Feeds

US government rescinds 'leave internet alone' policy

Strickling speaking, the Naughties are dead

The Power of One eBook: Top reasons to choose HP BladeSystem

The US government’s policy of leaving the Internet alone is over, according to Obama’s top official at the Department of Commerce.

Instead, an “Internet Policy 3.0” approach will see policy discussions between government agencies, foreign governments, and key Internet constituencies, according to Assistant Secretary Larry Strickling, with those discussions covering issues such as privacy, child protection, cybersecurity, copyright protection, and Internet governance.

The outcomes of such discussions will be “flexible” but may result in recommendations for legislation or regulation, Strickling said in a speech at the Media Institute in Washington this week.

The new approach is a far cry from a US government that consciously decided not to intrude into the internet’s functioning and growth and in so doing allowed an academic network to turn into a global communications phenomenon.

Strickling referred to these roots arguing that it was “the right policy for the United States in the early stages of the Internet, and the right message to send to the rest of the world.” But, he continued, “that was then and this is now. As we at NTIA approach a wide range of Internet policy issues, we take the view that we are now in the third generation of Internet policy making.”

Outlining three decades of internet evolution - from transition to commercialization, from the garage to Main Street, and now, starting in 2010, the “Policy 3.0” approach - Strickling argued that with the internet is now a social network as well a business network. “We must take rules more seriously.”

He cited a number of examples where this new approach was needed: end users worried about credit card transactions, content providers who want to prevent their copyright, companies concerned about hacking, network neutrality, and foreign governments worried about Internet governance systems.

The decision to effectively end the policy that made the internet what it is today is part of a wider global trend of governments looking to impose rules on use of the network by its citizens.

In the UK, the Digital Economy Bill currently making its way through Parliament has been the subject of significant controversy for advocating strict rules on copyright infringement and threatening to ban people from the internet if they are found to do so. The bill includes a wide variety of other measures, including giving regulator Ofcom a wider remit, forcing ISPs to monitor their customers’ behavior, and allowing the government to take over the dot-uk registry.

In New Zealand, a similar measure to the UK’s cut-off provision has been proposed by revising the Copyright Act to allow a tribunal to fine those found guilty of infringing copyright online as well as suspend their Internet accounts for up to six months. And in Italy this week, three Google executives were sentenced to jail for allowing a video that was subsequently pulled down to be posted onto its YouTube video site.

Internationally, the Internet Governance Forum – set up by under a United Nations banner to deal with global governance issues – is due to end its experimental run this year and become an acknowledged institution. However, there are signs that governments are increasingly dominating the IGF, with civil society and the Internet community sidelined in the decision-making process.

In this broader context, the US government’s newly stated policy is more in line with the traditional laissez-faire internet approach. Internet Policy 3.0 also offers a more global perspective than the isolationist approach taken by the previous Bush administration.

In explicitly stating that foreign governments will be a part of the upcoming discussions, Strickling recognizes the United States’ unique position as the country that gives final approval for changes made to the internet’s “root zone.” Currently the global Internet is dependent on an address book whose contents are changed through a contract that the US government has granted to the Internet Corporation for Assigned Names and Number (ICANN), based in Los Angeles.

ICANN recently adjusted its own agreement with the US government to give it more autonomy and now reports to the global Internet community through a series of reviews. Strickling sits on the panel of one of those reviews.

Overall, this new approach could enable the US government to regain the loss of some of its direct influence through recommendations made in policy reports. But internet old hands will still decry the loss of a policy that made the network what it is today. ®

Maximizing your infrastructure through virtualization

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
Bring back error correction, say Danish 'net boffins
We don't need no steenkin' TCP/IP retransmission and the congestion it causes
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.