Skip to main content
U.S. flag
An official website of the United States government
Dot gov
The .gov means it’s official. 
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.
Https
The site is secure. 
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.
Federal Register Publications

FDIC Federal Register Citations



Home > Regulation & Examinations > Laws & Regulations > FDIC Federal Register Citations




FDIC Federal Register Citations

[Federal Register: August 12, 2003 (Volume 68, Number 155)]

[Notices]

[Page 47954-47960]

From the Federal Register Online via GPO Access [wais.access.gpo.gov]

[DOCID:fr12au03-83]

=======================================================================

DEPARTMENT OF THE TREASURY

Office of the Comptroller of the Currency

[Docket No. 03-18]

DEPARTMENT OF THE TREASURY

Office of Thrift Supervision

[No. 03-35]

BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM

[Docket No. OP-1155]

FEDERAL DEPOSIT INSURANCE CORPORATION

Interagency Guidance on Response Programs for Unauthorized Access

to Customer Information and Customer Notice

AGENCIES: Office of the Comptroller of the Currency, Treasury (OCC);

Board of Governors of the Federal Reserve System (Board); Federal

Deposit Insurance Corporation (FDIC); and Office of Thrift Supervision,

Treasury (OTS).\1\

---------------------------------------------------------------------------

\1\ The National Credit Union Administration (NCUA) participated

in the guidance of development process and will separately issue

comparable proposed guidance.

ACTION: Notice and request for comment.

-----------------------------------------------------------------------

SUMMARY: The OCC, Board, FDIC, and OTS (the Agencies) are requesting

comment on proposed guidance entitled Interagency Guidance on Response

Programs for Unauthorized Access to Customer Information and Customer

Notice (``the proposed Guidance'').

In addition, as part of their continuing efforts to reduce

paperwork and respondent burden, the Agencies invite the general public

and other Federal agencies to take this opportunity to comment on a

proposed information collection, as required by the Paperwork Reduction

Act of 1995 (44 U.S.C. chapter 35).

DATES: Comments must be submitted on or before October 14, 2003

ADDRESSES: Interested parties are invited to submit written comments

to:

Office of the Comptroller of the Currency: Public Information Room,

Office of the Comptroller of the Currency, 250 E Street, SW, Mail stop

1-5, Washington, DC 20219, Attention: Docket No. 03-18, Fax number

(202) 874-4448 or e-mail address: regs.comments@occ.treas.gov. Due to

delays in the delivery of paper mail in the Washington area, commenters

are encouraged to submit their comments by fax or email. Comments may

be inspected and photocopied at the OCC's Public Information Room, 250

E Street, SW, Washington, DC. You can make an appointment to inspect

the comments by calling (202) 874-5043.

Board of Governors of the Federal Reserve System: Comments should

refer to Docket No. OP-1155 and may be mailed to Ms. Jennifer J.

Johnson, Secretary, Board of Governors of the Federal Reserve System,

20th Street and Constitution Avenue, NW., Washington, DC 20551.

However, because paper mail in the Washington area and at the Board of

Governors is subject to delay, please consider submitting your comments

by e-mail to regs.comments@federalreserve.gov, or faxing them to the

Office of the Secretary at (202) 452-3819 or (202) 452-3102. Members of

the public may inspect comments in Room MP-500 between 9 a.m. and 5

p.m. on weekdays pursuant to 12 CFR 261.12, except as provided in 12

CFR 261.14, of the Board's Rules Regarding Availability of Information,

12 CFR sections 261.12 and 261.14.

Federal Deposit Insurance Corporation: Send written comments to

Robert E. Feldman, Executive Secretary, Attention: Comments/OES,

Federal Deposit Insurance Corporation, 550 17th Street, NW.,

Washington, DC 20429. Comments also may be mailed electronically to

comments@fdic.gov. Comments may be hand delivered to the guard station

at the rear of the 17th Street building (located on F Street) on

business days between 7 a.m. and 5 p.m.; Fax Number (202) 898-3838.

Comments may be inspected and photocopied in the FDIC Public

Information Center, Room 100, 801 17th Street, NW., Washington, DC

20429, between 9 a.m. and 5 p.m. on business days.

Office of Thrift Supervision: Comments may be sent to Regulation

Comments, Chief Counsel's Office, Office of Thrift Supervision, 1700 G

Street, NW., Washington, DC 20552, Attention: No.03-35; FAX number

(202) 906-6518, Attention: No. 03-35; or e-mail address

regs.comments@ots.treas.gov, Attention: No. 03-35, and include your

name and telephone number. Comments may also be hand delivered to the

Guard's Desk, East Lobby Entrance, 1700 G Street, NW., from 9 a.m. to 4

p.m. on business days, Attention: Regulation Comments, Chief Counsel's

Office, No. 03-35. Commenters should be aware that there have been

unpredictable and lengthy delays in postal deliveries to the

Washington, DC area and may prefer to make their comments via

facsimile, e-mail, or hand delivery. OTS will post

[[Page 47955]]

comments and the related index on the OTS Internet Site at http://www.ots.treas.gov.

In addition, you may inspect comments at the Public

Reading Room, 1700 G Street, NW., by appointment. To make an

appointment for access, you may call (202) 906-5922, send an e-mail to

public.info@ots.treas. gov, or send a facsimile transmission to (202)

906-7555. (Please identify the materials you would like to inspect to

assist us in serving you.) We schedule appointments on business days

between 10 a.m. and 4 p.m. In most cases, appointments will be

available the business day after the date we receive a request.

