NOTES. Cyber Security

Size: px
Start display at page:

Download "NOTES. Cyber Security"

Transcription

1 S Cyber Security Cyber incidents can result from deliberate attacks or unintentional events. Cyber attacks include gaining unauthorized access to digital systems for purposes of misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks may also be carried out in a manner that does not require gaining unauthorized access, e.g., the initiation of denial-of-service attacks on websites. Cyber attacks may be carried out by third parties or insiders using techniques that range from highly sophisticated efforts to electronically circumvent network security or overwhelm websites to more traditional intelligence gathering and social engineering aimed at obtaining information necessary to gain access, e.g., dumpster diving for password or other security sentinels. The SEC expects that advisers will have compliance policies and procedures that address data protection and identity theft, including service provider oversight by the adviser in these areas. Advisers must acquire, implement, and diligently monitor appropriate resources to both address ongoing cyber security risk sets and the process by which the adviser will deploy a rapid response and notification capability to mitigate the impact of any such attacks and their related effects on fund investors and advisory clients. This must be achieved in congruence with the federal securities laws that address privacy and safeguarding client material nonpublic information and increasingly, those statutes that speak directly to cyber security. Speech, Norm Champ, ICI Mutual Funds Conference ( ). When designing and creating a cyber security program, your firm should take an inventory of assets they are trying to protect (e.g., client data and company records, intellectual property etc.) and implement controls to protect those assets. It must also be prepared to respond to such attacks in the appropriate ways (e.g., notification protocol vis-a-vis state statutes). 1

2 Assessment Advisers should assume that the risk of a hacking or cyber intrusion is relatively high and design policy and procedure with this threat set in mind. Consider the quantitative and qualitative magnitude of those risks were an event to occur (i.e., disaster recovery, reputational risk, legal consequences, etc.). In evaluating whether risk factor disclosure should be provided, you should also consider the adequacy of preventative actions taken to reduce cyber security risks in the context of the industry in which they operate and risks to that security, including threatened attacks of which they are aware. Prevention Advisers must manage who has access to its computer and other systems and under what circumstances authorized employees have such access. An anti-virus ring must be maintained around its assets. This ring should guard against hacking, malware, physical attack and stolen credentials. Qualified third-party experts should be engaged to advise on the particulars of developing and monitoring this virus ring. Responses To the extent that the adviser has identified and prioritized the qualitative and quantitative risks attendant to a cyber attack, regulators expect that the firm must have a response when a breach or vulnerability occurs. Patches for the IT architecture should be fully tested (via integration with the BCP) and ready to go. If possible, your firm should implement a system that detects incoming threats and automatically triggers patches. Mobile Devices and the Cloud Advisers may permit their personnel to use/access proprietary and client data via mobile devices and cloud networks. If so, this represents an added level of risk to the adviser s privacy and information safeguarding policy, which, on the basis of establishing risk-based policy pursuant to Rule 206(4)-7, necessitates that the firm develops controls to address the incremental risk this policy entails. Advisers should consider adopting and implementing a permissible use policy for electronic communications as part of their compliance policies and procedures. A permissible use policy should set forth, among other things: the types of communications that are permitted, the types of mobile devices permitted for business use/access to material nonpublic information (i.e., encrypted to specific protocol), the social media websites that are permitted, recordkeeping requirements for retaining and archiving business communications made on such devices, and whether such use and communications are subject to monitoring by the firm. 2

3 The privacy and security risks associated with mobile devices include: Recordkeeping concerns due to the commingling of personal and company accounts on devices; Data breaches resulting from the loss or theft of personal communications devices containing or having access to confidential client data, such as information in corporate ; Inadvertent storage of sensitive data on unauthorized computers or servers when devices are configured to back up data to a personal laptop or to the cloud; Interception of wireless network communications to and from a mobile device across unsecured wireless access points (e.g., public Wi-Fi hotspots located in many airports). Even wireless networks protected by a password are vulnerable to attack if not properly configured; Data leakage concerns involving corporate data stored on a mobile device or accessible via an app on such a device (e.g., Dropbox), and the difficulties in controlling the flow of proprietary company information and intellectual property outside the firm; Surveillance obstacles in monitoring compliance on personal devices; and Rogue software, apps, spyware, mobile adware (also known as madware ), viruses, and worms that can infect the device. These threats can compromise not only the device itself, but also can spread to the firm s corporate network and infect other machines. For example, Apple iphones running operating system version ios were recently vulnerable to exposing access to contacts, calendars, and other information, and to a vulnerability permitting the passcode to be circumvented. As often is the case, these threats can also contribute to data loss or degraded performance of the device. With respect to your firm s cyber security policy and security, consider the following: Have an action plan (i.e., an escalation and notification protocol) to be implemented immediately in the event of a security breach; Have a team already established that can begin to deal with a data breach as soon as it is discovered. Make sure the various constituencies of your company are represented on the team (e.g., management, information security, information technology technical experts, legal, public affairs, business continuity, human resources, compliance, and facilities management); Conduct periodic fire drills to test the readiness of your company s data breach policy (it is recommended that this be included in annual test of the adviser s BCP); Review and reassess record/data retention policies and destroy unneeded data if permitted by books and records requirements of applicable statutes and regulations. In order to limit the universe of information that is susceptible to a data breach, consider whether older or unneeded data must continue to be retained. If a computer or other equipment that holds data on a hard drive is being replaced, make sure that such data 3

