Post

Information Security and Red Flags

Description: Information Security and Red Flags describes the purpose of information security laws and the GLBA and FCRA. This course explains how to handle different types of nonpublic personal, sensitive, and personal identifiable information. It explains how to ensure physical, electronic and vendor security in various situations. This course also covers safeguards that a bank can make to ensure secure remote access is controlled and enforced. This course provides approaches to avoid falling victim of human based and online social engineering. It explains ways that banks and customers can promptly identify when information security has been breached and how to handle a security breach. This course also defines identity theft and discusses key provisions of an identity theft prevention program.  

 

Audience: All bank employees.

 

Learning Objectives: After completing this course, students will be able to:

  • Describe the purpose of information security laws and types of protected information
  • Describe guidelines for protecting information through security measures
  • Recognize identity theft and develop an identity theft program

Commands