Executive Fraud Forum October 30, 2013
|
|
|
- Julian Dalton
- 10 years ago
- Views:
Transcription
1 Executive Fraud Forum October 30, 2013 Payments Fraud Trends Mary Kepler, Director, Retail Payments Risk Forum, Federal Reserve Bank of Atlanta Judy Long, Executive Vice President, First Citizens National Bank Michael Blume, Director, U.S. Department of Justice Josh Burke, Trial Attorney, U.S. Department of Justice Charles Baxter, Special Agent, United States Secret Service The views expressed in this presentation are those of the presenters and do not necessarily reflect the views of the Federal Reserve Bank of Atlanta, First Citizens National Bank, the U.S. Department of Justice, or the U.S. Secret Service. 1
2 The Problem: Changing players, changing risks Agenda: Third Party Payment Processors Risks & Regulatory Considerations Bank Risk Controls Case Studies Building Relationships with Law Enforcement 2
3 Third Party Payment Processors Perform payment services for businesses and stand between the bank and merchant Brick and mortar or online and mobile merchants Legitimate, high risk, and illegal merchants Provide various payment transactions, particularly ACH Remotely created checks HIGH RISK MERCHANTS/ACTIVITIES: Ammo sales Gov t grants Pharma sales As seen on TV Gambling Pornography Credit repair services Pay day loans Telemarketing Other payment processors (nested processors) 3
4 Remotely Created Checks: Volumes unknown but risk high Check created by merchant or third party payment processor with buyer s account number, no signature Difficult to identify no MICR identifier After the fact: mounting returns indicate trouble 4
5 KYC and KYCC TPPP Due Diligence and Monitoring Onboarding and due diligence: Know business line of TPPP s customers Visit TPPP, review website and marketing materials Understand TPPP s procedures for due diligence and monitoring of its customers Ongoing monitoring: Consumer complaints and returns, set thresholds Set transaction volume limits Audit processor periodically Require reports from TPPP on new customers and return rates of customers RED FLAGS: TPPP splitting volume between multiple banks or history of moving from bank to bank Consumer complaints re: unauthorized, misrepresented, strong arm tactics High rates of unauthorized returns 5
6 Regulatory Responses and Resources Responses: Require bank to terminate relationship with TPPP Take informal or formal enforcement actions Impose civil money penalties Invoke Section 5 of the FTC Act: prohibits unfair or deceptive acts or practices affecting commerce, and bank may be viewed as facilitating TPPP s or merchant s fraudulent activity Resources: FDIC Supervisory Approach to Payment Processing Relationships with Merchant Customers that Engage in Higher-Risk Activities (FIL ) September 27, 2013 FDIC Revised Guidance on Payment Processor Relationships (FIL ) January 31, 2012 FinCEN Advisory on Risks Associated with Third-Party Payment Processors (FIN A010) October 22,
7 Bank Risk Controls Financial Institutions should assess risk tolerance in overall risk assessment program & develop policies & procedures addressing due diligence, underwriting, & ongoing monitoring of high risk payment processor relationships. FI should ensure agreements with payment processors provide terms and conditions of overall program. 7
8 Bank Risk Controls - ACH Know Your Customer Enhance Due Diligence Effective Underwriting Increased Scrutiny & Monitoring of High Risk Accounts for an Increase in Unauthorized Returns Charge Backs Suspicious Activity and/or Consumer Complaints 8
9 Bank Risk Controls Implement risk mitigation policies & procedures that include oversight & controls appropriate for the risk & transaction types of the payment processing activities. 9
Payment Processor Relationships Revised Guidance
Federal Deposit Insurance Corporation 550 17th Street NW, Washington, D.C. 20429-9990 Payment Processor Relationships Revised Guidance Financial Institution Letter FIL-3-2012 January 31, 2012 Summary:
FDIC Updates Guidance on Payment Processor Relationships
February 2012 FDIC Updates Guidance on Payment Processor Relationships BY KEVIN L. PETRASIC In its recently issued Financial Institution Letter, FIL-3-2012, the Federal Deposit Insurance Corporation (
GUIDANCE ON PAYMENT PROCESSOR RELATIONSHIPS (Revised July 2014)
Federal Deposit Insurance Corporation 550 17th Street NW, Washington, D.C. 20429-9990 Financial Institution Letter FIL-127-2008 November 7, 2008 GUIDANCE ON PAYMENT PROCESSOR RELATIONSHIPS (Revised July
Third Party Payment Processors Job Aid
Third Party Payment Processors Job Aid This job aid is to be used by state institution examiners as a means to understand, identify, and assess the risks associated with institutions relationships with
Get In Tune With Third Parties: Finding the harmonies between Third Party Senders, Originators, and Customers.
