FYI -
Federal Bank and Thrift Regulatory Agencies Publish
Guide to Help Financial Institutions Comply with Information
Security Guidelines - The federal bank and thrift regulatory
agencies today announced the publication of a compliance guide for
the Interagency Guidelines Establishing Information Security
Standards (Security Guidelines). The compliance guide summarizes the
obligations of financial institutions to protect customer
information and illustrates how certain provisions of the Security
Guidelines apply to specific situations.
Press Release:
www.federalreserve.gov/boarddocs/press/bcreg/2005/20051214/default.htm
Press Release:
www.fdic.gov/news/news/press/2005/pr12705.html
Press Release:
www.occ.treas.gov/toolkit/newsrelease.aspx?JNR=1&Doc=FCQ6KWX2.xml
Press Release:
www.ots.treas.gov/docs/7/77548.html
Press Release:
www.occ.treas.gov/ftp/bulletin/2005-44.txt
Attachment:
www.occ.treas.gov/ftp/bulletin/2005-44a.pdf
FYI -
NCUA - Letter to Credit Unions 05-CU-20 -Phishing
Guidance for Credit Unions and Their Members.
www.ncua.gov/letters/2005/CU/05-CU-20.pdf
FYI - IT Lessons Learned From the FBI - A recent GAO
testimony highlights several best management practices organizations
can follow when updating their IT systems.
http://www.theiia.org/itaudit/index.cfm?fuseaction=forum&fid=5667
FYI - Fat fingered
typing costs a trader losses -CLUMSY typing cost a Japanese bank at
least £128 million and staff their Christmas bonuses yesterday,
after a trader mistakenly sold 600,000 more shares than he should
have.
http://www.timesonline.co.uk/article/0,,3-1917093,00.html
FYI - Likelihood of
fraud after security breach is surprisingly low, analysis finds - A
computerized analysis of four data breaches that compromised
personal information on some 500,000 people suggests the alarm that
often accompanies electronic break-ins may be largely unwarranted.
http://www.signonsandiego.com/uniontrib/20051208/news_1b8identity.html
http://www.scmagazine.com/us/news/article/532650/?n=us
FYI - Terrorist groups
lack the capability to launch a damaging Internet-based attack on
the United States, and foreign governments are probably behind many
online spying attempts, FBI officials said.
http://news.zdnet.com/2102-1009_22-5986099.html?tag=printthis
FYI - Notification
criticized for lack of information - The undated letter aggravated
many recipients, though, because it provided no details about the
breach and offered no specific recommendations on steps they could
take to protect their personal banking and credit accounts.
http://www.signonsandiego.com/news/business/20051203-9999-1b3breach.html
FYI - Business backup
blues from storage survey - One third of businesses in Ireland and
the UK have no backup and recovery procedures in place or don't
adhere to the policies that they have, a new survey has revealed.
http://www.siliconrepublic.com/news/news.nv?storyid=single5800
FYI - Security Breach
Exposes Credit Cards - Mastercard, Visa alert customers whose
personal data may have been released in Sam's Club glitch. Sam's
Club, a division of Wal-Mart Stores, is investigating a security
breach that has exposed credit card data belonging to an unspecified
number of customers who purchased gas at the wholesaler's stations
between September 21 and October 2.
http://www.pcworld.com/news/article/0,aid,123919,tk,dn121405X,00.asp
FYI - Pensonal Computer -
Photographs show a conceptual pen-sized personal computer system.
http://www.snopes.com/photos/advertisements/pcpen.asp
FYI - 'High' risk in Symantec
antivirus software flaw - Symantec's antivirus software contains a
vulnerability that could be exploited by a malicious hacker to take
control of a system, the company said. According to an advisory
issued by Secunia, the bug affects most of Symantec's products,
including enterprise and home user versions of Symantec AntiVirus,
Symantec Norton AntiVirus and Symantec Norton Internet Security,
across the Windows and Macintosh platforms.
http://news.com.com/2102-1002_3-6004097.html?tag=st.util.print
Return to the top
of the newsletter
WEB SITE COMPLIANCE -
Electronic
Fund Transfer Act, Regulation E (Part 1 of 2)
Generally, when online banking systems include electronic fund
transfers that debit or credit a consumer's account, the
requirements of the Electronic Fund Transfer Act and Regulation E
apply. A transaction
involving stored value products is covered by Regulation E when the
transaction accesses a consumer's account (such as when value is
"loaded" onto the card from the consumer's deposit account
at an electronic terminal or personal computer).
