Resource Library

Everyone should have access to an open and trusted Internet.
Read our reports, papers, and other documents for insight and vision on how we can get there.

Action Plan 2022

Our roadmap for tackling the threats and challenges for today’s Internet as we look to grow and strengthen it for future generations.

global map with 11 icons
Impact Report 2021

As the world is shifting, we need the Internet more than ever. Learn what the Internet Society is doing to help ensure no one is left behind.

Global Internet Report (GIR)

From trust to consolidation, access to sustainability, a deep look at the forces shaping our digital future.

Policy Briefs

Our perspective on critical Internet issues, including community networks, encryption, open Internet standards, Internet Exchange Points, and more.

Measuring the Impact of Local IXPs

How do local Internet exchanges affect Asia-Pacific? Internet exchange point hubs are increasingly playing a critical role in making local Internet faster and more affordable. So how does the ...

Factsheet: How Encryption Can Protect Advocacy Groups and Social Change Movements

Encryption is a tool designed to help Internet users keep their online data and communications private and secure. It plays a critical role in protecting day-to-day digital activities like ...

Internet Impact Brief: Revised Directive on Security of Network and Information (NIS2) – Presidency Compromise Proposal September 2021
This report uses the Internet Impact Assessment Toolkit (IIAT) to assess how the Presidency compromise proposal from 21 September 2021 may affect the global Internet by impacting what the Internet ...
Reimagining the Summit on Community Networks in Africa during the COVID-19 Pandemic

With almost half the world’s population offline and left out, there has been one clear lesson from the COVID-19 pandemic. Access to affordable Internet connectivity and digital ...

Security Through Encryption and Despite Encryption: An (un)Achievable Outcome?
On 16 June 2021 we organised a roundtable to explore in greater detail how to apply the European Council’s position on encryption, following its November 2020 Resolution; “Security through encryption ...
Internet Governance in the Middle East and North Africa
The Internet is a ‘network of networks’ made up of tens of thousands of networks that interconnect and route traffic efficiently between end points. While the interconnections and routing of ...
Moving Toward an Interconnected Africa: The 80/20 Initiative

In 2010, the Africa Internet technical community embraced an ambitious vision to have 80% of all Internet traffic locally accessible with only 20% being sourced internationally by 2020.

...
Effective IXP strategies for the Asia-Pacific
In partnership with the Asia Pacific Internet Exchange Association (APIX), we set out to explore how different exchanges fit into their local environment to find best strategies and approaches they ...
The Economic Impact of Laws that Weaken Encryption

In 2018 the Australian parliament passed the Telecommunications and Other Legislation Amendment (Assistance and Access) Act (TOLA) 2018, expanding the government's powers to bypass digital data protections, and bringing with ...

Mauritius IGF and Internet Society Response to Mauritius ICTA Consultation Paper
The Mauritius IGF and the Internet Society's input to the proposed amendments to the ICT ACT for regulating the use and addressing the abuse and misuse of Social Media in ...
Encryption unlocks the benefits of a thriving, trustworthy Internet
This analysis is intended to help policymakers worldwide understand how encryption operates throughout the Internet’s infrastructure, and not just in the applications so many of us use each day ...
Guide to Federal Broadband Funding Opportunities in the U.S.
This guide offers an overview of federal funding options that could provide financial support to Tribal, state, and local governments and utilities in their efforts to expand broadband infrastructure ...

Archives

Enhancing IoT Security: Final Outcomes and Recommendations Report
The Internet of Things (IoT) carries enormous potential to change the world for the better. Projections for the impact of IoT on the Internet and the global economy are impressive, ...
Info Guide: 6 Ways “Lawful Access” Puts Everyone’s Security At Risk
What is encryption?

Encryption is the process to scramble or hide information so it can only be read by someone with the means (or keys) to return it to ...

The Trust Opportunity: Exploring Consumer Attitudes to the Internet of Things

This new research from Consumers International and the Internet Society explored consumer perceptions and attitudes towards trust, security and the privacy of consumer Internet of Things (IoT) devices.

The survey ...

The economics of the security of consumer-grade IoT products and services
Security is often lacking in consumer IoT devices: an analysis of 10 of the most common types of consumer devices found that 70% contained serious vulnerabilities ...
2018 Online Trust Audit and Honor Roll

The Online Trust Audit & Honor Roll assesses nearly 1,200 organizations, recognizing excellence in online consumer protection, data security, and responsible privacy practices. This 10th annual audit of more than 1,200 predominantly consumer-facing ...

Best Practices: Infrastructure Security
  1. Optimize TLS implementation using information gleaned from public tools. This includes eliminating use of insecure ciphers and older, insecure protocols as well as vulnerabilities to the POODLE and ROBOT ...
Best Practices: Privacy

  • Make sure the privacy statement has a link and is easily discoverable from the home page.
  • Place the revision date of the statement at the top ...
DNS Privacy Frequently Asked Questions (FAQ)
Almost every time we use an Internet application, it starts with a Domain Name System (DNS) transaction to map a human-friendly domain name into a set of IP addresses that ...
IPv6 Security for IPv4 Engineers
This document provides an overview of IPv6 security that is specifically aimed at IPv4 engineers and operators. Rather than describing IPv6 in an isolated manner, it aims to re-use as ...
Introduction to DNS Privacy
Almost every time we use an Internet application, it starts with a Domain Name System (DNS) transaction to map a human-friendly domain name into a set of IP addresses that ...
IPv6 Security Frequently Asked Questions (FAQ)

The Internet Society recognises that global deployment of the IPv6 protocol is paramount to accommodate the present and future growth of the Internet. Given the scale at which IPv6 must ...

10 Goals for Good Privacy Protection Law
The concept of digital “privacy” refers to an individual’s right to determine when, how, and to what extent their personal data can be shared. Privacy is essential to our ability ...

Organization Reports

On annual basis, we publish annual reports (an Action Plan and Impact Report), as well as financial reports, annual financial statements, and Form 990s.