This internet privacy order is about to be repealed

Congress is trying to push through revocation of this order via All of the protections contained inside this document will be revoked if the joint resolution passes.

Created by @pmn, 1 year, 10 months ago

Questions about this document:

  • Will the revocation of anything mentioned in this page weaken consumer protections?
  • Does this page have anything to do with rules around data breaches?
  • Does this page have to do with customer protections around the sale of your data?
Answer Questions

All Pages

Summary: In adopting these rules the Commission implements the statutory requirement that telecommunications carriers protect the confidentiality of customer proprietary information. The full text of this document is available for public inspection during regular business hours in the FCC Reference Information Center, Portals II, 445 12th Street SW., Room CY–A257, Washington DC 20554. It allows us to seek jobs and expand our career horizons; find and take advantage of educational opportunities; communicate with our health care providers; engage with our government; create and deepen our ties with family, friends and communities; participate in online commerce; and otherwise receive the benefits of being digital citizens.
People: Sherwin Siy , Nicole
Companies: Federal Communications
Organizations: Communications Commission , FCC , Federal , Congress , FCC Wireline Competition Bureau , Trade Commission , OMB , NPRM , CPBR , FTC
Crimes mentioned: harassment
/law, govt and politics/legal issues/civl rights/privacy /law, govt and politics/government /technology and computing/networking/vpn and remote access
Summary: fundamental importance of transparency to enable consumers to make informed purchasing decisions, we require carriers to provide privacy notices that clearly and accurately To comply with this requirement, a carrier must adopt security practices appropriately calibrated to the nature and scope of its activities, the sensitivity of the underlying data, the size of the provider, and technical feasibility. In order to ensure that affected customers and the appropriate federal agencies receive notice of data breaches that could result in harm, we adopt rules requiring BIAS
Companies: carrier
Organizations: FTC , CPNI , CPBR
/technology and computing/enterprise technology/customer relationship management /technology and computing/networking/vpn and remote access /law, govt and politics/legal issues/civl rights/privacy
Summary: We also adopt heightened disclosure and affirmative consent requirements for BIAS providers that offer customers financial incentives, such as lower monthly rates, in exchange for the right to use the customers’ confidential information. issues raised in our rulemaking, including dispute resolution; the request for an exemption for enterprise customers of telecommunications services other than BIAS; federal preemption; and the timeline for implementation. As early as the 1960s the Commission began to wrestle with the privacy implications of the use of communications networks to provide shared access to computers and the sensitive, personal data they often contained.
Companies: Secret Service
Organizations: Congress , FBI , Legal Authority , NPRM , CPNI
/law, govt and politics /law, govt and politics/legal issues/civl rights/privacy /law, govt and politics/legal issues/legislation
Summary: For example, after the emergence and growth of an industry made possible by ‘‘pretexting’’—the practice of improperly accessing and selling details of residential telephone calls—the Commission strengthened its section 222 rules to add customer authentication and data breach notification requirements. Based on our review of the record, we reaffirm our earlier finding that a broadband provider ‘‘sits at a privileged place in the network, the bottleneck between the customer and the rest of the Internet’’— a position that we have referred to as a gatekeeper. A range of browser extensions are largely effective at blocking prominent third parties, ‘‘but these tools do nothing to stop data collection on the wire.’’ Further, Professor Nick Feamster explains that unlike other Internet participants that see Domain Name System (DNS) lookups only to their own domains (e.g.,,,, BIAS providers can see DNS lookups every time a customer uses the service to go to a new site.
People: Professor Nick Feamster
Companies: Google , Facebook , Twitter
Organizations: FTC , FCC , NPRM
/technology and computing/networking/vpn and remote access /law, govt and politics/legal issues/civl rights/privacy /technology and computing/hardware/computer networking/router
Summary: precisely which user was connected to an IP address at a specific point in time, any third party will not, unless they subpoena the BIAS provider for data. Moreover, we have previously observed that ‘‘[b]roadband providers have the ability to act as gatekeepers even in the absence of ‘the sort of market concentration that would enable them to impose substantial price increases on end users.’ ’’ Their position is strengthened by the high switching costs customers face when seeking a new service, which could deter customers from changing BIAS providers if they are unsatisfied the providers’ privacy policies. As aptly explained by Mozilla, ‘‘[t]he strength of the Web and its economy rests on a number of core building blocks that make up its foundational DNA.
Companies: Mozilla , Netflix
/technology and computing/networking/vpn and remote access /technology and computing/hardware/computer networking/router /technology and computing/internet technology/isps
Summary: We also find that voice and BIAS customers face similar issues related to the protection of their private information when they apply for, subscribe to, and terminate their telecommunications services. Similarly, current customers would be penalized for switching providers given that the ‘‘losing’’ carrier would be free to stop protecting the confidentiality of any private information it retains. For example, some mobile BIAS providers offer group plans in which each person has their own identified device, user ID, and/or telephone number.
People: holder
/technology and computing/networking/vpn and remote access /technology and computing/internet technology/isps /family and parenting/adoption
Summary: We recognize that these categories are not mutually exclusive, but taken together they identify the types of confidential customer information BIAS providers and other telecommunications carriers may collect or access in connection with their provision of service. voice rules, we adopt the statutory definition of customer proprietary network information (CPNI) for all telecommunications services, including BIAS. commenters who propose that the phrase ‘‘made available to the carrier by the customer solely by virtue of the carrier-customer relationship’’ means that only information that is uniquely available to the BIAS provider may satisfy the definition of CPNI.
Companies: CPNI
Organizations: Congress
/technology and computing/enterprise technology/customer relationship management /science/social science/philosophy/ethics /business and industrial/company/merger and acquisition
Summary: To highlight design properties relevant to the broadband CPNI analysis, we describe a five-layer model in this explanation. architecture of Internet communications, we can now examine how the components of an IP data packet map to the statutory definition of CPNI. These plans detail subscription information, including the type of service (e.g., fixed or mobile; cable or fiber; prepaid or term contract), speed, pricing, and capacity (e.g., data caps).
Organizations: UDP
/technology and computing/hardware/computer networking/router /technology and computing/internet technology/email /business and industrial/aerospace and defense/space technology
Summary: We disagree with Sandvine, which argues that link layer information such as MAC addresses do not relate to the technical configuration of network traffic or the destination of packets. For the same reasons, we conclude that other device identifiers and other information in link layer protocol headers are CPNI in the broadband context because they relate to the technical configuration and destination of use of a telecommunications service. But a dynamic IP address still meets the statutory definition of CPNI because it relates to the technical configuration, type, destination, and/or location of use of a telecommunications service, for the reasons discussed above.
Companies: Sandvine
Organizations: Congress
/technology and computing/hardware/computer networking/router /technology and computing /technology and computing/internet technology/email
Summary: We agree with commenters that other transport layer protocol header information is CPNI in the broadband context because it relates to the technical configuration and amount of use of a telecommunications service. BIAS providers use traffic statistics to optimize the efficiency of their networks and protect against cyber threats, but can also use this data to draw inferences that implicate the amount of use, destination, and type of a telecommunications service. For example, BIAS providers can use traffic statistics to determine the amount of use (e.g., date, time, and duration), and to identify patterns such as when the customer is at home, at work, or elsewhere, or reveal other highly personal information.
Organizations: IPFIX
/technology and computing/hardware/computer networking/router /technology and computing/internet technology/email /science/mathematics/statistics
Page 1 of 8 next >
× About Pricing Contact Sign In Sign Up