Library shelves with books

Resource Library

Everyone should have access to an open and trusted Internet.
Read our reports, papers, and other documents for insight and vision on how we can get there.

A person capturing a photograph of a picturesque village

Action Plan 2025

Our 2025 Action Plan outlines our priorities in 2025, the first year of our 2030 Strategy.

Krishna waiting as a helicopter slinging a load of goods

2023 Year in Review

The Year in Review shows the steps we took in 2023 to ensure the Internet is for everyone. Learn about the positive difference we made for the Internet.

forest trees from above

Internet Impact Briefs

Shorter reports that analyze how different policies or new technologies may affect what the Internet needs to exist and thrive.

Glossary of Internet Terms

Understand key terms and become fluent in the language of the Internet with our new and improved glossary. 

Blue background with pattern

Policy Briefs

Our perspective on critical Internet issues, including community networks, encryption, open Internet standards, Internet Exchange Points, and more.

Global Digital Compact: Zero Draft Matrix

The Internet Society has analyzed the Global Digital Compact Zero Draft with the aim of supporting efforts to identify areas of concern and opportunity, and proposals that may impact ...

2030 Strategy

The Internet Society’s 2030 Strategy embodies our mission: the Internet is a resource to enrich people’s lives and a force for good in society ...

2024 West Africa Submarine Cable Outage Report

Learn about the West Africa submarine cable outage, and its impact on Internet connectivity in 13 countries ...

Internet Impact Brief: Nepal’s Proposed National Internet Gateway

Learn about the implications of Nepal’s National Internet Gateway proposal on Internet access and security ...

Client-Side Scanning

Read about the Internet Society's recommendations to European Parliament proposed regulation on preventing and combating child sexual abuse ...

Civil Society Experts Voice Concern as New EU Digital Identity Regulation Finalized

Read the analysis and recommendations developed by the Internet Society, Center for Democracy and Technology, Electronic Frontier Foundation, and Epicenter.works regarding new EU Digital Identity Regulation ...

How to Talk to Your Manager About Memory Safety

Learn about memory safety, memory-safe languages, common bugs and vulnerabilities, and the reasons for memory safe language adoption and use ...

How the Chippewas of Nawash are Bridging the Digital Divide

Through investments in a community network initiative and skills development programs, the Chippewas of Nawash now have reliable, affordable, high speed Internet connectivity.  ...

Internet Fragmentation: An Explainer

Internet fragmentation affects all of us. Learn how policies and proposals around the world put the open Internet at risk ...

Internet Society’s Submission to the European Commission’s Exploratory Consultation on “The future of the electronic communications sector and its infrastructure”

We provided feedback in response to the European Commission’s exploratory consultation on the “The future of the electronic communications sector and its infrastructure” ...

Encrypted DNS Factsheet

The domain name system (DNS) makes the Internet easier for humans to navigate as well as for services online to be highly resilient ...

Homomorphic Encryption: What Is It, and Why Does It Matter?

Learn about the concept of homomorphic encryption, its practicalities and implications, in order to make smart choices about this emerging technology ...

Archives

The Road to Deployment: Network Time Security

The presentation by Karen ‘O’Donoghue at LACNIC 33 ...

Policy Brief: Internet Shutdowns

An Internet shutdown can be defined as an “intentional disruption of Internet or electronic communications, rendering them inaccessible or effectively unusable, for a specific population or within a location often ...

Internet Society Position on Internet Shutdowns

The Internet Society believes Internet shutdowns harm societies, economies, and the global Internet infrastructure ...

A Multi-Stakeholder Model in ICT Policymaking

The multistakeholder model, an established approach for Internet governance, lends itself to ideal use in policymaking for the digital era--an environment that is increasingly made up of various actors that ...

Security Factsheet: Keeping Your Workplace Safe Online

For many of us the Internet is a staple in our day-to-day lives – especially at our jobs. But did you know that by simply connecting your device to WiFi ...

Security Factsheet: Why Should Municipalities Make Network and Data Security a Priority?

Communities can minimize risk by being intentional about how and by whom networks and devices are used. These are eight best practices for municipal governments to optimize security ...

Online Trust Audit – 2020 U.S. Presidential Campaigns

Given increased concerns about security and privacy in the political realm and the continuing drumbeat of high-profile data breaches, we conducted an Audit of the websites and email practices of ...

2019 Online Trust Audit Methodology 

The 2019 Online Trust Audit will represent the 11th independent analysis and benchmark report of the adoption of security standards and responsible privacy practices. This methodology reflects comments received in response to the Internet Society’s ...

Policy Brief: IoT Privacy for Policymakers

The Internet of Things, or IoT, is the latest wave of integration of technology into our lives and surroundings. This rapidly-spreading new generation of devices brings cameras, microphones, sensors, computing, ...

Are Organizations Ready for New Privacy Regulations?

Based on 1,200 privacy statements, many are not prepared for coming regulations ...

2019 Online Trust Audit and Honor Roll

The 2019 Online Trust Audit & Honor Roll will represent the 11th independent analysis and benchmark report of the adoption of security standards and responsible privacy practices. 

Sites  are eligible to ...

2018 Cyber Incident & Breach Trends Report

This year’s report includes ransomware, business email compromise (BEC), distributed denial-of-service (DDoS) attacks, connected device vulnerability, and more ...

Annual Reports and Financials

On annual basis, we publish annual reports (an Action Plan and Impact Report), as well as financial reports, annual financial statements, and Form 990s.