NNSquad - Network Neutrality Squad
[ NNSquad ] Re: FCC paths to Internet network management? (from IP)
And, hence, my suggestions with regard to what (if anything) the
FCC should do with regard to ISPs and P2P.
First, there have been claims of inadequate disclosure of network
management policies and terms of service by ISPs. While none have
ever been made against our company, I'd love to see all such claims
put to rest once and for all, and would be quite willing to post a
form (much like the ones that come with credit card solicitations)
summarizing our policies prominently on our Web site. These could
include such things as permitted and forbidden activities (e.g.
outbound SMTP), and whether these are allowed under different
service plans (e.g. P2P might be allowed with measured rates but
not flat rates). However, ISPs should not be required to include
technical details (such as lists of blocked ports) that might allow
hackers to bypass security measures or would have to be updated
minute-by-minute as attacks were blocked.
Third, with disclosure, ISPs should be allowed to do such things as
post messages in the user's browser window, frame pages, or employ
similar mechanisms so as to provide informational messages to them.
(There was a furor a month or two ago when Rogers Cable did this --
a shame, because the mechanism is extremely useful and unobtrusive.)
Fifth, content and service providers desiring to use P2P should be
required to PROMINENTLY disclose whether their software is capable
of turning the user's machine into a server or consumes any
resources beyond what it takes to transfer the content or provide
the service to that one user. Content and service providers should
also be required to turn off, by default, any features that turn
the user's machine into a server, and only allow them to be turned
on if the user chooses to enable them and the ISP indicates (via a
mechanism such as the "robots.txt" files commonly used to control
indexing) that such use is permissible. Note that, again, this
might vary by service plan or by venue (e.g., a Wi-Fi hotspot might
be more heavily restricted than a private connection).
Finally, any rules that are promulgated should make it absolutely
clear that ISPs retain the right to stop abuse of their networks
and to enforce their acceptable use policies and terms of service.
Otherwise, they could not defend against spamming, worms, "bots,"
and other scourges of the Internet.