Enforcement via Policies and Procedures. Processes and Procedures These are boring, tedious, time consuming…… BUT THEY ARE ESSENTIAL They must be written.

Slides:



Advertisements
Similar presentations
MONITORING OF SUBGRANTEES
Advertisements

Shipbuilding Intellectual Property Protection CESA/GuardSHIP Rotterdam, 4 February 2010.
Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
At Hyderabad December 29, 2010 Kunnel Prem. ICP 27 on Insurance Frauds and ICP 28 on AML/CFT.
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
The European legal framework of payments Ayse Zoodsma-Sungur Sixth Macedonian Financial Sector Conference on Payments and Securities Settlement Systems.
Time System What is this all about? The purpose of this project is to automate how Evergreen collects, records and manages employees’ dates and times worked.
Centers for IBM e-Business Innovation :: Chicago © 2005 IBM Corporation IBM Project October 2005.
Code of Conduct for Mobile Money Providers 6 November 2014 All material © GSMA The policy advocacy and regulatory work of the GSMA Mobile Money team.
First Practice - Information Security Management System Implementation and ISO Certification.
Achieving our mission Presented to Line Staff. INTERNAL CONTROLS What are they?
INTERNAL CONTROLS. Session Objectives Understand why an organization should have internal controls Understand the key components of internal controls.
Ecommerce Applications 2009/10 Session 31 E-Commerce Applications E-payment.
WHS Management Plans.
Network security policy: best practices
Inspecting A Hedge Fund 2010 NASAA IA Training. Preparing for the Inspection  Getting over your fears  Treat as any other advisor  Preparation  Obtain.
National Smartcard Project Work Package 8 – Security Issues Report.
Wireless Password: ONLINE GAMING / GAMBLING KNOW - YOUR - CUSTOMER AND RISK MANAGEMENT.
Compliance and Regulation for Mobile Solutions Amanda J. Smith Messick & Lauer, P.C. May 16, 2013.
Financial Resource Management Recommended Best Practices Training for Volunteers and Support Groups.
Introduction to Software Quality Assurance (SQA)
Postgraduate Educational Course in radiation protection and the Safety of Radiation sources PGEC Part IV The International System of Radiation Protection.
SMS Operation.  Internal safety (SMS) audits are used to ensure that the structure of an SMS is sound.  It is also a formal process to ensure continuous.
Safe and Secure Internet Gambling Financial Model.
Wetlands Reserve Program Case Study An Overview of the External Audit Process Helping People Help The Land.
Designing Smart Cities Conference University of Strathclyde, Glasgow 31 st March 2015 “Regulating Smart Cities: Policing & Privacy” Paul Mackie Chief Executive.
Best Practices for Banking MSBs
ANRC AACD Arkansas Conservation Districts Training Program Power Point 10 Financial Policies.
Best Practices: Financial Resource Management February 2011.
Internal Controls and Fraud Convery Describe an Internal Controls System and its elements Identify specific Internal Control issues in a NPO Consider.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Overview Creating a Bill and Billing Manual. Objectives Review the Credentialing Process Setting up the Practice Management Systems Items to Consider.
Internal Audit for Treasury Market Risk Management.
ANTI-MONEY LAUNDERING COMPLIANCE PROGRAM FCM TRAINING
FIRMA April 2010 DATA BREACHES & PRIVACY Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Effective Bank Secrecy Act/ Anti-Money Laundering Audits Presented by K.D. Mehra, CAMS, CRCM Managing Director September 22, 2011.
Accounting & Financial Analysis 111 Lecture 8 Source Documents, Day accounts/Specialised Journals, Debtors & Creditors Subsidiary Ledgers.
SABRE VIRTUAL PAYMENTS Karen Frayer Sabre Virtual Payments Manager.
Organization and Implementation of a National Regulatory Program for the Control of Radiation Sources Management Systems Part I.
1 Banking and Reconciliation. 2 To Certify As A Cash Handler  Visit the training website  Review the Payment Card Industry (PCI)
Chapter 8 Auditing in an E-commerce Environment
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
Working Group 6 – Report Transparency. Working Group # 6 Principle # 23 Disclosure of rules, key procedures, and market data 1.What constitutes "compliance"
Working Group # 3 –Settlement: Principles 8 soundness of the settlement, 9 monetary settlements and 10 physical deliveries.
Ch. 5.4 Deposit Account Documents. When an account is opened, customers receive documentation outlining the rights and responsibilities associated with.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
Summary of Changes. General These are changes that have come up in many EMV migrations that I have assessed and been involved in. The changes are broken.
Management of Operational Risk. Regulatory Capital Perspective Credit Risk – Basel I (1987) Market Risk – (Amendment 1998) Credit Risk – Basel II (2005)
Welcome. Contents: 1.Organization’s Policies & Procedure 2.Internal Controls 3.Manager’s Financial Role 4.Procurement Process 5.Monthly Financial Report.
Improving Compliance with ISAs Presenters: Al Johnson & Pat Hayle.
On-Site Inspections & Senior Officer Approval Regime Kenneth Baker Deputy Managing Director, Regulation.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
HR FUNCTIONS AT A GLANCE. PRE-RECRUITMENT PROCESS  Collection of requirement of manpower from various departmental heads  Securitization of the requirement.
Judy Graham, Program Officer
Stock, Payroll & Non –current assets
Tender Evaluation and Award Process
Problems – Technical Requirements
Internal Controls.
Red Flags Rule An Introduction County College of Morris
DATA BREACHES & PRIVACY Christine M
County HIPAA Review All Rights Reserved 2002.
Internal controls 01-Nov-2017.
Internal Controls.
Internal Controls.
Presentation transcript:

