October 14, 2003
Ms. Jennifer Johnson, Secretary
Board of Governors of the Federal Reserve
System
20th Street and Constitution Ave, NW
Washington, D.C. 20551 |
Office of
the Comptroller of the Currency
250 E Street, SW
Mailstop 1-5
Washington, D.C. 20219 |
Robert E. Feldman
Executive Secretary
Attention: Comments/OES
Federal Deposit Insurance Corporation
550 17th Street, N.W.
Washington, D.C. 20429 |
Chief Counsel's Office
Office of Thrift Supervision
1700 G. Street, N.W.
Washington, DC 20522 |
Re: Interagency Guidance on Response
Programs for Unauthorized Access to Customer Information and Customer
Notice
Dear Madame and Messrs:
The American Bankers Association
appreciates this opportunity to comment on the proposed Interagency
Guidance on Response Programs to Protect against Identity Theft. The
proposed guidance is designed to interpret the February 2001 customer
information security guidelines issued in conjunction with section
501(b) of the Gramm-Leach-Bliley Act ("existing security guidelines").
According to the notice, the proposed guidelines describe the "Agencies'
expectations that every financial institution develop a response program
to protect against and address reasonably foreseeable risks associated
with internal and external threats to the security of customer
information maintained by the financial institution or its service
provider.
The ABA brings together all categories of
banking institutions to best represent the interests of this rapidly
changing industry. Its membership - which includes community, regional
and money center banks and holding companies, as well as savings
associations, trust companies and savings banks - makes ABA the largest
banking trade association in the country.
Review of the Guidance
The American Bankers Association has been
working with our members to assist them with the crafting of information
security policies and procedures since the passage of section 501(b) of
the Gramm-Leach-Bliley Act. In fact, ABA produced an on-line "member
toolbox" on "Safeguarding Customer Information" in 2002 that, among
other things, makes it clear that:
A bank's information security program
must be designed to ensure the security and confidentiality of
customer information, protect against any anticipated threats or
hazards to the security or integrity of such information, and protect
against unauthorized access to or use of such information that would
result in substantial harm or inconvenience to any customer.
The banking industry is thus well aware
of the need for strong information security programs and has put in
place such programs. It is important that the proposed guidance take
this into consideration as it finalizes this document.
The industry also takes its
responsibilities to deter identity theft extremely seriously, and has
worked with the Federal Trade Commission, the federal bank regulatory
agencies, and others to ensure that financial institutions and their
customers have the tools available to prevent such thefts and resolve
them when they occur. For instance, the ABA has produced an "Identity
Theft" communications kit, as well as a "Financial Privacy" toolbox,
both of which provide a variety of identity theft prevention and
resolution resources.
Overall, while we believe that the
agencies have striven to achieve a balance between monitoring accounts
and notifying customers, there must be flexibility and discretion
afforded financial institutions in determining how to implement this
proposed guidance in accordance with individual facts and circumstances.
Our comments are directed at areas where clarification is necessary to
ensure that flexibility. It should also be noted that implementation of
this guidance, in its current form, could result in substantial costs
for smaller financial institutions that lack sophisticated monitoring
systems.
ABA offers the following specific
comments:
• Requirement for Information Security
Program
• Risk Assessments and Controls
• Program Requirements
• Service Providers
• Response Program Issues, and
• Customer Notice Issues
Requirement for
Information Security Program
In order to remain consistent with the
existing security guidelines, we urge the agencies to clarify that the
final rules apply only to consumer accounts as is stated in footnote
three of the Appendix (Vol. 68 Fed. Reg. at 47958). This becomes
important as institutions grapple with the customer notice requirements
discussed below.
The proposed guidance tracks the existing
security guidelines that, among other things, require every institution
to have a security program that protects "against unauthorized access to
or use of such information that could result in substantial harm or
inconvenience to any customer [emphasis added]." Since the proposed
guidelines contain more specific obligations, ABA urges the agencies to
clarify the term "inconvenience" to the customer so that requirements
such as "notice" are not unnecessarily triggered.
Risk Assessments and
Controls
We commend the agencies for reiterating
that the security measures an institution should adopt will depend upon
the risks presented by the complexity and scope of its business. There
is an aspect to the existing security guidelines, however, that ABA
recommends be revisited, in that it deviates from a standard of
assessing "reasonably foreseeable" internal and external threats.
