Gramm-Leach-Bliley Act (GLBA)
The Financial Services Modernization Act of 1999 (also known as Gramm Leach Bliley Act (GLBA) 15 U.S.C. §6801) governs the use, sharing, and collection of financial information. It requires “financial institutions” to take steps to protect customers’ nonpublic personal information. Because Ohio State and higher education institutions like Ohio State participate in financial activities such as making student loans, the Federal Trade Commission's regulations consider them financial institutions and subject to certain GLBA regulations. Higher education institutions must comply with the Safeguards Rule of GLBA however they are exempt from the Privacy Rule by being compliant with the Family Educational Rights and Privacy Act (FERPA).
GLBA Security Plan
Purpose
This document is The Ohio State University Gramm Leach Bliley Act (GLBA) Security Plan. The goal of this document is to provide an outline to assure ongoing compliance with federal regulations related to the Safeguards Rule of GLBA. The University Bursar is responsible for the GLBA Security Plan and its periodic review. While not limited to the following, these offices are known to be covered under the scope of GLBA regulations to the extent they have access to in scope data: Office of the University Bursar, Student Financial Aid, Office of the Controller, the Office of the University Registrar, and the Office of Technology and Digital Innovation. The University’s Security Framework and Privacy and Release of Student Education Records Policy, which addresses FERPA compliance at Ohio State, supplement this document.
GLBA mandates that the University:
- Designate one or more employees to coordinate its information security program;
- Identify and assess the risks to customer information in each relevant area of the University’s operations, and evaluate the effectiveness of the current safeguards for controlling these risks
- Design and implement a safeguards program, and regularly monitor and test it;
- Select service providers that can maintain appropriate safeguards, make sure your contract requires them to maintain safeguards, and oversee their handling of customer information; and
- Evaluate and adjust the program in light of relevant circumstances, including changes in the University’s business or operations, or the results of security testing and monitoring.
Scope
For purposes of GLBA, covered data is limited to financial information connected to student and parent finances such as student and parent loans, bank account information and income tax information for financial aid packages. Emergency faculty loans are also considered in scope. Covered data resides in the University’s Student Information System (SIS), Tableau, Workday, and the Operational Data Store (ODS).
Plan Statement
I. Information Security Program Coordinator
The Chief Information Security Officer is the Information Security Program Coordinator for the University. The GLBA Information Security Program is part of the larger University Information Security Program.
The GLBA Information Security Program is evaluated periodically to make appropriate adjustments and educational reminders are sent to the University community. Questions regarding interpretations and applicability of the GLBA and implementing federal regulations is coordinated with the Office of the University Bursar.
II. Risk Assessment and Safeguards
Covered data is housed in several systems therefore multiple areas of the University are responsible for assessing risks and putting safeguards in place to protect customer’s information. The Office of the University Bursar and the Office of Technology and Digital Innovation work together to identify and assess risks to (a) customer information including detection, prevention and response to attacks, intrusions and other system failures, (b) information systems, including network and software design, as well information processing, storage, transmission and disposal, and (c) employee training and education, and in each case, put safeguards in place to address those risks and regularly test those safeguards to make sure they are effective.
III. Employee training and education
While directors and supervisors are ultimately responsible for ensuring compliance with information security practices, the Office of the University Bursar has developed and implemented GLBA training for all employees who have access to covered data. These employees typically fall into three categories: professionals in information technology; data stewards; and those employees who use the data as part of their essential job duties. New employees must successfully complete GLBA training as well as pass a quiz in order to gain access to student financial or financial aid data. In addition, current employees that have access to student financial or financial aid data must complete GLBA training and pass a quiz at least once every fiscal year. Current employees that do not complete the training by the required deadline have their access removed and must complete the training as well as pass the quiz before access is restored.
IV. Oversight of Service Providers and Contracts
GLBA requires the University to take reasonable steps to select and retain service providers who maintain appropriate safeguards for covered data and information. Vendors who will have access to covered data must undergo a security risk assessment to identify and document risks associated with them transmitting and/or storing customer data. Appropriate data security provisions are included in contracts with such vendors.
