[Federal Register: August 12, 2003 (Volume 68, Number 155)]
[Notices]
[Page 47954-47960]
From the Federal Register Online via GPO Access [wais.access.gpo.gov]
[DOCID:fr12au03-83]
=======================================================================
DEPARTMENT OF THE TREASURY
Office of the Comptroller of the Currency
[Docket No. 03-18]
DEPARTMENT OF THE TREASURY
Office of Thrift Supervision
[No. 03-35]
BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM
[Docket No. OP-1155]
FEDERAL DEPOSIT INSURANCE CORPORATION
Interagency Guidance on Response Programs for Unauthorized Access
to Customer Information and Customer Notice
AGENCIES: Office of the Comptroller of the Currency, Treasury (OCC);
Board of Governors of the Federal Reserve System (Board); Federal
Deposit Insurance Corporation (FDIC); and Office of Thrift Supervision,
Treasury (OTS).\1\
---------------------------------------------------------------------------
\1\ The National Credit Union Administration (NCUA) participated
in the guidance of development process and will separately issue
comparable proposed guidance.
ACTION: Notice and request for comment.
-----------------------------------------------------------------------
SUMMARY: The OCC, Board, FDIC, and OTS (the Agencies) are requesting
comment on proposed guidance entitled Interagency Guidance on Response
Programs for Unauthorized Access to Customer Information and Customer
Notice (``the proposed Guidance'').
In addition, as part of their continuing efforts to reduce
paperwork and respondent burden, the Agencies invite the general public
and other Federal agencies to take this opportunity to comment on a
proposed information collection, as required by the Paperwork Reduction
Act of 1995 (44 U.S.C. chapter 35).
DATES: Comments must be submitted on or before October 14, 2003
ADDRESSES: Interested parties are invited to submit written comments
to:
Office of the Comptroller of the Currency: Public Information Room,
Office of the Comptroller of the Currency, 250 E Street, SW, Mail stop
1-5, Washington, DC 20219, Attention: Docket No. 03-18, Fax number
(202) 874-4448 or e-mail address: regs.comments@occ.treas.gov. Due to
delays in the delivery of paper mail in the Washington area, commenters
are encouraged to submit their comments by fax or email. Comments may
be inspected and photocopied at the OCC's Public Information Room, 250
E Street, SW, Washington, DC. You can make an appointment to inspect
the comments by calling (202) 874-5043.
Board of Governors of the Federal Reserve System: Comments should
refer to Docket No. OP-1155 and may be mailed to Ms. Jennifer J.
Johnson, Secretary, Board of Governors of the Federal Reserve System,
20th Street and Constitution Avenue, NW., Washington, DC 20551.
However, because paper mail in the Washington area and at the Board of
Governors is subject to delay, please consider submitting your comments
by e-mail to regs.comments@federalreserve.gov, or faxing them to the
Office of the Secretary at (202) 452-3819 or (202) 452-3102. Members of
the public may inspect comments in Room MP-500 between 9 a.m. and 5
p.m. on weekdays pursuant to 12 CFR 261.12, except as provided in 12
CFR 261.14, of the Board's Rules Regarding Availability of Information,
12 CFR sections 261.12 and 261.14.
Federal Deposit Insurance Corporation: Send written comments to
Robert E. Feldman, Executive Secretary, Attention: Comments/OES,
Federal Deposit Insurance Corporation, 550 17th Street, NW.,
Washington, DC 20429. Comments also may be mailed electronically to
comments@fdic.gov. Comments may be hand delivered to the guard station
at the rear of the 17th Street building (located on F Street) on
business days between 7 a.m. and 5 p.m.; Fax Number (202) 898-3838.
Comments may be inspected and photocopied in the FDIC Public
Information Center, Room 100, 801 17th Street, NW., Washington, DC
20429, between 9 a.m. and 5 p.m. on business days.
Office of Thrift Supervision: Comments may be sent to Regulation
Comments, Chief Counsel's Office, Office of Thrift Supervision, 1700 G
Street, NW., Washington, DC 20552, Attention: No.03-35; FAX number
(202) 906-6518, Attention: No. 03-35; or e-mail address
regs.comments@ots.treas.gov, Attention: No. 03-35, and include your
name and telephone number. Comments may also be hand delivered to the
Guard's Desk, East Lobby Entrance, 1700 G Street, NW., from 9 a.m. to 4
p.m. on business days, Attention: Regulation Comments, Chief Counsel's
Office, No. 03-35. Commenters should be aware that there have been
unpredictable and lengthy delays in postal deliveries to the
Washington, DC area and may prefer to make their comments via
facsimile, e-mail, or hand delivery. OTS will post
[[Page 47955]]
comments and the related index on the OTS Internet Site at http://www.ots.treas.gov.
In addition, you may inspect comments at the Public
Reading Room, 1700 G Street, NW., by appointment. To make an
appointment for access, you may call (202) 906-5922, send an e-mail to
public.info@ots.treas. gov, or send a facsimile transmission to (202)
906-7555. (Please identify the materials you would like to inspect to
assist us in serving you.) We schedule appointments on business days
between 10 a.m. and 4 p.m. In most cases, appointments will be
available the business day after the date we receive a request.
FOR FURTHER INFORMATION CONTACT:
OCC: Aida Plaza Carter, Director, Bank Information Technology
Operations Division, (202) 874-4740; Clifford A. Wilke, Director, Bank
Technology Division, (202) 874-5920; Amy Friend, Assistant Chief
Counsel, (202) 874-5200; or Deborah Katz, Senior Attorney, Legislative
and Regulatory Activities Division, (202) 874-5090.
