DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Manonmaniam Sundaranar University
Tirunelveli
Directorate of Distance and Continuing Education
M. Com
Digital Banking Page 1
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Digital Banking
UNIT I
Banking Technology: Essentials of Bank computerization Computer Systems; LANs;
WANs; UPS; Core Banking Payment Systems and Electronic Banking: ATMs; HWAK;
PIN; Electromagnetic Cards; Electronic Banking; Signature Storage & Retrieval
System; CTS; Note & Coin Counting Machines; Microfiche; NPC; RUPAY
UNIT II
Online Banking: Online Enquiry and Update Facilities – Personal Identification Numbers
and their use in conjunction with magnetic cards of both credit and debit cards, smart
cards, signature storage and display by electronic means, cheque truncation, note and
coin counting device
UNIT III
Data Communication Network and EFT systems: Components & Modes of
Transmission; Major Networks in India; Emerging Trends in Communication Networks for
Banking; Evolution of EFT System; SWIFT; Automated Clearing Systems; Funds
Transfer Systems; Recent Developments in India
UNIT IV
Role of Technology Up gradation and its impact on Banks: Trends in Technology
Developments; Role & Uses of Technology Up gradation; Global Trends; Impact of
IT on Banks- Preventive Vigilance in Electronic Banking Phishing; Customer Education;
Safety Checks; Precautions
UNIT V
Digital Banking Page 2
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Security Considerations Risk Concern Areas; Types of Threats; Control Mechanism;
Computer Audit; IS Security; IS Audit; Evaluation Requirements Overview of IT Act
Gopalakrishna- Committee Recommendations
Unit I
Banking Technology: Essentials of Bank computerization Computer Systems; LANs;
WANs; UPS; Core Banking Payment Systems and Electronic Banking: ATMs; HWAK;
PIN; Electromagnetic Cards; Electronic Banking; Signature Storage & Retrieval
System; CTS; Note & Coin Counting Machines; Microfiche; NPC; RUPAY
Banking Technology
Banking technology has undergone a transformative journey, especially in recent
years, propelled by rapid advancements in digital innovation. The integration of
technology in the banking sector has not only redefined the way financial services are
delivered but has also significantly influenced customer expectations and industry
dynamics. From the adoption of mobile banking and digital wallets to the implementation
of cutting-edge technologies like artificial intelligence and blockchain, banks are striving
to enhance efficiency, security, and customer experience. This transformation has not
only streamlined traditional banking processes but has also given rise to innovative
financial services, paving the way for a more interconnected and technologically-driven
banking ecosystem. As we delve into the realm of banking technology, it becomes
evident that the landscape continues to evolve, presenting both challenges and
opportunities for financial institutions to adapt, thrive, and meet the ever-changing needs
of a digitally empowered clientele.
Digital Banking Page 3
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
1. Digital Transformation: Indian banks have been actively pursuing digital
transformation initiatives to enhance customer experience, improve operational
efficiency, and stay competitive. This includes the adoption of advanced
technologies such as artificial intelligence (AI), machine learning (ML), and
blockchain.
2. Mobile Banking and Apps: Mobile banking has seen significant growth in India,
with banks offering feature-rich mobile apps for various transactions. Customers
can check balances, transfer funds, pay bills, and even invest using these apps.
3. Online Banking: Internet banking services are widely used in India, allowing
customers to perform a range of transactions from the comfort of their homes or
offices. This includes fund transfers, bill payments, and account management.
4. Unified Payments Interface (UPI): UPI has played a crucial role in
revolutionizing digital payments in India. It enables instant fund transfers between
bank accounts through mobile devices with the help of a unique identifier called a
UPI ID.
5. Digital Wallets: The use of digital wallets has gained popularity, allowing users to
store money digitally and make quick payments for various services and products.
Popular digital wallets in India include Paytm, PhonePe, Google Pay, and others.
6. Biometric Authentication: Many banks in India have implemented biometric
authentication methods, such as fingerprint and iris scans, to enhance security in
financial transactions.
7. Core Banking Solutions (CBS): Most banks in India have implemented CBS,
which enables centralized processing of transactions, customer accounts, and
other banking services from a single platform.