V. Evaluation and Revision of the Information Security Program
GLBA mandates that the Information Security Program be subject to periodic review and adjustment as a result of the risk assessments and material changes to the University’s operations or business. Processes such as data access procedures and the training program undergo regular review in relevant offices of the University.
Resources:
- GLBA Training - BuckeyeLearn
- Cybersecurity at Ohio State - Office of Technology and Digital Innovation
- FERPA at Ohio State - Office of the University Registrar
- How To Comply with the Privacy of Consumer Financial Information Rule of the Gramm-Leach-Bliley Act - Federal Trade Commission
Identity Theft Red Flags
The Ohio State University recognizes that identity theft is an issue that can result in harm to its customers as well as the institution. The purpose of a red flags program is to detect patterns, practices and specific forms of activity that indicate the existence of identity theft and prevent a customer from using false identifying information to obtain goods, services or credit. In addition, identifying information maintained by the University must be protected to the greatest possible extent.
Ohio State Red Flags Program
Coming Soon!
University Account Establishment Red Flags Guidelines
Initiation of a relationship with a customer for the purpose of establishing a University Account as defined in the Identity Theft Red Flags policy. Examples include individual submits a credit application request, patient completes registration paperwork, individual requests to purchase a good or service such as memberships, tuition payment plans, etc.
Red Flag ID # | Description of Red Flag | Examples of Detection Mechanisms* | Employee Action Steps | Supervisor Action Steps |
---|---|---|---|---|
1 | Fraud alert is included with a consumer report | Credit report where there are statements regarding identification mismatch, fraud alert or credit freeze. | 1) Do not process transaction until further information can be obtained 2) Unit should contact consumer reporting agency to validate identifying information 3) If validation is acceptable, proceed with customer initiation activity 4) If validation is not acceptable, do not proceed with the customer initiation activity and report the incident to supervisor | 1) Notify customer that the transaction cannot be processed 2) Collect and retain any documents for potential evidence 3) Report incident to the University Police as appropriate |
2 | Notice of a credit freeze in response to a request for a consumer report | Credit report where there are statements regarding identification mismatch, fraud alert or credit freeze. | 1) Do not process transaction until further information can be obtained 2) Unit should contact consumer reporting agency to validate identifying information 3) If validation is acceptable, proceed with customer initiation activity 4) If validation is not acceptable, do not proceed with the customer initiation activity and report the incident to supervisor | 1) Notify customer that the transaction cannot be processed 2) Collect and retain any documents for potential evidence 3) Report incident to the University Police as appropriate |
3 | Consumer reporting agency provides a notice of address discrepancy | Credit report where there is an indication of an address discrepancy | 1) Do not process transaction until further information can be obtained 2) Unit should contact consumer reporting agency to validate identifying information 3) If validation is acceptable, proceed with customer initiation activity 4) If validation is not acceptable, do not proceed with the customer initiation activity and report the incident to supervisor | 1) Notify customer that the transaction cannot be processed 2) Collect and retain any documents for potential evidence 3) Report incident to the University Police as appropriate |
4 | Unusual credit activity, such as an increased number of accounts or inquiries | Credit report where there is an indication of an unusual number of inquiries | 1) Do not process transaction until further information can be obtained 2) Unit should contact consumer reporting agency to validate identifying information 3) If validation is acceptable, proceed with customer initiation activity 4) If validation is not acceptable, do not proceed with the customer initiation activity and report the incident to supervisor | 1) Notify customer that the transaction cannot be processed 2) Collect and retain any documents for potential evidence 3) Report incident to the University Police as appropriate |
5 | Document provided for identification appears to be altered or forged | Picture on identification is not representative of customer
| 1) Request additional government issued ID 2) If second identification is satisfactory, proceed with the customer initiation activity 3) If second identification is not satisfactory, do not proceed with the customer initiation activity and report the incident to supervisor | 1) Notify customer that the transaction cannot be processed 2) Collect and retain any documents for potential evidence 3) Report incident to the University Police as appropriate |
