Judgment,” Jack of Kent, May 11, 2010, http://jackofkent.blogspot.com/2010/05/paul-chambers-disgraceful-and-illiberal.html.
“Man Cleared over Girls Aloud Blog,” BBC, June 29, 2009, http://news.bbc.co.uk/2/hi/uk_news/england/tyne/8124059.stm.
Jane Fae Ozimek, “Mucky Private Chat Could Be Illegal Soon,” Register, May 18, 2010, http://www.theregister.co.uk/2010/05/18/text_law_extension/.
See generally the Explanatory Notes to Regulation of Investigatory Powers Act at http://www.opsi.gov.uk/acts/acts2000/en/ukpgaen_20000023_en_1, accessed January 2009.
UNITED KINGDOM FREEDOM HOUSE Freedom on the Net including billing data; intrusive surveillance, such as on residential premises or in private vehicles; covert surveillance in the course of specific operations; the use of covert human intelligence sources like agents, informants, and undercover officers; and access to encrypted data. It requires that communications providers maintain interception capabilities, including systems to record internet traffic on a large scale.
RIPA allows national government agencies and nearly 500 local bodies to access communication records for a variety of reasons, from national security to tax collection.
Orders for interception and access to the content of communications require approval from the home secretary or another secretary of state. In 2009, there were 525,130 requests for communications data from telephone companies (including mobile-phone service providers) and ISPs.33 In the past few years, there have been numerous cases in which RIPA powers have been used to investigate minor violations, such as sending children to school in the wrong school district or illegal trash dumping.34 The law has also been used against journalists to obtain their phone records and identify their sources. This has prompted orders to scale back its use.In 2009, regulations to implement the EU Data Retention Directive were adopted.Under the directive, providers must retain communications data on all users for 12 months, including mobile-phone location and e-mail logs. ISPs also continue to “voluntarily” store web-access logs. Government agencies access this information through the procedures in RIPA. The Interception Modernisation Programme (IMP), a proposal to expand surveillance through deep packet inspection (DPI) and create a 2 billion pound (US$3.2 billion) central database of all communications, was hotly debated in 2009 but failed to move forward as a bill under the old government.37 The new coalition government promised to limit the scale of surveillance conducted in the country. However, it quietly announced in late 2010 its intent to preserve the ability of various law enforcement agencies to “obtain communication data and to intercept communication within the appropriate legal framework.”There has been significant public discussion surrounding the secret use of DPI by ISPs including British Telecom and Virgin in cooperation with the advertising company Phorm. Sir Paul Kennedy, “Report of the Interception of Communications Commissioner for 2009,” July 27, 2010, http://www.official-documents.gov.uk/document/hc1011/hc03/0341/0341.pdf, accessed February 15, 2011.
Steve Doughty, “Councils Deploy Snooping Powers 200 Times a Week,” Daily Mail, November 12, 2009, http://www.dailymail.co.uk/news/article-1227102/Councils-deploy-snooping-powers-200-times-week.html.
Ian Grant, “UK Tightens Ripa Surveillance Rules,” ComputerWeekly.com, November 4, 2009, http://www.computerweekly.com/Articles/2009/11/04/238423/UK-tightens-Ripa-surveillance-rules.htm.
The Data Retention (EC Directive) Regulations 2009 (SI 2009 No. 859), April 2, 2009.