20 July 2011
Implementation of the Truth in Caller ID Act
[Federal Register Volume 76, Number 139 (Wednesday, July 20, 2011)]
[Rules and Regulations]
[Pages 43196-43206]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-18165]
=======================================================================
-----------------------------------------------------------------------
FEDERAL COMMUNICATIONS COMMISSION
47 CFR Parts 1 and 64
[WC Docket No. 11-39; FCC 11-100]
Implementation of the Truth in Caller ID Act
AGENCY: Federal Communications Commission.
ACTION: Final rule.
-----------------------------------------------------------------------
SUMMARY: In this Report and Order (Order), the Commission adopts rules
to implement the Truth in Caller ID Act of 2009 (Truth in Caller ID
Act, or Act). The Truth in Caller ID Act, and the Commission's
implementing rules, prohibit any person or entity from knowingly
altering or manipulating caller identification information with the
intent to defraud, cause harm, or wrongfully obtain anything of value.
DATES: Effective August 19, 2011.
ADDRESSES: Federal Communications Commission, 445 12th Street, SW.,
Washington, DC 20554.
FOR FURTHER INFORMATION CONTACT: Lisa Hone, Wireline Competition
Bureau, (202) 418-1580.
SUPPLEMENTARY INFORMATION: This is a summary of the Commission's Report
and Order (Order) in WC Docket No. 11-39, FCC 11-100, adopted June 20,
2011, and released June 22, 2011. In this Order, the Commission adopts
rules to
[[Page 43197]]
implement the Truth in Caller ID Act of 2009. Caller ID services
typically identify the telephone numbers and sometimes the names
associated with incoming calls, thus allowing consumers to decide
whether or how to answer a phone call based on who appears to be
calling. However, caller ID information can be altered or manipulated
(``spoofed''). Increasingly, bad actors are spoofing caller ID
information in order to facilitate a wide variety of malicious schemes.
In response to the increasing use of caller ID spoofing to facilitate
schemes that defraud consumers and threaten public safety, Congress
passed the Truth in Caller ID Act. The Truth in Caller ID Act, and the
Commission's implementing rules, prohibit any person or entity from
knowingly spoofing caller identification information with the intent to
defraud, cause harm, or wrongfully obtain anything of value.
Synopsis of Report and Order
I. Implementation of the Truth in Caller ID Act
1. Having considered the record in this proceeding, we adopt rules
that prohibit any person or entity in the United States, acting with
the intent to defraud, cause harm, or wrongfully obtain anything of
value, from knowingly causing, directly or indirectly, any caller
identification service to transmit or display misleading or inaccurate
caller identification information. The revisions to the Commission's
Calling Party Number (CPN) rules are modeled on the Act's prohibition
against knowingly engaging in caller ID spoofing with fraudulent or
harmful intent. The rules include exemptions based on conduct the Act
identifies as exempt from its prohibitions. The revised rules also
include new definitions, including several modeled after definitions in
the Act. As proposed in the Caller ID Act NPRM, 76 FR 16367, the
revised rules also specify that blocking or attempting to block one's
own caller ID is not a violation of the new rules, while clarifying
that telemarketers are not relieved of their obligation to transmit
caller identification information.
A. Prohibited Practice
2. The principal implementing rule we adopt provides that ``no
person or entity in the United States shall, with intent to defraud,
cause harm, or wrongfully obtain anything of value, knowingly cause,
directly or indirectly, any caller identification service to transmit
or display misleading or inaccurate caller identification
information.'' The wording of the prohibition in our rules generally
tracks the wording of the prohibition in the Act, and is unchanged from
the rule the Commission proposed in the Caller ID Act NPRM.
3. The Act specifies that the prohibited conduct is ``in connection
with any telecommunications or IP-enabled voice service.'' Because we
define the terms ``caller identification service'' and ``caller
identification information'' to encompass the use of telecommunications
services and ``interconnected VoIP services,'' we do not need to
specify in the rule that the prohibition encompasses calls made using
telecommunications services and IP-enabled voice services, as specified
in the Act.
4. We also note that the Act is directed at ``any person,'' but
does not define the term ``person.'' In order to make clear that the
rules are not limited to natural persons and to be consistent with the
Commission's current rules concerning the delivery of CPN, our
amendments to the CPN rules use the phrase any ``person or entity.'' By
contrast, the amendments to the Commission's forfeiture rules use the
term ``person'' in order to be consistent with use of the term
``person'' in the forfeiture rules. In both cases, we intend for the
entities covered to be those within the scope of the definition of
``person'' in the Communications Act. The only commenter that addressed
the use of the phrase ``person or entity'' in the proposed rules
supported the Commission's clarification that the rule applies to both
natural persons and other entities.
5. In the Caller ID Act NPRM, the Commission asked about the
placement of the term ``knowingly'' in the proposed rules. As with the
proposed rules, the rules we adopt today provide that in order to
violate the rules, the person or entity ``knowingly'' causing
transmission or display of inaccurate or misleading caller
identification must be the same person or entity that is acting with
intent to defraud, cause harm, or wrongfully obtain anything of value.
The Truth in Caller ID Act is aimed at prohibiting the use of caller ID
spoofing for ill intent. Therefore, we believe that an entity subject
to liability for violating the Act must knowingly spoof caller
identification information and do so with intent to defraud, cause
harm, or wrongfully obtain something of value.
6. Most commenters agreed with the Commission's proposal to clarify
that the word ``knowingly'' modifies the action of the person or entity
engaged in malicious caller ID spoofing because this is the most
logical reading of placement of the word in the Truth in Caller ID Act.
However, in its reply comments, the Privacy Rights Clearinghouse (PRC)
recommends that the Commission change the placement of the word
``knowingly'' so that it modifies the actions of the caller
identification service or modify the rule so that spoofing services are
prohibited from knowingly transmitting misleading or inaccurate caller
identification information for a party violating the Act. PRC argues
that requiring that the same person or entity knowingly cause the
transmission or display of misleading or inaccurate caller
identification information and have the requisite intent to ``defraud,
cause harm, or wrongfully obtain anything of value'' imposes an
unnecessary hurdle to enforcement efforts.
7. We disagree with PRC's arguments. Based on our reading of the
statute, it is not enough that a person or entity intend to defraud,
cause harm, or wrongfully obtain anything of value to violate the Truth
in Caller ID Act. Rather, the person or entity intending to defraud,
cause harm or wrongfully obtain anything of value must facilitate the
scheme through the manipulation or alteration of caller identification
information. Moreover, adopting a rule in which ``knowingly'' modifies
the action of the caller identification service would not impose
liability on caller ID spoofing services for knowingly manipulating
caller identification information absent intent to defraud, cause harm,
or wrongfully obtain anything of value. Nor would it ease the burden on
law enforcement of proving a violation of the Act. Instead, it would
require law enforcers to show that the provider of the caller ID
service--usually a terminating carrier or VoIP provider--knew that the
incoming caller identification information was manipulated or altered.