Under existing security guidelines,
financial institutions must adopt specific procedures such as "access
controls on customer information systems" and requires that such
controls "prevent" an employee from providing customer informauon to
unauthorized individuals who may seek to obtain this information through
fraudulent means. The use of the single term "prevent" is simply too
broad and fails to take into consideration that no company or government
agency for that matter can monitor every employee's conduct. While banks
have long employed various procedures to permit only authorized
employees to access customer information, such procedures have
technological as well as policy limits. No system is failsafe. ABA urges
the agencies to modify the language in existing security guidelines to
require controls "aimed at preventing" employees from gaining
unauthorized access as opposed to "preventing" such access.
Existing security guidelines also direct
that the institution, if appropriate, utilize background checks for
certain employees. It should be noted that institutions already
fingerprint employees in order to determine whether there has been a
previous arrest or conviction but more resources could be made
available. Security officers are clamoring for access to data concerning
new hires and Congress has even responded with a section in the USA
PATRIOT Act on this subject. Section 355 of the Act grants a "safe
harbor" to financial institutions that provides written information to
another institution concerning a former employee's employment record. To
date, we are not hearing that many institutions have taken advantage of
this important provision. It would be helpful if the agencies would
remind the industry of this background-screening tool.
Service Providers
Third party service providers have a
current obligation to protect financial institution customer information
against unauthorized access. That obligation exists by contract, based
upon the requirement in the existing security guidelines that financial
institutions amend their contracts,
by July 1, 2003, to require its
service providers to implement appropriate security measures. We would
recommend that the Agencies specify that financial institutions may
place any requirements for reporting security breaches in the contractor
service level agreement with service providers. Service level agreements
are contractually binding. If they are not specified, financial
institutions may be under the impression that they must place such
language in the overall contract.
Response Program
The Agencies begin this section by
stating, in the context of developing a response program, that "internal
and external threats to the security of customer information are
reasonably foreseeable."
ABA believes that not all threats are
reasonably foreseeable. Such a statement places an unrealistic
expectation on financial institutions and their security programs. We
recommend the language be amended as follows:
The Agencies expect every financial
institution to develop a response program to protect against
reasonably foreseeable internal and external threats to the security
of customer information.
Such language will make it clear that
there are instances where a threat is not foreseeable and is consistent
with the Administration's overall cyber protection strategy. Many of the
threats to the security of customer information are cyber-related. The
volume and diversity of these potential threats make it unlikely that
any customer information security program will be failsafe. The
Administration makes this point in its recently released "National
Strategy to Secure Cyberspace," stressing the need for all levels of
computer users to "reduce vulnerabilities in the absence of known
threats," and further stating that we as a nation "cannot eliminate all
vulnerabilities or deter all threats."1
The Agencies indicate that every
financial institution should develop a response [emphasis added]
program to protect against the risks associated with these threats, when
it is in fact the institution's overall security program that is
designed to accomplish this goal. Such language may lead institutions to
believe that they must reiterate, in their written response program,
much of what is already contained in their existing security program.
Language such as "the Agencies expect every financial institution to
develop a response program as a part of its overall program to safeguard
customer information" would clarify this point.
As threats and vulnerabilities to
customer information are not always readily foreseeable, change over
time, and vary depending on the characteristics of the financial
institution, ABA recommends that the Agencies expressly state that
institutions should develop their response programs to be flexible,
appropriate for the size of the institution, the risk the institution
has based on its technological sophistication, and the products it
offers.
For the specifics of the response
program, ABA offers the following comments:
• Regulatory Notification
The proposed guidelines suggest that
there will be instances when institutions must promptly notify its
primary federal regulator when it "becomes aware of an incident
involving unauthorized access to or use of customer information that
could result in substantial harm or inconvenience to its customers." The
guidelines also note the requirements under the "Suspicious Activity
Reporting" (SAR) regulations on so called "computer intrusions."2
There will be much confusion as to what the Agencies are to receive from
institutions without clarification. ABA urges that there be no
additional notice requirements to the Agencies or customers until there
is a detailed analysis as to how an institution must treat the various
disclosures. Until these issues are resolved, the final guidelines
should make clear that complying with SAR requirements is sufficient and
that notification of other regulatory and law enforcement agencies is
solely at the discretion of the institution. ABA would be happy to
assist in this important effort.
• Corrective measures
Under the proposed guidelines,
institutions must take certain measures to "flag accounts."
Specifically, the proposal suggests that the institution should
"immediately begin identifying and monitoring the accounts of customers
whose information may have been accessed or misused."
