{"id":11123,"date":"2013-05-10T16:10:29","date_gmt":"2013-05-10T16:10:29","guid":{"rendered":"http:\/\/www.publicknowledge.org\/uncategorized\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/"},"modified":"2025-01-09T21:06:02","modified_gmt":"2025-01-09T21:06:02","slug":"fcc-this-is-what-a-net-neutrality-violation-looks-like","status":"publish","type":"post","link":"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/","title":{"rendered":"FCC: This is What a Net Neutrality Violation Looks Like"},"content":{"rendered":"\n<p><a href=\"http:\/\/www.theverge.com\/2013\/5\/9\/4317136\/espn-may-pay-carriers-to-sidestep-data-caps\" target=\"_blank\" rel=\"noopener noreferrer\">News broke today<\/a> that ESPN is in negotiations with at least one major wireless carrier to pay to exempt ESPN content from data caps.\u00a0 This type of structure, where content providers who pay get better access to customers, is exactly what net neutrality is designed to prevent.<\/p>\n\n\n\n<p>At its core, net neutrality is all about making sure that the company that connects you to the internet does not get to control what you do on the internet (if you ever forget that, just head on over to <a href=\"http:\/\/whatisnetneutrality.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">WhatIsNetNeutrality.org<\/a> for a reminder).&nbsp; Imposing data caps on consumers and then allowing wealthy content holders to buy their way around them is a recipe for stagnation online.<\/p>\n\n\n\n<p>What kinds of problems does this create?&nbsp; Fortunately, in its <a href=\"https:\/\/docs.fcc.gov\/public\/attachments\/FCC-10-201A1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Open Internet Order<\/a>, the Federal Communications Commission (FCC) provided us with a taste of what may happen (\u201cedge providers\u201d are anyone who creates content like ESPN, Facebook, local governments, and personal websites):<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u201ca broadband provider may act to benefit edge providers that have paid it to exclude rivals\u201d (Paragraph 23)<\/li>\n\n\n\n<li>\u201cbroadband providers may have incentives to increase revenues by charging edge providers, who already pay for their own connections to the Internet, for access or prioritized access to end users.\u201d (Paragraph 24)<\/li>\n\n\n\n<li>\u201cBroadband providers would be expected to set inefficiently high fees to edge providers because they receive the benefits of those fees but are unlikely to fully account of the detrimental impact on edge providers\u2019 ability and incentive to innovate and invest, including the possibility that some edge providers might exit or decline to enter the market.\u201d (Paragraph 25)<\/li>\n\n\n\n<li>\u201cFees for access or prioritized access could trigger an \u2018arms race\u2019 within a given edge market segment.\u00a0 If one edge provider pays for access or prioritized access to end users, subscribers may tend to favor that provider\u2019s services, and competing edge providers may feel that they must respond by paying too.\u201d (Paragraph 25)<\/li>\n\n\n\n<li>\u201cFees for access or prioritization to end users could reduce the potential profits that an edge provider would expect to earn from developing new offerings, and thereby reducing edge providers\u2019 incentives to invest and innovate.\u201d (Paragraph 26)<\/li>\n\n\n\n<li>\u201cif broadband providers can profitably charge edge providers for prioritized access to end users, they will have an incentive to degrade or decline to increase the quality of the service they provide to non-prioritized traffic.\u201d (Paragraph 29)<\/li>\n<\/ul>\n\n\n\n<p>The deal being discussed could cause all of these harms and more.&nbsp; Now is the time for the FCC to step up and preserve an open internet.<\/p>\n\n\n\n<p><em>Image by flickr user <a href=\"http:\/\/www.flickr.com\/photos\/28478778@N05\/4568484975\/\" target=\"_blank\" rel=\"noopener noreferrer\">espensorvik<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Content providers paying ISPs special fees to access customers is exactly what net neutrality is supposed to prevent.\u00a0 It is time for the FCC to heed its own.<\/p>\n","protected":false},"author":34,"featured_media":37633,"parent":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[13],"class_list":["post-11123","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights","tag-net-neutrality"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v26.