Board: Donna L. Parker, Supervisory Financial Analyst, Division of
Banking Supervision & Regulation, (202) 452-2614; Thomas E. Scanlon,
Counsel, Legal Division, (202) 452-3594; or Joshua H. Kaplan, Attorney,
Legal Division, (202) 452-2249.
FDIC: Jeffrey M. Kopchik, Senior Policy Analyst, Division of
Supervision and Consumer Protection, (202) 898-3872; Patricia I.
Cashman, Senior Policy Analyst, Division of Supervision and Consumer
Protection, (202) 898-6534; or Robert A. Patrick, Counsel, Legal
Division, (202) 898-3757.
OTS: Robert Engebreth, Director, Technology Risk Management, (202)
906-5631; Lewis C. Angel, Senior Project Manager, Technology Risk
Management, (202) 906-5645; Elizabeth Baltierra, Program Analyst
(Compliance), Compliance Policy, (202) 906-6540; or Paul Robin, Special
Counsel, Regulations and Legislation Division, (202) 906-6648.
SUPPLEMENTARY INFORMATION:
I. Background
The Agencies have published Interagency Guidelines Establishing
Standards for Safeguarding Customer Information (``Security
Guidelines'').\2\ These Security Guidelines were published to fulfill a
requirement in section 501(b) of the Gramm-Leach-Bliley Act in which
Congress directed the Agencies to establish standards for financial
institutions relating to administrative, technical, and physical
safeguards to: (1) Insure the security and confidentiality of customer
records and information; (2) protect against any anticipated threats or
hazards to the security or integrity of such records; and (3) protect
against unauthorized access to or use of such records or information
that could result in substantial harm or inconvenience to any
customer.\3\
---------------------------------------------------------------------------
\2\ 12 CFR part 30, app. B (OCC); 12 CFR part 208, app. D-2, and
part 225, app. F (Board); 12 CFR part 364, app. B (FDIC); and 12 CFR
part 570, app. B (OTS).
\3\ 15 U.S.C. 6805(b).
---------------------------------------------------------------------------
Among other things, the Security Guidelines direct financial
institutions to: (1) Identify reasonably foreseeable internal and
external threats that could result in unauthorized disclosure, misuse,
alteration, or destruction of customer information or customer
information systems; (2) assess the likelihood and potential damage of
these threats, taking into consideration the sensitivity of customer
information; and (3) assess the sufficiency of policies, procedures,
customer information systems, and other arrangements in place to
control risks.\4\
---------------------------------------------------------------------------
\4\ Security Guidelines, Paragraph III.B.2.
---------------------------------------------------------------------------
This proposed Guidance, published as an Appendix to this notice,
interprets section 501(b) of the Gramm-Leach-Bliley Act and the
provisions of the Security Guidelines noted above.\5\ It describes the
Agencies' expectations that every financial institution develop a
response program to protect against and address reasonably foreseeable
risks associated with internal and external threats to the security of
customer information maintained by the financial institution or its
service provider. The proposed Guidance further describes the
components of a response program, which includes procedures for
notifying customers about incidents of unauthorized access to customer
information that could result in substantial harm or inconvenience to
the customer. The proposed Guidance provides that a financial
institution is expected to expeditiously implement its response program
to address incidents of unauthorized access to or use of customer
information. A response program should contain policies and procedures
that enable the financial institution to:
---------------------------------------------------------------------------
\5\ The Agencies may treat an institution's failure to implement
final Guidance issued as a violation of the Security Guidelines.
---------------------------------------------------------------------------
A. Assess the situation to determine the nature and scope of the
incident, and identify the information systems and types of customer
information affected;
B. Notify the institution's primary Federal regulator and, in
accordance with applicable regulations and guidance, file a Suspicious
Activity Report and notify appropriate law enforcement agencies;
C. Take measures to contain and control the incident to prevent
further unauthorized access to or use of customer information,
including shutting down particular applications or third party
connections, reconfiguring firewalls, changing computer access codes,
and modifying physical access controls; and
D. Address and mitigate harm to individual customers.
The proposed Guidance describes the following corrective measures a
financial institution should include as a part of its response program
in order to effectively address and mitigate harm to individual
customers:
A. Flag Accounts--The institution should identify accounts of
customers whose information may have been compromised, monitor those
accounts for unusual activity, and initiate appropriate controls to
prevent the unauthorized withdrawal or transfer of funds from customer
accounts.
B. Secure Accounts--The institution should secure all accounts
associated with the customer information that has been the subject of
unauthorized access or use.
C. Customer Notice and Assistance--The institution should, under
certain circumstances, notify affected customers when sensitive
customer information about them is the subject of unauthorized access.
Where the institution can specifically identify affected customers from
its logs, notification may be limited to those persons only. Otherwise,
the institution should notify each customer in those groups likely to
be affected.
The proposed Guidance provides that a financial institution should
notify each affected customer when it becomes aware of unauthorized
access to sensitive customer information, unless the institution, after
an appropriate investigation, reasonably concludes that misuse of the
information is unlikely to occur, and takes appropriate steps to
safeguard the interests of affected customers, including by monitoring
affected customers' accounts for unusual or suspicious activity. For
the purposes of the proposed Guidance, the Agencies define sensitive
customer information to mean a customer's social security number,
personal identification number (PIN), password, or account number, in
conjunction with a personal identifier, such as the individual's name,
address, or telephone number. Sensitive customer information would also
include any combination of components of customer information
[[Page 47956]]
that would allow someone to log onto or access another person's
account, such as user name and password.
