Presentation is loading. Please wait.

Presentation is loading. Please wait.

Bank Security A Training Module Nick Elmy, Nicole Fiamingo, & Katie Liparulo.

Similar presentations

Presentation on theme: "Bank Security A Training Module Nick Elmy, Nicole Fiamingo, & Katie Liparulo."— Presentation transcript:

1 Bank Security A Training Module Nick Elmy, Nicole Fiamingo, & Katie Liparulo

2 Introduction Training Topic Purpose of Training The Importance of Training

3 Branch Security Topics Bank Entrance Bank Exit Procedures Cashing Checks Counterfeit Information Security Bank Robbery Procedures Bank Robbery Awareness

4 Branch Entrance

5 Terms To Know Dual Control: involves two bank employees performing necessary bank functions All clear signal: a device used to signal employees the branch is safe to enter

6 All Clear Signal

7 Bank Entrance Checklist 1.Two people to open 2.Drive around branch to do an outside inspection 3.One employee enters branch to perform inspection and disarm the alarm panel 4.If everything is good, set the all clear signal 5.Let second employee in to continue with opening procedures

8 Branch Exit Procedures

9 Closing Procedures Dual control Locking the doors (only after all customers have left) Routine closing procedures –Tellers cash balancing –Emailing work –Scanning any necessary documents Sensitive documents Setting the vault clocks Security codes

10 Branch Exit Checklist 1.Inspect branch to ensure there are no customers inside 2.Lock the doors 3.Perform nightly closing procedures (example: tellers cash balancing) 4.Put all sensitive documents in vault 5.Under dual control, set and lock in vault clocks, and close the vault door 6.Using your assigned security code, enter it into the alarm panel to arm the alarms, and exit the building

11 Cashing Checks

12 What is usually on a check? Owner of the account’s name & address Date Written & numerical amount Check number Check memo Signature Fraction Micro number Account number Bank name & address

13 Before you cash a check: Check the date Be sure that it isn’t stale dated (6 months or older) Make sure the written and numeric amounts match Verify the makers signature if the check is drawn on our bank Always ask for identification if you don’t know the customer If the amount of the check exceeds $10,000 a CTR (currency transaction report) needs to be filled out

14 Good Check

15 Bad Check Name should appear at the beginning of the line Micr number is overlapped Asterisks shouldn’t be there Missing fraction

16 Cash Balancing

17 Terms Bait money Money kept in your working cash in case of a robbery. Bait money is $100 usually in $20 bills. Bait money is recorded on a sheet containing all the serial numbers on the bills. Mutilated money Money in poor condition. Mutilated money is classified by the Fed as any bill that is damaged by the means of being burned, severely ripped, moldy, or containing feces. Bulk money Money of one denomination strapped together 100’s strapped in bulk of $1000, 50’s strapped in bulk of $1000, 20’s strapped In bulk of $2000, 10’s strapped in bulk of $1000, 5’s strapped in bulk of $500, and 1’s strapped in bulk of $100 Cash can Contained where all of your cash is stored at night and all working cash is stored during the day Top drawer Where all your working cash is kept during the day Drawer may remain unlocked while your at your teller window, but must be locked as soon as you leave your station. Bottom drawer Where all your bulk cash is kept during the day This drawer is to be lock at all times and only unlocked when you need to use more cash. Coin vault Where each individual teller’s bulk coin is kept

18 Head Teller/Teller Services Supervisor Cash Can limit of $25,000 $2500 to be maintained in top drawer Bulk cash to be locked in second drawer All excess cash is sold to vault All cash arranged in your cash can with the smallest denomination closest to you.

