cpni filling documents - 2014 - rules and compliances

Upload: federal-communications-commission-fcc

Post on 03-Jun-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/12/2019 CPNI Filling Documents - 2014 - Rules and Compliances

    1/14

    Author: Thiago D. Modelli Revision: CPNI2014.3 Created on: 2.28.2014Status: Draft Certification docket Modified on: N/ACPNI Policies & ProceduresAnnual statement of FCC CPNI rule compliance

    1 |P a g e

    This document is proprietary and confidential.

    Copyright ownership of ESI. All rights reserved.

    Annual statement of PCC CPNI rule

    compliance - 2014

  • 8/12/2019 CPNI Filling Documents - 2014 - Rules and Compliances

    2/14

    Author: Thiago D. Modelli Revision: CPNI2014.3 Created on: 2.28.2014Status: Draft Certification docket Modified on: N/ACPNI Policies & ProceduresAnnual statement of FCC CPNI rule compliance

    2 |P a g e

    This document is proprietary and confidential.

    Copyright ownership of ESI. All rights reserved.

    Revision HistoryVersion Date Author ModificationsD001 2.28.2014 Bob Russo Document initiationNew template execution

  • 8/12/2019 CPNI Filling Documents - 2014 - Rules and Compliances

    3/14

    Author: Thiago D. Modelli Revision: CPNI2014.3 Created on: 2.28.2014Status: Draft Certification docket Modified on: N/ACPNI Policies & ProceduresAnnual statement of FCC CPNI rule compliance

    3 |P a g e

    This document is proprietary and confidential.

    Copyright ownership of ESI. All rights reserved.

    Table of contents

    1. Introduction ____________________________________________________________________ 4

    2. Stakeholders ____________________________________________________________________ 4

    2.1. Companies & Affiliates ______________________________________________________________ 4

    2.2. People & Roles _____________________________________________________________________ 4

    3. Statement ______________________________________________________________________ 4

    3.1. Duty to Protect CPNI ________________________________________________________________ 4

    3.2. Our Own Use of CPNI ________________________________________________________________ 5

    3.2.1. Marketing _______________________________________________________________________________ 53.2.2. Provision of services ______________________________________________________________________ 5

    3.3. Authenticating customers before disclosing CPNI _________________________________________ 6

    3.3.1. Telephone _______________________________________________________________________________ 7

    3.3.2. In Person Authentication ___________________________________________________________________ 8

    3.3.3. By mail _________________________________________________________________________________ 8

    3.3.4. Online access ____________________________________________________________________________ 8

    3.4. Customer Notification of CPNI Rights ___________________________________________________ 8

    3.5. Training and Discipline ______________________________________________________________ 9

    3.6. Record keeping ____________________________________________________________________ 9

    3.7. Notification of account changes _______________________________________________________ 9

    3.8. Unauthorized disclosure of CPNI ______________________________________________________ 9

    4. Requirements, Baseline & Definition _______________________________________________ 10

    4.1. 47 CFR 64 ________________________________________________________________________ 10

    4.2. Definitions _______________________________________________________________________ 11

    Attachment I ________________________________________________ Error! Bookmark not defined.

  • 8/12/2019 CPNI Filling Documents - 2014 - Rules and Compliances

    4/14

    Author: Thiago D. Modelli Revision: CPNI2014.3 Created on: 2.28.2014Status: Draft Certification docket Modified on: N/ACPNI Policies & ProceduresAnnual statement of FCC CPNI rule compliance

    4 |P a g e

    This document is proprietary and confidential.

    Copyright ownership of ESI. All rights reserved.

    1. IntroductionCustomer proprietary network information (CPNI) is the data collected by telecommunications companies about

    a consumer's telephone calls. It includes the time, date, duration and destination number of each call, the typeof network a consumer subscribes to, and any other information that appears on the consumer's telephone bill.

