Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Updating the Whole Net Neutrality Situation

Updating the Whole Net Neutrality Situation

Net Neutrality in the United States has been a hot-button issue for almost anyone that uses the Internet. 2018 saw the 2005 principles governing the preservation of an open Internet repealed completely, leaving control over the Internet in the hands of huge companies that deliver Internet services to people. Today, we’ll go back over Net Neutrality and provide an update of what has happened since the Federal Communications Commission repeal of net neutrality laws.

Commercially available Internet services have been available since the early 1990s, but as broadband was being implemented, the Internet, and investment in the medium was strong. In an attempt to keep control of the Internet distributed among the people that utilize the service, and not massive corporations looking to gain control over it, the Federal Communications Commission (FCC) under chair Kathleen Abernathy adopted neutrality principles “to preserve and promote the vibrant and open character of the Internet as the telecommunications marketplace enters the broadband age” in 2005.

For seven years, lawmakers attempted to pass bills in Congress that would secure an open future for the Internet. All of these attempts failed, leaving the future of who would control the Internet up in the air. The fear was that ISPs, which are typically huge multinational conglomerates, would be able to control bandwidth with cost, as they do with their television services. Internet freedom advocates considered the price discrimination that would arise from “local monopolies enshrined in law” to be at the helm of what has proven to be the most remarkable invention in human history, counterproductive for the establishment of an open and useful construct.

Years of litigation followed. Cases such as Verizon Communications Inc. vs. FCC, which ruled that the FCC had no regulatory power over the Internet because it was, in fact, not actually a utility, and thus, governed under Title I of the Communications Act of 1934. Immediately after this ruling, the FCC took steps to reclassify Internet delivery services into a public utility, which are governed under Title II of the Act. In February of 2015, the classifications were officially challenged as voting members agreed that Internet services met the criteria of a utility under Title II of the Communications Act of 1934 and the more recent Telecommunications Act of 1996. In April of 2015 “net neutrality” was upheld by officially declaring Internet services as a utility. The rules officially went into effect the following June.

The “final rule” turned out to be short lived, however. In April of 2017, the FCC proposed to repeal the policies that governed net neutrality, and return control to the corporations that invest in and provide broadband services. The proposed changes were met with heavy consternation, with over 20 million people providing comments during the public discourse phase of the process. It was later found that millions of the comments made in support of net neutrality repeal were made fraudulently by foreign actors. Despite the overwhelming dissention of the mass of people, the FCC repealed the net neutrality policies and followed it with a hefty amount of propaganda material claiming that the decision was “restoring Internet freedom”. The repeal became official in June of 2018.

What Is Going on with Net Neutrality Now?
Almost immediately after the change was made there have been several lawsuits filed and they seem to keep coming. States, advocacy groups, neutrality lobbies, and companies have all started lawsuits against the FCC both for their handling of the situation and for the repeal of net neutrality itself.

One way to ascertain if it has been a benefit is by looking at the claims the FCC made before dismantling the mandate:

  1. Net Neutrality is hindering broadband investment. In 2018 what is known as the Big Four--Verizon, AT&T, Charter, and Comcast--collectively spent less in broadband projects than they did in 2017. It was the first time in three years that investment has dropped.
  2. It doesn’t make sense for ISPs to throttle Internet traffic. The Big Four reportedly slowed internet traffic without telling customers not more than six weeks after the repeal. Sites like YouTube, Netflix, and Amazon Prime were the most targeted. Verizon was especially culpable as it was found to slow data speeds that led to slower EMS response times; a major problem as firefighters were battling massive fires in California.

The issue isn’t totally devoid of common ground, however. Almost everyone believes that ISPs shouldn’t be able to flex their muscles, so to speak. One way this is happening is that there is a push to restore older FCC mandates that prohibited ISPs to enact anticompetitive and harmful practices. Basically, everyone wants a fast, open, and unobstructed Internet, but the disagreement, usually on party lines, is who is responsible for the regulation.

An extreme majority of people support net neutrality. Most people want to return oversight over the Internet to the bureaucracy, as they believe that corporations whose stated purpose is to make profit aren’t the best organizations to manage something as important as access to the Internet, despite being the companies that sell that access. Time will tell who is right.

If you would like to do something about it, go to https://www.battleforthenet.com/ and sign up. Do you believe market forces will keep ISPs honest, and the Internet open? Leave your thoughts in the comments section below.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 November 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Google Business Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications IT Support Business Continuity Smartphones Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Managed IT Services Windows Phishing Upgrade Outsourced IT Ransomware Data Backup Windows 10 Server Save Money Data Recovery Office Cloud Computing Windows 10 Passwords Social Media Chrome Virtualization Gadgets Tech Term Saving Money Holiday Automation Microsoft Office Managed Service Managed IT Services Operating System Cybercrime Computers Artificial Intelligence Facebook Hacking Health Internet of Things Wi-Fi BYOD Mobile Device Management Networking IT Support Information Technology Managed Service Provider Information Remote Alert Spam Office 365 Covid-19 Telephone Systems Social Engineering Router Recovery Employer-Employee Relationship Mobility BDR Bandwidth Applications Big Data Human Resources Law Enforcement Data Breach Mobile Computing Remote Monitoring Application Password Money App History Encryption Blockchain Data Storage Patch Management VPN Paperless Office Government Remote Computing Private Cloud Mobile Office Managed IT Apps How To Office Tips Training Google Drive Gmail Vulnerability Settings Windows 7 Word Avoiding Downtime Two-factor Authentication Servers Flexibility Infrastructure Voice over Internet Protocol Marketing Mouse WiFi HaaS IT solutions Entertainment Bring Your Own Device Website Data Security Data Management Budget Work/Life Balance Wireless Safety Lithium-ion battery Sports HIPAA Conferencing Redundancy Telephone System Staff Keyboard Software as a Service Scam Firewall Machine Learning Connectivity Remote Work Virtual Reality Apple Vendor Management Social Save Time User Error Vendor Meetings USB Managed Services Cleaning Display Data Protection Risk Management Hacker End of Support Employee/Employer Relationship Education Physical Security RMM The Internet of Things Access Control SharePoint Computing Virtual Assistant PDF Authentication Customer Service Proactive IT Business Intelligence Environment Digital Signage Fax Server Audit Worker Best Practice YouTube Update IT Management Black Market Virus SaaS Botnet Google Docs Unified Threat Management IT Plan Procurement Computer Accessories Net Neutrality Workplace Strategy Identity Theft Document Management Help Desk Wireless Technology Network Congestion Unsupported Software Solid State Drive Printing How to Downtime eWaste Charger Augmented Reality Printer Data storage Compliance Fraud Bluetooth Automobile OneNote Managed Services Provider Computer Care Current Events Remote Worker Telephony Database Wearable Technology Cryptocurrency Retail Computing Infrastructure Hard Drives Samsung Going Green Remote Workers Instant Messaging Robot Excel IT Consultant Processor Value Comparison Biometrics Battery Virtual Desktop Spam Blocking Electronic Medical Records CES Humor Hard Drive Shadow IT Legal DDoS Hiring/Firing Business Technology Content Management Internet Exlporer webinar Smartwatch Printers Emergency Consultant Ergonomics Millennials Tip of the week Distributed Denial of Service Wireless Charging Analytics Professional Services Development Customer Relationship Management Public Cloud OLED Employer Employee Relationship Notifications Smart Office PCI DSS Virtual Machine Analyitcs Assessment Programming Employee Virtual Private Network Best Available 2FA Workforce Windows Server 2008 Fiber Optics Cables Tools Messaging Cabling Relocation WIndows 7 Policy Hypervisor Television Trend Micro Video Games Project Management Nanotechnology Dark mode Antivirus Telecommuting Cortana SMS Worker Commute Default App Windows 8 Public Computer Digital Signature Procedure Experience IT service Saving Time Regulations Shopping Scalability Google Search Warranty Transportation dark theme User Google Apps PowerPoint AI Business Owner Windows Media Player Computer Fan IT Infrastructure Tablet Rootkit HVAC Bing NarrowBand Analysis FinTech Domains Social Network Search Workers Administrator Benefits Devices Managing Stress IaaS Maintenance FENG Investment iPhone Enterprise Content Management IBM MSP Accountants Employees Employee/Employer Relationships Bloatware Cameras Flash ISP Microchip Smart Technology Thought Leadership Windows 365 Credit Cards Password Manager Video Conferencing ROI Files Tablets Password Management Supercomputer Shortcuts Chromecast Sales Multi-Factor Security Software Tips Bitcoin Entrepreneur Sync Personal Emails Cryptomining Search Engine Twitter Point of Sale NIST Business Mangement Supply Chain Management Shortcut Colocation Uninterrupted Power Supply Smart Tech Monitoring Trending Batteries Cost Management Amazon Printer Server Digitize Social Networking Netflix Monitor Two Factor Authentication Addiction Windows 8.1 Recycling Root Cause Analysis Windows Server 2008 R2 Knowledge Wiring Music Practices Customer relationships HBO Amazon Web Services Skype IT Assessment Manufacturing Reputation Streaming Media Cache Email Best Practices Running Cable Safe Mode Criminal Content Data loss Memory Tech Support Leadership Security Cameras Laptop GDPR Troubleshooting Hosted Computing Computer Tips Outlook Managed IT Service Techology Online Shopping Start Menu OneDrive Biometric Security Customers Wireless Internet Virtual CIO File Sharing Peripheral Audiobook Screen Mirroring Loyalty Touchpad Camera Books Inventory Digital Security Cameras Specifications Frequently Asked Questions Using Data Evernote Mobile Copiers Windows 10s 5G Science Wire Quick Tip Politics Travel Cast Advertising

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code