6 | Photograph on identification is inconsistent with the appearance of the customer | Picture on identification is not representative of customer
| 1) Request additional government issued ID 2) If second identification is satisfactory, proceed with the customer initiation activity 3) If second identification is not satisfactory, do not proceed with the customer initiation activity and report the incident to supervisor | 1) Notify customer that the transaction cannot be processed 2) Collect and retain any documents for potential evidence 3) Report incident to the University Police as appropriate |
7 | Information on identification is inconsistent with information provided by the person opening the account | Name, address or other information from identification does not match application form | 1) Ask customer to clarify discrepancy and provide additional government issued ID, if necessary 2) If explanation is reasonable, proceed with the customer initiation activity 3) If explanation is not satisfactory, do not proceed with the customer initiation activity and report the incident to supervisor | 1) Notify customer that the transaction cannot be processed 2) Collect and retain any documents for potential evidence 3) Report incident to the University Police as appropriate |
8 | Information on identification (such as signature) is inconsistent with existing information on file | Name, address or other information from identification does not match application form | 1) Ask customer to clarify discrepancy and provide additional government issued ID, if necessary 2) If explanation is reasonable, proceed with the customer initiation activity 3) If explanation is not satisfactory, do not proceed with the customer initiation activity and report the incident to supervisor | 1) Notify customer that the transaction cannot be processed 2) Collect and retain any documents for potential evidence 3) Report incident to the University Police as appropriate |
9 | Application appears to be forged, altered or destroyed and reassembled | Signature on completed application does not match signature on identification or any other available documentation or
| 1) Request additional government issued ID 2) If second identification is satisfactory, proceed with the customer initiation activity 3) If second identification is not satisfactory, do not proceed with the customer initiation activity and report the incident to supervisor | 1) Notify customer that the transaction cannot be processed 2) Collect and retain any documents for potential evidence 3) Report incident to the University Police as appropriate |
10A | Information on identification does not match the address in a consumer report or existing system or application | Name, address or other information from identification does not match application form | 1) Ask customer to clarify discrepancy and provide additional government issued ID, if necessary 2) If explanation is reasonable, proceed with the customer initiation activity 3) If explanation is not satisfactory, do not proceed with the customer initiation activity and report the incident to supervisor | 1) Notify customer that the transaction cannot be processed 2) Collect and retain any documents for potential evidence 3) Report incident to the University Police as appropriate |
10B | Social security number provided by customer has not been issued or appears on the Social Security Administrator’s Death Master File | 1) Verify Social Security number has been issued via Social Security Number Verification Service 2) If Social Security number appears to be valid, proceed with customer initiation activity 3) If Social Security number does not appear to be valid, ask customer to confirm provided Social security number 4) If same number is provided, do not proceed with the customer initiation activity and report the incident to supervisor | 1) Notify customer that the transaction cannot be processed 2) Collect and retain any documents for potential evidence 3) Report incident to the University Police as appropriate | |
11 | Range in the social security number does not correlate to the date of birth | 1) Verify Social Security number has been issued via Social Security Number Verification Service 2) If Social Security number appears to be valid, proceed with customer initiation activity 3) If Social Security number does not appear to be valid, ask customer to confirm provided Social security number 4) If same number is provided, do not proceed with the customer initiation activity and report the incident to supervisor | 1) Notify customer that the transaction cannot be processed 2) Collect and retain any documents for potential evidence 3) Report incident to the University Police as appropriate | |
12 | Personal identifying information has been associated with known fraud activity | Person’s name has been included in an University alert
| 1) Do not proceed with the customer initiation activity and report the incident to supervisor | 1) Notify customer that the transaction cannot be processed 2) Collect and retain any documents for potential evidence 3) Report incident to the University Police as appropriate |