As the Commission noted in the Caller ID Act NPRM, ``in many instances
the caller identification service has no way of knowing whether or not
the caller identification information it receives has been
manipulated.'' We do not believe Congress intended to impose liability
on caller ID spoofers acting with malicious intent only upon proof that
the provider of the call recipient's caller ID service knew that the
caller identification information was manipulated or altered. That
would be a perverse result, wholly inconsistent with the intent of the
Act and its legislative history.
8. As for PRC's suggestion that we modify the rule to hold spoofing
providers liable for transmitting
[[Page 43198]]
inaccurate or misleading caller identification information on behalf of
someone violating the Act, as discussed below, we choose to follow
Congress' lead in not imposing additional obligations on spoofing
providers. We find that the proposed rules and the rules we adopt today
are consistent with Congressional intent to focus on whether a person
or entity has knowingly manipulated the caller identification
information in order to defraud, cause harm, or wrongfully obtain
anything of value, and therefore we adopt the prohibition on caller ID
spoofing as proposed in the Caller ID Act NPRM. The person or entity
that knowingly causes caller ID services to transmit or display
misleading or inaccurate information may, in some cases, be a carrier,
spoofing provider or other service provider, and we do not exempt such
conduct from the purview of our rules. Indeed, we believe that caller
ID spoofing done to wrongfully avoid payment of intercarrier
compensation charges--whether by the originating provider, an
intermediate carrier, or other intermediate entity--would be a
violation of our rules.
9. Like the proposed rules, the rules we adopt today address both
transmission and display of misleading or inaccurate caller
identification information to make clear that, even if a carrier or
interconnected VoIP provider transmits accurate caller identification
information, it would be a violation for a person or entity to
knowingly cause, directly or indirectly, a device that displays caller
identification information to display inaccurate or misleading
information with the intent to defraud, cause harm, or wrongfully
obtain anything of value. We also note that the rules we adopt today
cover situations in which a person or entity is ``directly or
indirectly'' causing a caller identification service to transmit or
display misleading or inaccurate caller ID. We include the concept of
``indirect'' action in our rules to foreclose those acting with the
requisite harmful intent from arguing that they are not liable merely
because they have engaged a third party to cause the transmission or
display of inaccurate or misleading caller identification information.
10. In the Caller ID Act NPRM, the Commission sought comment on
whether the proposed prohibition on causing any caller identification
service to transmit or display ``misleading or inaccurate'' caller
identification information with the ``intent to defraud, cause harm, or
wrongfully obtain anything of value'' provides clear guidance about
what actions are prohibited. Commenters generally agreed that the terms
in the proposed rule were sufficiently clear. We agree. Although we do
not believe it is necessary to offer additional definitions to clarify
the meaning of the prohibited actions, we do agree with the National
Network to End Domestic Violence (NNEDV) that the term ``harm'' is a
broad concept that encompasses financial, physical, and emotional harm,
include stalking, harassment, and the violation of protection and
restraining orders. Moreover, NNEDV offers substantial evidence that
abusive spouses use third-party caller ID services to harass and stalk
their victims. We consider knowing manipulation or alteration of caller
identification information for the purpose of harassing or stalking
someone to be an egregious violation of the Act and of our rules
implementing the Act. We intend to enforce our rules vigorously,
including against those who engage in such malicious practices, and we
encourage spoofing providers to notify their customers in no uncertain
terms that such actions are illegal.
B. Exemptions
11. The Act directs the Commission to exempt from its regulations
(i) any authorized activity of a law enforcement agency; and (ii) court
orders that specifically authorize the use of caller identification
manipulation. Separately, the Act also makes clear that it ``does not
prohibit any lawfully authorized investigative, protective, or
intelligence activity of a law enforcement agency of the United States,
a State or a political subdivision of a State, or of an intelligence
agency of the United States.'' DOJ requested that the Commission
explicitly incorporate lawfully authorized investigative, protective,
or intelligence activities into the exemptions to the Commission's
implementing rule. In light of the statutory language specifying that
such activities are not prohibited by the Act and DOJ's request that
such activities be included in the exemptions to the Commission's
implementing rule, the proposed rule incorporated the two exemptions
specified in the Act, and expanded the exemption for law enforcement
activities to cover protective and intelligence activities. No
commenters objected to the proposed rule, and AT&T, the only commenter
other than DOJ that addressed the exemptions in the proposed rule,
supported their adoption. Thus, the record supports our decision to
include those exemptions in the rule we adopt today.
12. We decline to adopt any other exemptions from the Act.
Commenters have proposed a number of additional exemptions, all of
which cover practices that, as described by the commenters themselves,
would not violate the plain language of the Act. Some commenters assert
that absent additional exemptions, the rules might be misinterpreted to
prohibit normal and helpful business practices, such as those designed
to facilitate communications with customers. As a result some
commenters ask for broad exemptions to the Act. AT&T, for example, asks
the Commission to make clear that caller ID manipulation ``for
legitimate business reasons'' is exempt; inContact asks the Commission
to ``exempt all uses not specifically intended to defraud or deceive
consumers''; and USTelecom and Verizon ask the Commission to exempt
``any action required by law or permitted under Sec. 64.1601(d).''
Still other commenters propose exemptions for caller identification
manipulation involving specific types of practices or actors. For
example, a number of commenters representing telecommunications and
VoIP providers express support for an exemption for carriers and
providers that transmit caller ID information they receive from their
customers or other providers, even if it turns out to be inaccurate.
Commenters that provide call management services for telemarketers and
debt collectors, and those that provide caller ID spoofing services to
the public, suggest that they should be exempt from responsibility for
bad actors, unless the service provider has the necessary intent to
defraud, cause harm, or wrongfully obtain anything of value. Companies
that provide call management services to telemarketers and debt
collectors have also asked the Commission for an exemption allowing
manipulation of caller ID information so that a call recipient's caller
ID displays a local number, regardless of where the calling party is
located. NNEDV suggests that the Commission exempt victim service
providers, and a private investigator requests that the Commission
include an exemption for lawful use by licensed private investigators.
We do not find any of these exemptions to be necessary or appropriate.
13. We note that those commenters that requested that the
Commission exempt manipulation of caller ID information in order to
display a local phone number, asked in the alternative that the
Commission clarify that manipulating caller ID to display a local
number is not a violation of the Act. We
[[Page 43199]]
agree that such a practice is not in and of itself a violation of the
Act. We note, however, that if the display of a ``spoofed'' local
number is done as part of a scheme to defraud, cause harm, or
wrongfully obtain anything of value, then the person or entity
perpetrating the scheme would be in violation of the Act.
