FCC Adopts Data Breach Notification Rules for Telecommunications Providers

January 5, 2024

Reading Time : 10+ min

At the end of 2023, the Federal Communications Commission (“FCC” or “the Commission”) adopted updates to its existing 16-year-old data breach notification rules (“prior rules”) designed to ensure that sensitive customer information is adequately protected by providers of telecommunications, interconnected Voice over Internet Protocol (“VoIP”), and telecommunications relay services (“TRS”) (such providers, collectively, “carriers”).[1] The FCC released the final order on December 21, 2023. The updates to the rules add to the increasing regulation of data protection and security by federal agencies.

The FCC’s prior rules, which were originally adopted in 1998 and updated in 2007, required carriers to notify law enforcement and customers of breaches involving Customer Proprietary Network Information (“CPNI”), which the FCC has interpreted to include “information such as the phone numbers called by a consumer, the frequency, duration, and timing of such calls; the location of a mobile device when it is in active mode (i.e., able to signal its location to nearby network facilities); and any services purchased by the consumer, such as call waiting.”[2] Under the prior rules, a breach occurred “when a person, without authorization or exceeding authorization, has intentionally gained access to, used, or disclosed CPNI.”[3] Specifically, the prior rules were designed to stop the practice of “pretexting,” or pretending to be a customer or other authorized person in order to obtain access to that customer’s call detail or communications records.[4] The FCC further updated the rules to include TRS providers in 2013 to protect TRS user information.[5]

These updated rules culminate a lengthy regulatory process in which the FCC adopted a Notice of Proposed Rulemaking (“NPRM”) in December 2022 to seek comment on updates to the rules.[6]

Updates to the Rules

 

  • Expanding the scope of protected consumer information

Previously, carriers were only required to provide notice of breaches of consumer data that qualified as “CPNI” under the FCC’s definition. The new rules, however, expand the scope of protected consumer information to include forms of personally identifiable information (“PII”), including all information that is traceable to an individual’s identity, either alone or combined with other information.[7] As a result, carriers will be required to provide notice any time a consumer’s PII is breached. The FCC further defines the scope of PII to include: 1) first name or initial and last name, combined with any government-issued identification numbers or similar information used for authentication purposes; 2) user name or email address in combination with a password or security question/answer, or any authentication method for account access; or 3) unique biometric, genetic, or medical data.[8] The scope also includes dissociated data that would constitute PII if the “means to link the dissociated data were accessed in connection with access to the dissociated data, and any one of the discrete data elements listed above or any combination of the discrete data elements listed above is PII if the data element or combination of data elements would enable a person to commit identity theft or fraud against the individual to whom the data element or elements pertain.”[9] The updated rules, in line with state laws, adopt an exception for publicly available information lawfully available to the public through government records or widely-distributed media.[10]

  • Expanding the definition of “breach”

The updated rules expand the Commission’s definition of “breach” to include the inadvertent access, use, or disclosure of protected data. While the Commission’s prior definition of breach targeted intentional access of CPNI by an unauthorized person, the updated definition of “breach” is “any instance in which a person, without authorization or exceeding authorization, has gained access to, used, or disclosed covered data.”[11] In response to industry concerns that the expansion could lead to “notice fatigue” for consumers, deplete industry and government resources, or increase reporting burdens, the rules set out exceptions for good-faith acquisitions of customer data by employees or agents of the carrier when the information is not improperly used.[12]

  • Notifying federal agencies of data breaches

Per the updated rules, telecommunications carriers must notify the FCC, the Secret Service, and the Federal Bureau of Investigation (“FBI”) of a breach via the central reporting facility.[13] This is a change from the prior rules, which only required notification to the Secret Service and FBI.[14] The law enforcement requirement is meant to enable the agencies to investigate the breach of sensitive customer information.[15] Coordination of the reporting service between agencies will occur in conjunction with the Wireline Competition Bureau at the FCC, and reporting will occur through the existing central reporting facility to avoid additional notification burdens on impacted organizations.[16]

The timeline for providing notice to federal agencies has not changed, but the new rules did update thresholds for when notification much occur. Specifically, breach notification must occur as soon as practicable, but not later than seven business days after reasonable determination of a breach.[17] The new rules also include a threshold for federal agency notifications. Breaches affecting 500 or more customers, or breaches impacting fewer than 500 customers that are reasonably likely to cause harm to the customer, require individual, per-breach notifications to the federal agencies.[18] For breaches affecting fewer than 500 customers that the carrier can reasonably determine are not likely to harm the customers, the carrier should instead report the breach in an annual summary of the breaches filed in the central reporting facility in lieu of a notification.[19] The annual consolidated summary from the previous calendar year must be submitted via the central reporting facility no later than February 1 each year.[20] The final order instructs the Wireline Competition Bureau to take steps to reduce the burden on carriers of reporting these smaller breaches by developing requirements to streamline the information necessary in the report.[21]

