Resource Library

Everyone should have access to an open and trusted Internet.
Read our reports, papers, and other documents for insight and vision on how we can get there.

Action Plan 2022

Our roadmap for tackling the threats and challenges for today’s Internet as we look to grow and strengthen it for future generations.

Impact Report 2020

Some of our important work in 2020, highlighting how our community has worked together to to build, promote and defend the Internet.

Global Internet Report (GIR)

From trust to consolidation, access to sustainability, a deep look at the forces shaping our digital future.

Policy Briefs

Our perspective on critical Internet issues, including community networks, encryption, open Internet standards, Internet Exchange Points, and more.

COVID-19 Impact on Internet Performance
This report holistically examines the state of Internet infrastructure, performance, network resilience and discusses insights on how to strengthen Internet performance in Afghanistan, Nepal, and Sri Lanka ...
White Paper: Considerations for Mandating Open Interfaces
People all around the world depend on the Internet to live their lives and do their jobs. Behind the surface of applications, online services depend on “interoperability”, the ability of software ...
Traceability and Cybersecurity

Traceability, or the ability track down the originator of a particular piece of content or message, is at the center of India’s debate around rules for online platforms and communications ...

Impact of COVID-19 on the Internet Ecosystem in the Middle East and North Africa
This paper focuses on the challenges of addressing the COVID-19 crisis and its potential aftermath in the Middle East and North Africa (MENA) ...
Breaking Encryption Myths

In September 2020, a draft European Commission report called “Technical solutions to detect child sexual abuse in end-to-end encrypted communications” was leaked.1 The report gave an analysis of different ways ...

2020 Indigenous Connectivity Summit Policy Recommendations

Indigenous peoples in North America are pursuing innovative and independent ways to connect to the Internet. They face unique challenges to connectivity and, when it comes to policymaking, they are ...

Internet Way of Networking Use Case: Data Localization
This use case analyzes the effect that government policies regarding data localization may have on the Internet Way of Networking ...
Fact Sheet: Does quantum computing put our digital security at risk?
A paper explaining how quantum computing and encryption are related ...
Info Guide: For Youth by Youth: 3 Ways to ACT

Heading to a protest or just worried about snooping siblings? You definitely don’t want to be SMSing about it. You need something safer. 

You need to make sure the apps ...

Info Guide: Virtual schooling: 11 ways to keep your child safe online
Take a look through our back-to-school checklist that aims to help you, as a parent or guardian, make sure your child stays safe while learning online ...
Intermediary Liability Survey: Latin America

This report is a product of a crowdsourcing exercise designed to map current existing intermediary liability regimes in Latin American countries. Such an exercise was conducted with the full support ...

Internet Way of Networking Use Case: Intermediary Liability
Intermediary liability protection and the Internet Way of Networking ...

Archives

Info Guide: 6 Ways “Lawful Access” Puts Everyone’s Security At Risk
What is encryption?

Encryption is the process to scramble or hide information so it can only be read by someone with the means (or keys) to return it to ...

The Trust Opportunity: Exploring Consumer Attitudes to the Internet of Things

This new research from Consumers International and the Internet Society explored consumer perceptions and attitudes towards trust, security and the privacy of consumer Internet of Things (IoT) devices.

The survey ...

The economics of the security of consumer-grade IoT products and services
Security is often lacking in consumer IoT devices: an analysis of 10 of the most common types of consumer devices found that 70% contained serious vulnerabilities ...
2018 Online Trust Audit and Honor Roll

The Online Trust Audit & Honor Roll assesses nearly 1,200 organizations, recognizing excellence in online consumer protection, data security, and responsible privacy practices. This 10th annual audit of more than 1,200 predominantly consumer-facing ...

Best Practices: Infrastructure Security
  1. Optimize TLS implementation using information gleaned from public tools. This includes eliminating use of insecure ciphers and older, insecure protocols as well as vulnerabilities to the POODLE and ROBOT ...
Best Practices: Privacy

  • Make sure the privacy statement has a link and is easily discoverable from the home page.
  • Place the revision date of the statement at the top ...
DNS Privacy Frequently Asked Questions (FAQ)
Almost every time we use an Internet application, it starts with a Domain Name System (DNS) transaction to map a human-friendly domain name into a set of IP addresses that ...
IPv6 Security for IPv4 Engineers
This document provides an overview of IPv6 security that is specifically aimed at IPv4 engineers and operators. Rather than describing IPv6 in an isolated manner, it aims to re-use as ...
Introduction to DNS Privacy
Almost every time we use an Internet application, it starts with a Domain Name System (DNS) transaction to map a human-friendly domain name into a set of IP addresses that ...
IPv6 Security Frequently Asked Questions (FAQ)

The Internet Society recognises that global deployment of the IPv6 protocol is paramount to accommodate the present and future growth of the Internet. Given the scale at which IPv6 must ...

10 Goals for Good Privacy Protection Law
The concept of digital “privacy” refers to an individual’s right to determine when, how, and to what extent their personal data can be shared. Privacy is essential to our ability ...
9 Steps Companies Must Take to Ensure Data Privacy
Many Internet companies have extraordinary access to individuals’ personal data – their actions, their friends, their preferences, their interests – and their most intimate secrets. These companies should handle this ...

Organization Reports

On annual basis, we publish annual reports (an Action Plan and Impact Report), as well as financial reports, annual financial statements, and Form 990s.