Faq

3aub8n

Q1. What is required of Management?

Management is required to develop, implement, and maintain the Information Security Program. Management is also required to report the effectiveness of the Information Security Program to the Board of Directors at least annually.

Q2. Is the Board of Directors required to be involved in the Information Security Program? If so, what is the Board’s role?

The Board of Directors plays a crucial role. The Board is responsible for approval of the Credit Union’s Information Security Program, as well as development, implementation, and the maintenance of the program. The NCUA also holds the Board responsible for delegating implementation of the program.

Q3. How do we get started?

Identify the policies, standards & procedures, and practices that have been established at your Credit Union. Use what you are already doing and build upon that to develop an Information Security Program that meets regulatory requirements and industry best practices.

Q4. We have a firewall, isn’t that all we need?

A properly configured firewall is a vital component to a comprehensive Information Security Program. If however you rely solely on your firewall or other security product to protect member information, it may still be vulnerable to compromise.

Q5. What if all my services are hosted off-site? Isn’t it the vendor’s responsibility to protect our member information?

You may entrust information processing, maintenance, and the storage to a Third Party, but the Regulation requires Credit Unions to maintain responsibility for protecting their member's information. Credit Unions should perform sufficient due diligence to ensure that the Third Party Service Provider’s security is acceptable in protecting member information.

Q6. What must Credit Unions do to comply with the new Regulations for Safeguarding Member Information?

Credit Unions must develop, implement, and maintain a comprehensive Information Security Program that addresses each element of the Regulations to be in compliance.

Q7. What are the Guidelines for Safeguarding Member Information?

On November 12, 1999 President Bill Clinton signed the Gramm-Leach-Bliley Act into law. Section 501, Protection of Nonpublic Personal Information, requires the NCUA to establish appropriate standards relating to the administrative, technical, and physical safeguards for member information. In response, the NCUA modified its security regulation (12CFR Part 748.0) to require Credit Unions to protect member information. The NCUA published these Guidelines within Appendix A of the regulation. The NCUA will also be establishing Appendix B to the regulation. This portion of the Guideline will address standards Credit Unions should establish regarding response to intrusion and member notification.

Q8. We are a small Credit Union with limited resources, how can we obtain help without breaking our budget?

Call CastleGarde. Our staff has the capability, knowledge, and one hundred plus years ofcombined experience to help your Credit Union develop, implement, and maintain an Information Security Program that will exceed the requirements of the Regulations without costing the Credit Union a fortune.

Q9. Our Credit Union is not connected to the Internet, so we don’t have to worry about this, right?

While connection to the Internet increases risk to the security and integrity of your member information, Regulations still require appropriate protection of member information regardless of form, media, or presence on the Internet.

Q10. Our Credit Union has a privacy policy, aren’t we in compliance with the new regulations?

Not necessarily. Privacy policies generally don’t provide the level of protection for member information required by the Regulations. Effective information security is a process, not a product. A complete Information Security Program encompasses administrative, physical, and technical components.

Q11. How often are Credit Unions required to assess their Information Security Program?

The Regulations require management to report the effectiveness of the Information Security Program to the Board of Directors at least annually. Risk assessment should be included in the report, and thus performed annually. Assessments should also be scheduled according to the Credit Union’s needs and most current assessment results.

Q12. Does the Credit Union have to buy a lot of expensive hardware and software to meet the requirements of the Regulations?

Not necessarily. Some investment may be required, but it need not be excessive. The key is to perform an information security assessment and use the results to determine what is appropriate for your Credit Union.

Q13. Can Credit Unions perform their own risk assessments?

Although many Credit Unions may find it cost-prohibitive to hire the necessary expertise to perform a thorough risk assessment, we have found that some large Credit Unions have allocated the resources to perform their own risk assessment. You should also keep in mind that the required tests serve an audit function and the personnel that execute these tests should be independent of those who maintain the information systems.