Advanced Methods To Target and Eliminate Unlawful Robocalls, Call Authentication Trust Anchor, 29478-29482 [2019-13320]
Download as PDF
29478
Federal Register / Vol. 84, No. 121 / Monday, June 24, 2019 / Proposed Rules
EPA is proposing that the TCEQ’s
maintenance plan adequately addresses
the five basic components of a
maintenance plan: Attainment
inventory, maintenance demonstration,
monitoring network, verification of
continued attainment, and a
contingency plan. Thus, the
maintenance plan SIP revision proposed
by the TCEQ meets the requirements of
CAA section 175A and EPA proposes to
approve it as a revision to the Texas SIP.
jbell on DSK3GLQ082PROD with PROPOSALS
III. Motor Vehicle Emissions Budgets
The DFW maintenance plan
submission includes motor vehicle
emissions budgets (MVEBs) for the last
year of the maintenance plan (in this
case 2032). MVEBs are used to conduct
regional emissions analyses for
transportation conformity purposes. See
40 CFR 93.118. The MVEB is the portion
of the total allowable emissions in the
maintenance demonstration that is
allocated to highway and transit vehicle
use and emissions. See 40 CFR 93.101.
As part of the interagency consultation
process on setting MVEBs, TCEQ held
discussions to determine what years to
set MVEBs for the DFW area
maintenance plan.
We note the DFW area already has
adequate NOX and VOC MVEBs for the
2008 ozone NAAQS (81 FR 88124,
December 7, 2016). Therefore, the DFW
area can continue to make conformity
determinations for transportation plans,
transportation improvement programs,
and projects based on budgets for the
2008 ozone NAAQS as it has been
doing, according to the requirements of
the transportation conformity
regulations at 40 CFR part 93.13 The
DFW area currently demonstrates
conformity to the 2008 and 2015 ozone
NAAQS using MVEBs contained in the
area’s 2008 ozone NAAQS Reasonable
Further Progress SIP revision (81 FR
88124). Therefore, EPA is not proposing
to approve the submitted 2032 NOx and
VOC MVEBs for transportation
conformity purposes. As noted above,
EPA is proposing to find that the
projected emissions inventory which
reflects these budgets are consistent
with maintenance of the 1-hour and 8hour standard.
IV. Proposed Action
We are proposing to determine that
the DFW area is continuing to attain the
1-hour and 1997 8-hour ozone NAAQS,
and that Texas has met the CAA criteria
13 Transportation Conformity Guidance for the
South Coast II Court Decision, EPA–420–B–18–050.
November 2018, available on EPA’s web page at
https://www.epa.gov/state-and-localtransportation/policy-and-technical-guidance-stateand-local-transportation.
VerDate Sep<11>2014
16:30 Jun 21, 2019
Jkt 247001
for redesignation of this area. Therefore,
the EPA is proposing to terminate all the
Serious area classification’s antibacksliding obligations for the DFW area
for the 1-hour and 1997 ozone NAAQS.
We are also proposing to approve the
plan for maintaining the 1-hour and
1997 ozone NAAQS through 2032 in the
DFW area.
V. Statutory and Executive Order
Reviews
The actions in this proposal terminate
statutory and regulatory requirements
associated with prior federal revoked
ozone standards and do not impose any
additional regulatory requirements on
sources beyond those imposed by state
law. Therefore, this action does not in
and of itself create any new
requirements. Moreover, the
Administrator is required to approve a
SIP submission that complies with the
provisions of the Act and applicable
Federal regulations. 42 U.S.C. 7410(k);
40 CFR 52.02(a). Thus, in reviewing SIP
submissions, EPA’s role is to approve
state choices, provided that they meet
the criteria of the CAA. For that reason,
these actions:
• Are not a ‘‘significant regulatory
action’’ subject to review by the Office
of Management and Budget under
Executive Orders 12866 (58 FR 51735,
October 4, 1993) and 13563 (76 FR 3821,
January 21, 2011);
• Are not an Executive Order 13771
(82 FR 9339, February 2, 2017)
regulatory action because they are not
‘‘significant regulatory actions’’ under
Executive Order 12866;
• Do not impose an information
collection burden under the provisions
of the Paperwork Reduction Act (44
U.S.C. 3501 et seq.);
• Are certified as not having a
significant economic impact on a
substantial number of small entities
under the Regulatory Flexibility Act (5
U.S.C. 601 et seq.);
• Do not contain any unfunded
mandate or significantly or uniquely
affect small governments, as described
in the Unfunded Mandates Reform Act
of 1995 (Pub. L. 104–4);
• Do not have federalism implications
as specified in Executive Order 13132
(64 FR 43255, August 10, 1999);
• Are not an economically significant
regulatory action based on health or
safety risks subject to Executive Order
13045 (62 FR 19885, April 23, 1997);
• Are not a significant regulatory
action subject to Executive Order 13211
(66 FR 28355, May 22, 2001);
• Are not subject to requirements of
section 12(d) of the National
Technology Transfer and Advancement
Act of 1995 (15 U.S.C. 272 note) because
PO 00000
Frm 00080
Fmt 4702
Sfmt 4702
application of those requirements would
be inconsistent with the CAA; and
• Do not provide EPA with the
discretionary authority to address, as
appropriate, disproportionate human
health or environmental effects, using
practicable and legally permissible
methods, under Executive Order 12898
(59 FR 7629, February 16, 1994).
In addition, the SIP is not approved
to apply on any Indian reservation land
or in any other area where EPA or an
Indian tribe has demonstrated that a
tribe has jurisdiction. In those areas of
Indian country, the proposed rule does
not have tribal implications and will not
impose substantial direct costs on tribal
governments or preempt tribal law as
specified by Executive Order 13175 (65
FR 67249, November 9, 2000).
List of Subjects
40 CFR Part 52
Environmental protection, Air
pollution control, Incorporation by
reference, Intergovernmental relations,
Ozone.
40 CFR Part 81
Environmental protection, Air
pollution control.
Authority: 42 U.S.C. 7401 et seq.
Dated: June 14, 2019.
David Gray,
Acting Regional Administrator, Region 6.
[FR Doc. 2019–13126 Filed 6–21–19; 8:45 am]
BILLING CODE 6560–50–P
FEDERAL COMMUNICATIONS
COMMISSION
47 CFR Part 64
[CG Docket No. 17–59, WC Docket No. 17–
97; FCC 19–51]
Advanced Methods To Target and
Eliminate Unlawful Robocalls, Call
Authentication Trust Anchor
Federal Communications
Commission.
ACTION: Proposed rule.
AGENCY:
In this document the Federal
Communications Commission (FCC or
Commission) invites comments on
proposed revisions to its rules
implementing the Telephone Consumer
Protection Act and seeks comment on
issues pertaining to the implementation
of SHAKEN/STIR. The Commission
proposes: A safe harbor for call-blocking
programs targeting unauthenticated
calls, which may be potentially spoofed;
safeguards to ensure that the most
important calls are not blocked; and to
require voice service providers to
SUMMARY:
E:\FR\FM\24JNP1.SGM
24JNP1
jbell on DSK3GLQ082PROD with PROPOSALS
Federal Register / Vol. 84, No. 121 / Monday, June 24, 2019 / Proposed Rules
implement the SHAKEN/STIR Caller ID
Authentication framework, in the event
major voice service providers have
failed to do so by the end of this year.
