recommended reading

Democrats part with GOP on net neutrality, online privacy

Preparations are made in Charlotte for the Democratic National Convention.

Preparations are made in Charlotte for the Democratic National Convention. // Charles Dharapak/AP

As the Democrats open their convention on Tuesday in Charlotte, they will adopt a national platform that addresses many of the same tech and telecom issues as the Republican Party plan, but with starkly different approaches in some key areas.

Like the GOP platform adopted last week during the party’s convention in Tampa, the Democrats’ plan pledges to take steps to shore up the nation’s cyberdefenses, to protect intellectual property, and to resist international attempts to impose new regulations on the Internet.

But unlike the GOP plan, the Democratic platform again endorsed the idea of net neutrality, saying, “President Obama is strongly committed to protecting an open Internet that fosters investment, innovation, creativity, consumer choice, and free speech, unfettered by censorship or undue violations of privacy.”

Another area where the parties depart is on privacy. The Democratic platform backs Obama’s call for a consumer “Privacy Bill of Rights” and to offer consumers a chance to opt-out of Internet tracking. The administration’s privacy bill of rights, unveiled in February, calls on companies to do more to protect personal data by, for example, telling consumers about what data is being collected and how it is used. The administration called on Congress to codify its privacy proposals into legislation but the Democratic platform is silent on the issue.

The GOP platform discusses the need to protect individual liberty from government intrusion. However, the Republican platform does not mention the need to enhance consumer privacy.

The Democratic platform touted President Obama’s proposal to promote access to wireless broadband services. It notes that the administration has pledged to ensure that 98 percent of the country has access to wireless broadband service and is “finding new ways to free up wireless spectrum.”

The GOP plan also supports this goal, but offered more details and criticized Obama for not doing enough to free up more spectrum. The Republican platform noted that the Federal Communications Commission has yet to conduct one spectrum auction during the Obama administration. It also called for conducting an inventory of the nation’s current spectrum holdings to determine what airwaves can be auctioned for use by wireless providers.

Like the GOP platform, the Democratic plan also devotes attention to cybersecurity. The Democratic platform noted the “unprecedented steps” the administration has taken to protect the nation from cyberattacks and pledged to “continue to take steps to deter, prevent, detect, and defend against cyber intrusions by investing in cutting-edge research and development, promoting cybersecurity awareness and digital literacy, and strengthening private-sector and international partnerships.”

It notes that the president supports “comprehensive cybersecurity legislation that would help business and government protect against risks of cyberattacks.” But congressional attempts to pass such a measure stalled last month in the Senate. The platform said the president will “continue to take executive action to strengthen and update our cyber defenses.”

The GOP platform argues that the administration’s policies have “failed to curb malicious actions by our adversaries.” It called for an update of a decade-old law related to the security of government computer systems and greater sharing of information between the government and private sector.

On intellectual property, the Democratic platform said the administration is “vigorously protecting U.S. intellectual property—our technology and creativity—at home and abroad through better enforcement and innovative approaches such as voluntary efforts by all parties to minimize infringement while supporting the free flow of information.” Both party platforms call out China in particular for failing to do enough to protect U.S. intellectual property.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.