Feeds

FCC boss Wheeler talks tough on net neutrality with Title II threat

Says he 'won't hesitate' to slap down telcos that flout Open Internet rules

Beginner's guide to SSL certificates

Just days after being accused of gutting net neutrality provisions in the US, the head of the US Federal Communications Commission is vowing to take any measures necessary to prevent a multi-tiered internet.

FCC Chairman Tom Wheeler said on Tuesday that the commission would continue to enforce an open internet policy, even if that meant using the Title II provision of the Telecommunications Act of 1996 to reclassify broadband as a telecommunications service, making it subject to stronger regulations.

"I do not believe we should leave the market unprotected for multiple more years while lawyers for the biggest corporate players tie the FCC’s protections up in court," Wheeler said in a blog post.

"Notwithstanding this, all regulatory options remain on the table. If the proposal before us now turns out to be insufficient or if we observe anyone taking advantage of the rule, I won’t hesitate to use Title II."

The comments comes in the wake of a proposal by Wheeler to ease the commission's stance on net neutrality by allowing for certain cases where "commercially reasonable" arrangements could be made to allow certain companies such as streaming video providers to enjoy preferred network access.

The proposal was widely panned as a concession by the FCC that would gut net neutrality in the wake of a decision against the commission in its case with Verizon. Critics argued that Wheeler, a former CTIA exec, had turned in favor of companies who sought to end net neutrality protection.

Wheeler, however, maintains that the new plan would seek to maintain a basic foundation of net neutrality and that the "commercially reasonable" designation would not be allowed for deals that would harm consumers, create exclusive network services or harm competition and free speech.

"If broadband providers would seek to use the commercially reasonable test as justification of activities in which users can’t effectively use that pathway, or the capabilities of it are degraded, I suggest they save their breath since such conduct would be a violation of the Open Internet rules we propose," Wheeler said. "If anyone acts to degrade the service for all for the benefit of a few, I intend to use every available power to stop it."

The FCC commissioners are set to vote on the proposed rules on May 15, after which a public comment window will follow before a final decision will be made. ®

Security for virtualized datacentres

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.