Directors’ College 2007 Protecting Your Customers’ Privacy A Directors’ Guide to GLBA By David Abbott, FDIC IT Examiner.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

University of Minnesota
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Information System Assurance Practices in China Key players doing IS Assurance In China Regulatory Regime and Professional Organizations -Regulatory AuthoritiesRegulatory.
1 SAFEGUARDING REGULATIONS AND HOW THEY EFFECT US MICHIGAN ASSOCIATION FOR STUDENT FINANACIAL SERVICE ADMINISTRATORS BY: KAREN REDDICK NATIONAL CREDIT.
Chapter 12: Regulatory Compliance for Financial Institutions.
Auditing Corporate Information Security John R. Robles Tuesday, November 1, Tel:
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
E B a n k i n g Information Security Guidelines ABA’s Technology Risk Management – A Strategic Approach Telephone/Webcast Briefing June 17, 2002.
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
The Role of Risk Management and Assurance in Effective Organizational Governance Urton Anderson The University of Texas at Austin.
Step 1: A.User enters id/pw for FI: encrypted in Quicken PIN vault B.Id/pw transmitted to Intuit CustomerCentral Servers at NCR using 128 bit SSL Step.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Vendor Risk: Effective Management is Essential
Compliance: A Traditional Risk-Based Audit Approach GR-ISSA Lloyd Guyot, MCS GSEC Sarbanes-Oxley USA PATRIOT Act Gramm-Leach-Bliley … more November, 2005.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
Due Diligence - The Regulator’s Perspective ABA Telephone/Webcast Briefing August 14, 2001 Cynthia Bonnette, Assistant Director FDIC Bank Technology Group.
INFORMATION SECURITY REGULATION COMPLIANCE By Insert name dd/mm/yyyy senior leadership training on the primary regulatory requirements,
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
Credit unions use social media in a variety of ways, including marketing, providing incentives, facilitating applications for new accounts, inviting feedback.
SECURITY POLICIES Indu Ramachandran. Outline General idea/Importance of security policies When security policies should be developed Who should be involved.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
September 14, David A. Reed Attorney at Law Reed & Jolly, PLLC (703)
Securing Your Computing Environment to Conform to Privacy Regulations July 31, 2002.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Supervision of Information Security and Technology Risk Barbara Yelcich, Federal Reserve Bank of New York Presentation to the World Bank September 10,
MAINTAINING PRIVACY & DATA SECURITY IN THE VIRTUAL PRACTICE OF LAW.
AICP New England 13 th Annual Education Day PRIVACY Jenny Erickson Vice President, Legislative and Regulatory Affairs The Life Insurance Association of.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Manage Your Risk Utilizing Collaborative Partnerships to analyze, simplify, compare & strategize.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
© Dr. John T. Whiting All Rights Reserved Slide 1 Achieving Compliance with GBLA & Other Laws and Regulations Impacting.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
FIRMA April 2010 DATA BREACHES & PRIVACY Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
PACB One-Day Cybersecurity Workshop CYBERSECURITY IN YOUR ISP! PRESENTED BY: JON WALDMAN, SBS – CISA, CRISC © Secure Banking Solutions, LLC
Compliance August 18, Agenda Outline Status Draft of Answers.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Chapter 8 Auditing in an E-commerce Environment
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
Cyber Risk Management Solutions Fall 2015 Thomas Compliance Associates, Inc
FIRMA National Risk Management Training Conference – Orlando, FL Wednesday April 9, 2008 Third Party / SAS 70 Reports A Regulatory and Standards Update.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
1 Vereniging van Compliance Officers The Compliance Function in Banks Amsterdam, 10 June 2004 Marc Pickeur CBFA CBFA.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Compliance Risk Management
Washington State Auditor’s Office Third Party Receipting Presented to Washington Public Ports Association June 2016 Peg Bodin, CISA.
Nassau Association of School Technologists
2013 LBA Bank Counsel Conference
Understanding HIPAA Dr. Jennifer Lu.
Optimizing Your Regulatory Compliance Program
IS4680 Security Auditing for Compliance
Red Flags Rule An Introduction County College of Morris
#IASACFO.
DATA BREACHES & PRIVACY Christine M
County HIPAA Review All Rights Reserved 2002.
UCA Gramm-Leach Bliley Act (GLBA) Safeguards Rule Compliance Training Effective June 12, 2018 Adapted from materials published by the Federal Trade Commission.
HIPAA Security Standards Final Rule
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Neopay Practical Guides #2 PSD2 (Should I be worried?)
University of Maryland Robert H. Smith School of Business
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Presentation transcript:

Directors’ College 2007 Protecting Your Customers’ Privacy A Directors’ Guide to GLBA By David Abbott, FDIC IT Examiner

The Regulations Gramm-Leach-Bliley Act -Section 501(b) FINANCIAL INSTITUTIONS’ SAFEGUARDS. In furtherance of the policy in subsection (a), each agency or authority described in section 505(a) shall establish appropriate standards for the financial institutions subject to their jurisdiction relating to administrative, technical, and physical safeguards (1) to insure the security and confidentiality of customer records and information; (2) to protect against any anticipated threats or hazards to the security or integrity of such records; and (3) to protect against unauthorized access to or use of such records or information which could result in substantial harm or inconvenience to any customer.

