Direct Debit Transactions: a comprehensive analysis of emerging attack patterns
|
|
|
- Liliana Powell
- 9 years ago
- Views:
Transcription
1 Direct Debit Transactions: a comprehensive analysis of emerging attack patterns Luigi Coppolino, Salvatore D Antonio, Luigi Romano, Gaetano Papale, Luigi Sgaglione University of Naples Parthenope {luigi.coppolino, salvatore.dantonio, luigi.romano, gaetano.papale, luigi.sgaglione}@uniparthenope.it and Ferdinando Campanile Sync Lab S.r.l {f.campanile}@synclab.it Abstract In the recent years payment systems in Europe are evolved to a new scenario where transactions and retail payments take place according to the SEPA (Single Euro Payments Area) Regulation. SEPA is an initiative of the European banking industry aiming at making all electronic payments across the Euro area e.g. by credit card, debit card, bank transfer or direct debit as easy as domestic payments currently are. One of the payment schemes defined by the SEPA mandate is the SEPA Direct Debit (SDD) that allows a creditor (biller) to collect funds from a debtor s (payer s) account, provided that a signed mandate has been granted by the payer to the biller. Thanks to SDD consumers can make and receive no-cash euro payments with a single set of instructions and a single bank account. It is apparent that the use of this standard scheme facilitates the access to new markets by enterprises and public administrations and allows for a substantial cost reduction. However, the other side of the coin is represented by the security issues concerning this type of electronic payments. A study conducted by Center of Economics and Business Research (CEBR) of Britain, on behalf of Liverpool Insurance Company, showed that from 2006 to 2010 the Direct Debit frauds have increased of 288%. In this paper a comprehensive analysis of real SDD data provided by the EU FP7 LeanBigData project is performed in order to identify and classify emerging and sophisticated attack patterns that can be executed against an SDD service. The results of this data analysis will be used to inspire the design of a security system supporting analysts to detect Direct Debit frauds. I. INTRODUCTION Payment systems are in rapidly evolution. And so is for the payment frauds. Whenever a new payment method is introduced, the fraudsters try to take advantage from loopholes and security weaknesses that each novel system brings with it. In this scenario the European Union has developed the Single Euro Payment Area (SEPA), where 500 million of citizens, businesses and the European Public Authorities can make and receive over 100 billion no-cash payments every year [1]. SEPA Direct Debit (SDD) is a service that allows consumers to make in euro payments using a single bank account and a single set of instructions. A common standard, if on one hand translates into efficiency gains for businesses and public administrations, facilitating access to new markets and reducing costs, on the other hand, the simplification of the payment process increases the risks for the users. The SDD service is not free from cybercrime attacks. A study conducted by Center of Economics and Business Research (CEBR) of Britain, on behalf of Liverpool Insurance Company, showed that from 2006 to 2010 the Direct Debit frauds have increased of 288%, with an expected growth of 57% for the next three years [2]. The magnitude of these evidences is related to the lack of knowledge on the part of financial institutions with respect to the types of threats that an attacker can put in place. The research presented in this paper have as goal the analysis and identification of emerging attack patterns against the Direct Debit transactions. Our work is been driven from the study of real SDDs provided by an Italian bank. This data are properly filtered and anonymized by the fraud analyst of the institute. The paper is organized as follows. Section II presents the works found in literature that approached to the issues in SDD payments and electronics ones. In the Section III an in-depth analysis of the SEPA standard and an accurate description of the phases to set-up a Direct Debit transaction is presented. Particular emphasis is given to the almost absence of security mechanisms that a financial institution puts in place to protect his/hers users due to unauthorized or fraudulent SDDs. Section IV, starting from the information reported in the previous sections, analyzes the hazards of the SDD process due to the adoption of Creditor Mandate Flow Model (CMF). Section V proposes a categorization, in four misuse cases, of attacks that a fraudster can put in place against an unaware SDD s user. To this aim, we have analyzed a huge amount of real SDD data, over than 2TB of real data, provided by SincLab S.r.l within the European LeanBigData project. Finally, Section VI concludes the work showing future research directions. II. RELATED WORK The Direct Debit frauds are a modern topic in the scientific community and, at the beginning of our work, we were aware that no literature concerning this argument was available. However, several are the publications relating the detection of threats against other forms of electronic payment. In [3] [4] the authors describe the advanced cyber threats, specifically targeted to financial institutions and propose an approach based on combining multiple and heterogeneous data to detect frauds against a Mobile Money Transfer (MMT). The research presented in [5], denotes that in real life fraudulent transactions are scattered with genuine transactions and simple pattern matching techniques are not often sufficient to detect those frauds accurately. The work present a survey of various techniques (Data mining, Fuzzy logic, Machine learning...) used in credit card fraud detection. In [6] is showed that the frauds tend to be perpetrated to certain patterns and the
