Bank Security A Training Module Nick Elmy, Nicole Fiamingo, & Katie Liparulo.

Slides:



Advertisements
Similar presentations
Protect Our Students Protect Ourselves
Advertisements

Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Copyright, 1996 © Dale Carnegie & Associates, Inc. BANK ON IT Money Smart Course Indiana Department of Financial Institutions.
CHAPTER 25 Checking Accounts. CHAPTER 25 Checking Accounts.
Primary Threats to Computer Security
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Store Security. STORE SECURITY Customer Service Acknowledge all customers Make eye contact. A possible robber will think twice if he thinks that he can.
1 Identity Theft and Phishing: What You Need to Know.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
What is identity theft, and how can you protect yourself from it?
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
FDIC Money Smart for Young Adults
Before The Bank Robbery. Before The Robbery Following Measures Should Be Taken Prior to a Robbery:  Regularly conducted teller training  Implementation/installation.
1 Cash Handling – It’s my job Whether you take in lots of money or … you collect “pennies”
Security, Privacy, and Ethics Online Computer Crimes.
The Internet = A World of Opportunities
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
HIPAA Privacy & Security EVMS Health Services 2004 Training.
Internet safety By Lydia Snowden.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
HIPAA Privacy & Security Kay Carolin Barbara Ann Karmanos Cancer Center March 2009.
Douglas County Sheriff’s Office
Scams & Schemes Common Sense Media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Stay Safe Online. Use strong passwords Using the same password for all your accounts makes it easy to remember. However, it also means a hacker needs.
Company Guidelines and Basic Rules for …. No text words or slang, all s sent have to be polite and formal Use suitable, relevant subject lines.
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Checking & Savings Accounts Economics What is a Checking Account?  Common financial service used by many consumers (a place to keep money)  Funds.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
CASH HANDLING POLICIES AND PROCEDURES TRAINING
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
CHAPTER 7 Bank Security. ROBBERY During a robbery you must remain calm and follow proper bank security guidelines. During a robbery you must remain calm.
Protecting Your Assets By Preventing Identity Theft
Cash Handling – It’s my job
An Introduction to Phishing and Viruses
Robbery Response and Prevention Training
Information Security 101 Richard Davis, Rob Laltrello.
Cash Handling – It’s my job
Open, Manage, and Reconcile
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Protecting Your Identity:
Protecting Yourself from Fraud including Identity Theft
Premier Employee Program Version 4.0
Handling Information Securely
Identity Theft Samuel H. Slater.
Presentation transcript:

Bank Security A Training Module Nick Elmy, Nicole Fiamingo, & Katie Liparulo

Introduction Training Topic Purpose of Training The Importance of Training

Branch Security Topics Bank Entrance Bank Exit Procedures Cashing Checks Counterfeit Information Security Bank Robbery Procedures Bank Robbery Awareness

Branch Entrance

Terms To Know Dual Control: involves two bank employees performing necessary bank functions All clear signal: a device used to signal employees the branch is safe to enter

All Clear Signal

Bank Entrance Checklist 1.Two people to open 2.Drive around branch to do an outside inspection 3.One employee enters branch to perform inspection and disarm the alarm panel 4.If everything is good, set the all clear signal 5.Let second employee in to continue with opening procedures

Branch Exit Procedures

Closing Procedures Dual control Locking the doors (only after all customers have left) Routine closing procedures –Tellers cash balancing – ing work –Scanning any necessary documents Sensitive documents Setting the vault clocks Security codes

Branch Exit Checklist 1.Inspect branch to ensure there are no customers inside 2.Lock the doors 3.Perform nightly closing procedures (example: tellers cash balancing) 4.Put all sensitive documents in vault 5.Under dual control, set and lock in vault clocks, and close the vault door 6.Using your assigned security code, enter it into the alarm panel to arm the alarms, and exit the building

Cashing Checks

What is usually on a check? Owner of the account’s name & address Date Written & numerical amount Check number Check memo Signature Fraction Micro number Account number Bank name & address

Before you cash a check: Check the date Be sure that it isn’t stale dated (6 months or older) Make sure the written and numeric amounts match Verify the makers signature if the check is drawn on our bank Always ask for identification if you don’t know the customer If the amount of the check exceeds $10,000 a CTR (currency transaction report) needs to be filled out

Good Check

Bad Check Name should appear at the beginning of the line Micr number is overlapped Asterisks shouldn’t be there Missing fraction

