Colleges and universities have many concerns to manage. From overseeing student safety and satisfaction to protecting copious amounts of data, the last thing many want to consider are pages of compliance requirements. And at 30+ pages, the Gramm-Leach-Bliley Act (GLBA), or Financial Services Modernization Act of 1999, is no exception. Its contents are complex, extensive, and at times, a little confusing. Add in the ominous threats of monetary fines, criminal prosecution and prison time for non-compliance and you’ve created a scenario that breeds a bit of anxiety.
Fortunately, with a little unpacking of terms, guidelines and general requirements this complex topic is easily reduced into something more palatable.
So let’s dive in, shall we?
The Gramm-Leach-Bliley Act (GLBA), which is overseen by the Federal Trade Commission (FTC), requires financial institutions (companies that offer consumers financial products or services like loans, financial or investment advice, or insurance) to explain their information-sharing practices to their customers and to safeguard sensitive data.1
Claiming amnesty from this designation seems appropriate after reading the word “financial institution”. However, colleges and universities are still regulated by the GLBA because they deal with federal student loans. So instead of trying to fight the facts, it’s best to just dive right in.
To help digest the message of the GLBA, it is helpful to review the contents of its three primary rules.2
Colleges and universities can narrow their focus even further since they are primarily responsible for complying with the Safeguards Rule which, as stated in Section 501(b) requires organizations to develop, implement, and maintain a comprehensive written information security program that contains administrative, technical, and physical safeguards.3
This is where most universities begin to ask questions. Questions like, “how do we ensure that our cybersecurity program adheres to the requirements outlined in the GLBA?” And, “how do we know if we are missing any protocols that would subject the institution to penalization?” To help make this determination, it is helpful to review the following checklist from the FTC.
In addition to the general statement of just needing a written security plan, The Safeguards Rule further outlines five points that must be encompassed within the document:4
In our experience, many organizations quickly realize they lack the time, talent and resources needed to effectively implement a strategy to meet compliance. That is where BitLyft comes in. Our security operations team is skilled in the monitoring, detection and neutralization of hidden and visible threats and can help provide the data needed to achieve GLBA compliance. Our cybersecurity experts help institutions meet these guidelines by:
We understand the challenges of the compliance landscape and don’t want you to take it on alone. To learn even more about the Gramm-Leach-Bliley Act and how our team can help your organization maintain compliance, download our whitepaper.
1 Federal Trade Commission, “Gramm-Leach-Bliley Act,” web.
2 Tech Target, “Gramm-Leach-Bliley Act (GLBA),” web.
3 Federal Register, “Standards for Safeguarding Customer Information,” web.