2 use of Neural Network to detect fraudulent transactions is presented. The paper [7] suggests a novel combination of the two well known meta-heuristic approaches, namely the genetic algorithms and the scatter search to detecting credit card frauds. The method is applied to real data and very successful results are obtained compared to current practice. The research presented in [8] proposes an analysis of the identity theft and the related crimes. In the SDDs analysis are been fundamental many publications of European Payment Council (EPC). In particular [9] defines the SEPA Direct Debit Scheme (SDD-Core), rules and the obligations. The work [10] presents a review of the SEPA evolution and a discussion on the ISO XML standard, the types of national or regional Additional Optional Service and the different clearing practices associated with these. Finally, for the future developments of this work, very interesting are the results presented in [11] where the authors propose and demonstrate the applicability of a visualization support in a Big Data banking use case. III. SEPA DIRECT-DEBIT TRANSACTIONS SEPA is the area where citizens, businesses, governments and other economic actors can make and receive in euro payments [12]. The jurisdictional of the SEPA scope currently consists of the 28 EU Member States [13], the members of European Free Trade Association-EFTA (Iceland, Liechtenstein, Norway and Switzerland), plus Monaco and San Marino. The goal of the SEPA project includes the development of financial instruments, standards, procedures and infrastructures to enable economies of scale. This paper is focused on SEPA Direct Debit transactions (SDDs), one of the services provided by SEPA. Typical examples of SDD transactions are services that require recursive payments such as pay per view TV, gym subscription and energy distribution. The actors involved in an SDD transaction are: Creditor In the SEPA Direct Debit (SDD) schema is the person or company who has a credit that will be satisfied by collecting funds from the Debtor s bank account through an SDD transaction. Debtor In the SEPA Direct Debit (SDD) schema is the person or company who has a debit that satisfies by providing funds from his/her bank account to the Creditor s bank account by means of an SDD transaction. Creditor s and Debtor s banks Represent the respective banks of Creditor and Debtor. When a Creditor must draw funds from another person s bank account, to set up the process, he/she has to acquire an SDD mandate from Debtor and advise his/her bank about it. During each transaction, the Creditor sends a direct debit request (with information about the amount of the transaction) to his/her bank that will start the process to request the specified amount from Debtor s bank account. The Debtor must provide only the signature of the mandate, but has no prior acknowledgement about the direct debit being in charge to his/her bank account. Usually, the Creditor send a receipt to the Debtor by using a best effort service, so no guarantee about delivery time and delivery itself is provided. In this process, the Debtor will have knowledge [scale=0.28]sdd2.eps Fig. 1: SEPA Direct Debit process of an unauthorized direct debit only when the funds have already been withdrawn and after reception of his/her bank statement. This of course exposes the Debtor to a large number of possible frauds. For these reasons, with SEPA, in case of unauthorized transactions due to errors or frauds, a Debtor can request refund until 8 weeks from the SDD deadline or 13 months in case of an unauthorized SDD. The SDD process (figure 1) is characterized by the following steps: Acquisition 1) The mandate is signed by the Debtor and is notified to the Creditor Bank. Validation 1) The Creditor Bank sends a validation request for the received mandate to the Debtor Bank. 2) The Debtor Bank receives the validation request and returns its validation. During this step is checked the validity of Debtor Bank coordinates. SDD Request 1) The Creditor generates a receipt at least 14 working days before its deadline. 2) The Creditor sends an SDD request to its bank (at least 11 working days before in case of first SDD request, 9 for subsequent requests). 3) The Creditor Bank sends an SDD request to the Debtor Bank which checks the correctness of the request and if no problem occurred, the bank debits the SDD on Debtor s account. Interbank clearing 1) The Debtor Bank communicates the result of SDD request to the Creditor Bank. 2) In case of positive response, the Creditor Bank credits the amount of the transaction on Creditor s account. The standard adopted by SEPA to compose SDD requests is the ISO [14] [15], a multi-part International Standard performed by ISO Technical Committee TC68 Financial Services. It defines a modelling methodology to capture in a syntax-independent way financial business areas, business transactions, and associated message flows. Also, it sets a central dictionary of business items used in financial communications and fixes a set of XML and ASN.1 design rules to convert the message models into XML or ASN.1 schemas, whenever the use of ISO XML or ASN.1-based syntax is preferred. In Italy, from the 1st of February 2014, domestic credit transfers, banking and postal direct debits (RIDs) were replaced by the corresponding SEPA instruments. The SEPA standard adopted by Italy is slightly different from the canonical one (ISO 20022). In particular, for the SDD request, the CBIBdySDDReq standard which is provided by
3 the Interbank Corporate Banking (CBI) consortium, is used. In listing 1 an excerpt of real SDD s data is shown. It contains the information of the Creditor. The Id field represents the Creditor Identifier [16] on 23 digits. In particular, from digit 8 to digit 23 is defined the VAT number of the company. <Cdtr> <Nm>xxx yyyyy</nm> <PstlAdr> <TwnNm>xxxxx yyyyy zz</twnnm> <Ctry>Italia</Ctry> <AdrLine>via numero xx</adrline> </PstlAdr> <Id> <PrvtId> <Othr> <Id>ITXXX YYY</Id> </Othr> </PrvtId> </Id> </Cdtr> <CdtrAcct> <Id> <IBAN>ITXXX YYY</IBAN> </Id> </CdtrAcct> Listing 1: Excerpt of Creditor s data in ISO format An analogous structure is used to the Debtor, but the Id field is on 16 digits and represents the fiscal code of the user. In the real data that we have analyzed, every ISO xml file contains a trace of purpose of the transaction (i.e gym or pay-tv subscription) within the field Ustrd. IV. ISSUES IN SEPA TRANSACTIONS The SEPA Direct Debit transactions, as any other form of electronic payment, are not immune from attacks of fraudsters. At the basis of each SDD fraud there is an Identity Theft, either the Debtor s identity or the Creditor s identity. Identity Theft is a