Understanding the Points of Differentiation Between PSD and PSD2
|
|
- Helena Chandler
- 7 years ago
- Views:
Transcription
1 ABSTRACT The use of biometric authentication to combat fraud and improve the authentication experience for users is widely understood by banks and payment system providers. But, in light of the recent directives around the PSD2 regulation, is there more value in biometrics for banks than meets the eye? Biometrics and PSD2 Copyright AimBrain Solutions Ltd. All rights reserved.
2 Executive Summary The use of biometric authentication to combat fraud and improve the authentication experience for users is widely understood by banks and payment system providers. But, in light of the recent directives around the PSD2 regulation, is there more value in biometrics for banks than meets the eye? As banks and payment providers work towards implementing PSD2, many are asking whether or not biometric authentication can perhaps help address the ever-growing challenge of complying with these regulations. This whitepaper will look to answer these questions and examine the new PSD2 directive on payment services and provide practical implementation advice. Understanding the History of PSD2 Before we look at the issues and how we can overcome them, we need to understand PSD2 and how it is going to change the payments landscape. In 2007, a Directive on Payment Services (PSD) was adopted to create a single market for payments within the European Union. Rules were created along with guidelines for modernising payment processing across Europe with the key aim of simplification. The latest version of the directive remains true to this objective of ease and simplification. It continues to clearly emphasize two key goals one, promote competition from new market entrants and two, reduce costs. While the original PSD achieved good progress towards this, continuous feedback from the market was that it still did not create a level playing field for market participants. As a result, an updated directive, Directive on Payment Services 2 (or PSD2) was proposed in Three years later, on January 12 th 2016, PSD2 came into force and will be implemented into national law of member states by 13 th January (*Note that the impact a Brexit will have on PSD2 will be the subject of another whitepaper in this series.) Why PSD2? So now that the directive is enforced, let s understand in-depth what PSD2 is trying to achieve: Improved consumer protections through strong customer authentication or through the use of a risk-based approach to authentication Standardised, integrated, and overall improved payment efficiency in the European Union Promotion of innovation in the payment space Cost reduction in the payment space Improved clarity on the use of mobile payments and other emerging payment methods Ease-of-entry for new payment service providers (referred to as third party providers, TPPs) through enabling new services: Payment Initiation Services (PIS) and Account Information Services (AIS) Harmonised pricing and improved security of payment processing across the European Union Incorporation of new and emerging payment services into the regulation Understanding the Points of Differentiation Between PSD and PSD2 To understand the changes from PSD to PSD2, let s look at one key practical difference. Today, when a consumer purchases online, they must enter details onto a merchant s website. The retailer receives the money via a number of intermediaries. Under PSD2, the retailer will be able to ask the consumer Copyright AimBrain Solutions Ltd. All rights reserved. P a g e 1
3 aka Payment Service User (PSU) for permission to use their bank details. The PSU will then be required to authenticate with his/her bank or the Account Servicing Payment Service Provider (ASPSP) using multifactor authentication. Once authenticated, and successfully authorised, the retailer will receive the payment directly from PSUs bank thus making the use of an intermediary (schemes and acquirers) no longer necessary. How does this happen? To start, the retailer can now connect directly to the bank using an Application Programming Interface (API). In payment IT terms the availability of this API means that companies can connect to banks directly. Clearly, there is going to be a wave of new Fintech companies that can now provide services that they had previously not been able to. This is where PIS and AIS providers have the opportunity to really innovate and change the payment landscape. In today s environment, if you have multiple bank relationships you need to get details (such as a balance) from each bank separately. PSD2 simplifies this by enabling you to view all of your bank details on one single portal by introducing Account Information Service Providers (AISP s). AISP s will provide the Payment Service User (PSU) with aggregated online information on one or more payment accounts held with one or more other payment service providers and accessed via online interfaces of the account servicing payment service provider (ASPSP). The PSU is thus able to have an overall view of his/her financial situation immediately and at any given moment. So What About Biometric Authentication? With PSD2 comes a host of new consumer protections. These protections range from new refund rights