Solved

Gramm-Leach-Bliley

Posted on 2011-03-23
4
422 Views
Last Modified: 2012-06-27
I wanted to know where I can get information about Gramm-Leach-Bliley?

Where can I get help on this?
0
Comment
Question by:vulture714
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 33

Expert Comment

by:MikeKane
ID: 35209668
0
 

Author Comment

by:vulture714
ID: 35210434
What about some type of a checklist for the office.   What I need is a checklist of what do to and what not to do when it comes to information technology.
0
 
LVL 33

Expert Comment

by:MikeKane
ID: 35211047
I think the closest thing to a checklist will the the it booklets from the Feds.... http://ithandbook.ffiec.gov/it-booklets.aspx     Look at the site and pick the area you want to focus upon.


0
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 35221060
See this summary read, GLBA specifies, in seven titles, the specific requirements for all major financial players, including banks, securities firms, and insurance companies and the responsibilities of the financial community to protect the individual’s right to privacy. The act was directed primarily at allowing expanded functions and relationships among financial institutions but does interlink with other legislation especially in securing the user data

@ http://www.compliancesforum.com/tag/gramm-leach-bliley-act

See this Risk Assessment checklist for GLBA

@ http://www.itservicestrategy.com/gramm-leach-bliley-act-glba-compliance-risk-assessment-templates-banking-and-financial-institution
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this increasingly digital world, security hacks are no longer just a threat, but a reality. As we've witnessed with Target's big identity hack 2013, Heartbleed in 2015, and now Cloudbleed, companies and their leaders need to prepare for the unthi…
As cyber crime continues to grow in both numbers and sophistication, a troubling trend of optimization has emerged over the last year.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question