Library shelves with books

Resource Library

Everyone should have access to an open and trusted Internet.
Read our reports, papers, and other documents for insight and vision on how we can get there.

Action Plan 2024

Our roadmap for tackling the threats and challenges for today’s Internet as we look to grow and defend it for future generations.

Krishna waiting as a helicopter slinging a load of goods

2023 Year in Review

The Year in Review shows the steps we took in 2023 to ensure the Internet is for everyone. Learn about the positive difference we made for the Internet.

forest trees from above

Internet Impact Briefs

Shorter reports that analyze how different policies or new technologies may affect what the Internet needs to exist and thrive.

Panorama of a city

Global Internet Report (GIR)

From trust to consolidation, access to sustainability, a deep look at the forces shaping our digital future.

Blue background with pattern

Policy Briefs

Our perspective on critical Internet issues, including community networks, encryption, open Internet standards, Internet Exchange Points, and more.

Internet Impact Brief: India CERT-In Cybersecurity Directions 2022

Read how the draft regulation may affect Internet development in India, and more broadly, the health of the global Internet ...

World Telecommunications Development Conference 2022 Background Paper

This document will help you understand the WTDC's role, its importance, and major opportunities of engagement ...

World Telecommunication Development Conference 2022 Issues Matrix

The matrix summarizes the proposed changes to Internet-related WTDC-17 resolutions (including new resolutions) ...

How To Protect the Internet from Becoming the Splinternet

The splinternet is the idea that the open, globally connected Internet we all use splinters into a collection of isolated networks controlled by governments or corporations ...

Internet Impact Brief: South Korea’s Interconnection Rules

Read how a series of enacted and proposed revisions of Telecommunications Business Act in South Korea affect further Internet development ...

Community Network Readiness Assessment Handbook

Find out if a community is ready to deploy and maintain a community network, and take steps to plan and build one ...

Quick Analysis – The Impact of Efforts to Disconnect Russia from the Internet

Read how some of the proposals and actions to disconnect Russia impact the global Internet ...

Internet Impact Brief: Impact of Ukraine’s Requests to Block Russia’s Access to the Internet

Learn how politically motivated actions to prevent people from accessing the global Internet would cause significant harm to the open, globally connected, secure and trustworthy Internet ...

Internet Impact Brief: How Refusing Russian Networks Will Impact the Internet

Read how actions to block networks from accessing the global Internet cause significant harm what the Internet needs to exist and thrive, and the ability of people to use it ...

Path to 2025

A strategy that advances our enduring vision: The Internet is for everyone ...

Internet Impact Brief: Bangladesh: Regulation for Digital, Social Media and OTT Platforms, 2021

Finds that the provisions outlined in the draft regulation could have serious repercussions on the usefulness of the Internet for Bangladesh and its people ...

Impact of COVID-19 on the Internet Ecosystem in Bangladesh, Bhutan, and Pakistan

Internet performance was negatively affected in Bangladesh, Bhutan, and Pakistan during the lockdown period of the COVID-19 pandemic ...

Archives

2018 Cyber Incident & Breach Trends Report

This year’s report includes ransomware, business email compromise (BEC), distributed denial-of-service (DDoS) attacks, connected device vulnerability, and more ...

Policy Brief: Principles for Responsible Data Handling

More and more of our activities generate data which is collected and used in ways we don't see and can't control. While the data is used for ...

The State of User Privacy and Trust Online

In the 2019 CIGI-Ipsos Global Survey on Internet Security and Trust, Internet users point to cybercriminals, Internet companies, other Internet users, and governments as major sources of their distrust in ...

Net Neutrality Experts’ Roundtable Series Process Report

The United States needs an approach that upholds the core principles of an open Internet and provides market stability; it also needs a solution that puts consumer rights at the ...

Net Neutrality Legislation: A Framework for Consensus

Note: The Net Neutrality Principles do not represent the views of the Internet Society, nor any of its Chapters, members, partners or any of the participating organizations. Rather, they ...

Enhancing IoT Security: Final Outcomes and Recommendations Report

The Internet of Things (IoT) carries enormous potential to change the world for the better. Projections for the impact of IoT on the Internet and the global economy are impressive, ...

Info Guide: 6 Ways “Lawful Access” Puts Everyone’s Security At Risk

What is encryption?

Encryption is the process to scramble or hide information so it can only be read by someone with the means (or keys) to return it to ...

The Trust Opportunity: Exploring Consumer Attitudes to the Internet of Things

This new research from Consumers International and the Internet Society explored consumer perceptions and attitudes towards trust, security and the privacy of consumer Internet of Things (IoT) devices. The survey ...

The economics of the security of consumer-grade IoT products and services

Security is often lacking in consumer IoT devices: an analysis of 10 of the most common types of consumer devices found that 70% contained serious vulnerabilities ...

2018 Online Trust Audit and Honor Roll

The Online Trust Audit & Honor Roll assesses nearly 1,200 organizations, recognizing excellence in online consumer protection, data security, and responsible privacy practices. This 10th annual audit of more than 1,200 predominantly consumer-facing ...

Best Practices: Infrastructure Security

  1. Optimize TLS implementation using information gleaned from public tools. This includes eliminating use of insecure ciphers and older, insecure protocols as well as vulnerabilities to the POODLE and ROBOT ...

Best Practices: Privacy

  • Make sure the privacy statement has a link and is easily discoverable from the home page.
  • Place the revision date of the statement at the top ...

Organization Reports

On annual basis, we publish annual reports (an Action Plan and Impact Report), as well as financial reports, annual financial statements, and Form 990s.