Sunday, March 26, 2023
AI Home Security
No Result
View All Result
  • Home
  • Home Security
  • Cyber Security
  • Biometric Technology
  • Home
  • Home Security
  • Cyber Security
  • Biometric Technology
No Result
View All Result
Morning News
No Result
View All Result
Home Cyber Security

Proposed FCC Rule Redefines Data Breaches for Communications Carriers

justmattg by justmattg
March 10, 2023
in Cyber Security
0
‘Skinny’ Cyber Insurance Policies Create Compliance Path
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter



A proposed rule change at the Federal Communications Commission would expand the definition of a data breach for communications carriers. If approved by the agency, the rule would cover any incident that affects the confidentiality of customer information, even if no harm to customers results.

“This [rule] means [communications] carriers would be required to report any unauthorized access or disclosure of customer information, even if the breach was unintentional or not malicious,” says Venkat Gupta, data estate modernization portfolio leader at Sogeti, part of the Capgemini group. “Everyone should care because data breaches can occur in many different ways, and even unintentional breaches can have profound consequences.”

The FCC said the rule change aligns with recent developments in federal and state data breach laws covering other industry sectors.

“The law requires carriers to protect sensitive consumer information but, given the increase in frequency, sophistication, and scale of data leaks, we must update our rules to protect consumers and strengthen reporting requirements,” said FCC Chairwoman Jessica Rosenworcel in a prepared statement. “This new proceeding will take a much-needed, fresh look at our data breach reporting rules to better protect consumers, increase security, and reduce the impact of future breaches.”

Reporting to the FCC and Consumers

Under the current rule, Gupta says, telecommunications carriers must notify federal law enforcement — the US Secret Service and the FBI — within seven business days of all breaches that involve customer proprietary network information (CPNI), and the carriers may inform affected consumers of such breaches seven days after they notify those agencies.

The proposed rule update requires carriers to notify the FCC contemporaneously with the law enforcement agencies as soon as practicable after discovery of a breach, and it would eliminate the current seven-day waiting period between notifying law enforcement and notifying the consumer.

Part of the incentive of updating the regulation, noted Ali Jessani, a senior associate at the law firm Wilmer Cutler Pickering Hale and Dorr LLP (WilmerHale), is that if the FCC is going to make the definition of a breach broader, companies will reassess their cybersecurity policies and procedures to prevent the breaches in the first place.

When a data breach occurs, such as an individual attack on a cell phone account, the attackers could monetize that attack in a matter of hours or minutes. Such an attack “is exactly why the notification rule exists — to give the consumer the ability to limit potential damage to their personal information being compromised,” Jessani says. He cautions, however, that while the carrier might report such breaches to the authorities right away, if law enforcement asks the carrier to not alert the customer at the same time in order to preserve evidence for the investigation, the updated rule still protects the company.

Gupta agrees, noting the delay allows carriers to assess the scope and impact of the breach, including the number of customers affected and the type of information that was compromised. “This information is important for determining the appropriate response to the breach and for assessing the potential harm to customers. The waiting period also enables carriers to take any necessary steps to mitigate the effects of the breach and prevent further damage,” he says.

Having carriers notify the FCC, Secret Service, and FBI at the same time will minimize burdens on carriers, eliminate confusion regarding obligations, and streamline the reporting process, allowing carriers to free up resources that can be used to address the breach and prevent further harm, Gupta says.

A Push to Improve Processes

The proposed rule change could have a direct impact on the carriers’ operations as they are forced to change their processes and procedures. “Carriers will need to implement new procedures for identifying and reporting breaches that affect the confidentiality of customer information. This may include changes to the carrier’s incident response plan, which outlines the steps to be taken in the event of a data breach,” Gupta notes.

Carriers might also need to invest in new technology or security measures to prevent breaches and detect unauthorized access to customer information. For example, some carriers might need to implement multifactor authentication, encryption, and other controls to protect sensitive customer data.

