Information Security Program Overview
Purpose
This document describes Boston Financial Data Services’ Information Security Program,
Infrastructure Policies and Information Security Requirements. We are committed to
ensuring the safety of our customer’s data from unauthorized use, access, disclosure,
theft, manipulation, reproduction or possible security breach, during the tenure of our
relationship.
Our Information Security Program employs a layered security approach, forming a defense
in depth strategy to mitigate known or potential security risks. Major components of the
program include Risk Assessment, Security Assessment, Security Awareness, Security
Policies and Standards, Risk Mitigation and Reporting. A dedicated Information Security
team, led by the Information Security Officer was established in 2005, and is responsible
for the management of the program. to ensure the prevention of unauthorized access to
the environment supporting the services provided to our customers. We implement
commercially accepted technologies and apply appropriate methods of security to ensure
that the integrity and privacy of our customer’s data is protected. Our security program is
reviewed annually and adheres to industry standards and best practices that addresses the
critical requirements of safeguarding information based on:
 International Organization for Standardization 27002 (ISO/IEC 17799:2005)
 COBIT Framework and Control Objectives
 BITS Financial Services Roundtable Shared Assessment Program
 Legal Compliance Requirements including but not limited to:
 California’s Security Breach Notification Act
 Massachusetts Privacy Act
 Gramm-Leach Bliley Act (“GLB 501b – Standards for Safeguarding Customer
Information”) and implementing legislation and regulations
 Sarbanes Oxley Act (“SOX-404”)
 FTC Information Security Requirements for Safeguarding Customer
Information
 Other state and federal laws and regulations relating to safeguarding
information
Key Points:
 Management Commitment
 Review and Evaluation
 Industry and Regulatory Standards
 Defense in depth via a layered approach
Scope
The scope of the Information Security Program and Requirements at Boston Financial
encompasses Information Security Administration, Security Technology Infrastructure and
Security Policy Management. Consistent monitoring to detect changes in the threat
landscape, allow us to be more proactive with changes to our production environment, and
gives us the ability to act in a reasonable manner to address potential exposure to known
or reported risks targeting our information systems.
 Information Security Administration includes:
 Education and Awareness
 Security Incident Response
 Audit and Reporting
 Information Security Policies includes:
 Security Management
 Risk Management
 Personnel Security
 Physical Security
 Operations Management
 Security Monitoring and Response
 Communications Management
 Access Control
 Network Security
 Third Party Services
 Application Development
 Recovery and Business Continuity
 Legal, Compliance and Regulatory
 Information Security Technology Infrastructure includes:
 Access Controls
 Encryption of information in transit through non-dedicated circuits only
 Host Security
 Data Security
 Data Retention
Boston Financial recognizes the need for customer assurance and validation that all private
and sensitive data are being protected. As a result, all security policies must be reviewed
and updated as necessary in accordance to regulatory changes and best practices outlined
in ISO/IEC 27002 (17799:2005). Security policies are confidential and will not be
disseminated to any third-party. Customers can validate the safety of their data and
security principles employed at Boston Financial in one of the following ways:
 Clients may review our Information Security policies on premise with
Information Security Officer
 Boston Financial will answer follow up questions that remain after client
review of the Standard Information Gathering (SIG) document
 Clients can request copy of SSAE16 audit report
 Clients can request an executive summary of independent third-party
Network and Application security assessment findings. The report is
confidential and will not be shared with clients
If you have any questions or require any further information please contact your
relationship manager or the Information Security Officer at Boston Financial.

More Related Content

PDF
Health care compliance webinar may 10 2017
PDF
HealthCare Compliance - HIPAA & HITRUST
PPTX
Log Monitoring and File Integrity Monitoring
PPTX
EU's General Data Protection Regulation (GDPR)
PPTX
[ON-DEMAND WEBINAR] Construction Companies: Manage Cyber Risk Exposure & Prev...
 
PPTX
General Data Protection Regulation (GDPR)
PPTX
What Data Center Compliance Means for Your Business
PPT
Is Security Team 2 Glba
Health care compliance webinar may 10 2017
HealthCare Compliance - HIPAA & HITRUST
Log Monitoring and File Integrity Monitoring
EU's General Data Protection Regulation (GDPR)
[ON-DEMAND WEBINAR] Construction Companies: Manage Cyber Risk Exposure & Prev...
 
General Data Protection Regulation (GDPR)
What Data Center Compliance Means for Your Business
Is Security Team 2 Glba

What's hot (16)

PDF
An Overview of the Major Compliance Requirements
PPTX
Privacy and Money Laundering Prof. Hernan Huwyler CPA MBA
PPTX
IRBsearch | GLBA data
PDF
Protect Cardholder Data and Maintain PCI Compliance with PCI Penetration Testing
PDF
GDPR Quick Reference for American Accountants (CPA Seminar)
PDF
Preparing for GDPR Compliance...
PDF
Accelerating Regulatory Compliance for IBM i Systems
PDF
Boards of Directors and GDPR Prof. Hernan Huwyler, MBA CPA
PPTX
Access Control Systems
PDF
It security iso 27001
PPTX
Sensitive data
PDF
Québec's Privacy Modernization: Bill 64
PDF
Qa Financials - 10 Smart Controls for Software Development
DOCX
Migration approachquestionnaire checklist
PDF
Datasheet: Security
PDF
CyNation - 7 things you should know about EU-GDPR
An Overview of the Major Compliance Requirements
Privacy and Money Laundering Prof. Hernan Huwyler CPA MBA
IRBsearch | GLBA data
Protect Cardholder Data and Maintain PCI Compliance with PCI Penetration Testing
GDPR Quick Reference for American Accountants (CPA Seminar)
Preparing for GDPR Compliance...
Accelerating Regulatory Compliance for IBM i Systems
Boards of Directors and GDPR Prof. Hernan Huwyler, MBA CPA
Access Control Systems
It security iso 27001
Sensitive data
Québec's Privacy Modernization: Bill 64
Qa Financials - 10 Smart Controls for Software Development
Migration approachquestionnaire checklist
Datasheet: Security
CyNation - 7 things you should know about EU-GDPR
Ad

Similar to Mn bfdsprivacy (20)

PPTX
Infosec policies to appsec standards ed final
PDF
Information Security It's All About Compliance
PPTX
2011 hildebrandt institute cio forum data privacy and security presentation...
PPTX
A practical data privacy and security approach to ffiec, gdpr and ccpa
PDF
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
PPTX
Information Security Management System ISO/IEC 27001:2005
PPTX
Government Standards for Cybersecurity: Ensuring a Secure Cyber Environment
PDF
Fadi Mutlak - Information security governance
PPT
Implementing an Information Security Program
PPTX
Information security principles
PDF
CNIT 160 Ch 4a: Information Security Programs
PDF
CNIT 160 Ch 4a: Information Security Programs
PDF
Valiente Balancing It SecurityCompliance, Complexity & Cost
PDF
Compliance poster
DOCX
Risk Assessment
DOCX
R.a 1
PPT
Information Security Framework
PDF
Information Risk Security model and metrics
PDF
CCA study group
PPT
Data Risks In A Digital Age
Infosec policies to appsec standards ed final
Information Security It's All About Compliance
2011 hildebrandt institute cio forum data privacy and security presentation...
A practical data privacy and security approach to ffiec, gdpr and ccpa
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
Information Security Management System ISO/IEC 27001:2005
Government Standards for Cybersecurity: Ensuring a Secure Cyber Environment
Fadi Mutlak - Information security governance
Implementing an Information Security Program
Information security principles
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security Programs
Valiente Balancing It SecurityCompliance, Complexity & Cost
Compliance poster
Risk Assessment
R.a 1
Information Security Framework
Information Risk Security model and metrics
CCA study group
Data Risks In A Digital Age
Ad

More from wardell henley (20)

PDF
RP_Patch_Management_S508C.pdf
PDF
mita_overview.pdf
PDF
Landscape_Medicaid_Healthcare_Information_Technology.pdf
PDF
Facets Overview and Navigation User Guide.pdf
PDF
self_inspect_handbook_nisp.pdf
PDF
Itil a guide to cab meetings pdf
PDF
9 150928065812-lva1-app6892 gmp
PDF
It security cert_508
PDF
15466 mba technology_white_paper
PDF
Best practices for_implementing_security_awareness_training
PDF
213946 dmarc-architecture-identifier-alignmen
PPT
Soa security2
PPT
Cissp chapter-05ppt178
PDF
Enterprise%20 security%20architecture%20 %20business%20driven%20security
PPT
3 securityarchitectureandmodels-120331064706-phpapp01
PDF
Splunk 7.2.3-security-hardeningstandards
PDF
Ms app 1.5.1-msinfra-bestpracticesguide
PDF
IBM enterprise Content Management
PDF
oracle EBS
PDF
5 principles-securing-devops-veracode-whitepaper
RP_Patch_Management_S508C.pdf
mita_overview.pdf
Landscape_Medicaid_Healthcare_Information_Technology.pdf
Facets Overview and Navigation User Guide.pdf
self_inspect_handbook_nisp.pdf
Itil a guide to cab meetings pdf
9 150928065812-lva1-app6892 gmp
It security cert_508
15466 mba technology_white_paper
Best practices for_implementing_security_awareness_training
213946 dmarc-architecture-identifier-alignmen
Soa security2
Cissp chapter-05ppt178
Enterprise%20 security%20architecture%20 %20business%20driven%20security
3 securityarchitectureandmodels-120331064706-phpapp01
Splunk 7.2.3-security-hardeningstandards
Ms app 1.5.1-msinfra-bestpracticesguide
IBM enterprise Content Management
oracle EBS
5 principles-securing-devops-veracode-whitepaper

