DOC

3501 FAIRFAX DRIVE ROOM 3086 ARLINGTON, VA 22226-3550

By Curtis Tucker,2014-05-24 03:00
8 views 0
[2] See the Audit, Management, Business Continuity Planning, and Information Security Booklets of the FFIEC IT Examination Handbook.

     Federal Financial Institutions Examination Council

    3501 FAIRFAX DRIVE ? ROOM 3086 ? ARLINGTON, VA 22226-3550 ? (703) 516-5487 ? http://www.ffiec.gov

    Risk Management of Remote Deposit Capture

Background and Purpose

    Remote Deposit Capture (RDC), a deposit transaction delivery system, allows a financial

    institution to receive digital information from deposit documents captured at remote locations.

    These locations may be the financial institution’s branches, ATMs, domestic and foreign

    correspondents, or locations owned or controlled by commercial or retail customers of the

    financial institution. In substance, RDC is similar to traditional deposit delivery systems at

    financial institutions; however, it enables customers of financial institutions to deposit items

    electronically from remote locations. RDC can decrease processing costs, support new and

    existing banking products, and improve customers’ access to their deposits; however, it

    introduces additional risks to those typically inherent in traditional deposit delivery systems.

This guidance addresses the necessary elements of an RDC risk management process in an

    electronic environment, focusing on RDC deployed at a customer location. The general

    principles of RDC risk management discussed here are also applicable to financial institutions’

    internal deployment and other forms of electronic deposit delivery systems (e.g., mobile banking

    and automated clearing house [ACH] check conversions).

Risk Management: Risk Assessment

    Although deposit taking is not a new activity, RDC should be viewed as a new delivery system

    and not simply as a new service. Prior to implementing RDC, senior management should

    identify and assess the legal, compliance, reputation, and operational risks associated with the

    new system. They should ensure that RDC is compatible with the institution’s business strategies and understand the return on investment and management’s ability to manage the risks inherent in RDC. Management should incorporate their assessments of RDC systems, including

    products and services, into existing risk assessment processes. The Management Booklet of the 1FFIEC IT Examination Handbook and the FFIEC Bank Secrecy Act/Anti-Money Laundering (BSA/AML) Examination Manual provide high-level descriptions of risk management processes

    that include planning, risk identification and assessment, controls, and measuring and 2monitoring.

     1 Board of Governors of the Federal Reserve System, Federal Deposit Insurance Corporation, National Credit Union

    Administration, Office of the Comptroller of the Currency, Office of Thrift Supervision, and a representative of the

    State Liaison Committee.

     2 See the Audit, Management, Business Continuity Planning, and Information Security Booklets of the FFIEC IT

    Examination Handbook. All booklets that compose the handbook are available at

    The size and complexity of the financial institution, as well as the relative scale and impact of RDC to overall activities, should determine the appropriate level at which governance, oversight, and risk management of RDC should occur. Accordingly, the board or management should approve plans, policies, and significant expenditures, and should review periodic performance and risk management reports on the implementation and ongoing operation of RDC systems and services.

A financial institution’s RDC risk assessment should include a determination of the risks to the 3security and confidentiality of nonpublic personal information consistent with the Interagency 4Guidelines Establishing Information Security Standards (Guidelines). Under these Guidelines,

    financial institutions must adjust their information security programs in light of any relevant changes in technology, the sensitivity of customer information, internal or external threats to information, and their own changing business arrangements. Therefore, as an institution implements RDC systems, it must consider information security risks associated with RDC technology and operations.

    The complexity of the risk identification and assessment process will vary depending on the scope of RDC implementation and exposures faced by the institution. In general, implementing RDC in the institution’s backroom operations may present less risk and complexity than deploying RDC at remote locations, such as customers’ business premises or homes, where the

    capture process is outside the direct control of the institution. Risks may differ if the institution uses image exchange for a portion of the process or elects to use the ACH network throughout. Therefore, depending on how RDC is implemented, the financial institution’s risk assessment should include its own IT systems as well as those of its third-party service providers and RDC customers.

    Financial institutions should approach their risk management responsibilities by involving all potential stakeholders in RDC. Depending on the size and complexity of the institution, stakeholders could include staff from information technology, deposit operations, treasury or cash management sales, business continuity, information security, audit, compliance (including BSA/AML), management, accounting, and legal. Some financial institutions may involve third parties in the risk assessment, implementation, or ongoing operations to provide additional expertise. Regardless of the parties involved, the board and senior management are ultimately responsible for safe and sound operations, including RDC products and services.

http://www.ffiec.gov/ffiecinfobase/index.html. Also refer to the Risk Assessment section in the FFIEC Bank

    Secrecy Act/Anti-Money Laundering Examination Manual at http://www.ffiec.gov/bsa_aml_infobase/default.htm.

     3 See FRS: 12 CFR 216.3(n); FDIC: 12 CFR 332.3(n); NCUA: 12 CFR 716.3(q); OCC: 12 CFR 40.3(n); OTS: 12 CFR 573.3(n).

     4 See FRS: 12 CFR 208, Appendix D-2 and 12 CFR 225, Appendix F; FDIC: 12 CFR 364, Appendix B; NCUA: 12 CFR 748, Appendix A; OCC: 12 CFR 30, Appendix B; OTS: 12 CFR 570, Appendix B.

     2

    Legal and Compliance Risks

Senior management should identify and assess exposure to legal and compliance risks related to

    RDC. For example, if a financial institution accepts a deposit of check images from a customer

    through the RDC system, legal risk exposures may be related to the controls over the process

    used for image capture or image exchange and the institution’s arrangements and contracts for clearing and settling checks. When a financial institution sends the deposited items, in either

    electronic or paper form, to another institution for collection or presentment, it should consider st5the risks it takes under the Check Clearing for the 21 Century Act (Check 21 Act), Regulation 6CC, Regulation J, applicable state laws, or any agreements or clearinghouse rules.

Some RDC systems employ “least cost routing,” which allows items to be transmitted and settled

    either through the check collection system or as an ACH transaction. Financial institutions 7should understand the separate rules and liabilities and consider them in the risk assessment.

For each clearing method, the financial institution should consider applicable legal and

    regulatory requirements, such as timing and amount of funds availability, as well as the

    timeframes for handling returned items. The institution should assess its agreements to verify

    that liability is allocated appropriately and that other matters, such as methods for resolving

    disputes and choice of legal jurisdiction, are addressed adequately. (See further discussion under

    Contracts and Agreements.)

The financial institution should evaluate potential risks and regulatory requirements under Bank

    Secrecy Act laws and regulations when designing and implementing RDC. The institution

    should consider whether and to what extent it could be exposed to the risk of money laundering

    activities as well as its ability to comply with anti-money laundering laws and regulations and 8suspicious activity monitoring. In particular, the growing use of RDC by foreign correspondent

    financial institutions and foreign money services businesses to replace pouch and certain

    instrument processing and clearing activities raises money laundering risks the institution should

    understand and mitigate. Additional due diligence may be necessary where there is evidence that

     5 Refer to the FFIEC Check 21 InfoBase for additional discussion of the Check 21 Act and the responsibilities

    associated with substitute checks at http://www.ffiec.gov/exam/check21.

     6 When a financial institution sends a check for collection or presentment, it makes warranties and takes on

    liabilities with respect to that check under Regulation CC, state law (the Uniform Commercial Code), and, if it sends

    the check to a Federal Reserve Bank, Regulation J. In addition, the financial institution may take on other

    responsibilities with respect to the check as agreed to between the participating institutions by contract or

    clearinghouse rules. The financial institution should consider applicable Federal Reserve Operating Circulars and

    governing agreements of relevant third parties involved in their check processing operations (e.g., Electronic Check

    Clearinghouse Organization [ECCHO]).

     7 See the rules of the National Automated Clearing House Association (NACHA) and Regulation E, 12 CFR 205.

     8 Laws and regulations related to anti-money laundering include the Bank Secrecy Act (BSA), the Uniting and

    Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001

    (USA PATRIOT Act), and Office of Foreign Assets Control (OFAC) requirements.

     3

the RDC capture device is in a foreign location, or when a customer has been otherwise 9identified as being high risk.

Operational Risks

    Senior management should understand operational risks and ensure that appropriate policies, procedures, and other controls are in place to mitigate them, including physical and logical access controls over RDC systems, original deposit items at customer locations, electronic files, and retained nonpublic personal information. Management should assess carefully how RDC affects existing risks and mitigating controls. For example, for the various technological options, management should assess the risks associated with how and where nonpublic personal information is captured, transmitted, retained, and destroyed. Management should consider the confidentiality, integrity, and availability of data afforded by its IT systems and by the systems used by its service providers and RDC customers.

