Gramm Leach Bliley (GLB) Safeguards Rule

advertisement
Original Version: May 31, 2004
Revised: December 30, 2006
Purdue University
Information Security Program
As it pertains to the Gramm Leach Bliley Act and the Health Insurance Portability and
Accountability Act of 1996, Safeguarding of Electronic Customer Information and
Protected Health Information
Objectives of the Information Security Program for the Gramm Leach Bliley Act (GLBA)
and Health Insurance Portability and Accountability Act of 1996 (HIPAA):
 Ensure the security and confidentiality of customer information in compliance with
applicable GLBA rules as published by the Federal Trade Commission.
 Provide administrative, physical, and technical safeguards to ensure compliance with the
HIPAA Security Rule.1
 Safeguard against anticipated threats to the security or integrity of protected electronic data.
 Guard against unauthorized access to or use of protected data that could result in harm or
inconvenience to any customer.
Contents
I. Coordination of the Information Security Program
II. Risk Assessment and Safeguards2
III. Employee Training and Education
IV. Oversight of Service Providers and Contracts
V. Evaluation and Revision of the Information Security Plan
VI. Definitions
VII. Appendices
I. Coordination and Responsibility for the Information Security Program
The Coordinator of the Information Security Program is the Chief Information Security Officer
(CISO) for Purdue University. The Coordinator has also been designated as the HIPAA Security
Officer. The Coordinator is responsible for the development, implementation, and oversight of
Purdue University’s compliance with the policies and procedures required by the Gramm Leach
Bliley Act (GLBA) Safeguards Rule and the Security Rule of the Health Insurance Portability
and Accountability Act of 1996 (HIPAA). Although ultimate responsibility for compliance lies
with the Coordinator, representatives from each of the operational areas are responsible for
1 Purdue University compliance with the HIPAA Privacy Rule is not covered by this document. This Information
Security Program document pertains to the GLBA Safeguards Rule and the HIPAA Security Rule.
2 For purposes of HIPAA, only Security Rule risk assessments are covered by this document.
1
implementation and maintenance of the specified requirements of the security program in their
specific operation.
See Appendix A-1 for the matrix identifying the GLBA operational areas and their
representatives. Appendix A-2 includes a list of areas considered for inclusion in this program,
but deemed to be outside the scope of the GLBA Safeguards Rule.
A list of Purdue University HIPAA covered components and their representatives may be found
at http://www.purdue.edu/hipaa/arealiaisons/arealiaisons.shtml.
These lists (GLBA operational areas and their representatives and HIPAA covered components
and their representatives) may be updated from time to time.
GLBA Committee
The GLBA Standing Committee exists to ensure that this Information Security Program is kept
current and to evaluate potential policy or procedural changes driven by GLBA. This committee
includes the following individuals: Director of Audits, Chief Information Security Officer,
Executive Director Financial Aid, Bursar, University Counsel, and representatives from the
Calumet, Fort Wayne, and North Central regional campuses. Other individuals may be added as
needed. This committee meets biannually and as needed.
Questions regarding GLBA impacts on business processes and policies should be directed to the
Coordinator of the Information Security Program.
HIPAA Steering Committee
The HIPAA Steering Committee was created to ensure that activities are sufficient for Purdue
University to maintain compliance with the three segments of the HIPAA Administrative
Simplification regulations: the Privacy Rule, Transaction and Code Set Standards, and the
Security Rule. Changes to the HIPAA Security Rule, which could impact the Information
Security Plan will be discussed during the quarterly HIPAA Steering Committee meetings.
A roster of HIPAA Steering Committee members may be found at:
http://www.purdue.edu/hipaa/administration/hipaasteeringcommrosterforwebsite.pdf
Questions regarding HIPAA impacts on business processes and policies should be directed to the
Director of HIPAA Privacy Compliance.
Questions regarding technical issues, risk assessments, and information technology security
policy should be directed to the Office of Information Technology Security and Privacy.
This Information Security Program includes input from other Purdue University departments and
from the University’s General Counsel.
2
II. Risk Assessment and Safeguards
There is an inherent risk in handling and storing any information that must be protected.
Identifying areas of risk and maintaining appropriate safeguards can reduce risk. Safeguards are
designed to reduce the risk inherent in handling protected information and include safeguards for
information systems and the storage of paper.
The GLBA Information Sheet and HIPAA Information Sheet are located in Appendix B.
The Coordinator of the Information Security Program must work with all relevant areas of the
University to identify potential and actual risks to security and privacy of electronic information.
Each representative, or designee, will fully participate in periodic data security reviews as
specified by the Coordinator. Each representative, or designee, must also participate in a data
security review whenever there is a material system change in that area. Documentation of the
review will be retained by the Coordinator for a period of six (6) years from the date of its
creation or the date when it last was in effect, whichever is later.
III. Employee Training and Education
Employees handle and have access to protected information in order to perform their job duties.
This includes permanent and temporary employees as well as student employees, whose job
duties require them to access protected information or who work in a location where there is
access to protected information. Departments are responsible for maintaining a high level of
awareness and sensitivity to safeguarding protected information and should periodically remind
employees of its importance. Seemingly minor changes to office layout and practices could
significantly compromise protected information if a culture of awareness is not present.
The department representative is responsible for ensuring that staff are trained in the relevant
GLBA and HIPAA concepts and requirements. Training materials relative to GLBA and HIPAA
have been developed by the GLBA Committee and the HIPAA Privacy Compliance Office.
These training templates and required materials are available on the web (see Appendix C for the
websites). Upon approval by the Coordinator for GLBA and Director of HIPAA Privacy
Compliance for HIPAA, these training templates and other materials may be tailored by each
department to reflect their individual training needs. Training may be delivered in a variety of
ways that meet the department’s objectives. Departments are responsible for maintaining
records of staff that have received training and must be able to produce written copies upon
request. A sample GLBA acknowledgement statement and HIPAA Confidentiality Statement
are provided in Appendix G. These statements should be signed by all employees receiving
GLBA or HIPAA training. These records should be maintained in departmental files by the
GLBA or HIPAA representative. These records need to be maintained and available for audit for
a period of six (6) years from the date of the record’s creation or the date when it was last in
effect, whichever is later.
3
IV. Oversight of Service Providers and Contracts
GLBA requires the University to take reasonable steps to select and retain service providers who
maintain appropriate safeguards for covered data and information. GLBA Contracts with service
providers entered into prior to June 24, 2002 were grandfathered until May 2004. University
General Counsel prepared language to ensure that all relevant service provider contracts comply
with GLBA provisions. Contracts should be reviewed to ensure the following language is
included:
[Service Provider] agrees to implement and maintain a written comprehensive
information security program containing administrative, technical and physical
safeguards for the security and protection of customer information and further
containing each of the elements set forth in § 314.4 of the Gramm Leach Bliley
Standards for Safeguarding Customer Information (16 C.F.R. § 314). [Service Provider]
further agrees to safeguard all customer information provided to it under this Agreement
in accordance with its information security program and the Standards for Safeguarding
Customer Information.
The GLBA contract addendum and service provider due diligence questionnaire are
provided in Appendix H.
Similarly, HIPAA allows a covered component to disclose protected health information to a
business associate who is providing a particular function for the covered entity only if the
covered entity obtains satisfactory assurances that the business associate will safeguard the
information appropriately as required by HIPAA. Excluded from this requirement are
disclosures for treatment, and other exceptions. Standard contracts have been developed by
University General Counsel and such contracts are administered by the HIPAA Privacy
Compliance Office. The covered component is responsible for identifying the need for a
business associate agreement and should contact the HIPAA Privacy Compliance Office to
determine if a business associate's agreement is required and for issuance of the agreement.
Purdue Purchasing may issue a business associate agreement in conjunction with a master
agreement and will coordinate with the HIPAA Privacy Compliance Office should this occur.
These contracts should not be issued by covered components independently from the HIPAA
Privacy Compliance Office.
V. Evaluation and Revision of the Information Security Program
GLBA mandates that this Information Security Program be subject to periodic review and
adjustment. The most frequent of these reviews will occur within Information Technology
Security and Privacy where constantly changing technology and constantly evolving risks
indicate the wisdom of regular reviews. Processes in other relevant offices of the University such
as data access procedures and the training program should undergo regular review. It is the
policy of Purdue University to conduct yearly security assessment reviews for HIPAA purposes.
4
This Information Security Program, as well as the related Data Retention Policy, should be
reevaluated annually in order to ensure ongoing compliance with existing and future laws and
regulations.
VI. Definitions
Covered Component means any area of Purdue University, which is required to be
compliant with either GLBA or HIPAA regulations.
Customer Information means any record containing nonpublic personal information as
defined in 16 C.F.R. § 313.3(n), about a customer of a financial institution, whether in paper,
electronic, or other form, that is handled or maintained by or on behalf of [the financial
institution] or [its] affiliates.