Get In Tune With Third Parties: Finding the harmonies between Third Party Senders, Originators, and Customers. Marsha Jones President TPPPA Brent Siegel Vice President Argos Risk 1 1 AGENDA/OUTLINE Third-Party
THIRD PARTY PAYMENT PROVIDERS
THIRD PARTY PAYMENT PROVIDERS BY DARLIA FOGARTY, DIRECTOR OF COMPLIANCE & COO KNOWLEDGE. CLARITY. RELIABILITY. www.compliancealliance.com (888) 353-3933 THIRD PARTY PAYMENT PROCESSORS Third Party Payment
Managing TPPPs and TPSs in the Current Regulatory Environment
November 2015 Managing TPPPs and TPSs in the Current Regulatory Environment Prepared by: Jodie Ruby, Director Audience: This document is intended for managers, directors and executives who deal with business
ACH and Third Party Payment Processors
ACH and Third Party Payment Processors Definition of Third-Party Relationship Entity with which financial institution has entered into a business relationship Facilitate customer access to bank services
Know Your Customer & Know Your Customer s Customers (KYCC) BITS ACH Fraud Risk Subgroup Presented by George Thomas November 19, 2008
Know Your Customer & Know Your Customer s Customers (KYCC) BITS ACH Fraud Risk Subgroup Presented by George Thomas November 19, 2008 Agenda Theme and Issue Types of Third Party Processors Risk from Third
Office of Audits and Evaluations Report No. AUD-15-008
Office of Audits and Evaluations Report No. AUD-15-008 The FDIC s Role in Operation Choke Point and Supervisory Approach to Institutions that Conducted Business with Merchants Associated with High-Risk
Third-Party Sender Case Studies: ODFI Best Practices to Close the Gap An ACH Risk Management White Paper
Third-Party Sender Case Studies: ODFI Best Practices to Close the Gap An ACH Risk Management White Paper This ACH risk management white paper examines three case studies related to Third-Party Sender Risk.
Third-Party Senders Risks and Best Practices
Third-Party Senders Risks and Best Practices Please turn off all cell phones or mobile devices. Thank you to today s sponsors! This morning s refreshment break sponsored by The Royal Bank of Scotland EventMobile
Electronic Transactions Association Guidelines on Merchant and ISO Underwriting and Risk Monitoring
TM MARCH 2014 Electronic Transactions Association Guidelines on Merchant and ISO Underwriting and Risk Monitoring DEVELOPED BY www.deanarich.com COUNSEL Venable LLP Jeffrey D. Knowles Ellen Traupman Berge
Third Party Payment Processors: Relationships, Guidance, and Case Examples
Federal Financial Institutions Examination Council, Examiner Education 3501 Fairfax Drive Room B3030 Arlington, VA 22226-3550 (703) 516-5588 FAX (703) 516-5487 http://www.ffiec.gov Third Party Payment
Payment Systems: Regulatory Interest in Payment Processors, Faster Payments, and Related Consumer Protections
July 2015 RPL15-04 Payment Systems: Regulatory Interest in Payment Processors, Faster Payments, and Related Consumer Protections Executive Summary The expansion of the Internet and the growth in electronic
Payment Systems Today: Latest Legal and Regulatory Challenges
Payment Systems Today: Latest Legal and Regulatory Challenges October 14, 2014 Jon Genovese, Vantiv Ellen T. Berge, Esq., Venable LLP Ed Wilson, Esq., Venable LLP Andrew E. Bigart, Esq., Venable LLP 1
Executive Summary. Guidelines on Merchant and ISO Underwriting and Risk Monitoring MARCH 2014 COUNSEL DEVELOPED BY
TM MARCH 2014 Guidelines on Merchant and ISO Underwriting and Risk Monitoring Executive Summary DEVELOPED BY www.deanarich.com COUNSEL Venable LLP Jeffrey D. Knowles Ellen Traupman Berge Leonard L. Gordon
Information Technology
Information Technology Information Technology Session Structure Board of director actions Significant and emerging IT risks Practical questions Resources Compensating Controls at the Directorate Level
October 9, 2015. Re: Comments on Third-Party Sender Registration Proposal. Dear Ms. Bondoc,
National Consumer Law Center Consumer Federation of America Center for Responsible Lending Consumer Action Consumers Union National Association of Consumer Advocates National Consumers League U.S. PIRG
KYCC Strategies for Managing Third-Party Payment Processor (TPPP) and Third-Party Sender (TPS) Risk
KYCC Strategies for Managing Third-Party Payment Processor (TPPP) and Third-Party Sender (TPS) Risk Dan Frechtling SVP Marketing & Chief Product Officer April 20, 2015 Steve Clendaniel Director of Risk
In This Presentation:
The U.S. Department of Justice and banking regulators have stepped up the pace of criminal, civil and administrative actions against banks, payment processors, money transmitters, and other financial institutions,
Bank Secrecy Act, Anti-Money Laundering, and Office of Foreign Assets Control
Bank Secrecy Act, Anti-Money Laundering, and Office of Foreign Assets Control Overview The Bank Secrecy Act (BSA) was created in 1970 to assist in criminal, tax, and regulatory investigations. The Financial
ACH Operations Bulletin #1-2014
ACH Operations Bulletin #1-2014 Questionable ACH Debit Origination: Roles and Responsibilities of ODFIs and RDFIs September 30, 2014 Replaces ACH Operations Bulletin #2-2013 (Originally Issued March 14,
Unfair, Deceptive or Abusive Acts or Practices Act (UDAAP)..It May Not Be What You Think
Unfair, Deceptive or Abusive Acts or Practices Act (UDAAP)..It May Not Be What You Think November 15, 2012 Mary Thorson VP, Chartwell Compliance/ICBA CRM I. UDAAP Overview Background II. UDAAP An emerging
STATEMENT STUART F. DELERY ASSISTANT ATTORNEY GENERAL CIVIL DIVISION
STATEMENT OF STUART F. DELERY ASSISTANT ATTORNEY GENERAL CIVIL DIVISION BEFORE THE SUBCOMMITTEE ON REGULATORY REFORM, COMMERCIAL AND ANTITRUST LAW COMMITTEE ON JUDICIARY U.S. HOUSE OF REPRESENTATIVES FOR
RISK MANAGEMENT UPDATE Lessons [To Be] Learned from Recent Enforcement Actions
RISK MANAGEMENT UPDATE Lessons [To Be] Learned from Recent Enforcement Actions Presented by: Dixie K. Hieb and Robb Schlimgen Davenport, Evans, Hurwitz & Smith, LLP www.dehs.com 2014 Davenport, Evans,
Identifying Key Risk Indicator
PUERTO RICO PAYMENTS SYMPOSIUM Identifying Key Risk Indicator EPOCPR Services Agenda for Today Background History Regulators & Risk Management Let s have fun Regulators & Risk Assessment ACH Risks Categories
ACH Operations Bulletin #2-2013
ACH Operations Bulletin #2-2013 High-Risk Originators and Questionable Debit Activity March 14, 2013 EXECUTIVE SUMMARY Recent press reports have inaccurately stated that some Receiving Depository Financial
O OCC BULLETIN OCC 2006-39. Automated Clearing House Activities. Risk Management Guidance
O OCC BULLETIN Comptroller of the Currency Administrator of National Banks Subject: Automated Clearing House Activities Description: Risk Management Guidance TO: Chief Executive Officers, Chief Risk Officers,
NCUA LETTER TO CREDIT UNIONS
NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314 DATE: August 2008 LETTER NO.: 08-CU-19 TO: SUBJ: Federally Insured Credit Unions Third-Party Relationships:
Knowing your customers and their customers and their customers and so on and so on
Knowing your customers and their customers and their customers and so on and so on Identifying your Third-Party s and their Nested s This ACH risk management white paper provides an overview of ACH relationships
Do You Know Who Your Closing Agent is? MBA's Risk Management and Quality Assurance Forum September 9-11, 2012 Omni Dallas Hotel Dallas, TX
Do You Know Who Your Closing Agent is? MBA's Risk Management and Quality Assurance Forum September 9-11, 2012 Omni Dallas Hotel Dallas, TX INTRODUCTION In the age of Dodd-Frank and the Consumer Financial
3 rd Party Risk Management is Broken Critical Vendors Should be Exam-Ready.
3 rd Party Risk Management is Broken Critical Vendors Should be Exam-Ready. Abstract: Kudos to the FFIEC agencies efforts to bring more attention and effort to managing 3rd party risk. With so much focus
Facts About FACTA Red Flag Identity Theft Prevention Program
FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious
Evolving Legal and Regulatory Landscape for Lead Generation
Evolving Legal and Regulatory Landscape for Lead Generation LeadsCon 2012 February 27, 2012 The Mirage Resort & Casino, Las Vegas, NV Jonathan L. Pompan, Esq. Venable LLP, Washington, DC 1 IMPORTANT INFORMATION
Legal Ramifications of Operation Choke Point By Peter Weinstock, Hunton & Williams LLP 1
Legal Ramifications of Operation Choke Point By Peter Weinstock, Hunton & Williams LLP 1 I. Background The U.S. Department of Justice ( DOJ ) created Operation Choke Point ostensibly to combat consumer
Vendor Risk Management in the New Regulatory Environment. kpmg.com
Vendor Risk Management in the New Regulatory Environment kpmg.com Vendor Risk Management in the New Regulatory Environment 2 Vendor Risk Management in the New Regulatory Environment Background Regulators
3344-19-01 Identity theft prevention program and red flag compliance policy.