4 is completely erased. In reality, the only way to absolutely guarantee that information on a hard drive is unretrievable may be to destroy the hard drive (which may not be practicable); Review and reassess your employee education/training programs. Conduct training to make employees aware of the various computer threats so they can be recognized when they occur. Require employees to practice computer security best practices (e.g., use passwords with a mix of uppercase and lowercase letters, numbers, and symbols); Review and reassess your company s business continuity and disaster recovery plans to make sure it covers a cyber attack or other type of computer disruption; Review and reassess the data privacy and computer security policies and procedures of your third-party service providers. While the level of detail of review that you apply to a third-party service organization may not be as exacting as it is for your own organization, do you have a high level of confidence that their data privacy and computer security policies and procedures are sufficient for protecting your company s and your customers information; Review and reassess service contracts with third-party service providers to ensure that privacy and computer security issues are adequately addressed. Consider whether an amendment to a service contract may be necessary; Remotely wiping a lost or stolen device, through either a selective wipe of strictly corporate data or a full wipe of the entire device, restoring it to factory default settings (although wiping an entire device should be done as a last resort, this feature can give compliance personnel peace of mind in knowing that data is less likely to be compromised in the event a device is lost or stolen); Review and reassess insurance policies. Confirm whether your company s insurance coverage includes losses, remediation costs, and litigation costs associated with a data breach, and consider whether such coverage is adequate. Such insurance coverage is evolving, so consider consulting with an insurance broker knowledgeable about the latest policies in the marketplace for the coverage you may need. Education and Training The success and efficacy of a cyber security program is directly correlated to the employee training that complements the policy. In this regard, it is posited that the majority of successful cyber attacks are unknowingly abetted by employees. In this regard, advisers should consider the following policy considerations: Restricting installation of certain apps (blacklisting), such as Dropbox, Evernote, icloud, or apps which your firm has determined are not consistent with its security policy; Permitting installation only of certain approved apps (whitelisting); Restricting access to certain functions on a device, such as the camera, Bluetooth wireless access, GPS, screen shots, or browser, while connected to the firm s network; Prohibiting non-compliant, jailbroken, and non-employee devices from accessing a firm s network; 4

5 Monitoring which devices are not in compliance with a firm s policies, such as those that do not have a pass-code set, those that have not upgraded to the latest operating system, and those that contain unauthorized apps; Locking down USB ports; and Notifying employees whose devices are non-compliant to bring their devices into compliance. Regulatory Developments You should keep abreast of regulatory developments related to cyber security. Regulatory expectations for advisers may arise out of actions involving other financial firms. Gramm-Leach-Bliley Act, Safeguard Rule, and Disposal Rule Essential privacy rights were conveyed to financial consumers over the past several years, and key among them were the privacy protection provisions of Gramm-Leach-Bliley (GLB). The regulatory implementation of GLB put an affirmative obligation upon advisers to observe and protect non-public personal information (NPPI) and the rights and choices of financial consumers. Effective and appropriate management of NPPI begins with clear and accountable supervision of employees exposed to it both in the workplace and through outside activities. Safeguard Rule Rule 30(a) of Regulation S-P (the safeguard rule ), requires that SEC advisers, among others, adopt policies and procedures to address administrative, technical, and physical safeguards for the protection of customer records and information and protect against the unauthorized access or use of customer information. The SEC amended Rule 30 of Regulation S-P to require that policies and procedures adopted in compliance with the safeguard rule be written to help ensure reasonable protection for customer records and information, and facilitate compliance oversight by SEC examiners. Disposal Rule The SEC also adopted amendments that created Rule 30(b) (the disposal rule ) to implement requirements of section 216 of the Fair and Accurate Credit Transactions Act of 2003, requiring proper disposal of consumer report information and records. The disposal rule requires registered investment advisers, among others, that maintain or possess consumer report information for a business purpose to take reasonable measures to protect against unauthorized access to or use of the information in connection with its disposal. In determining what measures are reasonable under the disposal rule, the SEC stated in the Proposing Release that it expects firms to consider the sensitivity of the consumer report information, the nature and size of the entity s operations, the costs and benefits of different disposal methods, and relevant technological changes. The SEC also noted that reasonable 5

6 measures are very likely to require elements such as the establishment of policies and procedures governing disposal, as well as appropriate employee training. The Adopting Release included examples intended to provide guidance on disposal measures that would be deemed reasonable under the disposal rule. Regulation S-P generally allows a firm to tailor its policies and procedures to its own system of gathering and transferring information. Regulation S-AM Regulation S-AM became effective January 1, This SEC Rule limits the extent to which certain financial institutions can provide consumer information to affiliates for marketing purposes. Under Regulation S-AM, a covered person is prohibited from using eligibility information that it receives from an affiliate to make a marketing solicitation unless: (1) the potential marketing use of that information has been clearly, conspicuously, and concisely disclosed to the consumer; (2) the consumer has been provided a reasonable opportunity and a simple method to opt out of receiving the marketing solicitations; and (3) the consumer has not opted out. Here are the highlights of the Rule: Applies to brokers, dealers, investment companies, registered investment advisers, and registered transfer agents; Limits sharing of eligibility data about consumers between affiliates for the purpose of initiating marketing solicitations (eligibility data is information used to identify the consumer as a marketing target, e.g., net worth); Requires consumer to be granted an opt-out option before using eligibility information to initiate a marketing solicitation; Opt-out notices can be included with existing notice requirements, e.g., a privacy notice. Regulation S-AM specifies the parameters of compliant opt-out methodologies, including details about the: Scope and duration of the opt-out notice; Contents of the opt-out notice; Definition of reasonable opportunity to opt out; Definition of reasonable and simple method of opting out; Delivery of opt-out notices; Renewal of opt-out elections. The SEC offers a compliance guide for regulated entities to assess the new Rule and its relevance to their business model. Go to the following link to access the guide and model forms: 6

7 State Data Breach Notification Laws Privacy policies are nothing new to regulated entities; however it is our experience that compliance programs often lack provisions to manage a security breach, which upon occurrence will significantly flex the registrant s privacy policy and procedures. Breach provisions are required to meet existing and emergent state regulations. Taking California s lead, many states have implemented or will soon implement statutes requiring that their residents receive early warning from commercial entities that experience breach of access to the personal information of consumers and customers. Specifically, if the enterprise knows or suspects that the information has been divulged to (hacked by) unauthorized parties, the enterprise is required to notify the consumer or customer so the latter may take appropriate steps to mitigate or correct the risk attendant to the privacy breach. Privacy policy should incorporate breach event management and notification accordingly. The CCO is encouraged to oversee policy formulation which takes the following steps, at a minimum: Define the threshold for reporting a possible or real security breach; Clearly articulate the steps to be taken by all parties when reporting and escalating a breach; Ascertain the geographic residence of all victims of the breach; Cross reference state law with geographic analysis to ensure that the enterprise response meets all applicable requirements within every state where residents are impacted by the enterprise breach; Report the security breach to all parties, per state requirements; Minimize the risk of future breaches by adding internal controls as necessary; Implement the disciplinary policy as necessary to address any employee behavior that may have contributed to the breach; Use the event as a training opportunity to reinforce enterprise policy and the negative implications associated with security failures; Place security breach testing at the top of the compliance test list and be ever vigilant for risks and gaps in the business processes; Add privacy and security protocols to each new business process and partner relationship taken on by the enterprise. Strong policy and continuous communication and training will go a long way to prevent data leakage and breach. To the extent that a breach does occur, a swift and effective response will help preserve the reputation of the enterprise and minimize regulatory backlash. The website breachprep.org is a good place to start for CCOs in search of state security breach notification laws and related resources. 7

