Library shelves with books

Resource Library

Everyone should have access to an open and trusted Internet.
Read our reports, papers, and other documents for insight and vision on how we can get there.

A person capturing a photograph of a picturesque village

Action Plan 2025

Our 2025 Action Plan outlines our priorities in 2025, the first year of our 2030 Strategy.

2019-2024 Impact Results

Our Impact Report is a snapshot of how we worked with our global community to grow, promote, and defend the Internet worldwide.

forest trees from above

Internet Impact Briefs

Shorter reports that analyze how different policies or new technologies may affect what the Internet needs to exist and thrive.

Glossary of Internet Terms

Understand key terms and become fluent in the language of the Internet with our new and improved glossary. 

Blue background with pattern

Policy Briefs

Our perspective on critical Internet issues, including community networks, encryption, open Internet standards, Internet Exchange Points, and more.

2030 Strategy

The Internet Society’s 2030 Strategy embodies our mission: the Internet is a resource to enrich people’s lives and a force for good in society ...

2024 West Africa Submarine Cable Outage Report

Learn about the West Africa submarine cable outage, and its impact on Internet connectivity in 13 countries ...

Internet Impact Brief: Nepal’s Proposed National Internet Gateway

Learn about the implications of Nepal’s National Internet Gateway proposal on Internet access and security ...

Client-Side Scanning

Read about the Internet Society's recommendations to European Parliament proposed regulation on preventing and combating child sexual abuse ...

Community Network Do-It-Yourself Toolkit

The toolkit organizes a series of resources in 10 steps and outlines everything you need to know to prepare, build, and maintain a community network ...

Civil Society Experts Voice Concern as New EU Digital Identity Regulation Finalized

Read the analysis and recommendations developed by the Internet Society, Center for Democracy and Technology, Electronic Frontier Foundation, and Epicenter.works regarding new EU Digital Identity Regulation ...

How to Talk to Your Manager About Memory Safety

Learn about memory safety, memory-safe languages, common bugs and vulnerabilities, and the reasons for memory safe language adoption and use ...

How the Chippewas of Nawash are Bridging the Digital Divide

Through investments in a community network initiative and skills development programs, the Chippewas of Nawash now have reliable, affordable, high speed Internet connectivity.  ...

Internet Fragmentation: An Explainer

Internet fragmentation affects all of us. Learn how policies and proposals around the world put the open Internet at risk ...

Internet Society’s Submission to the European Commission’s Exploratory Consultation on “The future of the electronic communications sector and its infrastructure”

We provided feedback in response to the European Commission’s exploratory consultation on the “The future of the electronic communications sector and its infrastructure” ...

Encrypted DNS Factsheet

The domain name system (DNS) makes the Internet easier for humans to navigate as well as for services online to be highly resilient ...

Homomorphic Encryption: What Is It, and Why Does It Matter?

Learn about the concept of homomorphic encryption, its practicalities and implications, in order to make smart choices about this emerging technology ...

Archives

Enhancing IoT Security: Final Outcomes and Recommendations Report

The Internet of Things (IoT) carries enormous potential to change the world for the better. Projections for the impact of IoT on the Internet and the global economy are impressive, ...

Info Guide: 6 Ways “Lawful Access” Puts Everyone’s Security At Risk

What is encryption?

Encryption is the process to scramble or hide information so it can only be read by someone with the means (or keys) to return it to ...

The Trust Opportunity: Exploring Consumer Attitudes to the Internet of Things

This new research from Consumers International and the Internet Society explored consumer perceptions and attitudes towards trust, security and the privacy of consumer Internet of Things (IoT) devices. The survey ...

The economics of the security of consumer-grade IoT products and services

Security is often lacking in consumer IoT devices: an analysis of 10 of the most common types of consumer devices found that 70% contained serious vulnerabilities ...

2018 Online Trust Audit and Honor Roll

The Online Trust Audit & Honor Roll assesses nearly 1,200 organizations, recognizing excellence in online consumer protection, data security, and responsible privacy practices. This 10th annual audit of more than 1,200 predominantly consumer-facing ...

Best Practices: Infrastructure Security

  1. Optimize TLS implementation using information gleaned from public tools. This includes eliminating use of insecure ciphers and older, insecure protocols as well as vulnerabilities to the POODLE and ROBOT ...

Best Practices: Privacy

  • Make sure the privacy statement has a link and is easily discoverable from the home page.
  • Place the revision date of the statement at the top ...

DNS Privacy Frequently Asked Questions (FAQ)

Almost every time we use an Internet application, it starts with a Domain Name System (DNS) transaction to map a human-friendly domain name into a set of IP addresses that ...

IPv6 Security for IPv4 Engineers

This document provides an overview of IPv6 security that is specifically aimed at IPv4 engineers and operators. Rather than describing IPv6 in an isolated manner, it aims to re-use as ...

Introduction to DNS Privacy

Almost every time we use an Internet application, it starts with a Domain Name System (DNS) transaction to map a human-friendly domain name into a set of IP addresses that ...

IPv6 Security Frequently Asked Questions (FAQ)

The Internet Society recognises that global deployment of the IPv6 protocol is paramount to accommodate the present and future growth of the Internet. Given the scale at which IPv6 must ...

10 Goals for Good Privacy Protection Law

The concept of digital “privacy” refers to an individual’s right to determine when, how, and to what extent their personal data can be shared. Privacy is essential to our ability ...

Annual Reports and Financials

On annual basis, we publish annual reports (an Action Plan and Impact Report), as well as financial reports, annual financial statements, and Form 990s.