around direct debits to limiting credit card charges to enhanced fraud protections. It also adds the need for stronger customer authentication. Enter biometric authentication. Going forward, PSPs are required to apply "strong customer authentication" measures when a PSU initiates "an electronic payment transaction". What does stronger customer authentication mean? Put simply, it means that a Payment Service Provider (PSP) should now be confident that the Payment Service User (PSU) is truly and accurately who the PSUs says they are. To ensure that this happens, PSD2 has tightened up the authentication rules significantly. From an official regulatory perspective, Stronger Customer Authentication is defined by the Commission as "a procedure for the validation of the identification of a natural or legal person based on the use of two or more elements categorised as knowledge, possession and inherence that are independent, in that the breach of one does not compromise the reliability of the others and is designed in such a way as to protect the confidentiality of the authentication data". In practical payment speak, this means multi-factor authentication. Let s now look more closely at the words knowledge, possession, and inherence: Knowledge o This is something only a user will know such as a PIN Possession o This is something only the user possesses such as a token Copyright AimBrain Solutions Ltd. All rights reserved. P a g e 2
4 Inherence o This is something that only the user is such as a biometric Before we examine the practical implementation and opportunities that this part of the regulation presents, we need to understand how important it is for banks to comply with the multi-factor authentication. To do this, let s discuss what will happen to a bank if it fails to implement the Stronger Authentication for Payments aspect of PSD2. Any bank that fails to apply the Strong Authentication for Payments cannot require payers to "bear any financial consequences" unless the payer has acted fraudulently. Additionally, a PSP would be required to compensate other PSPs or even intermediaries of the PSP "for any losses incurred or sums paid" by those other businesses as a result of their failure to apply strong customer authentication. Clearly this is very important and there is even more to it. Third party PSPs that initiate payment transactions are also required to ensure they apply Strong Customer Authentication. As per PSD2, third parties should be free "to rely on the authentication methods" of ASPSPs "when acting on behalf of the payment service user". In terms of practical implementation, it is most likely that banks will rely on the knowledge factor option such as a PIN but could decide to choose between possession and inherence as the second factor of authentication. This is where we need to turn our attention to the consumer or PSU and how PSP s will need to offer consumer-friendly solutions in order to win and retain market share. It is our opinion that relying on possession as the second factor of authentication will not the preferred option. While a possession-focused solution would be technologically strong it may not provide the level of accuracy required to achieve Stronger Authentication. Possession-focused solutions have been known to have more points failure and may be more susceptible to fraud attacks. Additionally, a possession-focused solution is not particularly consumerfriendly, potentially sacrificing market share and competitive advantages for the PSP. As an alternative, many banks are looking into inherence options to address the second factor of authentication. One such option is biometrics. Why? Because quite simply, it is much more difficult to fraud a biometric device than it is to steal something in a user s possession. Using inherence as that second factor caters to both security requirements and the user experience priorities of PSPs giving them the best of both worlds so to speak. Furthermore, with mobile devices becoming more prominent in the consumer s daily life and smartphones an extension of their social and digital identity, it is important to consider the impact of a user- unfriendly experience. Copyright AimBrain Solutions Ltd. All rights reserved. P a g e 3
5 Biometric Authentication is consumer-friendly. It works in real-time and is extremely easy for banks to implement. It provides banks with better user experience capabilities and better risk management. Additionally, and very importantly, it addresses the requirements for Stronger Authentication through more accurate validation. Biometric technology makes identity fraud less likely. This means that banks can save time and money and at the same fight fraud. While a future whitepaper will discuss the strengths and weaknesses of biometrics in more detail, banks have already begun to actively look at and evaluate behavioural-specific biometrics for authentication as the way to comply with PSD2. Why? Because behavioural authentication provides the necessary balance between security and a positive customer experience. By being able to assess the customer s behaviour, banks/aspsps are able to assess the level of risk and subsequently, the level of authentication required for the specific scenario. This benefit and capability is extremely important