
Resource Library
Everyone should have access to an open and trusted Internet.
Read our reports, papers, and other documents for insight and vision on how we can get there.

Action Plan 2026
From our strategic vision to specific goals, read about how we’ll be advancing our five-year strategy in the coming year.

2019-2024 Impact Results
Our Impact Report is a snapshot of how we worked with our global community to grow, promote, and defend the Internet worldwide.

Internet Impact Briefs
Shorter reports that analyze how different policies or new technologies may affect what the Internet needs to exist and thrive.

Glossary of Internet Terms
Understand key terms and become fluent in the language of the Internet with our new and improved glossary.

Policy Briefs
Our perspective on critical Internet issues, including community networks, encryption, open Internet standards, Internet Exchange Points, and more.
Delivering on a Five-Year Strategy
Investigatory Powers (Amendment) Act 2024 Consultation Response to the Home Office
A Policy Framework for Internet Intermediaries and Content
Intermediary functions are crucial to the Internet’s existence. This paper provides a framework for understanding Internet intermediary functions and developing policy concerning responsibility for online content without harming individuals’ ...
2025 Action Plan
ITU World Telecommunication Standardization Assembly 2024 Matrix
Case Study: Canada’s Online News Act Hurt Journalism, Competition, and the Internet
Traceability in End-to-End Encrypted Environments
The Olympics and the Internet: A Timeline
2024 East Africa Submarine Cable Outage Report
Preemptive Monitoring in End-to-end Encrypted Services
ITU World Telecommunication Standardization Assembly 2024: Background Paper
Internet Society’s Submission to the Consultation on the European Commission’s White Paper on “How to master Europe’s digital infrastructure needs?”
Archives
Net Neutrality Legislation: A Framework for Consensus
Note: The Net Neutrality Principles do not represent the views of the Internet Society, nor any of its Chapters, members, partners or any of the participating organizations. Rather, they ...
Enhancing IoT Security: Final Outcomes and Recommendations Report
Info Guide: 6 Ways “Lawful Access” Puts Everyone’s Security At Risk
What is encryption?
Encryption is the process to scramble or hide information so it can only be read by someone with the means (or keys) to return it to ...
The Trust Opportunity: Exploring Consumer Attitudes to the Internet of Things
The economics of the security of consumer-grade IoT products and services
2018 Online Trust Audit and Honor Roll
The Online Trust Audit & Honor Roll assesses nearly 1,200 organizations, recognizing excellence in online consumer protection, data security, and responsible privacy practices. This 10th annual audit of more than 1,200 predominantly consumer-facing ...
Best Practices: Infrastructure Security
- Optimize TLS implementation using information gleaned from public tools. This includes eliminating use of insecure ciphers and older, insecure protocols as well as vulnerabilities to the POODLE and ROBOT ...
Best Practices: Privacy
- Make sure the privacy statement has a link and is easily discoverable from the home page.
- Place the revision date of the statement at the top ...
DNS Privacy Frequently Asked Questions (FAQ)
IPv6 Security for IPv4 Engineers
Introduction to DNS Privacy
IPv6 Security Frequently Asked Questions (FAQ)
The Internet Society recognises that global deployment of the IPv6 protocol is paramount to accommodate the present and future growth of the Internet. Given the scale at which IPv6 must ...
Annual Reports and Financials
On annual basis, we publish annual reports (an Action Plan and Impact Report), as well as financial reports, annual financial statements, and Form 990s.
Image copyright: © Jordan Kapono Nakamura, © Victor Ndonnang