(page 132m para. 304)
"In the NPRM, we tentatively concluded that we should retain the definition of reasonable network management we previously adopted, which does not include preventing transfer of unlawful content or the unlawful transfer of content as a reasonable practice.782 We affirm this tentative conclusion and re-state that open Internet rules do not prohibit broadband providers from making reasonable efforts to address the transfer of unlawful content or unlawful transfers of content to ensure that open Internet rules are not used as a shield to enable unlawful activity or to deter prompt action against such activity.
For example, the no-blocking rule should not be invoked to protect copyright infringement, which has adverse consequences for the economy, nor should it protect child pornography. We reiterate that our rules do not alter the copyright laws and are not intended to prohibit or discourage voluntary practices undertaken to address or mitigate the occurrence of copyright infringement.783 After consideration of the record, we retain this rule, which is applicable to both fixed and mobile broadband providers engaged in broadband Internet access service and reads as follows: Nothing in this part prohibits reasonable efforts by a provider of broadband Internet access service to address copyright infringement or other unlawful activity.
305. Some commenters contend that this rule promotes the widespread use of intrusive packet inspection technologies by broadband providers to filter objectionable content and that such monitoring poses a threat to customersβ privacy rights.784
Certainly, many broadband providers have the technical tools to conduct deep packet inspection of unencrypted traffic on their networks,785 and consumer privacy is a paramount concern in the Internet age. Nevertheless, we believe that broadband monitoring concerns are adequately addressed by the rules we adopt today, so we decline to alter this provision. This rule is limited to protecting βreasonable efforts . . . to address copyright infringement or other unlawful activity.β786
We retain the discretion to evaluate the reasonableness of broadband providersβ practices under this rule on a case-by-case basis. Consumers also have many tools at their disposal to protect their privacy against deep packet inspectionβincluding SSL encryption, virtual private networks, and routing methods like TOR.787 Further, the complaint processes we adopt today add to these technical methods and advance consumer interests in this area.788"