UCA Gramm-Leach Bliley Act (GLBA) Safeguards Rule Compliance Training Effective June 12, 2018 Adapted from materials published by the Federal Trade Commission.

Slides:



Advertisements
Similar presentations
University of Minnesota
Advertisements

UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
1 FTC SAFEGUARDS RULE Gramm-Leach-Bliley Act Effective 5/23/2003.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Security Vulnerabilities and Conflicts of Interest in the Provider-Clearinghouse*-Payer Model Andy Podgurski and Bret Kiraly EECS Department & Sharona.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Privacy Rule Training
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Privacy Laws & Higher Education. Agenda 1.Five Privacy Laws a.FERPA b.HIPAA c.GLB d.FACTA Disposal Rule e.CAN-SPAM 2.Overview of the Laws a.What does.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Springfield Technical Community College Security Awareness Training.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
Protecting Personal Information Guidance for Business.
Information Privacy and Compliance Training For All Brigham Young University– Idaho Employees.
1 SAFEGUARDING REGULATIONS AND HOW THEY EFFECT US MICHIGAN ASSOCIATION FOR STUDENT FINANACIAL SERVICE ADMINISTRATORS BY: KAREN REDDICK NATIONAL CREDIT.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
Informed Consent and HIPAA Tim Noe Coordinating Center.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Network security policy: best practices
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
2005 MASFAA CONFERENCE CHARLESTON, WEST VIRGINIA Ginny D’Angelo Vice President of Student Loans Commerce Bank Diane Lambart Fleming Associate Director.
2015 ANNUAL TRAINING By: Denise Goff
HIPAA PRIVACY AND SECURITY AWARENESS.
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
IVCC Information Security Plan Important information about the privacy of student records Adapted from SVCC Information Security Plan, 3/03. IVCC Revision.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
AICP New England 13 th Annual Education Day PRIVACY Jenny Erickson Vice President, Legislative and Regulatory Affairs The Life Insurance Association of.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
Eliza de Guzman HTM 520 Health Information Exchange.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
HIPAA Security Final Rule Overview
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
Juvenile Legislative Update 2013 Confidential Records and Protected Disclosures.
HIPAA Privacy Rule Training
An Update on FERPA and Student Privacy
Data Security Policies
Service Organization Control (SOC)
Post-Secondary Institution Data-Security Overview and Requirements
Chapter 3: IRS and FTC Data Security Rules
Agenda Introduction Why is cybersecurity important? Laws & Regulations
Protecting Personal Information Guidance for Business.
2016 Annual CPNI Training CPNI & PI Awareness Beth Slough,
Red Flags Rule An Introduction County College of Morris
Family Education Rights and Privacy Act
Disability Services Agencies Briefing On HIPAA
Current Privacy Issues That May Affect Your Credit Union
County HIPAA Review All Rights Reserved 2002.
CompTIA Security+ Study Guide (SY0-401)
Identity Theft Prevention Program Training
HIPAA Security Standards Final Rule
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Data Security Julie D. Wilson Sr
Building a Vertical Around Regulated Industries to Increase Your Business
EASFAA Annual Conference Portland, ME May 6, 2019
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

UCA Gramm-Leach Bliley Act (GLBA) Safeguards Rule Compliance Training Effective June 12, 2018 Adapted from materials published by the Federal Trade Commission (FTC) and University of Minnesota

Training Objectives To provide information to the UCA campus community and customers regarding: What is the Safeguards Rule and why it applies to UCA How the Safeguards Rule differs from FERPA What information is covered by the Safeguards Rule What is required of UCA to comply Examples of safeguards How UCA is complying

What is GLBA? GLBA was passed in 1999 and is intended “to protect consumers & customers who obtain ‘financial products or services to be used primarily for personal or other household purposes.’” (Choroszy, “Beyond FERPA”) Through FERPA compliance, UCA is exempt from privacy regulations in GLBA. (16 CFR 313.1(b)) However, compliance with FERPA is not an exemption from the Safeguards Rule; UCA and other colleges and universities are required to comply. (Schneider, “ED Proposes Auditing Safeguards Rule Compliance”)

How is GLBA different from FERPA? FERPA relates to students’ educational records, including their right to access and inspect them, what types of records and to whom information can be disclosed, etc. (http://uca.edu/registrar/ferpa/) GLBA Safeguards Rule pertains to nonpublic personal information, which is typically limited to an individual’s financial information obtained in connection with a financial product or service. (FTC, “Financial Institutions and Customer Information”) The University’s efforts should be aimed at ensuring the protection of all student, faculty, staff, and customer private data regardless of the applicable regulation (e.g., FERPA, HIPAA, GLBA).

What are the objectives of the Safeguards Rule? Insure the security and confidentiality of customer information Protect against any anticipated threats or hazards to the security or integrity of such information Protect against unauthorized access to or use of such information that could result in substantial harm or inconvenience to any customer. Source: 16 CFR 314.3(b)

Why is UCA required to comply? GLBA applies to financial institutions’ protection of customer information; colleges and universities are considered financial institutions under the Safeguards Rule primarily because they offer student loans, though other activities may also be covered (Schneider, “ED Proposes Auditing Safeguards Rule Compliance”) In the Program Participation Agreement (PPA) UCA has with the U.S. Department of Education, UCA agrees to comply with Standards for Safeguarding Customer Information issued by the FTC (specific GLBA provision added in 2015) (U.S. Dept of Education, DCL GEN-16-12, July 1, 2016)

