Policy & Regulation

Policy & Regulation / Most Commented

Rethinking Europe’s Cloud Future: Balancing Regulation and Innovation

European efforts to build independent cloud infrastructure face challenges from regulatory overreach and dependence on U.S. cloud providers. Some say that a balanced approach focused on collaboration and flexible standards will be needed to strengthen data sovereignty and foster regional growth. Eighty percent of corporate executives in Germany say that Europe's future prosperity will depend on secure and independent digital infrastructure. more

Breaking Ground: Historic Launch of UN Global Mechanism for Cyberspace Governance

The international community has long struggled with the challenge of translating international law into actionable norms and practices in cyberspace. The conclusion of the United Nations Open-Ended Working Group (OEWG) on the security of and in the use of information and communications technologies 2021-2025 marks a vital milestone in that ongoing process.  more

Implications of Satellite Being Broadband

We've had a quiet policy change in the United States over the last year, where satellite broadband is starting to be considered broadband by the federal government. Any rural household that subscribes to and loves Starlink would wonder why this is news, but from a policy perspective, it is a big deal. I've been considering what this shift might mean in the future. The FCC decided that Starlink wasn't broadband when it rejected Starlink's long-form filing in August 2022, where Starlink wanted to claim the funding it had won in the RDOF reverse auction.  more

IS3C Report: Socio-Political and Technical Impacts of Post Quantum Cryptography Policies

At the 20th Internet Governance Forum in Lillestrøm, Norway, the UN Internet Governance Forum's dynamic coalition Internet Standards, Security and Safety (IS3C) released its new report on post-quantum policies. This report presents the findings of a collaborative study undertaken by IS3C and the French domain name registry Afnic and examines the critical need for Post-Quantum Cryptography (PQC) to achieve greater security in the ever-expanding global IoT landscape. more

America’s Broadband Blind Spot: Audit Reveals Millions More Offline Than FCC Reports

A new audit has sharply challenged the Federal Communications Commission's (FCC) broadband availability estimates, revealing that 26 million Americans lack access to fixed 100/20 Mbps internet, 6.4 million more than the FCC claims. more

i2Coalition Launches ‘DNS at Risk’ Report, Warns of Rising DNS Abuse and Censorship

The i2Coalition has unveiled a new report and website, DNS at Risk, spotlighting the growing misuse of Internet infrastructure by governments to control online content. Released on June 3rd, the initiative documents how states are increasingly deploying DNS resolvers and IP filtering—originally neutral systems—as tools of censorship and enforcement. more

A Targeted Blueprint for Tackling DNS Abuse

The NetBeacon Institute is pleased to publish its White Paper: Proposal for PDPs on DNS Abuse. We created this paper to support and advance ICANN Community discussions on potential policy development related to DNS Abuse. From our unique perspective, we believe there are a number of issues that are constrained enough to be a successful ICANN PDP and can make a meaningful difference in our collective work against DNS Abuse. more

What Can We Learn From 160 Years of Tech Diplomacy at ITU?

On 17 May 1865, 20 European states convened to establish the International Telecommunication Union (ITU) to streamline the clunky process of sending telegraph messages across borders. 160 years later, ITU's anniversary is more than a mere commemorative moment; it is a stark reminder that multilateral cooperation is beneficial and necessary in our increasingly interconnected world. more

When Space Becomes Infrastructure: Governance Challenges in Record-Breaking Week for Satellites

This past week offered a striking illustration of the pace and scale at which our shared orbital environment is evolving. In less than 24 hours, six rockets were launched from different parts of the globe, each contributing to the rapid expansion of low Earth orbit (LEO) infrastructure. China deployed a new set of Guowang satellites, while SpaceX launched two batches of Starlink satellites - one from Vandenberg in California and another from Cape Canaveral in Florida. United Launch Alliance (ULA) successfully placed Amazon's Kuiper satellites into orbit... more

Reviling Universal Service Subsidies and Then Showcasing the Results

Today, the Supreme Court will consider a challenge to the universal service subsidy program established soon after the introduction of telephone service by the AT&T Bell System and later officially adopted by the FCC as mandated by a 1996 law.1, 2 Universal service funding supports access to telephone and broadband service by subscribers in rural locales that commercial ventures will not serve absent a subsidy. more

Bad News From the 2025 Munich Security Conference: Cyberspace Gets Weaponized

There was one unpleasant message from the 2025 Munich Security Conference (MSC), which will have probably far reaching consequences for the governance of the digital space: Cyberspace will be governed by the rules of geo-political conflicts. And it is a battlefield in the 21st century wars. Both in the "Bayerischer Hof" and in the "IHK Munich", where the 11th edition of the Munich Cybersecurity Conference (MCSC) took place, controversial debates circled around the question of how civilian and military use of digital services will interplay in the years to come. more

Beyond WHOIS: CircleID and Edgemoor Research Institute Inaugural Event on Balancing Privacy and Legitimate Data Needs

The global debate over Internet privacy and security took center stage in a webinar hosted by CircleID in partnership with the Edgemoor Research Institute. The event marked the first in a series exploring the delicate balance between safeguarding personal data and ensuring legitimate access to domain name registration details. As governments, cybersecurity experts, law enforcement, and intellectual property holders grapple with the evolving regulatory landscape, Project Jake seeks to establish a framework that prioritizes policy clarity, efficiency, and adaptability. more

How Decades-Old Decisions Left U.S. Networks Vulnerable to Chinese Cyberintrusion

It seems like there is more disturbing news every day about Chinese infiltration of our telecommunications networks. A recent headline said that nine large ISPs have now been infiltrated. Tom Wheeler, a previous Chairman of the FCC, recently wrote an article for the Brookings Institute that speculates that the ability of the Chinese to infiltrate our networks stems back to decisions made decades ago that have never been updated for the modern world of sophisticated hacking. more

IGF 2024 in Riyadh: AI, WSIS+20 and the Global South

"Building our Multistakeholder Digital Future" was the theme of the 19th edition of the UN-based Internet Governance Forum (IGF). It attracted more than 11.000 participants (Offline and Online) from all over the world in Riyadh/Saudi Arabia, December 15-19, 2024. In the 307 plenaries, workshops, open fora, lightening talks and other conversations in the meeting rooms and the lobby halls of the King Abdulaziz International Conference Center (KAICC), nearly everything... more

ICANN CSG and NCSG Make Progress at ICANN81

The Commercial Stakeholder Group and Non-Commercial Stakeholder Group (together, the Non-Contracted Party House, or NCPH) met for a daylong Day 0 session on 8 November 2024, immediately prior to the opening of the ICANN81 meeting in Istanbul. This meeting follows one of a similar nature conducted prior to ICANN78 in Hamburg, which was the first joint NCPH meeting following the pandemic. more