Financial Product or Service means
(i)
any product or service that a financial holding company could offer by engaging
in a financial activity; and
(ii)
Financial Service includes your evaluation or brokerage of information that you
collect in connection with a request or an application from a consumer for a
financial product or service.
Non-Public Personal Information means
(i)
Personally identifiable financial information and
(ii)
Any list, description, or other grouping of consumers (and publicly
available information pertaining to them) that is derived using any
personally identifiable financial information that is not publicly
available. 16 C.F.R. § 313.3(n) (1).
Personally Identifiable Financial Information means any information:
(i)
A consumer provides to you to obtain a financial product or
service from you;
(ii)
About a consumer resulting from any transaction involving a
financial product or service between you and a consumer; or
(iii)
You otherwise obtain about a consumer in connection with
providing a financial product or service to the consumer.
Protected Information refers to either personally identifiable financial information or
protected health information, which is covered by either the Gramm Leach Bliley Act
(GLBA) or the Health Insurance Portability and Accountability Act of 1996 (HIPAA).
Protected Health Information (=individually identifiable health information) is
information that is a subset of health information, including demographic information
collected from an individual, and:
(i)
Is created or received by a health care provider, health plan, employer, or health
care clearinghouse; and
5
(ii)
Relates to the past, present, or future physical or mental health or condition of an
individual; the provision of health care to an individual; or the past, present, or
future payment for the provision of health care to an individual; and
a. That identifies the individual; or
b. With respect to which there is a reasonable basis to believe the information
can be used to identify the individual.
Examples of Activities the FTC is Likely to Consider as a Financial Product or
Service include:
 Student (or other) loans, including receiving application information, and the making
or servicing of such loans
 Financial or investment advisory services
 Credit counseling services
 Tax planning or tax preparation
 Collection of delinquent loans and accounts
 Sale of money orders, savings bonds or traveler’s checks
 Check cashing services
 Travel agency services provided in connection with financial services
 Real estate settlement services
 Money wiring services
 Issuing credit cards or long term payment plans involving interest charges
 Personal property and real estate appraisals
 Career counseling services for those seeking employment in finance, accounting or
auditing
 Services provided by a principal, broker or agent with respect to life, health, liability
or disability insurance products
 Obtaining information from a consumer report
 Providing or issuing annuities
Last revised: 12/30/2006
6
VII. Appendices
A.


A-1: Business Processes Identified for Risk Assessment Under Gramm Leach
Bliley - Matrix as of August, 2004.
A-2:
Business Processes Considered Out of Scope Under Gramm Leach
Bliley – Matrix as of August, 2004.
B.


B-1: GLBA Information Sheet.
B-2: HIPAA Information Sheet. More information on Purdue University’s
HIPAA compliance program can be found at: http://www.purdue.edu/hipaa/.
C. GLBA and HIPAA Training Templates (departments are responsible for maintaining
records of staff that have received training). Note: Either training template may be
used or departments may adapt, with permission, the training template relative to
departmental needs.
1. http://www.itap.purdue.edu/security/policies/GLB_Safeguards_Rule_Training_Business_Office.pdf
2. http://www.itap.purdue.edu/security/policies/GLB_Safeguards_Rule_Training_General.pdf
4. http://www.purdue.edu/hipaa/stafftraining/stafftraining.shtml
D. Legal References (citations)
1. 15 USC, Subchapter I, §§ 6801-6809 (Gramm-Leach-Bliley Act)
2. Pub. L. No. 104-191, 110 Stat. 1936 (codified in scattered sections of 18, 26,
29, and 42 U.S.C.). (Health Insurance Portability and Accountability Act of
1996)
3. 16 CFR, Part 313 (Privacy Regulations, see reference to Family Educational
Rights and Privacy Act (FERPA).)