    The FCC regulations on the release of this information are strict. We must be sure that we release no call

    information to any party that is not properly authorized. We can verify information that is given to us and if a

    specific call is identified to us (such as from which number, the number dialed and the time of the call) we can

    discuss that particular call but otherwise we cannot reveal phone numbers, IP addressing or routing details.

    2. Stakeholders2.1. Companies & Affiliates ESI hosted Services, LLC499 ID: Estech Systems, Inc.2.2. People & Roles George PlattExecutive ReviewerCEO/President Karen boydLegal Counsel - Officer Bob RussoProcess CreatorNetwork Operations Manager Thiago ModelliProcess ownerDirector of Operations

    3. StatementESI Hosted Services, LLC has created a CPNI Policy set containing procedures that it has adopted to ensure the

    protection of CPNI. The handbook describes our procedures in greater detail and provides practical guidance on

    how to protect against unauthorized disclosure or use of CPN. The policy documentation is distributed to our

    employees during training and serves as an important reference tool for our employees.

    3.1. Duty to Protect CPNIWe as a communications company recognize our duty to protect customer CPN!. We may not disclose CPNI

    to unauthorized persons, nor may we use CPNI in certain ways without consent from our customers. Before

    we can provide customers with their own CPNI, we must authenticate the customer.

    We recognize that there are a few cases in which we can disclose CPNI without first obtaining customer

    approval:

    a. Administrative use: We may use CPNI to initiate, render, bill and collect for communications services.b. Protection of carrier and third parties: We may use CPNI to protect the interests of our company, such

    as to prevent fraud or illegal use of our systems and network. Employees are notified of the steps to

    take, if any, in these sorts of situations.

  • 8/12/2019 CPNI Filling Documents - 2014 - Rules and Compliances

    5/14

    Author: Thiago D. Modelli Revision: CPNI2014.3 Created on: 2.28.2014Status: Draft Certification docket Modified on: N/ACPNI Policies & ProceduresAnnual statement of FCC CPNI rule compliance

    5 |P a g e

    This document is proprietary and confidential.

    Copyright ownership of ESI. All rights reserved.

    c. As required by law: We may disclose CPNI if we are required to by law, such as through legal process(subpoenas) or in response to requests by law enforcement. Employees are notified of any steps they

    must take in these situations.

    3.2. Our Own Use of CPNIWe may use CPNI to provide or market services to our existing customers. We understand that we are

    required to obtain customers approval prior to using CPNI in certain ways.

    3.2.1. MarketingWe understand that we do not need to obtain customer approval before using CPNI to market services

    to our existing customers within the categories of service to which the customer already subscribes.

    We understand that we may not use CPNI to market services that are in a service category to which the

    customer does not already subscribe without customer approval.We understand that we cannot use CPNI to solicit a customer to add a new category of service without first

    obtaining the customer's approval.

    We also understand that we do not need customer consent before using CPNI to market "adjunct to-basic"

    services such as speed dialing, computer-provided directory assistance, call monitoring, call tracing, call

    blocking, call return, repeat dialing, call tracking, call waiting, caller ID, call forwarding, and certain Centrex

    features.

    We understand that we may not use CPNI to identify or track customers that call competing service

    providers.

    We regularly review our marketing practices to determine when and how CPNI is used within the company,

    and whether CPNI is being shared with other entities. We also review new marketing or sales campaigns to

    ensure compliance with these CPNI policies and with the FCC's CPNI regulations. We will only share CPNI with

    our affiliate ESI Hosted Services..

    3.2.2. Provision of servicesWe understand that we do not need customer approval to use CPNI to provide CPE and call answering, voice

    mail or messaging, voice storage and retrieval services, fax store and forward, and protocol conversion.

  • 8/12/2019 CPNI Filling Documents - 2014 - Rules and Compliances

    6/14

    Author: Thiago D. Modelli Revision: CPNI2014.3 Created on: 2.28.2014Status: Draft Certification docket Modified on: N/ACPNI Policies & ProceduresAnnual statement of FCC CPNI rule compliance

    6 |P a g e

    This document is proprietary and confidential.