14. The legislative history of the Act makes clear that
manipulation or alteration of caller ID information done without the
requisite harmful intent does not violate the Act. Nothing in our
implementing rules changes that fact. Likewise, the transmission of
incorrect caller ID information by carriers and providers acting
without the requisite intent to defraud, cause harm or wrongfully
obtain anything of value does not violate the Truth in Caller ID Act or
our rules implementing the Truth in Caller ID Act. Moreover, we agree
with DOJ that ``none of the commenters who advocated for a status-based
exemption to the Truth in Caller ID Act were able to articulate any
scenario whereby legitimate conduct would fall within the prohibitions
of the Act.'' Like DOJ, we fear that allowing any such exemptions could
``create dangerous loopholes under the Act that could be exploited by
criminals.'' Therefore, we decline to adopt any further exemptions from
the Act at this time, primarily because the ones that have been
presented to us are unnecessary.
C. Definitions
15. The Caller ID Act NPRM proposed adding definitions to the
Commission's CPN rules for ``Interconnected VoIP service''; ``Caller
identification information''; ``Caller identification service''; and
``information regarding the origination'' of a call. We adopt the
proposed definitions for all four of those terms, with slight
modifications to the definitions of ``Caller identification service''
and ``information regarding the origination.''
16. Interconnected VoIP service. The Truth in Caller ID Act covers
caller ID spoofing done ``in connection with any telecommunications
service or IP-enabled voice service.'' As mentioned above, the rules we
adopt today use the term ``interconnected VoIP service'' instead of
``IP-enabled voice service.'' We define ``interconnected VoIP service''
to have the same meaning given that term in Sec. 9.3 of the
Commission's rules. We do this because the Act defines ``IP-enabled
voice service'' by reference to Sec. 9.3 of the Commission's
regulations, as they may be amended. Section 9.3 of the Commission's
rules defines ``interconnected VoIP service,'' not ``IP-enabled voice
service.'' Therefore, to be consistent with the apparent intent of
Congress in enacting the Truth in Caller ID act, we limit the scope of
the rule's coverage to telecommunications services and interconnected
VoIP services.
17. DOJ and some other commenters recommend that we adopt rules
that cover VoIP services more expansively than the Commission's
definition of ``Interconnected VoIP'' service in Sec. 9.3 of its rules
does. We find that the Act's incorporation of the Commission's rule
defining interconnected VoIP service calls for applying the current
definition found in Sec. 9.3 (as it may be amended over time).
Consequently, the rules we adopt today use the term ``interconnected
VoIP service'' and specify that it has the same meaning given the term
``interconnected VoIP service'' in 47 CFR 9.3 as it currently exists or
may hereafter be amended. However, we are cognizant of the importance
of protecting consumers from malicious caller ID spoofing as broadly as
possible. To that end, we raise this issue in the Report to Congress
for further consideration.
18. Caller identification information. We define ``caller
identification information'' to mean ``information provided by a caller
identification service regarding the telephone number of, or other
information regarding the origination of, a call made using a
telecommunications service or interconnected VoIP service.'' This is
the definition the Commission proposed in the Caller ID Act NPRM and no
commenters offered any reason not to use this definition.
19. Caller identification service. We define ``caller
identification service'' to mean ``any service or device designed to
provide the user of the service or device with the telephone number of,
or other information regarding the origination of, a call made using a
telecommunications service or interconnected VoIP service.'' Unlike the
proposed rule, the definition of ``caller identification service'' that
we adopt today does not explicitly reference automatic number
identification (ANI) because, as discussed below, we have defined
``information regarding the origination'' to include ``billing number
information, including charge number, ANI, or pseudo-ANI.'' By
including such billing number information in the definition of
``information regarding the origination'' we effectively include within
the definition of ``caller identification service'' any service or
device designed to provide the user with any form of the calling
party's billing number, including charge number, ANI, or pseudo-ANI.
20. Information regarding the origination (of a call). The
definitions of ``caller identification information'' and ``caller
identification service'' in the Act and in the rules we adopt today
both use the phrase ``the telephone number of, or other information
regarding the origination of, a call.'' We define ``information
regarding the origination'' to mean any: (1) Telephone number; (2)
portion of a telephone number, such as an area code; (3) name; (4)
location information; (5) billing number information, including charge
number, ANI, or pseudo-ANI; or (6) other information regarding the
source or apparent source of a telephone call. The definition we adopt
today mirrors the proposed definition, but adds ``billing number
information including charge number, ANI, or pseudo-ANI'' to the types
of information that constitute ``information regarding the
origination.'' We add these types of information to the definition of
``information regarding the origination'' in response to commenters'
concerns about the importance of transmission of accurate billing
information, including charge number, ANI and pseudo-ANI, to caller
identification services used by emergency services providers.
21. Our current rules relating to the delivery of CPN services
define ANI as referring to the ``delivery of the calling party's
billing number by a local exchange carrier to any interconnecting
carrier for billing or routing purposes, and to the subsequent delivery
of such number to end users.'' The Caller ID Act NPRM sought comment on
whether the Commission should use a different definition of ANI for
purposes of the Truth in Caller ID Act, and in particular, whether the
Commission should include a definition of ANI that encompasses charge
party numbers delivered by interconnected VoIP providers. Some
commenters requested that the Commission revise the current definition
of ANI to encompass billing numbers delivered by interconnected VoIP
providers. The terms ANI, calling party number, and charge number in
Sec. 64.1600 of our rules are used in sections of the rule that we
have not addressed in this rulemaking; therefore we decline to amend
those definitions at this time. Other commenters more generally
suggested that the Commission make sure to include billing numbers,
charge number, ANI and pseudo-ANI information within the ambit of the
rule.
22. Spoofing caller identification information transmitted to
emergency services providers is a particularly dangerous practice, and
one that Congress was particularly concerned
[[Page 43200]]
about when adopting the Truth in Caller ID Act. ANI and pseudo-ANI are
the foundations of the emergency services routing infrastructure in the
United States and derive their data exclusively from information
maintained in the records of the originating carrier. The delivery of
accurate information for any person who dials 911 or seeks assistance
via 10-digit emergency and non-emergency numbers is fundamental to
ensuring that the correct identifying information is transmitted with
those calls. While this information may not be subject to manipulation
by callers in the ordinary course, if an individual or entity did spoof
ANI, the individual could conceal his or her identity and location, and
could tie up public response capacity by initiating spoofed calls
designed to cause the dispatch of responders to locations where no
emergency is at hand. Given the rapid evolution of technology, and the
consequences of spoofing ANI and pseudo-ANI, we find that the delivery
of caller identification information to E911 public safety answering
points (PSAPs), which use ANI or pseudo-ANI to look up the caller's
name and location information on emergency calls, should be considered
a type of ``information regarding the origination'' of a call.