8. ATM Network: India has an extensive network of ATMs, providing convenient
access to cash and basic banking services. Banks continue to upgrade their ATMs
with advanced features and security measures.
Digital Banking Page 4
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
9. Cybersecurity Measures: With the increasing reliance on digital platforms, banks
in India have been investing in robust cybersecurity measures to protect customer
data and financial transactions from cyber threats.
10. Regulatory Initiatives: Regulatory bodies such as the Reserve Bank of India
(RBI) play a crucial role in shaping the technology landscape in the Indian banking
sector. They issue guidelines and frameworks to ensure the security and
efficiency of digital banking services.
Essentials of Bank computerization Computer Systems
Bank computerization involves the use of computer systems and technology to
streamline and automate various banking operations. The essentials of bank
computerization and computer systems in this context include:
1. Core Banking System (CBS): Core banking is the central component of
computerization in banks. CBS allows a seamless integration of various branches,
enabling customers to access their accounts and perform transactions from any
branch. It facilitates real-time processing of transactions, including deposits,
withdrawals, and fund transfers.
2. Database Management System (DBMS): Banks rely on robust DBMS to store
and manage vast amounts of customer data, transaction records, and other critical
information. The efficient retrieval and storage of data are essential for quick and
accurate customer service.
3. Networking Infrastructure: A robust networking infrastructure connects various
branches, ATMs, and online banking channels. This ensures real-time data
synchronization, allowing customers to access their accounts and conduct
transactions from multiple locations.
Digital Banking Page 5
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
4. ATM Systems: Automated Teller Machines (ATMs) are an integral part of banking
computerization. These machines provide customers with convenient 24/7 access
to basic banking services, such as cash withdrawals, balance inquiries, and fund
transfers.
5. Internet Banking Systems: Internet banking platforms enable customers to
access their accounts, perform transactions, pay bills, and manage finances
online. These systems require strong security measures to protect customer data
and transactions.
6. Mobile Banking Applications: Mobile banking apps extend banking services to
smartphones, allowing customers to perform transactions on the go. These apps
often include features like mobile deposits, bill payments, and alerts.
7. Security Systems: Given the sensitive nature of financial data, banks invest
significantly in security systems. This includes firewalls, encryption techniques,
multi-factor authentication, and other measures to safeguard customer information
and prevent unauthorized access.
8. Customer Relationship Management (CRM) Systems: CRM systems help
banks manage and analyze customer interactions. These systems aid in
understanding customer needs, providing personalized services, and improving
overall customer satisfaction.
9. Analytics and Business Intelligence: Banks use analytics and business
intelligence tools to derive insights from large datasets. This helps in decision-
making, risk management, and the development of targeted marketing strategies.
10. Disaster Recovery and Backup Systems: To ensure business continuity, banks
implement robust disaster recovery and backup systems. These systems protect
against data loss and downtime in the event of unforeseen disasters or technical
failures.
Digital Banking Page 6
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
11. Compliance and Regulatory Systems: Banks need to adhere to various
regulatory requirements. Computer systems are crucial for ensuring compliance
with financial regulations and reporting standards.
12. Training and Support Systems: Training programs and support systems are
essential to ensure that bank staff is proficient in using the computerized systems.
This is crucial for the smooth operation of banking services and customer support.
As technology continues to advance, banks must stay abreast of emerging trends and
regularly update their computer systems to maintain efficiency, security, and
competitiveness in the financial industry.
LANs
A Local Area Network (LAN) is a network of interconnected computers and devices
within a limited geographical area, such as a home, office, or campus. LANs facilitate
communication and resource sharing among connected devices. Here's a more detailed
look at the components and characteristics of LANs:
1. Topology:
Bus Topology: All devices share a common communication channel or
bus.
Star Topology: All devices connect to a central hub or switch.
Ring Topology: Devices are connected in a circular fashion.
2. Components:
Computers and Devices: End-user devices like computers, laptops,
printers, and servers are connected to the LAN.
Network Interface Cards (NICs): Hardware components that enable
devices to connect to the LAN.
Digital Banking Page 7
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Switches/Hubs: Devices that manage the flow of data within the LAN.
Switches are more intelligent and efficient than hubs.
