Understanding the Points of Differentiation Between PSD and PSD2

Size: px
Start display at page:

Download "Understanding the Points of Differentiation Between PSD and PSD2"

Transcription

1 ABSTRACT The use of biometric authentication to combat fraud and improve the authentication experience for users is widely understood by banks and payment system providers. But, in light of the recent directives around the PSD2 regulation, is there more value in biometrics for banks than meets the eye? Biometrics and PSD2 Copyright AimBrain Solutions Ltd. All rights reserved.

2 Executive Summary The use of biometric authentication to combat fraud and improve the authentication experience for users is widely understood by banks and payment system providers. But, in light of the recent directives around the PSD2 regulation, is there more value in biometrics for banks than meets the eye? As banks and payment providers work towards implementing PSD2, many are asking whether or not biometric authentication can perhaps help address the ever-growing challenge of complying with these regulations. This whitepaper will look to answer these questions and examine the new PSD2 directive on payment services and provide practical implementation advice. Understanding the History of PSD2 Before we look at the issues and how we can overcome them, we need to understand PSD2 and how it is going to change the payments landscape. In 2007, a Directive on Payment Services (PSD) was adopted to create a single market for payments within the European Union. Rules were created along with guidelines for modernising payment processing across Europe with the key aim of simplification. The latest version of the directive remains true to this objective of ease and simplification. It continues to clearly emphasize two key goals one, promote competition from new market entrants and two, reduce costs. While the original PSD achieved good progress towards this, continuous feedback from the market was that it still did not create a level playing field for market participants. As a result, an updated directive, Directive on Payment Services 2 (or PSD2) was proposed in Three years later, on January 12 th 2016, PSD2 came into force and will be implemented into national law of member states by 13 th January (*Note that the impact a Brexit will have on PSD2 will be the subject of another whitepaper in this series.) Why PSD2? So now that the directive is enforced, let s understand in-depth what PSD2 is trying to achieve: Improved consumer protections through strong customer authentication or through the use of a risk-based approach to authentication Standardised, integrated, and overall improved payment efficiency in the European Union Promotion of innovation in the payment space Cost reduction in the payment space Improved clarity on the use of mobile payments and other emerging payment methods Ease-of-entry for new payment service providers (referred to as third party providers, TPPs) through enabling new services: Payment Initiation Services (PIS) and Account Information Services (AIS) Harmonised pricing and improved security of payment processing across the European Union Incorporation of new and emerging payment services into the regulation Understanding the Points of Differentiation Between PSD and PSD2 To understand the changes from PSD to PSD2, let s look at one key practical difference. Today, when a consumer purchases online, they must enter details onto a merchant s website. The retailer receives the money via a number of intermediaries. Under PSD2, the retailer will be able to ask the consumer Copyright AimBrain Solutions Ltd. All rights reserved. P a g e 1

3 aka Payment Service User (PSU) for permission to use their bank details. The PSU will then be required to authenticate with his/her bank or the Account Servicing Payment Service Provider (ASPSP) using multifactor authentication. Once authenticated, and successfully authorised, the retailer will receive the payment directly from PSUs bank thus making the use of an intermediary (schemes and acquirers) no longer necessary. How does this happen? To start, the retailer can now connect directly to the bank using an Application Programming Interface (API). In payment IT terms the availability of this API means that companies can connect to banks directly. Clearly, there is going to be a wave of new Fintech companies that can now provide services that they had previously not been able to. This is where PIS and AIS providers have the opportunity to really innovate and change the payment landscape. In today s environment, if you have multiple bank relationships you need to get details (such as a balance) from each bank separately. PSD2 simplifies this by enabling you to view all of your bank details on one single portal by introducing Account Information Service Providers (AISP s). AISP s will provide the Payment Service User (PSU) with aggregated online information on one or more payment accounts held with one or more other payment service providers and accessed via online interfaces of the account servicing payment service provider (ASPSP). The PSU is thus able to have an overall view of his/her financial situation immediately and at any given moment. So What About Biometric Authentication? With PSD2 comes a host of new consumer protections. These protections range from new refund rights around direct debits to limiting credit card charges to enhanced fraud protections. It also adds the need for stronger customer authentication. Enter biometric authentication. Going forward, PSPs are required to apply "strong customer authentication" measures when a PSU initiates "an electronic payment transaction". What does stronger customer authentication mean? Put simply, it means that a Payment Service Provider (PSP) should now be confident that the Payment Service User (PSU) is truly and accurately who the PSUs says they are. To ensure that this happens, PSD2 has tightened up the authentication rules significantly. From an official regulatory perspective, Stronger Customer Authentication is defined by the Commission as "a procedure for the validation of the identification of a natural or legal person based on the use of two or more elements categorised as knowledge, possession and inherence that are independent, in that the breach of one does not compromise the reliability of the others and is designed in such a way as to protect the confidentiality of the authentication data". In practical payment speak, this means multi-factor authentication. Let s now look more closely at the words knowledge, possession, and inherence: Knowledge o This is something only a user will know such as a PIN Possession o This is something only the user possesses such as a token Copyright AimBrain Solutions Ltd. All rights reserved. P a g e 2

