Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Net Neutrality Sneaking Back Into Social Consciousness

Net Neutrality Sneaking Back Into Social Consciousness

The COVID-19 outbreak has been a trying time for businesses and individuals, alike. Not much positive has come from it, as people, who typically band together in times of unease, are asked to stay away from each other. This has led to many people turning to their smartphones and Internet connections to communicate with the people they hold dear. With a national reliance on Internet connections there have been some new voices (and some familiar ones) advocating for the return of net neutrality. Today, we’ll remind you what net neutrality is and why this situation has people calling for a change. 

The Foundations of Net Neutrality

Net neutrality is the act of having an open Internet that is overseen by the public to ensure that all the people that need to get reliable internet access, can. The Internet Service Providers (ISPs) argue that because they own most of the infrastructure that it should be them who sets the rules over what type of Internet service is for sale and how to provide the bandwidth for individuals and companies. This obviously sets them at odds.

One of the best analogies used to describe net neutrality is that of the “dumb pipe’ in a city’s water system. In this scenario all people hooked onto the system would get an equal amount of water pressure. Their individual identity or specific use for the water isn’t factored in. This is why some of the most public organizations are in support of this policy. Human rights groups, civil rights groups, animal rights groups, and consumer advocacy companies all support net neutrality.

ISPs and the major telecom companies like Verizon and AT&T have a lot to lose if they lose the power to determine how to disseminate their product. This, and how it has played out in the political sphere, make this an absolutely fascinating issue. 

What the COVID-19 Outbreak Has Caused

With the COVID-19 outbreak affecting most people--and organizations like the Centers for Disease Control and Prevention and many state’s Governments have suggested a stay-in-place policy--connectivity is looked on as essential. It has led the Federal Communications Commission, the same entity that worked to privatize Internet connections, to reach out to the ISPs and telecoms with the establishment of the Keep Americans Connected Pledge.

Here is the press release sent by the FCC on March 13, 2020:

“Given the coronavirus pandemic and its impact on American society, [[Company Name]] pledges for the next 60 days to: 

(1) not terminate service to any residential or small business customers because of their inability to pay their bills due to the disruptions caused by the coronavirus pandemic; 
(2) waive any late fees that any residential or small business customers incur because of their economic circumstances related to the coronavirus pandemic; and 
(3) open its Wi-Fi hotspots to any American who needs them.”

With the seriousness of the situation, dozens of ISPs have signed, many of which during the first hours; and, many of them have gone beyond the pledge to help society deal with the COVID-19 pandemic by eliminating data caps and taking other actions. In a statement, FCC Chairman Ajit Pai said:

“As the coronavirus outbreak spreads and causes a series of disruptions to the economic, educational, medical, and civic life of our country, it is imperative that Americans stay connected. Broadband will enable them to communicate with their loved ones and doctors, telework, ensure their children can engage in remote learning, and — importantly — take part in the ‘social distancing’ that will be so critical to limiting the spread of this novel coronavirus.”

This has led many people to wonder why, if the Internet is being treated like a utility, why it is being regulated as a private service? The calls for net neutrality, despite the admittedly generous stance of ISPs, is sure to get a fair amount of attention when the COVID-19 mess is over. One thing is for sure, people today need access to high-speed Internet more than ever before.

How do you feel about how the ISPs have handled this situation? Leave your thoughts in the comments below and check back at our blog for more information about technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 30 October 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Network Security Hardware User Tips Efficiency Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Cybersecurity Saving Money Communication Data Backup Productivity Managed Service Smartphone Android Upgrade VoIP Smartphones Business Management Mobile Devices communications Data Recovery Windows Disaster Recovery Social Media AI Browser Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Information Automation Artificial Intelligence Facebook Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Remote Work Server Managed Service Provider Outsourced IT Employee/Employer Relationship Encryption Spam IT Support Compliance Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Data Security Apps Vendor Two-factor Authentication Mobile Office App Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Mobile Device Management Tip of the week Chrome Gmail Budget Apple Networking How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing WiFi 2FA Operating System Computers Router Risk Management Virtual Private Network Healthcare Website Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Big Data Managed IT Services Social Cooperation Windows 11 Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Customer Service Vendor Management Excel Cybercrime Physical Security Display Remote Workers Printer Paperless Office Infrastructure Monitoring Free Resource Project Management Firewall Document Management Windows 7 Microsoft 365 Telephone The Internet of Things Scam Solutions Data loss Holidays Robot Telephone System Customer Relationship Management Cost Management Data Storage Settings Wireless Supply Chain Printing Video Conferencing Content Filtering Hacking IT Management Managed Services Provider YouTube Meetings Virtual Machines Professional Services Presentation VPN Cryptocurrency Modem Wireless Technology User Tip Processor Computer Repair Mobile Security Virtual Desktop iPhone Data storage LiFi Word Smart Technology Vulnerabilities Outlook Data Privacy Machine Learning Money Saving Time Images 101 Humor Multi-Factor Authentication Mobility Managed IT Service Safety Maintenance Sports Downloads Antivirus Mouse Licensing Employees Entertainment Administration Integration Application Best Practice Trends Alert Managing Costs Amazon Buisness File Sharing Regulations eCommerce Dark Data Google Calendar SSID Managed IT Customer Resource management IBM Legal Data Analysis IT solutions Star Wars Surveillance How To Microsoft Excel Virtual Assistant Outsource IT Media Business Growth Gamification Notifications Staff Virtual Machine Environment Travel Social Networking Legislation Medical IT Reviews Techology Fileless Malware Google Maps Development Cortana Transportation Small Businesses Alt Codes Content Wearable Technology Hypervisor Displays Downtime Unified Threat Management Motherboard Optimization Comparison PowerPoint Competition Health IT Shopping Unified Threat Management Directions Hosted Solution Assessment Permissions Employer/Employee Relationships Outsourcing Navigation Typing PCI DSS Network Congestion Specifications Workplace Gig Economy Google Drive User Error Microchip User Internet Exlporer Internet Service Provider Knowledge Fraud Teamwork Hiring/Firing Evernote Paperless Username Regulations Compliance Point of Sale Memes 5G Black Friday Co-managed IT IP Address Google Docs Unified Communications Database Net Neutrality Experience SQL Server Technology Care Business Communications Bitcoin Network Management Financial Data Running Cable Tech Support IT Technicians History Cookies IT Monitors Cyber Monday Scams Google Wallet Proxy Server Smartwatch Recovery Tactics Procurement Hotspot Azure Hybrid Work Tech Human Resources Hard Drives Windows 8 Telework Laptop Websites Mirgation Cyber security Nanotechnology Communitications Cables Domains Drones CES SharePoint Addiction Supply Chain Management Electronic Medical Records Language Term Google Apps Refrigeration Management FinTech Halloween Chatbots Lenovo Screen Reader IT Assessment Writing Distributed Denial of Service IT Maintenance Public Speaking Lithium-ion battery Service Level Agreement Flexibility Virtual Reality Computing Infrastructure Value Business Intelligence Scary Stories Private Cloud Identity Shortcuts Hacks Server Management Organization Entrepreneur Superfish Bookmark Digital Security Cameras Identity Theft Smart Tech Smart Devices Fun Ransmoware Deep Learning Download Remote Working Twitter Alerts Memory Vendors Error Data Breach Google Play Be Proactive Undo Browsers Videos Education Connectivity Electronic Health Records Social Engineering Break Fix Workforce Upload Remote Computing Wasting Time Threats Trend Micro Multi-Factor Security Security Cameras Workplace Strategies Mobile Computing Social Network Tablet IoT Software as a Service Search Dark Web Meta

Blog Archive