because per PSD2, PSPs can be exempted from applying strong customer authentication when the associated risk is low. Also, because behavioural authentication runs in the background it is invisible to users. It does not infringe the customer journey and therefore does not sacrifice the quality of the user experience all while providing rigorous customer authentication. Banks using inherence (specifically behavioural biometrics) as their second authentication factor, importantly have somewhere to go. They have the ability to incorporate another layer of security into their authentication protocol if a high-risk is identified during the process. Rather than declining the user, they can step-up their authentication in these high-risk scenarios identified by behavioural biometrics by deciding to use possession as a third factor of authentication. Adding this additional layer helps to prevent a negative customer journey. How Does It Work? The Behavioural Biometric Use Case 1. User enters a mobile payment app and enters a PIN (Knowledge factor, tick). 2. Behavioural Authentication provides the bank with a session score so the bank knows whether the user really is who they say they are (Inherence factor, tick). 3. Behavioural Authentication Session Score is sent to the bank all the time the user is in the app important as the Strong Customer Authentication needs to be at the point of payment (Inherence factor tick). Copyright AimBrain Solutions Ltd. All rights reserved. P a g e 4
6 Summary In summary, there are a few key points to keep in mind when working towards implementing PSD2 compliance practices: Banks/ASPSPs will need to make significant changes to align with PSD2. Public APIs will need to be opened to PIS and AIS players Multi-factor authentication will need to be incorporated to ensure strong customer authentication. Security credentials will need to align with at least two of the three option: i) Knowledge ii) Possession and iii) Inherence It is assumed that Knowledge will be one of the factors used for authentication Low risk transactions can be exempted from strong customer authentication Inherence provides a stronger authentication and better customer journey Biometrics and Behavioural pattern helps assess the risk which can drive the need for multifactor authentication About the Author, AimBrain AimBrain, a next-generation biometrics engineering company, helps financial institutions easily, securely, and accurately authenticate their mobile banking users. Using a patent-pending, context-based step-up authentication methodology, AimBrain is helping some of the world s largest financial institutions know if their users really are who they say they are. AimBrain delivers advanced biometrics technology to banks so they can stay ahead of mobile fraud through a secure and frictionless authentication experience. Supported by Episode1, a leading UK venture capitalist, AimBrain is largely recognised for their potential to revolutionise the world of money and has been named as a 2016 FinTech50 finalist. Contributors Andrew McFarlane and Anshuman Bhardwaj from Accenture. Copyright AimBrain Solutions Ltd. All rights reserved. P a g e 5
Securing Internet Payments across Europe. Guidelines for Detecting and Preventing Fraud
Securing Internet Payments across Europe Guidelines for Detecting and Preventing Fraud Table of Contents Executive Summary Protecting Internet Payments: A Top Priority for All Stakeholders European Central
More informationGeneral Comments and Replies to Questions
DRAFT BSG RESPONSE TO EBA/DP/2015/03 ON FUTURE DRAFT REGULATORY TECHNICAL STANDARDS ON STRONG CUSTOMER AUTHENTICATION AND SECURE COMMUNICATION UNDER THE REVISED PAYMENT SERVICES DIRECTIVE (PSD2) General
More informationEBA STRONG AUTHENTICATION REQUIREMENTS
EBA STRONG AUTHENTICATION REQUIREMENTS FOR INTERNET PAYMENTS IN EU TO BE IMPLEMENTED BY AUGUST 1 ST 2015 LEGAL WHITEPAPER What are the strong authentication requirements under EBA Guidelines which European
More information5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business. An IDology, Inc. Whitepaper
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business An IDology, Inc. Whitepaper No matter how big your company is or what industry you are in, every business typically
More informationFinTech Focus: New European Directive on Payment Services (PSD2) Comes into Force
February 1, 2016 FinTech Focus: New European Directive on Payment Services (PSD2) Comes into Force By Simon Deane-Johns and Susan McLean On 12 January 2016, the long-awaited revised Payment Services Directive
More informationCA Viewpoint. Meeting the European Banking Authority Guidelines and EU Payment Security Directive for Secure Authentication
EXECUTIVE BRIEF AUGUST 2015 CA Viewpoint Summary of European Banking Authority Guidelines and How CA Can Help Meeting the European Banking Authority Guidelines and EU Payment Security Directive for Secure
More informationW3C Web Payment IG. Payment Service Providers. Alibaba Zephyr Tuan
W3C Web Payment IG Payment Service Providers Alibaba Zephyr Tuan 01 Internet Finance Ecosystem in China 02 Payment Service Provider Requirements 03 Open Questions 01 When Internet Meet Finance Internet
More informationGuide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
