Skip to main content
U.S. flag
An official website of the United States government
Dot gov
The .gov means it’s official. 
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.
Https
The site is secure. 
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.
Federal Register Publications

FDIC Federal Register Citations



Home > Regulation & Examinations > Laws & Regulations > FDIC Federal Register Citations




FDIC Federal Register Citations


October 14, 2003
 

Ms. Jennifer Johnson, Secretary
Board of Governors of the Federal Reserve
System 20th Street and Constitution Ave, NW
Washington, D.C. 20551

Office of the Comptroller of the Currency
250 E Street, SW
Mailstop 1-5
Washington, D.C. 20219
Robert E. Feldman
Executive Secretary
Attention: Comments/OES
Federal Deposit Insurance Corporation
550 17th Street, N.W.
Washington, D.C. 20429
Chief Counsel's Office
Office of Thrift Supervision
1700 G. Street, N.W.
Washington, DC 20522

 

Re: Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and Customer Notice

Dear Madame and Messrs:

The American Bankers Association appreciates this opportunity to comment on the proposed Interagency Guidance on Response Programs to Protect against Identity Theft. The proposed guidance is designed to interpret the February 2001 customer information security guidelines issued in conjunction with section 501(b) of the Gramm-Leach-Bliley Act ("existing security guidelines"). According to the notice, the proposed guidelines describe the "Agencies' expectations that every financial institution develop a response program to protect against and address reasonably foreseeable risks associated with internal and external threats to the security of customer information maintained by the financial institution or its service provider.

The ABA brings together all categories of banking institutions to best represent the interests of this rapidly changing industry. Its membership - which includes community, regional and money center banks and holding companies, as well as savings associations, trust companies and savings banks - makes ABA the largest banking trade association in the country.

Review of the Guidance

The American Bankers Association has been working with our members to assist them with the crafting of information security policies and procedures since the passage of section 501(b) of the Gramm-Leach-Bliley Act. In fact, ABA produced an on-line "member toolbox" on "Safeguarding Customer Information" in 2002 that, among other things, makes it clear that:

A bank's information security program must be designed to ensure the security and confidentiality of customer information, protect against any anticipated threats or hazards to the security or integrity of such information, and protect against unauthorized access to or use of such information that would result in substantial harm or inconvenience to any customer.

The banking industry is thus well aware of the need for strong information security programs and has put in place such programs. It is important that the proposed guidance take this into consideration as it finalizes this document.

The industry also takes its responsibilities to deter identity theft extremely seriously, and has worked with the Federal Trade Commission, the federal bank regulatory agencies, and others to ensure that financial institutions and their customers have the tools available to prevent such thefts and resolve them when they occur. For instance, the ABA has produced an "Identity Theft" communications kit, as well as a "Financial Privacy" toolbox, both of which provide a variety of identity theft prevention and resolution resources.

Overall, while we believe that the agencies have striven to achieve a balance between monitoring accounts and notifying customers, there must be flexibility and discretion afforded financial institutions in determining how to implement this proposed guidance in accordance with individual facts and circumstances. Our comments are directed at areas where clarification is necessary to ensure that flexibility. It should also be noted that implementation of this guidance, in its current form, could result in substantial costs for smaller financial institutions that lack sophisticated monitoring systems.

ABA offers the following specific comments:

• Requirement for Information Security Program
• Risk Assessments and Controls
• Program Requirements
• Service Providers
• Response Program Issues, and
• Customer Notice Issues

Requirement for Information Security Program

In order to remain consistent with the existing security guidelines, we urge the agencies to clarify that the final rules apply only to consumer accounts as is stated in footnote three of the Appendix (Vol. 68 Fed. Reg. at 47958). This becomes important as institutions grapple with the customer notice requirements discussed below.

The proposed guidance tracks the existing security guidelines that, among other things, require every institution to have a security program that protects "against unauthorized access to or use of such information that could result in substantial harm or inconvenience to any customer [emphasis added]." Since the proposed guidelines contain more specific obligations, ABA urges the agencies to clarify the term "inconvenience" to the customer so that requirements such as "notice" are not unnecessarily triggered.

Risk Assessments and Controls

We commend the agencies for reiterating that the security measures an institution should adopt will depend upon the risks presented by the complexity and scope of its business. There is an aspect to the existing security guidelines, however, that ABA recommends be revisited, in that it deviates from a standard of assessing "reasonably foreseeable" internal and external threats.

