{"id":15142,"date":"2017-06-13T19:52:00","date_gmt":"2017-06-13T23:52:00","guid":{"rendered":"http:\/\/www.publicknowledge.org\/uncategorized\/there-is-no-loophole-in-the-net-neutrality-rules\/"},"modified":"2017-06-13T19:52:00","modified_gmt":"2017-06-13T23:52:00","slug":"there-is-no-loophole-in-the-net-neutrality-rules","status":"publish","type":"post","link":"https:\/\/publicknowledge.org\/there-is-no-loophole-in-the-net-neutrality-rules\/","title":{"rendered":"There Is No Loophole in the Net Neutrality Rules"},"content":{"rendered":"<p dir=\"ltr\"><span id=\"docs-internal-guid-f15bcf28-a303-d53a-62fa-8df2b025039e\">One of the stranger ideas going around among the anti-net neutrality crowd (and in the Federal Communication Commission&rsquo;s <\/span><a href=\"http:\/\/transition.fcc.gov\/Daily_Releases\/Daily_Business\/2017\/db0523\/FCC-17-60A1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">proposal<\/a> to roll back the net neutrality rules) is the idea that the current rules, adopted by the previous FCC, contain a loophole that allows Internet Service Providers to block whatever websites they want to and generally avoid the rules, provided they use the right magic words&#8211;namely, that if they simply say ahead of time they intend to violate the rules, they&rsquo;re no longer subject to them. This is wrong&mdash;the rules only cover broadband ISPs, which are defined quite precisely, but there&rsquo;s no way for an ISP to continue offering what anyone would recognize as &ldquo;internet access&rdquo; without being covered by the rules.<\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f15bcf28-a303-d53a-62fa-8df2b025039e\">Specifically, the rules apply to broadband internet access service&mdash;which, with the FCC&rsquo;s usual flair for acronyms, is known as BIAS. BIAS is <\/span><a href=\"https:\/\/www.washingtonpost.com\/how-the-fcc-defines-an-internet-provider\/f4ccd75c-9afa-45d5-af4f-b3298b26d74b_note.html?utm_term=.2584a9a030f4\" target=\"_blank\" rel=\"noopener noreferrer\">defined<\/a> in relevant parts as &ldquo;A mass-market retail service by wire or radio that provides the capability to transmit data to and receive data from all or substantially all Internet endpoints&hellip;This term also encompasses any service that the Commission finds to be providing a functional equivalent of the service described in the previous sentence, or that is used to evade the protections set forth in this Part.&rdquo;<\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f15bcf28-a303-d53a-62fa-8df2b025039e\">So&mdash;merely offering a service using the Internet Protocol, such as cable-like IPTV that is sold independently of broadband, or a device with built-in limited connectivity, such as an Internet-of-Things device with a built-in LTE radio that only connects to a specific server, is not the same thing as selling BIAS. Amazon doesn&rsquo;t violate net neutrality if it sells you a Kindle that connects only to the Amazon ebook store. While net neutrality proponents are sensitive to the prospect of companies using various IP-based &ldquo;managed services&rdquo; to avoid net neutrality rules, no one has seriously suggested that the use of IP technology or equipment by itself should subject a service to net neutrality rules.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f15bcf28-a303-d53a-62fa-8df2b025039e\">The question boils down to what an &ldquo;ISP&rdquo; would have to actually do to fall out of the BIAS definition, and thus the rules. That is, what does it take for an ISP to no longer actually offer to consumers &ldquo;the capability to transmit data to and receive data from all or substantially all Internet endpoints&rdquo; AND not to be a &ldquo;functional equivalent&rdquo; of such a service?<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f15bcf28-a303-d53a-62fa-8df2b025039e\">In the first place even the most aggressive proponents of this alleged loophole must concede that whatever a non-BIAS service is, it needs to be adequately and accurately described and marketed to consumers ahead of time&mdash;it is too much background to get into here, but this is because the common and statutory law on common carriage hinge on concepts like the &ldquo;offer&rdquo; and &ldquo;holding out&rdquo; to the public. A provider that held itself out as offering access to the &ldquo;Internet,&rdquo; but with a bunch of fine print, would run afoul of this. By contrast, a provider that sold, for example, a device that only offered mobile access to streaming music would likely be fine, since no consumer would confuse such a service with internet access.