A Step-by-Step Guide for Policymakers: Tackling Online Harm While Preserving the Open Internet

By

Introduction

When the Electronic Frontier Foundation (EFF) and 18 organizations—including Mozilla, the Tor Project, and Open Rights Group—wrote to UK policymakers, they delivered a clear warning: heavy-handed restrictions like sweeping age-gating and access controls risk dismantling the open web without addressing the true drivers of online harm. This guide translates their core message into actionable steps for legislators, regulators, and advocates who want to protect users—especially children—without sacrificing privacy, anonymity, or the internet’s fundamental architecture. By focusing on root causes and rights-respecting design, you can craft policies that reduce harm while keeping the web a global public resource.

A Step-by-Step Guide for Policymakers: Tackling Online Harm While Preserving the Open Internet
Source: www.eff.org

What You Need

Step-by-Step Guide

Step 1: Identify the Root Causes of Online Harm

Before writing any regulation, analyze what actually drives harm. The coalition’s letter points to business models built on pervasive data collection and targeted advertising. Platforms design features to maximize engagement—often at the expense of safety and autonomy. Start by mapping how algorithmic amplification, dark patterns, and lack of transparency contribute to issues like cyberbullying, misinformation, and exploitation. Hold workshops with academics and child safety experts to separate symptoms from causes.

Step 2: Avoid Blanket Age-Gating and Access Restrictions

Proposed measures often require all users to verify identity via age assurance technologies before accessing services—from social media and video games to VPNs and simple websites. This is a blunt tool. As the letter warns, these systems are either inaccurate (falsely blocking legitimate users) or privacy-invasive (collecting sensitive data). Worse, they undermine anonymity and create surveillance risks. Instead, reject any mandate that forces identity checks on the entire user base. If age verification is considered, limit it to specific, high-risk services and ensure it is voluntary, transparent, and privacy-protecting.

Step 3: Prioritize Rights-Respecting Alternatives

Rather than restricting access, design policies that empower users. Require platforms to integrate safety features by default—like complaint mechanisms, robust reporting tools, and privacy-by-design architecture. Encourage the development of age-appropriate experiences without compulsory identity checks. For example, offer “safe modes” that filter content based on context, not user age. The internet must remain accessible to all, especially young people who rely on it for information, support, and expression that may not exist offline.

Step 4: Hold Companies Accountable for Systemic Practices

The coalition’s message: target the business model, not the user. Introduce mandatory transparency reports on data collection, advertising targeting, and algorithmic decision-making. Impose fines for practices that prioritize engagement over safety, such as using dark patterns to lure children into addictive loops. Require independent audits of platform design for high-risk services. Accountability must shift from individual behavior to corporate responsibility.

A Step-by-Step Guide for Policymakers: Tackling Online Harm While Preserving the Open Internet
Source: www.eff.org

Step 5: Preserve the Core Architecture of the Open Web

Blunt restrictions fragment the internet into jurisdictional silos, empower gatekeepers (like app stores), and limit interoperability. As the letter notes, age-gating at scale erodes openness and accessibility. Guard against this by including “internet freedom” clauses in any regulation. Ensure that new rules do not inadvertently require technologies that break end-to-end encryption or force all traffic through centralized identity providers. Maintain the web as a global public resource where anyone can participate without prior permission.

Step 6: Engage Diverse Stakeholders

Policymaking should not happen in isolation. Follow the coalition’s example: bring together civil liberty groups, technology nonprofits, child rights advocates, and industry representatives. Public consultation ensures that policies reflect a wide range of expertise and avoid unintended consequences. Create an advisory panel that includes privacy experts and youth representatives. Use their input to refine proposals before they become law.

Step 7: Protect Young People’s Access to Vital Online Resources

Remember that the internet is a lifeline for many youths—offering educational content, mental health support, and communities of peers with similar experiences. Restrictive policies risk cutting off these benefits without meaningfully reducing harm. As you craft solutions, explicitly assess their impact on young people’s right to access information and free expression. Include a provision that any measure must demonstrate a net positive effect for youth well-being, not just a reduction in easily measurable categories of risk.

Tips for Success

Tags:

Related Articles

Recommended

Discover More

Apple's June Quarter Guidance: Revenue Growth and Memory Shortage Insights7 Critical Insights on the RAM Shortage Worsening in 2027 and Beyond, According to SamsungOPay Eyes US IPO: What You Need to Know About Nigeria's Fintech Giant57 Nations Forge a Clear Roadmap to End Fossil Fuel Dependence at Landmark Colombia SummitMastering Rust Test Execution with cargo-nextest: A Practical Guide