recommended reading

Rep. Eshoo Calls for ‘Re-brand’ of Net Neutrality

Rep. Anna Eshoo, D-Calif.

Rep. Anna Eshoo, D-Calif. // Charles Dharapak/AP File Photo

Rep. Anna Eshoo has a plan to save net neutrality: Call it something else.

Americans, says the California Democrat, know what they want on the Internet, but the confusing terminology of the debate has left them confused about which plan matches their ideals. "The American people are left with a muddled understanding of what to support," she said.

Her plan calls for a "re-brand" of the term, which she defines as "the principle that all Internet traffic is created equal and should be treated as such." She's turning to—where else?—the Internet to help her give net neutrality its new moniker.

Tuesday, Eshoo launched a Reddit contest to start the re-brand. The most popular suggestion by Sept. 8 (assuming it's appropriate) will be designated as the new term for net neutrality.

Eshoo opposes the Federal Communications Commission's plan to allow Internet providers to charge for "fast lanes" for speedier Internet traffic, which she said "would mean a fast lane for those who can afford it and a slow lane for everyone else, hindering small businesses, innovators, and Internet users." True net neutrality, she said, would put all websites on a level playing field.

"In order to send a clear message to the FCC, I think we need to re-brand net neutrality to more accurately reflect our goal," she said.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.