FOR FURTHER INFORMATION CONTACT:

OCC: Aida Plaza Carter, Director, Bank Information Technology

Operations Division, (202) 874-4740; Clifford A. Wilke, Director, Bank

Technology Division, (202) 874-5920; Amy Friend, Assistant Chief

Counsel, (202) 874-5200; or Deborah Katz, Senior Attorney, Legislative

and Regulatory Activities Division, (202) 874-5090.

Board: Donna L. Parker, Supervisory Financial Analyst, Division of

Banking Supervision & Regulation, (202) 452-2614; Thomas E. Scanlon,

Counsel, Legal Division, (202) 452-3594; or Joshua H. Kaplan, Attorney,

Legal Division, (202) 452-2249.

FDIC: Jeffrey M. Kopchik, Senior Policy Analyst, Division of

Supervision and Consumer Protection, (202) 898-3872; Patricia I.

Cashman, Senior Policy Analyst, Division of Supervision and Consumer

Protection, (202) 898-6534; or Robert A. Patrick, Counsel, Legal

Division, (202) 898-3757.

OTS: Robert Engebreth, Director, Technology Risk Management, (202)

906-5631; Lewis C. Angel, Senior Project Manager, Technology Risk

Management, (202) 906-5645; Elizabeth Baltierra, Program Analyst

(Compliance), Compliance Policy, (202) 906-6540; or Paul Robin, Special

Counsel, Regulations and Legislation Division, (202) 906-6648.

SUPPLEMENTARY INFORMATION:

I. Background

The Agencies have published Interagency Guidelines Establishing

Standards for Safeguarding Customer Information (``Security

Guidelines'').\2\ These Security Guidelines were published to fulfill a

requirement in section 501(b) of the Gramm-Leach-Bliley Act in which

Congress directed the Agencies to establish standards for financial

institutions relating to administrative, technical, and physical

safeguards to: (1) Insure the security and confidentiality of customer

records and information; (2) protect against any anticipated threats or

hazards to the security or integrity of such records; and (3) protect

against unauthorized access to or use of such records or information

that could result in substantial harm or inconvenience to any

customer.\3\

---------------------------------------------------------------------------

\2\ 12 CFR part 30, app. B (OCC); 12 CFR part 208, app. D-2, and

part 225, app. F (Board); 12 CFR part 364, app. B (FDIC); and 12 CFR

part 570, app. B (OTS).

\3\ 15 U.S.C. 6805(b).

---------------------------------------------------------------------------

Among other things, the Security Guidelines direct financial

institutions to: (1) Identify reasonably foreseeable internal and

external threats that could result in unauthorized disclosure, misuse,

alteration, or destruction of customer information or customer

information systems; (2) assess the likelihood and potential damage of

these threats, taking into consideration the sensitivity of customer

information; and (3) assess the sufficiency of policies, procedures,

customer information systems, and other arrangements in place to

control risks.\4\

---------------------------------------------------------------------------

\4\ Security Guidelines, Paragraph III.B.2.

---------------------------------------------------------------------------

This proposed Guidance, published as an Appendix to this notice,

interprets section 501(b) of the Gramm-Leach-Bliley Act and the

provisions of the Security Guidelines noted above.\5\ It describes the

Agencies' expectations that every financial institution develop a

response program to protect against and address reasonably foreseeable

risks associated with internal and external threats to the security of

customer information maintained by the financial institution or its

service provider. The proposed Guidance further describes the

components of a response program, which includes procedures for

notifying customers about incidents of unauthorized access to customer

information that could result in substantial harm or inconvenience to

the customer. The proposed Guidance provides that a financial

institution is expected to expeditiously implement its response program

to address incidents of unauthorized access to or use of customer

information. A response program should contain policies and procedures

that enable the financial institution to:

---------------------------------------------------------------------------

\5\ The Agencies may treat an institution's failure to implement

final Guidance issued as a violation of the Security Guidelines.

---------------------------------------------------------------------------

A. Assess the situation to determine the nature and scope of the

incident, and identify the information systems and types of customer

information affected;

B. Notify the institution's primary Federal regulator and, in

accordance with applicable regulations and guidance, file a Suspicious

Activity Report and notify appropriate law enforcement agencies;

C. Take measures to contain and control the incident to prevent

further unauthorized access to or use of customer information,

including shutting down particular applications or third party

connections, reconfiguring firewalls, changing computer access codes,

and modifying physical access controls; and

D. Address and mitigate harm to individual customers.

The proposed Guidance describes the following corrective measures a

financial institution should include as a part of its response program

in order to effectively address and mitigate harm to individual

customers:

A. Flag Accounts--The institution should identify accounts of

customers whose information may have been compromised, monitor those

accounts for unusual activity, and initiate appropriate controls to

prevent the unauthorized withdrawal or transfer of funds from customer

accounts.

B. Secure Accounts--The institution should secure all accounts

associated with the customer information that has been the subject of

unauthorized access or use.

C. Customer Notice and Assistance--The institution should, under

certain circumstances, notify affected customers when sensitive

customer information about them is the subject of unauthorized access.

Where the institution can specifically identify affected customers from

its logs, notification may be limited to those persons only. Otherwise,

the institution should notify each customer in those groups likely to

be affected.

