Posted on 2011-03-23
Medium Priority
Last Modified: 2012-06-27
I wanted to know where I can get information about Gramm-Leach-Bliley?

Where can I get help on this?
Question by:vulture714
  • 2
LVL 33

Expert Comment

ID: 35209668

Author Comment

ID: 35210434
What about some type of a checklist for the office.   What I need is a checklist of what do to and what not to do when it comes to information technology.
LVL 33

Expert Comment

ID: 35211047
I think the closest thing to a checklist will the the it booklets from the Feds.... http://ithandbook.ffiec.gov/it-booklets.aspx     Look at the site and pick the area you want to focus upon.

LVL 66

Accepted Solution

btan earned 2000 total points
ID: 35221060
See this summary read, GLBA specifies, in seven titles, the specific requirements for all major financial players, including banks, securities firms, and insurance companies and the responsibilities of the financial community to protect the individual’s right to privacy. The act was directed primarily at allowing expanded functions and relationships among financial institutions but does interlink with other legislation especially in securing the user data

@ http://www.compliancesforum.com/tag/gramm-leach-bliley-act

See this Risk Assessment checklist for GLBA

@ http://www.itservicestrategy.com/gramm-leach-bliley-act-glba-compliance-risk-assessment-templates-banking-and-financial-institution

Featured Post

Get 10% Off Your First Squarespace Website

Ready to showcase your work, publish content or promote your business online? With Squarespace’s award-winning templates and 24/7 customer service, getting started is simple. Head to Squarespace.com and use offer code ‘EXPERTS’ to get 10% off your first purchase.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

You do not need to be a security expert to make the RIGHT security. You just need some 3D guidance, to help lay out an action plan to secure your business operations. It does not happen overnight. You just need to start now and do the first thin…
Cloud computing is a model of provisioning IT services. By combining many servers into one large pool and providing virtual machines from that resource pool, it provides IT services that let customers acquire resources at any time and get rid of the…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…

627 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question