Resource Library
Everyone should have access to an open and trusted Internet. Read our reports, papers, and other documents for insight and vision on how we can get there.
All OTA ResourcesBuilding TrustGlobalOnline Trust AllianceOTAOTA Online Trust Audit and Honor RollPrivacyRebuilding TrustResourcesSecurity
Online Trust Audit – 2020 U.S. Presidential Campaigns
Given increased concerns about security and privacy in the political realm and the continuing drumbeat of high-profile data breaches, we …
All OTA ResourcesGlobalOnline Trust AllianceOTAOTA Online Trust Audit and Honor RollPrivacyRebuilding TrustResourcesSecurity
2019 Online Trust Audit Methodology
The 2019 Online Trust Audit will represent the 11th independent analysis and benchmark report of the adoption of security standards and responsible privacy …
Asia-PacificConsolidationFuture of the InternetHow the Internet WorksInternet TrendsInternet’s FutureResourceResourcesSurveys
The Internet Society Survey on Policy Issues in Asia-Pacific 2019
The 2019 survey aims to contribute to policy debates and discussions—both in the APAC region and globally—on the trends and …
GlobalInternet of Things (IoT)Internet of Things (IoT)Internet PolicyPolicy BriefsPolicy BriefsPrivacyRebuilding TrustResources
Policy Brief: IoT Privacy for Policymakers
This policy brief identifies the key privacy challenges and risks arising from IoT devices in our homes, workplaces, and public …
Are Organizations Ready for New Privacy Regulations?
Based on 1,200 privacy statements, many are not prepared for coming regulations …
All OTA ResourcesBuilding TrustGlobalOnline Trust AllianceOTAOTA Online Trust Audit and Honor RollPrivacyRebuilding TrustResourcesSecurity
2019 Online Trust Audit and Honor Roll
The 2019 Online Trust Audit & Honor Roll will represent the 11th independent analysis and benchmark report of the adoption of …
All OTA ResourcesBuilding TrustCyber Incident and Breach ReadinessCybersecurityGlobalOnline Trust AllianceOTARebuilding TrustResourcesSecurityTechnology
2018 Cyber Incident & Breach Trends Report
This year’s report includes ransomware, business email compromise (BEC), distributed denial-of-service (DDoS) attacks, connected device vulnerability, and more …
Policy Brief: Principles for Responsible Data Handling
Responsible data handling means applying ethical principles of transparency, fairness and respect to how we treat the data that affects …
Trust by Design
We’re asking manufacturers to include trust in all stages of the design process …