relatively new phenomenon for which there is no universally recognized definition, but overall can be defined as a crime where someone: knowingly transfers, possesses, or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, or in connection with, any unlawful activity that constitutes a violation law... [17]. The major weakness of the SEPA Direct Debit process is at the beginning of the procedure, in particular during the phase of signing the mandate. In fact, as shown in figure 2, a fraudster can authorize the SDD mandate in the place of the Debtor. This illegal activity, also known as Mandate Fraud, allows to benefit products or services without paying for it, while the Debtor will recognize the fraud after the direct debit was performed. The management of the mandate can follow two different models: CMF - Creditor-driven Mandate Flow DMF - Debtor-driven Mandate Flow CMF provides that the mandate is stored with the Creditor and it is the unique model in four European country (Germany, Spain, Netherland and UK). DMF, unlike the previous, [scale=0.35]mandate.eps Fig. 2: Mandate Fraud provides that the mandate stays with the Debtor s bank and is adopted in Finland, Greece, Malta, Slovenia, Slovakia, Hungary, Latvia and Lithuania. In Italy and in the remaining countries of SEPA area, CMF and DMF co-exist, but the European Policy Centre (EPC) has unilaterally decided that the SEPA model would be based on CMF. The same European Consumers Organization (BEUC), through a letter to the members of European Parliament (MEPs) dated 25 January 2010, has raised the issue by defining SEPA s Creditor Mandate Flow Model (CMF) massively open to fraud. With the CMF model, the consumer s bank (i.e. Debtor s bank) does not have control over the mandate, so the risk of fraud is higher [18]. This model prevents the Debtor s Bank from intervening once a payment has left an account, with the consequence that the Creditor is in full control of the transaction. Furthermore, the reduced amount of information required to activate a transaction, allow even to the less savvy criminals to perpetrate a fraud. The precondition of an SDD fraud is an identity fraud. There are different techniques to steal personal information of the victim, as reported in [19], several that don t need high technical expertises (i.e. Dumpster Diving) and other more sophisticated (i.e. Spoofing and Spamming). V. FOUR MISUSE CASES In this section will be described four misuse cases in the SDD transactions. The classification was conducted in order to develop, in future, a support system to recognize SDD frauds with an high detection rate and a low occurrence of falsepositives. To categorize the frauds, we have examined a huge amount of real data thanks to collaboration with Sync Lab S.r.l. [20], an Italian SME that manages for his clients over 4 million of direct debit transactions per day. This data have been obtained within the LeanBigData project [21], where Sync Lab figures as a partner. LeanBigData is an European project that has as goal the building of an ultra-scalable and ultraefficient integrated big data platform addressing important open issues in financial, cloud data and social media big data analytics. Through the analyze of real data, over 2 TB of transactions properly anonymized and, from the observation of different attack patterns, we have extract four misuse cases related to an SDD fraud. The misuse cases will be schematized with indications about the actors involved in the fraud, the preconditions to perpetrate it, a description of the misuse case and the fraudster s goal. To allow a better understanding of the misuse cases, it is appropriate to divide the services that can be connected to an SDD transaction into two categories: location-independent location-bound The location-independent category identifies services that can be provided in any location and therefore do not require the physical presence of the Debtor (i.e. pay-per-view, smartphone fee) while, the term location-bound indicates all services necessarily provided in a specific place and required the physical presence of the user, for example the
4 gym subscription. Misuse case 1: Location-independent Service Fraud Objective: The goal of the Fraudster is to benefit of a service without pay for it. 1) The Fraudster steals Debtor s identity. 2) The Fraudster signs a mandate for a locationindependent service in stead of legitimate user. 1) The Fraudster, impersonating a Creditor, requests a direct debit on the Debtor s account for a locationindependent service. 2) The Fraudster, to activate the SDD process, signs the mandate with the stolen identity of the Debtor. 3) The Debtor s bank, once verified the correctness of the data into SDDs, transfer the cost of the service from Debtor s account to the account selected by the Fraudster. Misuse case 2: Location-bound Service Fraud Objective: The goal of the Fraudster is to benefit of a service without pay for it. 1) The Fraudster steals Debtor s identity. 2) The Fraudster signs a mandate for a location-bound service in stead of legitimate user. 1) The Fraudster steals the identity of a Creditor and, by using such identity, requests a payment for a location-bound service to the unaware Debtor. 3) The location-bound service provided by Fraudster has a location of use very far from usually places visited/lived by the Debtor. 4) The Debtor s bank, that has the duty of checking only the format validity of personal and banking data of the actors, validates the transaction. Misuse case 3: Address Spoofing Fraud Objective: The goal of the Fraudster is to gain money. 1) The Fraudster steals Debtor s identity. 2) The Fraudster signs a mandate for a service equipment in stead of legitimate user. 1) The Fraudster steals the identity of a legitimate Creditor and, with the stolen identity, requires a direct debit to an unaware user for a service equipment. 3) The Fraudster sets as equipment s receiving address one that he can easily have access to, but different from real Debtor s address. 4) The Debtor s bank accepts the SDDs because it controls only the correspondence between name and bank details of Debtor. Misuse case 4: Fake Company Fraud Actors: Debtor and Fraudster. Objective: The goal of the Fraudster is to gain money. 1) Fraudster and Creditor are the same actor. 