4 Inherence o This is something that only the user is such as a biometric Before we examine the practical implementation and opportunities that this part of the regulation presents, we need to understand how important it is for banks to comply with the multi-factor authentication. To do this, let s discuss what will happen to a bank if it fails to implement the Stronger Authentication for Payments aspect of PSD2. Any bank that fails to apply the Strong Authentication for Payments cannot require payers to "bear any financial consequences" unless the payer has acted fraudulently. Additionally, a PSP would be required to compensate other PSPs or even intermediaries of the PSP "for any losses incurred or sums paid" by those other businesses as a result of their failure to apply strong customer authentication. Clearly this is very important and there is even more to it. Third party PSPs that initiate payment transactions are also required to ensure they apply Strong Customer Authentication. As per PSD2, third parties should be free "to rely on the authentication methods" of ASPSPs "when acting on behalf of the payment service user". In terms of practical implementation, it is most likely that banks will rely on the knowledge factor option such as a PIN but could decide to choose between possession and inherence as the second factor of authentication. This is where we need to turn our attention to the consumer or PSU and how PSP s will need to offer consumer-friendly solutions in order to win and retain market share. It is our opinion that relying on possession as the second factor of authentication will not the preferred option. While a possession-focused solution would be technologically strong it may not provide the level of accuracy required to achieve Stronger Authentication. Possession-focused solutions have been known to have more points failure and may be more susceptible to fraud attacks. Additionally, a possession-focused solution is not particularly consumerfriendly, potentially sacrificing market share and competitive advantages for the PSP. As an alternative, many banks are looking into inherence options to address the second factor of authentication. One such option is biometrics. Why? Because quite simply, it is much more difficult to fraud a biometric device than it is to steal something in a user s possession. Using inherence as that second factor caters to both security requirements and the user experience priorities of PSPs giving them the best of both worlds so to speak. Furthermore, with mobile devices becoming more prominent in the consumer s daily life and smartphones an extension of their social and digital identity, it is important to consider the impact of a user- unfriendly experience. Copyright AimBrain Solutions Ltd. All rights reserved. P a g e 3

5 Biometric Authentication is consumer-friendly. It works in real-time and is extremely easy for banks to implement. It provides banks with better user experience capabilities and better risk management. Additionally, and very importantly, it addresses the requirements for Stronger Authentication through more accurate validation. Biometric technology makes identity fraud less likely. This means that banks can save time and money and at the same fight fraud. While a future whitepaper will discuss the strengths and weaknesses of biometrics in more detail, banks have already begun to actively look at and evaluate behavioural-specific biometrics for authentication as the way to comply with PSD2. Why? Because behavioural authentication provides the necessary balance between security and a positive customer experience. By being able to assess the customer s behaviour, banks/aspsps are able to assess the level of risk and subsequently, the level of authentication required for the specific scenario. This benefit and capability is extremely important because per PSD2, PSPs can be exempted from applying strong customer authentication when the associated risk is low. Also, because behavioural authentication runs in the background it is invisible to users. It does not infringe the customer journey and therefore does not sacrifice the quality of the user experience all while providing rigorous customer authentication. Banks using inherence (specifically behavioural biometrics) as their second authentication factor, importantly have somewhere to go. They have the ability to incorporate another layer of security into their authentication protocol if a high-risk is identified during the process. Rather than declining the user, they can step-up their authentication in these high-risk scenarios identified by behavioural biometrics by deciding to use possession as a third factor of authentication. Adding this additional layer helps to prevent a negative customer journey. How Does It Work? The Behavioural Biometric Use Case 1. User enters a mobile payment app and enters a PIN (Knowledge factor, tick). 2. Behavioural Authentication provides the bank with a session score so the bank knows whether the user really is who they say they are (Inherence factor, tick). 3. Behavioural Authentication Session Score is sent to the bank all the time the user is in the app important as the Strong Customer Authentication needs to be at the point of payment (Inherence factor tick). Copyright AimBrain Solutions Ltd. All rights reserved. P a g e 4

6 Summary In summary, there are a few key points to keep in mind when working towards implementing PSD2 compliance practices: Banks/ASPSPs will need to make significant changes to align with PSD2. Public APIs will need to be opened to PIS and AIS players Multi-factor authentication will need to be incorporated to ensure strong customer authentication. Security credentials will need to align with at least two of the three option: i) Knowledge ii) Possession and iii) Inherence It is assumed that Knowledge will be one of the factors used for authentication Low risk transactions can be exempted from strong customer authentication Inherence provides a stronger authentication and better customer journey Biometrics and Behavioural pattern helps assess the risk which can drive the need for multifactor authentication About the Author, AimBrain AimBrain, a next-generation biometrics engineering company, helps financial institutions easily, securely, and accurately authenticate their mobile banking users. Using a patent-pending, context-based step-up authentication methodology, AimBrain is helping some of the world s largest financial institutions know if their users really are who they say they are. AimBrain delivers advanced biometrics technology to banks so they can stay ahead of mobile fraud through a secure and frictionless authentication experience. Supported by Episode1, a leading UK venture capitalist, AimBrain is largely recognised for their potential to revolutionise the world of money and has been named as a 2016 FinTech50 finalist. Contributors Andrew McFarlane and Anshuman Bhardwaj from Accenture. Copyright AimBrain Solutions Ltd. All rights reserved. P a g e 5

Securing Internet Payments across Europe. Guidelines for Detecting and Preventing Fraud