3344-19-01 Identity theft prevention program and red flag compliance policy. (A) Program adoption Cleveland state university has developed this identity theft prevention program ( program ) pursuant to
VII 4.1. VII. Unfair and Deceptive Practices Third Party Risk. Third Party Risk. Introduction. Background
Third Party Risk Introduction The board of directors and senior management of an insured depository institution (institution) are ultimately responsible for managing activities conducted through third-party
Compliance and Operational Services for Online Lenders
Compliance and Operational Services for Online Lenders VP Compliance Services, LLC October 2014 Company Overview VP Compliance Services (VPCS) is a leading provider of compliance and operational services
Board Responsibility. A bank can outsource a task, but it cannot outsource the responsibility.
Third-Party Risk Board Responsibility The Board of Directors and senior management are ultimately responsible for managing activities conducted through third-party relationships as if the activity were
Regulatory Compliance - What You Need to Know. John Zasada Principal CliftonLarsonAllen 218 790 1086 [email protected]
Regulatory Compliance - What You Need to Know John Zasada Principal CliftonLarsonAllen 218 790 1086 [email protected] Compliance Risk Defense or move forward It exists for all FIs Identify, rank,
IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF NORTH CAROLINA
IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF NORTH CAROLINA : UNITED STATES OF AMERICA, : : Plaintiff, : : v. : CIVIL ACTION NO. : FOUR OAKS FINCORP, INC., and : FOUR OAKS BANK & TRUST
Risk Management of Remote Deposit Capture
Federal Financial Institutions Examination Council 3501 FAIRFAX DRIVE ROOM 3086 ARLINGTON, VA 22226-3550 (703) 516-5487 http://www.ffiec.gov Background and Purpose Risk Management of Remote Deposit Capture
VII 5.1. VII. Abusive Practices Third Party Procedures. Third Party Risk. Introduction. Background
Third Party Risk Introduction The board of directors and senior management of an insured depository institution (institution) are ultimately responsible for managing activities conducted through third-party
Vendor Management: An Enterprise-wide Focus. Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd.
Vendor Management: An Enterprise-wide Focus Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd. Why Focus on Vendor Management Increased financial regulatory scrutiny GLBA and Identity Theft Red
WiFiAccessCode: LEADSPEDIA Follow at #leadscon Thursday, 4:00 4:45PM
WiFiAccessCode: LEADSPEDIA Follow at #leadscon Thursday, 4:00 4:45PM Staying Current with Consumer Protection: Practical Lessons from Recent Enforcement Actions MODERATOR: Jonathan Pompan, Partner, Venable
Red Flag Rules and Aging Services: What You Need to Know
Red Flag Rules and Aging Services: What You Need to Know Late in 2007, six federal agencies, including the Federal Trade Commission ( FTC ), jointly issued final rules and accompanying guidelines to implement
8 Hour MA SAFE Comprehensive: Key Topics for MLO s. Syllabus. Course Provider
8 Hour MA SAFE Comprehensive: Key for MLO s Course Provider Host Group Real Estate Academy 236 Huntington Avenue Suite #312 Boston, MA 02115 800-918-5240 www.hostgroup.us / www.hostgroupboston.com [email protected]
Chicago Region Regulatory Conference Call July 29, 2014 DON T FORGET ABOUT DEPOSIT REGULATIONS
Chicago Region Regulatory Conference Call July 29, 2014 DON T FORGET ABOUT DEPOSIT REGULATIONS 1 Introduction Teresa Sabanty, Deputy Regional Director PowerPoint E-mail: [email protected] Presenters:
Unlawful Internet Gambling Enforcement Act of 2006 Overview
Attachment A Unlawful Internet Gambling Enforcement Act of 2006 Overview This document provides an overview of the Unlawful Internet Gambling Enforcement Act of 2006 (UIGEA or Act), 31 USC 5361-5366, and
Vendor Management: Who the CFPB is Watching and Who They Are Expecting You to be Watching