    Copyright ownership of ESI. All rights reserved.

    3.3. Authenticating customers before disclosing CPNIWe understand that we are required to objectively determine that our customers are who they say they arebefore disclosing CPNI to them. With this in mind, a workflow for such process has been attached as figure one

    and the required process for each access method is expressed bellow.

  • 8/12/2019 CPNI Filling Documents - 2014 - Rules and Compliances

    7/14

    Author: Thiago D. Modelli Revision: CPNI2014.3 Created on: 2.28.2014Status: Draft Certification docket Modified on: N/ACPNI Policies & ProceduresAnnual statement of FCC CPNI rule compliance

    7 |P a g e

    This document is proprietary and confidential.

    Copyright ownership of ESI. All rights reserved.

    Customer request CPNI

    information

    Does customer give

    specific call information

    You are free to dicuss details

    for call

    Yes

    Is there a Kyako ticket

    open concerning issue

    No

    You may enter details on

    existing ticket

    Yes

    Can caller create Kyako

    ticket under authorized

    log-in

    You may enter details on

    created ticket.

    No

    Yes

    Customers Person of Record must

    make written request* or allow

    authorized log-in to Kyako for caller

    No

    * Written request can come

    from the billing address of

    the account, or fromaccounts email address of

    record

    Fig. 1

    3.3.1. TelephoneWe understand that when a customer calls, we may not release call detail information, or information

    relating to the transmission of specific telephone calls until we have obtained the account password from the

    caller, or have called the customer back at the telephone number of record to ensure that the customer is

  • 8/12/2019 CPNI Filling Documents - 2014 - Rules and Compliances

    8/14

    Author: Thiago D. Modelli Revision: CPNI2014.3 Created on: 2.28.2014Status: Draft Certification docket Modified on: N/ACPNI Policies & ProceduresAnnual statement of FCC CPNI rule compliance

    8 |P a g e

    This document is proprietary and confidential.

    Copyright ownership of ESI. All rights reserved.

    who s/he says s/he is. Alternatively, we may offer to send the call detail information to the address of record

    or provide it to the customer or authorized individual in person after s/he has produced valid photo

    identification at our office.

    We understand that we may disclose non-call detail information over the telephone after authenticating thecustomer by calling back the telephone number of record, checking valid photo identification, or by mailing

    the information to the account address of record.

    3.3.2. In Person AuthenticationWe understand that before we can disclose CPNI to customers in person, the customer must present valid

    government-issued photo identification. The name on the photo identification must match the name on the

    account. If the customer cannot present the required identification, we offer to provide the requested CPNI

    by sending it to the account address of record.

    Before providing the CPNI to the customer, we make a copy of the photo identification. This copy is then

    placed in the customer's file, together with a copy of the CPNI provided to the customer. These records are

    then kept in the customer file in accordance with our record-keeping policies.

    3.3.3. By mailIf the customer requests CPNI through regular mail, or if the customer cannot comply with one of the

    authentication methods above, we send the requested information to the customer's address of record only.

    3.3.4. Online accessOnline access of CPNI data is available via password protected technics to authenticate the customer for

    direct access. Secured password reset technics via registered account email has been implemented and

    it is enforced following the same requirements as above.

    3.4. Customer Notification of CPNI RightsWe provide a CPNI privacy policy to all customers online, via our website and support tools. This policy providesnotification to each customer of his/her right to restrict use of, disclosure of, and access to that customer's

    CPNI. We provide additional copies of the CPNI privacy policy to all customers who request it and to all new

    customers upon activation of service.

    The policy contains an opt-out customer approval notice. Customers who do not wish to allow us to use their

    CPNI to market services outside their existing service categories, or who do not wish to allow us to share their

    CPNI with affiliates, have 30 days to contact us to tell us that they do not approve of this use. If we do not hear

    back from the customer within 30 days, we understand that we are free to use their CPNI for these purposes. We

    understand that customers can change their option at any time by contacting us, and we notify our customers of

    this right.

