Internet Policy

Other Report

A New Framework for Cross-Border Data Flows

Author: Karen Kornbluh

The flow of data across international borders creates jurisdictional challenges and causes international tensions. Increasingly, countries have responded by imposing new requirements to store data locally, threatening cross-border data flows, which generate approximately $2.8 trillion of global gross domestic product each year. CFR Senior Fellow for Digital Policy Karen Kornbluh argues that the United States should take the lead in addressing these tensions.

See more in Europe; United States; Internet Policy; Privacy

Other Report

Countering Islamic State Exploitation of the Internet

Author: David P. Fidler

The use of social media and other Internet-enabled communications by the self-proclaimed Islamic State is pushing the United States and other democracies to react to the abuse of liberal freedoms by illiberal forces. CFR Visiting Fellow David P. Fidler outlines ways to counter the Islamic State's online onslaught through policies anchored in free speech, transparency, and accountability. 

See more in Syria; Iraq; Cybersecurity; Internet Policy

Other Report

Internet Governance and the ITU: Maintaining the Multistakeholder Approach

Authors: Christian Schaller and Johannes Thimm

Christian Schaller and Johannes Thimm analyze Germany's policy priorities at the ITU conference in Busan, South Korea, arguing that Germany will go to Busan opposed to the expansion of the ITU mandate, but in search of ways to increase the ITU's technical capabilities to broaden access.

See more in Global; Germany; International Organizations and Alliances; Internet Policy

Other Report

Holding the Multistakeholder Line at the ITU

Author: Adam Segal

Adam Segal explains the U.S. approach at the ITU Plenipotentiary Conference in Busan, South Korea, where the United States is looking to defend its approach to Internet governance. Washington and its allies favor the "multistakeholder" model: a bottom-up policy process that includes organizations representing technical experts, governments, businesses, civil society, and individual users.

See more in Global; Internet Policy; International Organizations and Alliances

Primary Sources

World Summit on the Information Society Statements

UN General Assembly Resolution 56/183 in December 2001 endorsed the World Summit on the Information Society (WSIS), which encourages global discussions on how to benefit from the digital revolution while addressing the digital divide. The International Telecommunication Union hosted two phases in Geneva from December 10 to 12, 2003, and in Tunis from November 16 to 18, 2005. From February 25 to 27, 2013, WSIS participants met in Paris to evaluate progress and goals. In December 2015, the UN produced a draft resolution on the outcome of the WSIS from the past ten years and renewed the Internet Governance Forum (IGF) for another ten years.

See more in Global; Digital Infrastructure; Internet Policy

Primary Sources

UN Group of Governmental Experts: Developments in the Field of Information and Telecommunications in the Context of International Security

The United Nations Group of Governmental Experts (GGE) released this consensus report (A/70/172) on rules of behavior in cyberspace, particularly during peacetime. The report recommends that nations should not use information and communication technologies to attack critical infrastructure or interrupt the information systems of emergency services.

See more in Global; Internet Policy

Primary Sources

Cybersecurity Law of the People's Republic of China

National People's Congress of China released this draft text on July 6, 2015, and it will be available for public comment through August 2015. The law outlines the Chinese government's goals for security standards for technical systems, networks, and user data. It requires companies with operations in China to comply with government requests for regulating and restricting technology use. See also the broader National Security Law passed on July 1, 2015.

See more in China; Cybersecurity; Internet Policy

Primary Sources

Federal Communications Commission Open Internet Order

Federal Communications Commission (FCC) voted on February 26, 2015, on rules governing regulation of U.S. broadband networks. The FCC published rules (FCC 15-24) regulating this order on March 12, 2015. The rules ban the ability of broadband companies to prioritize traffic from sources that pay more and reclassify broadband as a telecommunications service, subject to regulation under Title II of the Communications Act. The FCC news release states that the rules are focused on making networks "fast, fair, and open."

See more in United States; Internet Policy; Digital Infrastructure

Primary Sources

Guidelines on the Implementation of the European Union's Judgment on “Google Spain and Inc v. Agencia Espanola de Proteccion de Datos (AEPD) and Mario Costeja Gonzalez”

On November 26, 2014, the European Union adopted guidelines for search engines to use when deciding whether to remove, upon request, specific articles from search results for a person's name, in accordance with EU data privacy laws. These privacy laws are also referred to as "the right to be forgotten," for citizens to request that searches for their names not surface particular results.

See more in EU; Internet Policy; Privacy

Primary Sources

Congressional Letter to FCC Chairman Demanding Net Neutrality

Congressional Representatives Raúl Grijalva and Keith Ellison sent a letter to Federal Communications Commission Chair Tom Wheeler, before a May 15, 2014 FCC meeting to propose new Internet speed and pricing policies. The cosigners of the letter support preservation of Net Neutrality and equal access to the Internet, to prevent companies from paying higher fees to Internet service providers and in turn having their online content favored. The FCC voted on February 26, 2015, on rules governing regulation of U.S. broadband networks.

See more in United States; Internet Policy