
Fundamentals for Newer Directors 2014 (pdf)
The latest edition of ICI’s flagship publication shares a wealth of research and data on trends in the investment company industry.
Stay informed of the policy priorities ICI champions on behalf of the asset management industry and individual investors.
Explore research from ICI’s experts on industry-related developments, trends, and policy issues.
Explore expert resources, analysis, and opinions on key topics affecting the asset management industry.
Read ICI’s latest publications, press releases, statements, and blog posts.
See ICI’s upcoming and past events.
The latest edition of ICI’s flagship publication shares a wealth of research and data on trends in the investment company industry.
Explore expert resources, analysis, and opinions on key topics affecting the asset management industry.
Read ICI’s latest publications, press releases, statements, and blog posts.
See ICI’s upcoming and past events.
ICI Innovate brings together multidisciplinary experts to explore how emerging technologies will impact fund operations and their implications for the broader industry.
ICI Innovate is participating in the Emerging Leaders initiative, offering a heavily discounted opportunity for the next generation of asset management professionals to participate in ICI’s programming.
The Emerging.
Stay informed of the policy priorities ICI champions on behalf of the asset management industry and individual investors.
Explore research from ICI’s experts on industry-related developments, trends, and policy issues.
Explore expert resources, analysis, and opinions on key topics affecting the asset management industry.
Read ICI’s latest publications, press releases, statements, and blog posts.
See ICI’s upcoming and past events.
[20946]
March 13, 2007
TO: PRIVACY ISSUES WORKING GROUP No. 2-07
The Federal Trade Commission (FTC) has recently published Protecting Personal Information, A Guide for Business (the “Guide”), [1] which contains useful and practical information for businesses of all sizes to consider in establishing a data security plan. According to the Guide, a sound data security plan is built on the following five key principles:
1. Taking Stock – This principle involves a business knowing what personal information it has in its files and on its computers. The paper notes that, as part of the taking stock process, businesses may want to consider inventorying all of their computers, laptops, flash drives, home computers and other equipment to find out where sensitive data is stored.
2. Scaling Down – The Guide recommends that businesses keep only that sensitive personally identifying information that they need. If a business does not have a legitimate need for information, it should not collect it. If it does have a need, it should keep the information only as long as necessary. The Guide recommends that businesses that are required to retain information to comply with the law develop a written records retention policy to identify what information must be kept, how to secure it, how long to keep it, and how to dispose of it securely when the business no longer needs it.
3. Locking It – The bulk of the Guide is spent discussing issues to consider relating to protecting sensitive personally identifying information. While appropriate security depends on the kind of information a business maintains and how it is stored, in developing a data security plan, businesses may want to consider four key elements: physical security, electronic security, employee training, and the security practices of contractors and service providers. The Guide contains advice relating to each of these elements, including the following:
4. Pitching It – The Guide recommends that business implement information disposal practices that are reasonable and appropriate to prevent unauthorized access to – or use of – personally identifying information. Such practices should be based on the sensitivity of the information, the costs and benefits of different disposal methods, and changes in technology. The Guide contains useful information regarding proper disposal and notes that a business should make sure that employees who work from home following the business’ procedures for disposing of sensitive documents, old computers, and portable storage devices.
5. Planning Ahead – According to the Guide, a business should consider preparing today for future breaches to reduce their impact on the business, its employees, and its customers. This can be accomplished by having a plan in place to respond to breaches, including procedures governing containing, investigating, and providing notice of the breach, as appropriate to consumers, law enforcement, customers, credit bureaus, and other businesses that may be impacted.
The Guide includes a list of additional websites and publications containing more information about securing sensitive data.
Tamara K. Salmon
Senior Associate Counsel
[1] The Guide is available on the FTC’s website at: http://www.ftc.gov/bcp/edu/pubs/business/privacy/bus69.pdf. See also the discussion of establishing an effective records management program in the Investment Company Institute’s Electronic Recordkeeping & Communications, Guidance for Investment Companies & Investment Advisers (2006) (http://www.ici.org/pdf/ppr_06_elec_comm.pdf) ar 29-43, which provides advice consist with the FTC’s Guide.
Latest Comment Letters:
TEST - ICI Comment Letter Opposing Sales Tax on Additional Services in Maryland
ICI Comment Letter Opposing Sales Tax on Additional Services in Maryland
ICI Response to the European Commission on the Savings and Investments Union