Regulation P & GLBA Training

Size: px
Start display at page:

Download "Regulation P & GLBA Training"

Transcription

1 Regulation P & GLBA Training

2 Overview Regulation P governs the treatment of nonpublic personal information about consumers by the financial institution. (Gramm-Leach-Bliley Act of 1999) The GLBA is composed of several components, including: Financial Privacy Rule Safeguards Rule

3 Right to Financial Privacy All employees should receive a copy of the Bank s Right to Financial Privacy Act Policy. Confirm with the Bank s personnel department that all new employees are provided a copy as well. The Bank should confirm that there are information sharing agreements between the Bank and affiliates, including service agreements and/or contracts between the Bank and nonaffiliated third parties either to obtain or provide information or services. The Bank is responsible for maintaining complaint logs, monitoring telemarketing scripts and any other information obtained from nonaffiliated third parties Note: Review telemarketing scripts to determine whether the contractual terms set forth under CFPB s limits on sharing account number information for marketing purposes are met and whether the Bank is disclosing account number information in violation of CFPB s exception to opt out requirements for service providers and joint marketing.

4 Right to Financial Privacy Important Definitions: Consumer: An individual who obtains or has obtained from you a financial product or service that is to be used primarily for personal, family, or household purposes in an isolated transaction. EX: Purchase of a money order. Customer: A consumer with whom you have a continuing relationship in which you provide one or more financial products or services to the consumer that are to be used primarily for personal, family or household purposes EX: Opens and maintains a deposit account with you. NOTE: For loans, a person becomes a customer at origination. Therefore, an applicant is a consumer.

5 Right to Financial Privacy - Requests The Right to Financial Privacy Act applies only to requests for customers that are individuals or partnerships of five or fewer individuals. Requests from the state and local government agencies and nongovernmental entities are generally covered by state law. The Internal Revenue Service follows a separate set of rules as well.

6 Right to Financial Privacy - Requests Right to Financial Privacy Act Process All Bank Personnel: Do not tell any employee or Bank personnel, other than the person you directly refer the request to, about the request. Is the request, or demand, from: A state or federal government agency (including the IRS)? Refer the request to the Security Officer and provide any relevant documentation. Another financial institution? Do not respond to the request; transfer the request directly to the officer in charge of the account. Other than a state or federal government agency or another financial institution? Advise the requestor that all information about Bank customers is confidential; and the Bank will not acknowledge whether or not the person about whom the request is made is a customer of the Bank.

7 Right to Financial Privacy - Requests Privacy Notice - Required Content Simplified Notice (For non-disclosure of nonpublic personal information) Right to Disclose Notice (For disclosure of nonpublic personal information) Short Form Notices - Required Content Opt-Out Notice - Required Content Opt-Out Notice Delivery Initial Privacy Notices Customer Initial Notice Consumer Initial Notice Annual Privacy Notice Revised Notices

8 Privacy Notice Required Content All notices must be clear and conspicuous, meaning they must be: Reasonably understandable AND Designed to call attention to the nature and significance of the information. Do you disclose or reserve the right to disclose nonpublic personal information except to nonaffiliated third parties as permitted by the exceptions under "exception to notice and opt out requirements for processing and servicing transactions" ( ) or "other exceptions to notice and opt out" ( )? Yes = Simplified notice (for non-disclosure of nonpublic personal information) No = Right to disclose notice (for disclosure of nonpublic personal information)

9 Simplified Notice (For non-disclosure of nonpublic personal information) Include the categories of nonpublic personal information you collect. Include policies and practices with respect to protecting the confidentiality and security of nonpublic personal information. Include the fact that the Bank does not disclose nonpublic personal information about current and former customers to affiliates or nonaffiliated third parties, except as authorized by and NOTE: To satisfy this requirement, the notice may simply state that you make disclosures to nonaffiliated third parties as permitted by law.

10 Right to Disclose Notice (For disclosure of nonpublic personal information) Include all categories of nonpublic personal information the Bank collects. Include all categories of nonpublic personal information you disclose about your consumers and former customers. Include all categories of affiliates and nonaffiliated third parties to whom you disclose nonpublic personal information about your consumers and former customers. Include a statement describing the Bank's disclosure of nonpublic personal information under an exception listed in "Exceptions to Notice and Opt Out Requirements for Processing and Servicing Transactions" ( ) or "Other Exceptions to Notice and Opt-Out" ( ). NOTE: You are not required to list those exceptions in your initial and annual privacy notices or provide detailed information about the parties to whom you make such disclosures; rather, you are allowed to state only that you make disclosures to other nonaffiliated third parties as permitted by law.

11 Right to Disclose Notice (For disclosure of nonpublic personal information) If you disclose nonpublic personal information under the "Exception to Opt Out Requirements for Service Providers and Joint Marketing" ( ) and no other exception in or permits the disclosure, include a separate statement of the categories of information you disclose and the categories of third parties with whom you have contracted under Include an explanation of the consumer s right to opt out of disclosures of nonpublic personal information to nonaffiliated third parties, including the method(s) by which the consumer may exercise that right at that time. Include any notices you may provide under the Fair Credit Reporting Act (FCRA) regarding ability to opt out of disclosures of information among affiliates. Include policies and practices with respect to protecting the confidentiality and security of nonpublic personal information. NOTE: Appendix A of the Privacy Rule provides sample clauses that illustrate some of the requirements for the content of notices.

