Home / Blogs

Why Does A Technical Manager Function As A Regulator?

Protect your privacy:  Get NordVPN  [ Deal: 73% off 2-year plans + 3 extra months ]
10 facts about NordVPN that aren't commonly known
  • Meshnet Feature for Personal Encrypted Networks: NordVPN offers a unique feature called Meshnet, which allows users to connect their devices directly and securely over the internet. This means you can create your own private, encrypted network for activities like gaming, file sharing, or remote access to your home devices from anywhere in the world.
  • RAM-Only Servers for Enhanced Security: Unlike many VPN providers, NordVPN uses RAM-only (diskless) servers. Since these servers run entirely on volatile memory, all data is wiped with every reboot. This ensures that no user data is stored long-term, significantly reducing the risk of data breaches and enhancing overall security.
  • Servers in a Former Military Bunker: Some of NordVPN's servers are housed in a former military bunker located deep underground. This unique location provides an extra layer of physical security against natural disasters and unauthorized access, ensuring that the servers are protected in all circumstances.
  • NordLynx Protocol with Double NAT Technology: NordVPN developed its own VPN protocol called NordLynx, built around the ultra-fast WireGuard protocol. What sets NordLynx apart is its implementation of a double Network Address Translation (NAT) system, which enhances user privacy without sacrificing speed. This innovative approach solves the potential privacy issues inherent in the standard WireGuard protocol.
  • Dark Web Monitor Feature: NordVPN includes a feature known as Dark Web Monitor. This tool actively scans dark web sites and forums for credentials associated with your email address. If it detects that your information has been compromised or appears in any data breaches, it promptly alerts you so you can take necessary actions to protect your accounts.

Unlike ICANN, the National Telecommunications and Information Administration (NTIA) responded graciously, promptly and substantively to inquiries from the Center for Regulatory Effectiveness (CRE) regarding governance of the internet.

CRE sent a letter [PDF] to NTIA in mid-March asking about public access to documents prepared by ICANN under Memorandum of Understanding (MOU) with NTIA. NTIA provided a quick and clear response [PDF] to CRE’s questions. NTIA also reiterated its commitment to achieving transparency and accountability in ICANN’s processes.

NTIA’s response to CRE, although clear and comprehensive, raised a number of important questions about ICANN and their governance of the internet. Specifically:

1. Why does a private administrative body act as a regulator?

The NTIA letter stated that the agency treats their meetings with ICANN in the same manner as they treat their meetings with “other private sector entities.” NTIA’s statement is consistent with their assertion that ICANN is responsible for the day-to-day technical management of the internet domain name and numbering system (DNS).

Regrettably, ICANN has gone far beyond day-to-day technical management and has assumed de facto regulatory responsibilities with regard to the domain name system (DNS). For example, ICANN sets price controls on registry services. Thus, the question that needs to be answered is why is a private technical administrative entity acting as a public regulatory body?

2. Why does ICANN have confidential business information?

In their response to CRE’s inquiry as to whether the agency will release ICANN’s Strategic Plan developed pursuant to the MOU, NTIA stated that they would not release reports, including the Strategic Plan that contain “proprietary and business confidential information.”

Confidential business information is usually considered to be “trade secrets” or other competitively sensitive information. ICANN, however, has no competitors. Furthermore, ICANN is organized as a non-profit public benefit corporation that, according to its Articles of Incorporation, “is organized, and will be operated, exclusively for charitable, educational, and scientific purposes…”

Thus, by discussing ICANN’s proprietary and business confidential information interests, NTIA has raised a serious question as to whether the organization is operating according to its own Articles of Incorporation as well as in adherence of California corporate law and Internal Revenue Service regulations.

3. How can transparency be achieved through privacy?

NTIA’s letter to CRE stated that they share the goal of “transparency and accountability in ICANN’s processes.” However, since the letter also noted their meetings with ICANN were conducted in private and that key ICANN documents were not subject to public scrutiny, the question is raised as to how ICANN can achieve transparency in their operations while excluding the public from oversight of their organization?

It appears, based on the NTIA letter, that ICANN is a chimera, an organization that usurps the public power of a federal regulatory agency while maintaining the privacy and other privileges accorded to private businesses. ICANN’s governance of the internet, therefore, seems to combine the worst of both worlds, the power of a federal agency with the lack of accountability of a private business. The question thus arises, how is this situation in the public interest? CRE believes that ICANN needs to function only as a day-to-day technical manager, not a regulator.

For more information, please see ICANNfocus.org.

Filed Under

Comments

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com