Search
IT Security: E-mail Security Awareness (Individual)
This course is designed for all employees who use corporate e-mail. In this course, you will learn about how cyberthieves acquire personal and sensitive information through e-mail, and infect...
IT Security: Mobile Phone Security Awareness (Individual)
This course explores the threats to security on smartphones. Smartphones are fully functional computers as well as communication devices. As such, they are subject to the same types of IT security...
IT Security: Safe Web Browsing (Individual)
This course explores the threats to your security and privacy, and threats to your organization. Learn how to mitigate these threats with software settings and updates, as well as best practices...
Managing a Remote Workforce (Individual)
In times of crisis, employees are sometimes required to work from home. The transition from the traditional workplace to a remote environment is not easy. This course explores the challenges of...
IT Security: Phishing Awareness (Individual)
Cyberthieves use victims’ personal information to steal their money and identities. They attack victims’ computers and other devices with malware attacks. Learn what phishing is, the various ways...
IT Security: Ransomware (Individual)
This course explores what ransomware is, how cyberthieves attack systems with ransomware, what IT Departments and employees can do to reduce the likelihood of ransomware attacks, and what IT...
IT Security: Work Off-Site (Individual)
This course examines the IT security risks associated with remote work. Learn to keep your computer, devices and home network secure, use public networks safely, and recognize phishing and targeted...
Let’s Talk About Racism (Individual)
On May 25, 2020 George Floyd, an unarmed black man, died while a police officer kneeled on his neck for almost nine minutes. That cruel death ignited outrage around the world and unleashed...
Negotiating Skills for the Professional (Individual)
This course has techniques for identifying customer expectations and determining how to meet them in a way that both parties are satisfied by the results. There are checklists and discussion...
Payments 101: Part 2 - ACH & Wire Transfers (Individual)
In the United States there are many ways we pay our bills and each other. The Automated Clearing House (ACH) is generally seen as a consumer product but is used by companies as well. Wire transfers...
Military Lending Act (Individual)
The Military Lending Act was originally enacted in 2006 and is implemented by the Department of Defense. It protects active-duty members of the military, their spouses, and dependents from certain...
Payments 101: Part 1 - Checks and Cards (Individual)
Two of the oldest forms of payments are checks and debit and credit cards. While check use is decreased and physical checks have not changed dramatically, processing them has. Cards have had a...
Phishing and Ransomware (Individual)
Phishing & Ransomware are general terms for any attempt to collect personal, financial and sensitive information. The information is then used to access the targeted individual's accounts and can...
Physical Information Security (Individual)
Successful security programs combine general security and loss prevention techniques that are designed for daily operations with targeted techniques that are designed to prevent losses from...
Regulation CC: Funds Availability Act - In Depth (Individual)
Regulation CC, also known as the Expedited Funds Availability Act, establishes the basic rights, liabilities, and responsibilities financial institutes have regarding the availability of deposited...
Principles of Banking Overview (Individual)
The banking industry can be quite complex. It is important bankers understand the industry as a whole. This course will provide an overview of the banking industry. It will discuss how a bank is...
Product Knowledge and Cross-Selling (Individual)
As a frontline employee, you are often called upon to open a new account. In this situation, you need an excellent understanding of your bank's products and services. You have to be able to answer...
Regulation B: Equal Credit Opportunity Act - Overview (Individual)
The Equal Credit Opportunity Act (ECOA), enacted through Regulation B, prohibits discrimination in credit transactions. The law is designed to protect applicants from unfair or discriminatory...
Regulation DD: Truth in Savings - Overview (Individual)
The primary purpose of the Truth-in-Savings Act is to give consumers enough information to make an informed decision about deposit accounts they want to open at the bank via standardized...
Regulation E: Liability and Error Resolution (Individual)
Regulation E provides basic protections for a consumer when using an electronic fund transfer service that the bank offers. Liability and error resolution are essential to the consumer protections...
Regulation CC: Funds Availability Act - Overview (Individual)
Regulation CC, also known as the Expedited Funds Availability Act, establishes the basic rights, liabilities, and responsibilities financial institutes have regarding the availability of deposited...