23. The Caller ID Act NPRM sought comment on whether there are
other things that should be included in the definition, specifically,
information transmitted in the SS7 Jurisdiction Information Parameter
(JIP) code that provides information about the location of a caller who
has ported his number or is calling over a mobile service. As the
record demonstrates, use of the JIP code can benefit law enforcement
and public safety, and can be used for improved routing for
emergencies. Therefore, we clarify that ``location information''
includes information transmitted in the SS7 JIP code. However, in
encompassing information transmitted in the JIP code within our
definition, we do not require that any providers, including CMRS and
VoIP providers, populate the JIP in signaling data.
D. Caller ID Blocking
24. The Truth in Caller ID Act specifies that it is not intended to
be construed to prevent or restrict any person from blocking the
transmission of caller identification information. The legislative
history shows that Congress intended to protect and preserve
subscribers' ability to block the transmission of their own caller
identification information to called parties. Consequently, like the
proposed rules, the rules we adopt today provide that a person or
entity that blocks or seeks to block a caller identification service
from transmitting or displaying that person or entity's own caller
identification information shall not be liable for violating our rules
implementing the Truth in Caller ID Act.
25. Although our rules generally allow callers to block caller ID,
as discussed in the Caller ID Act NPRM, telemarketers are required to
transmit caller identification information, and the phone number they
transmit must be one that a person can call to request placement on a
company-specific do-not-call list. This requirement allows consumers to
more easily identify incoming telemarketing calls and to make informed
decisions about whether to answer particular calls. It also facilitates
consumers' ability to request placement on company-specific do-not-call
lists. Additionally, the requirement assists law enforcement
investigations into telemarketing complaints. Therefore, our rules make
clear that persons or entities engaged in telemarketing remain
obligated to transmit caller identification information.
E. Third-Party Spoofing Services
26. As discussed above, one of the reasons that it is easy for
anyone to spoof their caller ID is that third-party caller ID spoofing
services are widely available and inexpensive. There are typically four
steps to the process of using a third-party caller ID spoofing service
to spoof a call. First, the customer places a call to a company-
controlled toll free or POTS line number. Second, after the first call
is connected, the customer enters a personal identification number and
then enters the number he or she wants to substitute as the caller ID
that is transmitted to the called party. Third, the customer enters the
phone number he or she wants to call; and fourth, the spoofing
provider--or the carrier it uses--delivers the call to the terminating
carrier serving the called number with the requested substitute number
transmitted as the caller's CPN.
27. Recognizing the role spoofing providers play in facilitating
caller ID spoofing, the Commission sought comment on whether the
Commission may, and should, adopt rules imposing obligations on
providers of caller ID spoofing services when they are not themselves
acting with intent to defraud, cause harm, or wrongfully obtain
anything of value. More specifically, the Commission also sought
comment on whether it should impose record-keeping requirements on
caller ID spoofing providers. In addition, the Commission sought
comment on a proposal made by DOJ, and supported by the Minnesota
Attorney General, to adopt rules requiring ``public providers of caller
ID spoofing services to make a good-faith effort to verify that a user
has the authority to use the substituted number, such as by placing a
one-time verification call to that number.''
28. Although Itellas and Teltech, the two third-party caller ID
spoofing services that commented on the Caller ID Act NPRM, indicate
that they do maintain records of the calls they facilitate and that
they cooperate with law enforcement investigations, there is little
support among the commenters for the adoption of rules requiring third-
party spoofing providers to maintain records. The third-party spoofing
providers strongly object to any rule requiring them to verify that
their customers have a right to use the phone number they choose to
spoof. Itellas and TelTech both argue that requiring users of caller ID
services to verify that they have authority to use the spoofed number
would be pointless and ineffective, because people or entities using
caller ID spoofing to carry out a criminal enterprise can purchase the
software to spoof caller ID rather than use a third-party provider.
They also argue that verification cannot establish a caller's intent,
and absent malintent there can be no violation of the Truth in Caller
ID Act. As TelTech explains, ``[u]sing a number you do not have
permission to spoof is not illegal under the Act.'' In its reply
comments, NNEDV agrees that verification requirements would be
inconsistent with the intent expressed in the legislative history of
the Act, which recognized the importance of caller ID spoofing to
protect victims of domestic violence. According to NNEDV, a
verification requirement ``would endanger victims and `domestic
violence shelters that provide false caller ID number (sic) to prevent
call recipients from discovering the location of victims.''' Although
NNEDV objects to DOJ's proposal that the Commission impose verification
requirements on caller ID spoofing services, it does propose that the
Commission require spoofing services to give prominent notice that use
of their services in violation of the Truth in Caller ID Act is
unlawful.
29. We are very concerned about the harmful effects of caller ID
spoofing done with malicious intent. We also recognize that requiring
caller ID spoofing services to verify that users have the authority to
use the substitute number would likely reduce the use of
[[Page 43201]]
caller ID spoofing to further criminal schemes, and could simplify law
enforcement efforts to determine who is behind a caller ID spoofing
scheme. Likewise, the public would benefit from having third-party
caller ID spoofing providers clearly and conspicuously notify their
users about the practices prohibited by the Truth in Caller ID Act.
However, we are not convinced that it is appropriate for the Commission
to impose such obligations on third-party caller ID spoofing service
providers at this time. In crafting the Truth in Caller ID Act, we
believe that Congress intended to balance carefully the drawbacks of
malicious caller ID spoofing against the benefits provided by
legitimate caller ID spoofing. The Act prohibits spoofing providers,
like all other persons and entities in the United States, from
knowingly spoofing caller ID with malicious intent. However, the Act
does not expressly impose additional obligations on providers of caller
ID spoofing services. Following Congress' lead, we decline to impose
additional obligations on third-party spoofing providers at this time.
30. We are cognizant of the fact that spoofing providers can, and
sometimes do, detect and prevent some types of illegitimate
manipulation of caller ID spoofing. Itellas, for example, noted in its
comments that its system does not allow customers to call or display
911, in order to prevent use of its service for swatting. Itellas'
system also prevents its customers from using a specific spoofed number
when placing calls to toll free numbers in order to prevent users from
using the phone number associated with a stolen credit card or with a
specific bank account to activate the credit card, or to transfer money
from the compromised bank account. In its comments, TelTech represents
that it has closed accounts that it has identified as appearing to be
used to commit crimes, including money transfer fraud, activation of
stolen credit cards, or identity theft. However, spoofing services do
not necessarily know the intent with which their customers place
spoofed calls. Once the Commission's rules are in force, we will have
the opportunity to determine whether the current rules are sufficient
to deter malicious caller ID spoofing. If they are not, we can revisit
the issue. In the meantime, we raise the issue of liability for third-
party providers in the report the Act requires the Commission to submit
to Congress.
