54
GLBA @ 2 GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University of Nebraska [email protected]

GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

Embed Size (px)

Citation preview

Page 1: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2GLBA @ 2What GLBA really says,Who is doing what, andCompliance “on the cheap”Michael G. Carr, JD, CISSP

Chief Information Security OfficerUniversity of [email protected]

Page 2: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

2005 © Mike Carr (University of Nebraska)

Unless noted, this work is the intellectual property of the author.

Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on

the reproduced materials and notice is given that the copying is by permission of the author.

To disseminate otherwise or to republish requires written permission from the author.

Page 3: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AgendaAgenda•Historical Review•Assessment

of the law, of collegial response

•Current Events•“Inexpensive” Approaches

Page 4: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

Historical ReviewHistorical Review

•Gramm-Leach-Bliley Act of 1999

Removed banking restrictions Required privacy policy notices Required information security

controls Applied to institutions of higher

education

Page 5: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

Historical ReviewHistorical Review

•Gramm-Leach-Bliley Act Enacted in 1999

Senate: 90-8, House: 362-57

then-Sentator Phil Gramm (R-TX)

Chair, US Senate Banking Committee

then-Representative Jim Leach (R-IA) Chair, House Financial Services Committee

then-Representative Tom Bliley (R-VA) Chair, FTC Commerce Committee

Page 6: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

Historical Historical ReviewReview

•The Great Depression•Crash: Oct 1929•By ’32:

Stock: 20¢ on the $1

30% unemployment

44% bank failures

Dorothea Lange’s Migrant Mother

Page 7: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

Historical Historical ReviewReview

•Franklin D. Roosevelt•32nd President

•Carried 42/48 states•1st order: “Bank Holiday”

to restore confidence

Page 8: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

Historical Historical ReviewReview

“…the only thing to fear is fear itself.”

1st Inaugural Address, March 4, 1933

Page 9: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

Historical ReviewHistorical Review

•New Deal – “alphabet soup” agencies

• AAA the Agricultural Adjustment Administration

• FSA the Farm Security Administration • CCC the Civilian Conservation Corps • NRA the National Recovery Act • NYA the National Youth Administration • WPA the Works Projects Administration • PWA the Public Works Administration • SSA the Social Security Administration • REA the Rural Electrification Administration

Note: the FTC was already in existence (1914)

Page 10: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

Historical Historical ReviewReview

•Banking Legislation•Glass-Steagall Act of 1933

Limited commercial bank dealings No collaboration with full-service

brokerage firms No participating in investment

banking activities Goal:Goal: protect depositors

•Bank Holding Act of 1956

No non-bank ownership

Page 11: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

Historical ReviewHistorical Review

• 1995: EU Data Protection Directive Int’l data exchange homeland privacy

• 1997: Charter Pacific Bank Sold credit cards to adult website

• 1998: NationsBank Shared customer data

• 1999: US Bankcorp Shared customer data in

violation of own policy

Page 12: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

Historical Historical ReviewReview

• Glass-Steagall & Bank Holding Act repealed by the Financial Services Modernization Act of 1999 Signed by President

Clinton aka Gramm-Leach-Bliley

Act or GLBA (P.L 106-102) 15 USC § 6801-6810

Page 13: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• GLBA Goal: Continued de-regulation Permit one-stop shopping Permit cross-selling While providing consumer

safeguards

Page 14: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• 2 Main GLBA Provisions: Privacy RulePrivacy Rule, 16 CFR Part 313

Disclosure of privacy policy “Opt-Out”

Safeguards RuleSafeguards Rule, 16 CFR Part 314 “Comprehensive information

security program”

Page 15: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• GLBA “Audience”: Financial Institutions Organizations that are

“significantly engaged” in providing financial svcs

Universities are included “…significantly engaged in

lending funds to consumers” (16 CFR Part 313.1)

Page 16: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• GLBA applies to Higher Ed, but…

If compliant with FERPA Family Educational Rights & Privacy Act of 1974

Then compliant with Privacy Rule 16 CFR Part 313.1

Page 17: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• However… 16 CFR Part 314 GLBA “Safeguarding Rules” Requires administrative,

technical, and physical safeguarding of customer information

Page 18: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• However… 16 CFR Part 314 GLBA “Safeguarding Rules” Requires administrative,

technical, and physical safeguarding of customer information

Page 19: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• However… 16 CFR Part 314 GLBA “Safeguarding Rules” Requires administrative,

technical, and physical safeguarding of customer information

Page 20: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• However… 16 CFR Part 314 GLBA “Safeguarding Rules” Requires administrative,

technical, and physical safeguarding of customer information

Page 21: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• However… 16 CFR Part 314 GLBA “Safeguarding Rules” Requires administrative,

technical, and physical safeguarding of customer information

Compliance Deadline: May 23, May 23, 20032003

Page 22: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• Without getting into a lot of detail… Written InfoSec program Appropriate to the

size & complexity of the institution,

nature & scope of activities, and

sensitivity of customer info at issue

16 CFR 314, Section A. Background

Page 23: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• Written Policy: Then-existing

policies and procedures may have been adequate

Might just needed to have been written down

Page 24: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• One size does not fit all!• “Appropriate” for me might

not be “appropriate” for you

• It depends…

Page 25: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• What most (many?) institutions did: Wrote a Q&D info security plan Identified a Security Officer Tasked this “CISO” with GLBA

compliance responsibility Went back to business as usual

Page 26: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

DISCLAIMER!DISCLAIMER!

Many Colleges and Universities implemented information security

programsin good faith

and have worked since to protect the confidentiality, integrity and

availability of their “financial transaction”-customers’

nonpublic personal information

Page 27: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• Many (most?) consider GLBA to be an “I/T” thing technical safeguards & risk

assessment of “information systems” of “detecting, preventing and

responding to attacks, instructions or other systems failures”

16 CFR 314.4 Elements (2) and (3)

Page 28: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• Some have… Funded network vulnerability

testing, or Implemented firewalls, intrusion

detection/prevention, encryption “to identify reasonably foreseeable

internal and external risks” Updated purchasing agreements

“oversee service providers”

Page 29: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• Some have… Developed security awareness

programs Incorporated infosec awareness

into new employee orientation Used GLBA to justify

stronger password requirements reduced sign-on initiatives increased I/T budget

Page 30: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• But if we look back…

FTC spelled out the 5 5 elements of GLBA

WeWe get to decide what is “appropriate”

Page 31: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• The 5 GLBA Elements:a) Infosec program

coordinatorb) Identity risksc) Safeguards to control

the risksd) Oversee service

providerse) Evaluate & adjust the

program

Page 32: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• How did these get interpreted?a) “Designate an employee or

employees to coordinate your information security program.” 16 CFR 314.4 (a)

Appointed or hired someone to be the organization’s Information Security Officer (ISO)

Page 33: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• How did these get interpreted?b) “Identify reasonably foreseeable

internal and external risks . . . that could result in the unauthorized disclosure, misuse, alteration, destruction or other compromise…” 16 CFR 314.4 (b)

Page 34: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• How did these get interpreted?…assess the risk in:

b) 1. employee training & mgmt:

Orientation & awareness programs

b) 2. information systems Maintain status quo

b) 3. detecting, preventing & responding to attacks, intrusions…

Pen testing, vulnerability assessments, self-scanning

Page 35: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• How did these get interpreted?c) “Design and implement

information safeguards to control the risks you identify through risk assessment, and regularly test or otherwise monitor the effectiveness of the safeguards’ key controls, systems, and procedures.”

16 CFR 314.4 (c)

Page 36: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• How did these get interpreted?c) “Design and implement

information safeguards to control the risks you identify through risk assessment, and regularly test or otherwise monitor the effectiveness of the safeguards’ key controls, systems, and procedures.”

16 CFR 314.4 (c)

Page 37: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• How did these get interpreted? Firewalls Intrusion detection systems (IDS) Intrusion prevention systems

(IPS) Incident Response Procedures Digital Forensics

Page 38: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• How did these get interpreted?d) “Oversee Service Providers, by:

1) Taking reasonable steps to select and retain service providers capable of maintaining appropriate safeguards… and

2) Requiring Service Providers by contract to implement & maintain such safeguards.”

16 CFR 314.4 (d)

Page 39: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• How did these get interpreted? Additional contract verbiage Addendums to existing

agreements

Page 40: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• How did these get interpreted?e) “Evaluate and adjust your

information security program in light of the results of the testing and monitoring…”

16 CFR 314.4 (e)

Maintain status quo

Page 41: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• Are these interpretations good/bad?

* YES! ** YES! * In general, sound management &

technical practices push us to implement agreements, firewalls, risk assessments, etc.

However, GLBA customer customer informationinformation

Page 42: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• Customer Information “…nonpublic personal information

as defined in 16 CFR 313.3(n), about a customer . . ., whether in paper, electronic or other form….”

16 CFR 314.2(b)

Page 43: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• Customer Information Section 509(4) of GLBA “ ‘‘personally identifiable financial

information’’ that is provided by a consumer to a financial institution, results from any transaction with the consumer or any service performed for the consumer, or is otherwise obtained by the financial institution.”

16 CFR 313.3(n)

Page 44: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

What the %#!_& What the %#!_& does that mean?does that mean?

Page 45: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• Customer Information 23 April 2003 note from Coalition

of Higher Education Assistance Organizations (COHEAO)

What kinds of transactions? Extensions of credit, yes Installment contracts, probably

no– Unless loan with interest

charged Stored-value cards, probably no Alumni credit cards, probably

no

“If the school is not receiving individual customer account or activity

information, only a funding stream, the activity is probably not covered”

“If the school is not receiving individual customer account or activity

information, only a funding stream, the activity is probably not covered”

Page 46: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• Which means . . . ? When the University/College acts

like a bank and collects SSN, routing numbers, and/or savings/checking account numbers…

GLBA applies But, for better or worse…

GLBA has sometimes been implemented across the entire institution, and

In some instances, ignored completely

Page 47: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

AssessmentAssessment

• If you recall… GLBA requires “administrative,

technical and physical safeguards” Many institutions have failed to

address the administrative and physical safeguards in the business offices Ad-hoc & canned reports –

shredding? Background checks – student

workers? Departmental servers – hardened? Workstation security – screensaver

pswds?

Page 48: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

Page 49: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

Current EventsCurrent Events

• 2004: FTC Nationwide GLBA Compliance Sweep of auto dealers and mortgage companies Sunbelt Lending Services, Inc.

Agreed to consent decree Compliant w/in 6 months Audit every other yr for 10 yrs

Nationwide Mortgage Group, Inc. Currently negotiating decree

Page 50: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

Current EventsCurrent Events

• Choicepoint & Lexis/Nexis breaches Federal legislation pending Require “data brokers” to

notify consumers in the event of a breach

• San Jose Medical Group PC theft

• Sen. Feinstein: SSN Misuse Prevention Act, Notification Act, Privacy Act

Page 51: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

““Inexpensive” Inexpensive” ApproachesApproaches

• Share this material with Financial Aid, Student Records, and H/R

• Trustees, Board or Presidential directive away from SSN

• ABWA – audit by walking around

• Training materials In general & for financial aid staff New employee orientation, annual

reviews

Page 52: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

““Inexpensive” Inexpensive” ApproachesApproaches

• Download/share:

ID Theft video clipUS Attorney’s Office, Central

District CA www.usdoj.gov/usao/cac/idtheft/idtheft.html

ID Theft DVDUS Postal Inspectorswww.usps.com/postalinspectors/id_intro.htm

Page 53: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ 2 GLBA @ 2

2005 © University of Nebraska

““Inexpensive” Inexpensive” ApproachesApproaches

• Information Security Awareness

US-CERT, www.us-cert.gov EDUCAUSE resources StaySafeOnline.info National Cyber Security Awareness

Month October

Page 54: GLBA @ 2 What GLBA really says, Who is doing what, and Compliance “on the cheap” Michael G. Carr, JD, CISSP Chief Information Security Officer University

GLBA @ GLBA @ 22

Discussion?

Questions?

Michael G. Carr, JD, CISSP

Chief Information Security OfficerUniversity of [email protected]