    We maintain records of the customers who received the opt-out approval notice and records of the customers

    who contacted us to opt out in accordance with our record-keeping policies.

    We understand that we must provide written notice to the FCC within five (5) business days if our opt-out

    mechanisms do not work properly to the degree that our customers' inability to opt out is more than an anomaly.

  • 8/12/2019 CPNI Filling Documents - 2014 - Rules and Compliances

    9/14

    Author: Thiago D. Modelli Revision: CPNI2014.3 Created on: 2.28.2014Status: Draft Certification docket Modified on: N/ACPNI Policies & ProceduresAnnual statement of FCC CPNI rule compliance

    9 |P a g e

    This document is proprietary and confidential.

    Copyright ownership of ESI. All rights reserved.

    3.5. Training and DisciplineWe provide our internal policy and employee handbook to every new employee, and require new and

    existing employees to sign acceptance of the employee handbook and any attached policy.Also, existingemployees are required to review and accept any existing or modified policies on a periodic basis, following

    standard company policies for hand-book distribution and acceptance.

    Violation by company employees of such CPNI requirements will lead to disciplinary action (including remedial

    training, reprimands, unfavorable performance reviews, and probation), depending upon the circumstances of

    the violation (including the severity of the violation, whether appropriate guidance was sought, and the extent to

    which the violation was or was not deliberate or malicious.

    Disciplinary records are maintained in the company files in accordance with our record-keeping policies.

    3.6. Record keepingWe maintain the following records in our files for two (2) years:

    a. Records relating to the annual mailing of the customer CPNI privacy policy;b. Records of customer approval or disapproval of CPNI use, or the limitation or revocation thereof;c. Records of disclosure or provision of CPNI to third parties for marketing purposes, including Buckland

    Telephone Company's and affiliates' sales and marketing campaigns using customer CPNI, the CPNI used, and

    what products and services were offered as part of the campaign;

    d. Employee disciplinary records; ande. Records of discovered CPNI breaches, notifications to law enforcement regarding breaches, and any

    responses from law enforcement regarding those breaches.

    3.7.

    Notification of account changesWe understand that we are required to notify customers when changes have been made to passwords, customer

    responses to back-up means of authentication, or addresses of record by mailing a notification to the account

    address of record. We do not reveal the changed account data in the notification

    3.8. Unauthorized disclosure of CPNIWe understand that we must report CPNI breaches to law enforcement no later than seven (7) business days

    after determining the breach has occurred, by sending electronic notification through the link at

    http://www.fcc.gov/eb/CPNII to the central reporting facility, which will then notify the United States Secret

    Service (USSS) and the Federal Bureau of Investigation (FBI).

    We understand that we may not notify customers or the public of the breach earlier than seven (7) days after we

    have notified law enforcement through the central reporting facility. If we wish to notify customers or the publicimmediately, where we feel that there is "an extraordinarily urgent need to notify" to avoid "immediate and

    irreparable harm," we inform law enforcement of our desire to notify and comply with law enforcement's

    directions.

    Records relating to such notifications are kept in accordance with our record-keeping policies.

    These records include: (i) the date we discovered the breach, (ii) the date we notified law enforcement, (iii) a

    detailed description of the CPNI breached, and (iv) the circumstances of the breach.

  • 8/12/2019 CPNI Filling Documents - 2014 - Rules and Compliances

    10/14

    Author: Thiago D. Modelli Revision: CPNI2014.3 Created on: 2.28.2014Status: Draft Certification docket Modified on: N/ACPNI Policies & ProceduresAnnual statement of FCC CPNI rule compliance

    10 |P a g e

    This document is proprietary and confidential.

    Copyright ownership of ESI. All rights reserved.

    During the course of the year, we compile information regarding pretexted attempts to gain improper access to

    CPNI, including any breaches or attempted breaches. We include this information in our annual CPNI compliance

    certification filed with the FCC.