13 | Suspicious address is supplied, such as a mail drop or prison or phone numbers associated with pagers or answering service | 1) Do not proceed with the customer initiation activity and report the incident to supervisor | 1) Notify customer that the transaction cannot be processed 2) Collect and retain any documents for potential evidence 3) Report incident to the University Police as appropriate | |
14 | Social security number provided matches that submitted by another person opening an account or other customers | 1) Verify Social Security number has been issued via Social Security Number Verification Service 2) If Social Security number appears to be valid, proceed with customer initiation activity 3) If Social Security number does not appear to be valid, ask customer to confirm provided Social security number 4) If same number is provided, do not proceed with the customer initiation activity and report the incident to supervisor | 1) Notify customer that the transaction cannot be processed 2) Collect and retain any documents for potential evidence 3) Report incident to the University Police as appropriate | |
15 | An address or phone number matching that supplied by a large number of applicants | 1) Do not proceed with the customer initiation activity and report the incident to supervisor | 1) Notify customer that the transaction cannot be processed 2) Collect and retain any documents for potential evidence 3) Report incident to the University Police as appropriate | |
16 | Person opening the account is unable to supply identifying information in response to notification that an application is incomplete | 1) Do not proceed with the customer initiation activity and report the incident to supervisor | 1) Notify customer that the transaction cannot be processed 2) Collect and retain any documents for potential evidence 3) Report incident to the University Police as appropriate | |
17 | Personal information is inconsistent with information already on file | Name, address or other information from identification does not match application form, other available documents or information already on file in system | 1) Ask customer to clarify discrepancy and provide additional government issued ID, if necessary 2) If explanation is reasonable, proceed with the customer initiation activity | 1) Notify customer that the transaction cannot be processed 2) Collect and retain any documents for potential evidence 3) Report incident to the University Police as appropriate |
18 | Person opening an account or customer is unable to correctly answer challenge questions | 1) Do not proceed with the customer initiation activity and report the incident to supervisor | 1) Notify customer that the transaction cannot be processed 2) Collect and retain any documents for potential evidence 3) Report incident to the University Police as appropriate | |
19 | Shortly after change of address is received, receive request for additional users of the account | 1) Ask customer to clarify discrepancy and provide additional government issued ID, if necessary 2) If explanation is reasonable, proceed with the customer initiation activity 3) If explanation is not satisfactory, do not proceed with the customer initiation activity and report the incident to supervisor | 1) Notify customer that the transaction cannot be processed 2) Collect and retain any documents for potential evidence 3) Report incident to the University Police as appropriate | |
20 | Most of the available credit is used for cash advances, jewelry or electronics and/or customer fails to make first payment | Not applicable | Not applicable | |
21 | Drastic changes in payment patterns, use of available credit or spending patterns | Not applicable | Not applicable | |
22 | An account that has been inactive for a lengthy time suddenly exhibits unusual activity | Not applicable | Not applicable | |
23 | Mail sent to customer repeatedly returned as undeliverable despite ongoing transactions on active account | Not applicable | Not applicable | |
24 | Customer indicates that they are not receiving paper account statements | Not applicable | Not applicable | |
25 | Customer notifies that there are unauthorized charges or transactions on customer’s account | Not applicable | Not applicable | |
26 | Institution notified that it has opened a fraudulent account for a person engaged in identity theft | Not applicable | Not applicable |
* Below is the list of the forms of acceptable identification. The presented identification must contain a photograph.
- Current validated OSU employee or student identification card OSU ID number (e.g. BuckID or other University issued ID card)
- State issued driver’s license
- State issued identification
- U.S. passport
- Non-U.S. passport with I-94 card (Visa)
- Government issued military ID
- U.S. Bureau of Indian Affairs ID
- Major credit card
University Billing and Account Payments Red Flags Guidelines
Payment on an account or closure of an account as defined in the Identity Theft Red Flags policy. Examples include missing account statements, unauthorized transactions, suspicious address or phone changes by the customer, etc.
