SlideShare a Scribd company logo
Mozilla & Public Policy
 a discussion Framework for the Mozilla Community
                  September 2012

                     DRAFT
let’s start with some questions




    why         what’s      what’s            what and
participate?               our goal?   who?
               our role?                       when?
public policy can help or hurt the web

      policy threats have been constant since the
                       beginning



       1996                         1997
  Advocates win                                                   2012
                     WIPO almost made caching copyright
protections in CDA                                        ACTA and SOPA Defeated
                               infringement




                                   what would the web look like
we can make a difference by both
        advancing and defending the open web
                                                                             Do Not Trac




  Export Control           Do Not Track            Jailbreaking




 open source products      Launched DNT and
availabel to more people    now all browsers       Supported DMCA
    around the world          support DNT      exemption for jail-breaking
What’s our role?

engage when we can make a difference
            ... without compromising core code efforts

            ... when we can add differential value

            ... directly or indirectly



  educate       organize               enable         advocate
 <inform>      <convene>             <support>       <engage>
When do we act?




when fundamental web DNA is threatened
Open web threats are global

  ISP Data                                              Russian Internet
  Sharing Bill                  German Copyright bill      Blacklist Bill

SOPA                      ACTA
   CISPA                                Egypt & Syria
                                              Internet
                                            shutdown(s)        Pakistan
                 ITU Internet                                Censorship Bill
                  governance
                   proposal
Threats to the Open Web

                               choice and control

                                    accessibility

Anti-competitive
     practices

                                                         Open web
                                 prioritized traffic

Prioritized traffic
                               interoperability            DNA
  Commercial
    interests                no advance permissions          ...
 State interests
                                     distributed         Essential
                                  content neutral      characteristics
  Intermediary
     Liability                          security




                                resilience

                                 privacy
How do we engage?


      macro                 empower mozilla
                              communities
                                                          micro
                      educate
                                        drive awareness     support local
  direct action
                                                            stakeholders
                    sponsor advocates
                                           convene


                             support issue
                               initiatives




   Internet wide and                              isolated or regional
immediate threats to the                         threats to open web
       open web
http://www.mozilla.org

More Related Content

What's hot

Buildingblockspdf
BuildingblockspdfBuildingblockspdf
Buildingblockspdf
Joyce Schwarz
 
Indonesia, Internet Governance Forum and Multistakeholder
Indonesia, Internet Governance Forum and MultistakeholderIndonesia, Internet Governance Forum and Multistakeholder
Indonesia, Internet Governance Forum and Multistakeholder
Shita Laksmi
 
The Real Problem of Bridging the Multimedia “Semantic Gap”
The Real Problem of Bridging the Multimedia “Semantic Gap” The Real Problem of Bridging the Multimedia “Semantic Gap”
The Real Problem of Bridging the Multimedia “Semantic Gap”
jrs21
 
milSuite and Open Source
milSuite and Open SourcemilSuite and Open Source
milSuite and Open Source
milSuite
 
Disintermediation: The Shift Has Happened
Disintermediation: The Shift Has HappenedDisintermediation: The Shift Has Happened
Disintermediation: The Shift Has Happened
Colin Daniels
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
segughana
 
Openness And Social Networking (PDF)
Openness And Social Networking (PDF)Openness And Social Networking (PDF)
Openness And Social Networking (PDF)
Colin
 
Misinformation on the internet: Video and AI
Misinformation on the internet: Video and AIMisinformation on the internet: Video and AI
Misinformation on the internet: Video and AI
VasileiosMezaris
 
Internet
InternetInternet
Internet
AhmedHussain180
 
Staying up to date with Utility Locating
Staying up to date with Utility LocatingStaying up to date with Utility Locating
Staying up to date with Utility Locating
Utilocate
 
Innovation
InnovationInnovation
Innovation
Dave Tinker
 
e-G8 Summary
e-G8 Summarye-G8 Summary
e-G8 Summary
Simeon Oriko
 
Slide Deck about Cybersecurity by Marcos Semola 2017
Slide Deck about Cybersecurity by Marcos Semola 2017Slide Deck about Cybersecurity by Marcos Semola 2017
Slide Deck about Cybersecurity by Marcos Semola 2017
Marcos Semola
 
