Preview

Federal Deposit Insurance Corporation (FDIC): A Case Study

Powerful Essays
Open Document
Open Document
1156 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Federal Deposit Insurance Corporation (FDIC): A Case Study
Information Security Program Governance of the Federal Deposit Insurance Corporation (FDIC)
CSIA 413
February 8, 2015
Celida M Bruss

Information policy and the protection of high value digital assets used to be the responsibility of a select group of practitioners. However, the ubiquity of information technology (IT) security policies and governance have been a long-standing part of many industries with far more “average-consumer” impact since the inception of the Gramm-Leach-Bliley Act of 1999 (Computer Services Inc. - GLBA Act Compliance, 2015). Most individuals who conduct business with any financial institution will notice that the institution is required by Federal law, to comply with one of the federally mandated programs that insures customer deposits up to $250,000 (FDIC , 2009). In addition to this mission, the FDIC is responsible for “Examining and supervising financial institutions for safety and soundness of consumer
…show more content…
The objectives of Section II, part B outline the FDIC’s intent to protect the Confidentiality, Integrity, and Availability (CIA) of customer data (FDIC, 2014). Section III covers the majority of the tasks to be performed in the implementation of the security policy. Those actions identification of stakeholders, assessment and management of risk, due diligence in oversight (of providers and third party personnel), monitoring, evaluating and, adjusting policy components as applicable, and reporting to an authoritative body (FDIC, 2014). Each of these actions can be found in other industry standards such as the NIST SP 800-53 Rev.4’s Risk Management Framework Security Life Cycle and Security Control Structure (NIST, 2013, pp. 8-9). This just further solidifies the ubiquity of sound security policies across multiple sectors of the United States Federal and consumer

You May Also Find These Documents Helpful

  • Satisfactory Essays

    d. What are the implications to the other DIs (Depository Institutions) in the economy of the implementation of this exemption?…

    • 740 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    2. Which law requires all types of financial institutions to protect customers’ private financial information?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    NT2580 Final Study Guide

    • 1423 Words
    • 6 Pages

    2. Which law requires all types of financial institutions to protect customers’ private financial information? (Page 9)…

    • 1423 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    First World Bank Savings and Loan (FWBSL) needs to consider the increased revenue and cost that will be present if they decide to offer secure services to their clients. With them expecting to have over $100,000,000 a year for online credit cards and loan applications together with other banking services, they are also expected to provide this service while paying close attention to the three security priorities which are: confidentiality, integrity, and availability. Customers expect FWBSL to be diligent when it comes to protecting their accounts and Nonpublic Personal Information. If something were to go wrong they could lose credibility with their current and potential…

    • 1335 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Wk 5 Alt Assign

    • 384 Words
    • 2 Pages

    It is important for our company to have security and control policies in place to protect valuable information. This information has tremendous value and therefore there can be grave consequences if they are lost, destroyed, or wind up in the wrong hands. Also, inadequate security and control can result in legal liabilities. Not only are we protecting our own information assets, but also those of our customers, employees, and business partners. Failure to comply in this matter can open our company to litigation matters due to data exposure and/or theft.…

    • 384 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This document is to describe the Information Security Team's requirements of Online Application Services and Application Service Providers that engage in business with McBride Financial Services.…

    • 634 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is 411 Study Guide

    • 305 Words
    • 2 Pages

    Information Security Business Challenges and Policies the mitigate risk within the 7 domains. – p 77 - 83…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information Security has come to play an extremely vital role in today’s fast moving but invariably technically fragile business environment. Consequently, secured communications and business are needed in order for both Cooney Hardware Ltd. and our customers to benefit from the advancements the internet has given us. The importance of this fact needs to be clearly highlighted, not only to enhance the company’s daily business procedures and transactions, but also to ensure that the much needed security measures are implemented with an acceptable level of security.…

    • 676 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Our team initially reviewed key provisions included in SAS 109, SOX Section 404, PCAOB Auditing Standard No.5, and FFC policies. To provide the financial auditors with a complete and accurate review of the critical ITGC areas, we reviewed FFC’s IT and security procedures, interviewed relevant FFC client personnel, and observed FFC operations and procedures related to its ITGCs. Upon review of all relevant evidence and data collected through our walkthrough of FFC, we developed our risk assessment of each ITGC area and an associated assessment of the strengths and weaknesses of each ITGC area documented in Exhibit 3, parts A &B.…

    • 1520 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Technology has gone from the days of the pony express to advancing at a rate of a mile a minute to now evolving to what seems like the speed of light or faster. With such a fast paced environment of change in technology, policies and laws must adapt to be compatible to those advancements in order to provide the best method to govern the laws and policies and protect its people. This paper will explore how technological advancements have influenced crucial changes in two essential policies: the Electronic Communications Privacy Act (ECPA) and the Electronic Funds Transfer Act (EFTA).…

    • 410 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Areas similar to standards discussed Overview of the corporate philosophy on security Documents the Introduction and Purpose of the Information security policy of Chicago It provides a reasonable framework that helps the reader to understand the intent of the document…

    • 2909 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Security Awareness Policy

    • 1733 Words
    • 3 Pages

    Security guidance must exist in the form of formal written policies and procedures that define…

    • 1733 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    The U.S. Federal and State compliance laws in regards to data protection affect all financial institutions in that non-compliance will result in fines and penalties. ABS Financial Solutions handles sensitive data for many credit unions and without regulations governing data security there would be no repercussions when private information is mishandled, lost or stolen. ABS understands their responsibility for protecting their client’s data and the threat of the retribution both federal and civil for non-compliance ensures they take appropriate security precautions.…

    • 407 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Antitrust Laws Effective

    • 844 Words
    • 4 Pages

    The United States has several laws that are intended to further fair, balanced, and competitive business practices. Do you think that such laws are effective? If so, why? If not, why not? Be sure to provide evidence to support your position one way or the other.…

    • 844 Words
    • 4 Pages
    Good Essays