2) The Fraudster steals Debtor s identity. 3) The Fraudster signs a mandate for a service in stead of legitimate user. 1) A fake company, registered as biller for SDDs, requires a direct debit for a service to an unaware Debtor. 3) The Debtor s bank, that is not able to verify the reliability of Creditor, accepts the SDDs. VI. CONCLUSION In this paper we discussed of the new SEPA Direct Debit standard adopted by the European Union to transfer funds within its economic area. From an in-depth study of the Direct Debit process, many safety risks for user s money emerged. In this context, only a strong understanding of the fraud strategies, can indicate the best countermeasures. Our work, starting from real SDDs data, presented an analysis of emerging attack patterns against Direct Debit transactions and it has categorized them in misuse cases. The classification is been conducted in order to ensure an high detection rate and a low occurrence of false-positives. In future, we plan of develop a tool that by correlating attack symptoms in near real time, as done in [22] [23], can recognize ongoing frauds and support the fraud analysts. ACKNOWLEDGMENT The research leading to these results has received funding from European Commission within the context of Seventh Framework Programme (FP7/ ) for research, technological development and demonstration under Grant Agreement No (Ultra-Scalable and Ultra-Efficient Integrated and Visual Big Data Analytics, LeanBigData Project). It has been also partially supported by the Embedded Systems in critical domains POR Project (CUP B25B ) funded by the Campania region in the context of the POR Campania FSE , Asse IV and Asse V and by
5 the TENACE PRIN Project (n P34XC) funded by the Italian Ministry of Education, University and Research. The authors also wish to thank Mr. Giuseppe Trincia for the fruitful technical discussions. REFERENCES [1] EPC. Euroland: Our single payment area! [Online]. knowledge-bank/epc-documents/euroland-our-single-payment-area/ sepa-whitepaper pdf/ [2] Direct debit fraud at an all-time high; bacs challenges figures. [Online]. Available: aspx?newsitemid=22028 [3] L. Coppolino, S. D Antonio, V. Formicola, C. Massei, and L. Romano, Use of the dempster shafer theory to detect account takeovers in mobile money transfer services, Journal of Ambient Intelligence and Humanized Computing, pp. 1 10, DOI: /s [4] L. Coppolino, S. D Antonio, L. Romano et al., Use of the dempster shafer theory for fraud detection: The mobile money transfer case study, in Intelligent Distributed Computing VIII. Springer, 2015, pp [5] S. B. E. Raj and A. A. Portia, Analysis on credit card fraud detection methods, in Computer, Communication and Electrical Technology (ICCCET), 2011 International Conference on. IEEE, 2011, pp [6] R. Patidar, L. Sharma et al., Credit card fraud detection using neural network, International Journal of Soft Computing and Engineering (IJSCE) ISSN, pp , [7] E. Duman and M. H. Ozcelik, Detecting credit card fraud by genetic algorithm and scatter search, Expert Systems with Applications, vol. 38, no. 10, pp , [8] S. F. Allison, A. M. Schuck, and K. M. Lersch, Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics, Journal of Criminal Justice, vol. 33, no. 1, pp , [9] EPC. Sepa core direct debit scheme rulebook. [Online]. Available: epc-documents/sepa-direct-debit-core-rulebook-version-81/ epc core-sdd-rb-v81-approvedpdf/ [10] R. Wandhöfer, Sepa for corporates: On the path towards cross-border harmonisation, Journal of Payments Strategy & Systems, [11] L. Coppolino, S. D Antonio, L. Romano, F. Campanile, and A. V. de Carvalho, Effective visualization of a big data banking application, in Intelligent Interactive Multimedia Systems and Services. Springer, 2015, pp [12] L. D. Andrei and P. Brezeanu, Single euro payents area (sepa) - strategic value on the high degree of interoperability for all active participants in the financial transaction, [13] EPC. Epc list of sepa scheme countries. [Online]. knowledge-bank/epc-documents/epc-list-of-sepa-scheme-countries/ epc epc-list-of-sepa-scheme-countries-v21-june-2015pdf/ [14] S. Goswell, Iso 20022: The implications for payments processing and requirements for its successful use, Journal of Payments Strategy & Systems, vol. 1, no. 1, pp , [15] Iso 20022: Universal financial industry message scheme. [Online]. Available: [16] EPC. Creditor identifier overview. [Online]. knowledge-bank/epc-documents/creditor-identifier-overview/ epc creditor-identifier-overview-v40/ [17] K. M. Finklea, Identity theft: Trends and issues. DIANE Publishing, [18] BEUC. Establishing technical requirements for credit transfers and direct debits in euro and amending regulation (ec) no 924/2009. [Online]. Available: pdf [19] M. P. Pardede and T. Dewi, E-fraud, taxonomy on methods of attacks, prevention, detection, investigation, prosecution and restitution, [20] Sync lab s.r.l. [Online]. Available: [21] Leanbigdata project. [Online]. Available: [22] L. Coppolino, S. D Antonio, L. Romano, and G. Spagnuolo, An intrusion detection system for critical information infrastructures using wireless sensor network technologies, in Critical Infrastructure (CRIS), th International Conference on. IEEE, 2010, pp [23] M. Ficco, A. Daidone, L. Coppolino, L. Romano, and A. Bondavalli, An event correlation approach for fault diagnosis in scada infrastructures, in Proceedings of the 13th European Workshop on Dependable Computing. ACM, 2011, pp
Microsoft Dynamics NAV. SEPA Credit Transfers and Direct Debits
Microsoft Dynamics NAV SEPA Credit Transfers and Direct Debits July 2012 EXECUTIVE SUMMARY... 1 SEPA PAYMENT INSTRUMENTS... 2 SEPA CREDIT TRANSFERS... 2 SEPA DIRECT DEBITS... 2 OVERVIEW OF SEPA DIRECT
SEPA. Changes in the Payment System Implementation of the European SEPA Regulations for Kuna and Euro Payments
SEPA Changes in the Payment System Implementation of the European SEPA Regulations for Kuna and Euro Payments SEPA The Single Euro Payments Area (SEPA) stands for a European Union (EU) payments integration
SEPA. Frequently Asked Questions
SEPA Frequently Asked Questions Page 1 of 13 Contents General SEPA Questions... 4 What is SEPA?... 4 What is the aim of SEPA?... 4 What are the benefits of SEPA?... 4 What countries are included in SEPA?...
