Skip Header

Federal Deposit
Insurance Corporation

Each depositor insured to at least $250,000 per insured bank



Home > Regulation & Examinations > Laws & Regulations > FDIC Federal Register Citations




FDIC Federal Register Citations


October 8, 2003
 

Ms. Jennifer Johnson, Secretary
Board of Governors of the Federal Reserve
System
20th Street and Constitution Ave, NW
Washington, D.C. 20551
Attention: Docket No. R-1151
 

Office of the Comptroller of the Currency
250 E Street, SW
Mailstop 1-5
Washington, D.C. 20219
Attention: Docket No. 03-10
Robert E. Feldman
Executive Secretary
Attention: Comments/OES
Federal Deposit Insurance Corporation
550 17th Street, N.W.
Washington, D.C. 20429
Chief Counsel's Office
Office of Thrift Supervision
1700 G. Street, N.W.
Washington, DC 20522
Attention Docket No. 2003-20

 

Re: Proposed Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and Customer Notice

Ladies and Gentleman:

This comment letter is submitted on behalf of Visa U.S.A. Inc. in response to the Notice and Request for Comment issued by the Federal Deposit Insurance Corporation, Federal Reserve Board, Office of the Comptroller of the Currency and Office of Thrift Supervision (collectively, "the Agencies") regarding the "Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and Customer Notice" ("Proposed Guidance"). Visa appreciates the opportunity to comment on this very important issue.

The Visa Payment System, of which Visa U.S.A.1 is a part, is the largest consumer payment system, and the leading consumer e-commerce payment system, in the world, with more volume than all other major payment cards combined. There are more than one billion Visa-branded cards, and they are accepted at more than 28 million physical locations in 144 countries. Visa plays a pivotal role in advancing new payment products and technologies, including technology initiatives for protecting personal information and preventing identity theft and other fraud, for the benefit of its 21,000 member financial institutions and their hundreds of millions of cardholders worldwide.

Visa supports the statement in the Proposed Guidance that an aggressive response program is a key part of an institution's information security plan and Visa supports the Agencies' efforts to explore measures aimed at enhancing the security of customer information and reducing the deleterious effects of identity theft. However, key aspects of the Proposed Guidance do not effectively recognize the day-to-day realities of customer information security and suggest an overly rigid approach that is likely to be both inefficient and harmful. In particular, a more balanced and flexible approach is needed to allow financial institutions to develop and implement effective and efficient fraud prevention measures, consistent with their overall security procedures and business operations.

Visa believes that the appropriate response to a security breach affecting customer information depends on the specific factors of that breach, including the information accessed, the extent to which the interloper who accessed the information has had an opportunity to use or further disclose the information for illicit purposes, and the tools available to both the financial institution and its customers to identify and address the illicit use of customer information. In addition, an appropriate response must balance the risks of illicit use of the information affected, against the risks that the response itself may lead to customer cost and inconvenience that are actually greater than the risk of illicit use of the information under the circumstances.

The latter issue has particular significance when determining whether customer notification is appropriate following any particular security breach. Implicit in the concept of customer notification is the idea that a customer receiving that notification can take steps to protect himself or herself against identity theft or other fraud. Customer scrutiny of billing statements for unauthorized transactions, the ability to close fraudulently established accounts, the ability of customers to place fraud alerts on their files at consumer reporting agencies, and the ability of customers to review their consumer reporting agency files are all important steps in preventing identity theft and other fraud. However, in the context of payment card accounts--both credit card and debit card accounts--these steps serve merely as backstops to the far more sophisticated fraud detection systems currently in place for both existing and new accounts, including the Visa cardholder account fraud detection systems and the customer identification requirements mandated by Section 326 of the USA PATRIOT Act ("Section 326"). Moreover, while scrutiny of billing statements should be routine, the closing of accounts, the placing of fraud alerts, and the review of files at consumer reporting agencies involve costs and inconvenience for both the customer and the marketplace as a whole. For example, closed accounts must be replaced, fraud alerts may impede future transactions, and repeated access to consumer reporting agency files is costly. Moreover, a proliferation of fraud alerts that are not related to actual fraud can actually dilute the effectiveness of fraud alert programs, since a series of false positives makes it more difficult to identify real fraud, potentially making identity theft easier rather than harder.

Given these considerations, Visa believes that an appropriate response to a security breach should involve a three-step process. First, an assessment of the fraud risks associated with the particular breach, second, an assessment of the tools available to address those risks, and third, an assessment of whether and the extent to which customer participation is likely to be an important element of controlling those risks; in other words, the utilization of a risk-based model for customer notification. In addition, any consideration of the appropriateness of customer notification must include consideration of the content of the notice and the advice to be given to the customer. While the Proposed Guidance generally recognizes these three steps, Visa believes that the structure and language of the Proposed Guidance could be improved significantly in order to reduce the likelihood that the Guidance will cause institutions to react to security breaches inappropriately.

