Policy & Regulation

Policy & Regulation / Most Viewed

CircleID’s Top 10 Posts for 2010

Looking back at 2010, here is the list of top ten most popular news, blogs, and industry news on CircleID in 2010 based on the overall readership of the posts (total views as of Jan 1, 2011). Congratulations to all the participants whose posts reached top readership and best wishes to the entire community for 2011. Happy New Year! more

Internet Will Split Into Chinese-Led and US-Led Versions Within the Next Decade, Says Eric Schmidt

Speaking at a private event hosted by Village Global VC, tech luminary and former Google CEO Eric Schmidt predicted that the internet will split into Chinese-led and US-led versions by 2028. more

China’s Pursuit of Public International Cybersecurity Law Leadership

There are relatively few venues today for the development of public international cybersecurity law among Nation States. One was the United Nations Group of Governmental Experts (UNGGE) at which the U.S. several months ago announced its de facto withdrawal with some concern expressed. A much older, well-established venue is newly assuming considerable significance - the Expert Group on the International Telecommunication Regulations (EG-ITRs). more

Plural TLDs: Let’s Stop Throwing Spanners in the Works!

I don't have strong religion on plural TLDs. For that matter, I don't have strong feelings for or against closed generics either, an other new gTLD issue that has recently been discussed even though it is not mentioned in the rules new gTLD applicants had to rely on. What I do care about is predictability of process. Yet, as Beijing showed, the ICANN community has an uncanny ability to throw last-minute wrenches at its own Great Matter, as Cardinal Wolsey called Henry VIII's plan to divorce Catherine of Aragon. more

Email and Social Media Accounts Under the Spotlight in UK’s Proposed New ‘Spy’ Plan

It would be reasonable to assume that your employer is archiving your email communications. But what about your personal emails, texts, phone calls and Facebook posts. Are these really private? Not for long, if the UK government has its way. It has been reported that its new anti-terror plan, if passed, would require Internet providers and phone companies to store all online communications by UK citizens for one year. more

Is There Such a Thing as Technical Internet Governance?

In ICANN's "President & CEO Goals for Fiscal Year 2021", Göran Marby went out to make a curious distinction in the document's second stated goal, according to which he intends to "Implement a common strategy for Internet governance (IG) and technical Internet governance (TIG)". Proceeding to state that "we will begin by identifying the most important issues we need to address, followed by an assessment of where and how we can intervene, the venues we should use, and the resources required to be effective". more

ICANN Takes First Step to Becoming a Global Content Regulator

There has been wide coverage of ICANN's decision this week to adopt a new process for creating new global Top Level Domains (gTLDs). Publishing a clear, transparent and objective process is thought likely to result in a considerable expansion of gTLDs -- although nobody really knows whether this means "quite a lot" or "many thousands"... Less attention has been given to one of the new tests ICANN will use when considering whether to approve a new gTLD, contained in GNSO's sixth recommendation... more

U.S. Department of Commerce Issues IoT Advancement Guidelines

The Department of Commerce issues a green paper outlining guiding principles and ways to support the advancement of the Internet of Things (IoT). more

Creating a National Cybersecurity Framework: Need For New Regulation?

The Congressional Research Service (CRS) recently released a major new study examining cybersecurity. The report, "Creating a National Framework for Cybersecurity: An Analysis of Issues and Options" discusses a variety of significant public and private cybersecurity concerns. The CRS analysis lists several broad options for addressing cybersecurity weaknesses ranging from adopting standards and certification to promulgating best practices and guidelines and use of audits among other measures. more

Of Canaries and Coal Mines: Verisign’s Proposal and Sudden Withdrawal of Domain Anti-Abuse Policy

Too many techies still don't understand the concept of due process, and opportunistic law enforcement agencies, who tend to view due process constraints as an inconvenience, are very happy to take advantage of that. That's the lesson to draw from Verisign's proposal and sudden withdrawal of a new "domain name anti-abuse policy" yesterday. The proposal, which seems to have been intended as a new service to registrars, would have allowed Verisign to perform malware scans on all .com, .net, and .name domain names quarterly when registrars agreed to let them do it. more

MIT 2010 Spam Conference Starts Tomorrow…

In January we presented the glorious history of the MIT spam conference, today we present the schedule for the first day. Opening session will be from this author, Garth Buren with a topic entitled The Internet Doomsday Book, with details be released the same day as the presentation. Followed by Dr. Robert Bruen with a review of activities since the last MIT spam conference... more

“Internet Drivers License” - A Short History Lesson

The press, the blogosphere, CircleID - everybody has been discussing Craig Mundie's comment on the need for an "Internet Driver's License". Most of the reaction has been from privacy advocates fearing that this is simply another way to kill anonymity on the Internet. Oh well... that's the usual set of reactions. Now... the fun part is, a driver's license also shows that you have the competence to drive... more

GAC, Inside Out: When GAC Members Abuse ICANN Procedures…

There is no doubt that the new gTLD program has been the most encouraging revolutionary program in the history of internet. As everybody expected, there have been lots of positive and negative insights about this program in recent years and during the process of development of the program, pushing ICANN to be very conservative in its program in order to satisfy all internet stakeholders. more

DotSpam? Certain New gTLDs Rapidly Outpacing Legacy TLDs in Terms of Abuse

Would you like to hear about how to treat your psoriasis? Where to get a cheap oil change? How to flatten your belly? Achieve a stronger sexual life? Cheap toner? Annuities? Herpes? Bed bugs? Free energy? Varicose-Veins? Herpes? Saggy skin? Arthritis? Overactive bladder? Drug addiction? Herpes? No? Well, that's too bad, because that you are going to hear about it whether you like it or not. Many of the messages about these and other subjects are being carried to you via new gTLDs. more

IoT Developments: NIST Issues Tech Guidance while NTIA Seeks Broad Input, Global Efforts Percolate

As the federal government grapples with Internet-connected devices and applications that make up the Internet of Things (IoT), the National Institute of Standards and Technology (NIST) is forging ahead to provide "technical leadership" for "the operation, trustworthiness, and lifecycle of IoT". Such efforts complement - and contrast - recent policy efforts at the National Telecommunications and Information Administration (NTIA) and elsewhere to promote IoT innovation while addressing security, privacy, and interoperability.  more