Resource Library

Everyone should have access to an open and trusted Internet.
Read our reports, papers, and other documents for insight and vision on how we can get there.

Action Plan 2022

Our roadmap for tackling the threats and challenges for today’s Internet as we look to grow and strengthen it for future generations.

global map with 11 icons
Impact Report 2021

As the world is shifting, we need the Internet more than ever. Learn what the Internet Society is doing to help ensure no one is left behind.

forest trees from above
Internet Impact Briefs

Shorter reports that analyze how different policies or new technologies may affect what the Internet needs to exist and thrive.

Global Internet Report (GIR)

From trust to consolidation, access to sustainability, a deep look at the forces shaping our digital future.

Policy Briefs

Our perspective on critical Internet issues, including community networks, encryption, open Internet standards, Internet Exchange Points, and more.

Internet Impact Brief: Mandated Browser Root Certificates in the European Union’s eIDAS Regulation on the Internet
This report uses the Internet Impact Assessment Toolkit (IIAT) to assess how the EU’s proposal may affect the global Internet by impacting what the Internet needs to thrive as an ...
Internet Impact Brief: 2021 Indian Intermediary Guidelines and the Internet Experience in India
This report uses the Internet Impact Assessment Toolkit to assess how the 2021 Indian Intermediary Guidelines may affect the global Internet by impacting what the Internet needs to thrive as ...
Internet Impact Brief: Canada’s Proposed Online Harms Legislation and the Internet
This report uses the Internet Impact Assessment Toolkit (IIAT) to assess how the Canada’s proposed online harms bill may affect the global Internet by impacting what the Internet needs to ...
Internet Impact Brief: Technical Architecture of the GAIA-X Project
This report uses the Internet Impact Assessment Toolkit (IIAT) to assess how the GAIA-X concepts may affect the global Internet by impacting what the Internet needs to thrive as an ...
Measuring the Impact of Local IXPs

How do local Internet exchanges affect Asia-Pacific? Internet exchange point hubs are increasingly playing a critical role in making local Internet faster and more affordable. So how does the ...

Factsheet: How Encryption Can Protect Advocacy Groups and Social Change Movements

Encryption is a tool designed to help Internet users keep their online data and communications private and secure. It plays a critical role in protecting day-to-day digital activities like ...

Internet Impact Brief: Revised Directive on Security of Network and Information (NIS2) – Presidency Compromise Proposal September 2021
This report uses the Internet Impact Assessment Toolkit (IIAT) to assess how the Presidency compromise proposal from 21 September 2021 may affect the global Internet by impacting what the Internet ...
Reimagining the Summit on Community Networks in Africa during the COVID-19 Pandemic

With almost half the world’s population offline and left out, there has been one clear lesson from the COVID-19 pandemic. Access to affordable Internet connectivity and digital ...

Security Through Encryption and Despite Encryption: An (un)Achievable Outcome?
On 16 June 2021 we organised a roundtable to explore in greater detail how to apply the European Council’s position on encryption, following its November 2020 Resolution; “Security through encryption ...
Internet Governance in the Middle East and North Africa
The Internet is a ‘network of networks’ made up of tens of thousands of networks that interconnect and route traffic efficiently between end points. While the interconnections and routing of ...
Moving Toward an Interconnected Africa: The 80/20 Initiative

In 2010, the Africa Internet technical community embraced an ambitious vision to have 80% of all Internet traffic locally accessible with only 20% being sourced internationally by 2020.

...
Effective IXP strategies for the Asia-Pacific
In partnership with the Asia Pacific Internet Exchange Association (APIX), we set out to explore how different exchanges fit into their local environment to find best strategies and approaches they ...

Archives

Net Neutrality Experts’ Roundtable Series Process Report
The United States needs an approach that upholds the core principles of an open Internet and provides market stability; it also needs a solution that puts consumer rights at the ...
Net Neutrality Legislation: A Framework for Consensus

Note: The Net Neutrality Principles do not represent the views of the Internet Society, nor any of its Chapters, members, partners or any of the participating organizations. Rather, they ...

Enhancing IoT Security: Final Outcomes and Recommendations Report
The Internet of Things (IoT) carries enormous potential to change the world for the better. Projections for the impact of IoT on the Internet and the global economy are impressive, ...
Info Guide: 6 Ways “Lawful Access” Puts Everyone’s Security At Risk
What is encryption?

Encryption is the process to scramble or hide information so it can only be read by someone with the means (or keys) to return it to ...

The Trust Opportunity: Exploring Consumer Attitudes to the Internet of Things

This new research from Consumers International and the Internet Society explored consumer perceptions and attitudes towards trust, security and the privacy of consumer Internet of Things (IoT) devices.

The survey ...

The economics of the security of consumer-grade IoT products and services
Security is often lacking in consumer IoT devices: an analysis of 10 of the most common types of consumer devices found that 70% contained serious vulnerabilities ...
2018 Online Trust Audit and Honor Roll

The Online Trust Audit & Honor Roll assesses nearly 1,200 organizations, recognizing excellence in online consumer protection, data security, and responsible privacy practices. This 10th annual audit of more than 1,200 predominantly consumer-facing ...

Best Practices: Infrastructure Security
  1. Optimize TLS implementation using information gleaned from public tools. This includes eliminating use of insecure ciphers and older, insecure protocols as well as vulnerabilities to the POODLE and ROBOT ...
Best Practices: Privacy

  • Make sure the privacy statement has a link and is easily discoverable from the home page.
  • Place the revision date of the statement at the top ...
DNS Privacy Frequently Asked Questions (FAQ)
Almost every time we use an Internet application, it starts with a Domain Name System (DNS) transaction to map a human-friendly domain name into a set of IP addresses that ...
IPv6 Security for IPv4 Engineers
This document provides an overview of IPv6 security that is specifically aimed at IPv4 engineers and operators. Rather than describing IPv6 in an isolated manner, it aims to re-use as ...
Introduction to DNS Privacy
Almost every time we use an Internet application, it starts with a Domain Name System (DNS) transaction to map a human-friendly domain name into a set of IP addresses that ...

Organization Reports

On annual basis, we publish annual reports (an Action Plan and Impact Report), as well as financial reports, annual financial statements, and Form 990s.