IDG News Service - The U.S. Federal Communications Commission has taken the first step toward creating formal net neutrality rules, despite a huge lobbying effort from opposing groups in recent days.
The FCC voted Thursday to open a rulemaking process and begin receiving comments on a proposal to create new net neutrality rules following a contentious debate on whether new regulations are needed.
The FCC is still months away from voting on the final regulations, but the rules, as proposed, would allow Web users to run the legal applications and access the legal Web sites of their choice, while prohibiting broadband providers from selectively blocking or slowing Web content. Providers could use "reasonable" network management to reduce congestion and maintain quality of service, but the rules would require them to be transparent with consumers about their efforts.
Under the FCC proposal, wireless broadband services would be included in the net neutrality rules. The FCC will seek comments on how to treat managed network services.
The rules are necessary to protect innovation on the Internet and preserve the openness that has allowed the Internet to blossom, said FCC Chairman Julius Genachowski.
"The problem is not merely that we've seen some significant situations where broadband providers have degraded the data streams of popular lawful services and blocked consumer access to lawful applications," he said. "The heart of the problem is that ... we face the dangerous combination of an uncertain legal framework with ongoing as well as emerging challenges to a free and open Internet.
"Given the potentially huge consequences of having the open Internet diminished through inaction, the time is now to move forward with consideration of fair and reasonable rules of the road," he added.
But Commissioner Robert McDowell suggested the Internet has seen massive growth because of a lack of regulations. The proposed rules regulate network providers, but not Web applications vendors, while supporters assume new innovation will come from applications and not networks, he said.
"The Internet is perhaps the greatest deregulatory success story of all time," said McDowell, a Republican. "No government has ever succeeded in mandating innovation and investment."
New rules could inadvertently hurt the growth of the Internet and give a precedent to other nations that want to create all kinds of new Internet regulations, McDowell added. But he praised Genachowski for creating an open and collegial rulemaking process.
Net neutrality advocates began pressing hard for new rules in 2005, after the FCC phased out rules requiring traditional telecom carriers to share their broadband networks with competitors. That same year, the FCC approved four informal net neutrality principles, but broadband provider Comcast, in a lawsuit, has challenged the FCC's authority to enforce those principles.
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- A Survival Guide for Data in the Wild
- All corporate data used to reside in the data center. Safe and sound behind the corporate firewall. But now, employees have multiple devices...
- Gartner Critical Capabilities for Enterprise Endpoint Backup
- With this complimentary report you can:
- Discover the critical product capabilities that matter
- Learn about the unique backup needs of the mobile and...
- Top 10 Endpoint Backup Mistakes
- When considering endpoint backup options, be sure you're making the right decisions. Protecting data on endpoints has become more challenging because of recent...
- Transforming Security: Designing a State-of-the-Art Extended Team
- The information security mission is no longer about implementing and operating controls. All Government IT White Papers
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- All Government IT Webcasts