    4. Requirements, Baseline & Definition4.1. 47 CFR 64 64.2010 Safeguards on the disclosure of customer proprietary network information.

    (a)Safeguarding CPNI.Telecommunications carriers must take reasonable measures to discover and protect

    against attempts to gain unauthorized access to CPNI. Telecommunications carriers must properly authenticate

    a customer prior to disclosing CPNI based on customer-initiated telephone contact, online account access, or an

    in-store visit.

    (b)Telephone access to CPNI.Telecommunications carriers may only disclose call detail information over the

    telephone, based on customer-initiated telephone contact, if the customer first provides the carrier with a

    password, as described in paragraph (e) of this section, which is not prompted by the carrier asking for readily

    available biographical information, or account information. If the customer does not provide a password, the

    telecommunications carrier may only disclose call detail information by sending it to the customer's address of

    record, or by calling the customer at the telephone number of record. If the customer is able to provide call

    detail information to the telecommunications carrier during a customer-initiated call without the

    telecommunications carrier's assistance, then the telecommunications carrier is permitted to discuss the call

    detail information provided by the customer.

    (c)Online access to CPNI.A telecommunications carrier must authenticate a customer without the use of readilyavailable biographical information, or account information, prior to allowing the customer online access to CPNI

    related to a telecommunications service account. Once authenticated, the customer may only obtain online

    access to CPNI related to a telecommunications service account through a password, as described in paragraph

    (e) of this section, that is not prompted by the carrier asking for readily available biographical information, or

    account information.

    (d)In-store access to CPNI.A telecommunications carrier may disclose CPNI to a customer who, at a carrier's

    retail location, first presents to the telecommunications carrier or its agent a valid photo ID matching the

    customer's account information.

    (e)Establishment of a Password and Back-up Authentication Methods for Lost or Forgotten Passwords.To

    establish a password, a telecommunications carrier must authenticate the customer without the use of readily

    available biographical information, or account information. Telecommunications carriers may create a back-up

    customer authentication method in the event of a lost or forgotten password, but such back-up customer

    authentication method may not prompt the customer for readily available biographical information, or account

  • 8/12/2019 CPNI Filling Documents - 2014 - Rules and Compliances

    11/14

    Author: Thiago D. Modelli Revision: CPNI2014.3 Created on: 2.28.2014Status: Draft Certification docket Modified on: N/ACPNI Policies & ProceduresAnnual statement of FCC CPNI rule compliance

    11 |P a g e

    This document is proprietary and confidential.

    Copyright ownership of ESI. All rights reserved.

    information. If a customer cannot provide the correct password or the correct response for the back-up

    customer authentication method, the customer must establish a new password as described in this paragraph.

    (f)Notification of account changes.Telecommunications carriers must notify customers immediately whenever

    a password, customer response to a back-up means of authentication for lost or forgotten passwords, online

    account, or address of record is created or changed. This notification is not required when the customer initiates

    service, including the selection of a password at service initiation. This notification may be through a carrier-

    originated voicemail or text message to the telephone number of record, or by mail to the address of record,

    and must not reveal the changed information or be sent to the new account information.

    (g)Business customer exemption.Telecommunications carriers may bind themselves contractually to

    authentication regimes other than those described in this section for services they provide to their business

    customers that have both a dedicated account representative and a contract that specifically addresses the

    carriers' protection of CPNI.

    4.2. Definitions(a)Account information.Account information is information that is specifically connected to the customer's

    service relationship with the carrier, including such things as an account number or any component thereof, the

    telephone number associated with the account, or the bill's amount.

    (b)Address of record.An address of record, whether postal or electronic, is an address that the carrier has

    associated with the customer's account for at least 30 days.

    (c)Affiliate.The term affiliate has the same meaning given such term in section 3(1) of the Communications Act

    of 1934, as amended,47 U.S.C. 153(1).