    RDC processes at a customer location expose the financial institution to operational risks from the point of initial capture. These risks can be unique to each customer’s location, RDC

    processing technology, and information security systems. Faulty equipment, inadequate procedures, or inadequate training of customers and their employees can lead to inappropriate document processing, poor image quality, and inaccurate electronic data. Ineffective controls at the customer location may lead to the intentional or unintentional alteration of deposit item information, resubmission of an electronic file, or re-deposit of physical items. Inadequate separation of duties at a customer location can afford an individual end-to-end access to the RDC process and the ability to alter logical and physical information without detection. In the typical RDC process, original deposit items are not submitted to the financial institution but are retained by the customer or the customer’s service provider. Therefore, it is important for the financial institution to require customers to implement appropriate document management procedures to ensure the safety and integrity of deposited items from the time of receipt until the time of destruction or other voiding.

    Depending on the type of RDC system implemented, information security risks may extend to the financial institution’s own internal networks and networks of its service providers. These

    technology-related operational risks include failure to maintain compatible and integrated IT systems between the financial institution, service providers, and the customer. For example, a customer or service provider may modify RDC-associated software or hardware or fail to update or patch an associated operating system in a timely manner. There also may be risks related to Web application vulnerabilities, authentication of a customer to the RDC system, and encryption used at any point in the process. The Information Security Booklet of the FFIEC IT

    Examination Handbook provides further guidance in these areas.

    A financial institution should consider carefully the authentication method appropriate for RDC customers. As stated in the Interagency Guidance on Authentication in an Internet Banking 10Environment, the FFIEC agencies consider single-factor authentication, as the only control

     9 See USA PATRIOT Act ?312, 31 CFR 103.176. 10 See FRS: SR 05-19; FDIC: FIL 103-2005; NCUA: LTCU 05-CU-18; OCC: Bulletin 2006-35; OTS: CEO Memo 228.

     4

mechanism, to be inadequate for high-risk transactions involving access to customer information

    or the movement of funds to other parties. The agencies consider transfer of deposit transaction

    information to represent “the movement of funds to other parties.” Thus, for those RDC systems

    using the Internet as a communication medium, management should implement multifactor

    authentication, layered security, or other controls reasonably calculated to mitigate risks.

Risks associated with fraud are not unique to RDC; however, certain aspects of fraud risk are

    elevated in an RDC environment. Check alteration, including making unwarranted changes to

    the Magnetic Ink Character Recognition (MICR) line on the image of scanned items, may be

    more difficult to detect when deposited items are received through RDC and are not inspected by

    a qualified person. Similarly, forged or missing endorsements, which may be detected in person,

    may be less easily detected in an RDC environment. Certain check security features may be lost

    or the physical alteration of a deposited check such as by “washing” or other alteration

    techniques may be obscured in imaging or electronic conversion processes. Counterfeit items

    may be similarly difficult to detect. Duplicate presentment of checks and images at the

    institution or another depository institution represents both a business process and a fraud risk.

    The potential for insider fraud may be greater with RDC because the financial institution

    typically does not perform background checks on its customers’ employees who may have

    access to physical deposit items or electronic files. Access by customers and their staffs to

    nonpublic personal information contained on, or represented by, deposit items may also increase

    the risk of identity theft.

Risk Management: Mitigation and Controls

    If a comprehensive risk assessment supports a management conclusion that the risks associated

    with RDC can be effectively mitigated, measured, and monitored, management should

    implement appropriate risk management policies. These policies should establish risk tolerance

    levels, internal procedures and controls, risk transfer mechanisms where appropriate and

    available, and well-designed contracts that meet the institution’s risk management needs.

Customer Due Diligence and Suitability

A financial institution may determine that risks associated with RDC warrant greater customer

    selectivity than the risks associated with traditional deposit services and may choose to reduce

    and control those risks by limiting the availability of this system. Management should establish

    appropriate risk-based guidelines to qualify customers for this service. In general, information

    gathered while conducting customer identification and customer due diligence procedures in

    fulfillment of the institution’s BSA/AML program can support the assessment of customer

    suitability. Foreign correspondent accounts are subject to due diligence requirements prescribed 11in regulations issued pursuant to the USA PATRIOT Act amendments to the BSA.

