Regulations can’t keep pace with technological innovation and may actually give hackers hints on the strong and weak points in companies’ computer systems, he said. Still, he said, industry buy-in on improved cyber procedures, coupled with investigations into bad cyber practices, is preferable to imposing top-down regulations. Yet the agency rolled back some Obama-era practices: in 2017, President Trump signed a law repealing FCC privacy rules for internet service providers.Ĭhairman of the FCC from 2013 to 2017, said the Biden administration needs to sharpen the agency’s focus on security as 5G networks proliferate and enable much larger transmissions of data. Under the Trump administration, the FCC pushed carriers to avoid equipment from Chinese-owned firm Huawei Technologies Co. In a 2017 Senate hearing, he described the agency’s jurisdiction over data security as “extremely limited.” O’Rielly tend to take a narrower view of the FCC’s cyber authorities. In the T-Mobile investigation, the agency could be seeking details on whether the stolen data is covered under CPNI rules, said FCC rules say carriers have a duty to protect such data, and companies must obtain annual privacy certifications for it from the FCC.įormer FCC Chairman Tom Wheeler, in a 2015 photo. Paid $25 million to settle an investigation into the improper access of 280,000 customers’ personal data, as well as so-called customer proprietary network information, or CPNI, like phone numbers called and the timing of chats. The FCC’s enforcement bureau said at the time that the failure to reasonably secure customer information violated the Communications Act, the 1934 law that established the agency. and YourTel America Inc., two affiliated budget wireless carriers, in 2015 paid $3.5 million and entered a consent decree after agency officials found that a vendor had stored data on 300,000 customers of the two carriers in readable text files on servers open to the internet. The FCC has penalized companies for lax data-security practices in the past, though under different authorities. “At the same time, it makes them a target.” Telecom firms “have a great set of customer data for their businesses,” said The incident at T-Mobile is the latest in a string of breaches at the Bellevue, Wash.-based wireless carrier, the second largest in the U.S. “These people didn’t even sign an agreement with T-Mobile.” Keller, who has co-led class-action lawsuits against hacked companies like Equifax. “Why were they keeping the Social Security numbers and driver’s license numbers for these people?” asked Ms. “Why were they keeping the Social Security numbers and driver’s license numbers for these people? ” - Amy Keller, DiCello Levitt Gutzler
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |