Gramm Leach Bliley Act. GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. 7/1/2007



Similar documents
FINAL May Guideline on Security Systems for Safeguarding Customer Information

Valdosta Technical College. Information Security Plan

Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act)

by: Scott Baranowski Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

California State University, Sacramento INFORMATION SECURITY PROGRAM

Index .700 FORMS - SAMPLE INCIDENT RESPONSE FORM.995 HISTORY

College of DuPage Information Technology. Information Security Plan

PII = Personally Identifiable Information

Montclair State University. HIPAA Security Policy

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY

Subject: Safety and Soundness Standards for Information

CREDIT CARD PROCESSING & SECURITY POLICY

INFORMATION SECURITY PROGRAM

Wellesley College Written Information Security Program

BERKELEY COLLEGE DATA SECURITY POLICY

Information Security Policy

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)

Client Advisory October Data Security Law MGL Chapter 93H and 201 CMR 17.00

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)

Page 1 of 15. VISC Third Party Guideline

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

Utica College. Information Security Plan

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

Title: Data Security Policy Code: Date: rev Approved: WPL INTRODUCTION

Data Privacy and Gramm- Leach-Bliley Act Section 501(b)

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

HIPAA Security. Jeanne Smythe, UNC-CH Jack McCoy, ECU Chad Bebout, UNC-CH Doug Brown, UNC-CH

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO

Vulnerability Management Policy

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

Information Resources Security Guidelines

HIPAA Security Alert

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Statement of Policy. Reason for Policy

CHIS, Inc. Privacy General Guidelines

Rowan University Data Governance Policy

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan

HIPAA BUSINESS ASSOCIATE AGREEMENT

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

Responsible Access and Use of Information Technology Resources and Services Policy

Rackspace Archiving Compliance Overview

CHAPTER 12 IDENTITY PROTECTION AND IDENTITY THEFT PREVENTION POLICIES

Preparing for the HIPAA Security Rule

New Boundary Technologies Financial Modernization Act of 1999 (Gramm-Leach-Bliley Act) Security Guide

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

PROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs

C.T. Hellmuth & Associates, Inc.

SAFEGUARDS FOR PROTECTING PRIVATE DATA - SERVICE PROVIDERS AND CONTRACTORS

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

Online Lead Generation: Data Security Best Practices

Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.

The HIPAA Security Rule Primer Compliance Date: April 20, 2005

HIPAA Information Security Overview

Information Security Plan effective March 1, 2010

Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5

CREDIT CARD PROCESSING POLICY AND PROCEDURES

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

Interagency Guidelines Establishing Information Security Standards. Small-Entity Compliance Guide

Identity theft. A fraud committed or attempted using the identifying information of another person without authority.

Privacy Impact Assessment. For. Non-GFE for Remote Access. Date: May 26, Point of Contact and Author: Michael Gray

How To Protect Decd Information From Harm

Security Controls What Works. Southside Virginia Community College: Security Awareness

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

31-R-11 A RESOLUTION ADOPTING THE CITY OF EVANSTON IDENTITY PROTECTION POLICY. WHEREAS, The Fair and Accurate Credit Transactions Act of 2003,

Client Security Risk Assessment Questionnaire

Securing the FOSS VistA Stack HIPAA Baseline Discussion. Jack L. Shaffer, Jr. Chief Operations Officer

TOURO UNIVERSITY WORLDWIDE AND TOURO COLLEGE LOS ANGELES IDENTITY THEFT PREVENTION POLICY 1.0 POLICY/PROCEDURE 2.0 PURPOSE 3.0 SCOPE 4.

Cyber Self Assessment

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

DSU Identity Theft Prevention Policy No. DSU

MASSIVE NETWORKS Online Backup Compliance Guidelines Sarbanes-Oxley (SOX) SOX Requirements... 2

Institutional Data Governance Policy

Estate Agents Authority

HIPAA Training for Hospice Staff and Volunteers

INFORMATION SECURITY FOR YOUR AGENCY

Transcription:

Gramm Leach Bliley Act 15 U.S.C. 6801-6809 6809 GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. 7/1/2007 1

Objectives for GLBA Training GLBA Overview Safeguards Rule Additional Resources GLBA Definitions iti 2

