GUIDANCE ON PAYMENT PROCESSOR RELATIONSHIPS (Revised July 2014)
|
|
|
- Maude Chandler
- 10 years ago
- Views:
Transcription
1 Federal Deposit Insurance Corporation th Street NW, Washington, D.C Financial Institution Letter FIL November 7, 2008 GUIDANCE ON PAYMENT PROCESSOR RELATIONSHIPS (Revised July 2014) Summary: The FDIC is issuing the attached guidance that describes potential risks associated with relationships with entities that process payments for telemarketers and other merchant clients. These types of relationships pose a higher risk and require additional due diligence and close monitoring. This guidance outlines risk management principles for this type of higher-risk activity. Distribution: FDIC-supervised Institutions Suggested Routing: Chief Executive Officer Executive Officers BSA Compliance Officer Related Topics: Risk Management FDIC Guidance for Managing Third-Party Risk (FIL , June 2008) FFIEC Handbook on Retail Payment Systems (March 2004) FFIEC Handbook on Outsourcing Technology Services (June 2004) FFIEC Bank Secrecy Act/Anti-Money Laundering (BSA/AML) Examination Manual Attachment: Guidance on Payment Processor Relationships Contact: Michael Benardo, Chief, Cyber Fraud and Financial Crimes Section, at [email protected] or (202) Note: FDIC financial institution letters (FILs) may be accessed from the FDIC's Web site at To receive FILs electronically, please visit Paper copies of FDIC financial institution letters may be obtained through the FDIC's Public Information Center, 3501 Fairfax Drive, E-1002, Arlington, VA ( or ). Highlights: Account relationships with entities that process payments for telemarketers and other merchant clients could expose financial institutions to increased strategic, credit, compliance, transaction, and reputation risks. Account relationships with these higher-risk entities require careful due diligence and monitoring as well as prudent and effective underwriting. Payment processors pose greater money laundering and fraud risk if they do not have an effective means of verifying their merchant clients identities and business practices. A financial institution should assess its risk tolerance for this type of activity as part of its risk management program and develop policies and procedures that address due diligence, underwriting, and ongoing monitoring of high-risk payment processor relationships for suspicious activity. Financial institutions should be alert to consumer complaints that suggest a payment processor s merchant clients are inappropriately obtaining personal account information. Financial institutions should act promptly when they believe fraudulent or improper activities have occurred related to a payment processor.
2 GUIDANCE ON PAYMENT PROCESSOR RELATIONSHIPS The FDIC has seen an increase in the number of relationships between financial institutions and payment processors in which the payment processor is a deposit customer of the financial institution and uses its customer relationship to process payments for merchant clients. Most payment processors effect transactions that are legitimate payments for a variety of reputable merchants. However, telemarketing and online merchants, in the aggregate, have displayed a higher incidence of unauthorized charges and associated returns or charge backs, which is often indicative of fraudulent activity. Payment processors pose greater money laundering and fraud risk if they do not have an effective means of verifying their merchant clients identities and business practices. In these cases, financial institutions should perform enhanced due diligence and heightened account monitoring. Payment processors typically process payments by creating and depositing remotely created checks (RCCs) often referred to as Demand Drafts or by originating Automated Clearing House (ACH) debits on behalf of their merchant customers. The payment processor may use its own deposit account to process such transactions, or it may establish deposit accounts for its merchant clients to process transactions. Although all the core elements of managing third-party risk are present in payment processor relationships (e.g., risk assessment, due diligence, and oversight), managing this risk where there may not be a direct customer relationship with the merchant can present challenges for financial institutions. Risks associated with this type of activity are heightened when neither the payment processor nor the financial institution performs adequate due diligence on the merchants