The proposed Guidance provides that a financial institution should

notify each affected customer when it becomes aware of unauthorized

access to sensitive customer information, unless the institution, after

an appropriate investigation, reasonably concludes that misuse of the

information is unlikely to occur, and takes appropriate steps to

safeguard the interests of affected customers, including by monitoring

affected customers' accounts for unusual or suspicious activity. For

the purposes of the proposed Guidance, the Agencies define sensitive

customer information to mean a customer's social security number,

personal identification number (PIN), password, or account number, in

conjunction with a personal identifier, such as the individual's name,

address, or telephone number. Sensitive customer information would also

include any combination of components of customer information

[[Page 47956]]

that would allow someone to log onto or access another person's

account, such as user name and password.

Under the Security Guidelines, an institution must protect against

unauthorized access to or use of customer information that could result

in substantial harm or inconvenience to any customer. The Agencies

believe that substantial harm or inconvenience is most likely to result

from the improper access to and use of sensitive customer information.

Accordingly, the proposed Guidance requires notice to mitigate or

prevent substantial harm or inconvenience to a customer.

The Agencies note that the response program required under the

proposed Guidance must address incidents involving the unauthorized

access to or use of any form of customer information. However, the

customer notice requirement applies only to security breaches involving

sensitive customer information.

The proposed Guidance provides several examples the Agencies

believe typify situations in which customer notification is required

and those when it is not. As in other circumstances, the Agencies also

expect financial institutions to notify customers upon the direction of

the institution's primary Federal regulator.

The proposed Guidance discusses the content and delivery of

customer notices. The notice should include a general description of

the incident, and provide information to assist customers in mitigating

potential harm, including a customer service number, steps customers

can take to obtain and review their credit reports and to file fraud

alerts with nationwide credit reporting agencies, and sources of

information designed to assist individuals in protecting against

identity theft.

In addition, institutions are expected to inform each customer

about the availability of the Federal Trade Commission's (``FTC'')

online guidance regarding measures to protect against identity theft

and to encourage the customer to report any suspected incidents of

identity theft to the FTC. Further, institutions should provide the

FTC's Web site address and telephone number for purposes of obtaining

the guidance and reporting suspected incidents of identity theft.

Currently, the Web site address is http://www.ftc.gov/idtheft, and the

toll free number for the identity theft hotline is 1-877-IDTHEFT.

The proposed Guidance also describes other forms of assistance that

financial institutions have offered to their customers in incidents of

this type. Financial institutions may wish to offer such forms of

assistance to their customers and describe them in the customer notice.

II. Request for Comments

The Agencies invite comment on all aspects of the proposed

Guidance, including each component of the response program described in

Paragraph II of the proposed Guidance. Please consider the following

questions in formulating your comments:

[sbull] Should any component of the response program be clarified

in some way and, if so, how?

[sbull] Are there additional components that should be included in

a response program to address incidents involving unauthorized access

to or use of customer information? If so, please describe the

component, and the reasons that support it.

[sbull] Should each component of the response program be retained?

If not, which components should be deleted and why?

[sbull] In preparing the proposed Guidance, the Agencies have

attempted to identify a standard that will lead to customer notice when

appropriate. The Agencies recognize that there is a spectrum of

alternatives for developing a requirement to notify customers. On one

side of the spectrum is a standard that would require a financial

institution to notify its customers every time the mere possibility of

misuse of customer information arises. On the other side is a standard

that would require an institution to notify its customers only when it

becomes aware of an incident involving unauthorized access to customer

information and, based on unusual activity in customers' accounts or

other indicia of identity theft, knows that the information is being

misused. The Agencies propose a standard that lies in the middle of

this spectrum. The Agencies believe that no useful purpose would be

served if notices were sent due to the mere possibility of misuse of

some customer information because, in general, the notices should alert

customers to those situations where enhanced vigilance is necessary to

protect against fraud or identity theft. Rather, the Agencies believe

that notice to customers should be required in a narrower range of

instances involving the unauthorized access to sensitive customer

information. The standard proposed here would require a financial

institution to send notice to each affected customer when the

institution becomes aware of an incident of unauthorized access to

sensitive customer information, unless the institution, after an

appropriate investigation, reasonably concludes that misuse of the

information is unlikely to occur and takes appropriate steps to

safeguard the interests of affected customers, including by monitoring

affected customers' accounts for unusual or suspicious activity. The

Agencies invite comment on whether this is the appropriate standard for

requiring customer notice. For commenters who believe that this

standard is inappropriate, the Agencies request that these commenters

state specifically their reasoning and offer alternative thresholds for

requiring customer notice.

[sbull] The proposed Guidance defines sensitive customer

information as a social security number, a personal identification

number (PIN), password, or an account number in conjunction with a

personal identifier. Sensitive customer information would also include

any combination of components of customer information that would allow

someone to log onto or access another person's account, such as user

name and password. The Agencies request comment on which, if any,

additional types of information should be included in this definition,

such as mother's maiden name or driver's license number.

[sbull] The Agencies invite comment on the potential burden

associated with the customer notice provisions. For example, what is

the anticipated burden that may arise from the questions posed by those

customers who receive the notices? Should the Agencies consider how the

burden may vary depending upon the size and complexity of the

institution?

[sbull] As part of the response program, the Agencies describe

certain corrective measures that an institution should take once an

incident of unauthorized access occurs. One such measure is to ``secure

accounts.'' Is the discussion of securing accounts sufficiently clear

to enable institutions to know what is expected of them when instances

of unauthorized access occur? To what extent would contracts between

financial institutions and service providers need to be modified, if at

all, to comply with the proposed Guidance? How much burden, if any,

will the Guidance impose on service providers?

