Computers, Privacy & the Constitution
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.

Tradeoffs Between Network Neutrality and Privacy

-- By GuilhermePinheiro - 07 Mar 2010

*Introduction*

The paper has the purpose to analyze the definition of network neutrality, point out its consequences and identify the problems that the adoption of such a policy could have on the privacy of Internet users all around the country and the world. For the past several years, the principle of network neutrality has been widely discussed inside the academia and the Unites States government, especially by the Federal Communications Commission – FCC. In 2008, in a complaint against Comcast, the FCC found that Comcast was inhibiting the users of its Internet service from using file-sharing software, and laid down the basis for the formal adoption of a network neutrality principle in the Internet. There is also a bill in Congress addressing net neutrality.

*Net Neutrality Definition*

According to professor Timothy Wu, net neutrality is best defined as a network design principle in which all content, sites and platforms are treated equally. This rule would allow the network to carry “every form of information and to support every kind of application” with no content-based discrimination. Network neutrality principles support the existence of a non-discriminatory platform allowing a greater number of interactions among its users and the optimization of network tools. In sum, network neutrality intends to prevent private network owners from giving priority to different types of content on the Internet. The “Internet Freedom Preservation Act”, a Bill presented to Congress in 2009, states that network neutrality policy is based upon the principle of nondiscrimination and is consistent with the history of the Internet’s development. The Bill considers this non-discrimination “essential to ensure that Internet services remain open to all consumers, entrepreneurs, innovators, and providers of lawful content, services, and applications”.

*How Privacy May be Threatened*

In order for the network neutrality principle to work, however, it is necessary that some regulation over private owned networks, which comprise the Internet, be exercised by the government. This regulation would not only set forth the rules for network neutrality principles application, but also the penalties and damages private network owners would incur if the principle were to be violated. The main issue is, therefore, how the net neutrality control by the government could be done without the government itself having access to Internet users private data. Indeed, for the government to determine that that there was a breach of net neutrality principles, it would have to exercise constant surveillance and monitoring of the Internet information and the data flows, which could inevitably lead to the invasion of privacy or personal data of an Internet user. It is not like the government has not yet already access to a vast number of personal data available on the Internet. Net neutrality, however, would endow this access with a legal foundation (and more than just legal a moral foundation), based entirely on net neutrality reasoning. Some argue that it would be near to impossible to try and enforce some sort of net neutrality regulation without first hurting individual privacy. In this context, the possibilities are twofold: (i) a possible control and manipulation of the Internet information flow by a private network owner; or (ii) the danger of the government officially taking the matters into its own hand and freely and legally exercising surveillance and monitoring of the Internet. So far, the debate leaves us between two bad choices, from which we have to pick the least worse one.

*Two Privacy Problems of Net Neutrality*

In the issue of net neutrality, there are two main types of violation of privacy. First, there is a violation of privacy by the private network owners to determine whether the consumer is using the owner`s network to access contents or download applications from one of the their direct competitors. This violation of privacy is the means by which the network owners have access to the data they use in order to practice discrimination. It is, therefore, one of the foundations for the adoption of the net neutrality principle. The second type of violation is the violation of the user`s privacy by the government, when trying to determine the existence of discriminatory actions on the part of the private network owners. In this endeavour, the risks to violate the privacy of the Internet end user are high. This second issue raises more concern in this paper. Ironically, net neutrality, when trying to interfere with the violation of privacy generated by network owners, creates itself the possibility a privacy violation by the government. In the net neutrality debate the question remains open. Is the government able to fulfill the objectives of net neutrality principles without the government itself violating privacy?

*Conclusion*

This paper shows that there is a permanent tension between the network neutrality principle and the right to network privacy of Internet users. It argues that it is not advisable to simply accept the government`s justification for applying and enforcing net neutrality, that is, the protection of the free flow of information and the circulation of information on the Internet. If the government has a free-hand and total discretion in applying and enforcing the principles of network neutrality on the Internet, it is very likely that private data of Internet users will become more easily available to the government. The enforcement of net neutrality principles must be carefully executed to prevent privacy violations.


You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" on the next line:

# * Set ALLOWTOPICVIEW = TWikiAdminGroup, GuilhermePinheiro

Note: TWiki has strict formatting rules. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of that line. If you wish to give access to any other users simply add them to the comma separated list

Navigation

Webs Webs

r1 - 07 Mar 2010 - 11:26:15 - GuilhermePinheiro
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM