Gramm-Leach-Bliley Act Compliance Plan


This compliance plan ("Plan") describes  K-State's  safeguards to protect non-public, financial-related personal information ("covered information") in accordance with the requirements of the Gramm-Leach-Bliley Act of 1999 (GLBA). The Safeguards Rule of the GLBA, as defined by the Federal Trade Commission (FTC), requires financial institutions, which the FTC explicitly indicated includes higher education institutions, to have an information security program to protect confidentiality and integrity of personal information. 

These safeguards are provided to:

  • Ensure the security and confidentiality of covered information. 
  • Protect against anticipated threats or hazards to the security or integrity of such information.
  • Protect against unauthorized access to or use of covered information that could result in substantial harm or inconvenience to any customer.

This Information Security Plan also provides for mechanisms to:;

  • Designate an employee or employees to coordinate the information security program. 
  • Identify and assess the internal and external risks that may threaten covered information maintained by K-State.
  • Design and implement safeguards to control the identified risks. 
  • Oversee service providers, including third-party contractors, to ensure appropriate safeguards for covered information are maintained. 
  • Periodically evaluate and adjust the information security program as circumstances change. 

This plan responds to the Gramm-Leach-Bliley Act of 1999 that mandates protection of customer information, which for universities is primarily student financial information.


  • Students
  • Faculty
  • Staff
  • Guests



Covered Information
Information that K-State has obtained from a customer (e.g., a student) in the process of offering a financial product or service, or such information provided to the University by another financial institution. Offering a financial product or service includes offering student loans to students, receiving income tax information from a student's parent when offering a financial aid package, and other miscellaneous financial services. Examples of student financial information include addresses, phone numbers, bank and credit card account numbers, income and credit histories, and Social Security numbers, in both paper and electronic format. 

Information Security Program
The administrative, technical, or physical safeguards used to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle covered information.

Service Providers
Any person or entity that receives, maintains, processes, or otherwise is permitted access to covered information through its direct provision of services to the University.

Roles and Responsibilities

Chief Information Security Officer (CISO)
The CISO is responsible for coordinating and overseeing all elements of K-State's information security program. The CISO will work with appropriate personnel from other offices as needed such as the Registrar's Office, Internal Audit, and the Division of Financial Services to ensure protection of covered information.

Information Security Program Elements

Risk Assessment

Under the oversight of the CISO, risk and privacy assessments are performed for all information systems that house or access covered information. These risk and privacy assessments shall address unauthorized access, use, disclosure, disruption, modification and/or destruction of information or the information system itself. Further, the assessments shall identify known potential threats, the likelihood of their occurrence and the magnitude of the impact of those threats should they occur.

Internal and external risks at K-State include, but are not limited to:

  • Unauthorized access of covered information by persons within or outside the University.
  • Compromised system security as a result of human error, vulnerabilities, infection by malicious software, or unauthorized system access.
  • Interception of data during transmission.
  • Loss of data integrity.
  • Physical loss of data in a disaster.
  • Errors introduced into the system.
  • Corruption of data or systems.
  • Unauthorized access through hard copy files or reports.
  • Unauthorized disclosure of covered information through third parties.

Risk and privacy assessments are used to determine the likelihood and magnitude of harm that could come to an information system, the affected individual(s), and ultimately the University itself in the event of a security breach. By determining the amount of risk that exists, the University shall determine how much of the risk should be mitigated and what controls should be used to achieve that mitigation.

Both risk and privacy assessments shall be performed prior to, or if not practical, immediately after acquisition of an information system (in the event that the information system is owned/operated by the University) or prior to the initial establishment of service agreements (in the event that the information system is owned/operated by a third party on behalf of the University). Further, the risk and privacy assessments shall be reviewed and, where required, updated after three years or whenever a significant change is made to the information system, whichever comes first.

Risk assessment should include consideration of risks in each of the following operational areas, in accordance with the requirements of the GLBA:

Employee training and management

Prior to being granted access to covered information, new employees in positions that require access to covered information (e.g., position in the Division of Financial Services, Registrar, and Student Financial Assistance) will receive training on the importance of confidentiality of student records, student financial information, and other types of covered information, and the risks of not providing appropriate protection. Furthermore, all employees receive annual training in general information technology security. Training also covers controls and procedures to prevent employees from providing confidential information to an unauthorized individual through social engineering or improper disposal of documents that contain covered information. All training will be reviewed and, where needed, updated at least annually.

All new employees with access to covered information must pass a criminal background check as a condition of employment.

Each department responsible for maintaining covered information is instructed to take steps to protect the information from destruction, loss or damage due to environmental hazards, such as fire and water damage or technical failures.

Information systems

Including network and software design, as well as information processing, storage, transmission, and disposal.

Incident management

Including detecting, preventing and responding to attacks, intrusions, or other systems failures. K-State's strategy for managing IT security incidents, including assessing risks, is described in the IT Security Incident Reporting process.

Designing and Implementing Safeguards

Safeguards are necessary to mitigate and control the risks identified through risk assessment. Furthermore, the effectiveness of safeguards' key controls, systems, and procedures should be regularly tested to ensure continued protection of covered information. The policy framework for K-State's information security program that governs the design, implementation, and maintenance of these safeguards. Protection of covered information is explicitly encompassed by K-State's comprehensive information security program that protects all K-State information and technology assets, commensurate with size and complexity of the institution, the nature and scope of activities, and the sensitivity of information assets.

Overseeing Service Providers

In the process of choosing a service provider that will maintain or regularly access covered information, the selection and retention processes shall ensure the ability of the service provider to implement and maintain appropriate safeguards for covered information. Contracts with service providers may include the following provisions:

  • An explicit acknowledgment that the contract allows the contract partner access to covered information.
  • A specific definition or description of the covered information being provided. 
  • A stipulation that the covered information will be held in strict confidence and accessed only for the explicit business purpose of the contract.
  • An assurance that the contract partner will protect the covered information it receives according to commercially acceptable standards and no less rigorously than it protects its own covered information.
  • A provision providing for the return or destruction of all covered information received by the contract provider upon completion or termination of the contract.
  • An agreement that any violation of the contract's confidentiality conditions may constitute a material breach of the contract and entitles K-State to terminate the contract without penalty.
  • A provision ensuring that the contract's confidentiality requirements shall survive any termination of the agreement.

Program Evaluation and Adjustment

The CISO will periodically review and adjust the information security program as it relates to the GLBA requirements, with input from the University's Security Team and relevant stakeholders. Program evaluation should be based on results of testing and monitoring of security safeguard effectiveness and reflect changes in technology and/or operations, evolving internal and external threats, and any other circumstances that have a material impact on the information security program. The Office of General Counsel and the Chief Information Officer must review any recommended adjustments.

Related Laws, Regulations, or Policies

Statements regarding compliance with Gramm Leach Bliley have been added to:




Article ID: 190
Wed 6/1/22 12:26 PM
Tue 4/4/23 1:16 PM