INTERNET PRIVACY

The FCC votes in favor of a strong net neutrality rule to keep the internet open and free. – February 26, 2015

________________________________________________________________

Net neutrality (also network neutrality or Internet neutrality) is the principle that Internet service providers and governments should treat all data on the Internet equally, not discriminating or charging deferentially by user, content, site, platform, application, type of attached equipment, and modes of communication. The term was coined by Columbia media law professor Tim Wu in 2003 as an extension of the longstanding concept of a common carrier. Proponents often see net neutrality as an important component of an open internet, where policies such as equal treatment of data and open web standards allow those on the internet to easily communicate and conduct business without interference from a third party. A “closed internet” refers to the opposite situation, in which established corporations or governments favor certain uses. A closed internet may have restricted access to necessary web standards, artificially degrade some services, or explicitly filter out content.

The Rules

Adopted on February 26, 2015, the FCC’s Open Internet rules are designed to protect free expression and innovation on the Internet and promote investment in the nation’s broadband networks. The Open Internet rules are grounded in the strongest possible legal foundation by relying on multiple sources of authority, including: Title II of the Communications Act and Section 706 of the Telecommunications Act of 1996. As part of this decision, the Commission also refrains (or “forbears”) from enforcing provisions of Title II that are not relevant to modern broadband service. Together Title II and Section 706 support clear rules of the road, providing the certainty needed for innovators and investors, and the competitive choices and freedom demanded by consumers.

The Open Internet rules went into effect on June 12, 2015. They are ensuring consumers and businesses have access to a fast, fair, and open Internet.

The new rules apply to both fixed and mobile broadband service. This approach recognizes advances in technology and the growing significance of mobile broadband Internet access in recent years. These rules will protect consumers no matter how they access the Internet, whether on a desktop computer or a mobile device.

Bright Line Rules:

  • No Blocking: broadband providers may not block access to legal content, applications, services, or non-harmful devices.
  • No Throttling: broadband providers may not impair or degrade lawful Internet traffic on the basis of content, applications, services, or non-harmful devices.
  • No Paid Prioritization: broadband providers may not favor some lawful Internet traffic over other lawful traffic in exchange for consideration of any kind—in other words, no “fast lanes.” This rule also bans ISPs from prioritizing content and services of their affiliates.

To ensure an open Internet now and in the future, the Open Internet rules also establish a legal standard for other broadband provider practices to ensure that they do not unreasonably interfere with or disadvantage consumers’ access to the Internet. The rules build upon existing, strong transparency requirements. They ensure that broadband providers maintain the ability to manage the technical and engineering aspects of their networks. The legal framework used to support these rules also positions the Commission for the first time to be able to address issues that may arise in the exchange of traffic between mass-market broadband providers and other networks and services.

(sources  quoted above is  from the FCC’S rules  on Net Neutrality and can be  found at https://www.fcc.gov/openinternet)

________________________________________________________________

The  stance of Gizmo Graphics & Technology  on the  issue is this, “Our  activity  on the  internet is not  anyone’s business as  long as  we are not doing  anything  that  is  Explicitly Illegal and  punishable by  law.”  Examples  of  this would  be  hacking someones  personal, or private information  and or  stealing  information  not  implicitly  owned  by the individuals  or  parties performing  these  illegal acts.

banner-wide

BELOW IS A  LINK TO  TOOLS THAT WILL HELP PROTECT YOUR PRIVACY.

Reset the Net privacy  tools. CLICK HERE

The information provided in this link is provided for your convenience Gizmo Graphics & Technology is not responsible for content or opinions displayed or expressed on other sites.