[sbull] The Agencies also invite comment on whether the proposed

standard should be modified to apply to other extraordinary

circumstances that compel an institution to conclude that unauthorized

access to information, other than sensitive customer information,

likely will result in substantial harm or inconvenience to the affected

customers.

[[Page 47957]]

[sbull] The proposed Guidance includes examples of circumstances in

which customer notice would be expected and those when it would not.

Please comment on whether the examples in the proposed Guidance should

be modified or supplemented and provide your rationale.

III. Paperwork Reduction Act

A. Request for Comment on Proposed Information Collection

In accordance with the requirements of the Paperwork Reduction Act

of 1995, the Agencies may not conduct or sponsor, and the respondent is

not required to respond to, an information collection unless it

displays a currently valid Office of Management and Budget (OMB)

control number. The Agencies are requesting comment on a proposed

information collection. The Agencies also give notice that, at the end

of the comment period, the proposed collections of information, along

with an analysis of the comments and recommendations received, will be

submitted to OMB for review and approval.

Comments are invited on:

(a) Whether the collection of information is necessary for the

proper performance of the Agency's functions, including whether the

information has practical utility;

(b) The accuracy of the estimates of the burden of the information

collection, including the validity of the methodology and assumptions

used;

(c) Ways to enhance the quality, utility, and clarity of the

information to be collected;

(d) Ways to minimize the burden of the information collection on

respondents, including through the use of automated collection

techniques or other forms of information technology; and

(e) Estimates of capital or start up costs and costs of operation,

maintenance, and purchase of services to provide information.

At the end of the comment period, the comments and recommendations

received will be analyzed to determine the extent to which the

information collections should be modified prior to submission to OMB

for review and approval. The comments will also be summarized or

included in the Agencies' requests to OMB for approval of the

collections. All comments will become a matter of public record.

Comments should be addressed to:

OCC: Public Information Room, Office of the Comptroller of the

Currency, 250 E Street, SW, Mail stop 1-5, Attention: Docket 03-18,

Washington, DC 20219; fax number (202) 874-4448; Internet address:

regs.comments@occ.treas.gov. Due to delays in paper mail delivery in

the Washington area, commenters are encouraged to submit their comments

by fax or e-mail. You can make an appointment to inspect the comments

at the Public Information Room by calling (202) 874-5043.

Board: Comments should refer to Docket No. OP-1155 and may be

mailed to Ms. Jennifer J. Johnson, Secretary, Board of Governors of the

Federal Reserve System, 20th Street and Constitution Avenue, NW.,

Washington, DC 20551. However, because paper mail in the Washington

area and at the Board of Governors is subject to delay, please consider

submitting your comments by e-mail to regs.comments@federalreserve.gov,

or faxing them to the Office of the Secretary at (202) 452-3819 or

(202) 452-3102. Members of the public may inspect comments in Room MP-

500 between 9 a.m. and 5 p.m. on weekdays pursuant to 12 CFR section

261.12, except as provided in 12 CFR section 261.14, of the Board's

Rules Regarding Availability of Information, 12 CFR sections 261.12 and

261.14.

FDIC: Steven F. Hanft, Legal Division (Consumer and Compliance

Unit), Room MB-3064, Federal Deposit Insurance Corporation, 550 17th

Street, NW., Washington, DC 20429. All comments should refer to the

title of the proposed collection. Comments may be hand-delivered to the

guard station at the rear of the 17th Street Building (located on F

Street), on business days between 7 a.m. and 5 p.m., Attention:

Comments, Federal Deposit Insurance Corporation, 550 17th Street, NW.,

Washington, DC 20429.

OTS: Information Collection Comments, Chief Counsel's Office,

Office of Thrift Supervision, 1700 G Street, NW., Washington, DC 20552;

send a facsimile transmission to (202) 906-6518; or send an e-mail to

infocollection.comments@ots.treas.gov. OTS will post comments and the

related index on the OTS Internet site at http://www.ots.treas.gov. In

addition, interested persons may inspect the comments at the Public

Reading Room, 1700 G Street, NW., by appointment. To make an

appointment, call (202) 906-5922, send an e-mail to

publicinfo@ots.treas.gov, or send a facsimile transmission to (202)

906-7755.

B. Proposed Information Collection

Title of Information Collection: Notice Regarding Unauthorized

Access to Customer Information.

Frequency of Response: On occasion.

Affected Public:

OCC: National banks, District of Columbia banks, and Federal

branches and agencies of foreign banks.

Board: State member banks, bank holding companies, affiliates and

certain non-bank subsidiaries of bank holding companies, uninsured

state agencies and branches of foreign banks, commercial lending

companies owned or controlled by foreign banks, and Edge and agreement

corporations.

FDIC: Insured nonmember banks, insured state branches of foreign

banks, and certain subsidiaries of these entities.

OTS: Savings associations and certain of their subsidiaries.

Abstract: The proposed Guidance describes the Agencies'

expectations regarding a response program, including customer

notification procedures, that a financial institution should develop

and apply under the circumstances described in the Appendix to address

unauthorized access to or use of customer information that could result

in substantial harm or inconvenience to a customer.

The information collections in the proposed Guidance would require

financial institutions to: (1) Develop notices to customers; (2)

determine which customers should receive the notices and send the

notices to customers; and (3) ensure that their contracts with their

service providers satisfy the proposed Guidance.

