Policy & Regulation

Policy & Regulation / Most Viewed

The U.S. House Judiciary Committee Is Investigating Google’s Plans to Implement DNS Over HTTPS

The U.S. House Judiciary Committee is investigating Google's plans to implement DNS over HTTPS (DoH) in Chrome according to a report by the Wall Street Journal over the weekend. more

Australia Launches Major Cybersecurity Revamp Following Recent Major Cyberattacks

Australia is set to enhance its cybersecurity framework in response to recent widespread cyberattacks. The government has released its 2023 -- 2030 Cyber Security Strategy, aiming to position Australia among the top cyber-secure nations by 2030. more

The Other Vote on November 4th

The vote that Federal Communications Commissioners are planning for November 4 is not as important as the voting we'll do on that day, but it does matter a lot to the future of the United States. Unless the forces opposed to progress manage to postpone FCC action (which they are trying very hard to do), the FCC could decide to set the stage for another generation of innovative products with which the US will strengthen its competitive position in global markets... more

Internet Vigilantism

Atrivo (aka Intercage), a Concord, California-based Internet hosting service, disappeared from the Internet for around two days recently. They didn't go bankrupt or suffer a physical catastrophe. Their providers simply shut them down by refusing their traffic. This might very well be the first time in history that the Internet community, a cooperative association of networks with no governing body, has collectively put someone out of business, if only briefly. more

Apple Setting Up First Data Center in China to Comply with Tougher Cybersecurity Laws

Apple today reported it is constructing its first data center in China, in partnership with a local internet services company, in order to comply with the tougher cybersecurity laws enacted last month. more

Making Sense of MIIT’s Category of Telecommunications Services

This morning I read a catchy titled article on CircleID "China Closing the Door to New Technologies". I was trying to make sense of what all the fuss is about... So I called up my friends in Ministry of Industry and Information (MIIT) for lunch to find out what's going. more

The Root of All Email

This week, the Internet Engineering Task Force (IETF) published a number of what they call "RFCs," which originally meant "Requests for Comment" - the standards documents which specify the technical underpinnings of the Internet. Two of these, numbered 5321> and 5322, replace earlier documents defining the very core of internet email. On the surface, each of these seem surprisingly simple... Yet without general industry-wide acceptance of (and compliance with) these standards, internet email simply would not exist. more

Defining Broadband

The FCC is seeking public comments to help create a better definition of "broadband". The effort is in relation to its development of a National Broadband Plan by February 2010 as part of the American Recovery and Reinvestment Act. Accurately noting that "broadband can be defined in myriad ways" and "tends to center on download and upload throughput," the FCC seeks a more robust definition. The definition will be part of the governance over those receiving funding for broadband development as part of the Recovery Act. This could get interesting. more

China Blocks WhatsApp, Says Messaging Service Should Stop Spread of “Illegal Information”

WhatsApp is now broadly disrupted in China including text messages which were going through despite China's censorship of the app beginning mid-July which only effected photographs and video chats. more

Officially Compromised Privacy

The essence of information privacy is control over disclosure. Whoever is responsible for the information is supposed to be able to decide who sees it. If a society values privacy, it needs to ensure that there are reasonable protections possible against disclosure to those not authorized by the information's owner. In the online world, an essential technical component for this assurance is encryption. If the encryption that is deployed permits disclosure to those who were not authorized by the information's owner, there should be serious concern about the degree of privacy that is meaningfully possible. more

The FCC Cyber Trust Label Gambit

Several weeks ago, the Federal Communications Commission (FCC) embarked on one of the most far-reaching regulatory gambits in its 90-year history. It is formally known as a Notice of Proposed Rulemaking in the matter of Cybersecurity Labeling for Internet of Things, Docket 23 -- 239. The FCC offers ICT product developers the use of its FCC trademarked cyber trust mark placed on their products in exchange for accepting open-ended Commission cybersecurity jurisdiction... more

To Tax or Not to Tax

Well it is not new that the US has always maintained that the Internet should be a tax free zone as per the US Congress's Tax Freedom Act 1998 which following expiry continued to be reauthorized and its most recent re-authorization (legal speak for extension) was in October 2007 where this has been extended till 2014. It is unclear whether there will be another extension post 2014. There is a moratorium on new taxes on e-commerce, and the taxing of internet access via the Tax Freedom Act. more

What’s the Right Definition of Upload Speed?

I read a blog on the WISPA website written by Mark Radabaugh that suggests that the best policy for broadband speeds would be met by asymmetrical architecture (meaning that upload speeds don't need to be as fast as download speeds). I can buy that argument to some extent because there is no doubt that most homes download far more data than we upload. But then the blog loses me when Mr. Radabaugh suggests that an adequate definition of speed might be 50/5 Mbps or 100/10 Mbps. more

Sophia Bekele: The AUCC Debate on Cybersecurity Needs to Involve All Stakeholders

The African Union's Convention on the Establishment of a Credible Legal Framework for Cyber Security in Africa (AUCC) has been the focus of debate recently.To shed light on online security issues in Africa, CIO East Africa sought the views of Ms Sophia Bekele, an internet security expert and international policy advisor over internet and ICT. more

EFOW Wants Total Protection for Geographical Indications Domains in .VIN, .WINE and All Other TLDs

This is a letter sent from the European Federation of Origin Wines (EFOW) to the courteous attention of Dr Steve Crocker, Chair of the ICANN Board , Mr Cherine Chalaby, Chair of the new gTLD Program Committee Board, Mr Fadi ChehadĂ©, CEO of ICANN and Mr Akram Atallah, COO of ICANN. This letter, sent by its President Riccardo Ricci Curbastro, was sent today to ICANN and is entitled "ICANN initiatives for the attribution of new generic top-level Internet domains -- PDO and PGI wines' concerns". more