Vendor Management. Federal Deposit Insurance Corporation Division of Risk Management Supervision Atlanta Regional Office.

Similar documents
How To Understand The Risks Of A Financial Institutin

In-House Counsel Day Priorities for Cloud Computing the benefits, potential risks and security for the future

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

TrustED Briefing Series:

GUIDANCE FOR BUSINESS ASSOCIATES

Personal Data Security Breach Management Policy

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

STANDARDISATION IN E-ARCHIVING

Outsourcing arrangements

MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER

HIPAA HITECH ACT Compliance, Review and Training Services

Appendix H. Annual Risk Assessment and Audit Plan 2013/14

To Receive CPE Credit

SecurityNational Mortgage Company Vendor Management Program

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released

VCU Payment Card Policy

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

Sources of Federal Government and Employee Information

Key Steps for Organizations in Responding to Privacy Breaches

Audit Committee Charter

Presentation: The Demise of SAS 70 - What s Next?

AHLA. C. Big Data, Cloud Computing and the New World Order for Health Care Privacy

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

Information Security Policy

Process of Setting up a New Merchant Account

Internal Audit Charter and operating standards

Information Security Incident Response Plan

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012

CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT

Electronic Signatures Laws

BYOD and Cloud Computing

RATIONALE TERMS OF REFERENCE FOR THE QUALITY COMMITTEE UNDER THE EXCELLENT CARE FOR ALL ACT. Authority

How To Ensure Your Health Care Is Safe

Data Protection Policy & Procedure

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT

Enterprise Security Management CIS 259

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply

TO: Chief Executive Officers of all National Banks, Department and Division Heads, and all Examining Personnel

What Information Is Collected and How Is It Collected?

Fraud Prevention Techniques for Higher Education

DALBAR Due Diligence: Trust, but Verify

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012

Newborn Blood Spot Failsafe Solution (NBSFS) Operational Level Agreements. Part B: Child Health Record Department (CHRD) Users

Chapter 7 Business Continuity and Risk Management

Legacy EMR Data Conversions

Template on written coordination and cooperation arrangements of the supervisory college established for the <XY> Group/<A> Institution

AUDIT AND RISK COMMITTEE TERMS OF REFERENCE

Quantifying CDM Audit Results

Process for Responding to Privacy Breaches

Preferred Broker Network

Plus500CY Ltd. Statement on Privacy and Cookie Policy

MANITOBA SECURITIES COMMISSION STRATEGIC PLAN

IN-HOUSE OR OUTSOURCED BILLING

Business Plan Overview

Network Security Trends in the Era of Cloud and Mobile Computing

Big Data Applications and Privacy Issues in Customer Service, Distribution Planning, and Rate Design

First Global Data Corp.

Supersedes: DPS Policy Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5

My AmeriCorps Release 3 AmeriCorps National Programs

Interagency Guidance on Privacy Laws and Reporting Financial Abuse of Older Adults

AmeriCorps State Commissions and Programs

BAMS Third Party Service Providers (TPSPs) FAQs

7 October Re: Themed Inspection into Third Party Personal Injury Claims. Dear

WASHINGTON STATE UNIVERSITY EXTENSION NEW EMPLOYEE CHECKLIST

Army DCIPS Employee Self-Report of Accomplishments Overview Revised July 2012

AHI. Foreign Pre-Approval Inspections (PAIs) Points to Consider

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS

CHARTER OF THE COMPENSATION COMMITTEE OF THE BOARD OF DIRECTORS OF UPLAND SOFTWARE, INC.

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service.

Guidelines for Outsourcing, Offshoring, and Cloud Services

Hampton Roads Orthopaedics & Sports Medicine. Notice of Privacy Practices

Creating an Ethical Culture and Protecting Your Bottom Line:

National Australia Bank Limited Group Disclosure & External Communications Policy

Internal Audit Revenue Cycle Risks

State of Wisconsin. File Server Service Service Offering Definition

Systems Support - Extended

Security Services. Service Description Version Effective Date: 07/01/2012. Purpose. Overview

Emergency Preparedness Plans. Page 1 of 19

UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C FORM WB-DEC

Oracle Cloud Enterprise Hosting and Delivery Policies

Introduction to FedRAMP Abel Sussman. June, 2015

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S

NAIC Replacement Requirements For Certain Life Insurance Policies And Annuity Contracts