31. We want to make clear that our decision not to impose
additional obligations on third-party caller ID spoofers in no way
immunizes them from the obligation to comply with the Act. Where a
caller ID spoofing service causes, directly or indirectly, the
transmission or display of false or misleading caller ID information
with the intent to defraud, cause harm, or wrongfully obtain anything
of value, such service will be in violation of the Truth in Caller ID
Act and our rules. Our conclusion follows from a natural reading of the
statute, which applies to any ``person'' who causes caller ID services
to transmit misleading or inaccurate caller ID information. Likewise,
although we do not decide the matter here, liability questions would
arise if the totality of the circumstances demonstrated that a third-
party spoofing provider had promoted its services to others as a means
to defraud, cause harm, or wrongfully obtain anything of value.
32. Caller ID Unmasking. As mentioned in the Caller ID Act NPRM,
some entities--often the same ones that offer spoofing services--also
offer the ability to unmask a blocked number, effectively stripping out
the privacy indicator chosen by the calling party. We remain deeply
concerned about these unmasking services, which circumvent the privacy
protections afforded by the Commission's CPN rules. The record reflects
concern regarding these services as well. However, the record is not
sufficiently robust to support amendments to our rules at this time.
The Commission will consider whether to take further rulemaking action
to address these services in the future. In the meantime, we take this
opportunity to remind carriers of their obligations to honor callers'
privacy requests.
F. Amendments to the Commission's Enforcement Rules
33. The Act provides for additional forfeiture penalties for
violations of subsection 227(e) of the Communications Act, and new
procedures for imposing and recovering such penalties. In order to
fully implement the Truth in Caller ID Act, the Commission proposed
amendments to its forfeiture rule, 47 CFR 1.80. The proposed amendments
specified the forfeiture penalties the Commission proposed to assess
for violations of the Truth in Caller ID Act, and proposed procedures
for imposing penalties and recovering such penalties. The Commission
also proposed some minor revisions to our forfeiture rules to address
issues not directly related to the Truth in Caller ID Act. For the
reasons discussed below, we now adopt the proposed amendments to our
forfeiture rules, with some minor modifications.
34. Amount of Penalties. The Act specifies that the penalty for a
violation of the Act ``shall not exceed $10,000 for each violation, or
3 times that amount for each day of a continuing violation, except that
the amount assessed for any continuing violation shall not exceed a
total of $1,000,000 for any single act or failure to act.'' These
forfeitures are in addition to penalties provided for elsewhere in the
Communications Act. Therefore, to implement these provisions of the
Truth in Caller ID Act, we adopt the Commission's proposal to amend
section 1.80(b) of our rules to include a provision specifying the
maximum amount of additional fines that can be assessed for violations
of the Truth in Caller ID Act. In the interest of consistency and
clarity, we also amend the text and chart in Section III of what is now
the ``Note to Paragraph (b)(5)'' to include information about the
maximum additional forfeitures provided for by the Truth in Caller ID
Act.
35. The Truth in Caller ID Act establishes the maximum amount of
additional forfeiture penalties the Commission can assess for a
violation of the Act, but it does not specify how the Commission should
determine the forfeiture amount in any particular situation. In order
to provide guidance about the factors the Commission will use in
determining the amount of penalty it will assess for violations of the
Truth in Caller ID Act, we adopt the Commission's proposal to employ
the balancing factors the Commission typically considers when
determining the amount of a forfeiture penalty. Those factors are set
out in section 503(b)(2)(E) of the Communications Act and Sec.
1.80(b)(4) of the Commission's rules. The balancing factors include
``the nature, circumstances, extent, and gravity of the violation, and,
with respect to the violator, the degree of culpability, any history of
prior offenses, ability to pay, and such other matters as justice may
require.'' These factors allow the Commission to properly consider the
specific facts of each case when determining an appropriate forfeiture
penalty.
36. Procedure for Determining Penalties. With respect to the
procedure for determining or imposing a penalty, the Act provides that
``[a]ny person that is determined by the Commission, in accordance with
paragraphs (3) and (4) of section 503(b) [of the Communications Act],
to have violated this subsection shall be liable to the United States
for a forfeiture penalty.'' It also states that ``[n]o forfeiture
penalty shall be determined under clause (i) against any person unless
such person
[[Page 43202]]
receives the notice required by section 503(b)(3) or section 503(b)(4)
[of the Communications Act].'' As the Commission indicated in the
Caller ID Act NPRM, taken together, sections 503(b)(3) and 503(b)(4)
allow the Commission to impose a forfeiture penalty against a person
through either a hearing or a written notice of apparent liability
(NAL), subject to certain procedures. The Truth in Caller ID Act makes
no reference to section 503(b)(5) of the Communications Act, which
states that the Commission may not assess a forfeiture under any
provision of section 503(b) against any person, who: (i) ``Does not
hold a license, permit, certificate, or other authorization issued by
the Commission''; (ii) ``is not an applicant for a license, permit,
certificate, or other authorization issued by the Commission''; or
(iii) is not ``engaging in activities for which a license, permit,
certificate, or other authorization is required,'' unless the
Commission first issues a citation to such person in accordance with
certain procedures. As the Commission explained in the Caller ID Act
NPRM, that omission suggests that Congress intended to give the
Commission the authority to proceed expeditiously to stop and, where
appropriate, assess a forfeiture penalty against, any person or entity
engaged in prohibited caller ID spoofing without first issuing a
citation. Having received no comments disagreeing with the Commission's
proposed approach, we find that it is appropriate and consistent with
Congressional intent to adopt rules that allow the Commission to
determine or impose a forfeiture penalty for a violation of section
227(e) against ``any person,'' regardless of whether that person holds
a license, permit, certificate, or other authorization issued by the
Commission; is an applicant for any of the identified
instrumentalities; or is engaged in activities for which one of the
instrumentalities is required.
37. We also adopt rules that amend Sec. 1.80(a) of our rules to
add a new subsection (4) providing that forfeiture penalties may be
assessed against any person found to have ``violated any provision of
section 227(e) of the Communications Act or of the rules issued by the
Commission under section 227(e) of that Act.'' In contrast to section
503(b)(1)(B) of the Communications Act, which provides for a forfeiture
penalty against anyone who has ``willfully or repeatedly'' failed to
comply with any provisions of the Communications Act, or any
regulations issued by the Commission under the Act, the Truth in Caller
ID Act does not require ``willful'' or ``repeated'' violations to
justify imposition of a penalty. Therefore, we adopt new Sec.
1.80(a)(4), in accordance with Congressional direction that the
Commission have authority to assess a forfeiture penalty for all
violations of section 227(e) or of the rules issued by the Commission
under that section of the Act.