Under the Security Guidelines, an institution must protect against
unauthorized access to or use of customer information that could result
in substantial harm or inconvenience to any customer. The Agencies
believe that substantial harm or inconvenience is most likely to result
from the improper access to and use of sensitive customer information.
Accordingly, the proposed Guidance requires notice to mitigate or
prevent substantial harm or inconvenience to a customer.
The Agencies note that the response program required under the
proposed Guidance must address incidents involving the unauthorized
access to or use of any form of customer information. However, the
customer notice requirement applies only to security breaches involving
sensitive customer information.
The proposed Guidance provides several examples the Agencies
believe typify situations in which customer notification is required
and those when it is not. As in other circumstances, the Agencies also
expect financial institutions to notify customers upon the direction of
the institution's primary Federal regulator.
The proposed Guidance discusses the content and delivery of
customer notices. The notice should include a general description of
the incident, and provide information to assist customers in mitigating
potential harm, including a customer service number, steps customers
can take to obtain and review their credit reports and to file fraud
alerts with nationwide credit reporting agencies, and sources of
information designed to assist individuals in protecting against
identity theft.
In addition, institutions are expected to inform each customer
about the availability of the Federal Trade Commission's (``FTC'')
online guidance regarding measures to protect against identity theft
and to encourage the customer to report any suspected incidents of
identity theft to the FTC. Further, institutions should provide the
FTC's Web site address and telephone number for purposes of obtaining
the guidance and reporting suspected incidents of identity theft.
Currently, the Web site address is http://www.ftc.gov/idtheft, and the
toll free number for the identity theft hotline is 1-877-IDTHEFT.
The proposed Guidance also describes other forms of assistance that
financial institutions have offered to their customers in incidents of
this type. Financial institutions may wish to offer such forms of
assistance to their customers and describe them in the customer notice.
II. Request for Comments
The Agencies invite comment on all aspects of the proposed
Guidance, including each component of the response program described in
Paragraph II of the proposed Guidance. Please consider the following
questions in formulating your comments:
[sbull] Should any component of the response program be clarified
in some way and, if so, how?
[sbull] Are there additional components that should be included in
a response program to address incidents involving unauthorized access
to or use of customer information? If so, please describe the
component, and the reasons that support it.
[sbull] Should each component of the response program be retained?
If not, which components should be deleted and why?
[sbull] In preparing the proposed Guidance, the Agencies have
attempted to identify a standard that will lead to customer notice when
appropriate. The Agencies recognize that there is a spectrum of
alternatives for developing a requirement to notify customers. On one
side of the spectrum is a standard that would require a financial
institution to notify its customers every time the mere possibility of
misuse of customer information arises. On the other side is a standard
that would require an institution to notify its customers only when it
becomes aware of an incident involving unauthorized access to customer
information and, based on unusual activity in customers' accounts or
other indicia of identity theft, knows that the information is being
misused. The Agencies propose a standard that lies in the middle of
this spectrum. The Agencies believe that no useful purpose would be
served if notices were sent due to the mere possibility of misuse of
some customer information because, in general, the notices should alert
customers to those situations where enhanced vigilance is necessary to
protect against fraud or identity theft. Rather, the Agencies believe
that notice to customers should be required in a narrower range of
instances involving the unauthorized access to sensitive customer
information. The standard proposed here would require a financial
institution to send notice to each affected customer when the
institution becomes aware of an incident of unauthorized access to
sensitive customer information, unless the institution, after an
appropriate investigation, reasonably concludes that misuse of the
information is unlikely to occur and takes appropriate steps to
safeguard the interests of affected customers, including by monitoring
affected customers' accounts for unusual or suspicious activity. The
Agencies invite comment on whether this is the appropriate standard for
requiring customer notice. For commenters who believe that this
standard is inappropriate, the Agencies request that these commenters
state specifically their reasoning and offer alternative thresholds for
requiring customer notice.
[sbull] The proposed Guidance defines sensitive customer
information as a social security number, a personal identification
number (PIN), password, or an account number in conjunction with a
personal identifier. Sensitive customer information would also include
any combination of components of customer information that would allow
someone to log onto or access another person's account, such as user
name and password. The Agencies request comment on which, if any,
additional types of information should be included in this definition,
such as mother's maiden name or driver's license number.
[sbull] The Agencies invite comment on the potential burden
associated with the customer notice provisions. For example, what is
the anticipated burden that may arise from the questions posed by those
customers who receive the notices? Should the Agencies consider how the
burden may vary depending upon the size and complexity of the
institution?
[sbull] As part of the response program, the Agencies describe
certain corrective measures that an institution should take once an
incident of unauthorized access occurs. One such measure is to ``secure
accounts.'' Is the discussion of securing accounts sufficiently clear
to enable institutions to know what is expected of them when instances
of unauthorized access occur? To what extent would contracts between
financial institutions and service providers need to be modified, if at
all, to comply with the proposed Guidance? How much burden, if any,
will the Guidance impose on service providers?
