| 
 | 
  
![]() 
  
  "It is
  impossible for ideas to compete in the marketplace if no forum for COMPLYING TO THE GRAMM-LEACH-BLILEY ACT Author: Charles Baumert 
 
 
  	A recent
  NetworkWorld survey reported that in 2002, 66% of IT managers increased their
  spending on IT security.  Recent world events have certainly played
  a part in raising awareness of the importance of IT security and encouraging
  investment in this area. At the same time government and industry
  regulators worldwide have been working steadily to put into place measurable
  and enforceable standards to ensure that business can be carried out in an
  environment of trust.  
   
	This paper
  summarizes several key elements of one of the most important pieces of
  government regulation on security.   
   
	On November
  12, 1999, President Clinton signed the Gramm-Leach-Bliley (G-L-B) Act (Pub.
  L.106-102) into law.  Section 501, entitled Protection of Nonpublic
  Personal Information, requires the Agencies and the Securities and Exchange
  Commission, the National Credit Union Administration and the Federal Trade
  Commission to establish appropriate standards for the financial institutions
  subject to their respective jurisdictions relating to the administrative,
  technical and physical safeguards for customer records and information. 
  These safeguards are intended to: (1) Insure the security and confidentiality
  of customer records and information; (2) protect against any anticipated
  threats or hazards to the security or integrity of such records; and (3)
  protect against unauthorized access to or use of such records or information
  that would result in substantial harm or inconvenience to any customer. 1 
   
   
	The Office of
  the Comptroller of the Currency, Board of Governors of the Federal Reserve
  System, Federal Deposit Insurance Corporation, and Office of Thrift
  Supervision (collectively, the Agencies) have published final Guidelines that
  implement sections 501 of the G-L-B Act. 2 
   
   
	The Agencies retained July 1, 2001 as the effective date for these Guidelines. 
  However, they also included a transition rule for contracts with service
  providers that provides a two-year period for grand fathering existing
  contracts.  Thus a contract entered into on or before July 1, 2001
  satisfied the provision of this part until July 1, 2003. 3 
   
   
	The Board of
  Governors of the Federal Reserve Systems final Guidelines apply to
  approximately 9,500 institutions, including state member banks, bank holding
  companies and certain of their non bank subsidiaries or affiliates, state
  uninsured branches and agencies of foreign banks, commercial lending companies
  owned or controlled by foreign banks, and Edge and Agreement corporations. 
  The Board estimates that over 4,500 of the institutions are small institutions
  with assets of less than $100 million. 4 
   
   
   
   
	Paragraph IIIC
  of 12 CFR Part 30 states: 
   
   Manage and Control Risk. 
	Each bank shall: 
   
   
	1.  
  Design its information security program to control the identified risks,
  commensurate with the sensitivity of the information as well as the complexity
  and scope of the banks activities.  Each bank must consider whether
  the following security measures are appropriate for the bank, and if so, adopt
  those measures the bank concludes are appropriate. 
   
   
	c. Encryption
  of electronic customer information, including while in transit or in storage
  on networks or systems to which unauthorized individuals may have access.
  5 
   
   
	The 
  solution I believe is secure leased lines from 2.4 Mbps to 52 Mbps, ATM from E1/T1 to
  OC-12, Frame Relay from 2 Mbps to 52 Mbps, and we offer IPSec VPNs up to 100
  Mbps full duplex (200 Mbps) with Triple-DES encryption and 20,000 simultaneous
  connections. 
   
   
	Encryption
  appliances provide the following benefits: 
   
   
 
 
 
	Paragraph IIIC
  of 12 CFR Part 30 goes on to indicates the potential requirement for: 
   
   
	e. Dual
  control procedures, segregation of duties, and employee background checks for
  employees with responsibilities for or access to customer information.6 
   
   
	Any
  solution
  must facilitate meeting this requirement in a number of ways.  
   
   
	Firstly, that
  encryptors are standalone security devices which are not integrated into IT
  network equipment like routers or firewalls.  This ensures maximum
  bandwidth availability and also maximum security.  Integrated products
  typically have reduced performance when security is enabled and also more
  subject to security breaches.  
   
   
	Secondly, that
  solutions are centrally managed from a dedicated Security Network Management
  platform called PrivaCy Manager, which provides a Java-based platform for all
  of our VPN and WAN Security appliances. PrivaCy Managers graphical
  representation of the network's topology and its point-and-click interface
  simplifies the tasks of configuring, modifying and managing network security. 
  Furthermore, PrivaCy Manager can implement a broad range of security policies
  for determining access to network security devices, while preventing
  unauthorized devices from masquerading as legitimate devices within a users
  network.  PrivaCy Managers ease of management is one of our
  competitive advantages in helping our customers to lower their total cost of
  network security.  
   (PrivaCy Manager manages all the security functions in a network while a separate management system can be used for control of the IT network. This enables true segregation of duties. ) 
 
	Paragraph IIID
  of 12 CFR Part 30 states: 
   
   D. Oversee Service Provider Arrangements. 
	 Each bank shall 
   
   
	1. Exercise
  appropriate due diligence in selecting its service providers 
   
	2. Require its
  service providers by contract to implement appropriate   measures
  designed to meet the objectives of these Guidelines; and 
   
	3. Where
  indicated by the banks risk assessment, monitor its service providers to
  confirm that they have satisfied their obligations as required by paragraph
  D.2.  As part of this monitoring, a bank should review audits, summaries
  of test results, or other equivalent evaluations of its service providers. 7 
   
   
	This part of
  the regulations further expands the banks scope of responsibility in
  ensuring that its information remains secure.  Each bank has
  responsibility to understand the security aspects of its business and ensure
  that adequate measures are in place even if these services are outsourced. 
   
   In todays regulatory environment it is the responsibility of each bank to honestly assess its need for encryption and segregation of duties and to implement appropriate solutions. Sources: 
	
	1)
  Interagency Guidelines Establishing Standards for
  Safeguarding Customer Information and Rescission of Year 2000 Standards for
  Safety and Soundness p.5 
  
   
   
	DEPARTMENT OF THE TREASURY 
	FEDERAL RESERVE SYSTEM 
	 FEDERAL DEPOSIT INSURANCE
  CORPORATION 
   
	DEPARTMENT OF THE TREASURY 
   
   
	2) Ibid, p.2 
   
   
	3) Ibid, p. 40 
   
   
	4) Ibid, p. 53 
   
   
	5) Ibid, p.
  109 
   
   
	6) Ibid, p.
  109 
   
   
	7) Ibid, p.110 
   Visit the Authors Web SiteInquiry Only - No Cost Or Obligation
  
  
  
 
	
		 
 Search the ENTIRE Business
  Forum site. Search includes the Business
   |