Outsourcing Technology Services A Management Decision



Similar documents
TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel

Risk Management of Outsourced Technology Services. November 28, 2000

GUIDANCE FOR MANAGING THIRD-PARTY RISK

Outsourcing Technology Services OT

Outsourced Third Party Relationship Management/ Vendor Management. TTS Webinar July 15, 2015 Susan Orr CISA, CISM, CRISC, CRP

Vendor Management. Outsourcing Technology Services

Any business relationship between a bank and another entity, by contract or otherwise

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

Vendor Management: An Enterprise-wide Focus. Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd.

White Paper on Financial Institution Vendor Management

Managing Outsourcing Arrangements

Vendor Risk Management in the New Regulatory Environment. kpmg.com

<[Z[hWb <_dwdy_wb?dij_jkj_edi ;nwc_dwj_ed 9ekdY_b

Cloud Computing: Legal Risks and Best Practices

VENDORINSIGHTU P D A T E

OCC 98-3 OCC BULLETIN

Navigating Vendor Management Issues in Today s Regulatory Environment

<[Z[hWb <_dwdy_wb?dij_jkj_edi ;nwc_dwj_ed 9ekdY_b

Prudential Practice Guide

Third Party Relationships

Credit Union Liability with Third-Party Processors

Vendor Management Compliance Top 10 Things Regulators Expect

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

Vendor Management Compliance Top 10 Things Regulators Expect

VII 4.1. VII. Unfair and Deceptive Practices Third Party Risk. Third Party Risk. Introduction. Background

9/13/ /20 Vision for Vendor Management & Oversight. Disclaimer. Bank Service Company Act - FIL-49-99

Instructions for Completing the Information Technology Officer s Questionnaire

Office of Inspector General

Asset Management. Comptroller s Handbook. Comptroller of the Currency Administrator of National Banks

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

Guidelines for Financial Institutions Outsourcing of Business Activities, Functions, and Processes Date: July 2004

Preparing for the Outsourcing Challenge: Legal Due Diligence to Ensure a Winning Service Provider Relationship

Appendix J: Strengthening the Resilience of Outsourced Technology Services

VII 5.1. VII. Abusive Practices Third Party Procedures. Third Party Risk. Introduction. Background

INFORMATION TECHNOLOGY OFFICER S QUESTIONNAIRE. Instructions for Completing the Information Technology Examination Officer s Questionnaire

Statement of Guidance: Outsourcing All Regulated Entities

OUTSOURCING POLICY

The rise of third party relationships means rise in risk and regulation. Non-compliance is risky business for financial institutions

Identifying Key Risk Indicator

Information Technology

Due Diligence and Effective Vendor Management. Corporate America Credit Union 30 th Annual Meeting May 1, 2012

Morgan Stanley. Policy for the Management of Third Party Residential Mortgage Servicing Providers

GUIDANCE NOTE ON OUTSOURCING

Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

Technology Outsourcing. Tools to Manage Technology Providers Performance Risk: Service Level Agreements

Anatomy of an IT Outsourcing Deal. Bruce Laco Deloitte John Pickett IT World Canada Barry Sookman McCarthy Tetrault

Understanding the Fundamentals of Credit Union Third-Party Vendor Due Diligence

Risk Management of Remote Deposit Capture

SHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE ( ) ON THIRD PARTY RELATIONSHIPS

Objective and key requirements of this Prudential Standard

The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations

VENDOR MANAGEMENT. General Overview

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Forensic Services. Third Party Risks. March 2013

Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World

Validating Third Party Software Erica M. Torres, CRCM

OUTSOURCING GUIDELINES FOR BANKS AND FINANCIAL INSTITUTIONS, 2008

SUPERVISION GUIDELINE

LRES Corporation. Best Business Practices for an Appraisal Management Company

Vendor Management Best Practices

GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK FOR CREDIT UNIONS

Technology Outsourcing. Effective Practices for Selecting a Service Provider

SECURITY AND EXTERNAL SERVICE PROVIDERS

Draft Guidelines on Outsourcing of activities by Insurance Companies

Identifying and Managing Third Party Data Security Risk

THIRD PARTY SUPPLIER RISK MANAGEMENT. Meeting Emerging Financial Services Regulatory Requirements. By Joseph Yacura, ISG Director.

