Data Breach Reporting Requirements, 3953-3965 [2023-00824]

Download as PDF Federal Register / Vol. 88, No. 14 / Monday, January 23, 2023 / Proposed Rules [FR Doc. 2023–00685 Filed 1–20–23; 8:45 am] BILLING CODE 6560–50–P FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 64 [WC Docket No. 22–21; FCC 22–102; FR 122866] Data Breach Reporting Requirements Federal Communications Commission. ACTION: Proposed rule. AGENCY: In this document, the Federal Communications Commission (Commission) begins the process to update and strengthen its data breach rule to provide greater protections to the public. We propose to expand the Commission’s definition of ‘‘breach’’ to include inadvertent disclosures of customer information and seek comment on adopting a harm-based trigger for breach notifications. We also propose to require carriers to notify the Commission, in addition to the Secret Service and FBI, as soon as practicable after discovery of a breach. We also propose to eliminate the mandatory waiting period before notifying customers and instead require carriers to notify customers of CPNI breaches without unreasonable delay after discovery of a breach unless requested by law enforcement. We also propose to make changes to our TRS data breach reporting rule consistent with those we propose to our CPNI breach reporting rule. DATES: Comments are due on or before February 22, 2023, and reply comments are due on or before March 24, 2023. Written comments on the Paperwork Reduction Act proposed information collection requirements must be submitted by the public, Office of Management and Budget (OMB), and other interested parties on or before March 24, 2023. ADDRESSES: You may submit comments, identified by WC Docket No. 22–21, by any of the following methods: D Federal Communications Commission’s Website: https:// apps.fcc.gov/ecfs/. Follow the instructions for submitting comments. D People with Disabilities: Contact the FCC to request reasonable accommodations (accessible format documents, sign language interpreters, CART, etc.) by email: FCC504@fcc.gov or phone: 202–418–0530 or TTY: 202– 418–0432. For detailed instructions for submitting comments and additional khammond on DSKJM1Z7X2PROD with PROPOSALS SUMMARY: VerDate Sep<11>2014 15:57 Jan 20, 2023 Jkt 259001 information on the rulemaking process, see the SUPPLEMENTARY INFORMATION section of this document. In addition to filing comments with the Secretary, a copy of any comments on the Paperwork Reduction Act proposed information collection requirements contained herein should be submitted to the Federal Communications Commission via email to PRA@fcc.gov and to Nicole On’gele, FCC, via email to Nicole.Ongele@fcc.gov. FOR FURTHER INFORMATION CONTACT: Melissa Kirkel, Competition Policy Division, Wireline Competition Bureau, at (202) 418–7958, melissa.kirkel@ fcc.gov. For additional information concerning the Paperwork Reduction Act information collection requirements contained in this document, send an email to PRA@fcc.gov or contact Nicole On’gele at (202) 418–2991. SUPPLEMENTARY INFORMATION: This is a summary of the Commission’s Notice of Proposed Rulemaking in WC Docket No. 22–21, adopted on December 29, 2022 and released on January 6, 2023. The full text of this document is available at https://docs.fcc.gov/public/ attachments/FCC-22-102A1.pdf. To request materials in accessible formats for people with disabilities (e.g., Braille, large print, electronic files, audio format, etc.) or to request reasonable accommodations (e.g., accessible format documents, sign language interpreters, CART, etc.), send an email to fcc504@ fcc.gov or call the Consumer & Governmental Affairs Bureau at (202) 418–0530. Pursuant to Sections 1.415 and 1.419 of the Commission’s rules, 47 CFR 1.415, 1.419, interested parties may file comments and reply comments on or before the dates indicated on the first page of this document. Comments may be filed using the Commission’s Electronic Comment Filing System (ECFS). See Electronic Filing of Documents in Rulemaking Proceedings, 63 FR 24121 (1998). • Electronic Filers: Comments may be filed electronically using the internet by accessing the ECFS: https:// apps.fcc.gov/ecfs/. • Paper Filers: Parties who choose to file by paper must file an original and one copy of each filing. • Filings can be sent by commercial overnight courier, or by first-class or overnight U.S. Postal Service mail. All filings must be addressed to the Commission’s Secretary, Office of the Secretary, Federal Communications Commission. • Commercial overnight mail (other than U.S. Postal Service Express Mail and Priority Mail) must be sent to 9050 PO 00000 Frm 00022 Fmt 4702 Sfmt 4702 3953 Junction Drive, Annapolis Junction, MD 20701. U.S. Postal Service first-class, Express, and Priority mail must be addressed to 45 L Street NE, Washington, DC 20554. • Effective March 19, 2020, and until further notice, the Commission no longer accepts any hand or messenger delivered filings. This is a temporary measure taken to help protect the health and safety of individuals, and to mitigate the transmission of COVID–19. See FCC Announces Closure of FCC Headquarters Open Window and Change in Hand-Delivery Policy, Public Notice, DA 20–304 (March 19, 2020). https://www.fcc.gov/document/fcccloses-headquarters-open-window-andchanges-hand-delivery-policy. The proceeding this document initiates shall be treated as a ‘‘permitbut-disclose’’ proceeding in accordance with the Commission’s ex parte rules. Persons making ex parte presentations must file a copy of any written presentation or a memorandum summarizing any oral presentation within two business days after the presentation (unless a different deadline applicable to the Sunshine period applies). Persons making oral ex parte presentations are reminded that memoranda summarizing the presentation must (1) list all persons attending or otherwise participating in the meeting at which the ex parte presentation was made, and (2) summarize all data presented and arguments made during the presentation. If the presentation consisted in whole or in part of the presentation of data or arguments already reflected in the presenter’s written comments, memoranda or other filings in the proceeding, the presenter may provide citations to such data or arguments in his or her prior comments, memoranda, or other filings (specifying the relevant page and/or paragraph numbers where such data or arguments can be found) in lieu of summarizing them in the memorandum. Documents shown or given to Commission staff during ex parte meetings are deemed to be written ex parte presentations and must be filed consistent with rule 1.1206(b). In proceedings governed by rule 1.49(f) or for which the Commission has made available a method of electronic filing, written ex parte presentations and memoranda summarizing oral ex parte presentations, and all attachments thereto, must be filed through the electronic comment filing system available for that proceeding, and must be filed in their native format (e.g., .doc, .xml, .ppt, searchable .pdf). Participants in this proceeding should familiarize E:\FR\FM\23JAP1.SGM 23JAP1 3954 Federal Register / Vol. 88, No. 14 / Monday, January 23, 2023 / Proposed Rules themselves with the Commission’s ex parte rules. This document contains proposed information collection requirements. The Commission, as part of its continuing effort to reduce paperwork burdens, invites the general public and the Office of Management and Budget (OMB) to comment on the information collection requirements contained in this document, as required by the Paperwork Reduction Act of 1995, Public Law 104–13. Public and agency comments are due March 24, 2023. Comments should address: (a) whether the proposed collection of information is necessary for the proper performance of the functions of the Commission, including whether the information shall have practical utility; (b) the accuracy of the Commission’s burden estimates; (c) ways to enhance the quality, utility, and clarity of the information collected; (d) ways to minimize the burden of the collection of information on the respondents, including the use of automated collection techniques or other forms of information technology; and (e) way to further reduce the information collection burden on small business concerns with fewer than 25 employees. In addition, pursuant to the Small Business Paperwork Relief Act of 2002, Public Law 107–198, see 44 U.S.C. 3506(c)(4), we seek specific comment on how we might further reduce the information collection burden for small business concerns with fewer than 25 employees. Synopsis khammond on DSKJM1Z7X2PROD with PROPOSALS I. Notice of Proposed Rulemaking 1. To better protect telecommunications customers and ensure that our rules keep pace with today’s challenges, we propose a number of updates to our rule addressing telecommunications carriers’ breach notification duties. We seek to ensure that affected customers, the Commission, and other federal law enforcement agencies receive the information they need in a timely manner so they can mitigate and prevent harm due to the breach and take action to deter future breaches. To identify best practices and to minimize burdens, we look to other federal and state breach laws as potential models for our rules. 2. We propose to expand the Commission’s definition of ‘‘breach’’ to include inadvertent disclosures of customer information and seek comment on adopting a harm-based trigger for breach notifications. We also propose to require carriers to notify the VerDate Sep<11>2014 15:57 Jan 20, 2023 Jkt 259001 Commission, in addition to the Secret Service and FBI, as soon as practicable after discovery of a breach. We also propose to eliminate the mandatory waiting period before notifying customers and instead require carriers to notify customers of CPNI breaches without unreasonable delay after discovery of a breach unless requested by law enforcement. We also seek comment on whether we should adopt minimum requirements for the content of customer breach notices. We also evaluate and seek comment on the impact of the Congressional disapproval of the 2016 Privacy Order on the Commission’s legal authority to issue the rules proposed herein for telecommunications carriers. Finally, we propose to make changes to our TRS data breach reporting rule consistent with those we propose to our CPNI breach reporting rule. A. Defining ‘‘Breach’’ 3. Inadvertent Disclosures. We propose to expand the Commission’s definition of ‘‘breach’’ to include inadvertent access, use, or disclosures of customer information and seek comment on our proposal. Our current rule, adopted in response to the practice of pretexting, defines a ‘‘breach’’ as ‘‘when a person, without authorization or exceeding authorization, has intentionally gained access to, used, or disclosed CPNI.’’ While the practice of pretexting necessarily involves an intent to gain access to customer information, the intervening years since the adoption of our existing rule have demonstrated that the inadvertent exposure of customer information can result in the loss and misuse of sensitive information by scammers and phishers, and trigger a need to inform the affected individuals so that they can take appropriate steps to protect themselves and their information. Further, whether or not a breach was intentional may not always be immediately apparent, which may lead to legal ambiguity and underreporting. We also believe that it is important that the Commission and law enforcement be made aware of any accidental access, use, or disclosures so that we can (1) investigate and advise carriers on how best to avoid future breaches, and (2) stand ready to investigate if and when any of the affected information falls prey to malicious actors. We anticipate that requiring notification for accidental breaches will encourage telecommunications carriers to adopt stronger data security practices and will help us identify and confront systemic network vulnerabilities. Do commenters agree with the foregoing analysis? Are PO 00000 Frm 00023 Fmt 4702 Sfmt 4702 there other policy factors the Commission should consider in determining whether to require disclosure for unintentional breaches? What are the benefits and burdens associated with this proposal? We note that state data breach laws overwhelmingly do not include an intent limitation, and we seek comment on how state and other federal data breach laws should influence the policy we adopt. 4. We seek comment on the impact of requiring reporting of accidental breaches on the number of reported breaches. Do commenters foresee a significant increase in the number of reported breaches? If so, how would our proposal affect reporting costs for telecommunications carriers and is that burden outweighed by the benefits to customers, who may need to take actions to protect their personal and financial information whether or not the breach was intentional? Would removing the intentionality limit potentially risk over-notification of data breaches to customers? What would the impacts of over-notification be? Would the potential benefits outweigh any potential harm? To help us assess the burden to both carriers and consumers from requiring reporting of accidental breaches, we invite commenters to provide estimates on the total number of breaches they have detected over the past few years, as well as the number of people affected by those breaches, and the severity of the compromised CPNI. 5. We propose to revise our definition to define a breach as any instance in which a person, without authorization or exceeding authorization, has gained access to, used, or disclosed CPNI. We seek comment on this proposal and other possible definitions. Should we retain the intent limitation in certain contexts? If so, what contexts and why? With only a few exceptions, the vast majority of state statutes include a provision exempting from the definition of breach a good-faith acquisition of covered data by an employee or agent of the company where such information is not used improperly or further disclosed. Should we include such an exemption in our definition of ‘‘breach’’ or is such a provision unnecessary or otherwise inadvisable? Is our proposed rule sufficient to capture all instances in which persons, either purposefully or inadvertently, gain access to, use, or disclose CPNI? If not, how should we revise our proposed rule to ensure that it does? We also seek comment on whether we should expand the definition of a breach to include situations where a telecommunications carrier or a third party discovers E:\FR\FM\23JAP1.SGM 23JAP1 khammond on DSKJM1Z7X2PROD with PROPOSALS Federal Register / Vol. 88, No. 14 / Monday, January 23, 2023 / Proposed Rules conduct that could have reasonably led to exposure of customer CPNI, even if it has not yet determined if such exposure occurred. 6. Harm-Based Notification Trigger. We seek comment on whether to forego requiring notification to customers or law enforcement of a breach in those instances where a telecommunications carrier can reasonably determine that no harm to customers is reasonably likely to occur as a result of the breach. Our current rule requires no showing of harm, instead requiring that notification be furnished in every instance where a breach of a carrier’s customers’ CPNI has occurred, where such breach is defined as any instance when ‘‘a person, without authorization or exceeding authorization, has intentionally gained access to, used, or disclosed CPNI.’’ 7. We seek comment on the benefits and drawbacks of adopting a ‘‘harmbased’’ notification trigger. How would it impact consumers? Would it benefit consumers by avoiding confusion and ‘‘notice fatigue’’ with respect to breaches that are unlikely to cause harm? Recognizing that it is not only distressing, but time consuming and expensive, to deal with the fallout of a data breach, we seek comment on whether a harm-based notification trigger could save consumers the time, effort, and financial difficulty of changing their passwords, purchasing fraud alerts or credit monitoring, and freezing their credit in the wake of a breach that is not reasonably likely to result in harm. Alternatively, does a harm-based notification trigger risk that consumers would be unaware of important information regarding their CPNI? We note that a harm-based trigger has a basis in data breach notification frameworks employed by states, which generally do not require covered entities to notify customers of breaches when a determination is made that the breach is unlikely to cause harm. How should state and other data breach laws influence our analysis? 8. We also seek comment on the potential impacts of adopting a harmbased trigger on telecommunications carriers. Would a harm-based trigger allow carriers to better focus their resources on data security and ameliorating the harms caused by data breaches? Or to the contrary, would a harm-based trigger require carriers to unnecessarily expend resources determining whether particular breaches are reasonably likely to cause harm instead of more efficiently providing notice? 9. If we adopt a harm-based trigger, how should telecommunications carriers and the Commission determine VerDate Sep<11>2014 15:57 Jan 20, 2023 Jkt 259001 the likelihood of misuse or harm? Should we identify a standard or set of factors that telecommunications carriers must consider to evaluate whether no harm to customers is reasonably likely? If so, what factors should carriers consider in making their evaluation? We preliminarily believe that no single factor on its own (e.g., basic encryption) is sufficient to make a determination regarding harm to customers. Do commenters agree? Do carriers have sufficient expertise and experience to determine whether a breach is likely to result in harm? Should we establish a rebuttable presumption of consumer harm unless and until a carrier demonstrates that no harm to consumers is reasonably likely to occur as a result of a breach? 10. We seek comment on whether we should clarify the definition of ‘‘misuse’’ or ‘‘harm.’’ For example, should we construe ‘‘harm’’ broadly to encompass not only financial, but also physical and emotional harm, including reputational damage, personal embarrassment, and loss of control over the exposure of intimate personal details? Should we require telecommunications carriers to consider whether other information about the customers that may be available combined with CPNI could result in harm when determining whether notification is required? Should any harm-based trigger apply even where the data breached is encrypted? What are the potential enforcement and compliance implications associated with this approach? Should breaches without such ‘‘harm’’ be reported to the Commission even if not reported to customers? Should we require the carrier to consult with federal law enforcement and/or the Commission prior to determining that there is no reasonable likelihood of harm or misuse? We seek comment on whether there are other triggers we should consider for which notice would be unnecessary, such as the number of affected consumers or the length of time exposure occurred. Are there other factors that we should consider before requiring breach notifications? Should we adopt a harm-based trigger only if we require notices of unintentional breaches, or should we evaluate the two issues independently? We also seek comment on the current notification practices in the industry. How do carriers currently make decisions regarding whether to notify customers and law enforcement of a breach? 11. We seek comment on whether any harm-based notification trigger should apply to both notifications to customers and notifications to law enforcement. PO 00000 Frm 00024 Fmt 4702 Sfmt 4702 3955 While there are legitimate reasons to consider eliminating notifications to customers in those instances where a breach is not reasonably likely to result in harm—including reducing confusion, stress, financial hardship, and notice fatigue—can the same be said of notifications to law enforcement? Are there compelling reasons for carriers to continue notifying law enforcement of data breaches even where such breaches are not reasonably likely to result in consumer harm? Do the benefits of notifying law enforcement of all breaches, regardless of whether the breach is likely to result in harm, outweigh the attendant costs to carriers of providing such notice? 12. We propose that if we adopt a harm-based trigger, where a carrier is unable to make a determination regarding harm or is uncertain whether harm is likely to occur, the obligation to notify would remain. We seek comment on this proposal. 13. We also recognize that telecommunications carriers possess proprietary information other than CPNI that customers have an interest in protecting from public exposure, such as Social Security Numbers and financial records. We seek comment on the Commission’s authority to establish breach-reporting obligations for this type of information under Section 222, to the extent that this information is obtained by a telecommunications carrier in its activity as a common carrier. We also seek comment on the role of the Commission in protecting such information in light of the existing role of other agencies, including the FTC and Cybersecurity and Infrastructure Security Agency (CISA). If we were to require telecommunications carriers to report breaches of proprietary information other than CPNI under Section 222(a), how broadly or narrowly should we define that category of information? If we were to extend our data breach rule to cover such information, how could we minimize duplicative reporting obligations from the FTC and CISA? B. Notifying the Commission and Other Federal Law Enforcement of Data Breaches 14. Commission Notification. We propose to require telecommunications carriers to notify the Commission of breaches, in addition to the Secret Service and FBI, as soon as practicable, and seek comment on our proposal. Our proposal is consistent with other federal sector-specific laws, which require prompt notification to the relevant subject-matter agency. For example, both HIPAA and the Health Breach E:\FR\FM\23JAP1.SGM 23JAP1 khammond on DSKJM1Z7X2PROD with PROPOSALS 3956 Federal Register / Vol. 88, No. 14 / Monday, January 23, 2023 / Proposed Rules Notification Rule require notice to the department of Health and Human Services (HHS) and the FTC respectively. We seek comment on the benefits and costs of requiring notification to the Commission in addition to notifying the Secret Service and the FBI, as our existing rules require. 15. As discussed above, the Commission adopted its existing data breach rule to address concerns regarding pretexting practices. The Commission found that notifying law enforcement of CPNI breaches is consistent with the goal of protecting CPNI because it enables law enforcement to investigate the breach, ‘‘which could result in legal action against the perpetrators, thus ensuring that they do not continue to breach CPNI.’’ Moreover, the Commission anticipated that law enforcement investigations into how breaches occurred would enable law enforcement to advise the carrier and the Commission to take steps to prevent future breaches of that kind. However, as we have seen in the years since our data breach rule was initially adopted, not all breaches of customer data are the result of criminal pretexting, which was Commission’s sole focus in 2007. Largescale security breaches can also be the result of lax or inadequate data security practices and employee training. Thus, we tentatively conclude that notification of breaches will provide Commission staff important information about data security vulnerabilities that Commission staff can help address and remediate. We anticipate that breach notification to the Commission will also shed light on carriers’ ongoing compliance with our rules. We seek comment on these tentative conclusions. How much of an incremental burden is associated with notifying the Commission of data breaches as compared to the existing data breach notification requirement for the Secret Service and FBI? Are there any other government entities to which we should require data breach reporting, such as the FTC? What would be the benefits and burdens of doing so? 16. Method of Notification. We propose that the Commission create and maintain a centralized portal for reporting breaches to the Commission and other federal law enforcement agencies, and we seek comment on our proposal. Our current breach notification rule requires that telecommunications carriers notify the FBI and Secret Service ‘‘through a central reporting facility’’ to which the Commission maintains a link on its website. We believe that the creation and operation by the Commission of a VerDate Sep<11>2014 15:57 Jan 20, 2023 Jkt 259001 centralized reporting facility for reporting of breaches to the Commission, Secret Service, and FBI will streamline the notification process and improve federal coordination. Do commenters agree? Are there alternative mechanisms for breach reporting to the Commission and other federal law enforcement that we should consider instead, such as leveraging the existing central reporting facility? Are there existing notification resources that we can leverage? For example, could we leverage the CISA Incident Reporting System to minimize burdens on carriers? 17. We seek comment on how we can minimize data breach reporting burdens for telecommunications carriers. The recently-passed Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) requires covered entities to notify CISA of cyber security incidents and establishes an interagency Cyber Incident Reporting Council intended to streamline interagency cyber incident reporting. When implemented, CIRCIA will require covered entities to report cybersecurity incidents to CISA, except where covered entities ‘‘by law, regulation, or contract’’ are already required to report ‘‘substantially similar information to another Federal agency within a substantially similar timeframe,’’ in which case the other agency will report the incident to CISA. To the extent that a breach of CPNI is a result of a cyber incident, we seek comment on whether there are any modifications to our proposed rules that would minimize potential duplicate reporting of such breaches. 18. Contents. We seek comment on applying our existing requirements regarding the contents of the data breach notification to federal law enforcement agencies to breaches reported to the Commission. Generally, the central reporting facility requires carriers to report information relevant to the breach, including carrier contact information; a description of the breach incident; the method of compromise; the date range of the incident, approximate number of customers affected; an estimate of financial loss to the carriers and customers, if any; types of data breached; and the addresses of affected customers. We believe that the information currently submitted through the FBI/Secret Service reporting facility is largely sufficient, and that generally the same information should be reported under the rule we propose here. Do commenters agree? Are there any additional or alternative categories of information that should be included in these disclosures? For example, PO 00000 Frm 00025 Fmt 4702 Sfmt 4702 should we require telecommunications carriers to report, at a minimum, the information required under CIRCIA with the aim of minimizing potentially duplicate reporting requirements? Should we curtail or streamline any of the existing content requirements? For example, should we eliminate the requirement that carriers report the addresses of affected individuals to law enforcement and the Commission, to minimize the personal information reported to the Commission and law enforcement? 19. Timeframe. We seek comment on the appropriate timeframe for notifying the Commission and other federal law enforcement of a breach. Our current rule requires telecommunications carriers to notify the Secret Service and the FBI of all breaches of CPNI no later than seven business days after reasonable determination of the breach. We propose to require carriers to notify the Commission of a reportable breach contemporaneously with notification to other law enforcement agencies as soon as practicable after discovery of a breach. We believe that requiring carriers to notify the Commission, Secret Service, and FBI at the same time will minimize burdens on carriers, eliminate confusion regarding obligations, and streamline the reporting process, allowing carriers to free up resources that can be used to address the breach and prevent further harm. We seek comment on our proposal. Is ‘‘as soon as practicable after discovery of a breach’’ an appropriate timeframe for notifying law enforcement after reasonable determination of a CPNI breach? Or, should we maintain the current ‘‘no later than seven business days’’ standard? Is there an alternative timeframe we should adopt for reporting CPNI breaches to the Commission and other federal law enforcement such as 24 hours or 72 hours as has been proposed in other contexts, or should we consider adopting a graduated timeframe? We also seek comment on whether we should clarify when a carrier should be treated as having ‘‘reasonably determined’’ that a breach has occurred. Should a carrier be held to have ‘‘reasonably determined’’ a breach has occurred when it has information indicating that it is more likely than not that there was a breach? Should we publish guidance on what constitutes a reasonable determination? Should we adopt a more definite standard? 20. Threshold Trigger. We seek comment on whether it is appropriate to set a threshold for the number of customers affected to require a breach report to the Commission, Secret E:\FR\FM\23JAP1.SGM 23JAP1 khammond on DSKJM1Z7X2PROD with PROPOSALS Federal Register / Vol. 88, No. 14 / Monday, January 23, 2023 / Proposed Rules Service, and/or FBI. We observe that breaches affecting smaller numbers of customers may not necessitate the same law enforcement attention as larger breaches because they may be less likely to reflect coordinated attacks on CPNI. Under our current rule, telecommunications carriers must notify federal law enforcement of all reportable breaches, regardless of the number of customers affected. Setting a threshold for the number of customers affected for breach reporting to the Secret Service and FBI could reduce the administrative burdens on carriers and law enforcement agencies from excessive reporting, and is consistent with many state statutes requiring notice to state law enforcement authorities, which require law enforcement notification of large breaches. 21. At the same time, establishing a threshold may limit our and our federal partners’ abilities to remediate, investigate, and deter smaller breaches. Further, as the Commission has previously found, notification of all breaches could allow the Commission and federal law enforcement to be ‘‘better positioned than individual carriers to develop expertise about the methods and motives associated with CPNI breaches.’’ Is this still the case, given the development of data breach law and practices since 2007? Should we adopt a threshold for reporting to federal law enforcement? If so, should the threshold be the same for the Commission as for federal law enforcement? If not, how should the threshold differ? What would be an appropriate threshold for reporting? Most states that adopt a threshold for reporting to law enforcement or government agencies require reporting at 250, 500, or 1000 individuals affected. What reporting threshold would meet the needs of law enforcement and provide adequate safeguards? What are the benefits and drawbacks of setting a threshold, particularly for small carriers? If we adopt a threshold trigger, should we require carriers to maintain a record of smaller breaches that fall below the threshold and report such small breaches to the Commission in a report at the end of the year? What are the benefits and drawbacks to such an approach? Rather than a numerical threshold, should we instead consider requiring carriers to report only intentional breaches to law enforcement, but to report all breaches, whether intentional or inadvertent, to the Commission? VerDate Sep<11>2014 15:57 Jan 20, 2023 Jkt 259001 C. Customer Notification 22. Notifying Customers of Data Breaches without Unreasonable Delay. We propose to require telecommunications carriers to notify customers of CPNI breaches without unreasonable delay after discovery of a breach and notification to law enforcement, unless law enforcement requests a delay. We seek comment on our proposal. Our existing data breach rule prohibits telecommunications carriers from notifying customers or disclosing the breach to the public until at least seven full business days after notification to the Secret Service and FBI. In cases where a carrier believes that there is an extraordinarily urgent need to notify affected customers in order to avoid immediate and irreparable harm, our rules permit carriers to notify affected customers after consultation with relevant investigating agencies. In adopting the existing rule, the Commission concluded that once customers have been notified, a breach may become public knowledge, ‘‘thereby impeding law enforcement’s ability to investigate the breach, identify the perpetrators, and determine how the breach occurred.’’ In short, the Commission found, ‘‘immediate customer notification may compromise all the benefits of requiring carriers to notify law enforcement of CPNI breaches,’’ and therefore a short delay was warranted. 23. We tentatively conclude that this existing approach is out-of-step with current approaches regarding the urgency of notifying victims about breaches of their personal information. We tentatively conclude that our proposal better serves the public interest than our current rule because it increases the speed at which customers may receive the important information contained in a notice, except in those specific circumstances when law enforcement officials specifically request otherwise. We seek comment on our tentative conclusion. What are the benefits and drawbacks to such an approach? Is there any reason to maintain our current absolute bar to customer notification for a set period? Does our proposal to eliminate the seven business-day waiting period before notifying customers appropriately balance legitimate law enforcement needs with the customers’ need to take action to timely protect their information after a breach? We seek comment on whether a ‘‘without unreasonable delay’’ notification requirement would allow carriers enough time to determine the scope and impact of a breach. Would prompt PO 00000 Frm 00026 Fmt 4702 Sfmt 4702 3957 customer notification compromise a carrier’s ability to discover the source of the breach, mitigate the loss of data, and ensure further data is not compromised? 24. Our proposed requirement is consistent with many existing data breach notification laws that require expedited notice but refrain from requiring a specific timeframe. For example, the GLBA requires customer notification ‘‘as soon as possible’’ after a determination that customer information has been misused. California law requires notification ‘‘be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement.’’ Similarly, many state data breach statutes impose an ‘‘expeditiously as practicable’’ or ‘‘without unreasonable delay’’ standard instead of a set time limit for reporting. In addition, FTC guidance on addressing data breaches explains that ‘‘if you quickly notify people that their personal information has been compromised, they can take steps to reduce the chance that their information will be misused.’’ How should state and other federal law influence the approach we adopt? 25. We seek comment on whether requiring notice to customers ‘‘without unreasonable delay’’ after discovery of a breach provides sufficient guidance as to the required timeframe to notify customers. Should we adopt a different approach, such as a fixed number of days for notification, and if so what should we adopt? If we were to adopt a ‘‘without unreasonable delay’’ standard, we seek comment on whether we should provide guidance on a specific time period that would be considered ‘‘reasonable’’ for notification. For example, HIPAA requires notification to individuals ‘‘without unreasonable delay and in no case later than 60 calendar days after discovery of a breach.’’ The Health Breach Notification Rule also requires notification to individuals ‘‘without unreasonable delay and in no case later than 60 days after the discovery of a breach of security.’’ Most states that impose an outside limit on when consumers must be notified of a breach require notification to affected consumers no later than 30, 45, or 60 days after discovery of a breach. What are the benefits and drawbacks to setting a definite time limit on notification while requiring notification without unreasonable delay? 26. We also seek comment on whether the same notification deadline should be applied to all carriers. Are there unique concerns or compliance barriers for small carriers that make prompt E:\FR\FM\23JAP1.SGM 23JAP1 khammond on DSKJM1Z7X2PROD with PROPOSALS 3958 Federal Register / Vol. 88, No. 14 / Monday, January 23, 2023 / Proposed Rules response unfeasible, such as resource availability or reliance on third-party cybersecurity services for breach detection? Should we adopt different notification requirements for small carriers? If so, what threshold should we establish for small carriers? Should we consider establishing any other exceptions to this proposed requirement? We also seek comment on whether we should take into consideration the scope of the breach, e.g., how many customers are affected, the type of information breach, in determining the appropriate timeframe for customer breach reporting. 27. We seek comment on how best to coordinate the timing of customer notification and federal law enforcement notification. Our current rule, providing for consecutive rather than simultaneous notification of federal law enforcement and customers, was adopted at the request of federal law enforcement. Is such an approach still necessary? Are there circumstances where it would be acceptable for carriers to notify customers and law enforcement simultaneously in certain instances? Given that nearly all, if not all, state data breach statutes subject the timing of customer notification to legitimate law enforcement needs, we seek comment on whether it is necessary to provide any further guidance to help coordinate the timing of notice to customers with notice to the Commission and other federal law enforcement. 28. In addition, consistent with our current rules implementing Section 222, our proposed rules would allow a federal agency to direct a carrier to delay customer notification for an initial period of up to 30 days if such notification would interfere with a criminal investigation or national security. In circumstances when a carrier reasonably decides to consult with law enforcement, a short delay pending such consultation would likely be reasonable for purposes of a ‘‘without unreasonable delay’’ standard for customer notification. We seek comment on this proposal. We observe that HIPAA, the GLBA, and the Health Breach Notification Rules allow for a delay of customer notification if law enforcement determines notification to customers would ‘‘impede a criminal investigation or cause damage to national security,’’ but only if law enforcement officials request such a delay. Both HIPAA and the Health Breach Notification Rule allow notification delays of up to 30 days if requested by law enforcement. Similarly, GLBA allows that ‘‘customer notice may be delayed if an appropriate VerDate Sep<11>2014 15:57 Jan 20, 2023 Jkt 259001 law enforcement agency determines that notification will interfere with a criminal investigation and provides the institution with a written request for a delay.’’ Likewise, most, if not all, states permit delays in notifying affected consumers for legitimate law enforcement needs. We tentatively conclude that our proposal strikes an appropriate balance between the needs of law enforcement to have time to investigate criminal activity and the needs of customers to be notified of data breaches. Do commenters agree? We also observe that these other regimes appear to allow non-federal law enforcement to request a delay, whereas the Commission’s rule currently allows only federal agencies to so request. Should our rule also allow carriers to delay notification upon request of nonfederal law enforcement? 29. Contents of Customer Breach Notification. We seek comment on whether we should require customer breach notifications to include specific minimum categories of information. Our current rules specify when and to whom breach notifications must be made, but do not address the content of such notifications. In adopting the current breach notification rules, the Commission declined to specify the precise content of the notice that must be provided to customers in the event of a security breach of CPNI, ‘‘leav[ing] carriers the discretion to tailor the language and method of notification to the circumstances.’’ Nearly 15 years later, we now seek comment on whether it is appropriate to require a minimum amount of information to ensure that such data breach notifications contain actionable information that is useful to the consumer. We seek comment on the benefits to customers and carriers of requiring carriers to include minimum categories of information in customer data breach notices. Will having minimum consistent fields of information assist consumers in understanding the circumstances and nature of the breach and streamline notice practices for carriers? What are the drawbacks to doing so? Are there any legal barriers to adopting a rule that prescribes the minimum categories of information in these breach notices? 30. To so identify possible categories of information to require, we look to numerous state data breach statutes as well as existing federal guidance regarding data breach notices. All 50 states, the District of Columbia, Guam, Puerto Rico, and the Virgin Islands have laws requiring private or governmental entities to notify individuals of breaches involving their personal information. Of these, many impose minimum content PO 00000 Frm 00027 Fmt 4702 Sfmt 4702 requirements on the notifications that must be transmitted to affected individuals in the wake of a data breach, including: the name and contact information for the entity reporting the breach; the date, estimated date, or estimated date range of the breach; a description of the breach incident; a description of the personally identifiable information that was used, disclosed, or accessed, or reasonably believed to have been used, disclosed, or accessed; any actions the entity is taking to remedy the situation and/or protect affected individuals; a brief list of steps that affected consumers can take to protect themselves and their information, such as contacting credit bureaus to ask that fraud alerts or credit freezes be placed on their credit reports; and contact information for the FTC and any federal agency that assists consumers with matters of identity theft. Similarly, both the HIPAA Breach Notification Rule and guidance issued by the Federal Deposit Insurance Corporation (FDIC) in response to the GLBA impose minimum content requirements on data breach notifications. In its Data Breach Response Guide, the FTC advises companies on specific information that should be included in their breach notices to individuals, including describing what the company knows about the breach (how it happened, what information was taken, how the thieves have used the information (if known), what actions the company has taken to remedy the situation, what actions the company is taking to protect individuals, how to reach the relevant contact in the organization); the steps individuals can take, given the type of information exposed, and provide relevant contact information; current information about how to recover from identity theft; information about the law enforcement agency working on the case, if the law enforcement agency agrees that would help; encouraging people who discover that their information has been misused to report it to the FTC; and describing how the company will contact consumers in the future to help victims avoid phishing scams. 31. We seek comment on adapting these models to telecommunications carriers and requiring carriers to include, at a minimum, the following information in security breach notices to customers: (1) the date of the breach; (2) a description of the customer information that was used, disclosed, or accessed; (3) information on how customers, including customers with disabilities, can contact the carrier to E:\FR\FM\23JAP1.SGM 23JAP1 khammond on DSKJM1Z7X2PROD with PROPOSALS Federal Register / Vol. 88, No. 14 / Monday, January 23, 2023 / Proposed Rules inquire about the breach; (4) information about how to contact the Commission, FTC, and any state regulatory agencies relevant to the customer and the service; (5) if the breach creates a risk of identity theft, information about national credit reporting agencies and the steps customers can take to guard against identity theft, including any credit monitoring, credit reporting, or credit freezes the carrier is offering to affected customers; and (6) what other steps customers should take to mitigate their risk based on the specific categories of information exposed in the breach. Are the identified categories the correct information to be included in data breach notices? Should we consider requiring any additional or alternative categories of information that carriers must include in customer breach notices? For example, would it be helpful to include a statement of whether the notification was delayed due to reporting requirements to law enforcement or a law enforcement investigation, and if so, the length of the delay to help explain to customers the time lapse between discovery of the breach and customer notification? Should we require notifications to include a list of the law enforcement and government entities that have been notified of the breach? Should we require carriers to include a brief description of how the carrier will contact consumers in the future regarding the breach to help consumers avoid phishing scams related to breaches? What are best practices for providing consumers with actionable information in a breach notification? We seek comment on what minimum required information appropriately balances empowering consumers to take the necessary steps to protect themselves and their information in the wake of a data breach and appropriately limiting burdens on telecommunications carriers. We also seek comment on whether adopting or adapting a set of existing notification contents requirements will help to create a measure of consistency across breach notifications and will benefit both consumers and carriers, particularly smaller carriers, by streamlining the manner and content of their response in the event of a data breach. 