Securing Internet Payments across Europe. Guidelines for Detecting and Preventing Fraud Securing Internet Payments across Europe Guidelines for Detecting and Preventing Fraud Table of Contents Executive Summary Protecting Internet Payments: A Top Priority for All Stakeholders European Central

More information

General Comments and Replies to Questions

General Comments and Replies to Questions DRAFT BSG RESPONSE TO EBA/DP/2015/03 ON FUTURE DRAFT REGULATORY TECHNICAL STANDARDS ON STRONG CUSTOMER AUTHENTICATION AND SECURE COMMUNICATION UNDER THE REVISED PAYMENT SERVICES DIRECTIVE (PSD2) General

More information

EBA STRONG AUTHENTICATION REQUIREMENTS

EBA STRONG AUTHENTICATION REQUIREMENTS EBA STRONG AUTHENTICATION REQUIREMENTS FOR INTERNET PAYMENTS IN EU TO BE IMPLEMENTED BY AUGUST 1 ST 2015 LEGAL WHITEPAPER What are the strong authentication requirements under EBA Guidelines which European

More information

5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business. An IDology, Inc. Whitepaper

5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business. An IDology, Inc. Whitepaper 5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business An IDology, Inc. Whitepaper No matter how big your company is or what industry you are in, every business typically

More information

FinTech Focus: New European Directive on Payment Services (PSD2) Comes into Force

FinTech Focus: New European Directive on Payment Services (PSD2) Comes into Force February 1, 2016 FinTech Focus: New European Directive on Payment Services (PSD2) Comes into Force By Simon Deane-Johns and Susan McLean On 12 January 2016, the long-awaited revised Payment Services Directive

More information

CA Viewpoint. Meeting the European Banking Authority Guidelines and EU Payment Security Directive for Secure Authentication

CA Viewpoint. Meeting the European Banking Authority Guidelines and EU Payment Security Directive for Secure Authentication EXECUTIVE BRIEF AUGUST 2015 CA Viewpoint Summary of European Banking Authority Guidelines and How CA Can Help Meeting the European Banking Authority Guidelines and EU Payment Security Directive for Secure

More information

W3C Web Payment IG. Payment Service Providers. Alibaba Zephyr Tuan

W3C Web Payment IG. Payment Service Providers. Alibaba Zephyr Tuan W3C Web Payment IG Payment Service Providers Alibaba Zephyr Tuan 01 Internet Finance Ecosystem in China 02 Payment Service Provider Requirements 03 Open Questions 01 When Internet Meet Finance Internet

More information

Guide to Evaluating Multi-Factor Authentication Solutions

Guide to Evaluating Multi-Factor Authentication Solutions Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor

More information

Industry Briefing: Security of Internet Payments - Legislative Developments in Europe

Industry Briefing: Security of Internet Payments - Legislative Developments in Europe Industry Briefing: Security of Internet Payments - Legislative Developments in Europe Copyright 2015 VASCO Data Security. All rights reserved. No part of this publication may be reproduced, stored in a

More information

Securing Internet Payments. The current regulatory state of play

Securing Internet Payments. The current regulatory state of play Securing Internet Payments The current regulatory state of play In recent years the European Union (EU) institutions have shown a growing interest on the security of electronic payments. This interest

More information

ONLINE AND MOBILE BANKING, YOUR RISKS COVERED

ONLINE AND MOBILE BANKING, YOUR RISKS COVERED ONLINE AND MOBILE BANKING, YOUR RISKS COVERED WITH KASPERSKY FRAUD PREVENTION ONLINE AND MOBILE BANKING, YOUR RISKS COVERED WITH KASPERSKY FRAUD PREVENTION Financial fraud is a serious risk with damaging

More information

THE NEW INTERNATIONALS. Updating perceptions of SMEs in an increasingly globalised world

THE NEW INTERNATIONALS. Updating perceptions of SMEs in an increasingly globalised world THE NEW INTERNATIONALS Updating perceptions of SMEs in an increasingly globalised world Contents Introduction 5 Born Global 6 International Futures 7 Supporting UK SMEs 8 UK Regions 9 Conclusion 10 About

More information

PSD2 Regulating a New Payments World Patterns of Expertise The quest for a

PSD2 Regulating a New Payments World Patterns of Expertise The quest for a PSD2 Regulating a New Payments World Patterns of Expertise The quest for a A Guide from Icon Solutions By Tom Hay, Head of Payments December 2014 Overview The European Union has been drafting new legislation

More information

EACT COMMENTS ON THE COMMISSION PROPOSAL FOR PAYMENT SERVICES DIRECTIVE II

EACT COMMENTS ON THE COMMISSION PROPOSAL FOR PAYMENT SERVICES DIRECTIVE II EACT COMMENTS ON THE COMMISSION PROPOSAL FOR PAYMENT SERVICES DIRECTIVE II 9 May 2014 1. Introduction The EACT supports a competitive and integrated European payments market and has since many years been

More information

Interchange fee regulation: consultation response

Interchange fee regulation: consultation response Interchange fee regulation: consultation response October 2015 Interchange fee regulation: consultation response October 2015 Crown copyright 2015 This publication is licensed under the terms of the Open

More information

How To Write A New Payment Services Directive

How To Write A New Payment Services Directive Proposal for a revised Payment Services Directive BEUC position Contact: Financial Services Team financialservices@beuc.eu Ref.: X/2013/079-27/11/2013 BUREAU EUROPÉEN DES UNIONS DE CONSOMMATEURS AISBL