4. 20 USC, Chapter 31, 1232g (FERPA)
5. 34 CFR, part 99 (FERPA regulations)
6. 16 CFR, part 314 (Safeguard Regulations, as published in the Federal
Register, 5/23/02)
7. 45 CFR, parts 160 & 164; 68 Fed. Reg. 8334 (Feb. 20, 2003) (HIPAA
Security Regulations)
8. NACUBO Advisory Report 2003-01, issued 1/13/03
9. FTC Facts for Business: Financial Institutions and Customer Data:
Complying with the Safeguards Rule, published September 2002
E. Selected University Policies, Executive Memoranda (referenced)
 No. B-50, Terms and Conditions of Employment of Faculty Members,
http://www.purdue.edu/oop/policies/pages/human_resources/b_50.html
 No. B-55, Terms and Conditions of Employment of Administrative and
Professional Staff,
http://www.purdue.edu/oop/policies/pages/human_resources/b_55.html
 No. C-2, Disclosure of University Records: Procedures for Use in Connection
with the “Access to Public Records” Law, and in Response to Third-Party
7














Subpoenas,
http://www.purdue.edu/oop/policies/pages/human_resources/c_2.html
No. C-8, Policy for Security Standard Practice Procedures,
http://www.purdue.edu/oop/policies/pages/records/c_8.html
C-10, Delegation of Administrative Authority and Responsibility to Officers
Reporting to the President of the University,
http://www.purdue.edu/oop/policies/pages/governance/c_10.html
No. C-34, Data Security and Access Policy Statement,
http://www.purdue.edu/oop/policies/pages/information_technology/c_34.html
No. C-41, Assignment of Authority and Responsibility for the Retention and
Disposal of University Records,
http://www.purdue.edu/oop/policies/pages/records/c_41.html
No. C-51, University Policy Regarding the “Family Educational Rights and
Privacy Act of 1974” (as amended),
http://www.purdue.edu/oop/policies/pages/records/c_51.html
IT Resource Acceptable Use Policy (V.4.1),
http://www.purdue.edu/policies/pages/information_technology/v_4_1.html
Social Security Number Policy (V.5.1),
http://www.purdue.edu/policies/pages/information_technology/v_5_1.html
Authentication and Authorization (V.1.2)
http://www.purdue.edu/policies/pages/information_technology/v_1_2.html
Incident Response (V.1.4)
http://www.purdue.edu/policies/pages/information_technology/v_1_4.html
Privacy for Electronic Information (V.1.3)
http://www.purdue.edu/policies/pages/information_technology/v_1_3.html
HIPAA Covered System and Application Logging (V.1.7) Interim
http://www.purdue.edu/policies/pages/information_technology/v_1_7_interim
.html
Proper Disposal of Electronic Media (V.1.5) Interim
http://www.purdue.edu/policies/pages/information_technology/v_1_5.html
Remote Access to IT Resources (V.1.6) Interim
http://www.purdue.edu/policies/pages/information_technology/v_1_6_interim
.html
Electronic Mail (V.3.1)
http://www.purdue.edu/policies/pages/information_technology/v_3_1.html
F. Selected Purdue Information Technology Administrative Computing Guidelines or
Policies (referenced)
1. Standards http://www.purdue.edu/securepurdue/standards/
2. Best Practices http://www.purdue.edu/securepurdue/bestPractices/
G.


G-1: Example GLBA Acknowledgement Statement
G-2: Example HIPAA Confidentiality Statement
8
H. GLBA Contracts Addendum and Service Providers Questionnaire
I. GLBA Quick Reference Checklist
9
Appendix A-1
Business Processes Identified for Risk Assessment Under the Gramm Leach Bliley Act
Matrix as of August 2004
Process
Area - West
Lafayette
Campus
Division of
Financial Aid
WL Area
Contact
Regional Campus
Contact
Rationale
Financial Aid
Director
Financial Aid
Director
Loans – Purdue and
Perkins/Health
Profession/Nursing
(application).
Loans – Purdue and
Perkins/Health
Profession/Nursing
(servicing and
collection)
Loans – School as
Lender
Deferred fees
Division of
Financial Aid
Financial Aid
Director
Financial Aid
Director
Involves collection of student
and parent personal financial
information in conjunction
with potentially being offered
student loans as part of the aid
package.
Student loans are a financial
product or service.
Loan Operations
Manager,
Loan
Program
N/A
Student loans are a financial
product or service.
Bursar
Bursar
Bursar
Bursar
Bursar
Bursar
Installment plan
Bursar
Bursar
Bursar
Budget plan
Bursar
Bursar
Bursar
Accounts Receivable
University
Collections
Manager,
UCO
Comptroller
Credit bureau
reporting
University
Collections
Manager,
UCO
Comptroller
Collection agency
referrals
University
Collections
Manager,
UCO
Comptroller
Student loans are a financial
product or service.
Represents offering “credit”
for tuition and fee payments
through deferment of amounts
due beyond due date.
Includes fee for service.