More informationIndustry Briefing: Security of Internet Payments - Legislative Developments in Europe
Industry Briefing: Security of Internet Payments - Legislative Developments in Europe Copyright 2015 VASCO Data Security. All rights reserved. No part of this publication may be reproduced, stored in a
More informationSecuring Internet Payments. The current regulatory state of play
Securing Internet Payments The current regulatory state of play In recent years the European Union (EU) institutions have shown a growing interest on the security of electronic payments. This interest
More informationONLINE AND MOBILE BANKING, YOUR RISKS COVERED
ONLINE AND MOBILE BANKING, YOUR RISKS COVERED WITH KASPERSKY FRAUD PREVENTION ONLINE AND MOBILE BANKING, YOUR RISKS COVERED WITH KASPERSKY FRAUD PREVENTION Financial fraud is a serious risk with damaging
More informationTHE NEW INTERNATIONALS. Updating perceptions of SMEs in an increasingly globalised world
THE NEW INTERNATIONALS Updating perceptions of SMEs in an increasingly globalised world Contents Introduction 5 Born Global 6 International Futures 7 Supporting UK SMEs 8 UK Regions 9 Conclusion 10 About
More informationPSD2 Regulating a New Payments World Patterns of Expertise The quest for a
PSD2 Regulating a New Payments World Patterns of Expertise The quest for a A Guide from Icon Solutions By Tom Hay, Head of Payments December 2014 Overview The European Union has been drafting new legislation
More informationEACT COMMENTS ON THE COMMISSION PROPOSAL FOR PAYMENT SERVICES DIRECTIVE II
EACT COMMENTS ON THE COMMISSION PROPOSAL FOR PAYMENT SERVICES DIRECTIVE II 9 May 2014 1. Introduction The EACT supports a competitive and integrated European payments market and has since many years been
More informationInterchange fee regulation: consultation response
Interchange fee regulation: consultation response October 2015 Interchange fee regulation: consultation response October 2015 Crown copyright 2015 This publication is licensed under the terms of the Open
More informationHow To Write A New Payment Services Directive
Proposal for a revised Payment Services Directive BEUC position Contact: Financial Services Team financialservices@beuc.eu Ref.: X/2013/079-27/11/2013 BUREAU EUROPÉEN DES UNIONS DE CONSOMMATEURS AISBL
More informationDP on future RTS on strong customer and secure communication under PSD2 EBA/DP/2015/03. 8 December 2015. Discussion Paper
EBA/DP/2015/03 8 December 2015 Discussion Paper on future Draft Regulatory Technical Standards on strong customer authentication and secure communication under the revised Payment Services Directive (PSD2)
More informationUsing Strong Authentication for Preventing Identity Theft
Position Paper Using Strong Authentication for Preventing Identity Theft Robert Pinheiro Consulting LLC Better identity authentication has been proposed as a potential solution not only to identity theft,
More informationWHITE PAPER. How to simplify and control the cardholder security environment
WHITE PAPER How to simplify and control the cardholder security environment Document Version V1-0 Document Set: QCC Information Security Prepared By Nick Prescot - QCC Information Security Ltd Sponsored
More informationActorcard Prepaid Visa Card Terms & Conditions
Actorcard Prepaid Visa Card Terms & Conditions These Terms & Conditions apply to your Actorcard prepaid Visa debit card. Please read them carefully. In these Terms & Conditions: "Account" means the prepaid
More informationPosition Paper e-payments
Position Paper e-payments 10 Recommendations for a Stronger e-payments Landscape in Europe www.ecommerce-europe.eu POSITION PAPER 3 Introduction: Ecommerce Europe Ecommerce Europe (www.ecommerce-europe.eu)
More informationTranform Multi-Factor Authentication from "Something You Have" to "Something You Already Have"
Tranform Multi-Factor Authentication from "Something You Have" to "Something You Already Have" DIGIPASS Embedded Solutions White Paper DIGIPASS Embedded Solutions White Paper Page 1 of 14 2009 VASCO Data
More informationMemorandum Regulating EU mobile, internet and card payments
Keynote speech linked to country-specific consumer protection legislation, but could often be removed through appropriate legislation. The EU legislators have taken action in recent years, firstly with
More informationPayment Card Industry (PCI) Data Security Standard. PCI DSS Applicability in an EMV Environment A Guidance Document Version 1
Payment Card Industry (PCI) Data Security Standard PCI DSS Applicability in an EMV Environment A Guidance Document Version 1 Release date: 5 October 2010 Table of Contents 1 Executive Summary... 3 1.1
More informationUser Authentication for Software-as-a-Service (SaaS) Applications White Paper
User Authentication for Software-as-a-Service (SaaS) Applications White Paper User Authentication for Software-as-a-Service (SaaS) Applications White Paper Page 1 of 16 DISCLAIMER Disclaimer of Warranties
More informationHDE position on legislative package to regulate payment systems (MIF and PSD II)
[Transparency Register No.: 31200871765-41] HDE position on legislative package to regulate payment systems (MIF and PSD II) November 2013 I. Einleitung I. Introduction The German Retail Federation HDE
More informationOpinion piece. The mobile wallet already exists! It s called mobile banking. By Simon Cadbury Head of Strategy & Innovation Intelligent Environments
