02
Sat, Nov
2 New Articles

FCC Acts to Preserve Internet Freedom and Openness

Standards Organizations
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

The Federal Communications Commission has acted to preserve the Internet as an open network enabling consumer choice, freedom of expression, user control, competition and the freedom to innovate.

Chairman Genachowski voted for the order; Commissioner Copps concurred and Commissioner Clyburn approved in part and concurred in part. Commissioners McDowell and Baker dissented. 

In 2009, the FCC launched a public process to determine whether and what actions might be necessary to preserve the characteristics that have allowed the Internet to grow into an indispensable platform supporting our nation’s economy and civic life, and to foster continued investment in the physical networks that enable the Internet.

This process has made clear that the Internet has thrived because of its freedom and openness--the absence of any gatekeeper blocking lawful uses of the network or picking winners and losers online.  Consumers and innovators do not have to seek permission before they use the Internet to launch new technologies, start businesses, connect with friends, or share their views.

The Internet is a level playing field.  Consumers can make their own choices about what applications and services to use and are free to decide what content they want to access, create, or share with others.  This openness promotes competition.  It also enables a self-reinforcing cycle of investment and innovation in which new uses of the network lead to increased adoption of broadband, which drives investment and improvements in the network itself, which in turn lead to further innovative uses of the network and further investment in content, applications, services, and devices.  A core goal of this Order is to foster and accelerate this cycle of investment and innovation.

The record and the economic analysis demonstrate, however, that the openness of the Internet cannot be taken for granted, and that it faces real threats.  Broadband providers have taken actions that endanger the Internet’s openness by blocking or degrading disfavored content and applications without disclosing their practices to consumers.  Finally, broadband providers may have financial interests in services that may compete with online content and services.  The record also establishes the widespread benefits of providing greater clarity in this area: clarity that the Internet’s openness will continue; that there is a forum and procedure for resolving alleged open Internet violations; and clarity that broadband providers may reasonably manage their networks.  In light of these considerations, the FCC has long recognized that certain basic standards for broadband provider conduct are necessary to ensure the Internet’s continued openness.

The rules ensure that Internet openness will continue, providing greater certainty to consumers, innovators, investors, and broadband providers, including the flexibility providers need to effectively manage their networks. These rules were developed following a public rulemaking process that began in fall 2009 and included input from more than 100,000 individuals and organizations and several public workshops.

The rules require all broadband providers to publicly disclose network management practices, restrict broadband providers from blocking Internet content and applications, and bar fixed broadband providers from engaging in unreasonable discrimination in transmitting lawful network traffic.  The rules ensure much-needed transparency and continued Internet openness, while making clear that broadband providers can effectively manage their networks and respond to market demands.

The order builds on the bipartisan Internet Policy Statement the Commission adopted in 2005.  It concludes that adopting open Internet protections to ensure the continued vitality of the Internet is needed in light of instances of broadband providers interfering with the Internet’s openness and natural incentives they face to exert gatekeeper control over Internet content, applications, and services.

Broadband Internet access services are clearly within the Commission’s jurisdiction.  Congress charged the FCC with “regulating a field of enterprise the dominant characteristic of which was the rapid pace of its unfolding” and therefore intended to give the FCC sufficiently broad authority to address new issues that arise with respect to “fluid and dynamic” communications technologies.  Congress did not limit its instructions to the Commission to one section of the Communications Act.  Rather, it expressed its instructions in multiple sections which, viewed as a whole, provide broad authority to promote competition, investment, transparency, and an open Internet through the rules adopted today.

