Skip to main content
U.S. flag
An official website of the United States government
Dot gov
The .gov means it’s official. 
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.
Https
The site is secure. 
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

FIL-43-2000 Attachment

[Federal Register: June 26, 2000 (Volume 65, Number 123)]
[Proposed Rules]               
[Page 39471-39489]
From the Federal Register Online via GPO Access [wais.access.gpo.gov]
[DOCID:fr26jn00-21]                        


[[Page 39471]]

-----------------------------------------------------------------------

Part II

Department of the Treasury
-----------------------------------------------------------------------

 

Office of the Comptroller of the Currency

 

Office of Thrift Supervision

 

-----------------------------------------------------------------------
Federal Reserve System

Federal Deposit Insurance Corporation
-----------------------------------------------------------------------

 

12 CFR Parts 30, 208, et al.

 

Interagency Guidelines Establishing Standards for Safeguarding Customer 
Information and Rescission of Year 2000 Standards for Safety and 
Soundness; Proposed Rule


[[Page 39472]]


-----------------------------------------------------------------------

DEPARTMENT OF THE TREASURY

Office of the Comptroller of the Currency

12 CFR Part 30

[Docket No. 00-13]
RIN 1557-AB84

FEDERAL RESERVE SYSTEM

12 CFR Parts 208, 211, 225, and 263

[Docket No. R-1073]

FEDERAL DEPOSIT INSURANCE CORPORATION

12 CFR Parts 308 and 364

RIN 3064-AC39

DEPARTMENT OF THE TREASURY

Office of Thrift Supervision

12 CFR Parts 568 and 570

[Docket No. 2000-51]
RIN 1550-AB36


Interagency Guidelines Establishing Standards for Safeguarding 
Customer Information and Rescission of Year 2000 Standards for Safety 
and Soundness

AGENCIES: The Office of the Comptroller of the Currency, Treasury; 
Board of Governors of the Federal Reserve System; Federal Deposit 
Insurance Corporation; and Office of Thrift Supervision, Treasury.

ACTION: Joint notice of proposed rule making.

-----------------------------------------------------------------------

SUMMARY: The Office of the Comptroller of the Currency, Board of 
Governors of the Federal Reserve System, Federal Deposit Insurance 
Corporation, and Office of Thrift Supervision, (collectively, the 
Agencies) are requesting comment on proposed Guidelines establishing 
standards for safeguarding customer information published to implement 
sections 501 and 505(b) of the Gramm-Leach-Bliley Act (the G-L-B Act or 
Act).
   Section 501 of the G-L-B Act requires the Agencies to establish 
appropriate standards for the financial institutions subject to their 
respective jurisdictions relating to administrative, technical, and 
physical safeguards for customer records and information. These 
safeguards are intended to: Insure the security and confidentiality of 
customer records and information; protect against any anticipated 
threats or hazards to the security or integrity of such records; and 
protect against unauthorized access to or use of such records or 
information that could result in substantial harm or inconvenience to 
any customer. The Agencies are to implement these standards in the same 
manner, to the extent practicable, as standards prescribed pursuant to 
section 39(a) of the Federal Deposit Insurance Act (FDI Act). The 
proposed Guidelines implement the requirements of the G-L-B Act.
   The Agencies previously issued guidelines establishing Year 2000 
safety and soundness standards for insured depository institutions 
pursuant to section 39 of the FDI Act. Since the events for which these 
guidelines were issued have passed, the Agencies have concluded that 
the guidelines are no longer necessary and propose to rescind the 
guidelines as part of this rulemaking.

DATES: Comments must be received not later than August 25, 2000.

ADDRESSES: Comments should be directed to: Office of the Comptroller of 
the Currency (OCC): Communications Division, Office of the Comptroller 
of the Currency, 250 E Street, SW., Third Floor, Washington, DC 20219, 
Attention: Docket No. 00-13; Fax number (202) 874-5274 or Internet 
address: regs.comments@occ.treas.gov. Comments may be inspected and 
photocopied at the OCC's Public Reference Room, 250 E Street, SW., 
Washington, D.C., between 9:00 a.m. and 5:00 p.m. on business days. You 
can make an appointment to inspect the comments by calling (202) 874-
5043.
   Board of Governors of the Federal Reserve System (Board): Comments, 
which should refer to Docket No. R-1073, may be mailed to Ms. Jennifer 
J. Johnson, Secretary, Board of Governors of the Federal Reserve 
System, 20th and C Streets, NW, Washington, DC 20551 or mailed 
electronically to regs.comments@federalreserve.gov. Comments addressed 
to Ms. Johnson also may be delivered to the Board's mail room between 
8:45 a.m. and 5:15 p.m. and to the security control room outside of 
those hours. Both the mail room and the security control room are 
accessible from the courtyard entrance on 20th Street between 
Constitution Avenue and C Street, NW. Comments may be inspected in Room 
MP-500 between 9 a.m. and 5 p.m., pursuant to Sec. 261.12, except as 
provided in Sec. 261.14, of the Board's Rules Regarding the 
Availability of Information, 12 CFR 261.12 and 261.14.
   Federal Deposit Insurance Corporation (FDIC): Send written comments 
to Robert E. Feldman, Executive Secretary, Attention: Comments/OES, 
Federal Deposit Insurance Corporation, 550 17th Street, NW., 
Washington, DC 20429. Comments also may be mailed electronically to 
comments@fdic.gov. Comments may be hand delivered to the guard station 
at the rear of the 17th Street building (located on F Street) on 
business days between 7 a.m. and 5 p.m.; Fax number (202) 898-3838. 
Comments may be inspected and photocopied in the FDIC Public 
Information Center, Room 100, 801 17th Street, NW., Washington, DC 
20429, between 9 a.m. and 5:00 p.m. on business days.
   Office of Thrift Supervision (OTS): Send comments to Manager, 
Dissemination Branch, Information Management & Services Division, 
Office of Thrift Supervision, 1700 G Street, NW., lower level from 9:00 
a.m. to 5:00 p.m. on business days. Send facsimile transmissions to Fax 
number (202) 906-7755 or (202) 906-6956 (if the comment is over 25 
pages). Send email to public.info@ots.treas.gov and include your name 
and telephone number. Interested persons may inspect comments at 1700 G 
Street, NW., from 9 a.m. until 4 p.m. on Tuesdays and Thursdays.

FOR FURTHER INFORMATION CONTACT:
   OCC: Mark Tenhundfeld, Assistant Director, Legislative and 
Regulatory Activities Division, (202) 874-5090; John Carlson, Acting 
Deputy Director for Bank Technology, (202) 874-5013; Deborah Katz, 
Senior Attorney, Legislative and Regulatory Activities Division, (202) 
874-5090; or Jeffery Abrahamson, Attorney, Legislative and Regulatory 
Activities Division, (202) 874-5090.
   Board: Heidi Richards, Manager, Division of Banking Supervision and 
Regulation, (202) 452-2598; or Stephanie Martin, Managing Senior 
Counsel, Legal Division, (202) 452-3198.
   For the hearing impaired only, contact Janice Simms, 
Telecommunication Device for the Deaf (TDD) (202) 452-3544, Board of 
Governors of the Federal Reserve System, 20th and C Streets, NW., 
Washington, DC 20551.
   FDIC: Thomas J. Tuzinski, Review Examiner, Division of Supervision, 
(202) 898-6748; Jeffrey M. Kopchik, Senior Policy Analyst, Division of 
Supervision, (202) 898-3872; or Robert A. Patrick, Counsel, Legal 
Division, (202) 898-3757.
   OTS: Paul R. Reymann, Senior Project Manager, Technology Risk 
Management, (202) 906-5645; or Christine Harrington, Counsel, Banking 
and Finance,

[[Page 39473]]

Regulations and Legislation Division, (202) 906-7957.

SUPPLEMENTARY INFORMATION: The contents of this preamble are listed in 
the following outline:

I. Background
II. Section-by-Section Analysis
III. Regulatory Analysis
   A. Paperwork Reduction Act
   B. Regulatory Flexibility Act
   C. Executive Order 12866
   D. Unfunded Mandates Act of 1995
IV. Solicitation of Comments on Use of Plain Language

I. Background

   On November 12, 1999, President Clinton signed the G-L-B Act (Pub. 
L. 106-102) into law. Section 501, entitled Protection of Nonpublic 
Personal Information, requires the Agencies and the Securities and 
Exchange Commission, the National Credit Union Administration, and the 
Federal Trade Commission to establish appropriate standards for the 
financial institutions subject to their respective jurisdictions 
relating to the administrative, technical, and physical safeguards for 
customer records and information. These safeguards are intended to: (1) 
Insure the security and confidentiality of customer records and 
information; (2) protect against any anticipated threats or hazards to 
the security or integrity of such records; and (3) protect against 
unauthorized access to or use of such records or information that would 
result in substantial harm or inconvenience to any customer.
   Section 505(b) of the G-L-B Act provides that these standards are 
to be implemented by the Agencies in the same manner, to the extent 
practicable, as standards prescribed pursuant to section 39(a) of the 
FDI Act.\1\ Section 39(a) of the FDI Act authorizes the Agencies to 
establish operational and managerial standards for insured depository 
institutions relative to, among other things, internal controls, 
information systems, and internal audit systems, as well as such other 
operational and managerial standards as the Agencies determine to be 
appropriate. These standards may be issued as guidelines or 
regulations. While this proposal is in the form of guidelines, the 
Agencies solicit comment on whether the final standards should be 
issued in the form of guidelines or as regulations.\2\
---------------------------------------------------------------------------

   \1\ Section 39 applies only to insured depository institutions, 
including insured branches of foreign banks. The Guidelines, 
however, will also apply to certain uninsured institutions, such as 
bank holding companies, certain nonbank subsidiaries of bank holding 
companies and insured depository institutions, and uninsured 
branches and agencies of foreign banks. See section 501 and 505(b) 
of the G-L-B Act.
   \2\ The OTS proposes to place its information security 
guidelines in Appendix B to 12 CFR part 570, with the provisions 
implementing section 39 of the FDI Act. At the same time, the OTS 
proposes a regulatory requirement that the institutions the OTS 
regulates comply with the proposed guidelines. Because information 
security guidelines are similar to physical security procedures, the 
OTS proposes including a provision in 12 CFR part 568, which covers 
primarily physical security procedures, requiring compliance with 
the guidelines in Appendix B to part 570.
---------------------------------------------------------------------------

   The proposed Guidelines apply to ``nonpublic personal information'' 
of ``customers'' as those terms are defined in the Agencies' privacy 
rules published in accordance with Title V of the G-L-B Act (the 
Privacy Rule). See Privacy of Consumer Financial Information, 65 FR 
35162 (June 1, 2000).\3\ Under section 503(b)(3) of the G-L-B Act and 
the Privacy Rule, financial institutions will be required to disclose 
their policies and practices with respect to protecting the 
confidentiality, security, and integrity of nonpublic personal 
information as part of the initial and annual notices to their 
customers. Key components of the proposed Guidelines were derived from 
security-related supervisory guidance previously issued by the Agencies 
and the Federal Financial Institutions Examination Council (FFIEC).
---------------------------------------------------------------------------

   \3\ Where the Supplementary Information refers to a section of 
the Privacy Rule, it will preface the common section number with 
``__'', as each Agency has a different part number.
---------------------------------------------------------------------------

   The texts of the Agencies' proposed Guidelines are substantively 
identical. The Agencies request comment on all aspects of the proposed 
Guidelines as well as comment on the specific provisions and issues 
highlighted in the section-by-section analysis below. Those commenters 
who believe that the proposed Guidelines would impose undue burdens on 
financial institutions should identify which parts of the Guidelines 
they believe impose excessive burdens and describe the burdens. Those 
commenters should also discuss either: (1) Alternative methods that 
would accomplish the same purpose; or (2) why the intended purpose is 
unnecessary or should be modified.
   The Agencies also seek comments on the impact of this proposal on 
community banks. The Agencies recognize that community banks operate 
with more limited resources than larger institutions and may present a 
different risk profile. Thus, in addition to reviewing comments, each 
Agency will endeavor to assess the potential impact and burden that the 
proposal may impose on community banks during the comment period. The 
Agencies also specifically request comment on the impact of this 
proposal on community banks' current resources and available personnel 
with the requisite expertise. Commenters should discuss whether (1) The 
standards are reasonable and realistic for community banks, and (2) 
whether the goals of the proposed regulation could be achieved, for 
community banks, through an alternative approach. Based on the comments 
received, the Agencies will consider whether there is a need to develop 
a compliance guide for community banks and other smaller institutions 
in conjunction with the final Guidelines.
   As proposed, the Guidelines will appear as an appendix to each 
Agency's Standards for Safety and Soundness. For the OCC those 
regulations appear at 12 CFR part 30; for the Board at 12 CFR part 208; 
for the FDIC at 12 CFR part 364; and for the OTS at 12 CFR part 570. 
The Board is also amending 12 CFR parts 211 and 225 to apply the 
Guidelines to other institutions that it supervises.
   The Agencies will apply the rules already in place to require the 
submission of a compliance plan in appropriate circumstances. For the 
OCC those regulations appear at 12 CFR part 30; for the Board at 12 CFR 
part 263; for the FDIC at 12 CFR part 308, subpart R; and for the OTS 
at 12 CFR part 570. This proposal makes conforming changes to the 
regulatory text of these parts.
   Rescission of Year 2000 Standards for Safety and Soundness. The 
Agencies previously issued guidelines establishing Year 2000 safety and 
soundness standards for insured depository institutions pursuant to 
section 39 of the FDI Act. Because the events for which these 
guidelines were issued have passed, the Agencies have concluded that 
the guidelines are no longer necessary and propose to rescind the 
guidelines as part of this rulemaking. These guidelines appear for the 
OCC at 12 CFR part 30, appendix B and C; for the Board at 12 CFR part 
208, appendix D-2; for the FDIC at 12 CFR part 364, appendix B; and for 
the OTS at 12 CFR part 570, appendix B. The Agencies request comment on 
whether the rescission of these appendices is appropriate.

