Protecting Consumers from SIM-Swap and Port-Out Fraud, 85794-85815 [2023-26338]
Download as PDF
85794
Federal Register / Vol. 88, No. 235 / Friday, December 8, 2023 / Rules and Regulations
FEDERAL COMMUNICATIONS
COMMISSION
47 CFR Parts 52 and 64
[WC Docket No. 21–341; FCC 23–95, FR
ID 186823]
Protecting Consumers from SIM-Swap
and Port-Out Fraud
Federal Communications
Commission.
ACTION: Final rule.
AGENCY:
In this document, the Federal
Communications Commission adopted a
Report and Order that adopts measures
designed to address two fraudulent
practices bad actors use to take control
of consumers’ cell phone accounts and
wreak havoc on people’s financial and
digital lives without ever gaining
physical control of a consumer’s phone.
The Report and Order revises the
Commission’s Customer Proprietary
Network Information (CPNI) and Local
Number Portability (LNP) rules to
require wireless providers to adopt
secure methods of authenticating a
customer before redirecting a customer’s
phone number to a new device or
provider. The Report and Order also
require wireless providers to
immediately notify customers whenever
a SIM change or port-out request is
made on customers’ accounts, and take
additional steps to protect customers
from SIM swap and port-out fraud.
DATES: Effective January 8, 2024, except
for revisions to 47 CFR 52.37(c),
52.37(d), 52.37(e), 52.37(g) (instruction
3), 64.2010(h)(2), 64.2010(h)(3),
64.2010(h)(4), 64.2010(h)(5),
64.2010(h)(6), and 64.2010(h)(8)
(instruction 6), which contain
information collection requirements and
are delayed indefinitely. The FCC will
publish a document in the Federal
Register announcing the effective date
for those Sections.
ADDRESSES: Federal Communications
Commission, 45 L Street SW,
Washington, DC 20554. In addition to
filing comments with the Office of the
Secretary, a copy of any comments on
the Paperwork Reduction Act
information collection requirements
contained herein should be submitted to
Nicole Ongele, Federal Communications
Commission, 45 L Street SW,
Washington, DC 20554, or send an email
to PRA@fcc.gov.
FOR FURTHER INFORMATION CONTACT: For
further information, contact Melissa
Kirkel at melissa.kirkel@fcc.gov. For
additional information concerning the
Paperwork Reduction Act information
collection requirements contained in
khammond on DSKJM1Z7X2PROD with RULES2
SUMMARY:
VerDate Sep<11>2014
17:02 Dec 07, 2023
Jkt 262001
this document, send an email to PRA@
fcc.gov or contact Nicole Ongele,
Nicole.Ongele@fcc.gov.
SUPPLEMENTARY INFORMATION: This is a
summary of the Commission’s Report
and Order in WC Docket No. 21–341,
FCC 23–95, adopted on November 15,
2023 and released on November 16,
2023. The full text of the document is
available on the Commission’s website
at https://docs.fcc.gov/public/
attachments/FCC-23-95A1.pdf. To
request materials in accessible formats
for people with disabilities (e.g. braille,
large print, electronic files, audio
format, etc.), send an email to FCC504@
fcc.gov or call the Consumer &
Governmental Affairs Bureau at (202)
418–0530 (voice).
Compliance with the rule changes
adopted in this Report and Order shall
not be required until the later of: (i) six
months after the effective date of this
Report and Order; or (ii) after the Office
of Management and Budget (OMB)
completes review of any information
collection requirements associated with
this Report and Order that the Wireline
Competition Bureau determines is
required under the Paperwork
Reduction Act.
Paperwork Reduction Act of 1995
Analysis
This document contains new or
modified information collection
requirements. The Commission, as part
of its continuing effort to reduce
paperwork burdens, will invite the
general public to comment on the
information collection requirements
contained in this Report and Order as
required by the Paperwork Reduction
Act of 1995, Public Law 104–13. In
addition, the Commission notes that
pursuant to the Small Business
Paperwork Relief Act of 2002, Public
Law 107–198, see 44 U.S.C. 3506(c)(4),
we previously sought specific comment
on how the Commission might further
reduce the information collection
burden for small business concerns with
fewer than 25 employees.
In this Report and Order, we have
assessed the effects of required customer
notifications and notices, and related
recordkeeping requirements, to protect
customers from SIM swap and port-out
fraud, and find that they do not place a
significant burden on small businesses.
Although no commenters specifically
addressed whether such requirements
may place burdens on small wireless
providers, we note that CCA advised the
Commission to ‘‘keep in mind the
constraints with which many small
carriers operate against in adopting
security measures,’’ asserting that any
rules ‘‘should allow carriers to use
PO 00000
Frm 00002
Fmt 4701
Sfmt 4700
technologies that are reasonably
available and have choice in the
approach to take in authenticating their
customers.’’ As a general matter, the
baseline, flexible rules we adopt reflect
our recognition that, in some cases,
strict prescriptive requirements to
prevent SIM swap and port-out fraud
could be technically and economically
infeasible for wireless providers to
implement, particularly for smaller
providers. We emphasize that the record
shows that many wireless providers
already have in place some of the
policies and procedures we adopt today
and that our rules may therefore only
require them to adapt, refine, or
consistently apply those existing
practices. Additionally, by setting
baseline requirements and giving
wireless providers flexibility on how to
meet them, we allow providers to adopt
the most cost-effective and least
burdensome solutions to achieve the
level of security needed to protect
customers against SIM swap and portout fraud in a given circumstance. We
have further minimized the potential
burdens of customer notifications by
declining to prescribe particular content
and wording and giving wireless
providers flexibility on how to deliver
such notifications. Similarly, for
customer notices, we declined to require
a specific format and content, and we
declined to require such notices be
delivered to customers annually.
Further, we mitigated potential burdens
of the recordkeeping requirement by
declining to require that wireless
providers include historic data in their
recordkeeping, which we acknowledged
would be particularly burdensome for
small providers, and declining to
require that providers report this data to
the Commission regularly.
Congressional Review Act
The Commission has determined, and
the Administrator of the Office of
Information and Regulatory Affairs,
Office of Management and Budget,
concurs, that this rule is non-major
under the Congressional Review Act, 5
U.S.C. 804(2). The Commission will
send a copy of this Report and Order to
Congress and the Government
Accountability Office pursuant to 5
U.S.C. 801(a)(1)(A).
I. Synopsis
1. Today we revise our CPNI and LNP
rules to provide greater protection to
customers from SIM swap and port-out
fraud. The cornerstone of our action is
a requirement that wireless providers
use secure methods of authenticating
customers prior to performing SIM
changes and number ports. Other rules
E:\FR\FM\08DER2.SGM
08DER2
khammond on DSKJM1Z7X2PROD with RULES2
Federal Register / Vol. 88, No. 235 / Friday, December 8, 2023 / Rules and Regulations
we adopt reinforce that requirement,
including that wireless providers adopt
processes for responding to failed
authentication attempts, institute
employee training for handling SIM
swap and port-out fraud, and establish
safeguards to prevent employees who
interact with customers from accessing
CPNI until after customers have been
authenticated. We also adopt rules that
will enable customers to act to prevent
and address fraudulent SIM changes
and number ports, including requiring
that wireless providers notify customers
regarding SIM change and port-out
requests, offer customers the option to
lock their accounts to block processing
of SIM changes and number ports, and
give advanced notice of available
account protection mechanisms. We
further establish requirements to
minimize the harms of SIM swap and
port-out fraud when it occurs, including
requiring wireless providers to maintain
a clear process for customers to report
fraud, promptly investigate and
remediate fraud, and promptly provide
customers with documentation of fraud
involving their accounts. Finally, to
ensure wireless providers track the
effectiveness of authentication measures
used for SIM change requests, we
require that they keep records of SIM
change requests and the authentication
measures they use.
2. In adopting these rules, we balance
the need to protect customers from the
harms of SIM swap and port-out fraud
with the goal of preserving the relative
ease with which customers can obtain
legitimate SIM changes and number
ports. The record reflects that the vast
majority of SIM change and port-out
requests are legitimate. It also shows
that the efficient and effective
processing of SIM changes and port-out
requests promotes customer choice and
competition and prevents interruptions
in access to wireless services that are
vital to customers’ everyday lives.
Service interruptions can be particularly
problematic when they hamper the
ability of customers to access emergency
services. We agree with the Competitive
Carriers Association (CCA) that
‘‘enhanced requirements for SIM swap
and port-out requests can implicate the
customer experience and can
intentionally or unintentionally serve as
impediments to legitimate requests to
change devices or change providers.’’
We are wary of setting rigid
requirements that would impose
significant burdens on customers
without substantially protecting against
SIM swap and port-out fraud. We also
recognize that prescribing particular
security methods can place greater
VerDate Sep<11>2014
17:02 Dec 07, 2023
Jkt 262001
burdens on some customers because of
their technical and financial means,
digital literacy, accessibility needs, and
other particularized circumstances. We
anticipate that the approach we take
today will provide meaningful
protection to customers while
preserving the competition and
customer choice that SIM changes and
number porting are meant to facilitate
and avoiding undue burdens that hinder
access to wireless services.
3. To that end, we set baseline rules,
rather than prescriptive requirements,
that establish a uniform framework
across the mobile wireless industry for
the types of policies and procedures
providers must employ to combat SIM
swap and port-out fraud. The record
indicates that several wireless providers
already rely, at least partly, on some of
these policies and procedures. We are
concerned, however, that a lack of
consistency in how wireless providers
apply these measures and a lack of
uniformity in the use of these measures
industry-wide leaves some customers
vulnerable to SIM swap and port-out
fraud. The rules we adopt ensure that all
wireless providers are taking consistent
and comprehensive steps to address this
fraud. For wireless providers that
already employ the measures we
require, in many cases our rules simply
raise the bar by requiring them to adapt,
refine, or consistently apply those
existing practices. For wireless
providers that do not, our new rules
require them to implement new
practices to meet the baseline standards.
We anticipate that our approach will
ensure that customers receive effective
protection from SIM swap and port-out
fraud regardless of the wireless
telecommunications services they
purchase or the wireless provider from
whom they purchase them.
4. In setting baseline requirements,
rather than prescriptive rules, our
approach also gives wireless providers
the flexibility to establish the specific
fraud protection measures they use so
that they can deliver the most advanced
protections available. The record
provides substantial evidence that to
best combat SIM swap and port-out
fraud, wireless providers need
flexibility. In particular, we are
persuaded that wireless providers need
such flexibility so that they can adapt
their security methods to keep pace
with the evolving threat landscape.
Verizon notes that ‘‘fraudsters are
sophisticated and constantly look to
circumvent any protections, no matter
how robust.’’ We also recognize that
‘‘[r]apid technological changes
introduce new vulnerabilities that
existing rules may be unequipped to
PO 00000
Frm 00003
Fmt 4701
Sfmt 4700
85795
address.’’ We are therefore concerned by
record evidence that a static set of
prescriptive requirements may
incentivize some wireless providers to
rely exclusively on those security
methods and discourage them from
innovating and adopting new and
improved practices to address evolving
fraud techniques used by bad actors. We
also share concerns that setting specific
requirements could either provide a
roadmap for bad actors seeking to
commit fraud or lock in measures that
quickly prove to be ineffective or
obsolete. The aim of our action today is
to better protect telecommunications
customers from fraudulent schemes; in
doing so, it is important that our rules,
while functioning as baseline
safeguards, do not serve as obstacles to
adoption of better security practices.
Indeed, the record asserts that
establishing rules that provide
flexibility will incentivize wireless
providers to develop and adopt new and
improved methods to protect against
SIM swap and port-out fraud and enable
them to quickly adapt their security
measures to respond to evolving
techniques and technologies used by
bad actors. Accordingly, we agree with
AT&T that ‘‘[t]he best way to combat
ever-evolving fraud tactics is to allow
industry players the ability to adapt and
respond to these changing threats in
real-time,’’ and we afford wireless
providers this flexibility with the rules
we adopt in this Report and Order.
5. Flexibility will also permit wireless
providers to use the specific security
practices that are effective and
appropriate under the circumstances.
We are persuaded that any given
measure will rarely prove foolproof,
necessary, or suitable in all instances,
and therefore that wireless providers
should have the ability to tailor the
security mechanisms they use. AT&T,
for instance, asserts that it has had
success in deploying measures
strategically to reduce the incidents of
SIM swap and port-out fraud, and with
our rules, we seek to foster such
outcomes. Our flexible approach
enables wireless providers to implement
security measures that are designed to
address a customer’s particular
circumstances and preferences, and also
allows wireless providers to implement
measures that are best suited for their
business models, technologies, and the
services they offer. We also recognize
that some wireless providers may seek
to use a risk-based model, whereby they
apply different mechanisms to protect
customers based on the likelihood of
fraud for a particular SIM change or
port-out request, and we do not want to
E:\FR\FM\08DER2.SGM
08DER2
85796
Federal Register / Vol. 88, No. 235 / Friday, December 8, 2023 / Rules and Regulations
khammond on DSKJM1Z7X2PROD with RULES2
hinder these targeted efforts. For these
reasons, we conclude that wireless
providers should have the flexibility to
determine which specific measure will
be most effective at protecting
customers against SIM swap and portout fraud in a given circumstance in
accordance with our baseline rules.
6. We further anticipate that our
flexible approach will enhance
protections for customers without
placing undue costs and burdens on
wireless providers. We are cognizant
that in some instances, strict
prescriptive requirements to prevent
SIM swap and port-out fraud could be
technically and economically infeasible
for wireless providers to implement,
particularly for smaller providers. Even
in the instances when wireless
providers do have the means to
implement prescriptive requirements,
those requirements could prove
burdensome on providers if they
become obsolete or ineffective and
providers are compelled to maintain
them alongside new and better practices
they adopt to address the evolving
threat landscape. By setting baseline
requirements and giving wireless
providers flexibility on how to meet
them, we allow providers to adopt the
most cost-effective and least
burdensome solutions to achieve the
level of security needed to protect
customers against SIM swap and portout fraud in a given circumstance.
Additionally, because many of our rules
build on existing mechanisms that many
wireless providers already use, we
expect that our new rules will further
minimize the costs and burdens for
those providers.
A. Strengthening the Commission’s
CPNI Rules To Protect Consumers
7. In this section, we adopt baseline
measures designed to reduce the
incidence of SIM swap fraud without
impinging on customers’ ability to
upgrade and replace their devices. As
proposed in the SIM Swap and Port-Out
Fraud Notice, we require wireless
providers to use secure methods to
authenticate customers that are
reasonably designed to confirm a
customer’s identity prior to effectuating
SIM changes, but we depart from our
proposal specifying particular methods
of authentication, to allow providers the
flexibility they need to implement the
most modern and effective
authentication methods on an ongoing
basis. We also adopt rules to require
wireless providers to implement
procedures to address failed
authentication attempts and to notify
customers of SIM change requests prior
to effectuating a SIM change.
VerDate Sep<11>2014
17:02 Dec 07, 2023
Jkt 262001
Additionally, we adopt rules that allow
customers to lock their accounts to
prevent SIM changes, require wireless
providers to track the effectiveness of
the authentication measures they have
implemented, and safeguard against
employee access to CPNI prior to
authentication. In each instance, we
afford wireless providers needed
flexibility while enhancing protections
for customers.
8. The record makes clear that
because SIMs are only used to facilitate
service for mobile wireless devices, SIM
swap fraud is a practice that is exclusive
to mobile wireless services. Thus, we
apply these new requirements to
providers of commercial mobile radio
service (CMRS), as defined in Section
20.3 of Title 47 of the Code of Federal
Regulations, including resellers of
CMRS. We apply these new
requirements to all SIM changes that
wireless providers perform. Further, we
require wireless providers to implement
these rules with respect to customers of
both pre-paid and post-paid services,
consistent with the protections afforded
by Section 222. We see no reason why
the protections should not apply to all
customers of CMRS, including
customers of resellers, particularly
considering indications in the record
that pre-paid customers are
disproportionately impacted by fraud
and that many customers impacted by
such fraud are low-income customers
who can ill afford such losses. Under
this definition, our new rules apply to
both facilities-based wireless providers
as well as resellers of wireless services.
Additionally, given that Section
332(c)(1)(A) of the Act requires that
providers of commercial mobile service
be treated as common carriers, 47 U.S.C.
332(c)(1)(A), our rules cover ‘‘any
officer, agent, or other person acting for
or employed by any common carrier or
user, acting within the scope of his
employment.’’ We make clear, however,
that the rules we adopt today do not
require providers to collect more
information about pre-paid customers
than they otherwise do in the normal
course of business, nor should they be
interpreted to impose disparate burdens
on pre-paid customers related to
information collection or
authentication.
1. Customer Authentication
Requirements
9. We update our CPNI rules to
protect customers from the risk of
fraudulent SIM swaps by requiring
wireless providers, prior to conducting
a SIM change, to use secure methods to
authenticate a customer that are
reasonably designed to confirm a
PO 00000
Frm 00004
Fmt 4701
Sfmt 4700
customer’s identity, except to the extent
otherwise required by the Safe
Connections Act or the Commission’s
rules implementing that statute. We
define ‘‘SIM,’’ for purposes of these
rules, as ‘‘a physical or virtual card
associated with a device that stores
unique information that can be
identified to a specific mobile network.’’
The record reflects significant support
for strengthening authentication
requirements for SIM change requests,
and we find that the requirement we
adopt today most appropriately balances
the need to increase protection for
customers from these types of
fraudulent schemes while providing
wireless providers the flexibility the
record shows they need to respond to
new and emerging threats. We
encourage wireless providers to use
secure authentication methods that
accommodate the needs of the broad
spectrum of customers they may serve.
We are persuaded by commenters that a
general security authentication standard
will afford customers the highest level
of protection by allowing wireless
providers to implement the
authentication methods raised in the
record, or develop new authentication
methods, in ways that both account for
advances in the technology and tactics
used by bad actors and that work best
for their customers and the particular
services they offer. Additionally, we
believe this flexibility alleviates record
concerns about the limited information
wireless providers may have to
authenticate customers of pre-paid
accounts.
10. The Safe Connections Act of 2022,
Public Law 117–223, 136 Stat. 2280
(Safe Connections Act), which is
codified at 47 U.S.C. 345, requires
wireless providers to separate lines from
a multi-line account upon request of a
survivor of domestic violence and other
related crimes and abuses. 47 U.S.C.
345(b)(1). In an Order adopted today
implementing the Safe Connections Act,
the Commission adopted rules to
require covered providers to attempt to
authenticate, using multiple
authentication methods if necessary,
that a survivor requesting a line
separation is a user of a specific line or
lines. Covered providers must use
methods that are reasonably designed to
confirm the survivor is actually a user
of the specified line(s) on the account
when the survivor is not the primary
account holder or a designated user, and
this authentication shall be sufficient for
requesting a SIM change when made in
connection with a line separation
request. To the extent this requirement
differs from other authentication
E:\FR\FM\08DER2.SGM
08DER2
khammond on DSKJM1Z7X2PROD with RULES2
Federal Register / Vol. 88, No. 235 / Friday, December 8, 2023 / Rules and Regulations
requirements, including those in 47 CFR
64.2010, the line separation
authentication requirements the
Commission adopts to implement 47
U.S.C. 345 serve as an exception to
those other requirements. We also make
clear that the Safe Connections Actrelated exceptions to our new SIM
change and LNP rules for any SIM
change or port-out requests made in
connection with a legitimate line
separation request apply regardless of
whether a line separation request is
technically or operationally infeasible.
11. While the approach we take today
gives wireless providers the flexibility to
adapt to evolving threats, it also creates
an obligation that they adapt to those
threats. Specifically, our rule establishes
a requirement that wireless providers
regularly, but not less than annually,
review and, as necessary, update their
customer authentication methods to
ensure those methods continue to be
secure. The record reflects that while
many authentication measures may be
effective today, evolving tactics may
mean those methods will not work
tomorrow or in all circumstances. If
wireless providers fail to evolve their
authentication methods over time, we
expect their methods eventually will
become ineffective. Therefore, we
require wireless providers to regularly,
but not less than annually, review their
authentication methods, and update
them as necessary to ensure that the
authentication methods remain
effective.
12. Because we impose a general
requirement for secure and reasonably
designed customer authentication, both
permitting and obligating wireless
providers to design effective methods to
authenticate customers, we decline to
enumerate the four specific
authentication methods the Commission
specified in the SIM Swap and Port-Out
Fraud Notice as those that would meet
the standard of secure authentication
methods. Those four methods were: (i)
the use of a pre-established password;
(ii) a one-time passcode sent via text
message to the account phone number
or a pre-registered backup number; (iii)
a one-time passcode sent via email to
the email address associated with the
account; or (iv) a passcode sent using a
voice call to the account phone number
or a preregistered back-up telephone
number. No commenters supported our
imposing these as the exclusive forms of
authentication. We are convinced by the
record that specifying approved
authentication methods may incentivize
wireless providers to rely exclusively on
those methods or discourage them from
adopting new methods to address
evolving techniques used by bad actors.
VerDate Sep<11>2014
17:02 Dec 07, 2023
Jkt 262001
Further, some commenters assert that
requiring specific authentication
methods would be burdensome for
wireless providers. Additionally, the
record reflects that setting specific
authentication methods could provide a
roadmap for bad actors seeking to
commit fraud. The record also
highlights potential vulnerabilities of
the four authentication methods we
proposed, which counsels against us
codifying these as secure methods of
authentication in perpetuity. For these
reasons, we conclude it is most
appropriate to allow wireless providers
to analyze and implement the most
effective and secure methods of
authenticating customers requesting a
SIM change. For similar reasons, we
also decline to require carriers to
comply with the National Institute of
Standards and Technology (NIST)
Digital Identity Guidelines or other
standards proposed in the record.
13. We nevertheless place boundaries
on the use of certain information for
customer authentication for SIM change
requests in light of evidence in the
record of their particular vulnerability.
Namely, we conclude, consistent with
our proposal, that methods of
authentication that use readily available
biographical information, account
information, recent payment
information, and call detail information
do not constitute secure methods of
authentication. We decline to establish
an exigent circumstances exception on
the use of this information for
authentication for when customers are
traveling and may not have access to or
remember a PIN, as CTIA asked us to
consider. We believe that such an
exception would establish a significant
loophole for fraudulent activity and
note that in these circumstances,
customers can use alternative methods
of authentication, such as email. We
strongly encourage providers to work
with customers to develop backup
authentication practices for use in these
types of scenarios. We seek comment in
the Further Notice on whether we
should harmonize our CPNI rules with
the SIM change rules we adopt today,
and we therefore take no action, at this
time, to amend our existing rules to
prohibit providers from relying on
recent payment and call detail
information to authenticate customers
for online, telephone, or in-person
access to CPNI.
14. We decline to restrict the use of
SMS-based customer authentication for
SIM change requests, but we strongly
encourage wireless providers to use this
mechanism only when paired with
other secure methods of authentication,
i.e., as part of multi-factor
PO 00000
Frm 00005
Fmt 4701
Sfmt 4700
85797
authentication (MFA). In the SIM Swap
and Port-Out Fraud Notice, we sought
comment on the potential security
vulnerabilities of SMS-based
authentication. The record clearly
expresses concern about the security
risks of SMS-based authentication when
used by third parties, such as financial
institutions, largely because this
authentication method becomes
vulnerable following fraudulent SIM
swaps. The record evidence is less clear
that SMS-based authentication is an
insecure mechanism in every instance it
is used, such as to authenticate the
identity of individuals requesting a SIM
change, particularly when sent over a
provider’s own network, rather than the
Public Switched Telephone Network
(PSTN). We also acknowledge that, in
some instances, it may be the most
practical means a provider can
authenticate a customer, particularly
when considering the needs of a
particular customer. We anticipate that
the approach we take here strikes the
right balance between protecting
customers against SIM swap fraud while
preserving the relative ease with which
customers can obtain legitimate SIM
changes. We emphasize, however, that
our rules create an ongoing obligation
that wireless providers ensure the
authentication methods they use are
secure. Accordingly, permitting wireless
providers to use SMS-based
authentication does not create a safe
harbor for use of this authentication
method. We will continue to monitor
the use of SMS-based authentication
and may later revisit our decision to
permit its continued use.
2. Response to Failed Authentication
Attempts
15. We require wireless providers to
develop, maintain, and implement
procedures for responding to failed
authentication attempts in connection
with a SIM change request that are
reasonably designed to prevent
unauthorized access to a customer’s
account, which, among other things,
take into consideration the needs of
survivors pursuant to the Safe
Connections Act and our implementing
rules. We are bolstered by the Princeton
University researchers who found
evidence that wireless providers’
procedures to respond to suspicious
authentication attempts may be
inadequate or nonexistent. Specifically,
they determined that some wireless
providers only required callers to
successfully respond to one
authentication challenge to obtain a SIM
change even if the caller had failed
numerous previous authentication
attempts. While the SIM Swap and Port-
E:\FR\FM\08DER2.SGM
08DER2
khammond on DSKJM1Z7X2PROD with RULES2
85798
Federal Register / Vol. 88, No. 235 / Friday, December 8, 2023 / Rules and Regulations
Out Fraud Notice raised these issues, no
commenters offered evidence to counter
the researchers’ findings. Without
procedures in place to respond to failed
authentication attempts, bad actors can
seek to circumvent wireless provider
authentication mechanisms to
fraudulently obtain a SIM change. We
anticipate that requiring wireless
providers to establish procedures to
respond to failed authentication
attempts that are reasonably designed to
prevent unauthorized access to a
customer’s account will impede these
fraud attempts. We conclude that
whatever burdens may be associated
with this requirement are outweighed
by the Commission’s interest in
protecting customers against fraudulent
activity.
16. At the same time, we are
persuaded by T-Mobile’s argument that
wireless providers need flexibility with
respect to failed authentication attempts
because it is common for customers to
lose or forget their authentication data,
leading to multiple failed attempts. As
such, we decline at this time to adopt
prescriptive requirements for how
wireless providers must respond to
failed authentication attempts in
connection with a SIM change request.
We find that anchoring this rule in a
reasonableness standard will give
wireless providers flexibility to design
procedures to handle failed
authentication attempts that protect
against fraudulent activity while
preventing unnecessary burdens on
legitimate customer activity. We
decline, however, to adopt CTIA’s
suggestion to require the development
and implementation of such procedures
only where a wireless provider has
reason to believe multiple
authentication attempts are fraudulent;
CTIA does not address how such
determinations would be made absent
the very procedures we require.
17. We decline, at this time, to adopt
a requirement that wireless providers
immediately notify customers in the
event of multiple failed authentication
attempts in connection with SIM change
requests. Industry commenters assert
that ‘‘in many cases, providers will not
be able to discern whether a failed
authentication attempt is ‘in connection
with a SIM change request’ or some
other type of transaction involving
account access for which authentication
is needed and fails,’’ and that ‘‘a carrier
does not typically know why a customer
authenticates until after the customer
has successfully authenticated.’’
Further, commenters raise concerns that
tracking such attempts across platforms
could be technically challenging,
though we are not persuaded that doing
VerDate Sep<11>2014
17:02 Dec 07, 2023
Jkt 262001
so is technically infeasible. For
example, CTIA’s proposal that carriers
should only be required to develop and
implement procedures for responding to
multiple failed authentication attempts
‘‘where a carrier has reason to believe
such attempts are fraudulent’’ implies
that wireless carriers can and do track
multiple authentication attempts, or, at
a minimum, are technically capable of
doing so. Given these concerns, we find
that requiring wireless providers to
notify customers immediately of
multiple failed authentication attempts
associated with a SIM change request is
not appropriate at this time. However,
we seek comment in the Further Notice
below whether we should require
wireless providers, or all
telecommunications carriers, to notify
customers immediately of all failed
authentication attempts to help protect
customers from account fraud, as well
as how wireless providers could
implement a customer notice
requirement for multiple failed
authentication attempts.
18. We also decline to require that
wireless providers delay SIM changes
for 24 hours in the event of failed
authentication attempts while notifying
customers via text message and/or email
regarding the failed authentication
attempts. The record reflects that strict
requirements involving 24-hour delays
or account locks could be overly
burdensome for customers that are
engaged in legitimate SIM changes. We
also anticipate that the requirement to
develop, maintain, and implement
procedures for responding to failed
authentication attempts in connection
with a SIM change request that are
reasonably designed to prevent
unauthorized access to a customer’s
account, coupled with the requirement
we adopt below that wireless providers
immediately notify customers upon
receiving a SIM change request, will be
sufficient to empower customers to
quickly address unauthorized SIM
change attempts.
3. Customer Notification of SIM Change
Requests
19. To provide customers with an
early warning that their account may be
subject to fraudulent activity, we adopt
our proposal to require wireless
providers to provide immediate
notification to customers of any requests
for a SIM change associated with the
customer’s account and specify that the
notification must be sent before a
wireless provider effectuates a SIM
change, except to the extent otherwise
required by the Safe Connections Act of
2022 (47 U.S.C. 345) the Commission’s
rules implementing that statute. The
PO 00000
Frm 00006
Fmt 4701
Sfmt 4700
record evinces firm support for this
requirement and provides good reason—
time is often of the essence with SIM
swap fraud, and notifying customers of
a SIM change request before effectuating
the request will enable customers to act
promptly to mitigate damages and
inconvenience resulting from fraudulent
or inadvertent SIM changes. We also
expect that requiring notification before
the request is processed will prevent the
notification from being sent to the bad
actor after a SIM swap has occurred. For
these reasons, we agree with Princeton
University that ‘‘[t]here is an
unambiguous and material security
upside,’’ to immediate customer
notification of SIM change requests, and
‘‘the only downside is a very infrequent
notification that the customer can easily
discard’’ for legitimate requests.
20. We therefore disagree with
AT&T’s contention that notification of
all SIM change requests is unnecessary
because ‘‘AT&T employs various tools
to assess the risk level of a particular
postpaid SIM change or port-out request
and very often can determine at the
outset that a request is legitimate.’’ The
notification requirement we adopt today
will provide a uniform safety measure
for all requests across the mobile
wireless industry, which we anticipate
will reduce the instances and mitigate
the harms of SIM swap fraud. We also
disagree with AT&T’s assertion that
customers will become so inundated
with SIM change notifications that they
will ‘‘eventually become numb or
immune to them or tire of and
consciously choose to ignore them, thus
undermining all value they might
otherwise have when the threat of fraud
is real.’’ Nothing in the record, or our
understanding of the SIM change
process, supports the notion that
customers request SIM changes at such
a rate that, upon the adoption of this
rule, wireless providers will be forced to
inundate their customers with the
required notifications. For the same
reasons, we decline AT&T’s request that
we modify the mandatory SIM change
request notification requirement ‘‘either
to (1) standalone SIM transactions—i.e.,
SIM swaps that do not include a device
change or upgrade—based on the lower
propensity for fraud in transactions
involving new devices, or (2) SIM
transactions that a carrier identifies as
having a high propensity for fraud,’’ on
the basis such notifications could cause
customer confusion, concern, and
fatigue, and could increase costs for
carriers because such notifications
increase customer calls.
21. Also contrary to AT&T’s
assertions, we do not anticipate that the
notification requirement we adopt today
E:\FR\FM\08DER2.SGM
08DER2
khammond on DSKJM1Z7X2PROD with RULES2
Federal Register / Vol. 88, No. 235 / Friday, December 8, 2023 / Rules and Regulations
will be overly burdensome for wireless
providers to implement. As an initial
matter, wireless providers should
already have processes in place to
immediately notify customers of certain
account changes involving CPNI in
accordance with our existing rules, so
they should be able to build on these
processes to provide immediate
notification regarding SIM change
requests. The record also demonstrates
that some wireless providers already
notify customers of SIM change requests
in most instances and therefore will
only need to update their processes to
notify customers in all cases.