Router: Connects LANs to wider networks, such as the Internet.
Cabling: Ethernet cables (e.g., Cat5e or Cat6) are commonly used for
wired LANs.
3. Protocols:
Ethernet: Most widely used LAN protocol, governing how data packets are
placed on the network.
Wi-Fi (802.11): Used for wireless LANs, enabling devices to connect
without physical cables.
4. Communication:
Packet Switching: Data is divided into packets for efficient transmission
across the network.
MAC Addresses: Media Access Control addresses uniquely identify
devices on the LAN.
IP Addresses: Internet Protocol addresses identify devices on a network
and enable routing between networks.
5. LAN Services:
File and Printer Sharing: Users can access files and printers on other
devices within the LAN.
Email and Messaging: LANs facilitate communication through local email
and messaging services.
Internet Access: Routers connect LANs to the Internet, providing access
to external resources.
Digital Banking Page 8
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
6. Security Measures:
Firewalls: Protect LANs from unauthorized access and external threats.
Encryption: Secure data transmission within the LAN to prevent
eavesdropping.
Access Controls: Restrict user access to certain resources based on
permissions.
7. Management and Administration:
Network Management Tools: Monitor and manage network performance,
troubleshoot issues, and optimize resources.
User Authentication: Ensure secure access to the LAN through login
credentials.
8. Scalability:
LANs can be easily expanded by adding more devices, switches, or access
points.
9. Common LAN Configurations:
Workgroup: Small networks where each device shares resources
independently.
Domain: Larger networks with centralized authentication and resource
management.
10. Advantages:
High Data Transfer Rates: LANs provide fast data transfer within the
network.
Resource Sharing: Devices can share files, printers, and other resources.
Digital Banking Page 9
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Cost-Effective: LANs are generally more cost-effective than wide-area
networks (WANs) for smaller geographical areas.
11. Challenges:
Limited Geographical Range: LANs are limited to a specific geographic
area.
Scalability Challenges: Larger organizations may require more complex
network architectures.
Understanding LANs is fundamental in the context of building and managing small to
medium-sized networks for efficient communication and resource sharing.
WANs
A Wide Area Network (WAN) is a network that spans a large geographical area,
connecting multiple Local Area Networks (LANs) or other types of networks. WANs are
designed to facilitate communication and resource sharing across long distances. Here's
a more detailed exploration of WAN components and characteristics:
1. Connectivity:
WANs connect LANs and other networks across cities, countries, or even
continents.
Internet connections, private leased lines, and dedicated connections
between remote sites are commonly used for WAN connectivity.
2. Components:
Routers: Essential for WANs, routers direct data traffic between different
networks, making decisions based on IP addresses.
Switches: Used to connect multiple devices within LANs connected to the
WAN.
Digital Banking Page 10
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Modems: Convert digital data from computers into analog signals for
transmission over telephone lines or cable systems.
Multiplexers: Combine multiple data signals into a single high-capacity
transmission line.
3. Communication Protocols:
TCP/IP: The standard protocol suite for WANs and the Internet.
Frame Relay: Packet-switching protocol used in WANs.
ATM (Asynchronous Transfer Mode): Cell-based switching technology
used for voice, video, and data.
4. Transmission Media:
Fiber Optic Cables: Commonly used for high-speed data transmission
over long distances.
Satellite Communication: Utilized for remote and geographically
dispersed locations.
Microwave Links: High-frequency radio waves used for point-to-point
communication.
5. Topologies:
Point-to-Point: Connects two locations directly.
Multipoint: Connects multiple locations to a central site.
6. Protocols for Secure Communication:
VPN (Virtual Private Network): Encrypts data for secure transmission
over public networks.
Digital Banking Page 11
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
IPsec (Internet Protocol Security): Provides a secure communication
framework for IP networks.
7. QoS (Quality of Service):
WANs often implement QoS mechanisms to prioritize certain types of
traffic, ensuring reliable and efficient data transmission.
8. Bandwidth Management:
WANs manage bandwidth to optimize data transfer rates, especially in
scenarios with varying traffic loads.
9. Redundancy and Reliability:
WANs often incorporate redundant connections and failover mechanisms to
ensure continuous operation in case of link failures.