II. Section-by-Section Analysis

   The discussion that follows applies to each of the Agencies' 
proposed Guidelines.

[[Page 39474]]

Appendix __ to Part __--Interagency Guidelines Establishing 
Standards for Safeguarding Customer Information

I. Introduction

   Proposed paragraph I. sets forth the general purpose of the 
proposed Guidelines, which is to provide guidance to each financial 
institution in establishing and implementing administrative, technical, 
and physical safeguards to protect the security, confidentiality, and 
integrity of customer information. This paragraph also sets forth the 
statutory authority for the proposed Guidelines, including section 
39(a) of the FDI Act (12 U.S.C. 1831p-1) and sections 501 and 505(b) of 
the G-L-B Act (15 U.S.C. 6801 and 6805(b) ).

I.A. Scope

   Paragraph I.A. describes the scope of the proposed Guidelines. Each 
Agency defines specifically those entities within its particular scope 
of coverage in this paragraph of the proposed Guidelines. \4\
---------------------------------------------------------------------------

   \4\ While the OTS generally regulates savings and loan holding 
companies under the Home Owners Loan Act (12 U.S.C. 1461 et seq.), a 
different Federal functional regulator, a state insurance authority, 
or the Federal Trade Commission may establish standards for 
safeguarding customer information as to that holding company under 
section 505 of the G-L-B Act, depending on the nature of the holding 
company's activities.
---------------------------------------------------------------------------

I.B. Preservation of Existing Authority

   Paragraph I.B. makes clear that in issuing these proposed 
Guidelines none of the Agencies is, in any way, limiting its authority 
to address any unsafe or unsound practice, violation of law, unsafe or 
unsound condition, or other practice, including any condition or 
practice related to safeguarding customer information. Any action taken 
by any Agency under section 39(a) of the FDI Act and these Guidelines 
may be taken independently of, in conjunction with, or in addition to 
any other enforcement action available to the Agency.

I.C. Definitions

   Paragraph I.C. sets forth the definitions of various terms for 
purposes of the proposed Guidelines. \5\
---------------------------------------------------------------------------

   \5\ In addition to the definitions discussed below, the Board's 
guidelines in 12 CFR parts 208 and 225 contain a definition of 
``subsidiary,'' which describes the state member bank and bank 
holding company subsidiaries that are subject to the Guidelines.
---------------------------------------------------------------------------

I.C.1. In General
   Paragraph I.C.1. provides that terms used in the proposed 
Guidelines have the same meanings as set forth in sections 3 and 39(a) 
of the FDI Act (12 U.S.C. 1813 and 1831p-1), except to the extent that 
the definition of the term is modified in the proposed Guidelines or 
where the context requires otherwise.
I.C.2. Customer Information
   Proposed paragraph I.C.2. defines customer information. Customer 
information includes any records, data, files, or other information 
containing nonpublic personal information, as defined in section 
__.3(n) of the Privacy Rule, about a customer. This includes records in 
paper, electronic, or any other form that are within the control of a 
financial institution or that are maintained by any service provider on 
behalf of an institution. Although the G-L-B Act uses both the terms 
``records'' and ``information,'' for the sake of simplicity, in the 
proposed Guidelines the term ``customer information'' encompasses all 
customer records.
   Section 501(b) refers to safeguarding the security and 
confidentiality of ``customer'' information. The term ``customer'' is 
also used in other sections of Title V of the G-L-B Act and has been 
defined by the Agencies in the Privacy Rule interpreting these sections 
to include those consumers who have a customer relationship with the 
institution. This term does not cover business customers, or consumers 
who have not established an ongoing relationship with a financial 
institution (e.g. those that merely use an institution's ATM or apply 
for a loan). See sections __.3(h) and (i) of the Privacy Rule.
   The Agencies propose defining ``customer'' for purposes of the 
Guidelines consistently with the Privacy Rule. However, the Agencies 
have considered whether the scope of the Guidelines should apply to 
records regarding all consumers, the institution's consumer and 
business clients, or all of an institution's records. The Agencies 
solicit comment on whether a broader definition would change the 
information security program that an institution would implement, or, 
whether, as a practical matter, institutions would respond to the 
Guidelines by implementing an information security program for all 
types of records under their control rather than segregating 
``customer'' records for special treatment.
I.C.3. Customer
   Proposed paragraph I.C.3. defines customer. Customer would include 
any customer of an institution as defined in section __.3(h) of the 
Privacy Rule. A customer is a consumer who has established a continuing 
relationship with an institution under which the institution provides 
one or more financial products or services to the consumer to be used 
primarily for personal, family or household purposes.
I.C.4. Service Provider
   Proposed paragraph I.C.4. defines a service provider as any person 
or entity that maintains or processes customer information on behalf of 
an institution, or is otherwise granted access to customer information 
through its provision of services to an institution.
I.C.5. Board of Directors
   Proposed paragraph I.C.5. defines board of directors to mean, in 
the case of a branch or agency of a foreign bank, the managing official 
in charge of the branch or agency. \6\
---------------------------------------------------------------------------

   \6\ The OTS version of the guidelines does not include this 
definition because the OTS does not regulate foreign institutions. 
Section I of the OTS guidelines has been renumbered accordingly.
---------------------------------------------------------------------------

I.C.6. Customer Information System
   Proposed paragraph I.C.6. defines customer information system to be 
electronic or physical methods used to access, collect, store, use, 
transmit and protect customer information.

II. Standards for Safeguarding Customer Information

II.A. Information Security Program

   The proposed Guidelines describe the Agencies' expectations for the 
creation, implementation, and maintenance of an information security 
program. This program must include administrative, technical, and 
physical safeguards appropriate to the size and complexity of the 
institution and the nature and scope of its activities. The proposed 
Guidelines describe the oversight role of the board of directors in 
this process and management's continuing duty to evaluate and report to 
the board on the overall status of this program. The four steps in this 
process require an institution to: (1) Identify and assess the risks 
that may threaten customer information; (2) develop a written plan 
containing policies and procedures to manage and control these risks; 
(3) implement and test the plan; and (4) adjust the plan on a 
continuing basis to account for changes in technology, the sensitivity 
of customer information, and internal or external threats to 
information security. The proposed Guidelines also set forth an 
institution's responsibility for overseeing outsourcing arrangements.

II.B. Objectives

   Proposed paragraph II.B. describes the objectives for an 
information security program to ensure the security and

[[Page 39475]]

confidentiality of customer information, protect against any 
anticipated threats or hazards to the security or integrity of such 
information, and protect against unauthorized access to or use of 
customer information that could either: (1) Result in substantial harm 
or inconvenience to any customer; or (2) present a safety and soundness 
risk to the institution. For purposes of the Guidelines, unauthorized 
access to or use of customer information does not include access to or 
use of customer information with the customer's consent. The Agencies 
request comment on whether there are additional or alternative 
objectives that should be included in the Guidelines.

III. Develop and Implement Information Security Program

III.A. Involve the Board of Directors and Management

   Proposed paragraph III.A. describes the involvement of the board 
and management in the development and implementation of an information 
security program. The board's responsibilities are to: (1) Approve the 
institution's written information security policy and program that 
complies with these Guidelines; and (2) oversee efforts to develop, 
implement, and maintain an effective information security program, 
including the regular review of management reports.
   The three responsibilities for management in the development of an 
information security program are to: (1) Evaluate the impact on the 
institution's security program of changing business arrangements (e.g. 
mergers and acquisitions, alliances and joint ventures, outsourcing 
arrangements), and changes to customer information systems; (2) 
document compliance with these Guidelines; and (3) keep the board 
informed of the current status of the institution's information 
security program, e.g., report to the board on a regular basis on the 
overall status of the information security program, including material 
matters related to: Risk assessment; risk management and control 
decisions; results of testing; attempted or actual security breaches or 
violations and responsive actions taken by management; and any 
recommendations for improvements to the information security program.
   The Agencies specifically invite comment regarding the appropriate 
frequency of reports to the board. Should the Guidelines specify 
reporting intervals--monthly, quarterly, annually? How regularly should 
management report to the board regarding the institution's information 
security program and why are these intervals appropriate? Should the 
Guidelines require that the board designate a Corporate Information 
Security Officer or other responsible individual who would have the 
authority, subject to the board's approval, to develop and administer 
the institution's information security program?

III.B. Assess Risk

   Proposed paragraph III.B. describes the risk assessment process 
that should be developed as part of the information security program in 
order to meet the objectives of the Guidelines. First, a financial 
institution should identify and assess risks that may threaten the 
security, confidentiality, or integrity of customer information, 
whether in storage, processing, or transit. The risk assessment should 
be made in light of an institution's size, scope of operations, and 
technology. Institutions should determine the sensitivity of customer 
information to be protected as part of this analysis.
   Next, a financial institution should conduct an assessment of the 
sufficiency of existing policies, procedures, customer information 
systems, and other arrangements intended to control the risks it has 
identified. Finally, the financial institution should monitor, 
evaluate, and adjust its risk assessment, taking into consideration any 
technological or other changes or the sensitivity of the information.

III.C. Manage and Control Risk

   Proposed paragraph III.C. describes the elements of a comprehensive 
risk management plan designed to control identified risks and to 
achieve the overall objective of ensuring the security and 
confidentiality of customer information. It identifies the factors an 
institution should consider in evaluating the adequacy of its policies 
and procedures to effectively manage these risks commensurate with the 
sensitivity of the information as well as the complexity and scope of 
the institution and its activities. In establishing the policies and 
procedures, each institution should consider appropriate:
   a. Access rights to customer information;
   b. Access controls on customer information systems, including 
controls to authenticate and grant access only to authorized 
individuals and companies;
   c. Access restrictions at locations containing customer 
information, such as buildings, computer facilities, and records 
storage facilities;
   d. Encryption of electronic customer information, including while 
in transit or in storage on networks or systems to which unauthorized 
individuals may have access;
   e. Procedures to confirm that customer information system 
modifications are consistent with the institution's information 
security program;
   f. Dual control procedures, segregation of duties, and employee 
background checks for employees with responsibilities for or access to 
customer information;
   g. Contract provisions and oversight mechanisms to protect the 
security of customer information maintained or processed by service 
providers;
   h. Monitoring systems and procedures to detect actual and attempted 
attacks on or intrusions into customer information systems;
   i. Response programs that specify actions to be taken when 
unauthorized access to customer information systems is suspected or 
detected;
   j. Protection against destruction of customer information due to 
potential physical hazards, such as fire and water damage; and
   k. Response programs to preserve the integrity and security of 
customer information in the event of computer or other technological 
failure, including, where appropriate, reconstructing lost or damaged 
customer information.
   The Agencies intend that these elements accommodate institutions of 
varying sizes, scope of operations, and risk management structures. The 
Agencies invite comment on the degree of detail that should be included 
in the Guidelines regarding the risk management program, which elements 
should be specified in the Guidelines, and any other components of a 
risk management program that should be included.
   The Guidelines also provide that an institution's information 
security program should include a training component designed to teach 
employees to recognize and respond to fraudulent attempts to obtain 
customer information and, where appropriate, to report any attempts to 
regulatory and law enforcement agencies.
   The information security program also should include regular 
testing of systems to confirm that an institution and its service 
providers control identified risks and achieve the objectives to ensure 
the security and confidentiality of customer information. The tests 
should be verified by an independent third party or staff independent 
of those who conducted the test. Tests should be documented.

[[Page 39476]]

The frequency and nature of the testing should be determined by the 
risk assessment and adjusted as necessary to reflect changes in the 
internal and external conditions. The Agencies request comment on 
whether specific types of security tests, such as penetration tests or 
intrusion detections tests, should be required.
   The Agencies invite comment regarding the appropriate degree of 
independence that should be specified in the Guidelines in connection 
with the testing of information security systems and the review of test 
results. Should the tests or reviews of tests be conducted by persons 
who are not employees of the financial institution? If employees may 
conduct the testing or may review test results, what measures, if any, 
are appropriate to assure their independence?
   Finally, the Guidelines describe the need for an ongoing process of 
monitoring, evaluation, and adjustment of the information security 
program in light of any relevant changes in technology, the sensitivity 
of customer information, and internal or external threats to 
information security.