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f15bcf28-a303-d53a-62fa-8df2b025039e\">(Additionally, regardless of how a service is described, any service that is the functional equivalent of internet access would be subject to the rules&mdash;so even if some service was &ldquo;offered&rdquo; the right way, if it nevertheless functioned as BIAS, it would be subject to the rules.)<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f15bcf28-a303-d53a-62fa-8df2b025039e\">In a concurring opinion <a href=\"{page_4878}\" target=\"_blank\" rel=\"noopener noreferrer\">denying a rehearing<\/a> of the Order, Judges Srinivasan and Tatel offer two hypotheticals: One, an ISP offering only access to &ldquo;family friendly&rdquo; content, and two, an ISP offering access to some other kind of &ldquo;edited service.&rdquo; &nbsp;Both of these services, the judges hypothesized, may not be BIAS, and thus not subject to the rules. But, they add, &ldquo;There is no need in this case to scrutinize the exact manner in which a broadband provider could render the FCC&rsquo;s Order inapplicable by advertising to consumers that it offers an edited service rather than an unfiltered pathway,&rdquo; because they view such offerings as unlikely, first because they would fail in the marketplace, and second because then such services might become liable for their users&rsquo; actions or for the internet content they choose to allow access to. Given the monopoly position of many broadband providers I wish I could share the judges&rsquo; feeling that services that may not be what consumers prefer would inevitably fail in the marketplace&mdash;but Public Knowledge has <\/span><a href=\"https:\/\/www.publicknowledge.org\/files\/docs\/PK_NN_Reply_Comments_4-26-10_FINAL.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">long observed<\/a> that actively engaging in editing what content users can access online may be enough to make ISPs liable for that content. This is one of the fundamental policy rationales for common carriage. (And, of course, nothing stops ISPs from offering to their customers the ability to control internet content, even at the network level. For example an ISP that gives its users the option to block adult content does not violate the rules. User-initiated control is encouraged by the Order!)<\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f15bcf28-a303-d53a-62fa-8df2b025039e\">Beyond that, though, it&rsquo;s hard to analyze whether a given service is or is not BIAS without a lot of specific details. Do the services still offer access to &ldquo;substantially all&rdquo; of the internet? Then they&rsquo;re still BIAS. Do they substitute for internet access? Then they&rsquo;re functional equivalents, and still BIAS. Whatever these hypothetical services might look like, it&rsquo;s not &ldquo;internet access&rdquo; as we know it&mdash;which is fine, since the Open Internet rules were never meant to prevent ISPs from experimenting with offering new kinds of non-BIAS services. At most we can say that a service that tried to offer to consumers the ability to access just Wikipedia, Club Penguin, and DirecTV Now might be able to&mdash;but this is quite far from an ISP being able to *block* DirecTV Now with impunity.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f15bcf28-a303-d53a-62fa-8df2b025039e\">It is of course somewhat surreal to be having this debate when the current FCC appears hell-bent on eliminating the net neutrality protections Public Knowledge and so many other advocates and consumers have fought for for years. Nevertheless it is worth remembering that the current rules are very good and worth fighting to protect.<\/span><\/p>\n<p dir=\"ltr\"><em>Image credit: <a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Savoy_knot.png#globalusage\" target=\"_blank\" rel=\"noopener noreferrer\">Wikimedia Commons<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the stranger ideas going around among the anti-net neutrality crowd (and in the Federal Communication Commission\u2019s proposal to roll back the net neutrality rules) is the idea that the current rules, adopted by the previous FCC, contain a loophole that allows Internet Service Providers to block whatever websites they want to and generally avoid the rules, provided they use the right magic words&#8211;namely, that if they simply say ahead of time they intend to violate the rules, they\u2019re no longer subject to them. This is wrong\u2014the rules only cover broadband ISPs, which are defined quite precisely, but there\u2019s no way for an ISP to continue offering what anyone would recognize as \u201cinternet access\u201d without being covered by the rules.<\/p>\n","protected":false},"author":29,"featured_media":0,"parent":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[13],"class_list":["post-15142","post","type-post","status-publish","format-standard","hentry","category-insights","tag-net-neutrality"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v26.