10. Cloud Connectivity:
WANs connect to cloud services, enabling organizations to leverage cloud
computing resources and applications.
11. Remote Access:
WANs facilitate remote access for users to connect securely to the
corporate network from different locations.
12. Network Monitoring and Management:
WANs require robust monitoring and management tools to ensure
performance, troubleshoot issues, and optimize the network.
13. Globalization and Collaboration:
WANs support global collaboration by connecting geographically dispersed
offices, allowing seamless communication and collaboration among
employees.
Digital Banking Page 12
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
14. Cost Considerations:
WANs often involve higher costs compared to LANs, especially when using
dedicated leased lines or satellite links.
Understanding the intricacies of WANs is crucial for organizations with geographically
distributed operations, as they enable efficient communication, collaboration, and
resource sharing across vast distances.
UPS
A UPS, or Uninterruptible Power Supply, is an electrical device that provides emergency
power to a load when the input power source or mains power fails. The primary purpose
of a UPS is to ensure a continuous and reliable power supply, protecting critical
electronic equipment from power disruptions, voltage fluctuations, and outages. Here are
key aspects of UPS systems:
1. Functionality:
Power Backup: UPS systems store electrical energy in batteries,
converting it into usable power when the main power source fails.
Voltage Regulation: Some UPS models provide voltage regulation to
stabilize power fluctuations and protect connected devices from
overvoltage or undervoltage conditions.
Surge Protection: UPS units often include surge protection to safeguard
connected devices from voltage spikes.
2. Components:
Battery: The most crucial component, storing electrical energy for backup
power.
Digital Banking Page 13
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Inverter: Converts DC power from the battery into AC power, ensuring
compatibility with most electronic devices.
Rectifier/Charger: Converts incoming AC power to DC for battery
charging.
Static Bypass Switch: Allows power to bypass the UPS in case of a
malfunction or overload.
3. Types of UPS:
Offline/Standby UPS: Switches to battery power only when the input
power fails, providing basic protection against outages.
Line-Interactive UPS: Adjusts input voltage to regulate fluctuations before
switching to battery during outages.
Online/Double-Conversion UPS: Continuously converts input power from
AC to DC and back to AC, offering the highest level of protection against
power issues.
4. Capacity and Runtime:
Capacity (VA/Watt): Indicates the maximum load a UPS can support.
Users should choose a UPS with sufficient capacity for their connected
devices.
Runtime: The duration a UPS can provide backup power. Runtime
depends on the battery capacity and the load's power consumption.
5. Applications:
Computers and Servers: Protects critical IT equipment from data loss and
potential damage during power interruptions.
Network Equipment: Safeguards routers, switches, and other networking
devices.
Digital Banking Page 14
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Telecommunication Systems: Ensures continuous operation of
communication infrastructure.
Critical Industrial Equipment: Protects sensitive machinery and electronic
components in industrial settings.
6. Installation and Maintenance:
Placement: UPS units are typically installed between the power source
and the connected devices.
Regular Testing: Periodic testing ensures the UPS is functioning correctly
and batteries are in good condition.
Battery Replacement: Batteries have a finite lifespan and may need
replacement every few years.
7. Size and Form Factor:
UPS units come in various sizes and form factors, including tower, rack-
mounted, and compact desktop models, catering to different installation
environments.
8. Smart UPS and Monitoring:
Some UPS models offer smart features, such as remote monitoring, self-
diagnosis, and management through software applications.
UPS systems are crucial for businesses, data centers, healthcare facilities, and any
environment where continuous power is essential. They provide a reliable solution to
prevent data loss, equipment damage, and downtime caused by power disruptions.
Core Banking Payment Systems
Core banking payment systems play a central role in modern banking, facilitating various
financial transactions and payment processes. These systems are integral to the core
Digital Banking Page 15
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
banking infrastructure and help ensure seamless, secure, and efficient electronic
payments. Here are key aspects of core banking payment systems:
1. Core Banking System (CBS):
Core banking payment systems are an integral part of the broader core
banking infrastructure.
They are responsible for managing customer accounts, transactions, and
other banking services in real-time across multiple channels.
