Skip to content

Control 3.10: SEC Reg S-P — Privacy of Consumer Financial Information — Portal Walkthrough

Step-by-step portal configuration for implementing privacy controls that support compliance with SEC Regulation S-P (including the 2023 amendments) when using Microsoft 365 Copilot with consumer financial information.

Prerequisites

  • Role: Compliance Administrator, Privacy Officer
  • License: Microsoft 365 E5 or E5 Compliance add-on
  • Access: Microsoft Purview portal

Steps

Step 1: Configure Sensitive Information Types for Consumer Financial Data

Portal: Microsoft Purview portal Path: Solutions > Data classification > Sensitive info types

  1. Review built-in sensitive information types relevant to Reg S-P:
  2. U.S. Social Security Number (SSN)
  3. Credit Card Number
  4. U.S. Bank Account Number
  5. U.S. Individual Taxpayer Identification Number (ITIN)
  6. Create custom sensitive information types for firm-specific financial data:
  7. Account numbers matching your firm's format
  8. Client identifiers and portfolio numbers
  9. Test each SIT against sample data to verify accuracy.

Step 2: Create DLP Policies for Consumer Financial Information in Copilot

Portal: Microsoft Purview portal Path: Solutions > Data loss prevention > Policies > Create policy

  1. Create a DLP policy named "FSI-RegSP-Copilot-Privacy-Protection".
  2. Select the U.S. Financial regulatory template as a starting point.
  3. Add locations: Exchange, SharePoint, OneDrive, Teams, and Copilot interactions.
  4. Configure rules:
  5. Low volume (1-9 instances): Notify user with policy tip
  6. High volume (10+ instances): Block sharing and notify compliance team
  7. Enable the policy for all Copilot-licensed users.

Step 3: Configure Information Barriers for Privacy Segregation

Portal: Microsoft Purview portal Path: Solutions > Information barriers > Segments and policies

  1. Review existing information barrier segments.
  2. Verify that segments prevent Copilot from surfacing consumer financial data across business unit boundaries where required by Reg S-P.
  3. Create or update barrier policies to prevent cross-segment data access via Copilot grounding.

Step 4: Enable Privacy Impact Assessment for Copilot Data Flows

Portal: Microsoft Purview portal Path: Solutions > Data classification > Content explorer

  1. Use Content Explorer to identify where consumer financial information resides.
  2. Document the data flow from source systems through Copilot interactions.
  3. Assess whether Copilot prompts and responses may expose nonpublic personal information (NPI).
  4. Configure appropriate access controls to limit NPI exposure in Copilot responses.

Step 5: Configure the Incident Response Program for Copilot NPI Events (Reg S-P Rule 248.30(a)(4))

Portal: Microsoft Purview portal / Internal incident response documentation Path: Microsoft Purview > Audit > Alert policies; Internal IRP documentation system

The amended Reg S-P requires a written incident response program addressing unauthorized access to or use of customer information. Configure the following for Copilot NPI incident coverage:

  1. Document Copilot NPI scenarios in the written IRP:
  2. Scenario: Copilot surfaces client NPI to unauthorized user (oversharing or permission misconfiguration)
  3. Scenario: Copilot-drafted communication contains NPI that should not have been disclosed
  4. Scenario: Copilot Chat response aggregates NPI from multiple sources into a single response accessible to an unauthorized party For each scenario, document: detection method, severity classification, escalation path, containment steps, and notification workflow.

  5. Configure alert policies for Copilot NPI events:

  6. Navigate to Microsoft Purview > Audit > Alert policies
  7. Create or verify an alert policy that triggers on DLP policy matches involving Copilot interactions
  8. Set alert severity to High for SSN/account credential exposure; Medium for other NPI types
  9. Configure alerts to route to the designated Privacy Officer and Compliance team

  10. Establish the 72-hour vendor notification workflow (Reg S-P Rule 248.30(a)(3)):

  11. Document Microsoft as the service provider requiring notification for Copilot-related NPI incidents
  12. Identify the Microsoft notification channel: Microsoft Security Response Center (MSRC) for security incidents; Microsoft 365 admin portal for service-level incidents
  13. Create a notification template for Microsoft with: incident description, NPI categories involved, estimated scope, and containment status
  14. The 72-hour clock starts at detection — document how "detection" is defined (alert trigger, user report, DLP match) to ensure consistent timing
  15. Assign a named individual responsible for executing the Microsoft notification within the 72-hour window

  16. Set up the incident response notification timeline:

  17. Internal escalation: 4 hours from detection → Privacy Officer + Compliance
  18. Executive notification: 24 hours from detection → Chief Compliance Officer + Legal
  19. Service provider (Microsoft) notification: 72 hours from detection → per documented procedure above
  20. Customer notification: 30 days from awareness → per Reg S-P requirement

Step 6: Test the Incident Response Program Configuration

  1. Conduct a tabletop exercise simulating a Copilot NPI incident.
  2. Walk through each stage of the notification timeline: internal escalation → executive notification → Microsoft 72-hour notification → customer notification.
  3. Verify that the designated Microsoft notification contact and template are accessible within the 72-hour window.
  4. Document the exercise outcomes and any gaps identified.
  5. Update the IRP based on exercise findings.

FSI Recommendations

Setting Baseline Recommended Regulated
DLP for consumer financial data Notify Block external Block all unauthorized
Information barriers Optional Business unit boundaries Full segregation
NPI detection in Copilot Audit only Warn users Block and log
Privacy impact assessment Annual Semi-annual Annual + event-driven
Written incident response program Required (Rule 248.30(a)(4)) With Copilot scenarios and 72-hour notification procedure With tabletop exercise documentation
72-hour vendor notification readiness Document procedure Test in tabletop Quarterly drill

Regulatory Alignment

  • SEC Reg S-P Rule 248.30(a)(3) — 72-hour vendor notification requirement for unauthorized NPI access; Microsoft notification procedure required for Copilot incidents
  • SEC Reg S-P Rule 248.30(a)(4) — Mandatory written incident response program; Copilot-specific scenarios must be included
  • SEC Reg S-P (Rule 30) — Supports compliance with safeguarding requirements for customer records and information
  • GLBA Title V — Helps meet financial privacy requirements for nonpublic personal information
  • FTC Safeguards Rule — Supports information security program requirements

Next Steps