Regulation DD: Truth in Savings - In Depth (Individual)
The primary purpose of the Truth-in-Savings Act is to give consumers enough information to make an informed decision about deposit accounts they want to open at the bank via standardized...
Regulation P: Consumer Privacy – Overview (Individual)
The Gramm-Leach Bliley Act (GLBA), is implemented by Regulation P: Privacy of Consumer Financial Information. The GLBA limits when and how an bank may disclose nonpublic personal information about...
Regulation E: Overview (Individual)
The Electronic Fund Transfer Act of 1978, implemented by Regulation E, is a consumer protection act that establishes the rights, liabilities, protections, and responsibilities of consumers who...
Regulation O: Insider Lending - Overview (Individual)
Regulation O governs extensions of credit made by a bank to an executive officer, director, or principal shareholder. It also applies to extensions of credit made by a bank to a political or...
Regulation P: Consumer Privacy – In Depth (Individual)
The Gramm-Leach Bliley Act (GLBA), is implemented by Regulation P: Privacy of Consumer Financial Information. The GLBA limits when and how a bank may disclose nonpublic personal information about a...
Regulation Z: Open-End Credit (Real Estate) (Individual)
Regulation Z or the Truth in Lending Act, encompasses several laws or acts and has been amended over the years. The regulation requires creditors to disclose the terms and cost of consumer credit...
Regulation Z: Closed-end Credit (Real Estate) (Individual)
Regulation Z or the Truth in Lending Act, encompasses several laws or acts and has been amended over the years. The regulation requires bank to disclose the terms and cost of consumer credit...
Regulatory Accounting and Operational Auditing (Individual)
Regulatory accounting and operational auditing are integral elements of the role of the internal auditor. In this module, we will introduce you to these concepts by discussing bank financial...
Regulation Z: Overview (Individual)
Regulation Z requires creditors to disclose the terms and cost of consumer credit transactions along with a host of other things. This course will provide an overview of each of the subparts within...
RESPA: Kickbacks and Affiliated Business Arrangements (Individual)
The Real Estate Settlement Procedures Act section 1024.14 & 1024.15, also known as “Section 8” prohibits certain payments and business arrangement. Section 1024.14 prohibits the paying or receiving...
Right to Financial Privacy (Individual)
The Right to Financial Privacy Act of 1978 provides customers of financial institutions with a reasonable amount of privacy for their financial records from the federal government. The Act includes...
Small Business Lending Rule (1071): Practical Application (Individual)
The Small Business Lending Rule (aka 1071) requires financial institutions collect and report to the CFPB certain data regarding applications for credit for women-owned, minority-owned, and small...
Supply Chain Cybersecurity (Individual)
In recent years, supply chains have become more efficient by automating many of the tasks and processes that were previously performed manually. The more that companies’ processes are automated and...
Robbery Response Techniques for All Personnel (Individual)
All bank personnel are just as responsible for maintaining the institution's Security Program as is the Security Officer and the role is a simple, but critical, one. This course discusses options –...
SAFE Act Training for MLOs (Individual)
The Secure and Fair Enforcement for Mortgage Licensing Act (SAFE Act) mandates a nationwide licensing and registration system for residential mortgage loan originators as well as the development of...
Security: An Orientation (Individual)
An effective security program is an excellent tool for protecting the institution's work product, physical assets, intellectual assets, and personnel. This course will introduce key concepts in...
Servicemembers Civil Relief Act (Individual)
The Servicemember Civil Relief Act (SCRA) provides relief provisions for both consumer and business credit that was extended to servicemembers prior to going on active duty. The protections include...
Small Business Lending Rule (1071): In-Depth (Individual)
The Small Business Lending Rule (aka 1071) requires financial institutions collect and report to the CFPB certain data regarding applications for credit for women-owned, minority-owned, and small...
Social Engineering Awareness (Individual)
This course explores what social engineering is, the types of social engineering attacks criminals use and the techniques they use to manipulate people into performing actions that either...
