Policy & Regulation

Policy & Regulation / Most Viewed

The End of Net Neutrality Regulation COULD Mean the End of Last-Mile Oligopolies

Landline networks like the old phone system and the new(er) cable systems do lend themselves to monopoly or at least duopoly outcomes. Building these networks is both very expensive and requires myriad government approvals. Once a system is in place, it is hard for anyone to raise the capital to duplicate it. Even a network of wireless towers is hard to compete with. more

Dear Industry Canada, Is Now a Good Time to Replace CIRA?

Today we have sent following to the Minister of Industry Canada, James Moore, as well as the Canadian Internet Registration Authority (CIRA) Board of Directors. This is in response to the revelation that CIRA is positioning to enter the managed DNS space. As we outline in the letter, we are fine with more competition (in fact Google just entered the domain and DNS space too... No, competition is a fact of life, what we want is more of it, not less. Here's what we wrote to The Honourable James Moore. more

Traceability

At a recent workshop on cybersecurity at Ditchley House sponsored by the Ditchley Foundation in the U.K., a primary topic of consideration was how to preserve the freedom and openness of the Internet while protecting against the harmful behaviors that have emerged in this global medium. That this is a significant challenge cannot be overstated... That these harmful behaviors can and do cross international boundaries only makes it more difficult to fashion effective responses. more

Wikileaks and the Gaps in Internet Governance

The recent publication of leaked United States diplomatic cables by Wikileaks has produced an extremist reaction by some governments, provoking them and compliant large corporations to strike out at the organisation's Web site, its financial base, and the person of its founder, Julian Assange. For the Civil Society Internet Governance Caucus (IGC), this highlights the need for cross-border Internet governance issues to be made subject to a due process of law, informed by sound political frameworks, including those of human rights. more

Bill C-27: Historic Canadian Anti-spam Legislation Battered, But Still Unbeaten

As readers of CircleID have seen, there has been a lot of activity (for example, Michael Geist's "Canadian Marketing Association Attacks Anti-Spam Bill"), as the final votes of C-27 grow nearer. The history towards getting a spam law passed in Canada has been a long one. For years, CAUCE encouraged legislators to undertake this important work... Fast forward a few years, and a few governments, and suddenly we have a law tabled in the House of Commons... more

ICANN and the Hyper-Aggressive Trademark Owners: The “Monster Test”

We read and hear a lot of complaints from trademark interests about allegedly rampant cybersquatting and other forms of trademark infringement, but it's rare to see a story about reverse domain name hijacking and other abuses committed by them. That's what made it so refreshing to see an article in the Saturday, April 4th Wall Street Journal titled "The Scariest Monster of All Sues for Trademark Infringement – Fancy Audio-Cable Outfit Defends Its Brands; A Mini Golf Course Fights Back". more

Why You Should Demand ‘Net Morality’ Instead of ‘Net Neutrality’

I have come to the conclusion that "net neutrality" is an ethical issue at heart, one about the appropriate constraint of unfair ISP power. Some people are (I pray unintentionally) on the wrong side of a now-clear moral divide. They are claiming to prevent harmful abuse of power, when in reality their actions create fresh harm. A central issue is one of technical competence to comment. If your beliefs are disconnected from how the world works, you cannot evaluate whether you are espousing something sensible or silly. more

Towards More Efficient Registry-Registrar Relations

On the morning of Wednesday 15th October, the The Domain Name Association (the DNA) held an important working group meeting during ICANN 51 Los Angeles. The topic was to discuss several operational issues between registries and registrars. The meeting's unofficial ongoing name is the Registry-Registrar Operations Working Group. The meeting was a continuation of an inaugural meeting that was held back in June of this year, and covered in a Industry Association: An Implementation Model circulated by the DNA from September 17, by Executive Director Kurt Pritz. more

The Role of Chronic Radio Interoperability Impediments in the Butler, PA Assassination Attempt

There are many inconvenient truths about radio spectrum sharing and transceiver interoperability that require full ventilation and resolution. Spectrum users want exclusive access and - news flash - they do not like to share! Campaign events, like the Trump Bulter, PA rally, require short notice, forced cooperation between and among federal, state, and local law enforcement officers, as well as a variety of other government agencies. more

AT Kearney Takes Side With Incumbent Telcos to Defend the Old World

In my job as part of a consultancy company, I know there are two types of reports our clients are interested in - those that are written for the customer to be used internally and those that are to be used externally. Quite often, instead of well thought out and researched pieces, these last-mentioned reports are created simply to underscore the opinion of the party paying for them. So when I received research by AT Kearney on A Viable Future Model for the Internet, I immediately checked who had paid for that report. more

Domain Pulse 2008: Day 2 Focuses on DNS Security

Day two of Domain Pulse 2008 last Friday (see review of day one) focused on online security issues giving the techies amongst us details of security issues, and the more policy-orientated amongst us something to chew on in a few other presentations. Kieren McCarthy, these days of ICANN, also gave some insights into the drawn out sex.com drama with more twists and turns than the average soap opera has in a year! And Randy Bush outlined the problems with IPv6. Among other presentations... more

What the ICANN Brussels Meeting Means for New gTLDs

ICANN's 38th get-together, in Brussels, may become known as the meeting where the dust finally began to settle. Long-standing issues were settled, compromises were reached, no-one complained too much about the latest version of the Applicant Guidebook, and the Board stood by its project plan dates, even scheduling a Board retreat to solve remaining issues. Finally, there were no surprise "gotcha!" delays that generic Top-Level Domain (gTLD) applicants have been used to seeing at ICANN meeting. With one possible exception... more

9 Thoughts on Stepping Up Spam and Malware Enforcement

In a tweet, EU commissioner for the Information Society Neelie Kroes congratulates OPTA on the spam fine for the golf ball printing company Backsound. Since 2004 the Dutch OPTA is the number one spam and malware fighter of the EU with a total of €1.9 million in fines. It made me ask two question to myself: How come that we seldom hear of other spam fines in the EU? And can the EU change this in any way? more

ICANN Opens GNSO Whois Study on Privacy/Proxy Abuse for Comment

ICANN has opened the Generic Names Supporting Organization (GNSO) Whois study on privacy/proxy abuse for public comment. Performed by the National Physical Laboratory (NPL), this study is one of many commissioned by the GNSO to examine the current, disparate, and often maligned registration directory service, and aims to measure the hypothesis that "a significant percentage of the domain names used to conduct illegal or harmful Internet activities are registered via privacy and proxy services to obscure the perpetrator's identity." more

League of Nations, United Nations, Next: United Cyber Nations

Though the "Techies" have been heavily involved in many initiatives like Internet Governance, Internationalized (Multi-lingual) Domain Names, Identity Management, Information Security, Access Rights Management etc., they still have to correctly apply the technologies at hand to be able to replicate many accepted norms that have matured in the physical world such as federated identities, non-repudiation, notarizing, witnessing, co-signing etc. more