Other Developments, Further Reading, and Coming Events (20 May 2021)

Subscribe to my newsletter, The Wavelength, if you want updates on global technology developments four times a week.

Other Developments

  • The White House has made a bit more information available on the specifics of the American Jobs Plan, some of which has been revealed elsewhere. In a fact sheet, the administration asserted “President Biden has made strengthening U.S. cybersecurity capabilities a top priority and has already taken action to advance it, including with last week’s Executive Order.” The White House claimed “[t]he American Jobs Plan will build on that work and deliver resilient infrastructure for the American people, including a renewed electric grid…[and] will allocate opportunities and resources to bolster cyber defenses.” The administration also issued a fact sheet on “the Future of Transportation and Manufacturing.” The White House summarized the cybersecurity funding and some programmatic changes it wants in an infrastructure package:
    • Make $20 billion in Energy Infrastructure Investments for State, Local, and Tribal Governments Contingent on Cyber Modernization: Governors, mayors, and legislators have embraced ambitious energy system modernization goals that have already driven significant private investment into grid upgrades, clean electricity, and U.S. cybersecurity. This $20 billion investment in DOE-administered energy system modernization block grants would support critical infrastructure – additional grid resilience, clean electricity, and cybersecurity efforts – and spur early action by state and local governments that creates a favorable environment for increased private investment, creating jobs, reducing pollution, and boosting security. 
    • Promote a secure network with the American Jobs Plan’s historic $100 billion broadband investment. President Biden’s American Jobs Plan will bring affordable, reliable, high-speed broadband to every American. This historic investment will also promote network security. Grant recipients will be asked to source from “trusted vendors” and give preference to open, interoperable architecture where feasible, and implement cybersecurity consistent with approaches and priorities described in the Executive Order on Cybersecurity of May 12, 2021.
    • Create a new tax credit for transmission infrastructure that will help finance cyber technologies for the electric grid. President Biden’s American Jobs Plan includes a targeted investment tax credit that incentivizes the buildout of at least 20 gigawatts of high-voltage capacity power lines and mobilizes tens of billions in private capital off the sidelines – right away. These tax credits will also encourage stronger cybersecurity capabilities.
    • Safeguard critical infrastructure and grid resilience. The American Jobs Plan devotes $2 billion to support micro-grids and distributed energy infrastructure for grid resilience in areas with high risk of power outages, critical infrastructure, and front-line communities. These funds will also be used for transmission risk reduction, including planning grants, scale up grants, efforts for winterization and floods, and supply chain readiness (including equipment reserves). As cybersecurity is a core part of resilience, this funding will be contingent on meeting and maintaining compliance with modern sensor and reporting requirements, with a portion of the funding reserved for investments in standalone infrastructure and networks with tight cybersecurity controls, including tightly gated access to the Internet. And, similar to clean energy block grants and the tax credit for transmission infrastructure, these funds will require recipients to install cybersecurity capabilities that detect and block malicious cyber activity.   
    • Expand and improve the technology modernization fund. The President’s American Rescue Plan included $1 billion for the Technology Modernization Fund, which will be used to deploy immediate security upgrades, facilitate a shift to a secure cloud infrastructure, improve the foundational technology used across the federal government, and assist agencies in delivering services to the American people. 
    • Improve security monitoring and incident response activities. The American Rescue Plan provided $650M to the Cyber Security and Information Security Agency (CISA), which will be used to improve CISAs response capabilities, upgrade its ability to support security projects at agencies and departments, and deploy modern endpoint protections for the federal civilian networks. 
  • The Federal Communications Commission (FCC) is “seeking comment on the impact the continuing global shortage of semiconductors may have on the U.S. communications sector and on FCC initiatives.” Specifically, the FCC’s the Wireless Telecommunications Bureau “seeks comment on the impact of semiconductor supply chain constraints and other supply chain challenges on the communications sector, on Commission priorities and initiatives, and on steps the Commission can take to ensure a resilient supply chain for communications technologies now and in the future” and posed these questions:
    • Has the global semiconductor shortage spread to the communications sector?  If so, to what segments?  What are the impacts on lead times and costs of communications equipment and devices?  Are there other industry trends that are relevant?
    • What is the nature and extent of semiconductor shortages or shortages of other components that are critical to the communications sector?  What is the short- and long-term capacity of manufacturers of semiconductors and semiconductor components to keep up with the communication sector’s demand?  How long is the current shortage expected to last? 