[sbull] The Agencies also invite comment on whether the proposed
standard should be modified to apply to other extraordinary
circumstances that compel an institution to conclude that unauthorized
access to information, other than sensitive customer information,
likely will result in substantial harm or inconvenience to the affected
customers.
[[Page 47957]]
[sbull] The proposed Guidance includes examples of circumstances in
which customer notice would be expected and those when it would not.
Please comment on whether the examples in the proposed Guidance should
be modified or supplemented and provide your rationale.
III. Paperwork Reduction Act
A. Request for Comment on Proposed Information Collection
In accordance with the requirements of the Paperwork Reduction Act
of 1995, the Agencies may not conduct or sponsor, and the respondent is
not required to respond to, an information collection unless it
displays a currently valid Office of Management and Budget (OMB)
control number. The Agencies are requesting comment on a proposed
information collection. The Agencies also give notice that, at the end
of the comment period, the proposed collections of information, along
with an analysis of the comments and recommendations received, will be
submitted to OMB for review and approval.
Comments are invited on:
(a) Whether the collection of information is necessary for the
proper performance of the Agency's functions, including whether the
information has practical utility;
(b) The accuracy of the estimates of the burden of the information
collection, including the validity of the methodology and assumptions
used;
(c) Ways to enhance the quality, utility, and clarity of the
information to be collected;
(d) Ways to minimize the burden of the information collection on
respondents, including through the use of automated collection
techniques or other forms of information technology; and
(e) Estimates of capital or start up costs and costs of operation,
maintenance, and purchase of services to provide information.
At the end of the comment period, the comments and recommendations
received will be analyzed to determine the extent to which the
information collections should be modified prior to submission to OMB
for review and approval. The comments will also be summarized or
included in the Agencies' requests to OMB for approval of the
collections. All comments will become a matter of public record.
Comments should be addressed to:
OCC: Public Information Room, Office of the Comptroller of the
Currency, 250 E Street, SW, Mail stop 1-5, Attention: Docket 03-18,
Washington, DC 20219; fax number (202) 874-4448; Internet address:
regs.comments@occ.treas.gov. Due to delays in paper mail delivery in
the Washington area, commenters are encouraged to submit their comments
by fax or e-mail. You can make an appointment to inspect the comments
at the Public Information Room by calling (202) 874-5043.
Board: Comments should refer to Docket No. OP-1155 and may be
mailed to Ms. Jennifer J. Johnson, Secretary, Board of Governors of the
Federal Reserve System, 20th Street and Constitution Avenue, NW.,
Washington, DC 20551. However, because paper mail in the Washington
area and at the Board of Governors is subject to delay, please consider
submitting your comments by e-mail to regs.comments@federalreserve.gov,
or faxing them to the Office of the Secretary at (202) 452-3819 or
(202) 452-3102. Members of the public may inspect comments in Room MP-
500 between 9 a.m. and 5 p.m. on weekdays pursuant to 12 CFR section
261.12, except as provided in 12 CFR section 261.14, of the Board's
Rules Regarding Availability of Information, 12 CFR sections 261.12 and
261.14.
FDIC: Steven F. Hanft, Legal Division (Consumer and Compliance
Unit), Room MB-3064, Federal Deposit Insurance Corporation, 550 17th
Street, NW., Washington, DC 20429. All comments should refer to the
title of the proposed collection. Comments may be hand-delivered to the
guard station at the rear of the 17th Street Building (located on F
Street), on business days between 7 a.m. and 5 p.m., Attention:
Comments, Federal Deposit Insurance Corporation, 550 17th Street, NW.,
Washington, DC 20429.
OTS: Information Collection Comments, Chief Counsel's Office,
Office of Thrift Supervision, 1700 G Street, NW., Washington, DC 20552;
send a facsimile transmission to (202) 906-6518; or send an e-mail to
infocollection.comments@ots.treas.gov. OTS will post comments and the
related index on the OTS Internet site at http://www.ots.treas.gov. In
addition, interested persons may inspect the comments at the Public
Reading Room, 1700 G Street, NW., by appointment. To make an
appointment, call (202) 906-5922, send an e-mail to
publicinfo@ots.treas.gov, or send a facsimile transmission to (202)
906-7755.
B. Proposed Information Collection
Title of Information Collection: Notice Regarding Unauthorized
Access to Customer Information.
Frequency of Response: On occasion.
Affected Public:
OCC: National banks, District of Columbia banks, and Federal
branches and agencies of foreign banks.
Board: State member banks, bank holding companies, affiliates and
certain non-bank subsidiaries of bank holding companies, uninsured
state agencies and branches of foreign banks, commercial lending
companies owned or controlled by foreign banks, and Edge and agreement
corporations.
FDIC: Insured nonmember banks, insured state branches of foreign
banks, and certain subsidiaries of these entities.
OTS: Savings associations and certain of their subsidiaries.
Abstract: The proposed Guidance describes the Agencies'
expectations regarding a response program, including customer
notification procedures, that a financial institution should develop
and apply under the circumstances described in the Appendix to address
unauthorized access to or use of customer information that could result
in substantial harm or inconvenience to a customer.
The information collections in the proposed Guidance would require
financial institutions to: (1) Develop notices to customers; (2)
determine which customers should receive the notices and send the
notices to customers; and (3) ensure that their contracts with their
service providers satisfy the proposed Guidance.