12 Short Form Notices Required Content If the Bank wishes to disclose nonpublic personal information about a consumer who is not your customer outside the exceptions, you may choose to provide a short-form initial notice along with your opt-out notice. EX: Notice on ATM saying the Bank's privacy policy is available upon request with an explanation on how to obtain the notice.

13 Opt-Out Notice Required Content State that you disclose, or reserve the right to disclose such information. State that the consumer has the right to opt out of the disclosure. Provide the customer with information about the financial products or services that the customer obtains to which the opt-out direction would apply. State how the consumer may exercise the right to opt-out. Include check-off boxes prominently displayed, A reply form included with the notice, An electronic means to opt-out, OR A toll free number.

14 Opt-Out Notice Required Content Describe how you will treat an opt-out direction by a consumer who obtains a product or service from you jointly with other consumers: The Bank considers an opt out by a joint customer as applying to all associated joint customers, OR Each joint customer is permitted to opt-out separately. State that the customer may opt-out at any time.

15 Opt-Out Notice Delivery Provide an additional copy/version of the Initial Notice if opt-out is given separately. Give a reasonable amount of time for response before disclosing information. Mail notice allowing consumer to respond by toll free number, return mail or other reasonable means: 30 days Online: 30 days For isolated transaction: ask for decision before completing the transaction Allow customers to opt-out at any time in the future. Honor opt-out notices until revoked by the customer in writing or electronically. Continue to honor opt-out after customer relationship ends.

16 Initial Privacy Notices Initial Notice for a Customer: Provide an up-to-date Privacy Notice before the customer relationship is established by: Hand delivery of printed copy, Mailing a printed copy, Posting on the Bank's electronic site and requiring receipt of acknowledgement from customer, OR Posting notice on the screen of ATM and requiring receipt of acknowledgment - for isolated transactions ONLY. Provide Opt-Out Notice. Provide reasonable opportunity to Opt-Out. Mail notice allowing customer to respond by toll free number, return mail or other reasonable means: 30 days Online: 30 days If opt-out notice is given separately, provide another copy/version of the Initial Notice.

17 Initial Privacy Notices Initial Notice for a Consumer: Provide up-to-date Privacy Notice if: You plan to disclose nonpublic personal information about him or her to a nonaffiliated third party AND The information you may disclose is not exempt from opt-out requirements. Provide the Opt-Out Notice. Allow reasonable opportunity to Opt-Out. For isolated transaction: ask for decision before completing the transaction.

18 Annual Privacy Notice Provide customers with notice of privacy policies and practices that conform to the procedures for creating the notice above. NOTE: Annual privacy notices should also be sent to each customer whose loan the Bank has the right to service. Annual privacy notices are not required for consumers or previous customers.

19 Annual Privacy Notice: Alternative Available if: You do not disclose nonpublic personal info to non-affiliated third parties, other than under an exception); You don t provide an Opt-out option; You have previously provided a privacy notice; Your privacy policy has not changed since the last time you issued it; AND, You use the model privacy form in the appendix to Reg P for the annual privacy notice. If available, you can satisfy the notice if you provide the abbreviated notice on an account statement, coupon book or other disclosures, and post your privacy notice on your website.

20 Annual Privacy Notice: FAST Act May not need to send it at all: the FAST Act, passed by congress, elmininated the requirement to send an annual privacy notice so long as you: You do not disclose nonpublic personal info to non-affiliated third parties, other than under an exception); and, Your privacy policy has not changed since the last time you issued it NOTE: This has been past by law, but Reg P has yet to be updated.

21 Revised Notices If the Bank s privacy policies and procedures have changed since the most recent notice provided? Yes: Provide a revised notice that reflects changes, a new opt-out notice, and a reasonable opportunity to opt-out BEFORE disclosing nonpublic personal information outside of what was described in the most recent privacy notice. No: You may continue disclosing nonpublic personal information. However, continue sending out the Annual Privacy Notice despite the fact there has been no changes.

22 GLBA Safeguards Rule Objectives To ensure the security and confidentiality of customer information; Protect against any anticipated threats or hazards to the security or integrity of such information; and Protect against unauthorized access to or use of such information that could result in substantial harm or inconvenience to any customer.

23 The Safeguards Rule The Safeguards Rule requires all financial institutions to design, implement and maintain administrative, technical and physical safeguards to protect customer information. The Safeguards Rule applies not only to financial institutions that collect information from their own customers, but also to financial institutions such as credit reporting agencies that receive customer information from other financial institutions.

24 Definition Customer Information Customer information means any record containing nonpublic personal information about a customer of the Bank, whether in paper, electronic, or other form, that is handled or maintained by or on behalf of the Bank or Bank affiliates.

25 Definition Non-Public Personal Information Personally identifiable financial information that is: Provided by a consumer to the Bank; Resulting from any transaction with the consumer or any service performed for the consumer; or Otherwise obtained by the Bank. The term also includes any lists, descriptions or other groupings of individuals that are derived using personally identifiable financial information that is not publicly available.

26 Non-Public Personal Information Examples SSN Financial account numbers Driver s License number Credit Card numbers DOB Name, Address, Phone number when collected with financial data Details of financial transactions Confirming whether or not a financial transaction took place

27 Why Protect Customer Information? It s the law. Several laws, including the Gramm-Leach-Bliley Safeguards Rule, require the Bank to protect customer information; and protecting customer information protects customers from identity theft. Obtaining non-public personal information is the main source of identity theft.