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>FCC: This is What a Net Neutrality Violation Looks Like - Public Knowledge<\/title>\n<meta name=\"description\" content=\"Public Knowledge promotes freedom of expression, an open internet, and access to affordable communications tools and creative works. We work to shape policy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FCC: This is What a Net Neutrality Violation Looks Like\" \/>\n<meta property=\"og:description\" content=\"Public Knowledge promotes freedom of expression, an open internet, and access to affordable communications tools and creative works. We work to shape policy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/\" \/>\n<meta property=\"og:site_name\" content=\"Public Knowledge\" \/>\n<meta property=\"article:published_time\" content=\"2013-05-10T16:10:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-09T21:06:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/publicknowledge.org\/wp-content\/uploads\/2013\/05\/4568484975_74dab3fac5_o-1-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1714\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Weinberg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Weinberg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/\"},\"author\":{\"name\":\"Michael Weinberg\",\"@id\":\"https:\/\/publicknowledge.org\/#\/schema\/person\/d86e4e889c8715e52178dc26db496b5c\"},\"headline\":\"FCC: This is What a Net Neutrality Violation Looks Like\",\"datePublished\":\"2013-05-10T16:10:29+00:00\",\"dateModified\":\"2025-01-09T21:06:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/\"},\"wordCount\":432,\"publisher\":{\"@id\":\"https:\/\/publicknowledge.org\/#organization\"},\"image\":{\"@id\":\"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/publicknowledge.org\/wp-content\/uploads\/2013\/05\/4568484975_74dab3fac5_o-1-scaled.jpg\",\"keywords\":[\"Net Neutrality\"],\"articleSection\":[\"Insights\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/\",\"url\":\"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/\",\"name\":\"FCC: This is What a Net Neutrality Violation Looks Like - Public Knowledge\",\"isPartOf\":{\"@id\":\"https:\/\/publicknowledge.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/publicknowledge.org\/wp-content\/uploads\/2013\/05\/4568484975_74dab3fac5_o-1-scaled.jpg\",\"datePublished\":\"2013-05-10T16:10:29+00:00\",\"dateModified\":\"2025-01-09T21:06:02+00:00\",\"description\":\"Public Knowledge promotes freedom of expression, an open internet, and access to affordable communications tools and creative works. We work to shape policy.\",\"breadcrumb\":{\"@id\":\"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/#primaryimage\",\"url\":\"https:\/\/publicknowledge.org\/wp-content\/uploads\/2013\/05\/4568484975_74dab3fac5_o-1-scaled.jpg\",\"contentUrl\":\"https:\/\/publicknowledge.org\/wp-content\/uploads\/2013\/05\/4568484975_74dab3fac5_o-1-scaled.jpg\",\"width\":2560,\"height\":1714},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/publicknowledge.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"FCC: This is What a Net Neutrality Violation Looks Like\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/publicknowledge.org\/#website\",\"url\":\"https:\/\/publicknowledge.org\/\",\"name\":\"Public Knowledge\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/publicknowledge.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/publicknowledge.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/publicknowledge.org\/#organization\",\"name\":\"Public Knowledge\",\"url\":\"https:\/\/publicknowledge.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/publicknowledge.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/publicknowledge.org\/wp-content\/uploads\/2021\/12\/pk_social_logo-2.png\",\"contentUrl\":\"https:\/\/publicknowledge.org\/wp-content\/uploads\/2021\/12\/pk_social_logo-2.png\",\"width\":400,\"height\":200,\"caption\":\"Public Knowledge\"},\"image\":{\"@id\":\"https:\/\/publicknowledge.org\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/publicknowledge.org\/#\/schema\/person\/d86e4e889c8715e52178dc26db496b5c\",\"name\":\"Michael Weinberg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/publicknowledge.org\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c3fea2664bad33b64687eac93b1a08aee273420501243e673c6d44c995ec851d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c3fea2664bad33b64687eac93b1a08aee273420501243e673c6d44c995ec851d?s=96&d=mm&r=g\",\"caption\":\"Michael Weinberg\"},\"url\":\"https:\/\/publicknowledge.org\/author\/michael-weinberg\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"FCC: This is What a Net Neutrality Violation Looks Like - Public Knowledge","description":"Public Knowledge promotes freedom of expression, an open internet, and access to affordable communications tools and creative works. We work to shape policy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/","og_locale":"en_US","og_type":"article","og_title":"FCC: This is What a Net Neutrality Violation Looks Like","og_description":"Public Knowledge promotes freedom of expression, an open