More information

DP on future RTS on strong customer and secure communication under PSD2 EBA/DP/2015/03. 8 December 2015. Discussion Paper

DP on future RTS on strong customer and secure communication under PSD2 EBA/DP/2015/03. 8 December 2015. Discussion Paper EBA/DP/2015/03 8 December 2015 Discussion Paper on future Draft Regulatory Technical Standards on strong customer authentication and secure communication under the revised Payment Services Directive (PSD2)

More information

Using Strong Authentication for Preventing Identity Theft

Using Strong Authentication for Preventing Identity Theft Position Paper Using Strong Authentication for Preventing Identity Theft Robert Pinheiro Consulting LLC Better identity authentication has been proposed as a potential solution not only to identity theft,

More information

WHITE PAPER. How to simplify and control the cardholder security environment

WHITE PAPER. How to simplify and control the cardholder security environment WHITE PAPER How to simplify and control the cardholder security environment Document Version V1-0 Document Set: QCC Information Security Prepared By Nick Prescot - QCC Information Security Ltd Sponsored

More information

Actorcard Prepaid Visa Card Terms & Conditions

Actorcard Prepaid Visa Card Terms & Conditions Actorcard Prepaid Visa Card Terms & Conditions These Terms & Conditions apply to your Actorcard prepaid Visa debit card. Please read them carefully. In these Terms & Conditions: "Account" means the prepaid

More information

Position Paper e-payments

Position Paper e-payments Position Paper e-payments 10 Recommendations for a Stronger e-payments Landscape in Europe www.ecommerce-europe.eu POSITION PAPER 3 Introduction: Ecommerce Europe Ecommerce Europe (www.ecommerce-europe.eu)

More information

Tranform Multi-Factor Authentication from "Something You Have" to "Something You Already Have"

Tranform Multi-Factor Authentication from Something You Have to Something You Already Have Tranform Multi-Factor Authentication from "Something You Have" to "Something You Already Have" DIGIPASS Embedded Solutions White Paper DIGIPASS Embedded Solutions White Paper Page 1 of 14 2009 VASCO Data

More information

Memorandum Regulating EU mobile, internet and card payments

Memorandum Regulating EU mobile, internet and card payments Keynote speech linked to country-specific consumer protection legislation, but could often be removed through appropriate legislation. The EU legislators have taken action in recent years, firstly with

More information

Payment Card Industry (PCI) Data Security Standard. PCI DSS Applicability in an EMV Environment A Guidance Document Version 1

Payment Card Industry (PCI) Data Security Standard. PCI DSS Applicability in an EMV Environment A Guidance Document Version 1 Payment Card Industry (PCI) Data Security Standard PCI DSS Applicability in an EMV Environment A Guidance Document Version 1 Release date: 5 October 2010 Table of Contents 1 Executive Summary... 3 1.1

More information

User Authentication for Software-as-a-Service (SaaS) Applications White Paper

User Authentication for Software-as-a-Service (SaaS) Applications White Paper User Authentication for Software-as-a-Service (SaaS) Applications White Paper User Authentication for Software-as-a-Service (SaaS) Applications White Paper Page 1 of 16 DISCLAIMER Disclaimer of Warranties

More information

HDE position on legislative package to regulate payment systems (MIF and PSD II)

HDE position on legislative package to regulate payment systems (MIF and PSD II) [Transparency Register No.: 31200871765-41] HDE position on legislative package to regulate payment systems (MIF and PSD II) November 2013 I. Einleitung I. Introduction The German Retail Federation HDE

More information

Opinion piece. The mobile wallet already exists! It s called mobile banking. By Simon Cadbury Head of Strategy & Innovation Intelligent Environments

Opinion piece. The mobile wallet already exists! It s called mobile banking. By Simon Cadbury Head of Strategy & Innovation Intelligent Environments Opinion piece The mobile wallet already exists! It s called mobile banking By Simon Cadbury Head of Strategy & Innovation Intelligent Environments What do we mean by a Mobile Wallet? The term Mobile Wallet

More information

Why you MUST protect your customer data

Why you MUST protect your customer data Why you MUST protect your customer data If you think you re exempt from compliance with customer data security and privacy laws because you re a small business, think again. Businesses of all sizes are

More information

Card Not Present Fraud Webinar Transcript

Card Not Present Fraud Webinar Transcript Card Not Present Fraud Webinar Transcript All right let s go ahead and get things started, and to do that, I d like to turn it over to Fae Ghormley. Fae? Thank you for giving us this opportunity to share

More information

How TraitWare TM Can Secure and Simplify the Healthcare Industry

How TraitWare TM Can Secure and Simplify the Healthcare Industry How TraitWare TM Can Secure and Simplify the Healthcare Industry January 2015 Secure and Simplify Your Digital Life. Overview of HIPPA Authentication Standards When Title II of the Health Insurance Portability

More information

Enterprise On The Go: 5 Essentials For BYOD & Mobile Enablement

Enterprise On The Go: 5 Essentials For BYOD & Mobile Enablement Enterprise On The Go: 5 Essentials For BYOD & Mobile Enablement Introduction: The Opportunities & Challenges of Enterprise Mobility Apps & the Enterprise The existence of smartphones and tablets able to

More information

How to reduce the cost and complexity of two factor authentication

How to reduce the cost and complexity of two factor authentication WHITEPAPER How to reduce the cost and complexity of two factor authentication Published September 2012 48% of small and medium sized businesses consistently cite technical complexity and cost of ownership

More information

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1

More information

BEST SECURITY PRACTICES IN ONLINE BANKING PLATFORMS

BEST SECURITY PRACTICES IN ONLINE BANKING PLATFORMS BEST SECURITY PRACTICES IN ONLINE BANKING PLATFORMS TABLE OF CONTENTS BEST SECURITY PRACTICES Home banking platforms have been implemented as an ever more efficient 1 channel through for banking transactions.

