Assessment of knowledge in dealing with security of non-public information. Covers bank policies and procedures.
Information used in personnel records, shareholder information and critical corporate information.
Any recorded information or combination of information, that identifies an individual and is maintained for business purposes.
Information that could allow access to a customers account.
Proprietary and/or critical data of affiliates or partners.
All the Above
Take notes and wait to see if there are any additional attempts to get information.
Report the incident immediately to the Information Security Officer and/or Executive Management.
Contact the local police department.
Gramm-Leach-Bliley Act
Fair Credit Reporting Act
Bank Secrecy Act
Federal Trade Commission
Place documents daily in a shred container at your desk and then should be emptied weekly into the locked shred bins.
Documents may be placed in any type of trash container as long as it is emptied nightly.
All documents containing confidential information will be given to the Information Security Officer to be shred on-site.
Place documents in a workspace shred container, which is emptied daily into a designated locked shred receptacle.
True
False
Rate this question:
Branch capture transaction misuse.
Lost or stolen digital devices, laptops and mobile devices containing stored non-public information.
Viruses, spyware, phishing and pharming via email, hyperlinks and websites.
Access to passwords.
All the Above
True
False
Information Security Officer
Senior Management
Deposit Operations
All employees have access
True
False
No account information should be released over the phone.
Date and amount of last deposit.
Last four digits of the account holders social security number or TIN
Both B and C
PIN or password information.
True
False
Contain at least 8 characters and use a complex format including upper and lower case, numbers and symbols.
Be changed every 3-6 months with no repetitions.
Use common words or phrases so they can be easily remembered.
None of the Above
True
False
An account holder calling the bank prior to sending faxed information.
When someone calls Signature Bank reading from a predefined script.
An individual that attempts to gain access to account information by impersonating the account holder, vendor, law enforcement or government agency.
An account holder sending a request via text messaging for account information.
True
False
Board of Directors
Bank Employees
Information Security Officer
Network Administrator
All the Above
True
False
In your planner
In your desk drawer
Taped to the bottom of your computer
Nowhere; passwords should not be written down.
True
False
Complete all required training
Adhere to established policies and procedures
Not allowing unauthorized persons access to bank owned computers for any reason
Contact ISO and/or Manager concerning suspicious activity or disclosure of non-public information
Discard and/or destroy non-public information per company guidelines
True
False
Ignore the email
Email the exact information requested in accordance with our Sundown Rule
Contact the client by phone to confirm the authenticity of the email. The client's phone voice must be known to the banker. Client identification through verbal follow-up / confirmation and standard identification procedures, followed by an encrypted reply will then constitute policy compliance.
Email is considered company property
An employee has the right to keep email private
Email may be retrieved and reviewed for any number of reasons including legal supoenas
Both A and C
True
False
True
False
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.