    • Which semiconductor technology nodes in particular have been impacted or are expected to be impacted by the shortage?  Which technology nodes are important to the short- and long-term needs of the communications sector?
    • What are the factors impacting the supply of semiconductors and other manufacturing components which are critical to the communications sector?  Commenters should consider the ongoing COVID-19 pandemic, the availability of materials, manufacturing capacity, shipping, rapidly increasing demand for particular types of products, excessive reliance on certain manufacturers for critical semiconductor components, and any other factors impacting these markets. 
    • To what extent are supply constraints impacting different uses of semiconductors, such as systems-on-a-chip, microprocessors, memory chips, and standard chips?
    • What are the impacts of shortages of semiconductors or other critical components on the communications sector, including on consumers, enterprise system users, private network operators (such as critical infrastructure), and service providers?  To what extent are these shortages driving changes to stakeholders’ plans and priorities and resulting in changes to the communications industry more broadly?
    • What are the impacts of these shortages on the public interest?  How do these challenges affect the security of the United States and its competitiveness in the global economy?  How do these challenges impact the deployment of next-generation networks and technologies?  How do these challenges affect communities of color, economically distressed areas, and small businesses?
    • What are the effects of semiconductor shortages on remote learning, telehealth, and other services that have moved online during the pandemic?
    • What are the potential impacts of the failure to sustain reliable access to semiconductors for the communications sector, including the impact on key vertical markets? 
    • What steps can be taken by the Commission, either working on its own or in concert with Federal partners, to help address these current challenges? 
    • What steps can be taken to prevent similar challenges in the future, particularly those challenges related to unanticipated, catastrophic, global events?  How can the Commission help to ensure that the benefits of United States leadership in semiconductor manufacturing will flow to all Americans?
  • The United Kingdom’s Information Commissioner’s Office (ICO) and the Competition and Markets Authority (CMA) have published a joint statement on “Competition and data protection in digital markets.” The ICO and CMA explained:
    • This document provides our shared view that our overlapping objectives regarding competition and data protection in the context of the digital economy are strongly aligned and complementary. There are several factors that support this conclusion:
      • First, more competitive markets will deliver the outcomes that consumers care about most, which increasingly includes enhanced privacy and greater control over personal data.
      • Second, we have concluded that this relationship is mutually reinforcing. Well-designed regulation and standards that preserve individuals’ privacy and place individuals in control of their personal data can promote positive competitive outcomes. In turn, with appropriate and targeted regulation, competitive pressures can be harnessed to incentivise responsible innovations that protect and support users.
      • Third, the creation of a level playing field is fundamental for enabling effective competition to thrive. Data protection law helps to achieve a level playing field with regards to data access, by ensuring that processing of personal data by all parties is fair and lawful and individual rights are upheld.
    • The agencies added:
      • We are confident that any areas of perceived tension between competition and data protection can be overcome through careful consideration of the issues on a case-by-case basis, with consistent and appropriate application of competition and data protection law, and through close cooperation between our two organisations.
      • Reaching these conclusions has been an important step towards achieving regulatory coherence for the digital economy, but we do not intend to stop here. We recognise that digital markets are complex and can evolve quickly, and we therefore intend to continue to work together to further develop our thinking, to ground our conclusions in the context of real-world examples, and to ensure that our approach keeps pace with market developments.
      • We also recognise that these matters are of global relevance, and we will continue to engage with our respective international counterparts and relevant fora around the world to build consensus and promote global regulatory coherence and collaboration.
      • We will also continue the work we set out to undertake in the DRCF’s recently published workplan including developing a more holistic view of how the digital advertising sector, and advertising funded business models, interact with potential consumer and citizen harms.
      • Our ongoing collaboration will not be confined to building understanding. We have provided two examples in this statement of projects where we are committed to consulting one another to ensure the synergies identified in this statement can be maximised, and any tensions overcome.
      • Our views will evolve as we progress this work and we will keep under review the benefits of expanding on this statement in the future.
  • The Department of Homeland Security’s (DHS) National Security Telecommunications Advisory Committee (NSTAC) issued a report on Communications Resiliency. NSTAC explained:
    • In May 2020, the Executive Office of the President tasked NSTAC with examining the resilience of the Nation’s communications infrastructure to better understand and address these challenges moving forward.
    • The focus of this report has shifted since the original tasking in May 2020. While the report outlines some of the challenges the Nation faces, it highlights the evolution of the ICT ecosystem toward a highly resilient environment of federated, hyperconnected, distributed networks managed via software. With the advent of 5G and other network advances, the Nation now stands at a point where not only can the ICT providers create meshed and highly resilient operating environments, but enterprises (both Government and commercial) can avail themselves of these capabilities as well. NSTAC contends the resiliency benefits of new technologies and innovations referenced in this report and supported by expert briefings throughout the study period will position the Nation’s economy to not only derive cost and operational efficiencies, but to create an environment for U.S. innovation and leadership in the global economy. As such, the recommendations in this report suggest actions the Administration can take to support the deployment, adoption, and mastery of these key technologies, putting the Nation in a better position to support the Nation’s security, economic security, and emergency preparedness goals.
  • The United Kingdom’s (UK) Department for Digital, Culture, Media and Sport (DCMS) “is calling for views on a number of measures to enhance the security of digital supply chains and third party IT services, used by firms for things such as data processing and infrastructure management.” The DCMS added:
    • The government wants views on the existing guidance for supply chain cyber risk management and is also testing the suitability of a proposed security framework for firms which manage organisations’ IT infrastructure, known as ‘Managed Service Providers’.
    • The proposals could require Managed Service Providers to meet the current Cyber Assessment Framework – a set of 14 cyber security principles designed for organisations that play a vital role in the day-to-day life of the UK.
    • The framework sets out measures organisations should take, such as:
      • Having policies to protect devices and prevent unauthorised access
      • Ensuring data is protected at rest and in transit
      • Keeping secure and accessible backups of data
      • Training staff and pursuing a positive cyber security culture.
  • Senators Amy Klobuchar (D-MN), John Kennedy (R-LA), Joe Manchin (D-WV), and Richard Burr (R-NC) reintroduced the “Social Media Privacy Protection and Consumer Rights Act” to protect the privacy of consumers’ online data. Bill text was not made available, but see here for more detail and analysis on the version introduced in the last Congress. In their press release, they asserted:
    • As online platforms capture user behavior and personal data for advertising purposes, this bill aims to enhance data privacy protections by ensuring companies give consumers control over how their personal data is being used. Specifically, the bill would give the Federal Trade Commission and state attorneys general the tools they need to hold big tech companies accountable for misuse of consumers’ data. The bill would also increase transparency and require companies to have privacy security programs. 
    • The Social Media Privacy Protection and Consumer Rights Act would:
      • Give consumers the right to opt-out and keep their information private by disabling data tracking and collection;
      • Provide users greater access to and control over their data;
      • Require terms of service agreements to be in plain language;
      • Ensure users have the ability to see what information about them has already been collected and shared;
      • Mandate that users be notified of a breach of their information within 72 hours;
      • Offer remedies for users when a breach occurs; and
      • Require that online platforms have a privacy program in place.
  • The Department of Homeland Security (DHS) issued its “Privacy Impact Assessment for the Use of Administrative Subpoenas for Cybersecurity Vulnerability Identification and Notification,” an authority the agency pushed to receive from Congress that was finally granted in the “National Defense Authorization Act for Fiscal Year 2021” (P.L. 116-283). The agency explained:
    • The U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) Cybersecurity Division (CSD) has established a process that permits CISA, pursuant to statutory authority, the use of administrative subpoenas for cybersecurity vulnerability identification and notification. This process allows CISA to issue administrative subpoenas and receive customer or subscriber contact information from service providers to identify and notify owners or operators of covered systems and devices related to critical infrastructure that have a specific security vulnerability. CISA is conducting this Privacy Impact Assessment (PIA) because responses to administrative subpoenas will include the personally identifiable information (PII) of individuals identified by subpoenaed service providers, such as Internet Service Providers (ISPs), as relevant points of contact.
    • Once a subpoena is approved and issued and CISA has received a response, CISA must notify the at-risk entity identified by the subpoena no later than seven (7) days after receiving the customer or subscriber information. The notification to the at-risk entity includes a discussion or statement that responding to or engaging with CISA is voluntary, and information about the process through which CISA identifies security vulnerabilities. CISA places no requirement on the entity to take any action on the identified vulnerability.
    • Law requires the destruction of information determined to be unrelated to critical infrastructure immediately upon providing notice to the entity, and the destruction of all PII not later than six (6) months after the date on which the subpoena response is received. When PII relates to an individual, the individual may consent to CISA retaining his or her information for future communication — but this consent will result in a new record. Upon consent for retention, the contact information will be retained in accordance with DHS/ALL/PIA-006 DHS General Contact Lists4 and DHS/ALL-002 Department of Homeland Security (DHS) Mailing and Other Lists Systems.