Additionally, as discussed below, we
give wireless providers flexibility on
how to provide the required
notifications, which we expect further
minimizes any potential burdens
associated with our new rule. For the
same reasons, we decline CTIA’s request
‘‘to let providers determine whether a
notice is warranted or effective in the
first instance’’ on the basis that such
flexibility is needed to deal with
instances, for example, when a phone is
lost or stolen and expedient forms of
notification may not be available. We do
not prohibit wireless providers from
processing SIM change requests after the
notification is sent, and because bad
actors may attempt to commit SIM swap
fraud by claiming that a device is lost
or stolen, that is precisely the type of
situation when we want to ensure
customers are provided a notification of
a SIM change request. In any event, we
find that the benefits of our notification
requirement outweigh the potential
burdens.
22. We permit wireless providers to
determine the method of providing
notifications regarding SIM change
requests involving a customer’s account,
but specify that the notifications must
be reasonably designed to reach the
customer associated with the account,
and sent in accordance with customer
preferences, if indicated. For example,
this would include delivering a
notification in the language of the
customer’s choosing, if the wireless
provider permits communications
preferences in other languages and the
customer has previously indicated such
choice. Although some commenters
suggest that we should specify the
means by which a wireless provider
should deliver SIM change request
notifications, we agree with industry
commenters that providers need
flexibility to determine the most
appropriate method to notify their
customers of a pending SIM change
request, so that providers can account
for ‘‘the complexities of notifications in
VerDate Sep<11>2014
17:02 Dec 07, 2023
Jkt 262001
various contexts,’’ as well as the
technical capabilities, accessibility
needs, or broadband access of
individual customers. For example,
when a customer is requesting a SIM
change because the customer’s phone is
lost or stolen, our flexible approach
enables wireless providers to use
methods of notification that are most
likely to reach the customer under those
circumstances, such as an email or a
text or call to a pre-determined back-up
phone number. We also aim to enable
wireless providers to send notifications
in accordance with customer
preferences, needs, and established
expectations. As such, we permit
wireless providers to use existing
methods of notification that are
reasonably designed to reach the
customer associated with the account,
and we encourage them to adopt new
notification methods as they are
developed to stay responsive to evolving
fraud schemes. Such methods include,
but are not limited to, live or automated
telephone calls, text messages, emails,
or push notification through wireless
provider software applications. We
acknowledge that our new rule differs
from our existing rule that providers
deliver notification of other account
changes involving CPNI, which
specifies that those notifications may be
delivered through a carrier-originated
voicemail or text message to the
telephone number of record, or by mail
to the address of record. We find that
departing from the existing rule’s
approach is appropriate given the depth
of harm that can occur from SIM swap
fraud, the need for wireless providers to
be able to choose the most effective
method of quickly alerting customers so
that customers can take action to
mitigate harm, and the importance of
providers adopting new forms of
notification.
23. Our rule also gives carriers the
flexibility to design a notification
process that accommodates scenarios
beyond individual customers, such as a
business customer seeking bulk SIM
changes to upgrade their equipment. We
note that nothing in the customer
safeguard rules we adopt today is
inconsistent with or intended to
supersede the Commission’s existing
business customer exemption, which
permits telecommunications carriers to
‘‘bind themselves contractually to
authentications regimes other than those
described in this section for services
they provide to their business customers
that have both a dedicated account
representative and a contract that
specifically addresses the carriers’
protection of CPNI.’’
PO 00000
Frm 00007
Fmt 4701
Sfmt 4700
85799
24. We also decline to prescribe
particular content or wording of SIM
change notifications, recognizing that
wireless providers are in the best
position to determine what will most
effectively notify customers of SIM
change requests and potential fraud and
will need to tailor notifications to
customers’ service plans and
circumstances. Nevertheless, consistent
with the record and our CPNI rules, we
specify that such notifications must use
clear and concise language that provides
sufficient information to effectively
inform a customer that a SIM change
request involving the customer’s SIM
was made. We observe that our rule
does not prohibit wireless providers
from using different content and
wording for notifications depending on
a provider’s risk assessment of a given
SIM change request, so long as the
notification uses clear and concise
language and is reasonably designed to
reach the actual customer.
25. We further decline to require a
delay for customer verification or
acknowledgement in connection with
notifications prior to completing a SIM
change request. In the SIM Swap and
Port-Out Fraud Notice, we sought
comment on whether we should require
a 24-hour delay (or other period of time)
before a wireless provider effectuates a
SIM change while notifying the
customer via text message, email, the
provider’s app, or push notification, and
requesting verification of the request.
This approach received minimal
support in the record, and we are
convinced by other record evidence that
the burdens of delay and verification
requirements outweigh the benefits,
particularly given how regularly
customers seek legitimate SIM changes.
For instance, CTIA explains that a
blanket delay would ‘‘make it
exceedingly difficult for a consumer to
obtain a new phone and continued
service when a device breaks or is lost,
representing a full day where that
consumer could not rely on their
wireless service for . . . ‘keeping in
touch with friends through voice calls
and text messages’ [and] placing lifesaving public safety calls.’’ AT&T and
T-Mobile echoed these concerns. We
also anticipate that the authentication,
notification, and remediation
requirements we adopt today will
sufficiently mitigate fraudulent SIM
change requests without the need for a
burdensome delay and verification
process. While we do not require
wireless providers to implement a delay
and verification process, we permit
them to do so in instances when they
determine these measures are necessary
E:\FR\FM\08DER2.SGM
08DER2
85800
Federal Register / Vol. 88, No. 235 / Friday, December 8, 2023 / Rules and Regulations
khammond on DSKJM1Z7X2PROD with RULES2
to protect against fraud, but stress that
this process should not be used to delay
legitimate SIM change requests.
4. Account Locks for SIM Changes
26. We require wireless providers to
offer all customers, at no cost, the
option to lock or freeze their account to
stop SIM changes. We anticipate that
this requirement will provide customers
with more consistent and meaningful
protection against SIM swap fraud, and
this expectation is supported by the
record, which reflects that account locks
can be powerful tools against SIM swap
fraud, particularly for customers that are
at high-risk of being a target of the
practice. We adopt our proposal that
account locks must be offered to all
customers at no cost because we find
that a customer’s financial means
should not dictate their access to this
enhanced security measure, particularly
since customers with lesser financial
means may suffer the greatest
consequences of SIM swap fraud. This
requirement is consistent with other
Commission rules governing preferred
carrier freezes for Local Exchange
Carriers, see 47 CFR 64.1190, as well as
the requirements adopted for port-out
locks. To simplify the ability for
customers to take advantage of account
locks for SIM changes and number
ports, we encourage wireless carriers to
offer customers the ability to activate
both locks in one step.
27. Like the other rules we adopt
today, we give wireless providers
flexibility on how to comply with this
measure. In particular, the record does
not evince a need for us to prescribe a
method or methods for customers to
unlock their accounts or impose a
waiting period before an unlocked
account can be transferred, and as such,
we decline to do so at this time. We do
require, however, that the process to
activate and deactivate an account lock
must not be unduly burdensome for
customers such that it effectively
inhibits them from implementing their
choice. Additionally, we stress that
when activated, wireless providers must
not fulfill SIM change requests until the
customer deactivates the lock, except to
the extent otherwise required by the
Safe Connections Act or the
Commission’s rules implementing that
statute. We find that the account lock
requirement is technically feasible,
particularly given evidence that some
wireless providers already offer this
feature to customers. Additionally, we
are unpersuaded by AT&T’s claim that
‘‘building a system that is capable of
widespread adoption of [account locks]
would entail significant carrier costs
and time for questionable gain.’’ We
VerDate Sep<11>2014
17:02 Dec 07, 2023
Jkt 262001
anticipate that because of these existing
account lock offerings and the flexible
approach we take, the rule will not be
unduly costly for wireless providers to
implement, and that to the extent there
are costs associated with the
requirement, they are outweighed by the
associated benefits of preventing
fraudulent activity.
28. Consistent with this flexible
approach, we permit wireless providers
to proactively initiate a SIM swap lock
on a customer’s account when a
provider believes the customer may be
at high risk of fraud. We are persuaded
by T-Mobile’s assertion that such
capability is valuable because wireless
providers are sometimes positioned to
know when a customer is at high risk of
SIM swap fraud and that this tool allows
them to help customers secure their
accounts. However, we require that
wireless providers promptly provide
clear notification to the customer that
the lock has been activated with
instructions on how the customer can
deactivate the account lock if the
customer chooses, and to promptly
comply with the customer’s legitimate
request to deactivate the account lock.
We also caution wireless providers that
any proactive initiation of a SIM change
lock must be limited in duration and
extend only so long as the high risk of
fraud is evident to the provider. In
establishing this limitation, we intend to
prohibit wireless provider abuse of SIM
change locks to avoid, among other
outcomes, preventing the customer from
terminating service with the provider or
moving to another competing provider.
29. Given the protection that account
locks can provide to customers, we
conclude that it should be offered to
customers of both pre-paid and postpaid services. We are unpersuaded by
AT&T’s assertion that pre-paid service is
not amenable to account locks because
‘‘[s]ome prepaid customers provide little
personal information when they activate
their account,’’ which could make it
difficult to authenticate a customer to
unlock an account. Because the account
lock is an optional security measure for
customers, wireless providers can, if
necessary, require customers to provide
information to use for authentication
purposes to activate the account lock.
30. We also disagree with AT&T that
an account lock option ‘‘should remain
a tool that carriers can choose, but are
not required, to offer.’’ AT&T
acknowledges that ‘‘[a]ccount locks can
be an effective tool to increase the
security of customer accounts on
occasion,’’ but it suggests that because
‘‘they are not needed to manage the risk
of fraud in every case and for every
customer,’’ wireless providers should
PO 00000
Frm 00008
Fmt 4701
Sfmt 4700
not be required to offer them to all
customers. While AT&T’s approach
would leave the choice of whether an
account lock is necessary exclusively in
the hands of wireless providers, we
conclude this choice should be placed
principally in the hands of the
customer, the party that is potentially at
risk for SIM swap fraud, and therefore
we require providers to offer the option
to all customers. Likewise, AT&T’s
concern that ‘‘an account lock can be a
source of friction’’ even for a postpaid
customer when the ‘‘customer forgets
having placed the freeze on the account
or dislikes the efforts needed to unfreeze
the account’’ is not, we conclude, a
valid basis for declining to require that
wireless providers offer SIM change
locks. The benefits of this account
security measure outweigh any potential
friction, and we expect that wireless
providers can take steps to mitigate any
such friction if they choose, such as by
providing customers with periodic
reminders that they have activated the
account lock and on how they can
deactivate the lock. Because of the
authentication challenges for pre-paid
customers and the potential friction for
customers who may not want SIM
changes to be more difficult, we decline
to require account locks be activated by
default, on an opt-out basis, as BPI/BITS
suggests. We are also unconvinced by
comments claiming that SIM change
locks may be of limited value to
customers. This requirement empowers
high-risk and security-minded
customers to enable additional
protections beyond the enhanced
authentication requirements and other
security measures we adopt today, and
it need not be activated by a large
percentage of customers for it to be
valuable.
5. Tracking Effectiveness of SIM Change
Protection Measures
31. We require wireless providers to
establish processes to reasonably track
and maintain information regarding SIM
change requests and their authentication
measures, and to retain that information
for a minimum of three years. We agree
with the Princeton University
researchers that a tracking requirement
will equip wireless providers ‘‘to
measure the effectiveness of their
customer authentication and account
protection measures,’’ and find that they
would not otherwise be able to do so
effectively without collecting such
information. Consistent with
recommendations in the record by the
Princeton University researchers, we
specifically require wireless providers
to collect and maintain the following
information regarding SIM change
E:\FR\FM\08DER2.SGM
08DER2
khammond on DSKJM1Z7X2PROD with RULES2
Federal Register / Vol. 88, No. 235 / Friday, December 8, 2023 / Rules and Regulations
requests and authentication measures:
the total number of SIM change
requests, the number of successful SIM
changes requests, the number of failed
SIM change requests, the number of
successful fraudulent SIM change
requests, the average time to remediate
a fraudulent SIM change, the total
number of complaints received
regarding fraudulent SIM changes, the
authentication measures the wireless
provider has implemented, and when
those authentication measures change.
We also strongly encourage them to
collect and retain any additional
information that will help them measure
the effectiveness of their customer
authentication and account protection
measures. We find that the three-year
retention period is appropriate because
it allows providers to track the
effectiveness of their measures over time
and ensures the information is available
for a sufficient time should the
Commission request it for review. The
requirement that wireless providers
collect and maintain information
regarding when authentication measures
change simply means that providers
must track the introduction and removal
of such measures, and not updates or
refinements to existing measures.
32. We disagree with CTIA’s
assertions that a recordkeeping
requirement will divert resources from
combating incidences of SIM swap
fraud. Instead we find that this data
tracking requirement is critical to
wireless providers’ efforts to keep ahead
of evolving fraud techniques. And the
record reflects that some wireless
providers already track and analyze
information regarding SIM swap fraud
and their account protection measures
to improve those measures, indicating
that this is a practical and cost-effective
practice. Thus, while we recognize that
this recordkeeping requirement may not
be without cost, particularly for wireless
providers who do not already collect
such information, we find that the
benefits of this requirement far exceed
any potential costs.
33. We agree with CTIA that the data
tracking and retention requirements
should only be prospective in nature,
and as such, we make clear that our rule
does not obligate wireless providers to
research and collect historic data. We
conclude that including historic data in
the data tracking requirements we adopt
would be burdensome, or even
impossible, for small wireless providers
and those who do not already track this
information. We decline to adopt
reporting and audit requirements in
conjunction with our data tracking
requirement, but we do require wireless
providers to make the information they
VerDate Sep<11>2014
17:02 Dec 07, 2023
Jkt 262001
collect available to the Commission
upon request. Because the information
we require wireless providers to collect
does not include personally identifiable
information (PII) or CPNI, wireless
providers will not be required to
provide PII or CPNI in response to
Commission requests for this
information, but the Enforcement
Bureau may request PII or CPNI in the
course of a specific investigation.
Although regular reporting and audit
requirements can improve wireless
provider incentives and accountability,
we do not find that such measures are
necessary at this time in light of the
other measures we adopt today and
providers’ ongoing commitment to be
vigilant in combating fraud. We
maintain the ability to obtain collected
information from wireless providers as
needed, not only as a potential tool to
evaluate whether providers are
implementing sufficient measures to
address SIM swap fraud, but also to
evaluate whether the specific
requirements we adopt today continue
to be effective or in need of updates to
address the evolution of fraud
techniques. Consequently, we find that
there are insufficient benefits of a
regular reporting requirement to
outweigh the potential costs.
6. Safeguards on Employee Access to
CPNI
34. We require wireless providers to
establish safeguards and processes so
that employees who receive inbound
customer communications are unable to
access CPNI in the course of that
customer interaction until after a
customer has been properly
authenticated. We find, based on the
record before us, that requiring wireless
providers to limit access to CPNI by
employees who receive inbound
customer communications until after
the customer has been properly
authenticated will help to minimize the
incidences of SIM swap fraud by
preventing customer service
representatives from inadvertently or
intentionally assisting bad actors in
fraudulent schemes. We are persuaded
that, even with the customer service
representative training requirements we
adopt today, allowing employees who
receive inbound customer
communications to access CPNI prior to
proper authentication of the customer is
unnecessary and possibly ‘‘invites
adversaries to exploit sympathetic,
inattentive, or malicious customer
service representatives for account
access.’’ While we anticipate that
employees will comply with training
requirements in good faith, ‘‘[t]here
should be no opportunity for a
PO 00000
Frm 00009
Fmt 4701
Sfmt 4700
85801
representative to give a hint or a free
pass’’ that will help bad actors commit
fraud. We therefore conclude that
requiring wireless providers to establish
safeguards and processes so that
employees who receive inbound
customer communications are unable to
access CPNI in the course of that
customer interaction until after the
customer has been properly
authenticated—‘‘a straightforward fix’’
and standard data security best
practice—will provide meaningful
protection in helping to combat SIM
swap fraud. We find that the benefits of
this requirement outweigh any potential
costs, and that any such costs will be
mitigated by allowing
telecommunications carriers flexibility
to determine the particular safeguards
and processes that will prevent
employees who receive inbound
customer communications from
accessing CPNI in the course of that
customer interaction until after a
customer has been properly
authenticated. Below, we seek comment
on whether to require all
telecommunications carriers to limit
access to CPNI by employees who
receive inbound customer
communications until after the
customer has been properly
authenticated to minimize customer
account fraud.
35. We decline to adopt other
suggested employee safeguards that are
overly prescriptive and for which the
costs outweigh the benefits. In the SIM
Swap and Port-Out Fraud Notice we
sought comment on other ways to avoid
employee malfeasance, such as
requiring two employees to sign off on
every SIM change. Although we
anticipate that two-employee sign off
could be an effective account protection
mechanism and encourage wireless
providers to use this procedure when
appropriate, we are persuaded by
AT&T’s argument that requiring this
procedure for every SIM change would
be a significant burden on legitimate
SIM change requests given the
uncertainty regarding whether it would
prevent SIM swap fraud in most
instances, and therefore decline to adopt
it. We also reject several other
requirements proposed in the record
concerning customer service
representatives who perform SIM
changes. Specifically, a mandate that
employees who perform SIM swaps be
subject to enhanced background checks
may be financially and practically
infeasible for large and small wireless
providers alike, and could create an
incentive for providers to reduce the
number of employees capable of
E:\FR\FM\08DER2.SGM
08DER2
85802
Federal Register / Vol. 88, No. 235 / Friday, December 8, 2023 / Rules and Regulations
performing SIM changes, which would
slow the processing of legitimate
changes. Requiring employees to swipe
a company badge when entering secure
facilities is a good practice that we
encourage wireless providers to adopt,
but the record does not address how this
requirement would serve to prevent SIM
swap fraud. The proposal to require
employees to sign a restrictive
confidentiality agreement is faulty for
the same reason. Moreover, a proposed
restriction on use of performance
incentives is overly broad, could stifle
competition, and might prevent
customers from accessing special offers.
Finally, we decline to adopt a proposal
that wireless providers ‘‘be required to
have heightened SIM swap customer
care during [weekends and evenings].’’
We find that providers are best
positioned to implement procedures
tailored to the level of risk at any given
time and should have the flexibility to
adjust their practices to address the
evolving nature of fraudulent activity.
khammond on DSKJM1Z7X2PROD with RULES2
7. Telecommunications Carriers’ Duty
To Protect CPNI
36. While the record shows that some
wireless providers have implemented
CPNI security practices beyond those
required by current rules, SIM swap
fraud persists. We are also concerned
that some wireless providers may view
the protection measures we adopt today
as sufficient, rather than baseline,
protections against SIM swap fraud. To
ensure that wireless providers adapt
their security practices on an ongoing
basis to address evolving techniques
used by bad actors to commit SIM swap
fraud, we take this opportunity to
remind all telecommunications carriers
of their statutory duty to ‘‘protect the
confidentiality of proprietary
information of, and relating to . . .
customers,’’ and their continuing
preexisting legal obligation to ‘‘take
reasonable measures to discover and
protect against attempts to gain
unauthorized access to CPNI.’’
Consistent with the Commission’s
approach in the 2007 CPNI Order, we
conclude that these existing legal
obligations necessarily obligate
telecommunications carriers to
proactively and regularly review and
monitor their policies and procedures to
ensure that they continue to be effective
at addressing evolving fraud techniques
against customer accounts and
services—including SIM swap and portout fraud—and to conduct analyses of
fraud incidents to determine how the
fraud occurred and implement measures
to prevent such tactics from being
successful again in the future.
VerDate Sep<11>2014
17:02 Dec 07, 2023
Jkt 262001
B. Strengthening the Commission’s
Number Porting Rules To Protect
Consumers
37. Given the potential for consumer
harm from port-out fraud, we conclude
that the time is ripe to strengthen our
number porting rules with baseline
measures to increase the protections for
customers against fraudulent port-outs.
As with our new SIM change rules, the
backbone of our new number porting
rules is a requirement that wireless
providers use secure methods to
authenticate customers that are
reasonably designed to confirm a
customer’s identity prior to effectuating
number ports, and we also require
wireless providers to notify customers
of port-out requests and allow
customers to lock their accounts to
prevent port-outs. To future-proof our
requirements, we give wireless
providers flexibility in how to
implement them. We anticipate that
these new rules will work together to
provide meaningful protection to
customers while preserving the efficient
and effective processing of port-out
requests that promotes customer choice
and competition. As with our new SIM
change rules, we apply these new
requirements exclusively to providers of
CMRS, as defined in Section 20.3 of
Title 47 of the Code of Federal
Regulations, including resellers of
CMRS, as the record shows that port-out
fraud is focused on mobile wireless
customers. We likewise require wireless
providers to implement these rules with
respect to customers of both pre-paid
and postpaid services.
1. Customer Authentication
Requirements
38. We revise our porting rules to
require that wireless providers use
secure methods to authenticate
customers that are reasonably designed
to confirm a customer’s identity before
completing a port-out request, except to
the extent otherwise required by the
Safe Connections Act or the
Commission’s rules implementing that
statute. Consistent with our new SIM
change authentication rules, we require
wireless providers to regularly, but not
less than annually, review and, as
necessary, update their customer
authentication methods to ensure those
methods continue to be secure.
39. The Safe Connections Act
prohibits wireless providers from
making a line separation contingent on
a prohibition or limitation on number
portability, provided such portability is
technically feasible. The Commission’s
rules adopted today implementing the
Safe Connections Act require covered
PO 00000
Frm 00010
Fmt 4701
Sfmt 4700
providers to attempt to authenticate,
using multiple authentication methods
if necessary, that a survivor requesting
a line separation is a user of a specific
line or lines. Covered providers must
use methods that are reasonably
designed to confirm the survivor is
actually a user of the specified line(s) on
the account when the survivor is not the
primary account holder or a designated
user. To the extent this requirement
differs from other authentication
requirements, including those in 47 CFR
64.2010, the line separation
authentication requirements the
Commission adopts to implement 47
U.S.C. 345 serve as an exception to
those other requirements.
40. As in the SIM change context, we
are persuaded by commenters that a
general security authentication standard
will best allow wireless providers the
flexibility to respond to advances in the
technology and tactics used by bad
actors, providing the greatest protection
for customers, and enabling providers to
implement authentication methods in
ways that work best for the particular
services they offer. The record reflects
that the benefits of allowing wireless
providers to determine the best method
for authenticating customers outweigh
speculative concerns that absent
standardized authentication methods,
nationwide providers could arbitrarily
determine which authentication
methods or controls are sufficient before
effectuating ports. We note also that
under the Act and our existing rules, all
carriers are required to complete
legitimate ports, and that our new
customer authentication requirements
do not give carriers the authority to
make determinations about the
sufficiency of another carrier’s
authentication methods—that
responsibility will belong to the
Commission, and we will address any
concerns regarding the adequacy of
authentication methods, as well as
inappropriate port denials, as needed.
We also agree with CCA that our
approach will better serve small
wireless providers by permitting them
to ‘‘use technologies that are reasonably
available and have choice in the
approach to take in authenticating their
customers.’’ Additionally, as we
concluded with regard to authentication
for SIM changes, this flexible approach
should resolve concerns about
authenticating customers of pre-paid
accounts.
41. We are mindful of the potential
effect on competition of our new
customer authentication requirements,
and thus, we require that the secure
authentication methods wireless
providers adopt accommodate the needs
E:\FR\FM\08DER2.SGM
08DER2
Federal Register / Vol. 88, No. 235 / Friday, December 8, 2023 / Rules and Regulations
khammond on DSKJM1Z7X2PROD with RULES2
of the broad spectrum of customers they
may serve, including those who do not
have data plans or data-enabled devices,
have varying degrees of technological
literacy, or have disabilities or
accommodation needs. To illustrate, we
observe that wireless providers may find
requiring a one-time port-out PIN
obtained through a provider app is an
effective means for authenticating
customers with a data-enabled smart
phone, but that authentication measure
may not be a feasible option for
customers without data plans or
smartphones, or for those customers
who are unable to navigate the
technology. As such, this requirement
may necessitate the use of multiple
authentication methods, such as inperson authentication using
government-issued identification, overthe-phone authentication, or alternative
methods for individuals with
disabilities.
42. We do not anticipate that using
secure methods to authenticate a
customer requesting a port-out will be
burdensome to wireless providers or
unreasonably delay the processing of
port-out requests. The record reflects
that many wireless providers have
already developed and implemented
some form of customer authentication
for port-out requests. The approach we
adopt today will allow wireless
providers to continue using or building
upon what is already working in the
industry, helping to streamline
implementation and costs. We expect
wireless providers to design and
implement customer authentication
processes for port-out requests that
minimize porting delays and maintain
the industry agreed-upon two-and-a-half
hour porting interval for wireless ports.
2. Customer Notification of Port-Out
Requests
43. We also revise our numbering
rules to require wireless providers to
provide immediate notification to their
customers whenever a port-out request
is made, sent in accordance with
customer preferences, if indicated, and
specify that the notification must be
sent before a provider effectuates a port,
except to the extent otherwise required
by the Safe Connections Act of 2022 (47
U.S.C. 345) or the Commission’s rules
implementing that Act. For example,
this would include delivering a
notification in the language of the
customer’s choosing, if the wireless
provider permits communications
preferences in other languages and the
customer has previously indicated such
choice. We require that wireless
providers notify their customers
‘‘immediately’’ of a porting request to
VerDate Sep<11>2014
17:02 Dec 07, 2023
Jkt 262001
not only ensure that porting requests are
processed efficiently, but also help alert
customers quickly to potential fraud to
allow them to mitigate damages and
inconvenience resulting from fraudulent
or inadvertent port-outs. The
notification requirement will provide a
uniform safety measure for all port-out
requests across the mobile wireless
industry, which we anticipate will
reduce the instances of port-out fraud.
For the same reasons we raised in the
SIM change context, we decline to
impose a blanket yes/no verification
requirement for authentication attempts.
44. As with SIM change notifications,
we decline to prescribe particular
methods for providing port-out
notifications or particular content and
wording for these notifications, but do
require that the notification methods be
reasonably designed to reach the
customer associated with the account
and that the content and wording use
clear and concise language that provides
sufficient information to effectively
inform a customer that a port-out
request involving the customer’s
number was made. We recognize that
wireless providers are in the best
position to determine which notification
methods and what content and wording
will be most effective at notifying
customers of port-out requests and
potential fraud under the particular
circumstances, including the real-world
security needs of the transaction, and
the technical capabilities, accessibility
needs, or broadband access of
individual customers. As such, we
encourage wireless providers to leverage
existing notification methods that are
reasonably designed to reach the
customer associated with the account,
and to adopt new notification methods
as they are developed to stay responsive
to evolving fraud schemes.
45. On balance, we find that benefits
accrued from early warning to
customers of potential fraudulent
account activity outweigh any potential
burdens imposed on wireless providers
by this notification requirement. First,
we find that customer notification of
port-out requests is unlikely to prevent
or unreasonably delay customer porting
requests, as we require ‘‘immediate’’
notification and do not require a delay
or customer verification or
acknowledgement of that notification
before continuing the porting-out
process. Second, because wireless
providers are already familiar with
notifying customers regarding changes
to their accounts, and in many cases
likely already notify customers of portout requests, we anticipate that wireless
providers will face low burdens in
implementing today’s customer
PO 00000
Frm 00011
Fmt 4701
Sfmt 4700
85803
notification requirement for port-out
requests. We also expect that these
existing notification systems can be
leveraged to help minimize any
potential costs associated with notifying
customers of port-out requests. Third,
we disagree with AT&T’s assertion that
customer notification of port-out
requests will result in notice fatigue,
undermining its efficacy. Nothing in the
record supports the notion that
customers request port-outs at such a
rate that, upon the adoption of this rule,
wireless providers will be forced to
inundate their customers with the
required notifications. For the same
reasons, we decline CTIA’s request that
customer notification of port-out
requests be ‘‘limited to situations where
the carrier determines that there is an
increased risk of fraud’’ on the basis that
the notification requirements ‘‘threaten
to cause customer confusion, concern,
and fatigue,’’ and could increase costs
for carriers because such notifications
increase customer calls. As such, we
conclude that the significant benefits of
alerting customers to potential
fraudulent account activity outweighs
any speculative negative impacts on
wireless providers or customers.
3. Account Locks for Port-Outs
46. For the same reasons explained
above with respect to SIM change
requests, we require wireless providers
to offer their customers, at no cost, the
ability to lock or freeze their accounts to
stop port-outs. We anticipate that this
requirement will provide customers
with more consistent and meaningful
protection against fraudulent port-outs.
The record reflects that account locks
can be powerful tools against fraudulent
port-outs, particularly for customers that
are at high-risk of being a target of the
practice. As in the SIM swap context,
we conclude that it should be offered to
customers of both pre-paid and postpaid services, and that this requirement
is feasible for both categories of
customers despite assertions to the
contrary. Because the account lock is an
optional security measure for customers,
carriers can, if necessary, require
customers to provide information to use
for authentication purposes to activate
and deactivate the account lock.
47. Like the other rules we adopt
today, we give wireless providers
flexibility on how to comply with the
measure. In particular, the record does
not evince a need for us to prescribe a
method or methods for customers to
unlock or unfreeze their accounts or
impose a waiting period before an
unlocked account can be transferred,
and as such, we decline to do so at this
time. Although we do not prescribe the
E:\FR\FM\08DER2.SGM
08DER2
khammond on DSKJM1Z7X2PROD with RULES2
85804
Federal Register / Vol. 88, No. 235 / Friday, December 8, 2023 / Rules and Regulations
exact form of the account lock
mechanism wireless providers must
adopt, the process to activate and
deactivate an account lock must not be
unduly burdensome for customers such
that it effectively inhibits them from
implementing their choice. We stress
that when activated, wireless providers
must not fulfill port-out requests until
the customer deactivates the lock,
except to the extent otherwise required
by the Safe Connections Act or the
Commission’s rules implementing that
statute. We decline CTIA’s request that
the Commission find that mandatory
port-out PINs satisfy this requirement.
We discuss the benefits and drawbacks
of port-out PINs as a method of
customer authentication, above. We
disagree that a mandatory port-out PIN
has the same effect as an optional
account lock; while the two protections
serve complementary functions, one is
focused on customer authentication for
a specific one-time request, and the
other functions as a customer directed
general account security feature.
48. Consistent with this flexible
approach, and as we did with the SIM
change rules, we permit wireless
providers to proactively initiate a portout lock on a customers’ account when
they believe a customer may be at high
risk of fraud, so long as providers
promptly provide clear notifications to
those customers that a lock has been
activated with instructions on how the
customers can deactivate account locks
if they choose and promptly deactivates
the account lock upon receipt of the
customer’s legitimate request to do so.
We also caution wireless providers that
any proactive initiation of a port-out
lock must be limited in duration and
extend only so long as the high risk of
fraud is evident to the provider. In
establishing this limitation, we intend to
prohibit wireless provider abuse of portout locks to avoid, among other
outcomes, preventing the customer from
terminating service with the provider or
moving to another competing provider.
49. As with account locks for SIM
changes, given that several wireless
providers already voluntarily offer
account locks to all their customers, and
coupled with the flexible approach we
adopt, we are unpersuaded by AT&T’s
claim that implementing account lock
offerings will be unduly costly and
time-consuming for wireless providers.
To the extent there are costs associated
with the requirement, we find that they
are outweighed by the benefits.