for which payments are originated. Potential Risks Arising from Payment Processor Relationships Deposit relationships with payment processors expose financial institutions to risks that may not be present in relationships with other commercial customers, including increased strategic, credit, compliance, and transaction risks. In addition, financial institutions also should consider the potential for legal, reputation, and other risks presented by relationships with payment processors, including those associated with customer complaints, returned items, and potential unfair or deceptive practices. Financial institutions that do not adequately manage these relationships may be viewed as facilitating fraudulent or unlawful activity by a payment processor or merchant client. Therefore, it is imperative that financial institutions recognize and understand the businesses with which they are involved. Financial institutions should be alert for payment processors that use more than one financial institution to process merchant client payments. Processors may use multiple financial institutions because they recognize that one or more of the relationships may be terminated as a result of suspicious activity. 1
3 Financial institutions also should be alert to consumer complaints that suggest a payment processor s merchant clients are inappropriately obtaining personal account information and using it to create unauthorized RCCs or ACH debits. Financial institutions should act promptly when they believe fraudulent or improper activities have occurred related to activities of a payment processor. Appropriate actions may include, but are not limited to, filing a Suspicious Activity Report, requiring the payment processor to cease processing for that specific merchant, or terminating the financial institution s relationship with the payment processor. Risk Management Controls Financial institutions should establish clear lines of responsibility for controlling risks associated with payment processor relationships. These include effective due diligence and underwriting, as well as ongoing monitoring of high-risk accounts for an increase in unauthorized returns and suspicious activity. Implementing appropriate controls over payment processors and their merchant clients will help identify those payment processors that process items for fraudulent telemarketers or other unscrupulous merchants and help ensure that the financial institution does not facilitate these transactions. Due diligence, underwriting, and account monitoring are especially important for financial institutions in which processors deposit RCCs and through which processors initiate ACH transactions for their merchant clients. Due Diligence and Underwriting Due diligence and effective underwriting are critical for an effective risk management program. Financial institutions should implement policies and procedures to reduce the likelihood of establishing or maintaining an inappropriate relationship with a payment processor through which unscrupulous merchants can access customers deposit accounts. Financial institutions that initiate transactions for payment processors should develop a processor approval program that extends beyond credit risk management. This program should include a due diligence and underwriting policy that, among other things, requires a background check of the payment processor and its merchant clients. This will help validate the activities, creditworthiness, and business practices of the payment processor. At a minimum, the policy should authenticate the processor s business operations and assess the entity s risk level. An assessment of the processor should include: Reviewing the processor s promotional materials, including its Web site, to determine the target clientele. 2
4 Determining if the processor re-sells its services to a third party who may be referred to as an agent or provider of Independent Sales Organization opportunities or gateway arrangements. 