Skip Navigation
Skip to Menu Toggle Button

UMGC Policy X-1.29 UMGC Policy on Gramm-Leach-Bliley Act (GLBA) Compliance

Policy CategoryPolicy OwnerVersion Effective DateReview CycleLast ReviewedPolicy Contact
X. Information Governance, Security & TechnologyChief Transformation OfficerJune 11, 2025Every 5 yearsJune 11, 2025Info. Security
  1. Purpose
    The Gramm-Leach-Bliley Act (GLBA) and its implementing regulations as amended requires Financial Institutions to protect, to the extent reasonably possible, the Security, Privacy, and Confidentiality of Covered Information. Because UMGC engages in Financial Services, such as student financial aid, the Federal Trade Commission considers the University a Financial Institution for GLBA purposes.
  2. Scope
    This Policy applies to Covered Information provided by a student or other third party to the University, resulting from any service or transaction performed by the University for a student or other third party, or otherwise obtained by the University.
  3. Definitions
    Defined terms are capitalized throughout this Policy and can be found in the Information Governance Glossary.
  4. Policy Statements
    1. The University will designate one or more qualified individuals to be responsible for overseeing, implementing, and enforcing the UMGC Information Security Program ("IS Program") as it relates to GLBA.
    2. The IS Program will identify and assess internal and external risks to the Security, Confidentiality, and Integrity of Covered Information that could result in the unauthorized disclosure, misuse, alteration, destruction or any other compromise of such Information. The IS Program will provide guidance to appropriate personnel in central administration, academic departments, and other University departments in evaluating their current practices and procedures and assessing the sufficiency of any safeguards in place to control these risks.
    3. The IS Program will coordinate with appropriate personnel to design and implement safeguards, as needed, to minimize or mitigate the risks identified in assessments and shall develop a plan to regularly test or otherwise monitor the effectiveness of such safeguards. The IS Program will ensure that monitoring of the safeguards shall be performed on an ongoing basis and adjustments to the IS Program shall be made as needed.
    4. The IS Program will be responsible for ensuring that related security policies and operational procedures are documented, in use, and known to all affected parties.
    5. The IS Program shall work with the University’s Office of Procurement and Office of Legal Affairs in developing methods and procedures for selecting and retaining Third-Party Providers that are capable of maintaining appropriate safeguards for Covered Information. Contract language shall require Third-Party Providers to implement and maintain appropriate safeguards for those computing resources that collect, access, maintain, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle Covered Information.
    6. The IS Program will be responsible for establishing and maintaining an Incident response plan.
    7. The IS Program will report annually to the senior leadership of UMGC on the risk posed to UMGC by information technology, cybersecurity, and privacy to the institution.
  5. Enforcement
    1. Any employee, contractor, or other third-party performing duties on behalf of the University with knowledge of an alleged violation of this Policy shall notify Information Security as soon as practicable.
    2. Any employee, contractor, or other third-party performing duties on behalf of the University who violates this Policy may be denied access to the University’s Information Technology Resources and may be subject to other penalties and disciplinary action, up to and including termination of employment or contract.
  6. Standards Referenced
    1. Most recent versions:
      1. USM IT Security Standards
      2. NIST SP 800-171 “Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations”
      3. Cybersecurity Maturity Model Certification (CMMC)
  7. Related Policies and References
    1. UMGC Information Governance, Security, and Technology Policies