32. Method of Customer Breach Notification. We observe that many state regulations specify the form that notifications to customers may take, whether by physical mail, email, or telephone. We seek comment on whether we should adopt a similar VerDate Sep<11>2014 15:57 Jan 20, 2023 Jkt 259001 requirement and, if so, on what form notifications to consumers should take. Is there a method or methods of notification that would make the most sense or be most beneficial to consumers? What are the benefits and burdens of imposing such a requirement? D. TRS Breach Reporting 33. In 2013, the Commission adopted CPNI rules applicable to all forms of Telecommunications Relay Services (TRS), as well as to point-to-point video calls handled over the video relay services (VRS) network. The Commission found that ‘‘for TRS to be functionally equivalent to voice telephone services, consumers with disabilities who use TRS are entitled to have the same assurances of privacy as do consumers without disabilities for voice telephone services.’’ The CPNI rules for TRS include a breach notification rule that is equivalent to § 64.2011 in terms of the substantive protection provided to TRS users. The texts of the two provisions are virtually identical, except for the substitution of the term ‘‘TRS provider’’ for ‘‘telecommunications carrier’’ in § 64.5111. The only substantive difference is that under the TRS rule, after a TRS provider notifies law enforcement of a breach, it ‘‘shall file a copy of the notification with the Disability Rights Office of the Consumer and Governmental Affairs Bureau at the same time as when the TRS provider notifies the customers.’’ 34. To maintain functional equivalency for TRS users, we propose to amend § 64.5111 so that it continues to provide equivalent privacy protection for TRS users. The amendments we propose for § 64.5111 are thus essentially the same as those proposed for users of telecommunications and interconnected VoIP services. That is, we propose: (1) to expand the Commission’s definition of ‘‘breach’’ to include inadvertent disclosures of customer information; (2) to require TRS providers to notify the Commission, in addition to the Secret Service and FBI, as soon as practicable after discovery of a breach; and (3) to eliminate the mandatory waiting period to notify customers, instead requiring TRS providers to notify customers of CPNI breaches without unreasonable delay after discovery of a breach unless law enforcement requests a delay. Further, we seek comment on the following additional issues, raised above regarding § 64.2011, as they relate to TRS providers: (1) whether to adopt a harmbased trigger for breach notifications; (2) whether we should adopt minimum PO 00000 Frm 00028 Fmt 4702 Sfmt 4702 3959 requirements for the content of customer breach notices; and (3) whether our rules should address breaches of sensitive personal information. 35. We seek comment on each of these proposals and their costs and benefits. Should updated data breach requirements for TRS providers be identical to those we adopt for providers of telecommunications and interconnected VoIP services, or are there circumstances unique to TRS providers that warrant differences in their obligations regarding data breaches? Are any additional notification requirements necessary to ensure TRS users receive functionally equivalent privacy protection? If we adopt the proposed requirement that service providers notify the Commission of breaches via a centralized portal, is there any need to retain the current requirement that TRS providers submit a copy of any breach notification to the Disability Rights Office of the Consumer and Governmental Affairs Bureau? Finally, would TRS providers incur costs or other compliance burdens under the proposed amendments that are disproportionately greater than those incurred by providers of telecommunications and interconnected VoIP services, and if so, would the extent of such costs or burdens justify the application of different breach notification requirements to TRS? 36. Legal Authority. Section 225 of the Act directs the Commission to ensure that TRS are available to enable communication in a manner that is functionally equivalent to voice telephone services. In 2013, the Commission found that applying the privacy protections of the Commission’s CPNI regulations to TRS users advances the functional equivalency of TRS. The Commission concluded further that the specific mandate of Section 225 to establish ‘‘functional requirements, guidelines, and operations procedures for TRS’’ authorizes the Commission to make the privacy protections of the Commission’s CPNI regulations applicable to TRS users. In addition, the Commission found that extending the CPNI regulations to TRS users is ancillary to its responsibilities under Section 222 of the Act to telecommunications service subscribers that place calls to or receive calls from TRS users, because TRS call records include call detail information concerning all calling and called parties. Finally, the Commission determined that applying CPNI requirements to point-to-point video services provided by VRS providers is ancillary to its E:\FR\FM\23JAP1.SGM 23JAP1 3960 Federal Register / Vol. 88, No. 14 / Monday, January 23, 2023 / Proposed Rules khammond on DSKJM1Z7X2PROD with PROPOSALS responsibilities under Sections 222 and 225. 37. We tentatively conclude that, for the same reasons cited in the 2013 VRS Reform Order, these sources of authority for establishing the current CPNI rules for TRS authorize the Commission to amend those rules to ensure that TRS users receive privacy protections equivalent to those proposed for users of telecommunications and VoIP services. We seek comment on this tentative conclusion. E. Legal Authority 38. Section 222. We believe that Section 222 provides authority to adopt the breach notification rules for which we seek comment in this Notice of Proposed Rulemaking. We also tentatively conclude that we have authority to apply the rules proposed in this Notice of Proposed Rulemaking to interconnected VoIP providers. We seek comment on these tentative conclusions. 39. Section 222 of the Act governs telecommunications carriers in their use, disclosure, and protection of proprietary information that they obtain in the course of providing telecommunications services. Section 222(a) imposes a duty on carriers to ‘‘protect the confidentiality of proprietary information of, and relating to’’ customers, fellow carriers, and equipment manufacturers. Section 222(c) imposes more specific requirements on carriers as to the protection and confidentiality of CPNI. We tentatively conclude that both subsections provide us authority to adopt rules requiring telecommunications carriers and interconnected VoIP providers to address breaches of CPNI. 40. The Commission has long required carriers to report data breaches as part of their duty to protect the confidentiality of customers’ information. We believe that the proposed revisions to the Commission’s data breach reporting rule reinforce carriers’ duty to protect the confidentiality of their customers’ information. Data breach reporting requirements also reinforce our other rules addressing the protection of CPNI. For example, data breach notifications can meaningfully inform customer decisions regarding whether to give, withhold, or retract their approval to use or disclose their information. Similarly, we believe that requiring carriers to notify the Commission in the event of a data breach will better enable the Commission to identify and confront systemic network vulnerabilities and help investigate and advise carriers on VerDate Sep<11>2014 15:57 Jan 20, 2023 Jkt 259001 how best to avoid future breaches, also helping carriers to fulfill their duty under Section 222(a) to protect the confidentiality of their customers’ information. We seek comment on this analysis. 41. Interconnected VoIP. We believe that we have authority under Section 222 and our ancillary jurisdiction to apply the rules we propose today to interconnected VoIP providers. In 2007, the Commission exercised ancillary jurisdiction to extend its Part 64 CPNI rules to interconnected VoIP services. Since then, interconnected VoIP providers have operated under these rules. Interconnected VoIP services remain within the Commission’s subject matter jurisdiction and we believe that the application of customer privacy requirements to these services is ‘‘reasonably ancillary to the effective performance’’ of our statutory responsibility under Section 222. As the Commission explained in 2007, ‘‘American consumers [can reasonably] expect that their telephone calls are private irrespective of whether the call is made using the service of a wireline carrier, a wireless carrier, or an interconnected VoIP provider.’’ Now, as then, extending Section 222’s protections to interconnected VoIP service customers is also ‘‘necessary to protect the privacy of wireline or wireless customers that place calls to or receive calls from interconnected VoIP providers.’’ In addition, in 2008, Congress ratified the Commission’s decision to apply Section 222’s requirements to interconnected VoIP services by adding language to Section 222 that expressly covers ‘‘IP-enabled voice service,’’ defined expressly to incorporate the Commission’s definition of ‘‘interconnected VoIP service.’’ The 2008 revisions to Section 222 would not make sense if the privacy-related duties of subsections (a) and (c) did not apply to interconnected VoIP providers. We seek comment on this analysis. 42. We seek comment on whether there are other bases of authority on which we can rely to adopt the rules we propose and seek comment on today. F. Impact of the Congressional Disapproval of the 2016 Privacy Order 43. As noted above, in 2016, the Commission acted to revise its breach notification rule as part of a larger proceeding addressing privacy requirements for broadband internet access service providers (ISPs). The rules the Commission adopted in the 2016 Privacy Order applied to telecommunications carriers and interconnected VoIP providers in addition to ISPs, which had been PO 00000 Frm 00029 Fmt 4702 Sfmt 4702 classified as providers of telecommunications services in 2015. In 2017, however, Congress nullified those 2016 revisions to the Commission’s CPNI rules under the Congressional Review Act. 44. As a threshold matter, we seek comment on the effect of the Congressional disapproval of the 2016 Privacy Order under the Congressional Review Act. While we seek comment on a range of proposals in this item, we clarify that, in light of the Congressional resolution of disapproval, we are not seeking comment on ‘‘reissu[ing] . . . in substantially the same form,’’ or on issuing ‘‘a new rule that is substantially the same as,’’ the rule disapproved by Congress. More generally, though, we seek comment here on the effect and scope of the Congressional disapproval of the 2016 Privacy Order for purposes of adopting rules that apply to telecommunications carriers. G. Digital Equity Considerations 45. The Commission, as part of its continuing effort to advance digital equity for all, including people of color and others who have been historically underserved, marginalized, and adversely affected by persistent poverty and inequality, invites comment on any equity-related considerations and benefits (if any) that may be associated with the proposals and issues discussed herein. Specifically, we seek comment on how our proposals may promote or inhibit advances in diversity, equity, inclusion, and accessibility. II. Procedural Matters 46. Initial Regulatory Flexibility Analysis. As required by the Regulatory Flexibility Act, the Commission has prepared an Initial Regulatory Flexibility Analysis (IRFA) of the possible significant economic impact on small entities of the policies and rules addressed in this document. The IRFA is set forth in Appendix B. Written public comments are requested on the IRFA. Comments must be filed by the deadlines for comments on the Notice of Proposed Rulemaking indicated on the first page of this document and must have a separate and distinct heading designating them as responses to the IRFA. The Commission’s Consumer and Governmental Affairs Bureau, Reference Information Center, will send a copy of this Notice of Proposed Rulemaking, including the IRFA, to the Chief Counsel for Advocacy of the SBA. 47. People with Disabilities. To request materials in accessible formats for people with disabilities (braille, large print, electronic files, audio format), send an email to fcc504@fcc.gov E:\FR\FM\23JAP1.SGM 23JAP1 Federal Register / Vol. 88, No. 14 / Monday, January 23, 2023 / Proposed Rules or call the Consumer & Governmental Affairs Bureau at 202–418–0530 (voice). khammond on DSKJM1Z7X2PROD with PROPOSALS III. Initial Regulatory Flexibility Analysis 1. As required by the Regulatory Flexibility Act of 1980, as amended (RFA), the Commission has prepared this Initial Regulatory Flexibility Analysis (IRFA) of the possible significant economic impact on small entities by the policies and rules proposed in this Notice of Proposed Rulemaking. The Commission requests written public comments on this IRFA. Comments must be identified as responses to the IRFA and must be filed by the deadlines for comments provided on the first page of the Notice of Proposed Rulemaking. The Commission will send a copy of the Notice of Proposed Rulemaking, including this IRFA, to the Chief Counsel for Advocacy of the Small Business Administration (SBA). In addition, the Notice of Proposed Rulemaking and IRFA (or summaries thereof) will be published in the Federal Register. A. Need for, and Objectives of, the Proposed Rules 2. The Commission first adopted a rule in 2007 requiring telecommunications carriers and interconnected Voice over internet Protocol (VoIP) providers to notify customers and federal law enforcement of breaches of customer proprietary network information (CPNI) in the carriers’ possession. In the almost decade and a half since that time, data breaches nationwide have increased in both frequency and severity in all industries. In the telecommunications industry, the public has suffered an increasing number of security breaches of customer information in recent years. Federal and state data breach laws covering other areas have evolved since 2007. Those developments combined with our specific experience suggest opportunities for improvement in our own breach notification rule. Today, we begin the process to update and strengthen our data breach rule to provide greater protections to the public. 3. The Commission adopted the data breach rule, like the rest of the privacy safeguards adopted in the 2007 CPNI Order, to address the problem of ‘‘pretexting,’’ the practice of pretending to be a particular customer or other authorized person in order to obtain access to that customer’s call detail or other private communications records. In the almost 15 years since, it has become clear that breaches of customer information in many contexts extend far VerDate Sep<11>2014 15:57 Jan 20, 2023 Jkt 259001 beyond pretexting in general or the specific type of pretexting addressed at that time and are increasing in scale and evolving in methodology. The increasing severity and diversifying methods of security breaches involving customer information can have lasting detrimental impacts on customers whose information has been breached. 4. To better protect telecommunications customers and ensure that our rules keep pace with today’s challenges, we propose a number of updates to our rule addressing telecommunications carriers’ breach notification duties. We seek to ensure that affected customers, the Commission, and other federal law enforcement agencies receive the information they need in a timely manner so they can mitigate and prevent harm due to the breach and take action to deter future breaches. To identify best practices and to minimize burdens, we look to other federal and state breach laws as potential models for our rules. 5. In this document, we propose to expand the Commission’s definition of ‘‘breach’’ to include inadvertent disclosures of customer information and seek comment on adopting a harmbased trigger for breach notifications. We also propose to require carriers to notify the Commission, in addition to the Secret Service and FBI, as soon as practicable after discovery of a breach. We also propose to eliminate the mandatory waiting period before notifying customers and instead require carriers to notify customers of CPNI breaches without unreasonable delay after discovery of a breach unless law enforcement requests a delay. We also seek comment on whether we should adopt minimum requirements for the content of customer breach notices, and we seek comment on whether our rules should address breaches of other types of sensitive personal information beyond CPNI. Finally, we propose to make changes to our TRS data breach reporting rule consistent with those we propose to our CPNI breach reporting rule. B. Legal Basis 6. The legal basis for any action that may be taken pursuant to this Notice of Proposed Rulemaking is contained in Sections 1, 4(i), 4(j), 201, 202, 222, 225, 303(r), and 332 of the Communications Act of 1934, as amended, 47 U.S.C. 151, 154, 201, 202, 222, 225, 303(r), 332. PO 00000 Frm 00030 Fmt 4702 Sfmt 4702 3961 C. Description and Estimate of the Number of Small Entities to Which the Proposed Rules Will Apply 7. The RFA directs agencies to provide a description of and, where feasible, an estimate of the number of small entities that may be affected by the proposed rules and by the rule revisions on which the Notice of Proposed Rulemaking seeks comment, if adopted. The RFA generally defines the term ‘‘small entity’’ as having the same meaning as the terms ‘‘small business,’’ ‘‘small organization,’’ and ‘‘small governmental jurisdiction.’’ In addition, the term ‘‘small business’’ has the same meaning as the term ‘‘small-business concern’’ under the Small Business Act. A ‘‘small-business concern’’ is one which: (1) is independently owned and operated; (2) is not dominant in its field of operation; and (3) satisfies any additional criteria established by the SBA. 8. Small Businesses, Small Organizations, Small Governmental Jurisdictions. Our actions, over time, may affect small entities that are not easily categorized at present. We therefore describe here, at the outset, three broad groups of small entities that could be directly affected herein. First, while there are industry specific size standards for small businesses that are used in the regulatory flexibility analysis, according to data from the Small Business Administration’s (SBA) Office of Advocacy, in general a small business is an independent business having fewer than 500 employees. These types of small businesses represent 99.9 percent of all businesses in the United States, which translates to 32.5 million businesses. 9. Next, the type of small entity described as a ‘‘small organization’’ is generally ‘‘any not-for-profit enterprise which is independently owned and operated and is not dominant in its field.’’ The Internal Revenue Service (IRS) uses a revenue benchmark of $50,000 or less to delineate its annual electronic filing requirements for small exempt organizations. Nationwide, for tax year 2018, there were approximately 571,709 small exempt organizations in the U.S. reporting revenues of $50,000 or less according to the registration and tax data for exempt organizations available from the IRS. 10. Finally, the small entity described as a ‘‘small governmental jurisdiction’’ is defined generally as ‘‘governments of cities, counties, towns, townships, villages, school districts, or special districts, with a population of less than fifty thousand.’’ U.S. Census Bureau data from the 2017 Census of E:\FR\FM\23JAP1.SGM 23JAP1 3962 Federal Register / Vol. 88, No. 14 / Monday, January 23, 2023 / Proposed Rules Governments indicate that there were 90,075 local governmental jurisdictions consisting of general purpose governments and special purpose governments in the United States. Of this number there were 36,931 general purpose governments (county, municipal and town or township) with populations of less than 50,000 and 12,040 special purpose governments— independent school districts with enrollment populations of less than 50,000. Accordingly, based on the 2017 U.S. Census of Governments data, we estimate that at least 48,971 entities fall into the category of ‘‘small governmental jurisdictions.’’ khammond on DSKJM1Z7X2PROD with PROPOSALS 1. Wireline Carriers 11. Wired Telecommunications Carriers. The U.S. Census Bureau defines this industry as establishments primarily engaged in operating and/or providing access to transmission facilities and infrastructure that they own and/or lease for the transmission of voice, data, text, sound, and video using wired communications networks. Transmission facilities may be based on a single technology or a combination of technologies. Establishments in this industry use the wired telecommunications network facilities that they operate to provide a variety of services, such as wired telephony services, including VoIP services, wired (cable) audio and video programming distribution, and wired broadband internet services. By exception, establishments providing satellite television distribution services using facilities and infrastructure that they operate are included in this industry. Wired Telecommunications Carriers are also referred to as wireline carriers or fixed local service providers. 12. The SBA small business size standard for Wired Telecommunications Carriers classifies firms having 1,500 or fewer employees as small. U.S. Census Bureau data for 2017 show that there were 3,054 firms that operated in this industry for the entire year. Of this number, 2,964 firms operated with fewer than 250 employees. Additionally, based on Commission data in the 2021 Universal Service Monitoring Report, as of December 31, 2020, there were 5,183 providers that reported they were engaged in the provision of fixed local services. Of these providers, the Commission estimates that 4,737 providers have 1,500 or fewer employees. Consequently, using the SBA’s small business size standard, most of these providers can be considered small entities. VerDate Sep<11>2014 15:57 Jan 20, 2023 Jkt 259001 13. Local Exchange Carriers (LECs). Neither the Commission nor the SBA has developed a size standard for small businesses specifically applicable to local exchange services. Providers of these services include both incumbent and competitive local exchange service providers. Wired Telecommunications Carriers is the closest industry with an SBA small business size standard. Wired Telecommunications Carriers are also referred to as wireline carriers or fixed local service providers. The SBA small business size standard for Wired Telecommunications Carriers classifies firms having 1,500 or fewer employees as small. U.S. Census Bureau data for 2017 show that there were 3,054 firms that operated in this industry for the entire year. Of this number, 2,964 firms operated with fewer than 250 employees. Additionally, based on Commission data in the 2021 Universal Service Monitoring Report, as of December 31, 2020, there were 5,183 providers that reported they were fixed local exchange service providers. Of these providers, the Commission estimates that 4,737 providers have 1,500 or fewer employees. Consequently, using the SBA’s small business size standard, most of these providers can be considered small entities. 