Video Activism
Video ActivismVideo Activism
BCS ITNow 201303 - Cope, Educate, Secure
BCS ITNow 201303 - Cope, Educate, SecureBCS ITNow 201303 - Cope, Educate, Secure
BCS ITNow 201303 - Cope, Educate, Secure
Gareth Niblett
 
Supporting Activists to Preserve Video Documentation
Supporting Activists to Preserve Video Documentation Supporting Activists to Preserve Video Documentation
Supporting Activists to Preserve Video Documentation
dri_ireland
 

What's hot (16)

Buildingblockspdf
BuildingblockspdfBuildingblockspdf
Buildingblockspdf
 
Indonesia, Internet Governance Forum and Multistakeholder
Indonesia, Internet Governance Forum and MultistakeholderIndonesia, Internet Governance Forum and Multistakeholder
Indonesia, Internet Governance Forum and Multistakeholder
 
The Real Problem of Bridging the Multimedia “Semantic Gap”
The Real Problem of Bridging the Multimedia “Semantic Gap” The Real Problem of Bridging the Multimedia “Semantic Gap”
The Real Problem of Bridging the Multimedia “Semantic Gap”
 
milSuite and Open Source
milSuite and Open SourcemilSuite and Open Source
milSuite and Open Source
 
Disintermediation: The Shift Has Happened
Disintermediation: The Shift Has HappenedDisintermediation: The Shift Has Happened
Disintermediation: The Shift Has Happened
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
 
Openness And Social Networking (PDF)
Openness And Social Networking (PDF)Openness And Social Networking (PDF)
Openness And Social Networking (PDF)
 
Misinformation on the internet: Video and AI
Misinformation on the internet: Video and AIMisinformation on the internet: Video and AI
Misinformation on the internet: Video and AI
 
Internet
InternetInternet
Internet
 
Staying up to date with Utility Locating
Staying up to date with Utility LocatingStaying up to date with Utility Locating
Staying up to date with Utility Locating
 
Innovation
InnovationInnovation
Innovation
 
e-G8 Summary
e-G8 Summarye-G8 Summary
e-G8 Summary
 
Slide Deck about Cybersecurity by Marcos Semola 2017
Slide Deck about Cybersecurity by Marcos Semola 2017Slide Deck about Cybersecurity by Marcos Semola 2017
Slide Deck about Cybersecurity by Marcos Semola 2017
 
Video Activism
Video ActivismVideo Activism
Video Activism
 
BCS ITNow 201303 - Cope, Educate, Secure
BCS ITNow 201303 - Cope, Educate, SecureBCS ITNow 201303 - Cope, Educate, Secure
BCS ITNow 201303 - Cope, Educate, Secure
 
Supporting Activists to Preserve Video Documentation
Supporting Activists to Preserve Video Documentation Supporting Activists to Preserve Video Documentation
Supporting Activists to Preserve Video Documentation
 

Viewers also liked

autozone CorpGovernanceOverview020507
autozone  CorpGovernanceOverview020507autozone  CorpGovernanceOverview020507
autozone CorpGovernanceOverview020507
finance46
 
Ly fundraiser3 1
Ly fundraiser3 1Ly fundraiser3 1
Ly fundraiser3 1
gowayne
 
Wdh 27012010
Wdh 27012010Wdh 27012010
Wdh 27012010
Johan Lapidaire
 
CLOrox fy05_q2_spmt
CLOrox   fy05_q2_spmtCLOrox   fy05_q2_spmt
CLOrox fy05_q2_spmt
finance48
 
Noise
NoiseNoise
Noise
klee4vp
 
галактика мониторинг заказов
галактика мониторинг заказовгалактика мониторинг заказов
галактика мониторинг заказов
Светлана Глазкова
 
Capitalizing On The Crisis: Strategic Decision-Making in an Uncertain Economy
Capitalizing On The Crisis: Strategic Decision-Making in an Uncertain EconomyCapitalizing On The Crisis: Strategic Decision-Making in an Uncertain Economy
Capitalizing On The Crisis: Strategic Decision-Making in an Uncertain Economy
skaf777
 