The Commission chose not to significantly modify the requirements for notification content to federal agencies.[22] The notification shall include, at minimum, (1) the carrier’s address and contact information; (2) a description of the breach incident; (3) the method of compromise; (4) the date range of the incident; (5) the approximate number of customers affected; (6) an estimate of financial loss to the carrier and customers, if any; and (7) the types of data breached.[23]

  • Notifying the customer of data breaches

In response to concerns that customers will be bombarded with continuous data breach notifications, the updated rules implement a new “harm-based notification trigger” that eliminates the breach notification requirement in cases where the carrier can “reasonably determine that no harm to customers is reasonably likely to occur as a result of the breach.”[24] To assess the likelihood of harm, the rules provide a non-exhaustive list of harm assessment factors such as: sensitivity of information breached, nature and duration of the breach, encryption of information, breach mitigation activity, and intentionality of breach.[25] Other factors used to define “harm” to customers include, but are not limited to, “financial harm, physical harm, identity theft, theft of services, potential for blackmail or spam, the disclosure of private facts, reputational or dignitary harm, mental pain and emotional distress, the disclosure of contact information for victims of abuse, and other similar types of danger.”[26] If a carrier is unable to reasonably determine whether harm is reasonably unlikely to occur, it must still notify the customer of a breach.[27]

The rules also eliminate the mandatory seven-day waiting period for customer notification and instead require prompt customer notifications, with an exception where delayed disclosure is requested by law enforcement to avoid impacts on pending investigations.[28] Under the new rules, customers must now be notified “without unreasonable delay” after notification to federal agencies; this should not exceed 30 days beyond the date of reasonable determination of a breach unless law enforcement requests as such.[29] There are no minimum categories of information required in the customer breach notification; rather, the rules provide recommendations for the types of information that carriers should include in the notice to consumers, such as estimated date of the breach and descriptions of the information used, disclosed, or accessed.[30]

The final order includes an encryption safe harbor that eliminates the customer breach notification requirement when the breach solely involves encrypted data and the carrier can confirm that the encryption key was not also used, accessed, or disclosed.[31] This exception acknowledges that the risk of harm to customers is greatly reduced when data is encrypted and the encryption key is not also compromised.[32]

  • TRS breach reporting

The new rules also apply to providers of telecommunications relay services (“TRS”). TRS providers will be subject to the same requirements as other carriers, including the expanded definition of “breach,” notification to the Commission, the Secret Service, and FBI of breaches, and the harm-based trigger for customer notification.[33]

Pushback on the Rules

The rules were adopted in a 3-2 vote with the Democratic Commissioners in support and the Republican Commissioners opposed, with FCC Commissioner Brendan Carr arguing in his dissent that the rules create a “sweeping theory” that oversteps the boundaries of administrative rulemaking.[34] The new rules are already generating political pushback from outside the Commission, with parties raising a number of potential legal and policy issues related to the rules.

Chief among these is the effect of a 2017 congressional repeal of a broader 2016 FCC order to impose privacy obligations on broadband providers, which included expanded breach notification requirements similar to the updated rules, pursuant to the Congressional Review Act (“CRA”). Commissioners Carr and Nathan Simington each cited that CRA repeal in their dissents as precluding the FCC from adopting the new rules. The CRA requires agencies to report the adoption of new rules to Congress and allows Congress to override such rules by passing a joint resolution of disapproval, a special procedure that effectively overturns the agency rulemaking.[35]  If Congress uses this process to overturn a rule, the relevant agency is specifically prohibited from issuing a subsequent rule that is substantially the same as the one that was previously nullified.[36] Congress exercised this authority in 2017 to overturn the FCC’s 2016 Privacy Order that enacted breach notification rules for telecommunications carriers and broadband internet access service providers and required breach notification to the Commission, the Secret Service, and the FBI, largely basing its disapproval on assertions that the rule would duplicate the Federal Trade Commission (“FTC”)’s privacy authority in terms of broadband internet service providers.

