
Resource Library
Everyone should have access to an open and trusted Internet.
Read our reports, papers, and other documents for insight and vision on how we can get there.

Action Plan 2025
Our 2025 Action Plan outlines our priorities in 2025, the first year of our 2030 Strategy.

2019-2024 Impact Results
Our Impact Report is a snapshot of how we worked with our global community to grow, promote, and defend the Internet worldwide.

Internet Impact Briefs
Shorter reports that analyze how different policies or new technologies may affect what the Internet needs to exist and thrive.

Glossary of Internet Terms
Understand key terms and become fluent in the language of the Internet with our new and improved glossary.

Policy Briefs
Our perspective on critical Internet issues, including community networks, encryption, open Internet standards, Internet Exchange Points, and more.
2030 Strategy
2024 West Africa Submarine Cable Outage Report
Internet Impact Brief: Nepal’s Proposed National Internet Gateway
Client-Side Scanning
Community Network Do-It-Yourself Toolkit
Civil Society Experts Voice Concern as New EU Digital Identity Regulation Finalized
How to Talk to Your Manager About Memory Safety
How the Chippewas of Nawash are Bridging the Digital Divide
Internet Fragmentation: An Explainer
Internet Society’s Submission to the European Commission’s Exploratory Consultation on “The future of the electronic communications sector and its infrastructure”
Encrypted DNS Factsheet
Homomorphic Encryption: What Is It, and Why Does It Matter?
Archives
Enhancing IoT Security: Final Outcomes and Recommendations Report
Info Guide: 6 Ways “Lawful Access” Puts Everyone’s Security At Risk
What is encryption?
Encryption is the process to scramble or hide information so it can only be read by someone with the means (or keys) to return it to ...
The Trust Opportunity: Exploring Consumer Attitudes to the Internet of Things
The economics of the security of consumer-grade IoT products and services
2018 Online Trust Audit and Honor Roll
The Online Trust Audit & Honor Roll assesses nearly 1,200 organizations, recognizing excellence in online consumer protection, data security, and responsible privacy practices. This 10th annual audit of more than 1,200 predominantly consumer-facing ...
Best Practices: Infrastructure Security
- Optimize TLS implementation using information gleaned from public tools. This includes eliminating use of insecure ciphers and older, insecure protocols as well as vulnerabilities to the POODLE and ROBOT ...
Best Practices: Privacy
- Make sure the privacy statement has a link and is easily discoverable from the home page.
- Place the revision date of the statement at the top ...
DNS Privacy Frequently Asked Questions (FAQ)
IPv6 Security for IPv4 Engineers
Introduction to DNS Privacy
IPv6 Security Frequently Asked Questions (FAQ)
The Internet Society recognises that global deployment of the IPv6 protocol is paramount to accommodate the present and future growth of the Internet. Given the scale at which IPv6 must ...
10 Goals for Good Privacy Protection Law
Annual Reports and Financials
On annual basis, we publish annual reports (an Action Plan and Impact Report), as well as financial reports, annual financial statements, and Form 990s.