Resource Library

Everyone should have access to an open and trusted Internet.
Read our reports, papers, and other documents for insight and vision on how we can get there.

illustration of shield icon and other icons around it

Action Plan 2023

Our roadmap for tackling the threats and challenges for today’s Internet as we look to grow and strengthen it for future generations.

a navy globe icon in the center and blue lines around it on white and neutral background

Impact Report 2022

In a year of upheaval, the Internet connected us to reliable information, social connection, and opportunity. Find out how we addressed threats and connected underserved populations.

forest trees from above

Internet Impact Briefs

Shorter reports that analyze how different policies or new technologies may affect what the Internet needs to exist and thrive.

Global Internet Report (GIR)

From trust to consolidation, access to sustainability, a deep look at the forces shaping our digital future.

Policy Briefs

Our perspective on critical Internet issues, including community networks, encryption, open Internet standards, Internet Exchange Points, and more.

ITU Plenipotentiary 2022 Summary Issues – Matrix

We have analyzed proposals to the ITU Plenipotentiary 2022 (PP22) conference that may impact the future development of the Internet ...

Background Paper on ITU Plenipotentiary 2022

Read about the ITU Plenipotentiary Conference 2022 and our perspectives on some of the main issues which may be discussed ...

Internet Impact Brief: European Commission Proposal to Prevent and Combat Child Sexual Abuse

Read how limitations on encryption arising from the CSA Proposal would move the Internet further from its potential as an open, globally connected, secure, and trustworthy resource for all ...

Internet Impact Brief: Proposals to Regulate Content Moderation on Social Media Platforms in Brazil

Read how Brazilian Bill 3227/2021 may affect the Internet by impacting what it needs to thrive as an open, globally connected, secure, and trusted resource for all people involved ...

Internet Impact Brief: India CERT-In Cybersecurity Directions 2022

Read how the draft regulation may affect Internet development in India, and more broadly, the health of the global Internet ...

World Telecommunications Development Conference 2022 Background Paper

This document will help you understand the WTDC's role, its importance, and major opportunities of engagement ...

World Telecommunication Development Conference 2022 Issues Matrix

The matrix summarizes the proposed changes to Internet-related WTDC-17 resolutions (including new resolutions) ...

How To Protect the Internet from Becoming the Splinternet

The splinternet is the idea that the open, globally connected Internet we all use splinters into a collection of isolated networks controlled by governments or corporations ...

Internet Impact Brief: South Korea’s Interconnection Rules

Read how a series of enacted and proposed revisions of Telecommunications Business Act in South Korea affect further Internet development ...

Community Network Readiness Assessment Handbook

Find out if a community is ready to deploy and maintain a community network, and take steps to plan and build one ...

Quick Analysis – The Impact of Efforts to Disconnect Russia from the Internet

Read how some of the proposals and actions to disconnect Russia impact the global Internet ...

Internet Impact Brief: Impact of Ukraine’s Requests to Block Russia’s Access to the Internet

Learn how politically motivated actions to prevent people from accessing the global Internet would cause significant harm to the open, globally connected, secure and trustworthy Internet ...

Archives

Internet Society Position on Internet Shutdowns

The Internet Society believes Internet shutdowns harm societies, economies, and the global Internet infrastructure ...

A Multi-Stakeholder Model in ICT Policymaking

The multistakeholder model, an established approach for Internet governance, lends itself to ideal use in policymaking for the digital era--an environment that is increasingly made up of various actors that ...

Security Factsheet: Keeping Your Workplace Safe Online

For many of us the Internet is a staple in our day-to-day lives – especially at our jobs. But did you know that by simply connecting your device to WiFi ...

Security Factsheet: Why Should Municipalities Make Network and Data Security a Priority?

Communities can minimize risk by being intentional about how and by whom networks and devices are used. These are eight best practices for municipal governments to optimize security ...

Encryption: Essential for the LGBTQ+ Community

For some communities, like LGBTQ+ communities, encryption is especially crucial in keeping people safe both online and in real life ...

Online Trust Audit – 2020 U.S. Presidential Campaigns

Given increased concerns about security and privacy in the political realm and the continuing drumbeat of high-profile data breaches, we conducted an Audit of the websites and email practices of ...

2019 Online Trust Audit Methodology 

The 2019 Online Trust Audit will represent the 11th independent analysis and benchmark report of the adoption of security standards and responsible privacy practices. This methodology reflects comments received in response to the Internet Society’s ...

Policy Brief: IoT Privacy for Policymakers

The Internet of Things, or IoT, is the latest wave of integration of technology into our lives and surroundings. This rapidly-spreading new generation of devices brings cameras, microphones, sensors, computing, ...

Are Organizations Ready for New Privacy Regulations?

Based on 1,200 privacy statements, many are not prepared for coming regulations ...

2019 Online Trust Audit and Honor Roll

The 2019 Online Trust Audit & Honor Roll will represent the 11th independent analysis and benchmark report of the adoption of security standards and responsible privacy practices. 

Sites  are eligible to ...

2018 Cyber Incident & Breach Trends Report

This year’s report includes ransomware, business email compromise (BEC), distributed denial-of-service (DDoS) attacks, connected device vulnerability, and more ...

Policy Brief: Principles for Responsible Data Handling

More and more of our activities generate data which is collected and used in ways we don't see and can't control. While the data is used for analytics and targeted ...

Organization Reports

On annual basis, we publish annual reports (an Action Plan and Impact Report), as well as financial reports, annual financial statements, and Form 990s.