{"id":1666,"date":"2006-07-11T00:00:00","date_gmt":"2006-07-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/07\/11\/fdic-proposes-new-risk-based-insurance-assessment-system\/"},"modified":"2021-12-30T11:39:46","modified_gmt":"2021-12-30T11:39:46","slug":"fdic-proposes-new-risk-based-insurance-assessment-system","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/07\/11\/fdic-proposes-new-risk-based-insurance-assessment-system\/","title":{"rendered":"FDIC Proposes New Risk-Based Insurance Assessment System"},"content":{"rendered":"<p>The FDIC&#8217;s Board of Directors today approved for public comment two proposed rules governing deposit insurance assessments under the Federal Deposit Insurance Reform Act of 2005.  One proposal would create a new system that would more closely tie what banks pay for deposit insurance to the risks they pose.  It also would adopt a new base schedule of rates that the FDIC Board could adjust up or down, depending upon the revenue needs of the insurance fund. The second proposal issued today would continue to set the designated reserve ratio (DRR) for the fund at 1.25 percent of estimated insured deposits.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;We hope that most FDIC-insured institutions will find our proposals reasonable and fair, and we look forward to receiving comments.&#8221;<\/p>\n<p>Comments on the proposed rules are due within 60 days of publication in the Federal Register, which is expected to occur within a week.<\/p>\n<p>In a related action, the FDIC Board also issued for comment a proposed new official sign for institutions to display at teller stations and elsewhere.<\/p>\n<p>http:\/\/www.bankinfosecurity.com\/regulations.php?reg_id=274&#038;PHPSESSID=cfb4ec9e2060b1a75aa318ad04007258<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1666","post","type-post","status-publish","format-standard","hentry","category-regulations"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1666","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1666"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1666\/revisions"}],"predecessor-version":[{"id":4153,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1666\/revisions\/4153"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1666"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1666"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}