8 Privacy Notice When the Gramm-Leach-Bliley Act (GLB) was passed in 1999, it obliterated the barriers remaining in the commercial and investment banking markets that were instituted with the passage of the Glass-Steagall Act during the Great Depression. As these barriers fell, concern grew regarding the safety and privacy of customer information heretofore largely segregated by the business model in the regulated financial services industry. Regulatory protocol directs advisers in their efforts to safely and effectively leverage non-public personal information of customers (NPI) while preserving the integrity of advisory client NPI. These provisions speak directly to the risk of consumer fraud and identity theft, both federal crimes. GLB conveys an affirmative obligation upon SEC advisers to observe customer choices regarding the sharing of NPI of customers. Regulation S-P was instituted by the SEC to implement the GLB privacy provisions and prohibits advisers from sharing retail customer NPI with non-affiliated third parties unless the firm has provided customers with the ability to opt out of the adviser s privacy policy of sharing customer data. The opt-out is generally provided through an annual privacy notice requirement and a corresponding opt-out notification that must be provided to advisory clients. The privacy notice must provide information regarding: the types of NPI that the adviser will aggregate and what NPI it may disclose (if any), similar processes for former customers, and how the NPI is protected pursuant to Fair Credit Reporting Act requirements. The adviser must establish clear and conspicuous notices to customers both at the time of establishing a relationship and on an ongoing basis (annual notice) thereafter, including the provision of privacy notices upon demand to consumers (customers and prospects). Many states have additional privacy notice and/or opt-out thresholds that must also be met. Non-SEC registered advisors are required to follow the Privacy Rules of the Federal Trade Commission to the extent that relevant state requirements do not. The SEC further requires advisers to summarize privacy policies in the ADV Form Part 2. Implementation Tips Effective December 31, 2009, the SEC (and other adopting agencies) approved a model privacy form that may be utilized by investment advisers and broker-dealers as a safe harbor to provide privacy disclosures. The template may be viewed here: os/2007/03/correctedneptunemarsandgenericformsfrn.pdf REGULATION S-ID 8

9 Summary of Requirements On April 10, 2013, the SEC voted to adopt rules requiring certain investment advisers to adopt programs to detect red flags and prevent identity theft. The SEC recommends the program include policies and procedures designed to identify relevant types of identity theft red flags; detect the occurrence of those red flags; respond appropriately to the detected red flags; and periodically update the identity theft protection program. The rule also requires staff training on the subject. SEC-regulated investment advisers with covered accounts are required to establish an Identity Theft Prevention Program ( ITPP ) that is designed to detect, prevent, and mitigate identity theft. The ITPP must be reasonably and appropriately designed for the size and nature of a particular firm. Effective Date: May 20, 2013 Compliance Date: November 20, 2013 History During recent decades, the federal government has taken steps to help protect individuals, and to help individuals protect themselves, from the risks of theft, loss, and abuse of their personal information. The Fair Credit Reporting Act of 1970 ( FCRA ), as amended in 2003, required several federal agencies to issue joint rules and guidelines regarding the detection, prevention, and mitigation of identity theft for entities that are subject to their respective enforcement authorities (also known as the identity theft red flags rules ). In 2010, the Dodd-Frank Wall Street Reform and Consumer Protection Act ( Dodd-Frank Act ) amended the FCRA to add the CFTC and SEC to the list of federal agencies that must jointly adopt and individually enforce identity theft red flags rules. Who Is Subject to Rules? The final rules apply to financial institutions and creditors subject to the Commissions respective enforcement authorities and do not exclude any entities registered with the Commissions from their scope. By way of illustration, the types of entities listed by name in the scope section are the registered entities regulated by the SEC that are most likely to be financial institutions or creditors, i.e., brokers or dealers ( broker-dealers ), investment companies, and investment advisers. Financial Institution A financial institution includes certain banks and credit unions, and any other person that, directly or indirectly, holds a transaction account (as defined in section 19(b) of the Federal Reserve Act) belonging to a consumer. 9

10 A transaction account includes an account on which the... account holder is permitted to make withdrawals by negotiable or transferable instrument, payment orders of withdrawal, telephone transfers, or other similar items for the purpose of making payments or transfers to third persons or others. 50 Section 603(c) of the FCRA defines consumer as an individual; 51 thus, to qualify as a financial institution, an entity must hold a transaction account belonging to an individual. The following are illustrative examples of an SEC-regulated entity that could fall within the meaning of the term financial institution because it holds transaction accounts belonging to individuals: i. a broker-dealer that offers custodial accounts; ii. a registered investment company that enables investors to make wire transfers to other parties or that offers check-writing privileges; and iii. an investment adviser that directly or indirectly holds transaction accounts and that is permitted to direct payments or transfers out of those accounts to third parties. Investment advisers who have the ability to direct transfers or payments from accounts belonging to individuals to third parties upon the individuals instructions, or who act as agents on behalf of the individuals, are susceptible to the same types of risks of fraud as other financial institutions, and individuals who hold transaction accounts with these investment advisers bear the same types of risks of identity theft and loss of assets as consumers holding accounts with other financial institutions. For instance, even if an investor s assets are physically held with a qualified custodian, an adviser that has authority, by power of attorney or otherwise, to withdraw money from the investor s account and direct payments to third parties according to the investor s instructions would hold a transaction account. However, an adviser that has authority to withdraw money from an investor s account solely to deduct its own advisory fees would not hold a transaction account, because the adviser would not be making the payments to third parties. Registered investment advisers to private funds also may directly or indirectly hold transaction accounts. If an individual invests money in a private fund, and the adviser to the fund has the authority, pursuant to an arrangement with the private fund or the individual, to direct such individual s investment proceeds (e.g., redemptions, distributions, dividends, interest, or other proceeds related to the individual s account) to third parties, then that adviser would indirectly hold a transaction account. 10