Opinion piece The mobile wallet already exists! It s called mobile banking By Simon Cadbury Head of Strategy & Innovation Intelligent Environments What do we mean by a Mobile Wallet? The term Mobile Wallet
More informationWhy you MUST protect your customer data
Why you MUST protect your customer data If you think you re exempt from compliance with customer data security and privacy laws because you re a small business, think again. Businesses of all sizes are
More informationCard Not Present Fraud Webinar Transcript
Card Not Present Fraud Webinar Transcript All right let s go ahead and get things started, and to do that, I d like to turn it over to Fae Ghormley. Fae? Thank you for giving us this opportunity to share
More informationHow TraitWare TM Can Secure and Simplify the Healthcare Industry
How TraitWare TM Can Secure and Simplify the Healthcare Industry January 2015 Secure and Simplify Your Digital Life. Overview of HIPPA Authentication Standards When Title II of the Health Insurance Portability
More informationEnterprise On The Go: 5 Essentials For BYOD & Mobile Enablement
Enterprise On The Go: 5 Essentials For BYOD & Mobile Enablement Introduction: The Opportunities & Challenges of Enterprise Mobility Apps & the Enterprise The existence of smartphones and tablets able to
More informationHow to reduce the cost and complexity of two factor authentication
WHITEPAPER How to reduce the cost and complexity of two factor authentication Published September 2012 48% of small and medium sized businesses consistently cite technical complexity and cost of ownership
More informationStrong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1
More informationBEST SECURITY PRACTICES IN ONLINE BANKING PLATFORMS
BEST SECURITY PRACTICES IN ONLINE BANKING PLATFORMS TABLE OF CONTENTS BEST SECURITY PRACTICES Home banking platforms have been implemented as an ever more efficient 1 channel through for banking transactions.
More informationWhitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers
Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to
More informationFCR The Driver of All Other Metrics
1 At SQM, we measure all major voice of the customer (VoC) metrics, such as customer satisfaction (Csat), ease of effort, net promoter score (NPS) and word of mouth index (WoMI). SQM also measures moments
More informationehealth 2.0: How health systems can gain a leadership role in digital health Gerardo Aue, Stefan Biesdorf, Nicolaus Henke
ehealth 2.0: How health systems can gain a leadership role in digital health Gerardo Aue, Stefan Biesdorf, Nicolaus Henke Health systems around the world clearly recognise the potential of digital health;
More informationService NSW Response to the Australian Payments Council Consultation Paper - "Viewpoints - Shaping the Future of Australian Payments"
Service NSW Service NSW Level2.66 Hawing ton Stre The Rocks NSW 2000 GPO Box 7057 Sydney NSW 2001 info@service. nsw. gov. au 13778B WWW. service. nay. gov. au ABN 37552837401 30 June 2015 Our ref: Di5-2083
More informationFINAL RECOMMENDATIONS FOR THE SECURITY OF PAYMENT ACCOUNT ACCESS SERVICES FOLLOWING THE PUBLIC CONSULTATION
FINAL RECOMMENDATIONS FOR THE SECURITY OF PAYMENT ACCOUNT ACCESS SERVICES FOLLOWING THE PUBLIC CONSULTATION NOTE: The final text of these Recommendations (Final Recommendations for the security of payment
More informationFinancial Conduct Authority Mobile banking and payments
Financial Conduct Authority Thematic Review TR14/15 Mobile banking and payments September 2014 Mobile banking and payments TR14/15 Contents 1 Executive summary 2 Introduction 2 High level findings 3 Who
More informationMASTERCARD PAYMENT GATEWAY SERVICES
MASTERCARD PAYMENT GATEWAY SERVICES OVERVIEW MAKING PAYMENTS SAFE, SIMPLE & SMART What are MasterCard Payment Gateway Services? Our Solutions Making payments safe, simple & smart for your customers, for
More informationG21 Provide hairdressing consultation services
Provide hairdressing consultation services Level 3 Hairdressing Trainer Guidance Notes The Learning Support Unit you have recently purchased makes reference to Key/Core Skill Opportunities. From September
More informationSelf-directed learning: managing yourself and your working relationships
ASSERTIVENESS AND CONFLICT In this chapter we shall look at two topics in which the ability to be aware of and to manage what is going on within yourself is deeply connected to your ability to interact
More informationInternet PIN Debit: Aligning the Needs of Merchants, FIs and Consumers for Online Payments
Internet PIN Debit: Aligning the Needs of Merchants, FIs and Consumers for Online Payments By Javelin Strategy & Research June 2009 2009 Javelin Strategy & Research All Rights Reserved Executive Summary
More informationThe Hidden Cost of Poor Advice: A Review of Investment Decision-Making and Governance in Local Government Pension Schemes ( LGPS ) Part 1
The Hidden Cost of Poor Advice: A Review of Investment Decision-Making and Governance in Local Government Pension Schemes ( LGPS ) Part 1 Universe and Data 99 Local Government Pension Schemes in England,
More informationFINAL NOTICE. 1.2. Nationwide has confirmed that it will not be referring the matter to the Financial Services and Markets Tribunal.
