Mcbride Security Policy Security Policies And Recommendations Essay

PAGES
3
WORDS
955
Cite

McBride Security Policy Security Policies and Recommendations for McBride Financial Services

McBride Financial Services has experienced increased consumer interest in its innovative and economical loan offerings and terms. With rising competition in the market, McBride is now aggressively working to boost market share through a renewed focus on customer service and simple and speedy loan processing (Fluss, 2009). While many automated processes in the financial sector can be convenient for customers, they can also present unique and significant security risks for companies (Compton, 2004). The following policies are aimed at covering certain critical security areas for the loan department at McBride Financial Services.

General Information Security

Sensitive information can be defined as a customer's full name, address, phone number, credit information, social security number, date of birth, mother's maiden name, employment and salary information, username/passwords combinations, or PIN ids (Bilich, 2000). All such information should be stored securely in order to help ensure confidentiality and thwart misuse, fraud, theft, and customer privacy violations.

All computer networks should receive a comprehensive review for reasonably foreseeable threats. These may include both internal and external threats such as unauthorized disclosure; misappropriation or alteration of customer information or accounts; improper disposal of sensitive information; unauthorized access to systems; work with third party vendors or service providers; and improper destruction of outdated electronic data and storage systems (Garratt & Keister, 2009).

Technical firewalls should be implemented, with consideration given to the many ways in which data systems can potentially...

...

Proper risk assessments should be conducted to strengthen potential areas of weakness posed by Internet connectivity. Both automated and manual processes should undergo a thorough and routine security audit to identify areas of vulnerability (Garratt & Keister, 2009).
Security Controls

Information security controls should be instituted to address any risks exposed during assessment (Ferreira & Andrade, 2011). Loan processing is primarily a back-office operation. At a fundamental level, back offices repetitively process large volumes of transactions. These processes can be simple steps such as posting payments, or complex, multi-step, multi-touch processes that span lengthy timeframes such as complex mortgages (Fan et al., 2010). The individuals involved in loan processing are many -- data entry clerks, loan agents, loan processors, accounts payable processors, closing agents, and loan officers.

Access controls that include passwords and classification levels should be implemented to allow only authorized individuals to view customer information and file management databases (Menconi & Desmond, 2000). In addition, access history should be recorded to allow the organization to monitor an employee's retrieving, downloading and sharing of sensitive records and other forms of data. Encryption for data in transit over networks will help safeguard sensitive information. All computer systems should feature anti-virus, Trojan detection, and other comparable safety measures to immediately quarantine and delete intrusive software or other attacks upon computer network (Ferreira & Andrade, 2011).

Paper records including loan applications, credit reports, and customer employment records…

Sources Used in Documents:

References

Bilich, F. (2000). 'Total quality management: quality macro-function model for banks. (Cover story)', Total Quality Management, 11(1), 15.

Brandt, D. (2012). 'Work Perfect', Industrial Engineer: IE, 44(9), 66.

Britt, P. (2005). 'Finding the Formula for Successful Cm', Econtent, 28(1/2), 38-42.

Compton, J. (2004). 'CRM Is Go!', CRM Magazine, 8(10), 30-35.


Cite this Document:

"Mcbride Security Policy Security Policies And Recommendations" (2012, November 18) Retrieved April 18, 2024, from
https://www.paperdue.com/essay/mcbride-security-policy-security-policies-83090

"Mcbride Security Policy Security Policies And Recommendations" 18 November 2012. Web.18 April. 2024. <
https://www.paperdue.com/essay/mcbride-security-policy-security-policies-83090>

"Mcbride Security Policy Security Policies And Recommendations", 18 November 2012, Accessed.18 April. 2024,
https://www.paperdue.com/essay/mcbride-security-policy-security-policies-83090

Related Documents

" (AAFP, nd) The Health Maintenance Organization further should "…negotiate with both public and private payers for adequate reimbursement or direct payment to cover the expenses of interpreter services so that they can establish services without burdening physicians…" and the private industry should be "…engaged by medical organizations, including the AAFP, and patient advocacy groups to consider innovative ways to provide interpreter services to both employees and the medically underserved." (AAFP,

Decreasing United States Unemployement Unemployment How to Decrease Unemployment in the United States Unemployment in the United States has reached an extended peak that it has not seen since the end of the 1930's. People are worried that this could be the new norm, even though the rate seems to be trending down again. Unfortunately, too many people also realize that much of the downward trend comes from the federal government constantly readjusting

, 2005). In addition, the workload on clinicians is often increased past the point of reasonable because it is too intrusive and time consuming to document patient encounters during clinic time (Grabenbauer, Skinner, and Windle, 2011). The amount of information that can accumulate in a patient's record from multiple sources can be daunting and lead to information overload. CDS alerts can be so common that clinicians begin to ignore them.

Operational issues of IT Department NHS Organization UK The objective of this report is to provide a proposal to reduce the IT operational costs. National Health Service (NHS) is a biggest healthcare service provider in the UK, and the organization delivers both primary and secondary healthcare since its formation. The UK government major objective for forming NHS is to provide the affordable and quality healthcare delivery for all social class in the

As a result, liberal international institutions broke down. Conversely, ineffective international institutions compounded national economic difficulties. (Holm & Sorensen, 1995, p. 148) Following World War II, the United States assumed a leadership role in developing new types of international institutions. For example, the General Agreement on Tariffs and Trade (GATT) provided for a liberalization of international trade, the Bretton Woods framework created a fixed exchange-rate system (which lasted until 1971),