Data Security Compliance with the Gramm-Leach-Bliley Act (GLBA)

How Thales solutions help with GLBA Compliance

The Gramm-Leach-Bliley Act (GLBA)

The Gramm-Leach-Bliley Act (GLBA)--also known as the Financial Services Modernization Act of 1999--requires financial institutions to explain their information-sharing practices to their customers and to safeguard sensitive data. The core aim is to prevent and mitigate cyber threats. The Federal Trade Commission (FTC) Safeguards Rule requires covered companies to develop, implement, and maintain an information security program with administrative, technical, and physical safeguards designed to protect customer information.

The GLBA is composed of three main rules regarding the privacy and protection of sensitive consumer data held by financial institutions:

  • The Financial Privacy Rule covers collection and disclosure of most personal information (name, date of birth, SSN) and transactional data (card or bank account numbers) captured by financial institutions.
  • The Safeguards Rule is designed to ensure the security of information gathered by financial institutions. It includes specific technical requirements for protecting sensitive data including encryption of data at rest or in transit as well as access management and authentication.
  • The Pretexting Rule aims to prevent employees or business partners from collecting customer information under false pretenses, such as those employed in social engineering techniques.
Americas

    The GLBA applies to a broad range of companies classified as financial institutions. The FTC explains that the GLBA applies to “all businesses, regardless of size, that are ‘significantly engaged’ in providing financial products or services.” That includes not only companies providing financial products or services like loans, financial advice, or insurance, but also companies providing appraisals, brokerage, and loan servicing, check-cashing, payday loans, courier services, nonbank lending, and tax preparation services, among others.

    The Gramm-Leach-Bliley Act was enacted by congress in 1999 and is in full effect. Primarily, the FTC enforces the regulation, although other federal agencies, such as the Federal Reserve Board and the FDIC, and State governments are responsible for regulating insurance providers.

    A financial institution found in violation of GLBA may face fines of $100,000 for each violation. Its officers and directors can be fined up to $10,000 for each violation and be imprisoned for five years or both.

    How Thales Helps with GLBA Compliance

    Thales’ solutions can help Financial Institutions comply with GLBA by simplifying compliance and automating security, reducing the burden on security and compliance teams. We help address essential requirements for safeguarding customer information under GLBA Part 314, which prescribes the development, implementation, and maintenance of an information security program with administrative, technical, and physical safeguards designed to protect customer information.

    We provide comprehensive cyber security solutions in three key areas of cybersecurity: Application Security, Data Security, and Identity & Access Management.

    GLBA Compliance

    GLBA Compliance Solutions

      Application Security

      Protect applications and APIs at scale in the cloud, on-premises, or in a hybrid model. Our market leading product suite includes Web Application Firewall (WAF), protection against Distributed Denial of Service (DDoS) and malicious BOT attacks, security for APIs, a secure Content Delivery Network (CDN), and Runtime Application Self-Protection (RASP).

      Data Security

      Discover and classify sensitive data across hybrid IT and automatically protect it anywhere, whether at rest, in motion, or in use, using encryption tokenization and key management. Thales solutions also identify, evaluate, and prioritize potential risks for accurate risk assessment as well as identify anomalous behavior, and monitor activity to verify compliance, allowing organizations to prioritize where to spend their efforts.

      Identity & Access Management

      Provide seamless, secure and trusted access to applications and digital services for customers, employees and partners. Our solutions limit the access of internal and external users based on their roles and context with granular access policies and Multi-Factor Authentication that help ensure that the right user is granted access to the right resource at the right time.

      Address Key GLBA Part 314 Requirements

        How Thales helps:

        • Discover and classify potential risk for all public, private and shadow APIs.
        • Identify structured and unstructured sensitive data at risk across Hybrid IT.
        • Identify current state of compliance and documenting gaps.

        How Thales helps:

        • Limit access to systems and data based on roles and context with policies.
        • Apply contextual security measures based on risk scoring.
        • Centralize access policies and enforcement to multiple hybrid environments in a single pane of glass.

        Solutions:

        Identity & Access Management

        Workforce Access Management

        Data Security

        Transparent Encryption

        Data Risk Analytics

        How Thales helps:

        • Encrypt data at rest on-premises, across clouds, and in big data or container environments.
        • Protect cryptographic keys in a FIPS 140-2 Level 3 environment.
        • Pseudonymize sensitive information in databases.
        • Protect data in motion with high-speed encryption.
        • Protect data in use by leveraging confidential computing.
        • Gain full sensitive data activity visibility, track who has access, audit what they are doing and document.
        • Security products designed for post-quantum upgrade to maintain crypto-agility.

        How Thales helps:

        • Protect apps from runtime exploitation, while integrating with tools in the CI/CD pipeline.
        • Detect and prevent cyber threats with web application firewall, ensuring seamless operations and peace of mind.
        • Safeguard critical network assets from DDoS attacks and Bad Bots while continuing to allow legitimate traffic.
        • Deploy data protection controls in hybrid and multi-cloud applications to protect DevSecOps.
        • Protect and automate access to secrets across DevOps tools.
        • Easily access data security solutions through online marketplaces.

        How Thales helps:

        • Enable multi-factor authentication (MFA) with the broadest range of hardware and software methods.
        • Build and deploy adaptive authentication policies based on the sensitivity of the data/application.
        • Protect against phishing and man-in-the-middle attacks.

        How Thales helps:

        • Locate structured and unstructured regulated data across hybrid IT and prioritize remediation.
        • Remove keys from CipherTrust Manager can ensure secure deletion, digitally shredding all instances of the data.

        How Thales helps:

        • Data activity monitoring for structured and unstructured data across cloud and on-prem systems.
        • Produce audit trail and reports of all access events to all systems, stream logs to external SIEM systems.

        Solutions:

        Data Security

        Data Activity Monitoring

        Identity & Access Management

        Workforce Access Management

        How Thales helps:

        • Reduce third party risk by maintaining on-premises control over encryption keys protecting data hosted by in the cloud.
        • Ensure complete separation of roles between cloud provider admins and your organization, restrict access to sensitive data.
        • Monitor and alert anomalies to detect and prevent unwanted activities from disrupting supply chain activities.
        • Enable relationship management with suppliers, partners or any third-party user; with clear delegation of access rights.
        • Minimize privileges by using relationship-based fine-grained authorization.

        Other key data protection and security regulations

        PCI HSM

        Global

        MANDATE | ACTIVE NOW

        The PCI HSM specification defines a set of logical and physical security compliance standards for HSMs specifically for the payments industry. PCI HSM Compliance certification depends on meeting those standards.

        DORA

        Global

        REGULATION | ACTIVE NOW

        DORA aims to strengthen the IT security of financial entities to make sure the financial sector in Europe is resilient in the face of the growing volume and severity of cyber-attacks.

        Data Breach Notification Laws

        Global

        REGULATION | ACTIVE NOW

        Data breach notification requirements following loss of personal information have been enacted by nations around the globe. They vary by jurisdiction but almost universally include a “safe harbor” clause.

        GLBA

        Americas

        REGULATION | ACTIVE NOW

        The Gramm-Leach-Bliley Act (GLBA)--also known as the Financial Services Modernization Act of 1999--requires financial institutions to explain their information-sharing practices to their customers and to safeguard sensitive data.

        Contact a Compliance Specialist

        Contact Us