III.D. Oversee Outsourcing Arrangements

   Proposed paragraph III.D. addresses outsourcing. An institution 
should exercise appropriate due diligence in managing and monitoring 
its outsourcing arrangements to confirm that its service providers have 
implemented an effective information security program to protect 
customer information and customer information systems consistent with 
these Guidelines.
   The Agencies welcome comments on the appropriate treatment of 
outsourcing arrangements. For example, are industry best practices 
available regarding effective monitoring of service provider security 
precautions? Do service providers accommodate requests for specific 
contract provisions regarding information security? To the extent that 
service providers do not accommodate these requests, how do financial 
institutions implement effective information security programs? Should 
these Guidelines contain specific contract provisions requiring service 
provider performance standards in connection with the security of 
customer information?

III.E. Implement the Standards

   Proposed paragraph III.E. describes the timing requirements for the 
implementation of these standards. Each financial institution is to 
take appropriate steps to fully implement an information security 
program pursuant to these Guidelines by July 1, 2001.

III. Regulatory Analysis

A. Paperwork Reduction Act

   FDIC: The FDIC has determined that the proposed rule does not 
contain any information collections as defined by the Paperwork 
Reduction Act (44 U.S.C. 3501, et seq.).

B. Regulatory Flexibility Act

   OCC: The Regulatory Flexibility Act (5 U.S.C. 601-612) (RFA) 
requires an agency to either provide an Initial Regulatory Flexibility 
Analysis with a proposed rule or certify that the proposed rule will 
not have a significant economic impact on a substantial number of small 
entities (defined for purposes of the RFA to include banks with less 
than $ 100 million in assets).

A. Reasons for Proposed Rule

   The proposed Guidelines implement section 501(b) of the G-L-B Act. 
Section 501(b) requires the OCC to publish standards for financial 
institutions subject to its jurisdiction relating to administrative, 
technical, and physical standards to: (1) Insure the security and 
confidentiality of customer records and information; (2) protect 
against any anticipated threats or hazards to the security or integrity 
of such records; and (3) protect against unauthorized access to or use 
of such records or information which could result in substantial harm 
or inconvenience to any customer.
   The OCC does not expect that this rule, if adopted, would have the 
threshold impact on small entities. The rule would adopt guidelines 
that are to be implemented by each institution within the OCC's primary 
jurisdiction in a way that is appropriate for that institution. Thus, 
the burden stemming from this rule is likely to be less on small 
institutions. Moreover, institutions regulated by the OCC, regardless 
of size, likely already have in place certain policies and procedures 
that would satisfy at least some of the guidelines. However, the OCC 
invites comment on the burden that likely will result on small 
institutions from this rulemaking, and has prepared the following 
analysis.

B. Statement of Objectives and Legal Basis

   The objectives of the proposed Guidelines are described in the 
Supplementary Information section. The legal bases for the proposed 
rule are 12 U.S.C. 93a, 1818, 1831p-1, and 3102(b), and 15 U.S.C. 6801 
and 6805(b)(1).

C. Description of Small Entities to Which the Rule Will Apply

   The proposed rule would apply to all national banks, Federal 
branches and Federal agencies of foreign banks, and any subsidiaries of 
such entities with assets under $100 million.

D. Projected Reporting, Recordkeeping and Other Compliance Requirements

   The OCC does not believe that the proposed rule imposes any 
reporting or any specific recordkeeping requirements within the meaning 
of the RFA. The proposed rule requires all covered institutions to 
develop an information security program to safeguard customer 
information. An institution must assess risks to customer information, 
establish policies, procedures and training to control risks, test the 
program's effectiveness, and manage and monitor its service providers. 
These requirements will apply to all institutions subject to the OCC's 
jurisdiction, regardless of their size.
   Because the information security program described in the proposed 
Guidelines reflects existing supervisory guidance already issued by the 
OCC and the FFIEC, as well as sound business practices, the OCC 
believes that most institutions already have such a program in place. 
Accordingly, the OCC believes that most covered institutions will 
already have the expertise to develop, implement, and maintain the 
program, including the skills of computer security professionals and 
lawyers. However, some institutions may need to formalize or enhance 
their information security programs. The OCC is concerned about the 
potential impact of the proposed Guidelines on community banks and will 
be reviewing current information security practices at smaller 
institutions. The OCC invites comment on the costs of establishing and 
operating an information security program.

E. Identification of Duplicative, Overlapping, or Conflicting Federal 
Rules

   The OCC is unable to identify any statutes or rules which would 
overlap or conflict with the requirement to develop and implement an 
information security program. The OCC seeks comment and information 
about any such statutes or rules, as well as any other state, local, or 
industry rules or policies that require a covered institution to 
implement business practices that would comply with the requirements of 
the proposed rule.

[[Page 39477]]

F. Discussion of Significant Alternatives

   The G-L-B Act requires that the Agencies issue standards to 
safeguard customer information. However, the G-L-B Act also states that 
the standards should be implemented in the same manner, to the extent 
practicable, as standards issued under section 39(a) of the FDI Act. 
Therefore, the standards have been issued as Guidelines and in a form 
that resembles all of the other standards prescribed by the Agencies 
thus far under section 39(a).
   In addition, the G-L-B Act requires that standards be developed for 
all institutions, without exception. Therefore, the proposed Guidelines 
apply to institutions of all sizes, including those with assets of $100 
million or less. However, the standards in the proposed Guidelines are 
flexible, so that each institution may develop an information security 
program tailored to its size and the nature of its operations. The OCC 
welcomes comment on any significant alternatives, consistent with the 
G-L-B Act, that would minimize the impact on small entities.
   Board: The Regulatory Flexibility Act (5 U.S.C. 601-612) (RFA) 
requires an agency either to publish an initial regulatory flexibility 
analysis with a proposed rule or certify that the proposed rule would 
not have a significant economic impact on a substantial number of small 
entities. The Board cannot at this time determine whether the proposed 
Guidelines would have significant economic impact on a substantial 
number of small entities as defined by the RFA. Therefore, pursuant to 
subsections 603(b) and (c) of the RFA, the Board provides the following 
initial regulatory flexibility analysis.

A. Reasons for Proposed Rule

   The Board is requesting comment on the proposed interagency 
Guidelines published pursuant to section 501 of the G-L-B Act. Section 
501 requires the Agencies to publish standards for financial 
institutions relating to administrative, technical, and physical 
standards to: (1) Insure the security and confidentiality of customer 
records and information; (2) protect against any anticipated threats or 
hazards to the security or integrity of such records; and (3) protect 
against unauthorized access to or use of such records or information 
which could result in substantial harm or inconvenience to any 
customer.

B. Statement of Objectives and Legal Basis

   The objectives of the proposed Guidelines are described in the 
Supplementary Information section above. The legal basis for the 
proposed Guidelines is the G-L-B Act, sections 501 and 505 (15 U.S.C. 
6801 and 6805).

C. Description/Estimate of Small Entities to Which the Rule Applies

   The proposed Guidelines would apply to approximately 9,500 
institutions, including state member banks and certain of their 
subsidiaries, bank holding companies and certain of their subsidiaries, 
state-licensed uninsured branches and agencies of foreign banks, and 
Edge and agreement corporations. The Board estimates that over 4,500 of 
the covered institutions are small institutions with assets less than 
$100 million.

D. Projected Reporting, Recordkeeping and Other Compliance Requirements

   The G-L-B Act and the proposed Guidelines require a covered 
institution to develop an information security program to safeguard 
customer information. The Guidelines will apply to all covered 
institutions regardless of size. Development of an information security 
program involves assessing risks to customer information, establishing 
policies, procedures, and training to control risks, testing the 
program's effectiveness, and managing and monitoring service providers. 
A covered institution may require professional skills to develop an 
information security program, including the skills of computer security 
professionals and lawyers.
   The Board believes that the establishment of information security 
programs is a sound business practice for the covered institutions that 
is already addressed by existing supervisory procedures. Although some 
institutions may need to establish or enhance information security 
programs to comply with the proposed Guidelines, the cost of doing so 
is not known. Neverthless, the Board is concerned about the potential 
impact on community banks and will be reviewing current information 
security practices at smaller institutions during the comment period. 
The Board seeks any information or comment on the costs of establishing 
information security programs as detailed in the proposed Guidelines, 
particularly for smaller institutions. The Board welcomes comment on 
the appropriate level of detail and degree of flexibility in the 
proposed Guidelines and on the potential cost of particular provisions 
in the proposed Guidelines.
   The Board does not believe that there are information collection 
requirements imposed by the proposed Guidelines.

E. Identification of Duplicative, Overlapping, or Conflicting Federal 
Rules

   The Board is unable to identify any statutes or rules which would 
overlap or conflict with the requirement to develop and implement an 
information security program. The Board seeks comment and information 
about any such statutes or rules, as well as any other state, local, or 
industry rules or policies that require a covered institution to 
implement business practices that would overlap or conflict with the 
requirements of the proposed Guidelines.

F. Discussion of Significant Alternatives

   The proposed Guidelines attempt to clarify the statutory 
requirements for all covered entities, including small entities. The 
proposed Guidelines are intended to provide substantial flexibility so 
that any institution, regardless of size, may adopt an information 
security program tailored to its individual needs. Neverthless, the 
Board is concerned about the potential impact on community banks and 
will be reviewing current information security practices at smaller 
institutions during the comment period. The Board seeks comment on 
elements that would be most useful in a Compliance Guide to be issued 
in conjunction with the final Guidelines. In addition, the Board 
welcomes comment on any significant alternatives to the proposed 
Guidelines that would provide adequate guidance regarding expectations 
for compliance with the G-L-B Act. The Board seeks any information or 
comment on cost-effective, sound information security programs and 
practices implemented by financial institutions, including community 
banks.
   FDIC: The Regulatory Flexibility Act (5 U.S.C. 601-612) (RFA) 
requires an agency to publish an initial regulatory flexibility 
analysis with a proposed rule whenever the agency is required to 
publish a general notice of proposed rulemaking for a proposed rule, 
except to the extent provided in the RFA. Pursuant to section 603 of 
the RFA, the FDIC provides the following initial regulatory flexibility 
analysis.

A. Reasons for Proposed Rule

   The FDIC is requesting comment on the proposed interagency 
Guidelines published pursuant to section 501 of the G-L-B Act. Section 
501 requires the Agencies to publish standards for financial 
institutions relating to administrative, technical, and physical 
standards to: (1) Insure the security and confidentiality of customer 
records and information; (2) protect against any

[[Page 39478]]

anticipated threats or hazards to the security or integrity of such 
records; and (3) protect against unauthorized access to or use of such 
records or information which could result in substantial harm or 
inconvenience to any customer. The proposed standards do not represent 
any change in the policies of the FDIC; rather they implement the G-L-B 
Act requirement to provide appropriate standards relating to the 
security and confidentiality of customer records. The FDIC requests 
comment on whether small entities would be required to amend their 
operations in order to comply with the proposed standards and the costs 
for such compliance.

B. Statement of Objectives and Legal Basis

   The SUPPLEMENTARY INFORMATION section above contains this 
information. The legal basis for the proposed rule is the G-L-B Act.

C. Description /Estimate of Small Entities to Which the Rule Applies

   The proposed Guidelines would apply to all FDIC-insured state 
nonmember banks, approximately 3,700 of which are small entities as 
defined by the RFA.

D. Projected Reporting, Recordkeeping and Other Compliance Requirements

   The FDIC does not believe that there are new reporting or 
recordkeeping requirements imposed by the proposed rule as defined by 
the Regulatory Flexibility Act (5 U.S.C. 603). Other compliance 
requirements of the proposed guidelines are applicable to all financial 
institutions subject to the jurisdiction of the FDIC and are discussed 
in the SUPPLEMENTARY INFORMATION section above. The G-L-B Act and the 
proposed Guidelines require all financial institutions subject to the 
jurisdiction of the FDIC to develop an information security program to 
safeguard customer information. The Guidelines will apply to all such 
covered institutions regardless of size. Development of an information 
security program involves assessing risks to customer information, 
establishing policies, procedures, and training to control risks, 
testing the program's effectiveness, and managing and monitoring 
service providers. A covered institution may require professional 
skills to develop an information security program, including the skills 
of computer security professionals and lawyers.
   The FDIC believes that the establishment of information security 
programs is a sound business practice for the covered institutions that 
is already addressed by existing supervisory procedures. Although some 
institutions may need to enhance information security programs, the 
cost of doing so is not known. The FDIC seeks any information or 
comment on the costs of establishing information security programs.

E. Identification of Duplicative, Overlapping, or Conflicting Federal 
Rules

   The FDIC is unable to identify any statutes or rules that would 
overlap or conflict with the requirement to develop and implement an 
information security program. The FDIC seeks comment and information 
about any such statutes or rules, as well as any other state, local, or 
industry rules or policies that require a financial institution subject 
to its jurisdiction to implement business practices that would comply 
with the requirements of the proposed Guidelines.

F. Discussion of Significant Alternatives

   As previously noted, the G-L-B Act requires the FDIC to establish 
appropriate standards for financial institutions under its jurisdiction 
relating to the security and confidentiality of customer records. These 
proposed Guidelines attempt to clarify the statutory requirements for 
all covered entities, including small entities. These proposed 
Guidelines also provide substantial flexibility so that any 
institution, regardless of size, may adopt an information security 
program tailored to its individual needs. The FDIC welcomes comment on 
any significant alternatives, consistent with the G-L-B Act that would 
minimize the impact on small entities.
   OTS: The Regulatory Flexibility Act (5 U.S.C. 601-612) (RFA) 
requires OTS to publish an initial regulatory flexibility analysis with 
this proposed rule unless OTS can certify that the proposed rule would 
not have a significant economic impact on a substantial number of small 
entities. Because OTS cannot at this time determine what impact this 
proposal would have on small entities, OTS provides the following 
initial regulatory flexibility analysis.

