bank security a training module nick elmy, nicole fiamingo, & katie liparulo

69
Bank Security A Training Module Nick Elmy, Nicole Fiamingo, & Katie Liparulo

Upload: nia-cocke

Post on 15-Dec-2015

217 views

Category:

Documents


3 download

TRANSCRIPT

Bank SecurityA Training Module

Nick Elmy, Nicole Fiamingo, & Katie Liparulo

Introduction• Training Topic

• Purpose of Training

• The Importance of Training

Branch Security Topics

• Bank Entrance

• Bank Exit Procedures

• Cashing Checks

• Counterfeit

• Information Security

• Bank Robbery Procedures

• Bank Robbery Awareness

Branch Entrance

Terms To Know

• Dual Control: involves two bank employees performing necessary bank functions

• All clear signal: a device used to signal employees the branch is safe to enter

All Clear Signal

Bank Entrance Checklist

1. Two people to open

2. Drive around branch to do an outside inspection

3. One employee enters branch to perform inspection and disarm the alarm panel

4. If everything is good, set the all clear signal

5. Let second employee in to continue with opening procedures

Branch Exit Procedures

Closing Procedures

• Dual control• Locking the doors (only after all customers have left)• Routine closing procedures

– Tellers cash balancing– Emailing work – Scanning any necessary documents

• Sensitive documents• Setting the vault clocks• Security codes

Branch Exit Checklist

1. Inspect branch to ensure there are no customers inside

2. Lock the doors

3. Perform nightly closing procedures (example: tellers cash balancing)

4. Put all sensitive documents in vault

5. Under dual control, set and lock in vault clocks, and close the vault door

6. Using your assigned security code, enter it into the alarm panel to arm the alarms, and exit the building

Cashing Checks

What is usually on a check?

•Owner of the account’s name & address•Date•Written & numerical amount•Check number•Check memo•Signature•Fraction•Micro number•Account number•Bank name & address

Before you cash a check:

•Check the date•Be sure that it isn’t stale dated (6 months or older)

•Make sure the written and numeric amounts match

•Verify the makers signature if the check is drawn on our bank

•Always ask for identification if you don’t know the customer

•If the amount of the check exceeds $10,000 a CTR (currency

transaction report) needs to be filled out

Good Check

Bad CheckName should appear at the beginning of the line

Micr number is overlapped

Asterisks shouldn’t be thereMissing fraction

Cash Balancing

Terms

• Bait moneyMoney kept in your working cash in case of a robbery. Bait money is $100 usually in $20 bills. Bait money is recorded on a sheet containing all the serial numbers on the bills.

• Mutilated moneyMoney in poor condition. Mutilated money is classified by the Fed as any bill that is damaged by the means of being burned, severely ripped, moldy, or containing feces.

• Bulk money Money of one denomination strapped together100’s strapped in bulk of $1000, 50’s strapped in bulk of $1000, 20’s strapped In bulk of $2000, 10’s strapped in bulk of $1000, 5’s strapped in bulk of $500, and 1’s strapped in bulk of $100

• Cash canContained where all of your cash is stored at night and all working cash is stored during the day

• Top drawer Where all your working cash is kept during the dayDrawer may remain unlocked while your at your teller window, but must be locked as soon as you leave your station.

• Bottom drawer Where all your bulk cash is kept during the dayThis drawer is to be lock at all times and only unlocked when you need to use more cash.

• Coin vault Where each individual teller’s bulk coin is kept

Head Teller/Teller Services Supervisor

• Cash Can limit of $25,000

• $2500 to be maintained in top drawer

• Bulk cash to be locked in second drawer

• All excess cash is sold to vault

• All cash arranged in your cash can with the smallest denomination closest to you.

Tellers

• Cash can limit of $10,000

• $2500 to be maintained in top drawer

• Bulk cash to be locked in second drawer

• All excess cash is to be sold to head teller to sell back to the vault

Activity 1.1

• Refer to activity 1.1 handout– Strapping money– Cash arrangement

Activity 1.2

•Refer to activity 1.2 handout-Cash balancing terms word find

Questions and Answers

Counterfeit

Safer. Smarter. More Secure

Activity 2.1Questions

1. Why is United States currency being changed?

2. Will the old bills be recalled, demonetized or devalued?

3. What changes are being made to the United States paper money?

4. Why add color to United States paper money?

Activity 2.1Answers• Why is United States currency being changed? United States paper money is being

changed to stay ahead of savvy counterfeiters.

• Will the old bills be recalled, demonetized or devalued? No. New bills and old bills will maintain their full face value. The United States has never devalued its paper money and will not do so now.

• What changes are being made to the United States paper money? On the $20, $50 and $10 denominations, the color-shifting ink on the number indicating the bill's denomination in the lower-right corner on the face of the bill has been enhanced to produce a more dramatic shift in color, from copper to green, when the bill is tilted. Previously, the color shifted from green to black. The new $5 bill, however, does not included color shifting ink in the bill's new design features.

• Why add color to United States paper money? Color makes it more burdensome for potential currency counterfeiters because it adds complexity to the bills, and it makes it easier to distinguish denominations.

While consumers should not use color to verify the authenticity of their money, it does have a practical advantage, particularly for individuals with low vision, because different colors make it easier to tell denominations apart.

PRE-1996 NOTES

SERIES 1996 NOTES

SERIES 2004 NOTES

Activity 2.3Catch a Counterfeit

Game

Questions and Answers

Security Awareness

Important Aspect of Information Security

• Confidentiality – Exclusively reviewed ONLY by intended parties

• Integrity- Ensuring accuracy of information

• Availability- Ensuring information is available to intended parties whenever needed

Consequences of a Lack in Information Security

• Loss of competitive advantage• Identity theft• Negative media coverage• Loss of customer confidence• Legal penalties

Security Threats

• Viruses• Spyware• Unauthorized system access• Shoulder surfing • Curious Personal • Disgruntled Employees• Phishing• Instant messaging services

Viruses

• Codes usually sent via email that can cause a great deal of damageo Steal files that may contain confidential personal

informationo Render a computer unusable o Remove files from computer

• How to protect your computer:o Do not open unknown sender emailso Report all suspicious emails to your department

manager

Spyware

• A technology that steals (without permission,

and or knowledge) personal and confidential information

• How to protect your computer:o Do not click on Pop Up windowso Do not install software, without consent from

your department manager

Unauthorized system access

• Viciously obtaining unauthorized access to your computer

• How to protect your computer:o Use strong passwordso Memorize your passwords

Do not keep your passwords written downo Change default passwordso Use a password protected screensaver

Shoulder surfing

• Direct observations techniques in order to gain unauthorized information

• How to protect your computer:o Be aware of your surroundings o Do not perform highly confidential work in

areas in which you are unable to safeguard yourself

o Use a privacy screen when necessary

Curious Personal

• An employee who tests the limits of their companies access

• How to protect your computer:o Retrieve your confidential documents (faxes)

yourself, and immediatelyo Shred confidential documentso Lock confidential documents in a file or drawer

Disgruntled employees

• Upset employees with an intent to harm the company

• How to protect your computer:o Be observant of those around youo Report suspicious behavior to the appropriate

authority

Phishing

• An email sent with the intention to cause damage

• How to protect your computer:o Never email personal information

Instant messaging services

• Privacy threats caused by using a free instant messaging service

• How to protect your computer:o Never send confidential messages or fileso Realize all information sent via an instant

messaging service is susceptible to information sharing

Online Security VS. Online Safety

• Online Security: The use to technology software to protect our computers

• Online Safety: Acting in ways that help protect against risks and threats

Viruses/Worms

Trojans

Spyware

Steps to Online Safety

• Turn on an Internet Firewall• Update your Operating System• Maintain Anti-Virus Software• Maintain Anti-Spyware Software

More Steps to Online Security

Back up your files regularly

Think before you

click

Readwebsite privacy

statements

Close pop-ups using red

“X”

Activity 3.1

Case StudyOne quiet Monday in July 2004, at the height of the summer vacation season, a call center representative at a midsize U.S. financial institution answered a peculiar call.

The customer on the line was suspicious of an e-mail she had received from the bank.The e-mail contained a link to a website where the customer was asked to enter her debit card number, card expiration date, PIN and e-mail address. But the message was full of typos and grammatical errors, and it didn't seem quite right for the bank to request that information.

The call set off a confused chain reaction. The customer forwarded the e-mail to the call center representative, who forwarded it to the call center manager. The manager sent it to someone in the online banking department, who forwarded it to her upper management and to the corporate security department.

Questions1. Did the customer have the

right to be curious?

