Customer Proprietary Network Information
Encyclopedia
Customer proprietary network information (CPNI) is the data
Data
The term data refers to qualitative or quantitative attributes of a variable or set of variables. Data are typically the results of measurements and can be the basis of graphs, images, or observations of a set of variables. Data are often viewed as the lowest level of abstraction from which...

 collected by telecommunications companies about a consumer's telephone call
Telephone call
A telephone call is a connection over a telephone network between the calling party and the called party.-Information transmission:A telephone call may carry ordinary voice transmission using a telephone, data transmission when the calling party and called party are using modems, or facsimile...

s. It includes the time, date, duration and destination number of each call, the type of network a consumer subscribes to, and any other information that appears on the consumer's telephone bill.

Telemarketers working on behalf of telephone companies, attempting to either win back a customer or upsell a customer with more services, must ask the customer's consent before accessing the billing information or before using that information to offer an upsell or any change of services. Usually this is done at the beginning of a call from the telemarketer to the telephone subscriber.

Description

The U.S. Telecommunications Act of 1996
Telecommunications Act of 1996
The Telecommunications Act of 1996 was the first major overhaul of United States telecommunications law in nearly 62 years, amending the Communications Act of 1934. This Act, signed by President Bill Clinton, was a major stepping stone towards the future of telecommunications, since this was the...

 granted the Federal Communications Commission
Federal Communications Commission
The Federal Communications Commission is an independent agency of the United States government, created, Congressional statute , and with the majority of its commissioners appointed by the current President. The FCC works towards six goals in the areas of broadband, competition, the spectrum, the...

 (FCC) authority to regulate how customer proprietary network information (CPNI) can be used and to enforce related consumer information privacy provisions. The rules in the 2007 FCC CPNI Order further restrict CPNI use and create new notification and reporting requirements.

The rules in the 2007 CPNI Order include:
  • limits the information which carriers may provide to third party marketing firms without first securing the affirmative consent of their customers
  • defines when and how customer service representatives may share call details
  • creates new notification and reporting obligations for carriers (including identity verification procedures)


Note that as long as an affiliate is "communications" related, the FCC has ruled that CPNI is under an opt-out approach (can be shared without your explicit permission). A phone company is permitted to sell all information on you, such as numbers you call, when you called them, where you were when you called them, or any other personally identifying information. CPNI would normally require a warrant for law enforcement agencies, but it can be freely sold to "communications" related companies. One can verify this by checking rule 64.2007(b)(1) and footnote 137 in the 2007 CPNI order. One can call up a phone company and opt out by requesting that they do not share CPNI information.

The 2007 CPNI Order does not revise all CPNI rules. For example, the rule revisions adopted in the Order do not limit a carrier's ability to use CPNI to perform billing and collections functions, restrict CPNI use to effect maintenance and repair activity, or impact responses to lawful subpoenas.

Fines for failure to comply with CPNI rules can be substantial. Since 2006, the FCC, focusing on one rule regarding internal annual compliance certificates, proposed over $1M in fines and those fines are not necessarily indicative of the fines the FCC could propose. The FCC is authorized to impose fines of up to $130,000 for each rule violation or each day of a continuing violation up to a maximum of $1.3M for each continuing violation. The rules adopted in the Order are effective either six months after the Order is published in the Federal Register or on receipt of OMB approval of the new rules depending on which event is later. (Order at ¶61)

See also

  • Call detail record
    Call detail record
    A call detail record , also known as call data record, is a data record produced by a telephone exchange or other telecommunications equipment documenting the details of a phone call that passed through the facility or device...

  • Telecommunications data retention
    Telecommunications data retention
    In the field of telecommunications, data retention generally refers to the storage of call detail records of telephony and internet traffic and transaction data by governments and commercial organisations...

  • Pen register
    Pen register
    A pen register is an electronic device that records all numbers called from a particular telephone line. The term has come to include any device or program that performs similar functions to an original pen register, including programs monitoring Internet communications.The United States statutes...

  • Call accounting
    Call accounting
    A Call Accounting System is a telecommunications software or hardware application that captures, records, and costs telephone usage events. Internationally call accounting systems may be referred to as call logging systems...

  • Internet Protocol Detail Record
  • Electronic Communications Privacy Act
    Electronic Communications Privacy Act
    The Electronic Communications Privacy Act is a United States law.- Overview :The “electronic communication” means any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic or...

  • Mobile identity management
    Mobile identity management
    The mobile phone in addition to a wallet and house keys has become one of the essentials to take with you when leaving the house. By storing all the technical necessary applications on a SIM card, the mobile phone has turned into a device for managing each person’s digital identity.Mobile Identity...


External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK