SlideShare a Scribd company logo
1 of 1
Download to read offline
Responsible Internet Measures
With decades of experience in the private and public sectors, Scott Cleland
is a proven thought leader in Internet-related policy and use. Through
advocating for a responsible Internet, an overhaul to the current Internet
adding safety and transparency measures, Scott Cleland works for greater
data protection without sacrificing utility.
The responsible Internet addresses the lack of transparency in data
storage online, the power imbalance between data storers and users, and
security risks inherent to data storage. A small handful of companies and
countries control a majority of Internet users’ data, giving this group
immense power over the Internet policies of countries who lack such
capabilities. Further, these companies store data on proprietary networks
and equipment, so only employees know how they operate. Because
citizens’ data is stored in such black box networks, users cannot easily
control the data they generate.
Creating a responsible Internet involves more than just using more secure
equipment. Though data storers may choose any network architecture or
equipment they like, both must use open source hardware and software, so
third parties can fully analyze their functionality and security. Measures like
end-to-end encryption can protect against data theft and privacy violation
by the data storers themselves.

More Related Content

Similar to Responsible Internet Measures

Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for GovernmentsCloudMask inc.
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET Journal
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoTnsangary
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
 
Where in the world is your Corporate data?
Where in the world is your Corporate data?Where in the world is your Corporate data?
Where in the world is your Corporate data?Ashish Patel
 
Report on Network Security And Privacy
Report on Network Security And PrivacyReport on Network Security And Privacy
Report on Network Security And PrivacyManan Gadhiya
 
President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...Clifton M. Hasegawa & Associates, LLC
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET Journal
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...Manish Sahani
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
Security and Privacy of Big Data in Mobile Devices
Security and Privacy of Big Data in Mobile DevicesSecurity and Privacy of Big Data in Mobile Devices
Security and Privacy of Big Data in Mobile DevicesIOSRjournaljce
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
Keep Student information protected while improving services
Keep Student information protected while improving servicesKeep Student information protected while improving services
Keep Student information protected while improving servicesCloudMask inc.
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliverMadison Oliver
 

Similar to Responsible Internet Measures (20)

Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for Governments
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoT
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
 
Where in the world is your Corporate data?
Where in the world is your Corporate data?Where in the world is your Corporate data?
Where in the world is your Corporate data?
 
Report on Network Security And Privacy
Report on Network Security And PrivacyReport on Network Security And Privacy
Report on Network Security And Privacy
 
President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Security and Privacy of Big Data in Mobile Devices
Security and Privacy of Big Data in Mobile DevicesSecurity and Privacy of Big Data in Mobile Devices
Security and Privacy of Big Data in Mobile Devices
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
journal paper
journal paperjournal paper
journal paper
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Keep Student information protected while improving services
Keep Student information protected while improving servicesKeep Student information protected while improving services
Keep Student information protected while improving services
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 

More from Scott Cleland

stop-section-230s-uncivil-war-destroying-democracy-in-america-rui-research-10...
stop-section-230s-uncivil-war-destroying-democracy-in-america-rui-research-10...stop-section-230s-uncivil-war-destroying-democracy-in-america-rui-research-10...
stop-section-230s-uncivil-war-destroying-democracy-in-america-rui-research-10...Scott Cleland
 
Common Examples of Online Crimes.pptx
Common Examples of Online Crimes.pptxCommon Examples of Online Crimes.pptx
Common Examples of Online Crimes.pptxScott Cleland
 
A Proven Thought Leadership Model
A Proven Thought Leadership ModelA Proven Thought Leadership Model
A Proven Thought Leadership ModelScott Cleland
 
What Is The Internet Reset?
What Is The Internet Reset?What Is The Internet Reset?
What Is The Internet Reset?Scott Cleland
 
The Internet Reset Defines New Realities for Institutional Investors
The Internet Reset Defines New Realities for Institutional InvestorsThe Internet Reset Defines New Realities for Institutional Investors
The Internet Reset Defines New Realities for Institutional InvestorsScott Cleland
 
A Convincing Antitrust Suit against Alphabet-Google Emerges
A Convincing Antitrust Suit against Alphabet-Google EmergesA Convincing Antitrust Suit against Alphabet-Google Emerges
A Convincing Antitrust Suit against Alphabet-Google EmergesScott Cleland
 
An Overview of Precursor, LLC
An Overview of Precursor, LLCAn Overview of Precursor, LLC
An Overview of Precursor, LLCScott Cleland
 
Amazon, Google, and Monopolist Tendencies
Amazon, Google, and Monopolist TendenciesAmazon, Google, and Monopolist Tendencies
Amazon, Google, and Monopolist TendenciesScott Cleland
 
Internetization and Framework Analysis
Internetization and Framework AnalysisInternetization and Framework Analysis
Internetization and Framework AnalysisScott Cleland
 
The Google Monopolization Strategy
The Google Monopolization StrategyThe Google Monopolization Strategy
The Google Monopolization StrategyScott Cleland
 
