Solved

Gramm-Leach-Bliley

Posted on 2011-03-23
4
411 Views
Last Modified: 2012-06-27
I wanted to know where I can get information about Gramm-Leach-Bliley?

Where can I get help on this?
0
Comment
Question by:vulture714
  • 2
4 Comments
 
LVL 33

Expert Comment

by:MikeKane
ID: 35209668
0
 

Author Comment

by:vulture714
ID: 35210434
What about some type of a checklist for the office.   What I need is a checklist of what do to and what not to do when it comes to information technology.
0
 
LVL 33

Expert Comment

by:MikeKane
ID: 35211047
I think the closest thing to a checklist will the the it booklets from the Feds.... http://ithandbook.ffiec.gov/it-booklets.aspx     Look at the site and pick the area you want to focus upon.


0
 
LVL 61

Accepted Solution

by:
btan earned 500 total points
ID: 35221060
See this summary read, GLBA specifies, in seven titles, the specific requirements for all major financial players, including banks, securities firms, and insurance companies and the responsibilities of the financial community to protect the individual’s right to privacy. The act was directed primarily at allowing expanded functions and relationships among financial institutions but does interlink with other legislation especially in securing the user data

@ http://www.compliancesforum.com/tag/gramm-leach-bliley-act

See this Risk Assessment checklist for GLBA

@ http://www.itservicestrategy.com/gramm-leach-bliley-act-glba-compliance-risk-assessment-templates-banking-and-financial-institution
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now