19 Tellers Cash can limit of $10,000 $2500 to be maintained in top drawer Bulk cash to be locked in second drawer All excess cash is to be sold to head teller to sell back to the vault

20 Activity 1.1 Refer to activity 1.1 handout –Strapping money –Cash arrangement

21 Activity 1.2 Refer to activity 1.2 handout -Cash balancing terms word find

22 Questions and Answers

23 Counterfeit Safer. Smarter. More Secure

24 Activity 2.1 Questions 1.Why is United States currency being changed? 2.Will the old bills be recalled, demonetized or devalued? 3.What changes are being made to the United States paper money? 4.Why add color to United States paper money?

25 Activity 2.1 Answers Why is United States currency being changed? United States paper money is being changed to stay ahead of savvy counterfeiters. Will the old bills be recalled, demonetized or devalued? No. New bills and old bills will maintain their full face value. The United States has never devalued its paper money and will not do so now. What changes are being made to the United States paper money? On the $20, $50 and $10 denominations, the color-shifting ink on the number indicating the bill's denomination in the lower-right corner on the face of the bill has been enhanced to produce a more dramatic shift in color, from copper to green, when the bill is tilted. Previously, the color shifted from green to black. The new $5 bill, however, does not included color shifting ink in the bill's new design features. Why add color to United States paper money? Color makes it more burdensome for potential currency counterfeiters because it adds complexity to the bills, and it makes it easier to distinguish denominations. While consumers should not use color to verify the authenticity of their money, it does have a practical advantage, particularly for individuals with low vision, because different colors make it easier to tell denominations apart.



28 Activity 2.2 Podcast PodCast



31 Activity 2.3 Catch a Counterfeit Game

32 Questions and Answers

33 Security Awareness

34 Important Aspect of Information Security Confidentiality – Exclusively reviewed ONLY by intended parties Integrity- Ensuring accuracy of information Availability- Ensuring information is available to intended parties whenever needed

35 Consequences of a Lack in Information Security Loss of competitive advantage Identity theft Negative media coverage Loss of customer confidence Legal penalties

36 Security Threats Viruses Spyware Unauthorized system access Shoulder surfing Curious Personal Disgruntled Employees Phishing Instant messaging services

37 Viruses Codes usually sent via email that can cause a great deal of damage o Steal files that may contain confidential personal information o Render a computer unusable o Remove files from computer How to protect your computer: o Do not open unknown sender emails o Report all suspicious emails to your department manager

38 Spyware A technology that steals (without permission, and or knowledge ) personal and confidential information How to protect your computer: o Do not click on Pop Up windows o Do not install software, without consent from your department manager

39 Unauthorized system access Viciously obtaining unauthorized access to your computer How to protect your computer: o Use strong passwords o Memorize your passwords  Do not keep your passwords written down o Change default passwords o Use a password protected screensaver


41 Shoulder surfing Direct observations techniques in order to gain unauthorized information How to protect your computer: o Be aware of your surroundings o Do not perform highly confidential work in areas in which you are unable to safeguard yourself o Use a privacy screen when necessary

42 Curious Personal An employee who tests the limits of their companies access How to protect your computer: o Retrieve your confidential documents (faxes) yourself, and immediately o Shred confidential documents o Lock confidential documents in a file or drawer

43 Disgruntled employees Upset employees with an intent to harm the company How to protect your computer: o Be observant of those around you o Report suspicious behavior to the appropriate authority

44 Phishing An email sent with the intention to cause damage How to protect your computer: o Never email personal information


46 Instant messaging services Privacy threats caused by using a free instant messaging service How to protect your computer: o Never send confidential messages or files o Realize all information sent via an instant messaging service is susceptible to information sharing

47 Online Security VS. Online Safety Online Security: The use to technology software to protect our computers Online Safety: Acting in ways that help protect against risks and threats Viruses/Worms Trojans Spyware

48 Steps to Online Safety Turn on an Internet Firewall Update your Operating System Maintain Anti-Virus Software Maintain Anti-Spyware Software

49 More Steps to Online Security Back up your files regularly Think before you click Read website privacy statements Close pop-ups using red “X”