11 Creditor The Commissions final definitions of creditor is a person that regularly extends, renews or continues credit, or makes those arrangements, that regularly and in the course of business advances funds to or on behalf of a person, based on an obligation of the person to repay the funds or repayable from specific property pledged by or on behalf of the person. The FCRA excludes from this definition a creditor that advances funds on behalf of a person for expenses incidental to a service provided by the creditor to that person. An investment adviser could potentially qualify as a creditor if it advances funds to an investor that are not for expenses incidental to services provided by that adviser. For example, a private fund adviser that regularly and in the ordinary course of business lends money, short-term or otherwise, to permit investors to make an investment in the fund, pending the receipt or clearance of an investor s check or wire transfer, could qualify as a creditor. Definition of Covered Account Under the final rules, a financial institution or creditor must establish a red flags Program if it offers or maintains covered accounts. As in the proposed rules, the Commissions are defining the term covered account in the final rules as: (i) an account that a financial institution or creditor offers or maintains, primarily for personal, family, or household purposes, that involves or is designed to permit multiple payments or transactions; and (ii) any other account that the financial institution or creditor offers or maintains for which there is a reasonably foreseeable risk to customers or to the safety and soundness of the financial institution or creditor from identity theft, including financial, operational, compliance, reputation, or litigation risks. The CFTC s definition includes a margin account as an example of a covered account. The SEC s definition includes, as examples of a covered account, a brokerage account with a broker-dealer or an account maintained by a mutual fund (or its agent) that permits wire transfers or other payments to third parties. The Commissions are defining an account as a continuing relationship established by a person with a financial institution or creditor to obtain a product or service for personal, family, household or business purposes. Footnote: To be a financial institution, an entity must hold a transaction account with at least one consumer (defined as an individual in 15 U.S.C. 1681a(c)). However, once an entity is a financial institution, it must periodically determine whether it offers or maintains covered accounts to or on behalf of its customers, which may be individuals or business entities. Although the definition of customer is broad, not every account held by or offered to a customer will be considered a covered account, as the identification of covered accounts under the identity theft red flags rules is based on a risk-based determination. 11

12 Each financial institution or creditor must periodically determine whether it offers or maintains covered accounts. As a part of this periodic determination, a financial institution or creditor must conduct a risk assessment that takes into consideration: (1) the methods it provides to open its accounts; (2) the methods it provides to access its accounts; and (3) its previous experiences with identity theft. A financial institution or creditor should consider whether, for example, a reasonably foreseeable risk of identity theft may exist in connection with accounts it offers or maintains that may be opened or accessed remotely or through methods that do not require face-to-face contact, such as through or the Internet, or by telephone. In addition, if financial institutions or creditors offer or maintain accounts that have been the target of identity theft, they should factor those experiences into their determination. The Commissions acknowledge that some financial institutions or creditors regulated by the Commissions do not offer or maintain accounts for personal, family, or household purposes, and engage predominantly in transactions with businesses, where the risk of identity theft is minimal. A financial institution or creditor that initially determines that it does not need to have a Program is required to periodically reassess whether it must develop and implement a Program. Alternatively, the financial institution or creditor may determine that only a limited range of its accounts present a reasonably foreseeable risk to customers, and therefore may decide to develop and implement a Program that applies only to those accounts or types of accounts. Other Interesting Provisions Approval of Program The final rules provide direction to financial institutions and creditors regarding the administration of Programs as a means of enhancing the effectiveness of those Programs. First, the final rules require that a financial institution or creditor obtain approval of the initial written Program from either its board of directors, an appropriate committee of the board of directors, or if the entity does not have a board, from a designated senior management employee. This requirement highlights the responsibility of the board of directors in approving a Program. The designated senior management employee who is responsible for the oversight of a broker-dealer s, investment company s or investment adviser s Program may be the entity s chief compliance officer. 12

13 Five Categories of Red Flags to Consider Section II(c) of the guidelines identifies five categories of red flags that financial institutions and creditors must consider including in their Programs, as appropriate: Alerts, notifications, or other warnings received from consumer reporting agencies or service providers, such as fraud detection services; Presentation of suspicious documents, such as documents that appear to have been altered or forged; Presentation of suspicious personal identifying information, such as a suspicious address change; Unusual use of, or other suspicious activity related to, a covered account; and Notice from customers, victims of identity theft, law enforcement authorities, or other persons regarding possible identity theft in connection with covered accounts held by the financial institution or creditor. Oversight of Service Provider Arrangements Section VI(c) of the guidelines provides that whenever a financial institution or creditor engages a service provider to perform an activity in connection with one or more covered accounts, the financial institution or creditor should take steps to ensure that the activity of the service provider is conducted in accordance with reasonable policies and procedures designed to detect, prevent, and mitigate the risk of identity theft.... Section VI(c) of the guidelines also includes, as an example of how a financial institution or creditor may comply with this provision, that a financial institution or creditor could require the service provider by contract to have policies and procedures to detect relevant red flags that may arise in the performance of the service provider s activities, and either report the red flags to the financial institution or creditor, or to take appropriate steps to prevent or mitigate identity theft. In those circumstances, the Commissions expect that the contractual arrangements would include the provision of sufficient documentation by the service provider to the financial institution or creditor to enable it to assess compliance with the identity theft red flags rules. Appendix A Appendix A to Subpart C of Part 248 Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation The Adopting Release Appendix A (pages ) offers practical guidance about implementing your program and is worth reading. 13

S T R O O C K SPECIAL BULLETIN

S T R O O C K SPECIAL BULLETIN S T R O O C K SPECIAL BULLETIN May 8, 2013 EXECUTIVE SUMMARY The CFTC and SEC have issued jointly a release setting forth final rules and guidelines requiring certain business entities subject to their

More information

Identity Theft Regulation: Are you under the SEC/CFTC microscope?

