1 / 17

INFORMATION SECURITY

INFORMATION SECURITY. The best way to dispose of customer-sensitive information and reports is. INFORMATION SECURITY. When not in use, customer-sensitive information should be stored in. INFORMATION SECURITY. Which of the following is false?

Download Presentation

INFORMATION SECURITY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. INFORMATION SECURITY The best way to dispose of customer-sensitive information and reports is

  2. INFORMATION SECURITY When not in use, customer-sensitive information should be stored in

  3. INFORMATION SECURITY Which of the following is false? a)  Viruses can be introduced to our network by downloading programs on to your computer. b)  You can download any program you wish on your computer. c)  All computers and equipment are property of the Bank.

  4. INFORMATION SECURITY TRUE OR FALSE Your user name and password may be temporarily loaned to another employee if that employee needs access to the systems and has misplaced their password.

  5. INFORMATION SECURITY When a vendor needs access to a Bank building: a) They must always be escorted when on Bank premises b) It is okay to allow them to access the building unescorted as long as they are wearing a uniform that displays their name c) They may be unescorted if they present a badge or ID showing that they are a legitimate vendor

  6. INFORMATION SECURITY TRUE OR FALSE When you are going to be away from your workstation for any length of time, you should make sure sensitive or customer-specific information is not displayed on your computer screen.

  7. INFORMATION SECURITY When you leave your work area for the day, you should: a) Make sure all customer information is placed ‘out of site’. b) Take out the garbage c) Log off your computer d) All of the above e) Only a and c

  8. INFORMATION SECURITY Which of the following is incorrect? When faxing sensitive documents, all employees must: a. Include a cover sheet that contains the bank’s contact information b. Be sure the fax is addressed to a specific individual c. Be sure to retain a copy of the cover sheet for at least 24 months.

  9. INFORMATION SECURITY To ensure the confidentiality of e-mail communications, employees should a. Delete all e-mails containing customer sensitive information immediately after reading b. Use another employee’s computer c. None of the above – email is not secure and care should be taken when using it to communicate confidential client or business information.

  10. INFORMATION SECURITY Any confidential customer information that is communicated electronically via the Internet should be: a. Sensitive information should not be emailed b. Copied to the Information Security Officer c.  Sent “reply requested”

  11. INFORMATION SECURITY Physical Bank Security is the responsibility of a.  Technology Management b.  Security c.  Compliance e.  All employees

  12. INFORMATION SECURITY The Bank’s Security Officer is: a.  b.  c.   e.  

  13. INFORMATION SECURITY Information Security is concerned with: a) Any and all information that has been collected in order to conduct business b) Only the funds that have been entrusted to the Bank c) None of the above

  14. INFORMATION SECURITY TRUE OR FALSE The Information Security Policy must be Board approved and reviewed annually.

  15. INFORMATION SECURITY Sensitive documents can only be left on printers or on desks if: a) Physical access controls are in place to prevent unauthorized persons from entering the area b) The clients can’t see them c) None of the above

  16. INFORMATION SECURITY TRUE OR FALSE The bank may, at its discretion, monitor employees Internet and e-mail usage.

More Related