Policy & Regulation

Policy & Regulation / Most Viewed

Privacy Getting a Reboot

Anyone old enough to remember when cross-border data flows were limited to what could be put in a DHL box in New York and sent directly to Milan for the next day? Or when MIPS were so costly and centralized that batch processing was the norm? The world has changed, but the rules governing data protection and privacy haven't (much). Today technology allows and users demand that data flow without the drag of political boundaries or national borders, yet we still want assurances that our information will be protected and respected.  more

Is the Passion Over Net Neutrality Misguided? A New Paper Offers a Fresh Technical Approach

"Net neutrality" is implicitly framed as a debate over how to deliver an equitable ration of quality to each broadband user and application. This is the wrong debate to have, since it is both technically impossible and economically unfair. We should instead be discussing how to create a transparent market for quality that is both achievable and fair. In this paper I propose an alternative approach that (potentially) meets the needs of both consumer advocates and free market proponents. more

If Slate Comes in Standard Sizes, Why Not Broadband?

Last week I was at the National Slate Museum in Wales watching slate being split apart. On the wall were sample pieces of all the standard sizes. These have cute names like "princess". For each size, there were three standard qualities: the thinnest are the highest quality (at 5mm in thickness), and the thickest have the lowest quality (those of 13mm or more). Obviously, a lighter slate costs less to transport and lets you roof a wider span and with less supporting wood, hence is worth more. more

Use STIX to Block Robocalls

It is one of those oddities that occurs around Washington from time to time. During the same hour today, the Federal Communications Commission (FCC) was meeting at its downtown headquarters trying to stop robocalls, while a large gathering of government and industry cybersecurity experts were meeting a few miles away at Johns Hopkins Applied Physics Lab advancing the principal means for threat information sharing known as STIX. more

Policymakers to Discuss Data Privacy at Caribbean Internet Governance Forum

Data privacy will be among the items topping the agenda at an upcoming Caribbean Internet Governance Forum to be held by the Caribbean Telecommunications Union (CTU) in Suriname this month. The meeting is part of an effort by several Caribbean countries to establish and strengthen policies to ensure that Internet users' personal information is collected, shared and used in appropriate ways. more

The Web’s Benevolent Dictators

Jeffrey Rosen has a great article in the New York Times Magazine this weekend titled Google's Gatekeepers. In it he deals with the question of whether we are becoming too overly dependent on a few big web companies like Google – and whether it's wise over the long run for us to trust their team of (currently) very nice, well-meaning people who are trying hard to do the right thing when faced with government censorship demands and surveillance pressures. He writes... more

Demystifying Art. 28 NIS2

On December 14, 2022, the European Parliament adopted the Directive on measures for a high common level of cybersecurity across the Union (Directive (EU) 2022/2555) hereinafter referred to as "NIS2"), which was published in the official journal on December 27, 2022. Being a directive, NIS2 requires transposition into national law. According to Art. 41 of NIS2, the transposition into national law must take place by October 17, 2024 and the measures must be applied as of October 18, 2024. more

Why the Internet is Not Like a Railroad

When one person transmits the speech of another, we have had three legal models, which I would characterize as Magazine, Bookstore, and Railroad. The Magazine model makes the transmitting party a publisher who is entirely responsible for whatever the material says. The publisher selects and reviews all the material it published. If users contribute content such as letters to the editor, the publisher reviews them and decides which to publish. more

Transition of the Telecoms Industry Is Overdue

It is interesting to observe the changes in the telecommunications environment over the last few decades. Before videotex (the predecessor of the internet) arrived in the late 1970s early 1980s, 90% of telecommunications revolved around telephone calls. And at that time telephony was still a luxury for many, as making calls were expensive. I remember that in 1972 a telephone call between London and Amsterdam cost one pound per minute. Local telephone calls were timed... more

Don’t Make the Internet Safe for Monopolies

This week I'm going to Washington to argue against regulating Internet access as if it were phone service. Twenty years ago I was there for the same reason. My concern now as it was then is that such regulation will damage the economy and reduce opportunity by stifling innovation and protecting the current dominant players from the startups which would otherwise threaten them. more

Internet Society Activities at EuroDIG 2016: Trust, Collaborative Security, Zero Rating and More…

Over the next two days (9-10 June), the European Dialogue on Internet Governance (EuroDIG) takes place in Brussels, Belgium. With a theme of "Embracing the digital (r)evolution", EuroDIG has a full agenda and Internet Society staff will be participating in many aspects of the programme. For us, a primary focus will be at 11:30 CEST (UTC+2) on Thursday, June 9, when our President and CEO Kathy Brown opens the first Plenary with a keynote speech. more

Flipping the Kill Switch: Internet Restrictions Becoming the New Normal

The Internet was built on the promise that everyone, everywhere could create, share information and ideas without frontiers. Yet, Internet restrictions are increasing to the point they are becoming the norm. And it's happening fast. In its 2016 Freedom on the Net report, Freedom House revealed that Internet freedom declined for the 6th year in a row. The report notes that more governments have been blocking social media and communication apps than ever before. more

April 8 2014: A World Less Secure

Not long after the message that Microsoft will stop updating Windows XP from 8 April onwards, after extending it beyond the regular life cycle for over a year already, came the soothing message that malware will be monitored for another year. That may be good news to some, but the fact remains that this is not the same as patching. Remaining on XP leads to a vulnerable state of the desktop, lap top and any other machine running on XP; vulnerable to potential hacks, cyber crimes, becoming part of a botnet, etc. more

EFF Urges EURid to Refuse EU Commission’s “Misguided Advice” to Eliminate UK-Registered .EU Domains

In response to the European Commission surprise announcement last week that British domain owners may no longer be entitled to keep their ".eu" domain names, EFF is urging the registry for .eu (EURid) no to follow through. more

Broadband Demand-Side Management

Countries, cities and commercial organisations around the globe are facing problems associated with the rollout of fibre-to-the-home networks... We have been warning about these issues for well over a decade. The problem arises because the telecoms industry has been based on the principle 'build and they will come'. more