28 Written Information Security Plan The Safeguards Rule requires the Bank to develop a written information security plan that describes the Bank s program to protect customer information. The plan must be appropriate to the Bank s size and complexity. As part of the plan, the Bank must: Designate one or more employees to coordinate the information security program; Identify and assess the risks to customer information in each relevant area of the Bank s operation, and evaluate the effectiveness of the current safeguards for controlling these risks; Design and implement a safeguards program; and Regularly monitor and test it; Select service providers that can maintain appropriate safeguards, make sure Bank contracts require them to maintain safeguards, and oversee their handling of customer information; Evaluate and adjust the program in light of relevant circumstances, including changes in the Bank s business or operations, or as a result of security testing and monitoring.

29 Safeguarding Customer Information Process for Managing and Controlling Risk: Implement strong access controls on customer information systems, including controls to authenticate and permit access only to authorized individuals. Example: Create strong password requirements that include the use of upper case, lower case, numbers and symbols #, etc.). Implement controls to prevent employees from providing customer information to unauthorized individuals who may seek to obtain information through fraudulent means. Example: Train employees on phishing scams to prevent employees from inadvertently disclosing information to unauthorized individuals. Implement access restrictions at physical locations containing customer information, such as buildings, computer facilities and records storage facilities to permit access only to authorized individuals. Example: Only allow certain Bank officers access to alarm codes and/or put locks or codes on doors where records are stored. Implement encryption of electronic customer information, including while in transit or in storage on networks or systems to which unauthorized individuals may have access. Do not allow full authorization within the system to any one employee. Example: Do not allow employees who input new customer account information the authority to change addresses or other contact information.

30 Safeguarding Customer Information Implement check-backs to ensure the information on completed customer forms match what was input into the system. Implement employee background checks for personnel with access to sensitive information. Ensure all employee workstations have up-to-date firewalls and virus protection software. Use software to detect actual and attempted attacks or intrusions. Train employees on the proper destruction of customer information, both physical and computerbased. Scan all paper information to protect against fire and water damage. Ensure all personnel back up their computers daily. Engage with a third party to conduct penetration testing to ensure controls are effective. Audit information security practices to ensure they are being adhered to by all personnel. Train employees at least annually on the importance of safeguarding customer information. Create internet policies for personnel and block sites that are likely to cause damage to internal systems.

31 Safeguarding Customer Information Vendor Management The Bank should take the appropriate steps to ensure the safety of consumer information when handled by a third party service provider: Conduct thorough due diligence before selecting a service provider who will have access to sensitive customer information. Conduct due diligence on existing service providers if it was not done prior to engagement. Evaluate: Measures taken by the service provider to protect customer information. Business reputation, complaints and litigation. Audit environment - request previous audit reports. Business resumption, continuity, recovery and contingency plans.

32 Safeguarding Customer Information Vendor Management Ensure the contract between the Bank and the service provider requires the provider to implement appropriate measures designed to meet the objectives of regulatory guidance on safeguarding customer information. Conduct ongoing monitoring of the service provider to confirm they are conforming with applicable laws and regulations. Periodically review audits, summaries of test results or other equivalent evaluations. Document all due diligence efforts and subsequent monitoring. Maintain with initial contract.

33 Types of Safeguards Safeguards to protect the security, confidentiality, and integrity of customer information fall into 3 basic categories: Administrative Safeguards; Technical Safeguards; and Physical Safeguards.

34 Administrative Safeguards Focuses on departmental processes and includes, but is not limited to: Adhering to policy for handling customer information. Following basic steps to protect customer information. Promoting awareness and knowledge about applicable policies and expectations. Limiting access to customer information to employees who have a business need to see it. Referring calls or requests for customer information to staff trained to respond to such requests. Being alert to fraudulent attempts to obtain customer information and reporting these to management for referral to appropriate law enforcement agencies.

35 Technical Safeguards Technical safeguards regarding hardware and networking are generally designed and provided by the Information Technology Department. Bank staff must be aware and knowledgeable regarding how customer information is safeguarded. PC/Workstations require technical safeguards: Use anti-virus software that updates automatically. Maintain up-to-date firewalls if your department manages them internally, particularly if your department uses broadband Internet access or allows staff to connect to the network from home. Use a password protected screensaver or logoff the terminal each time you step away. Do not store non-public personal information on personal PC or workstations, use the Bank s network only. Don t send non-public personal information via standard . Password safeguards: Never post passwords on or near your terminal. Don t give passwords out to anyone. Change passwords periodically as per Bank policy. Use complex passwords.

36 Physical Safeguards Basic Steps Lock and Secure rooms and file cabinets where customer information is kept and limit access to authorized employees. Ensure that storage areas are protected against damage from physical hazards, like fire or floods. Don t leave account numbers, bank documents or other similar documents in public view (Including applications, credit reports, denials, financial statements, etc.). Dispose of information appropriately. (i.e., Shred.)

37 Physical Safeguards Appropriate Disposal Store records in a secure area and limit access to authorized employees. Ensure that storage areas are protected against destruction or potential damage from physical hazards, like fire or floods.

38 Safeguard Failure Should be reported to the Board and corrective action should be monitored.

39 Annual Board Reporting Report overall status of the information security program and the Bank's compliance with laws and regulations regarding privacy of consumer information. Discuss potential and current service providers and results of due diligence. Discuss the results of the risk assessment including potential weaknesses. Discuss changes in controls. Report on findings from testing and management responses. Inform the Board of any security breaches or violations. Discuss recommended changes.