The provisions of the Communications the FCC relies on in enacting the open Internet rules include: 

  • Section 706 of the Telecommunications Act of 1996: This provision directs the FCC to “encourage the deployment on a reasonable and timely basis” of “advanced telecommunications capability” to all Americans  It directs the Commission to undertake annual inquiries concerning the availability of advanced telecommunications capability to all Americans and requires that, if the Commission finds that such capability is not being deployed in a reasonable and timely fashion, it “shall take immediate action to accelerate deployment of such capability by removing barriers to infrastructure investment and by promoting competition in the telecommunications market,” under Section 706(b). In July 2010, the Commission concluded that broadband deployment to all Americans is not reasonable and timely and noted that as a consequence of that conclusion, Section 706(b) was triggered. Section 706(b) therefore provides express authority for the pro-investment, pro-competition rules adopted today.
  • Title II of the Communications Act protects competition and consumers of telecommunications services.  Over-the-top Internet voice services -- VoIP -- can develop as a competitor to traditional phone services. The FCC likewise safeguards interconnection between telephone customers and VoIP users.
  • Title III of the Act gives the Commission authority to license spectrum used to provide fixed and mobile wireless services.  Licenses must be subject to terms that serve the public interest. The Commission previously has required certain wireless licensees to comply with open Internet principles, as appropriate in the particular situation before it. The open Internet conditions adopted today likewise are necessary to advance the public interest in innovation and investment.
  • Title VI of the Communications Act protects competition in video services.  Internet video distribution is increasingly important to video competition.  A cable or telephone company’s interference with the online transmission of programming by Direct Broadcast Satellite  operators or stand-alone online video programming aggregators that may function as competitive alternatives to traditional Multichannel Video Programming Distributors would frustrate Congress’s stated goals in enacting Section 628 of the Act, which include promoting “competition and diversity in the multichannel video programming market.”

Following are key excerpts from the Report and Order adopted by the Commission to preserve the open Internet:

 

Rule 1: Transparency

 

A person engaged in the provision of broadband Internet access service shall publicly disclose accurate information regarding the network management practices, performance, and commercial terms of its broadband Internet access services sufficient for consumers to make informed choices regarding use of such services and for content, application, service, and device providers to develop, market, and maintain Internet offerings.

 

Rule 2: No Blocking

 

A person engaged in the provision of fixed broadband Internet access service, insofar as such person is so engaged, shall not block lawful content, applications, services, or non-harmful devices, subject to reasonable network management.

 

A person engaged in the provision of mobile broadband Internet access service, insofar as such person is so engaged, shall not block consumers from accessing lawful websites, subject to reasonable network management; nor shall such person block applications that compete with the provider’s voice or video telephony services, subject to reasonable network

 

Rule 3: No Unreasonable Discrimination

 

A person engaged in the provision of fixed broadband Internet access service, insofar as such person is so engaged, shall not unreasonably discriminate in transmitting lawful network traffic over a consumer’s broadband Internet access service.  Reasonable network management shall not constitute unreasonable discrimination.

 

Select Definitions

 

Broadband Internet access service:  A mass-market retail service by wire or radio that provides the capability to transmit data to and receive data from all or substantially all Internet endpoints, including any capabilities that are incidental to and enable the operation of the communications service, but excluding dial-up Internet access service.  This term also encompasses any service that the Commission finds to be providing a functional equivalent of the service described in the previous sentence, or that is used to evade the protections set forth in this Part.

 

Reasonable network management.  A network management practice is reasonable if it is appropriate and tailored to achieving a legitimate network management purpose, taking into account the particular network architecture and technology of the broadband Internet access service. Legitimate network management purposes include: ensuring network security and integrity, including by addressing traffic that is harmful to the network; addressing traffic that is unwanted by users (including by premise operators), such as by providing services or capabilities consistent with a user’s choices regarding parental controls or security capabilities; and by reducing or mitigating the effects of congestion on the network. 