What is GLBA? The Gramm Leach Bliley Act (GLBA) is a comprehensive, federal law affecting financial institutions. The law requires financial institutions to develop, implement, and maintain administrative, technical, and physical safeguards to protect the security, integrity, and confidentiality of customer information. The Federal Trade Commission i (FTC) enforces compliance with GLBA. The FTC may bring an administrative enforcement action against any financial institution for non-compliance with the GLBA. 3

What is GLBA? Purdue University significantly engages in student loan making and provides other financial services to student customers. As such, Purdue falls within the definition of financial institution tion under the GLBA and must comply with the law s requirements. Financial Institution tion means any institution tion the business of which is engaging in financial activities. 4

What is GLBA? Examples of Purdue University Financial Products and Services Covered Under GLBA: Student loans, including receiving application information, and the making and servicing of such loans Financial advisory services (very limited at Purdue) Collection of delinquent loans Check cashing services Tax planning (very limited at Purdue) Obtaining information from a consumer report Career counseling services for those seeking employment in finance, accounting or auditing 5

What is GLBA? The GLBA is composed of several parts, including: the Privacy Rule (16 CFR 313) and the Safeguards Rule (16 CFR 314). 6

GLBA Privacy Rule The FTC has officially stated that any college or university that complies with the Family Educational Rights and Privacy Act (FERPA) (20 U.S.C. 1232g) and that is also a financial institution tion subject to the requirements of GLBA shall be deemed to be in compliance with GLBA s privacy rules if it is in compliance with FERPA (16 CFR 313.1). 7

GLBA Safeguards Rule The FTC has not made a similar exception for an institution of higher education with respect to the Safeguards Rule. The Safeguards ards Rule requires all financial institutions to develop an information security program designed to protect customer information. Purdue University must comply with the Safeguards Rule. 8

GLBA Safeguards Rule The objectives of the Safeguards Rule are to: Insure the security and confidentiality of customer information; Protect against any anticipated threats or hazards to the security or integrity of such information; and Protect against unauthorized access to or use of such information that could result in substantial harm or inconvenience to any customer. 9

GLBA Safeguards Rule Information Security Program means the administrative, technical, or physical safeguards used by a financial institution to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle customer information. Under Purdue s Information Security Program, a GLBA-covered department must assume responsibility for assuring adequate safeguards are in place within its area of responsibility. 10

GLBA Safeguards Rule The Information Security Program must include: Designation of staff to coordinate the safeguards program Identification and assessment of risks in each relevant area of the operation and an evaluation of the effectiveness of current safeguards Design and implementation of a safeguards program including regular monitoring and follow-up Selection of appropriate service providers including inclusion of contract language designed to protect customer information handled by third party service providers Evaluation and adjustment of the program in light of relevant circumstances and changes in business. 11

GLBA Safeguards Rule There are three types of safeguards that must be considered when a Purdue department implements safeguards to protect the security, confidentiality, and integrity of customer information : Administrative Safeguards Technical Safeguards Physical Safeguards 12

GLBA Safeguards Rule Administrative Safeguards include developing and publishing polices, standards, procedures, and guidelines, and are generally within the direct control of a department. Examples include : Reference checks for potential employees Confidentiality agreements that t include standards d for handling customer information Training employees on basic steps they must take to protect customer information (see detail later slide) Assure employees are knowledgeable about applicable policies and expectations Limit i access to customer information i to employees who have a business need to see it Impose disciplinary measures where appropriate 13

GLBA Safeguards Rule Physical Safeguards are generally within a department s control and include: Locking rooms and file cabinets where customer information is kept Using password activated screensavers Using strong passwords Changing passwords periodically and not writing them down Encrypting sensitive customer information in transit and at rest Referring calls or requests for customer information to staff trained to respond to such requests Being alert to fraudulent attempts to obtain customer information and reporting these to management for referral to appropriate law enforcement agencies 14

GLBA Safeguards Rule Physical Safeguards also include: Ensure that storage areas are protected against destruction or potential damage from physical hazards, like fire or floods Store records in a secure area and limit access to authorized employees Dispose of customer information appropriately: p» Designate a trained staff member to supervise the disposal of records containing customer personal information» Shred or recycle customer information recorded on paper and store it in a secure e area until the confidential recycling service picks it up» Erase all data when disposing of computers, diskettes, magnetic tapes, hard drives or any other electronic media that contains customer information» Promptly dispose of outdated customer information according to record retention policies 15