SEPA - Frequently Asked Questions
SEPA - Frequently Asked Questions Contents SEPA Overview Questions... 2 What is SEPA?... 2 What is the aim of SEPA?... 3 Where did SEPA come from?... 3 What countries are included in SEPA?... 3 What currencies
Single Euro Payments Area
Single Euro Payments Area Overview SEPA (Single Euro Payments Area) is a European payments initiative which aims to create one single, integrated, standardised payments market in Europe. It is an area
Statewatch Briefing ID Cards in the EU: Current state of play
Statewatch Briefing ID Cards in the EU: Current state of play Introduction In March 2010, the Council Presidency sent out a questionnaire to EU Member States and countries that are members of the socalled
RULES FOR FOREIGN PAYMENTS
RULES FOR FOREIGN PAYMENTS The terms used in these Rules have the following meaning: 1. Bank mbank S.A., 2. Client a natural person, legal person or organisational unit without legal personality, provided
ICEPAY & SEPA Direct Debit
ICEPAY & SEPA Direct Debit Page 1 July 2014 S. Campbell v0.5 Table of Contents 1. Purpose of this document... 3 1.1 Support... 3 2. SEPA - Introduction... 3 2.1 SEPA - Goals... 3 2.2 SEPA Bank accounts,
Students: undergraduate and graduate students who are currently enrolled in universities
DUO-Korea: 1. General Description CAUTION: If any application falls under the following 3 cases, the application is disqualified and will not be considered for selection. If such case is found after the
SEPA DATA MODEL. Reason for Issue Approved by the EPC Plenary on 13 December 2006
Doc: EPC029-06 (Version 2.2) 13 December2006 OITS SG SEPA DATA MODEL Abstract Document Reference Issue This document sets out the SEPA Data Model which is referred to in the SEPA Credit Transfer and Direct
EUROPEAN DIRECT DEBIT. ING Luxembourg s SEPA Direct Debit. European Direct Debit 1
EUROPEAN DIRECT DEBIT ING Luxembourg s SEPA Direct Debit European Direct Debit 1 EUROPEAN DIRECT DEBIT OR SEPA DIRECT DEBIT 3 Introduction to the European direct debit 3 Which countries are part of SEPA?
Legal aspects e-mandates
Legal aspects e-mandates European Payments Platform 2014 Euroforum Annemieke van der Beek [email protected] Joris van Horzen [email protected] 16 December 2014 SEPA mandates With a
Terms and Conditions for SEPA Direct Debit Collection Service, Great Britain
Terms and Conditions for SEPA Direct Debit Collection Service, Great Britain These Special Terms and Conditions for SEPA Direct Debit collection service, Great Britain (the Special Terms and Conditions
Information concerning Terms and Conditions of Provision of Payment Services by Citibank Europe plc, pobočka zahraničnej banky
Information concerning Terms and Conditions of Provision of Payment Services by Citibank Europe plc, pobočka zahraničnej banky I. Introductory Provisions 1. This Information concerning Terms and Conditions
International transfers are not always easy to understand.
SEPA, Page 1 of 8 International transfers are not always easy to understand. We re here to help you. International payments. SEPA, Page 2 of 8 The idea of a single European payments area. SEPA the concept.