DATES: Comments are due on or before
July 24, 2019, and reply comments are
due on or before August 23, 2019.
ADDRESSES: You may submit comments,
identified by CG Docket No. 17–59 and
WC Docket No. 17–97, by any of the
following methods:
D Federal Communications
Commission’s website: https://
apps.fcc.gov/ecfs/. Follow the
instructions for submitting comments.
D Paper Mail: Parties who choose to
file by paper must file an original and
one copy of each filing. Filers must
submit two additional copies for each
additional docket or rulemaking
number. Filings can be sent by hand or
messenger delivery, by commercial
overnight courier, or by first-class or
overnight U.S. Postal Service mail. All
filings must be addressed to the
Commission’s Secretary, Office of the
Secretary, Federal Communications
Commission.
D People with Disabilities: Contact the
FCC to request reasonable
accommodations (accessible format
documents, sign language interpreters,
CART, etc.) by email: FCC504@fcc.gov
or phone: 202–418–0530 or TTY: 202–
418–0432.
For detailed instructions for submitting
comments and additional information
on the rulemaking process, see the
SUPPLEMENTARY INFORMATION section of
this document.
FOR FURTHER INFORMATION CONTACT:
Jerusha Burnett, Consumer Policy
Division, Consumer and Governmental
Affairs Bureau, email at
jerusha.burnett@fcc.gov or by phone at
(202) 418–0526.
SUPPLEMENTARY INFORMATION: This is a
summary of the Commission’s Third
Further Notice of Proposed Rulemaking
(TFNPRM), in CG Docket No. 17–59, WC
Docket No. 17–97; FCC 19–51, adopted
on June 6, 2019 and released on June 7,
2019. The Declaratory Ruling that was
adopted concurrently with the TFNPRM
is published elsewhere in this issue of
the Federal Register. The full text of
document FCC 19–51 is available for
public inspection and copying via the
Commission’s Electronic Comment
Filing System (ECFS), and during
regular business hours at the FCC
Reference Information Center, Portals II,
445 12th Street SW, Room CY–A257,
Washington, DC 20554. To request
materials in accessible formats for
people with disabilities (braille, large
print, electronic files, audio format),
send an email to fcc504@fcc.gov or call
VerDate Sep<11>2014
16:30 Jun 21, 2019
Jkt 247001
the Consumer and Governmental Affairs
Bureau at 202–418–0530 (voice), 202–
418–0432 (TTY).
This matter shall be treated as a
‘‘permit-but-disclose’’ proceeding in
accordance with the Commission’s ex
parte rules. 47 CFR 1.1200 et seq.
Persons making oral ex parte
presentations are reminded that
memoranda summarizing the
presentations must contain summaries
of the substances of the presentations
and not merely a listing of the subjects
discussed. More than a one or two
sentence description of the views and
arguments presented is generally
required. See 47 CFR 1.1206(b). Other
rules pertaining to oral and written ex
parte presentations in permit-butdisclose proceedings are set forth in
§ 1.1206(b) of the Commission’s rules,
47 CFR 1.1206(b).
Initial Paperwork Reduction Act of
1995 Analysis
The TFNPRM in document FCC 19–51
seeks comment on proposed rule
amendments that may result in
modified information collection
requirements. If the Commission adopts
any modified information collection
requirements, the Commission will
publish another notice in the Federal
Register inviting the public to comment
on the requirements, as required by the
Paperwork Reduction Act. Public Law
104–13; 44 U.S.C. 3501–3520. In
addition, pursuant to the Small
Business Paperwork Relief Act of 2002,
the Commission seeks comment on how
it might further reduce the information
collection burden for small business
concerns with fewer than 25 employees.
Public Law 107–198; 44 U.S.C.
3506(c)(4).
Synopsis
1. In the TFNPRM, the Commission
takes additional steps to protect
consumers from illegal calls and ensure
the effectiveness and integrity of the
SHAKEN/STIR Caller ID authentication
framework by proposing rules to allow
voice service providers to block calls
based on Caller ID authentication in
certain instances. The Commission
further proposes protections to ensure
that the most important calls are not
blocked. The Commission also proposes
to require voice service providers to
implement the SHAKEN/STIR Caller ID
authentication framework in the event
that major voice service providers have
not met Chairman’s Pai’s deadline for
doing so by the end of 2019.
PO 00000
Frm 00081
Fmt 4702
Sfmt 4702
29479
Safe Harbor for Call-Blocking Programs
Based on Potentially Spoofed Calls
2. The Commission proposes a narrow
safe harbor for voice service providers
that offer call-blocking programs that
take into account whether a call has
been properly authenticated under the
SHAKEN/STIR framework and may
potentially be spoofed.
3. First, the Commission proposes a
safe harbor for voice service providers
that choose to block calls (or a subset of
calls) that fail Caller ID authentication
under the SHAKEN/STIR framework. A
call would fail authentication when the
attestation header has been maliciously
altered or inserted—in other words,
where a malicious actor has tried to
inappropriately spoof another number
and attempted to circumvent the
protection provided by SHAKEN/STIR.
Accordingly, the Commission would
expect the vast majority of calls blocked
in such circumstances to be illegitimate
and call-blocking programs targeting
such calls to be deserving of safe harbor.
The Commission seeks comment on this
view.
4. Are there other instances where
authentication would fail? Would a safe
harbor for such a call-blocking program
provide a strong incentive to
participating SHAKEN/STIR providers
to ensure their public key infrastructure
is up to date, as well as bolster the value
of a failed authentication as a strong
indicator of an illegal call? As SHAKEN/
STIR deployment becomes more
widespread, will failed authentication
be a good proxy for illegal calls? To the
extent it is overbroad, how should the
Commission address false positives? Are
there specific notification or other
procedures that are most appropriate for
use to enable callers to correct such
false positives quickly?
5. Second, the Commission seeks
comment on whether it should create a
safe harbor for blocking unsigned calls
from particular categories of voice
service providers. Many larger voice
service providers have committed to
deploying SHAKEN/STIR in 2019. If
other large voice service providers fail
to do so, should blocking unsigned calls
from such voice service providers, after
a reasonable transition period, fall
within the safe harbor? Alternatively,
should a safe harbor target those voice
service providers that are most likely to
facilitate unlawful robocallers?
6. How can the Commission ensure
that any safe harbor does not impose
undue costs on eligible
telecommunications carriers
participating in the Commission’s highcost program? And how can the
Commission ensure any such carve-out
E:\FR\FM\24JNP1.SGM
24JNP1
29480
Federal Register / Vol. 84, No. 121 / Monday, June 24, 2019 / Proposed Rules
jbell on DSK3GLQ082PROD with PROPOSALS
does not protect those few voice service
providers that actively facilitate
unlawful spoofing and robocalling,
often from foreign countries?