2. Payment Channels:
Core banking payment systems support a variety of channels through
which customers can initiate payments. These include:
Online Banking: Internet-based platforms that allow customers to
conduct financial transactions, including fund transfers and bill
payments.
Mobile Banking: Apps that enable customers to perform banking
activities on their mobile devices.
ATMs: Self-service machines that facilitate cash withdrawals,
deposits, and fund transfers.
Branches: Over-the-counter transactions conducted at physical
bank branches.
Point-of-Sale (POS): Terminals at merchant locations for card-
based transactions.
3. Payment Types:
Fund Transfers: Core banking payment systems enable customers to
transfer money between their own accounts or to other accounts within the
same bank or different banks.
Digital Banking Page 16
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Bill Payments: Customers can pay utility bills, credit card bills, and other
invoices directly through the core banking system.
Merchant Payments: Core banking systems support payments at various
merchants through different channels, including cards, digital wallets, and
other electronic methods.
4. Real-Time Processing:
Many modern core banking payment systems offer real-time processing
capabilities, ensuring that transactions are reflected in customer accounts
immediately.
5. Interbank Settlement:
Core banking payment systems facilitate interbank settlement, allowing for
the transfer of funds between different banks.
National and international payment networks often leverage these systems
for clearing and settlement processes.
6. Security Measures:
Core banking payment systems implement robust security measures to
protect customer data and financial transactions.
Encryption, secure authentication, and fraud detection mechanisms are
crucial components of these systems.
7. Compliance:
Core banking payment systems adhere to regulatory standards and
compliance requirements to ensure the legality and transparency of
financial transactions.
Regulatory frameworks may include guidelines for anti-money laundering
(AML) and know-your-customer (KYC) practices.
Digital Banking Page 17
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
8. Integration with Payment Networks:
Core banking systems integrate with various payment networks, such as
card networks (e.g., Visa, MasterCard), electronic funds transfer networks
(e.g., ACH), and real-time gross settlement systems (e.g., RTGS).
9. Innovation and Emerging Technologies:
As technology advances, core banking payment systems are incorporating
innovations such as contactless payments, digital currencies, and
application programming interfaces (APIs) for seamless integration with
third-party services.
10. Scalability:
Core banking payment systems are designed to handle a large volume of
transactions, ensuring scalability to accommodate the growing demands of
customers and the financial ecosystem.
11. User Experience:
The user interface and experience in core banking payment systems are
critical for customer satisfaction. Intuitive design and ease of use contribute
to the overall effectiveness of these systems.
Overall, core banking payment systems form the backbone of a bank's operations,
facilitating the movement of funds, supporting various payment methods, and ensuring a
secure and compliant financial environment.
Electronic Banking
Electronic banking, also known as e-banking or online banking, refers to the use of
electronic channels, such as the internet and mobile devices, to conduct various financial
transactions and banking activities. Electronic banking has become a fundamental
Digital Banking Page 18
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
aspect of modern banking, offering convenience, accessibility, and efficiency for both
consumers and financial institutions. Here are key aspects of electronic banking:
1. Online Banking:
Account Management: Customers can view account balances,
transaction history, and account details online.
Fund Transfers: Electronic banking allows users to transfer funds between
accounts, within the same bank or to other banks.
Bill Payments: Customers can pay bills electronically, including utilities,
credit cards, and other recurring payments.
E-Statements: Access electronic statements instead of traditional paper
statements.
2. Mobile Banking:
Apps and Mobile Websites: Banks provide dedicated mobile apps and
websites for users to perform banking tasks using smartphones and tablets.
Mobile Check Deposit: Users can deposit checks by capturing images
through their mobile devices.
Alerts and Notifications: Receive real-time updates on account activities,
transactions, and account balances.
3. ATM Services:
Withdrawals and Deposits: ATMs allow customers to withdraw cash,
deposit funds, and perform other basic transactions.
Balance Inquiry: Check account balances at ATMs.
4. Electronic Funds Transfer:
Digital Banking Page 19
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
ACH Transfers: Automated Clearing House (ACH) transfers enable
electronic fund transfers between banks for payroll, direct deposit, and
other purposes.
Wire Transfers: Swift and secure electronic transfers of funds between
banks, often used for large transactions or international transfers.