40 Incident Response The Bank should have an Incident Response Program designed to address incidents of unauthorized access to sensitive customer information maintained by the Bank or a service provider.

41 Components of a Response Program At a minimum, the Bank's response program should contain procedures for: Assessing the nature and scope of an incident and identifying what customer information systems and types of customer information have been accessed or misused; Notifying the Bank s primary federal regulator as soon as possible when aware of an incident involving unauthorized access to or use of sensitive customer information; Consistent with the agencies' Suspicious Activity Report (SAR) regulations, filing a timely SAR, and in situations involving federal criminal violations requiring immediate attention, such as when a reportable violation is ongoing, promptly notifying appropriate law enforcement authorities; Taking appropriate steps to contain and control the incident to prevent further unauthorized access to or use of customer information; and Notifying customers when warranted in a manner designed to ensure that a customer can reasonably be expected to receive it.

42 Response Program Follow the response program in the event of unauthorized access to customer information. Investigate the nature and scope of the incident. Identify what customer information was accessed or misused. Notify primary Federal regulator as soon as possible when the incident involves sensitive information. Sensitive information is a customer's name, address or telephone number, in conjunction with the customer's social security number, driver's license number, account number, credit or debit card number, or a personal identification number or password that would permit access to the customer's account. Notify appropriate law enforcement authorities. File a SAR. Take appropriate steps to contain and control the incident to prevent further unauthorized access to or use of customer information. Example: Freeze account, close affected account, send a new debit card, etc. Notify customers when warranted. If the incident is at the fault of a service provider, it is the Bank's responsibility to notify customers and the regulator. However, the Bank may authorize or contract with a service provider to notify the customer and regulator on their behalf.

43 Incident Response Notifying Customers Notifying a customer is required when the Bank becomes aware of an incident of unauthorized access to sensitive customer information and determines that misuse of its information has occurred or is reasonably possible. Note: Notification may be delayed if it will interfere with a criminal investigation and law enforcement provides the Bank with a written request for delay. Timely notification is required as soon as it will no longer interfere with an investigation. Determine affected customers or groups of customers. Create a clear and conspicuous notice including: Description of incident. Type of information obtained. Description of what the Bank has done to protect customer information from further unauthorized access.

44 Incident Response Notifying Customers Request for the customer to review all accounts and report suspicious activity. Reminder to be vigilant over the next months. Request for the customer to promptly report incident of suspected identity theft to the Bank. A description of fraud alerts and instructions on how to place one in their credit report. Recommendation to periodically obtain credit reports and explanation on how it may be done free of charge. Information about the availability of the FTC's online guidance regarding steps a consumer can take to protect against identity theft. The notice should encourage the customer to report any incidents of identity theft to the FTC, and should provide the FTC's Web site address and toll-free telephone number that customers may use to obtain the identity theft guidance and report suspected incidents of identity theft. Notify nationwide consumer credit reporting agencies prior to sending notices to a large number of customers. Deliver to customers in a manner that will ensure a customer can reasonably be expected to receive it.

45 Regulation P Penalties Although there are no specific penalties designated in Regulation P, the regulators have the authority to assess a civil money penalty in accordance with the Financial Institutions Reform, Recovery, and Enforcement Act (FIRREA) for non-compliance.

46 GLBA Penalties Violation of GLBA may result in: Civil penalties for the Bank, up to $100,000 for each violation. Civil penalties the officers and directors of the financial institution shall be subject to, and shall be personally liable for, a civil penalty of not more than $10,000 for each such violation. Criminal penalties may include up to 5 years in prison. Removal of management, directors, officers etc. and potentially barring them, permanently, from working in the banking industry. Fines of up to $1,000,000 for an individual or the lesser of $1,000,000 or 1% of the total assets of the Bank.

47 Questions? If you have any additional questions, contact Compliance Alliance at or

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications Gramm-Leach Bliley Act Section 501(b) and Customer Notification Roger Pittman Director of Operations Risk Federal Reserve Bank of Atlanta Overview Bank IT examination perspective Background information

More information

Gramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev.

Gramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. Gramm Leach Bliley Act 15 U.S.C. 6801-6809 GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. 11/30/2016 1 Objectives for GLBA Training GLBA Overview Safeguards Rule

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

Online Privacy & Security for the Mortgage Industry

Online Privacy & Security for the Mortgage Industry 1 Online Privacy & Security for the Mortgage Industry Ronald M. Jacobs (202) 216-8215 rmjacobs@venable venable.com 2 Online Privacy & Security Overview Gramm-Leach-Bliley Act (GLB) Privacy Regulations:

More information

Seattle University Identity Theft Prevention Program. Purpose. Definitions

Seattle University Identity Theft Prevention Program. Purpose. Definitions Seattle University Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in connection

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS? FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit

More information

An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule

An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule Legal Disclaimer: This overview is not intended as legal advice and should not be taken as such. We recommend that you consult legal

More information

Post-Secondary Institution Data-Security Overview and Requirements

Post-Secondary Institution Data-Security Overview and Requirements Post-Secondary Institution Data-Security Overview and Tiina K.O. Rodrigue, EdDc, CISSP, CISM, PMP, CSM, CEA, ITIL, ISC2 Compliance Mapper, A+ Senior Advisor Cybersecurity - 2017 Agenda Who needs to worry

More information

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities

More information

( Utility Name ) Identity Theft Prevention Program

( Utility Name ) Identity Theft Prevention Program ***DRAFT*** ( Utility Name ) Identity Theft Prevention Program Implemented as of, 2008 *** This document is intended to give guidance to municipal utilities in their understanding of the FTC Red Flag Rule.

