Information Security Policy for [RIA Firm Name] Purpose This Information Security Policy establishes the framework for [RIA Firm Name], a Registered Investment Advisor, to protect nonpublic personal information (NPI) of clients, comply with federal and state regulations, including Regulation S-P (17 CFR Part 248.30) and the Gramm-Leach-Bliley Act (GLBA), and mitigate cybersecurity risks. Scope This policy applies to all employees, contractors, and third-party service providers who access, process, or store NPI on behalf of [RIA Firm Name]. NPI includes client names, Social Security numbers, account numbers, financial details, or any information that could identify a client or access their accounts. Definitions Nonpublic Personal Information (NPI): Information about clients, including names, Social Security numbers, account numbers, or financial data, as defined by Regulation S-P. Sensitive Customer Information: NPI that, if accessed or used without authorization, could cause significant harm (e.g., Social Security numbers, account access codes). Covered Institution: [RIA Firm Name], as a registered investment adviser under the Investment Advisers Act of 1940. Policy 1. Information Safeguards Access Controls: Access to NPI is restricted to authorized personnel only. Systems require unique user IDs, strong passwords (minimum 12 characters, mixed case, numbers, symbols), and multi-factor authentication (MFA) for all client data systems. Encryption: NPI is encrypted at rest (AES-256) and in transit (TLS 1.3). Portable devices (laptops, USB drives) containing NPI must use full-disk encryption. Physical Security: Physical records containing NPI are stored in locked cabinets in a secure office. Access to office areas with NPI is restricted via keycard entry. Network Security: Firewalls, endpoint detection, and antivirus software are deployed and updated regularly. Secure Wi-Fi (WPA3) is used for all network connections. Data Disposal: NPI is securely disposed of via shredding for physical records and secure wiping (NIST 800-88 standards) for digital records. 2. Incident Response Program Detection and Assessment: [RIA Firm Name] will monitor systems for unauthorized access to NPI using intrusion detection tools. Any suspected breach will be assessed within 24 hours to determine the scope and affected systems. Notification: If sensitive customer information is accessed or reasonably likely to have been accessed without authorization, affected clients will be notified as soon as practicable, but no later than 30 days after discovery, per Regulation S-P. Notifications will include details of the incident, steps to protect against harm (e.g., fraud alerts), and contact information for support. Documentation: All incidents, investigations, and notifications will be documented and retained for at least 5 years, as required by Regulation S-P and Rule 204-2. Recovery: The firm will take steps to contain breaches (e.g., isolating affected systems) and restore operations, coordinating with IT and legal counsel. 3. Vendor Management Due Diligence: Third-party service providers (e.g., cloud providers, custodians) handling NPI must be vetted for cybersecurity practices before engagement. Contracts must include provisions for breach notification within 72 hours. Oversight: Vendors are reviewed annually to ensure compliance with Regulation S-P. Documentation of vendor agreements and audits is maintained. 4. Employee Training All employees are trained annually on this policy, data protection, and recognizing phishing or social engineering attacks. New hires receive training within 30 days of onboarding. Training includes procedures for reporting suspected breaches to the Chief Compliance Officer (CCO). 5. Privacy Notices Initial Notice: Clients receive a clear, conspicuous privacy notice at the time of establishing a customer relationship, detailing NPI collection, sharing practices, and opt-out rights under GLBA. Annual Notice: Privacy notices are provided annually to all clients, included with Form ADV Part 2A delivery or via mail/email. 6. Annual Review and Updates The CCO will review this policy annually to ensure it remains effective and compliant with federal and state regulations. Updates will address new threats, regulatory changes, or operational needs. Tabletop exercises are conducted annually to test the incident response plan. 7. Compliance and Enforcement The CCO is responsible for administering this policy. Violations (e.g., unauthorized disclosure of NPI) may result in disciplinary action, up to termination. Records of policy distribution, employee acknowledgments, and compliance reviews are maintained per Rule 204-2. Approval This policy is approved by [CCO Name], Chief Compliance Officer, and effective as of [Date]. Annual reviews are documented and maintained for regulatory inspections.