A. Reasons for Proposed Action

   OTS makes this proposal pursuant to section 501 of the G-L-B Act. 
Section 501 requires OTS to publish standards for the thrift industry 
relating to administrative, technical, and physical safeguards to: (1) 
Insure the security and confidentiality of customer records and 
information; (2) protect against any anticipated threats or hazards to 
the security or integrity of such records; and (3) protect against 
unauthorized access to or use of such records or information which 
could result in substantial harm or inconvenience to any customer.

B. Objectives of and Legal Basis for Proposal

   The SUPPLEMENTARY INFORMATION section above contains this 
information. The legal bases for the proposed action are: section 501 
of the G-L-B Act; section 39 of the FDIA; and sections 2, 4, and 5 of 
the Home Owners' Loan Act (12 U.S.C. 1462, 1463, and 1464).

C. Description of Entities to Which Proposal Would Apply

   This proposal would apply to all savings associations whose 
deposits are FDIC insured, and subsidiaries of such savings 
associations, except subsidiaries that are brokers, dealers, persons 
providing insurance, investment companies, and investment advisers. \7\ 
There are approximately 487 such small savings associations, 
approximately 97 of which have subsidiaries.
---------------------------------------------------------------------------

   \7\ For purposes of the Regulatory Flexibility Act, a small 
savings association is one with less that $100 million in assets. 13 
CFR 121.201 (Division H).
---------------------------------------------------------------------------

D. Projected Reporting, Recordkeeping, and Other Compliance 
Requirements; Skills Required

   The proposed rule does not contain any specific reporting 
requirements. However, it would require institutions to maintain 
certain records documenting compliance with the proposed rule, as 
detailed more specifically above.
   The statute and the proposed rule require a covered institution to 
develop an information security program to safeguard customer 
information. Developing such a program involves assessing risks to 
customer information, establishing policies, procedures, and training 
to control risks, testing the program's effectiveness, and managing and 
monitoring service providers. OTS believes that establishing an 
information security program is a sound business practice for covered 
institutions. However, some institutions may need to establish or 
enhance information security programs. The cost of doing so is unknown. 
OTS seeks information and comment on the costs of establishing and 
operating information security programs.
   Compliance with the proposed rule would require professional 
skills, especially skills of computer hardware and software 
professionals. Professional skills would be necessary to assess 
information security needs, design and

[[Page 39479]]

implement an information security program, and to monitor service 
providers. The particular skills needed will depend on the nature of 
each institution's customer information systems. Institutions with 
sophisticated and extensive computerization would need far more skills 
to comply with the proposed rules than would institutions with little 
computerization. As a result, small entities are likely to have less 
burdensome compliance needs than large entities.

E. Significant Alternatives

   The G-L-B Act requires OTS to establish standards for information 
security standards, but does not mandate the specific form that those 
standards must take. OTS has considered different alternatives for 
these standards, considering the burden on small institutions. OTS 
considered exempting small institutions entirely from the requirement 
to implement any information security standards. However, OTS does not 
believe that Congress has authorized OTS to exempt small institutions. 
Section 501(b) of the G-L-B Act requires OTS to establish standards for 
the institutions within OTS's jurisdiction, without regard to the 
institution's size.
   OTS has also considered an alternative of publishing standards 
using language the same, or nearly the same, as that in section 501(b) 
of the G-L-B Act. The statutory language is broad and general. This 
alternative would give institutions maximum flexibility in implementing 
information security protections. It would also ensure that 
institutions would not be at a competitive disadvantage with other 
types of financial institutions not subject to the Agencies' 
information security standards. This alternative has disadvantages, 
however. Because the statutory language is very general, this 
alternative would not give institutions information about what risks 
need to be addressed or what types of protections are appropriate. 
Small institutions in particular may need guidance in this area. OTS 
welcomes comments on whether the proposed guidelines have too much or 
too little detail. How would changing the level of detail affect 
institutions' security practices?
   OTS has proposed guidelines that would describe appropriate steps 
institutions must take to ensure the security of their customer 
information. While describing appropriate steps, OTS proposes flexible 
guidelines to let each institution design individual information 
standards appropriate for the institution's particular circumstances.
   OTS is considering whether to adopt the proposed information 
security standards as guidance or as a regulation. OTS solicits 
comments on whether the regulatory burden on small entities would 
differ depending on the form of the standards. If so, how and to what 
extent?
   OTS welcomes comments on the appropriateness of its approach, and 
on any other alternatives that would satisfy the objectives of this 
proposal.

F. Federal Rules That Duplicate, Overlap, or Conflict With the Proposal

   OTS is unaware of any statutes or rules that would overlap or 
conflict with the requirement to develop and implement an information 
security program. OTS seeks comment and information about any such 
statutes or rules, as well as other rules or policies that require 
covered institutions to implement business practices that would comply 
with the proposed guidelines.

C. Executive Order 12866

   OCC: The Comptroller of the Currency has determined that this 
proposed rule, if adopted as a final rule, does not constitute a 
``significant regulatory action'' for the purposes of Executive Order 
12866. The OCC issued the proposed Guidelines in accordance with the 
requirements of Sections 501 and 505(b) of the G-L-B Act and not under 
its own authority. The standards established by the Guidelines reflect 
good business practices and guidance previously issued by the OCC and 
the FFIEC. Accordingly, the OCC believes that most institutions already 
have information security programs in place.
   Nevertheless, the OCC acknowledges that the proposed Guidelines may 
impose costs on some institutions by requiring them to formalize or 
enhance their existing information security programs. Therefore, the 
OCC invites institutions and the public to provide any cost estimates 
and related data that they think would be useful to the agency in 
evaluating the overall costs of the proposed Guidelines. The OCC will 
review any comments and cost data provided carefully and will revisit 
the cost aspects of the proposed Guidelines in developing the final 
rule.
   OTS: OTS has determined that this proposed rule, if adopted as a 
final rule, would not constitute a ``significant regulatory action'' 
for the purposes of Executive Order 12866. OTS issued the proposed 
guidelines as required by sections 501 and 505(b) of the G-L-B Act and 
not under its own authority. The guidelines reflect good business 
practices that many institutions already follow. Further, OTS believes 
that any costs of complying with the guidelines would be below the 
thresholds prescribed in the Executive Order. Nevertheless, OTS 
acknowledges that the proposed guidelines may impose costs on some 
institutions by requiring them to formalize or enhance their existing 
information security programs. Therefore, OTS invites institutions and 
the public to provide any cost estimates and related data that they 
think would be useful to the agency in evaluating the overall costs of 
the proposed guidelines. OTS will carefully review any comments and 
cost data provided and will revisit the cost aspects of the proposed 
guidelines in developing the final rule.

D. Unfunded Mandates Act of 1995

   OCC: Section 202 of the Unfunded Mandates Reform Act of 1995, 2 
U.S.C. 1532 (Unfunded Mandates Act), requires that an agency prepare a 
budgetary impact statement before promulgating any rule likely to 
result in a federal mandate that may result in the expenditure by 
state, local, and tribal governments, in the aggregate, or by the 
private sector, of $100 million or more in any one year. If a budgetary 
impact statement is required, section 205 of the Unfunded Mandates Act 
also requires the agency to identify and consider a reasonable number 
of regulatory alternatives before promulgating the rule. However, an 
agency is not required to assess the effects of its regulatory actions 
on the private sector to the extent that such regulations incorporate 
requirements specifically set forth in law. 2 U.S.C. 1531.
   The OCC believes that most institutions have already established an 
information security program because it is a sound business practice 
that also has been addressed in existing supervisory guidance. 
Therefore, the OCC has determined that this proposed rule is unlikely 
to result in expenditures by state, local, and tribal governments, in 
the aggregate, or by the private sector, of $100 million or more in any 
one year. Accordingly, the OCC has not prepared a budgetary impact 
statement or specifically addressed the regulatory alternatives 
considered.
   OTS: Section 202 of the Unfunded Mandates Act requires that an 
agency prepare a budgetary impact statement before promulgating any 
rule likely to result in a federal mandate that may result in the 
expenditure by state, local, and tribal governments, in the aggregate, 
or by the private sector, of $100 million or more in any one year. If a 
budgetary impact statement is required, section 205 of the Unfunded 
Mandates Act also

[[Page 39480]]

requires the agency to identify and consider a reasonable number of 
regulatory alternatives before promulgating the rule. However, an 
agency is not required to assess the effects of its regulatory actions 
on the private sector to the extent that such regulations incorporate 
requirements specifically set forth in law. 2 U.S.C. 1531.
   OTS has determined that this proposed rule is unlikely to result in 
expenditures by state, local, and tribal governments, in the aggregate, 
or by the private sector, of $100 million or more in any one year. 
Accordingly, the OTS has not prepared a budgetary impact statement or 
specifically addressed the regulatory alternatives, except as described 
in the OTS's initial regulatory flexibility analysis earlier in this 
preamble.

IV. Solicitation of Comments on Use of Plain Language

   Section 722 of the G-L-B Act requires the federal banking agencies 
to use plain language in all proposed and final rules published after 
January 1, 2000. We invite your comments on how to make this proposal 
easier to understand. For example:
    Have we organized the material to suit your needs? If not, 
how could this material be better organized?
    Are the requirements in the Guidelines clearly stated? If 
not, how could the Guidelines be more clearly stated?
    Do the Guidelines contain technical language or jargon 
that is not clear? If so, which language requires clarification?
    Would a different format (grouping and order of sections, 
use of headings, paragraphing) make the Guidelines easier to 
understand? If so, what changes to the format would make the Guidelines 
easier to understand?
    Would more, but shorter, sections be better? If so which 
sections should be changed?
    What else could we do to make the Guidelines easier to 
understand?

List of Subjects

12 CFR Part 30

   Banks, banking, Consumer protection, National banks, Privacy, 
Reporting and recordkeeping requirements.

12 CFR Part 208

   Banks, banking, Consumer protection, Federal Reserve System, 
Foreign banking, Holding companies, Information, Privacy, Reporting and 
recordkeeping requirements.

12 CFR Part 211

   Exports, Federal Reserve System, Foreign banking, Holding 
companies, Investments, Privacy, Reporting and recordkeeping 
requirements.

12 CFR Part 225

   Administrative practice and procedure, Banks, banking, Federal 
Reserve System, Holding companies, Privacy, Reporting and recordkeeping 
requirements, securities.

12 CFR Part 263

   Administrative practice and procedure, Claims, Crime, Equal access 
in justice, Federal Reserve System, Lawyers, Penalties.

12 CFR Part 308

   Administrative practice and procedure, Banks, banking, Claims, 
Crime, Equal access of justice, Lawyers, Penalties, State nonmember 
banks.

12 CFR Part 364

   Administrative practice and procedure, Bank deposit insurance, 
Banks, banking, Reporting and recordkeeping requirements, Safety and 
soundness.

12 CFR Part 568

   Reporting and recordkeeping requirements, Savings associations, 
Security measures.

12 CFR Part 570

   Consumer protection, Privacy, Savings associations.

Office of the Comptroller of the Currency

12 CFR Chapter I

Authority and Issuance
   For the reasons set forth in the joint preamble, part 30 of the 
chapter I of title 12 of the Code of Federal Regulations is proposed to 
be amended as follows:

PART 30--SAFETY AND SOUNDNESS STANDARDS

   1. The authority citation for part 30 is revised to read as 
follows:

   Authority: 12 U.S.C. 93a, 1818, 1831p-1, 3102(b); 15 U.S.C. 
6801, 6805(b)(1).

   2. Revise Sec. 30.1 to read as follows:


Sec. 30.1  Scope.

   (a) This rule and the standards set forth in appendices A and B to 
this part apply to national banks and federal branches of foreign 
banks, that are subject to the provisions of section 39 of the Federal 
Deposit Insurance Act (section 39) (12 U.S.C. 1831p-1).
   (b) The standards set forth in appendix B to this part also apply 
to uninsured national banks, federal branches and federal agencies of 
foreign banks, and the subsidiaries of any national bank, federal 
branch or federal agency of a foreign bank (except brokers, dealers, 
persons providing insurance, investment companies and investment 
advisers). Violation of these standards may be an unsafe and unsound 
practice within the meaning of 12 U.S.C. 1818.
   3. In Sec. 30.2, revise the last sentence to read as follows:


Sec. 30.2  Purpose.

   * * * The Interagency Guidelines Establishing Standards for Safety 
and Soundness are set forth in appendix A to this part, and the 
Interagency Guidelines Establishing Standards for Safeguarding Customer 
Information are set forth in appendix B to this part.
   4. In Sec. 30.3, revise paragraph (a) to read as follows:


Sec. 30.3  Determination and notification of failure to meet safety and 
soundness standard.