SEPA Country Guide Italy. Introduction
Introduction This document provides an overview of all the country specific information you need to successfully implement your migration to SEPA in Italy. Intending to provide a global picture of the
File Service Agreement ( Agreement ) of Deutsche Börse AG
File Service Agreement ( Agreement ) of Deutsche Börse AG between Deutsche Börse AG 60485 Frankfurt/Main Germany Phone + 49-(0) 69-2 11-1 18 00 Fax + 49-(0) 69-2 11-1 45 01 E-mail [email protected]
Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI
Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI UNICRI s Main Goals The United Nations Interregional Crime and
Consultation on the future of European Insolvency Law
Consultation on the future of European Insolvency Law The Commission has put the revision of the Insolvency Regulation in its Work Programme for 2012. The revision is one of the measures in the field of
HSBC Your Guide to SEPA. Capitalising on the opportunities
HSBC Your Guide to SEPA Capitalising on the opportunities Executive Summary Developed by the European Payments Council, the Single Euro Payments Area or SEPA expands on the vision behind the Euro to establish
Single Euro Payments Area SEPA Herman Ciappara Payments & Banking Department Central Bank of Malta
Single Euro Payments Area SEPA Herman Ciappara Payments & Banking Department Central Bank of Malta 1 1 Outline What is SEPA? Objectives Opportunities Important SEPA Dates Impact of SEPA Challenges 2 2
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information
Planned Healthcare in Europe for Lothian residents
Planned Healthcare in Europe for Lothian residents Introduction This leaflet explains what funding you may be entitled to if you normally live in Lothian (Edinburgh, West Lothian, Midlothian and East Lothian
Questions & Answers clarifying key aspects of the SEPA Cards Framework
Doc. EPC075-08 (Version 10.0) 11 June 2008 Questions & Answers clarifying key aspects of the SEPA Cards Framework Circulation: Publicly available Restricted: No SEPA a Guide to the Single Euro Payments
EXECUTIVE SUMMARY. Measuring money laundering at continental level: The first steps towards a European ambition. January 2011 EUROPEAN COMMISSION
MONEY LAUNDERING IN EUROPE Measuring money laundering at continental level: The first steps towards a European ambition EXECUTIVE SUMMARY January 2011 EUROPEAN COMMISSION DG HOME AFFAIRS FIGHT AGAINST
The coordination of healthcare in Europe
The coordination of healthcare in Europe Rights of insured persons and their family members under Regulations (EC) No 883/2004 and (EC) No 987/2009 Social Europe European Commission The coordination of
SEPA Creditors Guide. SEPA Direct Debit Core Scheme. Version 1.3 Final Page 1 of 38
SEPA Creditors Guide SEPA Direct Debit Core Scheme Version 1.3 Final Page 1 of 38 Log of Revisions to the SDD Creditors Guide Version number Version1.1 Brief description of revision Comprehensive guide
Intra-day payment Frequently asked questions
Intra-day payment Frequently asked questions Contents 1. THE MEANING, advantages and scope of intra-day payment... 3 1.1. What does the launch of intra-day payment mean?... 3 1.2. What advantages does
Roadmap for the Single Euro Payments Area
www.europeanpaymentscouncil.eu Roadmap for the Single Euro Payments Area Status and progress Gerard Hartsink Chair - European Payments Council Raad Nederlandse Detailhandel Utrecht, 28 augustus 2009 Agenda
REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL
EUROPEAN COMMISSION Brussels, 25.9.2014 COM(2014) 592 final REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL on the implementation in the period from 4 December 2011 until 31 December
Special Eurobarometer 423 CYBER SECURITY SUMMARY
Special Eurobarometer 423 CYBER SECURITY SUMMARY Fieldwork: October 2014 Publication: February 2015 This survey has been requested by the European Commission, Directorate-General for Home Affairs and co-ordinated
Internet Governance and Cybersecurity Patrick Curry MACCSA [email protected]
Internet Governance and Cybersecurity Patrick Curry MACCSA [email protected] This project has received funding from the European Union s Seventh Framework Programme for research, technological development
A Steria Report SEPA: will European businesses be ready for the transformation? Prepared in collaboration with. è www.steria.com
A Steria Report SEPA: will European businesses be ready for the transformation? Prepared in collaboration with è www.steria.com 02 SEPA : will European businesses be ready for the transformation? è www.steria.com
for CONSUMERS Information on the SINGLE EURO PAYMENTS AREA
Version 5.0 - February 2014 for CONSUMERS Information on the SINGLE EURO PAYMENTS AREA All you need to know about SEPA EPC Shortcut Series* Shortcut to SEPA Shortcut to the SEPA Direct Debit Schemes Shortcut
365 Phone, Online and Mobile Banking Terms and Conditions - Republic of Ireland Effective from 25 th November 2013
365 Phone, Online and Mobile Banking Terms and Conditions - Republic of Ireland Effective from 25 th November 2013 1.0 Definitions of Terms used in this Document 2.0 Accounts 3.0 Mandates 4.0 SEPA Transfers
INNOBAROMETER 2015 - THE INNOVATION TRENDS AT EU ENTERPRISES
Eurobarometer INNOBAROMETER 2015 - THE INNOVATION TRENDS AT EU ENTERPRISES REPORT Fieldwork: February 2015 Publication: September 2015 This survey has been requested by the European Commission, Directorate-General
ARE THE POINTS OF SINGLE CONTACT TRULY MAKING THINGS EASIER FOR EUROPEAN COMPANIES?
ARE THE POINTS OF SINGLE CONTACT TRULY MAKING THINGS EASIER FOR EUROPEAN COMPANIES? SERVICES DIRECTIVE IMPLEMENTATION REPORT NOVEMBER 2011 EUROPEAN COMPANIES WANT WELL-FUNCTIONING POINTS OF SINGLE CONTACT
Terms and Conditions for Direct Debit Collection.