Financial institutions must provide disclosures that are clear and
readily understandable, in writing, and in a form the consumer may
keep. An Interim rule
was issued on March 20, 1998 that allows depository institutions to
satisfy the requirement to deliver by electronic communication any
of these disclosures and other information required by the act and
regulations, as long as the consumer agrees to such method of
delivery.
Financial institutions must ensure that consumers who sign up for a
new banking service are provided with disclosures for the new
service if the service is subject to terms and conditions different
from those described in the initial disclosures. Although not specifically mentioned in the commentary, this
applies to all new banking services including electronic financial
services.
The Federal Reserve Board Official Staff Commentary (OSC) also
clarifies that terminal receipts are unnecessary for transfers
initiated online. Specifically, OSC regulations provides that,
because the term "electronic terminal" excludes a
telephone operated by a consumer, financial institutions need not
provide a terminal receipt when a consumer initiates a transfer by a
means analogous in function to a telephone, such as by a personal
computer or a facsimile machine.
Return to
the top of the newsletter
INFORMATION TECHNOLOGY SECURITY -
We continue our series on the FFIEC interagency Information Security
Booklet.
SECURITY
CONTROLS - IMPLEMENTATION
LOGICAL AND ADMINISTRATIVE ACCESS CONTROL
AUTHENTICATION
Action Summary - Financial institutions should use effective
authentication methods appropriate to the level of risk. Steps
include
1) Selecting authentication mechanisms
based on the risk associated with the particular application or
services;
2) Considering whether multi - factor authentication is
appropriate for each application, taking into account that
multifactor authentication is increasingly necessary for many forms
of electronic banking and electronic payment activities; and
3) Encrypting the transmission and storage of authenticators
(e.g., passwords, PINs, digital certificates, and biometric
templates).
Authentication is the verification of identity by a system based on
the presentation of unique credentials to that system. The unique
credentials are in the form of something the user knows, something
the user has, or something the user is. Those forms exist as shared
secrets, tokens, or biometrics. More than one form can be used in
any authentication process. Authentication that relies on more than
one form is called multi - factor authentication and is generally
stronger than any single authentication method. Authentication
contributes to the confidentiality of data and the accountability of
actions performed on the system by verifying the unique identity of
the system user.
Authentication is not identification as that term is used in the USA
PATRIOT Act (31 U.S.C. 5318(l)). Authentication does not provide
assurance that the initial identification of a system user is
proper. Authentication only provides assurance that the user of the
system is the same user that was initially identified. Procedures
for the initial identification of a system user are beyond the scope
of this booklet.
Return to
the top of the newsletter
IT SECURITY QUESTION:
B. NETWORK
SECURITY
3. Evaluate controls over the management of
remote equipment.
4. Determine if effective procedures and practices are in place to
secure network services, utilities, and diagnostic ports, consistent
with the overall risk assessment.
Return to the top of
the newsletter
INTERNET PRIVACY - We continue
our series listing the regulatory-privacy examination questions.
When you answer the question each week, you will help ensure
compliance with the privacy regulations.
The Exceptions
Exceptions to the opt out right are detailed in sections 13, 14,
and 15 of the regulations. Financial institutions need not comply
with opt-out requirements if they limit disclosure of nonpublic
personal information:
1) To a nonaffiliated third party to perform services for the
financial institution or to function on its behalf, including
marketing the institution's own products or services or those
offered jointly by the institution and another financial
institution. The exception is permitted only if the financial
institution provides notice of these arrangements and by contract
prohibits the third party from disclosing or using the information
for other than the specified purposes. In a contract for a joint
marketing agreement, the contract must provide that the parties to
the agreement are jointly offering, sponsoring, or endorsing a
financial product or service. However, if the service or function is
covered by the exceptions in section 14 or 15 (discussed below), the
financial institution does not have to comply with the additional
disclosure and confidentiality requirements of section 13.
Disclosure under this exception could include the outsourcing of
marketing to an advertising company. (Section 13)
2) As necessary to effect, administer, or enforce a
transaction that a consumer requests or authorizes, or under certain
other circumstances relating to existing relationships with
customers. Disclosures under this exception could be in connection
with the audit of credit information, administration of a rewards
program, or to provide an account statement. (Section 14)
3) For specified other disclosures that a financial
institution normally makes, such as to protect against or prevent
actual or potential fraud; to the financial institution's attorneys,
accountants, and auditors; or to comply with applicable legal
requirements, such as the disclosure of information to regulators.
(Section 15) |