Represents offering “credit”
for tuition and fee payments
through deferment of amounts
due beyond due date.
Includes fee and truth in
lending disclosures.
Up front financing for tuition
and fees. Includes fee for
service.
CARS system used to bill for
tuition and fee amounts past
due or due to bad checks or
failed ACH payments.
Student loans and tuition
debts are reported to credit
bureaus.
Student loans and tuition
debts are referred to third
party agencies for collection.
Receipt and
processing of
applications for
financial aid
10
Process
Care Credit in Vet
Teaching Hospital –
“looks” like regular
merchant card
activity. We have
app forms available,
but don’t make credit
decisions
Downloads of
mainframe or client
server data to Access
or other query
databases
Lockbox processing
Planned Giving
Area - West
Lafayette
Campus
Credit Card
Operations
WL Area
Contact
Regional Campus
Contact
Credit Card
Operations
Manager
N/A
Bursar
Computing
Mgr of
Systems and
Office
Automation
Comptroller
Includes
student
loans,
accounts receivable, tuition
and fee payment plan
information.
Credit Card
Operations/Bursar
Bursar &
Credit Card
Operations
Manager
NA
General Counsel,
Office of Planned
Giving
General
Counsel,
University
Development
Office
General Counsel,
University
Development Office
Student loan payments and
deferred fee payments are
processed
through
the
lockbox. Staff with access to
lockbox information system
(LOIS) can view statements
and invoices imaged by bank.
Planned Giving maintains tax
information
for
certain
individuals
as
part
of
recommending a particular
deferred gift option.
11
Rationale
Appendix A-2
Business Processes Considered Out-of-Scope under the Gramm Leach Bliley Act
Matrix as of August 2004
Process
Area - West
Lafayette
Campus
Compensation
and Benefits
Reason for
Exclusion
Rationale
Not applicable under
Act
Purdue University does not provide financial
or investment advice.
University Tax
Group
Not applicable under
Act
Purdue University does not provide tax advice
or return preparation.
Boiler debit card
Card Office
Not applicable under
Act
Purdue University is not providing credit, nor
is confidential information collected.‫٭‬
Transmission of
student information to
National Clearing
House
Salary and travel
advance promissory
notes (in foundation)
Affiliated
organizations’
investments in CMIP
and UEP
Faculty editorships
Division of
Financial
Aid/Registrar
Not applicable under
Act
Task is not in conjunction with customers
obtaining financial products or services.
Purdue
Research
Foundation
Investments/Ac
counting
Out of Scope
Process resides in foundation.
Not applicable under
Act
Investments are not for individuals and
customer information is not captured.
Various
academic areas
Out of Scope
Limited tax return
(for student orgs)
preparation by Tax
Group
Verification of
employment/salary by
banks for purposes of
employees obtaining
loans
Direct deposit
(PEFCU file
transmission)
University Tax
Group
Not applicable under
Act
Services are not provided to individuals;
should be cautious about assessing fees for this
service as other regulations applicable to banks
may apply.
Services are not being provided to individuals.
Payroll/Investm
ents
Not applicable under
Act
Direct Deposit of
Financial Aid
(PEFCU file
transmission)
ACH Activities:
Bursar
Not applicable under
Act.
Remittance of
withholdings
University Tax
Group/Investme
nts
Not applicable under
Act
Financial counseling
by Compensation and
Benefits
Tax treaty analysis by
University Tax Group
Payroll
Not applicable under
Act
12
Incidental process; not involved in University
providing financial products or services.
However, good business practices for
safeguarding information apply if copies are
kept.
Transactions involving payroll appear outside
of scope of Act. Rational is that if the FTC
intended to include these activities, they would
not have limited GLBA to “financial
institutions” only.
Task is not in conjunction with customers
obtaining financial products or services.
See above.
Process
Area - West
Lafayette
Campus
Payroll/Investm
ents
Reason for
Exclusion
Rationale
Not applicable under
Act
See above.
Remittance of
PERF/TIAACREF/and other
SRA’s
Dean of Students
Emergency Loan
Fund
Compensation
and
Benefits/Invest
ments
Dean of
Students/Loan
Operations
Not applicable under
Act
See above.
Not applicable under
Act
Loans are short term and interest free.