7. Can downstream providers reliably
determine on which network a
particular unsigned call originated? Are
there concerns regarding a call that was
initially signed transiting a non-IP
network? Should the Commission set a
date certain for when this type of
blocking is permissible?
8. Are there any particular protections
the Commission should establish for a
safe harbor to ensure that wanted calls
are not blocked? The Commission seeks
comment on whether to require
providers seeking a safe harbor to
provide for identifying and remedying
the blocking of wanted calls.
9. Compliance with Rural Call
Completion Rules. The Commission also
seeks comment on how its proposal
intersects with the Commission’s rural
call completion rules, including those
implementing the Rural Call Quality
and Reliability Act of 2017 (RCC Act),
and whether to include additional
criteria related to these rules. The
Commission seeks comment on whether
Caller ID authentication provides
sufficient justification to permit a
downstream provider to block calls from
an upstream provider.
10. Use of SHAKEN/STIR-Based
Analytics. SHAKEN/STIR’s ability to
determine the source of robocalls will
be a significant contribution to the
quality of these analytics. The
Commission therefore seeks comment
on the use of SHAKEN/STIR-based
analytics once this technology is
implemented.
Protections for Critical Calls
11. Certain emergency calls must
never be blocked. Accordingly, the
Commission considers requiring any
voice service provider that offers callblocking to maintain a ‘‘Critical Calls
List’’ of numbers it may not block. Such
lists would include at least the
outbound numbers of 911 call centers
(i.e., PSAPs) and government emergency
outbound numbers. The prohibition on
call blocking would only apply to
authenticated calls. The Commission
seeks comment on this proposal.
12. The Commission seeks comment
on what numbers should be required on
a Critical Calls List. How should the
Commission define outbound numbers
of 911 call centers (i.e., PSAPs)? How
should the Commission define
government emergency outbound
numbers? How can the Commission
mitigate the burden of administering a
Critical Calls List? Should a Critical
Calls List be centrally maintained, or
VerDate Sep<11>2014
16:30 Jun 21, 2019
Jkt 247001
should each voice service provider
instead maintain its own list? If
centrally, what entity should maintain
the list and how should voice service
providers access the list? Does the
Commission’s proposal capture the most
important numbers to avoid blocking?
13. The Commission also seeks
comment on limiting Critical Calls List
protections to only those calls for which
the Caller ID is authenticated. Does this
provide protection against illegal callers
spoofing these crucial numbers? The
Commission seeks comment on whether
voice service providers should be
required to complete calls where any
level of attestation is present so long as
the Caller ID authenticates, or whether
the Commission should limit this
requirement.
14. How can the Commission ensure
that a Critical Calls List is sufficiently
protected from abuse by unscrupulous
callers? Should the list be kept nonpublic to avoid unlawful spoofing of
listed numbers? The Commission seeks
comment on whether there are any
benefits to making the list public that
outweigh these risks. If not public, who
should be able to access it? The
Commission invites comment on any
other critical details. The Commission
further seeks comment on the associated
costs and benefits of implementing such
a Critical Calls List.
15. Calls Placed to 911. The
Commission see no reason that the rule
prohibiting blocking of calls to 911
should not apply to the blocking
proposed herein. The Commission seeks
comment on the extent to which PSAPs
have received calls with a spoofed
Caller ID reporting a false emergency.
16. The Commission seeks comment
on other ways to protect callers from
erroneous blocking. Should the
Commission consider other bases for
blocking unwanted, illegal calls?
Mandating Caller ID Authentication
17. If major voice service providers
fail to meet an end of 2019 deadline for
voluntary implementation of the
SHAKEN/STIR Caller ID authentication
framework, the Commission proposes to
require them to implement that
framework. The Commission seeks
comment on this proposal.
18. Implementation of the SHAKEN/
STIR framework across voice networks
is important in the fight against
unwanted, including illegal, robocalls.
Should major voice service providers
fail to meet this end-of-year deadline,
the Commission proposes to take
appropriate regulatory action to ensure
that voice service providers implement
SHAKEN/STIR. If major voice service
providers meet the end-of-year deadline,
PO 00000
Frm 00082
Fmt 4702
Sfmt 4702
what steps should the Commission take
to ensure that other voice service
providers implement SHAKEN/STIR?
19. Determining whether it is
necessary to mandate implementation
of SHAKEN/STIR. The Commission
seeks comment on how best to define
‘‘major voice service providers’’ for the
purpose of evaluating the progress made
by such providers in implementing
SHAKEN/STIR by the end of this year.
20. The Commission seeks comment
on how best to evaluate whether major
voice service providers have met the
end of year deadline for implementation
set by Chairman Pai. In discussing
SHAKEN/STIR, providers often refer to
signing calls on an intercarrier basis and
using signature information they receive
to enhance the consumer experience.
Should this be the standard the
Commission uses to measure
implementation? The Commission
invites comment on this approach and
on specific alternatives. Should the
Commission require certifications
documenting compliance?
21. Voice service providers covered by
the SHAKEN/STIR implementation
requirement. If the Commission
mandates provider implementation of
SHAKEN/STIR, the Commission
proposes to require implementation by
all voice service providers—wireline,
wireless, and Voice over internet
Protocol (VoIP) providers. The
Commission seeks comment on this
proposal. Are there other voice service
providers the Commission should
include? Are there any exceptions to an
implementation requirement?
22. Implementation. If the
Commission mandates implementation
of SHAKEN/STIR, what should the
Commission require providers to
accomplish to meet the requirement?
Should it require providers to sign calls
on an intercarrier basis and use
signature information they receive to
enhance the consumer experience?
Should the Commission impose other or
different requirements?
23. For example, if the Commission
mandates SHAKEN/STIR
implementation, should the
Commission require providers to adopt
a uniform display showing consumers
whether a call has been authenticated?
Or should the Commission encourage
provider experimentation to develop the
most useful display for consumers?
24. Timing of the requirement. If the
Commission mandates implementation
of SHAKEN/STIR, how much
implementation time should the
Commission give voice service
providers? The Commission invites
commenters to propose specific
categories of voice service providers,
E:\FR\FM\24JNP1.SGM
24JNP1
Federal Register / Vol. 84, No. 121 / Monday, June 24, 2019 / Proposed Rules
specify how the Commission should
distinguish between or among them,
explain why the Commission should do
so for purposes of setting
implementation deadlines, and propose
specific implementation deadlines for
each proposed specific category of voice
service providers.
25. Governance. What role should the
Commission have in SHAKEN/STIR
governance? Industry has taken steps to
establish a governance regime. Are there
aspects of the governance authority that
the Commission should handle itself or
should its role be formal oversight? Are
there other functions that the
Commission should undertake to ensure
the adoption and implementation of
SHAKEN/STIR?
26. Legacy Networks. The
Commission recognizes that there are
challenges for smaller and rural carriers.