4. Wireless Port Validation Fields
50. After review of the record, we
decline to codify the wireless port
validation fields. We also decline to
VerDate Sep<11>2014
17:02 Dec 07, 2023
Jkt 262001
require wireless providers to implement
a customer-initiated passcode field for
all wireless-to-wireless number porting
requests. Currently, the mobile wireless
industry uses four data fields of
customer-provided information to
validate a wireless-to-wireless porting
request: telephone number, account
number, five-digit ZIP code, and
passcode (if applicable). In the SIM
Swap and Port-Out Fraud Notice, we
sought comment on whether we should
‘‘codify the types of information carriers
must use to validate simple wireless-towireless port requests.’’ While some
commenters did not oppose codification
of some of the customer-provided
wireless data fields, they preferred that
the Commission continue to give
wireless providers the flexibility to
adjust to business and customer needs.
We are persuaded by the record that
separate codification of the customerprovided data fields for validation of
wireless-to-wireless ports is not
necessary at this time, as we have been
provided no evidence that wireless
providers are not complying with the
validation obligations imposed in the
Four Fields Declaratory Ruling. As such,
we decline to separately codify the
customer-provided wireless-to-wireless
port validation fields at this time.
C. Additional Consumer Protection
Measures
51. In the SIM Swap and Port-Out
Fraud Notice, we sought comment on
whether we should adopt additional
measures to address the problems
associated with SIM swap and port-out
fraud. As discussed below, we require
that wireless providers inform
customers of any account protection
mechanisms the provider offers, ensure
that customer service representatives are
trained to recognize bad actors’ attempts
at these fraudulent schemes, and deliver
timely resolution of SIM swap and portout fraud when it does occur. We
decline, however, to establish a working
group to further study and develop
solutions to address the harms of SIM
swap and port-out fraud. We also
decline to adopt other proposals in the
record regarding wireless provider
liability and dispute resolution related
to SIM swap and port-out fraud.
52. Customer Notice of Account
Protection Measures. Many of the
account protection measures wireless
providers offer and that we require
wireless providers to adopt today are
designed to empower customers to take
steps to protect themselves from SIM
swap and port-out fraud if they choose,
but this empowerment will be stifled if
customers are not effectively made
aware of the measures that are available.
PO 00000
Frm 00012
Fmt 4701
Sfmt 4700
Accordingly, we require wireless
providers to provide notice, using clear
and concise language, of any account
protection measures the provider offers,
including the measures we adopt in this
Report and Order, and make this notice
easily accessible via provider websites
and applications. We decline to specify
the exact format or content of the
required notice, as we agree with CCA
that wireless providers are wellpositioned to determine exactly how
best to communicate information about
account protection measures to their
customers. The record also
demonstrates that some wireless
providers have already developed
content to educate customers about
some account protection measures.
53. We decline to require wireless
providers to deliver an annual notice to
customers regarding the availability of
the account protection mechanisms they
offer. The record does not exhibit
support for this requirement and we
have no basis for concluding that it
would be meaningfully more beneficial
for customers than our requirement that
wireless providers make notice about
the availability of account protection
measures easily accessible through
provider websites and applications. We
therefore decline to adopt an annual
notice requirement.
54. Employee Training. We require
wireless providers to develop and
implement training for employees on
how to identify, investigate, prevent,
and remediate SIM swap and port-out
fraud. We find that adopting this
employee training requirement will
serve as a ‘‘first line of defense’’ against
these damaging and evolving practices
by preparing employees to defend
against such fraud and preventing them
from inadvertently or intentionally
assisting bad actors in fraudulent
schemes.
55. We agree with Verizon that
‘‘customer care and employee training
programs are critical for preventing and
identifying unauthorized and high-risk
SIM changes for postpaid customers,’’
and we find that all customers will
benefit from employee training. The
record reflects the industry’s recognition
of the importance of employee training;
the country’s three largest wireless
providers—Verizon, T-Mobile, and
AT&T—have already implemented some
training measures for customer service
representatives to identify, prevent, and
remediate fraud. The record also shows,
however, that some wireless providers’
current practices for customer service
representative training may be lacking,
as there are reported instances of
wireless provider employees failing to
identify, prevent, or quickly remediate
E:\FR\FM\08DER2.SGM
08DER2
khammond on DSKJM1Z7X2PROD with RULES2
Federal Register / Vol. 88, No. 235 / Friday, December 8, 2023 / Rules and Regulations
SIM swap and port-out fraud. We have
previously determined that customer
service training requirements play an
important role in safeguarding the
proper use of CPNI and have required
telecommunications carriers to train
their personnel on when they are and
are not authorized to use CPNI. We
similarly conclude that the employee
training requirement we adopt today is
necessary to ensure customer service
representatives are prepared to identify,
prevent, and remediate fraudulent SIM
change and port-out activity.
56. In applying this requirement, we
give wireless providers flexibility on
designing their training programs. But
we do require that all employees who
may communicate with customers
regarding SIM changes and number
ports must be trained on how to
recognize potentially fraudulent
requests, how to recognize when a
customer may be the victim of fraud,
and how to direct potential victims and
individuals making potentially
fraudulent requests to employees
specifically trained to handle such
incidents. Given that (1) some wireless
providers already train employees on
how to address fraud, (2) our new
training requirement builds upon our
existing CPNI training rule, and (3) we
are providing wireless providers with
flexibility on how to design their
training programs, we do not anticipate
that imposing this training requirement
will be overly costly for wireless
providers.
57. Requirements to Remedy SIM
Swap and Port-Out Fraud. We are
concerned that in some cases,
‘‘consumers who have been the victims
of SIM swaps or port-out fraud have had
difficulties obtaining assistance from the
carriers’’ when they report it.
Accordingly, we require wireless
providers to maintain a clearly
disclosed, transparent, and easy-to-use
process for customers to report SIM
swap and port-out fraud, promptly
investigate and take reasonable steps
within their control to remediate such
fraud, and, upon request, promptly
provide customers with documentation
of SIM swap and port-out fraud
involving their accounts. These
measures must be provided to victims of
SIM swap and port out fraud at no cost.
We anticipate that, in combination,
these requirements will serve to
minimize the harms that victims
experience as a result of SIM swap and
port-out fraud.
58. Our requirement that wireless
providers maintain a clearly disclosed,
transparent, and easy-to-use process for
customers to report SIM swap and portout fraud rests on our concern that
VerDate Sep<11>2014
17:02 Dec 07, 2023
Jkt 262001
customers currently struggle to report
SIM swap and port-out fraud to their
wireless providers. When customers are
unable to find information about how to
report such fraud or use existing
customer service avenues to do so, it not
only frustrates these customers, it
prevents initiation of steps to investigate
and remediate the fraud, which
increases the risk that fraudsters will be
able to use a victim’s SIM or phone
number to accomplish further fraud. We
anticipate that clear methods for
reporting SIM swap and port-out fraud
that are transparent to customers will
‘‘ensure that customers have easy access
to information they need to report SIM
swap, port-out, or other fraud.’’ We
decline to specify the exact means
wireless providers must put in place for
customers to report SIM swap and portout fraud, but we stress that the process
must be a clearly disclosed, transparent,
and easy-to-use process for customers to
notify providers.
59. We require wireless providers to
establish procedures to promptly
investigate and take reasonable steps
within their control to remediate SIM
swap and port-out fraud because the
record demonstrates that even when
victims of SIM swap and port-out fraud
are successful in reporting such fraud to
their providers, they have difficulty
obtaining assistance from their
providers to remediate the fraud. This is
consequential because ‘‘[i]dentity theft,
including SIM swap fraud, can cause
intense anxiety for victims and must be
addressed in a timely manner to prevent
financial losses and exposure of
personal information.’’ Thus, we
conclude that ‘‘it should be easy for a
customer to get access to appropriate
carrier resources that can help mitigate
the significant harms caused by SIM
swap or port-out fraud.’’ Although we
do not specify the procedures that
wireless providers must adopt, we agree
with commenters that investigations
must be instigated and resolved
expeditiously.
60. To ensure victims of SIM swap
and port-out fraud have additional
means to resolve other consequences
that result from SIM swap and port-out
fraud, we require wireless providers to
give customers documentation regarding
such fraud on their accounts, upon
request. In the SIM Swap and Port-Out
Fraud Notice, we recognized that
‘‘customers sometimes need
documentation of the fraud incident to
provide to law enforcement, financial
institutions, or others to resolve
financial fraud or other harms of the
incident’’ and acknowledged that ‘‘[a]
SIM swap or port-out fraud victim may
have difficulty obtaining such
PO 00000
Frm 00013
Fmt 4701
Sfmt 4700
85805
documentation from the carrier because
the carrier may not have processes in
place to produce such documentation.’’
Requiring wireless providers to give
fraud victims supporting documentation
will enable those victims to seek
remedies from other institutions for
additional fraud that bad actors achieve
using a victim’s SIM or phone number.
We do not specify the form that such
documentation must take or exactly
what information it must contain, but it
should be reasonably designed to permit
customers to demonstrate to other
entities that they were victims of SIM
swap or port-out fraud and that bad
actors may have used access to a
victim’s telecommunications services to
carry out additional fraud. Such
documentation must address the
customer’s interest in protecting his or
her account(s) or identity but may be
tailored not to include other proprietary,
confidential, or law-enforcement-related
information regarding the SIM swap or
port-out fraud or the account.
Additionally, because of the potential
harms that can flow from SIM swap and
port-out fraud, we also require wireless
providers to provide this documentation
promptly.
61. We anticipate that the benefits of
our requirements will outweigh any
potential costs. Although commenters
did not address the costs of the
additional measures we adopt here, we
note that at least one wireless provider
has already adopted processes for
customers to report SIM swap and portout fraud, to investigate and remediate
such fraud, and to provide
documentation of such fraud to
customers upon request. We also
anticipate that allowing wireless
providers flexibility in how to abide by
these new requirements will enable
them to adopt cost-effective procedures
that will also allow them to successfully
resolve SIM swap and port-out fraud
incidents when they occur.
62. To maintain the flexibility we
believe will be required for wireless
providers to adequately tailor and adapt
their practices to address SIM swap and
port-out fraud, we decline to impose
prescriptive measures raised in the SIM
Swap and Port-Out Fraud Notice and
the record. Specifically, although we
encourage wireless providers to
establish a dedicated hotline for
customers to report SIM swap and portout fraud and respond within 24 hours
of a customer reporting suspected fraud,
we decline to require that wireless
providers adopt these approaches.
While the former requirement received
support from the National Consumer
Law Center (NCLC) and the Electronic
Privacy Information Center (EPIC), we
E:\FR\FM\08DER2.SGM
08DER2
khammond on DSKJM1Z7X2PROD with RULES2
85806
Federal Register / Vol. 88, No. 235 / Friday, December 8, 2023 / Rules and Regulations
conclude that it may not benefit a
wireless provider’s customers if it is
inconsistent with a provider’s
established customer service methods.
The latter may be infeasible for certain
incidents and is not necessary given our
requirement that investigation and
remediation be prompt. We also decline
to require that wireless providers give
customers an alternative number on a
temporary basis after SIM swap or portout fraud has occurred, as that may
promote number resource exhaust in
certain areas or for certain wireless
providers. However, we encourage
wireless providers to offer customers a
temporary alternative number when the
efforts to remediate SIM swap or portout fraud may take a significant amount
of time or to assist customers who have
critical needs to be accessible via phone
at the time. We also recognize that
adequate remediation may require
providing victims with permanent
replacement numbers or SIMs, and
carriers should effectively assist
customers with that transition should
that be necessary. We do not find it
necessary at this time to require that
wireless providers, upon being notified
by a customer of fraud, provide
‘‘detailed records of the fraud [to law
enforcement]’’ or ‘‘offer to the customer
to notify financial institutions and
creditors, the three national credit
reporting agencies, and others of the
fraud, to help the customer recover
control over their identity, if
appropriate.’’ While we encourage
wireless providers to take these steps
upon the request of customers as part of
their mitigation efforts, we conclude
that our new requirement that providers
give customers documentation
concerning fraudulent SIM swaps and
number ports will be sufficient to allow
those customers to alert appropriate
entities if needed. We note, however,
that we will monitor consumer
complaints and may evaluate the
remediation programs implemented by
wireless providers. If we find that such
programs are not adequately resolving
SIM swap and port-out fraud in a timely
manner, we may take steps to
implement more specific requirements
in the future.
63. Working Group. While we
recognize that the harmful effects of SIM
swap and port-out fraud may extend
beyond the control of wireless providers
and that the incentives to engage in
such fraud implicate the security
practices of other industries, we decline
at this time to direct or rely on standardsetting bodies, industry organizations,
or consumer groups to evaluate SIM
swap and port-out fraud ‘‘to augment
VerDate Sep<11>2014
17:02 Dec 07, 2023
Jkt 262001
our understanding and present possible
solutions.’’ Instead, we find it most
appropriate to focus on solutions within
the scope of the Commission’s authority
that we anticipate will mitigate the
harmful consequences of this fraud.
Additionally, to the extent that
commenters advocated that we direct
this issue to a working group before
taking action, we disagree with that
approach and find that doing so would
only delay solutions that we expect will
benefit customers now. Although we
decline to rely on a working group, we
also do not foreclose wireless providers
from forming or entering into crosssector, multi-stakeholder efforts,
independent of Commission direction,
to seek broader solutions to the harms
that may ultimately result from SIM
swap and port-out fraud.
64. Provider Liability and Dispute
Resolution. We decline to adopt
proposals in the record that prescribe
provider liability and dispute resolution
requirements for disputes between
wireless providers and customers.
65. NCLC and EPIC argue that the
Commission should ‘‘[r]equire carriers
to offer a redress program that . . .
provides full coverage of losses to
customers who have been the victims of
a fraudulent SIM swap or port-out
fraud,’’ which they say would
‘‘[p]rovide strong financial incentives to
providers to stop SIM swapping and
port-out fraud.’’ We agree with CTIA,
however, that telecommunications
carriers are ‘‘but one link in the chain
of consumer and business protection
from account takeover fraud,’’ and
therefore that the responsibility for
financial harms that a bad actor may be
able to perpetuate following such fraud
is borne by several parties, including,
significantly, the bad actor. Imposing
such liability on wireless providers
would be inequitable and would reduce
the incentives for email and social
media providers, financial institutions,
healthcare providers, retail websites,
and other entities that rely on cell
phone-based identity authentication to
improve their security practices, as well
as reduce the incentive for customers to
act responsibly. We note, however, that
compliance with our rules is not a safe
harbor for wireless providers; customers
will still be able to pursue any existing
remedies available by law.
66. Similarly, we decline to specify,
as NCLC and EPIC request, that wireless
providers are ‘‘fully responsible for any
abuse committed by its employees,
whether the employees acted either
intentionally or negligently,’’ although
we make clear that this statement does
not absolve wireless providers of any
liability for employee actions that
PO 00000
Frm 00014
Fmt 4701
Sfmt 4700
already exists. We anticipate that the
requirements we adopt today—
including employee training regarding
SIM swap and port-out fraud and
restrictions on the ability of employees
to access CPNI prior to authentication—
will ensure that wireless providers
implement adequate procedures to
prevent employees from perpetuating
SIM swap and port-out fraud.
67. Finally, we decline to adopt NCLC
and EPIC’s proposal that ‘‘any
arbitration clauses in the providers’
agreements with consumers explicitly
exclude resolutions’’ of SIM swap and
port-out fraud disputes at this time.
They urge this because ‘‘[o]therwise,
consumers who have not been made
whole, or who have difficulties
obtaining relief for frauds that are
perpetrated on them because of the
provider’s insufficiently strict
authentication protocols, will have no
meaningful way of enforcing the
protections mandated by the
Commission.’’ The Commission has full
authority to enforce the protections it
has mandated, and we anticipate that
the rules we adopt today, coupled with
this enforcement authority, will
incentivize wireless providers to adopt
strong practices to protect customers
from SIM swap and port-out fraud.
Nonetheless, we seek comment below
on whether the Commission should
require providers to exclude disputes
about SIM swapping or porting fraud
from arbitration clauses. We encourage
customers and public interest
organizations to submit complaints and
evidence of wireless providers failing to
comply with these new rules in support
of our enforcement efforts.
D. Implementation Timeframe
68. We require wireless providers to
comply with the requirements we adopt
today six months after the effective date
of the Report and Order or, for those
requirements subject to review by the
Office of Management and Budget
(OMB), upon completion of that review,
whichever is later. We conclude that
providing six months to achieve
compliance with rules that are not
subject to OMB review accounts for the
urgency of safeguarding customers from
these fraudulent schemes, and will
allow wireless providers to coordinate
any updates needed to their systems and
processes to comply with the Safe
Connections Act and the rules we adopt
to implement that statute. SIM swap and
port-out fraud can result in substantial
harm to the customer, including loss of
service on their devices. Fraudulent SIM
swaps and port-outs allow bad actors to
perpetrate greater fraud by giving them
the means to complete text and voice
E:\FR\FM\08DER2.SGM
08DER2
khammond on DSKJM1Z7X2PROD with RULES2
Federal Register / Vol. 88, No. 235 / Friday, December 8, 2023 / Rules and Regulations
authentications to access the victim’s
other accounts, and as such, we find
that an aggressive implementation
timeframe is appropriate to provide
these important consumer protections
without substantial delay. We agree
with some commenters that while many
wireless providers can immediately
implement the revisions to our CPNI
and number porting rules, other
providers may require this additional
time. Some wireless providers already
employ authentication and notification
measures to process SIM change and
port-out requests, offer account change
locks, provide notice to customers about
available fraud protection measures, and
train employees on how to address SIM
swap and port-out fraud, and may
simply need to refine those practices to
align with our rules. Other providers,
particularly smaller providers, may
need the additional time to upgrade
their systems, implement modifications
to their policies and procedures, and
conduct new customer service
representative training. We conclude
that providing six months after the
effective date of the Report and Order to
implement these revisions to our CPNI
and number porting rules strikes the
right balance between time for wireless
providers to implement these changes
and accounting for the urgency of
safeguarding customers from these
fraudulent schemes. We also find that
this implementation timeframe is
consistent with other proceedings and
regulatory frameworks adopted by the
Commission where consumer protection
and numbering requirements were at
issue. While we acknowledge industry’s
concerns that implementing these new
rules will be a multistep process for
many providers, providers themselves
acknowledge the necessity of
implementing today’s revisions to our
CPNI and LNP rules concurrently with
our rules implementing the Safe
Connections Act, given how both
frameworks address many of the same
actions (e.g., account locks, customer
notifications, customer authentication).
And as we explain in the Safe
Connections Order, ‘‘permitting a more
extended compliance timeframe for
implementing the line separation
provisions, as advocated for by industry
commenters, would be inconsistent
with the urgency Congress
demonstrated with the underlying
statutory obligation as well as with the
critical wireless communications needs
of survivors well-documented in the
record.’’ For all of these reasons, we
require wireless providers to implement
the rules we adopt today six months
VerDate Sep<11>2014
17:02 Dec 07, 2023
Jkt 262001
after the effective date of this Report
and Order, subject to review by OMB.
E. Legal Authority
69. The rules we adopt today build on
the Commission’s existing rules to
implement Congress’s mandates to
ensure that telecommunications carriers
(which include, for purposes of our
CPNI rules, providers of interconnected
VoIP service) protect the confidentiality
of proprietary information of, and
relating to, customers and to provide
number portability in accordance with
requirements prescribed by the
Commission. As such, the rules we
adopt are well-grounded in our
authority in Sections 222 and 251, as
well as other provisions of the Act.
70. SIM Changes. Congress, through
Section 222 of the Act, requires
telecommunications carriers to protect
the privacy and security of customers’
proprietary information that carriers
obtain by virtue of providing a
telecommunications service. Under
Section 222(a), every
telecommunications carrier has a ‘‘duty
to protect the confidentiality of
proprietary information of, and relating
to, . . . customers.’’ Section 222(c)(1)
provides that a telecommunications
carrier may only use, disclose, or permit
access to customers’ individually
identifiable CPNI that it has received or
obtained by virtue of its provision of a
telecommunications service in limited
circumstances: (1) as required by law;
(2) with the customer’s approval; or (3)
in its provision of the
telecommunications service from which
such information is derived or its
provision of services necessary to, or
used in, the provision of such
telecommunications service.
71. The Commission has previously
stated that to comply with these Section
222 requirements, ‘‘telecommunications
carriers [must] establish effective
safeguards to protect against
unauthorized use or disclosure of
CPNI.’’ The Commission also has
established rules pursuant to its Section
222 authority to ensure such safeguards
are in place. Among other things, the
Commission’s rules require carriers to
take ‘‘reasonable measures to discover
and protect against attempts to gain
unauthorized access to CPNI’’ and to
‘‘properly authenticate a customer prior
to disclosing CPNI based on customerinitiated telephone contact, online
account access, or an in-store visit.’’
Like these safeguards, our action today
‘‘strengthen[s] our privacy rules by
adopting additional safeguards to
protect customers’ CPNI against
unauthorized access and disclosure.’’
PO 00000
Frm 00015
Fmt 4701
Sfmt 4700
85807
72. Fraudulent SIM swaps result in
unauthorized disclosure of and access to
customers’ accounts, including
individually identifiable CPNI. By
successfully obtaining a fraudulent SIM
swap, a bad actor can access CPNI such
as incoming call information (including
the date and time of the call and number
from which the call is made), and gain
access to a victim’s account, potentially
giving the bad actor access to other
CPNI, like outgoing call history
(including numbers called and the
location, frequency, duration, and
timing of such calls) and the victim’s
bills and the services purchased by the
victim. And as described above,
fraudulent SIM swaps allow bad actors
to perpetrate greater fraud by giving
them the means to complete text and
voice authentications to access the
victim’s other accounts.
73. In light of the foregoing, we find
that the rules we adopt today to address
SIM swap fraud advance the protections
against unauthorized disclosure of, and
access to, individually identifiable CPNI
and other sensitive personal information
about customers, and therefore are
squarely grounded in the Commission’s
authority under Section 222. Our
requirement that wireless providers use
secure methods of authenticating their
customers that are reasonably designed
to confirm a customer’s identity prior to
effectuating a SIM change request will
help prevent unauthorized disclosure of
and access to such information. This
requirement also sustains customer
decisions regarding disclosure of their
information—if a wireless provider
completes a SIM change requested by
someone other than the actual customer,
then the wireless provider has not
obtained the customer’s approval to
disclose their CPNI in accordance with
Section 222(c)(1).
74. The other rules we adopt reinforce
the protections afforded by this new
rule. For instance, the requirement that
wireless providers develop, maintain,
and implement procedures to respond
to failed authentication attempts will
likewise serve to prevent unauthorized
disclosure of and access to CPNI. The
rule requiring that wireless providers
establish safeguards and processes so
that employees who receive inbound
customer communications are unable to
access CPNI until after the customer has
been properly authenticated will
prevent inadvertent disclosure of CPNI
to those making unauthorized requests
and inhibit the ability of employees to
participate in fraudulent SIM swaps.
Employee training requirements will not
only improve their ability to recognize
and derail fraudulent SIM change
requests, such requirements will better
E:\FR\FM\08DER2.SGM
08DER2
khammond on DSKJM1Z7X2PROD with RULES2
85808
Federal Register / Vol. 88, No. 235 / Friday, December 8, 2023 / Rules and Regulations
prepare customer service
representatives to address customer
complaints and remediate fraudulent
SIM swaps when they do occur.
Requiring wireless providers to
maintain a clear process for customers
to report fraud, investigate and
remediate fraud, and provide customers
with documentation of fraud involving
their accounts will ensure that the
harms of SIM swap and port-out fraud
are mitigated when it does occur. And
the requirement that wireless providers
keep records of data regarding SIM
change requests and the authentication
measures they have in place will help
ensure that wireless providers have
information they need to measure the
effectiveness of their customer
authentication and account protection
measures and make informed decisions
about how they should be updated over
time.
75. Our rules also further the goals of
Section 222 by enabling customers to
take action to prevent and address
fraudulent SIM changes, and therefore
help wireless providers protect against
unauthorized disclosure and access to
CPNI. The requirement that wireless
providers immediately notify customers
regarding SIM change requests provides
added protection by giving customers
information they can use to notify their
providers that a fraudulent request has
occurred at the time of the request or
shortly thereafter so that the provider
can take timely steps to remediate the
situation. Requiring wireless providers
to offer customers the option to lock
their accounts so that their providers are
prohibited from processing SIM changes
gives security-minded customers or
those who are at high risk of fraud a tool
to prevent a fraudulent request from
being processed in the first instance.
Additionally, our new rule that wireless
providers make notice of account
protection mechanisms easily accessible
via their websites and applications
ensures that customers are aware of
these tools. We also conclude that the
requirements we establish to promptly
resolve SIM swap and port-out fraud
extend from our Section 222 authority
because they will help to mitigate the
unauthorized disclosure of and access to
CPNI.
76. Finally, the new customer
authentication requirements, with
which both facilities-based providers
and resellers must comply, apply to
both pre-paid and postpaid services,
which is consistent with Section
222(a)’s mandate that ‘‘[e]very
telecommunications carrier . . . protect
the confidentiality of [customer]
proprietary information’’ and Section
222’s instruction that all ‘‘customers’’ of
VerDate Sep<11>2014
17:02 Dec 07, 2023
Jkt 262001
those carriers benefit from such
protections.
77. While Section 222 provides firm
foundation for our rules to address SIM
swap fraud, we also find that Section
251(e) of the Act provides additional
authority for these rules. In Section
251(e)(1), Congress expressly assigned
to the Commission exclusive
jurisdiction over that portion of the
North American Number Plan (NANP)
that pertains to the United States and
related telephone numbering issues. The
Commission retained its ‘‘authority to
set policy with respect to all facets of
numbering administration in the United
States.’’ Because our new SIM change
rules prevent and address misuse of
NANP numbers assigned to wireless
devices, we conclude that those rules
are supported by our exclusive
numbering authority within Section
251(e).
78. Number Porting. We rely on our
authority derived from Sections 1, 2,
4(i), 251(e), and 332 of the Act to
implement the changes to our number
porting rules to address port-out fraud.
As the Commission has consistently
found since 1996, ‘‘[w]e possess
independent authority under Sections 1,
2, 4(i), and 332 of the Communications
Act of 1934, as amended, to require
CMRS providers to provide number
portability as we deem appropriate.’’ We
rely on this well-established authority to
adopt number porting rules applicable
to wireless providers that address portout fraud.
79. We also find that the exclusive
numbering authority that Congress
granted this Commission under Section
251(e)(1) provides ample authority to
extend the LNP requirements as set out
in this Report and Order. Specifically,
in Section 251(e)(1) of the Act, Congress
expressly assigned to the Commission
exclusive jurisdiction over that portion
of the NANP that pertains to the United
States and related telephone numbering
issues. The Commission retained its
‘‘authority to set policy with respect to
all facets of numbering administration
in the United States.’’ We find that the
revisions to our number porting rules
designed to protect the customers from
port-out fraud fit comfortably within our
exclusive numbering authority because
the requirements we establish to prevent
and promptly resolve port-out fraud are
necessary to address improper use of
numbering resources and ensure that
customers can recover their numbers
when fraudulent ports have occurred.
80. Other Sources of Authority. While
the provisions discussed above provide
sufficient authority for the entirety of
the rules we adopt in this Report and
Order, we find additional support under
PO 00000
Frm 00016
Fmt 4701
Sfmt 4700
Sections 201 and 303. Sections 201 and
303 of the Act generally give the
Commission authority for prescribing
rules, but we also rely on these sources
of authority as described herein.
81. Section 201(b) authorizes the
Commission to prescribe rules to
implement carriers’ statutory duty not to
engage in conduct that is ‘‘unjust or
unreasonable.’’ We conclude that
practices that allow for fraudulent SIM
swaps and number ports are unjust and
unreasonable because they are contrary
to the reasonable expectations of
customers, are not reasonably avoidable
by customers, and can cause substantial
customer harm. We also rely on our
Section 201(b) authority to find that the
inability for customers to effectively
seek remedies from their wireless
providers when fraudulent SIM swaps
and port outs have occurred is ‘‘unjust
and unreasonable,’’ and therefore
warrants these rules. We would also
find these practices unjust and
unreasonable when a wireless provider
says it will implement reasonable
measures to prevent fraudulent SIM
swaps and number ports but fails to do
so. Our findings here are similar to and
consistent with how the Federal Trade
Commission (FTC) addresses inadequate
data security measures under Section 5
of the FTC Act.
82. We also rely on our broad
authority under Title III, which allows
us to protect the public interest through
spectrum licensing. Pursuant to Section
303(b)’s directive that the Commission
must, consistent with the public
interest, ‘‘[p]rescribe the nature of the
service to be rendered by each class of
licensed stations and each station
within any class,’’ these revisions to our
CPNI and number porting requirements
prescribe the conditions under which
licensed wireless providers must
provide their services. They specifically
require licensed wireless providers to
provide their services in a way that
protects the interests of their customers,
including reasonable measures to
prevent fraudulent acts against their
customers.
II. Procedural Matters
83. Regulatory Flexibility Act. The
Regulatory Flexibility Act of 1980, as
amended (RFA) requires that an agency
prepare a regulatory flexibility analysis
for notice and comment rulemakings,
unless the agency certifies that ‘‘the rule
will not, if promulgated, have a
significant economic impact on a
substantial number of small entities.’’
Accordingly, the Commission has
prepared a Final Regulatory Flexibility
Analysis (FRFA) concerning the
potential impact of the rule and policy
E:\FR\FM\08DER2.SGM
08DER2
Federal Register / Vol. 88, No. 235 / Friday, December 8, 2023 / Rules and Regulations
changes adopted in this Report and
Order on small entities. The FRFA is set
forth in Appendix B.
84. Congressional Review Act. The
Commission has determined, and the
Administrator of the Office of
Information and Regulatory Affairs,
Office of Management and Budget,
concurs, that this rule is ‘‘non-major’’
under the Congressional Review Act, 5
U.S.C. 804(2). The Commission will
send a copy of this Report and Order to
Congress and the Government
Accountability Office pursuant to 5
U.S.C. 801(a)(1)(A).
khammond on DSKJM1Z7X2PROD with RULES2
III. Final Regulatory Flexibility
Analysis
85. As required by the Regulatory
Flexibility Act of 1980, as amended
(RFA), an Initial Regulatory Flexibility
Analysis (IRFA) was incorporated into
the Protecting Consumers from SIM
Swap and Port-Out Fraud Notice of
Proposed Rulemaking (SIM Swap and
Port-Out Fraud) published October 15,
2021 at 86 FR 57390. The Commission
sought written public comment on the
proposals in the SIM Swap and Port-Out
Fraud Notice, including comment on
the IRFA. The comments received are
discussed below. This Final Regulatory
Flexibility Analysis (FRFA) conforms to
the RFA.
A. Need for, and Objectives of, the
Report and Order
86. The Report and Order establishes
protections to address SIM swap and
port-out fraud. With SIM swap fraud, a
bad actor impersonates a customer of a
wireless provider and convinces the
provider to reassign the customer’s SIM
from the customer’s device to a device
controlled by the bad actor. Similarly,
with port-out fraud, the bad actor
impersonates a customer of a wireless
provider and convinces the provider to
port the customer’s telephone number to
a new wireless provider and a device
that the bad actor controls. Both
fraudulent practices transfer the victim’s
wireless service to the bad actor, allow
the bad actor to gain access to
information associated with the
customer’s account, and permit the bad
actor to receive the text messages and
phone calls intended for the customer.