Teller Basics (Individual)
Banking is a people-oriented service industry. As in other service industries, customers expect quick, efficient, courteous service. However, in banking, expectations are heightened. Customers need...
Synthetic Identity Fraud (Individual)
This course explores how fraudsters create synthetic identities and use them to get credit cards and other forms of credit. Learn how synthetic identities are created, how fraudsters use them to...
Unconscious Bias (Individual)
Unconscious bias (or implicit bias) refers to unsupported social judgements or prejudice in favor or against a person or group of people. Since these happen without reasonable justification, they...
Understanding Endorsements (Individual)
An endorsement is a signature on the back of a check assigning interest to another party. The person who has endorsed the check has, by signing the back of the check, approved of the other party's...
UDAAP: Overview (Individual)
Unfair, deceptive, or abusive acts and practices (UDAAP) can cause significant financial injury to consumers, erode consumer confidence, and undermine the financial marketplace. Federal Regulations...
Working from Home Effectively (Individual)
COVID-19 is changing the way we live and work. Suddenly, many of us are working from home and trying to do it effectively amid the chaos of self-isolation, quarantines, school closures, and...
ThinkTECH Thursday – Connect MP4
Join us for this fast, fun, informative session to explore fintech solutions for community banks like yours. Each Accelerator selection process we connect with several fintech companies that have...
Workstation Security Essentials for Bank Employees (Individual)
The damage and impact from a data breach is more than the loss of the confidential information, it can also affect the bank's reputation and customer confidence. Workstation security is about much...
Bank Policies and Procedures: ADA General Accessibility Accommodations Policy (PLM-328)
Describes the bank’s intention to ensure that its services are accessible and accommodating to individuals with disabilities. Includes a policy statement; roles and responsibilities of bank board,...
Bank Policies and Procedures: ADA Website Accessibility Accommodations Policy (PLM-327)
Addresses the need of the bank’s website to provide equal treatment to all its customers and the public under Title II of the ADA, the Rehabilitations Act of 1973, and Department of Justice (DOJ)...
Bank Policies and Procedures: Bank Protection Act Policy (PLM-214)
Provides the requirements of the regulatory agencies and covers all aspects of bank security, including designation of a security officer, security devices, maintenance, testing, training, and...
Bank Policies and Procedures: Automated Clearing House (PLM-231)
Crafted specifically for community financial institutions, the ACH Policy offers a comprehensive solution for establishing a robust framework governing Automated Clearing House (ACH) transactions....
Bank Policies and Procedures: Branch Closing (PLM-092)
Sets forth the procedures required by the regulatory agencies to close a branch office, including profit analysis and availability of services.
Bank Policies and Procedures: Business Continuity Management Policy
Designed to provide a risk management plan to avoid potential losses. Includes policy implementation, bank security, emergency procedures, back-up sites, loss prevention, liquidity, insurance...
Bank Policies and Procedures: Bank Secrecy/AntiMoney Laundering (PLC-109)
Provides procedures as required by the regulatory agencies. Includes information on exempt persons, internal records, currency transaction reports, Office of Foreign Assets Control, Customer...
Bank Policies and Procedures: Board of Directors (PLM-100)
Designed to assist the board in recognizing and carrying out its duties and responsibilities for overall direction of the bank. Includes planning and budgeting, monitoring operations, overseeing...
Bank Policies and Procedures: Business and Travel Expenses (PLM-089)
Defines the general types of expenses the bank will incur; establishes the budgeting and operational procedures needed to implement the policy; and provides policy guidelines for travel and...
Bank Policies and Procedures: CAN SPAM Policy (PLM-338)
Outlines the specific procedures when initiating electronic mail messages to any recipient with the primary purpose of communicating a commercial message, primarily emails whose purpose is to...
Bank Policies and Procedures: Capital, Earnings, and Dividend (PLM-102)
Provides a clear outline of the bank's goals and parameters for maintaining an adequate capital base, and states how the payment of dividends relates to those goals and parameters.
Bank Policies and Procedures: Charitable Contributions (PLM-086)
Establishes the types of contributions the bank will grant and sets forth the budgeting and operational procedures needed to implement the policy.