Critics of the new rules argue that the CRA precludes the FCC from adopting the new data breach rules as a result of Congress’s earlier rejection of the FCC’s attempt to adopt rules opponents say were substantially similar to the ones at issue here. Commissioner Simington, in his dissent, noted that the new rules represent a “major step” to restoring the 2016 broadband privacy rules, which he contends were already based on “dubious legal theory.”[37]

The Commission anticipated this critique in its order adopting the new rules, asserting that the CRA “does not prohibit the Commission from revising its breach notification rules in ways that are similar to, or even the same as, some of the revisions that were adopted in the 2016 Privacy Order, unless the revisions adopted are the same, in substance, as the 2016 Privacy Order as a whole.”[38] The final order further argues that the requirements adopted are “materially less prescriptive” than the requirements adopted in 2016.[39] Republican Senators including Sen. Ted Cruz (R-TX), Sen. John Thune (R-SD), Sen. Mitch McConnell (R-KY), and Sen. Marsha Blackburn (R-TN), disagree with this interpretation. The lawmakers sent FCC Chairwoman Jessica Rosenworcel a letter urging withdrawal of the new data breach rules, positing that the rules violated the CRA by enacting in a piecemeal manner substantially similar rules to the 2016 breach notification that were nullified by Congress in 2017, and that the FCC cannot avoid obligations under the CRA by reviving just a portion of the previously nullified rules that were “legally suspect” in 2016.[40] Similarly, Commissioner Carr—in his dissent—contended that the FCC’s piecemeal approach to the rulemaking “creates an exception that swallows the CRA whole.”[41]

Commissioners Carr and Simington, as well as other critics through comments and ex parte filings with the Commission, have also raised several other potential issues with the rule, including: the Commission’s limitation of authority per statute to only regulate CPNI, not PII; operational and compliance burdens generated by the new rules; and consistency of the rules with state data breach notification laws. These areas could open the Commission to further legal scrutiny regarding the adopted rules.

Despite the criticism, the data breach rules have been approved by the Commission and companies should prepare for compliance with its regulations. The report and order will be effective 30 days after publication in the Federal Register, pending approval from the Office of Management and Budget, which must approve all new or expanded agency information collections, such as the updated data breach reporting rules.[42]

Our Telecommunications, Media, and Technology group and cybersecurity team have significant experience in assisting companies in preparing for cyber incidents running tabletop scenarios, developing risk matrices and advising on cyber governance and risk management as well as assisting with incident response and breach reporting. If you have any questions, please contact a member of the Akin TMT or cybersecurity, privacy, and data protection teams.


[1] FCC, FCC Adopts Updated Data Breach Notification Rules to Protect Consumers (Dec. 13, 2023), available at https://docs.fcc.gov/public/attachments/DOC-399090A1.pdf.

[2] FCC, In the Matter of Data Breach Reporting Requirements: Notice of Proposed Rulemaking (Jan. 6, 2023), available at https://www.fcc.gov/document/fcc-proposes-updated-data-breach-reporting-requirements, at para. 2.

[3] 47 CFR § 64.2011(e).

[4] FCC, In the Matter of Data Breach Reporting Requirements: Notice of Proposed Rulemaking (Jan. 6, 2023), available at https://www.fcc.gov/document/fcc-proposes-updated-data-breach-reporting-requirements, at para. 8.

[5] FCC, Report and Order in the Matter of Data Breach Reporting Requirements, WC Docket No. 22-21 (Dec. 21, 2023) available at https://docs.fcc.gov/public/attachments/FCC-23-111A1.pdf, at 5, para. 9.

[6] Id. at 7, para. 13.

[7] Id. at 10, para. 17.

[8] Id. at 10, para. 18.

[9] Id. at 11, para. 18.

[10] Id. at 11, para. 19.

[11] Id. at 12, para. 21.

[12] Id. at 14-15, para. 24; at 16, para. 26.

[13] Id. at 18, para. 28.

[14] 47 CFR § 64.2011(b)(2).

[15] FCC, Report and Order in the Matter of Data Breach Reporting Requirements, at 18, para. 28.

[16] Id. at 19, para. 29.

[17] Id. at 20, para. 31.

[18] Id. at 20, para. 31.

[19] Id. at 20, para. 31.

[20] Id. at 24, para. 39.

[21] Id. at 24, para. 39.

[22] Id. at 25, para. 42.

[23] See § 64.2011(a)(1) of final rules; id. at 25, para. 42.

[24] FCC, Report and Order in the Matter of Data Breach Reporting Requirements at 30-31, para. 52.

[25] Id. at 34-35, para. 57.

[26] Id. at 32-33, para. 55.

[27] Id. at 32, para. 54.

[28] Id. at 36, para. 59.

[29] Id. at 36, para. 59.

[30] Id. at 37, para. 62; id. at 38, para. 63.

[31] Id. at 35, para. 58.

[32] Id. at 35, para. 58.

[33] Id. at 39, para. 66.

[34] “Dissenting Statement of Commissioner Brendan Carr,” https://docs.fcc.gov/public/attachments/DOC-399090A3.pdf (December 13, 2023).

[35] Congressional Research Service, “The Congressional Review Act (CRA): A Brief Overview,” (February 27, 2023), available at https://crsreports.congress.gov/product/pdf/IF/IF10023.

[36] 5 U.S.C. § 801(b)(2).

