A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.
Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.
Subcommunities on Beehaw:
This community’s icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.
“Title II” in this context refers to Subchapter II of 47 U.S.C. Chapter 5. 47 U.S.C. is the Communications Act of 1934, the act of Congress that established the FCC, and Chapter 5 is the part that deals with “Wire and Radio Communications.”
If you want to know what this law empowers the FCC to do, you can read the statute yourself. Or, if that’s too difficult, you can also use your access to the internet to look up more accessible sources, such as Wikipedia’s “Common carrier” article.
I feel like reading statutes is unreliable because a lot of how the law works is how courts interpret the law, which can be very different from the commonsense interpretation of the letter of the law. Lacking broader context, I can’t know from just this exactly what the consequences might be. Here’s some parts that are possibly concerning though:
Not sure if this increases the ability of the government to spy on people through their ISPs or if that remains the same.
Some states have been experimenting with broad bans on online porn sites and requiring those sites and also social media sites to demand id from all users, maybe this provision could give a future FCC the power to apply this sort of thing to the internet nationally? Although this section already explicitly mentions the internet which is confusing if this whole thing is only recently being made relevant to the internet.
There are provisions about the FCC being able to come up with rules for the prevention of robocalls, maybe this could be generalized to prohibit some forms of automated network traffic?