Management of Operational Risk. Regulatory Capital Perspective Credit Risk – Basel I (1987) Market Risk – (Amendment 1998) Credit Risk – Basel II (2005)

Slides:



Advertisements
Similar presentations
EXPERIENCES OF OTHER COUNTRIES IN REGULATION OF PAYMENT CARDS SYSTEM This section reviews the regulatory experiences of other countries with respect to.
Advertisements

Page 1 Risk Management in Banking. Page 2 An Introduction to Risk Risk Management Risk Management is the process of measuring or assessing the actual.
Appendix F: Common risk categories for the public sector Insert client-specific photo here.
Electronic Finance: Reshaping the Financial Landscape Around the World Stijn Claessens Tom Glaessner Daniela Klingebiel.
STRATEGIC PLANNING FOR Post-Clearance Audit (PCA)
AML/CFT Regulation in Light of Global Financial Crisis Presented by Muhammad Baasiri SIC Secretary US-MENA PSD Chairman MENAFATF 1 st Year President 1.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Operational risk. Introduction During the early part of the decade, much of the focus was on techniques for measuring and managing market risk. As the.
Presented by Muhamad Abrar Bahaman W. Fatimatul Akmar Md. Hassan
Regulating the Financial Sector: Domestic Regulatory Regime Strategies to support financial stability and development by Marion Williams Rio de Janeiro,
Confidential 1 AML/KYC Seminar, Indian Institute of Bankers, Hotel Taj Westend, Bangalore – October 5, 2006 Role of IT in AML / KYC Arun Pingaley Head.
Auditing Computer Systems
Credit Reporting: What’s the role for the state? Fredes Montes Financial Infrastructure The World Bank.
Peter Brudenall & Caroline Evans- Simmons & Simmons Marsh Technology Conference 2005 Zurich, Switzerland. Managing the Security Landscape – Legal and Risk.
Security Controls – What Works
1 CSI COMPLIANCE AWARENESS TRAINING ANTI MONEY LAUNDERING July 2004 This is confidential proprietary and trade secret information of American Express Travel.
Code of Conduct for Mobile Money Providers 6 November 2014 All material © GSMA The policy advocacy and regulatory work of the GSMA Mobile Money team.
Outline  Company Profile  Services Provided  Assets  System Schema  Risk Categories  Technical Risks and Mitigation  Summary.
TOPCIMA - Risk and Control Strategy
Chapter 9: Introduction to Internal Control Systems
State Bank of Pakistan Various Departments
Chapter 3 Internal Controls.
Outsourcing Louis P. Piergeti VP, IIROC March 29, 2011.
Risk Management Reconstructed Implementing fraud risk intelligence practices July 2011 KPMG FORENSIC SM.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Supervision and Oversight in Procurement as a Tool of Efficient Project Implementation.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Risk Management. IT Controls Risk management process Risk management process IT controls IT controls IT Governance Frameworks IT Governance Frameworks.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
ETHICS, POLICY & SECURITY ISSUES
ETHICS, POLICY & SECURITY ISSUES
International Legal Regulation of the Securities Market Regulation of the securities market is an ordering activity of all its participants and transactions.
CIA Annual Meeting LOOKING BACK…focused on the future.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
Fundamentals I: Accounting Information Systems McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Lecture 28. Chapter 17 Understanding the Principles of Accounting.
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
Internal Audit for Treasury Market Risk Management.
Presented by: Hany Faidy Senior Vice President, Head of Compliance Division March 2009 Procedures followed by FI’s when reporting Suspicious Transaction.
Derek Huhta Micah McKee Natalia Meza Shaun Ripplinger.
BAISCS OF BANKING AND COMMERCIAL BANKING Baber Afridi Yasin Shakeri Akif Ali Mahwish Musharraf Hina Ilyas.
Banking Risks and Regulation. Changes in Indian Banking.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Internal/External Audit and Internal Controls February 23, 2000 David Dudley Federal Reserve Bank of NY.
Lee young man. 1) What is the definition of the Financial law ? 2) The definition of insurance fraud 3) Type of insurance fraud 4) Detecting.
Chapter 8 Auditing in an E-commerce Environment
Basel Committee Norms. Basel Framework Basel Committee set up in 1974 Objectives –Supervision must be adequate –No foreign bank should escape supervision.
Finance (Basic) Ludek Benada Department of Finance Office 533
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting your Managed Services Practice: Are you at Risk?
CH 2.  This chapter includes:  The Function of banks and services.  Banks targets.  Organizational forms for banks.  Administrative and organizational.
Corliss Whitaker: Portfolio – Instructional Presentation Understanding BASEL II Concepts Author: Korki Whitaker Revised: 02/17/2007.
Copyright © 2016 by McGraw-Hill Education Chapter 5 Fraud, Internal Control, and Cash PowerPoint Author: Brandy Mackintosh, CA.
Enforcement via Policies and Procedures. Processes and Procedures These are boring, tedious, time consuming…… BUT THEY ARE ESSENTIAL They must be written.
Unit 6 – Chapter 5.  Describe the Sarbanes-Oxley Act of 2002 and its impact on internal controls and financial reporting.
Treasury Market Risk Management. Treasury Management Treasury management is a broader concept than liquidity management Management of cash flows in terms.
Draft - Enterprise Risk Management Risk Universe
PROFESSIONAL LIABILITY & QUALITY CONTROL
Factors to be considered for the Internal Auditors
Errors, Fraud, Risk Management, and Internal Controls
Operational Risk.
Anti-Money Laundering Guidelines
Information Security based on International Standard ISO 27001
Chapter 3: IRS and FTC Data Security Rules
Banking and the Management of Financial Institutions
Principles of Auditing
Banking and the Management of Financial Institutions
A fundamental principle of UNCAC
Presentation transcript:

