Message-ID: <20230309212831.GA1720183@telecomdigest.us>
Date: Thu, 9 Mar 2023 16:28:31 -0500
From: Bill Horne <malQRMassimilation@gmail.com>
Subject: Mini-TCPA Laws You Should Know And That May Be Coming Soon
In 2023
By Brooks R. Brown (Boston) , W. Kyle Tayman (Washington), Christina
L. Hennecken (Boston) and Briana Adams-Seaton (New York)
In April 2021, the US Supreme Court issued its decision in Facebook
v. Duguid narrowly construing the Telephone Consumer Protection Act's
(TCPA) "automatic telephone dialing system" definition. In so doing,
the Supreme Court effectively brought an end to the flood of TCPA
lawsuits alleging violations of the statute's restrictions on calls
and texts made with an autodialer. Just two months later, however,
Florida responded to the Supreme Court's decision by enacting a
"mini-TCPA" that broadly (and vaguely) restricts certain telemarketing
calls and texts made to Florida residents (and other persons in
Florida) using an "automated system for the selection or dialing of
telephone numbers." The effect in Florida has been a substantial
uptick in lawsuits targeting allegedly unwanted telemarketing calls
and texts made with an autodialer. Now, more states are following
Florida's lead of tightening telemarketing restrictions by enacting or
proposing their own mini-TCPA laws. Companies engaged in telemarketing
by call or text in any of these states should be aware of these new
and emerging laws. As detailed below, these laws impose stricter
prohibitions than the TCPA, contain the same (or greater) penalties
for violations (e.g., 500ドル to 1,500ドル per violative call or text), and
employ potentially broader definitions of what constitutes an
autodialer, as the Florida mini-TCPA does. As more states follow and
expound on Florida's lead, there is likely to be increased mini-TCPA
litigation at the state level.
https://www.mondaq.com/article/news/1290090?q=1803232&n=722&tp=2&tlk=8&lk=23
--
(Please remove QRM for direct replies)
Message-ID: <tug87r24ドルidf2ドル@dont-email.me>
Date: 10 Mar 2023 16:42:18 -0500
From: Bill Horne <malQRMassimilation@gmail.com>
Subject: AT&T informs 9M customers about data breach
The company’s marketing vendor suffered a security failure in January
and exposed CPNI data that included first names, wireless account
numbers, wireless phone numbers, and email addresses.
By Apurva Venkat
AT&T is informing customers about a data breach at a vendor’s system
that allowed threat actors to gain access to AT&T’s Customer Proprietary
Network Information (CPNI).
The incident came to light after customers posted the email
communication from AT&T on community forums to know if it was legitimate
or email fraud.
https://www.csoonline.com/article/3690609/att-informs-9m-customers-about-data-breach.html
--
(Please remove QRM for direct replies)
Message-ID: <tug82i24ドルidf1ドル@dont-email.me>
Date: 10 Mar 2023 16:39:30 -0500
From: Bill Horne <malQRMassimilation@gmail.com>
Subject: Verizon, AT&T, T-Mobile, and Dish have all been targets of
hacks this year
By Mike Dano
2023 is shaping up to be the year of telecom hacks. All of the big 5G
operators in the US – Verizon, T-Mobile, AT&T and Dish Network – have
been involved in some kind of security incident already this year.
Broadly, the situation doesn't come as a surprise. Hacks and other
cybersecurity troubles have become de rigueur among corporate America in
recent years as aging IT infrastructure struggles to withstand dramatic
increases in the scope and scale of cyber attacks.
https://www.lightreading.com/security/verizon-atandt-t-mobile-and-dish-have-all-been-targets-of-hacks-this-year/d/d-id/783768
--
(Please remove QRM for direct replies)