Under existing security guidelines, financial institutions must adopt specific procedures such as "access controls on customer information systems" and requires that such controls "prevent" an employee from providing customer informauon to unauthorized individuals who may seek to obtain this information through fraudulent means. The use of the single term "prevent" is simply too broad and fails to take into consideration that no company or government agency for that matter can monitor every employee's conduct. While banks have long employed various procedures to permit only authorized employees to access customer information, such procedures have technological as well as policy limits. No system is failsafe. ABA urges the agencies to modify the language in existing security guidelines to require controls "aimed at preventing" employees from gaining unauthorized access as opposed to "preventing" such access.

Existing security guidelines also direct that the institution, if appropriate, utilize background checks for certain employees. It should be noted that institutions already fingerprint employees in order to determine whether there has been a previous arrest or conviction but more resources could be made available. Security officers are clamoring for access to data concerning new hires and Congress has even responded with a section in the USA PATRIOT Act on this subject. Section 355 of the Act grants a "safe harbor" to financial institutions that provides written information to another institution concerning a former employee's employment record. To date, we are not hearing that many institutions have taken advantage of this important provision. It would be helpful if the agencies would remind the industry of this background-screening tool.

Service Providers

Third party service providers have a current obligation to protect financial institution customer information against unauthorized access. That obligation exists by contract, based upon the requirement in the existing security guidelines that financial institutions amend their contracts,
by July 1, 2003, to require its service providers to implement appropriate security measures. We would recommend that the Agencies specify that financial institutions may place any requirements for reporting security breaches in the contractor service level agreement with service providers. Service level agreements are contractually binding. If they are not specified, financial institutions may be under the impression that they must place such language in the overall contract.

Response Program

The Agencies begin this section by stating, in the context of developing a response program, that "internal and external threats to the security of customer information are reasonably foreseeable."
ABA believes that not all threats are reasonably foreseeable. Such a statement places an unrealistic expectation on financial institutions and their security programs. We recommend the language be amended as follows:

The Agencies expect every financial institution to develop a response program to protect against reasonably foreseeable internal and external threats to the security of customer information.

Such language will make it clear that there are instances where a threat is not foreseeable and is consistent with the Administration's overall cyber protection strategy. Many of the threats to the security of customer information are cyber-related. The volume and diversity of these potential threats make it unlikely that any customer information security program will be failsafe. The Administration makes this point in its recently released "National Strategy to Secure Cyberspace," stressing the need for all levels of computer users to "reduce vulnerabilities in the absence of known threats," and further stating that we as a nation "cannot eliminate all vulnerabilities or deter all threats."1

The Agencies indicate that every financial institution should develop a response [emphasis added] program to protect against the risks associated with these threats, when it is in fact the institution's overall security program that is designed to accomplish this goal. Such language may lead institutions to believe that they must reiterate, in their written response program, much of what is already contained in their existing security program. Language such as "the Agencies expect every financial institution to develop a response program as a part of its overall program to safeguard customer information" would clarify this point.

As threats and vulnerabilities to customer information are not always readily foreseeable, change over time, and vary depending on the characteristics of the financial institution, ABA recommends that the Agencies expressly state that institutions should develop their response programs to be flexible, appropriate for the size of the institution, the risk the institution has based on its technological sophistication, and the products it offers.

For the specifics of the response program, ABA offers the following comments:

• Regulatory Notification

The proposed guidelines suggest that there will be instances when institutions must promptly notify its primary federal regulator when it "becomes aware of an incident involving unauthorized access to or use of customer information that could result in substantial harm or inconvenience to its customers." The guidelines also note the requirements under the "Suspicious Activity Reporting" (SAR) regulations on so called "computer intrusions."2 There will be much confusion as to what the Agencies are to receive from institutions without clarification. ABA urges that there be no additional notice requirements to the Agencies or customers until there is a detailed analysis as to how an institution must treat the various disclosures. Until these issues are resolved, the final guidelines should make clear that complying with SAR requirements is sufficient and that notification of other regulatory and law enforcement agencies is solely at the discretion of the institution. ABA would be happy to assist in this important effort.

• Corrective measures

Under the proposed guidelines, institutions must take certain measures to "flag accounts." Specifically, the proposal suggests that the institution should "immediately begin identifying and monitoring the accounts of customers whose information may have been accessed or misused."

The ABA recommends that the Agencies clarify that there may be instances where it is advisable for institutions to consider closing the affected accounts. In some cases, after consultation with the customer, it may be better protection for the customer as well as the financial institution to simply close the account, relieving both of the need to monitor the accounts or to respond to endless inquiries. This is especially true for smaller community-based institutions for which it may be more cost effective to close the account for the customer's benefit, rather than monitor it.

The proposal also does not indicate when an institution can cease monitoring accounts. Such monitoring is expensive, particularly for community-based and midsized institutions that typically lack the sophisticated automated monitoring tools used by the largest institutions. ABA recommends that the Agencies specify that institutions may cease monitoring accounts when the institution, after appropriate investigation, can reasonably conclude that misuse of information is unlikely to occur and notice is not expected. Doing so would more effectively link the monitoring with the notification process and provide greater clarity to financial institutions as to how the two processes fit together.

Banks are also directed to "implement controls to prevent [emphasis added] the unauthorized withdrawal or transfer of funds from customer accounts." As noted earlier, we recommend all references to the charge of "prevention" be modified to reflect the goal of prevention through the use of phrases such as "aimed at preventing." It is impossible to prevent unauthorized transactions in all cases. Transactions may appear to be authorized, but in fact are not. The system simply is not failsafe. Moreover, consumers are protected by various federal laws (Electronic Fund Transfer Act for electronic fund transfers and Truth in Lending Act for credit card transactions) and state laws (Uniform Commercial Code for deposit accounts) for unauthorized transactions.

In addition to identifying and monitoring accounts, the proposal advises institutions to "secure" the account. The meaning of "secure" is not clear. If it means that institutions should stop all transactions, customers could be greatly inconvenienced or harmed. For example, stopping a mortgage payment or payroll payment (if guidelines are applicable to commercial accounts) would harm the customer. Moreover, it would be impractical to obtain the customer's authorization for every transaction. Given that federal and state laws protect consumers against unauthorized transactions, institutions should have discretion on how to manage transactions on the compromised account so as to accommodate customers.

If, on the other hand, "secure" means to close or monitor for unusual activity, it is redundant with the requirement to flag accounts and will cause confusion. For these reasons, we recommend that the final guidelines omit this advice to "secure" the account.

Customer Notice

The ABA recommends that the preamble to the "Examples of When Notice is Not Expected" be amended to specify that financial institutions have the flexibility, after an appropriate investigation and monitoring of the account, to conclude that misuse of information is unlikely to occur.

It is also important to note that, in certain cases, the customer may actually be a suspect of the underlying action. Accordingly, the final guidelines should include an exception to the notice requirement if the institution has "reasonable cause to believe that the customer is involved in fraud." This exception, for example, is presently included in the funds availability schedules under the Expedited Funds Availability Act, which requires that banks make deposits available according to a federal schedule.

In addition, the requirement to notify customers should include an exception if law enforcement notifies the institution that notice to the customer will impede an investigation or enforcement. The guidelines should allow institutions to require that such requests from law enforcement be clear and in writing, to avoid confusion and unfair charges of failure to provide notification.

Conclusion

ABA believes that the development of a customer response program is a valuable component of every institution's customer information security program. We appreciate the opportunity to comment on the proposed guidelines. Such an initiative has sufficient import, in our opinion, that it warrants significant additional discussion and review within the regulatory and financial services community. Many issues have been raised, and we would welcome the opportunity, in whatever forum, to work with the Agencies to further refine the proposed guidelines before they become final. If you have any questions or comments on these matters, please contact Doug Johnson, Senior Policy Analyst at (202) 663-5059.

Sincerely,

James D. McLaughlin
Director, Regulatory and Trust Affairs
American Bankers Association
Washington, DC

_______________________

1 The White House, The National Strategy to Secure Cyberspace, 2003, pp.7, 27-28.
2 Computer intrusion (18 USC 1030)>
To gain access to a computer system of a financial institution to:
*Remove, steal, procure, or otherwise affect funds of the institution or the institution's customers;
*Remove, steal, procure or otherwise affect critical information of the institution including customer account information; or
*Damage, disable or otherwise affect critical systems of the institution.

Last Updated 10/15/2003 regs@fdic.gov

Last Updated: August 4, 2024