Check cashing service
Fiscal
Administrator
PMU
Not applicable under
Act
Purdue-pay (similar
function at regionals,
if applicable)
Bursar & Credit
Card
Operations
Manager
Director/Center
for Career
Opportunities
Not applicable under
Act
Customer information not collected or
maintained. Fee is $1.00 based on showing
PUID card. FTC rules envisioned “payday”
loan operations.‫٭‬
For tuition and fee payments, no different than
any other payment mechanism. Not obtaining
a financial process or service.‫٭‬
Not applicable under
Act
Customer information is not collected or
maintained.‫٭‬
e-Commerce &
Credit Card
Operations
Not applicable under
Act
Comptroller.‫٭‬
Remittance of child
support payments to
State of Indiana
Career counseling for
students interested in
financial services
industry
New uses of Purduepay for gifts, deposits,
etc. (similar function
at regionals, if
applicable)
‫٭‬Denotes rationale that was verified with the Federal Trade Commission.
13
Appendix B-1
Gramm Leach Bliley Act (GLBA) Information Sheet
Introduction
The Gramm Leach Bliley Act (GLBA) is a comprehensive law affecting institutions and
departments that deal with financial information which includes nonpublic personal information
such as addresses and phone numbers; bank and credit card account numbers; income and credit
histories; and Social Security numbers. Due to the fact that Purdue University does significantly
engage in student loan making and provides other financial services that use nonpublic personal
information, Purdue falls within the definition of “financial institution” under GLBA regulations.
For these reasons, Purdue University will be reviewing policies and systems to ensure
compliance with the requirements of the GLBA Safeguards Rule. Purdue’s current Family
Educational Rights and Privacy Act (FERPA) initiatives will ensure compliance with the Privacy
Rules required by the GLBA, limiting the scope of this assessment to the Safeguards Rule.
Requirements
The GLBA includes requirements to protect the security, integrity, and confidentiality of this
consumer information. To be GLBA compliant, organizations must develop, implement, and
enforce a comprehensive information security program including administrative, technical, and
physical safeguards as determined appropriate for the institution and data. In addition to
developing their own safeguards, organizations are responsible for taking steps to ensure that
their affiliates and service providers safeguard customer information in their care.
Due to these requirements, the IT Security and Policy group will be performing risk assessments
on all areas that must meet GLBA compliance requirements.
Actions required
The following basic actions must be taken to satisfy GLBA requirements:




Assess risk
Manage and control risk
Oversee service provider arrangements
Adjust the program to work with new technologies.
More information on risk assessments generally can be found at:
http://www.itap.purdue.edu/security/services/assessment.cfm
14
Appendix B-2
HIPAA Information Sheet
Introduction
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a comprehensive
law affecting institutions and departments that deal with protected health information. University
policy defines this as:
Individually identifiable health information, in any form received or
created as a consequence of providing healthcare services or health plan
benefits (including demographic information).
Protected health
information may include information used for research purposes, if that
information identifies or could be used to identify a human research
subject.
Because most, if not all of this information is stored, transmitted, and/or processed by various
information systems, ITaP Security and Privacy (ITSP) assesses the compliance and risk of
various departments within not only ITaP but the rest of the University.
Requirements
HIPAA includes requirements to protect the security, integrity, and confidentiality of this healthrelated information. These requirements apply to departments at Purdue that have been officially
designated by the HIPAA Privacy Compliance Office as covered by HIPAA. To be HIPAA
compliant, departments must develop, implement, and enforce a comprehensive security
program including administrative, technical, and physical safeguards as determined appropriate
for the institution and data. In addition to developing their own safeguards, departments are
responsible for taking steps to ensure that their affiliates and service providers safeguard
customer information in their care.
Actions Required
The following basic actions must be taken to satisfy HIPAA requirements:
 Assess risk to information systems, applications, and the HIPAA covered data it must
protect.
 Manage and control these risks.
 Identify business associates in your area and communicate them to the HIPAA
Privacy Compliance Office prior to sharing protected health information with them.
 Adjust new technologies and programs to satisfy HIPAA requirements.
A full risk assessment and compliance recommendation for your department will be performed
by ITSP to accomplish these goals.
15
Appendix G-1
GLBA Acknowledgement Statement
I acknowledge that I have participated in training concerning the Gramm Leach Bliley Standards
for Safeguarding Customer Information on the following date:
_________________________ ___________________
Signed
___________________________
Printed
___________________________
Department
16
Appendix G-2
HIPAA Confidentiality Statement
Certain employees of Purdue University may encounter health information protected by the
Health Insurance Portability and Accountability Act of 1996 through various sources including,
but not limited to, interoffice communications, data or software maintenance, electronic media,
verbal interactions, health plan claims or medical records. Employees with access to such
information shall not discuss, disclose, or give access to confidential health information except
as needed to perform an essential job function or to those having a legal right to such
information. They must further agree to access, use and disclose only the minimum protected
health information necessary to perform their job functions and to follow the University policies
and procedures that address the technical, physical and administrative safeguarding and security
of protected health information. Any breach of confidentiality in violation of University
policies, professional standards or state and federal laws and regulations governing protected
health information, may result in applicable sanctions and/or university disciplinary action
against the responsible employee.