Estimated Burden: It is estimated that it will initially take
institutions 20 hours (2.5 business days) to develop and produce the
notices described in the proposed Guidance and 24 hours per incident
(three business days) to determine which customers should receive the
notice and notify the customers. For the purposes of this analysis, it
is estimated that two percent of supervised institutions will
experience an incident of unauthorized access to customer information
on an annual basis, resulting in customer notification.\6\
---------------------------------------------------------------------------
\6\ This estimate is based upon the Agencies' experience and
data gathered by the FDIC on 2,000 institutions that indicates
slightly less than one percent of those institutions experienced
some form of unauthorized access to customer information during any
12 month period. However, the Agencies are assuming that other
incidents of unauthorized access to customer information may have
occurred, but were not reported.
---------------------------------------------------------------------------
Thus, the burden associated with this collection of information may
be summarized as follows. However, the burden estimate does not include
time for financial institutions to adjust their contracts with service
providers, if needed; nor for service providers to
[[Page 47958]]
disclose information pursuant to the proposed Guidance.
OCC
Number of Respondents: 2,200.
Estimated Time per Response:
Developing notices: 20 hrs. x 2,200 = 44,000 hours.
Notifying customers: 24 hrs. x 44 = 1,056 hours.
Total Estimated Annual Burden = 45,056 hours.
Board
Number of Respondents: 6,692.
Estimated Time per Response:
Developing notices: 20 hrs. x 6,692 = 133,840 hours.
Notifying customers: 24 hrs. x 134 = 3,216 hours.
Total Estimated Annual Burden: 137,056 hours.
FDIC
Number of Respondents: 5,500.
Estimated Time per Response:
Developing notices: 20 hrs. x 5,500 = 110,000 hours.
Notifying customers: 24 hrs. x 110 = 2,640 hours.
Total Estimated Annual Burden: 112,640 hours.
OTS
Number of Respondents: 961.
Estimated Time per Response:
Developing notices: 20 hrs. x 961 = 19,220 hours.
Notifying customers: 24 hrs. x 19 = 456 hours.
Estimated Total Annual Burden: 19,676 hours.
Appendix--Interagency Guidance on Response Programs for Unauthorized
Access to Customer Information and Customer Notice
I. Background
This Guidance \1\ interprets section 501(b) of the Gramm-Leach-
Bliley Act (``GLBA'') and the Interagency Guidelines Establishing
Standards for Safeguarding Customer Information (the ``Security
Guidelines'')\2\ and describes the Agencies'' expectations regarding
the response programs, including customer notification procedures,
that a financial institution should develop and apply to address
unauthorized access to or use of customer information that could
result in substantial harm or inconvenience to a customer.
---------------------------------------------------------------------------
\1\ This Guidance is being jointly issued by the Board of
Governors of the Federal Reserve System (Board), the Federal Deposit
Insurance Corporation (FDIC), the Office of the Comptroller of the
Currency (OCC), and the Office of Thrift Supervision (OTS).
\2\ 12 CFR part 30, app. B (OCC); 12 CFR part 208, app. D-2 and
part 225, app. F (Board); 12 CFR part 364, app. B (FDIC); and 12 CFR
part 570, app. B (OTS).
---------------------------------------------------------------------------
Interagency Security Guidelines
Section 501(b) of the GLBA required the Agencies to establish
appropriate standards for financial institutions subject to their
jurisdiction that include administrative, technical, and physical
safeguards, to protect the security and confidentiality of customer
information.\3\ Accordingly, the Agencies issued Security Guidelines
requiring every financial institution to have an information
security program designed to:
---------------------------------------------------------------------------
\3\ The term ``customer information'' is the same term used in
the Security Guidelines and means any record containing nonpublic
personal information whether in paper, electronic, or other form,
maintained by or on behalf of the institution.
---------------------------------------------------------------------------
[sbull] Ensure the security and confidentiality of customer
information;
[sbull] Protect against any anticipated threats or hazards to
the security or integrity of such information; and
[sbull] Protect against unauthorized access to or use of such
information that could result in substantial harm or inconvenience
to any customer.
Risk Assessment and Controls
The Security Guidelines direct every financial institution to
assess the following risks, among others, when developing its
information security program:
[sbull] Reasonably foreseeable internal and external threats
that could result in unauthorized disclosure, misuse, alteration, or
destruction of customer information or customer information systems;
[sbull] The likelihood and potential damage of threats, taking
into consideration the sensitivity of customer information; and
[sbull] The sufficiency of policies, procedures, customer
information systems, and other arrangements in place to control
risks.\4\
---------------------------------------------------------------------------
\4\ See Security Guidelines Paragraph III.B.
---------------------------------------------------------------------------
Following the assessment of these risks, the Security Guidelines
require a financial institution to design a program to address the
identified risks. The particular security measures an institution
should adopt will depend upon the risks presented by the complexity
and scope of its business. At a minimum, the financial institution
is required to consider the specific security measures enumerated in
the Security Guidelines,\5\ and adopt those that are appropriate for
the institution, including:
---------------------------------------------------------------------------
\5\ See Security Guidelines Paragraph III.C.
---------------------------------------------------------------------------
[sbull] Access controls on customer information systems,
including controls to authenticate and permit access only to
authorized individuals and controls to prevent employees from
providing customer information to unauthorized individuals who may
seek to obtain this information through fraudulent means;
[sbull] Background checks for employees with responsibilities
for access to customer information; and
[sbull] Response programs that specify actions to be taken when
the bank suspects or detects that unauthorized individuals have
gained access to customer information systems, including appropriate
reports to regulatory and law enforcement agencies.\6\
---------------------------------------------------------------------------
\6\ See Security Guidelines Paragraph III.D.