Financial Services Authority FINAL NOTICE To: Of: Nationwide Building Society Nationwide House Pipers Way Swindon SN38 1NW Date: 14 February 2007 TAKE NOTICE: The Financial Services Authority of 25 The
More informationPayments in India A Continuing Journey
Payments in India A Continuing Journey It has been more than three years since we covered Indian Payments in volume 4 of the. Over this period RBI (Reserve Bank of India) and NPCI (National Payments Council
More informationSecuring corporate assets with two factor authentication
WHITEPAPER Securing corporate assets with two factor authentication Published July 2012 Contents Introduction Why static passwords are insufficient Introducing two-factor authentication Form Factors for
More informationAuthentication Strategy: Balancing Security and Convenience
Authentication Strategy: Balancing Security and Convenience Today s Identity and Access Security Strategies Are Being Driven by Two Critical Imperatives: Enable business growth by: Quickly deploying new
More informationThe Future of Direct Carrier Billing in Europe and e-money
The Future of Direct Carrier Billing in Europe and e-money Executive Summary The adoption of direct carrier billing (DCB), a type of mobile payment that allows consumers to charge the cost of a purchase
More informationWhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program
WhiteHat Security White Paper Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program October 2015 The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information
More informationWhen being a good lawyer is not enough: Understanding how In-house lawyers really create value
When being a good lawyer is not enough: Understanding how In-house lawyers really create value Contents Foreword... 3 Do you really understand how In-house lawyers create value?... 4 Why creating value
More informationAdvanced Biometric Technology
INC Internet Biometric Security Systems Internet Biometric Security System,Inc.White Papers Advanced Biometric Technology THE SIMPLE SOLUTION FOR IMPROVING ONLINE SECURITY Biometric Superiority Over Traditional
More informationMODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION
Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION A SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PAIRED WITH THE FACT THAT THREATS
More informationShared service centres
Report by the Comptroller and Auditor General Cabinet Office Shared service centres HC 16 SESSION 2016-17 20 MAY 2016 4 Key facts Shared service centres Key facts 90m estimated savings made to date by
More informationTax-Free Childcare: consultation on childcare account provision
Tax-Free Childcare: consultation on childcare account provision May 2014 Tax-Free Childcare: consultation on childcare account provision May 2014 Crown copyright 2014 You may re-use this information (excluding
More informationBest Practices for Driving the Fintech Digital Revolution
EBOOK Best Practices for Driving the Fintech Digital Revolution Fintech innovation ultimately requires 3 critical elements: real-time data aggregation and intelligence, information security, and state-of-the-art
More informationLexisOne. LexisOne. Powered by Microsoft Dynamics AX 2012. EnterpriseSolutions
LexisOne Powered by Microsoft Dynamics AX 2012 LexisOne LexisOne powered by Microsoft Dynamics AX 2012 from LexisNexis goes beyond traditional practice management software currently available to legal
More informationTake the cost, complexity and frustration out of two-factor authentication
Take the cost, complexity and frustration out of two-factor authentication Combine physical and logical access control on a single card to address the challenges of strong authentication in network security
More informationMotivation Through Goal Setting: The Road to Success
Motivation Through Goal Setting: The Road to Success In sports, as well as in life, it is important to set goals for yourself and also for your team. They will provide direction and identify areas which
More informationPosition paper on the issue of access to the payment account
Position paper on the issue of access to the payment account April 2013 Position paper on the issue of access to the payment account Consumentenbond Currence De Nederlandsche Bank Nederlandse Vereniging
More informationAutomotive Compliance Showroom Manager process Training Module.
