The growth of the Internet has provided an unprecedented opportunity for the world to create, exchange, store and consume information. There is more information available to the world now than at any time in its history. This expansion has created businesses large and small who collect, process and store information. Not only is this information necessary for commerce, it may also be useful to governments, including law enforcement entities. Access to this information by governmental entities must be based on transparent, documented, and challengeable policies. Transparency, documentation, and challenge underlie the i2Coalition positions on a range of issues.
Observation of the activities of individuals on the Internet should be subject to traditional due process standards. The fact that information exists on the Internet does not transform its status. Due process standards that have served the world for generations should not be sacrificed simply because of a perception that access to information may be easier. Those who use the Internet in their daily lives do not believe that they check their traditional rights simply because their information is electronic rather than physical. In particular, the i2Coalition calls on governments around the world to enact laws governing surveillance that are disclosed to the general public, ensure that due process standards are met when access to information is sought and minimize the scope of access activities.
Electronic Communications Privacy Act (ECPA) Reform in the U.S.
Advocates from across the political spectrum continue to call on the U.S. Congress to reform a small, but outdated, provision of ECPA that allows warrantless access to data. This reform has unprecedented support in the U.S. House of Representatives and great support in the Senate. Warrantless access to data under ECPA is contrary to U.S. due process requirements, undermines confidence in the privacy of data, and has not been demonstrated to have an appreciable positive effect on law enforcement activities.
The ability for businesses to control the privacy of their data is fundamental to the operation of the Internet. The laws of many countries require data to be maintained in a private nature. Further, Infrastructure companies are constant targets of third parties who seek unauthorized access to data. Individual users of infrastructure services seek control over the privacy of their data. Because of this access to reliable, high strength encryption is imperative. Businesses and their customers require control over the means to ensure the privacy of data. Businesses around the world depend on technology created in one country and exported to others to do the same. Imposition of requirements to create backdoor access to data have been thoroughly debated for over fifteen years, and have conclusively been demonstrated not only to undermine the security of data but to be technically infeasible.
Recent Updates On Government Access To Data
Privacy Movements, Social Media Responsibility, And The New OSTP Director: August 2018 Legislative Update
New privacy legislation and cereal rules in development, tariffs, hearsing on social media responsibility, and more.
The i2Coalition responded to a request for comments on International Internet policy.
Our 2018 Annual Congressional Fly-In, The Restoring Internet Freedom Order, The Encrypt Act, And More: The June 2018 Legislative Update
This year 30 members of the Coalition joined with our staff and TwinLogic Strategies staff members to cover meetings with the White House, FBI, NTIA and 28 Congressional offices.
i2Coalition Honors Congressmen Doyle and Poe with Champion of Internet Freedom Award; Allison Heather and Stephen Mayhew with Internet Community Leadership Award
The i2Coalition presents legislators and community members who have made a beneficial impact on Internet policy with annual awards.
Encryption, Potential Data Breach Legislation, and Intermediary Liability Updates: The May 2018 Legislative Update
Privacy/Data Breach/Encryption bills are proposed, net neutrality fights continue, and intermediary liability still in question.
Monica will coordinate i2Coalition work on the policy initiatives chosen for focus by the member-led i2Coalition Working Groups.
On May 9th, we will provide an update on the current status of the compliance, analyze the correspondence with the Article 29 group, and discuss possible solutions.
Zuckerberg Visits Congress, More Discussion On Net Neutrality, And A Looming Battle For Encryption? The April 2018 Legislative Update
Zuckerberg’s visit, a plethora of potential Net Neutrality legislation, trade policy fears, erosion of Section 230, and the possible return of encryption banning dominate Congress in April.
We’ll be discussing an overview of the biggest issues that could lead to industry disaster and why that’s not hyperbole.
March 2018 Legislative Update: The Omnibus Appropriations Bill, SESTA-FOSTA, and competing Net Neutrality legislation
Congress rushed to pass an Omnibus Appropriations Bill, while SESTA-FOSTA passed eroding CDA Section 230, and competing Net Neutrality legislation was discussed.
After a government shutdown early in the month, updates to net neutrality, the CLOUD Act, cybersecurity policy, trade agreements, and more.
We’re announcing our 2018 Congressional Fly-In. The event will be held June 5th through 6th, 2018.