10 Leadership Reminders
10 Leadership Reminders10 Leadership Reminders
10 Leadership Reminders
Rajesh Goyal
 
P A P E R 05 2005 Characterization Of S O L I D W A S T E Disposed At Col...
P A P E R 05 2005  Characterization Of  S O L I D  W A S T E Disposed At  Col...P A P E R 05 2005  Characterization Of  S O L I D  W A S T E Disposed At  Col...
P A P E R 05 2005 Characterization Of S O L I D W A S T E Disposed At Col...
Ignacio García-Martínez
 
Презентация учителя для выявления представлений и интересов учащихся
Презентация учителя для выявления представлений и интересов учащихсяПрезентация учителя для выявления представлений и интересов учащихся
Презентация учителя для выявления представлений и интересов учащихся
guestd828b89
 
molson coors brewing COORS_AR2003
molson coors brewing  COORS_AR2003molson coors brewing  COORS_AR2003
molson coors brewing COORS_AR2003
finance46
 
The Americas
The AmericasThe Americas
The Americas
eastonworld
 
tenneco annual reports 2003
tenneco annual reports 2003tenneco annual reports 2003
tenneco annual reports 2003
finance46
 
Publicitaris jornada t_milan
Publicitaris jornada t_milanPublicitaris jornada t_milan
Publicitaris jornada t_milantrinamilan
 
CLOrox 1.%20Consolidated%20Earnings%20Segment%20Information%20and%20Consoli...
CLOrox   1.%20Consolidated%20Earnings%20Segment%20Information%20and%20Consoli...CLOrox   1.%20Consolidated%20Earnings%20Segment%20Information%20and%20Consoli...
CLOrox 1.%20Consolidated%20Earnings%20Segment%20Information%20and%20Consoli...
finance48
 
The Singleton Dilemma
The Singleton DilemmaThe Singleton Dilemma
The Singleton Dilemma
Frank Sons
 
omnicare annual reports 2004
omnicare annual reports 2004omnicare annual reports 2004
omnicare annual reports 2004
finance46
 
molson coors brewing COORS_AR1998
molson coors brewing  COORS_AR1998molson coors brewing  COORS_AR1998
molson coors brewing COORS_AR1998
finance46
 
Daffodil Principle
Daffodil PrincipleDaffodil Principle
Daffodil Principle
guest1e44cab
 

Viewers also liked (20)

autozone CorpGovernanceOverview020507
autozone  CorpGovernanceOverview020507autozone  CorpGovernanceOverview020507
autozone CorpGovernanceOverview020507
 
Ly fundraiser3 1
Ly fundraiser3 1Ly fundraiser3 1
Ly fundraiser3 1
 
Wdh 27012010
Wdh 27012010Wdh 27012010
Wdh 27012010
 
CLOrox fy05_q2_spmt
CLOrox   fy05_q2_spmtCLOrox   fy05_q2_spmt
CLOrox fy05_q2_spmt
 
Noise
NoiseNoise
Noise
 
галактика мониторинг заказов
галактика мониторинг заказовгалактика мониторинг заказов
галактика мониторинг заказов
 
Jp2007284370
Jp2007284370Jp2007284370
Jp2007284370
 
Capitalizing On The Crisis: Strategic Decision-Making in an Uncertain Economy
Capitalizing On The Crisis: Strategic Decision-Making in an Uncertain EconomyCapitalizing On The Crisis: Strategic Decision-Making in an Uncertain Economy
Capitalizing On The Crisis: Strategic Decision-Making in an Uncertain Economy
 
10 Leadership Reminders
10 Leadership Reminders10 Leadership Reminders
10 Leadership Reminders
 
P A P E R 05 2005 Characterization Of S O L I D W A S T E Disposed At Col...
P A P E R 05 2005  Characterization Of  S O L I D  W A S T E Disposed At  Col...P A P E R 05 2005  Characterization Of  S O L I D  W A S T E Disposed At  Col...
P A P E R 05 2005 Characterization Of S O L I D W A S T E Disposed At Col...
 