Automotive Compliance Showroom Manager process Training Module. Mandatory Dealership Policy. ALL RETAIL customers must be taken through the Automotive Compliance Showroom Manager process, irrespective
More informationAdvanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
More informationBanks Preparing for PSD. A Guide for Bankers on the Payment Services Directive
Banks Preparing for PSD A Guide for Bankers on the Payment Services Directive Version 1.1, November 2008 About the Euro Banking Association (EBA) The Euro Banking Association (EBA) is a forum for the European
More informationPosition Paper. BITKOM Position Paper "PSD 2" 14 th December 2014 page 1
14 th December 2014 page 1 The German Association for Information Technology, Telecommunications and New Media (BITKOM) represents more than 2,100 companies in Germany. Its 1,300 direct members generate
More informationEricsson Mobile digital identity
Ericsson Mobile digital identity (Views on delivering solutions and the Business case for the banking and finance community) pedro calderon head of Product line Authentication & digital identity Ericsson
More informationThe Data Protection Landscape. Before and after GDPR: General Data Protection Regulation
The Data Protection Landscape Before and after GDPR: General Data Protection Regulation Data Protection regulations across Europe Current regulations & guidance European Directives 95/46/EC (Data Protection)
More informationSEYMOUR SLOAN IDEAS THAT MATTER MOVING BEYOND CUSTOMER EXPERIENCE TOWARDS CUSTOMER ENGAGEMENT - A WINNING APPROACH
SEYMOUR SLOAN IDEAS THAT MATTER MOVING BEYOND CUSTOMER EXPERIENCE TOWARDS CUSTOMER - A WINNING APPROACH INTRODUCTION The traditional discussion within organisations has always focused around the customer
More informationRelationship Manager (Banking) Assessment Plan
Relationship Manager (Banking) Assessment Plan ST0184/AP03 1. Introduction and Overview The Relationship Manager (Banking) is an apprenticeship that takes 3-4 years to complete and is at a Level 6. It
More informationDRIVING CHANGE WITH PSD2 AND THE MIF REGULATION
DRIVING CHANGE WITH PSD2 AND THE MIF REGULATION CREATING OPPORTUNITIES IN EUROPE WHITEPAPER EXECUTIVE SUMMARY The payments industry is developing rapidly, and nowhere faster than in ecommerce. Since 2007,
More informationReview of the European Union s proposal for a new directive on payment services ( PSD2 )
18 February 2014 Review of the European Union s proposal for a new directive on payment services ( PSD2 ) By Alistair Maughan and Simon Deane-Johns The European Union is in the process of updating its
More informationWhitepaper on AuthShield Two Factor Authentication with ERP Applications
Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password
More informationEBA s regulatory work on payments. Geoffroy Goffinet PAYMENT SYSTEMS MARKET EXPERT GROUP 03/12/2015
EBA s regulatory work on payments Geoffroy Goffinet PAYMENT SYSTEMS MARKET EXPERT GROUP 03/12/2015 The role of the EBA The EBA was established by Regulation (EC) No. 1093/2010 of the European Parliament
More informationIDENTITY SOLUTIONS: Security Beyond the Perimeter
IDENTITY SOLUTIONS: Security Beyond the Perimeter 2016 Cloud Security Alliance All Rights Reserved All rights reserved. You may download, store, display on your computer, view, print, and link to the Cloud
More informationCompensation Reports: Eight Standards Every Nonprofit Should Know Before Selecting A Survey
The Tools You Need. The Experience You Can Trust. WHITE PAPER Compensation Reports: Eight Standards Every Nonprofit Should Know Before Selecting A Survey In today s tough economic climate, nonprofit organizations
More informationIDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
More informationTHE EVOLUTION OF CARD PAYMENTS IN THE TOURISM SECTOR
THE EVOLUTION OF CARD PAYMENTS IN THE TOURISM SECTOR globalpaymentsinc.co.uk Page 2 3 FOREWORD Keeping up to date with consumers ever increasing appetite for faster, easier ways to pay throws a number
More informationSecurity in the smart grid
Security in the smart grid Security in the smart grid It s hard to avoid news reports about the smart grid, and one of the media s favorite topics is security, cyber security in particular. It s understandable
More informationSpotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper
Spotting ID Theft Red Flags A Guide for FACTA Compliance An IDology, Inc. Whitepaper With a November 1 st deadline looming for financial companies and creditors to comply with Sections 114 and 315 of the
More informationPayPoint.net Gateway Guide to Identifying Fraud Risks
PayPoint.net Gateway Guide to Identifying Fraud Risks Copyright PayPoint.net 2010 This document contains the proprietary information of PayPoint.net and may not be reproduced in any form or disclosed to
More informationCOMPETENCY ACC LEVEL PCC LEVEL MCC LEVEL 1. Ethics and Standards
ICF CORE COMPETENCIES RATING LEVELS Adapted from the Minimum Skills Requirements documents for each credential level (Includes will-not-receive-passing-score criteria- gray background) COMPETENCY ACC LEVEL
More informationBeyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
More informationGrooming Your Business for Sale
PRIVATE COMPANIES Grooming Your Business for Sale Plan for the Future but Be Prepared for the Unexpected KPMG ENTERPRISE 2 Grooming Your Business for Sale Grooming Your Business for Sale Plan for the Future
More informationSECURE CUSTOMER DATA: ARE YOU AND YOUR CUSTOMERS AT RISK?
