Resource Library

Everyone should have access to an open and trusted Internet.
Read our reports, papers, and other documents for insight and vision on how we can get there.

Action Plan 2021

The roadmap for our work ahead – let’s join together to support our vision that the Internet is for everyone.

Impact Report 2020

Some of our important work in 2020, highlighting how our community has worked together to to build, promote and defend the Internet.

Global Internet Report (GIR)

From trust to consolidation, access to sustainability, a deep look at the forces shaping our digital future.

Policy Briefs

Our perspective on critical Internet issues, including community networks, encryption, open Internet standards, Internet Exchange Points, and more.

Security Through Encryption and Despite Encryption: An (un)Achievable Outcome?
On 16 June 2021 we organised a roundtable to explore in greater detail how to apply the European Council’s position on encryption, following its November 2020 Resolution; “Security through encryption ...
Internet Governance in the Middle East and North Africa
The Internet is a ‘network of networks’ made up of tens of thousands of networks that interconnect and route traffic efficiently between end points. While the interconnections and routing of ...
Moving Toward an Interconnected Africa: The 80/20 Initiative

In 2010, the Africa Internet technical community embraced an ambitious vision to have 80% of all Internet traffic locally accessible with only 20% being sourced internationally by 2020. 

This vision ...

Effective IXP strategies for the Asia-Pacific
In partnership with the Asia Pacific Internet Exchange Association (APIX), we set out to explore how different exchanges fit into their local environment to find best strategies and approaches they ...
The Economic Impact of Laws that Weaken Encryption

In 2018 the Australian parliament passed the Telecommunications and Other Legislation Amendment (Assistance and Access) Act (TOLA) 2018, expanding the government's powers to bypass digital data protections, and bringing with ...

Mauritius IGF and Internet Society Response to Mauritius ICTA Consultation Paper
The Mauritius IGF and the Internet Society's input to the proposed amendments to the ICT ACT for regulating the use and addressing the abuse and misuse of Social Media in ...
Encryption unlocks the benefits of a thriving, trustworthy Internet
This analysis is intended to help policymakers worldwide understand how encryption operates throughout the Internet’s infrastructure, and not just in the applications so many of us use each day ...
Guide to Federal Broadband Funding Opportunities in the U.S.
This guide offers an overview of federal funding options that could provide financial support to Tribal, state, and local governments and utilities in their efforts to expand broadband infrastructure ...
MANRS Community Report 2020
In this report we highlight success stories, the concrete impacts we made, from our efforts in training and partnership to leadership initiatives. We also outline our goals and plan for ...
How to Make Sure Section 230 Reforms Don’t Harm the Foundation of the Internet

Author: Katie Watson Jordan

We called it in 2020, and barely two months into the new year the increasing trend in the United States to propose reforms to Section 230 ...

Fact Sheet: Understanding Encryption: The Connections to Survivor Safety
For many survivors of domestic violence, sexual violence, stalking, and trafficking, having private and secure ways to communicate and store files electronically is a vital part of their safety. For ...
Internet Way of Networking Use Case: Content Filtering

This use case analyzes the effect that government policies requiring content filtering may have on the Internet Way of Networking. To understand how such policies could undermine the Internet’s broader ...

Archives

Internet Governance in the Middle East and North Africa
The Internet is a ‘network of networks’ made up of tens of thousands of networks that interconnect and route traffic efficiently between end points. While the interconnections and routing of ...
Fact Sheet: Does quantum computing put our digital security at risk?
A paper explaining how quantum computing and encryption are related ...
Info Guide: Virtual schooling: 11 ways to keep your child safe online
Take a look through our back-to-school checklist that aims to help you, as a parent or guardian, make sure your child stays safe while learning online ...
Policy Toolkit on IoT Security and Privacy
The Policy Toolkit on IoT Security and Privacy is a practical resource for policymakers and regulators to strengthen the security and privacy of IoT systems to protect individuals, businesses and ...
ITU World Telecommunication Standardization Assembly 2020: Background Paper
This background paper is intended to provide the Internet Society community and interested parties with an outline of the objectives and key issues concerning the Internet to be addressed at ...
Internet Infrastructure Security Guidelines for the Arab States
As many Arab states continue to modernize and diversify their economies with a focus on digital services, trade and e-government, both the opportunities and threats of the Internet are amplified ...
The Road to Deployment: Network Time Security
The presentation by Karen ‘O’Donoghue at LACNIC 33 ...
Policy Brief: Internet Shutdowns
An Internet shutdown can be defined as an “intentional disruption of Internet or electronic communications, rendering them inaccessible or effectively unusable, for a specific population or within a location often ...
Internet Society Position on Internet Shutdowns
The Internet Society believes Internet shutdowns harm societies, economies, and the global Internet infrastructure ...
A Multi-Stakeholder Model in ICT Policymaking
The multistakeholder model, an established approach for Internet governance, lends itself to ideal use in policymaking for the digital era--an environment that is increasingly made up of various actors that ...
Security Factsheet: Keeping Your Workplace Safe Online
For many of us the Internet is a staple in our day-to-day lives – especially at our jobs. But did you know that by simply connecting your device to WiFi ...
Security Factsheet: Why Should Municipalities Make Network and Data Security a Priority?
Communities can minimize risk by being intentional about how and by whom networks and devices are used. These are eight best practices for municipal governments to optimize security ...

Organization Reports

On annual basis, we publish annual reports, Action Plan and Impact Report, as well as the financial reports, annual financial statements and Form 990s.