2. What may have caused this situation?

3. How might this situation have been avoided?

4. How should this situation be handled? Who should be involved?

Questions and Answers

Robbery Awareness and Procedures

Awareness 

• A financial institution is very seldom prey for a criminal until it has been thoroughly "cased."

• Carefully observe persons loitering in the building. You should be discreetly wary of suspicious-looking individuals who seek change or ask for information.

 • Note identification. Check on maintenance workers,

and be certain that they are what they represent themselves to be.

Bank Robbery Background  

• 80% of bank robberies involve a lone robber who holds up a lone teller.

• The robber may hand the teller a note and may or may not display a weapon.

• Take-over robberies have been increasing in the last few years and can be extremely dangerous.

• The Bank Protection Act

The Bank Robber  

•Career Criminals o Method of operation

•Opportunists o Motivating factors

Procedures 

1. Silent alarm installed

2. Activate the surveillance camera(s)

3. A note left behind can be of great value to law enforcement agencies

4. Be certain to include bait money in loot given to the robber.

5. Observe the robber as he leaves.

After the Robbery  

Once the robber is gone:1.Call the authorities..

2. Avoid touching evidence.

3. Take down names.

4. If possible, each witness should write down all details that they observed during the course of the robbery so that they are not forgotten.

Ten Mistakes Employees Make During a Bank Robbery: 

DO NOT: o Treat the hold up note as a joke or a prank o Create any surprises for the robber o Carry excess cash in your cash drawer o Offer to rob the the bank for the robber o Attempt to bring attention to the robbery

Ten Mistakes Employees Make During a Bank Robbery cont.: 

DO NOT:o Argue with the robber o Tell customers that you have just been robbed o Leave the bank after a robbery o Make sudden movements o Attempt to engage the robber(s) in a struggle

Activity 4.11. Which is more important?

What a robber is wearing or his height, weight, eye color, face shape?

2. If the robber has on a cast, an eye patch, a bandage, or something similar, what should you keep in mind?

3. How can the weather be a factor in identifying suspicious individuals?

4. When you see suspicious individuals in or around your bank, what should you do?

5. After a robber leaves the building, it is a good idea to immediately write down what you remember about his appearance, his actions, his voice. True? or False

Activity 4.1 Answers1. Immutable characteristics are most important for identification purpose

2. It may be a prop. It's possible the robber has put it on in order to draw your attention, hoping you will remember that characteristic and not recall appearance characteristics that he can't change. Once he/she leaves the bank, he/she immediately removes the cast, patch, bandage

3. If an individual has a bulky coat or a hooded sweatshirt on when the weather is not cold, something is up

4. Notify your bank security officer. Observe them. Make notes about what you see, including a description of the individual(s) and their vehicle. If appropriate, contact the authorities

5. True. Writing down your recollection immediately will help you focus on exactly what you saw and heard while it is fresh in your mind.

Activity 5.1

STEAL OF FORTUNE

Referenceshttp://www.csoonline.com/article/print/220628

www.moneyfactory.com/newmoney

http://www.bankersonline.com/tools/securitygame/answers_frontlinesecurity.html

http://www.cops.usdoj.gov/files/RIC/Publications/e03071267.pdf

http://www.bankersonline.com/articles/bhv12n12/bhv12n12a3.html

http://banking.about.com/od/securityandsafety/a/bankrobbery.htm

http://banking.about.com/od/securityandsafety/a/bankrobbery_2.htm

http://www.workplacetraumacenter.com/training.html

http://www.allbusiness.com/finance/391083-1.html

http://www.bankersonline.com/tools/bwgif_1.gif

http://www.sanantonio.gov/sapd/pdf/SuspectDescriptionA.pdf

http://www.fincen.gov/forms/files/fin104_ctr.pdf

http://www.activityvillage.co.uk/printable_play_money.htm

http://www.printablekidsplaymoneytemplates.com/

http://www.activityvillage.co.uk-keepingkidsbusy

http://www.buzzle.com/articles/icebreaker-games-for-small-groups.html

Activities

• http://www.newmoney.gov/newmoney/flash/interactivebill/5_InteractiveNote.html Podcast

•  

• http://www.classbraingames.com/2010/02/catch-a-counterfeit/ Catch a Counterfeit

•  

• http://www.bankersonline.com/security/security_games_0409b.html Memory Game

•  

• http://www.bankersonline.com/tools/securitygame/ Steal of Fortune