14. Incumbent LECs. Neither the Commission nor the SBA has developed a small business size standard specifically for incumbent local exchange services. Wired Telecommunications Carriers is the closest industry with an SBA small business size standard. The SBA small business size standard for Wired Telecommunications Carriers classifies firms having 1,500 or fewer employees as small. U.S. Census Bureau data for 2017 show that there were 3,054 firms in this industry that operated for the entire year. Of this number, 2,964 firms operated with fewer than 250 employees. Additionally, based on Commission data in the 2021 Universal Service Monitoring Report, as of December 31, 2020, there were 1,227 providers that reported they were incumbent local exchange service providers. Of these providers, the Commission estimates that 929 providers have 1,500 or fewer employees. Consequently, using the SBA’s small business size standard, the Commission estimates that the majority of incumbent local exchange carriers can be considered small entities. 15. Competitive Local Exchange Carriers (Competitive LECs). Neither the Commission nor the SBA has developed a size standard for small businesses specifically applicable to local exchange PO 00000 Frm 00031 Fmt 4702 Sfmt 4702 services. Providers of these services include several types of competitive local exchange service providers. Wired Telecommunications Carriers is the closest industry with a SBA small business size standard. The SBA small business size standard for Wired Telecommunications Carriers classifies firms having 1,500 or fewer employees as small. U.S. Census Bureau data for 2017 show that there were 3,054 firms that operated in this industry for the entire year. Of this number, 2,964 firms operated with fewer than 250 employees. Additionally, based on Commission data in the 2021 Universal Service Monitoring Report, as of December 31, 2020, there were 3,956 providers that reported they were competitive local exchange service providers. Of these providers, the Commission estimates that 3,808 providers have 1,500 or fewer employees. Consequently, using the SBA’s small business size standard, most of these providers can be considered small entities. 16. Interexchange Carriers (IXCs). Neither the Commission nor the SBA has developed a small business size standard specifically for Interexchange Carriers. Wired Telecommunications Carriers is the closest industry with a SBA small business size standard. The SBA small business size standard for Wired Telecommunications Carriers classifies firms having 1,500 or fewer employees as small. U.S. Census Bureau data for 2017 show that there were 3,054 firms that operated in this industry for the entire year. Of this number, 2,964 firms operated with fewer than 250 employees. Additionally, based on Commission data in the 2021 Universal Service Monitoring Report, as of December 31, 2020, there were 151 providers that reported they were engaged in the provision of interexchange services. Of these providers, the Commission estimates that 131 providers have 1,500 or fewer employees. Consequently, using the SBA’s small business size standard, the Commission estimates that the majority of providers in this industry can be considered small entities. 17. Cable System Operators (Telecom Act Standard). The Communications Act of 1934, as amended (the Act), also contains a size standard for small cable system operators, which is ‘‘a cable operator that, directly or through an affiliate, serves in the aggregate fewer than one percent of all subscribers in the United States and is not affiliated with any entity or entities whose gross annual revenues in the aggregate exceed $250,000,000.’’ For purposes of the Telecom Act Standard, the Commission E:\FR\FM\23JAP1.SGM 23JAP1 Federal Register / Vol. 88, No. 14 / Monday, January 23, 2023 / Proposed Rules khammond on DSKJM1Z7X2PROD with PROPOSALS determined that a cable system operator that serves fewer than 677,000 subscribers, either directly or through affiliates, will meet the definition of a small cable operator based on the cable subscriber count established in a 2001 Public Notice. Based on industry data, only six cable system operators have more than 677,000 subscribers. Accordingly, the Commission estimates that the majority of cable system operators are small under this size standard. We note however, that the Commission neither requests nor collects information on whether cable system operators are affiliated with entities whose gross annual revenues exceed $250 million. Therefore, we are unable at this time to estimate with greater precision the number of cable system operators that would qualify as small cable operators under the definition in the Communications Act. 18. Other Toll Carriers. Neither the Commission nor the SBA has developed a size standard for small businesses specifically applicable to other toll carriers. This category includes toll carriers that do not fall within the categories of interexchange carriers, operator service providers, prepaid calling card providers, satellite service carriers, or toll resellers. Wired Telecommunications Carriers is the closest industry with a SBA small business size standard. The SBA small business size standard for Wired Telecommunications Carriers classifies firms having 1,500 or fewer employees as small. U.S. Census Bureau data for 2017 show that there were 3,054 firms in this industry that operated for the entire year. Of this number, 2,964 firms operated with fewer than 250 employees. Additionally, based on Commission data in the 2021 Universal Service Monitoring Report, as of December 31, 2020, there were 115 providers that reported they were engaged in the provision of other toll services. Of these providers, the Commission estimates that 113 providers have 1,500 or fewer employees. Consequently, using the SBA’s small business size standard, most of these providers can be considered small entities. 2. Wireless Carriers 19. Wireless Telecommunications Carriers (except Satellite). This industry comprises establishments engaged in operating and maintaining switching and transmission facilities to provide communications via the airwaves. Establishments in this industry have spectrum licenses and provide services using that spectrum, such as cellular services, paging services, wireless VerDate Sep<11>2014 15:57 Jan 20, 2023 Jkt 259001 internet access, and wireless video services. The SBA size standard for this industry classifies a business as small if it has 1,500 or fewer employees. U.S. Census Bureau data for 2017 show that there were 2,893 firms in this industry that operated for the entire year. Of that number, 2,837 firms employed fewer than 250 employees. Additionally, based on Commission data in the 2021 Universal Service Monitoring Report, as of December 31, 2020, there were 797 providers that reported they were engaged in the provision of wireless services. Of these providers, the Commission estimates that 715 providers have 1,500 or fewer employees. Consequently, using the SBA’s small business size standard, most of these providers can be considered small entities. 20. Satellite Telecommunications. This category comprises firms ‘‘primarily engaged in providing telecommunications services to other establishments in the telecommunications and broadcasting industries by forwarding and receiving communications signals via a system of satellites or reselling satellite telecommunications.’’ Satellite telecommunications service providers include satellite and earth station operators. The SBA small business size standard for this industry classifies a business with $38.5 million or less in annual receipts as small. U.S. Census Bureau data for 2017 show that 275 firms in this industry operated for the entire year. Of this number, 242 firms had revenue of less than $25 million. Additionally, based on Commission data in the 2021 Universal Service Monitoring Report, as of December 31, 2020, there were 71 providers that reported they were engaged in the provision of satellite telecommunications services. Of these providers, the Commission estimates that approximately 48 providers have 1,500 or fewer employees. Consequently, using the SBA’s small business size standard, a little more than of these providers can be considered small entities. 3. Resellers 21. Local Resellers. Neither the Commission nor the SBA have developed a small business size standard specifically for Local Resellers. Telecommunications Resellers is the closest industry with a SBA small business size standard. The Telecommunications Resellers industry comprises establishments engaged in purchasing access and network capacity from owners and operators of telecommunications networks and PO 00000 Frm 00032 Fmt 4702 Sfmt 4702 3963 reselling wired and wireless telecommunications services (except satellite) to businesses and households. Establishments in this industry resell telecommunications; they do not operate transmission facilities and infrastructure. Mobile virtual network operators (MVNOs) are included in this industry. The SBA small business size standard for Telecommunications Resellers classifies a business as small if it has 1,500 or fewer employees. U.S. Census Bureau data for 2017 show that 1,386 firms in this industry provided resale services for the entire year. Of that number, 1,375 firms operated with fewer than 250 employees. Additionally, based on Commission data in the 2021 Universal Service Monitoring Report, as of December 31, 2020, there were 293 providers that reported they were engaged in the provision of local resale services. Of these providers, the Commission estimates that 289 providers have 1,500 or fewer employees. Consequently, using the SBA’s small business size standard, most of these providers can be considered small entities. 22. Toll Resellers. Neither the Commission nor the SBA have developed a small business size standard specifically for Toll Resellers. Telecommunications Resellers is the closest industry with a SBA small business size standard. The Telecommunications Resellers industry comprises establishments engaged in purchasing access and network capacity from owners and operators of telecommunications networks and reselling wired and wireless telecommunications services (except satellite) to businesses and households. Establishments in this industry resell telecommunications; they do not operate transmission facilities and infrastructure. Mobile virtual network operators (MVNOs) are included in this industry. The SBA small business size standard for Telecommunications Resellers classifies a business as small if it has 1,500 or fewer employees. U.S. Census Bureau data for 2017 show that 1,386 firms in this industry provided resale services for the entire year. Of that number, 1,375 firms operated with fewer than 250 employees. Additionally, based on Commission data in the 2021 Universal Service Monitoring Report, as of December 31, 2020, there were 518 providers that reported they were engaged in the provision of toll services. Of these providers, the Commission estimates that 495 providers have 1,500 or fewer employees. Consequently, using the SBA’s small business size standard, E:\FR\FM\23JAP1.SGM 23JAP1 3964 Federal Register / Vol. 88, No. 14 / Monday, January 23, 2023 / Proposed Rules khammond on DSKJM1Z7X2PROD with PROPOSALS most of these providers can be considered small entities. 23. Prepaid Calling Card Providers. Neither the Commission nor the SBA has developed a small business definition specifically for prepaid calling card providers. Telecommunications Resellers is the closest industry with a SBA small business size standard. The Telecommunications Resellers industry comprises establishments engaged in purchasing access and network capacity from owners and operators of telecommunications networks and reselling wired and wireless telecommunications services (except satellite) to businesses and households. Establishments in this industry resell telecommunications; they do not operate transmission facilities and infrastructure. Mobile virtual network operators (MVNOs) are included in this industry. The SBA small business size standard for Telecommunications Resellers classifies a business as small if it has 1,500 or fewer employees. U.S. Census Bureau data for 2017 show that 1,386 firms in this industry provided resale services for the entire year. Of that number, 1,375 firms operated with fewer than 250 employees. Additionally, based on Commission data in the 2021 Universal Service Monitoring Report, as of December 31, 2020, there were 58 providers that reported they were engaged in the provision of payphone services. Of these providers, the Commission estimates that 57 providers have 1,500 or fewer employees. Consequently, using the SBA’s small business size standard, most of these providers can be considered small entities. 4. Other Entities 24. All Other Telecommunications. This industry is comprised of establishments primarily engaged in providing specialized telecommunications services, such as satellite tracking, communications telemetry, and radar station operation. This industry also includes establishments primarily engaged in providing satellite terminal stations and associated facilities connected with one or more terrestrial systems and capable of transmitting telecommunications to, and receiving telecommunications from, satellite systems. Providers of internet services (e.g. dial-up ISPs) or voice over internet protocol (VoIP) services, via client-supplied telecommunications connections are also included in this industry. The SBA small business size standard for this industry classifies firms with annual receipts of $35 million or less as small. U.S. Census VerDate Sep<11>2014 15:57 Jan 20, 2023 Jkt 259001 Bureau data for 2017 show that there were 1,079 firms in this industry that operated for the entire year. Of those firms, 1,039 had revenue of less than $25 million. Based on this data, the Commission estimates that the majority of ‘‘All Other Telecommunications’’ firms can be considered small. D. Description of Projected Reporting, Recordkeeping, and Other Compliance Requirements for Small Entities 25. In this document, we propose to expand the Commission’s definition of ‘‘breach’’ to include inadvertent disclosures of customer information and seek comment on adopting a harmbased trigger for breach notifications. We also propose to require carriers to notify the Commission, in addition to the Secret Service and FBI, as soon as practicable after discovery of a breach. We also propose to eliminate the mandatory waiting period before notifying customers and instead require carriers to notify customers of CPNI breaches without unreasonable delay after discovery of a breach unless law enforcement requests a delay. We also seek comment on whether we should adopt minimum requirements for the content of customer breach notices, and we seek comment on whether our rules should address breaches of other types of sensitive personal information beyond CPNI. Finally, we propose to make changes to our TRS data breach reporting rule consistent with those we propose to our CPNI breach reporting rule. 26. Should the Commission decide to modify existing rules or adopt new rules to strengthen our data breach reporting rule, such action could potentially result in increased, reduced, or otherwise modified recordkeeping, reporting, or other compliance requirements for affected providers of service. We seek comment on the effect of any proposals on small entities. Entities, especially small businesses, are encouraged to quantify the costs and benefits of any reporting, recordkeeping, or compliance requirement that may be established in this proceeding. E. Steps Taken To Minimize the Significant Economic Impact on Small Entities, and Significant Alternatives Considered 27. The RFA requires an agency to describe any significant alternatives that it has considered in reaching its proposed approach, which may include the following four alternatives (among others): (1) the establishment of differing compliance or reporting requirements or timetables that take into account the resources available to small PO 00000 Frm 00033 Fmt 4702 Sfmt 4702 entities; (2) the clarification, consolidation, or simplification of compliance and reporting requirements under the rules for such small entities; (3) the use of performance rather than design standards; and (4) an exemption from coverage of the rule, or any part thereof, for such small entities. 28. The document seeks comment on the particular impacts that the proposed rules may have on small entities. Specifically, the document seeks comment on whether there are unique concerns or compliance barriers for small carriers that make notice to customers without unreasonable delay unfeasible; if there should be different notification requirements for small carriers; if streamlining notice requirements will benefit small providers; if a centralized reporting portal would reduce compliance barriers for small providers; and if a threshold trigger would benefit small providers. F. Federal Rules That May Duplicate, Overlap, or Conflict With the Proposed Rules 29. None. IV. Ordering Clauses 30. Accordingly, it is ordered that, pursuant to Sections 1, 2, 4(i), 4(j), 201, 202, 222, 225, 303(b), 303(r), 332 of the Communications Act of 1934, as amended, 47 U.S.C. 151, 152, 154(i), 154(j), 201, 202, 222, 225, 303(b), 303(r), 332, this Notice of Proposed Rulemaking is adopted. 31. It is further ordered, that the Commission’s Consumer and Governmental Affairs Bureau, Reference Information Center, shall send a copy of this Notice of Proposed Rulemaking, including the Initial Regulatory Flexibility Analysis (IRFA), to the Chief Counsel for Advocacy of the Small Business Administration. List of Subjects in 47 CFR Part 64 Communications, Communications common carriers, Communications equipment, Individuals with disabilities, Reporting and recordkeeping requirements, Security measures, Telecommunications, Telephone. Federal Communications Commission. Marlene Dortch, Secretary. Proposed Rules For the reasons discussed in the preamble, the Federal Communications Commission proposes to amend 47 part 64 as follows: E:\FR\FM\23JAP1.SGM 23JAP1 Federal Register / Vol. 88, No. 14 / Monday, January 23, 2023 / Proposed Rules PART 64—MISCELLANEOUS RULES RELATING TO COMMON CARRIERS 1. The authority citation for part 64 continues to read as follows: ■ Authority: 47 U.S.C. 151, 152, 154, 201, 202, 217, 218, 220, 222, 225, 226, 227, 227b, 228, 251(a), 251(e), 254(k), 255, 262, 276, 403(b)(2)(B), (c), 616, 617, 620, 1401–1473, unless otherwise noted; Pub. L. 115–141, Div. P, sec. 503, 132 Stat. 348, 1091. Subpart U—Customer Proprietary Network Information 2. Amend § 64.2011 by revising paragraphs (a) through (e) to read as follows: ■ § 64.2011 Notification of customer proprietary network information security breaches. khammond on DSKJM1Z7X2PROD with PROPOSALS (a) A telecommunications carrier shall notify affected customers, the Federal Communications Commission (Commission), and other federal law enforcement of a breach of its customers’ CPNI as provided in this section. (b)(1) As soon as practicable after reasonable determination of a breach, a telecommunications carrier shall electronically notify the Commission, the United States Secret Service (USSS), and the Federal Bureau of Investigation (FBI) through a central reporting facility maintained by the Commission and made available on its website. (2) If a law enforcement or national security agency notifies the carrier that public disclosure or notice to customers would impede or compromise an ongoing or potential criminal investigation or national security, such agency may direct the carrier not to so disclose or notify for an initial period of up to 30 days. Such period may be extended by the agency as reasonably necessary in the judgment of the agency. If such direction is given, the agency shall notify the carrier when it appears that public disclosure or notice to affected customers will no longer impede or compromise a criminal investigation or national security. The agency shall provide in writing its initial direction to the carrier, any subsequent extension, and any notification that notice will no longer VerDate Sep<11>2014 15:57 Jan 20, 2023 Jkt 259001 impede or compromise a criminal investigation or national security. (c) Customer Notification. A telecommunications carrier shall notify affected customers of covered breaches of CPNI without unreasonable delay after discovery of the breach after notification to the Commission and law enforcement as described in paragraph (b) of this section. (d) Recordkeeping. All carriers shall maintain a record, electronically or in some other manner, of any breaches discovered, notifications made to the Federal Communications Commission, USSS, and the FBI pursuant to paragraph (b) of this section, and notifications made to customers. The record must include, if available, dates of discovery and notification, a detailed description of the CPNI that was the subject of the breach, and the circumstances of the breach. Carriers shall retain the record for a minimum of 2 years. (e) Definitions. As used in this section, a ‘‘breach’’ has occurred when a person, without authorization or exceeding authorization, has gained access to, used, or disclosed CPNI. * * * * * ■ 3. Amend § 64.5111 by revising paragraphs (a) through (e) to read as follows: § 64.5111 Notification of customer proprietary network information security breaches. (a) A TRS provider shall notify affected customers, the Federal Communications Commission (Commission), and other federal law enforcement of a breach of its customers’ CPNI as provided in this section. (b)(1) As soon as practicable after reasonable determination of a breach, a TRS provider shall electronically notify the Commission, the United States Secret Service (USSS), and the Federal Bureau of Investigation (FBI) through a central reporting facility maintained by the Commission and made available on its website. (2) If a law enforcement or national security agency notifies the TRS provider that public disclosure or notice to customers would impede or PO 00000 Frm 00034 Fmt 4702 Sfmt 9990 3965 compromise an ongoing or potential criminal investigation or national security, such agency may direct the TRS provider not to so disclose or notify for an initial period of up to 30 days. Such period may be extended by the agency as reasonably necessary in the judgment of the agency. If such direction is given, the agency shall notify the TRS provider when it appears that public disclosure or notice to affected customers will no longer impede or compromise a criminal investigation or national security. The agency shall provide in writing its initial direction to the TRS provider, any subsequent extension, and any notification that notice will no longer impede or compromise a criminal investigation or national security and such writings shall be contemporaneously logged on the same reporting facility that contains records of notifications filed by TRS provider. (c) Customer Notification. A TRS provider shall notify affected customers of covered breaches of CPNI without unreasonable delay after discovery of the breach after notification to the Commission and law enforcement as described in paragraph (b) of this section. (d) Recordkeeping. All TRS provider shall maintain a record, electronically or in some other manner, of any breaches discovered, notifications made to the Federal Communications Commission, USSS, and the FBI pursuant to paragraph (b) of this section, and notifications made to customers. The record must include, if available, dates of discovery and notification, a detailed description of the CPNI that was the subject of the breach, and the circumstances of the breach. TRS providers shall retain the record for a minimum of 2 years. (e) Definitions. As used in this section, a ‘‘breach’’ has occurred when a person, without authorization or exceeding authorization, has gained access to, used, or disclosed CPNI. * * * * * [FR Doc. 2023–00824 Filed 1–20–23; 8:45 am] BILLING CODE 6712–01–P E:\FR\FM\23JAP1.SGM 23JAP1

