Identity Finder Helps You Comply with Gramm-Leach-Bliley Act

Identity Finder helps your organization comply with the Gramm-Leach-Bliley Act (GLBA). The GLBA requires organizations to comply with the FTC's Privacy Rule, and is designed to protect consumer financial privacy by limiting how nonpublic personal information (NPI) may be used. Under the GLBA, "each financial institution has an affirmative continuing obligation to respect the privacy of its customers and to protect the security and confidentiality of those customers' nonpublic personal information." NPI includes any personally identifiable information including name, address, income, social security numbers, account information, credit card numbers, or any other non-public information.

Expand Collapse

The FTC Privacy Rule requires organizations to take reasonable actions to reduce risks to computer systems. Given the well-known risks associated with breaches of personal information, it is vital to remove personal information from unauthorized devices. After all, devices which do not contain unauthorized personal information cannot cause a breach.

How You Will Comply with GLBA

Identity Finder enforces compliance with the Gramm-Leach-Bliley Act and the FTC's Privacy Rule in more than 10 ways:
  1. Identity Finder secures computers against the risk of breaches by eliminating, redacting, encrypting, or quarantining sensitive personal information;
  2. Identity Finder enforces GLBA privacy policies on any network device, over the entire enterprise network, and enables employees or security and compliance officers to shred/destroy, redact, encrypt, or quarantine unnecessary sensitive data or consolidate necessary data;
  3. Identity Finder decreases GLBA compliance costs by reducing the number of devices subject GLBA oversight;
  4. Identity Finder enables security and compliance officers to conduct security and compliance assessments showing a gap analysis between what is in and out of compliance with your GLBA privacy and financial policies;
  5. Identity Finder's gap analysis drives business process changes that prevent future sensitive data leakage;
  6. Identity Finder enables security and compliance officers to identify specific devices and employees who store confidential data, and enforce university confidential data policies from a centralized console;
  7. Identity Finder implements and enforces data retention and disposal policies, pursuant to GLBA policies;
  8. Identity Finder creates a comprehensive sensitive data inventory over the entire university network;
  9. Identity Finder's sensitive inventory enables a targeted, surgical response, should a breach ever occur;
  10. Identity Finder has an extremely low false-positive rate, enabling security and compliance officers to save on wasted time and costs looking through irrelevant data;
  11. Identity Finder encourages employees to engage in data management best practices by providing a dashboard and reporting interface for both technical and executive level employees that displays your compliance status at any point in time.
See for yourself. Request a live demo to learn how to protect your organization by finding and protecting sensitive information.
Identity Finder DLP
  • Minimize false positives and search more accurately
  • Low costs w/ less training, hardware, and proserv
  • Scalable from 100 to 100,000+ employees
  • Search with agent, client, or agentlessly
  • Comply with regulations more easily
  • Centralized management and reporting
What's New