?
Solved

Gramm-Leach-Bliley

Posted on 2011-03-23
4
Medium Priority
?
430 Views
Last Modified: 2012-06-27
I wanted to know where I can get information about Gramm-Leach-Bliley?

Where can I get help on this?
0
Comment
Question by:vulture714
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 33

Expert Comment

by:MikeKane
ID: 35209668
0
 

Author Comment

by:vulture714
ID: 35210434
What about some type of a checklist for the office.   What I need is a checklist of what do to and what not to do when it comes to information technology.
0
 
LVL 33

Expert Comment

by:MikeKane
ID: 35211047
I think the closest thing to a checklist will the the it booklets from the Feds.... http://ithandbook.ffiec.gov/it-booklets.aspx     Look at the site and pick the area you want to focus upon.


0
 
LVL 64

Accepted Solution

by:
btan earned 2000 total points
ID: 35221060
See this summary read, GLBA specifies, in seven titles, the specific requirements for all major financial players, including banks, securities firms, and insurance companies and the responsibilities of the financial community to protect the individual’s right to privacy. The act was directed primarily at allowing expanded functions and relationships among financial institutions but does interlink with other legislation especially in securing the user data

@ http://www.compliancesforum.com/tag/gramm-leach-bliley-act

See this Risk Assessment checklist for GLBA

@ http://www.itservicestrategy.com/gramm-leach-bliley-act-glba-compliance-risk-assessment-templates-banking-and-financial-institution
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The recent Petya-like ransomware attack served a big blow to hundreds of banks, corporations and government offices The Acronis blog takes a closer look at this damaging worm to see what’s behind it – and offers up tips on how you can safeguard your…
What's worse than having your data encrypted by ransomware? Getting attacked by a so-called "wiper," which simply destroys the data and offers you no hope of ever seeing it again.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question