The Commission seeks comment on
how to encourage Caller ID
authentication for carriers that maintain
some portion of their network on legacy
technology. Are there technologies
available to enable legacy networks to
participate in Caller ID authentication?
27. Illegal calls originating outside the
United States. The Commission seeks
comment on how the Commission and
the industry can best leverage Caller ID
authentication technology and
specifically SHAKEN/STIR to combat
illegal calls originating outside the
United States.
jbell on DSK3GLQ082PROD with PROPOSALS
Measuring the Effectiveness of Robocall
Solutions
28. Should the Commission create a
mechanism to provide information to
consumers about the effectiveness of
providers’ robocall solutions? If so, how
should ‘‘effectiveness’’ be defined? How
would the Commission obtain the
information needed to evaluate the
effectiveness of the robocall solutions?
Legal Authority
29. The Commission seeks comment
on its authority to adopt new rules here.
Sections 201(b) and 202(a) of the
Communications Act (the Act) have
formed the basis for the Commission’s
traditional prohibitions on call blocking.
The Commission also is charged with
prescribing regulations to implement
the Truth in Caller ID Act, which made
unlawful the spoofing of Caller ID ‘‘in
connection with any
telecommunications service or IPenabled voice service . . . with the
intent to defraud, cause harm, or
wrongfully obtain anything of value
. . . .’’ And section 251(e) of the Act
gives the Commission authority over the
use and allocation of numbering
resources in the United States,
VerDate Sep<11>2014
16:30 Jun 21, 2019
Jkt 247001
including the use of unallocated and
unused numbers.
30. The Commission seeks comment
on whether these statutory provisions—
or any others—confer on the
Commission sufficient authority to
adopt rules to create a safe harbor for
certain call-blocking programs and
require voice service providers that offer
call-blocking programs to maintain a
Critical Calls List. Is creating a safe
harbor equivalent to declaring certain
practices presumptively just and
reasonable? Is encouraging providers to
adopt SHAKEN/STIR consistent with
the Commission’s authority under the
Truth in Caller ID Act? Does the
Commission’s plenary authority over
numbering extend to requiring that calls
from certain numbers be sacrosanct?
Does the Commission’s authority
depend, in part or at all, on whether the
calls considered in a call-blocking
program are in fact illegal under federal
law or merely unwanted by consumers?
Are these proposals necessary to allow
voice service providers to help prevent
unlawful acts and protect voice service
subscribers? Would any of these
proposals be limited only to calls
purporting to use North American
Numbering Plan (NANP) numbers?
31. The Commission believes section
251(e) of the Act, which grants the
Commission plenary jurisdiction over
the NANP resources in the United States
and the authority to administer
numbering resources, provides the
Commission the authority to mandate
Caller ID authentication and specifically
SHAKEN/STIR. By permitting voice
providers and consumers to identify
when a Caller ID number has been
spoofed, mandating SHAKEN/STIR
would prevent NANP resources from
being fraudulently exploited. The
Commission concludes that section
251(e) provides it sufficient authority to
adopt such rules. Do commenters agree?
Are there any other statutory provisions
or other sources of authority the
Commission should consider?
Initial Regulatory Flexibility Analysis
32. As required by the Regulatory
Flexibility Act of 1980, as amended, the
Commission has prepared the Initial
Regulatory Flexibility Analysis (IRFA)
of the possible significant economic
impact on a substantial number of small
entities by the policies and rules
proposed in the TFNPRM. Written
public comments are requested on the
IRFA. Comments must be identified as
responses to the IRFA and must be filed
by the deadlines for comments on the
TFNPRM provided.
33. Need for, and Objectives of, the
Proposed Rules
PO 00000
Frm 00083
Fmt 4702
Sfmt 4702
29481
The TFNPRM proposes rules to
permit voice service providers, on their
own initiative, to block calls based on
Caller ID authentication, specifically
where the Caller ID is eligible for
authentication but fails. The TFNPRM
also proposes to require a ‘‘Critical Calls
List’’ of numbers that must never be
blocked so long as the Caller ID is
authenticated. The TFNPRM further
proposes and seeks comment on
requiring voice service providers to
implement the SHAKEN/STIR call
authentication framework if major voice
service providers fail to voluntarily
implement it by the end of 2019.
Legal Basis
34. The proposed and anticipated
rules are authorized under sections 201,
202, 227, 251(e), and 403 of the Act, as
amended, 47 U.S.C. 201, 202, 227,
251(e), 403.
Description of Projected Reporting,
Recordkeeping, and Other Compliance
Requirements
35. As indicated above, the TFNPRM
seeks comment on proposed rules to
codify that voice service providers may
block telephone calls in certain
circumstances to protect subscribers
from illegal calls, as well as on proposed
rules to prevent the blocking of lawful
calls. Until these requirements are
defined in full, it is not possible to
predict with certainty whether the costs
of compliance will be proportional
between small and large voice service
providers. In the TRNPRM, the
Commission seeks to minimize the
burden associated with reporting,
recordkeeping, and other compliance
requirements for the proposed rules,
such as modifying software, developing
procedures, and training staff.
36. Under the proposed rules, the
Commission tentatively concludes that
voice service providers will need to
keep records of Caller ID authentication
information. In addition, voice service
providers may need to set up
communication with other voice service
providers to share information about
failed authentication. Voice service
providers will also be required to
maintain a ‘‘Critical Calls List’’ of
numbers that should not be blocked.
37. The TFNPRM also proposes to
require voice service providers to
implement SHAKEN/STIR if major
voice service providers have not
voluntarily implemented the framework
by the end of 2019. At this time, the
Commission is not in a position to
determine whether, if adopted, the
Commission’s proposals will require
small entities to hire attorneys,
engineers, consultants, or other
E:\FR\FM\24JNP1.SGM
24JNP1
29482
Federal Register / Vol. 84, No. 121 / Monday, June 24, 2019 / Proposed Rules
professionals and cannot quantify the
cost of compliance with the potential
rule changes discussed herein. The
TFNPRM proposes to require
implementation by all voice service
providers—wireline, wireless, and VoIP
providers.
jbell on DSK3GLQ082PROD with PROPOSALS
Steps Taken To Minimize Significant
Economic Impact on Small Entities, and
Significant Alternatives Considered
38. These proposed rules to codify
that voice service providers may block
telephone calls in certain circumstances
to protect subscribers from illegal and
unwanted calls are permissive and not
mandatory. Small businesses may avoid
compliance costs entirely by declining
to block calls, or may delay their
implementation of call blocking to allow
for more time to come into compliance
with the rules. However, the
Commission intends to craft rules that
encourage all carriers, including small
businesses, to block such calls and the
TFNPRM therefore seeks comment from
small businesses on how to minimize
costs associated with implementing the
proposed rules. The TFNPRM poses
specific requests for comment from
small businesses regarding how the
proposed rules affect them and what
could be done to minimize any
disproportionate impact on small
businesses.
39. The Commission’s proposed rules
allow voice service providers to block
calls based on certain criteria, including
where the Caller ID fails authentication.