More information

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to

More information

FCR The Driver of All Other Metrics

FCR The Driver of All Other Metrics 1 At SQM, we measure all major voice of the customer (VoC) metrics, such as customer satisfaction (Csat), ease of effort, net promoter score (NPS) and word of mouth index (WoMI). SQM also measures moments

More information

ehealth 2.0: How health systems can gain a leadership role in digital health Gerardo Aue, Stefan Biesdorf, Nicolaus Henke

ehealth 2.0: How health systems can gain a leadership role in digital health Gerardo Aue, Stefan Biesdorf, Nicolaus Henke ehealth 2.0: How health systems can gain a leadership role in digital health Gerardo Aue, Stefan Biesdorf, Nicolaus Henke Health systems around the world clearly recognise the potential of digital health;

More information

Service NSW Response to the Australian Payments Council Consultation Paper - "Viewpoints - Shaping the Future of Australian Payments"

Service NSW Response to the Australian Payments Council Consultation Paper - Viewpoints - Shaping the Future of Australian Payments Service NSW Service NSW Level2.66 Hawing ton Stre The Rocks NSW 2000 GPO Box 7057 Sydney NSW 2001 info@service. nsw. gov. au 13778B WWW. service. nay. gov. au ABN 37552837401 30 June 2015 Our ref: Di5-2083

More information

FINAL RECOMMENDATIONS FOR THE SECURITY OF PAYMENT ACCOUNT ACCESS SERVICES FOLLOWING THE PUBLIC CONSULTATION

FINAL RECOMMENDATIONS FOR THE SECURITY OF PAYMENT ACCOUNT ACCESS SERVICES FOLLOWING THE PUBLIC CONSULTATION FINAL RECOMMENDATIONS FOR THE SECURITY OF PAYMENT ACCOUNT ACCESS SERVICES FOLLOWING THE PUBLIC CONSULTATION NOTE: The final text of these Recommendations (Final Recommendations for the security of payment

More information

Financial Conduct Authority Mobile banking and payments

Financial Conduct Authority Mobile banking and payments Financial Conduct Authority Thematic Review TR14/15 Mobile banking and payments September 2014 Mobile banking and payments TR14/15 Contents 1 Executive summary 2 Introduction 2 High level findings 3 Who

More information

MASTERCARD PAYMENT GATEWAY SERVICES

MASTERCARD PAYMENT GATEWAY SERVICES MASTERCARD PAYMENT GATEWAY SERVICES OVERVIEW MAKING PAYMENTS SAFE, SIMPLE & SMART What are MasterCard Payment Gateway Services? Our Solutions Making payments safe, simple & smart for your customers, for

More information

G21 Provide hairdressing consultation services

G21 Provide hairdressing consultation services Provide hairdressing consultation services Level 3 Hairdressing Trainer Guidance Notes The Learning Support Unit you have recently purchased makes reference to Key/Core Skill Opportunities. From September

More information

Self-directed learning: managing yourself and your working relationships

Self-directed learning: managing yourself and your working relationships ASSERTIVENESS AND CONFLICT In this chapter we shall look at two topics in which the ability to be aware of and to manage what is going on within yourself is deeply connected to your ability to interact

More information

Internet PIN Debit: Aligning the Needs of Merchants, FIs and Consumers for Online Payments

Internet PIN Debit: Aligning the Needs of Merchants, FIs and Consumers for Online Payments Internet PIN Debit: Aligning the Needs of Merchants, FIs and Consumers for Online Payments By Javelin Strategy & Research June 2009 2009 Javelin Strategy & Research All Rights Reserved Executive Summary

More information

The Hidden Cost of Poor Advice: A Review of Investment Decision-Making and Governance in Local Government Pension Schemes ( LGPS ) Part 1

The Hidden Cost of Poor Advice: A Review of Investment Decision-Making and Governance in Local Government Pension Schemes ( LGPS ) Part 1 The Hidden Cost of Poor Advice: A Review of Investment Decision-Making and Governance in Local Government Pension Schemes ( LGPS ) Part 1 Universe and Data 99 Local Government Pension Schemes in England,

More information

FINAL NOTICE. 1.2. Nationwide has confirmed that it will not be referring the matter to the Financial Services and Markets Tribunal.

