This Policy prohibits the receipt of enticements with expectation of transactions or information in return.
Covers: Values less than $20 or has been approved by a supervisor.
Employee Bank Bribery Policy
This type of information will only be provided to account owners or with member consent (verbal or written)
What is Member Information?
This should be difficult to guess, include a capital letter, number and a special character.
This also should not be kept in any form that would allow an unauthorized person to access.
What is a password?
The fraudulent practice of sending emails pretending to be from reputable companies in an attempt to obtain personal information, such as passwords and credit card numbers.
What is Phishing?
This island nation is where the Lord of the Rings movies were filmed.
What is New Zealand?
This Policy covers activities that are unacceptable/prohibited while using Credit Union Computers.
Covers: Downloads, Social Networking, Videos, Illegal activities, and explicit content.
Computer Use Policy
This type of information should not be discussed outside of the credit union or with non-credit union personnel.
What is credit union business or member information?
Any suspicious emails/phone calls/faxes should be reported to this group.
What is management?
This form of cyberattack has been around for decades and uses malicious software designed to block access to a computer system until a sum of money has been paid.
What is Ransomware?
Frodo Baggins is given an elven sword named "Sting", which glows this color when in the presence of Orcs.
What is Blue?
All Employees are required to sign and abide by this policy on a condition of employment.
This policy is signed during BSA training.
Covers: Manipulation of accounts, documents, Etc. Theft. Check kiting. Forgeries. ETC
Employee Fraud Policy
Discussing issues involving members where other members could possibly hear can be prevented by doing this.
What is being aware of what is going on in the office?
This type of computer use should be limited/prohibited while using credit union computers.
Includes: Social media, gaming, videos.
What is Personal Computer use?
This type of software is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
What is Malware?
This mountain is where the One Ring was forged by Sauron the Deceiver
What is Mount Doom?
This lengthy Board approved Policy is based on management risk assessment. Controls and procedures are put in place based on perceived risk.
Covers: Risk Assessment, management responsibilities, network security, and oh so much more.
Information Security Policy
These two items should be locked at all times you are not at your teller station.
What is your computer and your money drawer?
Before opening attachments on emails or direct messages from employees this should be done.
What is asking them if the attachment is safe?
This is the technique aimed at talking a person into revealing specific information or performing a specific action for illegitimate reasons.
What is Social Enginerring
This creature found in the Mines of Moria was described by Gandalf as a demon of fire and shadow.
Credit Unions Must have this written Policy approved by the Board of Directors.
Covers: Embezzlement, internal Fraud, Emergency Evacuations, Reporting, Record Retention, Guidelines for Safekeeping, Etc.
General Security Policy
Before downloading files, opening unknown emails, or attachments you should do this.
What is asking for permission from management?
Management approval is required before preforming this online activity.
What is downloading software?
The fraudulent practice of sending text messages pretending to be from reputable companies in attempt to obtain personal information such as passwords and credit card numbers.
What is Smishing
This actor actually broke his foot while kicking a helmet during a scene in The Lord of the Rings: The Two Towers.
Who is Viggo Mortensen?