Policy & Regulation

Policy & Regulation / Featured Blogs

Correcting Federal Databases: A Procedural Guide

Federal databases, such as those being compiled by the Consumer Financial Protection Bureau and the Federal Trade Commission, contain data about many people and businesses. Although some of this data may be protected personal information (PPI), there is also extensive information in federal databases that is publicly disseminated via the internet. If the information is wrong, it has the potential to be a vector of tortious mischief. more

Watch Live Oct 1 - Dyn’s Techtoberfest: Internet Trends, Security, Net Neutrality and More

On Thursday, Oct 1, 2015, from 9:30am-4:30pm US EDT (UTC-4), Dyn will be holding their "TechToberFest" event in Manchester, NH, and also streaming the video live for anyone interested. There are a great set of speakers and a solid agenda. As I wrote on the Internet Society blog, I'll be part of the security panel from 3-4pm US EDT... and we who are on the panel are excited to participate just for the conversation that we are going to have! It should be fun! more

Decoding the WSIS Message - ISOC Releases Matrix of Countries’ WSIS+10 Positions

Over the next few months, major discussions at the United Nations will shape the future of Internet governance. In order to prepare with our community for the ten-year Review of the World Summit on the Information Society (WSIS+10), in New York, USA, on 15 to 16 December 2015, we are publishing today a matrix of the countries' positions on WSIS+10. The matrix draws from their written contributions to the UN this summer, and is designed to help all stakeholders better understand the key issues at the the heart of the negotiations. more

Why We Need Gigabit Networks

There is currently a great deal of debate regarding the need for gigabit networks. There are still a lot of voices, often led by conservative political and media people, who argue that hardly anyone needs such networks. Unfortunately for them, however, their arguments are totally flawed. And who are they, anyway, to set the tone for such new infrastructure. Isn't necessity the mother of invention? more

NTIA Directs Smoke Signals Toward LA

On September 25th-26th the Cross Community Working Group developing enhanced accountability measures to accompany the IANA functions transition, and replace the "backstop" role played by the U.S., will meet in Los Angeles to review the 90 comments filed on their second draft Proposal and consider responsive modifications... As NTIA will be the primary evaluator of whether the transition & accountability package that is eventually forwarded by ICANN meets the criteria it set when it announced the transition in March 2014, CCWG participants in LA will be carefully reading the tea leaves of this latest NTIA statement. more

The ICANN Accountability End Game

It was predictable, and inevitable, I suppose, that the end game of a search for a more accountable ICANN would devolve to a lawyer's contest. When there is money on the table, and when global politics are invoked to one degree or another, it is the lawyers who are tasked to translate lofty goals into precise words on paper that will survive the inspection of judges and courts. And ambitious politicians as well. more

The Empire Strikes Back: ICANN Accountability at the Inflection Point

The members of the ICANN community engaged in the work of the Cross Community Working Group on Enhancing ICANN Accountability (CCWG-ACCT, or just plain "CCWG" for this article) has been engaged since late 2014 in designing an enhanced ICANN accountability plan to accompany the transition of oversight of the IANA root zone functions from the National Telecommunications and Information Administration (NTIA) to the global multistakeholder community. On August 3rd the CCWG released its 2nd Draft Report (Work Stream 1) for a public comment period that closed on September 12th. more

Whither Passwords

The primary means of authentication on the Internet is the password -- a half-century old, shared secret mechanism that is difficult to use (especially on mobile devices) and has acknowledged security flaws including attacks at scale. Even so, passwords remain the most prevalent form of authentication with efforts to enhance security typically relying on "bolt on" solutions that increase user friction. more

One Step Closer to an Accountable ICANN

We believe that certain updates in the latest draft that limit the scope of ICANN's Mission, as specified in paragraph 188, could explicitly prevent ICANN from actively enforcing its contracts with Registries and Registrars or use contracts as a tool to implement consensus policies in the future. We suggest in our comments that revised bylaw text be added explicitly stating that the enforcement and creation of ICANN's contracts with Registries and Registrars... more

Sept 8 Deadline for Comments on IANA Stewardship Transition - Have You Submitted Your Comments?

Have you submitted your comments on the IANA Stewardship Transition Proposal? Do you believe the proposal of the IANA Stewardship Transition Coordination Group (ICG) for how to transition the Internet Assigned Numbers Authority (IANA) functions away from the U.S. government to the global community to be a solid proposal? Do you have points in the proposal you would like to emphasize? Do you have concerns? more