|
||||||
|
||||||
A portion of the debate over net neutrality centered on whether subscribers should have the right to use devices of their choice. The FCC's Open Internet regulations included a "any device" rule, but it only applies to subscribers of fixed broadband Internet access service. In contrast, subscribers of mobile broadband Internet access service have no such right. Subscribers of wired common carrier telephone service and of cable television service also have a right to use devices of their choice, but subscribers of satellite television and cell phone service do not. We propose here that users of all communication services should have such a right. We propose a law that ensures this right in all types of communication networks, while simultaneously ensuring service providers the right to reasonable network management. We explore the issues that must be resolved in order to create unified regulation of device attachment in converged communication networks. It is apparent that it is not sufficient to merely state an “any device” rule without substantial development of further statutes or regulations that detail what this means. We posit that these issues include demarcation of the connection point between a provider’s network and a user’s network, delineation of reasonable network management of various user devices, subsidization of user devices, and content protection. Furthermore, reasonable network management in this context requires identification of not only which functions are reasonable but also in which devices. Thus issues of discrimination and harm also arise. For each such issue, we present an example of statutory language that could be used to resolve the issue. This paper is intended for people with a background in communications policy:
This paper is intended for people with a technical background in networking:
Portions of this work were supported by NSF. Any opinions, findings, conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation or IEEE. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. One print or electronic copy may be made for personal use only. Permission must be obtained from the copyright holder for systematic or multiple reproduction, distribution to multiple locations via electronic or other means, duplication of any material in these papers for a fee or for commercial purposes, modification of the content of these papers, reprinting or republishing of this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, and to reuse any copyrighted component of this work in other works. |
||||||
| Scott Jordan | last modified June 4, 2013 | UCI CS Networked Systems |