1 Reviewing the processor s policies, procedures, and processes to determine the adequacy of due diligence standards for new merchants. Identifying the major lines of business and volume for the processor s customers. Reviewing corporate documentation, including independent reporting services and, if applicable, documentation on principal owners. Visiting the processor s business operations center. Financial institutions should require the payment processor to provide information on its merchant clients, such as the merchant s name, principal business activity, geographic location, and sales techniques. Financial institutions should verify directly, or through the payment processor, that the originator of the payment (i.e., the merchant) is operating a legitimate business. Such verification could include comparing the identifying information with public record and fraud databases and a trusted third party, such as a credit report from a consumer reporting agency or the state Better Business Bureau, or checking references from other financial institutions. Ongoing Monitoring Financial institutions that initiate transactions for payment processors should implement systems to monitor for higher rates of returns or charge backs, which often are evidence of fraudulent activity. High levels of RCCs or ACH debits returned as unauthorized or due to insufficient funds can be an indication of fraud. Financial institutions are required to have a Bank Secrecy Act/Anti-Money Laundering (BSA/AML) compliance program and appropriate policies, procedures, and processes in place for monitoring, detecting, and reporting suspicious activity. Non-bank payment processors generally are not subject to BSA/AML regulatory requirements, and therefore some payment processors may be vulnerable to money laundering, identity theft, fraud schemes, and illicit transactions. The FFIEC BSA/AML Examination Manual urges financial institutions to effectively assess and manage risk with respect to third-party payment processors and, as a result, a financial institution s risk management program should include procedures for monitoring payment processor information, such as merchant data, transaction volume, and charge-back history. 1 An Independent Sales Organization is an outside company contracted to procure new merchant relationships. Gateway arrangements are similar to Internet service providers that sell excess computer storage capacity to third parties, who in turn distribute computer services to other individuals unknown to the provider. The third party would make decisions about who would be receiving the service, although the provider would be responsible for the ultimate storage capacity. 3
5 Evolving Legal Framework for Remotely Created Checks The laws and regulations governing the acceptance of RCCs are continually evolving in response to new fraud techniques, technological advancements, increased use of imagebased processing, and other factors. As such, financial institutions should ensure that payment processors and their merchants are aware of and comply with the legal/regulatory framework governing these payments and have in place a process to remain informed of changes to applicable laws and regulations, such as: Changes to Federal Reserve Bank Operating Circular 3 that clarify electronically created images (including RCC items) that were not originally captured from paper are not eligible to be processed as Check 21 items (effective July 15, 2008). 2 Changes to Regulation CC that establish transfer and presentment warranties for RCC items that effectively return the responsibility for ensuring a check is authorized by the account holder to the bank of first deposit (effective July 1, 2006). 3 Rules and regulations governing the applicable ACH payment transactions. 4 Rules governing the use of telemarketing that require verifiable authorization of payment for services. 5 Conclusion The FDIC supports financial institutions participation in payment systems to serve the needs of legitimate payment processors and their merchant clients. However, to limit potential risks, financial institutions should implement risk management policies and procedures that include appropriate oversight and controls commensurate with the risk and complexity of the activities. At a minimum, risk management programs should assess the financial institution s risk tolerance for this type of activity, verify the legitimacy of the payment processor s business operations, and monitor payment processor relationships for suspicious activity. Financial institutions should act promptly if they believe fraudulent or improper activities have occurred related to activities of a payment processor. 2 Federal Reserve Banks Operating Circular No. 3 - Collection of Cash Items and Returned Checks, 3 Effective July 1, 2006 [70 Fed. Reg (November 28, 2005)]. 4 NACHA [ 5 Federal Trade Commission Telemarketing Sales Rule [16 CFR 310]. 4
Payment Processor Relationships Revised Guidance