Identity Theft Regulation: Are you under the SEC/CFTC microscope? Regulatory September 2013 brief A publication of PwC s financial services regulatory practice Identity Theft Regulation: Are you under the SEC/CFTC microscope? Overview Easy access to information has made

More information

Identity theft continues to make headlines as evidenced by the

Identity theft continues to make headlines as evidenced by the Investment Advisers Must Ramp Up Identity Theft Prevention Efforts By Bibb L. Strench Bibb L. Strench is Counsel at Seward & Kissel s Washington, D.C. office. He provides advice to registered investment

More information

Attachment A. Identification of Risks/Cybersecurity Governance

Attachment A. Identification of Risks/Cybersecurity Governance Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year

More information

OCIE CYBERSECURITY INITIATIVE

OCIE CYBERSECURITY INITIATIVE Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.

More information

CFTC and SEC Jointly Propose Identity Theft Rules

CFTC and SEC Jointly Propose Identity Theft Rules CLIENT MEMORANDUM March 7, 2012 CFTC and SEC Jointly Propose Identity Theft Rules Contents Identity Theft Prevention Program...1 Entities Required to Comply...1 Financial Institutions and Creditors...

More information

Privacy Policy & Identity Theft Prevention Program

Privacy Policy & Identity Theft Prevention Program Privacy Policy & Identity Theft Prevention Program Orcam Financial Group LLC PO Box 91098 4640 Cass St San Diego, CA 92109 (858) 220-5383 Orcam Financial Group LLC Privacy Policy February, 2014 Page 1

More information

Privacy of Consumer Financial Information

Privacy of Consumer Financial Information Background and Overview Introduction Title V, Subtitle A of the Gramm-Leach-Bliley Act ( GLBA ) 1 governs the treatment of nonpublic personal information about consumers by financial institutions. Section

More information

ASCINSURE SPECIALTY RISK PRIVACY/SECURITY PLAN July 15, 2010

ASCINSURE SPECIALTY RISK PRIVACY/SECURITY PLAN July 15, 2010 ASCINSURE SPECIALTY RISK PRIVACY/SECURITY PLAN July 15, 2010 OBJECTIVE This Security Plan (the Plan ) is intended to create effective administrative, technical and physical safeguards for the protection

More information

Substantive Requirements for a Registered Investment Adviser under the U.S. Investment Advisers Act of 1940

Substantive Requirements for a Registered Investment Adviser under the U.S. Investment Advisers Act of 1940 Substantive Requirements for a Registered Investment Adviser under the U.S. Investment Advisers Act of 1940 Alternative investment fund managers and other investment advisory firms that are registered

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Securities and Futures & Derivatives Alert

Securities and Futures & Derivatives Alert Securities and Futures & Derivatives Alert April 25, 2013 SECURITIES SEC and CFTC Issue Identity Theft Red Flags Rules I. Introduction On April 10, 2013, the Securities and Exchange Commission (SEC) and

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

PROPOSED INTERPRETIVE NOTICE

PROPOSED INTERPRETIVE NOTICE August 28, 2015 Via Federal Express Mr. Christopher J. Kirkpatrick Secretary Office of the Secretariat Commodity Futures Trading Commission Three Lafayette Centre 1155 21st Street, N.W. Washington, DC

More information

Section 10: Fair Credit Reporting Act (FCRA) Policy

Section 10: Fair Credit Reporting Act (FCRA) Policy Section 10: Fair Credit Reporting Act (FCRA) Policy Summary of Regulation The Fair Credit Reporting Act (FCRA) regulates Consumer Reporting Agencies (CRAs), users of consumer reports, and furnishers of

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

Statement of the Investment Company Institute. ERISA Advisory Council Working Group on Privacy and Security Issues Affecting Employee Benefit Plans

Statement of the Investment Company Institute. ERISA Advisory Council Working Group on Privacy and Security Issues Affecting Employee Benefit Plans Statement of the Investment Company Institute ERISA Advisory Council Working Group on Privacy and Security Issues Affecting Employee Benefit Plans September 1, 2011 (Submitted August 30, 2011) The Investment

More information

Lincoln Financial Group. FTC/SEC Red Flags Identity Theft Prevention Program

Lincoln Financial Group. FTC/SEC Red Flags Identity Theft Prevention Program Lincoln Financial Group FTC/SEC Red Flags Identity Theft Prevention Program Program Summary For Internal Use Only Table of Contents Page The Red Flags Rule 3 Key Points of the Program 4 Covered Accounts

More information

Standard: Information Security Incident Management

Standard: Information Security Incident Management Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation MELISSA J. KRASNOW, DORSEY & WHITNEY LLP

More information

Data Privacy and Gramm- Leach-Bliley Act Section 501(b)

Data Privacy and Gramm- Leach-Bliley Act Section 501(b) Data Privacy and Gramm- Leach-Bliley Act Section 501(b) October 2007 2007 Enterprise Risk Management, Inc. Agenda Introduction and Fundamentals Gramm-Leach-Bliley Act, Section 501(b) GLBA Life Cycle Enforcement

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

FACTA Identity Theft Red Flags Program. www.chs.acfei.com

FACTA Identity Theft Red Flags Program. www.chs.acfei.com 1 FACTA Identity Theft Red Flags Program Module 1 Fair and Accurate Credit Transactions Act Overview Identity thieves use individual s personal identifiable information to open new accounts and misuse

More information

White Paper on Financial Institution Vendor Management

White Paper on Financial Institution Vendor Management White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety

More information

THE LUTHERAN UNIVERSITY ASSOCIATION, INC. d/b/a Valparaiso University IDENTITY THEFT PREVENTION PROGRAM

THE LUTHERAN UNIVERSITY ASSOCIATION, INC. d/b/a Valparaiso University IDENTITY THEFT PREVENTION PROGRAM THE LUTHERAN UNIVERSITY ASSOCIATION, INC. d/b/a Valparaiso University IDENTITY THEFT PREVENTION PROGRAM SECTION 1: BACKGROUND The risk to Valparaiso University ("University"), its employees, students (in

More information

Data Processing Agreement for Oracle Cloud Services

Data Processing Agreement for Oracle Cloud Services Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services

More information

RANDOLPH COUNTY PUBLIC WORKS. Identity Theft Prevention Program. Adopted September 1, 2009 Effective beginning September 1, 2009

RANDOLPH COUNTY PUBLIC WORKS. Identity Theft Prevention Program. Adopted September 1, 2009 Effective beginning September 1, 2009 RANDOLPH COUNTY PUBLIC WORKS Identity Theft Prevention Program Adopted September 1, 2009 Effective beginning September 1, 2009 I. PROGRAM ADOPTION The Randolph County Public Works Department ( the Department