 

Pay for Priority Unlikely to Satisfy “No Unreasonable Discrimination” Rule

 

A commercial arrangement between a broadband provider and a third party to directly or indirectly favor some traffic over other traffic in the connection to a subscriber of the broadband provider (i.e., “pay for priority”) would raise significant cause for concern.  First, pay for priority would represent a significant departure from historical and current practice.  Since the beginning of the Internet, Internet access providers have typically not charged particular content or application providers fees to reach the providers’ consumer retail service subscribers or struck pay-for-priority deals, and the record does not contain evidence that U.S. broadband providers currently engage in such arrangements.  Second this departure from longstanding norms could cause great harm to innovation and investment in and on the Internet.  As discussed above, pay-for-priority arrangements could raise barriers to entry on the Internet by requiring fees from edge providers, as well as transaction costs arising from the need to reach agreements with one or more broadband providers to access a critical mass of potential users.  Fees imposed on edge providers may be excessive because few edge providers have the ability to bargain for lesser fees, and because no broadband provider internalizes the full costs of reduced innovation and the exit of edge providers from the market.  Third, pay-for-priority arrangements may particularly harm non-commercial end users, including individual bloggers, libraries, schools, advocacy organizations, and other speakers, especially those who communicate through video or other content sensitive to network congestion.  Even open Internet skeptics acknowledge that pay for priority may disadvantage non-commercial uses of the network, which are typically less able to pay for priority, and for which the Internet is a uniquely important platform.  Fourth, broadband providers that sought to offer pay-for-priority services would have an incentive to limit the quality of service provided to non-prioritized traffic.  In light of each of these concerns, as a general matter, it is unlikely that pay for priority would satisfy the “no unreasonable discrimination” standard.  The practice of a broadband Internet access service provider prioritizing its own content, applications, or services, or those of its affiliates, would raise the same significant concerns and would be subject to the same standards and considerations in evaluating reasonableness as third-party pay-for-priority arrangements.

 

Measured Steps for Mobile Broadband

 

Mobile broadband presents special considerations that suggest differences in how and when open Internet protections should apply.  Mobile broadband is an earlier-stage platform than fixed broadband, and it is rapidly evolving.  For most of the history of the Internet, access has been predominantly through fixed platforms -- first dial-up, then cable modem and DSL services.  As of a few years ago, most consumers used their mobile phones primarily to make phone calls and send text messages, and most mobile providers offered Internet access only via “walled gardens” or stripped down websites.   Today, however, mobile broadband is an important Internet access platform that is helping drive broadband adoption, and data usage is growing rapidly.   The mobile ecosystem is experiencing very rapid innovation and change, including an expanding array of smartphones, aircard modems, and other devices that allow mobile broadband providers to enable Internet access; the emergence and rapid growth of dedicated-purpose mobile devices like e-readers; the development of mobile application (“app”) stores and hundreds of thousands of mobile apps; and the evolution of new business models for mobile broadband providers, including usage-based pricing.

 

Moreover, most consumers have more choices for mobile broadband than for fixed broadband.   Mobile broadband speeds, capacity, and penetration are typically much lower than for fixed broadband,  though some providers have begun offering 4G service that will enable offerings with higher speeds and capacity and lower latency than previous generations of mobile service.   In addition, existing mobile networks present operational constraints that fixed broadband networks do not typically encounter.   This puts greater pressure on the concept of “reasonable network management” for mobile providers, and creates additional challenges in applying a broader set of rules to mobile at this time.   Further, we recognize that there have been meaningful recent moves toward openness, including the introduction of open operating systems like Android.  In addition, we anticipate soon seeing the effects on the market of the openness conditions we imposed on mobile providers that operate on upper 700 MHz C-Block spectrum, which includes Verizon Wireless, one of the largest mobile wireless carriers in the U.S.  

 

In light of these considerations, we conclude it is appropriate to take measured steps at this time to protect the openness of the Internet when accessed through mobile broadband

 

Specialized Services

 

In the Open Internet NPRM, the Commission recognized that broadband providers offer services that share capacity with broadband Internet access service over providers’ last-mile facilities, and may develop and offer other such services in the future.  These “specialized services,” such as some broadband providers’ existing facilities-based VoIP and Internet Protocol-video offerings, differ from broadband Internet access service and may drive additional private investment in broadband networks and provide consumers valued services, supplementing the benefits of the open Internet.  At the same time, specialized services may raise concerns regarding bypassing open Internet protections, supplanting the open Internet, and enabling anticompetitive conduct.  We note also that our rules define broadband Internet access service to encompass “any service that the Commission finds to be providing a functional equivalent of [broadband Internet access service], or that is used to evade the protections set forth in these rules.”

