Policy & Regulation

Policy & Regulation / Most Viewed

What is ‘On-Tap’ at ICANN 38 - Brussels (There’s More to Belgium than Beer!)

As the shorter of the ICANN interregnums comes to a close and the ICANN faithful finalize their dinner reservation agendas for Brussels, it is time again for a preview of what will be 'on-tap' at next week's ICANN meeting. While, as always, there is a lot going on in ICANN Land, a scan of the blogosphere and ICANN list serves suggests that the four most discussed topics will be... more

M3AAWG and APWG Do the Best Survey Yet on WHOIS Redaction

M3AAWG, the Messaging, Malware, and Mobile, Anti-Abuse Working Group and APWG, the Anti-Phishing Working Group, surveyed their members about recent WHOIS changes. With over 300 results from security researchers, it's the broadest report yet on WHOIS use. The survey results confirm our concerns that WHOIS was a vital resource for security research, and its loss is a serious and ongoing problem. more

FCC Open Internet Rules

At the Mobile World Congress in Barcelona, Tom Wheele, the FCC Chairman, gave a range of spirited responses to a grilling from the Director of the GSMA, Anne Bouverot. She was following the line of the telcos and questioned if the FCC intervention would stifle growth and investments in the market; however she had problems reconciling her position with the fact that, despite these regulatory changes, the American industry was still prepared to invest a whopping $45 billion in new spectrum. more

Why US Broadband Service Continues to Stagnate - Some Simple Numbers to Drive the Point Home

I've been fascinated by the recent announcement that Australia is spending $31 billion USD to upgrade its broadband. With all the excitement and fuss over the broadband stimulus funding in the American Recovery and Reinvestment Act, it may seem strange to be claiming that the $7.2 billion is a pitifully small amount -- but let me bring this home for you... more

Is Internet Part of the Curriculum of Universities?

Recently I joined my son, who is in his final high school year, to visit the open day of the newly founded Leiden University College in The Hague. The school focuses on Liberal Arts & Science and offers a broad education on (international) politics, philosophy and economy. The idea is to prepare the next generation internationally oriented public servants and leaders of the future. Among others they have former Dutch Minister of Foreign affairs and Secretary General of NATO Jaap de Hoop Scheffer as a college professor. more

Email User Safety At Risk - MAAWG Consumer Survey 2010

The 2010 version of the now-annual Messaging Anti-abuse Working Group (MAAWG) 'Email Security Awareness and Usage Report' was released yesterday. While un-belied by the title, the vernacular name might get a bit more attention: "The MAAWG Consumer Email Survey". ... Consumers were surveyed in North America and across Europe with variety of questions from computer expertise and savvy, to their preferences of email. more

The Netizen’s Guide to Reboot the Root (Part I)

In the world of ICANN and Internet policy, complexity is manufactured to create an illusion that issues are impenetrably technical such that normal and everyday principles can't apply. This causes a pervasive and entrenched phenomenon of eyes that glaze over at the mere mention of the word "ICANN" -- including those of government regulators and other officials that might otherwise take more of an active interest. more

FCC Releases New U.S. Anti-Bot Code

The Online Trust Alliance (OTA) joined a unanimous vote at the Federal Communications Commission's (FCC) Communications Security, Reliability and Interoperability Council (CSRIC) meeting today, approving the voluntary U.S. Anti-Bot Code of Conduct for Internet Service Providers (ISPs), also known as the ABCs for ISPs. As a member of the CSRIC appointed by FCC Chairman Julius Genachowski, the OTA has been working with the FCC and leading ISPs to develop this voluntary Code. more

Comcast Given 30 Days to Disclose Network Management Practices, Says FCC Order

In follow up to August 1st ruling against Comcast, Federal Communications Commission (FCC) in a 67 page order released today has given Comcast 30 days "to disclose the details of their unreasonable network management practices, submit a compliance plan describing how it intends to stop these unreasonable management practices by the end of the year, and disclose to both the Commission and the public the details of the network management practices that it intends to deploy following termination of its current practices." more

Connectivity Policy and the Open Internet

The goal of public policy for connectivity should be to assure access to our common facilities as a public good by adopting sustainable business models that don't put owners and users at odds with each other. Such balances are typically difficult to achieve which is what makes connectivity so unusual - we can achieve both once we fund the facilities as a public good apart from the particular applications such as telephone calls and cable content. more

“Net Neutrality” Protects New Monopolies from Old

Over the next decade which companies do you think will be better able to exercise monopoly power? Amazon, T&T, Comcast, Facebook, Google, Regional phone companies, or Verizon? If you'd asked me this question in 2000, I would've picked AT&T, Comcast, Verizon, and regional phone companies. They are part of local duopolies for wired infrastructure. more

Time to Look Past ‘Net Neutrality’. Let’s Start a Fresh Post-Neutrality Debate…

Yesterday, as many of you heard, the European Parliament voted to reject the 'net neutrality' fundamentalist amendments to the already flawed proposals they had helped to create. That's the good news. The bad news is that the law that we now have is merely ludicrous, rather than insane. Furthermore, it doesn't properly protect end users, hold ISP feet to the service delivery fire, or truly encourage broadband ecosystem innovation. more

ICANN CSG and NCSG Make Progress at ICANN81

The Commercial Stakeholder Group and Non-Commercial Stakeholder Group (together, the Non-Contracted Party House, or NCPH) met for a daylong Day 0 session on 8 November 2024, immediately prior to the opening of the ICANN81 meeting in Istanbul. This meeting follows one of a similar nature conducted prior to ICANN78 in Hamburg, which was the first joint NCPH meeting following the pandemic. more

In Which We Consider the Meaning of ‘Authorized’: GIVAUDAN FRAGRANCES CORPORATION v. Krivda

What does authorized access mean? If an employee with authorized access to a computer system goes into that system, downloads company secrets, and hands that information over to the company's competitor, did that alleged misappropriation of company information constitute unauthorized access? This is no small question. If the access is unauthorized, the employee potentially violated the Computer Fraud and Abuse Act (CFAA) (the CFAA contains both criminal and civil causes of action). But courts get uncomfortable here. more

Computer Transactions, Not People, Are Driving the Need for All-Fibre Networks

Ever since we first became involved in developing policies and strategies for countries relating to what are now known as national broadband networks, we have argued that those taking part in the strategic decision-making processes of designing these networks should look, not at what broadband can do now, but at what high-speed broadband can do to assist countries to create the best opportunities for future developments. more