Business & Technology A safety & soundness perspective Information Meetings September / October 2004.

Slides:



Advertisements
Similar presentations
Presented By Krypto Security Software, LLC. What is BackStopp is a simple but effective tool to help an organization protect its mobile data in the event.
Advertisements

OPERATING EFFECTIVELY AT WESD. What is Internal Control? A process designed to provide reasonable assurance the organizations objectives are achieved.
Combating Fraud Risk in Payment Systems. 2 Defining Fraud..a deliberate act of omission or commission by any person, carried out in the course of a banking.
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
© Family Economics & Financial Education – October 2010 – The Essentials to Take Charge of Your Finances – Depository Institution Essentials – Slide 1.
Managed Funds Association’s Sound Practices for Hedge Fund Managers 2009 Edition.
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
9 - 1 Computer-Based Information Systems Control.
WORKING ON WORK PLANS. Supervisory Committee Work Plans “The better the planning, the better the result!” Work plans provide an organized, systematic.
Auditor General’s Office One key audit focus area – Compliance with Laws and Regulations.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
“Limiting electronic fraud through an Information Security Management System (ISMS): An Introduction to ISO 27001" Presented to the ICGFM Annual Conference.
Intro to Business, 7e © 2009 South-Western, Cengage Learning SLIDE1 CHAPTER Banks and Other Financial Institutions Financial Services.
> > > > The Financial System Chapter 17. Learning Goals Outline the structure and importance of the financial system. List the various types of securities.
© 2012 Cengage Learning. All Rights Reserved. Principles of Business, 8e C H A P T E R 17 SLIDE Banks and Other Financial Institutions 17-2.
Banking Basics O You can take charge of your financial future!
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES.
Mr. Stasa – Willoughby-Eastlake City Schools ©. Essential Question #8  In your opinion, how has technology improved and/or damaged the banking industry?
Tan Jenny 23 September 2009 SESSION 4: Understanding Your IT Control Environment & Its Readiness.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Traditional and Electronic Payment Methods Chapter 3.
Vendor Risk: Effective Management is Essential
XML AND THE LEGAL FOUNDATIONS FOR ELECTRONIC COMMERCE: Making XML Pay: Revising Existing Electronic Payments Law to Accommodate Innovation Copyright (c)
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
WOODSTOCK INSTITUTE | JUNE 2014 Webinar June 18, 2014 Make your voice heard: Commenting on CFPB policies Courtney Eccles | Policy Director Katie Buitrago.
 More than ___% of teens have a savings account.  ___% of teens age have a checking account. ___% of those ages have one.  Likewise, ___%
Introduction to Information Technology: Your Digital World © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Using Information Technology, 10e©
Evolving IT Framework Standards (Compliance and IT)
Electronic Records Management: What Management Needs to Know May 2009.
Pre BDM road shows March / April 2007ICT Strategy Page 1 Pre BDM Road Shows BDM 2007 League Services and Costs 2008 / 2009 Liam O’Dwyer CEO.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Credit unions use social media in a variety of ways, including marketing, providing incentives, facilitating applications for new accounts, inviting feedback.
Where’s the Money Going? 10 Things You Should Know about Internal Controls and Fraud Donna S. Brown, CPA Bob Powell, CPA November 12, 2010.
PAPER AC 1 : E-BUSINESS AND CYBER LAWS. MEANING OF E-BUSINESS  E-business, is the application of information and communication technologies (ICT) which.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Traditional and Electronic Payment Methods Chapter 3.
AUTHENTICATION IN AN INTERNET ENVIRONMENT Dominick E. Nigro NCUA Information Systems Officer.
© 2009 National Automated Clearing House Association. All rights reserved. Industry Perspectives on Emerging Risks and Public/Private Engagement: Network.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
FRAUD Prevention & Detection. Group Members Raven Smith Tommy Harville Kedron Hilario.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Note1 (Admi1) Overview of administering security.
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
FACILITATOR Prof. Dr. Mohammad Majid Mahmood Art of Leadership & Motivation HRM – 760 Lecture - 25.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Prepared by Dept. of Information Technology & Telecommunications, November 19, 2015 Application Security Business Risk and Data Protection Gregory Neuhaus.
Casualty Loss Reserve Seminar General Session II September 9, 2003 Section 302/404 of Sarbanes-Oxley Act What Actuaries Need to Know Jan A. Lommele, FCAS,
Slide 1 Mike Trigg Group Money Laundering Reporting Officer.
Free Cookies and Other Security and Privacy Issues.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
ADVANTAGES OF DATA BASE MANAGEMENT SYSTEM. TO BE DICUSSED... Advantages of Database Management System  Controlling Data RedundancyControlling Data Redundancy.
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
Division of Risk Management State of Florida Loss Prevention Program.
Security Environment Assessment. Outline  Overview  Key Sources and Participants  General Findings  Policy / Procedures  Host Systems  Network Components.
1 Techniques for Effectively Managing Credit Relationships: Achieving the “Right” Rating Next Page To Advance: Click Screen Anywhere or Click Next To Return.
Diana Haskell Alpha Delta State Treasurer April, 2014.
SAFEGUARDING YOUR ASSETS AND PREVENTING FRAUD
The Importance of National Payments Systems in Reducing Market Risk S.W.I.F.T. Regional Conference in Central and Eastern Europe Prague, Czech Republic:
1.7.2.G1 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
NCUA Update Alaska Credit Union League 42 nd Annual Meeting Elizabeth A. Whitehead, Region V Director National Credit Union Administration.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
THE CONSUMERIZATION OF IT By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano.
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
Information Security based on International Standard ISO 27001
Final HIPAA Security Rule
Presentation transcript:

Business & Technology A safety & soundness perspective Information Meetings September / October 2004

Business & Technology  Technology is a tool  Business is the key  New communication channels  Use of  Use of Internet  Money Transmission - EFT, ATM, Bill Pay etc  Reporting – Call reports, Annual Returns etc

Credit Union IT Systems Provide:  Data and transaction processing  Reports and audits  Business planning  Data storage

Credit Union IT Systems  What about access to data and data protection?  What about operational procedures?  What about controls?  What about oversight?  What about responsibility and accountability?

Safety & Soundness in Credit Unions  Responsibility to serve the membership properly  Must operate within the law  Protect the business from unnecessary risk  Protect and enhance reputations  Develop a sound business ethos

Safety & Soundness in Credit Unions Essential to consider in terms of  Existing systems & operations  New services offering

Safety & Soundness in Credit Unions Questionnaire & Results  Password Security - Users are not accountable  Users share passwords  Users cannot change their own passwords  Deletion of Data  Auditing of cancellations, amendments and deletions needs improvement  Electronic data recovery should always be possible  Electronic reporting  Users unable to extract reports electronically  Critical reports cannot be reproduced

Safety & Soundness in Credit Unions Questionnaire & Results  Dormant and Deceased Accounts  Better management required, system controlling  Money Laundering  Report on values exceeding specified limits within a period  General  Low level of appreciation for system security in credit unions

Safety & Soundness in Credit Unions Risks  Poor or no clear accountability  System weaknesses or perceptions of weakness can lead to fraud or loss  Poor procedures and controls in credit unions can lead to fraud or loss

Safety & Soundness in Credit Unions Next Steps  Awareness, appreciation, buy-in  Set and improve standards Improve data access security and auditing capability Improve data access security and auditing capability Credit union procedures enforcement Credit union procedures enforcement Implement best practice in operations Implement best practice in operations Board and management oversight is necessary Board and management oversight is necessary Active supervision is essential Active supervision is essential  Manage the risks better

Safety & Soundness in Credit Unions Feedback & Discussion