---------------------------------------------------------------------------
Service Providers
The Security Guidelines direct every financial institution to
require its service providers by contract to implement appropriate
measures designed to protect against unauthorized access to or use
of customer information that could result in substantial harm or
inconvenience to any customer.\7\ Consistent with existing guidance
issued by the Agencies, an institution's contract with its service
provider should require the service provider to fully disclose to
the institution information relating to any breach in security
resulting in an unauthorized intrusion into the institution's
customer information systems maintained by the service provider.\8\
In view of these contractual obligations, the service provider would
be required to take appropriate actions to address incidents of
unauthorized access to or use of the financial institution's
customer information to enable the institution to expeditiously
implement its response program.\9\
---------------------------------------------------------------------------
\7\ See Security Guidelines Paragraphs II.B. and III.D.
\8\ See Federal Reserve SR Ltr. 00-04, Outsourcing of
Information and Transaction Processing, Feb. 9, 2000; SR Ltr. 00-17,
Guidance on Risk Management of Outsourced Technology Services, Nov.
30, 2000; OCC Bulletin 2001-47, ``Third-party Relationships Risk
Management Principles,'' Nov. 1, 2001; AL 2000-12, ``FFIEC Guidance
on Risk Management of Outsourced Technology Services,'' Nov. 28,
2000; FDIC FIL 81-2000, Risk Management of Technology Outsourcing,
Nov. 29, 2000; FIL 68-99, Risk Assessment Tools and Practices for
Information System Security, July 7, 1999; OTS Thrift Bulletin 82,
Third Party Arrangements, Mar. 4, 2003; OTS CEO Memorandum 133, Risk
Management of Technology Outsourcing, Dec. 13, 2000; CEO Memorandum
109, Transactional Web Sites, June 10, 1999; CEO Memorandum 70,
Statement on On-Line Personal Computer Banking, June 23, 1997.
\9\ The Agencies note that, in addition to contractual
obligations to a financial institution, a service provider may be
required to implement its own comprehensive information security
program in accordance with the Safeguards Rule promulgated by the
FTC. 12 CFR part 314 applies to the handling of all customer
information possessed by any financial institution subject to the
jurisdiction of the FTC, regardless of whether such information
pertains to individuals with whom the institution has a customer
relationship or pertains to the customers of other financial
institutions that have provided such information to that
institution.
---------------------------------------------------------------------------
Response Program
As internal and external threats to the security of customer
information are reasonably foreseeable and may lead to the misuse of
customer information, the Agencies expect every financial
institution to develop a response program to protect against the
risks associated with these threats. The response program should
include measures to protect customer information in customer
information systems maintained by the institution or its service
providers. The Agencies expect that customer notification will be a
component of an institution's response program, as described below.
II. Components of a Response Program
A response program should be a key part of an institution's
information security
[[Page 47959]]
program.\10\ Having such a program in place will allow the
institution to quickly respond \11\ to incidents involving the
unauthorized access to or use of customer information in its own
customer information systems that could result in substantial harm
or inconvenience to a customer. Under the Guidelines, an
institution's customer information systems consist of all of the
methods used to access, collect, store, use, transmit, protect, or
dispose of customer information, including the systems maintained by
its service providers.\12\
---------------------------------------------------------------------------
\10\ See FFIEC Information Security Booklet, Dec. 2002; Federal
Reserve SR 97-32, Sound Practice Guidance for Information Security
for Networks, Dec. 4, 1997; OCC Bulletin 2000-14, ``Infrastructure
Threats `` Intrusion Risks'' (May 15, 2000); OTS CEO Memorandum 109,
Transactional Web Sites, June 10, 1999; CEO Memorandum 70, Statement
on On-Line Personal Computer Banking, June 23, 1997; CEO Memorandum
59, Risk Management of Client/Server Systems, Oct. 24, 1996, for
additional guidance on preventing, detecting, and responding to
intrusions into financial institution computer systems.
\11\ Financial institutions are expected to provide employees
with the training necessary to understand their roles and
responsibilities in order to expeditiously implement the
institution's response program to address incidents of unauthorized
access to and use of customer information.
\12\ See Security Guidelines Paragraph I.C.f.
---------------------------------------------------------------------------
Timely notification of customers, under the circumstances
described below, is important to manage an institution's reputation
risk. Effective notice may reduce legal risk, assist in maintaining
good customer relations, and enable the institution's customers to
take steps to protect themselves against the consequences of
identity theft.
A response program should contain the following components:
A. Assess the Situation.
The institution should assess the nature and scope of the
incident, and identify what customer information systems and types
of customer information have been accessed or misused.
B. Notify Regulatory and Law Enforcement Agencies
The institution should promptly notify its primary Federal
regulator when it becomes aware of an incident involving
unauthorized access to or use of customer information that could
result in substantial harm or inconvenience to its customers.
An institution also should file a Suspicious Activity Report
(``SAR''), if required, in accordance with the applicable SAR
regulations \13\ and Agency guidance.\14\ Consistent with the
Agencies' SAR regulations, in situations involving Federal criminal
violations requiring immediate attention, such as when a reportable
violation is ongoing, the institution should immediately notify, by
telephone, appropriate law enforcement authorities and its primary
regulator, in addition to filing a timely SAR.
