Category Archives: Communications Law

FCC FILING DEADLINE FOR FORM 477 DATA IS NOW SEPTEMBER 1, 2017

FCCRulingThe Federal Communications Commission (FCC) FCC’s Form 477 filing interface, available online at https://apps2.fcc.gov/form477/login.xhtml, is now accepting data as of June 30, 2017.  The filing deadline for Form 477 data as of June 30, 2017 is September 1, 2017.

Information on how to file Form 477 is available on the FCC’s Form 477 Resources for Filers webpage at www.fcc.gov/form477.

Need more information or help filing Form 477?  Contact attorney Jeffrey A. Franklin at Prince Law Offices, P.C.

Advertisements

Leave a comment

Filed under Business Law, Communications Law

When the Lights Go Out – Black Sky Power Outage Mass Event – Preparedness

What would you do if you didn’t have power for an extended period of time? For one week? For one month? For six months? “EARTH EX” is designed to help you think through this scenario and increase your preparedness.

Leadership and staff from the Pennsylvania Public Utility Commission (PUC), Pennsylvania Emergency Management Agency (PEMA) and Pennsylvania Governor’s Office of Homeland Security today, August 23, 2017, joined with government agencies, utilities, emergency responders and other stakeholders around the world in a first-ever transnational exercise to test responses to a large-scale power outage event.

Today’s Pennsylvania involvement in EARTH EX 2017 is part of a continuing collaboration of public and private sector leaders to strengthen the state’s effort to prepare for “Black Sky” events – defined as extraordinary, wide-reaching events capable of producing power outages that last significantly longer than typical weather or operational outages.

Because of the large-scale nature of Black Sky events, they have the potential to impact not only electricity, but also other critical systems, such as natural gas, water, wastewater treatment, telecommunications and transportation services. These events could be caused by a cyber-attack on the electric grid, severe weather or physical attacks.

“Black Sky events have the potential to disrupt essential services across large areas, impacting the lives of millions of people,” said PUC Chairman Gladys M. Brown. “It is essential that we work collectively to address these threats, because it will require the work of government, private sector and not-for-profit organizations to better safeguard our critical systems, strengthen our response and enhance our ability to recover from Black Sky events.”

“This exercise gives us the opportunity to work with our partners in preparedness, response and recovery to identify ways we can work together more efficiently and effectively in the event of a Black Sky incident,” said PEMA Director Richard D. Flinn, Jr.

“Planning exercises like EARTH EX are a critical part of developing an effective, coordinated response to a Black Sky event,” said Marcus L. Brown, director of Pennsylvania’s Office of Homeland Security. “The lessons learned will help all of the participants prepare for, and recover from, a catastrophic disruption of electricity and other essential services.”

Pennsylvania’s first Black Sky exercise – one of the first in the country – was held in June 2016, hosted by the PUC and Gov. Tom Wolf. Since that time, the PUC, PEMA and the Governor’s Office of Homeland Security have continued to integrate Black Sky planning and practice into broader discussions about emergency response planning.

Today’s EARTH EX exercise, developed by the Electric Infrastructure Security Council (EIS Council), is the first phase of a nearly year-long series of international exercises intended to develop, test and enhance planning and preparation for Black Sky events. EIS Council hosts national and international collaborations on resilience and whole community restoration and response planning, addressing severe, national and global scale hazards to lifeline infrastructures.

If you or your business have legal questions or concerns regarding disaster preparedness, computer law, privacy, or cybersecurity law matters, contact attorney Jeffrey A. Franklin at Prince Law Offices. Learn more about preparedness at EARTH EX 2017.  Tell us how you are preparing in the comments.

1 Comment

Filed under Business Law, Communications Law, Computer Law, Consumer Advocacy, Energy Law

Stick with Security – Part 1

stick_with_security_1When it comes to data security, what’s reasonable will depend on the size and nature of your business and the kind of data you deal with. But certain principles apply across the board: Don’t collect sensitive information you don’t need. Protect the information you maintain. And train your staff to carry out your policies.

The FTC’s Start with Security initiative was built on those fundamentals. Some helpful tips follow.

