ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Internet Rights Advocacy Is for More Than Internet Access

Internet Rights Advocacy Is for More Than Internet Access

Some people believe so much in something that they’ll commit their lives to make it better for everyone. The Internet, as one of the most impressive advancements of civilization, has a fair amount of people who take the time (or make a living) advocating on the various issues that face Internet users. These Internet rights advocates have begun to make a big difference on the way that businesses, especially those businesses that only exist on the Internet, can act. Today, we’ll take a look at Internet advocacy.

You may think that the Internet hasn’t been around long enough for there to be enough unfairness to warrant advocacy, but as we’ve seen throughout society, the more people are cognizant of an issue, the more they are apt have definitive ideas about it. The major issues facing the Internet are the monetization of consumer/visitor data, censorship, access to affordable high-speed Internet service, and net neutrality.

Advocates

Many of the Internet advocates’ aim is to work to protect people’s privacy while they navigate their online lives. One such organization, the Electronic Frontier Foundation (EFF), fights to keep speech (and content) free from censorship, advocate against the surveillance state, and is also continuously fighting for individual privacy.

You should know that businesses of all kinds, as well as government agencies, tend to take liberties with your personal information and these advocates are trying to push the issue of personal data privacy. To these businesses, they look at the data as a whole other revenue stream, but organizations like the EEF and the American Civil Liberties Union (ACLU) don’t agree and work around the clock to advocate on behalf of people asking the question: “Why should Google and Facebook and Walmart benefit from your personal information?”

The heat has been turned up in the fight for individual privacy as the European Union’s General Data Protection Regulation (GDPR) went into effect in 2018, protecting the lot of Europe’s people from organizational tyranny. In the United States little has been done on that front, so advocates are literally on the ground trying to protect people. Unfortunately, as things stand today, it might be some time before the U.S. gets a data privacy law in the same vein as the GDPR.

Net Neutrality & Access to All

Another major issue that you see advocates arguing against is the repeal of net neutrality that took part late in 2017. Striking down the mandate, effectively gave the big Internet providers (ISPs) the control over how their services will be rolled out. According to advocates, as publicly traded companies, it is impossible to suggest that ISP giants Verizon, AT&T, Comcast, and Charter won’t try and maximize profit from their new position in the market.

The theory behind the net neutrality laws is that the typical Internet user only does so much on the web. They typically access the same sites and use their Internet connection for the same things. This creates a situation where ISPs, using market adjustments, would want to get more money per byte than if users used a variety of sites to do the same. With federal control, they were forced into charging a flat rate.

The net neutrality laws that were instituted in 2015 were repealed in 2017, as controlling bureaucrats argued that there were enough people without fair access to the Internet and the only way to persuade the ISPs to commit to investing in infrastructure that would curb this problem is by repealing the net neutrality laws. Needless to say, this caused quite a stir.

Internet rights advocates were quick to point out investment in Infrastructure is in these ISP’s best interest, and giving them the ability to throttle Internet speeds as they wish doesn’t work for consumers. Unfortunately for most Americans, these ISPs are the companies you have to get your Internet service from if you want speeds that allow you to use it the way you want. Advocates are still trying to do what they can to educate people about the benefits of net neutrality and have set up websites with information and for people to give their support. Organizations like the aforementioned ACLU and EFF,  the American Library Association, and Fight for the Future, Demand Progress, and Free Press Action currently sponsor www.battleforthenet.com, a one-stop site for all things net neutrality.

If you want to know how you can make a difference in the fight against what you may see are perceived wrongs, visit the EFF at eff.org or the ACLU at aclu.org. For more great technology-based information subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 11 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Ransomware Data Backup communications Smartphone Microsoft Office Upgrade Smartphones Small Business Network Mobile Devices Managed IT Services Data Recovery Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Facebook Business Continuity Windows 10 Disaster Recovery Passwords Holiday Covid-19 Windows 10 IT Support Managed Service Browser Apps Miscellaneous Cloud Computing Outsourced IT Data Management Internet of Things Managed Service Provider Remote Work Saving Money Government Operating System Gadgets Networking Windows Workplace Strategy Artificial Intelligence Managed IT services Blockchain App Virtualization Mobile Device Management Spam Information Business Technology WiFi Bandwidth Remote Server Encryption Gmail Budget History Office Two-factor Authentication Office 365 Apple Information Technology Employee/Employer Relationship Wi-Fi Big Data BDR Conferencing Health Analytics Cybercrime Access Control Data Security Patch Management Help Desk Hacking Employer-Employee Relationship Remote Monitoring Voice over Internet Protocol Cost Management IT Management Remote Computing Hacker Training Vendor Document Management Compliance Save Money Website Search... Best Practice Data loss Project Management BYOD Retail Mobile Office Computing Alert Vendor Management Hard Drive Managed Services Hiring/Firing Outlook Money Password Applications Customer Service Unified Threat Management Firewall Legal Vulnerabilities Data storage Augmented Reality Word IBM Social Engineering Router Running Cable Cryptocurrency Paperless Office Antivirus Black Market Maintenance Cleaning The Internet of Things Storage Robot YouTube Remote Workers Websites Laptop Windows 7 Free Resource Meetings Mobility User Data Breach How To Google Maps Twitter Scam Law Enforcement Sports Social Windows 11 Chrome End of Support SaaS DDoS Printer VPN Monitoring Update Healthcare iPhone Education Cortana Mobile Computing Content Filtering Travel Marketing Virtual Reality Video Conferencing Office Tips Telephone Private Cloud Customer Relationship Management Memory Processors Co-Managed IT Virtual Machines Computer Repair Entertainment Physical Security Professional Services Excel Politics Machine Learning Settings Start Menu Wireless Technology Computer Care Solid State Drive Downloads Managed Services Provider eWaste Virtual Assistant Virtual Private Network Vulnerability HIPAA Drones Software as a Service Downtime Chromebook Current Events Data Protection Safety Automobile Solutions Processor Virtual Desktop Experience How To Integration Images 101 Microchip Flexibility Display Multi-factor Authentication Tech Terms Disaster Hack PowerPoint Employees Identity Theft Managed IT Avoiding Downtime Administration Notifications Unified Communications Digital Saving Time Presentation Holidays Google Docs Lithium-ion battery Specifications IT Consultant Bluetooth Taxes Cooperation Distributed Denial of Service Computers Bitcoin Piracy Teamwork Term Business Intelligence Download Cables 2FA HTML Data Storage Audit Hypervisor Spyware Securty Medical IT File Sharing Browsers Botnet Nanotechnology Shopping Point of Sale Paperless Rental Service Software License Computer Accessories Micrsooft Redundancy SQL Server Domains Google Play Upload Social Network PCI DSS Flash Licensing Cache Humor Business Growth Unified Threat Management Workers Data Analysis Screen Reader Shortcuts Gig Economy Telephone Systems Business Communications Mobile Technology Internet Service Provider Azure Security Cameras Trends CCTV Customer Resource management Devices Regulations Compliance Printing Managed IT Service Memes Google Wallet Touchscreen Public Speaking Fileless Malware Be Proactive Banking Tip of the week Human Resources Messenger Company Culture Net Neutrality Deep Learning Emergency Streaming Media Computer Malfunction Gamification Keyboard Telephone System Regulations Financial Data Vendor Mangement IT Hosted Solution Samsung Hard Drives Directions Backup and Disaster Recovery Troubleshooting Workplace Strategies Risk Management Business Metrics intranet Content Google Apps Books Desktop Uninterrupted Power Supply Webcam Wireless Shortcut Electronic Medical Records Accountants Telework Language Society Business Mangement Communitications Microsoft 365 Tablets Heating/Cooling Environment Database Smartwatch Social Networking Reading Procurement Monitors Windows XP Visible Light Communication Supercomputer Health IT Equifax FinTech Google Calendar Windows 8 Hard Drive Disposal IT Assessment Virus Tactics Business Owner Smart Technology CES Username Relocation Supply Chain Management Displays Value Advertising Motion Sickness Startup Organization Work/Life Balance Comparison Freedom of Information Cyber security Tech Support Google Drive email scam Smart Devices Navigation Addiction Mobile Security Remote Working Knowledge Corporate Profile Staffing Employer Employee Relationship User Tip In Internet of Things Legislation AI Television News Trend Micro Telephony Electronic Health Records Network Congestion Transportation Cabling IP Address Evernote Network Management Inbound Marketing Supply Chain Digital Security Cameras Hacks Reliable Computing Writing Wasting Time Tablet G Suite Modem Tracking Proxy Server Emails Mouse Fake News eCommerce VoIP Computing Infrastructure Surveillance Service Level Agreement Workplace Videos Management Electronic Payment Scalability Device security Managing Costs Web Server Recovery SSID Digital Payment Competition Administrator Wireless Headphones Text Messaging SharePoint Microsoft Excel Proactive IT Business Cards Development Employer/Employee Relationships Worker Tech Going Green Scams Media Bring Your Own Device Entrepreneur Error Phone System LiFi Virtual Machine Access Documents Public Cloud Application Bookmark Reviews Optimization Music Time Management

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?