REAL Net Neutrality

Last fall, the Federal Communications Commission proposed rules for “Net Neutrality” — a set of regulations intended to help innovation and free speech continue to thrive on the Internet.

But is the FCC’s version of Net Neutrality the real deal? Or is it a fake?

Buried in the FCC’s rules is a deeply problematic loophole. Open Internet principles, the FCC writes, “do not… apply to activities such as the unlawful distribution of copyrighted works.”

For years, the entertainment industry has used that innocent-sounding phrase — “unlawful distribution of copyrighted works” — to pressure Internet service providers around the world to act as copyright cops — to surveil the Internet for supposed copyright violations, and then censor or punish the accused users.

From the beginning, a central goal of the Net Neutrality movement has been to prevent corporations from interfering with the Internet in this way — so why does the FCC’s version of Net Neutrality specifically allow them to do so?

Tell the FCC that if it wants to police the Internet, it first needs to demonstrate that it can protect Internet users and innovators by standing up to powerful industry lobbyists. Sign your name here to demand that the copyright-enforcement loophole be removed.

Done reading? Great! Now do something, take a stand for freedom, Sign The Letter.

Related Posts

FreeBSD and the GPL Linus Torvalds has said Linux wouldn't have happened if 386BSD had been around when he started up. We trace the history of FreeBSD and how it's affect...
iPad: The Disneyland of Computers Tech commentators have a love/hate relationship with Apple's new iPad. Those who try it tend to like it, but many dislike its locked-down App Store wh...
Internet Explorer’s dominant market share eroding Remember when Internet Explorer ruled the Web, to the tune of about 98% of the browser market share? Those were happy days for Internet Explorer. Unti...
The Traceability of an Anonymous Online Comment Yesterday, I described a simple scenario where a plaintiff, who is having difficulty identifying an alleged online defamer, could benefit from subpoen...
The Anatomy of a Modern GPL Violation I've been thinking the last few weeks about the evolution of the GPL violation. After ten years of being involved with GPL enforcement, it seems like ...
The Public Domain Manifesto The public domain, as we understand it, is the wealth of information that is free from the barriers to access or reuse usually associated with copyrig...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*