Compliance , Privacy

GLBA Privacy Requirements: Building a Program That Meets Compliance Mandates & Ensures Customer Privacy
GLBA Privacy Requirements: Building a Program That Meets Compliance Mandates & Ensures Customer Privacy
Preserving the privacy of customer information is a core mandate of Gramm-Leach-Bliley Act (GLBA) compliance - and increasingly an essential for business success.

Banking institutions need strong privacy programs to keep their customers' trust, but also to comply with a growing number of state privacy laws and federal regulations. Beyond regulatory requirements, recent incidents such as the Hannaford data breach have brought to the forefront the need for an effective Privacy program.

Register for this webinar for a how-to overview of elements necessary in an effective Privacy program, including:

  • Overview of GLBA and other regulatory requirements for privacy and security;
  • Privacy program components;
  • How to establish policies, procedures and technical controls to support and maintain privacy;
  • How to align vendor contracts to include Privacy-related requirements and outlining vendors' responsibilities;
  • Industry "best practices" for customer communications for privacy-related notifications.

Background

Building an effective privacy program is essential for business success. Financial institutions that experience privacy incidents lose the trust of their customers. And lost trust results in lost customers. Institutions need strong privacy programs not only to keep their customers' trust but also to comply with a growing number of privacy laws and regulations worldwide. A growing number of recent privacy related incidents have brought the need for an effective Privacy program to the fore-front.

In this exclusive webinar, noted privacy expert Rebecca Herold will lead a discussion of how financial institutions can establish an effective privacy program, outlining the components required to make the program succeed.

Among the points Rebecca will discuss:

Why a privacy program is necessary;
Defining personally identifiable information (PII);
Privacy program components;
Legal privacy and security requirements;
Policies, procedures and technical controls;
Inclusion of Privacy program related in the organization's vendor due-diligence process;
Privacy program maintenance.


Around the Network