SECURE CUSTOMER DATA: ARE YOU AND YOUR CUSTOMERS AT RISK? CONTENTS 1.0 EXECUTIVE SUMMARY 2.0 THE REAL COST OF DATA BREACHES TO THE RETAIL SECTOR 2.1 Cost of Reputation 3.0 DATA BREACHES IN EUROPE AND THE
More informationFinancial Services and Technology Forum 4 December 2013. TOPIC: Mobile Payments
Financial Services and Technology Forum 4 December 2013 Speakers: TOPIC: Mobile Payments Thibaut Kleiner, European Commission Mikkel Freltoft Krogsholm, CFIR Aoife Houlihan, Kreab Gavin Anderson Moderator:
More informationTrackunit Telematics Solution. for OEM
Trackunit Telematics Solution for OEM Trackunit Telematics is an indispensable tool for improving your business through a deeper understanding of machine usage and customer behaviour. It enables you to
More informationEmotional Intelligence Self Assessment
Emotional Intelligence Self Assessment Emotional Intelligence When people in the workplace do not act with Emotional Intelligence (EQ) the costs can be great: low morale, bitter conflict and stress all
More informationOUR CODE OF ETHICS. June 2013
OUR CODE OF ETHICS. June 2013 OUR CODE OF ETHICS GUIDING PRINCIPLES Ethical behaviour is an integral part of the way we do business. It's crucial that all our stakeholders are able to trust us to treat
More informationPublishers Note. Anson Reed Limited 145-157 St John Street London EC1V 4PY United Kingdom. Anson Reed Limited and InterviewGold.
Publishers Note Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act, this publication may only be
More informationTop Authentication & Identification Methods to Protect Your Credit Union
Top Authentication & Identification Methods to Protect Your Credit Union Presented on: Thursday, May 7, 2 3 ET Co presented by: Ann Davidson VP of Risk Consulting at Allied Solutions Tammy Behnke Credit
More informationMulti-Factor Authentication
Enhancing network security through the authentication process Multi-Factor Authentication Passwords, Smart Cards, and Biometrics INTRODUCTION Corporations today are investing more time and resources on
More information6 Plastic and Electronic Banking
Plastic and Electronic Banking 137 6 Plastic and Electronic Banking Objectives By the end of this chapter, you should be able to: Outline the functions of online and telephone banking. Describe what is
More informationCOURSE OBJECTIVES COURSE FORMAT
NATIONAL UNIVERSITY OF SINGAPORE NUS Business School BMA 5406 Negotiations and Conflict Management Special Term 1, 11 May 20 Jun 2015 P1: Monday/Thursday, 6pm-9:30pm P2: Saturday, 8:30am-12pm, 1pm-4:30pm
More informationSolution Showcase 2016
Solution Showcase 2016 Two taps booking Making travel and hospitality booking truly mobile, Scanovate's has developed a mobile image-based registration solution designed specifically for the business needs
More informationHow Secure is your Authentication Technology?
How Secure is your Authentication Technology? Compare the merits and vulnerabilities of 1.5 Factor Authentication technologies available on the market today White Paper Introduction A key feature of any
More informationF I C O. February 22, 2011
F I C O Fair Isaac Corporation 901 Marquette Avenue, Suite 3200 Minneapolis, M N 5 5 4 0 2 U S A T 6 1 2-7 5 8-5 2 0 0 F 6 1 2-7 5 8-5 2 0 1 www.fico.com February 22, 2011 Jennifer J. Johnson, Secretary
More informationClient Agreement document
Client Agreement document for Burton and Fisher Financial Services Introduction This document is aimed at providing you with an overview of Burton and Fisher Financial Services and to introduce you to
More informationEXECUTIVE VIEW MYDIGIPASS.COM. KuppingerCole Report. by Alexei Balaganski August 2013. by Alexei Balaganski ab@kuppingercole.
KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski August 2013 by Alexei Balaganski ab@kuppingercole.com August 2013 Content 1 Introduction... 3 2 Product Description... 4 3 Strengths and Challenges...
More informationIDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
More informationIncreasing Productivity with Mobile Integration.
1 Mobile Medicine: Increasing Productivity with Mobile Integration. Executive Summary Mobile devices smartphone or tablet computers are everywhere increasing effectiveness and efficiency in everyday life.
More information