    (d)Call detail information.Any information that pertains to the transmission of specific telephone calls,

    including, for outbound calls, the number called, and the time, location, or duration of any call and, for inbound

    calls, the number from which the call was placed, and the time, location, or duration of any call.

    (e)Communications-related services.The term communications-related services means telecommunications

    services, information services typically provided by telecommunications carriers, and services related to theprovision or maintenance of customer premises equipment.

    (f)Customer.A customer of a telecommunications carrier is a person or entity to which the telecommunications

    carrier is currently providing service.

    http://www.law.cornell.edu/uscode/text/47/153#1http://www.law.cornell.edu/uscode/text/47/153#1http://www.law.cornell.edu/uscode/text/47/153#1http://www.law.cornell.edu/uscode/text/47/153#1
  • 8/12/2019 CPNI Filling Documents - 2014 - Rules and Compliances

    12/14

    Author: Thiago D. Modelli Revision: CPNI2014.3 Created on: 2.28.2014Status: Draft Certification docket Modified on: N/ACPNI Policies & ProceduresAnnual statement of FCC CPNI rule compliance

    12 |P a g e

    This document is proprietary and confidential.

    Copyright ownership of ESI. All rights reserved.

    (g)Customer proprietary network information (CPNI).The term customer proprietary networkinformation

    (CPNI) has the same meaning given to such term in section 222(h)(1) of the Communications Act of 1934, as

    amended,47 U.S.C. 222(h)(1).

    (h)Customer premises equipment (CPE).The term customer premises equipment (CPE) has the same meaning

    given to such term in section 3(14) of the Communications Act of 1934, as amended,47 U.S.C. 153(14).

    (i)Information services typically provided by telecommunications carriers.The phrase information services

    typically provided by telecommunications carriers means only those information services (as defined in section

    3(20) of the Communication Act of 1934, as amended,47 U.S.C. 153(20))that are typically provided by

    telecommunications carriers, such as Internet access or voice mail services. Such phrase information services

    typically provided by telecommunications carriers, as used in this subpart, shall not include retail consumer

    services provided using Internet Web sites (such as travel reservation services or mortgage lending services),

    whether or not such services may otherwise be considered to be information services.

    (j)Local exchange carrier (LEC).The term local exchange carrier (LEC) has the same meaning given to such term

    in section 3(26) of the Communications Act of 1934, as amended,47 U.S.C. 153(26).

    (k)Opt-in approval.The term opt-in approval refers to a method for obtaining customer consent to use,

    disclose, or permit access to the customer's CPNI. This approval method requires that the carrier obtain from the

    customer affirmative, express consent allowing the requested CPNI usage, disclosure, or access after the

    customer is provided appropriate notification of the carrier's request consistent with the requirements set forth

    in this subpart.

    (l)Opt-out approval.The term opt-out approval refers to a method for obtaining customer consent to use,

    disclose, or permit access to the customer's CPNI. Under this approval method, a customer is deemed to have

    consented to the use, disclosure, or access to the customer's CPNI if the customer has failed to object thereto

    within the waiting period described in 64.2008(d)(1)after the customer is provided appropriate notification of

    the carrier's request for consent consistent with the rules in this subpart.

    (m)Readily available biographical information.Readily available biographical information is information

    drawn from the customer's life history and includes such things as the customer's social security number, or thelast four digits of that number; mother's maiden name; home address; or date of birth.