     11 RDC risk factors and risk mitigation, as well as sound customer due diligence processes and enhanced due

    diligence processes for certain foreign correspondent accounts, can also be found at

    http://www.ffiec.gov/bsa_aml_infobase/default.htm. Sections 312, 313, and 319(b) of the USA PATRIOT Act; 31

    CFR 103.175 - 103.177, 103.185. Refer to the Foreign Correspondent Account Recordkeeping and Due Diligence

    section and the Correspondent Accounts (Foreign) section in the FFIEC Bank Secrecy Act / Anti-Money Laundering

    Examination Manual for specific information. In addition, a foreign correspondent relationship may be subject to

     5

For new and existing customers, a suitability review should involve consideration of the

    customer’s business activities and risk management processes, geographic location, and 1213customer base. The depth of such review should be commensurate with the level of risk.

    When the level of risk warrants, financial institution staff should include visits to the customer’s

    physical location as part of the suitability review. During these visits, the institution should

    evaluate management, operational controls and risk management practices, staffing and the need

    for training and ongoing support, and the IT infrastructure. In addition, the financial institution

    should review available reports of independent audits performed at the customer location related

    to IT, RDC, and associated operational processes. When appropriate, based on risk, financial

    institutions may choose to rely on self-assessments by their RDC customers when these address

    the controls and risk management practices that would otherwise be reviewed during on-site

    visits by financial institution staff.

Vendor Due Diligence and Suitability

    Financial institutions’ interest in RDC has led to a proliferation of RDC technology service

    providers and RDC hardware and software suppliers. Financial institutions that rely on service

    providers for RDC activities should ensure implementation of sound vendor management

    processes as described in the Outsourcing Technology Services Booklet of the FFIEC IT

    Examination Handbook.

RDC Training for Customers

    Without effective periodic training, RDC customers may have unrealistic expectations of the

    system or may not understand their roles in managing risks and monitoring for processing errors

    or unauthorized activity. Management should ensure that customers receive sufficient training,

    whether the customer obtains the RDC system from the financial institution or from a third-party

    servicer. Sound training should include documentation that addresses routine operations and

    procedures, including those related to the risk of duplicate presentment and problem resolution.

Contracts and Agreements

Strong, well-constructed contracts and customer agreements are critical in mitigating the

    financial institution’s risks. The financial institution’s legal counsel should help develop

    contracts and agreements with other financial institutions that accept checks in the form of

special measures imposed by the Secretary of the Treasury under Section 311 of the USA PATRIOT Act. Also refer

    to the Special Measures section of the BSA/AML Manual and to the specific discussion of RDC risks and risk

    mitigation on pages 189-190.

     12 A financial institution may have relationships with multiple third parties that transmit items by RDC on behalf of

    merchants and other customers. When deposit items are converted into ACH transactions, such external parties are

    effectively acting as third-party senders as in an ACH transaction. See NACHA publication “Third-Party Senders &

    the ACH Network: An Implementation Guide.”

     13 Higher risk customers may be defined by industry, incidence of fraud, or other criteria. Examples of higher risk

    parties include online payment processors, certain credit-repair services, certain mail order and telephone order

    companies, online gambling operations, businesses located offshore, and adult entertainment businesses.

     6

electronic files, third-party service providers, and customers that participate in the RDC process.

    Contracts and agreements should be appropriate for the institution’s specific RDC environment

    and should identify clearly each party’s roles, responsibilities, and liabilities. RDC agreements

    should establish the control requirements identified during the risk assessment process and the

    consequences of noncompliance.

There are many elements that management should consider when developing customer contracts.

    For example, the contracts should cover risks and responsibilities relative to the physical

    equipment used by the customer in the RDC process. Specific contract provisions for

    consideration include:

    ? Roles and responsibilities of the parties, including those related to the sale or lease of

    equipment and software needed for RDC at the customer location;

    ? Handling and record retention procedures for the information in RDC, including physical

    and logical security expectations for access, transmission, storage, and disposal of deposit

    items containing nonpublic personal information;

    ? Types of items that may be transmitted;

    ? Processes and procedures that the customer must follow, including those related to image

    quality;

    ? Imaged documents (or original documents, if available) RDC customers must provide to

    facilitate investigations related to unusual transactions or poor quality transmissions, or to

    resolve disputes;

    ? Periodic audits of the RDC process, including the IT infrastructure;

    ? Performance standards for the financial institution and the customer;

    ? Allocation of liability, warranties, indemnification, and dispute resolution; 14? Funds availability, collateral, and collected funds requirements;

    ? Governing laws, regulations, and rules;

    ? Authority of the financial institution to mandate specific internal controls at the

    customer’s locations, audit customer operations, or request additional customer

    information; and,

    ? Authority of the financial institution to terminate the RDC relationship.