internet, and access to affordable communications tools and creative works. We work to shape policy.","og_url":"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/","og_site_name":"Public Knowledge","article_published_time":"2013-05-10T16:10:29+00:00","article_modified_time":"2025-01-09T21:06:02+00:00","og_image":[{"width":2560,"height":1714,"url":"https:\/\/publicknowledge.org\/wp-content\/uploads\/2013\/05\/4568484975_74dab3fac5_o-1-scaled.jpg","type":"image\/jpeg"}],"author":"Michael Weinberg","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Weinberg","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/#article","isPartOf":{"@id":"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/"},"author":{"name":"Michael Weinberg","@id":"https:\/\/publicknowledge.org\/#\/schema\/person\/d86e4e889c8715e52178dc26db496b5c"},"headline":"FCC: This is What a Net Neutrality Violation Looks Like","datePublished":"2013-05-10T16:10:29+00:00","dateModified":"2025-01-09T21:06:02+00:00","mainEntityOfPage":{"@id":"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/"},"wordCount":432,"publisher":{"@id":"https:\/\/publicknowledge.org\/#organization"},"image":{"@id":"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/#primaryimage"},"thumbnailUrl":"https:\/\/publicknowledge.org\/wp-content\/uploads\/2013\/05\/4568484975_74dab3fac5_o-1-scaled.jpg","keywords":["Net Neutrality"],"articleSection":["Insights"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/","url":"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/","name":"FCC: This is What a Net Neutrality Violation Looks Like - Public Knowledge","isPartOf":{"@id":"https:\/\/publicknowledge.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/#primaryimage"},"image":{"@id":"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/#primaryimage"},"thumbnailUrl":"https:\/\/publicknowledge.org\/wp-content\/uploads\/2013\/05\/4568484975_74dab3fac5_o-1-scaled.jpg","datePublished":"2013-05-10T16:10:29+00:00","dateModified":"2025-01-09T21:06:02+00:00","description":"Public Knowledge promotes freedom of expression, an open internet, and access to affordable communications tools and creative works. We work to shape policy.","breadcrumb":{"@id":"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/#primaryimage","url":"https:\/\/publicknowledge.org\/wp-content\/uploads\/2013\/05\/4568484975_74dab3fac5_o-1-scaled.jpg","contentUrl":"https:\/\/publicknowledge.org\/wp-content\/uploads\/2013\/05\/4568484975_74dab3fac5_o-1-scaled.jpg","width":2560,"height":1714},{"@type":"BreadcrumbList","@id":"https:\/\/publicknowledge.org\/fcc-this-is-what-a-net-neutrality-violation-looks-like\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/publicknowledge.org\/"},{"@type":"ListItem","position":2,"name":"FCC: This is What a Net Neutrality Violation Looks Like"}]},{"@type":"WebSite","@id":"https:\/\/publicknowledge.org\/#website","url":"https:\/\/publicknowledge.org\/","name":"Public Knowledge","description":"","publisher":{"@id":"https:\/\/publicknowledge.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/publicknowledge.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/publicknowledge.org\/#organization","name":"Public Knowledge","url":"https:\/\/publicknowledge.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/publicknowledge.org\/#\/schema\/logo\/image\/","url":"https:\/\/publicknowledge.org\/wp-content\/uploads\/2021\/12\/pk_social_logo-2.png","contentUrl":"https:\/\/publicknowledge.org\/wp-content\/uploads\/2021\/12\/pk_social_logo-2.png","width":400,"height":200,"caption":"Public Knowledge"},"image":{"@id":"https:\/\/publicknowledge.org\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/publicknowledge.org\/#\/schema\/person\/d86e4e889c8715e52178dc26db496b5c","name":"Michael Weinberg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/publicknowledge.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c3fea2664bad33b64687eac93b1a08aee273420501243e673c6d44c995ec851d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c3fea2664bad33b64687eac93b1a08aee273420501243e673c6d44c995ec851d?s=96&d=mm&r=g","caption":"Michael Weinberg"},"url":"https:\/\/publicknowledge.org\/author\/michael-weinberg\/"}]}},"_links":{"self":[{"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/posts\/11123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/comments?post=11123"}],"version-history":[{"count":0,"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/posts\/11123\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/media\/37633"}],"wp:attachment":[{"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/media?parent=11123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/categories?post=11123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/tags?post=11123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}