Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    [mc4wp_form id=3515]
    What's Hot

    Name That Toon: Last Line of Defense

    April 16, 2024

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Facebook Twitter Instagram
    • Privacy Policy
    • Contact Us
    Facebook Twitter Instagram Pinterest Vimeo
    AI Home SecurityAI Home Security
    • Home
    • Home Security
    • Cyber Security
    • Biometric Technology
    Contact
    AI Home SecurityAI Home Security
    Home»Cyber Security»Proposed FCC Rule Redefines Data Breaches for Communications Carriers
    Cyber Security

    Proposed FCC Rule Redefines Data Breaches for Communications Carriers

    justmattgBy justmattgMarch 10, 2023No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    [ad_1]

    A proposed rule change at the Federal Communications Commission would expand the definition of a data breach for communications carriers. If approved by the agency, the rule would cover any incident that affects the confidentiality of customer information, even if no harm to customers results.

    “This [rule] means [communications] carriers would be required to report any unauthorized access or disclosure of customer information, even if the breach was unintentional or not malicious,” says Venkat Gupta, data estate modernization portfolio leader at Sogeti, part of the Capgemini group. “Everyone should care because data breaches can occur in many different ways, and even unintentional breaches can have profound consequences.”

    The FCC said the rule change aligns with recent developments in federal and state data breach laws covering other industry sectors.

    “The law requires carriers to protect sensitive consumer information but, given the increase in frequency, sophistication, and scale of data leaks, we must update our rules to protect consumers and strengthen reporting requirements,” said FCC Chairwoman Jessica Rosenworcel in a prepared statement. “This new proceeding will take a much-needed, fresh look at our data breach reporting rules to better protect consumers, increase security, and reduce the impact of future breaches.”

    Reporting to the FCC and Consumers

    Under the current rule, Gupta says, telecommunications carriers must notify federal law enforcement — the US Secret Service and the FBI — within seven business days of all breaches that involve customer proprietary network information (CPNI), and the carriers may inform affected consumers of such breaches seven days after they notify those agencies.

    The proposed rule update requires carriers to notify the FCC contemporaneously with the law enforcement agencies as soon as practicable after discovery of a breach, and it would eliminate the current seven-day waiting period between notifying law enforcement and notifying the consumer.

    Part of the incentive of updating the regulation, noted Ali Jessani, a senior associate at the law firm Wilmer Cutler Pickering Hale and Dorr LLP (WilmerHale), is that if the FCC is going to make the definition of a breach broader, companies will reassess their cybersecurity policies and procedures to prevent the breaches in the first place.

    When a data breach occurs, such as an individual attack on a cell phone account, the attackers could monetize that attack in a matter of hours or minutes. Such an attack “is exactly why the notification rule exists — to give the consumer the ability to limit potential damage to their personal information being compromised,” Jessani says. He cautions, however, that while the carrier might report such breaches to the authorities right away, if law enforcement asks the carrier to not alert the customer at the same time in order to preserve evidence for the investigation, the updated rule still protects the company.

    Gupta agrees, noting the delay allows carriers to assess the scope and impact of the breach, including the number of customers affected and the type of information that was compromised. “This information is important for determining the appropriate response to the breach and for assessing the potential harm to customers. The waiting period also enables carriers to take any necessary steps to mitigate the effects of the breach and prevent further damage,” he says.

    Having carriers notify the FCC, Secret Service, and FBI at the same time will minimize burdens on carriers, eliminate confusion regarding obligations, and streamline the reporting process, allowing carriers to free up resources that can be used to address the breach and prevent further harm, Gupta says.

    A Push to Improve Processes

    The proposed rule change could have a direct impact on the carriers’ operations as they are forced to change their processes and procedures. “Carriers will need to implement new procedures for identifying and reporting breaches that affect the confidentiality of customer information. This may include changes to the carrier’s incident response plan, which outlines the steps to be taken in the event of a data breach,” Gupta notes.

    Carriers might also need to invest in new technology or security measures to prevent breaches and detect unauthorized access to customer information. For example, some carriers might need to implement multifactor authentication, encryption, and other controls to protect sensitive customer data.

    “Overall,” Gupta says, “the proposed rule change will require carriers to take a more proactive approach to data security and breach reporting. This may result in additional costs and resources for carriers, but it is ultimately designed to better protect customer privacy and prevent future breaches in the telecommunications industry.”

    Public comments on the FCC data breach reporting requirements are due by March 24.

    [ad_2]

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleIceFire Ransomware Exploits IBM Aspera Faspex to Attack Linux-Powered Enterprise Networks
    Next Article New Version of Prometei Botnet Infects Over 10,000 Systems Worldwide
    justmattg
    • Website

    Related Posts

    Cyber Security

    Name That Toon: Last Line of Defense

    April 16, 2024
    Cyber Security

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024
    Cyber Security

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Add A Comment

    Leave A Reply Cancel Reply

    Demo
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Cyber Security

    Name That Toon: Last Line of Defense

    justmattgApril 16, 2024

    [ad_1] The enemies are always getting closer, using the same advanced technologies as security pros…

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024

    Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks

    April 16, 2024

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    [mc4wp_form id=3515]
    Demo
    Top Posts

    Name That Toon: Last Line of Defense

    April 16, 2024

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Latest Reviews
    Cyber Security

    Name That Toon: Last Line of Defense

    justmattgApril 16, 2024

    [ad_1] The enemies are always getting closer, using the same advanced technologies as security pros…

    Cyber Security

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    justmattgApril 16, 2024

    [ad_1] Apr 16, 2024NewsroomSupply Chain / Software Security Security researchers have uncovered a “credible” takeover…

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    [mc4wp_form id=3515]
    Demo
    MOST POPULAR

    Name That Toon: Last Line of Defense

    April 16, 2024

    California mountain lion P-22 left mark on wildlife conservation

    January 1, 2023

    Congress Again Writes To Home Minister Amit Shah Over Rahul Gandhi’s Security

    January 1, 2023
    OUR PICKS

    Name That Toon: Last Line of Defense

    April 16, 2024

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    [mc4wp_form id=3515]
    Facebook Twitter Instagram Pinterest
    • Privacy Policy
    • Contact Us
    AI Home Security © 2025 All rights reserved | Designed By ESmartsSolution

    Type above and press Enter to search. Press Esc to cancel.

    ↑