Business Continuity

    Senior management should ensure the financial institution’s ability to recover and resume RDC

    operations to meet customer service requirements when an unexpected disruption occurs. The

    financial institution’s business continuity plan should address RDC systems and business processes, and the testing activities should assess whether restoration of systems and processes

    meets recovery objectives and time frames. To the extent possible, contingency plan

    development and testing should be coordinated with customers using RDC. The Business

    Continuity Planning Booklet of the FFIEC IT Examination Handbook provides more guidance

    on the process.

     14 The financial institution should consider including in its contracts and agreements provisions establishing cut-off

    times and specifying how and when the customer will know the institution has accepted the deposit.

     7

Other Mitigation and Control Considerations

    Management should implement as appropriate other controls that mitigate the operational risks of RDC, including those related to item processing as discussed in the Operations Booklet of the FFIEC IT Examination Handbook. These controls should be designed and implemented to

    ensure the security and integrity of nonpublic personal information throughout the transmission flow and while in storage. Separation of duties or other compensating controls at both the institution and the customer location can mitigate the risk of one person having responsibility for end-to-end RDC processing. Strong change control processes coordinated between the institution and customer can help to ensure synchronized RDC platforms, operating systems and applications, and business processes. To reduce the risk of items being processed more than once, deposit items can be endorsed, franked, or otherwise noted as already processed. When insurance coverage is available and cost effective, institutions may be able to mitigate risk further.

Risk Management: Measuring and Monitoring

    Financial institutions should develop and implement risk measuring and monitoring systems for effective oversight of RDC activities. Institutions should ensure that customers using RDC have implemented operational and risk monitoring processes appropriate to their choice of technology. Management should establish key operational performance metrics that support accurate and timely monitoring of risk within RDC processes. This information should be used to set operational benchmarks and standards, as well as to develop reports for monitoring results against the standards. Effective management oversight involves regularly reviewing the reports and periodically conducting reviews and operational risk assessments. This will help ensure that the monitoring and reporting process accurately reflects current policies and procedures and sound practices.

    A variety of reports can facilitate management oversight of RDC operations, customer compliance with agreements or contracts, and instances of anomalous or questionable activity. Reports on duplicate entries (file and/or item recognition and interception) and violations of deposit thresholds may help monitor for unauthorized activities. Velocity metrics such as file size and number of files, transaction dollar value and volume, and return item dollar value and volume also assist in monitoring for fraudulent activity and capacity utilization. In addition, 15reporting on reject items and corrections, and CAR/LAR/ICR adjustments supports monitoring

    of operational efficiency. Report content should be structured to meet the needs of the various levels of management. Reports should address point-in-time activities as well as trends for individual customers, groups of customers with similar characteristics, and for the RDC product as a whole.

Conclusion

     15 The CAR (Courtesy Amount Recognition) field contains the amount of the check in numeric form. The LAR (Legal Amount Recognition) field contains the amount of the check in written form. ICR (Intelligent Character Recognition) is the process by which scanning software interprets information on a deposit item and converts it into electronic data.

     8

A financial institution offering RDC should have sound risk management and mitigation systems

    in place and should require adequate risk management at customer locations. Prior to

    implementing RDC, and periodically thereafter, management should conduct a risk assessment

    to identify the related types and levels of risk exposure. Comprehensive contracts and customer

    agreements should identify clearly the roles, responsibilities, and liabilities of all parties in the RDC

    process to minimize exposure to legal and compliance risks. Appropriate technology and process

    controls should be implemented at both the financial institution and the customer locations to address

    operational risk. Financial institution management and the customer should implement effective risk

    measurement and monitoring systems. When appropriate and available, insurance coverage should be considered as a risk transfer mechanism. As with other financial services, RDC may not be appropriate for all customers or for all financial institutions.

     9

Report this document

For any questions or suggestions please email
cust-service@docsford.com