   (a) Determination. The OCC may, based upon an examination, 
inspection, or any other information that becomes available to the OCC, 
determine that a bank has failed to satisfy the safety and soundness 
standards contained in the Interagency Guidelines Establishing 
Standards for Safety and Soundness set forth in appendix A to this 
part, and the Interagency Guidelines Establishing Standards for 
Safeguarding Customer Information set forth in appendix B to this part.
* * * * *
   5. Revise Appendix B to part 30 to read as follows:

Appendix B to Part 30--Interagency Guidelines Establishing Standards 
For Safeguarding Customer Information

Table of Contents

I. Introduction
   A. Scope
   B. Preservation of Existing Authority
   C. Definitions
II. Standards for Safeguarding Customer Information
   A. Information Security Program
   B. Objectives
III. Development and Implementation of Customer Information Security 
Program
   A. Involve the Board of Directors and Management
   B. Assess Risk
   C. Manage and Control Risk
   D. Oversee Outsourcing Arrangements
   E. Implement the Standards

I. Introduction

   The Interagency Guidelines Establishing Standards for 
Safeguarding Customer Information (Guidelines) set forth standards 
pursuant to section 39 of the Federal Deposit Insurance Act (section 
39, codified at 12

[[Page 39481]]

U.S.C. 1831p-1), and sections 501 and 505(b), codified at 15 U.S.C. 
6801 and 6805(b), of the Gramm-Leach-Bliley Act. These Guidelines 
address standards for developing and implementing administrative, 
technical, and physical safeguards to protect the security, 
confidentiality, and integrity of customer information.
   A. Scope. The Guidelines apply to customer information 
maintained by or on behalf of entities over which the OCC has 
authority. Such entities, referred to as ``the bank,'' are national 
banks, federal branches and federal agencies of foreign banks, and 
any subsidiaries of such entities (except brokers, dealers, persons 
providing insurance, investment companies, and investment advisers).
   B. Preservation of Existing Authority. Neither section 39 nor 
these Guidelines in any way limit the authority of the OCC to 
address unsafe or unsound practices, violations of law, unsafe or 
unsound conditions, or other practices. The OCC may take action 
under section 39 and these Guidelines independently of, in 
conjunction with, or in addition to, any other enforcement action 
available to the OCC.
   C. Definitions. For purposes of the Guidelines, the following 
definitions apply:
   1. In general. For purposes of the Guidelines, except as 
modified in the Guidelines or unless the context otherwise requires, 
the terms used have the same meanings as set forth in sections 3 and 
39 of the Federal Deposit Insurance Act (12 U.S.C. 1813 and 1831p-
1).
   2. Customer information means any records, data, files, or other 
information containing nonpublic personal information, as defined in 
Sec. 40.3(n) of this chapter, about a customer, whether in paper, 
electronic or other form, that are maintained by or on behalf of the 
bank.
   3. Customer means any customer of the bank as defined in 
Sec. 40.3(h) of this chapter.
   4. Service provider means any person or entity that maintains or 
processes customer information on behalf of the bank, or is 
otherwise granted access to customer information through its 
provision of services to the bank.
   5. Board of directors, in the case of a branch or agency of a 
foreign bank means the managing official in charge of the branch or 
agency.
   6. Customer information systems means the electronic or physical 
methods used to access, collect, store, use, transmit and protect 
customer information.

II. Standards for Safeguarding Customer Information

   A. Information Security Program. Each bank shall implement a 
comprehensive information security program that includes 
administrative, technical, and physical safeguards appropriate to 
the size and complexity of the bank and the nature and scope of its 
activities.
   B. Objectives. A bank's information security program shall:
   1. Ensure the security and confidentiality of customer 
information;
   2. Protect against any anticipated threats or hazards to the 
security or integrity of such information; and
   3. Protect against unauthorized access to or use of such 
information that could result in substantial harm or inconvenience 
to any customer or risk to the safety and soundness of the bank.

III. Development and Implementation of Information Security Program

   A. Involve the Board of Directors and Management.
   1. The board of directors of each bank shall:
   a. Approve the bank's written information security policy and 
program that complies with these Guidelines; and
   b. Oversee efforts to develop, implement, and maintain an 
effective information security program.
   2. The bank's management shall develop, implement, and maintain 
an effective information security program. In conjunction with its 
responsibility to implement the bank's information security program, 
management of each bank shall regularly:
   a. Evaluate the impact on the bank's security program of 
changing business arrangements, such as mergers and acquisitions, 
alliances and joint ventures, outsourcing arrangements, and changes 
to customer information systems;
   b. Document its compliance with these Guidelines; and
   c. Report to the board on the overall status of the information 
security program, including material matters related to the 
following: risk assessment; risk management and control decisions; 
results of testing; attempted or actual security breaches or 
violations and responsive actions taken by management; and any 
recommendations for improvements in the information security 
program.
   B. Assess Risk. To achieve the objectives of its information 
security program, each bank shall:
   1. Identify and assess the risks that may threaten the security, 
confidentiality, or integrity of customer information systems. As 
part of the risk assessment, a bank shall determine the sensitivity 
of customer information and the internal or external threats to the 
bank's customer information systems.
   2. Assess the sufficiency of policies, procedures, customer 
information systems, and other arrangements in place to control 
risks.
   3. Monitor, evaluate, and adjust its risk assessment in light of 
any relevant changes to technology, the sensitivity of customer 
information, and internal or external threats to information 
security.
   C. Manage and Control Risk. As part of a comprehensive risk 
management plan, each bank shall:
   1. Establish written policies and procedures that are adequate 
to control the identified risks and achieve the overall objectives 
of the bank's information security program. Policies and procedures 
shall be commensurate with the sensitivity of the information as 
well as the complexity and scope of the bank and its activities. In 
establishing the policies and procedures, each bank should consider 
appropriate:
   a. Access rights to customer information;
   b. Access controls on customer information systems, including 
controls to authenticate and grant access only to authorized 
individuals and companies;
   c. Access restrictions at locations containing customer 
information, such as buildings, computer facilities, and records 
storage facilities;
   d. Encryption of electronic customer information, including 
while in transit or in storage on networks or systems to which 
unauthorized individuals may have access;
   e. Procedures to confirm that customer information system 
modifications are consistent with the bank's information security 
program;
   f. Dual control procedures, segregation of duties, and employee 
background checks for employees with responsibilities for or access 
to customer information;
   g. Contract provisions and oversight mechanisms to protect the 
security of customer information maintained or processed by service 
providers;
   h. Monitoring systems and procedures to detect actual and 
attempted attacks on or intrusions into customer information 
systems;
   i. Response programs that specify actions to be taken when 
unauthorized access to customer information systems is suspected or 
detected;
   j. Protection against destruction of customer information due to 
potential physical hazards, such as fire and water damage; and
   k. Response programs to preserve the integrity and security of 
customer information in the event of computer or other technological 
failure, including, where appropriate, reconstructing lost or 
damaged customer information.
   2. Train staff to recognize, respond to, and, where appropriate, 
report to regulatory and law enforcement agencies, any unauthorized 
or fraudulent attempts to obtain customer information.
   3. Regularly test the key controls, systems and procedures of 
the information security program to confirm that they control the 
risks and achieve the overall objectives of the bank's information 
security program. The frequency and nature of such tests should be 
determined by the risk assessment, and adjusted as necessary to 
reflect changes in internal and external conditions. Tests shall be 
conducted, where appropriate, by independent third parties or staff 
independent of those that develop or maintain the security programs. 
Test results shall be reviewed by independent third parties or staff 
independent of those that conducted the test.
   4. Monitor, evaluate, and adjust, as appropriate, the 
information security program in light of any relevant changes in 
technology, the sensitivity of its customer information, and 
internal or external threats to information security.
   D. Oversee Outsourcing Arrangements. The bank continues to be 
responsible for safeguarding customer information even when it gives 
a service provider access to that

[[Page 39482]]

information. The bank must exercise appropriate due diligence in 
managing and monitoring its outsourcing arrangements to confirm that 
its service providers have implemented an effective information 
security program to protect customer information and customer 
information systems consistent with these Guidelines.
   E. Implement the Standards. Each bank is to take appropriate 
steps to fully implement an information security program pursuant to 
these Guidelines by July 1, 2001.

   Dated: June 5, 2000.
John D. Hawke, Jr.,
Comptroller of the Currency.

Federal Reserve System

12 CFR Chapter II

Authority and Issuance
   For the reasons set forth in the joint preamble, parts 208, 211, 
225, and 263 of chapter II of title 12 of the Code of Federal 
Regulations are proposed to be amended as follows:

PART 208--MEMBERSHIP OF STATE BANKING INSTITUTIONS IN THE FEDERAL 
RESERVE SYSTEM (REGULATION H)

   1. The authority citation for 12 CFR part 208 is revised to read as 
follows:

   Authority: 12 U.S.C. 24, 36, 92a, 93a, 248(a), 248(c), 321-338a, 
371d, 461, 481-486, 601, 611, 1814, 1816, 1818, 1820(d)(9), 1823(j), 
1828(o), 1831, 1831o, 1831p-1, 1831r-1, 1835a, 1882, 2901-2907, 
3105, 3310, 3331-3351, and 3906-3909; 15 U.S.C. 78b, 78l(b), 78l(g), 
78l(i), 78o-4(c)(5), 78q, 78q-1, 78w, 6801, and 6805; 31 U.S.C. 
5318; 42 U.S.C. 4012a, 4104a, 4104b, 4106, and 4128.

   2. Amend Sec. 208.3 to revise paragraph (d)(1) to read as follows:


Sec. 208.3  Application and conditions for membership in the Federal 
Reserve System.

* * * * *
   (d) Conditions of membership. (1) Safety and soundness. Each member 
bank shall at all times conduct its business and exercise its powers 
with due regard to safety and soundness. Each member bank shall comply 
with the Interagency Guidelines Establishing Standards for Safety and 
Soundness prescribed pursuant to section 39 of the FDI Act (12 U.S.C. 
1831p-1), set forth in appendix D-1 to this part, and the Interagency 
Guidelines Establishing Standards for Safeguarding Customer Information 
prescribed pursuant to sections 501 and 505 of the Gramm-Leach-Bliley 
Act (15 U.S.C. 6801 and 6805), set forth in appendix D-2 to this part.
* * * * *
   3. Revise appendix D-2 to read as follows:

Appendix D-2 To Part 208--Interagency Guidelines Establishing Standards 
For Safeguarding Customer Information

Table of Contents
I. Introduction
   A. Scope
   B. Preservation of Existing Authority
   C. Definitions
II. Standards for Safeguarding Customer Information
   A. Information Security Program
   B. Objectives
III. Development and Implementation of Customer Information Security 
Program
   A. Involve the Board of Directors and Management
   B. Assess Risk
   C. Manage and Control Risk
   D. Oversee Outsourcing Arrangements
   E. Implement the Standards

I. Introduction

   These Interagency Guidelines Establishing Standards for 
Safeguarding Customer Information (Guidelines) set forth standards 
pursuant to sections 501 and 505 of the Gramm-Leach-Bliley Act (15 
U.S.C. 6801 and 6805), in the same manner, to the extent 
practicable, as standards prescribed pursuant to section 39 of the 
Federal Deposit Insurance Act (12 U.S.C. 1831p-1). These Guidelines 
address standards for developing and implementing administrative, 
technical, and physical safeguards to protect the security, 
confidentiality, and integrity of customer information.
   A. Scope. The Guidelines apply to customer information 
maintained by or on behalf of state member banks (banks) and their 
nonbank subsidiaries, except for brokers, dealers, persons providing 
insurance, investment companies, and investment advisors. Pursuant 
to Secs. 211.9 and 211.24 of this chapter, these guidelines also 
apply to customer information maintained by or on behalf of Edge 
corporations, agreement corporations, and uninsured state-licensed 
branches or agencies of a foreign bank.
   B. Preservation of Existing Authority. Neither section 39 nor 
these Guidelines in any way limit the authority of the Board to 
address unsafe or unsound practices, violations of law, unsafe or 
unsound conditions, or other practices. The Board may take action 
under section 39 and these Guidelines independently of, in 
conjunction with, or in addition to, any other enforcement action 
available to the Board.
   C. Definitions. For purposes of the Guidelines, the following 
definitions apply:
   1. In general. For purposes of the Guidelines, except as 
modified in the Guidelines or unless the context otherwise requires, 
the terms used have the same meanings as set forth in sections 3 and 
39 of the Federal Deposit Insurance Act (12 U.S.C. 1813 and 1831p-
1).
   2. Customer information means any records, data, files, or other 
information containing nonpublic personal information, as defined in 
Sec. 216.3(n) of this chapter, about a customer, whether in paper, 
electronic or other form, that are maintained by or on behalf of the 
bank.
   3. Customer means any customer of the bank as defined in 
Sec. 216.3(h) of this chapter.
   4. Service provider means any person or entity that maintains or 
processes customer information on behalf of the bank, or is 
otherwise granted access to customer information through its 
provision of services to the bank.
   5. Board of directors, in the case of a branch or agency of a 
foreign bank means the managing official in charge of the branch or 
agency.
   6. Customer information systems means the electronic or physical 
methods used to access, collect, store, use, transmit and protect 
customer information.
   7. Subsidiary means any company controlled by a bank, except a 
broker, dealer, person providing insurance, investment company, 
investment advisor, insured depository institution, or subsidiary of 
an insured depository institution.