Recently uploaded (20)

PPTX
Modernising the Digital Integration Hub
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
DOCX
search engine optimization ppt fir known well about this
PDF
STKI Israel Market Study 2025 version august
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPTX
2018-HIPAA-Renewal-Training for executives
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPT
What is a Computer? Input Devices /output devices
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
Five Habits of High-Impact Board Members
Modernising the Digital Integration Hub
Improvisation in detection of pomegranate leaf disease using transfer learni...
Enhancing plagiarism detection using data pre-processing and machine learning...
search engine optimization ppt fir known well about this
STKI Israel Market Study 2025 version august
OpenACC and Open Hackathons Monthly Highlights July 2025
1 - Historical Antecedents, Social Consideration.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
sbt 2.0: go big (Scala Days 2025 edition)
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
2018-HIPAA-Renewal-Training for executives
Custom Battery Pack Design Considerations for Performance and Safety
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Developing a website for English-speaking practice to English as a foreign la...
What is a Computer? Input Devices /output devices
Build Your First AI Agent with UiPath.pptx
Five Habits of High-Impact Board Members

Mn bfdsprivacy

  • 1. Information Security Program Overview Purpose This document describes Boston Financial Data Services’ Information Security Program, Infrastructure Policies and Information Security Requirements. We are committed to ensuring the safety of our customer’s data from unauthorized use, access, disclosure, theft, manipulation, reproduction or possible security breach, during the tenure of our relationship. Our Information Security Program employs a layered security approach, forming a defense in depth strategy to mitigate known or potential security risks. Major components of the program include Risk Assessment, Security Assessment, Security Awareness, Security Policies and Standards, Risk Mitigation and Reporting. A dedicated Information Security team, led by the Information Security Officer was established in 2005, and is responsible for the management of the program. to ensure the prevention of unauthorized access to the environment supporting the services provided to our customers. We implement commercially accepted technologies and apply appropriate methods of security to ensure that the integrity and privacy of our customer’s data is protected. Our security program is reviewed annually and adheres to industry standards and best practices that addresses the critical requirements of safeguarding information based on:  International Organization for Standardization 27002 (ISO/IEC 17799:2005)  COBIT Framework and Control Objectives  BITS Financial Services Roundtable Shared Assessment Program  Legal Compliance Requirements including but not limited to:  California’s Security Breach Notification Act  Massachusetts Privacy Act  Gramm-Leach Bliley Act (“GLB 501b – Standards for Safeguarding Customer Information”) and implementing legislation and regulations  Sarbanes Oxley Act (“SOX-404”)  FTC Information Security Requirements for Safeguarding Customer Information  Other state and federal laws and regulations relating to safeguarding information Key Points:  Management Commitment  Review and Evaluation  Industry and Regulatory Standards  Defense in depth via a layered approach Scope The scope of the Information Security Program and Requirements at Boston Financial encompasses Information Security Administration, Security Technology Infrastructure and Security Policy Management. Consistent monitoring to detect changes in the threat landscape, allow us to be more proactive with changes to our production environment, and
  • 2. gives us the ability to act in a reasonable manner to address potential exposure to known or reported risks targeting our information systems.  Information Security Administration includes:  Education and Awareness  Security Incident Response  Audit and Reporting  Information Security Policies includes:  Security Management  Risk Management  Personnel Security  Physical Security  Operations Management  Security Monitoring and Response  Communications Management  Access Control  Network Security  Third Party Services  Application Development  Recovery and Business Continuity  Legal, Compliance and Regulatory  Information Security Technology Infrastructure includes:  Access Controls  Encryption of information in transit through non-dedicated circuits only  Host Security  Data Security  Data Retention Boston Financial recognizes the need for customer assurance and validation that all private and sensitive data are being protected. As a result, all security policies must be reviewed and updated as necessary in accordance to regulatory changes and best practices outlined in ISO/IEC 27002 (17799:2005). Security policies are confidential and will not be disseminated to any third-party. Customers can validate the safety of their data and security principles employed at Boston Financial in one of the following ways:  Clients may review our Information Security policies on premise with Information Security Officer  Boston Financial will answer follow up questions that remain after client review of the Standard Information Gathering (SIG) document  Clients can request copy of SSAE16 audit report  Clients can request an executive summary of independent third-party Network and Application security assessment findings. The report is confidential and will not be shared with clients If you have any questions or require any further information please contact your relationship manager or the Information Security Officer at Boston Financial.