87. The rules adopted in the Report
and Order aim to foreclose these
fraudulent practices while preserving
the relative ease with which customers
can obtain legitimate SIM changes and
number ports. Specifically, the Report
and Order revises the Commission’s
CPNI and LNP rules to require that
wireless providers use secure methods
of authenticating customers prior to
performing SIM changes and number
VerDate Sep<11>2014
17:02 Dec 07, 2023
Jkt 262001
ports. This requirement is reinforced by
other rules, including that wireless
providers adopt processes for
responding to failed authentication
attempts, institute employee training for
handling SIM swap and port-out fraud,
and establish safeguards to prevent
employees who receive inbound
customer communications are unable to
access CPNI in the course of that
customer interaction until after
customers have been authenticated. The
Report and Order also adopts rules that
will enable customers to act to prevent
and address fraudulent SIM changes
and number ports, including requiring
that wireless providers notify customers
regarding SIM change and port-out
requests, offer customers the option to
lock their accounts to block processing
of SIM changes and number ports, and
give advanced notice of available
account protection mechanisms.
Additionally, the Report and Order
establishes requirements to minimize
the harms of SIM swap and port-out
fraud when it occurs, including
requiring wireless providers to maintain
a clear process for customers to report
fraud, promptly investigate and
remediate fraud, and promptly provide
customers with documentation of fraud
involving their accounts. Finally, to
ensure wireless providers track the
effectiveness of authentication measures
used for SIM change requests, the
Report and Order requires that
providers keep records of SIM change
requests and the authentication
measures they use.
B. Summary of Significant Issues Raised
by Public Comments in Response to the
IRFA
88. There were no comments that
directly addressed the proposed rules
and policies presented in the SIM Swap
and Port-Out Fraud Notice IRFA.
However two commenters discussed the
potential impact of rules on small
carriers. The Competitive Carriers
Association (CCA) advocated that the
Commission adopt security measures
that give providers flexibility to account
for the constraints with which many
small providers operate. The Rural
Wireless Association (RWA) called for
uniform standards for port-out
authentication to prevent potential
anticompetitive activities and increased
costs for small providers in the event
that larger providers hold small
providers to standards that are difficult
or costly to implement. The approach
taken by the Report and Order addresses
these comments by setting baseline
requirements that build on existing
mechanisms that many wireless
providers already use to establish a
PO 00000
Frm 00017
Fmt 4701
Sfmt 4700
85809
uniform framework across the mobile
wireless industry, while giving wireless
providers the flexibility to deliver the
most advanced, appropriate, and costeffective fraud protection measures
available.
C. Response to Comments by the Chief
Counsel for Advocacy of the Small
Business Administration
89. Pursuant to the Small Business
Jobs Act of 2010, which amended the
RFA, the Commission is required to
respond to any comments filed by the
Chief Counsel for Advocacy of the Small
Business Administration (SBA), and to
provide a detailed statement of any
change made to the proposed rules as a
result of those comments. The Chief
Counsel did not file any comments in
response to the proposed rules in this
proceeding.
D. Description and Estimate of the
Number of Small Entities to Which the
Rules Will Apply
90. The RFA directs agencies to
provide a description of, and where
feasible, an estimate of the number of
small entities that may be affected by
the rules adopted herein. The RFA
generally defines the term ‘‘small
entity’’ as having the same meaning as
the terms ‘‘small business,’’ ‘‘small
organization,’’ and ‘‘small governmental
jurisdiction.’’ In addition, the term
‘‘small business’’ has the same meaning
as the term ‘‘small business concern’’
under the Small Business Act. A ‘‘small
business concern’’ is one which: (1) is
independently owned and operated; (2)
is not dominant in its field of operation;
and (3) satisfies any additional criteria
established by the SBA.
91. Small Businesses, Small
Organizations, Small Governmental
Jurisdictions. Our actions, over time,
may affect small entities that are not
easily categorized at present. We
therefore describe, at the outset, three
broad groups of small entities that could
be directly affected herein. First, while
there are industry specific size
standards for small businesses that are
used in the regulatory flexibility
analysis, according to data from the
Small Business Administration’s (SBA)
Office of Advocacy, in general a small
business is an independent business
having fewer than 500 employees. These
types of small businesses represent
99.9% of all businesses in the United
States, which translates to 33.2 million
businesses.
92. Next, the type of small entity
described as a ‘‘small organization’’ is
generally ‘‘any not-for-profit enterprise
which is independently owned and
operated and is not dominant in its
E:\FR\FM\08DER2.SGM
08DER2
85810
Federal Register / Vol. 88, No. 235 / Friday, December 8, 2023 / Rules and Regulations
khammond on DSKJM1Z7X2PROD with RULES2
field.’’ The Internal Revenue Service
(IRS) uses a revenue benchmark of
$50,000 or less to delineate its annual
electronic filing requirements for small
exempt organizations. Nationwide, for
tax year 2020, there were approximately
447,689 small exempt organizations in
the U.S. reporting revenues of $50,000
or less according to the registration and
tax data for exempt organizations
available from the IRS.
93. Finally, the small entity described
as a ‘‘small governmental jurisdiction’’
is defined generally as ‘‘governments of
cities, counties, towns, townships,
villages, school districts, or special
districts, with a population of less than
fifty thousand.’’ U.S. Census Bureau
data from the 2017 Census of
Governments indicate there were 90,075
local governmental jurisdictions
consisting of general purpose
governments and special purpose
governments in the United States. Of
this number, there were 36,931 general
purpose governments (county,
municipal, and town or township) with
populations of less than 50,000 and
12,040 special purpose governments—
independent school districts with
enrollment populations of less than
50,000. Accordingly, based on the 2017
U.S. Census of Governments data, we
estimate that at least 48,971 entities fall
into the category of ‘‘small
governmental jurisdictions.’’
1. Providers of Telecommunications and
Other Services
94. Wired Telecommunications
Carriers. The U.S. Census Bureau
defines this industry as establishments
primarily engaged in operating and/or
providing access to transmission
facilities and infrastructure that they
own and/or lease for the transmission of
voice, data, text, sound, and video using
wired communications networks.
Transmission facilities may be based on
a single technology or a combination of
technologies. Establishments in this
industry use the wired
telecommunications network facilities
that they operate to provide a variety of
services, such as wired telephony
services, including VoIP services, wired
(cable) audio and video programming
distribution, and wired broadband
internet services. By exception,
establishments providing satellite
television distribution services using
facilities and infrastructure that they
operate are included in this industry.
Wired Telecommunications Carriers are
also referred to as wireline carriers or
fixed local service providers.
95. The SBA small business size
standard for Wired Telecommunications
Carriers classifies firms having 1,500 or
VerDate Sep<11>2014
17:02 Dec 07, 2023
Jkt 262001
fewer employees as small. U.S. Census
Bureau data for 2017 show that there
were 3,054 firms that operated in this
industry for the entire year. Of this
number, 2,964 firms operated with
fewer than 250 employees.
Additionally, based on Commission
data in the 2022 Universal Service
Monitoring Report, as of December 31,
2021, there were 4,590 providers that
reported they were engaged in the
provision of fixed local services. Of
these providers, the Commission
estimates that 4,146 providers have
1,500 or fewer employees.
Consequently, using the SBA’s small
business size standard, most of these
providers can be considered small
entities.
96. Local Exchange Carriers (LECs).
Neither the Commission nor the SBA
has developed a size standard for small
businesses specifically applicable to
local exchange services. Providers of
these services include both incumbent
and competitive local exchange service
providers. Wired Telecommunications
Carriers is the closest industry with an
SBA small business size standard.
Wired Telecommunications Carriers are
also referred to as wireline carriers or
fixed local service providers. The SBA
small business size standard for Wired
Telecommunications Carriers classifies
firms having 1,500 or fewer employees
as small. U.S. Census Bureau data for
2017 show that there were 3,054 firms
that operated in this industry for the
entire year. Of this number, 2,964 firms
operated with fewer than 250
employees. Additionally, based on
Commission data in the 2022 Universal
Service Monitoring Report, as of
December 31, 2021, there were 4,590
providers that reported they were fixed
local exchange service providers. Of
these providers, the Commission
estimates that 4,146 providers have
1,500 or fewer employees.
Consequently, using the SBA’s small
business size standard, most of these
providers can be considered small
entities.
97. Incumbent Local Exchange
Carriers (Incumbent LECs). Neither the
Commission nor the SBA have
developed a small business size
standard specifically for incumbent
local exchange carriers. Wired
Telecommunications Carriers is the
closest industry with an SBA small
business size standard. The SBA small
business size standard for Wired
Telecommunications Carriers classifies
firms having 1,500 or fewer employees
as small. U.S. Census Bureau data for
2017 show that there were 3,054 firms
in this industry that operated for the
entire year. Of this number, 2,964 firms
PO 00000
Frm 00018
Fmt 4701
Sfmt 4700
operated with fewer than 250
employees. Additionally, based on
Commission data in the 2022 Universal
Service Monitoring Report, as of
December 31, 2021, there were 1,212
providers that reported they were
incumbent local exchange service
providers. Of these providers, the
Commission estimates that 916
providers have 1,500 or fewer
employees. Consequently, using the
SBA’s small business size standard, the
Commission estimates that the majority
of incumbent local exchange carriers
can be considered small entities.
98. Competitive Local Exchange
Carriers (Competitive LECs). Neither the
Commission nor the SBA has developed
a size standard for small businesses
specifically applicable to local exchange
services. Providers of these services
include several types of competitive
local exchange service providers. Wired
Telecommunications Carriers is the
closest industry with an SBA small
business size standard. The SBA small
business size standard for Wired
Telecommunications Carriers classifies
firms having 1,500 or fewer employees
as small. U.S. Census Bureau data for
2017 show that there were 3,054 firms
that operated in this industry for the
entire year. Of this number, 2,964 firms
operated with fewer than 250
employees. Additionally, based on
Commission data in the 2022 Universal
Service Monitoring Report, as of
December 31, 2021, there were 3,378
providers that reported they were
competitive local exchange service
providers. Of these providers, the
Commission estimates that 3,230
providers have 1,500 or fewer
employees. Consequently, using the
SBA’s small business size standard,
most of these providers can be
considered small entities.
99. Interexchange Carriers (IXCs).
Neither the Commission nor the SBA
have developed a small business size
standard specifically for Interexchange
Carriers. Wired Telecommunications
Carriers is the closest industry with an
SBA small business size standard. The
SBA small business size standard for
Wired Telecommunications Carriers
classifies firms having 1,500 or fewer
employees as small. U.S. Census Bureau
data for 2017 show that there were 3,054
firms that operated in this industry for
the entire year. Of this number, 2,964
firms operated with fewer than 250
employees. Additionally, based on
Commission data in the 2022 Universal
Service Monitoring Report, as of
December 31, 2021, there were 127
providers that reported they were
engaged in the provision of
interexchange services. Of these
E:\FR\FM\08DER2.SGM
08DER2
khammond on DSKJM1Z7X2PROD with RULES2
Federal Register / Vol. 88, No. 235 / Friday, December 8, 2023 / Rules and Regulations
providers, the Commission estimates
that 109 providers have 1,500 or fewer
employees. Consequently, using the
SBA’s small business size standard, the
Commission estimates that the majority
of providers in this industry can be
considered small entities.
100. Local Resellers. Neither the
Commission nor the SBA have
developed a small business size
standard specifically for Local Resellers.
Telecommunications Resellers is the
closest industry with an SBA small
business size standard. The
Telecommunications Resellers industry
comprises establishments engaged in
purchasing access and network capacity
from owners and operators of
telecommunications networks and
reselling wired and wireless
telecommunications services (except
satellite) to businesses and households.
Establishments in this industry resell
telecommunications; they do not
operate transmission facilities and
infrastructure. Mobile virtual network
operators (MVNOs) are included in this
industry. The SBA small business size
standard for Telecommunications
Resellers classifies a business as small if
it has 1,500 or fewer employees. U.S.
Census Bureau data for 2017 show that
1,386 firms in this industry provided
resale services for the entire year. Of
that number, 1,375 firms operated with
fewer than 250 employees.
Additionally, based on Commission
data in the 2022 Universal Service
Monitoring Report, as of December 31,
2021, there were 207 providers that
reported they were engaged in the
provision of local resale services. Of
these providers, the Commission
estimates that 202 providers have 1,500
or fewer employees. Consequently,
using the SBA’s small business size
standard, most of these providers can be
considered small entities.
101. Toll Resellers. Neither the
Commission nor the SBA have
developed a small business size
standard specifically for Toll Resellers.
Telecommunications Resellers is the
closest industry with an SBA small
business size standard. The
Telecommunications Resellers industry
comprises establishments engaged in
purchasing access and network capacity
from owners and operators of
telecommunications networks and
reselling wired and wireless
telecommunications services (except
satellite) to businesses and households.
Establishments in this industry resell
telecommunications; they do not
operate transmission facilities and
infrastructure. Mobile virtual network
operators (MVNOs) are included in this
industry. The SBA small business size
VerDate Sep<11>2014
17:02 Dec 07, 2023
Jkt 262001
standard for Telecommunications
Resellers classifies a business as small if
it has 1,500 or fewer employees. U.S.
Census Bureau data for 2017 show that
1,386 firms in this industry provided
resale services for the entire year. Of
that number, 1,375 firms operated with
fewer than 250 employees.
Additionally, based on Commission
data in the 2022 Universal Service
Monitoring Report, as of December 31,
2021, there were 457 providers that
reported they were engaged in the
provision of toll services. Of these
providers, the Commission estimates
that 438 providers have 1,500 or fewer
employees. Consequently, using the
SBA’s small business size standard,
most of these providers can be
considered small entities.
102. Wireless Telecommunications
Carriers (except Satellite). This industry
comprises establishments engaged in
operating and maintaining switching
and transmission facilities to provide
communications via the airwaves.
Establishments in this industry have
spectrum licenses and provide services
using that spectrum, such as cellular
services, paging services, wireless
internet access, and wireless video
services. The SBA size standard for this
industry classifies a business as small if
it has 1,500 or fewer employees. U.S.
Census Bureau data for 2017 show that
there were 2,893 firms in this industry
that operated for the entire year. Of that
number, 2,837 firms employed fewer
than 250 employees. Additionally,
based on Commission data in the 2022
Universal Service Monitoring Report, as
of December 31, 2021, there were 594
providers that reported they were
engaged in the provision of wireless
services. Of these providers, the
Commission estimates that 511
providers have 1,500 or fewer
employees. Consequently, using the
SBA’s small business size standard,
most of these providers can be
considered small entities.
103. Satellite Telecommunications.
This industry comprises firms
‘‘primarily engaged in providing
telecommunications services to other
establishments in the
telecommunications and broadcasting
industries by forwarding and receiving
communications signals via a system of
satellites or reselling satellite
telecommunications.’’ Satellite
telecommunications service providers
include satellite and earth station
operators. The SBA small business size
standard for this industry classifies a
business with $38.5 million or less in
annual receipts as small. U.S. Census
Bureau data for 2017 show that 275
firms in this industry operated for the
PO 00000
Frm 00019
Fmt 4701
Sfmt 4700
85811
entire year. Of this number, 242 firms
had revenue of less than $25 million.
Additionally, based on Commission
data in the 2022 Universal Service
Monitoring Report, as of December 31,
2021, there were 65 providers that
reported they were engaged in the
provision of satellite
telecommunications services. Of these
providers, the Commission estimates
that approximately 42 providers have
1,500 or fewer employees.
Consequently, using the SBA’s small
business size standard, a little more
than half of these providers can be
considered small entities.
104. All Other Telecommunications.
This industry is comprised of
establishments primarily engaged in
providing specialized
telecommunications services, such as
satellite tracking, communications
telemetry, and radar station operation.
This industry also includes
establishments primarily engaged in
providing satellite terminal stations and
associated facilities connected with one
or more terrestrial systems and capable
of transmitting telecommunications to,
and receiving telecommunications from,
satellite systems. Providers of internet
services (e.g., dial-up ISPs) or Voice
over Internet Protocol (VoIP) services,
via client-supplied telecommunications
connections are also included in this
industry. The SBA small business size
standard for this industry classifies
firms with annual receipts of $35
million or less as small. U.S. Census
Bureau data for 2017 show that there
were 1,079 firms in this industry that
operated for the entire year. Of those
firms, 1,039 had revenue of less than
$25 million. Based on this data, the
Commission estimates that the majority
of ‘‘All Other Telecommunications’’
firms can be considered small.
2. Internet Service Providers
105. Wired Broadband Internet Access
Service Providers (Wired ISPs).
Providers of wired broadband internet
access service include various types of
providers except dial-up internet access
providers. Wireline service that
terminates at an end user location or
mobile device and enables the end user
to receive information from and/or send
information to the internet at
information transfer rates exceeding 200
kilobits per second (kbps) in at least one
direction is classified as a broadband
connection under the Commission’s
rules. Wired broadband internet services
fall in the Wired Telecommunications
Carriers industry. The SBA small
business size standard for this industry
classifies firms having 1,500 or fewer
employees as small. U.S. Census Bureau
E:\FR\FM\08DER2.SGM
08DER2
khammond on DSKJM1Z7X2PROD with RULES2
85812
Federal Register / Vol. 88, No. 235 / Friday, December 8, 2023 / Rules and Regulations
data for 2017 show that there were 3,054
firms that operated in this industry for
the entire year. Of this number, 2,964
firms operated with fewer than 250
employees.
106. Additionally, according to
Commission data on internet access
services as of December 31, 2018,
nationwide there were approximately
2,700 providers of connections over 200
kbps in at least one direction using
various wireline technologies. The
Commission does not collect data on the
number of employees for providers of
these services, therefore, at this time we
are not able to estimate the number of
providers that would qualify as small
under the SBA’s small business size
standard. However, in light of the
general data on fixed technology service
providers in the Commission’s 2022
Communications Marketplace Report,
we believe that the majority of wireline
internet access service providers can be
considered small entities.
107. Wireless Broadband Internet
Access Service Providers (Wireless ISPs
or WISPs). Providers of wireless
broadband internet access service
include fixed and mobile wireless
providers. The Commission defines a
WISP as ‘‘[a] company that provides
end-users with wireless access to the
internet[.]’’ Wireless service that
terminates at an end user location or
mobile device and enables the end user
to receive information from and/or send
information to the internet at
information transfer rates exceeding 200
kilobits per second (kbps) in at least one
direction is classified as a broadband
connection under the Commission’s
rules. Neither the SBA nor the
Commission have developed a size
standard specifically applicable to
Wireless Broadband Internet Access
Service Providers. The closest
applicable industry with an SBA small
business size standard is Wireless
Telecommunications Carriers (except
Satellite). The SBA size standard for this
industry classifies a business as small if
it has 1,500 or fewer employees. U.S.
Census Bureau data for 2017 show that
there were 2,893 firms in this industry
that operated for the entire year. Of that
number, 2,837 firms employed fewer
than 250 employees.
108. Additionally, according to
Commission data on internet access
services as of December 31, 2018,
nationwide there were approximately
1,209 fixed wireless and 71 mobile
wireless providers of connections over
200 kbps in at least one direction. The
Commission does not collect data on the
number of employees for providers of
these services, therefore, at this time we
are not able to estimate the number of
VerDate Sep<11>2014
17:02 Dec 07, 2023
Jkt 262001
providers that would qualify as small
under the SBA’s small business size
standard. However, based on data in the
Commission’s 2022 Communications
Marketplace Report on the small
number of large mobile wireless
nationwide and regional facilities-based
providers, the dozens of small regional
facilities-based providers and the
number of wireless mobile virtual
network providers in general, as well as
on terrestrial fixed wireless broadband
providers in general, we believe that the
majority of wireless internet access
service providers can be considered
small entities.
109. Internet Service Providers (NonBroadband). Internet access service
providers using client-supplied
telecommunications connections (e.g.,
dial-up ISPs) as well as VoIP service
providers using client-supplied
telecommunications connections fall in
the industry classification of All Other
Telecommunications. The SBA small
business size standard for this industry
classifies firms with annual receipts of
$35 million or less as small. For this
industry, U.S. Census Bureau data for
2017 show that there were 1,079 firms
in this industry that operated for the
entire year. Of those firms, 1,039 had
revenue of less than $25 million.
Consequently, under the SBA size
standard a majority of firms in this
industry can be considered small.
E. Description of Projected Reporting,
Recordkeeping, and Other Compliance
Requirements for Small Entities
110. This Report and Order adopts
rules that could result in increased,
reduced, or otherwise modified
recordkeeping, reporting, or other
compliance requirements for affected
providers of service, including small
wireless providers. Specifically, it
requires that wireless providers use
secure methods of authenticating
customers prior to performing SIM
changes and number ports, and to
review and update these authentication
methods as needed, but at least
annually. It requires wireless providers
to adopt processes for customer
notification and response to failed
authentication attempts, institute
employee training for handling SIM
swap and port-out fraud, and establish
safeguards to prevent employees who
receive inbound customer
communications from accessing CPNI in
the course of that customer interaction
until after customers have been
authenticated. The Report and Order
also adopts rules requiring that wireless
providers notify customers regarding
SIM change and port-out requests, offer
customers the option to lock their
PO 00000
Frm 00020
Fmt 4701
Sfmt 4700
accounts to block processing of SIM
changes and number ports, and give
advanced notice of available account
protection mechanisms. Additionally,
the Report and Order requires wireless
providers to maintain a clear process for
customers to report fraud, promptly
investigate and remediate fraud, and
promptly provide customers with
documentation of fraud involving their
accounts. Finally, the Report and Order
requires that providers keep records of
SIM change requests and the
authentication measures they use.
111. We are cognizant that, in some
instances, strict prescriptive
requirements to prevent SIM swap and
port-out fraud could be technically and
economically infeasible for wireless
providers to implement, particularly for
smaller providers. The Commission
does not have sufficient information on
the record to determine whether small
entities will be required to hire
professionals to comply with its
decisions or to quantify the cost of
compliance for small entities. However,
the record reflects that many wireless
providers have already developed and
implemented some form of the customer
authentication requirements in the
Report and Order, minimizing cost
implications for small entities. We also
permit wireless providers to use existing
methods of notification that are
reasonably designed to reach the
affected customer. Several of our rules
build on existing mechanisms that many
wireless providers already use, and
therefore, we expect that our new rules
will further minimize the costs and
burdens for those providers, and should
significantly reduce compliance
requirements for small entities that may
have smaller staff and fewer resources.
F. Steps Taken To Minimize the
Significant Economic Impact on Small
Entities, and Significant Alternatives
Considered
112. The RFA requires an agency to
provide ‘‘a description of the steps the
agency has taken to minimize the
significant economic impact on small
entities . . . including a statement of
the factual, policy, and legal reasons for
selecting the alternative adopted in the
final rule and why each one of the other
significant alternatives to the rule
considered by the agency which affect
the impact on small entities was
rejected.’’
113. The requirements established in
this Report and Order are designed to
minimize the economic impact on
wireless providers, including small
providers. The baseline, flexible rules
adopted reflect a recognition that, in
some cases, strict prescriptive
E:\FR\FM\08DER2.SGM
08DER2
Federal Register / Vol. 88, No. 235 / Friday, December 8, 2023 / Rules and Regulations
khammond on DSKJM1Z7X2PROD with RULES2
requirements to prevent SIM swap and
port-out fraud could be technically and
economically infeasible for wireless
providers to implement, particularly for
smaller providers. We therefore decline
to adopt certain specific authentication
methods mentioned in the SIM Swap
and Port-Out Fraud Notice because they
may discourage carriers from adopting
new methods to address evolving
techniques used by bad actors. The
record shows that many wireless
providers already have in place some of
the policies and procedures this Report
and Order adopts and that the rules may
therefore only require them to adapt,
refine, or consistently apply those
existing practices. Additionally, by
setting baseline requirements and giving
wireless providers flexibility on how to
meet them, this Report and Order
allows providers to adopt the most costeffective and least burdensome
solutions to achieve the level of security
needed to protect customers against SIM
swap and port-out fraud in a given
circumstance. The Report and Order
further minimizes any potential burdens
of customer notifications by declining to
prescribe particular content and
wording and giving wireless providers
flexibility on how to deliver such
notifications. Similarly, for customer
notices, the Report and Order declines
to require a specific format and content
and declines to require such notices be
delivered to customers annually. With
respect to employee training, we decline
to adopt overly prescriptive safeguards,
such as two-employee sign off. Instead,
the requirement this Report and Order
adopts minimizes potential burdens
because it builds on the Commission’s
existing CPNI training rule and gives
wireless providers flexibility on how to
develop their training programs.
Further, the Report and Order mitigates
the potential burdens of the
recordkeeping requirement by declining
to require that wireless providers
include historic data in their
recordkeeping, which the Report and
Order acknowledged would be
particularly burdensome for small
providers, and declining to require that
providers report this data to the
Commission regularly.
G. Report to Congress
114. The Commission will send a
copy of the SIM Swap and Port-Out
Fraud Report and Order, including this
FRFA, in a report to be sent to Congress
pursuant to the Congressional Review
Act. In addition, the Commission will
send a copy of the SIM Swap and PortOut Fraud Report and Order, including
this FRFA, to the Chief Counsel for
Advocacy of the SBA. A copy of the SIM
VerDate Sep<11>2014
17:02 Dec 07, 2023
Jkt 262001
Swap and Port-Out Fraud Report and
Order (or summaries thereof) will also
be published in the Federal Register.
IV. Ordering Clauses
115. Accordingly, it is ordered that,
pursuant to the authority contained in
Sections 1, 2, 4, 201, 222, 251, 303, and
332 of the Communications Act of 1934,
as amended, 47 U.S.C. 151, 152, 154,
201, 222, 251, 303, and 332, this Report
and Order in WC Docket No. 21–341 is
adopted and that Parts 52 and 64 of the
Commission’s Rules, 47 CFR parts 52,
64, are amended as set forth in
Appendix A.
116. It is further ordered that this
Report and Order shall be effective 30
days after publication in the Federal
Register, and that compliance with the
rules adopted herein shall be required
six months after the effective date of the
Report and Order, except that the
amendments to Sections 52.37(c),
52.37(d), 52.37(e), 52.37(g),
64.2010(h)(2), 64.2010(h)(3),
64.2010(h)(4), 64.2010(h)(5),
64.2010(h)(6), and 64.2010(h)(8) of the
Commission’s rules, 47 CFR 52.37(c),
52.37(d), 52.37(e), 52.37(g),
64.2010(h)(2), 64.2010(h)(3),
64.2010(h)(4), 64.2010(h)(5),
64.2010(h)(6), and 64.2010(h)(8), which
may contain new or modified
information collection requirements,
will not become effective until the later
of (i) six months after the effective date
of this Report and Order; or (ii) after the
Office of Management and Budget
completes review of any information
collection requirements associated with
this Report and Order that the Wireline
Competition Bureau determines is
required under the Paperwork
Reduction Act. The Commission directs
the Wireline Competition Bureau to
announce the compliance date for
§§ 52.37(c), 52.37(d), 52.37(e), 52.37(g),
64.2010(h)(2), 64.2010(h)(3),
64.2010(h)(4), 64.2010(h)(5),
64.2010(h)(6), and 64.2010(h)(8) and to
amend 47 CFR 52.37 and 64.2010
accordingly.
117. It is further ordered that the
Commission’s Office of the Secretary,
Reference Information Center, shall
send a copy of this Report and Order,
including the Final Regulatory
Flexibility Analysis, to the Chief
Counsel for Advocacy of the Small
Business Administration.
118. It is further ordered that the
Office of the Managing Director,
Performance and Program Management,
shall send a copy of this Report and
Order in a report to be sent to Congress
and the Government Accountability
Office pursuant to the Congressional
Review Act, see 5 U.S.C. 801(a)(1)(A).
PO 00000
Frm 00021
Fmt 4701
Sfmt 4700
85813
List of Subjects
Communications, Communications
common carriers, Privacy,
Telecommunications, Telephone,
Reporting and Recordkeeping
Requirements.
Federal Communications Commission.
Marlene Dortch,
Secretary.
Final Rules
For the reasons discussed in the
preamble, the Federal Communications
Commission amends 47 CFR parts 52
and 64 as follows:
PART 52—NUMBERING
1. The authority citation for part 52
continues to read as follows:
■
Authority: 47 U.S.C. 151, 152, 153, 154,
155, 201–205, 207–209, 218, 225–227, 251–
252, 271, 303, 332, unless otherwise noted.
2. Add § 52.37 to subpart C to read as
follows:
■
§ 52.37 Number Portability Requirements
for Wireless Providers.
(a) Applicability. This section applies
to all providers of commercial mobile
radio service (CMRS), as defined in 47
CFR 20.3, including resellers of wireless
service.
(b) Authentication of port-out
requests. A CMRS provider shall use
secure methods to authenticate a
customer that are reasonably designed
to confirm the customer’s identity
before effectuating a port-out request,
except to the extent otherwise required
by 47 U.S.C. 345 (Safe Connections Act
of 2022) or Part 64 Subpart II of this
chapter. A CMRS provider shall
regularly, but not less than annually,
review and, as necessary, update its
customer authentication methods to
ensure that its authentication methods
continue to be secure.
(c)–(e) [Reserved]
(f) Employee Training. A CMRS
provider shall develop and implement
training for employees to specifically
address fraudulent port-out attempts,
complaints, and remediation. Training
shall include, at a minimum, how to
identify fraudulent requests, how to
recognize when a customer may be the
victim of fraud, and how to direct
potential victims and individuals
making potentially fraudulent requests
to employees specifically trained to
handle such incidents.
(g) [Reserved]
(h) This section contains informationcollection and/or recordkeeping
requirements. Compliance with this
section will not be required until this
paragraph is removed or contains a
compliance date.
E:\FR\FM\08DER2.SGM
08DER2
85814
Federal Register / Vol. 88, No. 235 / Friday, December 8, 2023 / Rules and Regulations
3. Delayed indefinitely, amend § 52.37
by adding paragraphs (c), (d), (e), and (g)
to read as follows:
■
khammond on DSKJM1Z7X2PROD with RULES2
§ 52.37 Number Portability Requirements
for Wireless Providers.
(c) Customer notification of port-out
requests. Upon receiving a port-out
request, and before effectuating the
request, a CMRS provider shall provide
immediate notification to the customer
that a port-out request associated with
the customer’s account was made, sent
in accordance with customer
preferences, if indicated, and using
means reasonably designed to reach the
customer associated with the account
and clear and concise language that
provides sufficient information to
effectively inform a customer that a
port-out request involving the
customer’s number was made, except if
the port-out request was made in
connection with a legitimate line
separation request pursuant to 47 U.S.C.
345 and subpart II of this part,
regardless of whether the line separation
is technically or operationally feasible.
(d) Account locks. A CMRS provider
shall offer customers, at no cost, the
option to lock their accounts to prohibit
the CMRS provider from processing
requests to port the customer’s number.
A CMRS provider shall not fulfill a portout request until the customer
deactivates the lock on the account,
except if the port-out request was made
in connection with a legitimate line
separation request pursuant to 47 U.S.C.
345 and subpart II of this part,
regardless of whether the line separation
is technically or operationally feasible.
The process to activate and deactivate
an account lock must not be unduly
burdensome for customers such that it
effectively inhibits customers from
implementing their choice. A CMRS
provider may activate a port-out lock on
a customer’s account when the CMRS
provider has a reasonable belief that the
customer is at high risk of fraud, but
must provide the customer with clear
notification that the account lock has
been activated with instructions on how
the customer can deactivate the account
lock, and promptly comply with the
customer’s legitimate request to
deactivate the account lock.
(e) Notice of Account Protection
Measures. A CMRS provider must
provide customers with notice, using
clear and concise language, of any
account protection measures the CMRS
provider offers, including those to
prevent port-out fraud. A CMRS
provider shall make this notice easily
accessible through the CMRS provider’s
website and application.
*
*
*
*
*
VerDate Sep<11>2014
17:02 Dec 07, 2023
Jkt 262001
(g) Procedures to resolve fraudulent
ports. A CMRS provider shall, at no cost
to customers:
(1) Maintain a clearly disclosed,
transparent, and easy-to-use process for
customers to report fraudulent number
ports;
(2) Promptly investigate and take
reasonable steps within its control to
remediate fraudulent number ports; and
(3) Promptly provide customers, upon
request, with documentation of
fraudulent number ports involving their
accounts.