Terms and Conditions for Direct Debit Collection. Version as of 3 February 2015 Landesbank Baden-Württemberg - 1 - As at 10/13 Contents Terms and Conditions for Direct Debit Collection Collection Authorization
International Compliance
YOUR FREE COPY - NEW - Additional countries outside European Union LEGAL WHITE PAPER International Compliance Legal requirements international einvoicing European Union & Selected Countries Worldwide International
A strategic approach to fraud
A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for
1. Perception of the Bancruptcy System... 2. 2. Perception of In-court Reorganisation... 4
Bankruptcy Systems and In-court Reorganisation of Firms, 2010 Content: 1. Perception of the Bancruptcy System... 2 2. Perception of In-court Reorganisation... 4 3. Perception of Creditor Committees, Fast
Criminal Investigation
Criminal Investigation Stolen Identity Refund Fraud (SIRF) Nneka Sutherland Special Agent (267) 941 6281 [email protected] Joseph Carl Special Agent (267) 941 6117 [email protected] IRS
T-CY Guidance Note #4 Identity theft and phishing in relation to fraud
www.coe.int/tcy Strasbourg, 5 June 2013 T-CY (2013)8E Rev Cybercrime Convention Committee (T-CY) T-CY Guidance Note #4 Identity theft and phishing in relation to fraud Adopted by the 9 th Plenary of the
Collaboration Grant. How to APPLY. Contents. Introduction. Eligibility criteria who is eligible and what is eligible? What we don t fund
Collaboration Grant How to APPLY Contents Introduction 2 Eligibility criteria who is eligible and what is eligible? 3 What we don t fund 6 How we assess the applications 7 Application form 6 INTRODUCTION
CABINET OFFICE THE CIVIL SERVICE NATIONALITY RULES
ANNEX A CABINET OFFICE THE CIVIL SERVICE NATIONALITY RULES Introduction The Civil Service Nationality Rules concern eligibility for employment in the Civil Service on the grounds of nationality and must
The Community Innovation Survey 2010 (CIS 2010)
The Community Innovation Survey 2010 (CIS 2010) THE HARMONISED SURVEY QUESTIONNAIRE The Community Innovation Survey 2010 FINAL VERSION July 9, 2010 This survey collects information on your enterprise s
EUREKA Funding Schema in Turkey. Hüseyin GÖREN EUREKA National Project Coordinator
EUREKA Funding Schema in Turkey Hüseyin GÖREN EUREKA National Project Coordinator İstanbul ITEA2 Event, February 6,2008 EUREKA initiative is... intergovermental, Austria Belgium Croatia Czech Republic
IBM Financial Services Sector. IBM Payment Platform to face SEPA A flexible approach for a Smarter Bank
IBM Payment Platform to face SEPA A flexible approach for a Smarter Bank Market Forces Driving the Payments Industry to Transform Economic Pressures Increasing pressures on fees Margins being squeezed
Genuine BMW Accessories. The Ultimate Driving Machine. BMW Trackstar. tracked. recovered. BMW TRACKSTAR.
Genuine BMW Accessories BMW Trackstar The Ultimate Driving Machine stolen. tracked. recovered. BMW TRACKSTAR. stolen vehicle TRACKING SYSTEM. stolen. tracked. recovered. BMW Trackstar Stolen Vehicle Recovery
Identity Theft. What it is and How to Protect Yourself
Mark R. Herring Attorney General Commonwealth of Virginia Office of the Attorney General 900 East Main Street Richmond, Virginia 23219 (804) 786-2071 (Telephone) (804) 786-1991 (Facsimile) Identity Theft
Special Eurobarometer 390 CYBER SECURITY REPORT
Special Eurobarometer 390 CYBER SECURITY REPORT Fieldwork: March 2012 Publication: July 2012 This survey has been requested by the European Commission, Directorate-General Home Affairs and co-ordinated
Retail Payment Services
Retail Payment Services Information Sheet January 2015 Contents: 1. Security 2. Direct debits 3. Business days 4. Limits 5. Fees and charges 6. Exchange rates 7. Current account interest 8. Value date
Answers to the Green Paper Towards an integrated European market for card, internet and mobile payments
Answers to the Green Paper Towards an integrated European market for card, internet and mobile payments Ad 4.1.1. (MIFs) Figure 1. Interchange fees in card payments in Europe (2011). Visa Poland Germany
Concept and Project Objectives
3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the
Replacement Migration
Population Division Department of Economic and Social Affairs United Nations Secretariat Replacement Migration United Nations ST/ESA/SER.A/206 Population Division Department of Economic and Social Affairs
Market Intelligence Cell. Fighting Financial Crime
Market Intelligence Cell Fighting Financial Crime 1 Market Intelligence Cell Our objective To investigate and suppress illegal, dishonorable and improper practices, market abuse and any potential breach
INTERNATIONAL. Helping your money travel around the world. International payments travel money and CHAPS. Talk to us today
INTERNATIONAL Helping your money travel around the world International payments travel money and CHAPS Talk to us today Access your money, at home and away Maybe you have family overseas and want to send
Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009
Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current
Crystal Clear Contract Services Limited Application Form CIS/Sole Trader
CIS/Sole Trader Please sign and complete this form as soon as possible. Until we have processed your application, we cannot pay you. Complete the whole form if you can, BUT YOU MUST COMPLETE ALL AREAS
Information Concerning the Use of the SEPA Payment Schemes
DEUTSCHES PATENT- UND MARKENAMT 80297 München Telephone: +49 89 2195-0 Telephone enquiries: +49 89 2195-3402 Internet: http://www.dpma.de Beneficiary: Bundeskasse Halle/DPMA IBAN: DE84 7000 0000 0070 0010
Implementing SEPA in Belgiu m