38. Statute of Limitations. The Truth in Caller ID Act specifies
that ``[n]o forfeiture penalty shall be determined or imposed against
any person under [section 227(e)(5)(i)] if the violation charged
occurred more than 2 years prior to the date of issuance of the
required notice or notice of apparent liability.'' We note that this
differs from the more general limitations provision of section
503(b)(6) of the Communications Act, which provides for a one-year
statute of limitations in most cases. Given the explicit language of
the Truth in Caller ID Act, however, we find that the longer two-year
statute of limitations applies to enforcement of the Truth in Caller ID
Act.
39. Miscellaneous. We also take this opportunity to revise the
undesignated paragraph in Sec. 1.80(a) to address issues not directly
related to implementation of the Truth in Caller ID Act and to
redesignate that undesignated text as ``Note to paragraph 1.80(a).''
First, with respect to the proposed revisions, in order to ensure that
the language in the rule encompasses the language used in all of the
statutory provisions, we amend the rule to specify that the forfeiture
amounts set forth in Sec. 1.80(b) are inapplicable ``to conduct which
is subject to a forfeiture penalty or fine'' under the various
statutory provisions listed. (Emphasis added.) Second, we amend the
rule to change the references to sections 362(a) and 362(b) to sections
364(a) and 364(b) respectively, in order that the statutory provision
references match those used in the Communications Act, rather than the
sections of the U.S. Code. Third, we delete section 503(b) from the
list of statutory provisions to which the forfeiture amounts in Sec.
1.80(b) do not apply, because the inclusion was in error; Sec. 1.80(b)
implements the forfeiture amounts of section 503(b), and so the
penalties set forth in Sec. 1.80(b) apply to forfeiture under section
503(b).
Procedural Issues
A. Paperwork Reduction Act
40. This document does not contain new or modified information
collection requirements subject to the Paperwork Reduction Act of 1995
(PRA), Public Law 104-13. In addition, therefore, it does not contain
any new or modified information collection burdens for small business
concerns with fewer than 25 employees, pursuant to the Small Business
Paperwork Relief Act of 2002, Public Law 107-198, see 44 U.S.C.
3506(c)(4).
B. Congressional Review Act
41. The Commission will send a copy of this Report and Order in a
report to be sent to Congress and the Government Accountability Office
pursuant to the Congressional Review Act, see 5 U.S.C. 801(a)(1)(A).
C. Final Regulatory Flexibility Certification
42. The Regulatory Flexibility Act of 1980, as amended (RFA)
requires that a regulatory flexibility analysis be prepared for
rulemaking proceedings, unless the agency certifies that ``the rule
will not have a significant economic impact on a substantial number of
small entities.'' The RFA generally defines ``small entity'' as having
the same meaning as the terms ``small business,'' ``small
organization,'' and ``small governmental jurisdiction.'' In addition,
the term ``small business'' has the same meaning as the term ``small
business concern'' under the Small Business Act. A small business
concern is one which: (1) Is independently owned and operated; (2) is
not dominant in its field of operation; and (3) satisfies any
additional criteria established by the Small Business Administration
(SBA).
43. In this Report and Order, the Commission adopts rules
implementing the Truth in Caller ID Act. The Truth in Caller ID Act and
the implementing rules we adopt today prohibit any person or entity in
the United States from knowingly altering or manipulating caller
identification information with the intent to defraud, cause harm, or
wrongfully obtain anything of value. The Caller ID Act NPRM sought
comment on benefits and burdens that would be imposed on small entities
by the proposed rules and sought comment on an initial regulatory
flexibility analysis (IRFA). No commenters sought to argue that the
proposed rules would have a significant impact on a substantial number
of small entities. Indeed, no commenters raised any concerns about the
impact of the proposed rules on small entities, as such.
44. The NPRM also sought comment on whether the Commission may, and
should, adopt rules imposing obligations on providers of caller ID
spoofing services when they are not themselves acting with intent to
defraud, cause harm, or wrongfully obtain anything of value. It also
sought
[[Page 43203]]
comment more specifically on whether the Commission should impose
record-keeping requirements on caller ID spoofing providers, as well as
on a proposal made by DOJ and supported by the Minnesota Attorney
General to adopt rules requiring ``public providers of caller ID
spoofing services to make a good-faith effort to verify that a user has
the authority to use the substituted number, such as by placing a one-
time verification call to that number. In this Order, we decline to
impose any additional obligations on providers of caller ID spoofing
services at this time. Therefore, to the extent that such requirements
would have had an economic impact on some small entities, that impact
will not occur. Indeed, the record contains nothing showing that the
cost of compliance obligations would be economically significant or
would affect a substantial number of small entities. Indeed, based on
the record before us, we are persuaded that a substantial number of
small businesses do not engage in caller ID spoofing with the intent to
defraud, cause harm, or wrongfully obtain anything of value, and those
that do are already prohibited from doing so by the Truth in Caller ID
Act. Therefore, we certify that the requirements of this Report and
Order will not have a significant economic impact on a substantial
number of small entities. The Commission will send a copy of the Report
and Order including a copy of this final certification, in a report to
Congress pursuant to the Small Business Regulatory Enforcement Fairness
Act of 1996. See 5 U.S.C. 801(a)(1)(A). In addition, the Report and
Order and this certification will be sent to the Chief Counsel for
Advocacy of the Small Business Administration, and will be published in
the Federal Register. See 5 U.S.C. 605(b).
Ordering Clauses
45. Accordingly, it is ordered that, pursuant to section 2 of the
Truth in Caller ID Act of 2009, Public Law 11-331, and sections 1,
4(i), 4(j), 227, and 303(r) of the Communications Act of 1934, as
amended, 47 U.S.C. 151, 154(i), 154(j), 227 and 303(r), this Report and
Order, with all attachments, is adopted.
46. It is further ordered that parts 1 and 64 of the Commission's
rules are amended.
47. It is further ordered that pursuant to Sec. Sec. 1.4(b)(1) and
1.103(a) of the Commission's rules, 47 CFR 1.4(b)(1), 1.103(a), this
Report and order shall be effective 30 days after publication of a
summary in the Federal Register.
48. It is further ordered that the Commission's Consumer and
Governmental Affairs Bureau, Reference Information Center, shall send a
copy of this Report and Order, including the Final Regulatory
Flexibility Certification, to the Chief Counsel for Advocacy of the
Small Business Administration.
List of Subjects
47 CFR Part 1
Penalties.
47 CFR Part 64
Communications common carriers, Caller identification information,
Telecommunications, Telegraph, Telephone.
Federal Communications Commission.
Marlene H. Dortch,
Secretary.
Final Rules
For the reasons discussed in the preamble, the Federal
Communications Commission amends 47 CFR parts 1 and 64 as follows:
PART 1--PRACTICE AND PROCEDURE
0
1. The authority citation for part 1 is revised to read as follows:
Authority: 15 U.S.C. 79 et seq.; 47 U.S.C. 151, 154(i), 154(j),
155, 157, 225, 227, 303(r), and 309.