    • All information obtained through a subpoena must only be shared with (1) another federal department or agency for a cybersecurity purpose under the limited circumstances described below or (2) with the Department of Justice for enforcement of the subpoena. CISA may share nonpublic information obtained through the subpoena with a federal agency if CISA identifies or is notified of a cybersecurity incident involving the entity and the incident is related to the vulnerability which led to the issuance of the subpoena in the first place; CISA determines that sharing the information is necessary to allow the federal department or agency to take a law enforcement or national security action or action related to mitigating or otherwise resolving such incident; and the entity is notified (to the extent practicable consistent with national security or law enforcement interests), and consents to the sharing (although exceptions to the consent requirement may apply).
  • The Federal Trade Commission (FTC) submitted a report to Congress titled “Nixing the Fix: An FTC Report to Congress on Repair Restrictions.” The FTC explained:
    • The Commission’s concern with repair restrictions dates back more than forty years, to when the Commission’s then-Chairman testified in favor of the anti-tying provision of the Magnuson-Moss Warranty Act (the “MMWA”). The anti-tying provision, Section 102(c) of the MMWA, prohibits a warrantor of a consumer product from conditioning its warranty on the consumer’s using any article or service which is identified by brand name unless the article or service is provided for free or the warrantor obtains a waiver from the Commission. This provision, for example, bars an automobile manufacturer from voiding a warranty if a consumer has scheduled maintenance performed by someone other than the dealer, prohibits a printer manufacturer from conditioning its warranty on the purchaser’s use of the manufacturer’s branded ink, and forbids a smartphone manufacturer from voiding a warranty when a consumer has a new battery installed at a kiosk at the mall. In short, the anti-tying provision bars manufacturers from using access to warranty coverage as a way of obstructing consumers’ ability to have their consumer products maintained or repaired using third-party replacement parts and independent repair shops.
    • [W]e conclude by explaining that, based on the record before us, it is clear that repair restrictions have diluted the effectiveness of Section 102(c) and steered consumers into manufacturers’ repair networks or to replace products before the end of their useful lives. Based on a review of comments submitted and materials presented during the Workshop, there is scant evidence to support manufacturers’ justifications for repair restrictions. Moreover, the specific changes that repair advocates seek to address manufacturer repair restrictions (e.g., access to information, manuals, spare parts, and tools) are well supported by comments submitted for the record and testimony provided at the Workshop. While the car manufacturing industry has taken important steps to expand consumer choice, other industries that impose restrictions on repairs have not followed suit. The Commission will consider reinvigorated regulatory and law enforcement options, as well as consumer education. In addition to the FTC’s pursuit of efforts under its authority, the Commission stands ready to work with legislators, either at the state or federal level, to ensure that consumers and independent repair shops have appropriate access to replacement parts, instructions, and diagnostic software.
  • The Federal Bureau of Investigation (FBI) and Department of Homeland Security (DHS) submitted a report to the Judiciary, Intelligence, and Homeland Security committees in Congress titled “Strategic Intelligence Assessment and Data on Domestic Terrorism.” The FBI and DHS asserted:
    • Preventing terrorist attacks remains a top priority for both the FBI and the Department of Homeland Security (DHS). The threat posed by international and domestic threat actors has evolved significantly since 9/11. The greatest terrorism threat to the Homeland we face today is posed by lone offenders, often radicalized online, who look to attack soft targets with easily accessible weapons. Many of these violent extremists are motivated and inspired by a mix of socio-political goals and personal grievances against their targets. With this report, we are providing our strategic intelligence assessments on domestic terrorism (DT), a detailed discussion of our procedures and methods to address DT threats, as well as data on DT incidents and our investigations.
    • The FBI and DHS offered the following by way of recommendations:
      • The Biden Administration has announced a comprehensive review of domestic violent extremism, to include a review of resources, and policies within the federal government. The FBI, DHS, National Counterterrorism Center (NCTC,) and Department of Justice (DOJ) are actively participating in this review. Pending completion of this review and further consultation with DOJ leadership, the FBI has no recommendations at this time.