More information

Red Flags Program. Purpose

Red Flags Program. Purpose Red Flags Program Purpose The purpose of this Red Flags Rules Program is to document the protocol adopted by the University of Memphis in compliance with the Red Flags Rules. Many offices at the University

More information

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE COMPLIANCE ADVISOR NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE A PUBLICATION BY THE EXCESS LINE ASSOCIATION OF NEW YORK One Exchange Plaza 55 Broadway 29th Floor New York, New York 10006-3728 Telephone:

More information

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS STOCKTON UNIVERSITY PROCEDURE Identity Theft Prevention Program Procedure Administrator: Director of Risk Management and Environmental/Health/Safety Authority: Fair and Accurate Credit Transactions Act

More information

HIPAA Security and Privacy Policies & Procedures

HIPAA Security and Privacy Policies & Procedures Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

Annual Report on the Status of the Information Security Program

Annual Report on the Status of the Information Security Program October 2, 2014 San Bernardino County Employees Retirement Association 348 W. Hospitality Lane, Third Floor San Bernardino, CA 92415-0014 1 Table of Contents I. Executive Summary... 3 A. Overview... 3

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

Shaw Privacy Policy. 1- Our commitment to you

Shaw Privacy Policy. 1- Our commitment to you Privacy Policy last revised on: Sept 16, 2016 Shaw Privacy Policy If you have any questions regarding Shaw s Privacy Policy please contact: privacy@shaw.ca or use the contact information shown on any of

More information

Prevention of Identity Theft in Student Financial Transactions AP 5800

Prevention of Identity Theft in Student Financial Transactions AP 5800 Reference: Fair and Accurate Credit Transactions Act (Pub. L. 108-159) The Board recognizes that some activities of the Shasta-Tehama-Trinity Joint Community College District, "District," are subject to

More information

Red Flag Policy and Identity Theft Prevention Program

Red Flag Policy and Identity Theft Prevention Program Unified Government of Wyandotte County and Kansas City, Kansas Adopted: 5/11/2011 Red Flag Policy and Identity Theft Prevention Program Authority: The Mayor and the Board of Commissioners are responsible

More information

LCU Privacy Breach Response Plan

LCU Privacy Breach Response Plan LCU Privacy Breach Response Plan Sept 2018 Prevention Communication & Notification Evaluation of Risks Breach Containment & Preliminary Assessment Introduction The Credit Union makes every effort to safeguard

More information

[Utility Name] Identity Theft Prevention Program

[Utility Name] Identity Theft Prevention Program [Utility Name] Identity Theft Prevention Program Effective beginning, 2008 Minnesota Municipal Utilities Association Sample Red Flag policy I. PROGRAM ADOPTION The [Utility Name] ("Utility") developed

More information

University of North Texas System Administration Identity Theft Prevention Program

University of North Texas System Administration Identity Theft Prevention Program University of North Texas System Administration Identity Theft Prevention Program I. Purpose of the Identity Theft Prevention Program The Federal Trade Commission ( FTC ) requires certain entities, including

More information

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name. security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name. Security for Your Business Mitigating risk is a daily reality for business owners, but you don t have

More information

Identity Theft Prevention Program. Effective beginning August 1, 2009

Identity Theft Prevention Program. Effective beginning August 1, 2009 Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Christian Brothers University developed this Identity Theft Prevention Program pursuant to the Federal Trade Commission's

More information

Table of Contents. PCI Information Security Policy

Table of Contents. PCI Information Security Policy PCI Information Security Policy Policy Number: ECOMM-P-002 Effective Date: December, 14, 2016 Version Number: 1.0 Date Last Reviewed: December, 14, 2016 Classification: Business, Finance, and Technology

More information

Policy and Procedure: SDM Guidance for HIPAA Business Associates

Policy and Procedure: SDM Guidance for HIPAA Business Associates Policy and Procedure: SDM Guidance for HIPAA Business (Adapted from UPMC s Guidance for Business at http://www.upmc.com/aboutupmc/supplychainmanagement/documents/guidanceforbusinessassociates.pdf) Effective:

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

Privacy Policy Effective May 25 th 2018

Privacy Policy Effective May 25 th 2018 Privacy Policy Effective May 25 th 2018 1. General Information 1.1 This policy ( Privacy Policy ) explains what information Safety Management Systems, 2. Scope Inc. and its subsidiaries ( SMS ), it s brand

More information

IDENTITY THEFT PREVENTION Policy Statement

IDENTITY THEFT PREVENTION Policy Statement Responsible University Officials: Vice President for Financial Operations and Treasurer Responsible Office: Office of Financial Operations Origination Date: October 13, 2009 IDENTITY THEFT PREVENTION Policy

More information

Why you MUST protect your customer data

Why you MUST protect your customer data Why you MUST protect your customer data If you think you re exempt from compliance with customer data security and privacy laws because you re a small business, think again. Businesses of all sizes are

More information

Privacy Breach Policy

Privacy Breach Policy 1. PURPOSE 1.1 The purpose of this policy is to guide NB-IRDT employees and approved users on how to proceed in the event of a privacy breach, and to demonstrate to stakeholders that a systematic procedure

More information

Putting It All Together:

Putting It All Together: Putting It All Together: The Interplay of Privacy & Security Regina Verde, MS, MBA, CHC Chief Corporate Compliance & Privacy Officer University of Virginia Health System 2017 ISPRO Conference October 24,

More information

COMMENTARY. Information JONES DAY

COMMENTARY. Information JONES DAY February 2010 JONES DAY COMMENTARY Massachusetts Law Raises the Bar for Data Security On March 1, 2010, what is widely considered the most comprehensive data protection and privacy law in the United States

More information

Ouachita Baptist University. Identity Theft Policy and Program

Ouachita Baptist University. Identity Theft Policy and Program Ouachita Baptist University Identity Theft Policy and Program Under the Federal Trade Commission s Red Flags Rule, Ouachita Baptist University is required to establish an Identity Theft Prevention Program

More information

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review

More information

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision

More information

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. I. OBJECTIVE ebay s goal is to apply uniform, adequate and global data protection

More information

EXHIBIT A. - HIPAA Security Assessment Template -

EXHIBIT A. - HIPAA Security Assessment Template - Department/Unit: Date: Person(s) Conducting Assessment: Title: 1. Administrative Safeguards: The HIPAA Security Rule defines administrative safeguards as, administrative actions, and policies and procedures,

More information

NYDFS Cybersecurity Regulations

NYDFS Cybersecurity Regulations SPEAKERS NYDFS Cybersecurity Regulations Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 lsotto@hunton.com www.huntonprivacyblog.com March 9, 2017 The Privacy Team at Hunton & Williams Over 30 privacy

More information

FTC SAFEGUARDS RULE. Gramm-Leach-Bliley Act Effective 5/23/2003

FTC SAFEGUARDS RULE. Gramm-Leach-Bliley Act Effective 5/23/2003 FTC SAFEGUARDS RULE Gramm-Leach-Bliley Act Effective 5/23/2003 1 Introduction The purpose of the FTC Safeguards Rule is to: Ensure the security and confidentiality of customer information. Customer information

More information

NYDFS Cybersecurity Regulations: What do they mean? What is their impact?

NYDFS Cybersecurity Regulations: What do they mean? What is their impact? June 13, 2017 NYDFS Cybersecurity Regulations: What do they mean? What is their impact? Gus Coldebella Principal, Boston Caroline Simons Principal, Boston Agenda 1) Overview of the new regulations 2) Assessing

More information

GLBA, information security and incident response a compliance perspective

GLBA, information security and incident response a compliance perspective GLBA, information security and incident response a compliance perspective Introductions How many have experience with IT? How many have responsibilities involving IT? How many have responsibilities involving

More information

HIPAA Federal Security Rule H I P A A

HIPAA Federal Security Rule H I P A A H I P A A HIPAA Federal Security Rule nsurance ortability ccountability ct of 1996 HIPAA Introduction - What is HIPAA? HIPAA = The Health Insurance Portability and Accountability Act A Federal Law Created

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.

More information

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY 2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on

More information

Summary Comparison of Current Data Security and Breach Notification Bills

Summary Comparison of Current Data Security and Breach Notification Bills Topic S. 117 (Nelson) S. (Carper/Blunt) H.R. (Blackburn/Welch) Comments Data Security Standards The FTC shall promulgate regulations requiring information security practices that are appropriate to the

More information

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2 COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September 2018 Table of Contents 1. Scope, Purpose and Application to Employees 2 2. Reference Documents 2 3. Definitions 3 4. Data Protection Principles

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

City of New Haven Water, Sewer and Natural Gas Utilities Identity Theft Prevention Program

City of New Haven Water, Sewer and Natural Gas Utilities Identity Theft Prevention Program City of New Haven Identity Theft Prevention Program, October 2008, page City of New Haven Water, Sewer and Natural Gas Utilities Identity Theft Prevention Program Adopted by Resolution of the Mayor and

More information

Starflow Token Sale Privacy Policy

Starflow Token Sale Privacy Policy Starflow Token Sale Privacy Policy Last Updated: 23 March 2018 Please read this Privacy Policy carefully. By registering your interest to participate in the sale of STAR tokens (the Token Sale ) through

More information

PRIVACY STATEMENT +41 (0) Rue du Rhone , Martigny, Switzerland.

PRIVACY STATEMENT +41 (0) Rue du Rhone , Martigny, Switzerland. PRIVACY STATEMENT +41 (0) 225349799 www.energymarketprice.com Rue du Rhone 5 1921, Martigny, Switzerland dpo@energymarketprice.com Introduction Your privacy and trust are important to us and this Privacy

More information

Element Finance Solutions Ltd Data Protection Policy

Element Finance Solutions Ltd Data Protection Policy Element Finance Solutions Ltd Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information

Agreements & Contracts: Electronic Documents User Agreement CUSTOMER SERVICE SKOWHEGAN SAVINGS

Agreements & Contracts: Electronic Documents User Agreement CUSTOMER SERVICE SKOWHEGAN SAVINGS Agreements & Contracts: Electronic Documents User Agreement CUSTOMER SERVICE SKOWHEGAN SAVINGS 800.303.9511 CUSTSERV@SKOWSAVINGS.COM TABLE OF CONTENTS ELECTRONIC DELIVERY OF DOCUMENTS...3 SYSTEM REQUIREMENTS...3

More information

Privacy and Security Liaison Program: Annual Compliance and Risk Assessment (Fiscal Year 2013/2014)