0
2. Amend Sec. 1.80 as follows:
0
a. Revise paragraph (a)(3)
0
b. Designate the undesignated paragraph following (a)(4) as ``Note to
Paragraph (a)'' and revise it;
0
c. Redesignate paragraphs (a)(4), (b)(3), (b)(4), (b)(5), and (c)(3),
as paragraphs (a)(5), (b)(4), (b)(5), (b)(6), and (c)(4), respectively;
0
d. Redesignate ``Note to Paragraph (b)(4)'' as ``Note to paragraph
(b)(5)'' and revise it;
0
e. Add new paragraphs (a)(4), (b)(3), and (c)(3);
0
f. Revise redesignated paragraph (b)(4); and
0
g. Revise paragraph (d).
Sec. 1.80 Forfeiture proceedings.
(a) * * *
(3) Violated any provision of section 317(c) or 508(a) of the
Communications Act;
(4) Violated any provision of section 227(e) of the Communications
Act or of the rules issued by the Commission under section 227(e) of
that Act; or
* * * * *
Note to paragraph (a): A forfeiture penalty assessed under this
section is in addition to any other penalty provided for by the
Communications Act, except that the penalties provided for in
paragraphs (b)(1) through (4) of this section shall not apply to
conduct which is subject to a forfeiture penalty or fine under
sections 202(c), 203(e), 205(b), 214(d), 219(b), 220(d), 223(b),
364(a), 364(b), 386(a), 386(b), 506, and 634 of the Communications
Act. The remaining provisions of this section are applicable to such
conduct.
(b) * * *
(3) Any person determined to have violated section 227(e) of the
Communications Act or the rules issued by the Commission under section
227(e) of the Communications Act shall be liable to the United States
for a forfeiture penalty of not more than $10,000 for each violation or
three times that amount for each day of a continuing violation, except
that the amount assessed for any continuing violation shall not exceed
a total of $1,000,000 for any single act or failure to act. Such
penalty shall be in addition to any other forfeiture penalty provided
for by the Communications Act.
(4) In any case not covered by paragraphs (b)(1), (b)(2) or (b)(3)
of this section, the amount of any forfeiture penalty determined under
this section shall not exceed $16,000 for each violation or each day of
a continuing violation, except that the amount assessed for any
continuing violation shall not exceed a total of $112,500 for any
single act or failure to act described in paragraph (a) of this
section.
* * * * *
Note to paragraph (b)(5): Guidelines for Assessing Forfeitures.
The Commission and its staff may use these guidelines in particular
cases. The Commission and its staff retain the discretion to issue a
higher or lower forfeiture than provided in the guidelines, to issue
no forfeiture at all, or to apply alternative or additional
sanctions as permitted by the statute. The forfeiture ceilings per
violation or per day for a continuing violation stated in section
503 of the Communications Act and the Commission's rules are
described in Sec. 1.80(b)(5)(iii). These statutory maxima became
effective September 2, 2008. Forfeitures issued under other sections
of the Act are dealt with separately in section III of this note.
Section I. Base Amounts for Section 503 Forfeitures
[[Page 43204]]
------------------------------------------------------------------------
Violation
Forfeitures amount
------------------------------------------------------------------------
Misrepresentation/lack of candor........................ (\1\)
Construction and/or operation without an instrument of $10,000
authorization for the service..........................
Failure to comply with prescribed lighting and/or 10,000
marking................................................
Violation of public file rules.......................... 10,000
Violation of political rules: reasonable access, lowest 9,000
unit charge, equal opportunity, and discrimination.....
Unauthorized substantial transfer of control............ 8,000
Violation of children's television commercialization or 8,000
programming requirements...............................
Violations of rules relating to distress and safety 8,000
frequencies............................................
False distress communications........................... 8,000
EAS equipment not installed or operational.............. 8,000
Alien ownership violation............................... 8,000
Failure to permit inspection............................ 7,000
Transmission of indecent/obscene materials.............. 7,000
Interference............................................ 7,000
Importation or marketing of unauthorized equipment...... 7,000
Exceeding of authorized antenna height.................. 5,000
Fraud by wire, radio or television...................... 5,000
Unauthorized discontinuance of service.................. 5,000
Use of unauthorized equipment........................... 5,000
Exceeding power limits.................................. 4,000
Failure to respond to Commission communications......... 4,000
Violation of sponsorship ID requirements................ 4,000
Unauthorized emissions.................................. 4,000
Using unauthorized frequency............................ 4,000
Failure to engage in required frequency coordination.... 4,000
Construction or operation at unauthorized location...... 4,000
Violation of requirements pertaining to broadcasting of 4,000
lotteries or contests..................................
Violation of transmitter control and metering 3,000
requirements...........................................
Failure to file required forms or information........... 3,000
Failure to make required measurements or conduct 2,000
required monitoring....................................
Failure to provide station ID........................... 1,000
Unauthorized pro forma transfer of control.............. 1,000
Failure to maintain required records.................... 1,000
------------------------------------------------------------------------
\1\Statutory Maximum for each Service.
Violations Unique to the Service
------------------------------------------------------------------------
Violation Services affected Amount
------------------------------------------------------------------------
Unauthorized conversion of Common Carrier............ $40,000
long distance telephone
service.
Violation of operator Common Carrier............ 7,000
services requirements.
Violation of pay-per-call Common Carrier............ 7,000
requirements.
Failure to implement rate Cable..................... 7,500
reduction or refund order.
Violation of cable program Cable..................... 7,500
access rules.
Violation of cable leased Cable..................... 7,500
access rules.
Violation of cable cross- Cable..................... 7,500
ownership rules.
Violation of cable broadcast Cable..................... 7,500
carriage rules.
Violation of pole attachment Cable..................... 7,500
rules.
Failure to maintain Broadcast................. 7,000
directional pattern within
prescribed parameters.
Violation of main studio Broadcast................. 7,000
rule.
Violation of broadcast hoax Broadcast................. 7,000
rule.
AM tower fencing............ Broadcast................. 7,000
Broadcasting telephone Broadcast................. 4,000
conversations without
authorization.
Violation of enhanced Broadcast................. 2,000
underwriting requirements.
------------------------------------------------------------------------
Section II. Adjustment Criteria for Section 503 Forfeitures
Upward Adjustment Criteria
(1) Egregious misconduct.
(2) Ability to pay/relative disincentive.
(3) Intentional violation.
(4) Substantial harm.
(5) Prior violations of any FCC requirements.
(6) Substantial economic gain.
(7) Repeated or continuous violation.
Downward Adjustment Criteria
(1) Minor violation.
(2) Good faith or voluntary disclosure.
(3) History of overall compliance.
(4) Inability to pay.
