Policy & Regulation

Policy & Regulation / Recently Commented

CircleID’s Top 10 Posts for 2010

Looking back at 2010, here is the list of top ten most popular news, blogs, and industry news on CircleID in 2010 based on the overall readership of the posts (total views as of Jan 1, 2011). Congratulations to all the participants whose posts reached top readership and best wishes to the entire community for 2011. Happy New Year! more

Internet Governance: Leading by Example

On CircleID Jeremy Malcolm blogged in "Wikileaks and the Gaps in Internet Governance" that "For the Civil Society Internet Governance Caucus (IGC), this highlights the need for cross-border Internet governance issues to be made subject to a due process of law, informed by sound political frameworks, including those of human rights." A reaction, in which a network of the willing is suggested. more

Wikileaks and the Gaps in Internet Governance

The recent publication of leaked United States diplomatic cables by Wikileaks has produced an extremist reaction by some governments, provoking them and compliant large corporations to strike out at the organisation's Web site, its financial base, and the person of its founder, Julian Assange. For the Civil Society Internet Governance Caucus (IGC), this highlights the need for cross-border Internet governance issues to be made subject to a due process of law, informed by sound political frameworks, including those of human rights. more

Institutionalizing Consumer Trust and Public Interest at ICANN

For an organization where people argue for hours over arcane minutiae, it's remarkable that virtually everyone agrees that ICANN should serve the "global public interest" and build "consumer trust" in the Internet. Although it's only three pages long, ICANN's Affirmation of Commitments (AoC) cites "public interest" five times and "consumer trust" eight times. So at the ICANN meeting today in Cartagena, Colombia, a group of participants explored ways to "institutionalize" these concepts within the organization. more

Networks and States: The Global Politics of Internet Governance (Milton Mueller, NYU 12/14)

The Internet Society's NY Chapter (ISOC-NY) is delighted to present Milton Mueller's first full exposition of his new book Networks and States: The Global Politics of Internet Governance at NYU on Tuesday December 14 2010. Prof. Mueller is a co-founder of ICANN's NonCommercial User's Constituency and a renowned cyberlibertarian. more

Do-Not-Track: Still Not a Great Idea

Back in August, FTC chair Jon Leibowitz suggested an Internet do-not-track registry, analogous to the telephone do-not-call registry. At the time, I thought it wasn't a good idea for both technical and non-technical reasons. This week, the FTC published an online privacy report recommending the same thing, and Rep. Ed Markey promises to offer a bill next year to mandate do-not-track for children. With all this interest, might it be a good idea now? Maybe. more

FTC Proposes a Do-Not-Track List for the Web

The U.S. Federal Trade Commission (FTC) proposed on Wednesday a do-not-track list for the Web. "The proposal, which would allow consumers to opt out of having their online activities tracked, was included as part of the agency's preliminary report on consumer privacy," reports Gautham Nagesh in The Hill. "The report is intended as a framework for any potential privacy legislation from Congress but stops short of explicitly calling for a legislative solution." more

The Perfect, the Good, and the FCC

It has been a busy week in U.S. communications policy, with an FCC meeting adopting important spectrum policy reforms, an FCC complaint about Comcast's approval policies for cable modems, and a dispute between Comcast and Level 3 over fees for Internet backbone traffic. And late last night, it got even more interesting. more

Is It Time for Social Networks to Adopt Some Trademark Protection?

The headlines this week say that over 200 million domain names now exist on the internet. Pretty impressive... But consider the explosive growth of Social Networks. The top twenty social networks alone have over 2 billion user names. With User Names on social networks rapidly becoming the Internet's new brand identifiers, I wonder: is it time that we apply the same trademark rules we have for domain names to user names as well? more

The Threat from Within - US v. Fowler, SDFL 2010

The security vendor-phobe at the head of the conference bangs on the podium with his shoe declaring that "The greatest threat comes from within! (buy our product for your network's salvation)." Fear as a marketing strategy can never be underestimated. Particular when the fear is of the misunderstood. Media helps stoke the flames of fear-marketing with stories of fired or disgruntled IT staff who reportedly effectuate their revenge on former employers by bricking systems. more

ACMA: 30,000 PC’s Infected in Australia Per Day

Anti-spam and malware enforcement agency ACMA reports on this (shocking high?) figure. Keep this up and ca. 50% of the Australian population is infected within a year. I remember a presentation from Sweden only a few years ago, that there were only a little over a thousand infected pc's in Sweden. (Reactions were: that can't be correct. Too low) Do you know what the numbers are for your country and maybe more importantly what your government and/or Industry is/are doing about it? more

Comcast’s Demand for a Video Surcharge From Its Level 3 “Peer”

According to Level 3, a major long haul Internet Service Provider, Comcast has demanded a "recurring fee" when Level 3 hands off movie and other high capacity video traffic for delivery by Comcast to one of the cable company's subscribers. This demand warrants scrutiny, perhaps less in the context of Network Neutrality and more in terms of further diversification (unraveling) of the peering process. more

FISMA Standards Could Have a Major Impact on the Private Sector

The public is taking an increasing interest in ensuring that IT assets of federal agencies are protected from cybersecurity attacks. FISMA is addressing this concern, in part, by initiating a standard setting process for continuous monitoring. The actions taken by NIST for the federal sector could have a very significant impact on the private sector because pending legislation would provide the federal government with the authority to mandate cybesecurity measures on the private sector. more

Mandatory Provision of Abuse Contact Information in WHOIS

An industry professional at Abusix is the backbone behind a proposal to improve and create better mitigation of abuse across different global internet networks. Basically, this introduces a mandatory "abuse contact" field for objects in global Whois databases. This provides a more efficient way for abuse reports to reach the correct network contact. Personally - as a Postmaster for a leading, white-label ISP, I applaud this with great happiness for multiple reasons. I also feel people who handle abuse desks, anti-abuse roles, etc. should closely follow this. more

Trust Us

Here's the question: is it meaningful or important for a federal agency to have regulatory authority over high-speed Internet access connectivity? Right now, the FCC (which is supposed to oversee "communication over wire and radio") has no clear authority to make policy about high-speed Internet connectivity. (Transport is different than content - this post is not about applications or uses of this connectivity. Be careful when you talk about the Internet "ecosystem," because transport has been historically and remains different from everything else. I'm talking about the capacity to send packets from Point A to Point B, whether provided by wired or wireless providers.) more