II. Standards for Safeguarding Customer Information

   A. Information Security Program. Each bank shall implement a 
comprehensive information security program that includes 
administrative, technical, and physical safeguards appropriate to 
the size and complexity of the bank and the nature and scope of its 
activities. A bank also shall ensure that each of its subsidiaries 
is subject to a comprehensive information security program. The bank 
may fulfill this requirement either by including a subsidiary within 
the scope of the bank's comprehensive information security program 
or by causing the subsidiary to implement a separate comprehensive 
information security program in accordance with the standards and 
procedures in sections II and III of this appendix that apply to 
banks.
   B. Objectives. A bank's information security program shall:
   1. Ensure the security and confidentiality of customer 
information;
   2. Protect against any anticipated threats or hazards to the 
security or integrity of such information; and
   3. Protect against unauthorized access to or use of such 
information that could result in substantial harm or inconvenience 
to any customer or risk to the safety and soundness of the bank.

III. Development and Implementation of Information Security Program

   A. Involve the Board of Directors and Management.
   1. The board of directors of each bank shall:
   a. Approve the bank's written information security policy and 
program that complies with these Guidelines; and
   b. Oversee efforts to develop, implement, and maintain an 
effective information security program.
   2. The bank's management shall develop, implement, and maintain 
an effective information security program. In conjunction with its 
responsibility to implement the bank's information security program, 
management of each bank shall regularly:
   a. Evaluate the impact on the bank's security program of 
changing business arrangements, such as mergers and acquisitions, 
alliances and joint ventures,

[[Page 39483]]

outsourcing arrangements, and changes to customer information 
systems;
   b. Document its compliance with these Guidelines; and
   c. Report to the board on the overall status of the information 
security program, including material matters related to: risk 
assessment; risk management and control decisions; results of 
testing; attempted or actual security breaches or violations and 
responsive actions taken by management; and any recommendations for 
improvements in the information security program.
   B. Assess Risk. To achieve the objectives of its information 
security program, each bank shall:
   1. Identify and assess the risks that may threaten the security, 
confidentiality, or integrity of customer information systems. As 
part of the risk assessment, a bank shall determine the sensitivity 
of customer information and the internal or external threats to the 
bank's customer information systems.
   2. Assess the sufficiency of policies, procedures, customer 
information systems, and other arrangements in place to control 
risk.
   3. Monitor, evaluate, and adjust its risk assessment in light of 
any relevant changes to technology, the sensitivity of customer 
information, and internal or external threats to information 
security.
   C. Manage and Control Risk. As part of a comprehensive risk 
management plan, each bank shall:
   1. Establish written policies and procedures that are adequate 
to control the identified risks and achieve the overall objectives 
of the bank's information security program. Policies and procedures 
shall be commensurate with the sensitivity of the information as 
well as the complexity and scope of the bank and its activities. In 
establishing the policies and procedures, each bank should consider 
appropriate:
   a. Access rights to customer information;
   b. Access controls on customer information systems, including 
controls to authenticate and grant access only to authorized 
individuals and companies;
   c. Access restrictions at locations containing customer 
information, such as buildings, computer facilities, and records 
storage facilities;
   d. Encryption of electronic customer information, including 
while in transit or in storage on networks or systems to which 
unauthorized individuals may have access;
   e. Procedures to confirm that customer information system 
modifications are consistent with the bank's information security 
program;
   f. Dual control procedures, segregation of duties, and employee 
background checks for employees with responsibilities for or access 
to customer information;
   g. Contract provisions and oversight mechanisms to protect the 
security of customer information maintained or processed by service 
providers;
   h. Monitoring systems and procedures to detect actual and 
attempted attacks on or intrusions into customer information 
systems;
   i. Response programs that specify actions to be taken when 
unauthorized access to customer information systems is suspected or 
detected;
   j. Protection against destruction of customer information due to 
potential physical hazards, such as fire and water damage; and
   k. Response programs to preserve the integrity and security of 
customer information in the event of computer or other technological 
failure, including, where appropriate, reconstructing lost or 
damaged customer information.
   2. Train staff to recognize, respond to, and, where appropriate, 
report to regulatory and law enforcement agencies, any unauthorized 
or fraudulent attempts to obtain customer information.
   3. Regularly test the key controls, systems and procedures of 
the information security program to confirm that they control the 
risks and achieve the overall objectives of the bank's information 
security program. The frequency and nature of such tests should be 
determined by the risk assessment, and adjusted as necessary to 
reflect changes in internal and external conditions. Tests shall be 
conducted, where appropriate, by independent third parties or staff 
independent of those that develop or maintain the security programs. 
Test results shall be reviewed by independent third parties or staff 
independent of those that conducted the test.
   4. Monitor, evaluate, and adjust, as appropriate, the 
information security program in light of any relevant changes in 
technology, the sensitivity of its customer information, and 
internal or external threats to information security.
   D. Oversee Outsourcing Arrangements. The bank continues to be 
responsible for safeguarding customer information even when it gives 
a service provider access to that information. The bank must 
exercise appropriate due diligence in managing and monitoring its 
outsourcing arrangements to confirm that its service providers have 
implemented an effective information security program to protect 
customer information and customer information systems consistent 
with these Guidelines.
   E. Implement the Standards. Each bank is to take appropriate 
steps to fully implement an information security program pursuant to 
these Guidelines by July 1, 2001.

PART 211--INTERNATIONAL BANKING OPERATIONS (REGULATION K)

   4. The authority citation for part 211 is revised to read as 
follows:

   Authority: 12 U.S.C. 221 et seq., 1818, 1835a, 1841 et seq., 
3101 et seq., and 3901 et seq.; 15 U.S.C. 6801 and 6805.

   5. Add new Sec. 211.9 to read as follows:


Sec. 211.9  Protection of customer information.

   An Edge or agreement corporation shall comply with the Interagency 
Guidelines Establishing Standards for Safeguarding Customer Information 
prescribed pursuant to sections 501 and 505 of the Gramm-Leach-Bliley 
Act (15 U.S.C. 6801 and 6805), set forth in appendix D-2 to part 208 of 
this chapter.
   6. In Sec. 211.24, add new paragraph (i) to read as follows:


Sec. 211.24  Approval of offices of foreign banks; procedures for 
applications; standards for approval; representative-office activities 
and standards for approval; preservation of existing authority; reports 
of crimes and suspected crimes; government securities sales practices.

* * * * *
   (i) Protection of customer information. An uninsured state-licensed 
branch or agency of a foreign bank shall comply with the Interagency 
Guidelines Establishing Standards for Safeguarding Customer Information 
prescribed pursuant to sections 501 and 505 of the Gramm-Leach-Bliley 
Act (15 U.S.C. 6801 and 6805), set forth in appendix D-2 to part 208 of 
this chapter.

PART 225--BANK HOLDING COMPANIES AND CHANGE IN BANK CONTROL 
(REGULATION Y)

   7. The authority citation for part 225 is revised to read as 
follows:

   Authority: 12 U.S.C. 1817(j)(13), 1818, 1828(o), 1831i, 1831p-1, 
1843(c)(8), 1844(b), 1972(1), 3106, 3108, 3310, 3331-3351, 3907, and 
3909; 15 U.S.C. 6801 and 6805.

   8. In Sec. 225.1, add new paragraph (c)(16) to read as follows:


Sec. 225.1  Authority, purpose, and scope.

* * * * *
   (c) * * *
   (16) Appendix F contains the Interagency Guidelines Establishing 
Standards for Safeguarding Customer Information.
   9. In Sec. 225.4, add new paragraph (g) to read as follows:


Sec. 225.4  Corporate practices.

* * * * *
   (g) Protection of nonpublic personal information. A bank holding 
company, including a bank holding company that is a financial holding 
company, shall comply with the Interagency Guidelines Establishing 
Standards for Safeguarding Customer Information, as set forth in 
appendix F of this part, prescribed pursuant to sections 501 and 505 of 
the Gramm-Leach-Bliley Act (15 U.S.C. 6801 and 6805).
   10. Add new appendix F to read as follows:

Appendix F To Part 225--Interagency Guidelines Establishing 
Standards For Safeguarding Customer Information

Table of Contents

I. Introduction
   A. Scope

[[Page 39484]]

   B. Preservation of Existing Authority
   C. Definitions
II. Standards for Safeguarding Customer Information
   A. Information Security Program
   B. Objectives
III. Development and Implementation of Customer Information Security 
Program
   A. Involve the Board of Directors and Management
   B. Assess Risk
   C. Manage and Control Risk
   D. Oversee Outsourcing Arrangements
   E. Implement the Standards

I. Introduction

   These Interagency Guidelines Establishing Standards for 
Safeguarding Customer Information (Guidelines) set forth standards 
pursuant to sections 501 and 505 of the Gramm-Leach-Bliley Act (15 
U.S.C. 6801 and 6805). These Guidelines address standards for 
developing and implementing administrative, technical, and physical 
safeguards to protect the security, confidentiality, and integrity of 
customer information.
   A. Scope. The Guidelines apply to customer information maintained 
by or on behalf of bank holding companies and their nonbank 
subsidiaries or affiliates (except brokers, dealers, persons providing 
insurance, investment companies, and investment advisors), for which 
the Board has supervisory authority.
   B. Preservation of Existing Authority. These Guidelines do not in 
any way limit the authority of the Board to address unsafe or unsound 
practices, violations of law, unsafe or unsound conditions, or other 
practices. The Board may take action to enforce these Guidelines 
independently of, in conjunction with, or in addition to, any other 
enforcement action available to the Board.
   C. Definitions. For purposes of the Guidelines, the following 
definitions apply:
   1. In general. For purposes of the Guidelines, except as modified 
in the Guidelines or unless the context otherwise requires, the terms 
used have the same meanings as set forth in sections 3 and 39 of the 
Federal Deposit Insurance Act (12 U.S.C. 1813 and 1831p-1).
   2. Customer information means any records, data, files, or other 
information containing nonpublic personal information, as defined in 
Sec. 216.3(n) of this chapter, about a customer, whether in paper, 
electronic or other form, that are maintained by or on behalf of the 
bank holding company.
   3. Customer means any customer of the bank holding company as 
defined in Sec. 216.3(h) of this chapter.
   4. Service provider means any person or entity that maintains or 
processes customer information on behalf of the bank holding company, 
or is otherwise granted access to customer information through its 
provision of services to the bank holding company.
   5. Board of directors, in the case of a branch or agency of a 
foreign bank means the managing official in charge of the branch or 
agency.
   6. Customer information systems means the electronic or physical 
methods used to access, collect, store, use, transmit and protect 
customer information.
   7. Subsidiary means any company controlled by a bank holding 
company, except a broker, dealer, person providing insurance, 
investment company, investment advisor, insured depository institution, 
or subsidiary of an insured depository institution.

II. Standards for Safeguarding Customer Information

   A. Information Security Program. Each bank holding company shall 
implement a comprehensive information security program that includes 
administrative, technical, and physical safeguards appropriate to the 
size and complexity of the bank holding company and the nature and 
scope of its activities. A bank holding company also shall ensure that 
each of its subsidiaries is subject to a comprehensive information 
security program. The bank holding company may fulfill this requirement 
either by including a subsidiary within the scope of the bank holding 
company's comprehensive information security program or by causing the 
subsidiary to implement a separate comprehensive information security 
program in accordance with the standards and procedures in sections II 
and III of this appendix that apply to bank holding companies.
   B. Objectives. A bank holding company's information security 
program shall:
   1. Ensure the security and confidentiality of customer information;
   2. Protect against any anticipated threats or hazards to the 
security or integrity of such information; and
   3. Protect against unauthorized access to or use of such 
information that could result in substantial harm or inconvenience to 
any customer or risk to the safety and soundness of the bank holding 
company.

