GLB-act

advertisement
Office of Legal Affairs
MEMORANDUM – PRIVILEGED AND CONFIDENTIAL
TO:
Gramm-Leach-Bliley Policy Committee
FROM:
Suzanne Carter
RE:
UWM’s Obligations Under the Gramm-Leach-Bliley Act
DATE:
October 3, 2003
In 1999, Congress responded to the increasing digitization of financial information by
passing the Gramm-Leach-Bliley Act (GLBA), 15 U.S.C. § 6801 et seq. Congress
probably did not consider GLBA’s effect on colleges and universities, but the Federal
Trade Commission provided guidance to institutions of higher education in 2002, when
it issued GLBA’s implementing regulations (16 C.F.R. Part 314). The regulations
subjected practically every entity that collects financial data to GLBA and thereby in
effect guaranteed that financial aid services alone would obligate most colleges and
universities to comply with GLBA and its regulations.
GLBA consists of two sections that concern privacy and information safeguards,
respectively. The privacy section requires those institutions required to comply with
GLBA to notify people of their right to keep their financial information confidential and
their right to decide whether that information may be made publicly available. Many
universities and colleges seem to rely on the idea that if they are in compliance with
FERPA, they comply with this portion of GLBA. While it is true that such a FERPA
carve-out exists, it is important to remember that FERPA only applies to students only.
Therefore, if in the future UWM were to collect financial data on its employees or other
non-students through, for example, a home-loan program, a check-cashing service, a
tax-preparation service, or an ID debit-card system, it likely would have to comply with
the privacy requirements. Fortunately, the privacy rule is not overly onerous.
Because of its data collection activities in conjunction with providing financial aid,
UWM is required to comply with GLBA’s second section, pertaining to safeguards. This
section requires institutions to ensure the security and confidentiality of any individual’s
non-public personal financial information, such as bank and credit card account
2310 E. Hartford Avenue
Chapman Hall Room 380 · P. O. Box 413 ·
Milwaukee, WI 53201-0413
414 229-4278
FAX: 414 229-3919
E-mail: cartersl@uwm.edu
numbers, credit histories, and social security numbers used in conjunction with
financial transactions.
The safeguards rule states that, in order to make certain that such data is kept
confidential, institutions must develop, implement and maintain a comprehensive
information security program that is written in accessible language and contains
appropriate administrative, technological and physical safeguards. The regulations give
institutions quite a bit of freedom in developing such a program. They require that
covered entities engage in a risk-assessment process for each relevant area of UWM’s
operations. Such a process must include the following steps:

Designate one or more employees to coordinate the information security
program;

Institute an employee training program in information security. Such a program
should cover anyone who has access to personal financial information;

Assess internal and external risks that may threaten information systems,
including those risks involved in the processing, storage, transmission, and
disposal of information;

Devise a method for detecting, preventing and responding to attacks and other
system failures;

Oversee service providers by contractually obligating them to maintain
safeguards that adhere to GLBA; and

Adjust the security program as it is evaluated through use.
While the regulations include few practical suggestions in regard to these steps, they
emphasize that an information security program is never really complete in that it must
continuously respond to new technologies and be evaluated through its responses to
system failures. UWM must be diligent in fulfilling the obligations per the final step
listed above by frequently assessing its information security plan, and the plan itself
must be flexible enough to accommodate periodic improvements.
The date by which the information security plan was required to be drafted was May 23,
2003. Most colleges and universities seem to have missed the compliance date (I was
only able to locate Green Bay’s information security plan among UW campuses), and at
this point, the harshest sanction for non-compliant colleges and universities appears to
be a FTC audit of security practices. Nevertheless, it would be advantageous for UWM
to draft its information security plan as soon as possible, not only in order to comply
with GLBA but also to minimize the liabilities potentially posed by financial information
that is inadvertently exposed.
Download