Red Flag ID # | Description of Red Flag | Examples of Detection Mechanisms* | Employee Action Steps | Supervisor Action Steps |
---|---|---|---|---|
1 | Fraud alert is included with a consumer report | Not applicable | Not applicable | |
2 | Notice of a credit freeze in response to a request for a consumer report | Not applicable | Not applicable | |
3 | Consumer reporting agency provides a notice of address discrepancy | Not applicable | Not applicable | |
4 | Unusual credit activity, such as an increased number of accounts or inquiries | Not applicable | Not applicable | |
5 | Document provided for identification appears to be altered or forged | Not applicable | Not applicable | |
6 | Photograph on identification is inconsistent with the appearance of the customer | Not applicable | Not applicable | |
7 | Information on identification is inconsistent with information provided by the person opening the account | Not applicable | Not applicable | |
8 | Information on identification (such as signature) is inconsistent with existing information on file | Not applicable | Not applicable | |
9 | Application appears to be forged, altered or destroyed and reassembled | Not applicable | Not applicable | |
10A | Information on identification does not match the address in a consumer report or existing system or application | Not applicable | Not applicable | |
10B | Social security number provided by customer has not been issued or appears on the Social Security Administrator’s Death Master File | Not applicable | Not applicable | |
11 | Range in the social security number does not correlate to the date of birth | Not applicable | Not applicable | |
12 | Personal identifying information has been associated with known fraud activity | Not applicable | Not applicable | |
13 | Suspicious address is supplied, such as a mail drop or prison or phone numbers associated with pagers or answering service | Payment sent by mail statement indicates suspicious change of address or phone number | 1) Call the customer to verify change 2) If the change is valid, proceed with change 3) If the change appears to be suspicious report the incident to supervisor | 1) Collect and retain any documents for potential evidence 2) Report the incident to University Police as appropriate 3) Report any financial fraud per the Financial Fraud Reporting Policy |
14 | Social security number provided matches that submitted by another person opening an account or other customers | Not applicable | Not applicable | |
15 | An address or phone number matching that supplied by a large number of applicants | Not applicable | Not applicable | |
16 | Person opening the account is unable to supply identifying information in response to notification that an application is incomplete | Not applicable | Not applicable | |
17 | Personal information is inconsistent with information already on file | Not applicable | Not applicable | |
18 | Person opening an account or customer is unable to correctly answer challenge questions | Not applicable | Not applicable | |
19 | Shortly after change of address is received, receive request for additional users of the account | Not applicable | Not applicable | |
20 | Most of the available credit is used for cash advances, jewelry or electronics and/or customer fails to make first payment | First payment is missed on account | 1) If first payment is missed, review the application to verify that the account is not fraudulent 2) If the application detects fraudulent activity and report the incident to supervisor | 1) Collect and retain any documents for potential evidence 2) Report the incident to University Police as appropriate 3) Report any financial fraud per the Financial Fraud Reporting Policy |
21 | Drastic changes in payment patterns, use of available credit or spending patterns | Not applicable | Not applicable | |
22 | An account that has been inactive for a lengthy time suddenly exhibits unusual activity | Not applicable | Not applicable | |
23 | Mail sent to customer repeatedly returned as undeliverable despite ongoing transactions on active account | 1) Call the customer to verify address 2) If the change is valid, proceed with change 3) If the change appears to be suspicious report the incident to supervisor | 1) Collect and retain any documents for potential evidence 2) Report the incident to University Police as appropriate 3) Report any financial fraud per the Financial Fraud Reporting policy | |
24 | Customer indicates that they are not receiving paper account statements | Customer did not receive their statement | 1) Verify address with customer 2) If the customer states that the address on file is incorrect, then verify the customer’s personal identification and obtain correct address from customer. If information cannot be verified report the incident to supervisor. 3) If the customer states that the address on file is correct refer the customer to the US Postal Service for further investigation | 1) Collect and retain any documents for potential evidence 2) If the customer cannot produce verifying information, report the incident to University Policy as appropriate 3) Report any financial fraud per the Financial Fraud Reporting policy |
25 | Customer notifies that there are unauthorized charges or transactions on customer’s account | Upon receiving their statement, the customer notices unauthorized charges or transactions | 1) Review statement transactions with customer in order to verify that the transactions were fraudulent 2) If the employee believes the transaction to be fraudulent, employee reports the incident to supervisor | 1) Collect and retain any documents for potential evidence 2) Report the incident to University Police as appropriate 3) Report any financial fraud per the Financial Fraud Reporting policy |
26 | Institution notified that is has opened a fraudulent account for a person engaged in identity theft | 1) Review statement transactions with customer in order to verify that the transactions were fraudulent 2) If the transaction appears to be fraudulent, report the incident to supervisor | 1) Collect and retain any documents for potential evidence 2) Report the incident to University Police as appropriate 3) Report any financial fraud per the Financial Fraud Reporting policy | |
27 | Other | 1) If the transaction appears to be fraudulent, report the incident to supervisor | 1) Collect and retain any documents for potential evidence 2) Report the incident to University Police as appropriate 3) Report any financial fraud per the Financial Fraud Reporting policy |
Manager's Checklist
Note: All of the following steps should be reviewed on an annual basis.