PART 64—MISCELLANEOUS RULES
RELATING TO COMMON CARRIERS
4. The authority citation for part 64
continues to read as follows:
■
Authority: 47 U.S.C. 151, 152, 154, 201,
202, 217, 218, 220, 222, 225, 226, 227, 227b,
228, 251(a), 251(e), 254(k), 262, 276, 303,
332, 403(b)(2)(B), (c), 616, 620, 1004, 1401–
1473, unless otherwise noted; Pub. L. 115–
141, Div. P, sec. 503, 132 Stat. 348, 1091.
5. Amend § 64.2010 by adding
paragraph (h) to read as follows:
■
§ 64.2010 Safeguards on the disclosure of
customer proprietary network information.
*
*
*
*
*
(h) Subscriber Identity Module (SIM)
changes. A provider of commercial
mobile radio service (CMRS), as defined
in 47 CFR 20.3, including resellers of
wireless service, shall only effectuate
SIM change requests in accordance with
this section. For purposes of this
section, SIM means a physical or virtual
card associated with a device that stores
unique information that can be
identified to a specific mobile network.
(1) Customer authentication. A CMRS
provider shall use secure methods to
authenticate a customer that are
reasonably designed to confirm the
customer’s identity before executing a
SIM change request, except to the extent
otherwise required by 47 U.S.C. 345
(Safe Connections Act of 2022) or
subpart II of this part. Authentication
methods shall not rely on readily
available biographical information,
account information, recent payment
information, or call detail information
unless otherwise permitted under 47
U.S.C. 345 or subpart II of this part. A
CMRS provider shall regularly, but not
less than annually, review and, as
necessary, update its customer
authentication methods to ensure that
its authentication methods continue to
be secure. A CMRS provider shall
establish safeguards and processes so
that employees who receive inbound
customer communications are unable to
access CPNI in the course of that
customer interaction until after the
PO 00000
Frm 00022
Fmt 4701
Sfmt 4700
customer has been properly
authenticated.
(2)–(6) [Reserved]
(7) Employee training. A CMRS
provider shall develop and implement
training for employees to specifically
address fraudulent SIM change
attempts, complaints, and remediation.
Training shall include, at a minimum,
how to identify potentially fraudulent
SIM change requests, how to identify
when a customer may be the victim of
SIM swap fraud, and how to direct
potential victims and individuals
making potentially fraudulent requests
to employees specifically trained to
handle such incidents.
(8) [Reserved]
(9) Compliance. This paragraph (h)
contains information-collection and/or
recordkeeping requirements.
Compliance with this paragraph (h) will
not be required until this paragraph is
removed or contains a compliance date.
■ 6. Delayed indefinitely, amend
§ 64.2010 by adding paragraphs (h)(2)
through (6) and (h)(8) to read as follows:
§ 64.2010 Safeguards on the disclosure of
customer proprietary network information.
*
*
*
*
*
(h) * * *
(2) Response to failed authentication
attempts. A CMRS provider shall
develop, maintain, and implement
procedures for addressing failed
authentication attempts in connection
with a SIM change request that are
reasonably designed to prevent
unauthorized access to a customer’s
account, which, among other things,
take into consideration the needs of
survivors pursuant to 47 U.S.C. 345 and
subpart II of this part.
(3) Customer notification of SIM
change requests. Upon receiving a SIM
change request, and before effectuating
the request, a CMRS provider shall
provide immediate notification to the
customer that a SIM change request
associated with the customer’s account
was made, sent in accordance with
customer preferences, if indicated, and
using means reasonably designed to
reach the customer associated with the
account and clear and concise language
that provides sufficient information to
effectively inform a customer that a SIM
change request involving the customer’s
SIM was made, except if the SIM change
request was made in connection with a
legitimate line separation request
pursuant to 47 U.S.C. 345 and subpart
II of this part, regardless of whether the
line separation is technically or
operationally feasible.
(4) Account locks. A CMRS provider
shall offer customers, at no cost, the
option to lock their accounts to prohibit
E:\FR\FM\08DER2.SGM
08DER2
Federal Register / Vol. 88, No. 235 / Friday, December 8, 2023 / Rules and Regulations
khammond on DSKJM1Z7X2PROD with RULES2
the CMRS provider from processing
requests to change the customer’s SIM.
A CMRS provider shall not fulfill a SIM
change request until the customer
deactivates the lock on the account,
except if the SIM change request was
made in connection with a legitimate
line separation request pursuant to 47
U.S.C. 345 and subpart II of this part,
regardless of whether the line separation
is technically or operationally feasible.
The process to activate and deactivate
an account lock must not be unduly
burdensome for customers such that it
effectively inhibits customers from
implementing their choice. A CMRS
provider may activate a SIM change lock
on a customer’s account when the
CMRS provider has a reasonable belief
that the customer is at high risk of fraud,
but must provide the customer with
clear notification that the account lock
has been activated with instructions on
how the customer can deactivate the
VerDate Sep<11>2014
17:02 Dec 07, 2023
Jkt 262001
account lock, and promptly comply
with the customer’s legitimate request to
deactivate the account lock.
(5) Notice of account protection
measures. A CMRS provider must
provide customers with notice, using
clear and concise language, of any
account protection measures the CMRS
provider offers, including those to
prevent SIM swap fraud. A CMRS
provider shall make this notice easilyaccessible through the CMRS provider’s
website and application.
(6) Procedures to resolve fraudulent
SIM changes. A CMRS provider shall, at
no cost to customers:
(i) Maintain a clearly disclosed,
transparent, and easy-to-use process for
customers to report fraudulent SIM
changes;
(ii) Promptly investigate and take
reasonable steps within its control to
remediate fraudulent SIM changes; and
(iii) Promptly provide customers,
upon request, with documentation of
PO 00000
Frm 00023
Fmt 4701
Sfmt 9990
85815
fraudulent SIM changes involving their
accounts.
*
*
*
*
*
(8) SIM change recordkeeping. A
CMRS provider shall establish processes
to reasonably track, and maintain for a
minimum of three years, the total
number of SIM change requests it
received, the number of successful SIM
change requests, the number of failed
SIM change requests, the number of
successful fraudulent SIM change
requests, the average time to remediate
a fraudulent SIM change, the total
number of complaints received
regarding fraudulent SIM change
requests, the authentication measures
the CMRS provider has implemented,
and when those authentication
measures change. A CMRS provider
shall provide such data and information
to the Commission upon request.
[FR Doc. 2023–26338 Filed 12–7–23; 8:45 am]
BILLING CODE 6712–01–P
E:\FR\FM\08DER2.SGM
08DER2
Agencies
[Federal Register Volume 88, Number 235 (Friday, December 8, 2023)]
[Rules and Regulations]
[Pages 85794-85815]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2023-26338]
[[Page 85793]]
Vol. 88
Friday,
No. 235
December 8, 2023
Part IV
Federal Communications Commission
-----------------------------------------------------------------------
47 CFR Parts 52 and 64
Protecting Consumers From SIM-Swap and Port-Out Fraud; Final Rule
Federal Register / Vol. 88, No. 235 / Friday, December 8, 2023 /
Rules and Regulations
[[Page 85794]]
-----------------------------------------------------------------------
FEDERAL COMMUNICATIONS COMMISSION
47 CFR Parts 52 and 64
[WC Docket No. 21-341; FCC 23-95, FR ID 186823]
Protecting Consumers from SIM-Swap and Port-Out Fraud
AGENCY: Federal Communications Commission.
ACTION: Final rule.
-----------------------------------------------------------------------
SUMMARY: In this document, the Federal Communications Commission
adopted a Report and Order that adopts measures designed to address two
fraudulent practices bad actors use to take control of consumers' cell
phone accounts and wreak havoc on people's financial and digital lives
without ever gaining physical control of a consumer's phone. The Report
and Order revises the Commission's Customer Proprietary Network
Information (CPNI) and Local Number Portability (LNP) rules to require
wireless providers to adopt secure methods of authenticating a customer
before redirecting a customer's phone number to a new device or
provider. The Report and Order also require wireless providers to
immediately notify customers whenever a SIM change or port-out request
is made on customers' accounts, and take additional steps to protect
customers from SIM swap and port-out fraud.
DATES: Effective January 8, 2024, except for revisions to 47 CFR
52.37(c), 52.37(d), 52.37(e), 52.37(g) (instruction 3), 64.2010(h)(2),
64.2010(h)(3), 64.2010(h)(4), 64.2010(h)(5), 64.2010(h)(6), and
64.2010(h)(8) (instruction 6), which contain information collection
requirements and are delayed indefinitely. The FCC will publish a
document in the Federal Register announcing the effective date for
those Sections.
ADDRESSES: Federal Communications Commission, 45 L Street SW,
Washington, DC 20554. In addition to filing comments with the Office of
the Secretary, a copy of any comments on the Paperwork Reduction Act
information collection requirements contained herein should be
submitted to Nicole Ongele, Federal Communications Commission, 45 L
Street SW, Washington, DC 20554, or send an email to [email protected].
FOR FURTHER INFORMATION CONTACT: For further information, contact
Melissa Kirkel at [email protected]. For additional information
concerning the Paperwork Reduction Act information collection
requirements contained in this document, send an email to [email protected]
or contact Nicole Ongele, [email protected].
SUPPLEMENTARY INFORMATION: This is a summary of the Commission's Report
and Order in WC Docket No. 21-341, FCC 23-95, adopted on November 15,
2023 and released on November 16, 2023. The full text of the document
is available on the Commission's website at https://docs.fcc.gov/public/attachments/FCC-23-95A1.pdf. To request materials in accessible
formats for people with disabilities (e.g. braille, large print,
electronic files, audio format, etc.), send an email to [email protected]
or call the Consumer & Governmental Affairs Bureau at (202) 418-0530
(voice).
Compliance with the rule changes adopted in this Report and Order
shall not be required until the later of: (i) six months after the
effective date of this Report and Order; or (ii) after the Office of
Management and Budget (OMB) completes review of any information
collection requirements associated with this Report and Order that the
Wireline Competition Bureau determines is required under the Paperwork
Reduction Act.
Paperwork Reduction Act of 1995 Analysis
This document contains new or modified information collection
requirements. The Commission, as part of its continuing effort to
reduce paperwork burdens, will invite the general public to comment on
the information collection requirements contained in this Report and
Order as required by the Paperwork Reduction Act of 1995, Public Law
104-13. In addition, the Commission notes that pursuant to the Small
Business Paperwork Relief Act of 2002, Public Law 107-198, see 44
U.S.C. 3506(c)(4), we previously sought specific comment on how the
Commission might further reduce the information collection burden for
small business concerns with fewer than 25 employees.
In this Report and Order, we have assessed the effects of required
customer notifications and notices, and related recordkeeping
requirements, to protect customers from SIM swap and port-out fraud,
and find that they do not place a significant burden on small
businesses. Although no commenters specifically addressed whether such
requirements may place burdens on small wireless providers, we note
that CCA advised the Commission to ``keep in mind the constraints with
which many small carriers operate against in adopting security
measures,'' asserting that any rules ``should allow carriers to use
technologies that are reasonably available and have choice in the
approach to take in authenticating their customers.'' As a general
matter, the baseline, flexible rules we adopt reflect our recognition
that, in some cases, strict prescriptive requirements to prevent SIM
swap and port-out fraud could be technically and economically
infeasible for wireless providers to implement, particularly for
smaller providers. We emphasize that the record shows that many
wireless providers already have in place some of the policies and
procedures we adopt today and that our rules may therefore only require
them to adapt, refine, or consistently apply those existing practices.
Additionally, by setting baseline requirements and giving wireless
providers flexibility on how to meet them, we allow providers to adopt
the most cost-effective and least burdensome solutions to achieve the
level of security needed to protect customers against SIM swap and
port-out fraud in a given circumstance. We have further minimized the
potential burdens of customer notifications by declining to prescribe
particular content and wording and giving wireless providers
flexibility on how to deliver such notifications. Similarly, for
customer notices, we declined to require a specific format and content,
and we declined to require such notices be delivered to customers
annually. Further, we mitigated potential burdens of the recordkeeping
requirement by declining to require that wireless providers include
historic data in their recordkeeping, which we acknowledged would be
particularly burdensome for small providers, and declining to require
that providers report this data to the Commission regularly.
Congressional Review Act
The Commission has determined, and the Administrator of the Office
of Information and Regulatory Affairs, Office of Management and Budget,
concurs, that this rule is non-major under the Congressional Review
Act, 5 U.S.C. 804(2). The Commission will send a copy of this Report
and Order to Congress and the Government Accountability Office pursuant
to 5 U.S.C. 801(a)(1)(A).
I. Synopsis
1. Today we revise our CPNI and LNP rules to provide greater
protection to customers from SIM swap and port-out fraud. The
cornerstone of our action is a requirement that wireless providers use
secure methods of authenticating customers prior to performing SIM
changes and number ports. Other rules
[[Page 85795]]
we adopt reinforce that requirement, including that wireless providers
adopt processes for responding to failed authentication attempts,
institute employee training for handling SIM swap and port-out fraud,
and establish safeguards to prevent employees who interact with
customers from accessing CPNI until after customers have been
authenticated. We also adopt rules that will enable customers to act to
prevent and address fraudulent SIM changes and number ports, including
requiring that wireless providers notify customers regarding SIM change
and port-out requests, offer customers the option to lock their
accounts to block processing of SIM changes and number ports, and give
advanced notice of available account protection mechanisms. We further
establish requirements to minimize the harms of SIM swap and port-out
fraud when it occurs, including requiring wireless providers to
maintain a clear process for customers to report fraud, promptly
investigate and remediate fraud, and promptly provide customers with
documentation of fraud involving their accounts. Finally, to ensure
wireless providers track the effectiveness of authentication measures
used for SIM change requests, we require that they keep records of SIM
change requests and the authentication measures they use.
2. In adopting these rules, we balance the need to protect
customers from the harms of SIM swap and port-out fraud with the goal
of preserving the relative ease with which customers can obtain
legitimate SIM changes and number ports. The record reflects that the
vast majority of SIM change and port-out requests are legitimate. It
also shows that the efficient and effective processing of SIM changes
and port-out requests promotes customer choice and competition and
prevents interruptions in access to wireless services that are vital to
customers' everyday lives. Service interruptions can be particularly
problematic when they hamper the ability of customers to access
emergency services. We agree with the Competitive Carriers Association
(CCA) that ``enhanced requirements for SIM swap and port-out requests
can implicate the customer experience and can intentionally or
unintentionally serve as impediments to legitimate requests to change
devices or change providers.'' We are wary of setting rigid
requirements that would impose significant burdens on customers without
substantially protecting against SIM swap and port-out fraud. We also
recognize that prescribing particular security methods can place
greater burdens on some customers because of their technical and
financial means, digital literacy, accessibility needs, and other
particularized circumstances. We anticipate that the approach we take
today will provide meaningful protection to customers while preserving
the competition and customer choice that SIM changes and number porting
are meant to facilitate and avoiding undue burdens that hinder access
to wireless services.
3. To that end, we set baseline rules, rather than prescriptive
requirements, that establish a uniform framework across the mobile
wireless industry for the types of policies and procedures providers
must employ to combat SIM swap and port-out fraud. The record indicates
that several wireless providers already rely, at least partly, on some
of these policies and procedures. We are concerned, however, that a
lack of consistency in how wireless providers apply these measures and
a lack of uniformity in the use of these measures industry-wide leaves
some customers vulnerable to SIM swap and port-out fraud. The rules we
adopt ensure that all wireless providers are taking consistent and
comprehensive steps to address this fraud. For wireless providers that
already employ the measures we require, in many cases our rules simply
raise the bar by requiring them to adapt, refine, or consistently apply
those existing practices. For wireless providers that do not, our new
rules require them to implement new practices to meet the baseline
standards. We anticipate that our approach will ensure that customers
receive effective protection from SIM swap and port-out fraud
regardless of the wireless telecommunications services they purchase or
the wireless provider from whom they purchase them.
4. In setting baseline requirements, rather than prescriptive
rules, our approach also gives wireless providers the flexibility to
establish the specific fraud protection measures they use so that they
can deliver the most advanced protections available. The record
provides substantial evidence that to best combat SIM swap and port-out
fraud, wireless providers need flexibility. In particular, we are
persuaded that wireless providers need such flexibility so that they
can adapt their security methods to keep pace with the evolving threat
landscape. Verizon notes that ``fraudsters are sophisticated and
constantly look to circumvent any protections, no matter how robust.''
We also recognize that ``[r]apid technological changes introduce new
vulnerabilities that existing rules may be unequipped to address.'' We
are therefore concerned by record evidence that a static set of
prescriptive requirements may incentivize some wireless providers to
rely exclusively on those security methods and discourage them from
innovating and adopting new and improved practices to address evolving
fraud techniques used by bad actors. We also share concerns that
setting specific requirements could either provide a roadmap for bad
actors seeking to commit fraud or lock in measures that quickly prove
to be ineffective or obsolete. The aim of our action today is to better
protect telecommunications customers from fraudulent schemes; in doing
so, it is important that our rules, while functioning as baseline
safeguards, do not serve as obstacles to adoption of better security
practices. Indeed, the record asserts that establishing rules that
provide flexibility will incentivize wireless providers to develop and
adopt new and improved methods to protect against SIM swap and port-out
fraud and enable them to quickly adapt their security measures to
respond to evolving techniques and technologies used by bad actors.
Accordingly, we agree with AT&T that ``[t]he best way to combat ever-
evolving fraud tactics is to allow industry players the ability to
adapt and respond to these changing threats in real-time,'' and we
afford wireless providers this flexibility with the rules we adopt in
this Report and Order.
5. Flexibility will also permit wireless providers to use the
specific security practices that are effective and appropriate under
the circumstances. We are persuaded that any given measure will rarely
prove foolproof, necessary, or suitable in all instances, and therefore
that wireless providers should have the ability to tailor the security
mechanisms they use. AT&T, for instance, asserts that it has had
success in deploying measures strategically to reduce the incidents of
SIM swap and port-out fraud, and with our rules, we seek to foster such
outcomes. Our flexible approach enables wireless providers to implement
security measures that are designed to address a customer's particular
circumstances and preferences, and also allows wireless providers to
implement measures that are best suited for their business models,
technologies, and the services they offer. We also recognize that some
wireless providers may seek to use a risk-based model, whereby they
apply different mechanisms to protect customers based on the likelihood
of fraud for a particular SIM change or port-out request, and we do not
want to
[[Page 85796]]
hinder these targeted efforts. For these reasons, we conclude that
wireless providers should have the flexibility to determine which
specific measure will be most effective at protecting customers against
SIM swap and port-out fraud in a given circumstance in accordance with
our baseline rules.
6. We further anticipate that our flexible approach will enhance
protections for customers without placing undue costs and burdens on
wireless providers. We are cognizant that in some instances, strict
prescriptive requirements to prevent SIM swap and port-out fraud could
be technically and economically infeasible for wireless providers to
implement, particularly for smaller providers. Even in the instances
when wireless providers do have the means to implement prescriptive
requirements, those requirements could prove burdensome on providers if
they become obsolete or ineffective and providers are compelled to
maintain them alongside new and better practices they adopt to address
the evolving threat landscape. By setting baseline requirements and
giving wireless providers flexibility on how to meet them, we allow
providers to adopt the most cost-effective and least burdensome
solutions to achieve the level of security needed to protect customers
against SIM swap and port-out fraud in a given circumstance.
Additionally, because many of our rules build on existing mechanisms
that many wireless providers already use, we expect that our new rules
will further minimize the costs and burdens for those providers.
A. Strengthening the Commission's CPNI Rules To Protect Consumers
7. In this section, we adopt baseline measures designed to reduce
the incidence of SIM swap fraud without impinging on customers' ability
to upgrade and replace their devices. As proposed in the SIM Swap and
Port-Out Fraud Notice, we require wireless providers to use secure
methods to authenticate customers that are reasonably designed to
confirm a customer's identity prior to effectuating SIM changes, but we
depart from our proposal specifying particular methods of
authentication, to allow providers the flexibility they need to
implement the most modern and effective authentication methods on an
ongoing basis. We also adopt rules to require wireless providers to
implement procedures to address failed authentication attempts and to
notify customers of SIM change requests prior to effectuating a SIM
change. Additionally, we adopt rules that allow customers to lock their
accounts to prevent SIM changes, require wireless providers to track
the effectiveness of the authentication measures they have implemented,
and safeguard against employee access to CPNI prior to authentication.
In each instance, we afford wireless providers needed flexibility while
enhancing protections for customers.
8. The record makes clear that because SIMs are only used to
facilitate service for mobile wireless devices, SIM swap fraud is a
practice that is exclusive to mobile wireless services. Thus, we apply
these new requirements to providers of commercial mobile radio service
(CMRS), as defined in Section 20.3 of Title 47 of the Code of Federal
Regulations, including resellers of CMRS. We apply these new
requirements to all SIM changes that wireless providers perform.
Further, we require wireless providers to implement these rules with
respect to customers of both pre-paid and post-paid services,
consistent with the protections afforded by Section 222. We see no
reason why the protections should not apply to all customers of CMRS,
including customers of resellers, particularly considering indications
in the record that pre-paid customers are disproportionately impacted
by fraud and that many customers impacted by such fraud are low-income
customers who can ill afford such losses. Under this definition, our
new rules apply to both facilities-based wireless providers as well as
resellers of wireless services. Additionally, given that Section
332(c)(1)(A) of the Act requires that providers of commercial mobile
service be treated as common carriers, 47 U.S.C. 332(c)(1)(A), our
rules cover ``any officer, agent, or other person acting for or
employed by any common carrier or user, acting within the scope of his
employment.'' We make clear, however, that the rules we adopt today do
not require providers to collect more information about pre-paid
customers than they otherwise do in the normal course of business, nor
should they be interpreted to impose disparate burdens on pre-paid
customers related to information collection or authentication.
1. Customer Authentication Requirements
9. We update our CPNI rules to protect customers from the risk of
fraudulent SIM swaps by requiring wireless providers, prior to
conducting a SIM change, to use secure methods to authenticate a
customer that are reasonably designed to confirm a customer's identity,
except to the extent otherwise required by the Safe Connections Act or
the Commission's rules implementing that statute. We define ``SIM,''
for purposes of these rules, as ``a physical or virtual card associated
with a device that stores unique information that can be identified to
a specific mobile network.'' The record reflects significant support
for strengthening authentication requirements for SIM change requests,
and we find that the requirement we adopt today most appropriately
balances the need to increase protection for customers from these types
of fraudulent schemes while providing wireless providers the
flexibility the record shows they need to respond to new and emerging
threats. We encourage wireless providers to use secure authentication
methods that accommodate the needs of the broad spectrum of customers
they may serve. We are persuaded by commenters that a general security
authentication standard will afford customers the highest level of
protection by allowing wireless providers to implement the
authentication methods raised in the record, or develop new
authentication methods, in ways that both account for advances in the
technology and tactics used by bad actors and that work best for their
customers and the particular services they offer. Additionally, we
believe this flexibility alleviates record concerns about the limited
information wireless providers may have to authenticate customers of
pre-paid accounts.
10. The Safe Connections Act of 2022, Public Law 117-223, 136 Stat.
2280 (Safe Connections Act), which is codified at 47 U.S.C. 345,
requires wireless providers to separate lines from a multi-line account
upon request of a survivor of domestic violence and other related
crimes and abuses. 47 U.S.C. 345(b)(1). In an Order adopted today
implementing the Safe Connections Act, the Commission adopted rules to
require covered providers to attempt to authenticate, using multiple
authentication methods if necessary, that a survivor requesting a line
separation is a user of a specific line or lines. Covered providers
must use methods that are reasonably designed to confirm the survivor
is actually a user of the specified line(s) on the account when the
survivor is not the primary account holder or a designated user, and
this authentication shall be sufficient for requesting a SIM change
when made in connection with a line separation request. To the extent
this requirement differs from other authentication
[[Page 85797]]
requirements, including those in 47 CFR 64.2010, the line separation
authentication requirements the Commission adopts to implement 47
U.S.C. 345 serve as an exception to those other requirements. We also
make clear that the Safe Connections Act-related exceptions to our new
SIM change and LNP rules for any SIM change or port-out requests made
in connection with a legitimate line separation request apply
regardless of whether a line separation request is technically or
operationally infeasible.
11. While the approach we take today gives wireless providers the
flexibility to adapt to evolving threats, it also creates an obligation
that they adapt to those threats. Specifically, our rule establishes a
requirement that wireless providers regularly, but not less than
annually, review and, as necessary, update their customer
authentication methods to ensure those methods continue to be secure.
The record reflects that while many authentication measures may be
effective today, evolving tactics may mean those methods will not work
tomorrow or in all circumstances. If wireless providers fail to evolve
their authentication methods over time, we expect their methods
eventually will become ineffective. Therefore, we require wireless
providers to regularly, but not less than annually, review their
authentication methods, and update them as necessary to ensure that the
authentication methods remain effective.
12. Because we impose a general requirement for secure and
reasonably designed customer authentication, both permitting and
obligating wireless providers to design effective methods to
authenticate customers, we decline to enumerate the four specific
authentication methods the Commission specified in the SIM Swap and
Port-Out Fraud Notice as those that would meet the standard of secure
authentication methods. Those four methods were: (i) the use of a pre-
established password; (ii) a one-time passcode sent via text message to
the account phone number or a pre-registered backup number; (iii) a
one-time passcode sent via email to the email address associated with
the account; or (iv) a passcode sent using a voice call to the account
phone number or a preregistered back-up telephone number. No commenters
supported our imposing these as the exclusive forms of authentication.
We are convinced by the record that specifying approved authentication
methods may incentivize wireless providers to rely exclusively on those
methods or discourage them from adopting new methods to address
evolving techniques used by bad actors. Further, some commenters assert
that requiring specific authentication methods would be burdensome for
wireless providers. Additionally, the record reflects that setting
specific authentication methods could provide a roadmap for bad actors
seeking to commit fraud. The record also highlights potential
vulnerabilities of the four authentication methods we proposed, which
counsels against us codifying these as secure methods of authentication
in perpetuity. For these reasons, we conclude it is most appropriate to
allow wireless providers to analyze and implement the most effective
and secure methods of authenticating customers requesting a SIM change.
For similar reasons, we also decline to require carriers to comply with
the National Institute of Standards and Technology (NIST) Digital
Identity Guidelines or other standards proposed in the record.
13. We nevertheless place boundaries on the use of certain
information for customer authentication for SIM change requests in
light of evidence in the record of their particular vulnerability.
Namely, we conclude, consistent with our proposal, that methods of
authentication that use readily available biographical information,
account information, recent payment information, and call detail
information do not constitute secure methods of authentication. We
decline to establish an exigent circumstances exception on the use of
this information for authentication for when customers are traveling
and may not have access to or remember a PIN, as CTIA asked us to
consider. We believe that such an exception would establish a
significant loophole for fraudulent activity and note that in these
circumstances, customers can use alternative methods of authentication,
such as email. We strongly encourage providers to work with customers
to develop backup authentication practices for use in these types of
scenarios. We seek comment in the Further Notice on whether we should
harmonize our CPNI rules with the SIM change rules we adopt today, and
we therefore take no action, at this time, to amend our existing rules
to prohibit providers from relying on recent payment and call detail
information to authenticate customers for online, telephone, or in-
person access to CPNI.
14. We decline to restrict the use of SMS-based customer
authentication for SIM change requests, but we strongly encourage
wireless providers to use this mechanism only when paired with other
secure methods of authentication, i.e., as part of multi-factor
authentication (MFA). In the SIM Swap and Port-Out Fraud Notice, we
sought comment on the potential security vulnerabilities of SMS-based
authentication. The record clearly expresses concern about the security
risks of SMS-based authentication when used by third parties, such as
financial institutions, largely because this authentication method
becomes vulnerable following fraudulent SIM swaps. The record evidence
is less clear that SMS-based authentication is an insecure mechanism in
every instance it is used, such as to authenticate the identity of
individuals requesting a SIM change, particularly when sent over a
provider's own network, rather than the Public Switched Telephone
Network (PSTN). We also acknowledge that, in some instances, it may be
the most practical means a provider can authenticate a customer,
particularly when considering the needs of a particular customer. We
anticipate that the approach we take here strikes the right balance
between protecting customers against SIM swap fraud while preserving
the relative ease with which customers can obtain legitimate SIM
changes. We emphasize, however, that our rules create an ongoing
obligation that wireless providers ensure the authentication methods
they use are secure. Accordingly, permitting wireless providers to use
SMS-based authentication does not create a safe harbor for use of this
authentication method. We will continue to monitor the use of SMS-based
authentication and may later revisit our decision to permit its
continued use.
2. Response to Failed Authentication Attempts
15. We require wireless providers to develop, maintain, and
implement procedures for responding to failed authentication attempts
in connection with a SIM change request that are reasonably designed to
prevent unauthorized access to a customer's account, which, among other
things, take into consideration the needs of survivors pursuant to the
Safe Connections Act and our implementing rules. We are bolstered by
the Princeton University researchers who found evidence that wireless
providers' procedures to respond to suspicious authentication attempts
may be inadequate or nonexistent. Specifically, they determined that
some wireless providers only required callers to successfully respond
to one authentication challenge to obtain a SIM change even if the
caller had failed numerous previous authentication attempts. While the
SIM Swap and Port-
[[Page 85798]]
Out Fraud Notice raised these issues, no commenters offered evidence to
counter the researchers' findings. Without procedures in place to
respond to failed authentication attempts, bad actors can seek to
circumvent wireless provider authentication mechanisms to fraudulently
obtain a SIM change. We anticipate that requiring wireless providers to
establish procedures to respond to failed authentication attempts that
are reasonably designed to prevent unauthorized access to a customer's
account will impede these fraud attempts. We conclude that whatever
burdens may be associated with this requirement are outweighed by the
Commission's interest in protecting customers against fraudulent
activity.
16. At the same time, we are persuaded by T-Mobile's argument that
wireless providers need flexibility with respect to failed
authentication attempts because it is common for customers to lose or
forget their authentication data, leading to multiple failed attempts.
As such, we decline at this time to adopt prescriptive requirements for
how wireless providers must respond to failed authentication attempts
in connection with a SIM change request. We find that anchoring this
rule in a reasonableness standard will give wireless providers
flexibility to design procedures to handle failed authentication
attempts that protect against fraudulent activity while preventing
unnecessary burdens on legitimate customer activity. We decline,
however, to adopt CTIA's suggestion to require the development and
implementation of such procedures only where a wireless provider has
reason to believe multiple authentication attempts are fraudulent; CTIA
does not address how such determinations would be made absent the very
procedures we require.
17. We decline, at this time, to adopt a requirement that wireless
providers immediately notify customers in the event of multiple failed
authentication attempts in connection with SIM change requests.
Industry commenters assert that ``in many cases, providers will not be
able to discern whether a failed authentication attempt is `in
connection with a SIM change request' or some other type of transaction
involving account access for which authentication is needed and
fails,'' and that ``a carrier does not typically know why a customer
authenticates until after the customer has successfully
authenticated.'' Further, commenters raise concerns that tracking such
attempts across platforms could be technically challenging, though we
are not persuaded that doing so is technically infeasible. For example,
CTIA's proposal that carriers should only be required to develop and
implement procedures for responding to multiple failed authentication
attempts ``where a carrier has reason to believe such attempts are
fraudulent'' implies that wireless carriers can and do track multiple
authentication attempts, or, at a minimum, are technically capable of
doing so. Given these concerns, we find that requiring wireless
providers to notify customers immediately of multiple failed
authentication attempts associated with a SIM change request is not
appropriate at this time. However, we seek comment in the Further
Notice below whether we should require wireless providers, or all
telecommunications carriers, to notify customers immediately of all
failed authentication attempts to help protect customers from account
fraud, as well as how wireless providers could implement a customer
notice requirement for multiple failed authentication attempts.