In order to put these steps in perspective, for example, it is important to understand the fraud prevention systems that are already in place with respect to Visa payment cards. In this regard, Visa, and its card-issuing members, already implement internal procedures that parallel the Proposed Guidance's provision regarding the monitoring of affected accounts for unusual or suspicious activity. These procedures include sophisticated neural networks that flag unusual spending patterns for fraud, and block the authorization of transactions where fraud is suspected. In addition, financial institutions, particularly card issuers, use increasingly sophisticated customer identification procedures in connection with account openings, as required by Section 326.

Visa has long recognized the importance of strict internal procedures to protect the customer information of Visa's members, thereby protecting the integrity of the Visa system. As a result, Visa is currently implementing a comprehensive and aggressive customer information security program known as the Cardholder Information Security Plan ("CISP"). This security program applies to all entities that store, process, transmit, or hold Visa cardholder data. CISP was developed, and is already being used, to ensure that the customer information of Visa's members is kept protected and confidential. As a part of CISP, Visa requires that all participating entities comply with the "Visa Digital Dozen"-twelve basic requirements for safeguarding accounts. These include: (1) install and maintain a working network firewall to protect data; (2) keep security patches up-to-date; (3) protect stored data; (4) encrypt data sent across public networks; (5) use and regularly update anti-virus software; (6) restrict access to data by "need-to-know;" (7) assign a unique ID to each person with computer access; (8) do not use vendor-supplied defaults for system passwords and security parameters; (9) track all access to data by unique ID; (10) regularly test security systems and processes; (11) implement and maintain an overall information security policy; and (12) restrict physical access to data. These requirements are enforced by a mandate that Visa approved third-party firms conduct independent data security audits.

Notification to Regulatory and Law Enforcement Agencies

The Proposed Guidance states that a financial institution should "notify its primary [f]ederal regulator when it becomes aware of an incident involving unauthorized access to or use of customer information that could result in substantial harm or inconvenience to its customers." 2 Visa believes, however, that too broad of a notification requirement may be counterproductive. As the Agencies can appreciate from their own experience dealing with confidential information, the situations where there is "some potential for harmful results" far exceeds those situations where there is a significant likelihood that information will, in fact, be misused, let alone where there is some evidence that such information has actually been misused.

In this regard, Visa believes that among the most important tools shared between financial institutions and their service providers in the fight against customer information theft is free and open disclosure. Financial institutions typically require service providers to fully disclose information relating to any breach in security resulting in an unauthorized access to, or use of, the financial institution's customer information. However, Visa believes that a regulatory response program that unnecessarily mandates notification of customers and other entities, such as law enforcement and regulatory agencies, of security breaches, or that requires other steps such as securing or monitoring accounts when the breach does not rise to an appropriate threat level, will tend to discourage service providers from disclosing security breaches because of potential liability concerns and reputational risk.

As a result, Visa believes that in order to facilitate free and open disclosure between financial institutions and service providers, all unnecessary responses, including notifications to customers, law enforcement agencies, and regulatory agencies, should be avoided. Accordingly, Visa recommends that the notification provision in the Proposed Guidance be narrowed to situations where substantial harm to customers has occurred, or is at least likely to occur, instead of merely possible. In this regard, it is important to recognize that the Visa system provides for zero liability for unauthorized customer transactions, thereby significantly limiting the potential harm to Visa cardholders from fraud, including identity theft. Thus, financial institutions employing such a zero liability policy should be afforded the flexibility of not taking significant actions that they believe will adversely affect their customers, unless they determine that those customers are likely to suffer actual harm.

Corrective Measures

Flagging Accounts

The Proposed Guidance states that financial institutions should immediately begin identifying and monitoring the accounts of customers whose information MAY have been accessed or misused.3 Like the use of the term "could" with respect to notification of regulatory and law enforcement agencies discussed above, Visa believes that the proposed "may" language regarding the flagging of accounts is unclear and overbroad. It is unclear from the Proposed Guidance's use of the term "may" exactly what constitutes a triggering event and how long such "flagging" should last. Accordingly, Visa believes that the use of the word "may" will result in the unnecessary flagging of accounts in situations where it is unlikely that any customer harm will result. Moreover, unlike customer notification, which would be required under the Proposed Guidance after a security breach of sensitive customer information, flagging would be required after a security breach of any customer information-significantly increasing the instances where special monitoring is unnecessarily required.

Moreover, Visa believes that the decision to flag accounts and the nature of that "flag" should be left to individual financial institutions' risk-based procedures, particularly where fraud monitoring systems are already in place. As noted above, Visa and its members already routinely monitor account activity for fraud. Visa believes that this risk-based approach would protect accounts when there is a true threat of fraud from a customer information security breach, instead of the repetitive and unnecessary flagging that is suggested by the language of the Proposed Guidance.