POV on Draft Guidelines on Managing Risks and Code of Conduct in Outsourcing of Financial Services by NBFCs

HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers

Mapping of outsourcing requirements

Federal Financial Institutions Examination Council FFIEC. E-Banking IT EXAMINATION HANDBOOK

GUIDELINES ON OUTSOURCING

Internet Banking Internal Control Questionnaire

GUIDANCE NOTE OUTSOURCING OF FUNCTIONS BY ENTITIES LICENSED UNDER THE PROTECTION OF INVESTORS (BAILIWICK OF GUERNSEY) LAW, 1987

Guideline. Outsourcing of Business Activities, Functions and Processes. Category: Sound Business and Financial Practices

Outsourcing in the Financial Services Industry: Finding Opportunities and Managing Risk. New York. OCC and FRB Guidance on Managing Third-Party Risk

Transcription:

Outsourcing Technology Services A Management Decision A Telephone Seminar for National Banks Tuesday, July 20, 2004 And again on Wednesday, July 21, 2004

Agenda Outsourcing activities and relationships Regulatory guidance and expectations Risk management process Examiner focus Hot topics Foreign outsourcing considerations Intrusion and Incident Response Recap Question and Answer Session 2

Commonly Outsourced Technology Services Core bank processing Disaster recovery Wholesale payments ACH processing Credit card network/switching Customer service/call centers 3

Commonly Outsourced Technology Services (continued) Aggregation Web site hosting Imaging and electronic safekeeping Network management Security monitoring Digital certificate services 4

Types of Technology Service Providers Financial institutions Non-banks Independent data centers Joint ventures Limited liability corporations Bank service corporations 5

Outsourcing and Third-Party Guidance FFIEC IT Handbook OCC Bulletin 2001-47 OCC Bulletin 2002-16 Advisory Letter 2001-8 Outsourcing Technology Services Booklet Risk Management Principles for Third-Party Relationships Bank Use of Foreign-Based Third-Party Service Providers Standards for Safeguarding Customer Information 6

Outsourcing and Third-Party Guidance FFIEC IT Handbook OCC Bulletin 2004-20 Advisory Letter 2000-12 OCC Bulletin 98-38 OCC Bulletin 98-3 Supervision of Technology Service Providers Booklet Risk Management of New, Expanded, or Modified Bank Products and Services Interagency Guidance on IT Outsourcing PC Banking Technology Risk Management 7

Risk Management Process 1. Risk assessment 2. Due diligence 3. Written contracts 4. Ongoing monitoring 8

Risk Assessment Identify outsourcing risks Assess internal expertise Identify infrastructure Measure cost/benefit relationship Assess impact on Information Security Program GLBA Section 501(b) 9

Risk Assessment Common Problems Failing to recognize and mitigate the risks Underestimating the risks involved Failing to devote the appropriate resources prior to implementation Allowing economic pressure to limit spending on needed controls The risk assessment is the foundation upon which you develop and maintain your risk management process. 10

Due Diligence Is this a company you want to do business with? Check references Peers User Groups Better Business Bureau Law enforcement Determine expertise Assess reliability Understand vendor management practices Subcontractors 11

Due Diligence Determine adequacy of risk management process Assess effectiveness of controls Determine servicer s capability Analyze servicer s financial condition 12

Contracts Issues banks should consider addressing in contracts: Scope of arrangement Description of fees and costs, including purchasing and maintaining hardware and software Service Level Agreements (SLA) MIS Audit requirements and reports Business resumption and contingency planning Regulatory requirements clause Data ownership and use 13

Contracts Issues banks should consider addressing in contractscontinued: Security and confidentiality Intrusion and data compromise alerts Indemnification Insurance coverage Dispute resolution Default and termination Customer complaints Services subject to OCC examination and oversight 14

Contracts Key provisions in contracts: Data ownership Data may be servicer s largest asset in bankruptcy May not have access to it if not specified Service level agreements: Response time System availability Data integrity benchmarks Economic incentives and penalties Report availability and timing 15

Contracts Key provisions in contracts - continued: Responsibilities in key areas should be clear Customer complaints Business resumption/contingency planning Regulatory requirements clause GLBA 501b compliance Data compromise/intrusion/detection/ Monitoring/Incident Response 16

Contracts Key provisions in contracts - continued: Bank access to audit reports Specify right to review audit reports of servicer in a timely manner. This right helps bank to meet its 501(b) monitoring obligation. 17

