IT Examiner School, Seaside, CA

Encryption Standards

Evaluate the institution’s use of encryption for sensitive institution and customer data

• At rest and/or in transit • Current industry standards • Updates and reviews by IT management

Item Processing Check processing • Controls over teller/branch imaging • Security over the capture, storage, and transmission of images • Controls over the destruction of source documents after being scanned • Dual control or independent review over the processing of reject, re-entry, and unposted items • Physical controls over negotiable items • Controls over cash letters (e.g., reconcilements, segregation of duties)

Made with FlippingBook - Online catalogs