The Mobile Channel, TCPA and Privacy NCHELP New Orleans January 19, 2012 Mercedes Kelley Tunstall Of Counsel 202.661.2221 ballardspahr.com Jerod.

Slides:



Advertisements
Similar presentations
FFIEC Agency Supplement to Authentication in an Internet Banking Environment
Advertisements

Weighing the Risks and Benefits of Online Financial Transactions
The Telephone Consumer Protection Act John L. Culhane, Jr., Esquire NCHELP Winter Legal Meeting January 19,
Combating Fraud Risk in Payment Systems. 2 Defining Fraud..a deliberate act of omission or commission by any person, carried out in the course of a banking.
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Mobile Commerce.
Mobile Payments and the FTC Manas Mohapatra Director of Mobile Policy Mobile Technology Unit Federal Trade Commission The views expressed are not necessarily.
Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
Building Bucks Basic Financial Services. Financial Institutions 3 Main Types – Banks – Credit Unions – Savings and Loan Associations (S&L) Advantages.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking – Slide 1 Funded by a grant from Take Charge America,
Technology Supervision Branch New FFIEC Guidance on Strong Authentication ABA Webcast January 11, 2006.
Online Shopping Self-Defense
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Electronic Commerce Payment Systems CIS 579 – Technology of E-Business Joseph H. Schuessler, PhD Joseph.schuesslersounds.com Tarleton State University.
Breaking Trust On The Internet
Protect Yourself from Your Customer Kristin A. Stedman, AAP Senior Vice President Education Services 1 © 2014 TACHA. All Rights Reserved.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Bank On It Personal Finance Unit. Why Learn About Banking?
Bank On It.
$$$$$$$ Know your Money! Financial Institutions and Services.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
1 Money Transfer in Cyberspace MTRA 16 th Annual Conference November 13 – 15, 2006 Presented by Joseph Cachey III SVP, Global AML Compliance The Western.
Traditional and Electronic Payment Methods Chapter 3.
Online and Mobile Banking. Online banking Online Banking  Online banking is a fairly established practice in our internet-saturated world.  Many people.
EPS (Electronic payment system) is an online business process used for fund transfer using electronic means, i.e  Personal computers  services  Mobile.
Electronic Payment Systems University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2010 March 2010 ITSS 4201 Internet.
Introduction Our Topic: Mobile Security Why is mobile security important?
Bank On It 1. 2 Purpose Bank On It : Is an overview of banking services. Will help you build a positive relationship with banks, thrifts, and credit unions.
Read to Learn Discuss the different types of checking accounts and how they work. Discuss other services and offerings that banks provide checking account.
Electronic Commerce Semester 1 Term 1 Lecture 18.
Traditional and Electronic Payment Methods Chapter 3.
© 2009 National Automated Clearing House Association. All rights reserved. Industry Perspectives on Emerging Risks and Public/Private Engagement: Network.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
Payment Systems. Payment Revolution 1970: Electronic Funds Transfer between banking industries 1980: Electronic Data Interchange (EDI) for e- commerce.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Payment Systems Unit 34: E-commerce M2 - Compare two different payment systems used in e-commerce systems.
By Hinal Pithia Monday, November 14, Overview The traditional wallet The digital wallet –How it works –Technology –Payment Models –The players –Considerations.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Serving the Public. Regulating the Profession. CANADA’S ANTI-SPAM LEGISLATION (CASL) Training for Chapters Based on Guidelines for Chapters First published.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
E-Commerce Systems Chapter 8 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
Policies and Security for Internet Access
Credit and debt management. Student Learning Objective Compare and contrast the financial benefits of different products and services offered by a variety.
Section 3: Banking Services
1 Privacy & Preference Committee Update Ensuring a healthy ecosystem via transparency & trust Date: January 13, 2009 Alan Chapell, President.
ELECTRONIC PAYMENT SYSTEMS MGT 546 PREPARED FOR: SHAMSUL BAHARIN SAIHANI PREPARED BY: SITI SHAMEEN ALIA BINTI ALIAS NUR ATIQAH BINTI MOHD MAZLAN.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Trusted source for all your payment processing needs.
ELECTRONIC PAYMENT SYSTEM
Facebook privacy policy
Take Charge of your Finances
ISYM 540 Current Topics in Information System Management
Electronic Commerce Payment Systems CIS 579 – Technology of E-Business
Take Charge of your Finances
Mr. Roeshink – Financial Operations
Own Your Identity.
BY GAWARE S.R. DEPT.OF COMP.SCI
Financial Institutions and Services
Chapter 10 Consumer Education.
Digital $$ Quiz Test your knowledge.
Own Your Identity.
Protecting Yourself from Fraud including Identity Theft
Take Charge of your Finances
Streamlining Processes Across Retail Banking Channels
Presentation transcript:

The Mobile Channel, TCPA and Privacy NCHELP New Orleans January 19, 2012 Mercedes Kelley Tunstall Of Counsel ballardspahr.com Jerod Laughlin SVP, Digital Marketing PNC Bank John L. Culhane, Jr. Partner

2 The Wonderful World of Mobile Mobile devices are now used for all sorts of purposes related to financial services: Marketing and Advertising Applications Payments/Wallets Servicing/Customer Communications/E-Alerts M-Commerce

3 3 Methods of Mobile Communications Text messages Can be sent in a variety of formats, SMS, MMS, VMS, among others (i.e., Bluetooth). Mobile Web Websites can be optimized for viewing on a mobile browser Mobile Apps (i.e., Apple's App Store) Still innovating the best types of apps for financial services

3/2/ Legal Considerations for Mobile Telephone Consumer Protection Act CAN-SPAM Applies to text messages that are sent to an address (i.e., Marketing messages must be scrubbed against opt-out list and message must contain opt-out information Mobile Marketing Association

3/2/ MMA's Consumer Best Practices Double opt-in for text messages Customer initiates request for text Responsive text asks for approval to continue texting Customer confirms Responsive text must include the following information: Description of what messages will be received Msg&Data Rates May Apply Frequency of messaging HELP STOP

3/2/ MMA (cont.) More on STOP messaging Alternative terms must be recognized (e.g., quit, cancel, unsubscribe, end) STOP must not be case-sensitive In dispute now -- after STOP message is received, MMA recommends sending a confirmation STOP message, but, recent case law suggests otherwise. Opting out of text messaging generally Customer should be able to opt-out the same way that they opted-in to receiving text messages.

3/2/ MMA (cont.) Records of opt-ins and opt-outs -Should be maintained for from the time of opt-in until a minimum of at least six months after opt-out -Opt-ins and opt-outs should be processed within three days of the request Terms and Conditions for Text Messaging -Should explain how STOP and HELP work -Should include customer service telephone number and website for chatting -Disclose the frequency of messaging (or intended frequency) -Any other applicable terms and conditions -Carrier compatibility (to the extent applicable)

3/2/ Tricky Topics Sweepstakes Debt Collection Loan Applications via Mobile Web or Mobile App

3/2/ Mobile Payments and Wallets Person-to-person mobile payments -Using address or cell phone number -Funds exchange via ACH Mobile Wallets -Replacement for plastics – debit, prepaid, credit cards -Also, loyalty or membership cards -NFC

3/2/ Customer Authentication Requirements FFIEC – Authentication in an Internet Banking Environment (2005), supplemented June 28, 2011 When is authentication required? -Initial authentication -Additional layers of authentication, based upon risk level of transaction Business transactions are more risky than consumer transactions Layers should compensate for weakness in one control What are financial institutions required to do? -Detect and respond to suspicious activity, especially: initial login and authentication of customers to online banking customers initiating the transfer of funds to other parties electronically -Control administrative functions

3/2/ Suggested Authentication Methods fraud detection and monitoring that includes customer history and behavior; use of dual customer authorization through different access devices; use of out-of-band verification for transactions; use of positive pay, debit blocks, and other limits on transactions; account activity controls; recognizing IP addresses associated with fraudulent activities; processes for recognizing compromised customer devices as well as customers who may be facilitating fraud; controls for changes by customers to their account information online as well as through other customer service functions; customer education on techniques for customers to mitigate fraud

3/2/ AML and Data Security Concerns and Mobile Portability presents concerns: -Physical portability -Number portability -Underscores the importance of proper authentication, even in the mobile channel Mobile is the new frontier for hackers -Minimize information that is available to be stored on the phone that contains personally-identifiable information