Agencies

[Federal Register Volume 88, Number 14 (Monday, January 23, 2023)]
[Proposed Rules]
[Pages 3953-3965]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2023-00824]


=======================================================================
-----------------------------------------------------------------------

FEDERAL COMMUNICATIONS COMMISSION

47 CFR Part 64

[WC Docket No. 22-21; FCC 22-102; FR 122866]


Data Breach Reporting Requirements

AGENCY: Federal Communications Commission.

ACTION: Proposed rule.

-----------------------------------------------------------------------

SUMMARY: In this document, the Federal Communications Commission 
(Commission) begins the process to update and strengthen its data 
breach rule to provide greater protections to the public. We propose to 
expand the Commission's definition of ``breach'' to include inadvertent 
disclosures of customer information and seek comment on adopting a 
harm-based trigger for breach notifications. We also propose to require 
carriers to notify the Commission, in addition to the Secret Service 
and FBI, as soon as practicable after discovery of a breach. We also 
propose to eliminate the mandatory waiting period before notifying 
customers and instead require carriers to notify customers of CPNI 
breaches without unreasonable delay after discovery of a breach unless 
requested by law enforcement. We also propose to make changes to our 
TRS data breach reporting rule consistent with those we propose to our 
CPNI breach reporting rule.

DATES: Comments are due on or before February 22, 2023, and reply 
comments are due on or before March 24, 2023. Written comments on the 
Paperwork Reduction Act proposed information collection requirements 
must be submitted by the public, Office of Management and Budget (OMB), 
and other interested parties on or before March 24, 2023.

ADDRESSES: You may submit comments, identified by WC Docket No. 22-21, 
by any of the following methods:
    [ssquf] Federal Communications Commission's Website: https://apps.fcc.gov/ecfs/. Follow the instructions for submitting comments.
    [ssquf] People with Disabilities: Contact the FCC to request 
reasonable accommodations (accessible format documents, sign language 
interpreters, CART, etc.) by email: [email protected] or phone: 202-418-
0530 or TTY: 202-418-0432.
    For detailed instructions for submitting comments and additional 
information on the rulemaking process, see the SUPPLEMENTARY 
INFORMATION section of this document. In addition to filing comments 
with the Secretary, a copy of any comments on the Paperwork Reduction 
Act proposed information collection requirements contained herein 
should be submitted to the Federal Communications Commission via email 
to [email protected] and to Nicole On'gele, FCC, via email to 
[email protected].

FOR FURTHER INFORMATION CONTACT: Melissa Kirkel, Competition Policy 
Division, Wireline Competition Bureau, at (202) 418-7958, 
[email protected]. For additional information concerning the 
Paperwork Reduction Act information collection requirements contained 
in this document, send an email to [email protected] or contact Nicole 
On'gele at (202) 418-2991.

SUPPLEMENTARY INFORMATION: This is a summary of the Commission's Notice 
of Proposed Rulemaking in WC Docket No. 22-21, adopted on December 29, 
2022 and released on January 6, 2023. The full text of this document is 
available at https://docs.fcc.gov/public/attachments/FCC-22-102A1.pdf. 
To request materials in accessible formats for people with disabilities 
(e.g., Braille, large print, electronic files, audio format, etc.) or 
to request reasonable accommodations (e.g., accessible format 
documents, sign language interpreters, CART, etc.), send an email to 
[email protected] or call the Consumer & Governmental Affairs Bureau at 
(202) 418-0530.
    Pursuant to Sections 1.415 and 1.419 of the Commission's rules, 47 
CFR 1.415, 1.419, interested parties may file comments and reply 
comments on or before the dates indicated on the first page of this 
document. Comments may be filed using the Commission's Electronic 
Comment Filing System (ECFS). See Electronic Filing of Documents in 
Rulemaking Proceedings, 63 FR 24121 (1998).
     Electronic Filers: Comments may be filed electronically 
using the internet by accessing the ECFS: https://apps.fcc.gov/ecfs/.
     Paper Filers: Parties who choose to file by paper must 
file an original and one copy of each filing.
     Filings can be sent by commercial overnight courier, or by 
first-class or overnight U.S. Postal Service mail. All filings must be 
addressed to the Commission's Secretary, Office of the Secretary, 
Federal Communications Commission.
     Commercial overnight mail (other than U.S. Postal Service 
Express Mail and Priority Mail) must be sent to 9050 Junction Drive, 
Annapolis Junction, MD 20701. U.S. Postal Service first-class, Express, 
and Priority mail must be addressed to 45 L Street NE, Washington, DC 
20554.
     Effective March 19, 2020, and until further notice, the 
Commission no longer accepts any hand or messenger delivered filings. 
This is a temporary measure taken to help protect the health and safety 
of individuals, and to mitigate the transmission of COVID-19. See FCC 
Announces Closure of FCC Headquarters Open Window and Change in Hand-
Delivery Policy, Public Notice, DA 20-304 (March 19, 2020). https://www.fcc.gov/document/fcc-closes-headquarters-open-window-and-changes-hand-delivery-policy.
    The proceeding this document initiates shall be treated as a 
``permit-but-disclose'' proceeding in accordance with the Commission's 
ex parte rules. Persons making ex parte presentations must file a copy 
of any written presentation or a memorandum summarizing any oral 
presentation within two business days after the presentation (unless a 
different deadline applicable to the Sunshine period applies). Persons 
making oral ex parte presentations are reminded that memoranda 
summarizing the presentation must (1) list all persons attending or 
otherwise participating in the meeting at which the ex parte 
presentation was made, and (2) summarize all data presented and 
arguments made during the presentation. If the presentation consisted 
in whole or in part of the presentation of data or arguments already 
reflected in the presenter's written comments, memoranda or other 
filings in the proceeding, the presenter may provide citations to such 
data or arguments in his or her prior comments, memoranda, or other 
filings (specifying the relevant page and/or paragraph numbers where 
such data or arguments can be found) in lieu of summarizing them in the 
memorandum. Documents shown or given to Commission staff during ex 
parte meetings are deemed to be written ex parte presentations and must 
be filed consistent with rule 1.1206(b). In proceedings governed by 
rule 1.49(f) or for which the Commission has made available a method of 
electronic filing, written ex parte presentations and memoranda 
summarizing oral ex parte presentations, and all attachments thereto, 
must be filed through the electronic comment filing system available 
for that proceeding, and must be filed in their native format (e.g., 
.doc, .xml, .ppt, searchable .pdf). Participants in this proceeding 
should familiarize

[[Page 3954]]

themselves with the Commission's ex parte rules.
    This document contains proposed information collection 
requirements. The Commission, as part of its continuing effort to 
reduce paperwork burdens, invites the general public and the Office of 
Management and Budget (OMB) to comment on the information collection 
requirements contained in this document, as required by the Paperwork 
Reduction Act of 1995, Public Law 104-13. Public and agency comments 
are due March 24, 2023.
    Comments should address: (a) whether the proposed collection of 
information is necessary for the proper performance of the functions of 
the Commission, including whether the information shall have practical 
utility; (b) the accuracy of the Commission's burden estimates; (c) 
ways to enhance the quality, utility, and clarity of the information 
collected; (d) ways to minimize the burden of the collection of 
information on the respondents, including the use of automated 
collection techniques or other forms of information technology; and (e) 
way to further reduce the information collection burden on small 
business concerns with fewer than 25 employees. In addition, pursuant 
to the Small Business Paperwork Relief Act of 2002, Public Law 107-198, 
see 44 U.S.C. 3506(c)(4), we seek specific comment on how we might 
further reduce the information collection burden for small business 
concerns with fewer than 25 employees.

Synopsis

I. Notice of Proposed Rulemaking

    1. To better protect telecommunications customers and ensure that 
our rules keep pace with today's challenges, we propose a number of 
updates to our rule addressing telecommunications carriers' breach 
notification duties. We seek to ensure that affected customers, the 
Commission, and other federal law enforcement agencies receive the 
information they need in a timely manner so they can mitigate and 
prevent harm due to the breach and take action to deter future 
breaches. To identify best practices and to minimize burdens, we look 
to other federal and state breach laws as potential models for our 
rules.
    2. We propose to expand the Commission's definition of ``breach'' 
to include inadvertent disclosures of customer information and seek 
comment on adopting a harm-based trigger for breach notifications. We 
also propose to require carriers to notify the Commission, in addition 
to the Secret Service and FBI, as soon as practicable after discovery 
of a breach. We also propose to eliminate the mandatory waiting period 
before notifying customers and instead require carriers to notify 
customers of CPNI breaches without unreasonable delay after discovery 
of a breach unless requested by law enforcement. We also seek comment 
on whether we should adopt minimum requirements for the content of 
customer breach notices. We also evaluate and seek comment on the 
impact of the Congressional disapproval of the 2016 Privacy Order on 
the Commission's legal authority to issue the rules proposed herein for 
telecommunications carriers. Finally, we propose to make changes to our 
TRS data breach reporting rule consistent with those we propose to our 
CPNI breach reporting rule.

A. Defining ``Breach''

    3. Inadvertent Disclosures. We propose to expand the Commission's 
definition of ``breach'' to include inadvertent access, use, or 
disclosures of customer information and seek comment on our proposal. 
Our current rule, adopted in response to the practice of pretexting, 
defines a ``breach'' as ``when a person, without authorization or 
exceeding authorization, has intentionally gained access to, used, or 
disclosed CPNI.'' While the practice of pretexting necessarily involves 
an intent to gain access to customer information, the intervening years 
since the adoption of our existing rule have demonstrated that the 
inadvertent exposure of customer information can result in the loss and 
misuse of sensitive information by scammers and phishers, and trigger a 
need to inform the affected individuals so that they can take 
appropriate steps to protect themselves and their information. Further, 
whether or not a breach was intentional may not always be immediately 
apparent, which may lead to legal ambiguity and under-reporting. We 
also believe that it is important that the Commission and law 
enforcement be made aware of any accidental access, use, or disclosures 
so that we can (1) investigate and advise carriers on how best to avoid 
future breaches, and (2) stand ready to investigate if and when any of 
the affected information falls prey to malicious actors. We anticipate 
that requiring notification for accidental breaches will encourage 
telecommunications carriers to adopt stronger data security practices 
and will help us identify and confront systemic network 
vulnerabilities. Do commenters agree with the foregoing analysis? Are 
there other policy factors the Commission should consider in 
determining whether to require disclosure for unintentional breaches? 
What are the benefits and burdens associated with this proposal? We 
note that state data breach laws overwhelmingly do not include an 
intent limitation, and we seek comment on how state and other federal 
data breach laws should influence the policy we adopt.
    4. We seek comment on the impact of requiring reporting of 
accidental breaches on the number of reported breaches. Do commenters 
foresee a significant increase in the number of reported breaches? If 
so, how would our proposal affect reporting costs for 
telecommunications carriers and is that burden outweighed by the 
benefits to customers, who may need to take actions to protect their 
personal and financial information whether or not the breach was 
intentional? Would removing the intentionality limit potentially risk 
over-notification of data breaches to customers? What would the impacts 
of over-notification be? Would the potential benefits outweigh any 
potential harm? To help us assess the burden to both carriers and 
consumers from requiring reporting of accidental breaches, we invite 
commenters to provide estimates on the total number of breaches they 
have detected over the past few years, as well as the number of people 
affected by those breaches, and the severity of the compromised CPNI.
    5. We propose to revise our definition to define a breach as any 
instance in which a person, without authorization or exceeding 
authorization, has gained access to, used, or disclosed CPNI. We seek 
comment on this proposal and other possible definitions. Should we 
retain the intent limitation in certain contexts? If so, what contexts 
and why? With only a few exceptions, the vast majority of state 
statutes include a provision exempting from the definition of breach a 
good-faith acquisition of covered data by an employee or agent of the 
company where such information is not used improperly or further 
disclosed. Should we include such an exemption in our definition of 
``breach'' or is such a provision unnecessary or otherwise inadvisable? 
Is our proposed rule sufficient to capture all instances in which 
persons, either purposefully or inadvertently, gain access to, use, or 
disclose CPNI? If not, how should we revise our proposed rule to ensure 
that it does? We also seek comment on whether we should expand the 
definition of a breach to include situations where a telecommunications 
carrier or a third party discovers

[[Page 3955]]

conduct that could have reasonably led to exposure of customer CPNI, 
even if it has not yet determined if such exposure occurred.
    6. Harm-Based Notification Trigger. We seek comment on whether to 
forego requiring notification to customers or law enforcement of a 
breach in those instances where a telecommunications carrier can 
reasonably determine that no harm to customers is reasonably likely to 
occur as a result of the breach. Our current rule requires no showing 
of harm, instead requiring that notification be furnished in every 
instance where a breach of a carrier's customers' CPNI has occurred, 
where such breach is defined as any instance when ``a person, without 
authorization or exceeding authorization, has intentionally gained 
access to, used, or disclosed CPNI.''
    7. We seek comment on the benefits and drawbacks of adopting a 
``harm-based'' notification trigger. How would it impact consumers? 
Would it benefit consumers by avoiding confusion and ``notice fatigue'' 
with respect to breaches that are unlikely to cause harm? Recognizing 
that it is not only distressing, but time consuming and expensive, to 
deal with the fallout of a data breach, we seek comment on whether a 
harm-based notification trigger could save consumers the time, effort, 
and financial difficulty of changing their passwords, purchasing fraud 
alerts or credit monitoring, and freezing their credit in the wake of a 
breach that is not reasonably likely to result in harm. Alternatively, 
does a harm-based notification trigger risk that consumers would be 
unaware of important information regarding their CPNI? We note that a 
harm-based trigger has a basis in data breach notification frameworks 
employed by states, which generally do not require covered entities to 
notify customers of breaches when a determination is made that the 
breach is unlikely to cause harm. How should state and other data 
breach laws influence our analysis?
    8. We also seek comment on the potential impacts of adopting a 
harm-based trigger on telecommunications carriers. Would a harm-based 
trigger allow carriers to better focus their resources on data security 
and ameliorating the harms caused by data breaches? Or to the contrary, 
would a harm-based trigger require carriers to unnecessarily expend 
resources determining whether particular breaches are reasonably likely 
to cause harm instead of more efficiently providing notice?
    9. If we adopt a harm-based trigger, how should telecommunications 
carriers and the Commission determine the likelihood of misuse or harm? 
Should we identify a standard or set of factors that telecommunications 
carriers must consider to evaluate whether no harm to customers is 
reasonably likely? If so, what factors should carriers consider in 
making their evaluation? We preliminarily believe that no single factor 
on its own (e.g., basic encryption) is sufficient to make a 
determination regarding harm to customers. Do commenters agree? Do 
carriers have sufficient expertise and experience to determine whether 
a breach is likely to result in harm? Should we establish a rebuttable 
presumption of consumer harm unless and until a carrier demonstrates 
that no harm to consumers is reasonably likely to occur as a result of 
a breach?
    10. We seek comment on whether we should clarify the definition of 
``misuse'' or ``harm.'' For example, should we construe ``harm'' 
broadly to encompass not only financial, but also physical and 
emotional harm, including reputational damage, personal embarrassment, 
and loss of control over the exposure of intimate personal details? 
Should we require telecommunications carriers to consider whether other 
information about the customers that may be available combined with 
CPNI could result in harm when determining whether notification is 
required? Should any harm-based trigger apply even where the data 
breached is encrypted? What are the potential enforcement and 
compliance implications associated with this approach? Should breaches 
without such ``harm'' be reported to the Commission even if not 
reported to customers? Should we require the carrier to consult with 
federal law enforcement and/or the Commission prior to determining that 
there is no reasonable likelihood of harm or misuse? We seek comment on 
whether there are other triggers we should consider for which notice 
would be unnecessary, such as the number of affected consumers or the 
length of time exposure occurred. Are there other factors that we 
should consider before requiring breach notifications? Should we adopt 
a harm-based trigger only if we require notices of unintentional 
breaches, or should we evaluate the two issues independently? We also 
seek comment on the current notification practices in the industry. How 
do carriers currently make decisions regarding whether to notify 
customers and law enforcement of a breach?
    11. We seek comment on whether any harm-based notification trigger 
should apply to both notifications to customers and notifications to 
law enforcement. While there are legitimate reasons to consider 
eliminating notifications to customers in those instances where a 
breach is not reasonably likely to result in harm--including reducing 
confusion, stress, financial hardship, and notice fatigue--can the same 
be said of notifications to law enforcement? Are there compelling 
reasons for carriers to continue notifying law enforcement of data 
breaches even where such breaches are not reasonably likely to result 
in consumer harm? Do the benefits of notifying law enforcement of all 
breaches, regardless of whether the breach is likely to result in harm, 
outweigh the attendant costs to carriers of providing such notice?
    12. We propose that if we adopt a harm-based trigger, where a 
carrier is unable to make a determination regarding harm or is 
uncertain whether harm is likely to occur, the obligation to notify 
would remain. We seek comment on this proposal.
    13. We also recognize that telecommunications carriers possess 
proprietary information other than CPNI that customers have an interest 
in protecting from public exposure, such as Social Security Numbers and 
financial records. We seek comment on the Commission's authority to 
establish breach-reporting obligations for this type of information 
under Section 222, to the extent that this information is obtained by a 
telecommunications carrier in its activity as a common carrier. We also 
seek comment on the role of the Commission in protecting such 
information in light of the existing role of other agencies, including 
the FTC and Cybersecurity and Infrastructure Security Agency (CISA). If 
we were to require telecommunications carriers to report breaches of 
proprietary information other than CPNI under Section 222(a), how 
broadly or narrowly should we define that category of information? If 
we were to extend our data breach rule to cover such information, how 
could we minimize duplicative reporting obligations from the FTC and 
CISA?