Cash Balancing

Terms Bait money Money kept in your working cash in case of a robbery. Bait money is $100 usually in $20 bills. Bait money is recorded on a sheet containing all the serial numbers on the bills. Mutilated money Money in poor condition. Mutilated money is classified by the Fed as any bill that is damaged by the means of being burned, severely ripped, moldy, or containing feces. Bulk money Money of one denomination strapped together 100’s strapped in bulk of $1000, 50’s strapped in bulk of $1000, 20’s strapped In bulk of $2000, 10’s strapped in bulk of $1000, 5’s strapped in bulk of $500, and 1’s strapped in bulk of $100 Cash can Contained where all of your cash is stored at night and all working cash is stored during the day Top drawer Where all your working cash is kept during the day Drawer may remain unlocked while your at your teller window, but must be locked as soon as you leave your station. Bottom drawer Where all your bulk cash is kept during the day This drawer is to be lock at all times and only unlocked when you need to use more cash. Coin vault Where each individual teller’s bulk coin is kept

Head Teller/Teller Services Supervisor Cash Can limit of $25,000 $2500 to be maintained in top drawer Bulk cash to be locked in second drawer All excess cash is sold to vault All cash arranged in your cash can with the smallest denomination closest to you.

Tellers Cash can limit of $10,000 $2500 to be maintained in top drawer Bulk cash to be locked in second drawer All excess cash is to be sold to head teller to sell back to the vault

Activity 1.1 Refer to activity 1.1 handout –Strapping money –Cash arrangement

Activity 1.2 Refer to activity 1.2 handout -Cash balancing terms word find

Questions and Answers

Counterfeit Safer. Smarter. More Secure

Activity 2.1 Questions 1.Why is United States currency being changed? 2.Will the old bills be recalled, demonetized or devalued? 3.What changes are being made to the United States paper money? 4.Why add color to United States paper money?

Activity 2.1 Answers Why is United States currency being changed? United States paper money is being changed to stay ahead of savvy counterfeiters. Will the old bills be recalled, demonetized or devalued? No. New bills and old bills will maintain their full face value. The United States has never devalued its paper money and will not do so now. What changes are being made to the United States paper money? On the $20, $50 and $10 denominations, the color-shifting ink on the number indicating the bill's denomination in the lower-right corner on the face of the bill has been enhanced to produce a more dramatic shift in color, from copper to green, when the bill is tilted. Previously, the color shifted from green to black. The new $5 bill, however, does not included color shifting ink in the bill's new design features. Why add color to United States paper money? Color makes it more burdensome for potential currency counterfeiters because it adds complexity to the bills, and it makes it easier to distinguish denominations. While consumers should not use color to verify the authenticity of their money, it does have a practical advantage, particularly for individuals with low vision, because different colors make it easier to tell denominations apart.

Activity 2.2 Podcast PodCast

PRE-1996 NOTES SERIES 1996 NOTES SERIES 2004 NOTES

Activity 2.3 Catch a Counterfeit Game

Questions and Answers

Security Awareness

Important Aspect of Information Security Confidentiality – Exclusively reviewed ONLY by intended parties Integrity- Ensuring accuracy of information Availability- Ensuring information is available to intended parties whenever needed

Consequences of a Lack in Information Security Loss of competitive advantage Identity theft Negative media coverage Loss of customer confidence Legal penalties

Security Threats Viruses Spyware Unauthorized system access Shoulder surfing Curious Personal Disgruntled Employees Phishing Instant messaging services

Viruses Codes usually sent via that can cause a great deal of damage o Steal files that may contain confidential personal information o Render a computer unusable o Remove files from computer How to protect your computer: o Do not open unknown sender s o Report all suspicious s to your department manager

Spyware A technology that steals (without permission, and or knowledge ) personal and confidential information How to protect your computer: o Do not click on Pop Up windows o Do not install software, without consent from your department manager

Unauthorized system access Viciously obtaining unauthorized access to your computer How to protect your computer: o Use strong passwords o Memorize your passwords  Do not keep your passwords written down o Change default passwords o Use a password protected screensaver

Shoulder surfing Direct observations techniques in order to gain unauthorized information How to protect your computer: o Be aware of your surroundings o Do not perform highly confidential work in areas in which you are unable to safeguard yourself o Use a privacy screen when necessary

Curious Personal An employee who tests the limits of their companies access How to protect your computer: o Retrieve your confidential documents (faxes) yourself, and immediately o Shred confidential documents o Lock confidential documents in a file or drawer

