Follow this checklist to implement your GLBA conformance process.

Contact us to receive additional guidance on HIPAA, PCI, SOX & SSAE16 technology compliance. 

Jon Bowling, President

March 2017

       I.            Assign GLBA Compliance Officer.

  1. This person should be familiar with all aspects of the office Operations and if possible have a rudimentary understanding of technology.
  2. Duties will include…
    1. Developing office policies and procedures
    2. Implementing office policies and procedures
    3. Training of Staff members
    4. Training of new staff members
    5. Securing and Managing Vendors to ensure technological Compliance to the GLBA
    6. Periodic review of policies and procedures
    7. Development and management of Customer Notices
    8. Implementation of and management of Business Continuity Agreements with Vendors

 

 

    II.            Office Policies and Procedures

 

  1. These Policies and procedures are to be used in all every day activities throughout the offices.
  2. These Policies and Procedures are to ensure that our customers’ private and confidential Information is not compromised in any way as per the guidelines and rules set forth in the Gramm-Leach-Bliley-Act.
  3. Office Procedures;
    1. New Customer on-boarding.
      1. Customer is to be escorted to a designated conference room.
      2. Customer is to be provided a Privacy Compliance Notice.
      3. Customer is to complete the On-Boarding Documentation with the assistance of a staff member.
      4. Ensure that all customer information is removed from the Conference room when On-Boarding process is complete.
    2. Daily procedures:
      1. Ensure all customer files remain in the security of the employee office.
      2. Ensure all files not being worked are placed inside a file cabinet or desk drawer.
      3. Ensure that during the scanning of Customer files they are not left unattended during the scanning process. Employees should remain at the scanner to ensure the security of files during the process.
      4. Ensure that all computer Monitors can not be viewed by a “passer-by” of employee office.
      5. Ensure that all visitors are escorted at all times during their visit and kept out of employee offices unless their duties require entry. In the event entry is necessary all customer files and information is to be stored securely in a file cabinet or desk drawer
      6. Ensure all employees close office door when leaving their office. If any “in-work” customer files are open the employee must lock the door when leaving

 III.            Electronic Data Policies and Procedures.

  1. Ensure that all employees have secure passwords for accessing their computers and programs containing Confidential Customer Information.
  2. Ensure that Employee is using the minimum recommended password protection using the following criteria.
    1. Minimum Seven Characters
    2. Must contain at least three of the following
    3. UPPER CASE
    4. Lower Case
    5. Numeric value 1234 etc.
    6. Special Function Key !@#$ etc.
  3. Ensure that all employees have timed screen saver of 10 minutes or less with password protection.
  4. Ensure that employee doers not share Usernames and Password with anyone (This is a violation of the CFAA (Computer Fraud and Abuse Act))
  5. Ensure that Employee does not record on paper and leave in close proximity to their computer password to access either their system or Programs that contain Confidential Customer Information.

 

By | 2017-04-19T18:53:07+00:00 March 31st, 2017|Knowledge Center|0 Comments