B. Notifying the Commission and Other Federal Law Enforcement of Data 
Breaches

    14. Commission Notification. We propose to require 
telecommunications carriers to notify the Commission of breaches, in 
addition to the Secret Service and FBI, as soon as practicable, and 
seek comment on our proposal. Our proposal is consistent with other 
federal sector-specific laws, which require prompt notification to the 
relevant subject-matter agency. For example, both HIPAA and the Health 
Breach

[[Page 3956]]

Notification Rule require notice to the department of Health and Human 
Services (HHS) and the FTC respectively. We seek comment on the 
benefits and costs of requiring notification to the Commission in 
addition to notifying the Secret Service and the FBI, as our existing 
rules require.
    15. As discussed above, the Commission adopted its existing data 
breach rule to address concerns regarding pretexting practices. The 
Commission found that notifying law enforcement of CPNI breaches is 
consistent with the goal of protecting CPNI because it enables law 
enforcement to investigate the breach, ``which could result in legal 
action against the perpetrators, thus ensuring that they do not 
continue to breach CPNI.'' Moreover, the Commission anticipated that 
law enforcement investigations into how breaches occurred would enable 
law enforcement to advise the carrier and the Commission to take steps 
to prevent future breaches of that kind. However, as we have seen in 
the years since our data breach rule was initially adopted, not all 
breaches of customer data are the result of criminal pretexting, which 
was Commission's sole focus in 2007. Large-scale security breaches can 
also be the result of lax or inadequate data security practices and 
employee training. Thus, we tentatively conclude that notification of 
breaches will provide Commission staff important information about data 
security vulnerabilities that Commission staff can help address and 
remediate. We anticipate that breach notification to the Commission 
will also shed light on carriers' ongoing compliance with our rules. We 
seek comment on these tentative conclusions. How much of an incremental 
burden is associated with notifying the Commission of data breaches as 
compared to the existing data breach notification requirement for the 
Secret Service and FBI? Are there any other government entities to 
which we should require data breach reporting, such as the FTC? What 
would be the benefits and burdens of doing so?
    16. Method of Notification. We propose that the Commission create 
and maintain a centralized portal for reporting breaches to the 
Commission and other federal law enforcement agencies, and we seek 
comment on our proposal. Our current breach notification rule requires 
that telecommunications carriers notify the FBI and Secret Service 
``through a central reporting facility'' to which the Commission 
maintains a link on its website. We believe that the creation and 
operation by the Commission of a centralized reporting facility for 
reporting of breaches to the Commission, Secret Service, and FBI will 
streamline the notification process and improve federal coordination. 
Do commenters agree? Are there alternative mechanisms for breach 
reporting to the Commission and other federal law enforcement that we 
should consider instead, such as leveraging the existing central 
reporting facility? Are there existing notification resources that we 
can leverage? For example, could we leverage the CISA Incident 
Reporting System to minimize burdens on carriers?
    17. We seek comment on how we can minimize data breach reporting 
burdens for telecommunications carriers. The recently-passed Cyber 
Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) 
requires covered entities to notify CISA of cyber security incidents 
and establishes an interagency Cyber Incident Reporting Council 
intended to streamline interagency cyber incident reporting. When 
implemented, CIRCIA will require covered entities to report 
cybersecurity incidents to CISA, except where covered entities ``by 
law, regulation, or contract'' are already required to report 
``substantially similar information to another Federal agency within a 
substantially similar timeframe,'' in which case the other agency will 
report the incident to CISA. To the extent that a breach of CPNI is a 
result of a cyber incident, we seek comment on whether there are any 
modifications to our proposed rules that would minimize potential 
duplicate reporting of such breaches.
    18. Contents. We seek comment on applying our existing requirements 
regarding the contents of the data breach notification to federal law 
enforcement agencies to breaches reported to the Commission. Generally, 
the central reporting facility requires carriers to report information 
relevant to the breach, including carrier contact information; a 
description of the breach incident; the method of compromise; the date 
range of the incident, approximate number of customers affected; an 
estimate of financial loss to the carriers and customers, if any; types 
of data breached; and the addresses of affected customers. We believe 
that the information currently submitted through the FBI/Secret Service 
reporting facility is largely sufficient, and that generally the same 
information should be reported under the rule we propose here. Do 
commenters agree? Are there any additional or alternative categories of 
information that should be included in these disclosures? For example, 
should we require telecommunications carriers to report, at a minimum, 
the information required under CIRCIA with the aim of minimizing 
potentially duplicate reporting requirements? Should we curtail or 
streamline any of the existing content requirements? For example, 
should we eliminate the requirement that carriers report the addresses 
of affected individuals to law enforcement and the Commission, to 
minimize the personal information reported to the Commission and law 
enforcement?
    19. Timeframe. We seek comment on the appropriate timeframe for 
notifying the Commission and other federal law enforcement of a breach. 
Our current rule requires telecommunications carriers to notify the 
Secret Service and the FBI of all breaches of CPNI no later than seven 
business days after reasonable determination of the breach. We propose 
to require carriers to notify the Commission of a reportable breach 
contemporaneously with notification to other law enforcement agencies 
as soon as practicable after discovery of a breach. We believe that 
requiring carriers to notify the Commission, Secret Service, and FBI at 
the same time will minimize burdens on carriers, eliminate confusion 
regarding obligations, and streamline the reporting process, allowing 
carriers to free up resources that can be used to address the breach 
and prevent further harm. We seek comment on our proposal. Is ``as soon 
as practicable after discovery of a breach'' an appropriate timeframe 
for notifying law enforcement after reasonable determination of a CPNI 
breach? Or, should we maintain the current ``no later than seven 
business days'' standard? Is there an alternative timeframe we should 
adopt for reporting CPNI breaches to the Commission and other federal 
law enforcement such as 24 hours or 72 hours as has been proposed in 
other contexts, or should we consider adopting a graduated timeframe? 
We also seek comment on whether we should clarify when a carrier should 
be treated as having ``reasonably determined'' that a breach has 
occurred. Should a carrier be held to have ``reasonably determined'' a 
breach has occurred when it has information indicating that it is more 
likely than not that there was a breach? Should we publish guidance on 
what constitutes a reasonable determination? Should we adopt a more 
definite standard?
    20. Threshold Trigger. We seek comment on whether it is appropriate 
to set a threshold for the number of customers affected to require a 
breach report to the Commission, Secret

[[Page 3957]]

Service, and/or FBI. We observe that breaches affecting smaller numbers 
of customers may not necessitate the same law enforcement attention as 
larger breaches because they may be less likely to reflect coordinated 
attacks on CPNI. Under our current rule, telecommunications carriers 
must notify federal law enforcement of all reportable breaches, 
regardless of the number of customers affected. Setting a threshold for 
the number of customers affected for breach reporting to the Secret 
Service and FBI could reduce the administrative burdens on carriers and 
law enforcement agencies from excessive reporting, and is consistent 
with many state statutes requiring notice to state law enforcement 
authorities, which require law enforcement notification of large 
breaches.
    21. At the same time, establishing a threshold may limit our and 
our federal partners' abilities to remediate, investigate, and deter 
smaller breaches. Further, as the Commission has previously found, 
notification of all breaches could allow the Commission and federal law 
enforcement to be ``better positioned than individual carriers to 
develop expertise about the methods and motives associated with CPNI 
breaches.'' Is this still the case, given the development of data 
breach law and practices since 2007? Should we adopt a threshold for 
reporting to federal law enforcement? If so, should the threshold be 
the same for the Commission as for federal law enforcement? If not, how 
should the threshold differ? What would be an appropriate threshold for 
reporting? Most states that adopt a threshold for reporting to law 
enforcement or government agencies require reporting at 250, 500, or 
1000 individuals affected. What reporting threshold would meet the 
needs of law enforcement and provide adequate safeguards? What are the 
benefits and drawbacks of setting a threshold, particularly for small 
carriers? If we adopt a threshold trigger, should we require carriers 
to maintain a record of smaller breaches that fall below the threshold 
and report such small breaches to the Commission in a report at the end 
of the year? What are the benefits and drawbacks to such an approach? 
Rather than a numerical threshold, should we instead consider requiring 
carriers to report only intentional breaches to law enforcement, but to 
report all breaches, whether intentional or inadvertent, to the 
Commission?

C. Customer Notification

    22. Notifying Customers of Data Breaches without Unreasonable 
Delay. We propose to require telecommunications carriers to notify 
customers of CPNI breaches without unreasonable delay after discovery 
of a breach and notification to law enforcement, unless law enforcement 
requests a delay. We seek comment on our proposal. Our existing data 
breach rule prohibits telecommunications carriers from notifying 
customers or disclosing the breach to the public until at least seven 
full business days after notification to the Secret Service and FBI. In 
cases where a carrier believes that there is an extraordinarily urgent 
need to notify affected customers in order to avoid immediate and 
irreparable harm, our rules permit carriers to notify affected 
customers after consultation with relevant investigating agencies. In 
adopting the existing rule, the Commission concluded that once 
customers have been notified, a breach may become public knowledge, 
``thereby impeding law enforcement's ability to investigate the breach, 
identify the perpetrators, and determine how the breach occurred.'' In 
short, the Commission found, ``immediate customer notification may 
compromise all the benefits of requiring carriers to notify law 
enforcement of CPNI breaches,'' and therefore a short delay was 
warranted.
    23. We tentatively conclude that this existing approach is out-of-
step with current approaches regarding the urgency of notifying victims 
about breaches of their personal information. We tentatively conclude 
that our proposal better serves the public interest than our current 
rule because it increases the speed at which customers may receive the 
important information contained in a notice, except in those specific 
circumstances when law enforcement officials specifically request 
otherwise. We seek comment on our tentative conclusion. What are the 
benefits and drawbacks to such an approach? Is there any reason to 
maintain our current absolute bar to customer notification for a set 
period? Does our proposal to eliminate the seven business-day waiting 
period before notifying customers appropriately balance legitimate law 
enforcement needs with the customers' need to take action to timely 
protect their information after a breach? We seek comment on whether a 
``without unreasonable delay'' notification requirement would allow 
carriers enough time to determine the scope and impact of a breach. 
Would prompt customer notification compromise a carrier's ability to 
discover the source of the breach, mitigate the loss of data, and 
ensure further data is not compromised?
    24. Our proposed requirement is consistent with many existing data 
breach notification laws that require expedited notice but refrain from 
requiring a specific timeframe. For example, the GLBA requires customer 
notification ``as soon as possible'' after a determination that 
customer information has been misused. California law requires 
notification ``be made in the most expedient time possible and without 
unreasonable delay, consistent with the legitimate needs of law 
enforcement.'' Similarly, many state data breach statutes impose an 
``expeditiously as practicable'' or ``without unreasonable delay'' 
standard instead of a set time limit for reporting. In addition, FTC 
guidance on addressing data breaches explains that ``if you quickly 
notify people that their personal information has been compromised, 
they can take steps to reduce the chance that their information will be 
misused.'' How should state and other federal law influence the 
approach we adopt?
    25. We seek comment on whether requiring notice to customers 
``without unreasonable delay'' after discovery of a breach provides 
sufficient guidance as to the required timeframe to notify customers. 
Should we adopt a different approach, such as a fixed number of days 
for notification, and if so what should we adopt? If we were to adopt a 
``without unreasonable delay'' standard, we seek comment on whether we 
should provide guidance on a specific time period that would be 
considered ``reasonable'' for notification. For example, HIPAA requires 
notification to individuals ``without unreasonable delay and in no case 
later than 60 calendar days after discovery of a breach.'' The Health 
Breach Notification Rule also requires notification to individuals 
``without unreasonable delay and in no case later than 60 days after 
the discovery of a breach of security.'' Most states that impose an 
outside limit on when consumers must be notified of a breach require 
notification to affected consumers no later than 30, 45, or 60 days 
after discovery of a breach. What are the benefits and drawbacks to 
setting a definite time limit on notification while requiring 
notification without unreasonable delay?
    26. We also seek comment on whether the same notification deadline 
should be applied to all carriers. Are there unique concerns or 
compliance barriers for small carriers that make prompt

[[Page 3958]]

response unfeasible, such as resource availability or reliance on 
third-party cybersecurity services for breach detection? Should we 
adopt different notification requirements for small carriers? If so, 
what threshold should we establish for small carriers? Should we 
consider establishing any other exceptions to this proposed 
requirement? We also seek comment on whether we should take into 
consideration the scope of the breach, e.g., how many customers are 
affected, the type of information breach, in determining the 
appropriate timeframe for customer breach reporting.
    27. We seek comment on how best to coordinate the timing of 
customer notification and federal law enforcement notification. Our 
current rule, providing for consecutive rather than simultaneous 
notification of federal law enforcement and customers, was adopted at 
the request of federal law enforcement. Is such an approach still 
necessary? Are there circumstances where it would be acceptable for 
carriers to notify customers and law enforcement simultaneously in 
certain instances? Given that nearly all, if not all, state data breach 
statutes subject the timing of customer notification to legitimate law 
enforcement needs, we seek comment on whether it is necessary to 
provide any further guidance to help coordinate the timing of notice to 
customers with notice to the Commission and other federal law 
enforcement.
    28. In addition, consistent with our current rules implementing 
Section 222, our proposed rules would allow a federal agency to direct 
a carrier to delay customer notification for an initial period of up to 
30 days if such notification would interfere with a criminal 
investigation or national security. In circumstances when a carrier 
reasonably decides to consult with law enforcement, a short delay 
pending such consultation would likely be reasonable for purposes of a 
``without unreasonable delay'' standard for customer notification. We 
seek comment on this proposal. We observe that HIPAA, the GLBA, and the 
Health Breach Notification Rules allow for a delay of customer 
notification if law enforcement determines notification to customers 
would ``impede a criminal investigation or cause damage to national 
security,'' but only if law enforcement officials request such a delay. 
Both HIPAA and the Health Breach Notification Rule allow notification 
delays of up to 30 days if requested by law enforcement. Similarly, 
GLBA allows that ``customer notice may be delayed if an appropriate law 
enforcement agency determines that notification will interfere with a 
criminal investigation and provides the institution with a written 
request for a delay.'' Likewise, most, if not all, states permit delays 
in notifying affected consumers for legitimate law enforcement needs. 
We tentatively conclude that our proposal strikes an appropriate 
balance between the needs of law enforcement to have time to 
investigate criminal activity and the needs of customers to be notified 
of data breaches. Do commenters agree? We also observe that these other 
regimes appear to allow non-federal law enforcement to request a delay, 
whereas the Commission's rule currently allows only federal agencies to 
so request. Should our rule also allow carriers to delay notification 
upon request of non-federal law enforcement?
    29. Contents of Customer Breach Notification. We seek comment on 
whether we should require customer breach notifications to include 
specific minimum categories of information. Our current rules specify 
when and to whom breach notifications must be made, but do not address 
the content of such notifications. In adopting the current breach 
notification rules, the Commission declined to specify the precise 
content of the notice that must be provided to customers in the event 
of a security breach of CPNI, ``leav[ing] carriers the discretion to 
tailor the language and method of notification to the circumstances.'' 
Nearly 15 years later, we now seek comment on whether it is appropriate 
to require a minimum amount of information to ensure that such data 
breach notifications contain actionable information that is useful to 
the consumer. We seek comment on the benefits to customers and carriers 
of requiring carriers to include minimum categories of information in 
customer data breach notices. Will having minimum consistent fields of 
information assist consumers in understanding the circumstances and 
nature of the breach and streamline notice practices for carriers? What 
are the drawbacks to doing so? Are there any legal barriers to adopting 
a rule that prescribes the minimum categories of information in these 
breach notices?
    30. To so identify possible categories of information to require, 
we look to numerous state data breach statutes as well as existing 
federal guidance regarding data breach notices. All 50 states, the 
District of Columbia, Guam, Puerto Rico, and the Virgin Islands have 
laws requiring private or governmental entities to notify individuals 
of breaches involving their personal information. Of these, many impose 
minimum content requirements on the notifications that must be 
transmitted to affected individuals in the wake of a data breach, 
including: the name and contact information for the entity reporting 
the breach; the date, estimated date, or estimated date range of the 
breach; a description of the breach incident; a description of the 
personally identifiable information that was used, disclosed, or 
accessed, or reasonably believed to have been used, disclosed, or 
accessed; any actions the entity is taking to remedy the situation and/
or protect affected individuals; a brief list of steps that affected 
consumers can take to protect themselves and their information, such as 
contacting credit bureaus to ask that fraud alerts or credit freezes be 
placed on their credit reports; and contact information for the FTC and 
any federal agency that assists consumers with matters of identity 
theft. Similarly, both the HIPAA Breach Notification Rule and guidance 
issued by the Federal Deposit Insurance Corporation (FDIC) in response 
to the GLBA impose minimum content requirements on data breach 
notifications. In its Data Breach Response Guide, the FTC advises 
companies on specific information that should be included in their 
breach notices to individuals, including describing what the company 
knows about the breach (how it happened, what information was taken, 
how the thieves have used the information (if known), what actions the 
company has taken to remedy the situation, what actions the company is 
taking to protect individuals, how to reach the relevant contact in the 
organization); the steps individuals can take, given the type of 
information exposed, and provide relevant contact information; current 
information about how to recover from identity theft; information about 
the law enforcement agency working on the case, if the law enforcement 
agency agrees that would help; encouraging people who discover that 
their information has been misused to report it to the FTC; and 
describing how the company will contact consumers in the future to help 
victims avoid phishing scams.
    31. We seek comment on adapting these models to telecommunications 
carriers and requiring carriers to include, at a minimum, the following 
information in security breach notices to customers: (1) the date of 
the breach; (2) a description of the customer information that was 
used, disclosed, or accessed; (3) information on how customers, 
including customers with disabilities, can contact the carrier to

[[Page 3959]]

inquire about the breach; (4) information about how to contact the 
Commission, FTC, and any state regulatory agencies relevant to the 
customer and the service; (5) if the breach creates a risk of identity 
theft, information about national credit reporting agencies and the 
steps customers can take to guard against identity theft, including any 
credit monitoring, credit reporting, or credit freezes the carrier is 
offering to affected customers; and (6) what other steps customers 
should take to mitigate their risk based on the specific categories of 
information exposed in the breach. Are the identified categories the 
correct information to be included in data breach notices? Should we 
consider requiring any additional or alternative categories of 
information that carriers must include in customer breach notices? For 
example, would it be helpful to include a statement of whether the 
notification was delayed due to reporting requirements to law 
enforcement or a law enforcement investigation, and if so, the length 
of the delay to help explain to customers the time lapse between 
discovery of the breach and customer notification? Should we require 
notifications to include a list of the law enforcement and government 
entities that have been notified of the breach? Should we require 
carriers to include a brief description of how the carrier will contact 
consumers in the future regarding the breach to help consumers avoid 
phishing scams related to breaches? What are best practices for 
providing consumers with actionable information in a breach 
notification? We seek comment on what minimum required information 
appropriately balances empowering consumers to take the necessary steps 
to protect themselves and their information in the wake of a data 
breach and appropriately limiting burdens on telecommunications 
carriers. We also seek comment on whether adopting or adapting a set of 
existing notification contents requirements will help to create a 
measure of consistency across breach notifications and will benefit 
both consumers and carriers, particularly smaller carriers, by 
streamlining the manner and content of their response in the event of a 
data breach.
    32. Method of Customer Breach Notification. We observe that many 
state regulations specify the form that notifications to customers may 
take, whether by physical mail, email, or telephone. We seek comment on 
whether we should adopt a similar requirement and, if so, on what form 
notifications to consumers should take. Is there a method or methods of 
notification that would make the most sense or be most beneficial to 
consumers? What are the benefits and burdens of imposing such a 
requirement?