Estimated Burden: It is estimated that it will initially take

institutions 20 hours (2.5 business days) to develop and produce the

notices described in the proposed Guidance and 24 hours per incident

(three business days) to determine which customers should receive the

notice and notify the customers. For the purposes of this analysis, it

is estimated that two percent of supervised institutions will

experience an incident of unauthorized access to customer information

on an annual basis, resulting in customer notification.\6\

---------------------------------------------------------------------------

\6\ This estimate is based upon the Agencies' experience and

data gathered by the FDIC on 2,000 institutions that indicates

slightly less than one percent of those institutions experienced

some form of unauthorized access to customer information during any

12 month period. However, the Agencies are assuming that other

incidents of unauthorized access to customer information may have

occurred, but were not reported.

---------------------------------------------------------------------------

Thus, the burden associated with this collection of information may

be summarized as follows. However, the burden estimate does not include

time for financial institutions to adjust their contracts with service

providers, if needed; nor for service providers to

[[Page 47958]]

disclose information pursuant to the proposed Guidance.

OCC

Number of Respondents: 2,200.

Estimated Time per Response:

Developing notices: 20 hrs. x 2,200 = 44,000 hours.

Notifying customers: 24 hrs. x 44 = 1,056 hours.

Total Estimated Annual Burden = 45,056 hours.

Board

Number of Respondents: 6,692.

Estimated Time per Response:

Developing notices: 20 hrs. x 6,692 = 133,840 hours.

Notifying customers: 24 hrs. x 134 = 3,216 hours.

Total Estimated Annual Burden: 137,056 hours.

FDIC

Number of Respondents: 5,500.

Estimated Time per Response:

Developing notices: 20 hrs. x 5,500 = 110,000 hours.

Notifying customers: 24 hrs. x 110 = 2,640 hours.

Total Estimated Annual Burden: 112,640 hours.

OTS

Number of Respondents: 961.

Estimated Time per Response:

Developing notices: 20 hrs. x 961 = 19,220 hours.

Notifying customers: 24 hrs. x 19 = 456 hours.

Estimated Total Annual Burden: 19,676 hours.

Appendix--Interagency Guidance on Response Programs for Unauthorized

Access to Customer Information and Customer Notice

I. Background

This Guidance \1\ interprets section 501(b) of the Gramm-Leach-

Bliley Act (``GLBA'') and the Interagency Guidelines Establishing

Standards for Safeguarding Customer Information (the ``Security

Guidelines'')\2\ and describes the Agencies'' expectations regarding

the response programs, including customer notification procedures,

that a financial institution should develop and apply to address

unauthorized access to or use of customer information that could

result in substantial harm or inconvenience to a customer.

---------------------------------------------------------------------------

\1\ This Guidance is being jointly issued by the Board of

Governors of the Federal Reserve System (Board), the Federal Deposit

Insurance Corporation (FDIC), the Office of the Comptroller of the

Currency (OCC), and the Office of Thrift Supervision (OTS).

\2\ 12 CFR part 30, app. B (OCC); 12 CFR part 208, app. D-2 and

part 225, app. F (Board); 12 CFR part 364, app. B (FDIC); and 12 CFR

part 570, app. B (OTS).

---------------------------------------------------------------------------

Interagency Security Guidelines

Section 501(b) of the GLBA required the Agencies to establish

appropriate standards for financial institutions subject to their

jurisdiction that include administrative, technical, and physical

safeguards, to protect the security and confidentiality of customer

information.\3\ Accordingly, the Agencies issued Security Guidelines

requiring every financial institution to have an information

security program designed to:

---------------------------------------------------------------------------

\3\ The term ``customer information'' is the same term used in

the Security Guidelines and means any record containing nonpublic

personal information whether in paper, electronic, or other form,

maintained by or on behalf of the institution.

---------------------------------------------------------------------------

[sbull] Ensure the security and confidentiality of customer

information;

[sbull] Protect against any anticipated threats or hazards to

the security or integrity of such information; and

[sbull] Protect against unauthorized access to or use of such

information that could result in substantial harm or inconvenience

to any customer.

Risk Assessment and Controls

The Security Guidelines direct every financial institution to

assess the following risks, among others, when developing its

information security program:

[sbull] Reasonably foreseeable internal and external threats

that could result in unauthorized disclosure, misuse, alteration, or

destruction of customer information or customer information systems;

[sbull] The likelihood and potential damage of threats, taking

into consideration the sensitivity of customer information; and

[sbull] The sufficiency of policies, procedures, customer

information systems, and other arrangements in place to control

risks.\4\

---------------------------------------------------------------------------

\4\ See Security Guidelines Paragraph III.B.

---------------------------------------------------------------------------

Following the assessment of these risks, the Security Guidelines

require a financial institution to design a program to address the

identified risks. The particular security measures an institution

should adopt will depend upon the risks presented by the complexity

and scope of its business. At a minimum, the financial institution

is required to consider the specific security measures enumerated in

the Security Guidelines,\5\ and adopt those that are appropriate for

the institution, including:

---------------------------------------------------------------------------

\5\ See Security Guidelines Paragraph III.C.

---------------------------------------------------------------------------

[sbull] Access controls on customer information systems,

including controls to authenticate and permit access only to

authorized individuals and controls to prevent employees from

providing customer information to unauthorized individuals who may

seek to obtain this information through fraudulent means;

[sbull] Background checks for employees with responsibilities

for access to customer information; and

[sbull] Response programs that specify actions to be taken when

the bank suspects or detects that unauthorized individuals have

gained access to customer information systems, including appropriate

reports to regulatory and law enforcement agencies.\6\

---------------------------------------------------------------------------

\6\ See Security Guidelines Paragraph III.D.