Management of Operational Risk

Regulatory Capital Perspective Credit Risk – Basel I (1987) Market Risk – (Amendment 1998) Credit Risk – Basel II (2005) Operational Risk – Basel II (2005)

Regulatory Compliance Perspective Anti Money Laundering Undesirable Banking Practices Product Regulation Cross Border Business

Business Perspective Return on Capital Volatility Management Value Optimization

Risk Response Market response –Introduce new products Equity futures Foreign currency futures Currency swaps Options Regulatory response –Prudential norms –Stringent provisioning norms –Corporate governance norms

Internal Fraud Management Authorization of activities Reporting of transactions Measurement of bank positions –Regional level –National level –International level Property evaluation Regulatory compliance

Client Level Fraud Management Credit reports Monitoring worthless deposits Measures to scrutinize extortion Measures to scrutinize embezzlement Measures to scrutinize robbery Measures to scrutinize asset misappropriation

International Fraud Management Verify accounts transfer Verify accounts takeover Penalize non-compliance Penalize willful evasion Identify accounts with irregular movements

External Fraud Management Security to prevent robbery Expert personnel to detect forgery Systems security to prevent hacking Safety measures to ensure information safety

Employee Practices Adequate compensation Benefits meeting market practices Procedures in place for termination of employees Organized employee relations Employee health and safety rules Legal support

Business Process Management Enforce disclosure requirements (Know Your Customer (KYC)) Ensure privacy of business practices Avoid aggressive selling Proper usage of confidential information Legal provisions for lender liability

Customer Management Investigate customer transactions without violating customer confidentiality requirements. Scrutinize customer exposure limits. Ensure legal support for disputes in terms of advisory services of banks. Ensure error free development of banking products.

Systems Management Hardware maintenance contracts. Software updates and performance reports. Telecommunication performance. Ensure disruption free utility services. Proper communication to ensure error free loading of data. Ensure proper usage of operation models and systems

Enforcement Requirements Customer permissions Legal documentation Complete procedures Disclaimer clause where appropriate –Outsourcing –Customer dispute