Library shelves with books

Resource Library

Everyone should have access to an open and trusted Internet.
Read our reports, papers, and other documents for insight and vision on how we can get there.

people walking through a forest, surrounded by trees and rocks

Action Plan 2026

From our strategic vision to specific goals, read about how we’ll be advancing our five-year strategy in the coming year.

2019-2024 Impact Results

Our Impact Report is a snapshot of how we worked with our global community to grow, promote, and defend the Internet worldwide.

forest trees from above

Internet Impact Briefs

Shorter reports that analyze how different policies or new technologies may affect what the Internet needs to exist and thrive.

Glossary of Internet Terms

Understand key terms and become fluent in the language of the Internet with our new and improved glossary. 

Blue background with pattern

Policy Briefs

Our perspective on critical Internet issues, including community networks, encryption, open Internet standards, Internet Exchange Points, and more.

Delivering on a Five-Year Strategy

This report is a snapshot of how we worked with our global community to overcome major challenges and exceed our ambitious goals over the past five years ...

Investigatory Powers (Amendment) Act 2024 Consultation Response to the Home Office 

Investigatory Powers (Amendment) Act 2024 Consultation Response to the Home Office by Internet Society ...

A Policy Framework for Internet Intermediaries and Content

Intermediary functions are crucial to the Internet’s existence. This paper provides a framework for understanding Internet intermediary functions and developing policy concerning responsibility for online content without harming individuals’ ...

2025 Action Plan

Our 2025 Action Plan outlines our priorities in 2025, which demonstrate our collective ambition to ensure that the Internet is a resource that enriches people’s lives and is a force ...

ITU World Telecommunication Standardization Assembly 2024 Matrix

It summarizes the changes to Internet-related resolutions (including new resolutions) to identify issues, areas of concern, organizations impacted, and so forth on a best-efforts basis ...

Case Study: Canada’s Online News Act Hurt Journalism, Competition, and the Internet

Read about the impacts of Canada’s Online News Act on the Internet and how countries can develop laws to support the news industry sustainability without harming the Internet ...

Traceability in End-to-End Encrypted Environments

This brief explains how traceability impacts the security and privacy of end-to-end encrypted communications and highlights the technical flaws and security vulnerabilities it would introduce.  ...

The Olympics and the Internet: A Timeline

The Olympics and the Internet are both global connectors. Learn about how the Internet evolved the way we interact with the Olympics ...

2024 East Africa Submarine Cable Outage Report

Discover the impact of the submarine cable cuts on local connectivity in East Africa and the importance of resilience in maintaining service levels ...

Preemptive Monitoring in End-to-end Encrypted Services

Technical measures to screen messages in end-to-end encrypted systems introduce systemic risk for both service providers and users ...

ITU World Telecommunication Standardization Assembly 2024: Background Paper

This draft background paper is intended to provide the Internet Society community and interested parties with an outline of the objectives and key issues to be addressed at the World ...

Internet Society’s Submission to the Consultation on the European Commission’s White Paper on “How to master Europe’s digital infrastructure needs?”

We provided feedback in response to the consultation on the European Commission’s White Paper on “How to master Europe's digital infrastructure needs?” ...

Archives

Net Neutrality Legislation: A Framework for Consensus

Note: The Net Neutrality Principles do not represent the views of the Internet Society, nor any of its Chapters, members, partners or any of the participating organizations. Rather, they ...

Enhancing IoT Security: Final Outcomes and Recommendations Report

The Internet of Things (IoT) carries enormous potential to change the world for the better. Projections for the impact of IoT on the Internet and the global economy are impressive, ...

Info Guide: 6 Ways “Lawful Access” Puts Everyone’s Security At Risk

What is encryption?

Encryption is the process to scramble or hide information so it can only be read by someone with the means (or keys) to return it to ...

The Trust Opportunity: Exploring Consumer Attitudes to the Internet of Things

This new research from Consumers International and the Internet Society explored consumer perceptions and attitudes towards trust, security and the privacy of consumer Internet of Things (IoT) devices. The survey ...

The economics of the security of consumer-grade IoT products and services

Security is often lacking in consumer IoT devices: an analysis of 10 of the most common types of consumer devices found that 70% contained serious vulnerabilities ...

2018 Online Trust Audit and Honor Roll

The Online Trust Audit & Honor Roll assesses nearly 1,200 organizations, recognizing excellence in online consumer protection, data security, and responsible privacy practices. This 10th annual audit of more than 1,200 predominantly consumer-facing ...

Best Practices: Infrastructure Security

  1. Optimize TLS implementation using information gleaned from public tools. This includes eliminating use of insecure ciphers and older, insecure protocols as well as vulnerabilities to the POODLE and ROBOT ...

Best Practices: Privacy

  • Make sure the privacy statement has a link and is easily discoverable from the home page.
  • Place the revision date of the statement at the top ...

DNS Privacy Frequently Asked Questions (FAQ)

Almost every time we use an Internet application, it starts with a Domain Name System (DNS) transaction to map a human-friendly domain name into a set of IP addresses that ...

IPv6 Security for IPv4 Engineers

This document provides an overview of IPv6 security that is specifically aimed at IPv4 engineers and operators. Rather than describing IPv6 in an isolated manner, it aims to re-use as ...

Introduction to DNS Privacy

Almost every time we use an Internet application, it starts with a Domain Name System (DNS) transaction to map a human-friendly domain name into a set of IP addresses that ...

IPv6 Security Frequently Asked Questions (FAQ)

The Internet Society recognises that global deployment of the IPv6 protocol is paramount to accommodate the present and future growth of the Internet. Given the scale at which IPv6 must ...

Annual Reports and Financials

On annual basis, we publish annual reports (an Action Plan and Impact Report), as well as financial reports, annual financial statements, and Form 990s.