Contracts Key provisions in contracts - continued: Termination and Exit Clauses Include clause to allow either party to terminate under certain circumstances. Contain detail on termination fees and the responsibilities of the servicer and the bank in the event of early termination, whether planned or not. Termination fees should not be excessive or unreasonable. Contract should permit an orderly transition to new vendor. 18

Ongoing Monitoring and Oversight Financial condition of the service provider On-going monitoring Audited financial statements Servicer s ability to meet obligations Adequacy of IT insurance coverage Activate contingency plan if condition unstable or deteriorating 19

Ongoing Monitoring and Oversight General control environment of service provider Internal and security controls Internal and external audits Security and regulatory reports Policies addressing changes in products/services or regulatory requirements Business resumption contingency planning and testing User group issues Vendor management of subcontractors 20

Ongoing Monitoring and Oversight Quality of service and support Performance relative to contract and SLA s Customer complaints Training provided to employees Regular meetings with servicer to discuss performance 21

On-going Monitoring and Oversight Report to the Board of Directors Recap of significant service providers Policy compliance Business plans for new products and services Risk management and performance reports Periodic updates - annually or more frequent as needed 22

Dynamic Risk Management Process 1) Risk Assessment B O A R D 2) Due Diligence and Selection of Third Party 3) Negotiate Contract 5) Board reports and other data 4) Ongoing Monitoring The Board should be involved in the entire process. 23

Examiner Focus In assessing your risk management process, examiners may review: Business plans for significant, newly outsourced functions Risk assessments Due diligence reviews Contracts MIS from third party Ongoing monitoring and documentation Board reporting 24

Hot Topics Foreign Outsourcing Intrusion and Incident Response 25

Foreign Outsourcing - Regulatory Guidance OCC Bulletin 2002-16 Bank Use of Foreign-Based Third Party Service Providers Appendix C of the FFIEC IT Handbook, Outsourcing Technology Services Booklet 26

Foreign Outsourcing - Additional Risks Country Risk Economic, social, and political conditions Impact on servicer s ability to perform contractual obligations Compliance Risk Impact on bank s compliance with US and foreign laws OFAC s sanctions and embargo provisions Requirements on exportation of encryption-related technologies Ability to enforce contracts Jurisdictional considerations 27

Foreign Outsourcing - Additional Risks Operational Risk Accessibility and ownership of bank data Ability to monitor/control overseas operations 28

Foreign Outsourcing - Contracts Specific contracts provisions Choice of law and choice of forum Privacy and security obligations Continued bank ownership of data OCC s authority to examine foreign servicer 29

Foreign Outsourcing Ongoing Monitoring Monitoring and oversight complexities Reliable financial data Performance and quality data Geographic and time zone considerations 30

Foreign Outsourcing OCC Examinations OCC Focus Assess the bank s risk management process Require English translations of critical documents Examination of services performed by foreign-based servicer 31

Intrusion and Incident Response Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and Customer Notice Proposed guidance issued for comment August 2003; final version will be issued soon. Binding interpretation of GLBA 501(b) GLBA and Guidelines. Requires banks to implement a response program after unauthorized access to customer information. Applies to information held by service providers. 32

Intrusion and Incident Response Response Program requirements: Assess the situation Notify regulators & law enforcement (SAR) Initiate containment and control measures Implement corrective measures Flag accounts; secure accounts Provide customer notice 33

Intrusion and Incident Response Proposed Guidance - Contracts OCC Bulletin 2001-47: service contracts should require client bank notification of security breaches at the servicer resulting in unauthorized access to customer information. Proposed guidance would mandate such notification provisions in servicer contracts. 34

Outsourcing Recap Outsourcing IS a management decision. Arrangement can be a safe way to improve earnings. The Board has ultimate responsibility. Risk management process should be commensurate with the risks. 35

Outsourcing Recap Outsourcing is subject to the same risk management process as if it were performed internally. Outsourcing to affiliates should be structured similarly as outsourcing to non-affiliates. Outsourcing to foreign servicers based on same principles as those for domestic companies. Have an adequate response program and customer notification process within your Information Security Program. 36

Follow-up questions and OCC website Contact your Portfolio Manager, Assistant Deputy Comptroller, or Large Bank Examiner-in-Charge regarding any technology outsourcing question you might have. The OCC website, www.occ.treas.gov has links to all guidance documents mentioned in this presentation. 37

Question and Answer Segment 38