You are on page 1of 4

Lenox Operating ProceduresScribd Upload a Document Search Documents Explore DocumentsBooks - FictionBooks - Non-fictionHealth & MedicineBrochures/CatalogsGovernment DocsHow-To Guides/ManualsMagazines/NewspapersRecipes/MenusSchool

Work+ all categoriesFeaturedRecentPeopleAuthorsStudentsResearchersPublishersGovernment & NonprofitsBusinessesMusiciansArtists & DesignersTeachers+ all categoriesMost FollowedPopularSign Up Log In 1First Page Previous Page Next Page / 3Sections not available Zoom Out Zoom In Fullscreen Exit FullscreenSelect View Mode View ModeSlideshowScroll Readcast Add a Comment Embed & Share Reading should be social! Post a message on your social networks to let others know what you're reading. Select the sites below and start sharing.Readcast this Document Login to Add a Comment Share & EmbedAdd to Collections Download this Document for FreeAuto-hide: on This is a collapser for 728x90 OPERATING PROCEDURES FOR ENSURING COMPLIANCE WITH CPNI RULESLenox Municipal Communications Utility (the Company) has implemented the followingprocedures to ensure that it is compliant with Part 64 of Title 47 of the Code of FederalRegulations, Subpart U Customer Proprietary Network Information (CPNI), 64.2001 through 64.2011.Compliance Officer The Company has appointed a CPNI Compliance Officer. The Compliance Officer is responsiblefor ensuring that the Company is in compliance with all of the CPNI rules. The ComplianceOfficer is also the point of contact for anyone (internally or externally) with questions about CPNI.Employee Training:The Compliance Officer arranges for the training of employees on an annual basis, and morefrequently as needed. Any new employee is trained when hired by the Company. The trainingincludes, but is not limited to, when employees are and are not authorized to use CPNI, and theauthentication methods the company is using. The detail of the training can differ based onwhether or not the employee has access to CPNI.After the training, all employees are required to sign a certification that they have receivedtraining on the CPNI rules, that they understand the Companys procedures for protecting CPNIand they understand the Companys disciplinary process for improper use of CPNI. TheCompany will maintain a copy of the CPNI rules in a central location so all employees have easyaccess to it.Employees are instructed that if they ever have any questions regarding the use of CPNI, or if they are aware of CPNI being used improperly by anyone, they should contact the ComplianceOfficer immediately.Disciplinary ProcessThe Company has established a specific disciplinary process for improper use of CPNI. Thedisciplinary action is based on the type and severity of the violation and could include any or acombination of the following: retraining the employee on CPNI rules, notation in the employeespersonnel file, formal written reprimand, suspension or termination.The disciplinary process is reviewed with all employees at the time of the CPNI training.Customer Notification and Request for Approval to Use CPNIThe Company has not asked for approval to use CPNI because it only uses CPNI

in thoseinstances where it is permissible to use CPNI without customer approval, e.g. to discuss existingservices, to market enhancements to services the customer already subscribes to, as required bylaw, etc. It does not share the customers CPNI with any joint venture partner, independentcontractor or any other third party. For marketing campaigns, the Company does mass marketingto all customers and does not do marketing based on CPNI.If the Company receives a call from a customer who wants to discuss services outside of thecustomers existing service offerings, the customer service representative uses the oralnotification for one-time use of CPNI to obtain approval for the duration of the call. The customer is told that the approval to use the CPNI is limited only to the existing call. This is a collapser for 468x60 Marketing CampaignsThe Company does not use any CPNI for its marketing campaigns.AuthenticationThe Company does not disclose any CPNI until the customer has been appropriatelyauthenticated as follows:In-office visit- the customer must provide a valid photo ID matching the customers accountinformation.Customer-initiated call the customer is authenticated by providing an answer to a pre-established question and must be listed as a contact on the account.If the customer wants to discuss call detail information that requires a password, since thecompany does not use passwords, the following guidelines are followed:If the customer can provide all of the call detail information (telephone number called, when it was called, the amount of the call, etc.) necessary to address thecustomers issue, the Company will continue with its routine customer careprocedures.If the customer cannot provide all of the call detail information to address thecustomers issue, the Company will: (1) call the customer back at the telephonenumber of record, (2) send the information to the address of record, or (3) ask thecustomer to come into the office and provide a valid photo ID.Notification of Account ChangesThe Company promptly notifies customers whenever a change is made to the following: Address of record.The notification to the customer will be made either by a Company-originated voicemail or textmessage to the telephone number of record or sent to the address (postal or electronic) of record.The Company has a process for tracking when a notification is required and for recording whenand how the notification is made.Notification of BreachesEmployees will immediately notify the Compliance Officer of any indication of a breach. If it isdetermined that a breach has occurred, the Compliance Officer will do the following:Notify the United States Secret Service (USSS) and the Federal Bureau of Investigation (FBI) as soon as practicable, but in no event later than 7 business daysafter determination of the breach. The notification will be via the FCC link athttp://www.fcc.gov/eb/cpni.Notify customers only after 7 full business days have passed since notification tothe USSS and the FBI, unless the USSS or FBI has requested an extension. If there is an urgent need to notify affected customers or the public sooner toavoid immediate and irreparable harm, it will be done only after consultation with therelevant investigating agency.Maintain a record of the breach, the notifications made to the USSS and FBI, andthe notifications made to customers. The record should include dates of discoveryand notification, a detailed description of the CPNI that was the subject of the breach,and the circumstances of the breach.Include a summary of the breach in the annual compliance certificate filed withthe FCC.Annual CertificationThe Compliance Officer will file a Compliance Certification with the FCC by March 1 of each year,for data

