FYI -
Former ViewSonic network
admin faces five years inside for hack - A former network
administrator for computer monitor maker ViewSonic pleaded guilty to
illegally accessing a company server and deleting critical data
two weeks after the firm had fired him, the US Department of
Justice has said in a statement.
http://www.silicon.com/networks/lans/0,39024663,10006299,00.htm
FYI
-
NAB nabs e-mail scam
-
The National Australia Bank is warning all its
customers of an e-mail scam which gleans confidential information
from online banking accounts.
http://www.pcworld.idg.com.au/index.php?id=1041815809&fp=2&f%20pid=1
FYI - COMPUTER criminals are using emails claiming to be from federal police to access the files of home internet users, the Australian High Tech Crime Centre warned.
http://australianit.news.com.au/articles/0,7204,8707873%5e15319%5e%5enbv%5e15306,00.html
Return to the top of the
newsletter
INTERNET
COMPLIANCE - Disclosures
and Notices
Several consumer regulations provide for disclosures and/or notices
to consumers. The compliance officer should check the specific
regulations to determine whether the disclosures/notices can be
delivered via electronic means. The delivery of disclosures
via electronic means has raised many issues with respect to the
format of the disclosures, the manner of delivery, and the ability
to ensure receipt by the appropriate person(s). The following
highlights some of those issues and offers guidance and examples
that may be of use to institutions in developing their electronic
services.
Disclosures are generally required to be "clear and
conspicuous." Therefore, compliance officers should
review the web site to determine whether the disclosures have been
designed to meet this standard. Institutions may find that the
format(s) previously used for providing paper disclosures may need
to be redesigned for an electronic medium. Institutions may find it
helpful to use "pointers " and "hotlinks" that
will automatically present the disclosures to customers when
selected. A financial institution's use solely of asterisks or
other symbols as pointers or hotlinks would not be as clear as
descriptive references that specifically indicate the content of the
linked material.
Return to the top of the
newsletter
INFORMATION SYSTEMS SECURITY
- We
continue our series on the FFIEC interagency Information Security
Booklet.
SECURITY
CONTROLS - IMPLEMENTATION - OPERATING SYSTEM ACCESS
(Part 1 of 2)
Financial institutions must control access to system software within
the various network clients and servers as well as stand-alone
systems. System software includes the operating system and system
utilities. The computer operating system manages all of the other
applications running on the computer. Common operating systems
include IBM OS/400 and AIX, LINUX, various versions of Microsoft
Windows, and Sun Solaris. Security administrators and IT auditors
need to understand the common vulnerabilities and appropriate
mitigation strategies for their operating systems. Application
programs and data files interface through the operating system.
System utilities are programs that perform repetitive functions such
as creating, deleting, changing, or copying files. System utilities
also could include numerous types of system management software that
can supplement operating system functionality by supporting common
system tasks such as security, system monitoring, or transaction
processing.
System software can provide high-level access to data and data
processing. Unauthorized access could result in significant
financial and operational losses. Financial institutions must
restrict privileged access to sensitive operating systems. While
many operating systems have integrated access control software,
third - party security software is available for most operating
systems. In the case of many mainframe systems, these programs are
essential to ensure effective access control and can often integrate
the security management of both the operating system and the
applications. Network security software can allow institutions to
improve the effectiveness of the administration and security policy
compliance for a large number of servers often spanning multiple
operating system environments. The critical aspects for access
control software, whether included in the operating system or
additional security software, are that management has the capability
to:
! Restrict access to sensitive or critical system resources or
processes and have the capability, depending on the sensitivity to
extend protection at the program, file, record, or field level;
! Log user or program access to sensitive system resources including
files, programs, processes, or operating system parameters; and
! Filter logs for potential security events and provide adequate
reporting and alerting capabilities.
Return to the top of the
newsletter
IT SECURITY
QUESTION:
C. HOST SECURITY
14. Determine whether adequate policies and
procedure govern the destruction of sensitive data on machines that
are taken out of service.
Return to the top of the
newsletter
INTERNET PRIVACY - We
continue our series listing the regulatory-privacy examination
questions. When you answer the question each week, you will
help ensure compliance with the privacy regulations.
34. Does the institution deliver a
revised privacy notice when it:
a. discloses a new category of nonpublic personal information to a
nonaffiliated third party; [§8(b)(1)(i)]
b. discloses nonpublic personal information to a new category of
nonaffiliated third party; [§8(b)(1)(ii)] or
c. discloses nonpublic personal information about a former customer
to a nonaffiliated third party, if that former customer has not had
the opportunity to exercise an opt out right regarding that
disclosure? [§8(b)(1)(iii)]
(Note: a revised
notice is not required if the institution adequately described the
nonaffiliated third party or information to be disclosed in the
prior privacy notice. [§8(b)(2)]) |