
Filed in Federal Privacy — March 6, 2026
Categories
I’m the Principal Attorney at The Data Privacy Lawyer.
HI THERE, I’M Funmi

Telecommunications companies handle some of the most sensitive personal data in the modern economy. Every phone call, text message, and mobile connection can generate information about a person’s location, contacts, and communication patterns.
Because of this, telecommunications data has long been subject to federal privacy protections, particularly Section 222 of the Communications Act of 1934, which governs the protection of Customer Proprietary Network Information (CPNI). In recent years, regulators have increased scrutiny over how telecommunications providers collect, use, and share customer information, particularly location data.
In 2026, federal enforcement continues to emphasize three key principles: location data protection, meaningful consent, and organizational accountability. Telecommunications carriers and companies involved in telecommunications services must ensure that these principles guide how customer information is handled.
This article explains how telecommunications data creates unique privacy risks, why regulators focus on location information, and what businesses must consider when managing telecommunications-related data.
In particular, federal privacy rules governing Customer Proprietary Network Information (CPNI) place strict limits on how telecommunications carriers may use or disclose sensitive customer data.
Telecommunications networks generate detailed records about how people communicate and move through the world.
Examples of telecommunications-related data generated through telecommunications networks and services may include:
• Phone numbers and subscriber information
• Call records and communication metadata
• Device identifiers
• Internet usage data
• Cell tower connection records
• Real-time or historical location information
Unlike many other types of personal data, telecommunications data can reveal patterns of daily life, including where individuals travel, who they communicate with, and how frequently they interact.
Because of this sensitivity, federal law imposes specific obligations on telecommunications carriers to protect Customer Proprietary Network Information (CPNI) under Section 222 of the Communications Act of 1934.
Location data is one of the most sensitive categories of personal information generated through telecommunications networks, including information derived from cell tower connections, network signaling data, and mobile service usage.
Location information may reveal:
• Home addresses
• Work locations
• Travel patterns
• Medical visits
• Religious attendance
• Political activity
When location data is collected or shared without proper safeguards, individuals may face serious privacy risks. Recent enforcement actions involving mobile carriers have demonstrated that improper sharing of location data can trigger significant regulatory penalties.
For this reason, regulators expect telecommunications carriers and service providers to treat location information with heightened care and ensure that its collection and use are clearly explained to customers.
Consent plays a central role in telecommunications privacy obligations, particularly under Federal Communications Commission (FCC) rules implementing Section 222 of the Communications Act of 1934 that govern the use and disclosure of Customer Proprietary Network Information (CPNI).
Customers should understand:
• What information is collected
• How it will be used
• Whether it will be shared with third parties
• How long the data will be retained
Consent must be meaningful, and in some situations telecommunications carriers must obtain affirmative customer approval (opt-in consent) before sharing certain types of Customer Proprietary Network Information (CPNI) with third parties. If disclosures are unclear, incomplete, or difficult to understand, regulators may question whether customers truly agreed to the data practices.
Businesses should also avoid relying on passive consent mechanisms that customers may not notice or understand.
Transparency and clarity are critical.
Telecommunications carriers must maintain strong internal controls for managing customer information, including safeguards required under Federal Communications Commission (FCC) privacy and security rules.
This includes oversight of:
• Internal employee access
• Third-party service providers
• Data storage systems
• Security safeguards
• Incident response procedures
Accountability also means ensuring that privacy commitments made to customers accurately reflect how data is handled in practice and that internal practices comply with federal telecommunications privacy requirements.
If internal operations contradict public disclosures, regulatory risk increases.
While telecommunications carriers are directly regulated under federal telecommunications privacy law, many other businesses interact with telecommunications-related data.
Examples include:
• Mobile application developers
• Location-based advertising companies
• Data analytics firms
• Ride-sharing platforms
• Delivery services
• Internet-connected device manufacturers
Any business that uses telecommunications-related data must consider the privacy expectations surrounding that information, as regulators such as the Federal Communications Commission (FCC) and the Federal Trade Commission (FTC) may scrutinize how sensitive telecommunications-related data is used or disclosed.
Sensitivity does not disappear simply because the data moves between companies.
Organizations working with telecommunications data should consider:
• Clearly explaining how location and communication data is collected
• Implementing strong access controls
• Limiting employee access to necessary information
• Reviewing vendor data-sharing practices
• Monitoring internal data use
• Updating privacy disclosures as technology evolves
Strong governance practices help ensure that telecommunications data is handled responsibly and in alignment with federal telecommunications privacy requirements.
Most individuals rely on telecommunications services every day without thinking about how much data those services generate.
Mobile devices can reveal:
• Where someone lives
• Where they work
• Where they travel
• Who they communicate with
• When they are active online
When telecommunications data is misused or insufficiently protected, individuals may feel that their personal lives are being tracked or exposed.
Protecting telecommunications privacy helps preserve trust in modern digital infrastructure.
Telecommunications-related privacy obligations can be complex because they involve multiple federal laws, regulatory agencies, and technical systems.
The Data Privacy Lawyer helps organizations:
• Evaluate telecommunications data practices
• Review location data collection and consent mechanisms
• Align privacy disclosures with operational practices
• Assess vendor and partner data-sharing risks
• Develop governance frameworks for telecommunications data
Strong privacy practices protect both consumers and businesses operating in an increasingly connected world.
If you have questions about telecommunications privacy obligations or federal data protection expectations, our team is here to help.
Website:
www.thedataprivacylawyer.com
Email:
info@thedataprivacylawyer.com
Phone:
+1 (202) 946-5970
The information provided in this blog is for general informational and educational purposes only. It does not constitute legal advice, legal opinion, or a substitute for professional legal counsel.
Reading or using this content does not create an attorney–client relationship between you and The Data Privacy Lawyer PLLC. Laws and regulations may change, and how they apply can vary based on specific facts and circumstances.
If you need legal advice tailored to your situation, please contact a qualified attorney directly.
A practical checklist to evaluate and strengthen the foundation of your privacy program—so you’re not caught off guard by gaps, risks, or outdated practices.
When compliance feels overwhelming, it’s easy to freeze or delay action. This checklist helps you cut through the noise, identify what’s missing, and move forward with clarity and confidence. Let’s simplify the complex and get your privacy program into proactive, aligned motion.