pertaining to the previous calendar year.MiscellaneousThe Company takes reasonable measures to discover and protect against activity that isindicative of pretexting. Employees are instructed to notify the CPNI Compliance Officer immediately of any unusual or suspicious activity who will then determine what action needs to betaken.Record RetentionThe Company retains all information regarding CPNI in a secure file. Following is the minimumretention period the Company has established for specific items:Breaches two yearsAnnual certification six yearsEmployee training certification two yearsAll other CPNI information two years This is a collapser for 728x90Lenox Operating Procedures Download this Document for FreePrintMobileCollectionsReport DocumentReport this document?Please tell us reason(s) for reporting this document Spam or junk Porn adult content Hateful or offensiveIf you are the copyright owner of this document and want to report it, please follow these directions to submit a copyright infringement notice.Report Cancel This is a private document. Info and Rating Reads:82Uploaded:02/28/2011Category:Uncategorized.Rated:Copyright:Attribution Non-commercialFCC CPNI Submission Followfcc_filingsThis is a collapser for 300x250 Share & Embed Related Documents PreviousNext 1 p. 4 p. 1 p. 1 p. 1 p. 1 p. 1 p. 1 p. 2 p. 1 p. 1 p.More from this user PreviousNext 4 p. 7 p. 4 p. 4 p. 3 p. 3 p. 3 p. 2 p. 2 p. 2 p. 1 p. 3 p. 3 p. 3 p. 3 p. 3 p. 2 p. 5 p. 3 p. 2 p. 7 p. 5 p. 3 p. 3 p.

3 p.Add a Comment SubmitCharacters: 400 Print This DocumentHigh QualityOpen the downloaded document, and select print from the file menu (PDF reader required).Download and Print Closes in seconds. XUse your Facebook login and see what your friends are reading and sharing.Other login optionsLogin with FacebookSignupI don t have a Facebook account email address (required) create username (required) password (required) Send me the Scribd Newsletter, and occasional account related communications. Sign Up Privacy policy You will receive email notifications regarding your account activity. You can manage these notifications in your account settings. We promise to respect your privacy. Why Sign up?1. Discover and Connect With people of similar interests2. Publish Your Documents Quickly and easily3. Share Your Reading Interest On Scribd and social sites like Facebook and TwitterAlready have a Scribd account?email address or username password Log In Trouble logging in? Login SuccessfulNow bringing you back... Reset Your Password Back to Login Please enter your email address below to reset your password. We will send you an email with instructions on how to continue.Email Address: You need to provide a login for this account as well.Login Submit Upload a Document Search Documents Follow Us!scribd.com/scribdtwitter.com/scribdfacebook.com/scribdAboutPressBlogPartner sScribd 101Web StuffSupportFAQDevelopers / APIJobsTermsCopyrightPrivacyCopyright 2012 Scribd Inc.Language:EnglishChoose the language in which you want to experience Scribd:EnglishEspaolPortugus (Brasil)

You might also like