Responsible Use – How can these errors be avoided?

Responsible Use – How can these errors be avoided?
This scenario involves a bank and highlights the fact that security is following the right procedures and may not always be electronic in context.
A bank may have many communications between branches and corporate offices all of which are done through secure channels. But there are also many communications with customers. Most messages sent to customers are accessed only via login to a secure website. Many customers are not aware of security policies, and prefer to conduct business over the telephone by calling from a crowded location on a cell phone. In these situations the bank may inform the customer not to say out loud the ID or social security number needed for identification. The bank customer should really retire to a private area such as inside a car so that no one can overhear any part of the conversation, or see keypad entries over the shoulder. It is also not a good practice to leave paper documents in the open where a passing person can steal a quick glance.
Answer the following questions:
Question 1:
If the customer requests the bank to email information because that is the most convenient way for him/her to receive the information, should the bank comply with the request?
A. The bank should serve the customer and comply with the request.
B. The bank should use email but only use vague and bland terms that would mean nothing to another person.
C. The bank should not email but should complete the business on the telephone regardless of who else might be listening.
D. The bank may only communicate documents through secure upload and download from the website, or use US Mail in a secure way.

Question 2:
A customer might think that the bank’s security policies are designed to irritate the customer and deter the customer from communicating with the bank. Which of the following best represents the scope of the bank’s security policies?
A. The security policies protect both the bank and the customer.
B. The security policies are designed to cause delays and cover the bank’s slow response.
C. The security policies are designed to take power away from the customer.
D. Security policies are designed by people who have nothing better to do.

Sample Solution