By signing below, I certify that I have received and reviewed training concerning the HIPAA
Privacy Regulations and that I will abide by the Purdue policies and procedures to ensure
appropriate confidentiality and security of the health information that I encounter to do my job.
________________________________
Signed
______________
Date
________________________________
Printed
_________________________________
Department
17
Appendix H
ADDENDUM TO SERVICE PROVIDER AGREEMENT
This Addendum to Service Provider Agreement is entered into by Purdue University (“Purdue”)
and ________________________ (“Service Provider”) this ___ day of __________, 200__.
WHEREAS,
Purdue
and
Service
Provider
executed
dated_________________________________________, ____________ for
_________________________________________ (“Original Agreement”).
an
the
Agreement
purpose of
WHEREAS, the Original Agreement contemplates that “Customer Information” (as the term is
defined in the Gramm Leach Bliley Safeguards Rule, 16 C.F.R. § 314) may be provided or exchanged
with Service Provider in connection with a financial product or service;
WHEREAS, the Gramm Leach Bliley Safeguards Rule requires Purdue to ensure, by contract,
that Service Provider implements and maintains appropriate safeguards for Customer Information
provided to Service Provider.
NOW THEREFORE, the parties agree to add the following requirements to their Original
Agreement:
1. Service Provider agrees to implement and maintain a written comprehensive information
security program containing administrative, technical and physical safeguards for the security
and protection of Customer Information and further containing each of the elements set forth
in § 314.4 of the Gramm Leach Bliley Standards for Safeguarding Customer Information (16
C.F.R. § 314).
2. Service Provider further agrees to safeguard all Customer Information provided to it under
the Original Agreement and this Addendum in accordance with its information security
program and the Gramm Leach Bliley Standards for Safeguarding Customer Information.
3. All other provisions of the Original Agreement between the Parties shall remain in full force
and effect.
IN WITNESS WHEREOF, the parties have executed this Addendum to Service Provider
Agreement on the date and year first written above.
Purdue University
__________________________
“Service Provider”
By:___________________________
Printed:_______________________
By:_________________________
Printed:______________________
Title:_________________________
Title:________________________
#341217.1
18
Gramm Leach Bliley (GLB) Safeguards Rule
Service Provider Due Diligence
Company name:
___________________
Company Federal ID#:
_________________
Completed by (name, title): ___________________
Contact information (phone, fax, e-mail, address):
Please answer the following questions regarding your firm’s implementation of the GLB
Safeguards Rule:
1. Does your firm have a written information security program that contains administrative,
technical, and physical safeguards appropriate to the size and complexity of the firm, the
nature and scope of its activities, and the sensitivity of customer information at issue?
(circle one)
YES
NO
If no, please explain.
2. Has your firm designated an employee or employees to coordinate the information
security program? (circle one)
YES
NO
If no, please explain.
19
3. Has your firm undergone an assessment to identify reasonable, foreseeable internal and
external risks to the security, confidentiality, and integrity of customer information that
could result in the unauthorized disclosure, misuse, alteration, destruction, or other
compromise of such information? (circle one)
YES
NO
If no, please explain.
4. At a minimum, did the risk assessment include consideration of risks in the following
areas: employee training and management; information systems including network and
software design, as well as information processing, storage, transmission, and disposal;
and detecting, preventing, and responding to attacks, intrusions, or other systems
failures? (circle one)
YES
NO
If no, please explain.
5. Has your firm taken steps to select and retain service providers that are capable of
maintaining appropriate safeguards for customer information? (circle one)
YES
NO
If no, please explain.
6. Has your firm included appropriate language in service providers’ contracts requiring
them to implement and maintain appropriate safeguards? (circle one)
YES
NO
If no, please explain.
20
I certify that the information provided above is true and correct to the best of my knowledge.
Signature
Date
21
Appendix I
GLBA Quick Reference Chart
Item:
Comment:
Objectives of
Information
Security Program
Ensure the security and confidentiality of customer information.