---------------------------------------------------------------------------

Service Providers

The Security Guidelines direct every financial institution to

require its service providers by contract to implement appropriate

measures designed to protect against unauthorized access to or use

of customer information that could result in substantial harm or

inconvenience to any customer.\7\ Consistent with existing guidance

issued by the Agencies, an institution's contract with its service

provider should require the service provider to fully disclose to

the institution information relating to any breach in security

resulting in an unauthorized intrusion into the institution's

customer information systems maintained by the service provider.\8\

In view of these contractual obligations, the service provider would

be required to take appropriate actions to address incidents of

unauthorized access to or use of the financial institution's

customer information to enable the institution to expeditiously

implement its response program.\9\

---------------------------------------------------------------------------

\7\ See Security Guidelines Paragraphs II.B. and III.D.

\8\ See Federal Reserve SR Ltr. 00-04, Outsourcing of

Information and Transaction Processing, Feb. 9, 2000; SR Ltr. 00-17,

Guidance on Risk Management of Outsourced Technology Services, Nov.

30, 2000; OCC Bulletin 2001-47, ``Third-party Relationships Risk

Management Principles,'' Nov. 1, 2001; AL 2000-12, ``FFIEC Guidance

on Risk Management of Outsourced Technology Services,'' Nov. 28,

2000; FDIC FIL 81-2000, Risk Management of Technology Outsourcing,

Nov. 29, 2000; FIL 68-99, Risk Assessment Tools and Practices for

Information System Security, July 7, 1999; OTS Thrift Bulletin 82,

Third Party Arrangements, Mar. 4, 2003; OTS CEO Memorandum 133, Risk

Management of Technology Outsourcing, Dec. 13, 2000; CEO Memorandum

109, Transactional Web Sites, June 10, 1999; CEO Memorandum 70,

Statement on On-Line Personal Computer Banking, June 23, 1997.

\9\ The Agencies note that, in addition to contractual

obligations to a financial institution, a service provider may be

required to implement its own comprehensive information security

program in accordance with the Safeguards Rule promulgated by the

FTC. 12 CFR part 314 applies to the handling of all customer

information possessed by any financial institution subject to the

jurisdiction of the FTC, regardless of whether such information

pertains to individuals with whom the institution has a customer

relationship or pertains to the customers of other financial

institutions that have provided such information to that

institution.

---------------------------------------------------------------------------

Response Program

As internal and external threats to the security of customer

information are reasonably foreseeable and may lead to the misuse of

customer information, the Agencies expect every financial

institution to develop a response program to protect against the

risks associated with these threats. The response program should

include measures to protect customer information in customer

information systems maintained by the institution or its service

providers. The Agencies expect that customer notification will be a

component of an institution's response program, as described below.

II. Components of a Response Program

A response program should be a key part of an institution's

information security

[[Page 47959]]

program.\10\ Having such a program in place will allow the

institution to quickly respond \11\ to incidents involving the

unauthorized access to or use of customer information in its own

customer information systems that could result in substantial harm

or inconvenience to a customer. Under the Guidelines, an

institution's customer information systems consist of all of the

methods used to access, collect, store, use, transmit, protect, or

dispose of customer information, including the systems maintained by

its service providers.\12\

---------------------------------------------------------------------------

\10\ See FFIEC Information Security Booklet, Dec. 2002; Federal

Reserve SR 97-32, Sound Practice Guidance for Information Security

for Networks, Dec. 4, 1997; OCC Bulletin 2000-14, ``Infrastructure

Threats `` Intrusion Risks'' (May 15, 2000); OTS CEO Memorandum 109,

Transactional Web Sites, June 10, 1999; CEO Memorandum 70, Statement

on On-Line Personal Computer Banking, June 23, 1997; CEO Memorandum

59, Risk Management of Client/Server Systems, Oct. 24, 1996, for

additional guidance on preventing, detecting, and responding to

intrusions into financial institution computer systems.

\11\ Financial institutions are expected to provide employees

with the training necessary to understand their roles and

responsibilities in order to expeditiously implement the

institution's response program to address incidents of unauthorized

access to and use of customer information.

\12\ See Security Guidelines Paragraph I.C.f.

---------------------------------------------------------------------------

Timely notification of customers, under the circumstances

described below, is important to manage an institution's reputation

risk. Effective notice may reduce legal risk, assist in maintaining

good customer relations, and enable the institution's customers to

take steps to protect themselves against the consequences of

identity theft.

A response program should contain the following components:

A. Assess the Situation.

The institution should assess the nature and scope of the

incident, and identify what customer information systems and types

of customer information have been accessed or misused.

B. Notify Regulatory and Law Enforcement Agencies

The institution should promptly notify its primary Federal

regulator when it becomes aware of an incident involving

unauthorized access to or use of customer information that could

result in substantial harm or inconvenience to its customers.

An institution also should file a Suspicious Activity Report

(``SAR''), if required, in accordance with the applicable SAR

regulations \13\ and Agency guidance.\14\ Consistent with the

Agencies' SAR regulations, in situations involving Federal criminal

violations requiring immediate attention, such as when a reportable

violation is ongoing, the institution should immediately notify, by

telephone, appropriate law enforcement authorities and its primary

regulator, in addition to filing a timely SAR.

