Comptroller of the Currency Administrator of National Banks Electronic Banking: Industry Developments, Risks and OCC Regulatory Activities Prepared for.

Slides:



Advertisements
Similar presentations
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Advertisements

HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
1 The critical challenge facing banks and regulators under Basel II: improving risk management through implementation of Pillar 2 Simon Topping Hong Kong.
CEP Industry Research Hong Kong Financial Regulators Group 6.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
Consumer Authentication in e-Banking & Part 748 – Appendix B Response Program Catherine Yao Information Systems Officer NCUA.
The Islamic University of Gaza
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Demand for Audit and Other Assurance Services Chapter 1.
Security Controls – What Works
Information Security Policies and Standards
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Code of Conduct for Mobile Money Providers 6 November 2014 All material © GSMA The policy advocacy and regulatory work of the GSMA Mobile Money team.
Risk Management. Risk Categories Strategic Credit Market Liquidity Operational Compliance/legal/regulatory Reputation.
© 2012 McGladrey LLP. All Rights Reserved.© 2014 McGladrey LLP. All Rights Reserved. © 2012 McGladrey LLP. All Rights Reserved. © 2013 McGladrey LLP. All.
Division of Depositor and Consumer Protection Banker Teleconference Series Third-Party Compliance Risk Management Tuesday, June 5, 2012.
Guidance for Managing Third-Party Risk Chicago Region Regulatory Conference Call December 8, 2010.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Comptroller of the Currency Administrator of National Banks Wireless Banking April 1, 2003 Clifford A. Wilke Director of Bank Technology Office of the.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Chapter 7 Federal Regulations and Financial Institutions Related to the Mortgage Market © OnCourse Learning.
Vendor Risk: Effective Management is Essential
Privacy and Security Risks in Higher Education
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Securing Information Systems
U.S. Financial Regulations
Section 12-2-Regulatory Agencies and Laws.   These agencies make or enforce rules and regulations  Agencies provide oversight or supervision of activities.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
State Bank of Pakistan Various Departments
OECD Guidelines on Insurer Governance
Outsourcing Louis P. Piergeti VP, IIROC March 29, 2011.
HIPAA PRIVACY AND SECURITY AWARENESS.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
OVERVIEW OF INFORMATION SYSTEM (IS) AUDITING NORHAFIZAH BINTI ABDUL MUDALIP YAP YONG TECK TAN YUAN JUE TAY QIU JIE GROUP MEMBER:
September 14, David A. Reed Attorney at Law Reed & Jolly, PLLC (703)
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Looking beyond the obvious!! HOW SECURE IS BANKS’ CORE DATA? Prashant Pande Head Professional Services IDBI Intech Ltd.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Supervision of Information Security and Technology Risk Barbara Yelcich, Federal Reserve Bank of New York Presentation to the World Bank September 10,
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved Chapter Four Establishing New Banks, Branches, ATMs, Telephone Services, and Web.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
MANAGING THIRD-PARTY RISK New York Region Regulatory Conference Call March 3, 2011.
May 14, 2014 Presented by Ken Shim. Background April CFPB issued Bulletin Federal Reserve, OCC and FDIC issued similar guidance on vendor.
ANTI-MONEY LAUNDERING COMPLIANCE PROGRAM FCM TRAINING
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Chapter 8 Auditing in an E-commerce Environment
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Cyber Risk Management Solutions Fall 2015 Thomas Compliance Associates, Inc
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Management of Operational Risk. Regulatory Capital Perspective Credit Risk – Basel I (1987) Market Risk – (Amendment 1998) Credit Risk – Basel II (2005)
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Wire Fraud Prevention Training: Setting Your Organizational Structure to Mitigate Fraud Risk and Comply with Regulatory Expectations Presented by: Terri.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Law Firm Data Security: What In-house Counsel Need to Know
The Demand for Audit and Other Assurance Services
Protection of CONSUMER information
Red Flags Rule An Introduction County College of Morris
Current Privacy Issues That May Affect Your Credit Union
John Carlson Senior Director, BITS
Presentation transcript:

Comptroller of the Currency Administrator of National Banks Electronic Banking: Industry Developments, Risks and OCC Regulatory Activities Prepared for ABA USBanking 2002 by the Bank Technology Division of the Office of the Comptroller of the Currency January 2002 The OCC is an independent bureau of the Department of Treasury and is the federal regulator of approximately 2,200 national banks.

