Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What Does Internet Rights Advocacy Mean?

What Does Internet Rights Advocacy Mean?

The Internet is a vast and amazing place. Some have even argued that it is one of people’s best-ever inventions. Some would push it further by actively attempting to outline what rights an Internet user has. Advocacy groups have been popping up, and while it has had a marked effect on public policy in more progressive nations, some nations look on these groups with disdain. Today we will take you through human rights advocacy on the Internet, and what to expect going forward.

Initially, the advocacy of Internet Rights was just that: the right to have access to the Internet. While this isn’t a problem for as many people as it once was, some places still don’t have fair, affordable access to high-speed Internet service. Some nations, despite providing access, have Internet laws that subdue use due to an overlaying censorship. This issue, and the monetization of collected consumer data, are two of the hot-button issues today for Internet Rights advocates.

Lead Up

The Internet is a relatively new technology, especially in the manner it is being used by people today. As a result, there are different views on how these technologies are disseminated, who profits from them, and how non-controlling entities have their rights repressed. As a result, you’ll find from the early days of Internet rights advocacy, the largest voices were from organizations that found the equitable portion of the Internet either unnecessary or repressive to the rights of consumers.

Notice that the access to the Internet was not even on the roadmap. The nature of the early commercial Internet was such that it could be successfully described as libertarian. Through the end of the 1990s, as the first round of dot com investments started to tank, it became obvious that the technology would end up bigger than anyone had anticipated and needed regulation.

In the U.S. many fights have been undertaken in the subsequent 20 years. Many of which were pushed by Internet rights advocates. One of the most famous is:

Reno v. American Civil Liberties Union (1997)

In an attempt to clean up what some people considered indecent content on the Internet (pornography and the like); and more accurately, to keep kids away from this content, Congress passed the Communications Decency Act. The ALCU, which is a well-known civil rights advocate group, filed suit. The provision was eliminated by two federal judges before being heard in front of the Supreme Court, which upheld the lower courts’ rulings. This was a major blow against censorship; paving the way for free expression on the Internet.

While the ALCU isn’t exactly an Internet Rights Advocate, the landmark case ushered in a new world of free speech on the Internet; and, it sets the tone for Internet rights advocates to this day.

Personal Privacy

Today there are many organizations looking to protect people on the Internet. Sometimes their views overlap, sometimes they don’t. One of these groups, the Electronic Frontier Foundation (EFF), is a major player in the fight to keep speech (and content) free from censorship on the Internet, the fight against the surveillance state, and most notably, the ongoing fight for individual privacy.

Businesses of all kinds, as well as government agencies have grown to take significant liberties with people’s personal information. Organizations like the ALCU and the EEF work tirelessly to get the topic of personal data privacy in front of decision makers.

Have you ever wondered how you just had a conversation with your friend via some type of app about fingerless gloves and now your sidebar on every website is now filled with fingerless glove ads? Most users don’t fully understand that organizations that you interact with online keep a profile on you. All of your actions, any personal or financial information that you share, and more is stored in a file that is often packaged and sold off by those organizations to advertising firms.

These advocates, among the other issues they stand up for, are trying to push the issue of personal data privacy. The main point of contention is that companies profit off of the information people provide, and since this information is very clearly personal in nature, it is their belief that individuals are being taken advantage of. This debate has been ratcheted up significantly with the European Union’s General Data Protection Regulation (GDPR) that intends to protect individual information.

While it might be a matter of time before the U.S. gets a data privacy law in the same vein as the GDPR, Internet rights advocates will continue to act in the public’s favor on this issue, and many others.

Net Neutrality & Access to All

One of the biggest fights that Internet rights advocates are undertaking is against the companies that deliver the Internet itself: The Internet service providers (ISP). For those of you who don’t know, over the past several years the U.S. Government created mandates that forced ISPs to provide access to applications and content without favoring any, even if they are the ones that use the most bandwidth.

The theory is that the typical Internet user only does so much on the web. They typically access the same sites and use their Internet connection for the same things. This creates a situation where ISPs, using market adjustments would want to get more money per byte than if users used a variety of sites to do the same. With federal control, they were forced into charging a flat rate.

The net neutrality laws that were instituted in 2015 were repealed in 2017, as controlling bureaucrats argued that there were enough people without fair access to the Internet and the only way to persuade the ISPs to commit to investing in infrastructure that would curb this problem is by repealing the net neutrality laws. Needless to say, this caused quite a stir.

Internet rights advocates were quick to point out investment in Infrastructure is in these ISP’s best interest and giving them the ability to slow down Internet speeds as they see fit is not good for consumers. Unfortunately for most Americans, these ISPs are the companies you have to get your Internet service from if you want speeds that allow you to use it the way you want. Advocates are still trying to do what they can to educate people about the benefits of net neutrality and have set up websites with information and for people to give their support. Organizations like the aforementioned ACLU and EFF,  the American Library Association, and Fight for the Future, Demand Progress, and Free Press Action currently sponsor www.battleforthenet.com, a one-stop site for all things net neutrality.