III. Development and Implementation of Information Security Program

   A. Involve the Board of Directors and Management.
   1. The board of directors of each bank holding company shall:
   a. Approve the bank holding company's written information security 
policy and program that complies with these Guidelines; and
   b. Oversee efforts to develop, implement, and maintain an effective 
information security program.
   2. The bank holding company's management shall develop, implement, 
and maintain an effective information security program. In conjunction 
with its responsibility to implement the bank holding company's 
information security program, management of each bank holding company 
shall regularly:
   a. Evaluate the impact on the bank holding company's security 
program of changing business arrangements, such as mergers and 
acquisitions, alliances and joint ventures, outsourcing arrangements, 
and changes to customer information systems;
   b. Document its compliance with these Guidelines; and
   c. Report to the board on the overall status of the information 
security program, including material matters related to: risk 
assessment; risk management and control decisions; results of testing; 
attempted or actual security breaches or violations and responsive 
actions taken by management; and any recommendations for improvements 
in the information security program.
   B. Assess Risk. To achieve the objectives of its information 
security program, each bank holding company shall:
   1. Identify and assess the risks that may threaten the security, 
confidentiality, or integrity of customer information systems. As part 
of the risk assessment, a bank holding company shall determine the 
sensitivity of customer information and the internal or external 
threats to the bank holding company's customer information systems.
   2. Assess the sufficiency of policies, procedures, customer 
information systems, and other arrangements in place to control risks 
identified in section III.B.1 of this appendix.
   3. Monitor, evaluate, and adjust its risk assessment in light of 
any relevant changes to technology, the sensitivity of customer 
information, and internal or external threats to information security.
   C. Manage and Control Risk. As part of a comprehensive risk 
management plan, each bank holding company shall:

[[Page 39485]]

   1. Establish written policies and procedures that are adequate to 
control the identified risks and achieve the overall objectives of the 
bank holding company's information security program. Policies and 
procedures shall be commensurate with the sensitivity of the 
information as well as the complexity and scope of the bank holding 
company and its activities. In establishing the policies and 
procedures, each bank holding company should consider appropriate:
   a. Access rights to customer information;
   b. Access controls on customer information systems, including 
controls to authenticate and grant access only to authorized 
individuals and companies;
   c. Access restrictions at locations containing customer 
information, such as buildings, computer facilities, and records 
storage facilities;
   d. Encryption of electronic customer information, including while 
in transit or in storage on networks or systems to which unauthorized 
individuals may have access;
   e. Procedures to confirm that customer information system 
modifications are consistent with the bank holding company's 
information security program;
   f. Dual control procedures, segregation of duties, and employee 
background checks for employees with responsibilities for or access to 
customer information;
   g. Contract provisions and oversight mechanisms to protect the 
security of customer information maintained or processed by service 
providers;
   h. Monitoring systems and procedures to detect actual and attempted 
attacks on or intrusions into customer information systems;
   i. Response programs that specify actions to be taken when 
unauthorized access to customer information systems is suspected or 
detected;
   j. Protection against destruction of customer information due to 
potential physical hazards, such as fire and water damage; and
   k. Response programs to preserve the integrity and security of 
customer information in the event of computer or other technological 
failure, including, where appropriate, reconstructing lost or damaged 
customer information.
   2. Train staff to recognize, respond to, and, where appropriate, 
report to regulatory and law enforcement agencies, any unauthorized or 
fraudulent attempts to obtain customer information.
   3. Regularly test the key controls, systems and procedures of the 
information security program to confirm that they control the risks and 
achieve the overall objectives of the bank holding company's 
information security program. The frequency and nature of such tests 
should be determined by the risk assessment, and adjusted as necessary 
to reflect changes in internal and external conditions. Tests shall be 
conducted, where appropriate, by independent third parties or staff 
independent of those that develop or maintain the security programs. 
Test results shall be reviewed by independent third parties or staff 
independent of those that conducted the test.
   4. Monitor, evaluate, and adjust, as appropriate, the information 
security program in light of any relevant changes in technology, the 
sensitivity of its customer information, and internal or external 
threats to information security.
   D. Oversee Outsourcing Arrangements. The bank holding company 
continues to be responsible for safeguarding customer information even 
when it gives a service provider access to that information. The bank 
holding company must exercise appropriate due diligence in managing and 
monitoring its outsourcing arrangements to confirm that its service 
providers have implemented an effective information security program to 
protect customer information and customer information systems 
consistent with these Guidelines.
   E. Implement the Standards. Each bank holding company is to take 
appropriate steps to fully implement an information security program 
pursuant to these Guidelines by July 1, 2001.

PART 263--RULES OF PRACTICE FOR HEARINGS

   11. The authority citation for part 263 is revised to read as 
follows:

   Authority: 5 U.S.C. 504; 12 U.S.C. 248, 324, 504, 505, 1817(j), 
1818, 1828(c), 1831o, 1831p-1, 1847(b), 1847(d), 1884(b), 
1972(2)(F), 3105, 3107, 3108, 3907, 3909; 15 U.S.C. 21, 78o-4, 78o-
5, 78u-2, 6801, 6805; and 28 U.S.C. 2461 note.

   12. Amend Sec. 263.302 to revise paragraph (a) to read as follows:


Sec. 263.302  Determination and notification of failure to meet safety 
and soundness standard and request for compliance plan.

   (a) Determination. The Board may, based upon an examination, 
inspection, or any other information that becomes available to the 
Board, determine that a bank has failed to satisfy the safety and 
soundness standards contained in the Interagency Guidelines 
Establishing Standards for Safety and Soundness or the Interagency 
Guidelines Establishing Standards for Safeguarding Customer 
Information, set forth in appendices D-1 and D-2 to part 208 of this 
chapter, respectively.
* * * * *

   By order of the Board of Governors of the Federal Reserve 
System, June 13, 2000.
Jennifer J. Johnson,
Secretary of the Board.

Federal Deposit Insurance Corporation

12 CFR Chapter III

Authority and Issuance
   For the reasons set forth in the joint preamble, parts 308 and 364 
of chapter III of title 12 of the Code of Federal Regulation are 
proposed to be amended as follows:

PART 308--RULES OF PRACTICE AND PROCEDURE

   1. The authority citation for part 308 continues to read as 
follows:

   Authority: 5 U.S.C. 504, 554-557; 12 U.S.C. 93(b), 164, 505, 
1815(e), 1817, 1818, 1820, 1828, 1829, 1829b, 1831i, 1831o, 1831p-1, 
1832(c), 1884(b), 1972, 3102, 3108(a), 3349, 3909, 4717; 15 U.S.C. 
78(h) and (i), 78o-4(c), 78o-5, 78q-1, 78s, 78u, 78u-2, 78u-3 and 
78w; 28 U.S.C. 2461 note; 31 U.S.C. 330, 5321; 42 U.S.C. 4012a; sec. 
31001(s), Pub. L. 104-134, 110 Stat. 1321-358.

   1. Amend Sec. 308.302 to revise paragraph (a) to read as follows:


Sec. 308.302  Determination and notification of failure to meet a 
safety and soundness standard and request for compliance plan.

   (a) Determination. The FDIC may, based upon an examination, 
inspection, or any other information that becomes available to the 
FDIC, determine that a bank has failed to satisfy the safety and 
soundness standards set out in part 364 of this chapter and in the 
Interagency Guidelines Establishing Standards for Safety and Soundness 
in appendix A and the Interagency Guidelines Establishing Standards for 
Safeguarding Customer Information in appendix B to part 364 of this 
chapter.
* * * * *

PART 364--STANDARDS FOR SAFETY AND SOUNDNESS

   2. The authority citation for part 364 is revised to read as 
follows:

   Authority: 12 U.S.C. 1818 (Tenth), 1831p-1; 15 U.S.C. 6801(b), 
6805(b)(1).

   3. Amend Sec. 364.101 to revise paragraph (b) to read as follows:


Sec. 364.101  Standards for safety and soundness.

* * * * *

[[Page 39486]]

   (b) Interagency Guidelines Establishing Standards for Safeguarding 
Customer Information. The Interagency Guidelines Establishing Standards 
for Safeguarding Customer Information prescribed pursuant to section 39 
of the Federal Deposit Insurance Act (12 U.S.C. 1831p-1) and sections 
501 and 505(b) of the Gramm-Leach-Bliley Act (15 U.S.C. 6801, 6805(b)), 
as set forth in appendix B to this part, apply to all insured state 
nonmember banks, insured state licensed branches of foreign banks, and 
any subsidiaries of such entities (except brokers, dealers, persons 
providing insurance, investment companies, and investment advisers).
   4. Revise Appendix B to Part 364 to read as follows:

Appendix B to Part 364--Interagency Guidelines Establishing Standards 
for Safeguarding Customer Information

Table of Contents

I. Introduction
   A. Scope
   B. Preservation of Existing Authority
   C. Definitions
II. Standards for Safeguarding Customer Information
   A. Information Security Program
   B. Objectives
III. Development and Implementation of Customer Information Security 
Program
   A. Involve the Board of Directors and Management
   B. Assess Risk
   C. Manage and Control Risk
   D. Oversee Outsourcing Arrangements
   E. Implement the Standards

I. Introduction

   The Interagency Guidelines Establishing Standards for 
Safeguarding Customer Information (Guidelines) set forth standards 
pursuant to section 39 of the Federal Deposit Insurance Act (section 
39, codified at 12 U.S.C. 1831p-1), and sections 501 and 505(b), 
codified at 15 U.S.C. 6801 and 6805(b), of the Gramm-Leach-Bliley 
Act. These Guidelines address standards for developing and 
implementing administrative, technical, and physical safeguards to 
protect the security, confidentiality, and integrity of customer 
information.
   A. Scope. The Guidelines apply to customer information 
maintained by or on behalf of entities for which the Federal Deposit 
Insurance Corporation (FDIC) has authority. Such entities are 
referred to in this appendix as ``the bank.'' These are banks 
insured by the FDIC (other than members of the Federal Reserve 
System), insured state branches of foreign banks, and any 
subsidiaries of such entities (except brokers, dealers, persons 
providing insurance, investment companies, and investment advisers).
   B. Preservation of Existing Authority. Neither section 39 nor 
these Guidelines in any way limit the authority of the FDIC to 
address unsafe or unsound practices, violations of law, unsafe or 
unsound conditions, or other practices. The FDIC may take action 
under section 39 and these Guidelines independently of, in 
conjunction with, or in addition to, any other enforcement action 
available to the FDIC.
   C. Definitions. For purposes of the Guidelines, the following 
definitions apply:
   1. In general. For purposes of the Guidelines, except as 
modified in the Guidelines or unless the context otherwise requires, 
the terms used have the same meanings as set forth in sections 3 and 
39 of the Federal Deposit Insurance Act (12 U.S.C. 1813 and 1831p-
1).
   2. Customer information means any records, data, files, or other 
information containing nonpublic personal information, as defined in 
Sec. 332.3(n) of this chapter (the Privacy Rule), about a customer, 
whether in paper, electronic or other form, that are maintained by 
or on behalf of the bank.
   3. Customer means any customer of the bank as defined in 
Sec. 332.3(h) of this chapter.
   4. Service provider means any person or entity that maintains or 
processes customer information on behalf of the bank, or is 
otherwise granted access to customer information through its 
provision of services to the bank.
   5. Board of directors, in the case of a branch or agency of a 
foreign bank means the managing official in charge of the branch or 
agency.
   6. Customer information systems means the electronic or physical 
methods used to access, collect, store, use, transmit and protect 
customer information.

II. Standards for Safeguarding Customer Information

   A. Information Security Program. Each bank shall implement a 
comprehensive information security program that includes 
administrative, technical, and physical safeguards appropriate to 
the size and complexity of the bank and the nature and scope of its 
activities.
   B. Objectives. A bank's information security program shall:
   1. Ensure the security and confidentiality of customer 
information;
   2. Protect against any anticipated threats or hazards to the 
security or integrity of such information; and
   3. Protect against unauthorized access to or use of such 
information that could result in substantial harm or inconvenience 
to any customer or risk to the safety and soundness of the bank.

III. Development and Implementation of Information Security Program

   A. Involve the Board of Directors and Management. 
   1. The board of directors of each bank shall:
   a. Approve the bank's written information security policy and 
program that complies with these Guidelines; and
   b. Oversee efforts to develop, implement, and maintain an 
effective information security program.
   2. The bank's management shall develop, implement, and maintain 
an effective information security program. In conjunction with its 
responsibility to implement the bank's information security program, 
management of each bank shall regularly:
   a. Evaluate the impact on the bank's security program of 
changing business arrangements, such as mergers and acquisitions, 
alliances and joint ventures, outsourcing arrangements, and changes 
to customer information systems;
   b. Document its compliance with these Guidelines; and
   c. Report to the board on the overall status of the information 
security program, including material matters related to: risk 
assessment; risk management and control decisions; results of 
testing; attempted or actual security breaches or violations and 
responsive actions taken by management; and any recommendations for 
improvements in the information security program.
   B. Assess Risk. To achieve the objectives of its information 
security program, each bank shall:
   1. Identify and assess the risks that may threaten the security, 
confidentiality, or integrity of customer information systems. As 
part of the risk assessment, a bank shall determine the sensitivity 
of customer information and the internal or external threats to the 
bank's customer information systems.
   2. Assess the sufficiency of policies, procedures, customer 
information systems, and other arrangements in place to control 
risks.
   3. Monitor, evaluate, and adjust its risk assessment in light of 
any relevant changes to technology, the sensitivity of customer 
information, and internal or external threats to information 
security.
   C. Manage and Control Risk. As part of a comprehensive risk 
management plan, each bank shall:
   1. Establish written policies and procedures that are adequate 
to control the identified risks and achieve the overall objectives 
of the bank's information security program. Policies and procedures 
shall be commensurate with the sensitivity of the information as 
well as the complexity and scope of the bank and its activities. In 
establishing the policies and procedures, each bank should consider 
appropriate:
   a. Access rights to customer information;
   b. Access controls on customer information systems, including 
controls to authenticate and grant access only to authorized 
individuals and companies;
   c. Access restrictions at locations containing customer 
information, such as buildings, computer facilities, and records 
storage facilities;
   d. Encryption of electronic customer information, including 
while in transit or in storage on networks or systems to which 
unauthorized individuals may have access;
   e. Procedures to confirm that customer information system 
modifications are consistent with the bank's information security 
program;
   f. Dual control procedures, segregation of duties, and employee 
background checks for employees with responsibilities for or access 
to customer information;
   g. Contract provisions and oversight mechanisms to protect the 
security of

[[Page 39487]]

customer information maintained or processed by service providers;
   h. Monitoring systems and procedures to detect actual and 
attempted attacks on or intrusions into customer information 
systems;
   i. Response programs that specify actions to be taken when 
unauthorized access to customer information systems is suspected or 
detected;
   j. Protection against destruction of customer information due to 
potential physical hazards, such as fire and water damage; and
   k. Response programs to preserve the integrity and security of 
customer information in the event of computer or other technological 
failure, including, where appropriate, reconstructing lost or 
damaged customer information.
   2. Train staff to recognize, respond to, and, where appropriate, 
report to regulatory and law enforcement agencies, any unauthorized 
or fraudulent attempts to obtain customer information.
   3. Regularly test the key controls, systems and procedures of 
the information security program to confirm that they control the 
risks and achieve the overall objectives of your information 
security program. The frequency and nature of such tests should be 
determined by the risk assessment, and adjusted as necessary to 
reflect changes in internal and external conditions. Tests shall be 
conducted, where appropriate, by independent third parties or staff 
independent of those that develop or maintain the security programs. 
Test results shall be reviewed by independent third parties or staff 
independent of those that conducted the test.
   4. Monitor, evaluate, and adjust, as appropriate, the 
information security program in light of any relevant changes in 
technology, the sensitivity of its customer information, and 
internal or external threats to information security.
   D. Oversee Outsourcing Arrangements. The bank continues to be 
responsible for safeguarding customer information even when it gives 
a service provider access to that information. The bank must 
exercise appropriate due diligence in managing and monitoring your 
outsourcing arrangements to confirm that your service providers have 
implemented an effective information security program to protect 
customer information and customer information systems consistent 
with these Guidelines.
   E. Implement the Standards. Each bank is to take appropriate 
steps to fully implement an information security program pursuant to 
these Guidelines by July 1, 2001.


