GLBA Safeguards Rule Updates: What’s New, Best Practices, and Compliance Tips

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

GLBA Safeguards Rule Updates: What’s New, Best Practices, and Compliance Tips

Kevin Henry

Data Protection

March 16, 2025

6 minutes read
Share this article
GLBA Safeguards Rule Updates: What’s New, Best Practices, and Compliance Tips

FTC Safeguards Rule Amendment Overview

The latest GLBA Safeguards Rule updates add a federal Breach Notification Requirement for nonbank financial institutions, requiring notice to the FTC when a Notification Event affects 500 or more consumers. You must report as soon as possible and no later than 30 days after discovery, using the FTC Reporting Form; the FTC may publicly post your submission, increasing Enforcement Risk and reputational exposure. ([ftc.gov](https://www.ftc.gov/business-guidance/resources/ftc-safeguards-rule-what-your-business-needs-know?utm_source=openai))

At a high level, these changes clarify what triggers a report, specify the content of the notification, and align your Written Information Security Plan (WISP) with incident readiness and response. Together, they reinforce the obligation to safeguard Nonpublic Personal Information through documented risk management, rapid detection, and timely, accurate reporting. ([ftc.gov](https://www.ftc.gov/business-guidance/resources/ftc-safeguards-rule-what-your-business-needs-know?utm_source=openai))

Defining Notification Events

What the rule considers a Notification Event

A Notification Event is the unauthorized acquisition of unencrypted customer information involving at least 500 consumers. “Unencrypted” also covers data encrypted where an unauthorized person accessed the encryption key, and unauthorized access to unencrypted data is presumed to be unauthorized acquisition unless you have reliable evidence to the contrary. ([ftc.gov](https://www.ftc.gov/business-guidance/resources/ftc-safeguards-rule-what-your-business-needs-know?utm_source=openai))

When discovery occurs

The 30‑day clock starts the day the event is “discovered,” which is when it becomes known to any employee, officer, or agent (other than the person committing the breach). Treat “discovery” as an organizational standard, not just the security team’s awareness. ([law.cornell.edu](https://www.law.cornell.edu/cfr/text/16/314.4?utm_source=openai))

Practical examples

  • Exfiltration of a customer database containing Nonpublic Personal Information by a threat actor after credential compromise.
  • A stolen device holding customer information where the encryption key was also exposed (for example, harvested from a synced cloud profile).
  • A service provider incident that enabled unauthorized access to unencrypted customer information for 500+ consumers.

Notification Content Requirements

Your submission must include six elements: (1) the financial institution’s name and contact information; (2) the types of information involved; (3) the event date or date range (if determinable); (4) the number of consumers affected or potentially affected; (5) a general description of the event; and (6) whether a law‑enforcement official has requested delayed public disclosure, with contact details. Law enforcement can seek an initial delay up to 30 days, extendable up to 60 more days; further delay requires FTC staff determination. ([law.cornell.edu](https://www.law.cornell.edu/cfr/text/16/314.4?utm_source=openai))

Using the FTC Reporting Form

Report online via the FTC Reporting Form, which captures institution and contact details, event dates, number of consumers, types of data, and a narrative summary. The form notes that your report may be made public and explains how to submit supporting materials securely. ([ftc.gov](https://www.ftc.gov/business-guidance/privacy-security/gramm-leach-bliley-act/safeguards-rule-form?utm_source=openai))

Effective Date and Applicability

The breach notification amendment took effect on Monday, May 13, 2024 (180 days after publication in the Federal Register on November 13, 2023). If your organization discovers a qualifying event on or after that date, the federal reporting obligation applies. ([ftc.gov](https://www.ftc.gov/business-guidance/blog/2024/05/safeguards-rule-notification-requirement-now-effect?utm_source=openai))

The Safeguards Rule applies to nonbank “financial institutions” under FTC jurisdiction—such as mortgage brokers, motor vehicle dealers, and payday lenders—among others. Banks remain under separate banking‑agency frameworks. Validate applicability early to avoid missed deadlines and downstream Enforcement Risk. ([ftc.gov](https://www.ftc.gov/news-events/news/press-releases/2023/10/ftc-amends-safeguards-rule-require-non-banking-financial-institutions-report-data-security-breaches?utm_source=openai))

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Developing a Written Information Security Plan

