{"id":503,"date":"2015-08-27T06:00:28","date_gmt":"2015-08-27T06:00:28","guid":{"rendered":"http:\/\/www.dogoodsoft.com\/blog\/?p=503"},"modified":"2024-12-23T08:04:08","modified_gmt":"2024-12-23T08:04:08","slug":"ncua-institutes-encryption-protocols-for-data-provided-to-examiners","status":"publish","type":"post","link":"https:\/\/www.dogoodsoft.com\/blog\/ncua-institutes-encryption-protocols-for-data-provided-to-examiners-503\/","title":{"rendered":"NCUA institutes encryption protocols for data provided to examiners"},"content":{"rendered":"<p><a href=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/08\/Snap14.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-504 size-large\" src=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/08\/Snap14-1024x512.jpg\" alt=\"NCUA institutes encryption protocols for data provided to examiners\" width=\"654\" height=\"327\" srcset=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/08\/Snap14-1024x512.jpg 1024w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/08\/Snap14-300x150.jpg 300w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/08\/Snap14-2x1.jpg 2w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/08\/Snap14.jpg 1029w\" sizes=\"auto, (max-width: 654px) 100vw, 654px\" \/><\/a><\/p>\n<p>NCUA has instituted data encryption protocols as suggested by its Office of Inspector General this June following review of an examiner\u2019s loss of a thumb drive containing credit union members\u2019 data.<\/p>\n<p>The protocols were communicated Aug. 21 in a letter from NCUA Examination and Insurance Director Larry Fazio to the chief executives of federally insured credit unions.<\/p>\n<p>The letter says the agency\u2019s examiners now will accept data files from credit unions only if the files are encrypted first by the credit union or, if the credit union is unable or does not wish to do that, via transfer to NCUA\u2019s encrypted equipment. In either case, parties involved will sign a \u201cchain of custody\u201d document. The letter, in a footnote, also advises credit unions against electronically transmitting unencrypted data to examiners.<\/p>\n<p>Encryption protocols outlined in the letter will remain in use until the agency acquires a secure file transfer solution that will allow credit unions and exam staff to \u201csecurely and efficiently\u201d exchange information, Fazio wrote. That solution is expected to be in place early next year.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>NCUA has instituted data encryption protocols as suggested by its Office of Inspector General this June following review of an examiner\u2019s loss of a thumb drive containing credit union members\u2019 data. The protocols were communicated Aug. 21 in a letter from NCUA Examination and Insurance Director Larry Fazio to the chief executives of federally insured &hellip; <a href=\"https:\/\/www.dogoodsoft.com\/blog\/ncua-institutes-encryption-protocols-for-data-provided-to-examiners-503\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">NCUA institutes encryption protocols for data provided to examiners<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[203,52,202],"class_list":["post-503","post","type-post","status-publish","format-standard","hentry","category-news","tag-data-encryption-protocols","tag-encryption","tag-ncua"],"_links":{"self":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/comments?post=503"}],"version-history":[{"count":1,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/503\/revisions"}],"predecessor-version":[{"id":505,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/503\/revisions\/505"}],"wp:attachment":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/media?parent=503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/categories?post=503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/tags?post=503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}