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>There Is No Loophole in the Net Neutrality Rules - Public Knowledge<\/title>\n<meta name=\"description\" content=\"Public Knowledge promotes freedom of expression, an open internet, and access to affordable communications tools and creative works. We work to shape policy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/publicknowledge.org\/there-is-no-loophole-in-the-net-neutrality-rules\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"There Is No Loophole in the Net Neutrality Rules\" \/>\n<meta property=\"og:description\" content=\"Public Knowledge promotes freedom of expression, an open internet, and access to affordable communications tools and creative works. We work to shape policy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/publicknowledge.org\/there-is-no-loophole-in-the-net-neutrality-rules\/\" \/>\n<meta property=\"og:site_name\" content=\"Public Knowledge\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-13T23:52:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/publicknowledge.org\/wp-content\/uploads\/2021\/12\/pk_social_logo-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"John Bergmayer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Bergmayer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/publicknowledge.org\/there-is-no-loophole-in-the-net-neutrality-rules\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/publicknowledge.org\/there-is-no-loophole-in-the-net-neutrality-rules\/\"},\"author\":{\"name\":\"John Bergmayer\",\"@id\":\"https:\/\/publicknowledge.org\/#\/schema\/person\/94bc1c8d74a4aa15ac7a44ec9b35a1eb\"},\"headline\":\"There Is No Loophole in the Net Neutrality Rules\",\"datePublished\":\"2017-06-13T23:52:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/publicknowledge.org\/there-is-no-loophole-in-the-net-neutrality-rules\/\"},\"wordCount\":1085,\"publisher\":{\"@id\":\"https:\/\/publicknowledge.org\/#organization\"},\"keywords\":[\"Net Neutrality\"],\"articleSection\":[\"Insights\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/publicknowledge.org\/there-is-no-loophole-in-the-net-neutrality-rules\/\",\"url\":\"https:\/\/publicknowledge.org\/there-is-no-loophole-in-the-net-neutrality-rules\/\",\"name\":\"There Is No Loophole in the Net Neutrality Rules - Public Knowledge\",\"isPartOf\":{\"@id\":\"https:\/\/publicknowledge.org\/#website\"},\"datePublished\":\"2017-06-13T23:52:00+00:00\",\"description\":\"Public Knowledge promotes freedom of expression, an open internet, and access to affordable communications tools and creative works. We work to shape policy.\",\"breadcrumb\":{\"@id\":\"https:\/\/publicknowledge.org\/there-is-no-loophole-in-the-net-neutrality-rules\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/publicknowledge.org\/there-is-no-loophole-in-the-net-neutrality-rules\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/publicknowledge.org\/there-is-no-loophole-in-the-net-neutrality-rules\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/publicknowledge.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"There Is No Loophole in the Net Neutrality Rules\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/publicknowledge.org\/#website\",\"url\":\"https:\/\/publicknowledge.org\/\",\"name\":\"Public Knowledge\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/publicknowledge.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/publicknowledge.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/publicknowledge.org\/#organization\",\"name\":\"Public Knowledge\",\"url\":\"https:\/\/publicknowledge.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/publicknowledge.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/publicknowledge.org\/wp-content\/uploads\/2021\/12\/pk_social_logo-2.png\",\"contentUrl\":\"https:\/\/publicknowledge.org\/wp-content\/uploads\/2021\/12\/pk_social_logo-2.png\",\"width\":400,\"height\":200,\"caption\":\"Public Knowledge\"},\"image\":{\"@id\":\"https:\/\/publicknowledge.org\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/publicknowledge.org\/#\/schema\/person\/94bc1c8d74a4aa15ac7a44ec9b35a1eb\",\"name\":\"John Bergmayer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/publicknowledge.org\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/28a0d35544067df4989750367b2e4035613032af7d6a671f6639fbc81d5055b6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/28a0d35544067df4989750367b2e4035613032af7d6a671f6639fbc81d5055b6?s=96&d=mm&r=g\",\"caption\":\"John Bergmayer\"},\"url\":\"https:\/\/publicknowledge.org\/author\/john-bergmayer\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"There Is No Loophole in the Net Neutrality Rules - Public Knowledge","description":"Public Knowledge promotes freedom of expression, an open internet, and access to affordable communications tools and creative works. We work to shape policy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/publicknowledge.org\/there-is-no-loophole-in-the-net-neutrality-rules\/","og_locale":"en_US","og_type":"article","og_title":"There Is No Loophole in the Net Neutrality Rules","og_description":"Public Knowledge promotes freedom of expression, an open internet, and access to affordable communications tools and creative works. We work to shape policy.","og_url":"https:\/\/publicknowledge.org\/there-is-no-loophole-in-the-net-neutrality-rules\/","og_site_name":"Public Knowledge","article_published_time":"2017-06-13T23:52:00+00:00","og_image":[{"width":400,"height":200,"url":"https:\/\/publicknowledge.org\/wp-content\/uploads\/2021\/12\/pk_social_logo-2.png","type":"image\/png"}],"author":"John Bergmayer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"John Bergmayer","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/publicknowledge.org\/there-is-no-loophole-in-the-net-neutrality-rules\/#article","isPartOf":{"@id":"https:\/\/publicknowledge.org\/there-is-no-loophole-in-the-net-neutrality-rules\/"},"author":{"name":"John Bergmayer","@id":"https:\/\/publicknowledge.org\/#\/schema\/person\/94bc1c8d74a4aa15ac7a44ec9b35a1eb"},"headline":"There Is No Loophole in the Net Neutrality Rules","datePublished":"2017-06-13T23:52:00+00:00","mainEntityOfPage":{"@id":"https:\/\/publicknowledge.org\/there-is-no-loophole-in-the-net-neutrality-rules\/"},"wordCount":1085,"publisher":{"@id":"https:\/\/publicknowledge.org\/#organization"},"keywords":["Net Neutrality"],"articleSection":["Insights"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/publicknowledge.org\/there-is-no-loophole-in-the-net-neutrality-rules\/","url":"https:\/\/publicknowledge.org\/there-is-no-loophole-in-the-net-neutrality-rules\/","name":"There Is No Loophole in the Net Neutrality Rules - Public Knowledge","isPartOf":{"@id":"https:\/\/publicknowledge.org\/#website"},"datePublished":"2017-06-13T23:52:00+00:00","description":"Public Knowledge promotes freedom of expression, an open internet, and access to affordable communications tools and creative works. We work to shape policy.","breadcrumb":{"@id":"https:\/\/publicknowledge.org\/there-is-no-loophole-in-the-net-neutrality-rules\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/publicknowledge.org\/there-is-no-loophole-in-the-net-neutrality-rules\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/publicknowledge.org\/there-is-no-loophole-in-the-net-neutrality-rules\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/publicknowledge.org\/"},{"@type":"ListItem","position":2,"name":"There Is No Loophole in the Net Neutrality Rules"}]},{"@type":"WebSite","@id":"https:\/\/publicknowledge.org\/#website","url":"https:\/\/publicknowledge.org\/","name":"Public Knowledge","description":"","publisher":{"@id":"https:\/\/publicknowledge.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/publicknowledge.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/publicknowledge.org\/#organization","name":"Public Knowledge","url":"https:\/\/publicknowledge.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/publicknowledge.org\/#\/schema\/logo\/image\/","url":"https:\/\/publicknowledge.org\/wp-content\/uploads\/2021\/12\/pk_social_logo-2.png","contentUrl":"https:\/\/publicknowledge.org\/wp-content\/uploads\/2021\/12\/pk_social_logo-2.png","width":400,"height":200,"caption":"Public Knowledge"},"image":{"@id":"https:\/\/publicknowledge.org\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/publicknowledge.org\/#\/schema\/person\/94bc1c8d74a4aa15ac7a44ec9b35a1eb","name":"John Bergmayer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/publicknowledge.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/28a0d35544067df4989750367b2e4035613032af7d6a671f6639fbc81d5055b6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/28a0d35544067df4989750367b2e4035613032af7d6a671f6639fbc81d5055b6?s=96&d=mm&r=g","caption":"John Bergmayer"},"url":"https:\/\/publicknowledge.org\/author\/john-bergmayer\/"}]}},"_links":{"self":[{"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/posts\/15142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/comments?post=15142"}],"version-history":[{"count":0,"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/posts\/15142\/revisions"}],"wp:attachment":[{"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/media?parent=15142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/categories?post=15142"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/tags?post=15142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}