Feeds

US looking at censoring Internet cable access

FCC produces working paper

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

The spectre of US Internet cable access regulation and censorship looms. The Federal Communications Commission has produced a working paper "Internet over cable: defining the future in terms of the past" by staffer Barbara Esbin that notes that the FCC does not regulate Internet access through cable television, Internet telephony or video conferencing. Basic telecommunication services are heavily regulated whereas cable services providing Internet access escape the FCC regulation of tariffs,interconnection and unbundling requirements. The problem for the FCC is that the new and emerging technologies do not fit neatly into the FTC regulatory structure. No longer are services such as telephony and cable technologically distinct. "This renders application of existing regulatory categories difficult, if not impossible, for many forms of Internet-enabled communications," the report says. "In the future, it will become increasingly difficult to maintain that particular facilities and services are cable' as opposed to telecommunications'. " The FCC already regulates cable television programming, deciding at what time adult programming can start. It is but a short step for it to set uprules for Internet content providers-except that the 1996 Telecommunications Act requires the government to "promote continued development of the Internet . . . unfettered by federal or state regulation". If Internet access services by cable were treated as cable services,franchise fees could be imposed by cities in the US. Whether the boundaries between telephone, cable and Internet access will be subject to regulation will be a matter for Congress, although the FCC is seeking clarification as to whether cable services in the 1966 Act could be interpreted as to include cable-provided Internet services. Esbin suggests that rather than trying to squeeze the Internet and Internet-related services into familiar categories, the FCC might better endeavour to create a new regulatory category.®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
'Cowardly, venomous trolls' threatened with TWO-YEAR sentences for menacing posts
UK government: 'Taking a stand against a baying cyber-mob'
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.