Federal Deposit Insurance Corporation 550 17th Street NW, Washington, D.C. 20429-9990 Payment Processor Relationships Revised Guidance Financial Institution Letter FIL-3-2012 January 31, 2012 Summary:
THIRD PARTY PAYMENT PROVIDERS
THIRD PARTY PAYMENT PROVIDERS BY DARLIA FOGARTY, DIRECTOR OF COMPLIANCE & COO KNOWLEDGE. CLARITY. RELIABILITY. www.compliancealliance.com (888) 353-3933 THIRD PARTY PAYMENT PROCESSORS Third Party Payment
FDIC Updates Guidance on Payment Processor Relationships
February 2012 FDIC Updates Guidance on Payment Processor Relationships BY KEVIN L. PETRASIC In its recently issued Financial Institution Letter, FIL-3-2012, the Federal Deposit Insurance Corporation (
Managing TPPPs and TPSs in the Current Regulatory Environment
November 2015 Managing TPPPs and TPSs in the Current Regulatory Environment Prepared by: Jodie Ruby, Director Audience: This document is intended for managers, directors and executives who deal with business
Third Party Payment Processors Job Aid
Third Party Payment Processors Job Aid This job aid is to be used by state institution examiners as a means to understand, identify, and assess the risks associated with institutions relationships with
Information Technology
Information Technology Information Technology Session Structure Board of director actions Significant and emerging IT risks Practical questions Resources Compensating Controls at the Directorate Level
Risk Management of Remote Deposit Capture
Federal Financial Institutions Examination Council 3501 FAIRFAX DRIVE ROOM 3086 ARLINGTON, VA 22226-3550 (703) 516-5487 http://www.ffiec.gov Background and Purpose Risk Management of Remote Deposit Capture
Federal Financial Institutions Examination Council FFIEC. Retail Payment Systems RPS. February 2010 IT EXAMINATION HANDBOOK
Federal Financial Institutions Examination Council FFIEC Retail Payment Systems February 2010 RPS IT EXAMINATION HANDBOOK RETAIL PAYMENT SYSTEMS RISK MANAGEMENT Action Summary Financial institutions engaged
O OCC BULLETIN OCC 2006-39. Automated Clearing House Activities. Risk Management Guidance
O OCC BULLETIN Comptroller of the Currency Administrator of National Banks Subject: Automated Clearing House Activities Description: Risk Management Guidance TO: Chief Executive Officers, Chief Risk Officers,
Executive Fraud Forum October 30, 2013
Executive Fraud Forum October 30, 2013 Payments Fraud Trends Mary Kepler, Director, Retail Payments Risk Forum, Federal Reserve Bank of Atlanta Judy Long, Executive Vice President, First Citizens National
IDENTITY THEFT RED FLAGS, ADDRESS DISCREPANCIES, AND CHANGE OF ADDRESS REGULATIONS Examination Procedures
Federal Deposit Insurance Corporation 550 17th Street NW, Washington, D.C. 20429-9990 Financial Institution Letter FIL-105-2008 October 16, 2008 IDENTITY THEFT RED FLAGS, ADDRESS DISCREPANCIES, AND CHANGE
Payment Systems: Regulatory Interest in Payment Processors, Faster Payments, and Related Consumer Protections
July 2015 RPL15-04 Payment Systems: Regulatory Interest in Payment Processors, Faster Payments, and Related Consumer Protections Executive Summary The expansion of the Internet and the growth in electronic
Third Party Payment Processors: Relationships, Guidance, and Case Examples
Federal Financial Institutions Examination Council, Examiner Education 3501 Fairfax Drive Room B3030 Arlington, VA 22226-3550 (703) 516-5588 FAX (703) 516-5487 http://www.ffiec.gov Third Party Payment
Third-Party Senders Risks and Best Practices
Third-Party Senders Risks and Best Practices Please turn off all cell phones or mobile devices. Thank you to today s sponsors! This morning s refreshment break sponsored by The Royal Bank of Scotland EventMobile
FEDERAL DEPOSIT INSURANCE CORPORATION WASHINGTON, D.C. ) ) ) ) ) ) ) )
FEDERAL DEPOSIT INSURANCE CORPORATION WASHINGTON, D.C. In the Matter of BURKE & HERBERT BANK & TRUST COMPANY ALEXANDRIA, VIRGINIA (Insured State Nonmember Bank CONSENT ORDER FDIC-14-0103b The Federal Deposit
Bank Secrecy Act, Anti-Money Laundering, and Office of Foreign Assets Control
Bank Secrecy Act, Anti-Money Laundering, and Office of Foreign Assets Control Overview The Bank Secrecy Act (BSA) was created in 1970 to assist in criminal, tax, and regulatory investigations. The Financial
Identifying Key Risk Indicator
PUERTO RICO PAYMENTS SYMPOSIUM Identifying Key Risk Indicator EPOCPR Services Agenda for Today Background History Regulators & Risk Management Let s have fun Regulators & Risk Assessment ACH Risks Categories
Bank Secrecy Act/ Anti-Money Laundering Examination Manual