Securing Accounts

The Proposed Guidance states that "[w]hen a checking, savings, or other deposit account number, debit, or credit card account number, personal identification number [PIN], password, or other unique identifier has been accessed or misused, the financial institution should secure the account, and all other accounts and bank services that can be accessed using the same account number or name and password combination until such time as the financial institution and the customer agree on a course of action."4 Again, given the Proposed Guidance's language, the precise meaning of "secure accounts," is unclear. In some cases, for example, it may be possible to keep an account open and block transactions on the account that present greater risk, such as those where the customer is not present, until the concern over potential unauthorized use of the account is dispelled. As a practical matter, if accounts are only required to be secured when there is a substantial risk of fraud, it may be simpler to close the account. If securing an account means closing the account, or blocking its use in all situations, the adverse effects on customers will be substantial. Moreover, closing of customer accounts should only be done when the risks of fraud are clear and substantial.

The Proposed Guidance suggests that anytime the requisite information is accessed, an account must be secured. Although Visa supports the closing of accounts when there is material evidence of fraud, the Proposed Guidance could be read to require such a response even where a financial institution reasonably concludes that the potential for fraud or information misuse can be addressed effectively by other means, such as the neural networks described above. Visa believes that the better approach with respect to closing accounts lies with a risk-based model that permits the financial institution the flexibility to determine when and how an account should be closed, or even secured, by weighing the severity and likelihood of harm that a security breach is anticipated to cause. On the contrary, requiring that account(s) be closed in non-threatening situations until the customers and the financial institution can agree on a course of action will only result in inefficiency and the unnecessary burdening of the customers with the hardships and costs associated with replacing accounts. As in the case of other corrective measures, the decision to close accounts should be left to the individual financial institution and, where notification to the customer is appropriate, the customer.

Customer Notification and Internal Fraud Procedures

The Proposed Guidance also states that a financial institution should "notify affected customers whenever it becomes aware of unauthorized access to sensitive customer information unless the institution, after an appropriate investigation, reasonably concludes that misuse of the information is unlikely to occur and takes appropriate steps to safeguard the interests of affected customers, including by monitoring affected customers' accounts for unusual or suspicious activity."5 Generally, Visa supports the concept of customer notification in appropriate circumstances pursuant to risk-based procedures, as described in this letter. Visa also supports the Proposed Guidance to the extent it would allow financial institutions the flexibility of first performing appropriate investigations into security breaches to ascertain potential customer impact before any decision is made to notify affected customers. Nevertheless, there are significant issues with the proposed customer notification language that should be addressed.

Visa believes that, given the uncertainty and potential breadth of the proposed language regarding customer notification, the Proposed Guidance could trigger the customer notification provision in an unpredictable manner resulting in unnecessary notifications. While the proposed language permits a financial institution to forego notification if, after a reasonable investigation, the institution concludes that fraud or information misuse is unlikely to occur, it is not clear given the language of the Proposed Guidance what constitutes a security breach likely to create significant fraud risks. As a result, the Proposed Guidance is likely to cause unnecessary customer notifications, which will lead to needless customer concern and inconvenience, and eventually will blunt the effectiveness of such notices because of their frequent use in non-threatening situations.

Moreover, the Proposed Guidance's statement, that notification is required "whenever [the financial institution] becomes aware of unauthorized access to sensitive customer information," 6 further increases the risk of unnecessary notifications. Because of the short time period between discovery of a security breach, and the deadline set by the Proposed Guidance for customer notification, it is likely that customer notifications will be required before an appropriate investigation can take place. As a result, this statement is at odds with the Proposed Guidance's statement that a financial institution may avoid customer notification, if after a reasonable investigation, it determines that no threat of information misuse is likely to occur. Therefore, the statement requiring that customer notification take place "whenever [the financial institution] becomes aware of unauthorized access," should be removed to make it clear that financial institutions may conduct reasonable investigations to determine whether or not customer notification is necessary.

In the event that customer notification does become necessary, the Proposed Guidance may unnecessarily limit the options available to financial institutions for notification delivery. For example, the Proposed Guidance states that if a financial institution is able to pinpoint individual accounts affected by a security breach, individual notifications to affected customers will suffice. However, if the financial institution is unable to determine precisely what customers are affected, the Proposed Guidance states that the financial institution should "notify each customer in groups likely to have been affected." 7 First, individual customer notification where there is no evidence regarding which customers may have been affected should be avoided at all costs, since it advises the customer that he or she may be the victim of fraud when there is no evidence that this statement is accurate. In addition, although the Proposed Guidance states that financial institutions may make notification deliveries "in any manner that will ensure that the customer is likely to receive it," 8 the only notification delivery methods mentioned are phone, conventional mail, and electronic notice. Instead, the rules for mass customer notification should provide flexibility for the financial institution to notify customers either by the traditional methods enumerated in the Proposed Guidance, or, when timely notice or economic restraints are an issue, by substitute methods. For example, if a financial institution determines that a security breach warrants mass customer notification, the financial institution should be permitted to utilize alternative notification methods, such as Internet Web site notification, and notification through national media outlets. Moreover, such notification should be required only where a reasonable investigation actually reveals a threat that the customer needs to address with proper safety measures, and those measures should be consistent with the evidence.