Privacy and Security Liaison Program: Annual Compliance and Risk Assessment (Fiscal Year 2013/2014) Privacy and Security Liaison Program: Annual Compliance and Risk Assessment (Fiscal Year 2013/2014) Comprehensive Information Security Program (Policy 04.72.11) Purpose Temple University, as mandated by

More information

Emsi Privacy Shield Policy

Emsi Privacy Shield Policy Emsi Privacy Shield Policy Scope The Emsi Privacy Shield Policy ( Policy ) applies to the collection and processing of Personal Data that Emsi obtains from Data Subjects located in the European Union (

More information

Token Sale Privacy Policy

Token Sale Privacy Policy Token Sale Privacy Policy PRIVACY POLICY LAST UPDATED ON: [11 SEP 2018] A. OVERVIEW You must read the entirety of this Privacy Policy carefully before making any decision to purchase Tokens. You must also

More information

Section 3.9 PCI DSS Information Security Policy Issued: November 2017 Replaces: June 2016

Section 3.9 PCI DSS Information Security Policy Issued: November 2017 Replaces: June 2016 Section 3.9 PCI DSS Information Security Policy Issued: vember 2017 Replaces: June 2016 I. PURPOSE The purpose of this policy is to establish guidelines for processing charges on Payment Cards to protect

More information

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Presented by the Office of Housing Counseling and The Office of the Chief Information Officer Privacy Program

More information

Information Technology General Control Review

Information Technology General Control Review Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor

More information

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Cybercrime Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Organizations can prevent cybercrime from occurring through the proper use of personnel, resources,

More information

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018 ma recycle.com Rely and Comply... GDPR Privacy Policy Policy Date: 24 May 2018 Max Recycle Hawthorne House Blackthorn Way Sedgeletch Industrial Estate Fencehouses Tyne & Wear DH4 6JN T: 0845 026 0026 F:

More information

Beam Technologies Inc. Privacy Policy

Beam Technologies Inc. Privacy Policy Beam Technologies Inc. Privacy Policy Introduction Beam Technologies Inc., Beam Dental Insurance Services LLC, Beam Insurance Administrators LLC, Beam Perks LLC, and Beam Insurance Services LLC, (collectively,

More information

Building a Privacy Management Program

Building a Privacy Management Program Building a Privacy Management Program February 26, 2013 Office of the Information and Privacy Commissioner of Alberta Session Overview Reasons for having a PMP Strategies to deal with current and future

More information

Identity Theft Policies and Procedures

Identity Theft Policies and Procedures Identity Theft Policies and Procedures Davis & Wehrle, LLC 1104 S. Mays, Suite 105 Round Rock, TX 78664-6700 United States (512) 346-1131 Davis & Wehrle Identity Theft Policies & Procedures September 2017

More information

HPE DATA PRIVACY AND SECURITY

HPE DATA PRIVACY AND SECURITY ARUBA, a Hewlett Packard Enterprise company, product services ( Services ) This Data Privacy and Security Agreement ("DPSA") Schedule governs the privacy and security of Personal Data by HPE in connection

More information

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN TELECOM, INC. ( BCN" or "Company") has established practices and procedures adequate to ensure compliance

More information

Keeping It Under Wraps: Personally Identifiable Information (PII)

Keeping It Under Wraps: Personally Identifiable Information (PII) Keeping It Under Wraps: Personally Identifiable Information (PII) Will Robinson Assistant Vice President Information Security Officer & Data Privacy Officer Federal Reserve Bank of Richmond March 14, 2018

More information

Subject: Kier Group plc Data Protection Policy

Subject: Kier Group plc Data Protection Policy Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective

More information

GM Information Security Controls

GM Information Security Controls : Table of Contents 2... 2-1 2.1 Responsibility to Maintain... 2-2 2.2 GM s Right to Monitor... 2-2 2.3 Personal Privacy... 2-3 2.4 Comply with Applicable Laws and Site Specific Restrictions... 2-3 2.5

More information

QNB Bank-ONLINE AGREEMENT

QNB Bank-ONLINE AGREEMENT This is an Agreement between you and QNB Bank ("QNB"). It explains the rules of your electronic access to your accounts through QNB Online. By using QNB-Online, you accept all the terms and conditions

More information

Demonstrating Compliance in the Financial Services Industry with Veriato

Demonstrating Compliance in the Financial Services Industry with Veriato Demonstrating Compliance in the Financial Services Industry with Veriato Demonstrating Compliance in the Financial Services Industry With Veriato The biggest challenge in ensuring data security is people.

More information

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.

More information

INFORMATION SECURITY AND SECURITY BREACH NOTIFICATION GUIDANCE Preventing, Preparing for, and Responding to Breaches of Information Security

INFORMATION SECURITY AND SECURITY BREACH NOTIFICATION GUIDANCE Preventing, Preparing for, and Responding to Breaches of Information Security INFORMATION SECURITY AND SECURITY BREACH NOTIFICATION GUIDANCE Preventing, Preparing for, and Responding to Breaches of Information Security The Office of Illinois Attorney General Lisa Madigan has created

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information

More information

Consolidated Privacy Notice

Consolidated Privacy Notice Privacy Notice Overview Consolidated Privacy Notice The Southern California Edison Privacy Notice was updated on January 31, 2018 It is important to Southern California Edison (SCE) to protect your information

More information

Important Information

Important Information Important Information Important Information Effective from 13 January 2018 1. Your information 1.1 Who we are We are Coutts & Co, of 440 Strand, London WC2R OQS. We are a member of The Royal Bank of Scotland