More information

University of Tennessee's Identity Theft Prevention Program

University of Tennessee's Identity Theft Prevention Program IDENTITY THEFT PREVENTION PROGRAM 1. BACKGROUND The University of Tennessee (UT) developed this Identity Theft Prevention Program pursuant to the Federal Trade Commission s Red Flags Rule, Section 114

More information

Frequently Asked Questions: Identity Theft Red Flags and Address Discrepancies

Frequently Asked Questions: Identity Theft Red Flags and Address Discrepancies Frequently Asked Questions: Identity Theft Red Flags and Address Discrepancies The staff of the Board of Governors of the Federal Reserve System (FRB), Federal Deposit Insurance Corporation (FDIC), National

More information

SUPPLIER SECURITY STANDARD

SUPPLIER SECURITY STANDARD SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard

More information

Supplier IT Security Guide

Supplier IT Security Guide Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA

More information

RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009

RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009 RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT Identity Theft Prevention Program Adopted August 3, 2009 Effective beginning August 1, 2009 I. PROGRAM ADOPTION The Randolph County Emergency Services

More information

Wellesley College Written Information Security Program

Wellesley College Written Information Security Program Wellesley College Written Information Security Program Introduction and Purpose Wellesley College developed this Written Information Security Program (the Program ) to protect Personal Information, as

More information

OCIE Technology Controls Program

OCIE Technology Controls Program OCIE Technology Controls Program Cybersecurity Update Chris Hetner Cybersecurity Lead, OCIE/TCP 212-336-5546 Introduction (Role, Disclaimer, Background and Speech Topics) SEC Cybersecurity Program Overview

More information

UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE. University of Cincinnati Red Flags Rule Protecting Against Identity Fraud

UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE. University of Cincinnati Red Flags Rule Protecting Against Identity Fraud UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Cincinnati Red Flags Rule Protecting Against Identity Fraud Objectives Background What is the FTC Red Flags Rule? Why do we need

More information

Cyber Exposure for Credit Unions

Cyber Exposure for Credit Unions Cyber Exposure for Credit Unions What it is and how to protect yourself L O C K T O N 2 0 1 2 www.lockton.com Add Cyber Title Exposure Here Overview #1 financial risk for Credit Unions Average cost of

More information

IDENTITY THEFT AND MUNICIPAL UTILITIES

IDENTITY THEFT AND MUNICIPAL UTILITIES Minnesota Municipal Utilities Association IDENTITY THEFT AND MUNICIPAL UTILITIES Identity Theft and Red Flags Rule requirements The Red Flags Rule implements portions of the Fair and Accurate Credit Transactions

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)

More information

VMware vcloud Air HIPAA Matrix

VMware vcloud Air HIPAA Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory

More information

FS Regulatory Brief. How the SEC s Custody Rule Impacts Private Fund Advisers. Introduction. The Custody Rule: An overview

FS Regulatory Brief. How the SEC s Custody Rule Impacts Private Fund Advisers. Introduction. The Custody Rule: An overview How the SEC s Custody Rule Impacts Private Fund Advisers Introduction Under the Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank, or the Act ) and rules recently adopted by the Securities

More information

J.H. ELLWOOD & ASSOCIATES, INC. 33 West Monroe, Suite 1850 Chicago, IL 60603 (312) 782-5432 www.ellwoodassociates.com.

J.H. ELLWOOD & ASSOCIATES, INC. 33 West Monroe, Suite 1850 Chicago, IL 60603 (312) 782-5432 www.ellwoodassociates.com. J.H. ELLWOOD & ASSOCIATES, INC. 33 West Monroe, Suite 1850 Chicago, IL 60603 (312) 782-5432 www.ellwoodassociates.com March 31, 2015 This brochure provides information about the qualifications and business

More information

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background: 1. Do you implement virus controls and filtering on all systems? Anti-Virus anti-virus software packages look for patterns in files or memory that indicate the possible presence of a known virus. Anti-virus

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10) MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...

More information

COUNCIL POLICY NO. C-13

COUNCIL POLICY NO. C-13 COUNCIL POLICY NO. C-13 TITLE: POLICY: Identity Theft Prevention Program See attachment. REFERENCE: Salem City Council Finance Committee Report dated November 7, 2011, Agenda Item No. 3 (a) Supplants Administrative

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP

More information

Featured Article Federal Red Flag and Related Identity Theft Prevention Rules: Is Your Organization in Compliance?

Featured Article Federal Red Flag and Related Identity Theft Prevention Rules: Is Your Organization in Compliance? Featured Article Federal Red Flag and Related Identity Theft Prevention Rules: Is Your Organization in Compliance? Article contributed by: Nancy L. Perkins, Arnold & Porter LLP As of November 1, 2008,

More information

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.

More information

California State University, Sacramento INFORMATION SECURITY PROGRAM

California State University, Sacramento INFORMATION SECURITY PROGRAM California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...

More information

Travis County Water Control & Improvement District No. 17. Identity Theft Prevention Program. Effective beginning November 20, 2008

Travis County Water Control & Improvement District No. 17. Identity Theft Prevention Program. Effective beginning November 20, 2008 Travis County Water Control & Improvement District No. 17 Identity Theft Prevention Program Effective beginning November 20, 2008 I. PROGRAM ADOPTION The Travis County Water Control and Improvement District

More information

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,

More information

TITLE XVIII: IDENTITY THEFT PREVENTION PROGRAM

TITLE XVIII: IDENTITY THEFT PREVENTION PROGRAM River Bend Identity Theft Program 1 TITLE XVIII: IDENTITY THEFT PREVENTION PROGRAM Chapter 18.01. IDENTITY THEFT PREVENTION PROGRAM 2 Identity Theft Prevention Program SECTION Chapter 18.01: IDENTITY THEFT

More information

RANDOLPH COUNTY HEALTH DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009

RANDOLPH COUNTY HEALTH DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009 RANDOLPH COUNTY HEALTH DEPARTMENT Identity Theft Prevention Program Adopted August 3, 2009 Effective beginning August 1, 2009 I. PROGRAM ADOPTION The Randolph County Health Department ( the Department

