AAB-legal
AAB-legal

Are you complient?

Are you compliant with the GLBA? Failure to comply could cost your business thousands of dollars in fines..

The following information is provided by AAB-iScan to assist businesses. It should not be construed as legal advice.
What is the Gramm-Leach-Bliley Act?

Broadly speaking, the Gramm-Leach-Bliley Financial Services Modernization Act of 1974 (GLBA or GLB) restricts with whom businesses can share customer information and mandates that businesses take steps to safeguard customer information and inform customers of how their information will be used.
Who does the GLBA affect?

The GLBA applies to financial institutions, but that includes more than just banks and credit unions. As defined, financial institutions are entities significantly involved in financial activities, including auto dealers, loan brokers, tax preparers, insurance companies and many others.

What role does document management play in GLBA compliance?

The GLBA required certain government agencies, including the Federal Trade Commission (FTC), to establish appropriate standards for the financial institutions they oversee to protect the nonpublic personal information of their customers. To comply with this, the FTC added the Safeguards Rule: Standards for Safeguarding Customer Information, which went into effect in 2003. The rule requires that financial institutions create and implement a written information security program that explains how a business ensures the security and confidentiality of customer information, specifically by protecting against unauthorized access to customer information and foreseeable threats or hazards to customer information. GLBA violations can result in fine of up to $100,000 and/or up to 5 years in prison.

Here's where an electronic document management system (EDMS) like AAB-iScan On-Demand solution can help your business comply with this federal rule. An EDMS protects your customers' information (as well as your own data) more completely than a file cabinet - even a locked cabinet - ever can. Paper documents are vulnerable to human misuse by an employee or intruder as well as natural hazards like fire and flood.


On the other hand, once your paper documents have been scanned into an EDMS, they are protected against unauthorized access. With AAB-iScan On-Demand solution, you can grant access only to specific employees who need to use that information. This limits your exposure to identity theft by employees and just plain snooping. Furthermore, in every stage of transfer and access your data is secured against hacking with 256-bit AES encryption, which is authorized by the federal government to protect Top Secret-level classified information.

Your customers' information is also protected against natural disasters by several safeguards. AAB-iScan On-Demand solution keeps multiple backups of all your data in multiple locations so that if one copy is ever damaged, the system can roll back to another copy. In case of fire, our data facility has a state of the art dry fire suppression system. Even during a power outage, your information is safe and accessible to you.

Protecting your customers' information isn't just required by law, it's also good business. Make sure an electronic document management system like AAB-iScan On-Demand solution is a part of your federally mandated plan to protect your customer’s information.
What else do I need to do to comply with the GLBA?

Other sections of the GLBA may require that you give your customers privacy notices explaining what information you are collecting and how it will be used and give opt-out notices before sharing customer information with nonaffiliated third parties. For more information, check out the links for further reading below.
Contact AAB Services

Further Reading

Related Articles

AAB - Networking Overview

At its most basic level, computer AAB - Networking is about linking various computing devices together. The distances between connected hardware can be modest (across a room) or vast (across the globe), but many of the same underlying technologies are employed: Routers, switches, Ethernet cables, optical fiber, Wi-Fi networks, IP addresses, and networking protocols. Network administrators and architects need to be acquainted with all of these technologies. ...more

With AAB Network Solutions

At AAB Network Solutions, we provide companies with state of the art computer network infrastructure design to facilitate optimum performance. The benefits gained by our solutions designed by our certified engineers make a fundamental difference in the way you work, translating in to a competitive edge, higher profitability, and a positive impact on your bottom line. ...more

AAB - Cloud Computing Overview

In the AAB - Cloud computing model, IT resources are accessed over the Internet (or another network) as a service. There are a variety of cloud computing models, including public cloud computing, where IT resources are shared among users who access the service over the Internet. A private cloud generally limits access to those resources, often has computing resources onsite, and is under more direct control by the customer using the service. ...more

Call Directly (AYY) 765- 233 -6045 (phone) All in one! Your Choice! Your Source! Did you AbcFz.com today?