Solved

Gramm-Leach-Bliley

Posted on 2011-03-23
4
413 Views
Last Modified: 2012-06-27
I wanted to know where I can get information about Gramm-Leach-Bliley?

Where can I get help on this?
0
Comment
Question by:vulture714
  • 2
4 Comments
 
LVL 33

Expert Comment

by:MikeKane
ID: 35209668
0
 

Author Comment

by:vulture714
ID: 35210434
What about some type of a checklist for the office.   What I need is a checklist of what do to and what not to do when it comes to information technology.
0
 
LVL 33

Expert Comment

by:MikeKane
ID: 35211047
I think the closest thing to a checklist will the the it booklets from the Feds.... http://ithandbook.ffiec.gov/it-booklets.aspx     Look at the site and pick the area you want to focus upon.


0
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 35221060
See this summary read, GLBA specifies, in seven titles, the specific requirements for all major financial players, including banks, securities firms, and insurance companies and the responsibilities of the financial community to protect the individual’s right to privacy. The act was directed primarily at allowing expanded functions and relationships among financial institutions but does interlink with other legislation especially in securing the user data

@ http://www.compliancesforum.com/tag/gramm-leach-bliley-act

See this Risk Assessment checklist for GLBA

@ http://www.itservicestrategy.com/gramm-leach-bliley-act-glba-compliance-risk-assessment-templates-banking-and-financial-institution
0

Featured Post

Give your grad a cloud of their own!

With up to 8TB of storage, give your favorite graduate their own personal cloud to centralize all their photos, videos and music in one safe place. They can save, sync and share all their stuff, and automatic photo backup helps free up space on their smartphone and tablet.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Article by: btan
Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now