Open |
Easy and unrestricted access |
Yes, strongly negative |
How does this affect the ability of users or organizations to create new networks? Does it affect affordability and access among the general user population?
Example: A government- controlled company holds a monopoly on the Internet in a country.
|
Slower Internet and higher subscription costs for users. |
Unrestricted use and deployment of Internet technologies |
Yes, positive |
How does this affect the ability of a network or person to mix and match technologies, equipment, and devices?
Example: An authentication method actually makes it easier for users to create accounts without sharing data directly with the service.
|
Users can log in to accounts more easily, making it easier for new services to be adopted and used. |
Collaborative development, management, and governance |
Yes, strongly positive |
Does this support or undermine the collaborative, consensus-based model of the Internet?
Example: A community-managed IXP expands access, builds community, and supports the foundational principles of the Internet.
|
Peering keeps the network more resilient, helping users to have access that’s easier, cheaper, and more reliable. |
Globally connected |
Unrestricted reachability |
Yes, strongly negative |
Does it support or prevent users from visiting websites or services that should reasonably be available to them?
Example: A government-mandated filtering at the DNS level blocks traffic from reaching its destination makes the Internet less global.
|
Users can’t rely on the ability of a URL to reach its destination. It also reduces trust. |
Available capacity |
Yes, positive |
Does this help or hinder the ability of users or organizations to access the Internet capacity they need?
Example: By keeping traffic close to the users, an IXP can help to make connections cheaper, faster, and more reliable, increasing the capacity of the Internet, and users’ access to it.
|
A new, community-managed IXP makes the Internet faster and more reliable for everyone. As a result, more people are able to access the Internet and gain its benefits. |
Secure |
Data confidentiality of information, devices, and applications |
Yes, strongly negative |
Are there systems in place to prevent deliberate or accidental harm to the infrastructure? To what extent are users and services protected from things like botnets and phishing attacks?
Example: The UK’s Online Safety Act forces services to break end-to-end encryption, even exposing private messages, leaving anything and anyone connected to the service vulnerable to attacks and bad actors.
|
A user sending pictures of their child’s skin condition to their partner is also exposing their message to bad actors. |
Integrity of information, applications, and services |
Yes, positive |
Does this increase or decrease the ability of information to be transmitted without outside interference or access?
Example: RPKI (resource public key infrastructure) helps ISPs to validate the traffic they send and receive, reducing the risk of things like IP hijacking.
|
Someone sending an email to a friend can feel confident that the email will get there in its entirety. |
Trustworthy |
Reliability, resilience, and availability |
Yes, strongly negative |
How does this affect the ability of users and organizations to access and use the Internet when they need it?
Example: An Internet shutdown not only removes temporary access, it reduces trust in the Internet overall, which causes long-term harm.
|
A woman who relies on an online bus schedule so she can visit her family can’t travel safely, and stays home, experiencing isolation. |
Accountability |
Yes, positive, but weak |
Does this affect the ability of users to identify organizations or institutions, or to understand decisions that have been made?
Example: RFC 7725 makes it possible for a website owner to state that information isn’t available because of a legal demand, increasing transparency.
|
A student doing research can understand why their Google searches aren’t turning up information they thought they saw before. |
Privacy |
Yes, strongly negative |
Does this support or undermine users’ ability to understand and control how information about them is collected, shared, or used?
Example: The UK’s Online Safety Act forces services to break end-to-end encryption, even exposing private messages, violating user privacy and taking away their control over who sees their content.
|
A user sending pictures of their child’s skin condition to their partner could be falsely flagged for sharing CSAM material. |