Skip the navigation

More Gov't Legislation/Regulation In Depth

US lawmakers introduce bill banning paid prioritization online

A group of U.S. lawmakers have introduced legislation that would prohibit broadband providers from charging Web content generators for priority traffic management.

Thornton May: The time is now for information governance. But do you even know what it is?

Information governance covers the entire spectrum of information management, but most people have a fuzzy notion of what it is. This must change, because the real value of information can't be fully realized unless it is properly governed.

How Tom Wheeler's FCC plan will wreck your Internet

FCC Chairman Tom Wheeler's proposal is brilliant because it takes the U.S. as far away from net neutrality as possible by presenting the killing of net neutrality and making it sound like the opposite.

Ron Miller: Will the FCC stick us in the slow lane?

The Internet community has arisen with one voice to lambaste the FCC chairman's proposal to make the Internet less neutral for some.

Evan Schuman: One law to rule all data breaches -- but let's make it a real law

The White House's big report on big-data privacy has several shortcomings.

The Grill: Rep. William Keating wants cross-sector data sharing

Rep. William Keating (D-Mass.), who sits on the House Cybersecurity, Infrastructure Protection and Security Technologies Subcommittee, is calling on the Department of Homeland Security to be more involved in tackling the cybersecurity problem. Insider (registration required)

Bart Perkins: Pester no more: How to handle the FCC's new rules on robocalls

Businesses must make sure their processes and IT systems adhere to the new regulations.

Gigabit Internet Service Providers Challenge Traditional ISPs

Companies such as Comcast and Time Warner don't think the United States is ready for -- or even needs -- gigabit Internet, but Google Fiber and a host of independent initiatives suggest that they are faster and cheaper.

Jay Cline: U.S. takes the gold in doling out privacy fines

EU privacy regulators say U.S. privacy laws are too weak to protect EU personal data. But a new analysis of 358 privacy-enforcement actions paints the opposite picture.

Ron Miller: Restricting the Internet is a business killer

Turkey might be about to learn how attempts to control the population by limiting the Internet can backfire.

FCC's in-flight cellphone plan carries a lot of baggage

Anyone who dreads hearing one end of a loud phone call all the way from Anchorage to Miami, take heart: The plan to allow cellphones on planes could fail in more ways than an overbooked flight at a snowbound airport on Christmas Eve.

The best data security offense is a good defense

After several missed security audits, the IT team at the Pennsylvania Department of Public Welfare jumped into action, building an ambitious security risk framework so audit reports could be prepared in a timely fashion.

How a Dating Service for IP Could Turn Patent Trolls Into White Knights

At Demo 2013, a firm called idealAsset showed off a product that helps would-be buyers and sellers of intellectual property find each other. Could this sort of matchmaking convince patent trolls to acquire IP by nobler means?

Net neutrality faces uncertain court ruling in U.S.

It's difficult to predict how an appeals court will rule after it hears arguments Monday in Verizon Communication's challenge of the U.S. Federal Communications Commission's net neutrality rules.

We should promote broadband pricing innovation

Experimentation with pricing structures will let the broadband providers -- and their customers -- test new business models without regulatory interference.

Prism doesn't have CIOs in a panic -- yet

Revelations over the U.S. National Security Agency's Prism surveillance program have much of the general public in uproar, but in terms of the controversy's impact to enterprise IT, some CIOs have measured, albeit watchful, reactions.

Everyone must work together for a better Internet

As officials prepare to gather for the ITU's big, global forum on the Internet, a plea for open minds, understanding and cooperation.

Supply chain 2013: Stop playing whack-a-mole with security threats

IT can never take all the risk out of a supply chain, but it can help organizations minimize their vulnerability in a world of new threats.

For credit card handlers, cloud computing guidelines just got clearer

The Payment Card Industry Security Standards Council has just issued guidance that anyone processing credit cards in the cloud will want to review.

A Declaration of the Interdependence of Cyberspace

On the anniversary of John Perry Barlow's issuing 'A Declaration of the Independence of Cyberspace,' a response and alternate call to action.