The Response Interagency Guidelines Establishing Standards for Safeguarding Customer Information –FDIC - 12 CFR Parts 308 and 364 –OCC - 12 CFR Part 30 –FRB - 12 CFR Parts 208, 211, 225, and 263 –OTS - 12 CFR Parts 568 and 570

Appendix B to Part 364—Interagency Guidelines Establishing Information Security Standards Table of Contents I. Introduction A. Scope B. Preservation of Existing Authority C. Definitions II. Standards for Safeguarding Customer Information A. Information Security Program B. Objectives III. Development and Implementation of Customer Information Security Program A. Involve the Board of Directors B. Assess Risk C. Manage and Control Risk D. Oversee Service Provider Arrangements E. Adjust the Program F. Report to the Board G. Implement the Standards

Breaches, Breaches and more Breaches* * Source -

Public Bank Breaches* Bank of America Wachovia PNC Westborough Bank, MA Citi Financial J.P. Morgan Chase & Co. North Fork Bank, NY Firstrust Bank La Salle Bank People's Bank Vystar Credit Union, FL Nat'l Institutes of Health Federal Credit Union U.S. Bank Sovereign Bank FirstBank West Shore Bank, MI Premier Bank, MO Chase Bank * Source -

Common GLBA Examination Findings Findings Partial inventories Incomplete risk assessments Weak Board reporting Limited ongoing training Lack of monitoring of suspicious activity for all customer information systems Incomplete incident response plans Weak oversight on service providers / vendors Limited validation

Inventory Identifying the data –Where is the data? Network, Servicer, Back-up, Physical –Who can access the data? Employees, Vendors, Consultants, Programmers –How can the data be accessed? Intranet, Internet, Database, Application

Risk Assessment How is the data threatened? –Internal and External; New and Old Threats How is the data protected? –Encryption, Access Control, Security Configurations How is the data monitored? –When, How Often, Independently How is the data disposed of? –Shredded, Electronically Destroyed --- –FACTA (FIL )

Risk Assessment Conclusions Are you mitigating all threats? Would breaches be caught? Are changes detectable? Are you doing enough?

Board Reporting Report to the Board. Each bank shall report to its board or an appropriate committee of the board at least annually. This report should describe the overall status of the information security program and the bank's compliance with these Guidelines. The report, which will vary depending upon the complexity of each bank's program should discuss material matters related to its program, addressing issues such as: risk assessment; risk management and control decisions; service provider arrangements; results of testing; security breaches or violations, and management's responses; and recommendations for changes in the information security program.

Training Determine the frequency –Most companies perform annually –All new employees “One Size Doesn’t Fit All” Combine with other training

Monitoring Need to determine what needs monitoring Alert triggers should be established Should be done by independent person Should be automated

Incident Reponses Need a definitive program Should address responses for any/all anticipated incidents Should consider walk-throughs and/or preparatory activities FIL

Service Providers and Vendors It is your responsibility to ensure that your Service Providers and Vendors adhere to GLBA All GLBA procedures should be conducted for all Service Providers and Vendors that have access or can gain access to Non-Public Customer Data Just having a Contract Clause is NOT enough FIL

Validation Vital part Needs to be done independently of the controls Frequency and Scope should be determined by your Risk Assessment

References Appendix B to Part 364—Interagency Guidelines Establishing Information Security Standards – FFIEC GLBA Online Resources – Privacy Rights Clearinghouse – FFIEC Handbooks –

Appendix B to Part 364—Interagency Guidelines Establishing Information Security Standards

FFIEC GLBA Online Training

Privacy Rights Clearinghouse

FFIEC Handbooks

lRobert Sargent - FDIC IT Specialist 15 Braintree Hill Office Park Braintree, Massachusetts (781) lThomas J. Donahue - OTS IT Exam Manager 10 Exchange Place - 18th Floor Jersey City, New Jersey (201) lPaul Nadeau – BOS FED Supervisory Examiner Federal Reserve Bank of Boston 600 Atlantic Avenue - PO Box 2076 Boston, Massachusetts (617) lPeter Carter - OCC Lead Technology Expert Office of the Comptroller of the Currency 112 Madison Avenue - Suite 400 New York, NY (212) Contacts