Hero background
Compliance Updates6 min read

What Lenders Need to Know About Third-Party Risk

By Michael Dunleavey
October 15, 2025Updated April 21, 2026
glba complianceftc safeguards ruledata breach lender obligations

The Compliance Principle That Vendor Incidents Keep Testing

When a third-party vendor that handles your customer information experiences a breach, the instinctive response is to treat it as the vendor's problem. The regulatory reality is different: FCRA compliance and GLBA compliance obligations do not transfer to vendors. They remain with the financial institution regardless of where in the ecosystem a failure occurs.

This principle — that outsourcing a function does not outsource the compliance obligation that governs it — is the foundation of the FTC Safeguards Rule's vendor oversight requirements, and it is the lens through which regulators evaluate how institutions respond to third-party incidents. Understanding it before an incident occurs is how institutions avoid being caught on the wrong side of an examination finding.

For lending institutions on Salesforce, embedding vendor oversight documentation and monitoring into the COMPLY workflow — rather than managing it through separate manual processes — is how this obligation becomes operationally sustainable. Schedule a Compliance Discussion to review your current vendor risk program against Safeguards Rule requirements.

What the Safeguards Rule Actually Requires of Lenders

The FTC Safeguards Rule (16 CFR Part 314), as significantly strengthened by the 2021 amendments, imposes specific vendor oversight obligations on covered financial institutions. These are not general guidelines — they are requirements:

RequirementWhat It Means in Practice
Vendor SelectionSelect service providers with appropriate safeguards for customer information
Contractual RequirementsRequire by contract that vendors implement and maintain appropriate safeguards
Ongoing MonitoringMonitor vendor safeguards on an ongoing basis — not just at initial onboarding
Board ReportingReport to the board of directors on the information security program annually, including vendor risk
Incident ResponseMaintain a written incident response plan that addresses vendor-related security events
FTC NotificationNotify the FTC within 30 days of discovering a breach affecting 500 or more customers

The combination of contractual requirements and ongoing monitoring is where most institutions' vendor programs fall short. Selecting a reputable vendor is not sufficient. The Safeguards Rule requires that the selection be documented, that security expectations be contractually specified, and that compliance with those expectations be actively monitored.

The FCRA Dimension: Permissible Purpose and Data Accuracy

FCRA's vendor risk implications are distinct from GLBA's — and equally important for lenders. When credit data is accessed, processed, or transmitted through third-party systems, FCRA's permissible purpose, accuracy, and data security requirements follow the data regardless of which system is handling it.

Specific FCRA vendor risk obligations include:

Permissible Purpose Documentation. When credit data flows through vendor systems, the institution must be able to document that permissible purpose existed for every data access, even when that access was facilitated by a vendor system rather than the institution's own infrastructure.

Accuracy Obligations. Lenders that furnish data to credit bureaus remain responsible for the accuracy of that data even when the furnishing is handled through a vendor or middleware system. Data integrity failures in vendor systems can create FCRA accuracy liability for the institution.

Data Security. The FCRA does not specify security controls in the same way the Safeguards Rule does — but FCRA's disposal rule and the broader consumer protection framework create data security obligations that extend to vendor-handled credit data.

The Real-World Vendor Risk Exposure: Lessons from Major Breaches

The major third-party breaches of 2023–2025 — including the National Public Data breach, which exposed 2.9 billion records — provided a practical test of institutional vendor risk programs. The common compliance gaps that surfaced:

Vague contract language. Institutions with "industry-standard security" contract language could not point to specific security requirements that NPD had committed to — and could not demonstrate that their oversight had verified compliance with those requirements.

Incomplete vendor inventory. Some institutions were uncertain whether NPD held their customers' data because they lacked a current, complete inventory of all vendors and subprocessors handling customer information.

Notification timeline gaps. Institutions whose incident response plans predated the FTC's May 2024 30-day notification requirement had not updated their plans to reflect the new timeline — creating potential compliance gaps at exactly the moment the plans were needed.

Encryption verification. The NPD breach involved data that was not encrypted at rest. Institutions whose vendor contracts did not specify encryption requirements — and whose ongoing oversight had not verified encryption implementation — had limited basis for asserting adequate vendor oversight.

Building a Vendor Risk Program That Holds Under Examination

An examination-ready vendor risk program for lenders addresses each element of the Safeguards Rule's vendor oversight requirement with specific, documented evidence:

Vendor inventory. A current, maintained list of all vendors and subprocessors that handle customer information, including the categories of data each holds and the security requirements applicable to each relationship.

Contract specificity. Vendor agreements that specify encryption standards, access controls, incident notification timelines, and security assessment rights — not general language about maintaining "appropriate" or "industry-standard" security.

Periodic due diligence. Documented evidence of periodic security reviews for vendors handling significant customer information — including review of vendor SOC 2 reports, security questionnaires, or direct assessment results.

Incident response integration. Incident response plans that specifically address vendor-related security events, including the FTC's 30-day notification timeline from the date of discovery.

Board reporting. Annual documentation that the board of directors received and reviewed information security program status, including the state of vendor risk management.

What This Means for Your Institution

Third-party vendor risk is not an abstract compliance concept — it is a documented source of examination findings, enforcement actions, and financial exposure for lending institutions. The major breaches of 2023–2025 have provided a clear picture of what inadequate vendor oversight looks like in practice, and what regulators expect to see when they ask about vendor risk programs.

The institutions that manage this exposure most effectively are those that have built vendor oversight into their operational workflows — systematic rather than ad hoc, documented rather than assumed, and integrated into the technology platform rather than managed through standalone spreadsheets and periodic reminders.


Schedule a Compliance Discussion to review your institution's vendor risk management program against FTC Safeguards Rule requirements and current examination expectations.

Frequently Asked Questions

Do FCRA and GLBA compliance obligations transfer to third-party vendors?

No. FCRA compliance and GLBA compliance obligations remain with the financial institution regardless of where in the vendor ecosystem a failure occurs. When a vendor mishandles consumer credit data or experiences a breach, the institution faces regulatory exposure — not the vendor. This is why the Safeguards Rule requires contractual security requirements with vendors and ongoing oversight, not just initial selection.

What does the FTC Safeguards Rule require for vendor oversight?

The Safeguards Rule (16 CFR Part 314) requires covered financial institutions to select and retain service providers that maintain appropriate safeguards for customer information, require by contract that service providers implement and maintain those safeguards, and monitor service providers' compliance on an ongoing basis. Vague 'industry-standard security' contract language does not satisfy these requirements.

What vendor documentation should lenders maintain for examinations?

Lenders should maintain a current inventory of all vendors handling customer information, copies of vendor contracts with specific security requirements, records of vendor due diligence and periodic security reviews, documentation of any vendor security incidents and the institution's response, and records of the institution's annual board-level information security reporting that addresses vendor risk.

How should lenders respond when a vendor experiences a data breach?

When a vendor breach occurs, lenders must assess whether their customers' information was affected, determine whether the breach meets the Safeguards Rule's notification event threshold (500 or more customers), notify the FTC within 30 days of discovery if the threshold is met, evaluate whether their vendor oversight provisions were adequate, and document the institution's full response. The 30-day clock starts at discovery, not at confirmation.

Michael Dunleavey

Founder — LASER Credit Access

Michael Dunleavey brings over 15 years of experience in credit infrastructure and lending compliance, helping financial institutions streamline operations on Salesforce.

Ready to Transform Your Credit Operations?

Discover how LASER Credit Access streamlines compliance and decisioning natively inside Salesforce — unified in a single app, ready from day one.