More information

31-R-11 A RESOLUTION ADOPTING THE CITY OF EVANSTON IDENTITY PROTECTION POLICY. WHEREAS, The Fair and Accurate Credit Transactions Act of 2003,

31-R-11 A RESOLUTION ADOPTING THE CITY OF EVANSTON IDENTITY PROTECTION POLICY. WHEREAS, The Fair and Accurate Credit Transactions Act of 2003, 5/23/2011 31-R-11 A RESOLUTION ADOPTING THE CITY OF EVANSTON IDENTITY PROTECTION POLICY WHEREAS, The Fair and Accurate Credit Transactions Act of 2003, Public Law 108-159, requires municipalities to promulgate

More information

Cyber Security Issues - Brief Business Report

Cyber Security Issues - Brief Business Report Cyber Security: Are You Prepared? This briefing provides a high-level overview of the cyber security issues that businesses should be aware of. You should talk to a lawyer and an IT specialist for a complete

More information

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 jmadeja@buchananassociates.com Each business is required by Massachusetts law

More information

HIPAA Security COMPLIANCE Checklist For Employers

HIPAA Security COMPLIANCE Checklist For Employers Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major

More information

A Guide to Benedictine College and Identity Theft

A Guide to Benedictine College and Identity Theft IDENTITY THEFT PREVENTION PROGRAM The risk to Benedictine College, its employees and students from data loss and identity theft is of significant concern to the College and can be reduced only through

More information

Keystone Financial Planning, Inc.

Keystone Financial Planning, Inc. Keystone Financial Planning, Inc. 7261 Engle Road Suite 308 Middleburg Heights, Ohio 44130 Telephone: 440.234.6323 Facsimile: 440.234.6844 Website: www.keystonefin.com February 10, 2014 FORM ADV PART 2

More information

The City of West Linn Identity Theft Prevention Program

The City of West Linn Identity Theft Prevention Program Identity Theft Prevention Program Implemented January 1, 2009 Updated: July 20, 2009 Updated: December 18, 2009 I. PROGRAM ADOPTION The City of West Linn ("Utility") developed this Identity Theft Prevention

More information

DATA BREACH COVERAGE

DATA BREACH COVERAGE THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000

More information

787 Wye Road, Akron, Ohio 44333 P 330-666-6200 F 330-666-7801 www.keystonecorp.com

787 Wye Road, Akron, Ohio 44333 P 330-666-6200 F 330-666-7801 www.keystonecorp.com Introduction Keystone White Paper: Regulations affecting IT This document describes specific sections of current U.S. regulations applicable to IT governance and data protection and maps those requirements

More information

Model Identity Theft Policy and Adopting Resolution

Model Identity Theft Policy and Adopting Resolution Model Identity Theft Policy and Adopting Resolution, Tennessee RESOLUTION NO. A RESOLUTION ADOPTING AN IDENTITY THEFT POLICY WHEREAS, The Fair and Accurate Credit Transactions Act of 2003, an amendment

More information

CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY

CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY Policy Number: 2008-02 Date Adopted: October 27, 2008 Department: Administrative SUBJECT: IDENTITY THEFT PREVENTION PROGRAM I. OBJECTIVE: A. To protect

More information

Policies and Procedures: IDENTITY THEFT PREVENTION

Policies and Procedures: IDENTITY THEFT PREVENTION Policies and Procedures: IDENTITY THEFT PREVENTION Section: Chapter: Policy: Compliance Administration Identity Theft Prevention I. PURPOSE The purpose of this policy is to protect patients and West Virginia

More information

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131 CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131 TOPICS 1. Threats to your business s data 2. Legal obligations

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Information Security Program Management Standard

Information Security Program Management Standard State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES

More information

MCPHS IDENTITY THEFT POLICY

MCPHS IDENTITY THEFT POLICY SECTION 1: BACKGROUND MCPHS IDENTITY THEFT POLICY The risk to the College, its employees and students from data loss and identity theft is of significant concern to the College and can be reduced only

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

MOTLOW STATE COMMUNITY COLLEGE

MOTLOW STATE COMMUNITY COLLEGE Page 1 of 5 MOTLOW STATE COMMUNITY COLLEGE SUBJECT: FACTA Red Flag Rule and Identity Theft Prevention Program I. BACKGROUND In late 2007 the Federal Trade Commission (FTC) and Federal banking agencies

More information

Pefin Advisors, LLC. 39 West 32 nd Street, New York, NY 10001 Telephone # (917) 261-2416 Fax# (917) 210-3959. www.pefin.com.

Pefin Advisors, LLC. 39 West 32 nd Street, New York, NY 10001 Telephone # (917) 261-2416 Fax# (917) 210-3959. www.pefin.com. FORM ADV Uniform Application for Investment Advisor Registration Part 2A: Investment Advisor Brochure and Brochure Supplements Item 1: Cover Page Pefin Advisors, LLC 39 West 32 nd Street, New York, NY

More information

Northeast Technology Center Board Policy 2110 Page 1 IDENTITY THEFT PREVENTION (MANY COVERED ACCOUNTS)

Northeast Technology Center Board Policy 2110 Page 1 IDENTITY THEFT PREVENTION (MANY COVERED ACCOUNTS) Page 1 IDENTITY THEFT PREVENTION (MANY COVERED ACCOUNTS) This Policy is adopted to ensure compliance with the Fair and Accurate Credit Transaction Act, 15 U.S.C. 1601 et seq. and the Federal Trade Commission

More information

EXHIBIT A Identity Theft Protection Program. Definitions. For purposes of the Policy, the following definitions apply (1);

EXHIBIT A Identity Theft Protection Program. Definitions. For purposes of the Policy, the following definitions apply (1); EXHIBIT A Identity Theft Protection Program Definitions. For purposes of the Policy, the following definitions apply (1); A. City means: the City of Troy, Montana B. Covered Account means: An account that

More information

CITY OF ANDREWS IDENTITY THEFT PREVENTION PROGRAM

CITY OF ANDREWS IDENTITY THEFT PREVENTION PROGRAM CITY OF ANDREWS IDENTITY THEFT PREVENTION PROGRAM Approved: February 26, 2010 Reviewed: March 18, 2015 I. PROGRAM ADOPTION The City of Andrews ( Utility ) developed this Identity Theft Prevention ( Program

