Policy & Regulation

Policy & Regulation / Recently Commented

Public Policy Questions for Internet

There is little doubt that the Internet has formed part of the impetus for a revolutionary change in the nature of the global communications industry. "Revolutionary" in the sense that the past decade has seen fundamental and highly disruptive changes in the nature of the underlying technologies used by the industry, changes in the composition, ownership and role of industry players, changes in the nature of services offered to the end consumer, changes in the associated financial models used by the industry, and changes in the regulatory environments in which this industry operates. Considering that this industry was, in the latter half of the twentieth century, one of the largest and most influential industry sectors on a global basis, these revolutionary changes will doubtless have consequences that will echo onward for some time yet. more

Open Ends: Civil Society and Internet Governance - Part III

This is the final part of a three-part series interview by Geert Lovink with Jeanette Hofmann, policy expert from Germany, where she talks about her experiences as a member of the ICANN's Nominating Committee and her current involvement as a civil society member of the German delegation for the World Summit of the Information Society (WSIS). "You have been visiting WSIS as a member of the German delegation. Could you share some of your personal impressions with us? Did you primarily look at WSIS as an ICT circus for governmental officials and development experts or was there something, no matter how futile, at stake there?..." more

A Closer Look at the Katie.com Domain Name Controversy

Every time an individual logs on to the Internet a pornographer is able to copy the stream of digital bits created by the computer user's Internet connection. The data bits are used to compile a database of information about Internet user buying habits and sexual tastes. These pornographers use the information secretly collected from logged in computers to alter the category or type of pornographic images uploaded onto various websites. Pornographers, for example, know that as a result the pornography in Cyberspace is of an extremely disturbing sort when compared to porn found in "real-space." Internet users are primarily known fans of sexual images of incest, bestiality, and torture. Cyber porn -- as it is often called -- is bigger, badder, and more extreme.  more

Survey of Global Internet Jurisdiction

The American Bar Association/International Chamber of Commerce (ABA/ICC) recently released a survey on global Internet jurisdiction. The survey, co-chaired by Professor Michael Geist, involved nearly 300 companies in 45 different countries. It found that U.S. companies were far more concerned and pessimistic about Internet jurisdiction risk than European and Asian companies. The study has also found that an "Internet jurisdiction risk toolkit" is emerging where companies target low risk jurisdictions and take steps to avoid doing business in perceived high risk jurisdictions. more

ALAC on WSIS Declaration of Principles and Plan of Actions

The At Large Advisory Committee (ALAC) has released this statement about the results of the World Summit on Information Society (WSIS). It is circulated for public comment, in view of subsequent statements to be released in the next months. At the World Summit on the Information Society held on December 10 to 12 in Geneva, the member states of the United Nations adopted the Declaration of Principles and the Plan of Action that include specific language on the issue of "Internet Governance". ICANN's At Large Advisory Committee welcomes the fact that these statements clearly recognize the role of civil society as a full participant in the international management of the Internet, and bring attention to the need for a deep involvement of individual users into its governance. more

Security and Fort N.O.C.‘s

In an article by MSNBC called "Fort N.O.C.'s" [Network Operating Center] Brock N. Meeks reports: "The unassuming building that houses the "A" root sits in a cluster of three others; the architecture looks as if it were lifted directly from a free clip art library. No signs or markers give a hint that the Internet's most precious computer is inside humming happily away in a hermetically sealed room. This building complex could be any of a 100,000 mini office parks littering middle class America." ...It is hardly the "most precious computer"!!!  more

Nations at WSIS Better Off with an ICANN-Like Structure

There is much talk currently about the WSIS meeting taking place in Geneva this week which means some needed attention is being paid to Internet governance. While some may view the term "Internet governance" as an oxymoron and my natural reaction is something along the lines of "I hope that they continue to view regulation as too complicated so that we Internet-folks can just keep doing what we are doing" I confess to knowing deep down that we would all be better off with a simple, effective policy framework than with the current anarchic state. more

Online Registries: The DNS and Beyond

As the world grows more connected and more complicated, we all need ways of defining, identifying and keeping track of things and cross-referencing them with their owners. The simplest way to do that is with registries -- everything from the Domesday Book, a medieval registry of land, property and people; to current-day auto registries on the one hand and the worldwide Domain Name System on the other...But now, companies and organizations have to keep track of ever more things and people, not just inside their walls but across extended organizational boundaries. Call this new wrinkle an "external registry". Finally, they may want to interact with things and people, rather than just look them up, via an "active registry".  more

Privacy and Trust Go Hand-In-Hand

A few days ago, Eric Goldman wrote an interesting thinkpiece in CircleID regarding users' feeling about privacy. He seems to conclude that the existent regulations and policies on the matter are unnecessary, since Privacy doesn't "really" matters to the consumer. Eric based his argumentation on a number of surveys, stating that, even when the user expresses concerns about their privacy, on line behavior shows a different reality. We don't want to discuss here the soundness of surveys as a reliable source of information, but the author could be assuming too much in his analysis. more

Rethinking Digital Sovereignty: The Pitfalls of an Infrastructured Approach

In an era where our lives are increasingly intertwined with digital technologies, a recent development in the realm of digital sovereignty has sparked a pressing concern for nations and individuals alike. The concept of digital self-determination, once hailed as a great equalizer, has become a battleground for power, privacy, and control, with governments and tech giants vying for dominance in the digital realm. more

Senators Introduce COPIED Act to Combat AI-Driven Deepfakes

In a bipartisan effort to address the growing threat of deepfakes, U.S. Senators Marsha Blackburn (R-Tenn.), Maria Cantwell (D-Wash.), and Martin Heinrich (D-N.M.) have introduced the Content Origin Protection and Integrity from Edited and Deepfaked Media Act (COPIED Act). more

Net Neutrality: What Is Old Is New Again

On July 22, the FCC's open Internet order - which transforms Internet access service from a lightly regulated information service into a heavily regulated telecommunications service - will take effect. This article describes the policies and legal theories underlying the Order and the Order's effect on consumers of Internet services and providers of the service, including a number of entities that had previously escaped FCC regulation. more

Canadian Bill S-210 Sparks Controversy Over Internet Regulations

A new bill in the Canadian Senate, Bill S-210, has ignited a heated debate over its potential impact on the Internet in Canada. The bill, which mandates strict age verification for online content, has raised significant concerns among privacy advocates, network operators, and digital rights groups. more

UK First Country to Implement Cybersecurity Laws for Smart Devices, Including Banning Easily Guessable Default Passwords

Today UK's new consumer protection laws against hacking and cyber-attacks officially take effect. This legislation, a global first, mandates that all internet-connected smart devices - from smartphones and game consoles to connected refrigerators - meet stringent security standards. more

New EU WHOIS Verification Recommendations Take Center Stage

The EU has once again turned its attention to domain name registration data (WHOIS) -- this time reinforcing requirements to collect, maintain, verify, and disclose WHOIS for IP enforcement purposes through its "Commission Recommendation" on measures to combat counterfeiting and enhance the enforcement of IP Rights. Published last month, this regulatory action demonstrates the EU's commitment to restore WHOIS despite... more