 

We will closely monitor the robustness and affordability of broadband Internet access services, with a particular focus on any signs that specialized services are in any way retarding the growth of or constricting capacity available for broadband Internet access service.  We fully expect that broadband providers will increase capacity offered for broadband Internet access service if they expand network capacity to accommodate specialized services.  We would be concerned if capacity for broadband Internet access service did not keep pace.  We also expect broadband providers to disclose information about specialized services’ impact, if any, on last-mile capacity available for, and the performance of, broadband Internet access service.  We may consider additional disclosure requirements in this area in our related proceeding regarding consumer transparency and disclosure.  We would also be concerned by any marketing, advertising, or other messaging by broadband providers suggesting that one or more specialized services, taken alone or together, and not provided in accordance with our open Internet rules, is “Internet” service or a substitute for broadband Internet access service.  Finally, we will monitor the potential for anticompetitive or otherwise harmful effects from specialized services, including from any arrangements a broadband provider may seek to enter into with third parties to offer such services.   The Open Internet Advisory Committee will aid us in monitoring these issues.

 

Action by the Commission December 21, 2010, by Report and Order (FCC 10-201).  Chairman Genachowski approving, Commissioner Clyburn approving in part and concurring in part; Commissioner Copps concurring, Commissioners’ McDowell and Baker dissenting.  Separate statements issued by Chairman Genachowski, Commissioners’ Copps, McDowell, Clyburn, and Baker.

The Federal Communications Commission (FCC) is an independent United States government agency. The FCC was established by the Communications Act of 1934 and is charged with regulating interstate and international communications by radio, television, wire, satellite and cable. The FCC's jurisdiction covers the 50 states, the District of Columbia, and U.S. possessions. The FCC is directed by five Commissioners appointed by the President and confirmed by the Senate for five-year terms, except when filling an unexpired term. The President designates one of the Commissioners to serve as Chairperson. Only three Commissioners may be members of the same political party. None of them can have a financial interest in any Commission-related business. As the chief executive officer of the Commission, the Chairman delegates management and administrative responsibility to the Managing Director. The Commissioners supervise all FCC activities, delegating responsibilities to staff units and Bureaus. 

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$

Book Reviews

Resource Center

  • SB Profound WC 5536 Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here. In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform. Attend this webinar to learn:

  • SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation. Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects. The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.

  • SB HelpSystems ROBOT Generic IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads. But what does Power10 mean for your data center? In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • Magic MarkTRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Make sure your data survives when catastrophe hits. Request your trial now!  Request Now.

  • SB HelpSystems ROBOT GenericForms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.

  • SB HelpSystems ROBOT GenericIT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i. In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.

  • SB HelpSystems ROBOT GenericCan you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later. A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • FORTRA Disaster protection is vital to every business. Yet, it often consists of patched together procedures that are prone to error. From automatic backups to data encryption to media management, Robot automates the routine (yet often complex) tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:

  • FORTRAManaging messages on your IBM i can be more than a full-time job if you have to do it manually. Messages need a response and resources must be monitored—often over multiple systems and across platforms. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include:

  • FORTRAThe thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include:

  • FORTRAFor over 30 years, Robot has been a leader in systems management for IBM i. With batch job creation and scheduling at its core, the Robot Job Scheduling Solution reduces the opportunity for human error and helps you maintain service levels, automating even the biggest, most complex runbooks. Manage your job schedule with the Robot Job Scheduling Solution. Key features include:

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed. Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

  • LANSASupply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals. In this webinar, we discuss how:

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • Profound Logic Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: