IT Examiner School, Seaside, CA
Encryption Standards
Evaluate the institution’s use of encryption for sensitive institution and customer data
• At rest and/or in transit • Current industry standards • Updates and reviews by IT management
Item Processing Check processing • Controls over teller/branch imaging • Security over the capture, storage, and transmission of images • Controls over the destruction of source documents after being scanned • Dual control or independent review over the processing of reject, re-entry, and unposted items • Physical controls over negotiable items • Controls over cash letters (e.g., reconcilements, segregation of duties)
Made with FlippingBook - Online catalogs