White House seeks counsel on ISP industry code

 

IIA chief invited to meeting to discuss iCode.

The United States hosted representatives from Australia’s internet industry at the White House earlier this month to discuss the potential to introduce a voluntary code of conduct among American internet service providers.

Peter Coroneos, the departing chief executive of Australia’s Internet Industry Association, said he was hosted by United States cyber security chief Howard Schmidt on May 6 specifically to discuss the initiative.

Schmidt was appointed at the White House in December 2009, charged with developing a national strategy to find a way to give every U.S. citizen a “trusted identity” on the internet as a means of addressing cyber security threats.

Schmidt had previously expressed interest in the IIA scheme.

Under the iCode, Australia’s ISPs volunteer to notify users on their network found to be using compromised computers (i.e. part of a botnet), and report such users to Government-operated CERT Australia.

Coroneos has claimed that the industry-led scheme has staved off threats from the Australian Government to legislate and more closely regulate Australia’s internet industry.

He told iTnews that Schmidt expressed interest in the icode model, and noted that US ISP ComCast had unilaterally implemented a similar measure in the United States.

Coroneos said his vision was for other US ISPs to consider ComCast’s effort and form an “industry-wide” voluntary code.

The Executive Office of the President of the United States has been contacted for comment.

Copyright © iTnews.com.au . All rights reserved.


White House seeks counsel on ISP industry code
 
 
 
Top Stories
Making a case for collaboration
[Blog post] Tap into your company’s people power.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
Tracking the year of CIO churn
[Blog post] Who shone through in 12 months of disruption?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1054

Vote