Bank Secrecy Act/ Anti-Money Laundering Examination Manual Federal Financial Institutions Examination Council Board of Governors of the Federal Reserve System, Federal Deposit Insurance Corporation, National
ACH and Third Party Payment Processors
ACH and Third Party Payment Processors Definition of Third-Party Relationship Entity with which financial institution has entered into a business relationship Facilitate customer access to bank services
FEDERAL DEPOSIT INSURANCE CORPORATION WASHINGTON, D.C. ) CONSENT ORDER. ) FDIC-13-0450b
FEDERAL DEPOSIT INSURANCE CORPORATION WASHINGTON, D.C. In the Matter of THE BANK OF PRINCETON PRINCETON, NEW JERSEY (INSURED STATE NONMEMBER BANK) ) ) ) ) CONSENT ORDER ) ) ) FDIC-13-0450b ) The Federal
Unlawful Internet Gambling Enforcement Act of 2006 Overview
Attachment A Unlawful Internet Gambling Enforcement Act of 2006 Overview This document provides an overview of the Unlawful Internet Gambling Enforcement Act of 2006 (UIGEA or Act), 31 USC 5361-5366, and
Validating Third Party Software Erica M. Torres, CRCM
Validating Third Party Software Erica M. Torres, CRCM Michigan Bankers Association Risk Management & Compliance Institute September 29, 2014 MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT
Know Your Customer & Know Your Customer s Customers (KYCC) BITS ACH Fraud Risk Subgroup Presented by George Thomas November 19, 2008
Know Your Customer & Know Your Customer s Customers (KYCC) BITS ACH Fraud Risk Subgroup Presented by George Thomas November 19, 2008 Agenda Theme and Issue Types of Third Party Processors Risk from Third
Knowing your customers and their customers and their customers and so on and so on
Knowing your customers and their customers and their customers and so on and so on Identifying your Third-Party s and their Nested s This ACH risk management white paper provides an overview of ACH relationships
Third-Party Sender Case Studies: ODFI Best Practices to Close the Gap An ACH Risk Management White Paper
Third-Party Sender Case Studies: ODFI Best Practices to Close the Gap An ACH Risk Management White Paper This ACH risk management white paper examines three case studies related to Third-Party Sender Risk.
Background. FIN-2010-G001 Issued: March 5, 2010 Subject: Guidance on Obtaining and Retaining Beneficial Ownership Information
Joint Release Financial Crimes Enforcement Network Board of Governors of the Federal Reserve System Federal Deposit Insurance Corporation National Credit Union Administration Office of the Comptroller
Office of Audits and Evaluations Report No. AUD-15-008
Office of Audits and Evaluations Report No. AUD-15-008 The FDIC s Role in Operation Choke Point and Supervisory Approach to Institutions that Conducted Business with Merchants Associated with High-Risk
An Overview of the Identity Theft Red Flags and Address Discrepancies under the Fair and Accurate Credit Transactions Act of 2003 Final Rules
An Overview of the Identity Theft Red Flags and Address Discrepancies under the Fair and Accurate Credit Transactions Act of 2003 Final Rules By: Andrea J. Shaw, Esq., Compliance Officer, Gorham Savings
Government Crime Prevention Regulations. Richard Fraher VP & Counsel to the Retail Payments Office Federal Reserve Bank of Atlanta
Government Crime Prevention Regulations Richard Fraher VP & Counsel to the Retail Payments Office Federal Reserve Bank of Atlanta The Big Disclaimers The views expressed in this presentation are those
FEDERAL DEPOSIT INSURANCE CORPORATION WASHINGTON, D.C. CALIFORNIA DEPARTMENT OF FINANCIAL INSTITUTIONS SAN FRANCISCO, CALIFORNIA
FEDERAL DEPOSIT INSURANCE CORPORATION WASHINGTON, D.C. CALIFORNIA DEPARTMENT OF FINANCIAL INSTITUTIONS SAN FRANCISCO, CALIFORNIA ) ) In the Matter of ) ) ORDER TO MIZRAHI TEFAHOT BANK, LTD. ) CEASE AND
A Cautionary Tale Plus Cross-Channel Risk
Dan Tobin A Cautionary Tale Plus Cross-Channel Risk IT Examiner Supervision, Regulation & Credit [email protected] Agenda A Cautionary Tale Shames-Yeakel v. Citizens Financial Bank Cross-Channel Risk
ACH Operations Bulletin #2-2013
ACH Operations Bulletin #2-2013 High-Risk Originators and Questionable Debit Activity March 14, 2013 EXECUTIVE SUMMARY Recent press reports have inaccurately stated that some Receiving Depository Financial
Recent Regulatory Guidance Regarding the Banking of Remittance Companies
Recent Regulatory Guidance Regarding the Banking of Remittance Companies Compilation of Relevant Documents Prepared by Viamericas Corporation, January 2015 With emphasis added Table of Contents 1. U.S.
STATEMENT STUART F. DELERY ASSISTANT ATTORNEY GENERAL CIVIL DIVISION
STATEMENT OF STUART F. DELERY ASSISTANT ATTORNEY GENERAL CIVIL DIVISION BEFORE THE SUBCOMMITTEE ON REGULATORY REFORM, COMMERCIAL AND ANTITRUST LAW COMMITTEE ON JUDICIARY U.S. HOUSE OF REPRESENTATIVES FOR
HIGH-RISK COUNTRIES IN AML MONITORING
HIGH-RISK COUNTRIES IN AML MONITORING ALICIA CORTEZ TABLE OF CONTENTS I. Introduction 3 II. High-Risk Countries 3 Customers 4 Products 7 Monitoring 8 Audit Considerations 8 III. Conclusion 10 IV. References
The 2006 FFIEC Bank Secrecy Act/Anti-Money Laundering Examination Manual:
The 2006 FFIEC Bank Secrecy Act/Anti-Money Laundering Examination Manual: Knowing the Risks Is It Possible to Keep Pace and Manage Them All? By: Carmina Hughes, Executive Director and Patricia McKeown,
Remote Deposit Capture Customer Due Diligence FFIEC Tier II Exam Considerations Plus Mobile Capture! March 5, 2014. Topics of Discussion
Remote Deposit Capture Customer Due Diligence FFIEC Tier II Exam Considerations Plus Mobile Capture! March 5, 2014 Carolyn C. Dowdy, Speaker Bank Project Solutions does not guaranty by implementing criteria
ACH Internal Control Questionnaire
ACH Internal Control Questionnaire AUTOMATED CLEARING HOUSE (ACH) Assessment of the Adequacy of Internal Controls Completed by: Date Completed: Quality of Management and Support for ACH Processing Activity
Federal Financial Institutions Examination Council FFIEC. Retail Payment Systems RPS. February 2010 IT EXAMINATION H ANDBOOK
Federal Financial Institutions Examination Council FFIEC Retail Payment Systems February 2010 RPS IT EXAMINATION H ANDBOOK Table of Contents Introduction 1 Retail Payment Systems Overview 2 Payment Instruments,
Vendor Management Compliance Top 10 Things Regulators Expect
Vendor Management Compliance Top 10 Things Regulators Expect Paul M. Phillips, CFA Attorney, Adams and Reese Pamela T. Rodriguez, AAP, CIA, CISA EVP, Risk Management & Education, EastPay 2014 EastPay.
INSURANCE ACT 2008 CORPORATE GOVERNANCE CODE OF PRACTICE FOR REGULATED INSURANCE ENTITIES
SD 0880/10 INSURANCE ACT 2008 CORPORATE GOVERNANCE CODE OF PRACTICE FOR REGULATED INSURANCE ENTITIES Laid before Tynwald 16 November 2010 Coming into operation 1 October 2010 The Supervisor, after consulting
Mobile Deposit Policy
Mobile Deposit Policy Mobile Deposit, a deposit transaction delivery system, allows the Credit Union to receive digital information from deposit documents captured at remote locations (i.e., the Credit
Bank Secrecy Act Anti-Money Laundering Examination Manual
Bank Secrecy Act Anti-Money Laundering Examination Manual Core Overview - Customer Identification Program Assess the bank's compliance with the statutory and regulatory requirements for the Customer Identification
Credit Card Related Merchant Activities
Credit Card Related Merchant Activities Standards Examiners should evaluate the above-captioned function against the following control and performance standards. The Standards represent control and performance
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL OFFICE OF FOREIGN ASSET CONTROL COMPLIANCE REVIEW Report #OIG-06-09 December 18, 2006 William A. DeSarno Inspector General Released By:
INFORMATION TECHNOLOGY OFFICER S QUESTIONNAIRE. Instructions for Completing the Information Technology Examination Officer s Questionnaire
Institution Charter Date of Exam Prepared By INFORMATION TECHLOGY OFFICER S QUESTIONNAIRE Instructions for Completing the Information Technology Examination Officer s Questionnaire The Information Technology
Instructions for Completing the Information Technology Officer s Questionnaire
Instructions for Completing the The (Questionnaire) contains questions covering significant areas of a bank s information technology (IT) function. Your responses to these questions will help determine
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
FEDERAL DEPOSIT INSURANCE CORPORATION WASHINGTON, D.C. CALIFORNIA DEPARTMENT OF FINANCIAL INSTITUTIONS SAN FRANCISCO, CALIFORNIA
FEDERAL DEPOSIT INSURANCE CORPORATION WASHINGTON, D.C. CALIFORNIA DEPARTMENT OF FINANCIAL INSTITUTIONS SAN FRANCISCO, CALIFORNIA ) ) In the Matter of ) ) CONSENT ORDER BANAMEX USA ) CENTURY CITY, CALIFORNIA
Get In Tune With Third Parties: Finding the harmonies between Third Party Senders, Originators, and Customers.
Get In Tune With Third Parties: Finding the harmonies between Third Party Senders, Originators, and Customers. Marsha Jones President TPPPA Brent Siegel Vice President Argos Risk 1 1 AGENDA/OUTLINE Third-Party
A-MP. Comptroller of the Currency Administrator of National Banks. Merchant Processing. Comptroller s Handbook. December 2001.
A-MP Comptroller of the Currency Administrator of National Banks Merchant Processing December 2001 A Assets Merchant Processing Table of Contents Introduction... 1 Types of Merchant Processors... 2 Acquiring
The FDIC s Response to Bank Secrecy Act and Anti-Money Laundering Concerns Identified at FDIC-Supervised Institutions
Office of Audits and Evaluations Report No. AUD-14-009 The FDIC s Response to Bank Secrecy Act and Anti-Money Laundering Concerns Identified at FDIC-Supervised Institutions August 2014 Executive Summary
Selecting a Secure and Compliant Prepaid Reloadable Card Program
Selecting a Secure and Compliant Prepaid Reloadable Card Program Merchants and other distributors of prepaid general purpose reloadable (GPR) cards should review program compliance as an integral part
CASH AND DUE FROM BANKS Section 3.4
OVERVIEW...2 Cash...2 Clearings...2 Cash Items...2 Due From Banks...3 Deposit Notes...3 EXAMINATION OBJECTIVES...4 Primary Reserves...4 Interbank Liabilities...4 Compensating Balances...4 Correspondent
Executive Summary. Guidelines on Merchant and ISO Underwriting and Risk Monitoring MARCH 2014 COUNSEL DEVELOPED BY
TM MARCH 2014 Guidelines on Merchant and ISO Underwriting and Risk Monitoring Executive Summary DEVELOPED BY www.deanarich.com COUNSEL Venable LLP Jeffrey D. Knowles Ellen Traupman Berge Leonard L. Gordon
{Regulatory Compliance Update.} December 10, 2014
{Regulatory Compliance Update.} December 10, 2014 Presenter Elizabeth Snyder, CRCM, Regulatory Compliance Manager Elizabeth leads Plante Moran s regulatory compliance team. As a compliance specialist with