Comptroller of the Currency Administrator of National Banks Technology Developments  Advances in communications provide networked global access to information and delivery of products/services  Internet has reached critical mass (60% of U.S. households)  Some banks have 25 percent of customers banking online  Increased competition from other industries and abroad  Greater reliance on third party providers  Advances in technology make the component functions of banking more easily divisible

Growth in Number of National Banks that Have Transactional Websites Source: Office of the Comptroller of the Currency. “Transactional web sites” are defined as bank web sites that allow customers to transact business. This may include accessing accounts, transferring funds, applying for a loan, establishing an account, or performing more advanced activities.

Comptroller of the Currency Administrator of National Banks Technology-based Banking Products & Services  Balance inquiry  Transaction information  Funds transfer  Cash Management  Bill payment  Bill presentment  Loan applications  Stored Value  Aggregation  Electronic Finder  Automated clearinghouse (ACH) transactions  Internet Payments  Wireless Banking  Certification Authority  Data Storage

Comptroller of the Currency Administrator of National Banks  Vendor Risk Issues  Security, Data Integrity, and Confidentiality  Authentication, Identity Verification, and Authorization  Strategic and Business Risks  Business Continuity Planning  Permissibility, Compliance, Legal Issues, and Computer Crimes  Cross Border and International Banking Key Technology Risks

Comptroller of the Currency Administrator of National Banks Outsourcing Trends  TowerGroup estimates banks outsource over 85% of their information technology  Rapid pace straining ability to oversee third parties  Consolidation of tech. companies and core processors  Weak or negative earnings of new tech providers  Banks are postponing new technology investments, but still investing in proven technologies

Comptroller of the Currency Administrator of National Banks Outsourcing Guidance  FFIEC Guidance on Risk Management of Outsourced Technology Services (November 2000)  Key elements of the risk management process: – Risk assessment – Due diligence in selecting service provider – Contract requirements – Oversight of service provider Regardless of the decision to outsource, the bank remains ultimately responsible.

Comptroller of the Currency Administrator of National Banks Security and Privacy  Increases in security events and vulnerabilities  According to 2001 FBI/CSI survey, 70% reported that the Internet is the point of cyber attacks, up from 59% in 2000  Gramm-Leach-Bliley Act of 1999 requires banks to establish administrative, technical & physical safeguards to protect the privacy of customers’ nonpublic customer records and information

Reported Security Incidences & Vulnerabilities Source: CERT/CC -- statistics are not limited to the banking industry and include all reported incidents

Comptroller of the Currency Administrator of National Banks Key Elements of Security Program  Reviewing physical and logical security:  Review intrusion detection and response capabilities to ensure that intrusions will be detected and controlled  Seek necessary expertise and training, as needed, to protect physical locations and networks from unauthorized access  Maintain knowledge of current threats facing the bank and the vulnerabilities to systems  Assess firewalls and intrusion detection programs at both primary and back-up sites to make sure they are maintained at current industry best practice levels

Comptroller of the Currency Administrator of National Banks Key Elements of Security Program  Reviewing physical and logical security (cont’d):  Verify the identity of new employees, contractors, or third parties accessing your systems or facilities. If warranted, perform background checks.  Evaluate whether physical access to all facilities is adequate.  Work with service provider(s) and other relevant customers to ensure effective logical and physical security controls.

