Policy & Regulation

Blogs

Broadband Labels are Here

On October 10, all ISPs in the United States were supposed to have implemented and posted broadband labels. The labels were required as part of the Infrastructure Investment and Jobs Act. Large ISPs had to post labels six months ago, and now the requirement is for all ISPs. I looked at the ISPs in a few counties I'm very familiar with, and I found a few ISPs in each county that have not posted labels that I can find on their website.

Decoding Internet Governance Stakeholders, Part 2: Private Sector

The "Decoding Internet Governance Stakeholders" series of articles invites the community to ponder what underlies the labels that define our interactions, roughly 20 years after the "Tunis Agenda for the Information Society" called for the "full involvement of governments, business entities, civil society and intergovernmental organizations", as well as to "make full use of the expertise of the academic, scientific and technical communities".

Supreme Court Delivers One-Two Punch to Agency Power

At the end of its 2024 term, the Supreme Court made two landmark rulings that limit federal agencies' regulatory powers. Loper Bright Enterprises v. Raimondo curtails their ability to create new regulations, while SEC v. Jarkesy reduces their capacity to enforce existing laws. These decisions significantly weaken agencies like the FCC in regulating sectors of the national economy, marking a substantial shift in administrative authority.

Book Review: Forks in the Digital Road - Key Decisions in the History of the Internet

At first glance, this book looks like another history of the Internet, but it is much, much more. The authors use their engineering and scholarly understanding of what constitutes Internet history to identify forks in the digital road and key past decisions that shaped the Internet's path. The first part of the book maps out the core technical and policy decisions that created the Internet.

Decoding Internet Governance Stakeholders, Part 1: Technical Community

The "Decoding Internet Governance Stakeholders" series of articles invites the community to ponder what underlies the labels that define our interactions, roughly 20 years after the "Tunis Agenda for the Information Society" called for the "full involvement of governments, business entities, civil society and intergovernmental organizations," as well as to "make full use of the expertise of the academic, scientific and technical communities."

Human Rights and Standards Development Organizations

Do human rights come into the picture when technology and policy work are involved? If so, where? This is a question that has come up multiple times during the last dozen years, and occasionally even before, in Internet Governance discussions. These discussions have included debates on whether human rights were specifically applicable to protocol design or to the organizations developing protocol standards.

The Role of Chronic Radio Interoperability Impediments in the Butler, PA Assassination Attempt

There are many inconvenient truths about radio spectrum sharing and transceiver interoperability that require full ventilation and resolution. Spectrum users want exclusive access and - news flash - they do not like to share! Campaign events, like the Trump Bulter, PA rally, require short notice, forced cooperation between and among federal, state, and local law enforcement officers, as well as a variety of other government agencies.

Phishers Exploit the Cybercrime Supply Chain Despite the Availability of Effective Countermeasures

Interisle Consulting Group today released its fourth annual Phishing Landscape report investigating where and how cybercriminals acquire naming and hosting resources for phishing. Our study shows that cybercriminals evolved their tactics for obtaining attack resources, including sharply increasing their exploitation of subdomain and gateway providers.

Rethinking Digital Sovereignty: The Pitfalls of an Infrastructured Approach

In an era where our lives are increasingly intertwined with digital technologies, a recent development in the realm of digital sovereignty has sparked a pressing concern for nations and individuals alike. The concept of digital self-determination, once hailed as a great equalizer, has become a battleground for power, privacy, and control, with governments and tech giants vying for dominance in the digital realm.

Net Neutrality: What Is Old Is New Again

On July 22, the FCC's open Internet order - which transforms Internet access service from a lightly regulated information service into a heavily regulated telecommunications service - will take effect. This article describes the policies and legal theories underlying the Order and the Order's effect on consumers of Internet services and providers of the service, including a number of entities that had previously escaped FCC regulation.

Will We Ever End Legacy Telephone Networks?

Anybody not involved in the telephone business will probably be surprised to find that the old TDM telephone networks are still very much alive and in place. The old technologies were supposed to be phased out and replaced by digital technologies. The FCC started talking about this before 2010. In 2013, Tom Wheeler, the FCC Chairman at the time, announced an effort to force the needed changes, which was dubbed the IP Transition.

Alternative Insights on Article 28 of the NIS2 Directive

On June 9 CircleID published an insightful article by Thomas Rickert entitled "Demystifying Art 28 NIS2." In that piece Thomas set forth two alternative interpretations of Article 28(6) of NIS2, and argued that TLD registries should not be required to maintain a separate database of the registrant data under NIS2. In my view, Thomas' approach is inconsistent with the remainder of Article 28, and would not achieve the goals of NIS2 to improve cybersecurity across the EU member states.

Demystifying Art. 28 NIS2

On December 14, 2022, the European Parliament adopted the Directive on measures for a high common level of cybersecurity across the Union (Directive (EU) 2022/2555) hereinafter referred to as "NIS2"), which was published in the official journal on December 27, 2022. Being a directive, NIS2 requires transposition into national law. According to Art. 41 of NIS2, the transposition into national law must take place by October 17, 2024 and the measures must be applied as of October 18, 2024.

The UN’s AI Leadership

In the same way monarchs are proclaimed - by powerful stakeholders attending a coronation and not objecting - the UN's International Telecommunication Union (ITU) took a mandate last week to coordinate AI Safety worldwide, with most industry leaders and relevant UN agencies were present when it did so.

NIS 2.0 and Its Impact on the Domain Name Ecosystem

I recently appeared on the 419 Consulting podcast to discuss the European Union's NIS 2.0 Directive and its impact on the domain name ecosystem. I encourage all TLD registries, domain name registration service providers, and DNS operators to listen to the recording of that session which Andrew Campling has made available.

News Briefs

NIS 2 Directive Set for Implementation with New Guidelines, But Concerns Remain

Malaysia Plans Internet “Kill Switch” to Curb Online Abuse

Senators Introduce COPIED Act to Combat AI-Driven Deepfakes

Canadian Bill S-210 Sparks Controversy Over Internet Regulations

UK First Country to Implement Cybersecurity Laws for Smart Devices, Including Banning Easily Guessable Default Passwords

Proposed Generative AI Disclosure Act Seeks Transparency and Fairness in AI Training Datasets

New FCC Rule Mandates Transparent Broadband Labels to Aid Consumer Choice

U.S. Congress Nears Breakthrough Agreement on National Online Data Protection Framework

FCC Updates Broadband Speed Standard, Aims for Nationwide High-Speed Internet Acces

CENTR Warns Against EU FiDA Proposal’s Impact on Consumer Access and Business Continuity

UN Treaty Threatens Cybersecurity, Warns Google

U.S. Implements New Visa Restrictions to Combat Commercial Spyware Abuse

NSA Admits Purchasing Americans’ Internet Browsing Data Without Warrants

Australia Launches Major Cybersecurity Revamp Following Recent Major Cyberattacks

CENTR Unveils Key Principles for Internet Policy Ahead of 2024 EU Elections

UK Online Safety Act Becomes Law Amid Controversy

Online Safety Bill: UK’s Digital Overhaul

Balancing Digital Integrity: CENTR Critiques EU’s Insolvency Proposal

SEC Now Giving Companies a 4-Day Deadline to Reveal Cyberattacks

FCC Chairwoman Wants Broadband Standard Boosted to 100Mbps Across the United States

Most Viewed

Most Commented

Industry Updates

Participants – Random Selection