Resource Library

Everyone should have access to an open and trusted Internet.
Read our reports, papers, and other documents for insight and vision on how we can get there.

illustration of shield icon and other icons around it

Action Plan 2023

Our roadmap for tackling the threats and challenges for today’s Internet as we look to grow and strengthen it for future generations.

a navy globe icon in the center and blue lines around it on white and neutral background

Impact Report 2022

In a year of upheaval, the Internet connected us to reliable information, social connection, and opportunity. Find out how we addressed threats and connected underserved populations.

forest trees from above

Internet Impact Briefs

Shorter reports that analyze how different policies or new technologies may affect what the Internet needs to exist and thrive.

Global Internet Report (GIR)

From trust to consolidation, access to sustainability, a deep look at the forces shaping our digital future.

Policy Briefs

Our perspective on critical Internet issues, including community networks, encryption, open Internet standards, Internet Exchange Points, and more.

Internet Impact Brief: How Refusing Russian Networks Will Impact the Internet

Read how actions to block networks from accessing the global Internet cause significant harm what the Internet needs to exist and thrive, and the ability of people to use it ...

Path to 2025

A strategy that advances our enduring vision: The Internet is for everyone ...

Internet Impact Brief: Bangladesh: Regulation for Digital, Social Media and OTT Platforms, 2021

Finds that the provisions outlined in the draft regulation could have serious repercussions on the usefulness of the Internet for Bangladesh and its people ...

Impact of COVID-19 on the Internet Ecosystem in Bangladesh, Bhutan, and Pakistan

Internet performance was negatively affected in Bangladesh, Bhutan, and Pakistan during the lockdown period of the COVID-19 pandemic ...

Huawei’s “New IP” Proposal – Frequently Asked Questions

What is "New IP" Proposal, who is promoting and supporting it, what are the key concerns about it and other questions and answers about this proposal ...

Internet Impact Brief: Nigeria’s Protection from Internet Falsehood and Manipulation Bill 2019

Finds that implementing the regulatory measures described in the proposed Protection from Internet Falsehood and Manipulation Bill 2019 would negatively affect the performance, resilience, trustworthiness and security of the Internet ...

Internet Impact Brief: Cambodia National Internet Gateway

Outlines how the decree would undermine three of five critical properties of the Internet Way of Networking and negatively impact all four of the qualities that maximize the Internet’s potential ...

MANRS Community Report 2021

The world needs a secure and resilient Internet, especially in the face of an ongoing pandemic still driving more activity and more people online ...

Internet Impact Brief: End-to-end Encryption under the UK’s Draft Online Safety Bill

This brief uses the Internet Impact Assessment Toolkit (IIAT) to assess how the limitations placed on the use of end-to-end encryption under the UK’s Online Safety Bill may affect the ...

2021 Indigenous Connectivity Summit Policy Recommendations

Indigenous Peoples in North America are pursuing innovative and independent ways to connect to the Internet. They face unique challenges to connectivity and, when it comes to policymaking, they ...

Enablers of an Open, Globally Connected, Secure and Trustworthy Internet

The Enablers of an Open, Globally Connected, Secure and Trustworthy Internet are what help us get closer to the Internet we all want – now and in the future ...

How to Conduct an Internet Impact Brief

Find simple explanations of the goals, critical properties and enablers of the Internet, and a step-by-step guide to conducting and writing your own Internet impact brief ...

Archives

The State of User Privacy and Trust Online

In the 2019 CIGI-Ipsos Global Survey on Internet Security and Trust, Internet users point to cybercriminals, Internet companies, other Internet users, and governments as major sources of their distrust in ...

Net Neutrality Experts’ Roundtable Series Process Report

The United States needs an approach that upholds the core principles of an open Internet and provides market stability; it also needs a solution that puts consumer rights at the ...

Net Neutrality Legislation: A Framework for Consensus

Note: The Net Neutrality Principles do not represent the views of the Internet Society, nor any of its Chapters, members, partners or any of the participating organizations. Rather, they ...

Enhancing IoT Security: Final Outcomes and Recommendations Report

The Internet of Things (IoT) carries enormous potential to change the world for the better. Projections for the impact of IoT on the Internet and the global economy are impressive, ...

Info Guide: 6 Ways “Lawful Access” Puts Everyone’s Security At Risk

What is encryption?

Encryption is the process to scramble or hide information so it can only be read by someone with the means (or keys) to return it to ...

The Trust Opportunity: Exploring Consumer Attitudes to the Internet of Things

This new research from Consumers International and the Internet Society explored consumer perceptions and attitudes towards trust, security and the privacy of consumer Internet of Things (IoT) devices. The survey ...

The economics of the security of consumer-grade IoT products and services

Security is often lacking in consumer IoT devices: an analysis of 10 of the most common types of consumer devices found that 70% contained serious vulnerabilities ...

2018 Online Trust Audit and Honor Roll

The Online Trust Audit & Honor Roll assesses nearly 1,200 organizations, recognizing excellence in online consumer protection, data security, and responsible privacy practices. This 10th annual audit of more than 1,200 predominantly consumer-facing ...

Best Practices: Infrastructure Security

  1. Optimize TLS implementation using information gleaned from public tools. This includes eliminating use of insecure ciphers and older, insecure protocols as well as vulnerabilities to the POODLE and ROBOT ...

Best Practices: Privacy

  • Make sure the privacy statement has a link and is easily discoverable from the home page.
  • Place the revision date of the statement at the top ...

DNS Privacy Frequently Asked Questions (FAQ)

Almost every time we use an Internet application, it starts with a Domain Name System (DNS) transaction to map a human-friendly domain name into a set of IP addresses that ...

IPv6 Security for IPv4 Engineers

This document provides an overview of IPv6 security that is specifically aimed at IPv4 engineers and operators. Rather than describing IPv6 in an isolated manner, it aims to re-use as ...

Organization Reports

On annual basis, we publish annual reports (an Action Plan and Impact Report), as well as financial reports, annual financial statements, and Form 990s.