Enforcement via Policies and Procedures

Processes and Procedures These are boring, tedious, time consuming…… BUT THEY ARE ESSENTIAL They must be written and updated regularly Every member of staff must Be trained in their use Read them as part of their job Keep up to date on changes

What are They Operational procedures are documents that describe the way in which the Issuer or Acquirer operates throughout their operation. They cover every aspect of the process of cards and every interface inwards and outwards. To card schemes, bank systems, partner systems, central banks etc:

Why do you need them They are needed to ensure that the card processes always operate in the same way, regardless of when, were or what the situation is. They become base documents for: Training new staff Upgrading existing systems Introducing new systems

What Areas are Covered They cover every single area of the Issuer or Acquirer process within the bank and outside it.

Security and Access Who can access, see and update data and what they can do with it Directors Managers Supervisors Operators

Risk Processes KYC (Know Your Customer) Profiling for Risk exposure of: Applications Authorisations and Limits Collections Fraud New Products

Authorisations Who can authorise what How far can a limit be exceeded Criteria around breaking limits Reporting processes

Account Management Application Processing Account Maintenance Account Opening Account Closure Detail Changes Statement Production

Settlement Settlement processes: Internally Externally to Card Schemes Partners Customers

Disputes Stages involved in a dispute process: Copy of the voucher, till roll, signature or any other acceptable proof Chargeback Representment Arbitration

Collections Process to be followed on non-payment 30 days, 60 days, 90 days, and so on Collections Agencies Litigation Dunning Letters Write Offs

Fraud Process to be followed: Identification of where the faulty lies Chargeback if appropriate Notification of authorities Reporting to card schemes / central banks Write Offs

Customer Service Who can you talk to What can you say How do you follow up What are the limits of your job

Security Key Management System Security Access Passwords

Audit What data to be recorded on each transaction: Date Time Operator / workstation ID Details of changes Before image After image

Compliance Compliance with: Central Banking Regulations National Regulations Anti-Money Laundering Rules OFAC Card Scheme mandates and regulations Any other specific compliance issue e.g. move to EMV, use of fraud checking etc:

Contract Must Haves Contracts with Who Schemes Partners Suppliers Customers

Contract Must Haves Contracts are as boring as anything can be: But Make sure that the legal eagles have actually written in what you want It actually does do what you need to do Never be afraid to question anything If its not right nor will your business be right Goldfish

Scheme Business Interfaces Compliance with scheme rules Submission of waivers Settlement and reconciliation Disputes and Chargebacks Rules agreement Product launches Brand enhancement

Scheme Technical Interfaces Online authorisations Offline Clearing and Settlement Certifications Online Offline Chip card certification New Product Launch

Licences and Approvals Scheme Certifications Banking Licences EMoney Licences FSA Approvals Central Bank Agreements