DON’T COLLECT PERSONAL INFORMATION YOU DON’T NEED.

It’s a simple proposition: If you don’t ask for sensitive data in the first place, you won’t have to take steps to protect it. Of course, there will be data you must maintain, but the old habit of collecting confidential information “just because” doesn’t hold water in the cyber era. Continue reading

Leave a comment

Filed under Business Law, Communications Law, Computer Law, Consumer Advocacy

Stick with Security: FTC Providing Insights on Data Security Practices

ftc_logo_430As part of its ongoing efforts to help businesses ensure they are taking reasonable steps to protect and secure consumer data, the Federal Trade Commission (FTC) is publishing a series of blog posts using hypothetical examples based on lessons from closed investigations, FTC law enforcement actions, and questions from businesses. These new posts will build on the FTC’s Start with Security guide for businesses.

FTC Acting Chairman Maureen K. Ohlhausen pledged earlier this year to be more transparent about the lessons learned from the FTC’s closed data security investigations and to provide additional information for businesses about practices that contribute to reasonable data security, culminating in this “Stick with Security” Initiative.

In the first blog post published July 21, 2017, the FTC highlights some of the themes that have emerged from an examination of closed FTC data security investigations. For example, while news reports might call attention to a data breach, they might not focus on the fact that the company that suffered the breach had encrypted the data, which substantially reduces the risk of consumer injury (and legal liability). Another lesson gleaned is that security researchers’ valuable work can alert us to new vulnerabilities, but sometimes the risk of a vulnerability being exploited to cause consumer injury is more theoretical than likely. Another key lesson is that in almost every closed case, the entities involved used the same common-sense security fundamentals outlined in the FTC’s Start with Security guide for businesses.

If you or your business have questions or concerns regarding fraud, computer law, privacy, or cybersecurity law matters, contact attorney Jeffrey A. Franklin at Prince Law Offices.

Leave a comment

Filed under Business Law, Communications Law, Computer Law, Consumer Advocacy

FTC Cybersecurity Roundtables with Small Businesses

The Federal Trade Commission (FTC) is hosting small business owners in a series of public roundtables across the United States to discuss the most pressing challenges small businesses face in protecting the security of their computers and networks.

Engage, connect, protect - small business & data security roundtablesThe Engage, Connect, and Protect Initiative: Small Business and Data Security Roundtables are part of an ongoing initiative by Acting FTC Chairman Maureen K. Ohlhausen aimed at helping small businesses, which included the launch of a new website in May focused on helping small business owners avoid scams and protect their computers and networks from cyberattacks. There are more than 28 million small businesses nationwide, employing nearly 57 million people, according to the Small Business Administration (SBA).

“The FTC has been a leader in guiding businesses of all sizes on how to protect the data in their care,” Acting Chairman Ohlhausen said. “Companies with only a few employees face unique challenges when it comes to cybersecurity. We’ll use what we learn in the roundtables to tailor our practical resource materials for small businesses.”

The first roundtable event will take place July 25 in Portland, Oregon, in partnership with the National Cyber Security Alliance (NCSA), the SBA, and other organizations. This event will be followed by a roundtable discussion in Cleveland, Ohio, on September 6, hosted by the FTC and the Council of Smaller Enterprises and in collaboration with the SBA. Another roundtable event will take place later in September in Des Moines, Iowa, sponsored by the NCSA.

The roundtables will bring together FTC staff along with the SBA and other federal partners, industry associations, and the small business community. The comments and feedback generated by the roundtables will be used to help the FTC and its partners provide additional education and guidance for small business owners on cybersecurity issues.

If you or your business have questions or concerns regarding fraud, computer law, privacy, or cybersecurity law matters, contact attorney Jeffrey A. Franklin at Prince Law Offices.

Leave a comment

Filed under Business Law, Communications Law, Computer Law, Consumer Advocacy, Energy Law

Central PA Residents & Businesses Switching to 10-Digit Dialing in ‘717’ Area Code in August

puc_sealThe Pennsylvania Public Utility Commission (PUC) today reminded residents and businesses across Central Pennsylvania served by the 717 area code of the upcoming switch to 10-digit dialing for all local calls – in preparation for the activation of a new “overlay” area code, which will serve the entire region.

