Skip to main content

NAR Economist Dr. Lawrence Yun to speak at CMPS Institute training in New York City

National Mortgage Professional
Jun 19, 2008

MBA white paper outlines key components for information security programs MortgagePress.comMBA, White Paper, MBA Residential Technology Steering Committee, RESTECH The Mortgage Bankers Association's (MBA) Residential Technology Steering Committee (RESTECH) has released a white paper that addresses basic security components which should be present in any financial services related information security program. The paper outlines common risks and mitigation approaches, specifically for small to mid-sized lenders, to help them secure sensitive and confidential customer information while adhering to an ever-increasing number of related statutes and regulations. "As industry information security continues to develop rapidly, MBA feels it is critical to define a minimum set of objectives that small and mid-sized organizations can meet in order to execute an effective information security program," said Robert E. Story Jr., CMB, MBA's vice chair and chairman of MBA's board of directors technology steering committee (BODTECH). "This concise and business-oriented approach will help organizations with limited resources achieve successful information security practices." As concern about protection of personal information escalates, and the statutory and regulatory compliance landscape becomes more complex, the demand on an organization's information security program also intensifies. At the same time, the number of threats and the difficulty of addressing them are increasing as well. While information security does not generate revenue, the costs associated with liability, reputation, and compliance failures obligate senior managers to pay attention. While most large corporations have the necessary fiscal and human resources to comply with the growing number of regulatory requirements, small and mid-sized organizations have fewer resources. This paper identifies eight major components of an information security program: • Acceptable Use Policy; • User Access Controls; • Physical Security; • Personnel Security; • Business Continuity Planning; • Compliance; • Third-party Provider Management; • Technology Security To obtain a copy of the MBA RESTECH white paper, click here.
Published
Jun 19, 2008
Rocket Launches Visa Signature Card

Rocket says its first-of-its kind credit card will help clients save on home purchases and homeowners pay off mortgages.

Guild Mortgage Acquires Cherry Creek Mortgage

Terms of purchase not disclosed; reverse mortgage volume added to Guild.

Mar 14, 2023
Vigilance, Dedication, And Commitment Forge Legends

Submit a nomination for Mortgage Banker Magazine’s Legends of Lending.

Mar 10, 2023
FTC Moves To Block Black Knight, ICE Merger

Says it 'would drive up costs, reduce innovation, and reduce lenders’ choices.'

Mar 09, 2023
Rocket Arms Brokers With Bully Shield Vs. UWM

Rocket covers penalties and court fees for brokers who want to get out of United Wholesale Mortgage’s ultimatum contract. 

Feb 06, 2023
Top Texas Originator Sees No Surrender To 2023

Big cities will determine the battle

Jan 26, 2023