Library shelves with books

Resource Library

Everyone should have access to an open and trusted Internet.
Read our reports, papers, and other documents for insight and vision on how we can get there.

Action Plan 2024

Our roadmap for tackling the threats and challenges for today’s Internet as we look to grow and defend it for future generations.

Krishna waiting as a helicopter slinging a load of goods

2023 Year in Review

The Year in Review shows the steps we took in 2023 to ensure the Internet is for everyone. Learn about the positive difference we made for the Internet.

forest trees from above

Internet Impact Briefs

Shorter reports that analyze how different policies or new technologies may affect what the Internet needs to exist and thrive.

Panorama of a city

Global Internet Report (GIR)

From trust to consolidation, access to sustainability, a deep look at the forces shaping our digital future.

Blue background with pattern

Policy Briefs

Our perspective on critical Internet issues, including community networks, encryption, open Internet standards, Internet Exchange Points, and more.

Internet Impact Brief: How the US EARN IT Act Threatens Security, Confidentiality, and Safety Online

Read how the US EARN IT Act poses an existential threat to the Internet safety and security by preventing service providers from using end-to-end encryption ...

Internet Impact Brief: Draft Indian Telecommunication Bill 2022

Read how the draft telecommunication bill may affect Internet-based services in India, and more broadly, the health of the global Internet ...

Financing Mechanisms for Locally Owned Internet Infrastructure

The report analyzes the operating models and financing mechanisms that can support the community connectivity providers ...

ITU Plenipotentiary 2022 Summary Issues – Matrix

We have analyzed proposals to the ITU Plenipotentiary 2022 (PP22) conference that may impact the future development of the Internet ...

Background Paper on ITU Plenipotentiary 2022

Read about the ITU Plenipotentiary Conference 2022 and our perspectives on some of the main issues which may be discussed ...

Internet Impact Brief: European Commission Proposal to Prevent and Combat Child Sexual Abuse

Read how limitations on encryption arising from the CSA Proposal would move the Internet further from its potential as an open, globally connected, secure, and trustworthy resource for all ...

Internet Impact Brief: Proposals to Regulate Content Moderation on Social Media Platforms in Brazil

Read how Brazilian Bill 3227/2021 may affect the Internet by impacting what it needs to thrive as an open, globally connected, secure, and trusted resource for all people involved ...

Internet Impact Brief: India CERT-In Cybersecurity Directions 2022

Read how the draft regulation may affect Internet development in India, and more broadly, the health of the global Internet ...

World Telecommunications Development Conference 2022 Background Paper

This document will help you understand the WTDC's role, its importance, and major opportunities of engagement ...

World Telecommunication Development Conference 2022 Issues Matrix

The matrix summarizes the proposed changes to Internet-related WTDC-17 resolutions (including new resolutions) ...

How To Protect the Internet from Becoming the Splinternet

The splinternet is the idea that the open, globally connected Internet we all use splinters into a collection of isolated networks controlled by governments or corporations ...

Internet Impact Brief: South Korea’s Interconnection Rules

Read how a series of enacted and proposed revisions of Telecommunications Business Act in South Korea affect further Internet development ...

Archives

2019 Online Trust Audit and Honor Roll

The 2019 Online Trust Audit & Honor Roll will represent the 11th independent analysis and benchmark report of the adoption of security standards and responsible privacy practices. 

Sites  are eligible to ...

2018 Cyber Incident & Breach Trends Report

This year’s report includes ransomware, business email compromise (BEC), distributed denial-of-service (DDoS) attacks, connected device vulnerability, and more ...

Policy Brief: Principles for Responsible Data Handling

More and more of our activities generate data which is collected and used in ways we don't see and can't control. While the data is used for ...

The State of User Privacy and Trust Online

In the 2019 CIGI-Ipsos Global Survey on Internet Security and Trust, Internet users point to cybercriminals, Internet companies, other Internet users, and governments as major sources of their distrust in ...

Net Neutrality Experts’ Roundtable Series Process Report

The United States needs an approach that upholds the core principles of an open Internet and provides market stability; it also needs a solution that puts consumer rights at the ...

Net Neutrality Legislation: A Framework for Consensus

Note: The Net Neutrality Principles do not represent the views of the Internet Society, nor any of its Chapters, members, partners or any of the participating organizations. Rather, they ...

Enhancing IoT Security: Final Outcomes and Recommendations Report

The Internet of Things (IoT) carries enormous potential to change the world for the better. Projections for the impact of IoT on the Internet and the global economy are impressive, ...

Info Guide: 6 Ways “Lawful Access” Puts Everyone’s Security At Risk

What is encryption?

Encryption is the process to scramble or hide information so it can only be read by someone with the means (or keys) to return it to ...

The Trust Opportunity: Exploring Consumer Attitudes to the Internet of Things

This new research from Consumers International and the Internet Society explored consumer perceptions and attitudes towards trust, security and the privacy of consumer Internet of Things (IoT) devices. The survey ...

The economics of the security of consumer-grade IoT products and services

Security is often lacking in consumer IoT devices: an analysis of 10 of the most common types of consumer devices found that 70% contained serious vulnerabilities ...

2018 Online Trust Audit and Honor Roll

The Online Trust Audit & Honor Roll assesses nearly 1,200 organizations, recognizing excellence in online consumer protection, data security, and responsible privacy practices. This 10th annual audit of more than 1,200 predominantly consumer-facing ...

Best Practices: Infrastructure Security

  1. Optimize TLS implementation using information gleaned from public tools. This includes eliminating use of insecure ciphers and older, insecure protocols as well as vulnerabilities to the POODLE and ROBOT ...

Organization Reports

On annual basis, we publish annual reports (an Action Plan and Impact Report), as well as financial reports, annual financial statements, and Form 990s.