In addition, the proposed rules protect
callers from the risk of their calls being
blocked erroneously. The TFNPRM
requests feedback from small businesses
and seeks comment on ways to make the
proposed rules less costly and minimize
the economic impact of the
Commission’s proposals.
40. The TFNPRM also seeks comment
on the length of time the Commission
should allow voice service providers to
implement SHAKEN/STIR, whether
smaller and medium-sized voice
providers should be given additional
time to implement this framework, and
how to qualify and quantify voice
providers’ sizes. Moreover, the
Commission seeks updated information
for entities of all sizes, including small
entities, regarding the upfront and
recurring costs to providers of
implementing SHAKEN/STIR.
41. The Commission expects to
consider the economic impact on small
entities, as identified in comments filed
in response to the TFNPRM and the
IRFA, in reaching its final conclusions
and taking action in this proceeding.
VerDate Sep<11>2014
16:30 Jun 21, 2019
Jkt 247001
Federal Rules That May Duplicate,
Overlap, or Conflict With the Proposed
Rules
[FR Doc. 2019–13320 Filed 6–21–19; 8:45 am]
42. None.
List of Subjects in 47 CFR Part 64
Communications common carriers,
Reporting and recordkeeping
requirements, Telecommunications,
Telephone.
Federal Communications Commission.
Cecilia Sigmund,
Federal Register Liaison Officer, Office of the
Secretary.
Proposed Rules
For the reasons discussed in the
preamble, the Federal Communications
Commission proposes to amend 47 part
64 as follows:
PART 64—MISCELLANEOUS RULES
RELATING TO COMMON CARRIERS
1. The authority citation for part 64
continues to read as follows:
■
Authority: 47 U.S.C. 154, 201, 202, 217
218, 220, 222, 225, 226, 227, 228, 251(a),
251(e), 254(k), 262, 403(b)(2)(B), (c), 616, 620,
1401–1473, unless otherwise noted.
2. Amend § 64.1200 by
a. Redesignating paragraph (k)(2) as
paragraph (k)(5);
■ b. Redesignating paragraph (k)(4) as
paragraph (k)(2);
■ c. Redesignating paragraph (k)(1) as
paragraph (k)(4);
■ d. Redesignating paragraph (k)(3) as
paragraph (k)(1); and
■ e. Adding new paragraphs (k)(3) and
(k)(6).
The additions to read as follows:
■
■
§ 64.1200
Delivery restrictions
*
*
*
*
*
(k) * * *
(3) Any provider blocking pursuant to
this subsection must maintain a list of
numbers from which calls will not be
blocked where the Caller ID is
authenticated on a call purporting to
originate from the number. Providers
must include on their lists only
numbers used for outbound calls by
Public Safety Answering Points or other
emergency services; governmentoriginated calls, such as calls from local
authorities generated during
emergencies; and outbound calls from
schools and similar educational
institutions to provide school-related
emergency notifications, such as
weather-related closures or the
existence of an emergency affecting the
school or students.
*
*
*
*
*
(6) A provider may block a call that
is eligible for authentication of Caller ID
PO 00000
Frm 00084
and for which authentication by the
terminating provider has failed.
*
*
*
*
*
Fmt 4702
Sfmt 4702
BILLING CODE 6712–01–P
DEPARTMENT OF DEFENSE
GENERAL SERVICES
ADMINISTRATION
NATIONAL AERONAUTICS AND
SPACE ADMINISTRATION
48 CFR Parts 1, 5, 8, 9, 12, 13, 15, 19,
22, 25, 30, 50, and 52
[FAR Case 2018–007; Docket No. 2018–
0007, Sequence No. 1]
RIN 9000–AN67
Federal Acquisition Regulation:
Applicability of Inflation Adjustments
of Acquisition-Related Thresholds
Department of Defense (DoD),
General Services Administration (GSA),
and National Aeronautics and Space
Administration (NASA).
ACTION: Proposed rule.
AGENCY:
DoD, GSA, and NASA are
proposing to amend the Federal
Acquisition Regulation (FAR) to
implement a section of the National
Defense Authorization Act (NDAA) for
Fiscal Year (FY) 2018 to make inflation
adjustments of statutory acquisitionrelated thresholds applicable to existing
contracts and subcontracts in effect on
the date of the adjustment that contain
the revised clauses as proposed in this
rulemaking.
DATES: Interested parties should submit
written comments to the Regulatory
Secretariat Division at one of the
addresses shown below on or before
August 23, 2019 to be considered in the
formation of the final rule.
ADDRESSES: Submit comments in
response to FAR Case 2018–007 by any
of the following methods:
• Regulations.gov: https://
www.regulations.gov. Submit comments
via the Federal eRulemaking portal by
searching for ‘‘FAR Case 2018–007’’.
Select the link ‘‘Comment Now’’ that
corresponds with ‘‘FAR Case 2018–
007’’. Follow the instructions provided
on the screen. Please include your
name, company name (if any), and
‘‘FAR Case 2018–007’’ on your attached
document.
• Mail: General Services
Administration, Regulatory Secretariat
Division (MVCB), ATTN: Lois Mandell,
1800 F Street NW, 2nd Floor,
Washington, DC 20405.
SUMMARY:
E:\FR\FM\24JNP1.SGM
24JNP1
Agencies
[Federal Register Volume 84, Number 121 (Monday, June 24, 2019)]
[Proposed Rules]
[Pages 29478-29482]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2019-13320]
=======================================================================
-----------------------------------------------------------------------
FEDERAL COMMUNICATIONS COMMISSION
47 CFR Part 64
[CG Docket No. 17-59, WC Docket No. 17-97; FCC 19-51]
Advanced Methods To Target and Eliminate Unlawful Robocalls, Call
Authentication Trust Anchor
AGENCY: Federal Communications Commission.
ACTION: Proposed rule.
-----------------------------------------------------------------------
SUMMARY: In this document the Federal Communications Commission (FCC or
Commission) invites comments on proposed revisions to its rules
implementing the Telephone Consumer Protection Act and seeks comment on
issues pertaining to the implementation of SHAKEN/STIR. The Commission
proposes: A safe harbor for call-blocking programs targeting
unauthenticated calls, which may be potentially spoofed; safeguards to
ensure that the most important calls are not blocked; and to require
voice service providers to
[[Page 29479]]
implement the SHAKEN/STIR Caller ID Authentication framework, in the
event major voice service providers have failed to do so by the end of
this year.
DATES: Comments are due on or before July 24, 2019, and reply comments
are due on or before August 23, 2019.
ADDRESSES: You may submit comments, identified by CG Docket No. 17-59
and WC Docket No. 17-97, by any of the following methods:
[ssquf] Federal Communications Commission's website: https://apps.fcc.gov/ecfs/. Follow the instructions for submitting comments.
[ssquf] Paper Mail: Parties who choose to file by paper must file
an original and one copy of each filing. Filers must submit two
additional copies for each additional docket or rulemaking number.
Filings can be sent by hand or messenger delivery, by commercial
overnight courier, or by first-class or overnight U.S. Postal Service
mail. All filings must be addressed to the Commission's Secretary,
Office of the Secretary, Federal Communications Commission.
[ssquf] People with Disabilities: Contact the FCC to request
reasonable accommodations (accessible format documents, sign language
interpreters, CART, etc.) by email: [email protected] or phone: 202-418-
0530 or TTY: 202-418-0432.
For detailed instructions for submitting comments and additional
information on the rulemaking process, see the SUPPLEMENTARY
INFORMATION section of this document.
FOR FURTHER INFORMATION CONTACT: Jerusha Burnett, Consumer Policy
Division, Consumer and Governmental Affairs Bureau, email at
[email protected] or by phone at (202) 418-0526.
SUPPLEMENTARY INFORMATION: This is a summary of the Commission's Third
Further Notice of Proposed Rulemaking (TFNPRM), in CG Docket No. 17-59,
WC Docket No. 17-97; FCC 19-51, adopted on June 6, 2019 and released on
June 7, 2019. The Declaratory Ruling that was adopted concurrently with
the TFNPRM is published elsewhere in this issue of the Federal
Register. The full text of document FCC 19-51 is available for public
inspection and copying via the Commission's Electronic Comment Filing
System (ECFS), and during regular business hours at the FCC Reference
Information Center, Portals II, 445 12th Street SW, Room CY-A257,
Washington, DC 20554. To request materials in accessible formats for
people with disabilities (braille, large print, electronic files, audio
format), send an email to [email protected] or call the Consumer and
Governmental Affairs Bureau at 202-418-0530 (voice), 202-418-0432
(TTY).
This matter shall be treated as a ``permit-but-disclose''
proceeding in accordance with the Commission's ex parte rules. 47 CFR
1.1200 et seq. Persons making oral ex parte presentations are reminded
that memoranda summarizing the presentations must contain summaries of
the substances of the presentations and not merely a listing of the
subjects discussed. More than a one or two sentence description of the
views and arguments presented is generally required. See 47 CFR
1.1206(b). Other rules pertaining to oral and written ex parte
presentations in permit-but-disclose proceedings are set forth in Sec.
1.1206(b) of the Commission's rules, 47 CFR 1.1206(b).
Initial Paperwork Reduction Act of 1995 Analysis
The TFNPRM in document FCC 19-51 seeks comment on proposed rule
amendments that may result in modified information collection
requirements. If the Commission adopts any modified information
collection requirements, the Commission will publish another notice in
the Federal Register inviting the public to comment on the
requirements, as required by the Paperwork Reduction Act. Public Law
104-13; 44 U.S.C. 3501-3520. In addition, pursuant to the Small
Business Paperwork Relief Act of 2002, the Commission seeks comment on
how it might further reduce the information collection burden for small
business concerns with fewer than 25 employees. Public Law 107-198; 44
U.S.C. 3506(c)(4).
Synopsis
1. In the TFNPRM, the Commission takes additional steps to protect
consumers from illegal calls and ensure the effectiveness and integrity
of the SHAKEN/STIR Caller ID authentication framework by proposing
rules to allow voice service providers to block calls based on Caller
ID authentication in certain instances. The Commission further proposes
protections to ensure that the most important calls are not blocked.
The Commission also proposes to require voice service providers to
implement the SHAKEN/STIR Caller ID authentication framework in the
event that major voice service providers have not met Chairman's Pai's
deadline for doing so by the end of 2019.
Safe Harbor for Call-Blocking Programs Based on Potentially Spoofed
Calls
2. The Commission proposes a narrow safe harbor for voice service
providers that offer call-blocking programs that take into account
whether a call has been properly authenticated under the SHAKEN/STIR
framework and may potentially be spoofed.
3. First, the Commission proposes a safe harbor for voice service
providers that choose to block calls (or a subset of calls) that fail
Caller ID authentication under the SHAKEN/STIR framework. A call would
fail authentication when the attestation header has been maliciously
altered or inserted--in other words, where a malicious actor has tried
to inappropriately spoof another number and attempted to circumvent the
protection provided by SHAKEN/STIR. Accordingly, the Commission would
expect the vast majority of calls blocked in such circumstances to be
illegitimate and call-blocking programs targeting such calls to be
deserving of safe harbor. The Commission seeks comment on this view.
4. Are there other instances where authentication would fail? Would
a safe harbor for such a call-blocking program provide a strong
incentive to participating SHAKEN/STIR providers to ensure their public
key infrastructure is up to date, as well as bolster the value of a
failed authentication as a strong indicator of an illegal call? As
SHAKEN/STIR deployment becomes more widespread, will failed
authentication be a good proxy for illegal calls? To the extent it is
overbroad, how should the Commission address false positives? Are there
specific notification or other procedures that are most appropriate for
use to enable callers to correct such false positives quickly?
5. Second, the Commission seeks comment on whether it should create
a safe harbor for blocking unsigned calls from particular categories of
voice service providers. Many larger voice service providers have
committed to deploying SHAKEN/STIR in 2019. If other large voice
service providers fail to do so, should blocking unsigned calls from
such voice service providers, after a reasonable transition period,
fall within the safe harbor? Alternatively, should a safe harbor target
those voice service providers that are most likely to facilitate
unlawful robocallers?
6. How can the Commission ensure that any safe harbor does not
impose undue costs on eligible telecommunications carriers
participating in the Commission's high-cost program? And how can the
Commission ensure any such carve-out
[[Page 29480]]
does not protect those few voice service providers that actively
facilitate unlawful spoofing and robocalling, often from foreign
countries?
7. Can downstream providers reliably determine on which network a
particular unsigned call originated? Are there concerns regarding a
call that was initially signed transiting a non-IP network? Should the
Commission set a date certain for when this type of blocking is
permissible?
8. Are there any particular protections the Commission should
establish for a safe harbor to ensure that wanted calls are not
blocked? The Commission seeks comment on whether to require providers
seeking a safe harbor to provide for identifying and remedying the
blocking of wanted calls.
9. Compliance with Rural Call Completion Rules. The Commission also
seeks comment on how its proposal intersects with the Commission's
rural call completion rules, including those implementing the Rural
Call Quality and Reliability Act of 2017 (RCC Act), and whether to
include additional criteria related to these rules. The Commission
seeks comment on whether Caller ID authentication provides sufficient
justification to permit a downstream provider to block calls from an
upstream provider.
10. Use of SHAKEN/STIR-Based Analytics. SHAKEN/STIR's ability to
determine the source of robocalls will be a significant contribution to
the quality of these analytics. The Commission therefore seeks comment
on the use of SHAKEN/STIR-based analytics once this technology is
implemented.
Protections for Critical Calls
11. Certain emergency calls must never be blocked. Accordingly, the
Commission considers requiring any voice service provider that offers
call-blocking to maintain a ``Critical Calls List'' of numbers it may
not block. Such lists would include at least the outbound numbers of
911 call centers (i.e., PSAPs) and government emergency outbound
numbers. The prohibition on call blocking would only apply to
authenticated calls. The Commission seeks comment on this proposal.