18. We also decline to require that wireless providers delay SIM
changes for 24 hours in the event of failed authentication attempts
while notifying customers via text message and/or email regarding the
failed authentication attempts. The record reflects that strict
requirements involving 24-hour delays or account locks could be overly
burdensome for customers that are engaged in legitimate SIM changes. We
also anticipate that the requirement to develop, maintain, and
implement procedures for responding to failed authentication attempts
in connection with a SIM change request that are reasonably designed to
prevent unauthorized access to a customer's account, coupled with the
requirement we adopt below that wireless providers immediately notify
customers upon receiving a SIM change request, will be sufficient to
empower customers to quickly address unauthorized SIM change attempts.
3. Customer Notification of SIM Change Requests
19. To provide customers with an early warning that their account
may be subject to fraudulent activity, we adopt our proposal to require
wireless providers to provide immediate notification to customers of
any requests for a SIM change associated with the customer's account
and specify that the notification must be sent before a wireless
provider effectuates a SIM change, except to the extent otherwise
required by the Safe Connections Act of 2022 (47 U.S.C. 345) the
Commission's rules implementing that statute. The record evinces firm
support for this requirement and provides good reason--time is often of
the essence with SIM swap fraud, and notifying customers of a SIM
change request before effectuating the request will enable customers to
act promptly to mitigate damages and inconvenience resulting from
fraudulent or inadvertent SIM changes. We also expect that requiring
notification before the request is processed will prevent the
notification from being sent to the bad actor after a SIM swap has
occurred. For these reasons, we agree with Princeton University that
``[t]here is an unambiguous and material security upside,'' to
immediate customer notification of SIM change requests, and ``the only
downside is a very infrequent notification that the customer can easily
discard'' for legitimate requests.
20. We therefore disagree with AT&T's contention that notification
of all SIM change requests is unnecessary because ``AT&T employs
various tools to assess the risk level of a particular postpaid SIM
change or port-out request and very often can determine at the outset
that a request is legitimate.'' The notification requirement we adopt
today will provide a uniform safety measure for all requests across the
mobile wireless industry, which we anticipate will reduce the instances
and mitigate the harms of SIM swap fraud. We also disagree with AT&T's
assertion that customers will become so inundated with SIM change
notifications that they will ``eventually become numb or immune to them
or tire of and consciously choose to ignore them, thus undermining all
value they might otherwise have when the threat of fraud is real.''
Nothing in the record, or our understanding of the SIM change process,
supports the notion that customers request SIM changes at such a rate
that, upon the adoption of this rule, wireless providers will be forced
to inundate their customers with the required notifications. For the
same reasons, we decline AT&T's request that we modify the mandatory
SIM change request notification requirement ``either to (1) standalone
SIM transactions--i.e., SIM swaps that do not include a device change
or upgrade--based on the lower propensity for fraud in transactions
involving new devices, or (2) SIM transactions that a carrier
identifies as having a high propensity for fraud,'' on the basis such
notifications could cause customer confusion, concern, and fatigue, and
could increase costs for carriers because such notifications increase
customer calls.
21. Also contrary to AT&T's assertions, we do not anticipate that
the notification requirement we adopt today
[[Page 85799]]
will be overly burdensome for wireless providers to implement. As an
initial matter, wireless providers should already have processes in
place to immediately notify customers of certain account changes
involving CPNI in accordance with our existing rules, so they should be
able to build on these processes to provide immediate notification
regarding SIM change requests. The record also demonstrates that some
wireless providers already notify customers of SIM change requests in
most instances and therefore will only need to update their processes
to notify customers in all cases. Additionally, as discussed below, we
give wireless providers flexibility on how to provide the required
notifications, which we expect further minimizes any potential burdens
associated with our new rule. For the same reasons, we decline CTIA's
request ``to let providers determine whether a notice is warranted or
effective in the first instance'' on the basis that such flexibility is
needed to deal with instances, for example, when a phone is lost or
stolen and expedient forms of notification may not be available. We do
not prohibit wireless providers from processing SIM change requests
after the notification is sent, and because bad actors may attempt to
commit SIM swap fraud by claiming that a device is lost or stolen, that
is precisely the type of situation when we want to ensure customers are
provided a notification of a SIM change request. In any event, we find
that the benefits of our notification requirement outweigh the
potential burdens.
22. We permit wireless providers to determine the method of
providing notifications regarding SIM change requests involving a
customer's account, but specify that the notifications must be
reasonably designed to reach the customer associated with the account,
and sent in accordance with customer preferences, if indicated. For
example, this would include delivering a notification in the language
of the customer's choosing, if the wireless provider permits
communications preferences in other languages and the customer has
previously indicated such choice. Although some commenters suggest that
we should specify the means by which a wireless provider should deliver
SIM change request notifications, we agree with industry commenters
that providers need flexibility to determine the most appropriate
method to notify their customers of a pending SIM change request, so
that providers can account for ``the complexities of notifications in
various contexts,'' as well as the technical capabilities,
accessibility needs, or broadband access of individual customers. For
example, when a customer is requesting a SIM change because the
customer's phone is lost or stolen, our flexible approach enables
wireless providers to use methods of notification that are most likely
to reach the customer under those circumstances, such as an email or a
text or call to a pre-determined back-up phone number. We also aim to
enable wireless providers to send notifications in accordance with
customer preferences, needs, and established expectations. As such, we
permit wireless providers to use existing methods of notification that
are reasonably designed to reach the customer associated with the
account, and we encourage them to adopt new notification methods as
they are developed to stay responsive to evolving fraud schemes. Such
methods include, but are not limited to, live or automated telephone
calls, text messages, emails, or push notification through wireless
provider software applications. We acknowledge that our new rule
differs from our existing rule that providers deliver notification of
other account changes involving CPNI, which specifies that those
notifications may be delivered through a carrier-originated voicemail
or text message to the telephone number of record, or by mail to the
address of record. We find that departing from the existing rule's
approach is appropriate given the depth of harm that can occur from SIM
swap fraud, the need for wireless providers to be able to choose the
most effective method of quickly alerting customers so that customers
can take action to mitigate harm, and the importance of providers
adopting new forms of notification.
23. Our rule also gives carriers the flexibility to design a
notification process that accommodates scenarios beyond individual
customers, such as a business customer seeking bulk SIM changes to
upgrade their equipment. We note that nothing in the customer safeguard
rules we adopt today is inconsistent with or intended to supersede the
Commission's existing business customer exemption, which permits
telecommunications carriers to ``bind themselves contractually to
authentications regimes other than those described in this section for
services they provide to their business customers that have both a
dedicated account representative and a contract that specifically
addresses the carriers' protection of CPNI.''
24. We also decline to prescribe particular content or wording of
SIM change notifications, recognizing that wireless providers are in
the best position to determine what will most effectively notify
customers of SIM change requests and potential fraud and will need to
tailor notifications to customers' service plans and circumstances.
Nevertheless, consistent with the record and our CPNI rules, we specify
that such notifications must use clear and concise language that
provides sufficient information to effectively inform a customer that a
SIM change request involving the customer's SIM was made. We observe
that our rule does not prohibit wireless providers from using different
content and wording for notifications depending on a provider's risk
assessment of a given SIM change request, so long as the notification
uses clear and concise language and is reasonably designed to reach the
actual customer.
25. We further decline to require a delay for customer verification
or acknowledgement in connection with notifications prior to completing
a SIM change request. In the SIM Swap and Port-Out Fraud Notice, we
sought comment on whether we should require a 24-hour delay (or other
period of time) before a wireless provider effectuates a SIM change
while notifying the customer via text message, email, the provider's
app, or push notification, and requesting verification of the request.
This approach received minimal support in the record, and we are
convinced by other record evidence that the burdens of delay and
verification requirements outweigh the benefits, particularly given how
regularly customers seek legitimate SIM changes. For instance, CTIA
explains that a blanket delay would ``make it exceedingly difficult for
a consumer to obtain a new phone and continued service when a device
breaks or is lost, representing a full day where that consumer could
not rely on their wireless service for . . . `keeping in touch with
friends through voice calls and text messages' [and] placing life-
saving public safety calls.'' AT&T and T-Mobile echoed these concerns.
We also anticipate that the authentication, notification, and
remediation requirements we adopt today will sufficiently mitigate
fraudulent SIM change requests without the need for a burdensome delay
and verification process. While we do not require wireless providers to
implement a delay and verification process, we permit them to do so in
instances when they determine these measures are necessary
[[Page 85800]]
to protect against fraud, but stress that this process should not be
used to delay legitimate SIM change requests.
4. Account Locks for SIM Changes
26. We require wireless providers to offer all customers, at no
cost, the option to lock or freeze their account to stop SIM changes.
We anticipate that this requirement will provide customers with more
consistent and meaningful protection against SIM swap fraud, and this
expectation is supported by the record, which reflects that account
locks can be powerful tools against SIM swap fraud, particularly for
customers that are at high-risk of being a target of the practice. We
adopt our proposal that account locks must be offered to all customers
at no cost because we find that a customer's financial means should not
dictate their access to this enhanced security measure, particularly
since customers with lesser financial means may suffer the greatest
consequences of SIM swap fraud. This requirement is consistent with
other Commission rules governing preferred carrier freezes for Local
Exchange Carriers, see 47 CFR 64.1190, as well as the requirements
adopted for port-out locks. To simplify the ability for customers to
take advantage of account locks for SIM changes and number ports, we
encourage wireless carriers to offer customers the ability to activate
both locks in one step.
27. Like the other rules we adopt today, we give wireless providers
flexibility on how to comply with this measure. In particular, the
record does not evince a need for us to prescribe a method or methods
for customers to unlock their accounts or impose a waiting period
before an unlocked account can be transferred, and as such, we decline
to do so at this time. We do require, however, that the process to
activate and deactivate an account lock must not be unduly burdensome
for customers such that it effectively inhibits them from implementing
their choice. Additionally, we stress that when activated, wireless
providers must not fulfill SIM change requests until the customer
deactivates the lock, except to the extent otherwise required by the
Safe Connections Act or the Commission's rules implementing that
statute. We find that the account lock requirement is technically
feasible, particularly given evidence that some wireless providers
already offer this feature to customers. Additionally, we are
unpersuaded by AT&T's claim that ``building a system that is capable of
widespread adoption of [account locks] would entail significant carrier
costs and time for questionable gain.'' We anticipate that because of
these existing account lock offerings and the flexible approach we
take, the rule will not be unduly costly for wireless providers to
implement, and that to the extent there are costs associated with the
requirement, they are outweighed by the associated benefits of
preventing fraudulent activity.
28. Consistent with this flexible approach, we permit wireless
providers to proactively initiate a SIM swap lock on a customer's
account when a provider believes the customer may be at high risk of
fraud. We are persuaded by T-Mobile's assertion that such capability is
valuable because wireless providers are sometimes positioned to know
when a customer is at high risk of SIM swap fraud and that this tool
allows them to help customers secure their accounts. However, we
require that wireless providers promptly provide clear notification to
the customer that the lock has been activated with instructions on how
the customer can deactivate the account lock if the customer chooses,
and to promptly comply with the customer's legitimate request to
deactivate the account lock. We also caution wireless providers that
any proactive initiation of a SIM change lock must be limited in
duration and extend only so long as the high risk of fraud is evident
to the provider. In establishing this limitation, we intend to prohibit
wireless provider abuse of SIM change locks to avoid, among other
outcomes, preventing the customer from terminating service with the
provider or moving to another competing provider.
29. Given the protection that account locks can provide to
customers, we conclude that it should be offered to customers of both
pre-paid and post-paid services. We are unpersuaded by AT&T's assertion
that pre-paid service is not amenable to account locks because ``[s]ome
prepaid customers provide little personal information when they
activate their account,'' which could make it difficult to authenticate
a customer to unlock an account. Because the account lock is an
optional security measure for customers, wireless providers can, if
necessary, require customers to provide information to use for
authentication purposes to activate the account lock.
30. We also disagree with AT&T that an account lock option ``should
remain a tool that carriers can choose, but are not required, to
offer.'' AT&T acknowledges that ``[a]ccount locks can be an effective
tool to increase the security of customer accounts on occasion,'' but
it suggests that because ``they are not needed to manage the risk of
fraud in every case and for every customer,'' wireless providers should
not be required to offer them to all customers. While AT&T's approach
would leave the choice of whether an account lock is necessary
exclusively in the hands of wireless providers, we conclude this choice
should be placed principally in the hands of the customer, the party
that is potentially at risk for SIM swap fraud, and therefore we
require providers to offer the option to all customers. Likewise,
AT&T's concern that ``an account lock can be a source of friction''
even for a postpaid customer when the ``customer forgets having placed
the freeze on the account or dislikes the efforts needed to unfreeze
the account'' is not, we conclude, a valid basis for declining to
require that wireless providers offer SIM change locks. The benefits of
this account security measure outweigh any potential friction, and we
expect that wireless providers can take steps to mitigate any such
friction if they choose, such as by providing customers with periodic
reminders that they have activated the account lock and on how they can
deactivate the lock. Because of the authentication challenges for pre-
paid customers and the potential friction for customers who may not
want SIM changes to be more difficult, we decline to require account
locks be activated by default, on an opt-out basis, as BPI/BITS
suggests. We are also unconvinced by comments claiming that SIM change
locks may be of limited value to customers. This requirement empowers
high-risk and security-minded customers to enable additional
protections beyond the enhanced authentication requirements and other
security measures we adopt today, and it need not be activated by a
large percentage of customers for it to be valuable.
5. Tracking Effectiveness of SIM Change Protection Measures
31. We require wireless providers to establish processes to
reasonably track and maintain information regarding SIM change requests
and their authentication measures, and to retain that information for a
minimum of three years. We agree with the Princeton University
researchers that a tracking requirement will equip wireless providers
``to measure the effectiveness of their customer authentication and
account protection measures,'' and find that they would not otherwise
be able to do so effectively without collecting such information.
Consistent with recommendations in the record by the Princeton
University researchers, we specifically require wireless providers to
collect and maintain the following information regarding SIM change
[[Page 85801]]
requests and authentication measures: the total number of SIM change
requests, the number of successful SIM changes requests, the number of
failed SIM change requests, the number of successful fraudulent SIM
change requests, the average time to remediate a fraudulent SIM change,
the total number of complaints received regarding fraudulent SIM
changes, the authentication measures the wireless provider has
implemented, and when those authentication measures change. We also
strongly encourage them to collect and retain any additional
information that will help them measure the effectiveness of their
customer authentication and account protection measures. We find that
the three-year retention period is appropriate because it allows
providers to track the effectiveness of their measures over time and
ensures the information is available for a sufficient time should the
Commission request it for review. The requirement that wireless
providers collect and maintain information regarding when
authentication measures change simply means that providers must track
the introduction and removal of such measures, and not updates or
refinements to existing measures.
32. We disagree with CTIA's assertions that a recordkeeping
requirement will divert resources from combating incidences of SIM swap
fraud. Instead we find that this data tracking requirement is critical
to wireless providers' efforts to keep ahead of evolving fraud
techniques. And the record reflects that some wireless providers
already track and analyze information regarding SIM swap fraud and
their account protection measures to improve those measures, indicating
that this is a practical and cost-effective practice. Thus, while we
recognize that this recordkeeping requirement may not be without cost,
particularly for wireless providers who do not already collect such
information, we find that the benefits of this requirement far exceed
any potential costs.
33. We agree with CTIA that the data tracking and retention
requirements should only be prospective in nature, and as such, we make
clear that our rule does not obligate wireless providers to research
and collect historic data. We conclude that including historic data in
the data tracking requirements we adopt would be burdensome, or even
impossible, for small wireless providers and those who do not already
track this information. We decline to adopt reporting and audit
requirements in conjunction with our data tracking requirement, but we
do require wireless providers to make the information they collect
available to the Commission upon request. Because the information we
require wireless providers to collect does not include personally
identifiable information (PII) or CPNI, wireless providers will not be
required to provide PII or CPNI in response to Commission requests for
this information, but the Enforcement Bureau may request PII or CPNI in
the course of a specific investigation. Although regular reporting and
audit requirements can improve wireless provider incentives and
accountability, we do not find that such measures are necessary at this
time in light of the other measures we adopt today and providers'
ongoing commitment to be vigilant in combating fraud. We maintain the
ability to obtain collected information from wireless providers as
needed, not only as a potential tool to evaluate whether providers are
implementing sufficient measures to address SIM swap fraud, but also to
evaluate whether the specific requirements we adopt today continue to
be effective or in need of updates to address the evolution of fraud
techniques. Consequently, we find that there are insufficient benefits
of a regular reporting requirement to outweigh the potential costs.
6. Safeguards on Employee Access to CPNI
34. We require wireless providers to establish safeguards and
processes so that employees who receive inbound customer communications
are unable to access CPNI in the course of that customer interaction
until after a customer has been properly authenticated. We find, based
on the record before us, that requiring wireless providers to limit
access to CPNI by employees who receive inbound customer communications
until after the customer has been properly authenticated will help to
minimize the incidences of SIM swap fraud by preventing customer
service representatives from inadvertently or intentionally assisting
bad actors in fraudulent schemes. We are persuaded that, even with the
customer service representative training requirements we adopt today,
allowing employees who receive inbound customer communications to
access CPNI prior to proper authentication of the customer is
unnecessary and possibly ``invites adversaries to exploit sympathetic,
inattentive, or malicious customer service representatives for account
access.'' While we anticipate that employees will comply with training
requirements in good faith, ``[t]here should be no opportunity for a
representative to give a hint or a free pass'' that will help bad
actors commit fraud. We therefore conclude that requiring wireless
providers to establish safeguards and processes so that employees who
receive inbound customer communications are unable to access CPNI in
the course of that customer interaction until after the customer has
been properly authenticated--``a straightforward fix'' and standard
data security best practice--will provide meaningful protection in
helping to combat SIM swap fraud. We find that the benefits of this
requirement outweigh any potential costs, and that any such costs will
be mitigated by allowing telecommunications carriers flexibility to
determine the particular safeguards and processes that will prevent
employees who receive inbound customer communications from accessing
CPNI in the course of that customer interaction until after a customer
has been properly authenticated. Below, we seek comment on whether to
require all telecommunications carriers to limit access to CPNI by
employees who receive inbound customer communications until after the
customer has been properly authenticated to minimize customer account
fraud.
35. We decline to adopt other suggested employee safeguards that
are overly prescriptive and for which the costs outweigh the benefits.
In the SIM Swap and Port-Out Fraud Notice we sought comment on other
ways to avoid employee malfeasance, such as requiring two employees to
sign off on every SIM change. Although we anticipate that two-employee
sign off could be an effective account protection mechanism and
encourage wireless providers to use this procedure when appropriate, we
are persuaded by AT&T's argument that requiring this procedure for
every SIM change would be a significant burden on legitimate SIM change
requests given the uncertainty regarding whether it would prevent SIM
swap fraud in most instances, and therefore decline to adopt it. We
also reject several other requirements proposed in the record
concerning customer service representatives who perform SIM changes.
Specifically, a mandate that employees who perform SIM swaps be subject
to enhanced background checks may be financially and practically
infeasible for large and small wireless providers alike, and could
create an incentive for providers to reduce the number of employees
capable of
[[Page 85802]]
performing SIM changes, which would slow the processing of legitimate
changes. Requiring employees to swipe a company badge when entering
secure facilities is a good practice that we encourage wireless
providers to adopt, but the record does not address how this
requirement would serve to prevent SIM swap fraud. The proposal to
require employees to sign a restrictive confidentiality agreement is
faulty for the same reason. Moreover, a proposed restriction on use of
performance incentives is overly broad, could stifle competition, and
might prevent customers from accessing special offers. Finally, we
decline to adopt a proposal that wireless providers ``be required to
have heightened SIM swap customer care during [weekends and
evenings].'' We find that providers are best positioned to implement
procedures tailored to the level of risk at any given time and should
have the flexibility to adjust their practices to address the evolving
nature of fraudulent activity.
7. Telecommunications Carriers' Duty To Protect CPNI
36. While the record shows that some wireless providers have
implemented CPNI security practices beyond those required by current
rules, SIM swap fraud persists. We are also concerned that some
wireless providers may view the protection measures we adopt today as
sufficient, rather than baseline, protections against SIM swap fraud.
To ensure that wireless providers adapt their security practices on an
ongoing basis to address evolving techniques used by bad actors to
commit SIM swap fraud, we take this opportunity to remind all
telecommunications carriers of their statutory duty to ``protect the
confidentiality of proprietary information of, and relating to . . .
customers,'' and their continuing preexisting legal obligation to
``take reasonable measures to discover and protect against attempts to
gain unauthorized access to CPNI.'' Consistent with the Commission's
approach in the 2007 CPNI Order, we conclude that these existing legal
obligations necessarily obligate telecommunications carriers to
proactively and regularly review and monitor their policies and
procedures to ensure that they continue to be effective at addressing
evolving fraud techniques against customer accounts and services--
including SIM swap and port-out fraud--and to conduct analyses of fraud
incidents to determine how the fraud occurred and implement measures to
prevent such tactics from being successful again in the future.
B. Strengthening the Commission's Number Porting Rules To Protect
Consumers
37. Given the potential for consumer harm from port-out fraud, we
conclude that the time is ripe to strengthen our number porting rules
with baseline measures to increase the protections for customers
against fraudulent port-outs. As with our new SIM change rules, the
backbone of our new number porting rules is a requirement that wireless
providers use secure methods to authenticate customers that are
reasonably designed to confirm a customer's identity prior to
effectuating number ports, and we also require wireless providers to
notify customers of port-out requests and allow customers to lock their
accounts to prevent port-outs. To future-proof our requirements, we
give wireless providers flexibility in how to implement them. We
anticipate that these new rules will work together to provide
meaningful protection to customers while preserving the efficient and
effective processing of port-out requests that promotes customer choice
and competition. As with our new SIM change rules, we apply these new
requirements exclusively to providers of CMRS, as defined in Section
20.3 of Title 47 of the Code of Federal Regulations, including
resellers of CMRS, as the record shows that port-out fraud is focused
on mobile wireless customers. We likewise require wireless providers to
implement these rules with respect to customers of both pre-paid and
postpaid services.
1. Customer Authentication Requirements
38. We revise our porting rules to require that wireless providers
use secure methods to authenticate customers that are reasonably
designed to confirm a customer's identity before completing a port-out
request, except to the extent otherwise required by the Safe
Connections Act or the Commission's rules implementing that statute.
Consistent with our new SIM change authentication rules, we require
wireless providers to regularly, but not less than annually, review
and, as necessary, update their customer authentication methods to
ensure those methods continue to be secure.
39. The Safe Connections Act prohibits wireless providers from
making a line separation contingent on a prohibition or limitation on
number portability, provided such portability is technically feasible.
The Commission's rules adopted today implementing the Safe Connections
Act require covered providers to attempt to authenticate, using
multiple authentication methods if necessary, that a survivor
requesting a line separation is a user of a specific line or lines.
Covered providers must use methods that are reasonably designed to
confirm the survivor is actually a user of the specified line(s) on the
account when the survivor is not the primary account holder or a
designated user. To the extent this requirement differs from other
authentication requirements, including those in 47 CFR 64.2010, the
line separation authentication requirements the Commission adopts to
implement 47 U.S.C. 345 serve as an exception to those other
requirements.
40. As in the SIM change context, we are persuaded by commenters
that a general security authentication standard will best allow
wireless providers the flexibility to respond to advances in the
technology and tactics used by bad actors, providing the greatest
protection for customers, and enabling providers to implement
authentication methods in ways that work best for the particular
services they offer. The record reflects that the benefits of allowing
wireless providers to determine the best method for authenticating
customers outweigh speculative concerns that absent standardized
authentication methods, nationwide providers could arbitrarily
determine which authentication methods or controls are sufficient
before effectuating ports. We note also that under the Act and our
existing rules, all carriers are required to complete legitimate ports,
and that our new customer authentication requirements do not give
carriers the authority to make determinations about the sufficiency of
another carrier's authentication methods--that responsibility will
belong to the Commission, and we will address any concerns regarding
the adequacy of authentication methods, as well as inappropriate port
denials, as needed. We also agree with CCA that our approach will
better serve small wireless providers by permitting them to ``use
technologies that are reasonably available and have choice in the
approach to take in authenticating their customers.'' Additionally, as
we concluded with regard to authentication for SIM changes, this
flexible approach should resolve concerns about authenticating
customers of pre-paid accounts.
41. We are mindful of the potential effect on competition of our
new customer authentication requirements, and thus, we require that the
secure authentication methods wireless providers adopt accommodate the
needs
[[Page 85803]]
of the broad spectrum of customers they may serve, including those who
do not have data plans or data-enabled devices, have varying degrees of
technological literacy, or have disabilities or accommodation needs. To
illustrate, we observe that wireless providers may find requiring a
one-time port-out PIN obtained through a provider app is an effective
means for authenticating customers with a data-enabled smart phone, but
that authentication measure may not be a feasible option for customers
without data plans or smartphones, or for those customers who are
unable to navigate the technology. As such, this requirement may
necessitate the use of multiple authentication methods, such as in-
person authentication using government-issued identification, over-the-
phone authentication, or alternative methods for individuals with
disabilities.
42. We do not anticipate that using secure methods to authenticate
a customer requesting a port-out will be burdensome to wireless
providers or unreasonably delay the processing of port-out requests.
The record reflects that many wireless providers have already developed
and implemented some form of customer authentication for port-out
requests. The approach we adopt today will allow wireless providers to
continue using or building upon what is already working in the
industry, helping to streamline implementation and costs. We expect
wireless providers to design and implement customer authentication
processes for port-out requests that minimize porting delays and
maintain the industry agreed-upon two-and-a-half hour porting interval
for wireless ports.
2. Customer Notification of Port-Out Requests
43. We also revise our numbering rules to require wireless
providers to provide immediate notification to their customers whenever
a port-out request is made, sent in accordance with customer
preferences, if indicated, and specify that the notification must be
sent before a provider effectuates a port, except to the extent
otherwise required by the Safe Connections Act of 2022 (47 U.S.C. 345)
or the Commission's rules implementing that Act. For example, this
would include delivering a notification in the language of the
customer's choosing, if the wireless provider permits communications
preferences in other languages and the customer has previously
indicated such choice. We require that wireless providers notify their
customers ``immediately'' of a porting request to not only ensure that
porting requests are processed efficiently, but also help alert
customers quickly to potential fraud to allow them to mitigate damages
and inconvenience resulting from fraudulent or inadvertent port-outs.
The notification requirement will provide a uniform safety measure for
all port-out requests across the mobile wireless industry, which we
anticipate will reduce the instances of port-out fraud. For the same
reasons we raised in the SIM change context, we decline to impose a
blanket yes/no verification requirement for authentication attempts.
44. As with SIM change notifications, we decline to prescribe
particular methods for providing port-out notifications or particular
content and wording for these notifications, but do require that the
notification methods be reasonably designed to reach the customer
associated with the account and that the content and wording use clear
and concise language that provides sufficient information to
effectively inform a customer that a port-out request involving the
customer's number was made. We recognize that wireless providers are in
the best position to determine which notification methods and what
content and wording will be most effective at notifying customers of
port-out requests and potential fraud under the particular
circumstances, including the real-world security needs of the
transaction, and the technical capabilities, accessibility needs, or
broadband access of individual customers. As such, we encourage
wireless providers to leverage existing notification methods that are
reasonably designed to reach the customer associated with the account,
and to adopt new notification methods as they are developed to stay
responsive to evolving fraud schemes.
45. On balance, we find that benefits accrued from early warning to
customers of potential fraudulent account activity outweigh any
potential burdens imposed on wireless providers by this notification
requirement. First, we find that customer notification of port-out
requests is unlikely to prevent or unreasonably delay customer porting
requests, as we require ``immediate'' notification and do not require a
delay or customer verification or acknowledgement of that notification
before continuing the porting-out process. Second, because wireless
providers are already familiar with notifying customers regarding
changes to their accounts, and in many cases likely already notify
customers of port-out requests, we anticipate that wireless providers
will face low burdens in implementing today's customer notification
requirement for port-out requests. We also expect that these existing
notification systems can be leveraged to help minimize any potential
costs associated with notifying customers of port-out requests. Third,
we disagree with AT&T's assertion that customer notification of port-
out requests will result in notice fatigue, undermining its efficacy.
Nothing in the record supports the notion that customers request port-
outs at such a rate that, upon the adoption of this rule, wireless
providers will be forced to inundate their customers with the required
notifications. For the same reasons, we decline CTIA's request that
customer notification of port-out requests be ``limited to situations
where the carrier determines that there is an increased risk of fraud''
on the basis that the notification requirements ``threaten to cause
customer confusion, concern, and fatigue,'' and could increase costs
for carriers because such notifications increase customer calls. As
such, we conclude that the significant benefits of alerting customers
to potential fraudulent account activity outweighs any speculative
negative impacts on wireless providers or customers.
3. Account Locks for Port-Outs
46. For the same reasons explained above with respect to SIM change
requests, we require wireless providers to offer their customers, at no
cost, the ability to lock or freeze their accounts to stop port-outs.
We anticipate that this requirement will provide customers with more
consistent and meaningful protection against fraudulent port-outs. The
record reflects that account locks can be powerful tools against
fraudulent port-outs, particularly for customers that are at high-risk
of being a target of the practice. As in the SIM swap context, we
conclude that it should be offered to customers of both pre-paid and
post-paid services, and that this requirement is feasible for both
categories of customers despite assertions to the contrary. Because the
account lock is an optional security measure for customers, carriers
can, if necessary, require customers to provide information to use for
authentication purposes to activate and deactivate the account lock.
47. Like the other rules we adopt today, we give wireless providers
flexibility on how to comply with the measure. In particular, the
record does not evince a need for us to prescribe a method or methods
for customers to unlock or unfreeze their accounts or impose a waiting
period before an unlocked account can be transferred, and as such, we
decline to do so at this time. Although we do not prescribe the
[[Page 85804]]
exact form of the account lock mechanism wireless providers must adopt,
the process to activate and deactivate an account lock must not be
unduly burdensome for customers such that it effectively inhibits them
from implementing their choice. We stress that when activated, wireless
providers must not fulfill port-out requests until the customer
deactivates the lock, except to the extent otherwise required by the
Safe Connections Act or the Commission's rules implementing that
statute. We decline CTIA's request that the Commission find that
mandatory port-out PINs satisfy this requirement. We discuss the
benefits and drawbacks of port-out PINs as a method of customer
authentication, above. We disagree that a mandatory port-out PIN has
the same effect as an optional account lock; while the two protections
serve complementary functions, one is focused on customer
authentication for a specific one-time request, and the other functions
as a customer directed general account security feature.
48. Consistent with this flexible approach, and as we did with the
SIM change rules, we permit wireless providers to proactively initiate
a port-out lock on a customers' account when they believe a customer
may be at high risk of fraud, so long as providers promptly provide
clear notifications to those customers that a lock has been activated
with instructions on how the customers can deactivate account locks if
they choose and promptly deactivates the account lock upon receipt of
the customer's legitimate request to do so. We also caution wireless
providers that any proactive initiation of a port-out lock must be
limited in duration and extend only so long as the high risk of fraud
is evident to the provider. In establishing this limitation, we intend
to prohibit wireless provider abuse of port-out locks to avoid, among
other outcomes, preventing the customer from terminating service with
the provider or moving to another competing provider.
49. As with account locks for SIM changes, given that several
wireless providers already voluntarily offer account locks to all their
customers, and coupled with the flexible approach we adopt, we are
unpersuaded by AT&T's claim that implementing account lock offerings
will be unduly costly and time-consuming for wireless providers. To the
extent there are costs associated with the requirement, we find that
they are outweighed by the benefits.
