Computer Security

Submitted by: Submitted by

Views: 314

Words: 1175

Pages: 5

Category: Science and Technology

Date Submitted: 08/28/2012 12:19 PM

Report This Essay

Security Policies Assignment

xxxxxxxxxxxxxxx

CMG/T441

June 18, 2012

xxxxxxxxxxxxx

Security Policies Assignment

McBride Financial Services is a one stop mortgage provider servicing 5 locations across the country. McBride’s target market is mainly upscale demographically. As part of the services that the company provides besides the mortgages they do also provide credit reports for already approved customers, home inspections, appraisals and finally mortgages at the lowest available rates. McBride’s targeted customers had been more professionals purchasing either a secondary residence, retirees purchasing both a primary or secondary residence and finally families or individuals that are purchasing recreational properties.

In order to maximize productivity and the ability to handle high demands in applications for new mortgage loans etc, McBride Financial Services have an online process used by potential customers to submit an application for mortgage loans. Many and all competitors are utilizing this means to expedite their processes and make customer experience better, but as this market type is growing at a fast pace, there are also security concerns evolving as a really high level concern. As the market is normally aware of changes in personal information as well as financial records there is a high level need for security. Securing information is often extremely important and essential to performance and durability of the McBride Financial services. Because of security measures that need to be enforced to maintain a stable and risk free environment, the firm need to implement new security policies especially for the loan department to govern their ways of operations that is dealing with potential customers as well as established customers. The new security policy for the loan department will include the following critical areas below.

* Data backup

* Physical Security

* Accounts Access Control

* Training of Employees...