Disgruntled employees Upset employees with an intent to harm the company How to protect your computer: o Be observant of those around you o Report suspicious behavior to the appropriate authority

Phishing An sent with the intention to cause damage How to protect your computer: o Never personal information

Instant messaging services Privacy threats caused by using a free instant messaging service How to protect your computer: o Never send confidential messages or files o Realize all information sent via an instant messaging service is susceptible to information sharing

Online Security VS. Online Safety Online Security: The use to technology software to protect our computers Online Safety: Acting in ways that help protect against risks and threats Viruses/Worms Trojans Spyware

Steps to Online Safety Turn on an Internet Firewall Update your Operating System Maintain Anti-Virus Software Maintain Anti-Spyware Software

More Steps to Online Security Back up your files regularly Think before you click Read website privacy statements Close pop-ups using red “X”

Activity 3.1 Case Study One quiet Monday in July 2004, at the height of the summer vacation season, a call center representative at a midsize U.S. financial institution answered a peculiar call. The customer on the line was suspicious of an she had received from the bank. The contained a link to a website where the customer was asked to enter her debit card number, card expiration date, PIN and address. But the message was full of typos and grammatical errors, and it didn't seem quite right for the bank to request that information. The call set off a confused chain reaction. The customer forwarded the to the call center representative, who forwarded it to the call center manager. The manager sent it to someone in the online banking department, who forwarded it to her upper management and to the corporate security department. Questions 1.Did the customer have the right to be curious? 2.What may have caused this situation? 3.How might this situation have been avoided? 4.How should this situation be handled? Who should be involved?

Questions and Answers

Robbery Awareness and Procedures

Awareness A financial institution is very seldom prey for a criminal until it has been thoroughly "cased." Carefully observe persons loitering in the building. You should be discreetly wary of suspicious-looking individuals who seek change or ask for information. Note identification. Check on maintenance workers, and be certain that they are what they represent themselves to be.

Bank Robbery Background 80% of bank robberies involve a lone robber who holds up a lone teller. The robber may hand the teller a note and may or may not display a weapon. Take-over robberies have been increasing in the last few years and can be extremely dangerous. The Bank Protection Act

The Bank Robber Career Criminals o Method of operation Opportunists o Motivating factors

Procedures 1.Silent alarm installed 2.Activate the surveillance camera(s) 3.A note left behind can be of great value to law enforcement agencies 4.Be certain to include bait money in loot given to the robber. 5.Observe the robber as he leaves.

After the Robbery Once the robber is gone: 1.Call the authorities.. 2. Avoid touching evidence. 3. Take down names. 4. If possible, each witness should write down all details that they observed during the course of the robbery so that they are not forgotten.

Ten Mistakes Employees Make During a Bank Robbery: DO NOT: o Treat the hold up note as a joke or a prank o Create any surprises for the robber o Carry excess cash in your cash drawer o Offer to rob the the bank for the robber o Attempt to bring attention to the robbery

Ten Mistakes Employees Make During a Bank Robbery cont.: DO NOT: o Argue with the robber o Tell customers that you have just been robbed o Leave the bank after a robbery o Make sudden movements o Attempt to engage the robber(s) in a struggle

Activity Which is more important? What a robber is wearing or his height, weight, eye color, face shape? 2.If the robber has on a cast, an eye patch, a bandage, or something similar, what should you keep in mind? 3.How can the weather be a factor in identifying suspicious individuals? 4.When you see suspicious individuals in or around your bank, what should you do? 5.After a robber leaves the building, it is a good idea to immediately write down what you remember about his appearance, his actions, his voice. True? or False

Activity 4.1 Answers 1.Immutable characteristics are most important for identification purpose 2.It may be a prop. It's possible the robber has put it on in order to draw your attention, hoping you will remember that characteristic and not recall appearance characteristics that he can't change. Once he/she leaves the bank, he/she immediately removes the cast, patch, bandage 3.If an individual has a bulky coat or a hooded sweatshirt on when the weather is not cold, something is up 4.Notify your bank security officer. Observe them. Make notes about what you see, including a description of the individual(s) and their vehicle. If appropriate, contact the authorities 5.True. Writing down your recollection immediately will help you focus on exactly what you saw and heard while it is fresh in your mind.

Activity 4.2 PICTURE MEMORY

Activity 5.1 STEAL OF FORTUNE

References

Activities tml  Podcasthttp:// tml  Catch a Counterfeithttp://  Memory Gamehttp://  Steal of Fortune