Gatehouse Technology

• GLBA SAFEGUARDS RULE

GLBA Safeguards Rule Compliance
for Orange County Financial Firms

The FTC's updated Gramm-Leach-Bliley Act Safeguards Rule requires financial institutions to implement a comprehensive information security program. Gatehouse Technology handles the technical requirements so your firm stays compliant and your clients stay protected.

WHO MUST COMPLY

Registered Investment Advisors (RIAs)
Mortgage brokers and lenders
Insurance companies and agents
Auto dealers offering financing
Tax preparation services
Accounting firms
Financial planners
Check cashing services

KEY REQUIREMENTS

What the Updated GLBA Safeguards Rule Requires

Qualified Individual

Designate a qualified individual responsible for overseeing your information security program. This can be a virtual CISO (vCISO) — we provide this service.

Risk Assessment

Conduct a written risk assessment identifying foreseeable threats to customer information, the likelihood and potential damage of those threats, and the sufficiency of your safeguards.

Safeguards Implementation

Implement and regularly test safeguards addressing the risks identified in your assessment, including access controls, encryption, MFA, and monitoring.

Service Provider Oversight

Select and retain service providers that maintain appropriate safeguards, and require them by contract to implement and maintain such safeguards.

Incident Response Plan

Establish a written incident response plan that addresses goals, internal processes, roles, communications, and remediation procedures.

Annual Reporting

Report to your board of directors (or equivalent) at least annually on the status of your information security program.

WHAT WE IMPLEMENT

Technical Controls
for GLBA Compliance

The updated Safeguards Rule specifies nine categories of technical, administrative, and physical safeguards. We implement the technical controls and help you document the administrative and physical ones.

We also provide virtual CISO (vCISO) services — giving you a qualified individual to oversee your information security program without the cost of a full-time hire.

SPEAK WITH AN EXPERT
Multi-Factor Authentication (MFA) for all customer data systems
Encryption of customer financial information in transit and at rest
Access controls limiting employee access to customer data
Continuous monitoring for unauthorized access attempts
Penetration testing and vulnerability assessments
Secure disposal of customer information
Change management for IT systems handling NPI
Virtual CISO (vCISO) services for program oversight
Written Information Security Program (WISP) development
Annual security awareness training for all staff

Is Your Firm GLBA-Compliant?

Our free cybersecurity assessment includes a GLBA Safeguards Rule gap analysis. We'll identify your compliance gaps and show you the path to full compliance — no obligation.