More information

Creative Funding Solutions Limited Data Protection Policy

Creative Funding Solutions Limited Data Protection Policy Creative Funding Solutions Limited Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2007 H 1 HOUSE BILL 1699

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2007 H 1 HOUSE BILL 1699 GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 0 H HOUSE BILL Short Title: Option to Stop Junk Mail. (Public) Sponsors: Representatives Fisher; Alexander, Faison, Harrison, and Samuelson. Referred to: Judiciary

More information

The University of British Columbia Board of Governors

The University of British Columbia Board of Governors The University of British Columbia Board of Governors Policy No.: 118 Approval Date: February 15, 2016 Responsible Executive: University Counsel Title: Safety and Security Cameras Background and Purposes:

More information

Cybersecurity and Data Protection Developments

Cybersecurity and Data Protection Developments Cybersecurity and Data Protection Developments Nathan Taylor March 8, 2017 NY2 786488 MORRISON & FOERSTER LLP 2017 mofo.com Regulatory Themes 2 A Developing Regulatory Environment 2016 2017 March CFPB

More information

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: Can serve as annual HIPAA training for physician practice

More information

Leap Credit LLC Privacy Policy

Leap Credit LLC Privacy Policy Leap Credit LLC Privacy Policy Last Updated: May 04, 2017 Leap Credit LLC ("we," "us," or "our") respects your privacy and knows that you care about protecting your personal information. This privacy policy

More information

MASTERCARD PRICELESS SPECIALS INDIA PRIVACY POLICY

MASTERCARD PRICELESS SPECIALS INDIA PRIVACY POLICY Effective Date: 12 September 2017 MASTERCARD PRICELESS SPECIALS INDIA PRIVACY POLICY Mastercard respects your privacy. This Privacy Policy describes how we process personal data, the types of personal

More information

ADIENT VENDOR SECURITY STANDARD

ADIENT VENDOR SECURITY STANDARD Contents 1. Scope and General Considerations... 1 2. Definitions... 1 3. Governance... 2 3.1 Personnel... 2 3.2 Sub-Contractors... 2 3.3. Development of Applications... 2 4. Technical and Organizational

More information

Cybersecurity in Higher Ed

Cybersecurity in Higher Ed Cybersecurity in Higher Ed 1 Overview Universities are a treasure trove of information. With cyber threats constantly changing, there is a need to be vigilant in protecting information related to students,

More information

Eagles Charitable Foundation Privacy Policy

Eagles Charitable Foundation Privacy Policy Eagles Charitable Foundation Privacy Policy Effective Date: 1/18/2018 The Eagles Charitable Foundation, Inc. ( Eagles Charitable Foundation, we, our, us ) respects your privacy and values your trust and

More information

Privacy Policy. We may collect information either directly from you, or from third parties when you:

Privacy Policy. We may collect information either directly from you, or from third parties when you: Privacy Policy In this Privacy Policy, 'us' 'we' or 'our' means Envisage Software Pty Ltd trading as Envisage Apps. We are committed to respecting your privacy. Our Privacy Policy sets out how we collect,

More information

Security and Privacy Breach Notification

Security and Privacy Breach Notification Security and Privacy Breach Notification Version Approval Date Owner 1.1 May 17, 2017 Privacy Officer 1. Purpose To ensure that the HealthShare Exchange of Southeastern Pennsylvania, Inc. (HSX) maintains

More information

RippleMatch Privacy Policy

RippleMatch Privacy Policy RippleMatch Privacy Policy This Privacy Policy describes the policies and procedures of RippleMatch Inc. ( we, our or us ) on the collection, use and disclosure of your information on https://www.ripplematch.com/

More information

First Federal Savings Bank of Mascoutah, IL Agreement and Disclosures

First Federal Savings Bank of Mascoutah, IL Agreement and Disclosures Agreement and Disclosures INTERNET BANKING TERMS AND CONDITIONS AGREEMENT This Agreement describes your rights and obligations as a user of the Online Banking Service and all other services made available

More information

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems.

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems. BACKED BY REFERENCE GUIDE Acceptable Use Policy GENERAL GUIDANCE NOTE: This sample policy is not legal advice or a substitute for consultation with qualified legal counsel. Laws vary from country to country.

More information

PCI Compliance. What is it? Who uses it? Why is it important?

PCI Compliance. What is it? Who uses it? Why is it important? PCI Compliance What is it? Who uses it? Why is it important? Definitions: PCI- Payment Card Industry DSS-Data Security Standard Merchants Anyone who takes a credit card payment 3 rd party processors companies

More information

Baseline Information Security and Privacy Requirements for Suppliers

Baseline Information Security and Privacy Requirements for Suppliers Baseline Information Security and Privacy Requirements for Suppliers INSTRUCTION 1/00021-2849 Uen Rev H Ericsson AB 2017 All rights reserved. The information in this document is the property of Ericsson.

More information

Physical and Environmental Security Standards

Physical and Environmental Security Standards Physical and Environmental Security Standards Table of Contents 1. SECURE AREAS... 2 1.1 PHYSICAL SECURITY PERIMETER... 2 1.2 PHYSICAL ENTRY CONTROLS... 3 1.3 SECURING OFFICES, ROOMS AND FACILITIES...

More information

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your). Our Privacy Policy 1 Purpose Mission Australia is required by law to comply with the Privacy Act 1988 (Cth) (the Act), including the Australian Privacy Principles (APPs). We take our privacy obligations

More information