Skip to main content

NAR Economist Dr. Lawrence Yun to speak at CMPS Institute training in New York City

National Mortgage Professional
Jun 20, 2008

MBA white paper outlines key components for information security programs MortgagePress.comMBA, White Paper, MBA Residential Technology Steering Committee, RESTECH The Mortgage Bankers Association's (MBA) Residential Technology Steering Committee (RESTECH) has released a white paper that addresses basic security components which should be present in any financial services related information security program. The paper outlines common risks and mitigation approaches, specifically for small to mid-sized lenders, to help them secure sensitive and confidential customer information while adhering to an ever-increasing number of related statutes and regulations. "As industry information security continues to develop rapidly, MBA feels it is critical to define a minimum set of objectives that small and mid-sized organizations can meet in order to execute an effective information security program," said Robert E. Story Jr., CMB, MBA's vice chair and chairman of MBA's board of directors technology steering committee (BODTECH). "This concise and business-oriented approach will help organizations with limited resources achieve successful information security practices." As concern about protection of personal information escalates, and the statutory and regulatory compliance landscape becomes more complex, the demand on an organization's information security program also intensifies. At the same time, the number of threats and the difficulty of addressing them are increasing as well. While information security does not generate revenue, the costs associated with liability, reputation, and compliance failures obligate senior managers to pay attention. While most large corporations have the necessary fiscal and human resources to comply with the growing number of regulatory requirements, small and mid-sized organizations have fewer resources. This paper identifies eight major components of an information security program: • Acceptable Use Policy; • User Access Controls; • Physical Security; • Personnel Security; • Business Continuity Planning; • Compliance; • Third-party Provider Management; • Technology Security To obtain a copy of the MBA RESTECH white paper, click here.
Published
Jun 20, 2008
Chinese Property Giant Evergrande Falters, Threatening U.S. Investors

On Monday, investors across three continents dumped their stocks, mainly out of fear that the world’s two largest governments — the United States and China — would undercut the beginnings of a global economic recovery. 

Industry News
Sep 22, 2021
Compass Mortgage Expands In Four Additional States

Compass Mortgage is now licensed in Virginia, Washington, North Carolina and South Carolina.

Industry News
Sep 22, 2021
Enact Holdings Completes IPO

Genworth Financial Inc. announced the completion of the initial public offering for its subsidiary Enact Holdings Inc.

Industry News
Sep 21, 2021
Offerpad Expands Into Kansas City, St. Louis

Tech-Enabled Platform For Real Estate Transactions Now In 20 Markets

Industry News
Sep 20, 2021
KBRA Assigns Preliminary Ratings To RCKT 2021-4

Includes 1,002 Residential Mortgages With An Aggregate Principal Balance Of $968.4M

Industry News
Sep 20, 2021
KBRA Assigns Preliminary Ratings To SEMT 2021-6

Pool Of 497 First-Lien Loans Combined Have A Principal Balance Of Nearly $449M

Industry News
Sep 16, 2021