Policy & Regulation

Policy & Regulation / Recently Commented

China Calls on the United Nations to Impose an International Code of Conduct on the Internet

A Chinese official on Friday called on the United Nations to impose an international code of conduct on the Internet. "It is highly necessary and pressing for the international community to jointly bring about an international code of conduct on cyberspace at an early date," said Wang Qun.. more

Thoughts on the Open Internet - Part 6: Final Thoughts

Today we just don't have an "Open" Internet. The massive proliferation of network-based middleware has resulted in an internet that has few remaining open apertures. Most of the time the packet you send is not precisely the packet I receive, and all too often if you deviate from a very narrowly set of technical constraints within this packet, then the packet you send is the packet I will never receive. more

European Court Invalidates EU-US Data Pact

The personal data of Europeans held in the United States by Internet companies is not safe from US government snooping, the European court of justice ruled today, in a landmark verdict that hits Facebook, Google, Amazon and many others. more

.WINE New gTLD is Here, Thanks to Politicians

It is no news that the .WINE and .VIN new gTLDs are to be announced soon by Donuts and if the month of November is the very month everybody has been waiting for, at the beginning of the Sunrise Periods, many questions arise regarding the protection of wine geographical indications... There is a lot to say regarding the length of time it took to launch .wine and .vin new gTLDs and, most of all, how difficult it has been to protect its wine Geographical Indications (also called "wine GIs"). more

Correcting Federal Databases: A Procedural Guide

Federal databases, such as those being compiled by the Consumer Financial Protection Bureau and the Federal Trade Commission, contain data about many people and businesses. Although some of this data may be protected personal information (PPI), there is also extensive information in federal databases that is publicly disseminated via the internet. If the information is wrong, it has the potential to be a vector of tortious mischief. more

Watch Live Oct 1 - Dyn’s Techtoberfest: Internet Trends, Security, Net Neutrality and More

On Thursday, Oct 1, 2015, from 9:30am-4:30pm US EDT (UTC-4), Dyn will be holding their "TechToberFest" event in Manchester, NH, and also streaming the video live for anyone interested. There are a great set of speakers and a solid agenda. As I wrote on the Internet Society blog, I'll be part of the security panel from 3-4pm US EDT... and we who are on the panel are excited to participate just for the conversation that we are going to have! It should be fun! more

Decoding the WSIS Message - ISOC Releases Matrix of Countries’ WSIS+10 Positions

Over the next few months, major discussions at the United Nations will shape the future of Internet governance. In order to prepare with our community for the ten-year Review of the World Summit on the Information Society (WSIS+10), in New York, USA, on 15 to 16 December 2015, we are publishing today a matrix of the countries' positions on WSIS+10. The matrix draws from their written contributions to the UN this summer, and is designed to help all stakeholders better understand the key issues at the the heart of the negotiations. more

Why We Need Gigabit Networks

There is currently a great deal of debate regarding the need for gigabit networks. There are still a lot of voices, often led by conservative political and media people, who argue that hardly anyone needs such networks. Unfortunately for them, however, their arguments are totally flawed. And who are they, anyway, to set the tone for such new infrastructure. Isn't necessity the mother of invention? more

NTIA Directs Smoke Signals Toward LA

On September 25th-26th the Cross Community Working Group developing enhanced accountability measures to accompany the IANA functions transition, and replace the "backstop" role played by the U.S., will meet in Los Angeles to review the 90 comments filed on their second draft Proposal and consider responsive modifications... As NTIA will be the primary evaluator of whether the transition & accountability package that is eventually forwarded by ICANN meets the criteria it set when it announced the transition in March 2014, CCWG participants in LA will be carefully reading the tea leaves of this latest NTIA statement. more

Global Re-Distribution of IPv4 Addresses Requires Greater Trading Transparency and Security

He warns millions of IPv4 numbers are impacted by inaccurate records, and as a consequence, ARIN’s registry cannot, in many cases, be relied upon as the definitive single source for establishing the rightful holders of IPv4 address space. more

The ICANN Accountability End Game

It was predictable, and inevitable, I suppose, that the end game of a search for a more accountable ICANN would devolve to a lawyer's contest. When there is money on the table, and when global politics are invoked to one degree or another, it is the lawyers who are tasked to translate lofty goals into precise words on paper that will survive the inspection of judges and courts. And ambitious politicians as well. more

Xi Insists on China’s Right to Regulate Its Own Internet

Chinese President, Xi Jinping, in response to concerns about China's new Internet regulations and restrictions, says "rule of law also applies to the Internet, with the need to safeguard a country's sovereignty, security and development interests as relevant as in the real world." more

U.S. and China Negotiating Cyeberwarfare Control Deal

United States and China are in negotiation to establish a cyberattack agreement, according to reports. If successful, it "could become the first arms control accord for cyberspace, embracing a commitment by each country that it will not be the first to use cyberweapons to cripple the other's critical infrastructure during peacetime," reports David Sanger in the New York Times. more

Whither Passwords

The primary means of authentication on the Internet is the password -- a half-century old, shared secret mechanism that is difficult to use (especially on mobile devices) and has acknowledged security flaws including attacks at scale. Even so, passwords remain the most prevalent form of authentication with efforts to enhance security typically relying on "bolt on" solutions that increase user friction. more

One Step Closer to an Accountable ICANN

We believe that certain updates in the latest draft that limit the scope of ICANN's Mission, as specified in paragraph 188, could explicitly prevent ICANN from actively enforcing its contracts with Registries and Registrars or use contracts as a tool to implement consensus policies in the future. We suggest in our comments that revised bylaw text be added explicitly stating that the enforcement and creation of ICANN's contracts with Registries and Registrars... more