FINAL NOTICE. 1.2. Nationwide has confirmed that it will not be referring the matter to the Financial Services and Markets Tribunal. Financial Services Authority FINAL NOTICE To: Of: Nationwide Building Society Nationwide House Pipers Way Swindon SN38 1NW Date: 14 February 2007 TAKE NOTICE: The Financial Services Authority of 25 The

More information

Payments in India A Continuing Journey

Payments in India A Continuing Journey Payments in India A Continuing Journey It has been more than three years since we covered Indian Payments in volume 4 of the. Over this period RBI (Reserve Bank of India) and NPCI (National Payments Council

More information

Securing corporate assets with two factor authentication

Securing corporate assets with two factor authentication WHITEPAPER Securing corporate assets with two factor authentication Published July 2012 Contents Introduction Why static passwords are insufficient Introducing two-factor authentication Form Factors for

More information

Authentication Strategy: Balancing Security and Convenience

Authentication Strategy: Balancing Security and Convenience Authentication Strategy: Balancing Security and Convenience Today s Identity and Access Security Strategies Are Being Driven by Two Critical Imperatives: Enable business growth by: Quickly deploying new

More information

The Future of Direct Carrier Billing in Europe and e-money

The Future of Direct Carrier Billing in Europe and e-money The Future of Direct Carrier Billing in Europe and e-money Executive Summary The adoption of direct carrier billing (DCB), a type of mobile payment that allows consumers to charge the cost of a purchase

More information

WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program

WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program WhiteHat Security White Paper Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program October 2015 The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information

More information

When being a good lawyer is not enough: Understanding how In-house lawyers really create value

When being a good lawyer is not enough: Understanding how In-house lawyers really create value When being a good lawyer is not enough: Understanding how In-house lawyers really create value Contents Foreword... 3 Do you really understand how In-house lawyers create value?... 4 Why creating value

More information

Advanced Biometric Technology

Advanced Biometric Technology INC Internet Biometric Security Systems Internet Biometric Security System,Inc.White Papers Advanced Biometric Technology THE SIMPLE SOLUTION FOR IMPROVING ONLINE SECURITY Biometric Superiority Over Traditional

More information

MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION

MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION A SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PAIRED WITH THE FACT THAT THREATS

More information

Shared service centres

Shared service centres Report by the Comptroller and Auditor General Cabinet Office Shared service centres HC 16 SESSION 2016-17 20 MAY 2016 4 Key facts Shared service centres Key facts 90m estimated savings made to date by

More information

Tax-Free Childcare: consultation on childcare account provision

Tax-Free Childcare: consultation on childcare account provision Tax-Free Childcare: consultation on childcare account provision May 2014 Tax-Free Childcare: consultation on childcare account provision May 2014 Crown copyright 2014 You may re-use this information (excluding

More information

Best Practices for Driving the Fintech Digital Revolution

Best Practices for Driving the Fintech Digital Revolution EBOOK Best Practices for Driving the Fintech Digital Revolution Fintech innovation ultimately requires 3 critical elements: real-time data aggregation and intelligence, information security, and state-of-the-art

More information

LexisOne. LexisOne. Powered by Microsoft Dynamics AX 2012. EnterpriseSolutions

LexisOne. LexisOne. Powered by Microsoft Dynamics AX 2012. EnterpriseSolutions LexisOne Powered by Microsoft Dynamics AX 2012 LexisOne LexisOne powered by Microsoft Dynamics AX 2012 from LexisNexis goes beyond traditional practice management software currently available to legal

More information

Take the cost, complexity and frustration out of two-factor authentication

Take the cost, complexity and frustration out of two-factor authentication Take the cost, complexity and frustration out of two-factor authentication Combine physical and logical access control on a single card to address the challenges of strong authentication in network security

More information

Motivation Through Goal Setting: The Road to Success

Motivation Through Goal Setting: The Road to Success Motivation Through Goal Setting: The Road to Success In sports, as well as in life, it is important to set goals for yourself and also for your team. They will provide direction and identify areas which

More information

Position paper on the issue of access to the payment account

Position paper on the issue of access to the payment account Position paper on the issue of access to the payment account April 2013 Position paper on the issue of access to the payment account Consumentenbond Currence De Nederlandsche Bank Nederlandse Vereniging

More information

Automotive Compliance Showroom Manager process Training Module.

Automotive Compliance Showroom Manager process Training Module. Automotive Compliance Showroom Manager process Training Module. Mandatory Dealership Policy. ALL RETAIL customers must be taken through the Automotive Compliance Showroom Manager process, irrespective

More information

Advanced Authentication

Advanced Authentication White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is

More information

Banks Preparing for PSD. A Guide for Bankers on the Payment Services Directive

Banks Preparing for PSD. A Guide for Bankers on the Payment Services Directive Banks Preparing for PSD A Guide for Bankers on the Payment Services Directive Version 1.1, November 2008 About the Euro Banking Association (EBA) The Euro Banking Association (EBA) is a forum for the European

More information

Position Paper. BITKOM Position Paper "PSD 2" 14 th December 2014 page 1

Position Paper. BITKOM Position Paper PSD 2 14 th December 2014 page 1 14 th December 2014 page 1 The German Association for Information Technology, Telecommunications and New Media (BITKOM) represents more than 2,100 companies in Germany. Its 1,300 direct members generate

More information

Ericsson Mobile digital identity

Ericsson Mobile digital identity Ericsson Mobile digital identity (Views on delivering solutions and the Business case for the banking and finance community) pedro calderon head of Product line Authentication & digital identity Ericsson

More information

The Data Protection Landscape. Before and after GDPR: General Data Protection Regulation

The Data Protection Landscape. Before and after GDPR: General Data Protection Regulation The Data Protection Landscape Before and after GDPR: General Data Protection Regulation Data Protection regulations across Europe Current regulations & guidance European Directives 95/46/EC (Data Protection)