Session 9 : Information Security and Risk

SaaS Listing CA Cloud Service Management

ITIL Service Offerings & Agreement (SOA) Certification Program - 5 Days

Cloud Computing November 09. Information Assurance Framework

ATTACHMENT U THIRD PARTY AUDITOR/CONSULTANT QUALIFICATION GUIDELINE

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

Professional Leaders/Specialists

Credit Report Reissue Recommendation TABLE OF CONTENTS

NHPCO Guidelines for Using CAHPS Hospice Survey Results

GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN

CMS Eligibility Requirements Checklist for MSSP ACO Participation

Transcription:

Vendr Management Federal Depsit Insurance Crpratin Divisin f Risk Management Supervisin Atlanta Reginal Office June 18, 2014 1

Agenda Intrductin Vendr Management Overview Regulatry Expectatins Bard and Management Respnsibilities Framewrk Guidelines Cntracts Business Cntinuity Plans 2

Cre Applicatin Item Prcessing IT Security Audit Fraud Analysis Website Management Card Prcessing Mrtgage Servicing Cmmn Outsurced Services 3

GLBA Oversee Service Prvider Arrangements. Each bank shall: 1. Exercise apprpriate due diligence in selecting its service prviders; 2. Require its service prviders by cntract t implement apprpriate measures designed t meet the bjectives f these Guidelines; and 3. Where indicated by the bank's risk assessment, mnitr its service prviders t cnfirm that they have satisfied their bligatins as required by paragraph D.2. As part f this mnitring, a bank shuld review audits, summaries f test results, r ther equivalent evaluatins f its service prviders. 4

Risk Cnsideratins Strategic Hw des this service prvider fit int institutin s gals and bjectives? Are the Directrs invlved in the prcess? Transactin/Operatins Service-level metrics Disaster recvery Security-related cntrls Credit Cash flw Subcntractrs 5

Reputatin Risk Cnsideratins (cnt.) Interactins nt cnsistent with Institutin plicies Vilatins f law and regulatins Security breaches disclsing sensitive infrmatin Cuntry Judicial prvidence Plitical cnsideratins Cmpliance Laws, regulatins Institutin s plicies Other Interest rate Price Legal Freign currency 6

Bard and Management Oversight Plicy Review and Apprval Key bard functin REVIEW, nt just Apprval Institute Repeatable Framewrk Invlve varius departments f institutin Cmpliance Legal Credit Operatins Assign business wner as spnsr f prgram Safeguard Sensitive Infrmatin Business Cntinuity Planning Reprting Annual reprt t Bard required by GLBA Significant vendrs identified 7

1. Institute Risk Assessments Risk Management Framewrk Include key persnnel and departments Assign and define risk ranges Identify time and diligence required at each categry 2. Identify, Quantify, and Reduce Risk Similar t yur enterprise risk assessment Cnsider qualitative analysis as well 3. Incrprate Reminder Capability Tickler 4. Prvide fr Onging Due Diligence 5. Keep It Simple and Intuitive Flwchart the prcess 8

Risk Management Framewrk (cnt.) 6. Use a Similar Prcess Fr All Vendrs Flexibility is key 7. Maintain Details f Current and Past Reviews Archival Histrical 8. Ensure Bard Reprting and Invlvement 9

Vendr Checklist Vendr Name and Service Nature f the Service Data Cmpany data (cnfidential) Custmer data (sensitive) Intangible prperty Usage Magnitude f Perfrmance Prblems Financial Reputatinal Operatinal Cntractual Details Date, term, and value f cntract 10

Vendr Checklist (cnt.) Interactin frequency with the third party Gegraphical (glbal) cnsideratins such as lcatin f third parties and number f physical lcatins (Business Cntinuity) Cmpliance with rules, regulatins, law, etc. ID primary relatinship wner within the rganizatin Annual spend Risk scring Audit reprts Right-t-audit clause 11

Cntracts (Fees and Csts) Legal Audit Examinatin Equipment Hardware Sftware Fee Calculatins Develpment Prgramming Cnversin Recurring Services Special Requests 12

Cntracts (Service Perfrmance Clause) Respnse Times System Availability Data Integrity Cre Reprt Availability Frequency Type Peripheral Reprts Cntrl/Audit Financial Security Business Cntinuity Quantity Frmat Archival 13

SOC Determinatin 1. Security 2. Availability 3. Prcessing Integrity 4. Cnfidentiality 5. Privacy f a System and Its Infrmatin 14