4. Wireless Port Validation Fields
50. After review of the record, we decline to codify the wireless
port validation fields. We also decline to require wireless providers
to implement a customer-initiated passcode field for all wireless-to-
wireless number porting requests. Currently, the mobile wireless
industry uses four data fields of customer-provided information to
validate a wireless-to-wireless porting request: telephone number,
account number, five-digit ZIP code, and passcode (if applicable). In
the SIM Swap and Port-Out Fraud Notice, we sought comment on whether we
should ``codify the types of information carriers must use to validate
simple wireless-to-wireless port requests.'' While some commenters did
not oppose codification of some of the customer-provided wireless data
fields, they preferred that the Commission continue to give wireless
providers the flexibility to adjust to business and customer needs. We
are persuaded by the record that separate codification of the customer-
provided data fields for validation of wireless-to-wireless ports is
not necessary at this time, as we have been provided no evidence that
wireless providers are not complying with the validation obligations
imposed in the Four Fields Declaratory Ruling. As such, we decline to
separately codify the customer-provided wireless-to-wireless port
validation fields at this time.
C. Additional Consumer Protection Measures
51. In the SIM Swap and Port-Out Fraud Notice, we sought comment on
whether we should adopt additional measures to address the problems
associated with SIM swap and port-out fraud. As discussed below, we
require that wireless providers inform customers of any account
protection mechanisms the provider offers, ensure that customer service
representatives are trained to recognize bad actors' attempts at these
fraudulent schemes, and deliver timely resolution of SIM swap and port-
out fraud when it does occur. We decline, however, to establish a
working group to further study and develop solutions to address the
harms of SIM swap and port-out fraud. We also decline to adopt other
proposals in the record regarding wireless provider liability and
dispute resolution related to SIM swap and port-out fraud.
52. Customer Notice of Account Protection Measures. Many of the
account protection measures wireless providers offer and that we
require wireless providers to adopt today are designed to empower
customers to take steps to protect themselves from SIM swap and port-
out fraud if they choose, but this empowerment will be stifled if
customers are not effectively made aware of the measures that are
available. Accordingly, we require wireless providers to provide
notice, using clear and concise language, of any account protection
measures the provider offers, including the measures we adopt in this
Report and Order, and make this notice easily accessible via provider
websites and applications. We decline to specify the exact format or
content of the required notice, as we agree with CCA that wireless
providers are well-positioned to determine exactly how best to
communicate information about account protection measures to their
customers. The record also demonstrates that some wireless providers
have already developed content to educate customers about some account
protection measures.
53. We decline to require wireless providers to deliver an annual
notice to customers regarding the availability of the account
protection mechanisms they offer. The record does not exhibit support
for this requirement and we have no basis for concluding that it would
be meaningfully more beneficial for customers than our requirement that
wireless providers make notice about the availability of account
protection measures easily accessible through provider websites and
applications. We therefore decline to adopt an annual notice
requirement.
54. Employee Training. We require wireless providers to develop and
implement training for employees on how to identify, investigate,
prevent, and remediate SIM swap and port-out fraud. We find that
adopting this employee training requirement will serve as a ``first
line of defense'' against these damaging and evolving practices by
preparing employees to defend against such fraud and preventing them
from inadvertently or intentionally assisting bad actors in fraudulent
schemes.
55. We agree with Verizon that ``customer care and employee
training programs are critical for preventing and identifying
unauthorized and high-risk SIM changes for postpaid customers,'' and we
find that all customers will benefit from employee training. The record
reflects the industry's recognition of the importance of employee
training; the country's three largest wireless providers--Verizon, T-
Mobile, and AT&T--have already implemented some training measures for
customer service representatives to identify, prevent, and remediate
fraud. The record also shows, however, that some wireless providers'
current practices for customer service representative training may be
lacking, as there are reported instances of wireless provider employees
failing to identify, prevent, or quickly remediate
[[Page 85805]]
SIM swap and port-out fraud. We have previously determined that
customer service training requirements play an important role in
safeguarding the proper use of CPNI and have required
telecommunications carriers to train their personnel on when they are
and are not authorized to use CPNI. We similarly conclude that the
employee training requirement we adopt today is necessary to ensure
customer service representatives are prepared to identify, prevent, and
remediate fraudulent SIM change and port-out activity.
56. In applying this requirement, we give wireless providers
flexibility on designing their training programs. But we do require
that all employees who may communicate with customers regarding SIM
changes and number ports must be trained on how to recognize
potentially fraudulent requests, how to recognize when a customer may
be the victim of fraud, and how to direct potential victims and
individuals making potentially fraudulent requests to employees
specifically trained to handle such incidents. Given that (1) some
wireless providers already train employees on how to address fraud, (2)
our new training requirement builds upon our existing CPNI training
rule, and (3) we are providing wireless providers with flexibility on
how to design their training programs, we do not anticipate that
imposing this training requirement will be overly costly for wireless
providers.
57. Requirements to Remedy SIM Swap and Port-Out Fraud. We are
concerned that in some cases, ``consumers who have been the victims of
SIM swaps or port-out fraud have had difficulties obtaining assistance
from the carriers'' when they report it. Accordingly, we require
wireless providers to maintain a clearly disclosed, transparent, and
easy-to-use process for customers to report SIM swap and port-out
fraud, promptly investigate and take reasonable steps within their
control to remediate such fraud, and, upon request, promptly provide
customers with documentation of SIM swap and port-out fraud involving
their accounts. These measures must be provided to victims of SIM swap
and port out fraud at no cost. We anticipate that, in combination,
these requirements will serve to minimize the harms that victims
experience as a result of SIM swap and port-out fraud.
58. Our requirement that wireless providers maintain a clearly
disclosed, transparent, and easy-to-use process for customers to report
SIM swap and port-out fraud rests on our concern that customers
currently struggle to report SIM swap and port-out fraud to their
wireless providers. When customers are unable to find information about
how to report such fraud or use existing customer service avenues to do
so, it not only frustrates these customers, it prevents initiation of
steps to investigate and remediate the fraud, which increases the risk
that fraudsters will be able to use a victim's SIM or phone number to
accomplish further fraud. We anticipate that clear methods for
reporting SIM swap and port-out fraud that are transparent to customers
will ``ensure that customers have easy access to information they need
to report SIM swap, port-out, or other fraud.'' We decline to specify
the exact means wireless providers must put in place for customers to
report SIM swap and port-out fraud, but we stress that the process must
be a clearly disclosed, transparent, and easy-to-use process for
customers to notify providers.
59. We require wireless providers to establish procedures to
promptly investigate and take reasonable steps within their control to
remediate SIM swap and port-out fraud because the record demonstrates
that even when victims of SIM swap and port-out fraud are successful in
reporting such fraud to their providers, they have difficulty obtaining
assistance from their providers to remediate the fraud. This is
consequential because ``[i]dentity theft, including SIM swap fraud, can
cause intense anxiety for victims and must be addressed in a timely
manner to prevent financial losses and exposure of personal
information.'' Thus, we conclude that ``it should be easy for a
customer to get access to appropriate carrier resources that can help
mitigate the significant harms caused by SIM swap or port-out fraud.''
Although we do not specify the procedures that wireless providers must
adopt, we agree with commenters that investigations must be instigated
and resolved expeditiously.
60. To ensure victims of SIM swap and port-out fraud have
additional means to resolve other consequences that result from SIM
swap and port-out fraud, we require wireless providers to give
customers documentation regarding such fraud on their accounts, upon
request. In the SIM Swap and Port-Out Fraud Notice, we recognized that
``customers sometimes need documentation of the fraud incident to
provide to law enforcement, financial institutions, or others to
resolve financial fraud or other harms of the incident'' and
acknowledged that ``[a] SIM swap or port-out fraud victim may have
difficulty obtaining such documentation from the carrier because the
carrier may not have processes in place to produce such
documentation.'' Requiring wireless providers to give fraud victims
supporting documentation will enable those victims to seek remedies
from other institutions for additional fraud that bad actors achieve
using a victim's SIM or phone number. We do not specify the form that
such documentation must take or exactly what information it must
contain, but it should be reasonably designed to permit customers to
demonstrate to other entities that they were victims of SIM swap or
port-out fraud and that bad actors may have used access to a victim's
telecommunications services to carry out additional fraud. Such
documentation must address the customer's interest in protecting his or
her account(s) or identity but may be tailored not to include other
proprietary, confidential, or law-enforcement-related information
regarding the SIM swap or port-out fraud or the account. Additionally,
because of the potential harms that can flow from SIM swap and port-out
fraud, we also require wireless providers to provide this documentation
promptly.
61. We anticipate that the benefits of our requirements will
outweigh any potential costs. Although commenters did not address the
costs of the additional measures we adopt here, we note that at least
one wireless provider has already adopted processes for customers to
report SIM swap and port-out fraud, to investigate and remediate such
fraud, and to provide documentation of such fraud to customers upon
request. We also anticipate that allowing wireless providers
flexibility in how to abide by these new requirements will enable them
to adopt cost-effective procedures that will also allow them to
successfully resolve SIM swap and port-out fraud incidents when they
occur.
62. To maintain the flexibility we believe will be required for
wireless providers to adequately tailor and adapt their practices to
address SIM swap and port-out fraud, we decline to impose prescriptive
measures raised in the SIM Swap and Port-Out Fraud Notice and the
record. Specifically, although we encourage wireless providers to
establish a dedicated hotline for customers to report SIM swap and
port-out fraud and respond within 24 hours of a customer reporting
suspected fraud, we decline to require that wireless providers adopt
these approaches. While the former requirement received support from
the National Consumer Law Center (NCLC) and the Electronic Privacy
Information Center (EPIC), we
[[Page 85806]]
conclude that it may not benefit a wireless provider's customers if it
is inconsistent with a provider's established customer service methods.
The latter may be infeasible for certain incidents and is not necessary
given our requirement that investigation and remediation be prompt. We
also decline to require that wireless providers give customers an
alternative number on a temporary basis after SIM swap or port-out
fraud has occurred, as that may promote number resource exhaust in
certain areas or for certain wireless providers. However, we encourage
wireless providers to offer customers a temporary alternative number
when the efforts to remediate SIM swap or port-out fraud may take a
significant amount of time or to assist customers who have critical
needs to be accessible via phone at the time. We also recognize that
adequate remediation may require providing victims with permanent
replacement numbers or SIMs, and carriers should effectively assist
customers with that transition should that be necessary. We do not find
it necessary at this time to require that wireless providers, upon
being notified by a customer of fraud, provide ``detailed records of
the fraud [to law enforcement]'' or ``offer to the customer to notify
financial institutions and creditors, the three national credit
reporting agencies, and others of the fraud, to help the customer
recover control over their identity, if appropriate.'' While we
encourage wireless providers to take these steps upon the request of
customers as part of their mitigation efforts, we conclude that our new
requirement that providers give customers documentation concerning
fraudulent SIM swaps and number ports will be sufficient to allow those
customers to alert appropriate entities if needed. We note, however,
that we will monitor consumer complaints and may evaluate the
remediation programs implemented by wireless providers. If we find that
such programs are not adequately resolving SIM swap and port-out fraud
in a timely manner, we may take steps to implement more specific
requirements in the future.
63. Working Group. While we recognize that the harmful effects of
SIM swap and port-out fraud may extend beyond the control of wireless
providers and that the incentives to engage in such fraud implicate the
security practices of other industries, we decline at this time to
direct or rely on standard-setting bodies, industry organizations, or
consumer groups to evaluate SIM swap and port-out fraud ``to augment
our understanding and present possible solutions.'' Instead, we find it
most appropriate to focus on solutions within the scope of the
Commission's authority that we anticipate will mitigate the harmful
consequences of this fraud. Additionally, to the extent that commenters
advocated that we direct this issue to a working group before taking
action, we disagree with that approach and find that doing so would
only delay solutions that we expect will benefit customers now.
Although we decline to rely on a working group, we also do not
foreclose wireless providers from forming or entering into cross-
sector, multi-stakeholder efforts, independent of Commission direction,
to seek broader solutions to the harms that may ultimately result from
SIM swap and port-out fraud.
64. Provider Liability and Dispute Resolution. We decline to adopt
proposals in the record that prescribe provider liability and dispute
resolution requirements for disputes between wireless providers and
customers.
65. NCLC and EPIC argue that the Commission should ``[r]equire
carriers to offer a redress program that . . . provides full coverage
of losses to customers who have been the victims of a fraudulent SIM
swap or port-out fraud,'' which they say would ``[p]rovide strong
financial incentives to providers to stop SIM swapping and port-out
fraud.'' We agree with CTIA, however, that telecommunications carriers
are ``but one link in the chain of consumer and business protection
from account takeover fraud,'' and therefore that the responsibility
for financial harms that a bad actor may be able to perpetuate
following such fraud is borne by several parties, including,
significantly, the bad actor. Imposing such liability on wireless
providers would be inequitable and would reduce the incentives for
email and social media providers, financial institutions, healthcare
providers, retail websites, and other entities that rely on cell phone-
based identity authentication to improve their security practices, as
well as reduce the incentive for customers to act responsibly. We note,
however, that compliance with our rules is not a safe harbor for
wireless providers; customers will still be able to pursue any existing
remedies available by law.
66. Similarly, we decline to specify, as NCLC and EPIC request,
that wireless providers are ``fully responsible for any abuse committed
by its employees, whether the employees acted either intentionally or
negligently,'' although we make clear that this statement does not
absolve wireless providers of any liability for employee actions that
already exists. We anticipate that the requirements we adopt today--
including employee training regarding SIM swap and port-out fraud and
restrictions on the ability of employees to access CPNI prior to
authentication--will ensure that wireless providers implement adequate
procedures to prevent employees from perpetuating SIM swap and port-out
fraud.
67. Finally, we decline to adopt NCLC and EPIC's proposal that
``any arbitration clauses in the providers' agreements with consumers
explicitly exclude resolutions'' of SIM swap and port-out fraud
disputes at this time. They urge this because ``[o]therwise, consumers
who have not been made whole, or who have difficulties obtaining relief
for frauds that are perpetrated on them because of the provider's
insufficiently strict authentication protocols, will have no meaningful
way of enforcing the protections mandated by the Commission.'' The
Commission has full authority to enforce the protections it has
mandated, and we anticipate that the rules we adopt today, coupled with
this enforcement authority, will incentivize wireless providers to
adopt strong practices to protect customers from SIM swap and port-out
fraud. Nonetheless, we seek comment below on whether the Commission
should require providers to exclude disputes about SIM swapping or
porting fraud from arbitration clauses. We encourage customers and
public interest organizations to submit complaints and evidence of
wireless providers failing to comply with these new rules in support of
our enforcement efforts.
D. Implementation Timeframe
68. We require wireless providers to comply with the requirements
we adopt today six months after the effective date of the Report and
Order or, for those requirements subject to review by the Office of
Management and Budget (OMB), upon completion of that review, whichever
is later. We conclude that providing six months to achieve compliance
with rules that are not subject to OMB review accounts for the urgency
of safeguarding customers from these fraudulent schemes, and will allow
wireless providers to coordinate any updates needed to their systems
and processes to comply with the Safe Connections Act and the rules we
adopt to implement that statute. SIM swap and port-out fraud can result
in substantial harm to the customer, including loss of service on their
devices. Fraudulent SIM swaps and port-outs allow bad actors to
perpetrate greater fraud by giving them the means to complete text and
voice
[[Page 85807]]
authentications to access the victim's other accounts, and as such, we
find that an aggressive implementation timeframe is appropriate to
provide these important consumer protections without substantial delay.
We agree with some commenters that while many wireless providers can
immediately implement the revisions to our CPNI and number porting
rules, other providers may require this additional time. Some wireless
providers already employ authentication and notification measures to
process SIM change and port-out requests, offer account change locks,
provide notice to customers about available fraud protection measures,
and train employees on how to address SIM swap and port-out fraud, and
may simply need to refine those practices to align with our rules.
Other providers, particularly smaller providers, may need the
additional time to upgrade their systems, implement modifications to
their policies and procedures, and conduct new customer service
representative training. We conclude that providing six months after
the effective date of the Report and Order to implement these revisions
to our CPNI and number porting rules strikes the right balance between
time for wireless providers to implement these changes and accounting
for the urgency of safeguarding customers from these fraudulent
schemes. We also find that this implementation timeframe is consistent
with other proceedings and regulatory frameworks adopted by the
Commission where consumer protection and numbering requirements were at
issue. While we acknowledge industry's concerns that implementing these
new rules will be a multistep process for many providers, providers
themselves acknowledge the necessity of implementing today's revisions
to our CPNI and LNP rules concurrently with our rules implementing the
Safe Connections Act, given how both frameworks address many of the
same actions (e.g., account locks, customer notifications, customer
authentication). And as we explain in the Safe Connections Order,
``permitting a more extended compliance timeframe for implementing the
line separation provisions, as advocated for by industry commenters,
would be inconsistent with the urgency Congress demonstrated with the
underlying statutory obligation as well as with the critical wireless
communications needs of survivors well-documented in the record.'' For
all of these reasons, we require wireless providers to implement the
rules we adopt today six months after the effective date of this Report
and Order, subject to review by OMB.
E. Legal Authority
69. The rules we adopt today build on the Commission's existing
rules to implement Congress's mandates to ensure that
telecommunications carriers (which include, for purposes of our CPNI
rules, providers of interconnected VoIP service) protect the
confidentiality of proprietary information of, and relating to,
customers and to provide number portability in accordance with
requirements prescribed by the Commission. As such, the rules we adopt
are well-grounded in our authority in Sections 222 and 251, as well as
other provisions of the Act.
70. SIM Changes. Congress, through Section 222 of the Act, requires
telecommunications carriers to protect the privacy and security of
customers' proprietary information that carriers obtain by virtue of
providing a telecommunications service. Under Section 222(a), every
telecommunications carrier has a ``duty to protect the confidentiality
of proprietary information of, and relating to, . . . customers.''
Section 222(c)(1) provides that a telecommunications carrier may only
use, disclose, or permit access to customers' individually identifiable
CPNI that it has received or obtained by virtue of its provision of a
telecommunications service in limited circumstances: (1) as required by
law; (2) with the customer's approval; or (3) in its provision of the
telecommunications service from which such information is derived or
its provision of services necessary to, or used in, the provision of
such telecommunications service.
71. The Commission has previously stated that to comply with these
Section 222 requirements, ``telecommunications carriers [must]
establish effective safeguards to protect against unauthorized use or
disclosure of CPNI.'' The Commission also has established rules
pursuant to its Section 222 authority to ensure such safeguards are in
place. Among other things, the Commission's rules require carriers to
take ``reasonable measures to discover and protect against attempts to
gain unauthorized access to CPNI'' and to ``properly authenticate a
customer prior to disclosing CPNI based on customer-initiated telephone
contact, online account access, or an in-store visit.'' Like these
safeguards, our action today ``strengthen[s] our privacy rules by
adopting additional safeguards to protect customers' CPNI against
unauthorized access and disclosure.''
72. Fraudulent SIM swaps result in unauthorized disclosure of and
access to customers' accounts, including individually identifiable
CPNI. By successfully obtaining a fraudulent SIM swap, a bad actor can
access CPNI such as incoming call information (including the date and
time of the call and number from which the call is made), and gain
access to a victim's account, potentially giving the bad actor access
to other CPNI, like outgoing call history (including numbers called and
the location, frequency, duration, and timing of such calls) and the
victim's bills and the services purchased by the victim. And as
described above, fraudulent SIM swaps allow bad actors to perpetrate
greater fraud by giving them the means to complete text and voice
authentications to access the victim's other accounts.
73. In light of the foregoing, we find that the rules we adopt
today to address SIM swap fraud advance the protections against
unauthorized disclosure of, and access to, individually identifiable
CPNI and other sensitive personal information about customers, and
therefore are squarely grounded in the Commission's authority under
Section 222. Our requirement that wireless providers use secure methods
of authenticating their customers that are reasonably designed to
confirm a customer's identity prior to effectuating a SIM change
request will help prevent unauthorized disclosure of and access to such
information. This requirement also sustains customer decisions
regarding disclosure of their information--if a wireless provider
completes a SIM change requested by someone other than the actual
customer, then the wireless provider has not obtained the customer's
approval to disclose their CPNI in accordance with Section 222(c)(1).
74. The other rules we adopt reinforce the protections afforded by
this new rule. For instance, the requirement that wireless providers
develop, maintain, and implement procedures to respond to failed
authentication attempts will likewise serve to prevent unauthorized
disclosure of and access to CPNI. The rule requiring that wireless
providers establish safeguards and processes so that employees who
receive inbound customer communications are unable to access CPNI until
after the customer has been properly authenticated will prevent
inadvertent disclosure of CPNI to those making unauthorized requests
and inhibit the ability of employees to participate in fraudulent SIM
swaps. Employee training requirements will not only improve their
ability to recognize and derail fraudulent SIM change requests, such
requirements will better
[[Page 85808]]
prepare customer service representatives to address customer complaints
and remediate fraudulent SIM swaps when they do occur. Requiring
wireless providers to maintain a clear process for customers to report
fraud, investigate and remediate fraud, and provide customers with
documentation of fraud involving their accounts will ensure that the
harms of SIM swap and port-out fraud are mitigated when it does occur.
And the requirement that wireless providers keep records of data
regarding SIM change requests and the authentication measures they have
in place will help ensure that wireless providers have information they
need to measure the effectiveness of their customer authentication and
account protection measures and make informed decisions about how they
should be updated over time.
75. Our rules also further the goals of Section 222 by enabling
customers to take action to prevent and address fraudulent SIM changes,
and therefore help wireless providers protect against unauthorized
disclosure and access to CPNI. The requirement that wireless providers
immediately notify customers regarding SIM change requests provides
added protection by giving customers information they can use to notify
their providers that a fraudulent request has occurred at the time of
the request or shortly thereafter so that the provider can take timely
steps to remediate the situation. Requiring wireless providers to offer
customers the option to lock their accounts so that their providers are
prohibited from processing SIM changes gives security-minded customers
or those who are at high risk of fraud a tool to prevent a fraudulent
request from being processed in the first instance. Additionally, our
new rule that wireless providers make notice of account protection
mechanisms easily accessible via their websites and applications
ensures that customers are aware of these tools. We also conclude that
the requirements we establish to promptly resolve SIM swap and port-out
fraud extend from our Section 222 authority because they will help to
mitigate the unauthorized disclosure of and access to CPNI.
76. Finally, the new customer authentication requirements, with
which both facilities-based providers and resellers must comply, apply
to both pre-paid and postpaid services, which is consistent with
Section 222(a)'s mandate that ``[e]very telecommunications carrier . .
. protect the confidentiality of [customer] proprietary information''
and Section 222's instruction that all ``customers'' of those carriers
benefit from such protections.
77. While Section 222 provides firm foundation for our rules to
address SIM swap fraud, we also find that Section 251(e) of the Act
provides additional authority for these rules. In Section 251(e)(1),
Congress expressly assigned to the Commission exclusive jurisdiction
over that portion of the North American Number Plan (NANP) that
pertains to the United States and related telephone numbering issues.
The Commission retained its ``authority to set policy with respect to
all facets of numbering administration in the United States.'' Because
our new SIM change rules prevent and address misuse of NANP numbers
assigned to wireless devices, we conclude that those rules are
supported by our exclusive numbering authority within Section 251(e).
78. Number Porting. We rely on our authority derived from Sections
1, 2, 4(i), 251(e), and 332 of the Act to implement the changes to our
number porting rules to address port-out fraud. As the Commission has
consistently found since 1996, ``[w]e possess independent authority
under Sections 1, 2, 4(i), and 332 of the Communications Act of 1934,
as amended, to require CMRS providers to provide number portability as
we deem appropriate.'' We rely on this well-established authority to
adopt number porting rules applicable to wireless providers that
address port-out fraud.
79. We also find that the exclusive numbering authority that
Congress granted this Commission under Section 251(e)(1) provides ample
authority to extend the LNP requirements as set out in this Report and
Order. Specifically, in Section 251(e)(1) of the Act, Congress
expressly assigned to the Commission exclusive jurisdiction over that
portion of the NANP that pertains to the United States and related
telephone numbering issues. The Commission retained its ``authority to
set policy with respect to all facets of numbering administration in
the United States.'' We find that the revisions to our number porting
rules designed to protect the customers from port-out fraud fit
comfortably within our exclusive numbering authority because the
requirements we establish to prevent and promptly resolve port-out
fraud are necessary to address improper use of numbering resources and
ensure that customers can recover their numbers when fraudulent ports
have occurred.
80. Other Sources of Authority. While the provisions discussed
above provide sufficient authority for the entirety of the rules we
adopt in this Report and Order, we find additional support under
Sections 201 and 303. Sections 201 and 303 of the Act generally give
the Commission authority for prescribing rules, but we also rely on
these sources of authority as described herein.
81. Section 201(b) authorizes the Commission to prescribe rules to
implement carriers' statutory duty not to engage in conduct that is
``unjust or unreasonable.'' We conclude that practices that allow for
fraudulent SIM swaps and number ports are unjust and unreasonable
because they are contrary to the reasonable expectations of customers,
are not reasonably avoidable by customers, and can cause substantial
customer harm. We also rely on our Section 201(b) authority to find
that the inability for customers to effectively seek remedies from
their wireless providers when fraudulent SIM swaps and port outs have
occurred is ``unjust and unreasonable,'' and therefore warrants these
rules. We would also find these practices unjust and unreasonable when
a wireless provider says it will implement reasonable measures to
prevent fraudulent SIM swaps and number ports but fails to do so. Our
findings here are similar to and consistent with how the Federal Trade
Commission (FTC) addresses inadequate data security measures under
Section 5 of the FTC Act.
82. We also rely on our broad authority under Title III, which
allows us to protect the public interest through spectrum licensing.
Pursuant to Section 303(b)'s directive that the Commission must,
consistent with the public interest, ``[p]rescribe the nature of the
service to be rendered by each class of licensed stations and each
station within any class,'' these revisions to our CPNI and number
porting requirements prescribe the conditions under which licensed
wireless providers must provide their services. They specifically
require licensed wireless providers to provide their services in a way
that protects the interests of their customers, including reasonable
measures to prevent fraudulent acts against their customers.
II. Procedural Matters
83. Regulatory Flexibility Act. The Regulatory Flexibility Act of
1980, as amended (RFA) requires that an agency prepare a regulatory
flexibility analysis for notice and comment rulemakings, unless the
agency certifies that ``the rule will not, if promulgated, have a
significant economic impact on a substantial number of small
entities.'' Accordingly, the Commission has prepared a Final Regulatory
Flexibility Analysis (FRFA) concerning the potential impact of the rule
and policy
[[Page 85809]]
changes adopted in this Report and Order on small entities. The FRFA is
set forth in Appendix B.
84. Congressional Review Act. The Commission has determined, and
the Administrator of the Office of Information and Regulatory Affairs,
Office of Management and Budget, concurs, that this rule is ``non-
major'' under the Congressional Review Act, 5 U.S.C. 804(2). The
Commission will send a copy of this Report and Order to Congress and
the Government Accountability Office pursuant to 5 U.S.C. 801(a)(1)(A).
III. Final Regulatory Flexibility Analysis
85. As required by the Regulatory Flexibility Act of 1980, as
amended (RFA), an Initial Regulatory Flexibility Analysis (IRFA) was
incorporated into the Protecting Consumers from SIM Swap and Port-Out
Fraud Notice of Proposed Rulemaking (SIM Swap and Port-Out Fraud)
published October 15, 2021 at 86 FR 57390. The Commission sought
written public comment on the proposals in the SIM Swap and Port-Out
Fraud Notice, including comment on the IRFA. The comments received are
discussed below. This Final Regulatory Flexibility Analysis (FRFA)
conforms to the RFA.
A. Need for, and Objectives of, the Report and Order
86. The Report and Order establishes protections to address SIM
swap and port-out fraud. With SIM swap fraud, a bad actor impersonates
a customer of a wireless provider and convinces the provider to
reassign the customer's SIM from the customer's device to a device
controlled by the bad actor. Similarly, with port-out fraud, the bad
actor impersonates a customer of a wireless provider and convinces the
provider to port the customer's telephone number to a new wireless
provider and a device that the bad actor controls. Both fraudulent
practices transfer the victim's wireless service to the bad actor,
allow the bad actor to gain access to information associated with the
customer's account, and permit the bad actor to receive the text
messages and phone calls intended for the customer.
87. The rules adopted in the Report and Order aim to foreclose
these fraudulent practices while preserving the relative ease with
which customers can obtain legitimate SIM changes and number ports.
Specifically, the Report and Order revises the Commission's CPNI and
LNP rules to require that wireless providers use secure methods of
authenticating customers prior to performing SIM changes and number
ports. This requirement is reinforced by other rules, including that
wireless providers adopt processes for responding to failed
authentication attempts, institute employee training for handling SIM
swap and port-out fraud, and establish safeguards to prevent employees
who receive inbound customer communications are unable to access CPNI
in the course of that customer interaction until after customers have
been authenticated. The Report and Order also adopts rules that will
enable customers to act to prevent and address fraudulent SIM changes
and number ports, including requiring that wireless providers notify
customers regarding SIM change and port-out requests, offer customers
the option to lock their accounts to block processing of SIM changes
and number ports, and give advanced notice of available account
protection mechanisms. Additionally, the Report and Order establishes
requirements to minimize the harms of SIM swap and port-out fraud when
it occurs, including requiring wireless providers to maintain a clear
process for customers to report fraud, promptly investigate and
remediate fraud, and promptly provide customers with documentation of
fraud involving their accounts. Finally, to ensure wireless providers
track the effectiveness of authentication measures used for SIM change
requests, the Report and Order requires that providers keep records of
SIM change requests and the authentication measures they use.
B. Summary of Significant Issues Raised by Public Comments in Response
to the IRFA
88. There were no comments that directly addressed the proposed
rules and policies presented in the SIM Swap and Port-Out Fraud Notice
IRFA. However two commenters discussed the potential impact of rules on
small carriers. The Competitive Carriers Association (CCA) advocated
that the Commission adopt security measures that give providers
flexibility to account for the constraints with which many small
providers operate. The Rural Wireless Association (RWA) called for
uniform standards for port-out authentication to prevent potential
anticompetitive activities and increased costs for small providers in
the event that larger providers hold small providers to standards that
are difficult or costly to implement. The approach taken by the Report
and Order addresses these comments by setting baseline requirements
that build on existing mechanisms that many wireless providers already
use to establish a uniform framework across the mobile wireless
industry, while giving wireless providers the flexibility to deliver
the most advanced, appropriate, and cost-effective fraud protection
measures available.
C. Response to Comments by the Chief Counsel for Advocacy of the Small
Business Administration
89. Pursuant to the Small Business Jobs Act of 2010, which amended
the RFA, the Commission is required to respond to any comments filed by
the Chief Counsel for Advocacy of the Small Business Administration
(SBA), and to provide a detailed statement of any change made to the
proposed rules as a result of those comments. The Chief Counsel did not
file any comments in response to the proposed rules in this proceeding.
D. Description and Estimate of the Number of Small Entities to Which
the Rules Will Apply
90. The RFA directs agencies to provide a description of, and where
feasible, an estimate of the number of small entities that may be
affected by the rules adopted herein. The RFA generally defines the
term ``small entity'' as having the same meaning as the terms ``small
business,'' ``small organization,'' and ``small governmental
jurisdiction.'' In addition, the term ``small business'' has the same
meaning as the term ``small business concern'' under the Small Business
Act. A ``small business concern'' is one which: (1) is independently
owned and operated; (2) is not dominant in its field of operation; and
(3) satisfies any additional criteria established by the SBA.
