Security Procedures
Articles
- Access to Capital City Bank Facilities by Third Parties Overview Physical access to bank facilities is tightly controlled and managed by ...
- After Hours Call List Procedure To edit the after-hours call list in SecureStat, do the following: Log into Secur...
- Alarm Instructions for After Hours Calls Overview Associates on the After Hours Call list located in SecureStat receive c...
- Data Classification The purpose of this classification scheme is to establish a framework for classif...
- Office Opening and Closing Procedures Overview Office opening and closing procedures are designed to provide the highes...
- Office Closure - Other than Normal Schedule Overview Effective management of emergency situations is critical. Capital City B...
- Security Equipment Testing Procedures Overview All security equipment in an office is required to be tested in each cal...
- Threatening Client - CARE Guidelines Overview CARE is a set of guidelines to follow when you are dealing with a threat...
- Crime Stoppers and Crime Solvers Procedures Overview Capital City Bank (CCB) services the checking accounts for both Big Bend...
- Alarm Instructions for Business Partners The Alarm Process When entering any Capital City Bank office after hours, on holi...
- GLBA ID and Information Release Procedures Overview The Gramm-Leach-Bliley Act (GLBA) protects against the misuse of private...
- Vendor Management Procedures Overview Capital City Bank (CCB) builds strong relationships with third-party ven...
- Secure Online Transfer Associate Procedures Introduction Secure Online Transfer is an online file sharing service which allow...
- Building Card Access Procedures Overview Physical security access controls are 1 of the foundations of the Securi...
- March System Procedures Overview Capital City Bank’s video surveillance software is provided by March Net...
- Video Release Procedures In order to ensure consistency and reduce possible liability for improper disclos...