According to the implementation schedule for the “223” overlay area code, mandatory 10-digit dialing for all local calls will begin on Aug. 26, 2017. Starting on that date, if callers only dial a seven-digit number, they will reach a recorded announcement instructing them to hang up and redial the number using the area code plus the seven-digit number.

For the past several months, telephone callers in the 16-county 717 service area have been encouraged to voluntarily use 10-digit dialing (717 + the full local telephone number). The new 223 overlay area was approved based on forecasts that the remaining supply of available telephone numbers in the 717 area code was close to exhaustion.

According to Neustar, Inc., the neutral third party area code relief planner for Pennsylvania, the dialing plan for the 717/223 area code is as follows:

  • Local & Toll calls from the 717/223 area to other numbers inside the 717/223 area:
    Dial 10-digits (717 or 223 + XXX-XXXX)
  • Local & Toll Calls from the 717/223 area to numbers in another area code:
    Dial 1 + 10-Digits (1 + XXX-XXX-XXXX)
  • Operator Services (Credit card, collect, third party):
    Dial 0 + 10-digit (0 + XXX-XXX-XXXX)

The PUC’s Order approving the overlay plan specifies that any new numbers for the 223 overlay area code shall not be released until Sept. 26, 2017, and that requests for numbers in the 717 area code will continue to be honored as long as resources are available.

To learn how Prince Law Offices, P.C. can assist you or your business with telecommunications law and PUC matters, contact attorney Jeffrey A. Franklin at Prince Law Offices, P.C.

Leave a comment

Filed under Business Law, Communications Law, Computer Law, Consumer Advocacy, Energy Law

Someone Stole your Phone?

Identity theft can happen to anyone. Last week the Federal Trade Commission (FTC) published an article based on a true story from one if its fraud investigators who had her phone stolen.

She provided tips you can take to protect your digital identity:

Smart Phone:

  • Lock your phone. Use at least a 6-digit passcode on your device, or use the pattern lock or fingerprint scanner. Set the device to lock when not in use. This is especially important if you use a mobile wallet or money transfer apps.
  • Update it and back it up. Back up your device regularly and make sure automatic updates are turned on. Backing up your phone regularly and automatically makes sure that you’ll still have your stuff – if it disappears.
  • Get help finding your phone. Install and turn on Find My iPhone (iOS) or Find My Device (Android). These apps could help you locate your device if you lose it. If your phone is stolen, these apps also let you remotely issue a command to erase your device .
  • Alert your wireless provider if your phone is missing. Make the call as soon as you know your device is missing after you have used the Find My Phone/Device feature. They can permanently or temporarily disable the SIM card to stop someone from using the device on the cell network.

Accounts:

  • Turn on two-factor authentication. That means you’ll give your password and a second way to prove that you’re you. This extra layer of security makes it much harder for thieves to get into your accounts and lock you out. Many providers give several options to authenticate your identity, so be sure you have a backup method (like one-time use codes or a backup email address) in case you don’t have access to your device to receive texts or phone calls.
  • Know which devices have access to your accounts. Many social media sites and email providers, and some phone operating systems, let you view the logins for your devices from the settings menu. You can remove devices from the account, and log out of the site remotely using a computer or another device. That’s handy if ever you lose your phone, tablet, or laptop.
  • Check your log-in and account notifications. Many email and social media accounts can notify you if a new device connects to your account, or if someone tried to change your passwords.
  • When in doubt, change your passwords. If you’ve lost your device, change your passwords. Many of us set our devices to remember passwords – which could mean that someone who gets your phone could get access to your accounts and personal information. So: if you lose your phone, change your email, social media, online banking, shopping, and other passwords right away.

For more tips on what to do to protect yourself from identity thieves, check out ftc.gov/idtheft.

Need further help?  If you or your business have questions or concerns regarding fraud, computer law, privacy, or cybersecurity law matters, contact attorney Jeffrey A. Franklin at Prince Law Offices.

Leave a comment

Filed under Business Law, Communications Law, Computer Law, Consumer Advocacy