FTC Safeguards Rule Modernization
The U.S. Federal Trade Commission approved amendments to the Gramm-Leach-Bliley Act Safeguards Rule on October 27, 2021, imposing risk assessments, encryption, testing, and incident response obligations on financial institutions and service providers handling consumer financial data.
Accuracy-reviewed by the editorial team
The U.S. Federal Trade Commission voted on to strengthen the Safeguards Rule (16 CFR Part 314). The final rule expands security program requirements for nonbank financial institutions and vendors that store or process consumer financial information. This full update represents the most significant overhaul of the Safeguards Rule since its original adoption in 2003, reflecting two decades of technological advancement, evolving cyber threats, and lessons learned from major data breaches affecting financial services customers.
Regulatory Background and Scope
The Gramm-Leach-Bliley Act (GLBA) enacted in 1999 required financial institutions to explain their information-sharing practices and safeguard sensitive customer data. The FTC's Safeguards Rule implements these requirements for financial institutions not subject to other federal regulators.
The 2021 amendments modernize the rule to address contemporary cybersecurity threats and align with industry good practices developed by organizations like the National Institute of Standards and Technology (NIST). The expanded definition of financial institution now includes mortgage brokers, motor vehicle dealers engaged in financing, payday lenders, finance companies, account servicers, check cashers, wire transferors, collection agencies, credit counselors, tax preparation firms, non-federally insured credit unions, and investment advisors not registered with the SEC. This broader scope affects thousands of additional businesses that previously operated under minimal federal cybersecurity requirements.
Key Program Governance Requirements
Covered institutions must designate a qualified individual responsible for overseeing and implementing the information security program. This individual may be an employee, affiliate, or service provider but must have sufficient authority, stature, and resources to manage the program effectively.
The designated person must deliver written reports to boards of directors or equivalent governing bodies at least annually, covering the overall status of the information security program, compliance with the Safeguards Rule, material matters related to the program including risk assessment findings, security events and responses, and recommendations for program changes. Organizations must document full written risk assessments that identify reasonably foreseeable internal and external risks to customer information security, assess the sufficiency of existing safeguards, and implement controls to address identified risks.
Technical Safeguard Mandates
The updated rule mandates specific technical controls that previous versions left to institutional discretion. Multi-factor authentication is now required for any individual accessing customer information systems, unless the qualified individual has approved equivalent or more secure access controls in writing. Encryption must protect customer information both at rest and in transit, with the qualified individual authorized to approve alternative compensating controls only after documented evaluation.
Access controls must limit user permissions based on need-to-know principles, with procedures for adding, modifying, and removing access as employment relationships change. Continuous monitoring or annual penetration testing combined with semi-annual vulnerability assessments ensures ongoing security posture evaluation. Secure software development practices apply to in-house applications, while procedures must evaluate the security of externally developed applications before deployment.
Incident Response Requirements
Institutions need written incident response plans outlining goals, internal processes for responding to security events, clear definition of roles and responsibilities, internal and external communications procedures, identification of requirements for remediation, documentation and reporting protocols, and evaluation and revision procedures following incidents. The response plan must address how the organization will determine the nature and scope of incidents, take appropriate steps to contain and control them, and prevent similar future occurrences. Post-incident reviews must evaluate response effectiveness and update programs as needed.
Service Provider Oversight
Financial institutions bear responsibility for service provider security practices affecting customer information. Organizations must select providers capable of maintaining appropriate safeguards, contractually require setup of such safeguards, and periodically assess provider compliance based on the risk presented. Due diligence should examine provider security certifications, audit reports, insurance coverage, and incident history before engagement.
Implementation Timeline and Compliance Strategy
Most provisions took effect December 2022, with certain requirements phased in through June 2023. If you are affected, map all products, services, and vendor relationships falling within the expanded Safeguards Rule scope. Gap assessments should compare existing security programs against new requirements, prioritizing highest-risk deficiencies.
Board reporting cadences and documentation practices need updating to meet annual report requirements. Engineering and IT teams must implement multi-factor authentication and encryption baseline controls across all systems accessing customer information. Penetration testing programs require scheduling and vendor procurement if not already established. Service provider contracts should incorporate updated security requirements and assessment provisions.
Enforcement and Penalties
The FTC enforces the Safeguards Rule through civil actions seeking injunctive relief and civil penalties. Violations may result in penalties up to $50,120 per violation under current inflation-adjusted maximums. The Commission has brought numerous enforcement actions against financial institutions for Safeguards Rule failures, often following data breaches that exposed customer information. State attorneys general may also pursue parallel enforcement under state unfair and deceptive practices laws.
Continue in the Compliance pillar
Return to the hub for curated research and deep-dive guides.
Latest guides
-
Third-Party Risk Oversight Playbook
Operationalize OCC, Federal Reserve, EBA, and MAS outsourcing expectations with lifecycle controls, continuous monitoring, and board reporting.
-
Compliance Operations Control Room
Implement cross-border compliance operations that satisfy Sarbanes-Oxley, DOJ guidance, EU DORA, and MAS TRM requirements with verifiable evidence flows.
-
ESG Assurance Operating Guide
Deploy credible ESG assurance across CSRD, SEC climate disclosure, and ISSA 5000 requirements with regulator-aligned controls, data governance, and audit-ready evidence.
Coverage intelligence
- Published
- Coverage pillar
- Compliance
- Source credibility
- 90/100 — high confidence
- Topics
- FTC Safeguards Rule · GLBA compliance · Financial data protection · Security governance
- Sources cited
- 3 sources (ftc.gov, federalregister.gov, iso.org)
- Reading time
- 6 min
Further reading
- FTC Press Release — FTC Strengthens Security Safeguards for Consumer Financial Information Held by Non-Banks — ftc.gov
- Federal Register — Standards for Safeguarding Customer Information — federalregister.gov
- ISO 37301:2021 — Compliance Management Systems — International Organization for Standardization
Comments
Community
We publish only high-quality, respectful contributions. Every submission is reviewed for clarity, sourcing, and safety before it appears here.
No approved comments yet. Add the first perspective.