    (n)Subscriber list information (SLI).The term subscriber list information (SLI) has the same meaning given to

    such term in section 222(h)(3) of the Communications Act of 1934, as amended,47 U.S.C. 222(h)(3).

    http://www.law.cornell.edu/uscode/text/47/222#h_1http://www.law.cornell.edu/uscode/text/47/222#h_1http://www.law.cornell.edu/uscode/text/47/222#h_1http://www.law.cornell.edu/uscode/text/47/153#14http://www.law.cornell.edu/uscode/text/47/153#14http://www.law.cornell.edu/uscode/text/47/153#14http://www.law.cornell.edu/uscode/text/47/153#20http://www.law.cornell.edu/uscode/text/47/153#20http://www.law.cornell.edu/uscode/text/47/153#20http://www.law.cornell.edu/uscode/text/47/153#26http://www.law.cornell.edu/uscode/text/47/153#26http://www.law.cornell.edu/uscode/text/47/153#26http://www.law.cornell.edu/cfr/text/47/64.2008#d_1http://www.law.cornell.edu/cfr/text/47/64.2008#d_1http://www.law.cornell.edu/cfr/text/47/64.2008#d_1http://www.law.cornell.edu/uscode/text/47/222#h_3http://www.law.cornell.edu/uscode/text/47/222#h_3http://www.law.cornell.edu/uscode/text/47/222#h_3http://www.law.cornell.edu/uscode/text/47/222#h_3http://www.law.cornell.edu/cfr/text/47/64.2008#d_1http://www.law.cornell.edu/uscode/text/47/153#26http://www.law.cornell.edu/uscode/text/47/153#20http://www.law.cornell.edu/uscode/text/47/153#14http://www.law.cornell.edu/uscode/text/47/222#h_1
  • 8/12/2019 CPNI Filling Documents - 2014 - Rules and Compliances

    13/14

    Author: Thiago D. Modelli Revision: CPNI2014.3 Created on: 2.28.2014Status: Draft Certification docket Modified on: N/ACPNI Policies & ProceduresAnnual statement of FCC CPNI rule compliance

    13 |P a g e

    This document is proprietary and confidential.

    Copyright ownership of ESI. All rights reserved.

    (o)Telecommunications carrier or carrier.The terms telecommunications carrier or carrier shall have the

    same meaning as set forth in section 3(44) of the Communications Act of 1934, as amended,47 U.S.C. 153(44).

    For the purposes of this subpart, the term telecommunications carrier or carrier shall include an entity thatprovides interconnected VoIP service, as that term is defined in section 9.3 of these rules.

    (p)Telecommunications service.The term telecommunications service has the same meaning given to such

    term in section 3(46) of the Communications Act of 1934, as amended,47 U.S.C. 153(46).

    (q)Telephone number of record.The telephone number associated with the underlying service, not the

    telephone number supplied as a customer's contact information.

    (r)Valid photo ID.A valid photo ID is a government-issued means of personal identification with a photograph

    such as a driver's license, passport, or comparable ID that is not expired.

    [72 FR 31961,June 8, 2007]

    http://www.law.cornell.edu/uscode/text/47/153#44http://www.law.cornell.edu/uscode/text/47/153#44http://www.law.cornell.edu/uscode/text/47/153#44http://www.law.cornell.edu/uscode/text/47/153#46http://www.law.cornell.edu/uscode/text/47/153#46http://www.law.cornell.edu/uscode/text/47/153#46http://frwebgate.access.gpo.gov/cgi-bin/getpage.cgi?dbname=2007_register&position=all&page=31961http://frwebgate.access.gpo.gov/cgi-bin/getpage.cgi?dbname=2007_register&position=all&page=31961http://frwebgate.access.gpo.gov/cgi-bin/getpage.cgi?dbname=2007_register&position=all&page=31961http://frwebgate.access.gpo.gov/cgi-bin/getpage.cgi?dbname=2007_register&position=all&page=31961http://www.law.cornell.edu/uscode/text/47/153#46http://www.law.cornell.edu/uscode/text/47/153#44
  • 8/12/2019 CPNI Filling Documents - 2014 - Rules and Compliances

    14/14

    Author: Thiago D. Modelli Revision: CPNI2014.3 Created on: 2.28.2014Status: Draft Certification docket Modified on: N/ACPNI Policies & ProceduresAnnual statement of FCC CPNI rule compliance

    14 |P a g e

    This document is proprietary and confidential.

    Copyright ownership of ESI. All rights reserved.