      • The DHS is continuing to review authorities, expertise, and resources at its disposal to identify, prevent, and mitigate threats to the Homeland from Domestic Violent Extremists (DVEs). The DHS is committed to expanding its ability to collect DVE and DT information that is publicly available through social media and other platforms, while simultaneously safeguarding privacy, civil rights, and civil liberties of all persons, in order to enhance the Department’s ability to rapidly analyze and communicate DVE and DT threats so that policy makers and our homeland security partners are enabled to take appropriate action.

Further Reading

  • China Threatens Retaliation Against Ericsson if Sweden Doesn’t Drop Huawei 5G Ban” By Stu Woo — The Wall Street Journal. Beijing is giving Sweden one last chance to reverse its ban on telecommunications-equipment giant Huawei Technologies Co., a Chinese state media outlet said, before it could retaliate against rival Ericsson AB. Ericsson’s participation in the next round of China’s massive 5G build-out is linked to whether Stockholm changes its stance on Huawei, according to the Global Times, a Chinese Communist Party publication.
  • The government wants to pay your Internet bill for a few months. Here’s what you need to do.” By Geoffrey Fowler — The Washington Post. Washington wants to pick up the tab for tens of millions of Americans’ Internet connections. That may include yours. The Emergency Broadband Benefit, or EBB, was launched Wednesday to help a surprisingly wide range of people hit economically by the coronavirus pandemic. It can pay $50 every month toward the cost of your Internet service, and it is available to all families who lost some income in the last year and earn less than $198,000, among others. With $3.2 billion up for grabs, the EBB is the largest federal program to help with Internet bills in the three decades Americans have been going online.
  • Racing the Sun to Protect America” By Dana Goward — Nextgov. One hundred years ago, on the fifteenth of May 1921, random telegraph and telephone offices in the United States and around the world suddenly burst into flames. Fuses were blown, equipment damaged, connections severed. Undersea telegraph cable service was interrupted. Aurora—as in “the northern lights”—appeared in Pasadena, California. The night sky in Boston was so bright you could read a newspaper. 
  • China’s New Privacy Regulation Reforms Tech Giants Social Retail Scene” By Tiffany Lung — Forbes. China’s five-day-long May Day ‘Golden Week’ has seen revenge spending at full effect, with domestic travels predicted to see 265 million trips made during the period, surpassing 2019 levels. Further to that, several municipalities in China such as Shanghai launched the ‘Double Five Shopping Festival’ with over 1,900 events and branded partnerships lined up for two months across shopping, tourism and entertainment venues. Beijing’s own ‘2021 Consumer Season’ also saw the government distribute billions of yuan in various coupons to stimulate consumer spending offline and online. Several major e-commerce platforms such as Tencent, JD.com, Pinduoduo and others are also supporting the program with their own digital coupons.
  • Yahoo and AOL, Early Internet Pioneers, Are Sold to Private Equity Firm” By Edmund Lee and Lauren Hirsch — The New York Times. Yahoo and AOL, kings of the early internet, saw their fortunes decline as Silicon Valley raced ahead to create new digital platforms. Google replaced Yahoo. AOL was supplanted by cable giants. Now they will become the property of private equity. Verizon, their current owner, agreed to sell them to Apollo Global Management in a deal worth $5 billion, the companies announced Monday.
  • Taiwan accuses Beijing of waging economic war against tech sector” — Al Jazeera. Taiwan’s government has accused China of waging economic warfare against the Chinese-claimed island’s technology sector by stealing intellectual property and enticing away engineers, as its parliament considers strengthening legislation to prevent such alleged activity.
  • UK tools up against China’s intel gathering” By Cristina Gallardo and Stuart Lau — Politico EU. The U.K. has realized it is going to need more than James Bond to counter Chinese influence and espionage. Beijing’s massive state-backed effort to infiltrate British companies and research institutions in the race to develop key technologies is mostly not the stuff of traditional spying. And Britain has realized that its response needs to go well beyond the intelligence services.
  • Cybersecurity Ignorance Is Dangerous” By Tara Wheeler — Foreign Policy.  In one of the biggest tech book launches of 2021, Nicole Perlroth, a cybersecurity reporter at the New York Times, published This Is How They Tell Me The World Ends to cheers from the general public, plaudits from fellow journalists, and a notable wave of criticism from many in the cybersecurity community.
  • Chinese TV maker Skyworth under fire for excessive data collection that users call spying” By Xinmei Shen — South China Morning Post. Chinese television maker Skyworth has issued an apology after a consumer found that his set was quietly collecting a wide range of private data and sending it to a Beijing-based analytics company without his consent.