SOC Determinatin 15

Cntracts (NPPI) Nnpublic Persnally Identifiable Infrmatin data is any list, descriptin, r ther gruping f cnsumers (and publicly available infrmatin pertaining t them) derived using any persnally identifiable financial infrmatin that is nt publicly available. 16

Cntracts (Default and Terminatin Clause) Frce Majeure Mergers and Acquisitins Cnvenience Substantial Increase in Cst Repeated Failure t Meet Service Levels Failure t Prvide Critical Services Bankruptcy Inslvency 17

Cntracts (Ownership and License) Ownership Rights Surce Cde Access Intellectual Prperty Use f Institutin s Data Data Mining Marketing Use f Prcessing Hardware Use f Sftware Virtualizatin Operating System Applicatin Updates 18

Cntracts (Clud Cmputing) Three Mst Imprtant Cntract Cnsideratins Data Prtectin Data Security Jurisdictin Security Schedule Recmmendatins Institutin s data separated frm thers in Clud Restrictins n use f data Respnses t security breaches Use f security measures such as encryptin Access t Vulnerability and Penetratin tests Natural Cncerns Lss f cnfidentiality (unauthrized disclsure) Lss f integrity (crruptin) Lss f availability (deletin) End f Cntract Cncerns Access t data Deletin f data Applicatin Updates 19

Cntracts (Subcntracting) Primary Servicer Accuntable Must have visibility int subcntractrs. Define Services, Perfrmance Create metric table. Can be in frm f Dashbard. Peridically review perfrmance. Primary Servicer s Due Diligence Prcess Hw des the primary service prvider assess cntractrs? Apprval Prcess fr Change Institutin ntified? Institutin given chices? Freign Firms 20

Cntracts (Insurance) Wh is respnsible fr errrs r missins? What abut negligence? Will the service prvider cver any lsses f revenue? 21

BCP Vendr Checklist Ensure a disaster recvery and business cntinuity plan exists and is included in the cntract; Assess the adequacy and effectiveness f disaster recvery and business cntinuity plans and its alignment t yur wn plan; Dcument the rles and respnsibilities fr maintaining and testing the service prvider's business cntinuity and cntingency plans; Test the service prvider's business cntinuity and cntingency plans n a peridic basis; and, Maintain an exit strategy. 22

Custmer Ntice Standard fr Prviding Ntice Defining Custmer Infrmatin Affected Custmers Cntent f Custmer Ntice Delivery f Custmer Ntice 23

24

Thank Yu! Richard Snitzer IT Examinatin Specialist FDIC Atlanta Reginal Office 678.916.2224 rsnitzer@fdic.gov 25

Surces and References FFIEC Supplement t Authenticatin in an Internet Banking Envirnment (FIL-50-2011) FFIEC Retail Payment Systems Handbk (FIL-6-2010) Special Alert SA-147-2009: Fraudulent Electrnic Funds Transfers (August 2009) FFIEC Guidance n Risk Management f Remte Depsit Capture (FIL-4-2009) Identity Theft Red Flags, Address Discrepancies, and Change f Address Regulatins Examinatin Prcedures (FIL-105-2008) FFIEC Guidance: Authenticatin in an Internet Banking Envirnment (FIL-103-2005) 26

Surces and References (cnt.) Payment Prcessr Relatinships-Revised Guidance (FIL-3-2012) Guidance fr Managing Third-Party Risk (FIL-44-2008) FDIC Supervisry Insights Jurnal (Quarterly) Natinal Institute f Standards & Technlgy (NIST) Trade Assciatins (ABA, BITS) Part 364-B, FDIC Rules and Regulatins PCI Security Standards Cuncil US CERT 27

Surces and References (cnt.) Kitten, T. (2013, July 29). New Details n Glbal, Heartland Breaches. Http://www.bankinfsecurity.cm. Retrieved May 29, 2014. http://www.bankinfsecurity.cm/card-fraud-case-sheds-light-n-breachesa-5946. Vijayan, J. (2010, May 10). Heartland breach expenses pegged at $140M s far. Http://www.cmputerwrld.cm. Retrieved May 29, 2014. http://www.cmputerwrld.cm/s/article/9176507/heartland_breach_expens es_pegged_at_140m_s_far. Bradshaw, S., Millard, C., Walden, I. (2010, September 1). Cntracts fr Cluds: Cmparisn and Analysis f the Terms and Cnditins f Clud Cmputing Services. https://hq.ssrn.cm/. Retrieved May 28, 2014. http://papers.ssrn.cm/sl3/papers.cfm?abstract_id=1662374. 28