The ABA recommends that the Agencies
clarify that there may be instances where it is advisable for
institutions to consider closing the affected accounts. In some cases,
after consultation with the customer, it may be better protection for
the customer as well as the financial institution to simply close the
account, relieving both of the need to monitor the accounts or to
respond to endless inquiries. This is especially true for smaller
community-based institutions for which it may be more cost effective to
close the account for the customer's benefit, rather than monitor it.
The proposal also does not indicate when
an institution can cease monitoring accounts. Such monitoring is
expensive, particularly for community-based and midsized institutions
that typically lack the sophisticated automated monitoring tools used by
the largest institutions. ABA recommends that the Agencies specify that
institutions may cease monitoring accounts when the institution, after
appropriate investigation, can reasonably conclude that misuse of
information is unlikely to occur and notice is not expected. Doing so
would more effectively link the monitoring with the notification process
and provide greater clarity to financial institutions as to how the two
processes fit together.
Banks are also directed to "implement
controls to prevent [emphasis added] the unauthorized withdrawal or
transfer of funds from customer accounts." As noted earlier, we
recommend all references to the charge of "prevention" be modified to
reflect the goal of prevention through the use of phrases such as "aimed
at preventing." It is impossible to prevent unauthorized transactions in
all cases. Transactions may appear to be authorized, but in fact are
not. The system simply is not failsafe. Moreover, consumers are
protected by various federal laws (Electronic Fund Transfer Act for
electronic fund transfers and Truth in Lending Act for credit card
transactions) and state laws (Uniform Commercial Code for deposit
accounts) for unauthorized transactions.
In addition to identifying and monitoring
accounts, the proposal advises institutions to "secure" the account. The
meaning of "secure" is not clear. If it means that institutions should
stop all transactions, customers could be greatly inconvenienced or
harmed. For example, stopping a mortgage payment or payroll payment (if
guidelines are applicable to commercial accounts) would harm the
customer. Moreover, it would be impractical to obtain the customer's
authorization for every transaction. Given that federal and state laws
protect consumers against unauthorized transactions, institutions should
have discretion on how to manage transactions on the compromised account
so as to accommodate customers.
If, on the other hand, "secure" means to
close or monitor for unusual activity, it is redundant with the
requirement to flag accounts and will cause confusion. For these
reasons, we recommend that the final guidelines omit this advice to
"secure" the account.
Customer Notice
The ABA recommends that the preamble to
the "Examples of When Notice is Not Expected" be amended to specify that
financial institutions have the flexibility, after an appropriate
investigation and monitoring of the account, to conclude that
misuse of information is unlikely to occur.
It is also important to note that, in
certain cases, the customer may actually be a suspect of the underlying
action. Accordingly, the final guidelines should include an exception to
the notice requirement if the institution has "reasonable cause to
believe that the customer is involved in fraud." This exception, for
example, is presently included in the funds availability schedules under
the Expedited Funds Availability Act, which requires that banks make
deposits available according to a federal schedule.
In addition, the requirement to notify
customers should include an exception if law enforcement notifies the
institution that notice to the customer will impede an investigation or
enforcement. The guidelines should allow institutions to require that
such requests from law enforcement be clear and in writing, to avoid
confusion and unfair charges of failure to provide notification.
Conclusion
ABA believes that the development of a
customer response program is a valuable component of every institution's
customer information security program. We appreciate the opportunity to
comment on the proposed guidelines. Such an initiative has sufficient
import, in our opinion, that it warrants significant additional
discussion and review within the regulatory and financial services
community. Many issues have been raised, and we would welcome the
opportunity, in whatever forum, to work with the Agencies to further
refine the proposed guidelines before they become final. If you have any
questions or comments on these matters, please contact Doug Johnson,
Senior Policy Analyst at (202) 663-5059.
Sincerely,
James D. McLaughlin
Director, Regulatory and Trust Affairs
American Bankers Association
Washington, DC
_______________________
1 The White House, The
National Strategy to Secure Cyberspace, 2003, pp.7, 27-28.
2 Computer intrusion (18 USC 1030)>
To gain access to a computer system of a financial institution to:
*Remove, steal, procure, or otherwise affect funds of the institution or
the institution's customers;
*Remove, steal, procure or otherwise affect critical information of the
institution including customer account information; or
*Damage, disable or otherwise affect critical systems of the
institution. |