How Google Stunts Innovation and Harms Consumers
How Google Stunts Innovation and Harms ConsumersHow Google Stunts Innovation and Harms Consumers
How Google Stunts Innovation and Harms ConsumersScott Cleland
 
An Interview with Scott Cleland
An Interview with Scott ClelandAn Interview with Scott Cleland
An Interview with Scott ClelandScott Cleland
 
Precursor Blog Explains Netflix Response to Regulatory Arbitrage
Precursor Blog Explains Netflix Response to Regulatory ArbitragePrecursor Blog Explains Netflix Response to Regulatory Arbitrage
Precursor Blog Explains Netflix Response to Regulatory ArbitrageScott Cleland
 
Article Explores Google’s Reaction to Subpoena for Internal Documents
Article Explores Google’s Reaction to Subpoena for Internal DocumentsArticle Explores Google’s Reaction to Subpoena for Internal Documents
Article Explores Google’s Reaction to Subpoena for Internal DocumentsScott Cleland
 

More from Scott Cleland (14)

stop-section-230s-uncivil-war-destroying-democracy-in-america-rui-research-10...
stop-section-230s-uncivil-war-destroying-democracy-in-america-rui-research-10...stop-section-230s-uncivil-war-destroying-democracy-in-america-rui-research-10...
stop-section-230s-uncivil-war-destroying-democracy-in-america-rui-research-10...
 
Common Examples of Online Crimes.pptx
Common Examples of Online Crimes.pptxCommon Examples of Online Crimes.pptx
Common Examples of Online Crimes.pptx
 
A Proven Thought Leadership Model
A Proven Thought Leadership ModelA Proven Thought Leadership Model
A Proven Thought Leadership Model
 
What Is The Internet Reset?
What Is The Internet Reset?What Is The Internet Reset?
What Is The Internet Reset?
 
The Internet Reset Defines New Realities for Institutional Investors
The Internet Reset Defines New Realities for Institutional InvestorsThe Internet Reset Defines New Realities for Institutional Investors
The Internet Reset Defines New Realities for Institutional Investors
 
A Convincing Antitrust Suit against Alphabet-Google Emerges
A Convincing Antitrust Suit against Alphabet-Google EmergesA Convincing Antitrust Suit against Alphabet-Google Emerges
A Convincing Antitrust Suit against Alphabet-Google Emerges
 
An Overview of Precursor, LLC
An Overview of Precursor, LLCAn Overview of Precursor, LLC
An Overview of Precursor, LLC
 
Amazon, Google, and Monopolist Tendencies
Amazon, Google, and Monopolist TendenciesAmazon, Google, and Monopolist Tendencies
Amazon, Google, and Monopolist Tendencies
 
Internetization and Framework Analysis
Internetization and Framework AnalysisInternetization and Framework Analysis
Internetization and Framework Analysis
 
The Google Monopolization Strategy
The Google Monopolization StrategyThe Google Monopolization Strategy
The Google Monopolization Strategy
 
How Google Stunts Innovation and Harms Consumers
How Google Stunts Innovation and Harms ConsumersHow Google Stunts Innovation and Harms Consumers
How Google Stunts Innovation and Harms Consumers
 
An Interview with Scott Cleland
An Interview with Scott ClelandAn Interview with Scott Cleland
An Interview with Scott Cleland
 
Precursor Blog Explains Netflix Response to Regulatory Arbitrage
Precursor Blog Explains Netflix Response to Regulatory ArbitragePrecursor Blog Explains Netflix Response to Regulatory Arbitrage
Precursor Blog Explains Netflix Response to Regulatory Arbitrage
 
Article Explores Google’s Reaction to Subpoena for Internal Documents
Article Explores Google’s Reaction to Subpoena for Internal DocumentsArticle Explores Google’s Reaction to Subpoena for Internal Documents
Article Explores Google’s Reaction to Subpoena for Internal Documents
 

Recently uploaded

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Recently uploaded (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Responsible Internet Measures

  • 1. Responsible Internet Measures With decades of experience in the private and public sectors, Scott Cleland is a proven thought leader in Internet-related policy and use. Through advocating for a responsible Internet, an overhaul to the current Internet adding safety and transparency measures, Scott Cleland works for greater data protection without sacrificing utility. The responsible Internet addresses the lack of transparency in data storage online, the power imbalance between data storers and users, and security risks inherent to data storage. A small handful of companies and countries control a majority of Internet users’ data, giving this group immense power over the Internet policies of countries who lack such capabilities. Further, these companies store data on proprietary networks and equipment, so only employees know how they operate. Because citizens’ data is stored in such black box networks, users cannot easily control the data they generate. Creating a responsible Internet involves more than just using more secure equipment. Though data storers may choose any network architecture or equipment they like, both must use open source hardware and software, so third parties can fully analyze their functionality and security. Measures like end-to-end encryption can protect against data theft and privacy violation by the data storers themselves.