Презентация учителя для выявления представлений и интересов учащихся
Презентация учителя для выявления представлений и интересов учащихсяПрезентация учителя для выявления представлений и интересов учащихся
Презентация учителя для выявления представлений и интересов учащихся
 
molson coors brewing COORS_AR2003
molson coors brewing  COORS_AR2003molson coors brewing  COORS_AR2003
molson coors brewing COORS_AR2003
 
The Americas
The AmericasThe Americas
The Americas
 
tenneco annual reports 2003
tenneco annual reports 2003tenneco annual reports 2003
tenneco annual reports 2003
 
Publicitaris jornada t_milan
Publicitaris jornada t_milanPublicitaris jornada t_milan
Publicitaris jornada t_milan
 
CLOrox 1.%20Consolidated%20Earnings%20Segment%20Information%20and%20Consoli...
CLOrox   1.%20Consolidated%20Earnings%20Segment%20Information%20and%20Consoli...CLOrox   1.%20Consolidated%20Earnings%20Segment%20Information%20and%20Consoli...
CLOrox 1.%20Consolidated%20Earnings%20Segment%20Information%20and%20Consoli...
 
The Singleton Dilemma
The Singleton DilemmaThe Singleton Dilemma
The Singleton Dilemma
 
omnicare annual reports 2004
omnicare annual reports 2004omnicare annual reports 2004
omnicare annual reports 2004
 
molson coors brewing COORS_AR1998
molson coors brewing  COORS_AR1998molson coors brewing  COORS_AR1998
molson coors brewing COORS_AR1998
 
Daffodil Principle
Daffodil PrincipleDaffodil Principle
Daffodil Principle
 

Similar to Draft Framework sep 26

The Future of Digital Freedom
The Future of Digital FreedomThe Future of Digital Freedom
The Future of Digital Freedom
Mike Linksvayer
 
Internet Science
Internet ScienceInternet Science
Internet Science
i_scienceEU
 
FISL 2012 Prezo
FISL 2012 PrezoFISL 2012 Prezo
FISL 2012 Prezo
chefhja
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploits
ecarrow
 
FaceTime - DSS @Vilnius 2010
FaceTime - DSS @Vilnius 2010FaceTime - DSS @Vilnius 2010
FaceTime - DSS @Vilnius 2010
Andris Soroka
 
IT Vulnerability & Tools Watch 2011
IT Vulnerability & Tools Watch 2011IT Vulnerability & Tools Watch 2011
IT Vulnerability & Tools Watch 2011
WASecurity
 
Crowdshare, Secure Resource Sharing in Mobile Crowds
Crowdshare, Secure Resource Sharing in Mobile CrowdsCrowdshare, Secure Resource Sharing in Mobile Crowds
Crowdshare, Secure Resource Sharing in Mobile Crowds
Heinrich Seeger
 
גיא אילון Websense
גיא אילון   Websenseגיא אילון   Websense
גיא אילון Websense
lihig
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
tovmug
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
ITDogadjaji.com
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
Hamisi Kibonde
 
Isaca june 19, 2010
Isaca june 19, 2010Isaca june 19, 2010
Isaca june 19, 2010
Vicky Shah
 
Gaining User Traction in Decentralized Projects
Gaining User Traction in Decentralized ProjectsGaining User Traction in Decentralized Projects
Gaining User Traction in Decentralized Projects
aatkin1971
 
CrowdSec - Smart Money Round deck
CrowdSec - Smart Money Round deckCrowdSec - Smart Money Round deck
CrowdSec - Smart Money Round deck
CrowdSec
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
Kenny Huang Ph.D.
 