GLBA Safeguards Rule Technical Safeguards include the configuration of computing infrastructure and are generally the responsibility of centralized or departmental/zone IT computing staff. Departments should be knowledgeable regarding how their digital customer information is safeguarded. If additional technical controls are warranted, departments should work with IT staff to improve safeguards. Departments are also responsible for alerting IT staff to the existence of customer information on networks 16

GLBA Safeguards Rule Technical safeguards include: Storing electronic customer information on a secure server that is accessible only with a password - or has other security protections - and is kept in a physically-secure area Avoiding storage of customer information on machines with an Internet connection Maintaining i i secure backup media and securing archived data Using anti-virus software that updates automatically Obtaining and installing patches that resolve software vulnerabilities Following written contingency plans to address breaches of safeguards Maintaining up-to-date firewalls particularly if the institution uses broadband d Internet access or allows staff to connect to the network from home Providing central management of security tools and keep employees informed of security risks and breaches 17

GLBA Safeguards Rule In addition to developing their own safeguards, financial institutions are responsible for taking steps to ensure that their affiliates and service providers safeguard the customer information in their care. Affiliate means any company that controls, is controlled by, or is under common control with another company. Service Provider means any person or entity that receives, maintains, processes, or otherwise is permitted to access customer information through its provision of services directly to a financial institution. 18

PUID Purdue University uses the PUID as a unique identifier in many business transactions. The PUID is classified as sensitive University data and must be protected as such under the data handling guidelines. Information about the PUID is available at: http://www.purdue.edu/securepurdue/puid/ Welcome.cfm 19

Resources GLBA/HIPAA Information Security Program Committee http://www.purdue.edu/securepurdue/securityprogr ams.cfm Many of Purdue s existing IT policies address some of the compliance ce issues raised in the GLBA Safeguards Rule. http://www.purdue.edu/policies/pages/information_ technology/info_tech.html Purdue Social Security Number policy http://www.purdue.edu/policies/pages/information_technology /v_5_1.html All Purdue policies http://www.purdue.edu/policies/ 20

Resources SecurePurdue website for links to information security policies, standards, and best practices. http://www.purdue.edu/securepurdue/bestpractices/ SecurePurdue website for links on identity theft and identity protection. http://www.purdue.edu/securepurdue/theft.cfm University Data Handling Classifications and Guidelines. http://www.purdue.edu/securepurdue/bestpractices/dataclass. cfm 21

Resources Additional guidance regarding GLBA is available at: http://www.ftc.gov/privacy/privacyinitiatives /glbact.html 22

Resources Additional Questions? Contact your manager for specific procedural questions in your area. Contact IT Networks and Security for information regarding risk assessments, educational materials, and questions about computer security at itap-securityhelp@purdue.edu Contact Purdue s Chief Information Security Officer for questions about the GLBA/HIPAA Program Committee. 23

GLBA Definitions GLBA Definitions 24

GLBA Definitions Customer Information is any record containing i nonpublic personal information about a customer of a financial institution, whether in paper, electronic, or other form, that is handled or maintained by or on behalf of the financial institution or its affiliates. 25

GLBA Definitions GLBA applies to customer information obtained in a variety of situations, including: Information provided to obtain a financial product or service; Information about a customer resulting from any transaction involving a financial product or service between the institution and a customer; Information otherwise obtained about a customer in connection with providing a financial product or service to the customer. 26

GLBA Definitions Non-Public Personal Information means personally identifiable financial information that is: Provided by a consumer to a financial institution; Resulting from any transaction with the consumer or any service performed for the consumer; or Otherwise obtained by the financial institution. The term also includes any list, description, or other grouping of consumers and publicly available information pertaining to them that is derived using any personally identifiable financial information that is not publicly available. 27

GLBA Definitions Examples of Non-public Personal Information (NPI) Include: Social Security Number (SSN) Financial account numbers Credit card numbers Date of birth Name, address, and phone numbers when collected with Financial data Details of any financial transactions 28