Build a WISP that operationalizes the rule

A strong Written Information Security Plan (WISP) turns policy into repeatable practice. Anchor your WISP in a documented risk assessment; assign a qualified individual to oversee the program; implement access controls and multi‑factor authentication; encrypt Nonpublic Personal Information at rest and in transit; monitor and log activity; test safeguards; train personnel; manage service providers; and maintain a written incident response plan aligned to the Rule’s Breach Notification Requirements. ([law.cornell.edu](https://www.law.cornell.edu/cfr/text/16/314.4?utm_source=openai))

Create a succinct Risk Assessment Summary

  • Scope: systems, data flows, and repositories containing Nonpublic Personal Information.
  • Threats and vulnerabilities: internal, external, and supply‑chain risks.
  • Likelihood and impact ratings with rationale.
  • Controls mapping: preventive, detective, corrective; gaps and planned remediations.
  • Control owners, timelines, and residual risk acceptance.

Align incident response to Notification Events

  • Define “discovery” triggers and internal SLAs so day‑zero is unambiguous.
  • Pre‑draft evidence checklists to quickly evaluate whether unauthorized acquisition occurred (including encryption‑key exposure).
  • Stand up a reporting workstream to assemble FTC Reporting Form content within 30 days.

Annual Reporting and Board Communication

At least annually, your qualified individual should brief the Board (or governing body/senior officer) on the overall status of the program and material matters, including risk assessment results, risk management and control decisions, service‑provider oversight, testing outcomes, significant security events or violations and management’s responses, and recommended program changes. Tie this to business objectives and Enforcement Risk to secure sustained investment. ([law.cornell.edu](https://www.law.cornell.edu/cfr/text/16/314.4?utm_source=openai))

Board‑ready artifacts

  • Risk Assessment Summary with key trends and top residual risks.
  • Metrics: time to detect, time to contain, training completion, patch cadence, and third‑party assessment coverage.
  • Regulatory posture: incidents evaluated against Notification Event criteria and any FTC submissions.

Review and Improvement of WISP

Treat your WISP as a living program. Review at least annually and whenever material changes occur—to systems, threats, business processes, or after a security incident. Incorporate test results, monitoring insights, and post‑incident lessons learned, and then update safeguards, playbooks, and training accordingly. ([ftc.gov](https://www.ftc.gov/business-guidance/resources/ftc-safeguards-rule-what-your-business-needs-know?utm_source=openai))

Continuous‑improvement playbook

  • Quarterly controls health checks; annual independent testing.
  • Tabletop exercises that rehearse timeline pressures for 30‑day FTC reporting.
  • Service‑provider reviews focused on detection, escalation, and evidence preservation.
  • Version‑controlled WISP with change logs tied to risk decisions and compliance obligations.

Conclusion

The GLBA Safeguards Rule updates elevate incident readiness: know what a Notification Event is, decide fast, and submit a complete, timely notice. Build a WISP that is risk‑based, testable, and board‑visible, and you will reduce breach impact, meet federal timelines, and limit Enforcement Risk while protecting consumers’ Nonpublic Personal Information.

FAQs.

What constitutes a notification event under the Safeguards Rule?

A Notification Event is the unauthorized acquisition of unencrypted customer information affecting 500 or more consumers. Data is considered unencrypted if an unauthorized person accessed the encryption key, and unauthorized access to unencrypted data is presumed to be unauthorized acquisition unless you have reliable evidence disproving it. ([ftc.gov](https://www.ftc.gov/business-guidance/resources/ftc-safeguards-rule-what-your-business-needs-know?utm_source=openai))

How soon must breaches affecting 500 or more consumers be reported?

You must notify the FTC as soon as possible, and no later than 30 days after discovery of the Notification Event. The 30‑day window starts when any employee, officer, or agent (other than the wrongdoer) knows of the event. ([law.cornell.edu](https://www.law.cornell.edu/cfr/text/16/314.4?utm_source=openai))

What are the required elements in a breach notification?

Provide your organization’s name and contact information; the types of information involved; the date or date range (if determinable); the number of consumers affected or potentially affected; a general description of the event; and whether law enforcement requested delayed public disclosure, with a way for the FTC to contact that official. Submit via the FTC Reporting Form, which may be made public. ([law.cornell.edu](https://www.law.cornell.edu/cfr/text/16/314.4?utm_source=openai))

How often must organizations review and update their WISP?

Review your WISP at least annually and whenever material changes occur—such as new systems, emerging threats, organizational changes, or after an incident—to reflect testing and monitoring results and to maintain effective safeguards and compliance. ([ftc.gov](https://www.ftc.gov/business-guidance/resources/ftc-safeguards-rule-what-your-business-needs-know?utm_source=openai))

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles