Control 3.10: SEC Reg S-P — Privacy of Consumer Financial Information — Portal Walkthrough
Step-by-step portal configuration for implementing privacy controls that support compliance with SEC Regulation S-P (including the 2023 amendments) when using Microsoft 365 Copilot with consumer financial information.
Prerequisites
- Role: Compliance Administrator, Privacy Officer
- License: Microsoft 365 E5 or E5 Compliance add-on
- Access: Microsoft Purview portal
Steps
Step 1: Configure Sensitive Information Types for Consumer Financial Data
Portal: Microsoft Purview portal Path: Solutions > Data classification > Sensitive info types
- Review built-in sensitive information types relevant to Reg S-P:
- U.S. Social Security Number (SSN)
- Credit Card Number
- U.S. Bank Account Number
- U.S. Individual Taxpayer Identification Number (ITIN)
- Create custom sensitive information types for firm-specific financial data:
- Account numbers matching your firm's format
- Client identifiers and portfolio numbers
- Test each SIT against sample data to verify accuracy.
Step 2: Create DLP Policies for Consumer Financial Information in Copilot
Portal: Microsoft Purview portal Path: Solutions > Data loss prevention > Policies > Create policy
- Create a DLP policy named "FSI-RegSP-Copilot-Privacy-Protection".
- Select the U.S. Financial regulatory template as a starting point.
- Add locations: Exchange, SharePoint, OneDrive, Teams, and Copilot interactions.
- Configure rules:
- Low volume (1-9 instances): Notify user with policy tip
- High volume (10+ instances): Block sharing and notify compliance team
- Enable the policy for all Copilot-licensed users.
Step 3: Configure Information Barriers for Privacy Segregation
Portal: Microsoft Purview portal Path: Solutions > Information barriers > Segments and policies
- Review existing information barrier segments.
- Verify that segments prevent Copilot from surfacing consumer financial data across business unit boundaries where required by Reg S-P.
- Create or update barrier policies to prevent cross-segment data access via Copilot grounding.
Step 4: Enable Privacy Impact Assessment for Copilot Data Flows
Portal: Microsoft Purview portal Path: Solutions > Data classification > Content explorer
- Use Content Explorer to identify where consumer financial information resides.
- Document the data flow from source systems through Copilot interactions.
- Assess whether Copilot prompts and responses may expose nonpublic personal information (NPI).
- Configure appropriate access controls to limit NPI exposure in Copilot responses.
Step 5: Configure the Incident Response Program for Copilot NPI Events (Reg S-P Rule 248.30(a)(4))
Portal: Microsoft Purview portal / Internal incident response documentation Path: Microsoft Purview > Audit > Alert policies; Internal IRP documentation system
The amended Reg S-P requires a written incident response program addressing unauthorized access to or use of customer information. Configure the following for Copilot NPI incident coverage:
- Document Copilot NPI scenarios in the written IRP:
- Scenario: Copilot surfaces client NPI to unauthorized user (oversharing or permission misconfiguration)
- Scenario: Copilot-drafted communication contains NPI that should not have been disclosed
-
Scenario: Copilot Chat response aggregates NPI from multiple sources into a single response accessible to an unauthorized party For each scenario, document: detection method, severity classification, escalation path, containment steps, and notification workflow.
-
Configure alert policies for Copilot NPI events:
- Navigate to Microsoft Purview > Audit > Alert policies
- Create or verify an alert policy that triggers on DLP policy matches involving Copilot interactions
- Set alert severity to High for SSN/account credential exposure; Medium for other NPI types
-
Configure alerts to route to the designated Privacy Officer and Compliance team
-
Establish the 72-hour vendor notification workflow (Reg S-P Rule 248.30(a)(3)):
- Document Microsoft as the service provider requiring notification for Copilot-related NPI incidents
- Identify the Microsoft notification channel: Microsoft Security Response Center (MSRC) for security incidents; Microsoft 365 admin portal for service-level incidents
- Create a notification template for Microsoft with: incident description, NPI categories involved, estimated scope, and containment status
- The 72-hour clock starts at detection — document how "detection" is defined (alert trigger, user report, DLP match) to ensure consistent timing
-
Assign a named individual responsible for executing the Microsoft notification within the 72-hour window
-
Set up the incident response notification timeline:
- Internal escalation: 4 hours from detection → Privacy Officer + Compliance
- Executive notification: 24 hours from detection → Chief Compliance Officer + Legal
- Service provider (Microsoft) notification: 72 hours from detection → per documented procedure above
- Customer notification: 30 days from awareness → per Reg S-P requirement
Step 6: Test the Incident Response Program Configuration
- Conduct a tabletop exercise simulating a Copilot NPI incident.
- Walk through each stage of the notification timeline: internal escalation → executive notification → Microsoft 72-hour notification → customer notification.
- Verify that the designated Microsoft notification contact and template are accessible within the 72-hour window.
- Document the exercise outcomes and any gaps identified.
- Update the IRP based on exercise findings.
FSI Recommendations
| Setting | Baseline | Recommended | Regulated |
|---|---|---|---|
| DLP for consumer financial data | Notify | Block external | Block all unauthorized |
| Information barriers | Optional | Business unit boundaries | Full segregation |
| NPI detection in Copilot | Audit only | Warn users | Block and log |
| Privacy impact assessment | Annual | Semi-annual | Annual + event-driven |
| Written incident response program | Required (Rule 248.30(a)(4)) | With Copilot scenarios and 72-hour notification procedure | With tabletop exercise documentation |
| 72-hour vendor notification readiness | Document procedure | Test in tabletop | Quarterly drill |
Regulatory Alignment
- SEC Reg S-P Rule 248.30(a)(3) — 72-hour vendor notification requirement for unauthorized NPI access; Microsoft notification procedure required for Copilot incidents
- SEC Reg S-P Rule 248.30(a)(4) — Mandatory written incident response program; Copilot-specific scenarios must be included
- SEC Reg S-P (Rule 30) — Supports compliance with safeguarding requirements for customer records and information
- GLBA Title V — Helps meet financial privacy requirements for nonpublic personal information
- FTC Safeguards Rule — Supports information security program requirements
Next Steps
- Proceed to PowerShell Setup for privacy control automation
- See Verification & Testing to validate privacy protections