Comptroller of the Currency Administrator of National Banks Authentication  Reliable customer authentication is imperative for E-banking  Effective authentication can help banks reduce fraud, reputation risk, disclosure of customer information, and promote the legal enforceability of their electronic agreements  Methods to authenticate customers:  Passwords & PINS  Digital certificates & PKI  Physical devices such as tokens  Biometric identifiers

Comptroller of the Currency Administrator of National Banks Strategic and Reputation Risks  Uncertain pace of change and evolving standards (e.g., “bricks and clicks” more successful than internet-only model)  First mover (“bleeding edge”) vs. wait and see (permanently lose market share)  Struggle to retain customers in face of intense competition  Inadequate oversight of third party providers

Comptroller of the Currency Administrator of National Banks Business Continuity Planning  The 9/11 events, anthrax-laced mail, and NIMDA virus underscore the importance of robust business continuity planning.  Steps to consider when reviewing business continuity plans:  Identify primary and secondary facilities in high profile or vulnerable locations and develop plans to mitigate undue risk exposure.  Ensure business continuity plans are coordinated and communicated on a corporate-wide basis with clear expectations.

Comptroller of the Currency Administrator of National Banks Business Continuity Planning (cont’d)  Strengthen data backup and recovery site arrangements, as warranted, to ensure adequate off-site storage of back-up records and sufficient distance from primary operations.  Review succession plans for key employees and delegations of authority in the event of a crisis.  Review community’s incident response plans and work with local governments to identify enhancements  Analyze key customers and service providers for exposure to terrorist activities including high profile industries or facilities (e.g., power companies, refineries, airlines, telecommunications providers), then assess the adequacy of their business continuity planning process.  Test plans on a regular basis, evaluate results and update plans.

Comptroller of the Currency Administrator of National Banks Permissibility, Legal, and Compliance Issues  Technology raises legal issues  Permissible?  Applicability of state and foreign laws?  Validity of electronic agreements?  Technology creates consumer compliance issues  Electronic disclosures delivery  Weblinking, customer confusion, and liability  RESPA and fee income from weblinking  CRA and fair lending issues  Reg. E application to aggregation services

Comptroller of the Currency Administrator of National Banks Computer Crime  Internet banking and payment systems may allow for new ways to conduct illegal and fraudulent activities  Unauthorized access to deny service or re-direct a website  Identity theft resulting in unauthorized or illegal use of account information  Money laundering  Phony Internet banks

Comptroller of the Currency Administrator of National Banks Cross Border and International E-Banking  Information revolution around the globe and borderless reach of the Internet  Increase in global partnerships/alliances  Risks to U.S banks from cross border E- banking without adequate due diligence  Unlicensed activities?  Understanding application of local prudential and customer protection laws & regulations?  Expertise?  Risks to U.S. consumers of dealing with foreign Internet banks

Comptroller of the Currency Administrator of National Banks Cross Border and International E-Banking  EBG sponsored by the Basel Committee’s Electronic Banking Group  Chaired by Comptroller Hawke  Published studies on e-banking risk and risk management issues 1998, 2000 & 2001  available at or  Developing guidance on cross border, e-banking risks and aggregation  Coordinate international e-banking supervision efforts  Information sharing and training  OCC developing guidance on cross border Internet banking risks

Comptroller of the Currency Administrator of National Banks Key Findings of Successful E-banking Exams  Active vendor management  Ongoing board involvement  Sufficient technical expertise  Proactive network security that effectively prevents, detects, and responds to intrusions  Strong authentication practices  Encrypted communications  Periodic compliance and legal reviews  Appropriate backup and recovery

Comptroller of the Currency Administrator of National Banks OCC Technology Risks Supervision Program  Guidance -- Focus on risk analysis, measurement, controls, and monitoring  Risk-based examinations of banks and third party service providers (as authorized by the Bank Service Company Act of 1962)  On site and Quarterly reviews  Focus on safety and soundness  Reviews of banks with transactional web sites and E- banking service providers  Training and Technology Integration Project  External outreach and co-ordination  Licensing process for Internet-primary banks and novel activities

Comptroller of the Currency Administrator of National Banks Questions? Please contact John Carlson, Senior Advisor for Bank Technology, OCC Telephone: (202) Additional Information is available on the OCC Website:

Comptroller of the Currency Administrator of National Banks