FYI -
Interagency Paper on Sound Practices to Strengthen the Resilience of
the U.S. Financial System - The white paper is part of the
interagency effort to improve the resilience of the private-sector
clearing and settlement infrastructure after September 11 and
ensure the smooth operation of the financial system in the event of
a wide-scale disruption. www.federalreserve.gov/boarddocs/SRLETTERS/2003/sr0309.htm
FYI - On July 1, 2003,
Senate bill 1386 becomes Civil Code 1798.82. In a nutshell, the law
states that any person or company doing business in the state of
California is responsible for notifying California residents of
security breaches to their non-encrypted information. http://www.net-security.org/article.php?id=500
FYI - Losses
From Security Breaches Drop Big Time - Government and private
organizations are suffering far less financial losses from security
breaches, while the number of computer-assisted incidents have
remained about the same, an annual survey showed Thursday. http://www.internetwk.com/breakingNews/showArticle.jhtml?articleID=10100545
Return to the top of the newsletter
INTERNET
COMPLIANCE - Truth in Lending Act (Regulation Z)
The commentary to regulation Z was amended recently to clarify that
periodic statements for open-end credit accounts may be provided
electronically, for example, via remote access devices. The
regulations state that financial institutions may permit customers
to call for their periodic statements, but may not require them to
do so. If the customer wishes to pick up the statement and the plan
has a grace period for payment without imposition of finance
charges, the statement, including a statement provided by electronic
means, must be made available in accordance with the "14-day
rule," requiring mailing or delivery of the statement not later
than 14 days before the end of the grace period.
Provisions pertaining to advertising of credit products should be
carefully applied to an on-line system to ensure compliance with the
regulation. Financial institutions advertising open-end or
closed-end credit products on-line have options. Financial
institutions should ensure that on-line advertising complies with
the regulations. For on-line advertisements that may be deemed to
contain more than a single page, financial institutions should
comply with the regulations, which describe the requirements for
multiple-page advertisements.
Return to the top of the newsletter
INFORMATION SYSTEMS SECURITY
- We
continue our series on the FFIEC interagency Information Security
Booklet.
INFORMATION SECURITY RISK ASSESSMENT
KEY RISK ASSESSMENT PRACTICES (2
of 2)
4) Accountable
Activities - The responsibility for performing risk assessments
should reside primarily with members of management in the best
position to determine the scope of the assessment, and the
effectiveness of risk reduction techniques. For a mid - sized or
large institution, that organization will likely be the business
unit. The information security officer(s) are responsible for
overseeing the performance of each risk assessment and the
integration of the risk assessments into a cohesive whole. Senior
management is accountable for abiding by the board of directors'
guidance for risk acceptance and mitigation decisions.
5) Documentation -
Documentation of the risk assessment process and procedures assists
in ensuring consistency and completeness, as well as accountability.
Documentation of the analysis and results provides a useful starting
point for subsequent assessments, potentially reducing the effort
required in those assessments. Documentation of risks accepted and
risk mitigation decisions is fundamental to achieving accountability
for risk decisions.
6) Enhanced Knowledge -
Risk assessment increases management’s knowledge of the
institution’s mechanisms for storing, processing, and
communicating information, as well as the importance of those
mechanisms to the achievement of the institution’s objectives.
Increased knowledge allows management to respond more rapidly to
changes in the environment. Those changes can range from new
technologies and threats to regulatory requirements.
7) Regular Updates -
Risk assessments should be updated as new information affecting
information security risks are identified (e.g., a new threat,
vulnerability, adverse test result, hardware change, software change
or configuration change). At least once a year, senior management
should review the entire risk assessment to ensure relevant
information is appropriately considered.
Return to the top of the newsletter
INFORMATION SECURITY
QUESTION:
A. AUTHENTICATION AND ACCESS CONTROLS
- Authentication
7. Determine whether authentication error
feedback (i.e., reporting failure to successfully log-in) during the
authentication process provides a prospective attacker clues that
may allow them to hone their attack.
If so, obtain and evaluate a justification for such feedback.
Return to the top of the newsletter
INTERNET PRIVACY -We continue covering various issues in the "Privacy of Consumer Financial
Information" published by the financial regulatory agencies in
May 2001.
Sharing nonpublic personal information with nonaffiliated third
parties under Sections 14 and/or 15 and outside of exceptions (with
or without also sharing under Section 13). (Part 3 of 3)
C. Opt Out Right
1) Review the financial institution's opt out notices. An opt
out notice may be combined with the institution's privacy notices.
Regardless, determine whether the opt out notices:
a. Are clear and conspicuous (§§3(b) and 7(a)(1));
b. Accurately explain the right to opt out (§7(a)(1));
c. Include and adequately describe the three required items of
information (the institution's policy regarding disclosure of
nonpublic personal information, the consumer's opt out right, and
the means to opt out) (§7(a)(1)); and
d. Describe how the institution treats joint consumers
(customers and those who are not customers), as applicable (§7(d)).
2) Through discussions with management, review of the
institution's policies and procedures, and a sample of electronic or
written records where available, determine if the institution has
adequate procedures in place to provide the opt out notice and
comply with opt out directions of consumers (customers and those who
are not customers), as appropriate. Assess the following:
a. Timeliness of delivery (§10(a)(1));
b. Reasonableness of the method of delivery (e.g., by hand; by
mail; electronically, if the consumer agrees; or as a necessary step
of a transaction) (§9).
c. Reasonableness of the opportunity to opt out (the time
allowed to and the means by which the consumer may opt out) (§§10(a)(1)(iii),
10(a)(3)); and
d. Adequacy of procedures to implement and track the status of
a consumer's (customers and those who are not customers) opt out
direction, including those of former customers (§7(e), (f), (g)).
Return to the top of the newsletter
PENETRATION TESTS - WEB SITE AUDITS - We
offer independent Internet auditing regarding web sites compliance and
penetration-vulnerability testing. Visit http://www.bankwebsiteaudits.com
for more information about web site audits. For information
regarding penetration-vulnerability testing visit http://www.internetbankingaudits.com/
or email Kinney Williams at examiner@yennik.com.
|