- Review internal processes where goods, services or credit are provided to customers and implement the guidelines as necessary.
- Develop a compliance plan for your college or department to meet the requirements of the university red flags policy. Determine which of the 26 red flags apply to your business practices and which of the university red flag guidelines you should incorporate into your plan.
- Your compliance plan should begin with an assessment of your current business practices. Identify areas in your business processes where there is risk for identity theft to occur.
- Consider the types of accounts and the number of ways those accounts are created or assessed. Have you been defrauded before by someone using stolen information? How was it done? Are they process or technology based?
- The compliance plan should include details such as roles and responsibilities of each staff member.
- Update internal control structure or standard operating procedures as appropriate to reflect university guidelines.
- Determine the risk associated with each of your business processes.
- Determine whether you have proper controls in place or whether you should add some. Do gaps exist in your business procedures to identify individuals establishing university accounts? Do your procedures require a customer to present a photo identification to establish an account?
- Your compliance plan may incorporate documenting and reinforcing many of your existing controls.
- Annually review internal processes, control structures and standard operating procedures for continued compliance with guidelines.
- The updates should document the action steps as defined in the Identity Theft Red Flags guidelines and how these guidelines will be applied within your unit.
- Don't forget to update any internal training manuals or other materials.
- Identify employees who must complete training and ensure that training is completed in BuckeyeLearn.
- Ensure that your staff receives the necessary training. This includes training on the unit's internal processes as well as taking the online red flags training. Make sure that you and your staff are familiar with university policies related to protecting identifying information.
- New employees will need to complete this training within two weeks of their hire date.
Questions regarding the policy and training should be directed to the University Bursar (internalbursar@osu.edu).
Resources:
- Identity Theft Red Flags Training - BuckeyeLearn
- Identity Theft Red Flags Policy
Cash Management Regulations
The U.S. Department of Education published cash management regulations (34CFR668.161-167) via the Federal Register on October 30, 2015. This web page is published to comply with these regulatory reporting requirements.
Any United States bank account may be used for your student refund via direct deposit. Ohio State has partnered with Huntington National Bank; however, opening a Huntington account is voluntary and is not required to receive any Ohio State services, including direct deposit. No preferential treatment is given to Huntington account holders. For a listing of Huntington account options, including features and fees, please visit www.huntington.com/personal/checking. The agreement allows the BuckID Card to be linked to a Huntington banking account as a choice and provides additional optional banking as a convenience.
In compliance with the Department of Education cash management regulations, the following information was provided by Huntington National Bank to The Ohio State University and is in regards to the number of Ohio State students who had a Huntington Asterisk-Free checking account open at any time during the most recently completed award year and the mean and median of the actual costs incurred by Ohio State students who have Huntington Financial Account(s).
Award Year Ending June 30, 2024
Huntington National Bank
Category | Data |
---|---|
Student Accounts | 19,706 |
Mean Student Cost | $1.20 |
Median Student Cost | $0.00 |
Total Consideration | $0.00 |
**OSU Student accounts = consumer Asterisk-Free checking account, primary owner 18-24 (at reporting month), household match to OSU student file
Please visit Huntington's Asterisk-Free Checking Account for more information.
Resources:
- The Ohio State University and The Huntington National Bank Affinity and License Agreement
- Amendment #2 to Huntington Affinity and License Agreement
Digital information and digital services acquired, developed, or delivered prior to August 1, 2018, are subject to the applicable web and digital accessibility standards in effect at that time and specifically to the provisions for “legacy” content in the Digital Accessibility Policy.
Related Resources
- Registration, Fees and Important Dates
- Buckeye Link
- Student Financial Aid
- My Buckeye Link Reference Guide
- Ohio Residency for Tuition
- University Housing
- Dining Services
- Student Health Insurance
- Student Legal Services
- The Graduate School
- Military and Veterans Services
- Office of International Affairs
- Admissions
- Office of Human Resources
Contact Buckeye Link
P: 614-292-0300
W: help.osu.edu
Location
1st Floor Lobby
Student Academic Services Building
281 W. Lane Avenue
Columbus, Ohio 43210
Office Hours
M-R 9:00am - 5:00pm
F 9:00am - 4:00pm