Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
'Broadband Internet access service” (BIAS) is the essential conduit for the conduct of our daily personal and private lives, without which all Internet activity comes to a stop. Indeed, the Federal Communications Commission (FCC) recently referred to BIAS as “the most significant communications technology of today.” See, Federal Communications Commission, Notice of Proposed Rulemaking, Released April 1, 2016'(FCC 16-39), at 2. Nevertheless, because BIAS is the road on which Internet traffic travels, and not the destination, it is largely invisible. Rarely do we consider that Internet service providers (ISPs) that provide BIAS to consumers have extraordinarily broad access “to very sensitive and very personal information that could threaten a person's financial security, reveal embarrassing or even harmful details of medical history or disclose to prying eyes the intimate details of interest, physical presence and fears.” Id. at 3.
As ISPs follow their customer's Internet voyages, they can (and often do) develop highly individualized profiles of where each user travels and what services are acquired upon arrival at their Internet destinations. Indeed, the ability of ISPs to capture individualized data is far greater than the access enjoyed by “edge providers” such as Internet search engines, e-commerce sites, and streaming video services, but with far less regulation or disclosure of their monitoring activities.
Until now.
The FCC has adopted, by a 3-to-2 vote, a Notice of Proposed Rulemaking (NPRM) (133 pages long, plus more than a dozen pages of commissioners' statements) that proposes to establish privacy guidelines applicable to ISPs. Id. This article explores the FCC's proposal and some of the most important issues it raises.
General Outline
The NPRM proposes rules implementing the privacy requirements of '222 of the Communications Act for broadband ISPs. The FCC said in a statement that the NPRM proposes rules that would give broadband customers “the tools they need to make informed decisions about how their information is used by their ISPs” and whether and for what purposes their ISPs may share their customers' information with third parties. See, Press Release, “FCC Proposes to Give Broadband Consumers Increased Choice, Transparency and Security for Their Personal Data,” March 31, 2016. The term “customer” is defined in the NPRM to mean a current or former, paying or non-paying subscriber to broadband Internet access service ' as well as an applicant for broadband Internet access service. In other words, it is a definition so broad as to effectively include every individual or business that accesses the Internet.
The NPRM is drafted to enact what it considers the “three core privacy principles” or “three foundations of privacy” that traditionally have driven privacy considerations across a range of industries ' transparency, choice, and data security and breach notification. To do so, the NPRM proposes to provide consumers with: 1) the information needed to understand what data their ISP is collecting and what it does with that information; 2) the ability to decide how their information is used; and 3) protections against the unauthorized disclosure of their information.
The FCC's proposal starts with the proposition that a customer's decision to purchase an ISP's services manifests “inherent” consent to certain data collection. Thus, customer data necessary to provide broadband services and for marketing the type of broadband service purchased by a customer ' and for certain other purposes consistent with customer expectations, such as contacting public safety ' would require no additional customer consent beyond the creation of the customer-ISP relationship.
The proposal next provides that ISPs would be allowed to use customer data for the purposes of marketing other communications-related services and to share customer data with their affiliates that provide communications-related services for the purposes of marketing such services unless the customer affirmatively opts out.
Then, the NPRM provides that all other uses and sharing of consumer data would require “express, affirmative 'opt-in' consent from customers.”
The Specifics
The NPRM first proposes to define the information that would be protected as customer proprietary information, which would include both “customer proprietary network information” (CPNI) and personally identifiable information (PII) collected by broadband providers through their provision of services.
Under the NPRM, CPNI means “information that relates to the quantity, technical configuration, type, destination, location, and amount of use of a telecommunications service subscribed to by any customer of a telecommunications carrier, and that is made available to the carrier by the customer solely by virtue of the carrier-customer relationship” and “information contained in the bills pertaining to telephone exchange service or telephone toll service received by a customer or a carrier,” but not “subscriber list information.”
