Skip to main content

Gramm-Leach Bliley Act - Teller Addendum

Updated over 2 weeks ago

πŸ“˜ Privacy Rule: Teller Responsibilities


​Step Type: Text
​What learners will learn: How tellers apply GLBA Privacy Rule requirements in branch interactions.
​Step Description: This step explains teller duties under the GLBA Privacy Rule, including delivering privacy notices to customers, handling questions about privacy policies, determining permissible disclosures of nonpublic personal information (NPI), and escalating issues to management or compliance when guidance is unclear. The step provides clear procedures for interacting with customers while maintaining regulatory compliance.
​Summary of Content: Tellers practice understanding Privacy Notice delivery, permissible disclosures, responding to customer privacy questions, and escalation protocols for compliance.
​Key Topics Covered:

  • Delivery of GLBA Privacy Notices

  • Permissible disclosures of nonpublic personal information (NPI)

  • Handling customer privacy questions

  • Escalation when privacy guidance is unclear
    ​

πŸ“˜ Safeguards Rule: Protecting NPI in Branch Operations


​Step Type: Scenario
​What learners will learn: Operational steps to protect customer data in teller interactions.
​Step Description: This step presents scenarios involving day-to-day branch operations where sensitive customer information must be protected. It covers workstation security, private conversation protocols, document handling procedures, and digital security measures. The scenarios require decision-making at multiple points to reinforce proper safeguarding practices and adherence to the GLBA Safeguards Rule.
​Summary of Content: Tellers practice securing workstations, managing paper documents, and applying digital safeguards in realistic branch situations.
​Key Topics Covered:

  • Screen visibility and workstation security

  • Conducting private conversations

  • Proper handling of paper documents

  • Following digital security protocols
    ​

πŸ“˜ Handling Customer Opt-Out Requests


​Step Type: MultiChoice
​What learners will learn: How tellers recognize, document, and escalate customer requests to opt-out of information sharing.
​Step Description: This step presents scenarios in which customers exercise their rights to opt out of information sharing. It details how to identify opt-out requests, explain customers’ rights accurately, and follow the correct escalation procedures to management or compliance for processing and documentation.
​Summary of Content: Tellers reinforce correct identification, response, and escalation of opt-out requests according to GLBA requirements.
​Key Topics Covered:

  • Identifying customer opt-out requests

  • Explaining opt-out rights accurately

  • Escalation procedures for compliance
    ​

πŸ“˜ Pretexting and Social Engineering Awareness


​Step Type: True or False
​What learners will learn: How to recognize and respond to attempts to obtain NPI via deceptive methods.
​Step Description: This step provides guidance on recognizing and responding to deceptive attempts to obtain customer information, including phone calls, emails, or in-person requests. It emphasizes identifying red flags, verifying identities before disclosing information, refusing inappropriate requests, and escalating suspicious interactions according to internal policies and GLBA requirements.
​Summary of Content: Tellers learn to identify social engineering, verify identities, refuse inappropriate requests, and escalate suspicious activity.
​Key Topics Covered:

  • Recognizing pretexting or social engineering attempts

  • Identity verification best practices

  • Escalation of suspicious requests

  • Regulatory rationale under GLBA
    ​

πŸ“˜ Record Disposal and Security


​Step Type: Streak
​What learners will learn: Proper procedures for securing and disposing of physical and electronic customer information.
​Step Description: This step covers procedures for securing and disposing of both physical and electronic customer records. It outlines locking computer screens and devices, properly storing paper documents, shredding sensitive information, and following digital security protocols to protect NPI from unauthorized access, consistent with the GLBA Safeguards Rule.


​Summary of Content: Tellers learn how to lock screens, secure documents, and shred records, maintaining GLBA Safeguards Rule compliance.
​Key Topics Covered:

  • Locking computer screens and devices

  • Securing paper documents

  • Shredding and proper disposal procedures

  • Protecting NPI from unauthorized access
    ​

πŸ“˜ Escalation Protocols for Suspicious Information Requests


​Step Type: Scenario
​What learners will learn: When and how to escalate suspicious or potentially non-compliant requests for customer information.
​Step Description: This step presents branching scenarios where suspicious requests for customer information are encountered. It details how to recognize red flags, follow internal escalation chains, document incidents properly, and involve management or compliance as required to maintain regulatory compliance under GLBA Privacy and Safeguards Rules.
​Summary of Content: Tellers review escalation chains, recognize red flags, and document incidents in accordance with regulatory expectations.
​Key Topics Covered:

  • Recognizing suspicious NPI requests

  • Escalation to management or compliance

  • Documentation of incidents

  • Alignment with GLBA Privacy and Safeguards Rules
    ​

Did this answer your question?