12. The Commission seeks comment on what numbers should be required
on a Critical Calls List. How should the Commission define outbound
numbers of 911 call centers (i.e., PSAPs)? How should the Commission
define government emergency outbound numbers? How can the Commission
mitigate the burden of administering a Critical Calls List? Should a
Critical Calls List be centrally maintained, or should each voice
service provider instead maintain its own list? If centrally, what
entity should maintain the list and how should voice service providers
access the list? Does the Commission's proposal capture the most
important numbers to avoid blocking?
13. The Commission also seeks comment on limiting Critical Calls
List protections to only those calls for which the Caller ID is
authenticated. Does this provide protection against illegal callers
spoofing these crucial numbers? The Commission seeks comment on whether
voice service providers should be required to complete calls where any
level of attestation is present so long as the Caller ID authenticates,
or whether the Commission should limit this requirement.
14. How can the Commission ensure that a Critical Calls List is
sufficiently protected from abuse by unscrupulous callers? Should the
list be kept non-public to avoid unlawful spoofing of listed numbers?
The Commission seeks comment on whether there are any benefits to
making the list public that outweigh these risks. If not public, who
should be able to access it? The Commission invites comment on any
other critical details. The Commission further seeks comment on the
associated costs and benefits of implementing such a Critical Calls
List.
15. Calls Placed to 911. The Commission see no reason that the rule
prohibiting blocking of calls to 911 should not apply to the blocking
proposed herein. The Commission seeks comment on the extent to which
PSAPs have received calls with a spoofed Caller ID reporting a false
emergency.
16. The Commission seeks comment on other ways to protect callers
from erroneous blocking. Should the Commission consider other bases for
blocking unwanted, illegal calls?
Mandating Caller ID Authentication
17. If major voice service providers fail to meet an end of 2019
deadline for voluntary implementation of the SHAKEN/STIR Caller ID
authentication framework, the Commission proposes to require them to
implement that framework. The Commission seeks comment on this
proposal.
18. Implementation of the SHAKEN/STIR framework across voice
networks is important in the fight against unwanted, including illegal,
robocalls. Should major voice service providers fail to meet this end-
of-year deadline, the Commission proposes to take appropriate
regulatory action to ensure that voice service providers implement
SHAKEN/STIR. If major voice service providers meet the end-of-year
deadline, what steps should the Commission take to ensure that other
voice service providers implement SHAKEN/STIR?
19. Determining whether it is necessary to mandate implementation
of SHAKEN/STIR. The Commission seeks comment on how best to define
``major voice service providers'' for the purpose of evaluating the
progress made by such providers in implementing SHAKEN/STIR by the end
of this year.
20. The Commission seeks comment on how best to evaluate whether
major voice service providers have met the end of year deadline for
implementation set by Chairman Pai. In discussing SHAKEN/STIR,
providers often refer to signing calls on an intercarrier basis and
using signature information they receive to enhance the consumer
experience. Should this be the standard the Commission uses to measure
implementation? The Commission invites comment on this approach and on
specific alternatives. Should the Commission require certifications
documenting compliance?
21. Voice service providers covered by the SHAKEN/STIR
implementation requirement. If the Commission mandates provider
implementation of SHAKEN/STIR, the Commission proposes to require
implementation by all voice service providers--wireline, wireless, and
Voice over internet Protocol (VoIP) providers. The Commission seeks
comment on this proposal. Are there other voice service providers the
Commission should include? Are there any exceptions to an
implementation requirement?
22. Implementation. If the Commission mandates implementation of
SHAKEN/STIR, what should the Commission require providers to accomplish
to meet the requirement? Should it require providers to sign calls on
an intercarrier basis and use signature information they receive to
enhance the consumer experience? Should the Commission impose other or
different requirements?
23. For example, if the Commission mandates SHAKEN/STIR
implementation, should the Commission require providers to adopt a
uniform display showing consumers whether a call has been
authenticated? Or should the Commission encourage provider
experimentation to develop the most useful display for consumers?
24. Timing of the requirement. If the Commission mandates
implementation of SHAKEN/STIR, how much implementation time should the
Commission give voice service providers? The Commission invites
commenters to propose specific categories of voice service providers,
[[Page 29481]]
specify how the Commission should distinguish between or among them,
explain why the Commission should do so for purposes of setting
implementation deadlines, and propose specific implementation deadlines
for each proposed specific category of voice service providers.
25. Governance. What role should the Commission have in SHAKEN/STIR
governance? Industry has taken steps to establish a governance regime.
Are there aspects of the governance authority that the Commission
should handle itself or should its role be formal oversight? Are there
other functions that the Commission should undertake to ensure the
adoption and implementation of SHAKEN/STIR?
26. Legacy Networks. The Commission recognizes that there are
challenges for smaller and rural carriers. The Commission seeks comment
on how to encourage Caller ID authentication for carriers that maintain
some portion of their network on legacy technology. Are there
technologies available to enable legacy networks to participate in
Caller ID authentication?
27. Illegal calls originating outside the United States. The
Commission seeks comment on how the Commission and the industry can
best leverage Caller ID authentication technology and specifically
SHAKEN/STIR to combat illegal calls originating outside the United
States.
Measuring the Effectiveness of Robocall Solutions
28. Should the Commission create a mechanism to provide information
to consumers about the effectiveness of providers' robocall solutions?
If so, how should ``effectiveness'' be defined? How would the
Commission obtain the information needed to evaluate the effectiveness
of the robocall solutions?
Legal Authority
29. The Commission seeks comment on its authority to adopt new
rules here. Sections 201(b) and 202(a) of the Communications Act (the
Act) have formed the basis for the Commission's traditional
prohibitions on call blocking. The Commission also is charged with
prescribing regulations to implement the Truth in Caller ID Act, which
made unlawful the spoofing of Caller ID ``in connection with any
telecommunications service or IP-enabled voice service . . . with the
intent to defraud, cause harm, or wrongfully obtain anything of value .
. . .'' And section 251(e) of the Act gives the Commission authority
over the use and allocation of numbering resources in the United
States, including the use of unallocated and unused numbers.
30. The Commission seeks comment on whether these statutory
provisions--or any others--confer on the Commission sufficient
authority to adopt rules to create a safe harbor for certain call-
blocking programs and require voice service providers that offer call-
blocking programs to maintain a Critical Calls List. Is creating a safe
harbor equivalent to declaring certain practices presumptively just and
reasonable? Is encouraging providers to adopt SHAKEN/STIR consistent
with the Commission's authority under the Truth in Caller ID Act? Does
the Commission's plenary authority over numbering extend to requiring
that calls from certain numbers be sacrosanct? Does the Commission's
authority depend, in part or at all, on whether the calls considered in
a call-blocking program are in fact illegal under federal law or merely
unwanted by consumers? Are these proposals necessary to allow voice
service providers to help prevent unlawful acts and protect voice
service subscribers? Would any of these proposals be limited only to
calls purporting to use North American Numbering Plan (NANP) numbers?
