Senate passes bill allowing mobile phone owners to unlock devices
The House will still have to pass the Senate bill
IDG News Service - The U.S. Senate has passed a bill that would allow mobile phone customers to unlock their devices for the purposes of switching carriers.
The Senate, late Tuesday, approved the Unlocking Consumer Choice and Wireless Competition Act by unanimous consent.
The bill would overturn a January 2013 decision by the Library of Congress that removed legal protections for mobile phone unlocking. The library had previously allowed phone unlocking as an exception to the security circumvention provisions in the Digital Millennium Copyright Act (DMCA). The DMCA gives the Library of Congress rule-making authority over the anti-circumvention provisions in the law.
The House of Representatives passed its own version of a mobile phone unlocking bill in February. The House would have to pass the Senate bill before it goes to President Obama for his signature.
The Senate bill reinstates a 2010 rule by the librarian of Congress that allows mobile phone owners to unlock their devices without running afoul of copyright laws. It also directs the librarian of Congress to consider whether other wireless devices, like tablets, should be eligible for unlocking.
The Senate Judiciary Committee approved the bill and sent it to the Senate floor just last week.
"I applaud the Senate for so quickly passing the bipartisan Unlocking Consumer Choice and Wireless Competition Act, which puts consumers first and promotes competition in the wireless phone marketplace," Sen. Patrick Leahy, a Vermont Democrat and bill sponsor, said in a statement. "I hope the House will soon take up and pass our bill so that consumers will be able to use their existing cell phones on the wireless carrier of their choice."
Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant's email address is email@example.com.
- Top 3 Myths about Big Data Security : Debunking common misconceptions about big data security Big data represents massive business possibilities and competitive advantage for organizations that are able to harness and use that information. But how are...
- Magic Quadrant for Data Masking Technology IBM is a leader in Gartner Inc's Magic Quadrant for Data Masking Technology. Read the full report to learn about IBM.
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Why Are Customers Really Deploying an NGFW? It seems every IT Security expert is talking about the NGFW, but what are people really doing? This webcast covers 5 real-world customer... All Gov't Legislation/Regulation White Papers | Webcasts