---------------------------------------------------------------------------

\13\ 12 CFR 21.11 (national banks, federal branches and

agencies); 12 CFR 208.62 (state member banks); 12 CFR 211.5(k) (Edge

and agreement corporations); 12 CFR 211.24(f) (uninsured state

branches and agencies of foreign banks); 12 CFR 225.4(f) (bank

holding companies and their nonbank subsidiaries); 12 CFR part 353

(state non-member banks); and 12 CFR part 563 (savings

associations).

\14\ National banks must file SARs in connection with computer

intrusions and other computer crimes. See OCC Bulletin 2000-14,

``Infrastructure Threats--Intrusion Risks'' (May 15, 2000); Advisory

Letter 97-9, ``Reporting Computer Related Crimes'' (November 19,

1997) (general guidance still applicable though instructions for new

SAR form published in 65 FR 1229, 1230 (January 7, 2000)). See also

Federal Reserve SR 01-11, Identity Theft and Pretext Calling, Apr.

26, 2001; SR 97-28, Guidance Concerning Reporting of Computer

Related Crimes by Financial Institutions, Nov. 6, 1997; FDIC FIL 48-

2000, Suspicious Activity Reports, July 14, 2000; FIL 47-97,

Preparation of Suspicious Activity Reports, May 6, 1997; OTS CEO

Memorandum 139, Identity Theft and Pretext Calling, May 4, 2001; CEO

Memorandum 126, New Suspicious Activity Report Form, July 5, 2000.

---------------------------------------------------------------------------

C. Contain and Control the Situation

The financial institution should take measures to contain and

control the incident to prevent further unauthorized access to or

use of customer information, while preserving records and other

evidence.\15\ Depending upon the particular facts and circumstances

of the incident, these measures could include, in connection with

computer intrusions: (i) Shutting down applications or third party

connections; (ii) reconfiguring firewalls in cases of unauthorized

electronic intrusion; (iii) ensuring that all known vulnerabilities

in the financial institution's computer systems have been addressed;

(iv) changing computer access codes; (v) modifying physical access

controls; and (vi) placing additional controls on service provider

arrangements.

---------------------------------------------------------------------------

\15\ See FFIEC Information Security Booklet, Dec. 2002, pp. 68-

74.

---------------------------------------------------------------------------

D. Corrective Measures

Once an institution understands the scope of the incident and

has taken steps to contain and control the situation, it should take

measures to address and mitigate the harm to individual customers.

For example, the institution should take the following measures:

1. Flag Accounts

The institution should immediately begin identifying and

monitoring the accounts of those customers whose information may

have been accessed or misused. In particular, the institution should

provide staff with instructions regarding the recording and

reporting of any unusual activity, and if indicated given the facts

of a particular incident, implement controls to prevent the

unauthorized withdrawal or transfer of funds from customer accounts.

2. Secure Accounts

When a checking, savings, or other deposit account number, debit

or credit card account number, personal identification number (PIN),

password, or other unique identifier has been accessed or misused,

the financial institution should secure the account, and all other

accounts and bank services that can be accessed using the same

account number or name and password combination until such time as

the financial institution and the customer agree on a course of

action.\16\

---------------------------------------------------------------------------

\16\ The institution should also consider the use of new account

numbers and steps to ensure that customers do not reuse the same or

a similar personal identification number.

---------------------------------------------------------------------------

3. Customer Notice and Assistance

Under the Security Guidelines, financial institutions have an

affirmative duty to protect their customers' information against

unauthorized access or use. An institution may not forgo notifying

its customers of an incident because the institution believes that

it may be potentially embarrassed or inconvenienced by doing so.

Under the circumstances described in Paragraph III., the institution

should notify and offer assistance to customers whose information

was the subject of the incident.\17\ If the institution is able to

determine from its logs or other data precisely which customers'

information was accessed or misused, it may restrict its

notification to those individuals. However, if the institution

cannot identify precisely which customers are affected, it should

notify each customer in groups likely to have been affected, such as

each customer whose information is stored in the group of files in

question.

---------------------------------------------------------------------------

\17\ The institution should, therefore, ensure that a sufficient

number of appropriately trained employees are available to answer

customer inquiries and provide assistance.

---------------------------------------------------------------------------

a. Delivery of Customer Notice--Customer notice should be

timely, clear, and conspicuous, and delivered in any manner that

will ensure that the customer is likely to receive it. For example,

the institution may choose to contact all customers affected by

telephone or by mail, or for those customers who conduct

transactions electronically, using electronic notice.

b. Content of Customer Notice--The notice should describe the

incident in general terms and the customer's information that was

the subject of unauthorized access or use. It should also include a

number that customers can call for further information and

assistance. The notice also should remind customers of the need to

remain vigilant, over the next twelve to twenty-four months, and to

promptly report incidents of suspected identity theft.

Key Elements: In addition, the notice should:

[sbull] Inform affected customers that the institution will

assist the customer to correct and update information in any

consumer report relating to the customer, as required by the Fair

Credit Reporting Act;

[sbull] Recommend that the customer notify each nationwide

credit reporting agency to place a fraud alert \18\ in the

customer's consumer reports;

---------------------------------------------------------------------------

\18\ A fraud alert will put the customer's creditors on notice

that the customer may be a victim of fraud.