Section III. Non-Section 503 Forfeitures That Are Affected by the
Downward Adjustment Factors
Unlike section 503 of the Act, which establishes maximum forfeiture
amounts, other sections of the Act, with two exceptions, state
prescribed amounts of forfeitures for violations of the relevant
section. These amounts are then subject to mitigation or remission
under section 504 of the Act. One exception is section 223 of the Act,
which provides a maximum forfeiture per day. For convenience, the
Commission will treat this amount as if it were a prescribed base
amount, subject to downward adjustments. The other exception is section
227(e) of the Act, which provides maximum forfeitures per violation,
and for
[[Page 43205]]
continuing violations. The Commission will apply the factors set forth
in section 503(b)(2)(E) of the Act and section III of this note to
determine the amount of the penalty to assess in any particular
situation. The following amounts are adjusted for inflation pursuant to
the Debt Collection Improvement Act of 1996 (DCIA), 28 U.S.C. 2461.
These non-section 503 forfeitures may be adjusted downward using the
``Downward Adjustment Criteria'' shown for section 503 forfeitures in
section II of this note.
------------------------------------------------------------------------
Violation Statutory amount ($)
------------------------------------------------------------------------
Sec. 202(c) Common Carrier 9,600, 530/day.
Discrimination.
Sec. 203(e) Common Carrier Tariffs..... 9,600, 530/day.
Sec. 205(b) Common Carrier 18,200.
Prescriptions.
Sec. 214(d) Common Carrier Line 1,320/day.
Extensions.
Sec. 219(b) Common Carrier Reports..... 1,320.
Sec. 220(d) Common Carrier Records & 9,600/day.
Accounts.
Sec. 223(b) Dial-a-Porn................ 75,000/day.
Sec. 227(e)............................ 10,000/violation.
30,000/day for each day of
continuing violation, up to 1
million for any single act or
failure to act.
Sec. 364(a) Forfeitures (Ships)........ 7,500 (owner).
Sec. 364(b) Forfeitures (Ships)........ 1,100 (vessel master).
Sec. 386(a) Forfeitures (Ships)........ 7,500/day (owner).
Sec. 386(b) Forfeitures (Ships)........ 1,100 (vessel master).
Sec. 634 Cable EEO..................... 650/day.
------------------------------------------------------------------------
* * * * *
(c) * * *
(3) In the case of a forfeiture imposed under section 227(e), no
forfeiture will be imposed if the violation occurred more than 2 years
prior to the date on which the appropriate notice is issued.
* * * * *
(d) Preliminary procedure in some cases; citations. Except for a
forfeiture imposed under subsection 227(e)(5) of the Act, no forfeiture
penalty shall be imposed upon any person under this section of the Act
if such person does not hold a license, permit, certificate, or other
authorization issued by the Commission, and if such person is not an
applicant for a license, permit, certificate, or other authorization
issued by the Commission, unless, prior to the issuance of the
appropriate notice, such person:
(1) Is sent a citation reciting the violation charged;
(2) Is given a reasonable opportunity (usually 30 days) to request
a personal interview with a Commission official, at the field office
which is nearest to such person's place of residence; and
(3) Subsequently engages in conduct of the type described in the
citation. However, a forfeiture penalty may be imposed, if such person
is engaged in (and the violation relates to) activities for which a
license, permit, certificate, or other authorization is required or if
such person is a cable television operator, or in the case of
violations of section 303(q), if the person involved is a nonlicensee
tower owner who has previously received notice of the obligations
imposed by section 303(q) from the Commission or the permittee or
licensee who uses that tower. Paragraph (c) of this section does not
limit the issuance of citations. When the requirements of this
paragraph have been satisfied with respect to a particular violation by
a particular person, a forfeiture penalty may be imposed upon such
person for conduct of the type described in the citation without
issuance of an additional citation.
* * * * *
PART 64--MISCELLANEOUS RULES RELATING TO COMMON CARRIERS
0
3. The authority citation for part 64 is revised to read as follows:
Authority: 47 U.S.C. 154, 254(k), 227; secs. 403(b)(2)(B), (c),
Pub. L. 104-104, 100 Stat. 56. Interpret or apply 47 U.S.C. 201,
218, 222, 225, 226, 207, 228, and 254(k) unless otherwise noted.
0
4. Section 64.1600 is amended by redesignating paragraphs (c), (d),
(e), and (f) as paragraphs (e), (f), (i), and (j) respectively and by
adding new paragraphs (c), (d), (g), and (h) to read as follows:
Sec. 64.1600 Definitions.
* * * * *
(c) Caller identification information. The term ``caller
identification information'' means information provided by a caller
identification service regarding the telephone number of, or other
information regarding the origination of, a call made using a
telecommunications service or interconnected VoIP service.
(d) Caller identification service. The term ``caller identification
service'' means any service or device designed to provide the user of
the service or device with the telephone number of, or other
information regarding the origination of, a call made using a
telecommunications service or interconnected VoIP service.
* * * * *
(g) Information regarding the origination. The term ``information
regarding the origination'' means any:
(1) Telephone number;
(2) Portion of a telephone number, such as an area code;
(3) Name;
(4) Location information;
(5) Billing number information, including charge number, ANI, or
pseudo-ANI; or
(6) Other information regarding the source or apparent source of a
telephone call.
(h) Interconnected VoIP service. The term ``interconnected VoIP
service'' has the same meaning given the term ``interconnected VoIP
service'' in 47 CFR 9.3 as it currently exists or may hereafter be
amended.
* * * * *
Sec. 64.1604 [Redesignated as Sec. 64.1605]
0
5. Section 64.1604 is redesignated as section 64.1605, and a new
section 64.1604 is added to read as follows:
Sec. 64.1604 Prohibition on transmission of inaccurate or misleading
caller identification information.
(a) No person or entity in the United States shall, with the intent
to defraud, cause harm, or wrongfully obtain anything of value,
knowingly cause, directly or indirectly, any caller identification
service to transmit or display misleading or inaccurate caller
identification information.
(b) Exemptions. Paragraph (a) of this section shall not apply to:
[[Page 43206]]
(1) Lawfully authorized investigative, protective, or intelligence
activity of a law enforcement agency of the United States, a State, or
a political subdivision of a State, or of an intelligence agency of the
United States; or
(2) Activity engaged in pursuant to a court order that specifically
authorizes the use of caller identification manipulation.
(c) A person or entity that blocks or seeks to block a caller
identification service from transmitting or displaying that person or
entity's own caller identification information pursuant to Sec.
64.1601(b) of this part shall not be liable for violating the
prohibition in paragraph (a) of this section. This paragraph (c) does
not relieve any person or entity that engages in telemarketing, as
defined in Sec. 64.1200(f)(10) of this part, of the obligation to
transmit caller identification information under Sec. 64.1601(e).
[FR Doc. 2011-18165 Filed 7-19-11; 8:45 am]
BILLING CODE 6712-01-P
|