Big Regulatory Changes In Store For The Internet

In the next ten years there will be significant changes to the Internet as governments in both the US and the European Union introduce significant regulations  in response to the tremendous advances in areas like  3D printing, autonomous vehicles,  electric cars, drones, robotics, virtual reality and online gaming. 

Other fast emerging technology sectors include Artificial Intelligence (AI), Machine Learning (ML) and Automation technologies.

Blockchain, space exploration, asteroid mining and renewable energy are all attracting the attention of legislators interested in preventing market monopolies and promotion transparency.  

Regulators on both continents are formulating similar laws. 

  • In the US, the House Judiciary Subcommittee on Antitrust has just released a landmark report on Competition In Digital Markets which is expected result in limits being placed on the Big Tech firms market dominance.
  • The European Commission is in the process of drafting an EU Digital Services Act (“DSA”) to promote competition and innovation in digital markets, intended to curtail the US Big Tech companies.

Many industry analysts worry that widely-used technologies like the big social media platforms have the effect of weakening  core aspects of democracy and democratic representation. They also foresee significant social innovation between now and 2030 to try to address emerging issues.

The way the Internet will look and work in 2030 will be quite different, not least due to changing demographics.

The global population is expected to reach 8.5 billion people by 2030 and  India will overtake China as the most populated country. The fastest-growing demographic segment will be the over 65 age group, who will number over a billion by 2030.

Although the US and EU regulations are still only at the proposal stage, the large technology companies like Facebook, Amazon, Google and others will  likely broken up into smaller units, possibly along geographic lines in the EU, whereas in the US legislators have  recommended stopping large internet platforms from operating at different levels of the distribution chain. 

The existing Big Tech firms will have to break up into their constituent parts.

  • Facebook might have to divest WhatsApp and Instagram 
  • Google might have to divest its Android software business
  •  Amazon might have to split its retail platform from its booming  cloud computing business.

The regulatory barriers to entry that legislators are preparing to introduce will be much higher than they are today and businesses and other organisations will have to learn to navigate a web of regulation imposed to enforce market  rules in an ever-changing and complex technological environment. 

CapX:       Gizmodo:        Medium:   Pew Research:

You Might Also Read:

Wanted: International Cyber Standards:

 

« The Big US Tech Corporations Are A ‘Monopoly of Power’
Russia's Hackers Are Masters Of Cyber Warfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Privacy Professor

Privacy Professor

Privacy Professor provides information privacy, security and compliance services, tools and products to organizations in a wide range of industries.

Elastic

Elastic

Elastic is the world's leading software provider for making structured and unstructured data usable in real time for search, logging, security, and analytics use cases.

ThreatAware

ThreatAware

Total visibility of your business cybersecurity. Monitoring, management and compliance for your cybersecurity tools, people and processes from one easy to use dashboard.

Scout Ventures

Scout Ventures

Scout Ventures is an early stage venture capital firm that is making the world a better, safer place by cultivating standout frontier technologies.

Vivitec

Vivitec

Vivitec security services are tailored for your business, industry, risk, technology, and size to ensure great protection and planned response for the inevitable cyber-attacks on your business.

Stealth Software Technologies

Stealth Software Technologies

Stealth Software Technologies is focused on the generation of research and software products focused on applied cryptography and cybersecurity.

Tapestry Technologies

Tapestry Technologies

Tapestry Technologies supports the Department of Defense in shaping its approach to cybersecurity.

Mobileum

Mobileum

Mobileum is a leading provider of Telecom analytics for roaming, security and risk management and end-to-end domestic and roaming testing solutions.

Silent Quadrant

Silent Quadrant

Silent Quadrant delivers incomparable cybersecurity consulting, digital transformation, and risk management within our purpose-driven clients - empowering them to be the most resilient entities.

Cyber Crucible

Cyber Crucible

Cyber Crucible is a cybersecurity Software as a Service company definitively removing the risk of data extortion from customer environments.

SMARTEST

SMARTEST

SMARTEST is a world-class IT solutions provider active in the most challenging and demanding industries such as the oil and gas industries.

Vanta

Vanta

Vanta helps companies scale security practices and automate compliance for the industry’s most sought after standards - SOC 2, ISO 27001, HIPAA, GDPR, and other security and privacy frameworks.

Epoch Concepts

Epoch Concepts

Offering a full line of IT services, solutions, and integration capabilities, Epoch Concepts is the trusted partner of the US military, federal agencies, private enterprises, and systems integrators.

Infoline Tec Group Berhad

Infoline Tec Group Berhad

Infoline Tec Group Berhad is principally involved in providing IT infrastructure solutions, cybersecurity service provider and solutions, managed IT and other IT services.

Cyberleaf

Cyberleaf

Cyberleaf is simplified managed cybersecurity for MSPs, enabling top tier cyber protection for small and medium enterprise.

Clutch Security

Clutch Security

Clutch Security are on a mission to secure all Non-Human Identities. Everywhere.