53 Activity 3.1 Case Study One quiet Monday in July 2004, at the height of the summer vacation season, a call center representative at a midsize U.S. financial institution answered a peculiar call. The customer on the line was suspicious of an e-mail she had received from the bank. The e-mail contained a link to a website where the customer was asked to enter her debit card number, card expiration date, PIN and e-mail address. But the message was full of typos and grammatical errors, and it didn't seem quite right for the bank to request that information. The call set off a confused chain reaction. The customer forwarded the e-mail to the call center representative, who forwarded it to the call center manager. The manager sent it to someone in the online banking department, who forwarded it to her upper management and to the corporate security department. Questions 1.Did the customer have the right to be curious? 2.What may have caused this situation? 3.How might this situation have been avoided? 4.How should this situation be handled? Who should be involved?

54 Questions and Answers

55 Robbery Awareness and Procedures

56 Awareness A financial institution is very seldom prey for a criminal until it has been thoroughly "cased." Carefully observe persons loitering in the building. You should be discreetly wary of suspicious-looking individuals who seek change or ask for information. Note identification. Check on maintenance workers, and be certain that they are what they represent themselves to be.

57 Bank Robbery Background 80% of bank robberies involve a lone robber who holds up a lone teller. The robber may hand the teller a note and may or may not display a weapon. Take-over robberies have been increasing in the last few years and can be extremely dangerous. The Bank Protection Act

58 The Bank Robber Career Criminals o Method of operation Opportunists o Motivating factors

59 Procedures 1.Silent alarm installed 2.Activate the surveillance camera(s) 3.A note left behind can be of great value to law enforcement agencies 4.Be certain to include bait money in loot given to the robber. 5.Observe the robber as he leaves.

60 After the Robbery Once the robber is gone: 1.Call the authorities.. 2. Avoid touching evidence. 3. Take down names. 4. If possible, each witness should write down all details that they observed during the course of the robbery so that they are not forgotten.


62 Ten Mistakes Employees Make During a Bank Robbery: DO NOT: o Treat the hold up note as a joke or a prank o Create any surprises for the robber o Carry excess cash in your cash drawer o Offer to rob the the bank for the robber o Attempt to bring attention to the robbery

63 Ten Mistakes Employees Make During a Bank Robbery cont.: DO NOT: o Argue with the robber o Tell customers that you have just been robbed o Leave the bank after a robbery o Make sudden movements o Attempt to engage the robber(s) in a struggle

64 Activity 4.1 1.Which is more important? What a robber is wearing or his height, weight, eye color, face shape? 2.If the robber has on a cast, an eye patch, a bandage, or something similar, what should you keep in mind? 3.How can the weather be a factor in identifying suspicious individuals? 4.When you see suspicious individuals in or around your bank, what should you do? 5.After a robber leaves the building, it is a good idea to immediately write down what you remember about his appearance, his actions, his voice. True? or False

65 Activity 4.1 Answers 1.Immutable characteristics are most important for identification purpose 2.It may be a prop. It's possible the robber has put it on in order to draw your attention, hoping you will remember that characteristic and not recall appearance characteristics that he can't change. Once he/she leaves the bank, he/she immediately removes the cast, patch, bandage 3.If an individual has a bulky coat or a hooded sweatshirt on when the weather is not cold, something is up 4.Notify your bank security officer. Observe them. Make notes about what you see, including a description of the individual(s) and their vehicle. If appropriate, contact the authorities 5.True. Writing down your recollection immediately will help you focus on exactly what you saw and heard while it is fresh in your mind.

66 Activity 4.2 PICTURE MEMORY

67 Activity 5.1 STEAL OF FORTUNE

68 References

69 Activities tml  Podcast tml  Catch a Counterfeit  Memory Game  Steal of Fortune

Download ppt "Bank Security A Training Module Nick Elmy, Nicole Fiamingo, & Katie Liparulo."

Similar presentations

Ads by Google