FTC Safeguards Rule is a regulation under the Gramm-Leach-Bliley Act (GLBA) designed to ensure that financial institutions protect consumer data through comprehensive security measures. The rule requires covered entities to develop, implement, and maintain a written information security program tailored to the company’s size, complexity, and the nature of collected consumer information. Key requirements include conducting risk assessments, implementing access controls, encrypting sensitive data, regularly testing security measures, and ensuring third-party service providers maintain adequate safeguards.
Establish and maintain a written information security program.
Develop and document a comprehensive written information security program.
Conduct a written risk assessment to identify and assess potential threats and vulnerabilities.
Identify and document foreseeable internal and external risks to the security
Periodically reassess risks in light of changes to operations or new threats.
Implement specific safeguards to control the risks identified.
Implement and periodically review access controls to determine who has access to customer information.
Conduct a periodic inventory of data
Encrypt customer information on your system and when it's in transit.
Implement procedures for evaluating the security of apps that store
Implement multi-factor authentication for anyone accessing customer information on your system.
Securely dispose of customer information no later than two years after your last use.
Anticipate and evaluate changes to your information system or network.
Maintain a log of authorized users' activity and monitor for unauthorized access; regularly monitor and test the effectiveness of your safeguards.
Designate a qualified individual responsible for overseeing and implementing the information security program.
Designate a qualified individual to oversee the development
Take steps to ensure that service providers also maintain appropriate safeguards for customer information.
Select service providers capable of maintaining appropriate safeguards and include relevant security obligations in contracts.
Regularly evaluate and adjust the information security program.
At least annually
Develop and maintain a written incident response plan.
Develop and document a written incident response plan to address security events.