9/13/2013. 20/20 Vision for Vendor Management & Oversight. Disclaimer. Bank Service Company Act - FIL-49-99
20/20 Vision for Vendor Management & Oversight 2013 WBA Technology Conference September 17, 2013 Ken M. Shaurette, CISSP, CISA, CISM, CRISC, IAM Director IT Services Disclaimer The views set forth are
8 Guiding Principles for Anti-Money Laundering Polciies and Procedures in
TCH Guiding Principles September 2014 Exposure Draft Guiding Principles for Anti-Money Laundering Policies and Procedures in Correspondent Banking Exposure Draft for Public Comment 2 Preamble to the Exposure
Frequently Asked Questions: Identity Theft Red Flags and Address Discrepancies
Frequently Asked Questions: Identity Theft Red Flags and Address Discrepancies The staff of the Board of Governors of the Federal Reserve System (FRB), Federal Deposit Insurance Corporation (FDIC), National
Developing the Bank s BSA/AML Compliance Program Based upon its Risk Assessment
BSA/AML Risk Assessment Overview Developing the Bank s BSA/AML Compliance Program Based upon its Risk Assessment Management should structure the bank s BSA/AML compliance program to adequately address
Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation
Guidelines to FTC Red Flag Rule(reformatted) Appendix A to Part 681 Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 681.2 of this part requires each financial institution
ACH GENERAL 4 5 6 7 8
3 A B C E ACH GENERAL 4 5 6 7 8 INTRODUCTION AND PURPOSE ABBREVIATIONS AND DEFINITIONS NCUA REFERENCES EXTERNAL REFERENCES General Is the credit union a Receiving Depository Financial Yes/No/NA Comments
ACH Operations Bulletin #1-2014
ACH Operations Bulletin #1-2014 Questionable ACH Debit Origination: Roles and Responsibilities of ODFIs and RDFIs September 30, 2014 Replaces ACH Operations Bulletin #2-2013 (Originally Issued March 14,
Anti-Money Laundering Policy Manual Table of Contents [Sample Client] Table of Contents
Table of Contents [ Client] Table of Contents TABLE OF CONTENTS... 1 CHAPTER 1 INTRODUCTION... 3 1.1 GOALS AND OBJECTIVES... 3 1.2 REQUIRED REVIEW... 3 1.3 APPLICABILITY... 3 1.4 MONEY LAUNDERING DEFINED...
2: Credit cards, etc. Overview of the sector
19 2: Credit cards, etc Overview of the sector Note: This sectoral guidance is incomplete on its own. It must be read in conjunction with the main guidance set out in Part I of the Guidance. 2.1 A credit
Going All In on Board Reporting
Going All In on Board Reporting February 13, 2014 10:15 A.M to 11:15 A.M. Tony DaSilva, AAP, CISA Senior Examiner, Federal Reserve Bank of Atlanta Rajiv Donde President, Laru Technologies Peter Davey,
Anti-Money Laundering Program and Suspicious Activity Reporting Requirements For Insurance Companies. Frequently Asked Questions
Anti-Money Laundering Program and Suspicious Activity Reporting Requirements For Insurance Companies Frequently Asked Questions We are providing the following Frequently Asked Questions to assist insurance
In This Presentation:
The U.S. Department of Justice and banking regulators have stepped up the pace of criminal, civil and administrative actions against banks, payment processors, money transmitters, and other financial institutions,
FIN-2014-A007 August 11, 2014
FIN-2014-A007 August 11, 2014 Advisory to U.S. Financial Institutions on Promoting a Culture of Compliance BSA/AML shortcomings have triggered recent civil and criminal enforcement actions FinCEN seeks
[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM. Effective May 1, 2009
[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM Effective May 1, 2009 Because [FACILITY NAME] offers and maintains covered accounts, as defined by 16 C.F.R. Part 681 (the Regulations ), [FACILITY NAME]
Supplement to Authentication in an Internet Banking Environment
Federal Financial Institutions Examination Council 3501 Fairfax Drive Room B7081a Arlington, VA 22226-3550 (703) 516-5588 FAX (703) 562-6446 http://www.ffiec.gov Purpose Supplement to Authentication in
What Insurance Agents and Brokers Should Expect under the New Anti-Money Laundering Regulations for Life Insurance Companies
What Insurance Agents and Brokers Should Expect under the New Anti-Money Laundering Regulations for Life Insurance Companies The USA PATRIOT Act includes provisions intended to prevent the financial services