---------------------------------------------------------------------------

[sbull] Recommend that the customer periodically obtain credit

reports from each nationwide credit reporting agency and have

information relating to fraudulent transactions deleted;

[sbull] Inform the customer of the right to obtain a credit

report free of charge, if the customer has reason to believe that

the file at the consumer reporting agency contains inaccurate

information due to fraud, together with contact information

regarding the nationwide credit reporting agencies; and

[[Page 47960]]

[sbull] Inform the customer about the availability of the FTC's

online guidance regarding steps a consumer can take to protect

against identity theft, and encourage the customer to report any

incidents of identity theft to the FTC. The notice should provide

the FTC's Web site address and toll-free telephone number that

customers may use to obtain the identity theft guidance and report

suspected incidents of identity theft.\19\

---------------------------------------------------------------------------

\19\ Currently, the FTC Web site for the ID Theft brochure and

the FTC Hotline phone number are http://www.ftc.gov/idtheft and 1-

877-IDTHEFT.

---------------------------------------------------------------------------

Optional Element: Institutions also may wish to provide

customers with the following additional assistance that other

institutions have offered under these circumstances:

[sbull] Provide a toll-free telephone number that customers can

call for assistance;

[sbull] Offer to assist the customer in notifying the nationwide

credit reporting agencies of the incident and in placing a fraud

alert in the customer's consumer reports; and

[sbull] Inform the customer about subscription services that

provide notification anytime there is a request for the customer's

credit report or offer to subscribe the customer to this service,

free of charge, for a period of time.

The institution may also wish to include with the notice a

brochure regarding steps a consumer can take to protect against

identity theft, prepared by the Agencies that can be downloaded from

the Internet.\20\

---------------------------------------------------------------------------

\20\ http://www.occ.treas.gov/idtheft.pdf; http://www.federalreserve.gov/consumers.htm

http://www.fdic.gov/consumers/consumer/news/cnsum00/idthft.html; http://www.ots.treas.gov/docs/

---------------------------------------------------------------------------

III. Circumstances for Customer Notice

Standard for Providing Notice

An institution should notify affected customers whenever it

becomes aware of unauthorized access to sensitive customer

information unless the institution, after an appropriate

investigation, reasonably concludes that misuse of the information

is unlikely to occur and takes appropriate steps to safeguard the

interests of affected customers, including by monitoring affected

customers' accounts for unusual or suspicious activity.

Sensitive Customer Information

Under the Guidelines, an institution must protect against

unauthorized access to or use of customer information that could

result in substantial harm or inconvenience to any customer.

Substantial harm or inconvenience is most likely to result from

improper access to sensitive customer information because this type

of information is easily misused, as in the commission of identity

theft. For purposes of this Guidance, sensitive customer information

means a customer's social security number, personal identification

number, password or account number, in conjunction with a personal

identifier such as the customer's name, address, or telephone

number. Sensitive customer information would also include any

combination of components of customer information that would allow

someone to log onto or access another person's account, such as user

name and password. Therefore, institutions are expected to notify

affected customers when sensitive customer information has been

improperly accessed, unless the institution, after an appropriate

investigation, reasonably concludes that misuse of the information

is unlikely to occur and takes appropriate steps to safeguard the

interests of affected customers.

Examples of When Notice Should Be Given

An institution should notify affected customers when it is aware

of the following incidents unless the institution, after an

appropriate investigation, can reasonably conclude that misuse of

the information is unlikely to occur and takes appropriate steps to

safeguard the interests of affected customers:

[sbull] An employee of the institution has obtained unauthorized

access to sensitive customer information maintained in either paper

or electronic form;

[sbull] A cyber intruder has broken into an institution's

unencrypted database that contains sensitive customer information;

[sbull] Computer equipment such as a laptop computer, floppy

disk, CD-ROM, or other electronic media containing sensitive

customer information has been lost or stolen;

[sbull] An institution has not properly disposed of customer

records containing sensitive customer information; or

[sbull] The institution's third party service provider has

experienced any of the incidents described above, in connection with

the institution's sensitive customer information.

Examples of When Notice Is Not Expected

An institution is not expected to give notice when it becomes

aware of an incident of unauthorized access to customer information,

and the institution, after an appropriate investigation, can

reasonably conclude that misuse of the information is unlikely to

occur and takes appropriate steps to safeguard the interests of

affected customers. For example, an institution would not need to

notify affected customers in connection with the following

incidents:

[sbull] The institution is able to retrieve sensitive customer

information that has been stolen, and reasonably concludes, based

upon its investigation of the incident, that it has done so before

the information has been copied, misused or transferred to another

person who could misuse it;

[sbull] The institution determines that sensitive customer

information was improperly disposed of, but can establish that the

information was not retrieved or used before it was destroyed;

[sbull] A hacker accessed files that contain only customer names

and addresses; or

[sbull] A laptop computer containing sensitive customer

information is lost, but the data is encrypted and may only be

accessed with a secure token or similarly secure access device.

Dated: July 31, 2003.

Mark J. Tenhundfeld.

Assistant Director, Office of the Comptroller of the Currency.

By the Board of Governors of the Federal Reserve System on

August 5, 2003.

Jennifer J. Johnson,

Secretary of the Board.

Dated: August 6, 2003.

Michael J. Zamorski,

Director, Division of Supervision and Consumer Protection, Federal

Deposit Insurance Corporation.

Dated: July 30, 2003.

James E. Gilleran,

Director.

[FR Doc. 03-20440 Filed 8-11-03; 8:45 am]

BILLING CODE 6720-01-P

Last Updated 08/12/2003 regs@fdic.gov

Last Updated: August 4, 2024