Hi Group,
We had a report created by our IT department that captures each employees search activity within Symitar. This report is overwhelming and basically a data dump of information. It is limited in that it doesn’t necessarily report when an account actually has been accessed. We basically assume that since the search was performed, the employee accessed the member account. We refined this report further to report when employees have searched/”accessed” another employee’s account. The report details what employee accessed the account, the employee whose account was accessed, and if there was a transaction or FM involved, which we signify as a legitimate reason to access the account. My questions for you are the following:
- If anyone is looking at this type of information as well, what attributes are you looking at that would trigger a suspicion or a red flag to monitor this employee’s activity?
- Is anyone using artificial intelligence provided by a third party or the IT department to monitor this activity?
Thanks in advance,
Samantha
Bayport CU