Compare hotel prices and find the best deal - www.hotelscombined.com

Sunday, January 23, 2011

E-BANKING SUPPORT SERVICES


In addition to traditional banking products and services, financial institutions can provide a variety of services that have been designed or adapted to support e-commerce. Management should understand these services and the risks they pose to the institution. This section discusses some of the most common support services: weblinking, account aggregation, electronic authentication, website hosting, payments for e-commerce, and wireless banking activities.
WEBLINKING
A large number of financial institutions maintain sites on the World Wide Web. Some websites are strictly informational, while others also offer customers the ability to perform financial transactions, such as paying bills or transferring funds between accounts.
Virtually every website contains “weblinks.” A weblink is a word, phrase, or image on a webpage that contains coding that will transport the viewer to a different part of the website or a completely different website by just clicking the mouse. While weblinks are a convenient and accepted tool in website design, their use can present certain risks. Generally, the primary risk posed by weblinking is that viewers can become confused about whose website they are viewing and who is responsible for the information, products, and services available through that website. There are a variety of risk management techniques institutions should consider using to mitigate these risks. These risk management techniques are for those institutions that develop and maintain their own websites, as well as institutions that use third-party service providers for this function. The agencies have issued guidance on weblinking that provides details on risks and risk management techniques financial institutions should consider.(1)
ACCOUNT AGGREGATION
Account aggregation is a service that gathers information from many websites, presents that information to the customer in a consolidated format, and, in some cases, may allow the customer to initiate activity on the aggregated accounts. The information gathered or aggregated can range from publicly available information to personal account information (e.g., credit card, brokerage, and banking data). Aggregation services can improve customer convenience by avoiding multiple log-ins and providing access to tools that help customers analyze and manage their various account portfolios. Some aggregators use the customer-provided user IDs and passwords to sign in as the customer. Once the customer’s account is accessed, the aggregator copies the personal account information from the website for representation on the aggregator’s site (i.e., “screen scraping”). Other aggregators use direct data-feed arrangements with website operators or other firms to obtain the customer’s information. Generally, direct data feeds are thought to provide greater legal protection to the aggregator than does screen scraping.
Financial institutions are involved in account aggregation both as aggregators and as aggregation targets. Risk management issues examiners should consider when reviewing aggregation services include:
Bullet
Protection of customer passwords and user IDs – both those used to access the institution’s aggregation services and those the aggregator uses to retrieve customer information from aggregated third parties – to assure the confidentiality of customer information and to prevent unauthorized activity,
Bullet
Disclosure of potential customer liability if customers share their authentication information (i.e., IDs and passwords) with third parties, and
Bullet
Assurance of the accuracy and completeness of information retrieved from the aggregated parties’ sites, including required disclosures
Additional information regarding management of risks in aggregation services can be found in appendix D.
ELECTRONIC AUTHENTICATION 
Verifying the identities of customers and authorizing e-banking activities are integral parts of e-banking financial services. Since traditional paper-based and in-person identity authentication methods reduce the speed and efficiency of electronic transactions, financial institutions have adopted alternative authentication methods, including:
Bullet
Passwords and personal identification numbers (PINs),
Bullet
Digital certificates using a public key infrastructure (PKI),
Bullet
Microchip-based devices such as smart cards or other types of tokens,
Bullet
Database comparisons (e.g., fraud-screening applications), and
Bullet
Biometric identifiers.

The authentication methods listed above vary in the level of security and reliability they provide and in the cost and complexity of their underlying infrastructures. As such, the choice of which technique(s) to use should be commensurate with the risks in the products and services for which they control access.(2) Additional information on customer authentication techniques can be found in this booklet under the heading “Authenticating E-Banking Customers.”
The Electronic Signatures in Global and National Commerce (E-Sign) Act establishes some uniform federal rules concerning the legal status of electronic signatures and records in commercial and consumer transactions so as to provide more legal certainty and promote the growth of electronic commerce.(3) The development of secure digital signatures continues to evolve with some financial institutions either acting as the certification authority for digital signatures or providing repository services for digital certificates.(4)
WEBSITE HOSTING
Some financial institutions host websites for both themselves as well as for other businesses. Financial institutions that host a business customer’s website usually store, or arrange for the storage of, the electronic files that make up the website. These files are stored on one or more servers that may be located on the hosting financial institution’s premises. Website hosting services require strong skills in networking, security, and programming. The technology and software change rapidly. Institutions developing websites should monitor the need to adopt new interoperability standards and protocols such as Extensible Mark-Up Language (XML) to facilitate data exchange among the diverse population of Internet users.
Risk issues examiners should consider when reviewing website hosting services include damage to reputation, loss of customers, or potential liability resulting from:
Bullet
Downtime (i.e., times when website is not available) or inability to meet service levels specified in the contract,
Bullet
Inaccurate website content (e.g., products, pricing) resulting from actions of the institution’s staff or unauthorized changes by third parties (e.g., hackers),
Bullet
Unauthorized disclosure of confidential information stemming from security breaches, and
Bullet
Damage to computer systems of website visitors due to malicious code (e.g., virus, worm, active content) spread through institution-hosted sites.
PAYMENTS FOR E-COMMERCE
Many businesses accept various forms of electronic payments for their products and services. Financial institutions play an important role in electronic payment systems by creating and distributing a variety of electronic payment instruments, accepting a similar variety of instruments, processing those payments, and participating in clearing and settlement systems. However, increasingly, financial institutions are competing with third parties to provide support services for e-commerce payment systems. Among the electronic payments mechanisms that financial institutions provide for e-commerce are automated clearing house (ACH) debits and credits through the Internet, electronic bill payment and presentment, electronic checks, e-mail money, and electronic credit card payments. Additional information on payments systems can be found in other sections of the IT Handbook.
Most financial institutions permit intrabank transfers between a customer’s accounts as part of their basic transactional e-banking services. However, third-party transfers – with their heightened risk for fraud – often require additional security safeguards in the form of additional authentication and payment confirmation.

Bill Payment and Presentment
Bill payment services permit customers to electronically instruct their financial institution to transfer funds to a business’s account at some future specified date. Customers can make payments on a one-time or recurring basis, with fees typically assessed as a “per item” or monthly charge. In response to the customer’s electronic payment instructions, the financial institution (or its bill payment provider) generates an electronic transaction – usually an automated clearinghouse (ACH) credit – or mails a paper check to the business on the customer’s behalf. To allow for the possibility of a paper-based transfer, financial institutions typically advise customers to make payments effective 3–7 days before the bill’s due date.
Internet-based cash management is the commercial version of retail bill payment. Business customers use the system to initiate third-party payments or to transfer money between company accounts. Cash management services also include minimum balance maintenance, recurring transfers between accounts and on-line account reconciliation. Businesses typically require stronger controls, including the ability to administer security and transaction controls among several users within the business.
This booklet discusses the front-end controls related to the initiation, storage, and transmission of bill payment transactions prior to their entry into the industry’s retail payment systems (e.g., ACH, check processing, etc.). The IT Handbook’s “Retail Payments Systems Booklet” provides additional information regarding the various electronic transactions that comprise the back end for bill payment processing. The extent of front-end operating controls directly under the financial institution’s control varies with the system configuration. Some examples of typical configurations are listed below in order of increasing complexity, along with potential control considerations.
Bullet
Financial institutions that do not provide bill payment services, but may direct customers to select from several unaffiliated bill payment providers.
dash
Caution customers regarding security and privacy issues through the use of on-line disclosures or, more conservatively, e-banking agreements.
Bullet
Financial institutions that rely on a third-party bill payment provider including Internet banking providers that subcontract to third parties.
dash
Set dollar and volume thresholds and review bill payment transactions for suspicious activity.
dash
Gain independent audit assurance over the bill payment provider’s processing controls.
dash
Restrict employees’ administrative access to ensure that the internal controls limiting their capabilities to originate, modify, or delete bill payment transactions are at least as strong as those applicable to the underlying retail payment system ultimately transmitting the transaction.
dash
Restrict by vendor contract and identify the use of any subcontractors associated with the bill payment application to ensure adequate oversight of underlying bill payment system performance and availability.
dash
Evaluate the adequacy of authentication methods given the higher risk associated with funds transfer capabilities rather than with basic account access.
dash
Consider the additional guidance contained in the IT Handbook’s “Information Security,” “Retail Payment Systems,” and “Outsourcing Technology Services” booklets.
Bullet
Financial institutions that use third-party software to host a bill payment application internally.
dash
Determine the extent of any independent assessments or certification of the security of application source code.
dash
Ensure software is adequately tested prior to installation on the live system.
dash
Ensure vendor access for software maintenance is controlled and monitored.
Bullet
Financial institutions that develop, maintain, and host their own bill payment system.
dash
Consider additional guidance in the IT Handbook’s “Development and Acquisition Booklet.”
Financial institutions can offer bill payment as a stand-alone service or in combination with bill presentment. Bill presentment arrangements permit a business to submit a customer’s bill in electronic form to the customer’s financial institution. Customers can view their bills by clicking on links on their account’s e-banking screen or menu. After viewing a bill, the customer can initiate bill payment instructions or elect to pay the bill through a different payment channel.
In addition, some businesses have begun offering electronic bill presentment directly from their own websites rather than through links on the e-banking screens of a financial institution. Under such arrangements, customers can log on to the business’s website to view their periodic bills. Then, if so desired, they can electronically authorize the business to “take” the payment from their account. The payment then occurs as an ACH debit originated by the business’s financial institution as compared to the ACH credit originated by the customer’s financial institution in the bill payment scenario described above. Institutions should ensure proper approval of businesses allowed to use ACH payment technology to initiate payments from customer accounts.
Cash management applications would include the same control considerations described above, but the institution should consider additional controls because of the higher risk associated with commercial transactions. The adequacy of authentication methods becomes a higher priority and requires greater assurance due to the larger average dollar size of transactions. Institutions should also establish additional controls to ensure binding agreements – consistent with any existing ACH or wire transfer agreements – exist with commercial customers. Additionally, cash management systems should provide adequate security administration capabilities to enable the business owners to restrict access rights and dollar limits associated with multiple-user access to their accounts.
Person-to-Person Payments
Electronic person-to-person payments, also known as e-mail money, permit consumers to send “money” to any person or business with an e-mail address. Under this scenario, a consumer electronically instructs the person-to-person payment service to transfer funds to another individual. The payment service then sends an e-mail notifying the individual that the funds are available and informs him or her of the methods available to access the funds including requesting a check, transferring the funds to an account at an insured financial institution, or retransmitting the funds to someone else. Person-to-person payments are typically funded by credit card charges or by an ACH transfer from the consumer’s account at a financial institution. Since neither the payee nor the payer in the transaction has to have an account with the payment service, such services may be offered by an insured financial institution, but are frequently offered by other businesses as well.
Some of the risk issues examiners should consider when reviewing bill payment, presentment, and e-mail money services include:
Bullet
Potential liability for late payments due to service disruptions,
Bullet
Liability for bill payment instructions originating from someone other than the deposit account holder,
Bullet
Losses from person-to-person payments funded by transfers from credit cards or deposit accounts over which the payee does not have signature authority,
Bullet
Losses from employee misappropriation of funds held pending access instructions from the payer, and
Bullet
Potential liability directing payment availability information to the wrong e-mail or for releasing funds in response to e-mail from someone other than the intended payee.
WIRELESS E-BANKING
Wireless banking is a delivery channel that can extend the reach and enhance the convenience of Internet banking products and services. Wireless banking occurs when customers access a financial institution's network(s) using cellular phones, pagers, and personal digital assistants (or similar devices) through telecommunication companies’ wireless networks. Wireless banking services in the United States typically supplement a financial institution's e-banking products and services.
Wireless devices have limitations that increase the security risks of wireless-based transactions and that may adversely affect customer acceptance rates. Device limitations include reduced processing speeds, limited battery life, smaller screen sizes, different data entry formats, and limited capabilities to transfer stored records. These limitations combine to make the most recognized Internet language, Hypertext Markup Language (HTML), ineffective for delivering content to wireless devices. Wireless Markup Language (WML) has emerged as one of a few common language standards for developing wireless device content. Wireless Application Protocol (WAP) has emerged as a data transmission standard to deliver WML content.
Manufacturers of wireless devices are working to improve device usability and to take advantage of enhanced “third-generation” (3G) services. Device improvements are anticipated to include bigger screens, color displays, voice recognition applications, location identification technology (e.g., Federal Communications Commission (FCC) Enhanced 911), and increased battery capacity. These improvements are geared towards increasing customer acceptance and usage. Increased communication speeds and improvements in devices during the next few years should lead to continued increases in wireless subscriptions.
As institutions begin to offer wireless banking services to customers, they should consider the risks and necessary risk management controls to address security, authentication, and compliance issues. Some of the unique risk factors associated with wireless banking that may increase a financial institution's strategic, transaction, reputation, and compliance risks are discussed in appendix E.
(1):
See the interagency guidance titled “Weblinking: Identifying Risks and Risk Management Techniques” issued April 23, 2003 by the Federal Deposit Insurance Corporation (FDIC), National Credit Union Administration (NCUA), Office of the Comptroller of the Currency (OCC), and Office of Thrift Supervision (OTS) (the agencies) for specific risk and risk management guidance.
(2):
For example, section 326 of the USA PATRIOT Act (Pub. L. 107–56) requires financial institutions to implement reasonable procedures for (1) verifying the identity of any person seeking to open an account, to the extent reasonable and practicable; (2) maintaining records of the information used to verify the person’s identity, and (3) determining whether the person appears on any list of known or suspected terrorists or terrorist organizations. See 68 Federal Register 25090 (May 9, 2003); 12 CFR Part 21 (OCC); 12 CFR Parts 208 and 211 (Board); 12 CFR Part 326 (FDIC); 12 CFR Part 563 (OTS), and 12 CFR Part 748 (NCUA).
(3): 
Pub.L. No. 106–229. An electronic signature may be as simple as a person’s typed name or an image of a person’s handwritten signature.
(4): 
See OCC Bulletin 99–20: Certificate Authority Guidance (May 4, 1999).