[37] “Dissenting Statement of Commissioner Nathan Simington,” https://docs.fcc.gov/public/attachments/DOC-399090A5.pdf (December 13, 2023).

[38] FCC, Report and Order in the Matter of Data Breach Reporting Requirements at 67, para. 135.

[39] Id. at 70, para. 142.

[40] Letter to Chairwoman Rosenworcel, https://www.law360.com/articles/1777194/attachments/0 (December 12, 2023).

[41] “Dissenting Statement of Commissioner Brendan Carr,” https://docs.fcc.gov/public/attachments/DOC-399090A3.pdf (December 13, 2023).

[42] FCC, Report and Order in the Matter of Data Breach Reporting Requirements at 72, para. 144.

Share This Insight

Previous Entries

Data Dive

November 19, 2024

The European Union’s AI Office published the inaugural General-Purpose AI Code of Practice on November 14, 2024. The Code is intended to assist providers of AI models in their preparations for compliance with the forthcoming EU AI Act, to be enforced from August 2, 2025. The Code is designed to be both forward-thinking and globally applicable, addressing the areas of transparency, risk evaluation, technical safeguards and governance. While adherence to the Code is not mandatory, it is anticipated to serve as a means of demonstrating compliance with the obligations under the EU AI Act. Following a consultation period that garnered approximately 430 responses, the AI Office will be empowered to apply these rules, with penalties for nonconformity potentially reaching 3% of worldwide turnover or €15 million. Three additional iterations of the Code are anticipated to be produced within the coming five months.

...

Read More

Data Dive

November 15, 2024

On October 29, 2024, the DOJ issued a proposed rule prohibiting and restricting certain transactions that could allow persons from countries of concern, such as China, access to bulk sensitive personal data of U.S. citizens or to U.S. government-related data (regardless of volume).

...

Read More

Data Dive

October 17, 2024

During the course of any lending transaction, lenders will conduct a due diligence review of the borrower, including reviewing any relevant “know-your-customer” information.

...

Read More

Data Dive

September 17, 2024

Following the publication of the European Union’s Artificial Intelligence Act (AI Act or Act) on 12 July 2024, there are now a series of steps that various EU bodies need to take towards implementation. One of the first key steps is in relation to the establishment of codes of practice to “contribute to the proper application” of the AI Act.

...

Read More

Data Dive

August 6, 2024

On July 30, 2024, the Senate passed the Kids Online Safety and Privacy Act (S. 2073) via an overwhelmingly bipartisan vote of 91-3 shortly before departing for the August recess.

...

Read More

Data Dive

July 18, 2024

On 12 July 2024, the European Union Artificial Intelligence Act (AI Act or Act) was published in the Official Journal of the European Union (EU), marking the final step in the AI Act’s legislative journey. Its publication triggers the timeline for the entry into force of the myriad obligations under the AI Act, along with the deadlines we set out below. The requirement to ensure a sufficient level of AI literacy of staff dealing with the operation and use of AI systems will, for example, apply to all providers and deployers on 2 February 2025.

...

Read More

Data Dive

July 18, 2024

On June 18, 2024, the United States Securities and Exchange Commission (SEC) announced a settlement with R.R. Donnelley & Sons Company (RRD) for alleged internal control and disclosure failures following a ransomware attack in 2021. Without admitting or denying the SEC’s findings, the business communications and marketing services provider agreed to pay a civil penalty of over $2.1 million to settle charges alleging violations of Section 13(b)(2)(B) of the Securities Exchange Act of 1934 (Exchange Act) and Exchange Act Rule 13a-15(a).1

...

Read More

Data Dive

June 11, 2024

In May, the National Institute of Standards and Technology (NIST) issued updated recommendations for security controls for controlled unclassified information (CUI) that is processed, stored or transmitted by nonfederal organizations using nonfederal systems, (NIST Special Publication 800-171 (SP 800-171), Revision 3). These security requirements are “intended for use by federal agencies in contractual vehicles or other agreements that are established between those agencies and nonfederal organizations.”1 While these new controls are only applicable to nonfederal entities that agree to comply with the new issuance, Revision 3 signals the next phase of expected security for government contractors.

...

Read More

© 2024 Akin Gump Strauss Hauer & Feld LLP. All rights reserved. Attorney advertising. This document is distributed for informational use only; it does not constitute legal advice and should not be used as such. Prior results do not guarantee a similar outcome. Akin is the practicing name of Akin Gump LLP, a New York limited liability partnership authorized and regulated by the Solicitors Regulation Authority under number 267321. A list of the partners is available for inspection at Eighth Floor, Ten Bishops Square, London E1 6EG. For more information about Akin Gump LLP, Akin Gump Strauss Hauer & Feld LLP and other associated entities under which the Akin Gump network operates worldwide, please see our Legal Notices page.