---------------------------------------------------------------------------
\13\ 12 CFR 21.11 (national banks, federal branches and
agencies); 12 CFR 208.62 (state member banks); 12 CFR 211.5(k) (Edge
and agreement corporations); 12 CFR 211.24(f) (uninsured state
branches and agencies of foreign banks); 12 CFR 225.4(f) (bank
holding companies and their nonbank subsidiaries); 12 CFR part 353
(state non-member banks); and 12 CFR part 563 (savings
associations).
\14\ National banks must file SARs in connection with computer
intrusions and other computer crimes. See OCC Bulletin 2000-14,
``Infrastructure Threats--Intrusion Risks'' (May 15, 2000); Advisory
Letter 97-9, ``Reporting Computer Related Crimes'' (November 19,
1997) (general guidance still applicable though instructions for new
SAR form published in 65 FR 1229, 1230 (January 7, 2000)). See also
Federal Reserve SR 01-11, Identity Theft and Pretext Calling, Apr.
26, 2001; SR 97-28, Guidance Concerning Reporting of Computer
Related Crimes by Financial Institutions, Nov. 6, 1997; FDIC FIL 48-
2000, Suspicious Activity Reports, July 14, 2000; FIL 47-97,
Preparation of Suspicious Activity Reports, May 6, 1997; OTS CEO
Memorandum 139, Identity Theft and Pretext Calling, May 4, 2001; CEO
Memorandum 126, New Suspicious Activity Report Form, July 5, 2000.
---------------------------------------------------------------------------
C. Contain and Control the Situation
The financial institution should take measures to contain and
control the incident to prevent further unauthorized access to or
use of customer information, while preserving records and other
evidence.\15\ Depending upon the particular facts and circumstances
of the incident, these measures could include, in connection with
computer intrusions: (i) Shutting down applications or third party
connections; (ii) reconfiguring firewalls in cases of unauthorized
electronic intrusion; (iii) ensuring that all known vulnerabilities
in the financial institution's computer systems have been addressed;
(iv) changing computer access codes; (v) modifying physical access
controls; and (vi) placing additional controls on service provider
arrangements.
---------------------------------------------------------------------------
\15\ See FFIEC Information Security Booklet, Dec. 2002, pp. 68-
74.
---------------------------------------------------------------------------
D. Corrective Measures
Once an institution understands the scope of the incident and
has taken steps to contain and control the situation, it should take
measures to address and mitigate the harm to individual customers.
For example, the institution should take the following measures:
1. Flag Accounts
The institution should immediately begin identifying and
monitoring the accounts of those customers whose information may
have been accessed or misused. In particular, the institution should
provide staff with instructions regarding the recording and
reporting of any unusual activity, and if indicated given the facts
of a particular incident, implement controls to prevent the
unauthorized withdrawal or transfer of funds from customer accounts.
2. Secure Accounts
When a checking, savings, or other deposit account number, debit
or credit card account number, personal identification number (PIN),
password, or other unique identifier has been accessed or misused,
the financial institution should secure the account, and all other
accounts and bank services that can be accessed using the same
account number or name and password combination until such time as
the financial institution and the customer agree on a course of
action.\16\
---------------------------------------------------------------------------
\16\ The institution should also consider the use of new account
numbers and steps to ensure that customers do not reuse the same or
a similar personal identification number.
---------------------------------------------------------------------------
3. Customer Notice and Assistance
Under the Security Guidelines, financial institutions have an
affirmative duty to protect their customers' information against
unauthorized access or use. An institution may not forgo notifying
its customers of an incident because the institution believes that
it may be potentially embarrassed or inconvenienced by doing so.
Under the circumstances described in Paragraph III., the institution
should notify and offer assistance to customers whose information
was the subject of the incident.\17\ If the institution is able to
determine from its logs or other data precisely which customers'
information was accessed or misused, it may restrict its
notification to those individuals. However, if the institution
cannot identify precisely which customers are affected, it should
notify each customer in groups likely to have been affected, such as
each customer whose information is stored in the group of files in
question.
---------------------------------------------------------------------------
\17\ The institution should, therefore, ensure that a sufficient
number of appropriately trained employees are available to answer
customer inquiries and provide assistance.
---------------------------------------------------------------------------
a. Delivery of Customer Notice--Customer notice should be
timely, clear, and conspicuous, and delivered in any manner that
will ensure that the customer is likely to receive it. For example,
the institution may choose to contact all customers affected by
telephone or by mail, or for those customers who conduct
transactions electronically, using electronic notice.
b. Content of Customer Notice--The notice should describe the
incident in general terms and the customer's information that was
the subject of unauthorized access or use. It should also include a
number that customers can call for further information and
assistance. The notice also should remind customers of the need to
remain vigilant, over the next twelve to twenty-four months, and to
promptly report incidents of suspected identity theft.
Key Elements: In addition, the notice should:
[sbull] Inform affected customers that the institution will
assist the customer to correct and update information in any
consumer report relating to the customer, as required by the Fair
Credit Reporting Act;
[sbull] Recommend that the customer notify each nationwide
credit reporting agency to place a fraud alert \18\ in the
customer's consumer reports;
---------------------------------------------------------------------------
\18\ A fraud alert will put the customer's creditors on notice
that the customer may be a victim of fraud.
