https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • Microwave/RF
    • T&D World
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

View From The Top


Commentary

FCC updates CPNI rules to protect carrier information on devices

FCC updates CPNI rules to protect carrier information on devices

Recent FCC ruling makes commercial wireless carriers responsible for ensuring that Consumer Proprietary Network Information (CPNI) stored on an end-user device is protected from potential third-party attacks.
  • Written by
  • 10th July 2013

By Michael Higgs

The Federal Communications Commission recently moved to close a technology gap in its Consumer Proprietary Network Information (CPNI) rules. Specifically, new software used by carriers installed on the end-user device is capable of collecting and storing information, such as numbers called and received, as well as the time, duration and location of calls. Because this sensitive information resides on the device, it is incumbent on the carriers to protect that data.

This latest update to the Commission’s CPNI rules was brought about by the Carrier IQ snafu of November 2011. Carrier IQ software was used by numerous carriers to receive information about how their networks—and the devices used on those networks—were performing. When a researcher discovered security vulnerabilities that permitted third parties to access the information collected by the Carrier IQ software from handsets, an investigation was launched into the overall security of sensitive information throughout the mobile services industry.

The FCC is cognizant of the many potential benefits that come with the collection of CPNI on mobile devices, but it seeks to ensure that the confidentiality of such CPNI is adequately protected and that it is used only as permitted under the law. While a carrier might have sufficient information in its own network to see that calls are being dropped in a specific area, the mobile device itself is in a better position to collection information about the reasons for the dropped calls.

Handset data is useful in determining which parts of a network are most in need of improvement, in seeing which models of phones are experiencing more problems than others, and in troubleshooting customer problems with the device or mobile service. It is because the collection and storage of CPNI on the end-user device creates foreseeable risks that the commission imposes security responsibilities on the carriers that engage in such practices.

The FCC’s CPNI rules heretofore protected consumers from the disclosure of information by carriers or their designees, but this recent declaratory ruling takes the CPNI rules one step beyond. Carriers are now responsible for cybersecurity and protecting CPNI information from theft or misappropriation at the handset level.

Note that not all information on the handset is covered by this ruling—personal pictures, e-mails, texts and the like are not at issue here. Also not included under this ruling are third-party applications installed by end users that might collect the same or similar kinds of information.

However, when CPNI is collected by the subscriber’s mobile device—provided the collection is undertaken at the carrier’s direction and that the carrier, or its designee, has access to or control over that information—it must be adequately protected by the carrier.

Tags: Data Regulation Smart Devices Commentary Cybersecurity FCC Policy Security Subscriber Devices View From The Top Commentary

Most Recent


  • FCC updates CPNI rules to protect carrier information on devices
    Newscan: ‘Predator’ spyware let government hackers break into Chrome and Android, Google says
    Web Roundup Items from other news organizations ‘Predator’ spyware let government hackers break into Chrome and Android, Google says A private firm exposes Chrome vulnerabilities to government hackers, says Google EPA seeks funding to improve water-system cybersecurity Philadelphia launches real-time smart-city project NIST’s supply-chain security guidance tells agencies: Look to FedRAMP first Senate report highlights […]
  • Malicious Python Repository Package drops Cobalt Strike on Windows, macOS & Linux systems
    Public repositories of open source code are a critical part of the software supply chain that many organizations use to build applications. They are therefore an attractive target for adversaries seeking to distribute malware to a mass audience. The latest case in point is a malicious package for distributing Cobalt Strike on Windows, macOS, and Linux systems, […]
  • T-Mobile's CEO explains the company's new private 5G strategy
    T-Mobile on Monday took the wraps off its new private wireless networking offerings, and the company’s CEO spoke about it at length during an investor event. “CIOs everywhere are interested in this topic right now,” T-Mobile’s Mike Sievert said Monday at the J.P. Morgan Global Technology, Media and Communications Conference. “And they’re interested in it for a reason. […]
  • Hytera, Motorola Solutions refile appeal, cross-appeal in civil case
    As expected, Hytera Communications again has appealed a $543.7 million judgment against it to the 7th Circuit Court of Appeals, while Motorola Solutions this week filed for second time a cross appeal in the case that was initiated more than four years ago. There was little surprise in the filings, because both Hytera and Motorola […]

Related Content

Commentary


LTE and liability: Why the fire service must move forward with digital incident command

  • 2
6th May 2022

Partnership and collaboration must be the foundation for emergency communications

18th April 2022

FirstNet success means no hypothetical ‘shots’ need to be fired, Swenson says

22nd February 2022
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

Newscan: ‘Predator’ spyware let government hackers break into Chrome and Android, Google says dlvr.it/SR2lBG

25th May 2022
UrgentComm

Malicious Python Repository Package drops Cobalt Strike on Windows, macOS & Linux systems dlvr.it/SR0Qb2

24th May 2022
UrgentComm

T-Mobile’s CEO explains the company’s new private 5G strategy dlvr.it/SQyzhc

24th May 2022
UrgentComm

Hytera, Motorola Solutions refile appeal, cross-appeal in civil case dlvr.it/SQxNX1

24th May 2022
UrgentComm

Amid shifting workplace expectations, local government employers must adapt dlvr.it/SQwVVs

23rd May 2022
UrgentComm

The private-wireless networking opportunity shouldn’t stay too private dlvr.it/SQw7MT

23rd May 2022
UrgentComm

Europe’s first driverless-car test completed dlvr.it/SQvqyY

23rd May 2022
UrgentComm

FCC approves order to modernize priority-service rules dlvr.it/SQmSN0

20th May 2022

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • Microwave/RF
  • T&D World
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X