   By order of the Board of Directors.

   Dated at Washington, D.C., this 6th day of June, 2000.

Federal Deposit Insurance Corporation.
Robert E. Feldman,
Executive Secretary.

Office of Thrift Supervision

12 CFR Chapter V

Authority and Issuance
   For the reasons set forth in the joint preamble, parts 568 and 570 
of chapter V of title 12 of the Code of Federal regulations are 
proposed to be amended as follows:

PART 568--SECURITY PROCEDURES

   1. The authority citation for part 568 is revised to read as 
follows:

   Authority: Secs. 2-5, 82 Stat. 294-295 (12 U.S.C. 1881-1984); 12 
U.S.C. 1831p-1; 15 U.S.C. 6801, 6805(b)(1).
   2. Amend Sec. 568.1 to revise paragraph (a) to read as follows:


Sec. 568.1  Authority, purpose, and scope.

   (a) This part is issued by the Office of Thrift Supervision 
(``OTS'') pursuant to section 3 of the Bank Protection Act of 1968 (12 
U.S.C. 1882), and sections 501 and 505(b)(1) of the Gramm-Leach-Bliley 
Act (12 U.S.C. 6801, 6805(b)(1). This part is applicable to savings 
associations. It requires each savings association to adopt appropriate 
security procedures to discourage robberies, burglaries, and larcenies 
and to assist in the identification and prosecution of persons who 
commit such acts. Section 568.5 of this part is applicable to savings 
associations and their subsidiaries (except brokers, dealers, persons 
providing insurance, investment companies, and investment advisers). 
Section 568.5 of this part requires covered institutions to establish 
and implement appropriate administrative, technical, and physical 
safeguards to protect the security, confidentiality, and integrity of 
customer information.
* * * * *
   3. Add Sec. 568.5 to read as follows:


Sec. 568.5  Protection of customer information.

   Savings associations and their subsidiaries (except brokers, 
dealers, persons providing insurance, investment companies, and 
investment advisers) must comply with the Interagency Guidelines 
Establishing Standards for Safeguarding Customer Information prescribed 
pursuant to sections 501 and 505 of the Gramm-Leach-Bliley Act (15 
U.S.C. 6801 and 6805), set forth in appendix B to part 570 of this 
chapter.

PART 570--SUBMISSION AND REVIEW OF SAFETY AND SOUNDNESS COMPLIANCE 
PLANS AND ISSUANCE OF ORDERS TO CORRECT SAFETY AND SOUNDNESS 
DEFICIENCIES

   4. Amend Sec. 570.1 to add a sentence to the end of paragraph (a) 
and revise the last sentence of paragraph (b) to read as follows:


Sec. 570.1  Authority, purpose, scope and preservation of existing 
authority.

   (a) * * * Appendix B to this part is further issued under sections 
501(b) and 505 of the Gramm-Leach-Bliley Act (Pub. L. 106-102, 113 
Stat. 1338 (1999)).
   (b) * * * Interagency Guidelines Establishing Standards for 
Safeguarding Customer Information are set forth in appendix B to this 
part.
   5. Amend Sec. 570.2 to revise paragraph (a) to read as follows:


Sec. 570.2  Determination and notification of failure to meet safety 
and soundness standards and request for compliance plan.

   (a) Determination. The OTS may, based upon an examination, 
inspection, or any other information that becomes available to the OTS, 
determine that a savings association has failed to satisfy the safety 
and soundness standards contained in the Interagency Guidelines 
Establishing Standards for Safety and Soundness as set forth in 
appendix A to this part or the Interagency Guidelines Establishing 
Standards for Safeguarding Customer Information as set forth in 
appendix B to this part.
* * * * *
   6. Revise Appendix B to Part 570 to read as follows:

Appendix B to Part 570--Interagency Guidelines Establishing Standards 
for Safeguarding Customer Information

Table of Contents

I. Introduction
   A. Scope
   B. Preservation of Existing Authority
   C. Definitions
II. Standards for Safeguarding Customer Information
   A. Information Security Program
   B. Objectives
III. Development and Implementation of Customer Information Security 
Program
   A. Involve the Board of Directors and Management
   B. Assess Risk
   C. Manage and Control Risk
   D. Oversee Outsourcing Arrangements
   E. Implement the Standards

I. Introduction

   The Interagency Guidelines Establishing Standards for 
Safeguarding Customer Information (Guidelines) set forth standards 
pursuant to section 39 of the Federal Deposit Insurance Act (section 
39, codified at 12 U.S.C. 1831p-1), and sections 501 and

[[Page 39488]]

505(b), codified at 15 U.S.C. 6801 and 6805(b), of the Gramm-Leach-
Bliley Act. These Guidelines address standards for developing and 
implementing administrative, technical, and physical safeguards to 
protect the security, confidentiality, and integrity of customer 
information.
   A. Scope. The Guidelines apply to customer information 
maintained by or on behalf of entities for which OTS has authority. 
For purposes of this appendix, these entities are savings 
associations whose deposits are FDIC-insured and any subsidiaries of 
such savings associations, except brokers, dealers, persons 
providing insurance, investment companies, and investment advisers. 
This appendix refers to such entities as ``you.''
   B. Preservation of Existing Authority. Neither section 39 nor 
these Guidelines in any way limit the OTS's authority to address 
unsafe or unsound practices, violations of law, unsafe or unsound 
conditions, or other practices. OTS may take action under section 39 
and these Guidelines independently of, in conjunction with, or in 
addition to, any other enforcement action available to OTS.
   C. Definitions. For purposes of the Guidelines, the following 
definitions apply:
   1. In general. For purposes of the Guidelines, except as 
modified in the Guidelines or unless the context otherwise requires, 
the terms used have the same meanings as set forth in sections 3 and 
39 of the Federal Deposit Insurance Act (12 U.S.C. 1813 and 1831p-
1).
   2. Customer information means any records, data, files, or other 
information containing nonpublic personal information, as defined in 
12 CFR 573.3(n), about a customer, whether in paper, electronic or 
other form, that you maintain or that are maintained on your behalf.
   3. Customer means any of your customers, as defined in 12 CFR 
573.3(h).
   4. Service provider means any person or entity that maintains or 
processes customer information on your behalf, or is otherwise 
granted access to customer information through its provision of 
services to you.
   5. Customer information systems means the electronic or physical 
methods used to access, collect, store, use, transmit and protect 
customer information.

II. Standards for Safeguarding Customer Information

   A. Information Security Program. You shall implement a 
comprehensive information security program that includes 
administrative, technical, and physical safeguards appropriate to 
your size and complexity and the nature and scope of your 
activities.
   B. Objectives. Your information security program shall:
   1. Ensure the security and confidentiality of customer 
information;
   2. Protect against any anticipated threats or hazards to the 
security or integrity of such information; and
   3. Protect against unauthorized access to or use of such 
information that could result in substantial harm or inconvenience 
to any customer or risk to your safety and soundness.

III. Development and Implementation of Information Security Program

   A. Involve the Board of Directors and Management.
   1. Your board of directors shall:
   a. Approve your written information security policy and program 
that complies with these Guidelines; and
   b. Oversee efforts to develop, implement, and maintain an 
effective information security program.
   2. Your management shall develop, implement, and maintain an 
effective information security program. In conjunction with its 
responsibility to implement your information security program, your 
management shall regularly:
   a. Evaluate the impact on your security program of changing 
business arrangements, such as mergers and acquisitions, alliances 
and joint ventures, outsourcing arrangements, and changes to 
customer information systems;
   b. Document its compliance with these Guidelines; and
   c. Report to your board on the overall status of the information 
security program, including material matters related to; risk 
assessment; risk management and control decisions; results of 
testing; attempted or actual security breaches or violations and 
responsive actions taken by management; and any recommendations for 
improvements in the information security program.
   B. Assess Risk. To achieve the objectives of its information 
security program, you shall:
   1. Identify and assess the risks that may threaten the security, 
confidentiality, or integrity of customer information systems. As 
part of the risk assessment, you shall determine the sensitivity of 
customer information and the internal or external threats to your 
customer information systems.
   2. Assess the sufficiency of policies, procedures, customer 
information systems, and other arrangements in place to control 
risks.
   3. Monitor, evaluate, and adjust your risk assessment in light 
of any relevant changes to technology, the sensitivity of customer 
information, and internal or external threats to information 
security.
   C. Manage and Control Risk. As part of a comprehensive risk 
management plan, you shall:
   1. Establish written policies and procedures that are adequate 
to control the identified risks and achieve the overall objectives 
of your information security program. Policies and procedures shall 
be commensurate with the sensitivity of the information as well as 
the complexity and scope of you and your activities. In establishing 
the policies and procedures, you should consider appropriate:
   a. Access rights to customer information;
   b. Access controls on customer information systems, including 
controls to authenticate and grant access only to authorized 
individuals and companies;
   c. Access restrictions at locations containing customer 
information, such as buildings, computer facilities, and records 
storage facilities;
   d. Encryption of electronic customer information, including 
while in transit or in storage on networks or systems to which 
unauthorized individuals may have access;
   e. Procedures to confirm that customer information system 
modifications are consistent with your information security program;
   f. Dual control procedures, segregation of duties, and employee 
background checks for employees with responsibilities for or access 
to customer information;
   g. Contract provisions and oversight mechanisms to protect the 
security of customer information maintained or processed by service 
providers;
   h. Monitoring systems and procedures to detect actual and 
attempted attacks on or intrusions into customer information 
systems;
   i. Response programs that specify actions to be taken when 
unauthorized access to customer information systems is suspected or 
detected;
   j. Protection against destruction of customer information due to 
potential physical hazards, such as fire and water damage; and
   k. Response programs to preserve the integrity and security of 
customer information in the event of computer or other technological 
failure, including, where appropriate, reconstructing lost or 
damaged customer information.
   2. Train staff to recognize, respond to, and, where appropriate, 
report to regulatory and law enforcement agencies, any unauthorized 
or fraudulent attempts to obtain customer information.
   3. Regularly test the key controls, systems and procedures of 
the information security program to confirm that they control the 
risks and achieve the overall objectives of your information 
security program. The frequency and nature of such tests should be 
determined by the risk assessment, and adjusted as necessary to 
reflect changes in internal and external conditions. Tests shall be 
conducted, where appropriate, by independent third parties or staff 
independent of those that develop or maintain the security programs. 
Test results shall be reviewed by independent third parties or staff 
independent of those that conducted the test.
   4. Monitor, evaluate, and adjust, as appropriate, the 
information security program in light of any relevant changes in 
technology, the sensitivity of its customer information, and 
internal or external threats to information security.

[[Page 39489]]

   D. Oversee Outsourcing Arrangements. You continue to be 
responsible for safeguarding customer information even when you give 
a service provider access to that information. You must exercise 
appropriate due diligence in managing and monitoring your 
outsourcing arrangements to confirm that your service providers have 
implemented an effective information security program to protect 
customer information and customer information systems consistent 
with these Guidelines.
   E. Implement the Standards. You are to take appropriate steps to 
fully implement an information security program pursuant to these 
Guidelines by July 1, 2001.

   Dated: June 9, 2000.

   By the Office of Thrift Supervision.
Ellen Seidman,
Director.
[FR Doc. 00-15798 Filed 6-23-00; 8:45 am]
BILLING CODE 4810-33-P, 6210-01-P, 6714-01-P, 6720-01-P

Last Updated: March 24, 2024