D. TRS Breach Reporting

    33. In 2013, the Commission adopted CPNI rules applicable to all 
forms of Telecommunications Relay Services (TRS), as well as to point-
to-point video calls handled over the video relay services (VRS) 
network. The Commission found that ``for TRS to be functionally 
equivalent to voice telephone services, consumers with disabilities who 
use TRS are entitled to have the same assurances of privacy as do 
consumers without disabilities for voice telephone services.'' The CPNI 
rules for TRS include a breach notification rule that is equivalent to 
Sec.  64.2011 in terms of the substantive protection provided to TRS 
users. The texts of the two provisions are virtually identical, except 
for the substitution of the term ``TRS provider'' for 
``telecommunications carrier'' in Sec.  64.5111. The only substantive 
difference is that under the TRS rule, after a TRS provider notifies 
law enforcement of a breach, it ``shall file a copy of the notification 
with the Disability Rights Office of the Consumer and Governmental 
Affairs Bureau at the same time as when the TRS provider notifies the 
customers.''
    34. To maintain functional equivalency for TRS users, we propose to 
amend Sec.  64.5111 so that it continues to provide equivalent privacy 
protection for TRS users. The amendments we propose for Sec.  64.5111 
are thus essentially the same as those proposed for users of 
telecommunications and interconnected VoIP services. That is, we 
propose: (1) to expand the Commission's definition of ``breach'' to 
include inadvertent disclosures of customer information; (2) to require 
TRS providers to notify the Commission, in addition to the Secret 
Service and FBI, as soon as practicable after discovery of a breach; 
and (3) to eliminate the mandatory waiting period to notify customers, 
instead requiring TRS providers to notify customers of CPNI breaches 
without unreasonable delay after discovery of a breach unless law 
enforcement requests a delay. Further, we seek comment on the following 
additional issues, raised above regarding Sec.  64.2011, as they relate 
to TRS providers: (1) whether to adopt a harm-based trigger for breach 
notifications; (2) whether we should adopt minimum requirements for the 
content of customer breach notices; and (3) whether our rules should 
address breaches of sensitive personal information.
    35. We seek comment on each of these proposals and their costs and 
benefits. Should updated data breach requirements for TRS providers be 
identical to those we adopt for providers of telecommunications and 
interconnected VoIP services, or are there circumstances unique to TRS 
providers that warrant differences in their obligations regarding data 
breaches? Are any additional notification requirements necessary to 
ensure TRS users receive functionally equivalent privacy protection? If 
we adopt the proposed requirement that service providers notify the 
Commission of breaches via a centralized portal, is there any need to 
retain the current requirement that TRS providers submit a copy of any 
breach notification to the Disability Rights Office of the Consumer and 
Governmental Affairs Bureau? Finally, would TRS providers incur costs 
or other compliance burdens under the proposed amendments that are 
disproportionately greater than those incurred by providers of 
telecommunications and interconnected VoIP services, and if so, would 
the extent of such costs or burdens justify the application of 
different breach notification requirements to TRS?
    36. Legal Authority. Section 225 of the Act directs the Commission 
to ensure that TRS are available to enable communication in a manner 
that is functionally equivalent to voice telephone services. In 2013, 
the Commission found that applying the privacy protections of the 
Commission's CPNI regulations to TRS users advances the functional 
equivalency of TRS. The Commission concluded further that the specific 
mandate of Section 225 to establish ``functional requirements, 
guidelines, and operations procedures for TRS'' authorizes the 
Commission to make the privacy protections of the Commission's CPNI 
regulations applicable to TRS users. In addition, the Commission found 
that extending the CPNI regulations to TRS users is ancillary to its 
responsibilities under Section 222 of the Act to telecommunications 
service subscribers that place calls to or receive calls from TRS 
users, because TRS call records include call detail information 
concerning all calling and called parties. Finally, the Commission 
determined that applying CPNI requirements to point-to-point video 
services provided by VRS providers is ancillary to its

[[Page 3960]]

responsibilities under Sections 222 and 225.
    37. We tentatively conclude that, for the same reasons cited in the 
2013 VRS Reform Order, these sources of authority for establishing the 
current CPNI rules for TRS authorize the Commission to amend those 
rules to ensure that TRS users receive privacy protections equivalent 
to those proposed for users of telecommunications and VoIP services. We 
seek comment on this tentative conclusion.

E. Legal Authority

    38. Section 222. We believe that Section 222 provides authority to 
adopt the breach notification rules for which we seek comment in this 
Notice of Proposed Rulemaking. We also tentatively conclude that we 
have authority to apply the rules proposed in this Notice of Proposed 
Rulemaking to interconnected VoIP providers. We seek comment on these 
tentative conclusions.
    39. Section 222 of the Act governs telecommunications carriers in 
their use, disclosure, and protection of proprietary information that 
they obtain in the course of providing telecommunications services. 
Section 222(a) imposes a duty on carriers to ``protect the 
confidentiality of proprietary information of, and relating to'' 
customers, fellow carriers, and equipment manufacturers. Section 222(c) 
imposes more specific requirements on carriers as to the protection and 
confidentiality of CPNI. We tentatively conclude that both subsections 
provide us authority to adopt rules requiring telecommunications 
carriers and interconnected VoIP providers to address breaches of CPNI.
    40. The Commission has long required carriers to report data 
breaches as part of their duty to protect the confidentiality of 
customers' information. We believe that the proposed revisions to the 
Commission's data breach reporting rule reinforce carriers' duty to 
protect the confidentiality of their customers' information. Data 
breach reporting requirements also reinforce our other rules addressing 
the protection of CPNI. For example, data breach notifications can 
meaningfully inform customer decisions regarding whether to give, 
withhold, or retract their approval to use or disclose their 
information. Similarly, we believe that requiring carriers to notify 
the Commission in the event of a data breach will better enable the 
Commission to identify and confront systemic network vulnerabilities 
and help investigate and advise carriers on how best to avoid future 
breaches, also helping carriers to fulfill their duty under Section 
222(a) to protect the confidentiality of their customers' information. 
We seek comment on this analysis.
    41. Interconnected VoIP. We believe that we have authority under 
Section 222 and our ancillary jurisdiction to apply the rules we 
propose today to interconnected VoIP providers. In 2007, the Commission 
exercised ancillary jurisdiction to extend its Part 64 CPNI rules to 
interconnected VoIP services. Since then, interconnected VoIP providers 
have operated under these rules. Interconnected VoIP services remain 
within the Commission's subject matter jurisdiction and we believe that 
the application of customer privacy requirements to these services is 
``reasonably ancillary to the effective performance'' of our statutory 
responsibility under Section 222. As the Commission explained in 2007, 
``American consumers [can reasonably] expect that their telephone calls 
are private irrespective of whether the call is made using the service 
of a wireline carrier, a wireless carrier, or an interconnected VoIP 
provider.'' Now, as then, extending Section 222's protections to 
interconnected VoIP service customers is also ``necessary to protect 
the privacy of wireline or wireless customers that place calls to or 
receive calls from interconnected VoIP providers.'' In addition, in 
2008, Congress ratified the Commission's decision to apply Section 
222's requirements to interconnected VoIP services by adding language 
to Section 222 that expressly covers ``IP-enabled voice service,'' 
defined expressly to incorporate the Commission's definition of 
``interconnected VoIP service.'' The 2008 revisions to Section 222 
would not make sense if the privacy-related duties of subsections (a) 
and (c) did not apply to interconnected VoIP providers. We seek comment 
on this analysis.
    42. We seek comment on whether there are other bases of authority 
on which we can rely to adopt the rules we propose and seek comment on 
today.

F. Impact of the Congressional Disapproval of the 2016 Privacy Order

    43. As noted above, in 2016, the Commission acted to revise its 
breach notification rule as part of a larger proceeding addressing 
privacy requirements for broadband internet access service providers 
(ISPs). The rules the Commission adopted in the 2016 Privacy Order 
applied to telecommunications carriers and interconnected VoIP 
providers in addition to ISPs, which had been classified as providers 
of telecommunications services in 2015. In 2017, however, Congress 
nullified those 2016 revisions to the Commission's CPNI rules under the 
Congressional Review Act.
    44. As a threshold matter, we seek comment on the effect of the 
Congressional disapproval of the 2016 Privacy Order under the 
Congressional Review Act. While we seek comment on a range of proposals 
in this item, we clarify that, in light of the Congressional resolution 
of disapproval, we are not seeking comment on ``reissu[ing] . . . in 
substantially the same form,'' or on issuing ``a new rule that is 
substantially the same as,'' the rule disapproved by Congress. More 
generally, though, we seek comment here on the effect and scope of the 
Congressional disapproval of the 2016 Privacy Order for purposes of 
adopting rules that apply to telecommunications carriers.

G. Digital Equity Considerations

    45. The Commission, as part of its continuing effort to advance 
digital equity for all, including people of color and others who have 
been historically underserved, marginalized, and adversely affected by 
persistent poverty and inequality, invites comment on any equity-
related considerations and benefits (if any) that may be associated 
with the proposals and issues discussed herein. Specifically, we seek 
comment on how our proposals may promote or inhibit advances in 
diversity, equity, inclusion, and accessibility.

II. Procedural Matters

    46. Initial Regulatory Flexibility Analysis. As required by the 
Regulatory Flexibility Act, the Commission has prepared an Initial 
Regulatory Flexibility Analysis (IRFA) of the possible significant 
economic impact on small entities of the policies and rules addressed 
in this document. The IRFA is set forth in Appendix B. Written public 
comments are requested on the IRFA. Comments must be filed by the 
deadlines for comments on the Notice of Proposed Rulemaking indicated 
on the first page of this document and must have a separate and 
distinct heading designating them as responses to the IRFA. The 
Commission's Consumer and Governmental Affairs Bureau, Reference 
Information Center, will send a copy of this Notice of Proposed 
Rulemaking, including the IRFA, to the Chief Counsel for Advocacy of 
the SBA.
    47. People with Disabilities. To request materials in accessible 
formats for people with disabilities (braille, large print, electronic 
files, audio format), send an email to [email protected]

[[Page 3961]]

or call the Consumer & Governmental Affairs Bureau at 202-418-0530 
(voice).

III. Initial Regulatory Flexibility Analysis

    1. As required by the Regulatory Flexibility Act of 1980, as 
amended (RFA), the Commission has prepared this Initial Regulatory 
Flexibility Analysis (IRFA) of the possible significant economic impact 
on small entities by the policies and rules proposed in this Notice of 
Proposed Rulemaking. The Commission requests written public comments on 
this IRFA. Comments must be identified as responses to the IRFA and 
must be filed by the deadlines for comments provided on the first page 
of the Notice of Proposed Rulemaking. The Commission will send a copy 
of the Notice of Proposed Rulemaking, including this IRFA, to the Chief 
Counsel for Advocacy of the Small Business Administration (SBA). In 
addition, the Notice of Proposed Rulemaking and IRFA (or summaries 
thereof) will be published in the Federal Register.

A. Need for, and Objectives of, the Proposed Rules

    2. The Commission first adopted a rule in 2007 requiring 
telecommunications carriers and interconnected Voice over internet 
Protocol (VoIP) providers to notify customers and federal law 
enforcement of breaches of customer proprietary network information 
(CPNI) in the carriers' possession. In the almost decade and a half 
since that time, data breaches nationwide have increased in both 
frequency and severity in all industries. In the telecommunications 
industry, the public has suffered an increasing number of security 
breaches of customer information in recent years. Federal and state 
data breach laws covering other areas have evolved since 2007. Those 
developments combined with our specific experience suggest 
opportunities for improvement in our own breach notification rule. 
Today, we begin the process to update and strengthen our data breach 
rule to provide greater protections to the public.
    3. The Commission adopted the data breach rule, like the rest of 
the privacy safeguards adopted in the 2007 CPNI Order, to address the 
problem of ``pretexting,'' the practice of pretending to be a 
particular customer or other authorized person in order to obtain 
access to that customer's call detail or other private communications 
records. In the almost 15 years since, it has become clear that 
breaches of customer information in many contexts extend far beyond 
pretexting in general or the specific type of pretexting addressed at 
that time and are increasing in scale and evolving in methodology. The 
increasing severity and diversifying methods of security breaches 
involving customer information can have lasting detrimental impacts on 
customers whose information has been breached.
    4. To better protect telecommunications customers and ensure that 
our rules keep pace with today's challenges, we propose a number of 
updates to our rule addressing telecommunications carriers' breach 
notification duties. We seek to ensure that affected customers, the 
Commission, and other federal law enforcement agencies receive the 
information they need in a timely manner so they can mitigate and 
prevent harm due to the breach and take action to deter future 
breaches. To identify best practices and to minimize burdens, we look 
to other federal and state breach laws as potential models for our 
rules.
    5. In this document, we propose to expand the Commission's 
definition of ``breach'' to include inadvertent disclosures of customer 
information and seek comment on adopting a harm-based trigger for 
breach notifications. We also propose to require carriers to notify the 
Commission, in addition to the Secret Service and FBI, as soon as 
practicable after discovery of a breach. We also propose to eliminate 
the mandatory waiting period before notifying customers and instead 
require carriers to notify customers of CPNI breaches without 
unreasonable delay after discovery of a breach unless law enforcement 
requests a delay. We also seek comment on whether we should adopt 
minimum requirements for the content of customer breach notices, and we 
seek comment on whether our rules should address breaches of other 
types of sensitive personal information beyond CPNI. Finally, we 
propose to make changes to our TRS data breach reporting rule 
consistent with those we propose to our CPNI breach reporting rule.

B. Legal Basis

    6. The legal basis for any action that may be taken pursuant to 
this Notice of Proposed Rulemaking is contained in Sections 1, 4(i), 
4(j), 201, 202, 222, 225, 303(r), and 332 of the Communications Act of 
1934, as amended, 47 U.S.C. 151, 154, 201, 202, 222, 225, 303(r), 332.

C. Description and Estimate of the Number of Small Entities to Which 
the Proposed Rules Will Apply

    7. The RFA directs agencies to provide a description of and, where 
feasible, an estimate of the number of small entities that may be 
affected by the proposed rules and by the rule revisions on which the 
Notice of Proposed Rulemaking seeks comment, if adopted. The RFA 
generally defines the term ``small entity'' as having the same meaning 
as the terms ``small business,'' ``small organization,'' and ``small 
governmental jurisdiction.'' In addition, the term ``small business'' 
has the same meaning as the term ``small-business concern'' under the 
Small Business Act. A ``small-business concern'' is one which: (1) is 
independently owned and operated; (2) is not dominant in its field of 
operation; and (3) satisfies any additional criteria established by the 
SBA.
    8. Small Businesses, Small Organizations, Small Governmental 
Jurisdictions. Our actions, over time, may affect small entities that 
are not easily categorized at present. We therefore describe here, at 
the outset, three broad groups of small entities that could be directly 
affected herein. First, while there are industry specific size 
standards for small businesses that are used in the regulatory 
flexibility analysis, according to data from the Small Business 
Administration's (SBA) Office of Advocacy, in general a small business 
is an independent business having fewer than 500 employees. These types 
of small businesses represent 99.9 percent of all businesses in the 
United States, which translates to 32.5 million businesses.
    9. Next, the type of small entity described as a ``small 
organization'' is generally ``any not-for-profit enterprise which is 
independently owned and operated and is not dominant in its field.'' 
The Internal Revenue Service (IRS) uses a revenue benchmark of $50,000 
or less to delineate its annual electronic filing requirements for 
small exempt organizations. Nationwide, for tax year 2018, there were 
approximately 571,709 small exempt organizations in the U.S. reporting 
revenues of $50,000 or less according to the registration and tax data 
for exempt organizations available from the IRS.
    10. Finally, the small entity described as a ``small governmental 
jurisdiction'' is defined generally as ``governments of cities, 
counties, towns, townships, villages, school districts, or special 
districts, with a population of less than fifty thousand.'' U.S. Census 
Bureau data from the 2017 Census of

[[Page 3962]]

Governments indicate that there were 90,075 local governmental 
jurisdictions consisting of general purpose governments and special 
purpose governments in the United States. Of this number there were 
36,931 general purpose governments (county, municipal and town or 
township) with populations of less than 50,000 and 12,040 special 
purpose governments--independent school districts with enrollment 
populations of less than 50,000. Accordingly, based on the 2017 U.S. 
Census of Governments data, we estimate that at least 48,971 entities 
fall into the category of ``small governmental jurisdictions.''
1. Wireline Carriers
    11. Wired Telecommunications Carriers. The U.S. Census Bureau 
defines this industry as establishments primarily engaged in operating 
and/or providing access to transmission facilities and infrastructure 
that they own and/or lease for the transmission of voice, data, text, 
sound, and video using wired communications networks. Transmission 
facilities may be based on a single technology or a combination of 
technologies. Establishments in this industry use the wired 
telecommunications network facilities that they operate to provide a 
variety of services, such as wired telephony services, including VoIP 
services, wired (cable) audio and video programming distribution, and 
wired broadband internet services. By exception, establishments 
providing satellite television distribution services using facilities 
and infrastructure that they operate are included in this industry. 
Wired Telecommunications Carriers are also referred to as wireline 
carriers or fixed local service providers.
    12. The SBA small business size standard for Wired 
Telecommunications Carriers classifies firms having 1,500 or fewer 
employees as small. U.S. Census Bureau data for 2017 show that there 
were 3,054 firms that operated in this industry for the entire year. Of 
this number, 2,964 firms operated with fewer than 250 employees. 
Additionally, based on Commission data in the 2021 Universal Service 
Monitoring Report, as of December 31, 2020, there were 5,183 providers 
that reported they were engaged in the provision of fixed local 
services. Of these providers, the Commission estimates that 4,737 
providers have 1,500 or fewer employees. Consequently, using the SBA's 
small business size standard, most of these providers can be considered 
small entities.
    13. Local Exchange Carriers (LECs). Neither the Commission nor the 
SBA has developed a size standard for small businesses specifically 
applicable to local exchange services. Providers of these services 
include both incumbent and competitive local exchange service 
providers. Wired Telecommunications Carriers is the closest industry 
with an SBA small business size standard. Wired Telecommunications 
Carriers are also referred to as wireline carriers or fixed local 
service providers. The SBA small business size standard for Wired 
Telecommunications Carriers classifies firms having 1,500 or fewer 
employees as small. U.S. Census Bureau data for 2017 show that there 
were 3,054 firms that operated in this industry for the entire year. Of 
this number, 2,964 firms operated with fewer than 250 employees. 
Additionally, based on Commission data in the 2021 Universal Service 
Monitoring Report, as of December 31, 2020, there were 5,183 providers 
that reported they were fixed local exchange service providers. Of 
these providers, the Commission estimates that 4,737 providers have 
1,500 or fewer employees. Consequently, using the SBA's small business 
size standard, most of these providers can be considered small 
entities.
    14. Incumbent LECs. Neither the Commission nor the SBA has 
developed a small business size standard specifically for incumbent 
local exchange services. Wired Telecommunications Carriers is the 
closest industry with an SBA small business size standard. The SBA 
small business size standard for Wired Telecommunications Carriers 
classifies firms having 1,500 or fewer employees as small. U.S. Census 
Bureau data for 2017 show that there were 3,054 firms in this industry 
that operated for the entire year. Of this number, 2,964 firms operated 
with fewer than 250 employees. Additionally, based on Commission data 
in the 2021 Universal Service Monitoring Report, as of December 31, 
2020, there were 1,227 providers that reported they were incumbent 
local exchange service providers. Of these providers, the Commission 
estimates that 929 providers have 1,500 or fewer employees. 
Consequently, using the SBA's small business size standard, the 
Commission estimates that the majority of incumbent local exchange 
carriers can be considered small entities.
    15. Competitive Local Exchange Carriers (Competitive LECs). Neither 
the Commission nor the SBA has developed a size standard for small 
businesses specifically applicable to local exchange services. 
Providers of these services include several types of competitive local 
exchange service providers. Wired Telecommunications Carriers is the 
closest industry with a SBA small business size standard. The SBA small 
business size standard for Wired Telecommunications Carriers classifies 
firms having 1,500 or fewer employees as small. U.S. Census Bureau data 
for 2017 show that there were 3,054 firms that operated in this 
industry for the entire year. Of this number, 2,964 firms operated with 
fewer than 250 employees. Additionally, based on Commission data in the 
2021 Universal Service Monitoring Report, as of December 31, 2020, 
there were 3,956 providers that reported they were competitive local 
exchange service providers. Of these providers, the Commission 
estimates that 3,808 providers have 1,500 or fewer employees. 
Consequently, using the SBA's small business size standard, most of 
these providers can be considered small entities.
    16. Interexchange Carriers (IXCs). Neither the Commission nor the 
SBA has developed a small business size standard specifically for 
Interexchange Carriers. Wired Telecommunications Carriers is the 
closest industry with a SBA small business size standard. The SBA small 
business size standard for Wired Telecommunications Carriers classifies 
firms having 1,500 or fewer employees as small. U.S. Census Bureau data 
for 2017 show that there were 3,054 firms that operated in this 
industry for the entire year. Of this number, 2,964 firms operated with 
fewer than 250 employees. Additionally, based on Commission data in the 
2021 Universal Service Monitoring Report, as of December 31, 2020, 
there were 151 providers that reported they were engaged in the 
provision of interexchange services. Of these providers, the Commission 
estimates that 131 providers have 1,500 or fewer employees. 
Consequently, using the SBA's small business size standard, the 
Commission estimates that the majority of providers in this industry 
can be considered small entities.
    17. Cable System Operators (Telecom Act Standard). The 
Communications Act of 1934, as amended (the Act), also contains a size 
standard for small cable system operators, which is ``a cable operator 
that, directly or through an affiliate, serves in the aggregate fewer 
than one percent of all subscribers in the United States and is not 
affiliated with any entity or entities whose gross annual revenues in 
the aggregate exceed $250,000,000.'' For purposes of the Telecom Act 
Standard, the Commission

