- Customer: An individual who has applied for and/or obtained a financial service or product from Longwood University intended for personal or household use. Students and students' parents may be classified as customers.
- Covered Data: Any paper or electronic record containing nonpublic personal financial information about a customer that the University manages. Covered Data may be provided by students or others in order to obtain a financial product or service from the University.
- Financial Service: Includes offering or servicing student and employee loans, receiving income tax information from a student or a student’s parent when offering a financial aid package, and engaging in debt collection activities.
The Vice President for Administration & Finance oversees this policy, and Longwood University Information Technology Services and Longwood University Financial Operations are responsible for implementation and proper procedures.
The Gramm-Leach-Bliley Act (GLBA), administered by the Federal Trade Commission (FTC), requires colleges and universities that provide financial services to establish policies and procedures for the privacy and safeguarding of nonpublic personal financial information. Specifically, The GLBA Privacy of Consumer Financial Information Rule (16 CFR § 313) and the GLBA Safeguards Rule mandates that Longwood University establish appropriate administrative, technical, and physical safeguards (16 CFR § 314); which are applicable to academic units, offices, or departments that collect, store, or process Covered Data. This policy is designed to address the steps to protect customer nonpublic personal financial information.
It shall be the policy of Longwood University to manage customers' nonpublic financial information as confidential records. Longwood University provides appropriate procedures to protect such customer financial information against reasonable threats and hazards and unauthorized access or use of such records that could result in substantial harm or inconvenience to customers.
- Responsible Positions:
- The Vice President of Administration and Finance is the GLBA Privacy Officer responsible for overseeing the implementation of the University GLBA Program including GLBA departmental risk assessments and GLBA security training. The GLBA Privacy Officer may designate other representatives of the University to oversee and coordinate additional elements of the program.
- The Chief Information Officer is the GLBA Information Technology Officer responsible for ensuring the overall security of electronic systems and infrastructure for the University, including the Information Technology Services (ITS) risk assessment, data security, threat detection, as well as monitoring and controlling system activities.
- Risk Analysis: University departments that manage or have access to Covered Data must complete an annual written risk assessment that examines the reasonably foreseeable security risks of data impacted by availability, confidentiality, and integrity.
- Securing Information: Department heads will appoint a trusted and knowledgeable employee to oversee their individual department’s safeguarding programs. These employees will serve on the GLBA Compliance Committee reporting to the GLBA Privacy Officer and the GLBA Information Technology Officer.
- Training: Departments shall ensure that all new and existing University employees, including student workers who are involved in activities covered under the Act, receive the GLBA training. Documentation will be maintained as proof of the University's compliance with the training requirement under this policy and GLBA Safeguard Rule.
- Monitoring and Detection: ITS shall continuously monitor information systems. Responsible departments will regularly assess their procedures and controls to safeguard Covered Data.
- Program Failures: Departments must immediately report significant failures of their safeguarding program to the department manager and refer to departmental standards and procedures.
- Reporting: The GLBA Privacy Officer or the GLBA Information Technology Officer shall report at least annually to the Board of Visitors in writing regarding the overall status of the program and any other material matters related to the information security program.
- References: The following policies and addendum supplement and help to create a comprehensive information security plan. Referral and adherence to these documents is imperative to overall protection of customer information. The following documents are incorporated by reference into the plan.
Approved by the Board of Visitors, September 11, 2004.
Revised and approved by the Board of Visitors, June 9, 2023.