Policy & Regulation

Policy & Regulation / Most Viewed

A Bend in the River: ICANN Should Prepare for a 2 °C World

Toward the end of last week, the world waited with bated breath for the outcome of the 21st annual meeting of the Conference of the Parties (COP) of the UN Framework Convention on Climate Change (UNFCC). The meeting, commonly called COP 21, was held in Le Bourget, Paris, from November 30 to December 12; a bit too soon after the terrorists attacks on Paris earlier in November. COP 21 was important because COP 15 in Copenhagen (2009) failed to arrive at a global consensus... more

Could Cybersecurity Become a New Driver for Business Transformation?

My involvement in the ICT industry over the last 40 years has always been to look at the strategic advantages that new technologies have to offer. I entered the industry through a proto-internet development called videotext. I looked at this technology, at what organisations could do with it, and assisted, for example, in the 1980s when the Commonwealth Bank introduced the world's first national online banking service called Telebank. more

Scaremongering from Spy Agents

In an article for the Financial Times, Mr Hannigan -- the chief of the British spy agency GCHQ said: "I understand why they [US technology companies] have an uneasy relationship with governments. They aspire to be neutral conduits of data and to sit outside or above politics." "But increasingly their services not only host the material of violent extremism or child exploitation, but are the routes for the facilitation of crime and terrorism."... more

Reviling Universal Service Subsidies and Then Showcasing the Results

Today, the Supreme Court will consider a challenge to the universal service subsidy program established soon after the introduction of telephone service by the AT&T Bell System and later officially adopted by the FCC as mandated by a 1996 law.1, 2 Universal service funding supports access to telephone and broadband service by subscribers in rural locales that commercial ventures will not serve absent a subsidy. more

Google License to Operate in China Renewed

Google Inc. today announced via its official blog that the Chinese government has renewed its license and that it will continue to operate in China. Google further notes: "We currently automatically redirect everyone using Google.cn to Google.com.hk, our Hong Kong search engine. This redirect, which offers unfiltered search in simplified Chinese, has been working well for our users and for Google. However, it's clear from conversations we have had with Chinese government officials that they find the redirect unacceptable -- and that if we continue redirecting users our Internet Content Provider license will not be renewed (it's up for renewal on June 30). Without an ICP license, we can't operate a commercial website like Google.cn -- so Google would effectively go dark in China." more

Content - The Next Regulatory War Zone

At the 2014 TelSoc Charles Todd Oration the former Chair of the ACCC, Graeme Samuel, warned against the looming content monopoly... "There is a constant risk that the exclusive tie-up of rights to content for new and emerging markets will allow the right holders to shut out competition across a wide range of services delivered over new networks." He didn't think that the current telcos have the right expertise to enter the content market... more

How Effective Are Internet Blackouts? Insights from Uganda

On 18th February, 2016, Uganda Communications Commission, the Telco regulator, ordered all ISPs to sever access to Facebook, Twitter and WhatsApp. 11 million Internet users, including myself were forced to live through a four-day Internet blackout. With this unprecedented move, Uganda joined Syria, Russia, Egypt, Burundi and other regimes that have weaponized the Internet to curtail free speech and access to information. more

The Public Interest and the Root: Why the Next Round Demands a Public Law Approach to DNS Governance

As ICANN prepares to expand the domain name space, calls grow for a public-law framework to govern the DNS root, ensuring global equity, transparency, and accountability in managing the Internet's core infrastructure. more

Protests Erupt Over EU’s Anti-Counterfeiting Trade Agreement

In a blog post today, Michael Geist writes: "The reverberations from the SOPA fight continue to be felt in the U.S. and elsewhere (mounting Canadian concern that Bill C-11 could be amended to adopt SOPA-like rules), but it is the Anti-Counterfeiting Trade Agreement that has captured increasing attention this week. Several months after the majority of ACTA participants signed the agreement, most European Union countries formally signed the agreement yesterday (notable exclusions include Germany, the Netherlands, Estonia, Cyprus and Slovakia). This has generated a flurry of furious protest..." more

Trusted Notifier Arrangements Require Trust: Why Unpacking Misunderstandings Around Trusted Notifiers Is Important for Dealing With DNS-related Abuse

Domain Name System (DNS) Operators (Registries and Registrars) receive notices asking them to take action on a wide range of alleged technical and content-related abuses. However, there is a fundamental question of when it is appropriate to act at the DNS level and the evaluation of whether the alleged abuse meets a sufficient threshold for action at the DNS level. Additionally, given the volume of abuses occurring on the internet, existing resources, mechanisms, and protocols available in-house to Operators are in many cases insufficient to address abuses in a timely fashion. more

Is Defining Broadband by Speed a Good Policy?

I’ve lately been looking at broadband policies that have shaped broadband, and I don’t think there has been any more disastrous FCC policy than the one that defines broadband by speed. This one policy has led to a misallocation of funding and getting broadband to communities that need it. The FCC established the definition of broadband as 25/3 Mbps in 2015, and before then, the definition of broadband was 4/1 Mbps, set a decade earlier. The FCC defines broadband to meet a legal requirement established by Congress and codified in Section 706 of the FCC governing rules. more

Your App Is Increasingly Paranoid

In Canada at the moment a fight has been engaged between Bell Canada, a major carrier, and a recent decision of its regulator, the CRTC, concerning whether the CRTC (the Commission) made the correct decision when it said that the underlying transport system was "telecommunications", while the "app" that was carried was "broadcasting". The decision appealed from (the Klass decision) is important because it marks the first time the CRTC has made a decision on the idea that lies at the core of Internet thinking: that an application floats on top of transport layers. more

EFF Raises Concerns Over EU’s Proposed Cyber Resilience Act

The Electronic Frontier Foundation (EFF) has voiced concerns about the European Union's proposed Cyber Resilience Act (CRA), saying it could pose significant threats to open-source developers and cybersecurity. more

A Civil Society Perspective on NETmundial Final Outcome: A Remarkable Achievement Despite Losses

few 'big picture' thoughts on the Netmundial meeting in Brazil this week and its final outcome document, adopted by its high level committee. Overall, there are some truly amazing and forward-looking principles supported in the "Netmundial Multi-Stakeholder Statement" that we as civil society should be proud of, and especially our civil society representatives who worked tirelessly for this achievement. more

ICANN, NTIA, Verisign and ANA Weighing In on ‘Name Collisions’ and the Readiness of New gTLD Program

Gregory S. Shatan of Reed Smith writes: "Last week, ICANN (the organization that oversees the domain name system of the Internet) was busy with nothing less than the security and stability of the Internet. At ICANN's recent meeting in Durban, those of us attending heard a drumbeat of studies, presentations and concerns regarding "name collisions": the conflicts that will arise when new gTLDs go live and conflict with existing top-level extensions in private networks..." more