SEPA Country Guide Belgium Implementing SEPA in Belgiu m All you need to know for a successful SEPA migration Introduction This document provides an overview of all the country specific information you
Exercise 39. The Euro. At the end of this exercise you will:
Exercise 39 The Euro At the end of this exercise you will: Know how the Euro was named Know the countries using the Euro Be able to name all the Euro notes Be able to name all the Euro coins Be able to
Electricity, Gas and Water: The European Market Report 2014
Brochure More information from http://www.researchandmarkets.com/reports/2876228/ Electricity, Gas and Water: The European Market Report 2014 Description: The combined European annual demand for electricity,
Guidance on reason codes for SDD R-transactions
EPC173-14 Version 2.0 Date issued:16 April 2015 Guidance on reason codes for SDD R-transs 1. SDD R-TRANSACTION DEFINITION The content of this document applies to the SEPA Direct Debit Core Scheme Rulebook
International Hints and Tips
International Hints and Tips Content Q: What is the cut off time for processing International payments? A: International payments must be submitted and fully approved within the cut off time indicated
Special Eurobarometer 423 CYBER SECURITY REPORT
Special Eurobarometer 423 CYBER SECURITY REPORT Fieldwork: October 2014 Publication: February 2015 This survey has been requested by the European Commission, Directorate-General for Home Affairs and co-ordinated
OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009
OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009 Current Laws: A person commits the crime of identity theft if the
187/2014-5 December 2014. EU28, euro area and United States GDP growth rates % change over the previous quarter
187/2014-5 December 2014 This News Release has been revised following an error in the data for Gross Fixed Capital Formation. This affects both the growth of GFCF and its contribution to GDP growth. All
99/2015-9 June 2015. EU28, euro area and United States GDP growth rates % change over the previous quarter
2005Q1 2005Q2 2005Q3 2005Q4 2006Q1 2006Q2 2006Q3 2006Q4 2007Q1 2007Q2 2007Q3 2007Q4 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 2012Q1
PORTABILITY OF SOCIAL SECURITY AND HEALTH CARE BENEFITS IN ITALY
PORTABILITY OF SOCIAL SECURITY AND HEALTH CARE BENEFITS IN ITALY Johanna Avato Human Development Network Social Protection and Labor The World Bank Background study March 2008 The Italian Social Security
SEPA Direct Debit Initiation Customer-to-Bank Implementation Guidelines for the Netherlands
SEPA Direct Debit Initiation Customer-to-Bank Implementation Guidelines for the Netherlands CORE and Business-to-Business Implementation Guidelines Disclaimer These guidelines may be subject to changes.
Technical Meeting on Advances in Exploration Techniques for Uranium Deposits and Other Radioactive Element Deposits
INTERNATIONAL ATOMIC ENERGY AGENCY (IAEA) Technical Meeting on Advances in Exploration Techniques for Uranium Deposits and Other Radioactive Element Deposits 1-4 September 2014 IAEA Headquarters, Vienna,
The New Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age
How to Battle the Leading Identity Fraud Tactic in The Digital Age In the 15 years since synthetic identity fraud emerged as a significant threat, it has become the predominant tactic for fraudsters. The
Payments Package: Questions and Answers
Payments Package: Questions and Answers Date: November 2013 Contact: Ruth Milligan, T: +32 2 737 05 95, [email protected] A. Introduction The Commission published its Payments Package on 24 July
An Overview of Cybersecurity and Cybercrime in Taiwan
An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication
The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015
The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table
Information on insurance tax and fire protection tax for EU/EEA insurers
Information on insurance tax and fire protection tax for EU/EEA insurers I. General This leaflet is intended for all insurers and authorised agents located in the EU/EEA area who are established outside
CASH BENEFITS IN RESPECT OF SICKNESS AND MATERNITY SUBJECT TO EU COORDINATION
CASH BENEFITS IN RESPECT OF SICKNESS AND MATERNITY SUBJECT TO EU COORDINATION Z a k ł a d U b e z p i e c z e ń S p o ł e c z n y c h The scope and purpose of benefits coordination The EU coordination
The need for a secure & trusted payment instrument in e-commerce. Ali AlMeshal
The need for a secure & trusted payment instrument in e-commerce Ali AlMeshal In Physical/Real World Hand over card Visual check Swipe in POS Online authorization Receipt with signature panel Sign or Pin
EN ISO 14121-1. Safety of machinery Risk assessment. Sicherheit von Maschinen Risikobeurteilung Teil 1: Leitsätze (ISO 14121-1:2007)
ÖNORM EN ISO 14121-1 Edition: 2008-01-01 Safety of machinery Risk assessment Part 1: Principles (ISO 14121-1:2007) Sicherheit von Maschinen Risikobeurteilung Teil 1: Leitsätze (ISO 14121-1:2007) Sécurité
Car Insurance Policy Summary
Car Insurance Policy Summary This policy summary outlines your car insurance cover, please read this carefully. It does not give details of all of the policy limits, terms, conditions and exclusions. For
INTERNATIONAL SERVICES TARIFF
INTERNATIONAL SERVICES TARIFF Supporting your international business Our service promise. If you experience a problem, we will always try to resolve it as quickly as possible. Please bring it to the attention
BUSINESS JUSTIFICATION
BUSINESS JUSTIFICATION FOR THE DEVELOPMENT OF NEW UNIFI (ISO 20022) FINANCIAL REPOSITORY ITEMS Name of the request: Payments Mandates Submitting organization: SWIFT SCRL Avenue Adèle, 1 1310 La Hulpe Belgium
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