Operational Areas
Impacted
Date / Timeframe, if applicable:
Responsible
Party
Coordinator
Protect against anticipated threats to the security or integrity of customer information.
Guard against unauthorized access to or use of customer information that could result in harm or
inconvenience to any customer.
Comply with applicable Gramm Leach Bliley rules as published by the Federal Trade Commission.
Includes but not limited to The Division of Financial Aid, Office of the Bursar, University Collections,
The Office of Planned Giving (see appendix A-1 for Matrix Identifying Operational Areas).
GLBA
Standing
Committee
Coordinator
responsible for
specific operation
Chief Information Security Officer. Coordinator must work with all relevant areas of the University to
identify potential and actual risk to security and privacy of information.
Coordinator
Offices deemed
outside GLBA
safeguard rules
(refer to appendix A-2)
GLBA
Standing
Committee
Standing
Committee
Director of Audits, Chief Information Security Officer, Bursar, Executive Director of Financial Aid,
representatives from the regional campuses, University Counsel.
Meetings biannually and as
needed.
Rep or Designee
Responsible to conduct a periodic data security review, with guidance from the coordinator.
Must retain assessment data for a period of two (2) years including the most recent assessment.
Retain two (2) years.
Directors & supervisors responsible for ensuring compliance with information security practices.
Training template on the web at:
1. http://www.itap.purdue.edu/security/policies/GLB_Safeguards_Rule_Training_Business_Office.pdf
2. http://www.itap.purdue.edu/security/policies/GLB_Safeguards_Rule_Training_General.pdf
22
GLBA
Standing
Committee
Coordinator
Item:
Comment:
Date / Timeframe, if applicable:
Maintain records that staff have received training (see Appendix G-1 for sample training statement).
Retain records for six (6) years including most recent training year. (Includes permanent, temporary, and
student employees whose jobs require them to access customer information or they work in a location
where there is access to customer information.)
Retain proof of training six (6)
years.
Responsible
Party
Questions
regarding
technical issues,
risk assessment,
and information
technology policy
Questions on
business policy
and processes
Contact Office of Information Technology Security and Privacy
ITSP
Contact Coordinator of the Information Security Program
Coordinator
Service Providers
Requirement
(Contracts)
Must include specific language in third party service in contracts relative to compliance with GLB,
Reference Item IV, page 4, GLB policy for specific language and Appendix H.
Department
and General
Counsel
Periodic review
required
GLB mandates that Information Security Programs be subject to periodic review and adjustment.
Customer
Information
Any record containing nonpublic personal information as defined in 16 C.F.R. 313.3(n), about a
customer of a financial institution, whether in paper, electronic, or other form, that is handled or
maintained by or on behalf of [the financial institution] or [its] affiliates.
Financial Product
or Service
Financial Product or Service means any product or service that a financial holding company could offer
by engaging in a financial activity.
Financial Service includes your evaluation or brokerage of information that you collect in connection
with a request or an application from a consumer for a financial product or service.
(i) Personally identifiable financial information, and
(ii) Any list, description , or other grouping of consumers (and publicly available information pertaining
to them) that is derived using any personally identifiable financial information that is not publicly
available. 16 C.F.R. 313.3 (n) (1).
Non-Public
Personal
Information
PersonallyIdentifiable
Financial
Information
Means any information:
(i) A consumer provides to you to obtain a financial product or service from you;
(ii) About a consumer resulting from any transaction involving a financial product or service between
you and a consumer; or
23
Plan to be evaluated annually.
GLBA
Standing
Committee
Not
Applicable
Item:
Examples FTC
considers a
financial product
Examples FTC
considers a
financial product
or service.
Comment:
Date / Timeframe, if applicable:
Responsible
Party
(iii) You otherwise obtain about a consumer in connection with providing a financial product or service
to the consumer.
Student (or other) loans, including receiving application information, and the making or servicing of such
loans
Financial or investment advisory services
Credit counseling services
Tax planning or tax preparation
Collection of delinquent loans and accounts
Sale of money orders, savings bonds or traveler's checks
Check cashing services
Travel agency services provided in connection with financial services
Real estate settlement services
Money wiring services
Issuing credit cards or long term payment plans involving interest charges
Personal property and real estate appraisals
Career counseling services for those seeking employment in finance, accounting or auditing
Services provided by a principal, broker or agent with respect to life, health, liability or disability
insurance products
Obtaining information from a consumer report
Providing or issuing annuities
24
Not
Applicable
Download