---------------------------------------------------------------------------
[sbull] Recommend that the customer periodically obtain credit
reports from each nationwide credit reporting agency and have
information relating to fraudulent transactions deleted;
[sbull] Inform the customer of the right to obtain a credit
report free of charge, if the customer has reason to believe that
the file at the consumer reporting agency contains inaccurate
information due to fraud, together with contact information
regarding the nationwide credit reporting agencies; and
[[Page 47960]]
[sbull] Inform the customer about the availability of the FTC's
online guidance regarding steps a consumer can take to protect
against identity theft, and encourage the customer to report any
incidents of identity theft to the FTC. The notice should provide
the FTC's Web site address and toll-free telephone number that
customers may use to obtain the identity theft guidance and report
suspected incidents of identity theft.\19\
---------------------------------------------------------------------------
\19\ Currently, the FTC Web site for the ID Theft brochure and
the FTC Hotline phone number are http://www.ftc.gov/idtheft and 1-
877-IDTHEFT.
---------------------------------------------------------------------------
Optional Element: Institutions also may wish to provide
customers with the following additional assistance that other
institutions have offered under these circumstances:
[sbull] Provide a toll-free telephone number that customers can
call for assistance;
[sbull] Offer to assist the customer in notifying the nationwide
credit reporting agencies of the incident and in placing a fraud
alert in the customer's consumer reports; and
[sbull] Inform the customer about subscription services that
provide notification anytime there is a request for the customer's
credit report or offer to subscribe the customer to this service,
free of charge, for a period of time.
The institution may also wish to include with the notice a
brochure regarding steps a consumer can take to protect against
identity theft, prepared by the Agencies that can be downloaded from
the Internet.\20\
---------------------------------------------------------------------------
\20\ http://www.occ.treas.gov/idtheft.pdf; http://www.federalreserve.gov/consumers.htm
http://www.fdic.gov/consumers/consumer/news/cnsum00/idthft.html; http://www.ots.treas.gov/docs/
---------------------------------------------------------------------------
III. Circumstances for Customer Notice
Standard for Providing Notice
An institution should notify affected customers whenever it
becomes aware of unauthorized access to sensitive customer
information unless the institution, after an appropriate
investigation, reasonably concludes that misuse of the information
is unlikely to occur and takes appropriate steps to safeguard the
interests of affected customers, including by monitoring affected
customers' accounts for unusual or suspicious activity.
Sensitive Customer Information
Under the Guidelines, an institution must protect against
unauthorized access to or use of customer information that could
result in substantial harm or inconvenience to any customer.
Substantial harm or inconvenience is most likely to result from
improper access to sensitive customer information because this type
of information is easily misused, as in the commission of identity
theft. For purposes of this Guidance, sensitive customer information
means a customer's social security number, personal identification
number, password or account number, in conjunction with a personal
identifier such as the customer's name, address, or telephone
number. Sensitive customer information would also include any
combination of components of customer information that would allow
someone to log onto or access another person's account, such as user
name and password. Therefore, institutions are expected to notify
affected customers when sensitive customer information has been
improperly accessed, unless the institution, after an appropriate
investigation, reasonably concludes that misuse of the information
is unlikely to occur and takes appropriate steps to safeguard the
interests of affected customers.
Examples of When Notice Should Be Given
An institution should notify affected customers when it is aware
of the following incidents unless the institution, after an
appropriate investigation, can reasonably conclude that misuse of
the information is unlikely to occur and takes appropriate steps to
safeguard the interests of affected customers:
[sbull] An employee of the institution has obtained unauthorized
access to sensitive customer information maintained in either paper
or electronic form;
[sbull] A cyber intruder has broken into an institution's
unencrypted database that contains sensitive customer information;
[sbull] Computer equipment such as a laptop computer, floppy
disk, CD-ROM, or other electronic media containing sensitive
customer information has been lost or stolen;
[sbull] An institution has not properly disposed of customer
records containing sensitive customer information; or
[sbull] The institution's third party service provider has
experienced any of the incidents described above, in connection with
the institution's sensitive customer information.
Examples of When Notice Is Not Expected
An institution is not expected to give notice when it becomes
aware of an incident of unauthorized access to customer information,
and the institution, after an appropriate investigation, can
reasonably conclude that misuse of the information is unlikely to
occur and takes appropriate steps to safeguard the interests of
affected customers. For example, an institution would not need to
notify affected customers in connection with the following
incidents:
[sbull] The institution is able to retrieve sensitive customer
information that has been stolen, and reasonably concludes, based
upon its investigation of the incident, that it has done so before
the information has been copied, misused or transferred to another
person who could misuse it;
[sbull] The institution determines that sensitive customer
information was improperly disposed of, but can establish that the
information was not retrieved or used before it was destroyed;
[sbull] A hacker accessed files that contain only customer names
and addresses; or
[sbull] A laptop computer containing sensitive customer
information is lost, but the data is encrypted and may only be
accessed with a secure token or similarly secure access device.
Dated: July 31, 2003.
Mark J. Tenhundfeld.
Assistant Director, Office of the Comptroller of the Currency.
By the Board of Governors of the Federal Reserve System on
August 5, 2003.
Jennifer J. Johnson,
Secretary of the Board.
Dated: August 6, 2003.
Michael J. Zamorski,
Director, Division of Supervision and Consumer Protection, Federal
Deposit Insurance Corporation.
Dated: July 30, 2003.
James E. Gilleran,
Director.
[FR Doc. 03-20440 Filed 8-11-03; 8:45 am]
BILLING CODE 6720-01-P
|