privacy and licensing

REAL Net Neutrality

Last fall, the Federal Communications Commission proposed rules for “Net Neutrality” — a set of regulations intended to help innovation and free speech continue to thrive on the Internet.

But is the FCC’s version of Net Neutrality the real deal? Or is it a fake?

Buried in the FCC’s rules is a deeply problematic loophole. Open Internet principles, the FCC writes, “do not… apply to activities such as the unlawful distribution of copyrighted works.”

For years, the entertainment industry has used that innocent-sounding phrase — “unlawful distribution of copyrighted works” — to pressure Internet service providers around the world to act as copyright cops — to surveil the Internet for supposed copyright violations, and then censor or punish the accused users.

From the beginning, a central goal of the Net Neutrality movement has been to prevent corporations from interfering with the Internet in this way — so why does the FCC’s version of Net Neutrality specifically allow them to do so?

Tell the FCC that if it wants to police the Internet, it first needs to demonstrate that it can protect Internet users and innovators by standing up to powerful industry lobbyists. Sign your name here to demand that the copyright-enforcement loophole be removed.

Done reading? Great! Now do something, take a stand for freedom, Sign The Letter.

Related Posts

Enforcement of the GNU GPL in Germany and Europe A. Rationale for enforcement of the GPL - At present, the enforcement of the GPL license conditions is driven by single developers and organizations s...
No Warrant Necessary to Seize Your Laptop The U.S. Customs may search your laptop and copy your hard drive when you cross the border, according to their policy. They may do this even if they h...
Who Controls Identity on the Web? The race to own your virtual identity is on. In announcements made just days apart at the end of April, Facebook and the Mozilla Foundation launched p...
Sign the petition: iPad DRM is iBad for our freedoms Today, Apple launched a computer that will never belong to its owner. Apple will use Digital Restrictions Management (DRM) to gain total veto power ov...
File-Sharing Software Potential Threat to Health Privacy The personal health and financial information stored in thousands of North American home computers may be vulnerable to theft through file-sharing sof...
The Multiple Meanings of the Term “Open” Over the last couple of months I’ve found myself involved, both actively and passively, in several conversations that contained terms like “open” or “...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*