Hacking - how accessible is it?
Hacking - how accessible is it?Hacking - how accessible is it?
Hacking - how accessible is it?
CPPGroup Plc
 
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรการสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
Software Park Thailand
 
GateWall DNS Filter
GateWall DNS FilterGateWall DNS Filter
GateWall DNS Filter
entensys
 
Tokenization on the Node - Data Protection for Security and Compliance
Tokenization on the Node - Data Protection for Security and ComplianceTokenization on the Node - Data Protection for Security and Compliance
Tokenization on the Node - Data Protection for Security and Compliance
Ulf Mattsson
 
Apresentação Allen ES
Apresentação Allen ESApresentação Allen ES
Apresentação Allen ES
Allen Informática
 

Similar to Draft Framework sep 26 (20)

The Future of Digital Freedom
The Future of Digital FreedomThe Future of Digital Freedom
The Future of Digital Freedom
 
Internet Science
Internet ScienceInternet Science
Internet Science
 
FISL 2012 Prezo
FISL 2012 PrezoFISL 2012 Prezo
FISL 2012 Prezo
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploits
 
FaceTime - DSS @Vilnius 2010
FaceTime - DSS @Vilnius 2010FaceTime - DSS @Vilnius 2010
FaceTime - DSS @Vilnius 2010
 
IT Vulnerability & Tools Watch 2011
IT Vulnerability & Tools Watch 2011IT Vulnerability & Tools Watch 2011
IT Vulnerability & Tools Watch 2011
 
Crowdshare, Secure Resource Sharing in Mobile Crowds
Crowdshare, Secure Resource Sharing in Mobile CrowdsCrowdshare, Secure Resource Sharing in Mobile Crowds
Crowdshare, Secure Resource Sharing in Mobile Crowds
 
גיא אילון Websense
גיא אילון   Websenseגיא אילון   Websense
גיא אילון Websense
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
Isaca june 19, 2010
Isaca june 19, 2010Isaca june 19, 2010
Isaca june 19, 2010
 
Gaining User Traction in Decentralized Projects
Gaining User Traction in Decentralized ProjectsGaining User Traction in Decentralized Projects
Gaining User Traction in Decentralized Projects
 
CrowdSec - Smart Money Round deck
CrowdSec - Smart Money Round deckCrowdSec - Smart Money Round deck
CrowdSec - Smart Money Round deck
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Hacking - how accessible is it?
Hacking - how accessible is it?Hacking - how accessible is it?
Hacking - how accessible is it?
 
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรการสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
 
GateWall DNS Filter
GateWall DNS FilterGateWall DNS Filter
GateWall DNS Filter
 
Tokenization on the Node - Data Protection for Security and Compliance
Tokenization on the Node - Data Protection for Security and ComplianceTokenization on the Node - Data Protection for Security and Compliance
Tokenization on the Node - Data Protection for Security and Compliance
 
Apresentação Allen ES
Apresentação Allen ESApresentação Allen ES
Apresentação Allen ES
 

Recently uploaded

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 

Recently uploaded (20)

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 

Draft Framework sep 26

  • 1. Mozilla & Public Policy a discussion Framework for the Mozilla Community September 2012 DRAFT
  • 2. let’s start with some questions why what’s what’s what and participate? our goal? who? our role? when?
  • 3. public policy can help or hurt the web policy threats have been constant since the beginning 1996 1997 Advocates win 2012 WIPO almost made caching copyright protections in CDA ACTA and SOPA Defeated infringement what would the web look like
  • 4. we can make a difference by both advancing and defending the open web Do Not Trac Export Control Do Not Track Jailbreaking open source products Launched DNT and availabel to more people now all browsers Supported DMCA around the world support DNT exemption for jail-breaking
  • 5. What’s our role? engage when we can make a difference ... without compromising core code efforts ... when we can add differential value ... directly or indirectly educate organize enable advocate <inform> <convene> <support> <engage>
  • 6. When do we act? when fundamental web DNA is threatened
  • 7. Open web threats are global ISP Data Russian Internet Sharing Bill German Copyright bill Blacklist Bill SOPA ACTA CISPA Egypt & Syria Internet shutdown(s) Pakistan ITU Internet Censorship Bill governance proposal
  • 8. Threats to the Open Web choice and control accessibility Anti-competitive practices Open web prioritized traffic Prioritized traffic interoperability DNA Commercial interests no advance permissions ... State interests distributed Essential content neutral characteristics Intermediary Liability security resilience privacy
  • 9. How do we engage? macro empower mozilla communities micro educate drive awareness support local direct action stakeholders sponsor advocates convene support issue initiatives Internet wide and isolated or regional immediate threats to the threats to open web open web