Vendor Management: Who the CFPB is Watching and Who They Are Expecting You to be Watching John Barnes 713.210.7441 [email protected] Jessica Hinkie 713.210.7405 [email protected] Kat Statman
Client Update FinCEN Proposes Anti-Money Laundering Rules for Investment Advisers
1 Client Update FinCEN Proposes Anti-Money Laundering Rules for Investment Advisers WASHINGTON, D.C. Kenneth J. Berman [email protected] Satish M. Kini [email protected] Robert T. Dura [email protected]
Selecting a Secure and Compliant Prepaid Reloadable Card Program
Selecting a Secure and Compliant Prepaid Reloadable Card Program Merchants and other distributors of prepaid general purpose reloadable (GPR) cards should review program compliance as an integral part
Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation
Guidelines to FTC Red Flag Rule(reformatted) Appendix A to Part 681 Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 681.2 of this part requires each financial institution
IDENTITY THEFT RED FLAGS, ADDRESS DISCREPANCIES, AND CHANGE OF ADDRESS REGULATIONS Examination Procedures
Federal Deposit Insurance Corporation 550 17th Street NW, Washington, D.C. 20429-9990 Financial Institution Letter FIL-105-2008 October 16, 2008 IDENTITY THEFT RED FLAGS, ADDRESS DISCREPANCIES, AND CHANGE
Going All In on Board Reporting
Going All In on Board Reporting February 13, 2014 10:15 A.M to 11:15 A.M. Tony DaSilva, AAP, CISA Senior Examiner, Federal Reserve Bank of Atlanta Rajiv Donde President, Laru Technologies Peter Davey,
Credit Repair: Self-Help May Be Best
FTC Facts For Consumers Federal Trade Commission For The Consumer December 2005 www.ftc.gov 1-877-ftc-help Credit Repair: Self-Help May Be Best You see the advertisements in newspapers, on TV, and on the
CREDIT REPAIR SERVICES (California Civil Code 1789.10 et seq.; 15 U.S.C.A. 1679 et seq.)
Legal Affairs 1625 North Market Blvd., Suite S 309, Sacramento, CA 95834 www.dca.ca.gov Legal Guide CR-9 CREDIT REPAIR SERVICES (California Civil Code 1789.10 et seq.; 15 U.S.C.A. 1679 et seq.) January
Navigating Consumer Financial Protection Bureau ( CFPB ) Investigations and Enforcement Actions
Navigating Consumer Financial Protection Bureau ( CFPB ) Investigations and Enforcement Actions Section of Antitrust Law 2013 Spring Meeting Wednesday, April 10, 2013 Jonathan L. Pompan Partner, Co-Chair
UNFAIR, DECEPTIVE, OR ABUSIVE ACTS OR PRACTICES (UDAAP)
UNFAIR, DECEPTIVE, OR ABUSIVE ACTS OR PRACTICES (UDAAP) EXAMINATION PROCEDURES Examination Objectives To assess the quality of the credit union s compliance risk management systems, including internal
I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.
Procedure 3.6: Rule (Identity Theft Prevention) Volume 3: Office of Business & Finance Managing Office: Office of Business & Finance Effective Date: December 2, 2014 I. Purpose In 2007, the Federal Trade
FEDERAL DEPOSIT INSURANCE CORPORATION WASHINGTON, D.C.
FEDERAL DEPOSIT INSURANCE CORPORATION WASHINGTON, D.C. In the Matter of THE BANCORP BANK WILMINGTON, DELAWARE (INSURED STATE NONMEMBER BANK) CONSENT ORDER AND ORDER TO PAY CIVIL MONEY PENALTY FDIC-11-698b
Bank Secrecy Act/ Anti-Money Laundering Examination Manual
Bank Secrecy Act/ Anti-Money Laundering Examination Manual Federal Financial Institutions Examination Council Board of Governors of the Federal Reserve System, Federal Deposit Insurance Corporation, National
CONFERENCE OF STATE BANK SUPERVISORS AMERICAN ASSOCIATION OF RESIDENTIAL MORTGAGE REGULATORS NATIONAL ASSOCIATION OF CONSUMER CREDIT ADMINISTRATORS
CONFERENCE OF STATE BANK SUPERVISORS AMERICAN ASSOCIATION OF RESIDENTIAL MORTGAGE REGULATORS NATIONAL ASSOCIATION OF CONSUMER CREDIT ADMINISTRATORS STATEMENT ON SUBPRIME MORTGAGE LENDING I. INTRODUCTION
A Cautionary Tale Plus Cross-Channel Risk
Dan Tobin A Cautionary Tale Plus Cross-Channel Risk IT Examiner Supervision, Regulation & Credit [email protected] Agenda A Cautionary Tale Shames-Yeakel v. Citizens Financial Bank Cross-Channel Risk