[[Page 3963]]

determined that a cable system operator that serves fewer than 677,000 
subscribers, either directly or through affiliates, will meet the 
definition of a small cable operator based on the cable subscriber 
count established in a 2001 Public Notice. Based on industry data, only 
six cable system operators have more than 677,000 subscribers. 
Accordingly, the Commission estimates that the majority of cable system 
operators are small under this size standard. We note however, that the 
Commission neither requests nor collects information on whether cable 
system operators are affiliated with entities whose gross annual 
revenues exceed $250 million. Therefore, we are unable at this time to 
estimate with greater precision the number of cable system operators 
that would qualify as small cable operators under the definition in the 
Communications Act.
    18. Other Toll Carriers. Neither the Commission nor the SBA has 
developed a size standard for small businesses specifically applicable 
to other toll carriers. This category includes toll carriers that do 
not fall within the categories of interexchange carriers, operator 
service providers, prepaid calling card providers, satellite service 
carriers, or toll resellers. Wired Telecommunications Carriers is the 
closest industry with a SBA small business size standard. The SBA small 
business size standard for Wired Telecommunications Carriers classifies 
firms having 1,500 or fewer employees as small. U.S. Census Bureau data 
for 2017 show that there were 3,054 firms in this industry that 
operated for the entire year. Of this number, 2,964 firms operated with 
fewer than 250 employees. Additionally, based on Commission data in the 
2021 Universal Service Monitoring Report, as of December 31, 2020, 
there were 115 providers that reported they were engaged in the 
provision of other toll services. Of these providers, the Commission 
estimates that 113 providers have 1,500 or fewer employees. 
Consequently, using the SBA's small business size standard, most of 
these providers can be considered small entities.
2. Wireless Carriers
    19. Wireless Telecommunications Carriers (except Satellite). This 
industry comprises establishments engaged in operating and maintaining 
switching and transmission facilities to provide communications via the 
airwaves. Establishments in this industry have spectrum licenses and 
provide services using that spectrum, such as cellular services, paging 
services, wireless internet access, and wireless video services. The 
SBA size standard for this industry classifies a business as small if 
it has 1,500 or fewer employees. U.S. Census Bureau data for 2017 show 
that there were 2,893 firms in this industry that operated for the 
entire year. Of that number, 2,837 firms employed fewer than 250 
employees. Additionally, based on Commission data in the 2021 Universal 
Service Monitoring Report, as of December 31, 2020, there were 797 
providers that reported they were engaged in the provision of wireless 
services. Of these providers, the Commission estimates that 715 
providers have 1,500 or fewer employees. Consequently, using the SBA's 
small business size standard, most of these providers can be considered 
small entities.
    20. Satellite Telecommunications. This category comprises firms 
``primarily engaged in providing telecommunications services to other 
establishments in the telecommunications and broadcasting industries by 
forwarding and receiving communications signals via a system of 
satellites or reselling satellite telecommunications.'' Satellite 
telecommunications service providers include satellite and earth 
station operators. The SBA small business size standard for this 
industry classifies a business with $38.5 million or less in annual 
receipts as small. U.S. Census Bureau data for 2017 show that 275 firms 
in this industry operated for the entire year. Of this number, 242 
firms had revenue of less than $25 million. Additionally, based on 
Commission data in the 2021 Universal Service Monitoring Report, as of 
December 31, 2020, there were 71 providers that reported they were 
engaged in the provision of satellite telecommunications services. Of 
these providers, the Commission estimates that approximately 48 
providers have 1,500 or fewer employees. Consequently, using the SBA's 
small business size standard, a little more than of these providers can 
be considered small entities.
3. Resellers
    21. Local Resellers. Neither the Commission nor the SBA have 
developed a small business size standard specifically for Local 
Resellers. Telecommunications Resellers is the closest industry with a 
SBA small business size standard. The Telecommunications Resellers 
industry comprises establishments engaged in purchasing access and 
network capacity from owners and operators of telecommunications 
networks and reselling wired and wireless telecommunications services 
(except satellite) to businesses and households. Establishments in this 
industry resell telecommunications; they do not operate transmission 
facilities and infrastructure. Mobile virtual network operators (MVNOs) 
are included in this industry. The SBA small business size standard for 
Telecommunications Resellers classifies a business as small if it has 
1,500 or fewer employees. U.S. Census Bureau data for 2017 show that 
1,386 firms in this industry provided resale services for the entire 
year. Of that number, 1,375 firms operated with fewer than 250 
employees. Additionally, based on Commission data in the 2021 Universal 
Service Monitoring Report, as of December 31, 2020, there were 293 
providers that reported they were engaged in the provision of local 
resale services. Of these providers, the Commission estimates that 289 
providers have 1,500 or fewer employees. Consequently, using the SBA's 
small business size standard, most of these providers can be considered 
small entities.
    22. Toll Resellers. Neither the Commission nor the SBA have 
developed a small business size standard specifically for Toll 
Resellers. Telecommunications Resellers is the closest industry with a 
SBA small business size standard. The Telecommunications Resellers 
industry comprises establishments engaged in purchasing access and 
network capacity from owners and operators of telecommunications 
networks and reselling wired and wireless telecommunications services 
(except satellite) to businesses and households. Establishments in this 
industry resell telecommunications; they do not operate transmission 
facilities and infrastructure. Mobile virtual network operators (MVNOs) 
are included in this industry. The SBA small business size standard for 
Telecommunications Resellers classifies a business as small if it has 
1,500 or fewer employees. U.S. Census Bureau data for 2017 show that 
1,386 firms in this industry provided resale services for the entire 
year. Of that number, 1,375 firms operated with fewer than 250 
employees. Additionally, based on Commission data in the 2021 Universal 
Service Monitoring Report, as of December 31, 2020, there were 518 
providers that reported they were engaged in the provision of toll 
services. Of these providers, the Commission estimates that 495 
providers have 1,500 or fewer employees. Consequently, using the SBA's 
small business size standard,

[[Page 3964]]

most of these providers can be considered small entities.
    23. Prepaid Calling Card Providers. Neither the Commission nor the 
SBA has developed a small business definition specifically for prepaid 
calling card providers. Telecommunications Resellers is the closest 
industry with a SBA small business size standard. The 
Telecommunications Resellers industry comprises establishments engaged 
in purchasing access and network capacity from owners and operators of 
telecommunications networks and reselling wired and wireless 
telecommunications services (except satellite) to businesses and 
households. Establishments in this industry resell telecommunications; 
they do not operate transmission facilities and infrastructure. Mobile 
virtual network operators (MVNOs) are included in this industry. The 
SBA small business size standard for Telecommunications Resellers 
classifies a business as small if it has 1,500 or fewer employees. U.S. 
Census Bureau data for 2017 show that 1,386 firms in this industry 
provided resale services for the entire year. Of that number, 1,375 
firms operated with fewer than 250 employees. Additionally, based on 
Commission data in the 2021 Universal Service Monitoring Report, as of 
December 31, 2020, there were 58 providers that reported they were 
engaged in the provision of payphone services. Of these providers, the 
Commission estimates that 57 providers have 1,500 or fewer employees. 
Consequently, using the SBA's small business size standard, most of 
these providers can be considered small entities.
4. Other Entities
    24. All Other Telecommunications. This industry is comprised of 
establishments primarily engaged in providing specialized 
telecommunications services, such as satellite tracking, communications 
telemetry, and radar station operation. This industry also includes 
establishments primarily engaged in providing satellite terminal 
stations and associated facilities connected with one or more 
terrestrial systems and capable of transmitting telecommunications to, 
and receiving telecommunications from, satellite systems. Providers of 
internet services (e.g. dial-up ISPs) or voice over internet protocol 
(VoIP) services, via client-supplied telecommunications connections are 
also included in this industry. The SBA small business size standard 
for this industry classifies firms with annual receipts of $35 million 
or less as small. U.S. Census Bureau data for 2017 show that there were 
1,079 firms in this industry that operated for the entire year. Of 
those firms, 1,039 had revenue of less than $25 million. Based on this 
data, the Commission estimates that the majority of ``All Other 
Telecommunications'' firms can be considered small.

D. Description of Projected Reporting, Recordkeeping, and Other 
Compliance Requirements for Small Entities

    25. In this document, we propose to expand the Commission's 
definition of ``breach'' to include inadvertent disclosures of customer 
information and seek comment on adopting a harm-based trigger for 
breach notifications. We also propose to require carriers to notify the 
Commission, in addition to the Secret Service and FBI, as soon as 
practicable after discovery of a breach. We also propose to eliminate 
the mandatory waiting period before notifying customers and instead 
require carriers to notify customers of CPNI breaches without 
unreasonable delay after discovery of a breach unless law enforcement 
requests a delay. We also seek comment on whether we should adopt 
minimum requirements for the content of customer breach notices, and we 
seek comment on whether our rules should address breaches of other 
types of sensitive personal information beyond CPNI. Finally, we 
propose to make changes to our TRS data breach reporting rule 
consistent with those we propose to our CPNI breach reporting rule.
    26. Should the Commission decide to modify existing rules or adopt 
new rules to strengthen our data breach reporting rule, such action 
could potentially result in increased, reduced, or otherwise modified 
recordkeeping, reporting, or other compliance requirements for affected 
providers of service. We seek comment on the effect of any proposals on 
small entities. Entities, especially small businesses, are encouraged 
to quantify the costs and benefits of any reporting, recordkeeping, or 
compliance requirement that may be established in this proceeding.

E. Steps Taken To Minimize the Significant Economic Impact on Small 
Entities, and Significant Alternatives Considered

    27. The RFA requires an agency to describe any significant 
alternatives that it has considered in reaching its proposed approach, 
which may include the following four alternatives (among others): (1) 
the establishment of differing compliance or reporting requirements or 
timetables that take into account the resources available to small 
entities; (2) the clarification, consolidation, or simplification of 
compliance and reporting requirements under the rules for such small 
entities; (3) the use of performance rather than design standards; and 
(4) an exemption from coverage of the rule, or any part thereof, for 
such small entities.
    28. The document seeks comment on the particular impacts that the 
proposed rules may have on small entities. Specifically, the document 
seeks comment on whether there are unique concerns or compliance 
barriers for small carriers that make notice to customers without 
unreasonable delay unfeasible; if there should be different 
notification requirements for small carriers; if streamlining notice 
requirements will benefit small providers; if a centralized reporting 
portal would reduce compliance barriers for small providers; and if a 
threshold trigger would benefit small providers.

F. Federal Rules That May Duplicate, Overlap, or Conflict With the 
Proposed Rules

    29. None.

IV. Ordering Clauses

    30. Accordingly, it is ordered that, pursuant to Sections 1, 2, 
4(i), 4(j), 201, 202, 222, 225, 303(b), 303(r), 332 of the 
Communications Act of 1934, as amended, 47 U.S.C. 151, 152, 154(i), 
154(j), 201, 202, 222, 225, 303(b), 303(r), 332, this Notice of 
Proposed Rulemaking is adopted.
    31. It is further ordered, that the Commission's Consumer and 
Governmental Affairs Bureau, Reference Information Center, shall send a 
copy of this Notice of Proposed Rulemaking, including the Initial 
Regulatory Flexibility Analysis (IRFA), to the Chief Counsel for 
Advocacy of the Small Business Administration.

List of Subjects in 47 CFR Part 64

    Communications, Communications common carriers, Communications 
equipment, Individuals with disabilities, Reporting and recordkeeping 
requirements, Security measures, Telecommunications, Telephone.

Federal Communications Commission.
Marlene Dortch,
Secretary.

Proposed Rules

    For the reasons discussed in the preamble, the Federal 
Communications Commission proposes to amend 47 part 64 as follows:

[[Page 3965]]

PART 64--MISCELLANEOUS RULES RELATING TO COMMON CARRIERS

0
1. The authority citation for part 64 continues to read as follows:

    Authority:  47 U.S.C. 151, 152, 154, 201, 202, 217, 218, 220, 
222, 225, 226, 227, 227b, 228, 251(a), 251(e), 254(k), 255, 262, 
276, 403(b)(2)(B), (c), 616, 617, 620, 1401-1473, unless otherwise 
noted; Pub. L. 115-141, Div. P, sec. 503, 132 Stat. 348, 1091.

Subpart U--Customer Proprietary Network Information

0
2. Amend Sec.  64.2011 by revising paragraphs (a) through (e) to read 
as follows:


Sec.  64.2011   Notification of customer proprietary network 
information security breaches.

    (a) A telecommunications carrier shall notify affected customers, 
the Federal Communications Commission (Commission), and other federal 
law enforcement of a breach of its customers' CPNI as provided in this 
section.
    (b)(1) As soon as practicable after reasonable determination of a 
breach, a telecommunications carrier shall electronically notify the 
Commission, the United States Secret Service (USSS), and the Federal 
Bureau of Investigation (FBI) through a central reporting facility 
maintained by the Commission and made available on its website.
    (2) If a law enforcement or national security agency notifies the 
carrier that public disclosure or notice to customers would impede or 
compromise an ongoing or potential criminal investigation or national 
security, such agency may direct the carrier not to so disclose or 
notify for an initial period of up to 30 days. Such period may be 
extended by the agency as reasonably necessary in the judgment of the 
agency. If such direction is given, the agency shall notify the carrier 
when it appears that public disclosure or notice to affected customers 
will no longer impede or compromise a criminal investigation or 
national security. The agency shall provide in writing its initial 
direction to the carrier, any subsequent extension, and any 
notification that notice will no longer impede or compromise a criminal 
investigation or national security.
    (c) Customer Notification. A telecommunications carrier shall 
notify affected customers of covered breaches of CPNI without 
unreasonable delay after discovery of the breach after notification to 
the Commission and law enforcement as described in paragraph (b) of 
this section.
    (d) Recordkeeping. All carriers shall maintain a record, 
electronically or in some other manner, of any breaches discovered, 
notifications made to the Federal Communications Commission, USSS, and 
the FBI pursuant to paragraph (b) of this section, and notifications 
made to customers. The record must include, if available, dates of 
discovery and notification, a detailed description of the CPNI that was 
the subject of the breach, and the circumstances of the breach. 
Carriers shall retain the record for a minimum of 2 years.
    (e) Definitions. As used in this section, a ``breach'' has occurred 
when a person, without authorization or exceeding authorization, has 
gained access to, used, or disclosed CPNI.
* * * * *
0
3. Amend Sec.  64.5111 by revising paragraphs (a) through (e) to read 
as follows:


Sec.  64.5111   Notification of customer proprietary network 
information security breaches.

    (a) A TRS provider shall notify affected customers, the Federal 
Communications Commission (Commission), and other federal law 
enforcement of a breach of its customers' CPNI as provided in this 
section.
    (b)(1) As soon as practicable after reasonable determination of a 
breach, a TRS provider shall electronically notify the Commission, the 
United States Secret Service (USSS), and the Federal Bureau of 
Investigation (FBI) through a central reporting facility maintained by 
the Commission and made available on its website.
    (2) If a law enforcement or national security agency notifies the 
TRS provider that public disclosure or notice to customers would impede 
or compromise an ongoing or potential criminal investigation or 
national security, such agency may direct the TRS provider not to so 
disclose or notify for an initial period of up to 30 days. Such period 
may be extended by the agency as reasonably necessary in the judgment 
of the agency. If such direction is given, the agency shall notify the 
TRS provider when it appears that public disclosure or notice to 
affected customers will no longer impede or compromise a criminal 
investigation or national security. The agency shall provide in writing 
its initial direction to the TRS provider, any subsequent extension, 
and any notification that notice will no longer impede or compromise a 
criminal investigation or national security and such writings shall be 
contemporaneously logged on the same reporting facility that contains 
records of notifications filed by TRS provider.
    (c) Customer Notification. A TRS provider shall notify affected 
customers of covered breaches of CPNI without unreasonable delay after 
discovery of the breach after notification to the Commission and law 
enforcement as described in paragraph (b) of this section.
    (d) Recordkeeping. All TRS provider shall maintain a record, 
electronically or in some other manner, of any breaches discovered, 
notifications made to the Federal Communications Commission, USSS, and 
the FBI pursuant to paragraph (b) of this section, and notifications 
made to customers. The record must include, if available, dates of 
discovery and notification, a detailed description of the CPNI that was 
the subject of the breach, and the circumstances of the breach. TRS 
providers shall retain the record for a minimum of 2 years.
    (e) Definitions. As used in this section, a ``breach'' has occurred 
when a person, without authorization or exceeding authorization, has 
gained access to, used, or disclosed CPNI.
* * * * *
[FR Doc. 2023-00824 Filed 1-20-23; 8:45 am]
BILLING CODE 6712-01-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.