More information

SEYMOUR SLOAN IDEAS THAT MATTER MOVING BEYOND CUSTOMER EXPERIENCE TOWARDS CUSTOMER ENGAGEMENT - A WINNING APPROACH

SEYMOUR SLOAN IDEAS THAT MATTER MOVING BEYOND CUSTOMER EXPERIENCE TOWARDS CUSTOMER ENGAGEMENT - A WINNING APPROACH SEYMOUR SLOAN IDEAS THAT MATTER MOVING BEYOND CUSTOMER EXPERIENCE TOWARDS CUSTOMER - A WINNING APPROACH INTRODUCTION The traditional discussion within organisations has always focused around the customer

More information

Relationship Manager (Banking) Assessment Plan

Relationship Manager (Banking) Assessment Plan Relationship Manager (Banking) Assessment Plan ST0184/AP03 1. Introduction and Overview The Relationship Manager (Banking) is an apprenticeship that takes 3-4 years to complete and is at a Level 6. It

More information

DRIVING CHANGE WITH PSD2 AND THE MIF REGULATION

DRIVING CHANGE WITH PSD2 AND THE MIF REGULATION DRIVING CHANGE WITH PSD2 AND THE MIF REGULATION CREATING OPPORTUNITIES IN EUROPE WHITEPAPER EXECUTIVE SUMMARY The payments industry is developing rapidly, and nowhere faster than in ecommerce. Since 2007,

More information

Review of the European Union s proposal for a new directive on payment services ( PSD2 )

Review of the European Union s proposal for a new directive on payment services ( PSD2 ) 18 February 2014 Review of the European Union s proposal for a new directive on payment services ( PSD2 ) By Alistair Maughan and Simon Deane-Johns The European Union is in the process of updating its

More information

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Whitepaper on AuthShield Two Factor Authentication with ERP Applications Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password

More information

EBA s regulatory work on payments. Geoffroy Goffinet PAYMENT SYSTEMS MARKET EXPERT GROUP 03/12/2015

EBA s regulatory work on payments. Geoffroy Goffinet PAYMENT SYSTEMS MARKET EXPERT GROUP 03/12/2015 EBA s regulatory work on payments Geoffroy Goffinet PAYMENT SYSTEMS MARKET EXPERT GROUP 03/12/2015 The role of the EBA The EBA was established by Regulation (EC) No. 1093/2010 of the European Parliament

More information

IDENTITY SOLUTIONS: Security Beyond the Perimeter

IDENTITY SOLUTIONS: Security Beyond the Perimeter IDENTITY SOLUTIONS: Security Beyond the Perimeter 2016 Cloud Security Alliance All Rights Reserved All rights reserved. You may download, store, display on your computer, view, print, and link to the Cloud

More information

Compensation Reports: Eight Standards Every Nonprofit Should Know Before Selecting A Survey

Compensation Reports: Eight Standards Every Nonprofit Should Know Before Selecting A Survey The Tools You Need. The Experience You Can Trust. WHITE PAPER Compensation Reports: Eight Standards Every Nonprofit Should Know Before Selecting A Survey In today s tough economic climate, nonprofit organizations

More information

IDRBT Working Paper No. 11 Authentication factors for Internet banking

IDRBT Working Paper No. 11 Authentication factors for Internet banking IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased

More information

THE EVOLUTION OF CARD PAYMENTS IN THE TOURISM SECTOR

THE EVOLUTION OF CARD PAYMENTS IN THE TOURISM SECTOR THE EVOLUTION OF CARD PAYMENTS IN THE TOURISM SECTOR globalpaymentsinc.co.uk Page 2 3 FOREWORD Keeping up to date with consumers ever increasing appetite for faster, easier ways to pay throws a number

More information

Security in the smart grid

Security in the smart grid Security in the smart grid Security in the smart grid It s hard to avoid news reports about the smart grid, and one of the media s favorite topics is security, cyber security in particular. It s understandable

More information

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper Spotting ID Theft Red Flags A Guide for FACTA Compliance An IDology, Inc. Whitepaper With a November 1 st deadline looming for financial companies and creditors to comply with Sections 114 and 315 of the

More information

PayPoint.net Gateway Guide to Identifying Fraud Risks

PayPoint.net Gateway Guide to Identifying Fraud Risks PayPoint.net Gateway Guide to Identifying Fraud Risks Copyright PayPoint.net 2010 This document contains the proprietary information of PayPoint.net and may not be reproduced in any form or disclosed to

More information

COMPETENCY ACC LEVEL PCC LEVEL MCC LEVEL 1. Ethics and Standards

COMPETENCY ACC LEVEL PCC LEVEL MCC LEVEL 1. Ethics and Standards ICF CORE COMPETENCIES RATING LEVELS Adapted from the Minimum Skills Requirements documents for each credential level (Includes will-not-receive-passing-score criteria- gray background) COMPETENCY ACC LEVEL

More information

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive

More information

Grooming Your Business for Sale

Grooming Your Business for Sale PRIVATE COMPANIES Grooming Your Business for Sale Plan for the Future but Be Prepared for the Unexpected KPMG ENTERPRISE 2 Grooming Your Business for Sale Grooming Your Business for Sale Plan for the Future

More information

SECURE CUSTOMER DATA: ARE YOU AND YOUR CUSTOMERS AT RISK?