91. Small Businesses, Small Organizations, Small Governmental
Jurisdictions. Our actions, over time, may affect small entities that
are not easily categorized at present. We therefore describe, at the
outset, three broad groups of small entities that could be directly
affected herein. First, while there are industry specific size
standards for small businesses that are used in the regulatory
flexibility analysis, according to data from the Small Business
Administration's (SBA) Office of Advocacy, in general a small business
is an independent business having fewer than 500 employees. These types
of small businesses represent 99.9% of all businesses in the United
States, which translates to 33.2 million businesses.
92. Next, the type of small entity described as a ``small
organization'' is generally ``any not-for-profit enterprise which is
independently owned and operated and is not dominant in its
[[Page 85810]]
field.'' The Internal Revenue Service (IRS) uses a revenue benchmark of
$50,000 or less to delineate its annual electronic filing requirements
for small exempt organizations. Nationwide, for tax year 2020, there
were approximately 447,689 small exempt organizations in the U.S.
reporting revenues of $50,000 or less according to the registration and
tax data for exempt organizations available from the IRS.
93. Finally, the small entity described as a ``small governmental
jurisdiction'' is defined generally as ``governments of cities,
counties, towns, townships, villages, school districts, or special
districts, with a population of less than fifty thousand.'' U.S. Census
Bureau data from the 2017 Census of Governments indicate there were
90,075 local governmental jurisdictions consisting of general purpose
governments and special purpose governments in the United States. Of
this number, there were 36,931 general purpose governments (county,
municipal, and town or township) with populations of less than 50,000
and 12,040 special purpose governments--independent school districts
with enrollment populations of less than 50,000. Accordingly, based on
the 2017 U.S. Census of Governments data, we estimate that at least
48,971 entities fall into the category of ``small governmental
jurisdictions.''
1. Providers of Telecommunications and Other Services
94. Wired Telecommunications Carriers. The U.S. Census Bureau
defines this industry as establishments primarily engaged in operating
and/or providing access to transmission facilities and infrastructure
that they own and/or lease for the transmission of voice, data, text,
sound, and video using wired communications networks. Transmission
facilities may be based on a single technology or a combination of
technologies. Establishments in this industry use the wired
telecommunications network facilities that they operate to provide a
variety of services, such as wired telephony services, including VoIP
services, wired (cable) audio and video programming distribution, and
wired broadband internet services. By exception, establishments
providing satellite television distribution services using facilities
and infrastructure that they operate are included in this industry.
Wired Telecommunications Carriers are also referred to as wireline
carriers or fixed local service providers.
95. The SBA small business size standard for Wired
Telecommunications Carriers classifies firms having 1,500 or fewer
employees as small. U.S. Census Bureau data for 2017 show that there
were 3,054 firms that operated in this industry for the entire year. Of
this number, 2,964 firms operated with fewer than 250 employees.
Additionally, based on Commission data in the 2022 Universal Service
Monitoring Report, as of December 31, 2021, there were 4,590 providers
that reported they were engaged in the provision of fixed local
services. Of these providers, the Commission estimates that 4,146
providers have 1,500 or fewer employees. Consequently, using the SBA's
small business size standard, most of these providers can be considered
small entities.
96. Local Exchange Carriers (LECs). Neither the Commission nor the
SBA has developed a size standard for small businesses specifically
applicable to local exchange services. Providers of these services
include both incumbent and competitive local exchange service
providers. Wired Telecommunications Carriers is the closest industry
with an SBA small business size standard. Wired Telecommunications
Carriers are also referred to as wireline carriers or fixed local
service providers. The SBA small business size standard for Wired
Telecommunications Carriers classifies firms having 1,500 or fewer
employees as small. U.S. Census Bureau data for 2017 show that there
were 3,054 firms that operated in this industry for the entire year. Of
this number, 2,964 firms operated with fewer than 250 employees.
Additionally, based on Commission data in the 2022 Universal Service
Monitoring Report, as of December 31, 2021, there were 4,590 providers
that reported they were fixed local exchange service providers. Of
these providers, the Commission estimates that 4,146 providers have
1,500 or fewer employees. Consequently, using the SBA's small business
size standard, most of these providers can be considered small
entities.
97. Incumbent Local Exchange Carriers (Incumbent LECs). Neither the
Commission nor the SBA have developed a small business size standard
specifically for incumbent local exchange carriers. Wired
Telecommunications Carriers is the closest industry with an SBA small
business size standard. The SBA small business size standard for Wired
Telecommunications Carriers classifies firms having 1,500 or fewer
employees as small. U.S. Census Bureau data for 2017 show that there
were 3,054 firms in this industry that operated for the entire year. Of
this number, 2,964 firms operated with fewer than 250 employees.
Additionally, based on Commission data in the 2022 Universal Service
Monitoring Report, as of December 31, 2021, there were 1,212 providers
that reported they were incumbent local exchange service providers. Of
these providers, the Commission estimates that 916 providers have 1,500
or fewer employees. Consequently, using the SBA's small business size
standard, the Commission estimates that the majority of incumbent local
exchange carriers can be considered small entities.
98. Competitive Local Exchange Carriers (Competitive LECs). Neither
the Commission nor the SBA has developed a size standard for small
businesses specifically applicable to local exchange services.
Providers of these services include several types of competitive local
exchange service providers. Wired Telecommunications Carriers is the
closest industry with an SBA small business size standard. The SBA
small business size standard for Wired Telecommunications Carriers
classifies firms having 1,500 or fewer employees as small. U.S. Census
Bureau data for 2017 show that there were 3,054 firms that operated in
this industry for the entire year. Of this number, 2,964 firms operated
with fewer than 250 employees. Additionally, based on Commission data
in the 2022 Universal Service Monitoring Report, as of December 31,
2021, there were 3,378 providers that reported they were competitive
local exchange service providers. Of these providers, the Commission
estimates that 3,230 providers have 1,500 or fewer employees.
Consequently, using the SBA's small business size standard, most of
these providers can be considered small entities.
99. Interexchange Carriers (IXCs). Neither the Commission nor the
SBA have developed a small business size standard specifically for
Interexchange Carriers. Wired Telecommunications Carriers is the
closest industry with an SBA small business size standard. The SBA
small business size standard for Wired Telecommunications Carriers
classifies firms having 1,500 or fewer employees as small. U.S. Census
Bureau data for 2017 show that there were 3,054 firms that operated in
this industry for the entire year. Of this number, 2,964 firms operated
with fewer than 250 employees. Additionally, based on Commission data
in the 2022 Universal Service Monitoring Report, as of December 31,
2021, there were 127 providers that reported they were engaged in the
provision of interexchange services. Of these
[[Page 85811]]
providers, the Commission estimates that 109 providers have 1,500 or
fewer employees. Consequently, using the SBA's small business size
standard, the Commission estimates that the majority of providers in
this industry can be considered small entities.
100. Local Resellers. Neither the Commission nor the SBA have
developed a small business size standard specifically for Local
Resellers. Telecommunications Resellers is the closest industry with an
SBA small business size standard. The Telecommunications Resellers
industry comprises establishments engaged in purchasing access and
network capacity from owners and operators of telecommunications
networks and reselling wired and wireless telecommunications services
(except satellite) to businesses and households. Establishments in this
industry resell telecommunications; they do not operate transmission
facilities and infrastructure. Mobile virtual network operators (MVNOs)
are included in this industry. The SBA small business size standard for
Telecommunications Resellers classifies a business as small if it has
1,500 or fewer employees. U.S. Census Bureau data for 2017 show that
1,386 firms in this industry provided resale services for the entire
year. Of that number, 1,375 firms operated with fewer than 250
employees. Additionally, based on Commission data in the 2022 Universal
Service Monitoring Report, as of December 31, 2021, there were 207
providers that reported they were engaged in the provision of local
resale services. Of these providers, the Commission estimates that 202
providers have 1,500 or fewer employees. Consequently, using the SBA's
small business size standard, most of these providers can be considered
small entities.
101. Toll Resellers. Neither the Commission nor the SBA have
developed a small business size standard specifically for Toll
Resellers. Telecommunications Resellers is the closest industry with an
SBA small business size standard. The Telecommunications Resellers
industry comprises establishments engaged in purchasing access and
network capacity from owners and operators of telecommunications
networks and reselling wired and wireless telecommunications services
(except satellite) to businesses and households. Establishments in this
industry resell telecommunications; they do not operate transmission
facilities and infrastructure. Mobile virtual network operators (MVNOs)
are included in this industry. The SBA small business size standard for
Telecommunications Resellers classifies a business as small if it has
1,500 or fewer employees. U.S. Census Bureau data for 2017 show that
1,386 firms in this industry provided resale services for the entire
year. Of that number, 1,375 firms operated with fewer than 250
employees. Additionally, based on Commission data in the 2022 Universal
Service Monitoring Report, as of December 31, 2021, there were 457
providers that reported they were engaged in the provision of toll
services. Of these providers, the Commission estimates that 438
providers have 1,500 or fewer employees. Consequently, using the SBA's
small business size standard, most of these providers can be considered
small entities.
102. Wireless Telecommunications Carriers (except Satellite). This
industry comprises establishments engaged in operating and maintaining
switching and transmission facilities to provide communications via the
airwaves. Establishments in this industry have spectrum licenses and
provide services using that spectrum, such as cellular services, paging
services, wireless internet access, and wireless video services. The
SBA size standard for this industry classifies a business as small if
it has 1,500 or fewer employees. U.S. Census Bureau data for 2017 show
that there were 2,893 firms in this industry that operated for the
entire year. Of that number, 2,837 firms employed fewer than 250
employees. Additionally, based on Commission data in the 2022 Universal
Service Monitoring Report, as of December 31, 2021, there were 594
providers that reported they were engaged in the provision of wireless
services. Of these providers, the Commission estimates that 511
providers have 1,500 or fewer employees. Consequently, using the SBA's
small business size standard, most of these providers can be considered
small entities.
103. Satellite Telecommunications. This industry comprises firms
``primarily engaged in providing telecommunications services to other
establishments in the telecommunications and broadcasting industries by
forwarding and receiving communications signals via a system of
satellites or reselling satellite telecommunications.'' Satellite
telecommunications service providers include satellite and earth
station operators. The SBA small business size standard for this
industry classifies a business with $38.5 million or less in annual
receipts as small. U.S. Census Bureau data for 2017 show that 275 firms
in this industry operated for the entire year. Of this number, 242
firms had revenue of less than $25 million. Additionally, based on
Commission data in the 2022 Universal Service Monitoring Report, as of
December 31, 2021, there were 65 providers that reported they were
engaged in the provision of satellite telecommunications services. Of
these providers, the Commission estimates that approximately 42
providers have 1,500 or fewer employees. Consequently, using the SBA's
small business size standard, a little more than half of these
providers can be considered small entities.
104. All Other Telecommunications. This industry is comprised of
establishments primarily engaged in providing specialized
telecommunications services, such as satellite tracking, communications
telemetry, and radar station operation. This industry also includes
establishments primarily engaged in providing satellite terminal
stations and associated facilities connected with one or more
terrestrial systems and capable of transmitting telecommunications to,
and receiving telecommunications from, satellite systems. Providers of
internet services (e.g., dial-up ISPs) or Voice over Internet Protocol
(VoIP) services, via client-supplied telecommunications connections are
also included in this industry. The SBA small business size standard
for this industry classifies firms with annual receipts of $35 million
or less as small. U.S. Census Bureau data for 2017 show that there were
1,079 firms in this industry that operated for the entire year. Of
those firms, 1,039 had revenue of less than $25 million. Based on this
data, the Commission estimates that the majority of ``All Other
Telecommunications'' firms can be considered small.
2. Internet Service Providers
105. Wired Broadband Internet Access Service Providers (Wired
ISPs). Providers of wired broadband internet access service include
various types of providers except dial-up internet access providers.
Wireline service that terminates at an end user location or mobile
device and enables the end user to receive information from and/or send
information to the internet at information transfer rates exceeding 200
kilobits per second (kbps) in at least one direction is classified as a
broadband connection under the Commission's rules. Wired broadband
internet services fall in the Wired Telecommunications Carriers
industry. The SBA small business size standard for this industry
classifies firms having 1,500 or fewer employees as small. U.S. Census
Bureau
[[Page 85812]]
data for 2017 show that there were 3,054 firms that operated in this
industry for the entire year. Of this number, 2,964 firms operated with
fewer than 250 employees.
106. Additionally, according to Commission data on internet access
services as of December 31, 2018, nationwide there were approximately
2,700 providers of connections over 200 kbps in at least one direction
using various wireline technologies. The Commission does not collect
data on the number of employees for providers of these services,
therefore, at this time we are not able to estimate the number of
providers that would qualify as small under the SBA's small business
size standard. However, in light of the general data on fixed
technology service providers in the Commission's 2022 Communications
Marketplace Report, we believe that the majority of wireline internet
access service providers can be considered small entities.
107. Wireless Broadband Internet Access Service Providers (Wireless
ISPs or WISPs). Providers of wireless broadband internet access service
include fixed and mobile wireless providers. The Commission defines a
WISP as ``[a] company that provides end-users with wireless access to
the internet[.]'' Wireless service that terminates at an end user
location or mobile device and enables the end user to receive
information from and/or send information to the internet at information
transfer rates exceeding 200 kilobits per second (kbps) in at least one
direction is classified as a broadband connection under the
Commission's rules. Neither the SBA nor the Commission have developed a
size standard specifically applicable to Wireless Broadband Internet
Access Service Providers. The closest applicable industry with an SBA
small business size standard is Wireless Telecommunications Carriers
(except Satellite). The SBA size standard for this industry classifies
a business as small if it has 1,500 or fewer employees. U.S. Census
Bureau data for 2017 show that there were 2,893 firms in this industry
that operated for the entire year. Of that number, 2,837 firms employed
fewer than 250 employees.
108. Additionally, according to Commission data on internet access
services as of December 31, 2018, nationwide there were approximately
1,209 fixed wireless and 71 mobile wireless providers of connections
over 200 kbps in at least one direction. The Commission does not
collect data on the number of employees for providers of these
services, therefore, at this time we are not able to estimate the
number of providers that would qualify as small under the SBA's small
business size standard. However, based on data in the Commission's 2022
Communications Marketplace Report on the small number of large mobile
wireless nationwide and regional facilities-based providers, the dozens
of small regional facilities-based providers and the number of wireless
mobile virtual network providers in general, as well as on terrestrial
fixed wireless broadband providers in general, we believe that the
majority of wireless internet access service providers can be
considered small entities.
109. Internet Service Providers (Non-Broadband). Internet access
service providers using client-supplied telecommunications connections
(e.g., dial-up ISPs) as well as VoIP service providers using client-
supplied telecommunications connections fall in the industry
classification of All Other Telecommunications. The SBA small business
size standard for this industry classifies firms with annual receipts
of $35 million or less as small. For this industry, U.S. Census Bureau
data for 2017 show that there were 1,079 firms in this industry that
operated for the entire year. Of those firms, 1,039 had revenue of less
than $25 million. Consequently, under the SBA size standard a majority
of firms in this industry can be considered small.
E. Description of Projected Reporting, Recordkeeping, and Other
Compliance Requirements for Small Entities
110. This Report and Order adopts rules that could result in
increased, reduced, or otherwise modified recordkeeping, reporting, or
other compliance requirements for affected providers of service,
including small wireless providers. Specifically, it requires that
wireless providers use secure methods of authenticating customers prior
to performing SIM changes and number ports, and to review and update
these authentication methods as needed, but at least annually. It
requires wireless providers to adopt processes for customer
notification and response to failed authentication attempts, institute
employee training for handling SIM swap and port-out fraud, and
establish safeguards to prevent employees who receive inbound customer
communications from accessing CPNI in the course of that customer
interaction until after customers have been authenticated. The Report
and Order also adopts rules requiring that wireless providers notify
customers regarding SIM change and port-out requests, offer customers
the option to lock their accounts to block processing of SIM changes
and number ports, and give advanced notice of available account
protection mechanisms. Additionally, the Report and Order requires
wireless providers to maintain a clear process for customers to report
fraud, promptly investigate and remediate fraud, and promptly provide
customers with documentation of fraud involving their accounts.
Finally, the Report and Order requires that providers keep records of
SIM change requests and the authentication measures they use.
111. We are cognizant that, in some instances, strict prescriptive
requirements to prevent SIM swap and port-out fraud could be
technically and economically infeasible for wireless providers to
implement, particularly for smaller providers. The Commission does not
have sufficient information on the record to determine whether small
entities will be required to hire professionals to comply with its
decisions or to quantify the cost of compliance for small entities.
However, the record reflects that many wireless providers have already
developed and implemented some form of the customer authentication
requirements in the Report and Order, minimizing cost implications for
small entities. We also permit wireless providers to use existing
methods of notification that are reasonably designed to reach the
affected customer. Several of our rules build on existing mechanisms
that many wireless providers already use, and therefore, we expect that
our new rules will further minimize the costs and burdens for those
providers, and should significantly reduce compliance requirements for
small entities that may have smaller staff and fewer resources.
F. Steps Taken To Minimize the Significant Economic Impact on Small
Entities, and Significant Alternatives Considered
112. The RFA requires an agency to provide ``a description of the
steps the agency has taken to minimize the significant economic impact
on small entities . . . including a statement of the factual, policy,
and legal reasons for selecting the alternative adopted in the final
rule and why each one of the other significant alternatives to the rule
considered by the agency which affect the impact on small entities was
rejected.''
113. The requirements established in this Report and Order are
designed to minimize the economic impact on wireless providers,
including small providers. The baseline, flexible rules adopted reflect
a recognition that, in some cases, strict prescriptive
[[Page 85813]]
requirements to prevent SIM swap and port-out fraud could be
technically and economically infeasible for wireless providers to
implement, particularly for smaller providers. We therefore decline to
adopt certain specific authentication methods mentioned in the SIM Swap
and Port-Out Fraud Notice because they may discourage carriers from
adopting new methods to address evolving techniques used by bad actors.
The record shows that many wireless providers already have in place
some of the policies and procedures this Report and Order adopts and
that the rules may therefore only require them to adapt, refine, or
consistently apply those existing practices. Additionally, by setting
baseline requirements and giving wireless providers flexibility on how
to meet them, this Report and Order allows providers to adopt the most
cost-effective and least burdensome solutions to achieve the level of
security needed to protect customers against SIM swap and port-out
fraud in a given circumstance. The Report and Order further minimizes
any potential burdens of customer notifications by declining to
prescribe particular content and wording and giving wireless providers
flexibility on how to deliver such notifications. Similarly, for
customer notices, the Report and Order declines to require a specific
format and content and declines to require such notices be delivered to
customers annually. With respect to employee training, we decline to
adopt overly prescriptive safeguards, such as two-employee sign off.
Instead, the requirement this Report and Order adopts minimizes
potential burdens because it builds on the Commission's existing CPNI
training rule and gives wireless providers flexibility on how to
develop their training programs. Further, the Report and Order
mitigates the potential burdens of the recordkeeping requirement by
declining to require that wireless providers include historic data in
their recordkeeping, which the Report and Order acknowledged would be
particularly burdensome for small providers, and declining to require
that providers report this data to the Commission regularly.
G. Report to Congress
114. The Commission will send a copy of the SIM Swap and Port-Out
Fraud Report and Order, including this FRFA, in a report to be sent to
Congress pursuant to the Congressional Review Act. In addition, the
Commission will send a copy of the SIM Swap and Port-Out Fraud Report
and Order, including this FRFA, to the Chief Counsel for Advocacy of
the SBA. A copy of the SIM Swap and Port-Out Fraud Report and Order (or
summaries thereof) will also be published in the Federal Register.
IV. Ordering Clauses
115. Accordingly, it is ordered that, pursuant to the authority
contained in Sections 1, 2, 4, 201, 222, 251, 303, and 332 of the
Communications Act of 1934, as amended, 47 U.S.C. 151, 152, 154, 201,
222, 251, 303, and 332, this Report and Order in WC Docket No. 21-341
is adopted and that Parts 52 and 64 of the Commission's Rules, 47 CFR
parts 52, 64, are amended as set forth in Appendix A.
116. It is further ordered that this Report and Order shall be
effective 30 days after publication in the Federal Register, and that
compliance with the rules adopted herein shall be required six months
after the effective date of the Report and Order, except that the
amendments to Sections 52.37(c), 52.37(d), 52.37(e), 52.37(g),
64.2010(h)(2), 64.2010(h)(3), 64.2010(h)(4), 64.2010(h)(5),
64.2010(h)(6), and 64.2010(h)(8) of the Commission's rules, 47 CFR
52.37(c), 52.37(d), 52.37(e), 52.37(g), 64.2010(h)(2), 64.2010(h)(3),
64.2010(h)(4), 64.2010(h)(5), 64.2010(h)(6), and 64.2010(h)(8), which
may contain new or modified information collection requirements, will
not become effective until the later of (i) six months after the
effective date of this Report and Order; or (ii) after the Office of
Management and Budget completes review of any information collection
requirements associated with this Report and Order that the Wireline
Competition Bureau determines is required under the Paperwork Reduction
Act. The Commission directs the Wireline Competition Bureau to announce
the compliance date for Sec. Sec. 52.37(c), 52.37(d), 52.37(e),
52.37(g), 64.2010(h)(2), 64.2010(h)(3), 64.2010(h)(4), 64.2010(h)(5),
64.2010(h)(6), and 64.2010(h)(8) and to amend 47 CFR 52.37 and 64.2010
accordingly.
117. It is further ordered that the Commission's Office of the
Secretary, Reference Information Center, shall send a copy of this
Report and Order, including the Final Regulatory Flexibility Analysis,
to the Chief Counsel for Advocacy of the Small Business Administration.
118. It is further ordered that the Office of the Managing
Director, Performance and Program Management, shall send a copy of this
Report and Order in a report to be sent to Congress and the Government
Accountability Office pursuant to the Congressional Review Act, see 5
U.S.C. 801(a)(1)(A).
List of Subjects
Communications, Communications common carriers, Privacy,
Telecommunications, Telephone, Reporting and Recordkeeping
Requirements.
Federal Communications Commission.
Marlene Dortch,
Secretary.
Final Rules
For the reasons discussed in the preamble, the Federal
Communications Commission amends 47 CFR parts 52 and 64 as follows:
PART 52--NUMBERING
0
1. The authority citation for part 52 continues to read as follows:
Authority: 47 U.S.C. 151, 152, 153, 154, 155, 201-205, 207-209,
218, 225-227, 251-252, 271, 303, 332, unless otherwise noted.
0
2. Add Sec. 52.37 to subpart C to read as follows:
Sec. 52.37 Number Portability Requirements for Wireless Providers.
(a) Applicability. This section applies to all providers of
commercial mobile radio service (CMRS), as defined in 47 CFR 20.3,
including resellers of wireless service.
(b) Authentication of port-out requests. A CMRS provider shall use
secure methods to authenticate a customer that are reasonably designed
to confirm the customer's identity before effectuating a port-out
request, except to the extent otherwise required by 47 U.S.C. 345 (Safe
Connections Act of 2022) or Part 64 Subpart II of this chapter. A CMRS
provider shall regularly, but not less than annually, review and, as
necessary, update its customer authentication methods to ensure that
its authentication methods continue to be secure.
(c)-(e) [Reserved]
(f) Employee Training. A CMRS provider shall develop and implement
training for employees to specifically address fraudulent port-out
attempts, complaints, and remediation. Training shall include, at a
minimum, how to identify fraudulent requests, how to recognize when a
customer may be the victim of fraud, and how to direct potential
victims and individuals making potentially fraudulent requests to
employees specifically trained to handle such incidents.
(g) [Reserved]
(h) This section contains information-collection and/or
recordkeeping requirements. Compliance with this section will not be
required until this paragraph is removed or contains a compliance date.
[[Page 85814]]
0
3. Delayed indefinitely, amend Sec. 52.37 by adding paragraphs (c),
(d), (e), and (g) to read as follows:
Sec. 52.37 Number Portability Requirements for Wireless Providers.
(c) Customer notification of port-out requests. Upon receiving a
port-out request, and before effectuating the request, a CMRS provider
shall provide immediate notification to the customer that a port-out
request associated with the customer's account was made, sent in
accordance with customer preferences, if indicated, and using means
reasonably designed to reach the customer associated with the account
and clear and concise language that provides sufficient information to
effectively inform a customer that a port-out request involving the
customer's number was made, except if the port-out request was made in
connection with a legitimate line separation request pursuant to 47
U.S.C. 345 and subpart II of this part, regardless of whether the line
separation is technically or operationally feasible.
(d) Account locks. A CMRS provider shall offer customers, at no
cost, the option to lock their accounts to prohibit the CMRS provider
from processing requests to port the customer's number. A CMRS provider
shall not fulfill a port-out request until the customer deactivates the
lock on the account, except if the port-out request was made in
connection with a legitimate line separation request pursuant to 47
U.S.C. 345 and subpart II of this part, regardless of whether the line
separation is technically or operationally feasible. The process to
activate and deactivate an account lock must not be unduly burdensome
for customers such that it effectively inhibits customers from
implementing their choice. A CMRS provider may activate a port-out lock
on a customer's account when the CMRS provider has a reasonable belief
that the customer is at high risk of fraud, but must provide the
customer with clear notification that the account lock has been
activated with instructions on how the customer can deactivate the
account lock, and promptly comply with the customer's legitimate
request to deactivate the account lock.
(e) Notice of Account Protection Measures. A CMRS provider must
provide customers with notice, using clear and concise language, of any
account protection measures the CMRS provider offers, including those
to prevent port-out fraud. A CMRS provider shall make this notice
easily accessible through the CMRS provider's website and application.
* * * * *
(g) Procedures to resolve fraudulent ports. A CMRS provider shall,
at no cost to customers:
(1) Maintain a clearly disclosed, transparent, and easy-to-use
process for customers to report fraudulent number ports;
(2) Promptly investigate and take reasonable steps within its
control to remediate fraudulent number ports; and
(3) Promptly provide customers, upon request, with documentation of
fraudulent number ports involving their accounts.
PART 64--MISCELLANEOUS RULES RELATING TO COMMON CARRIERS
0
4. The authority citation for part 64 continues to read as follows:
Authority: 47 U.S.C. 151, 152, 154, 201, 202, 217, 218, 220,
222, 225, 226, 227, 227b, 228, 251(a), 251(e), 254(k), 262, 276,
303, 332, 403(b)(2)(B), (c), 616, 620, 1004, 1401-1473, unless
otherwise noted; Pub. L. 115-141, Div. P, sec. 503, 132 Stat. 348,
1091.
0
5. Amend Sec. 64.2010 by adding paragraph (h) to read as follows:
Sec. 64.2010 Safeguards on the disclosure of customer proprietary
network information.
* * * * *
(h) Subscriber Identity Module (SIM) changes. A provider of
commercial mobile radio service (CMRS), as defined in 47 CFR 20.3,
including resellers of wireless service, shall only effectuate SIM
change requests in accordance with this section. For purposes of this
section, SIM means a physical or virtual card associated with a device
that stores unique information that can be identified to a specific
mobile network.
(1) Customer authentication. A CMRS provider shall use secure
methods to authenticate a customer that are reasonably designed to
confirm the customer's identity before executing a SIM change request,
except to the extent otherwise required by 47 U.S.C. 345 (Safe
Connections Act of 2022) or subpart II of this part. Authentication
methods shall not rely on readily available biographical information,
account information, recent payment information, or call detail
information unless otherwise permitted under 47 U.S.C. 345 or subpart
II of this part. A CMRS provider shall regularly, but not less than
annually, review and, as necessary, update its customer authentication
methods to ensure that its authentication methods continue to be
secure. A CMRS provider shall establish safeguards and processes so
that employees who receive inbound customer communications are unable
to access CPNI in the course of that customer interaction until after
the customer has been properly authenticated.
(2)-(6) [Reserved]
(7) Employee training. A CMRS provider shall develop and implement
training for employees to specifically address fraudulent SIM change
attempts, complaints, and remediation. Training shall include, at a
minimum, how to identify potentially fraudulent SIM change requests,
how to identify when a customer may be the victim of SIM swap fraud,
and how to direct potential victims and individuals making potentially
fraudulent requests to employees specifically trained to handle such
incidents.
(8) [Reserved]
(9) Compliance. This paragraph (h) contains information-collection
and/or recordkeeping requirements. Compliance with this paragraph (h)
will not be required until this paragraph is removed or contains a
compliance date.
0
6. Delayed indefinitely, amend Sec. 64.2010 by adding paragraphs
(h)(2) through (6) and (h)(8) to read as follows:
Sec. 64.2010 Safeguards on the disclosure of customer proprietary
network information.
* * * * *
(h) * * *
(2) Response to failed authentication attempts. A CMRS provider
shall develop, maintain, and implement procedures for addressing failed
authentication attempts in connection with a SIM change request that
are reasonably designed to prevent unauthorized access to a customer's
account, which, among other things, take into consideration the needs
of survivors pursuant to 47 U.S.C. 345 and subpart II of this part.
(3) Customer notification of SIM change requests. Upon receiving a
SIM change request, and before effectuating the request, a CMRS
provider shall provide immediate notification to the customer that a
SIM change request associated with the customer's account was made,
sent in accordance with customer preferences, if indicated, and using
means reasonably designed to reach the customer associated with the
account and clear and concise language that provides sufficient
information to effectively inform a customer that a SIM change request
involving the customer's SIM was made, except if the SIM change request
was made in connection with a legitimate line separation request
pursuant to 47 U.S.C. 345 and subpart II of this part, regardless of
whether the line separation is technically or operationally feasible.
(4) Account locks. A CMRS provider shall offer customers, at no
cost, the option to lock their accounts to prohibit
[[Page 85815]]
the CMRS provider from processing requests to change the customer's
SIM. A CMRS provider shall not fulfill a SIM change request until the
customer deactivates the lock on the account, except if the SIM change
request was made in connection with a legitimate line separation
request pursuant to 47 U.S.C. 345 and subpart II of this part,
regardless of whether the line separation is technically or
operationally feasible. The process to activate and deactivate an
account lock must not be unduly burdensome for customers such that it
effectively inhibits customers from implementing their choice. A CMRS
provider may activate a SIM change lock on a customer's account when
the CMRS provider has a reasonable belief that the customer is at high
risk of fraud, but must provide the customer with clear notification
that the account lock has been activated with instructions on how the
customer can deactivate the account lock, and promptly comply with the
customer's legitimate request to deactivate the account lock.
(5) Notice of account protection measures. A CMRS provider must
provide customers with notice, using clear and concise language, of any
account protection measures the CMRS provider offers, including those
to prevent SIM swap fraud. A CMRS provider shall make this notice
easily-accessible through the CMRS provider's website and application.
(6) Procedures to resolve fraudulent SIM changes. A CMRS provider
shall, at no cost to customers:
(i) Maintain a clearly disclosed, transparent, and easy-to-use
process for customers to report fraudulent SIM changes;
(ii) Promptly investigate and take reasonable steps within its
control to remediate fraudulent SIM changes; and
(iii) Promptly provide customers, upon request, with documentation
of fraudulent SIM changes involving their accounts.
* * * * *
(8) SIM change recordkeeping. A CMRS provider shall establish
processes to reasonably track, and maintain for a minimum of three
years, the total number of SIM change requests it received, the number
of successful SIM change requests, the number of failed SIM change
requests, the number of successful fraudulent SIM change requests, the
average time to remediate a fraudulent SIM change, the total number of
complaints received regarding fraudulent SIM change requests, the
authentication measures the CMRS provider has implemented, and when
those authentication measures change. A CMRS provider shall provide
such data and information to the Commission upon request.
[FR Doc. 2023-26338 Filed 12-7-23; 8:45 am]
BILLING CODE 6712-01-P