Feeds

New Nominet chair: I’ll start by listening

Baroness Rennie Fritchie opens up

High performance access to file storage

Regulation

The issue for Board control also gained the interest of the UK government, which warned Nominet that it was prepared to step in if the organization couldn’t self-regulate. The result, in a number of clauses in the Digital Economy Bill, is that the government now has a number of reserve powers to take over the dot-uk registry if it thinks the situation warrants it.

Having previously worked as a regulator of government, Baroness Fritchie recognises the importance of that step and is determined to do something about it. “Self-regulation is very important. We have to demonstrate that not only do we have the tools but also that we use them well — and I think Nominet has demonstrated that extremely well to government.”

She doesn’t see the government repealing its new powers though. “Government is keen to have a final determinant. And given the last year of banks and the economy, you can understand why they would want it.”

But, she says, it was the previous Labour government that introduced the powers and so far the Conservative-Liberal coalition government “seems less interested in central control”, adding that she will want to test that hypothesis as well as “be able to influence” how this government views the reserve powers. “Part of the reason I’m here is that I worked as a regulator of government, so I hope to give the government confidence in Nominet,” she says, noting, “but I’m not there for government, I’m there for Nominet.”

Style

As to her likely style as chair, Baroness Fritchie highlights a philosophy of “principled pragmatism” which recognises that “there is always a principle behind the rule”. She also cites the first principle of a doctor's philosophy: “Do no harm.” “I know that an organization is only as good as the people who work for it, and I hope to demonstrate how to get the best we can from them.”

She recognises that the task of guiding Nominet will not be simple or certain, however, describing it as “a bit like navigating by the stars”. The key, says the woman who also authored a book called The Business of Assertiveness, is to “keep a strong heart and a cool head”.

If the past five years of Nominet’s existence are anything to go by, its new chair will need both. ®

High performance access to file storage

More from The Register

next story
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.