The NPRM proposes that, at a minimum, the following types of information would constitute CPNI in the broadband context:
'
'
PII would be defined as “any information that is linked or linkable to an individual.” It would include, but not be limited to, the customer's name, Social Security number, unique government identification numbers (e.g., driver's license, passport, taxpayer identification), date and place of birth, mother's maiden name, physical address, e-mail address or other online contact information, phone numbers, MAC addresses or other unique device identifiers, IP addresses, persistent online identifiers (e.g., unique cookies), eponymous and non-eponymous online identities, account numbers and other account information (including account login information), Internet browsing history, traffic statistics, application usage data, current or historical geo-location, financial information (e.g., account numbers, credit or debit card numbers, credit history), shopping records, medical and health information, the fact of a disability and any additional information about a customer's disability, biometric information, education information, employment information, information relating to family members, race, religion, sexual identity or orientation, other demographic information, and information identifying personally owned property (e.g., license plates, device serial numbers). As should be recognized, the proposed definition of PII is appropriately comprehensive given the value of PII and the harm that could result if PII were accessed for nefarious purposes.
Having defined the private consumer data at issue, the NPRM next applies the “three foundations of privacy” ' transparency, choice, and security ' to broadband providers' use of that data.
First, transparency would be achieved by ISPs disclosing:
'
'
Then, the NPRM explains that consumers “must be empowered to decide how broadband providers may use and share their data.” It proposes a tiered approach to choice:
'
'
In discussing the final prong, security, the NPRM defines “breach” as any instance in which “a person, without authorization or exceeding authorization, has gained access to, used, or disclosed customer proprietary information.” It proposes that consumers should be able to rely on their broadband provider to take “reasonable steps” to safeguard customer information from unauthorized use, disclosure, or access, a standard whose definition may be elusive for broadband providers and consumers alike. Nevertheless, the NPRM proposes certain definite breach notification terms that may provide predictability that heretofore has been lacking due to the absence of a uniform federal breach notification statute. (At the present time, data breach notification and response is governed by a patchwork of industry-specific federal regulations, such as under the Health Insurance Portability and Accountability Act (HIPAA) and the Gramm-Leach-Bliley Act (GLB Act), and the varying breach statutes enacted by 47 states, the District of Columbia, Guam, Puerto Rico, and the Virgin Islands. See, Security Breach Notification Laws, National Conference of State Legislatures (NCSL). For example, the NPRM proposes adoption of a specific trigger as to when notice is needed and the requirement that broadband providers notify affected customers within 10 days of the discovery of a breach that triggers customer notification requirements. The NPRM proposes that the FCC be notified of all data breaches, and that other federal law enforcement be notified of breaches that impact more than 5,000 customers within seven days of discovery of such a breach, and three days before notification to the customer. It allows law enforcement to seek delay of customer notification.
Other Matters
As might be expected in such a lengthy, comprehensive document, the NPRM contains a number of other proposals. For instance, it would require that broadband providers adopt risk management practices, institute personnel training practices, implement strong customer authentication requirements, identify a senior manager responsible for data security, and take responsibility for use and protection of customer information when shared with third parties.
Next Steps
Attorneys and clients are able to comment on the NPRM until May 27, 2016, with reply comments open until June 27, 2016. The FCC is actively seeking comments on dozens and dozens of topics, ranging from whether there are particular types of information (such as Social Security numbers, financial account information, or geo-location information) that deserve special treatment, to whether there are additional or alternative paths “to achieve pro-consumer, pro-privacy goals.” Parties who believe that their interests are affected in one way or another may want to consider commenting before the deadline.
It is important to recognize that the scope of the NPRM is limited to broadband service providers and that it does not apply to the privacy practices of websites and other “edge services” over which the Federal Trade Commission has authority. (The FTC continues to be active in the privacy realm. See, e.g., FTC Memorandum of Understanding with Canadian Agency to Strengthen Cooperation on Do Not Call, Spam Enforcement. It also recently announced a second “PrivacyCon” event to be held on Jan. 12, 2017.) Moreover, the NPRM's scope does not include other services of a broadband provider, such as the operation of a social media website, or issues such as government surveillance, encryption, or law enforcement.
Conclusion
The struggle between the overwhelming usefulness and importance of the Internet for businesses and individuals, on the one hand, and privacy concerns, on the other, continues unabated, as my other articles in this newsletter have frequently observed in a variety of contexts. See, e.g., “Standing to Assert Claims for Online Privacy Breaches,” January 2016; and “Fifth Amendment Does Not Extend to 'Digital Person,'” November 2015. The NPRM draws stark attention to the fact that privacy concerns abound each time we access any technology that is connected to the Internet. The NPRM, if adopted, will address consumers' rights to have notice, choice, and security when it comes to the use of private information by broadband providers.
Shari Claire Lewis, a partner in the Long Island office of Rivkin Radler, can be reached at [email protected].
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.
During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.
The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.
As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.
Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.