Skip Ribbon Commands
Skip to main content
S1-Post-Only

Responsive-thumbnail

Access control...

on customer information systems, including controls to authenticate and permit access only to authorized individuals and systems to prevent employees from providing customer information to unauthorized individuals who seek it through fraudulent means

Access restrictions...

at physical locations containing customer information.

Encryption...

of electronic customer information, including when in transit or in storage on systems where unauthorized individuals may have access.

Procedures...

to ensure that customer information system modifications are consistent with an organization's information security program.

Dual control procedures...

segregation of duties and employee background checks for employees with access to customer information.

Monitoring of systems...

and procedures to detect actual and attempted attacks on or intrusion into customer information systems.

Response programs...

for when an organization suspects or detects that unauthorized individuals have gained access to customer information systems.

Measures...

to protect customer information from destruction, loss or damage by environmental hazards or technological failure.

Training for staff...

to implement the security program.

Regular testing...

of the key controls, systems, and procedures of the security program.



 
image 
 
​127 South Peyton Street
Alexandria VA 22314
​phone: 800.221.7917
fax: 703.683.7556
email: info@iiaba.net

Follow Us!


​Empowering Trusted Choice®
Independent Insurance Agents.