SECURE CUSTOMER DATA: ARE YOU AND YOUR CUSTOMERS AT RISK? SECURE CUSTOMER DATA: ARE YOU AND YOUR CUSTOMERS AT RISK? CONTENTS 1.0 EXECUTIVE SUMMARY 2.0 THE REAL COST OF DATA BREACHES TO THE RETAIL SECTOR 2.1 Cost of Reputation 3.0 DATA BREACHES IN EUROPE AND THE

More information

Financial Services and Technology Forum 4 December 2013. TOPIC: Mobile Payments

Financial Services and Technology Forum 4 December 2013. TOPIC: Mobile Payments Financial Services and Technology Forum 4 December 2013 Speakers: TOPIC: Mobile Payments Thibaut Kleiner, European Commission Mikkel Freltoft Krogsholm, CFIR Aoife Houlihan, Kreab Gavin Anderson Moderator:

More information

Trackunit Telematics Solution. for OEM

Trackunit Telematics Solution. for OEM Trackunit Telematics Solution for OEM Trackunit Telematics is an indispensable tool for improving your business through a deeper understanding of machine usage and customer behaviour. It enables you to

More information

Emotional Intelligence Self Assessment

Emotional Intelligence Self Assessment Emotional Intelligence Self Assessment Emotional Intelligence When people in the workplace do not act with Emotional Intelligence (EQ) the costs can be great: low morale, bitter conflict and stress all

More information

OUR CODE OF ETHICS. June 2013

OUR CODE OF ETHICS. June 2013 OUR CODE OF ETHICS. June 2013 OUR CODE OF ETHICS GUIDING PRINCIPLES Ethical behaviour is an integral part of the way we do business. It's crucial that all our stakeholders are able to trust us to treat

More information

Publishers Note. Anson Reed Limited 145-157 St John Street London EC1V 4PY United Kingdom. Anson Reed Limited and InterviewGold.

Publishers Note. Anson Reed Limited 145-157 St John Street London EC1V 4PY United Kingdom. Anson Reed Limited and InterviewGold. Publishers Note Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act, this publication may only be

More information

Top Authentication & Identification Methods to Protect Your Credit Union

Top Authentication & Identification Methods to Protect Your Credit Union Top Authentication & Identification Methods to Protect Your Credit Union Presented on: Thursday, May 7, 2 3 ET Co presented by: Ann Davidson VP of Risk Consulting at Allied Solutions Tammy Behnke Credit

More information

Multi-Factor Authentication

Multi-Factor Authentication Enhancing network security through the authentication process Multi-Factor Authentication Passwords, Smart Cards, and Biometrics INTRODUCTION Corporations today are investing more time and resources on

More information

6 Plastic and Electronic Banking

6 Plastic and Electronic Banking Plastic and Electronic Banking 137 6 Plastic and Electronic Banking Objectives By the end of this chapter, you should be able to: Outline the functions of online and telephone banking. Describe what is

More information

COURSE OBJECTIVES COURSE FORMAT

COURSE OBJECTIVES COURSE FORMAT NATIONAL UNIVERSITY OF SINGAPORE NUS Business School BMA 5406 Negotiations and Conflict Management Special Term 1, 11 May 20 Jun 2015 P1: Monday/Thursday, 6pm-9:30pm P2: Saturday, 8:30am-12pm, 1pm-4:30pm

More information

Solution Showcase 2016

Solution Showcase 2016 Solution Showcase 2016 Two taps booking Making travel and hospitality booking truly mobile, Scanovate's has developed a mobile image-based registration solution designed specifically for the business needs

More information

How Secure is your Authentication Technology?

How Secure is your Authentication Technology? How Secure is your Authentication Technology? Compare the merits and vulnerabilities of 1.5 Factor Authentication technologies available on the market today White Paper Introduction A key feature of any

More information

F I C O. February 22, 2011

F I C O. February 22, 2011 F I C O Fair Isaac Corporation 901 Marquette Avenue, Suite 3200 Minneapolis, M N 5 5 4 0 2 U S A T 6 1 2-7 5 8-5 2 0 0 F 6 1 2-7 5 8-5 2 0 1 www.fico.com February 22, 2011 Jennifer J. Johnson, Secretary

More information

Client Agreement document

Client Agreement document Client Agreement document for Burton and Fisher Financial Services Introduction This document is aimed at providing you with an overview of Burton and Fisher Financial Services and to introduce you to

More information

EXECUTIVE VIEW MYDIGIPASS.COM. KuppingerCole Report. by Alexei Balaganski August 2013. by Alexei Balaganski ab@kuppingercole.

EXECUTIVE VIEW MYDIGIPASS.COM. KuppingerCole Report. by Alexei Balaganski August 2013. by Alexei Balaganski ab@kuppingercole. KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski August 2013 by Alexei Balaganski ab@kuppingercole.com August 2013 Content 1 Introduction... 3 2 Product Description... 4 3 Strengths and Challenges...

More information

IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Increasing Productivity with Mobile Integration.

Increasing Productivity with Mobile Integration. 1 Mobile Medicine: Increasing Productivity with Mobile Integration. Executive Summary Mobile devices smartphone or tablet computers are everywhere increasing effectiveness and efficiency in everyday life.

More information