31. The Commission believes section 251(e) of the Act, which grants
the Commission plenary jurisdiction over the NANP resources in the
United States and the authority to administer numbering resources,
provides the Commission the authority to mandate Caller ID
authentication and specifically SHAKEN/STIR. By permitting voice
providers and consumers to identify when a Caller ID number has been
spoofed, mandating SHAKEN/STIR would prevent NANP resources from being
fraudulently exploited. The Commission concludes that section 251(e)
provides it sufficient authority to adopt such rules. Do commenters
agree? Are there any other statutory provisions or other sources of
authority the Commission should consider?
Initial Regulatory Flexibility Analysis
32. As required by the Regulatory Flexibility Act of 1980, as
amended, the Commission has prepared the Initial Regulatory Flexibility
Analysis (IRFA) of the possible significant economic impact on a
substantial number of small entities by the policies and rules proposed
in the TFNPRM. Written public comments are requested on the IRFA.
Comments must be identified as responses to the IRFA and must be filed
by the deadlines for comments on the TFNPRM provided.
33. Need for, and Objectives of, the Proposed Rules
The TFNPRM proposes rules to permit voice service providers, on
their own initiative, to block calls based on Caller ID authentication,
specifically where the Caller ID is eligible for authentication but
fails. The TFNPRM also proposes to require a ``Critical Calls List'' of
numbers that must never be blocked so long as the Caller ID is
authenticated. The TFNPRM further proposes and seeks comment on
requiring voice service providers to implement the SHAKEN/STIR call
authentication framework if major voice service providers fail to
voluntarily implement it by the end of 2019.
Legal Basis
34. The proposed and anticipated rules are authorized under
sections 201, 202, 227, 251(e), and 403 of the Act, as amended, 47
U.S.C. 201, 202, 227, 251(e), 403.
Description of Projected Reporting, Recordkeeping, and Other Compliance
Requirements
35. As indicated above, the TFNPRM seeks comment on proposed rules
to codify that voice service providers may block telephone calls in
certain circumstances to protect subscribers from illegal calls, as
well as on proposed rules to prevent the blocking of lawful calls.
Until these requirements are defined in full, it is not possible to
predict with certainty whether the costs of compliance will be
proportional between small and large voice service providers. In the
TRNPRM, the Commission seeks to minimize the burden associated with
reporting, recordkeeping, and other compliance requirements for the
proposed rules, such as modifying software, developing procedures, and
training staff.
36. Under the proposed rules, the Commission tentatively concludes
that voice service providers will need to keep records of Caller ID
authentication information. In addition, voice service providers may
need to set up communication with other voice service providers to
share information about failed authentication. Voice service providers
will also be required to maintain a ``Critical Calls List'' of numbers
that should not be blocked.
37. The TFNPRM also proposes to require voice service providers to
implement SHAKEN/STIR if major voice service providers have not
voluntarily implemented the framework by the end of 2019. At this time,
the Commission is not in a position to determine whether, if adopted,
the Commission's proposals will require small entities to hire
attorneys, engineers, consultants, or other
[[Page 29482]]
professionals and cannot quantify the cost of compliance with the
potential rule changes discussed herein. The TFNPRM proposes to require
implementation by all voice service providers--wireline, wireless, and
VoIP providers.
Steps Taken To Minimize Significant Economic Impact on Small Entities,
and Significant Alternatives Considered
38. These proposed rules to codify that voice service providers may
block telephone calls in certain circumstances to protect subscribers
from illegal and unwanted calls are permissive and not mandatory. Small
businesses may avoid compliance costs entirely by declining to block
calls, or may delay their implementation of call blocking to allow for
more time to come into compliance with the rules. However, the
Commission intends to craft rules that encourage all carriers,
including small businesses, to block such calls and the TFNPRM
therefore seeks comment from small businesses on how to minimize costs
associated with implementing the proposed rules. The TFNPRM poses
specific requests for comment from small businesses regarding how the
proposed rules affect them and what could be done to minimize any
disproportionate impact on small businesses.
39. The Commission's proposed rules allow voice service providers
to block calls based on certain criteria, including where the Caller ID
fails authentication. In addition, the proposed rules protect callers
from the risk of their calls being blocked erroneously. The TFNPRM
requests feedback from small businesses and seeks comment on ways to
make the proposed rules less costly and minimize the economic impact of
the Commission's proposals.
40. The TFNPRM also seeks comment on the length of time the
Commission should allow voice service providers to implement SHAKEN/
STIR, whether smaller and medium-sized voice providers should be given
additional time to implement this framework, and how to qualify and
quantify voice providers' sizes. Moreover, the Commission seeks updated
information for entities of all sizes, including small entities,
regarding the upfront and recurring costs to providers of implementing
SHAKEN/STIR.
41. The Commission expects to consider the economic impact on small
entities, as identified in comments filed in response to the TFNPRM and
the IRFA, in reaching its final conclusions and taking action in this
proceeding.
Federal Rules That May Duplicate, Overlap, or Conflict With the
Proposed Rules
42. None.
List of Subjects in 47 CFR Part 64
Communications common carriers, Reporting and recordkeeping
requirements, Telecommunications, Telephone.
Federal Communications Commission.
Cecilia Sigmund,
Federal Register Liaison Officer, Office of the Secretary.
Proposed Rules
For the reasons discussed in the preamble, the Federal
Communications Commission proposes to amend 47 part 64 as follows:
PART 64--MISCELLANEOUS RULES RELATING TO COMMON CARRIERS
0
1. The authority citation for part 64 continues to read as follows:
Authority: 47 U.S.C. 154, 201, 202, 217 218, 220, 222, 225,
226, 227, 228, 251(a), 251(e), 254(k), 262, 403(b)(2)(B), (c), 616,
620, 1401-1473, unless otherwise noted.
0
2. Amend Sec. 64.1200 by
0
a. Redesignating paragraph (k)(2) as paragraph (k)(5);
0
b. Redesignating paragraph (k)(4) as paragraph (k)(2);
0
c. Redesignating paragraph (k)(1) as paragraph (k)(4);
0
d. Redesignating paragraph (k)(3) as paragraph (k)(1); and
0
e. Adding new paragraphs (k)(3) and (k)(6).
The additions to read as follows:
Sec. 64.1200 Delivery restrictions
* * * * *
(k) * * *
(3) Any provider blocking pursuant to this subsection must maintain
a list of numbers from which calls will not be blocked where the Caller
ID is authenticated on a call purporting to originate from the number.
Providers must include on their lists only numbers used for outbound
calls by Public Safety Answering Points or other emergency services;
government-originated calls, such as calls from local authorities
generated during emergencies; and outbound calls from schools and
similar educational institutions to provide school-related emergency
notifications, such as weather-related closures or the existence of an
emergency affecting the school or students.
* * * * *
(6) A provider may block a call that is eligible for authentication
of Caller ID and for which authentication by the terminating provider
has failed.
* * * * *
[FR Doc. 2019-13320 Filed 6-21-19; 8:45 am]
BILLING CODE 6712-01-P