“Overall,” Gupta says, “the proposed rule change will require carriers to take a more proactive approach to data security and breach reporting. This may result in additional costs and resources for carriers, but it is ultimately designed to better protect customer privacy and prevent future breaches in the telecommunications industry.”

Public comments on the FCC data breach reporting requirements are due by March 24.



Source link

READ ALSO

OpenAI Reveals Redis Bug Behind ChatGPT User Data Exposure Incident

‘Dark Power’ Ransomware Extorts 10 Targets in Less Than a Month

Related Posts

OpenAI Reveals Redis Bug Behind ChatGPT User Data Exposure Incident
Cyber Security

OpenAI Reveals Redis Bug Behind ChatGPT User Data Exposure Incident

March 26, 2023
Everything You Need to Know
Cyber Security

‘Dark Power’ Ransomware Extorts 10 Targets in Less Than a Month

March 26, 2023
Microsoft Warns of Stealthy Outlook Vulnerability Exploited by Russian Hackers
Cyber Security

Microsoft Warns of Stealthy Outlook Vulnerability Exploited by Russian Hackers

March 26, 2023
U.K. National Crime Agency Sets Up Fake DDoS-For-Hire Sites to Catch Cybercriminals
Cyber Security

U.K. National Crime Agency Sets Up Fake DDoS-For-Hire Sites to Catch Cybercriminals

March 25, 2023
Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
Cyber Security

Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data

March 25, 2023
Red Teaming at Scale to Uncover Your Big Unknowns
Cyber Security

Red Teaming at Scale to Uncover Your Big Unknowns

March 24, 2023
Next Post
New Version of Prometei Botnet Infects Over 10,000 Systems Worldwide

New Version of Prometei Botnet Infects Over 10,000 Systems Worldwide

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

POPULAR NEWS

Hackers Create Malicious Dota 2 Game Modes to Secretly Access Players’ Systems

Hackers Create Malicious Dota 2 Game Modes to Secretly Access Players’ Systems

February 13, 2023
Trickbot Members Sanctioned for Pandemic-Era Ransomware Hits

Trickbot Members Sanctioned for Pandemic-Era Ransomware Hits

February 11, 2023
The New Threats to Cryptocurrency Users

The New Threats to Cryptocurrency Users

February 12, 2023
Do you know who is watching you?

Do you know who is watching you?

January 2, 2023
PopID announces big customer deployment for face biometric payments in UAE

PopID announces big customer deployment for face biometric payments in UAE

February 14, 2023

EDITOR'S PICK

Microsoft Urges Customers to Secure On-Premises Exchange Servers

Microsoft Urges Customers to Secure On-Premises Exchange Servers

January 28, 2023
Lessons All Industries Can Learn From Automotive Security

Lessons All Industries Can Learn From Automotive Security

February 14, 2023
6 Types of Risk Assessment Methodologies + How to Choose

6 Types of Risk Assessment Methodologies + How to Choose

January 21, 2023
How Threat Actors Manipulate Reality

How Threat Actors Manipulate Reality

March 7, 2023

About

We bring you the best news & updates related to Home security, Cyber security and Biometric technology. Keep visiting our website for latest updates.

Follow us

Categories

  • Biometric Technology
  • Cyber Security
  • Home Security

Recent Posts

  • OpenAI Reveals Redis Bug Behind ChatGPT User Data Exposure Incident
  • ‘Dark Power’ Ransomware Extorts 10 Targets in Less Than a Month
  • Microsoft Warns of Stealthy Outlook Vulnerability Exploited by Russian Hackers
  • U.K. National Crime Agency Sets Up Fake DDoS-For-Hire Sites to Catch Cybercriminals
  • Privacy Policy
  • Contact Us

© 2023 AI Home Security - All rights reserved.

No Result
View All Result
  • Home
  • Home Security
  • Cyber Security
  • Biometric Technology

© 2023 AI Home Security - All rights reserved.