What type(s) of information is covered? Personally identifiable financial information obtained in connection with a financial product or service offered or serviced by or on behalf of the University, including: Account balances Account numbers Debit/credit card numbers Income and payment history Credit score or rating Social security number Internet Service Provider (ISP) address Name, address, and other information provided on a loan application Important: This list is not comprehensive. Please direct any questions on whether information is covered by the Safeguards Rule to your department manager. Source: 16 CFR 313.3(o)(2)(i)

Customer Information Personally identifiable financial information (see previous slide) obtained in the following situations is covered by the Safeguards Rule: Information provided by a customer to obtain a financial product or service (e.g., loan, long-term payment plan with interest); Information about a customer resulting from a transaction involving a financial product or service between the customer and the University; and, Information otherwise obtained about a customer in connection with providing a financial product or service to that customer Important: Departments that accept loan or other applications for credit and then forward to another office, such as the Office of Student Financial Aid, are required to protect such information. Source: 16 CFR 313.3(o)(1)

Examples of activities not covered Customer use of a University ATM to withdraw funds, check account balances, etc. Offering and/or servicing deferred payments or short-term payment plans without interest Solely accepting payment by cash, check, or debit/credit card that the University did not issue Renting a University facility Payments for merchandise (e.g., books, clothing, etc.) Important: In general, financial products or services are those that would typically be offered by a financial institution, such as loans, investment/retirement accounts (e.g., IRA), insurance products, etc. Source: 16 CFR 313.3(i)(2)(ii) and the University of Minnesota

What is required of UCA? The Safeguards Rule requires financial institutions to develop and maintain an Information Security Program (ISP), which must include: A designated ISP Coordinator (currently the Vice President for Finance & Administration or designee); A risk assessment to identify internal and external threats to customer information; Implementation and monitoring of safeguards to control threats to customer information identified in the risk assessment; An evaluation and adjustment of the ISP due to changing circumstances or business operations; and, Actions to oversee third-party service providers to ensure they are capable of adequately safeguarding customer information Source: 16 CFR 314

Risk Assessment Requirements The University’s identification & assessment of risks to customer information should address, at a minimum, the following: Employee training & management; Information systems, including network & software design, as well as information processing, storage, transmission, & disposal; and Detecting, preventing, & responding to attacks, intrusions, or other systems failures Source: 16 CFR 314.4(b)

Examples of safeguards Reference checks/background checks on new employees who will be accessing customer information; Having new employees sign an agreement to follow the institution’s confidentiality and security standards for customer information; Limiting access to customer information to employees who have a business need/reason to access it; Requiring “strong” passwords (minimum number of characters; combination of letters, numbers, and symbols; etc.); Appropriate use policies for technology devices, including mobile devices; Immediately deactivating login credentials for terminated employees to prevent unauthorized network access; Source: FTC, “Financial Institutions and Customer Information”

Examples of safeguards (cont.) Ensuring only authorized employees have access to physical records containing customer information; Ensuring the transmission of customer information is done via a secure connection and/or encrypted; Properly disposing of customer information by shredding or another suitable method; Erasing or wiping data from technology devices containing customer information prior to disposal; Keeping network activity logs and monitor for unauthorized network access; and, Utilizing an intrusion detection system (IDS) to alert the institution of attempted network attacks Source: FTC, “Financial Institutions and Customer Information”

How UCA is complying The University has: Developed an Information Security Program (ISP) outlining the requirements of the Safeguards Rule and the roles and responsibilities of the ISP Coordinator and campus departments; Created a two-page reference guide on the types of information and activities that may be covered; Created a questionnaire to determine what campus areas handle covered information and how it is protected; Created a certification form for departments/administrative units to attest to compliance; and, Provided links to applicable University policies and external resources for additional information on the Safeguards Rule.

Resources Information Security Program (ISP) – contains the requirements of the Safeguards Rule and how the University is complying Safeguards Rule Examples – a short reference guide of activities and information that may be covered under the Safeguards Rule Safeguards Rule Compliance Training – this PowerPoint® providing an overview of the Safeguards Rule and how UCA is complying Safeguards Rule Compliance Questionnaire – required to be completed annually by departments handling customer information covered under the Safeguards Rule. It helps determine whether appropriate safeguards are in place. Safeguards Rule Certification Form – required to be completed annually by departments handling customer information covered under the Safeguards Rule. It demonstrates the necessary requirements for compliance have been satisfied.

Contacts For questions on procedures and information specific to your area, please ask your supervisor. For questions on the University’s Information Security Program (ISP) or compliance materials, please visit the Division of Finance & Administration web page. For assistance with network and computer security, policies, and procedures; please visit the Division of Information Technology (IT) web page.

Sources Choroszy, Melisa. “Beyond FERPA: Maintaining the Privacy and Confidentiality of Student Data.” Accessed April 18, 2017. Electronic Code of Federal Regulations (CFR): 16 CFR 313, 314 FTC, Financial Institutions and Customer Information: Complying with the Safeguards Rule. Published April 2006. Accessed April 17, 2017. Schneider, Megan. “ED Proposes Auditing Safeguards Rule Compliance.” NACUBO. April 13, 2017. UCA Registrar, FERPA. https://uca.edu/registrar/ferpa/. Accessed April 18, 2017. University of Minnesota Controller’s Office: Gramm-Leach Bliley-Act: Safeguards Rule. https://finsys.umn.edu/glba. Published June 1, 2012. Accessed April 18, 2017. U.S. Department of Education, Dear Colleague Letter GEN-16-12. Subject: Protecting Student Information. Publication Date July 1, 2016.