British Law To Protect Online Users

The British Government's Online Safety Bill, announced in the recent Queen's Speech, comes with a promise of protecting debate. The aim is to keep children safe and it also aims to keep democratically important content preserved.  But some  campaign groups say the plans will lead to censorship, while others warn fines do not go far enough. 

The proposed legislation, previously known as the Online Harms Bill, has been two years in reparation.

The Bill, which is still in draft form is a milestone in the UK effort to make the internet a safer place for users. "Despite the fact that we are now using the Internet more than ever, over three quarters of UK adults are concerned about going online, and fewer parents feel the benefits outweigh the risks of their children being online, falling from 65 per cent in 2015 to 50 per cent in 2019”, says the Government statement .

It covers a huge range of content to which children might fall victim - including grooming, revenge porn, hate speech, images of child abuse and posts relating to suicide and eating disorders.But it goes much further, taking in terrorism, disinformation, racist abuse and pornography, too.Late additions to the bill include provisions to tackle online scams, such as romance fraud and fake investment opportunities. Significantly, It will not include fraud via advertising, emails or cloned websites.

One new section would make the UK one of the first nations in the west to require social networks to take active steps to moderate their impact on the democratic process. 

There are concerns that the requirement could lead to social networks refusing to take action against harmful content in case it is decreed to be democratically important. Digital Secretary Oliver Dowden said the "ground-breaking laws" would usher in "a new age of accountability for tech". 

Home Secretary Priti Patel added the scam provisions would help fight "ruthless criminals who defraud millions of people". Social media firms will have to remove harmful content quickly or potentially face multi-billion-pound fines under new UK legislation.

GovUK:       BBC:     Guardian:      Financial Times

You Might Also Read:

Investigating Fake News With Google, YouTube & Facebook:

 

 

« Responding To Ransomware Attacks
UPDATE: Ransom Attack On Irish Health Service Continues »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

iXsystems

iXsystems

iXsystems is a leader in Open-Source enterprise server and storage solutions including Backup & Recovery to protect critical data.

Centre for International Governance Innovation (CIGI)

Centre for International Governance Innovation (CIGI)

CIGI research areas include Conflict Management & Security which encompass cyber security and cyber warfare.

Cyberlytic

Cyberlytic

Cyberlytic applies artificial intelligence to combat the most sophisticated of web application threats, addressing the growing problem of high volumes of threat data.

AVR International

AVR International

AVR educate, advise, analyse and provide professional, technical consultancy and support to ensure your business is safe, compliant and protected.

BPC Banking Technologies

BPC Banking Technologies

BPC’s advanced fraud prevention solution helps card issuers and acquirers combat the growing threat by monitoring 100% of transactions, online, in real-time across all channels.

BMS Group

BMS Group

BMS is an independent, employee-owned specialist insurance broking group. Broking solutions include Cyber and Technology.

Netwrix

Netwrix

Detect security threats, prove compliance and increase IT team efficiency with IT audit software from Netwrix.

TÜV Informationstechnik (TÜViT)

TÜV Informationstechnik (TÜViT)

TÜViT is a leading service provider in the IT sector offering unbiased and independent tests and certifications of IT products, hardware, software, systems and processes.

Cyscale

Cyscale

Cyscale is a consultancy and development agency helping Enterprises adopt and migrate to the Cloud by providing an Automated Cloud Security Platform.

The Security Company (TSC)

The Security Company (TSC)

The Security Company is a leading provider of creative employee security awareness programmes.

Guidehouse

Guidehouse

Guidehouse is a leading global provider of consulting services to the public and commercial markets with broad capabilities in management, technology, and risk consulting.

Luxembourg House of Financial Technology (LHoFT)

Luxembourg House of Financial Technology (LHoFT)

Offering start-up incubation, co-working spaces including a soft-landing platform, the LHoFT connects and creates value for the entire Luxembourg FinTech ecosystem.

VectorRock

VectorRock

Save Your Business From Cyber Criminals. We specialize in uncovering cyber risks which threaten your organization and fixing them.

Cyber Tzar

Cyber Tzar

Cyber Tzar is a new approach at dealing with an old problem; assessing and managing risks to your IT estate.

SLVA Cybersecurity

SLVA Cybersecurity

SLVA Cybersecurity excel at delivering security-as-a-service, fit-for-purpose, within the constraints of realistic budgets and business expectations.

Inspectiv

Inspectiv

Inspectiv offers a turn-key solution to continuously identify security vulnerabilities and provide security assurance.