Coming Events

  • On 20 May, the House Appropriations Committee’s Defense Subcommittee will hold a closed hearing on the Intelligence Community’s World Wide Threat Assessment and the FY 2022 National Intelligence Program/Military Intelligence Program Posture with these witnesses:
    • The Honorable Avril Haines, the Director of National Intelligence
    • The Honorable David M. Taylor, Performing Under Secretary of Defense for Intelligence & Security, Department of Defense
  • The Commerce, Science, and Transportation Committee will consider Eric Lander’s nomination to be the Director of the Office of Science and Technology Policy (OSTP) on 20 May.
  • The House Select Committee on the Climate Crisis will hold a 20 May hearing titled “Powering Up Clean Energy: Investments to Modernize and Expand the Electric Grid” with these witnesses:
    • Linda Apsey, President and CEO, ITC Holdings Corp. Apsey is responsible for the strategic vision and overall business operations of ITC, the largest independent electricity transmission company in the United States. Based in Michigan, the company owns and operates high-voltage transmission infrastructure in Michigan, Iowa, Minnesota, Illinois, Missouri, Kansas and Oklahoma, with plans underway to expand to Wisconsin.
    • Donnie Colston, Director, Utility Department, International Brotherhood of Electrical Workers (IBEW). Colston manages issues related to collective bargaining agreements, working conditions, safety-related work practices, and apprenticeship training. A utility lineman, he started his career in transmission and distribution construction before working as an electric troubleman. He has been a member of the IBEW Local Union 2100, which represents the employees of Louisville Gas and Electric Company (LG&E) and Kentucky Utilities Company (KU), for more than four decades.
    • Michael Skelly, Founder and President, Grid United. Skelly is a renewable energy entrepreneur and pioneer in the U.S. wind industry who currently leads Grid United, an early-stage transmission development company. He was previously the founder and president of Clean Line Energy, a company that successfully permitted some of the longest transmission lines in the United States in the last 50 years.
    • Emily Sanford Fisher, General Counsel, Corporate Secretary & Senior Vice President, Clean Energy Edison Electric Institute (EEI). Sanford Fisher manages EEI’s litigation and legal affairs at EEI, an association that represents all investor-owned electric companies in the United States. She also oversees and coordinates strategic clean energy engagement across EEI and across the federal government.
  • The House Armed Services Committee’s Cyber, Innovative Technologies, and Information Systems Subcommittee will hold a 20 May hearing titled “Reviewing Department of Defense Science and Technology Strategy, Policy, and Programs for Fiscal Year 2022: Fostering a Robust Ecosystem for Our Technological Edge” with these witnesses:
    • Ms. Barbara McQuiston, Acting, Under Secretary of Defense for Research and Engineering (USD(R&E)), Office of the Secretary of Defense
    • Dr. Philip Perconti, Deputy Assistant Secretary of the Army for Research and Technology (DASA R&T), Department of the Army
    • Ms. Joan “JJ” Johnson, Deputy Assistant Secretary of the Navy Research, Development, Test, and Engineering (DASN RDTE), Department of the Navy
    • Ms. Kristin Baldwin, Assistant Secretary of the Air Force for Acquisition, Technology and Logistics for Science Technology, and Engineering (SAF/AQR), Department of the Air Force
  • On 20 May, the House Veterans Affairs Committee’s Technology Modernization Subcommittee will hold a hearing titled “Cybersecurity and Risk Management at VA: Addressing Ongoing Challenges and Moving Forward” but no witnesses have been announced.
  • On 20 May, the Federal Communications Commission (FCC) will hold an open meeting with this tentative agenda:
    • Reducing Interstate Rates and Charges for Incarcerated People – The Commission will consider a Third Report and Order, Order on Reconsideration, and Fifth Notice of Proposed Rulemaking that, among other actions, will lower interstate rates and charges for the vast majority of incarcerated people, limit international rates for the first time, and seek comment on further reforms to the Commission’s calling services rules, including for incarcerated people with disabilities. (WC Docket No. 12-375)
    • Strengthening Support for Video Relay Service – The Commission will consider a Notice of Proposed Rulemaking and Order to set Telecommunications Relay Services (TRS) Fund compensation rates for video relay service (VRS). (CG Docket Nos. 03-123, 10-51)
    • Enforcement Bureau Action – The Commission will consider an enforcement action.
    • Enforcement Bureau Action – The Commission will consider an enforcement action.
  • On 27 July, the Federal Trade Commission (FTC) will hold PrivacyCon 2021.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s