Advocacy can go a long way toward giving a voice to people who may not think they have one. What Internet-related topics do you find to be problematic? Leave your thoughts in the comments and subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Phishing Managed IT Services Upgrade Windows Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Server Save Money Cloud Computing Office Passwords Windows 10 Gadgets Chrome Virtualization Tech Term Social Media Saving Money Holiday Microsoft Office Managed Service Automation Managed IT Services Operating System Artificial Intelligence Computers Facebook Cybercrime Internet of Things Hacking Wi-Fi BYOD Mobile Device Management Health Networking IT Support Managed Service Provider Spam Alert Information Office 365 Covid-19 Telephone Systems Information Technology Remote Social Engineering Mobility Recovery Employer-Employee Relationship Router Bandwidth BDR Big Data Remote Monitoring Password Money App History Mobile Computing Encryption Applications Data Breach Application Human Resources Law Enforcement Blockchain Private Cloud Paperless Office Mobile Office How To Managed IT Apps Office Tips Data Storage Patch Management Training VPN Government Remote Computing Data Security Mouse HaaS Bring Your Own Device Data Management Work/Life Balance Infrastructure Flexibility Voice over Internet Protocol Marketing Wireless WiFi Vulnerability IT solutions Windows 7 Word Entertainment Website Gmail Budget Google Drive Settings Servers Two-factor Authentication Avoiding Downtime Social Telephone System Staff Software as a Service Vendor User Error Save Time Machine Learning Meetings Managed Services Display Connectivity Remote Work Cleaning Risk Management Employee/Employer Relationship Hacker Conferencing RMM End of Support The Internet of Things Education Physical Security Lithium-ion battery Scam Safety Data Protection USB HIPAA Sports Redundancy Firewall Keyboard Vendor Management Virtual Reality Apple Current Events Network Congestion Virtual Assistant eWaste Document Management Telephony Authentication Solid State Drive Wireless Technology Samsung How to Downtime Managed Services Provider Value Database Data storage Update Remote Workers Wearable Technology Automobile Spam Blocking Electronic Medical Records Hard Drives Retail Virus Instant Messaging Google Docs Processor Robot Computing Infrastructure Excel Hiring/Firing Identity Theft Unified Threat Management Going Green Computer Accessories Biometrics Hard Drive Virtual Desktop Battery Augmented Reality Computing DDoS Shadow IT Fraud Legal Business Intelligence SharePoint Remote Worker Printer Bluetooth Audit Internet Exlporer Worker IT Management Cryptocurrency Digital Signage Botnet Customer Service PDF Environment IT Plan Comparison IT Consultant Fax Server Proactive IT CES Unsupported Software Best Practice Procurement Net Neutrality SaaS Humor YouTube Charger Workplace Strategy Black Market Content Management Business Technology Help Desk Access Control Compliance Printing OneNote Computer Care Bloatware Video Conferencing ROI Consultant Search Shortcuts Virtual Private Network Analytics iPhone Netflix Two Factor Authentication Workforce Sales Bitcoin Personal Cryptomining Root Cause Analysis Tablets Cables Point of Sale HBO Entrepreneur Knowledge Music Supply Chain Management Best Available WIndows 7 Skype Project Management Files Nanotechnology Telecommuting Monitoring Batteries Chromecast Cortana Windows 8.1 Digitize Shortcut Data loss Outlook Cost Management Leadership Digital Signature Troubleshooting Windows Server 2008 R2 Start Menu Warranty Social Networking Colocation Uninterrupted Power Supply Customer relationships Loyalty Google Apps Email Best Practices IT Assessment Manufacturing Screen Mirroring HVAC Frequently Asked Questions Monitor Analysis Books Managed IT Service Security Cameras User Running Cable Mobile Administrator PowerPoint Windows 10s Devices Windows Media Player Computer Tips Memory Virtual CIO OneDrive Biometric Security Cast Enterprise Content Management Tip of the week MSP Reputation webinar Accountants Streaming Media Emergency Peripheral Using Data Managing Stress Content Professional Services Microchip Public Cloud Thought Leadership Tech Support Employer Employee Relationship Credit Cards Digital Security Cameras Laptop Assessment Password Manager Copiers 5G Techology Password Management Windows Server 2008 Cameras Customers Multi-Factor Security Quick Tip Smartwatch Audiobook Tools Search Engine Twitter Science Ergonomics Touchpad Television Business Mangement Development OLED NIST Smart Tech Trending PCI DSS Virtual Machine Fiber Optics Employee Distributed Denial of Service Politics Customer Relationship Management Advertising Addiction Amazon 2FA Analyitcs Public Computer Recycling Messaging Cabling Regulations Wiring Printer Server Programming Practices Notifications Transportation Policy Hypervisor Trend Micro Computer Fan Cache Rootkit Amazon Web Services Dark mode Criminal SMS Default App Safe Mode Antivirus GDPR Relocation Workers Hosted Computing Benefits Procedure Saving Time Shopping Google Search FENG Wireless Internet Windows 8 Online Shopping dark theme IBM AI IT Infrastructure IT service Video Games File Sharing Bing Worker Commute Flash Camera Inventory Smart Technology Specifications FinTech Social Network Experience Wire Tablet Evernote Supercomputer Travel Investment Domains Scalability Software Tips Business Owner Sync Printers Emails Millennials Employees Employee/Employer Relationships ISP IaaS Maintenance Smart Office NarrowBand Wireless Charging Windows 365

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code