More information

Identity Theft Prevention Program

Identity Theft Prevention Program Smyth County Policy Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in

More information

Chatsworth Water Works Commission. Identity Theft Prevention Program. Effective beginning December 1, 2008

Chatsworth Water Works Commission. Identity Theft Prevention Program. Effective beginning December 1, 2008 Chatsworth Water Works Commission Identity Theft Prevention Program Effective beginning December 1, 2008 I. PROGRAM ADOPTION The Chatsworth Water Works Commission ("Utility") developed this Identity Theft

More information

Five keys to a more secure data environment

Five keys to a more secure data environment Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational

More information

An Overview of the Identity Theft Red Flags and Address Discrepancies under the Fair and Accurate Credit Transactions Act of 2003 Final Rules

An Overview of the Identity Theft Red Flags and Address Discrepancies under the Fair and Accurate Credit Transactions Act of 2003 Final Rules An Overview of the Identity Theft Red Flags and Address Discrepancies under the Fair and Accurate Credit Transactions Act of 2003 Final Rules By: Andrea J. Shaw, Esq., Compliance Officer, Gorham Savings

More information

GUIDANCE FOR MANAGING THIRD-PARTY RISK

GUIDANCE FOR MANAGING THIRD-PARTY RISK GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,

More information

by: Scott Baranowski Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy

by: Scott Baranowski Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy June 10, 2015 MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT

More information

WHEREAS the Federal Trade Commission regulations include utility companies in the definition of creditor;

WHEREAS the Federal Trade Commission regulations include utility companies in the definition of creditor; CITY OF STATE OF GEORGIA ORDINANCE NO: AN ORDINANCE TO AMEND THE CODE OF ORDINANCES, CITY OF, GEORGIA TO PROVIDE A NEW ARTICLE, IDENTITY THEFT PREVENTION PROGRAM; TO COMPLY WITH FEDERAL REGULATIONS RELATING

More information

Privacy Law Basics and Best Practices

Privacy Law Basics and Best Practices Privacy Law Basics and Best Practices Information Privacy in a Digital World Stephanie Skaff sskaff@fbm.com What Is Information Privacy? Your name? Your phone number or home address? Your email address?

More information

CYBERSECURITY EXAMINATION SWEEP SUMMARY

CYBERSECURITY EXAMINATION SWEEP SUMMARY This Risk Alert provides summary observations from OCIE s examinations of registered broker-dealers and investment advisers, conducted under the Cybersecurity Examination Initiative, announced April 15,

More information

Covered Areas: Those EVMS departments that have activities with Covered Accounts.

Covered Areas: Those EVMS departments that have activities with Covered Accounts. I. POLICY Eastern Virginia Medical School (EVMS) establishes the following identity theft program ( Program ) to detect, identify, and mitigate identity theft in its Covered Accounts in accordance with

More information

SEC update: Cybersecurity initiatives. SEC update: Cybersecurity initiatives. Intelligize // 02

SEC update: Cybersecurity initiatives. SEC update: Cybersecurity initiatives. Intelligize // 02 Intelligize // 02 As is tradition, at the beginning of the year, the U.S. Securities and Exchange Commission outlined both its current state of affairs and annual goals for maintaining proper compliance

More information

Re: Big Data Request for Information

Re: Big Data Request for Information March 31, 2014 Attn: Big Data Study Office of Science and Technology Policy Eisenhower Executive Office Building 1650 Pennsylvania Avenue NW Washington, D.C. 20502 Ladies and Gentlemen: Re: Big Data Request

More information

identity Theft Prevention and Identification Requirements For Utility

identity Theft Prevention and Identification Requirements For Utility [Utility Name] Identity Theft Prevention Program Effective beginning, 2008 I. PROGRAM ADOPTION The [Utility Name] ("Utility") developed this Identity Theft Prevention Program ("Program") pursuant to the

More information

Ferris State University

Ferris State University Ferris State University BUSINESS POLICY TO: All Members of the University Community 2009:08 DATE: May 2009 I. BACKGROUND IDENTITY THEFT PREVENTION PROGRAM The risk to the University, and its students,

More information

Valdosta Technical College. Information Security Plan

Valdosta Technical College. Information Security Plan Valdosta Technical College Information Security 4.4.2 VTC Information Security Description: The Gramm-Leach-Bliley Act requires financial institutions as defined by the Federal Trade Commision to protect

More information

Identity Theft Prevention Program

Identity Theft Prevention Program The University of North Carolina at Chapel Hill Identity Theft Prevention Program The Board of Trustees of The University of North Carolina at Chapel Hill (the University ) adopts this Identity Theft Prevention

More information

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches

More information

Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs

Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs 1 Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs NEW YORK Byungkwon Lim blim@debevoise.com Gary E. Murphy gemurphy@debevoise.com Michael J. Decker mdecker@debevoise.com

More information

Policy: 208 Subject: Identity Theft Prevention Program Approved for Board Action: December 22, 2009 Dates Amended:

Policy: 208 Subject: Identity Theft Prevention Program Approved for Board Action: December 22, 2009 Dates Amended: Policy: 208 Subject: Identity Theft Prevention Program Approved for Board Action: December 22, 2009 Dates Amended: I. PROGRAM ADOPTION Hawkeye REC ("REC") developed this Identity Theft Prevention Program

More information

Regulation P Privacy of Consumer Financial Information

Regulation P Privacy of Consumer Financial Information Regulation P Privacy of Consumer Financial Information BACKGROUND AND OVERVIEW Title V, Subtitle A of the Gramm-Leach-Bliley Act ( GLBA ) governs the treatment of nonpublic personal information about consumers

More information

PROVISIONS IDENTITY THEFT RED FLAG FAQS

PROVISIONS IDENTITY THEFT RED FLAG FAQS R E D F L A G PROVISIONS 2 0 0 9 IDENTITY THEFT RED FLAG FAQS Provided to you by P r e p a r e d b y Eduard Goodman, J.D.,LL.M. Chief Privacy Officer I d e n t i t y T h e f t 9 11, L L C FREQUENTLY ASKED

More information

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg. ACCG Identity Theft Prevention Program ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.org July 2009 Contents Summary of ACCG Identity Theft Prevention Program...

More information