{"id":347,"date":"2006-04-10T00:00:00","date_gmt":"2006-04-10T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/10\/fdic-delivery-of-special-alerts-electronic-distribution-to-become-primary-method\/"},"modified":"2021-12-30T11:37:05","modified_gmt":"2021-12-30T11:37:05","slug":"fdic-delivery-of-special-alerts-electronic-distribution-to-become-primary-method","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/10\/fdic-delivery-of-special-alerts-electronic-distribution-to-become-primary-method\/","title":{"rendered":"FDIC &#8211; Delivery of Special Alerts &#8211; Electronic Distribution to Become Primary Method"},"content":{"rendered":"<p>Beginning June 1, 2006, the Federal Deposit Insurance Corporation (FDIC) will change its primary method of distributing Special Alerts (SAs) to insured financial institutions from paper-copy delivery through the U.S. Postal Service to electronic delivery through the FDIC&#8217;s free secure Web site, FDICconnect.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>To guarantee that the SA notification e-mails are received, institutions should ensure that their network spam filters are set to accept all e-mails from fdic.gov.<\/p>\n<p>Institutions without Internet access may request to continue receiving SAs through the mail by completing the attached paper-delivery request form and faxing it to the FDIC at (703) 465-4314.  The FDIC also offers electronic distribution of SAs through its online subscription service.  Since this service is not secure, confidential SA attachments of fraudulent and genuine instruments are not included.<\/p>\n<p>To decrease the number of unnecessary e-mails, institution users of this on-line subscription service may wish to discontinue receiving SAs through this mechanism.<\/p>\n<p>http:\/\/www.bankinfosecurity.com\/regulations.php?reg_id=220&#038;PHPSESSID=0c468c65f2007d6227f7a3a2c3db0faf<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-347","post","type-post","status-publish","format-standard","hentry","category-financial"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/347","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=347"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/347\/revisions"}],"predecessor-version":[{"id":2834,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/347\/revisions\/2834"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=347"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}