In addition, in determining when customer notification is necessary, the Proposed Guidance appears to exceed the scope of the existing guidelines establishing standards for safeguarding customer information. The Proposed Guidance explains that notice would be required whenever there has been unauthorized access to sensitive customer information unless an appropriate investigation by the financial institution reasonably concludes that misuse of the information is unlikely to occur. Sensitive customer information is defined as certain account related information such as an account number or a PIN number in conjunction with certain identifying information including address. 9 Instead, sensitive customer information should only include nonpublic personal information as defined in the rules implementing the privacy provisions of Title V of the Gramm-Leach-Bliley Act. For example, a four digit number, that may be a PIN number, coupled with an address, without further information, does not constitute nonpublic personal information, nor should it pose a significant threat of identity theft.

Furthermore, given the complex nature of customer notification under the Proposed Guidance, the Agencies attempt to clarify what constitutes a triggering event by providing several examples to illustrate when customer notification is necessary and when it is not. However, consistent with a risk-based approach to customer notification, these illustrations of appropriate triggering events are too broad and should be narrowed in scope. For example, the first illustration concludes that customer notification should take place when "[a]n employee of the institution has obtained unauthorized access to sensitive customer information maintained in either paper or electronic form.10  While this example would cover a situation where an employee actually obtains unauthorized access to customer information for illicit purposes, the example also could be read to include other non-threatening or less threatening situations, such as where an employee gains access to the general area where customer information is stored, but not access to the information itself, or where there is no reasonable evidence to suggest that the employee was acting in furtherance of an illicit purpose. While a financial institution should be expected to investigate each situation where an employee gains unauthorized access to customer information under suspicious circumstances, investigations and notifications based simply upon "access," with no indication of wrongdoing or wrongful intent, would unduly burden financial institutions. Therefore, the example should be clarified to reflect a flexible risk-based model of investigation and customer notification, allowing the financial institution the flexibility to determine the proper scope of investigation and the proper level of threat that justifies customer notification.

Visa strongly supports customer notification, combined with monitoring of affected accounts for unusual activity, whenever unauthorized access to customer information results in a significant recognizable threat that suggests the need for customer action. However, for situations that involve unauthorized access to customer information, but which do not indicate a significant risk that customer information will be the subject of fraud or misuse, notification of customers should not be required. Instead, the institution should be permitted to monitor the affected customer accounts for the period of time and to the extent warranted by the particular circumstances. This approach is consistent with the Proposed Guidance's direction that no customer notification is necessary when sensitive customer information misuse is unlikely to occur, while still retaining a balance between customer information security and unnecessary and potentially harmful customer notification. In this regard, for example, when a financial institution participates in a payment system, like the Visa payment system, that has a program designed to identify and prevent fraud, and where the liability of individual customers for unauthorized transactions is limited, no notice should be required in conjunction with a security breach of customer information unless there is actual evidence that the personal information obtained is being used for purposes of fraud.

In preparing the final rules on this subject, it is also important for the Agencies to recognize that financial institutions are already aggressively implementing their own monitoring systems to deter fraud and identity theft and, thus, are already in a position to determine the level of response appropriate for each individual security breach through existing risk-based procedures. As a result, the imposition of inflexible notification and monitoring rules will only hamper security response programs by removing the flexibility and effectiveness of the risk-based security response programs described above.

In conclusion, Visa appreciates the opportunity to comment on this very important topic. If you have any questions concerning these comments, or if we may otherwise be of assistance in connection with this matter, please do not hesitate to contact me at (415) 932-2178.

Sincerely,
Russell W. Schrader
Senior Vice President
and Assistant General Counsel
VISA, U.S.A., Inc.
San Francisco, CA

_______________________________

1
Visa U.S.A. is a membership organization comprised of U.S. financial institutions licensed to use the Visa service marks in connection with payment systems.
2  
68 Fed. Reg 47,954,47,959 (Aug. 12, 2003).
3
  Id.
4
  Id.
5
68 Fed. Reg. 47,954,47,960 (Aug. 12, 2003).
6
Id.
7 68 Fed. Reg. 47,954,47,959 (Aug. 12, 2003).
8
Id.
9
68 Fed. Reg. 47,954,47,960 (Aug. 12, 2003).
10
Id.
 

Last Updated 10/09/2003 regs@fdic.gov

Skip Footer back to content