5. Debit and Credit Cards:
Online Card Transactions: Customers can make purchases, pay bills,
and transfer funds using debit and credit cards online.
Contactless Payments: Increasingly popular, contactless payment
methods use near-field communication (NFC) for quick and secure
transactions.
6. Digital Wallets:
Mobile Payment Apps: Services like Apple Pay, Google Pay, and
Samsung Pay enable users to make payments using their mobile devices
at contactless terminals.
Peer-to-Peer (P2P) Payments: Users can send money directly to others
using P2P payment platforms.
7. Security Measures:
Encryption: Secure transmission of data over the internet using encryption
technologies.
Two-Factor Authentication (2FA): Enhances security by requiring
additional verification beyond passwords.
Biometric Authentication: Fingerprint and facial recognition technologies
for secure login.
8. Customer Support:
Digital Banking Page 20
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Online Chat and Support: Many electronic banking platforms provide
online chat and customer support services for immediate assistance.
9. Investment and Wealth Management:
Online Trading: Customers can buy and sell stocks, bonds, and other
securities online.
Robo-Advisors: Automated investment platforms provide algorithm-based
financial advice and portfolio management.
10. Loan Applications and Management:
Online Loan Applications: Users can apply for loans, mortgages, and
credit cards through electronic platforms.
Loan Repayments: Manage loan repayments and view loan details online.
11. Regulatory Compliance:
Electronic banking platforms adhere to financial regulations, including anti-
money laundering (AML) and know-your-customer (KYC) requirements.
Electronic banking has not only transformed the way individuals manage their finances
but has also revolutionized the banking industry by increasing efficiency, reducing costs,
and expanding the range of services available to customers.
ATMs
Automated Teller Machines (ATMs) are self-service banking machines that allow
customers to perform various financial transactions without the need for direct interaction
with bank staff. ATMs have become a ubiquitous part of the modern banking landscape,
offering convenience and accessibility to account holders. Here are key aspects of
ATMs:
1. Functions of ATMs:
Digital Banking Page 21
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Cash Withdrawals: Users can withdraw cash from their bank accounts
using debit or credit cards.
Deposits: Some ATMs accept cash and check deposits, allowing users to
add funds to their accounts.
Balance Inquiries: Customers can check their account balances through
ATMs.
Fund Transfers: In some cases, ATMs allow users to transfer funds
between accounts.
PIN Changes: Users can change their Personal Identification Number
(PIN) for security purposes.
Mini-Statements: ATMs often provide a printed or on-screen mini-
statement detailing recent transactions.
2. ATM Cards and Debit Cards:
Access with Cards: ATMs typically require a plastic card, usually a debit
or ATM card, to access the user's accounts.
Debit Card Transactions: Users can make purchases at Point-of-Sale
(POS) terminals using debit cards.
Card Security: ATMs use encryption and PINs to secure transactions and
prevent unauthorized access.
3. Networks and Interoperability:
ATM Networks: ATMs are often part of national or international networks
(e.g., Visa, MasterCard, PLUS, Cirrus), enabling users to access their
accounts from various locations.
Interbank Transactions: Users can use ATMs from different banks for
transactions, facilitated by interbank networks.
Digital Banking Page 22
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
4. ATM Locations:
Bank Branches: ATMs are commonly located near or within bank
branches.
Retail Locations: Many ATMs are found in retail establishments, malls,
airports, and other high-traffic areas.
Stand-Alone ATMs: Independent ATMs operated by third-party companies
may be located in various public places.
5. Security Features:
PIN Protection: Users must enter a Personal Identification Number (PIN)
to initiate transactions, enhancing security.
Card Skimming Protection: ATMs are equipped with measures to prevent
card skimming devices, which could capture card information.
Biometric Authentication: Some advanced ATMs incorporate biometric
features such as fingerprint or iris scans for enhanced security.
6. Cash Management:
Cash Replenishment: Banks and ATM operators regularly replenish ATMs
with cash to ensure availability.
Cash Recycling: Some ATMs are equipped to accept and dispense the
same cash, reducing the need for frequent replenishment.
7. Accessibility Features:
ATMs are designed to be accessible to individuals with disabilities,
featuring Braille keypads, audio instructions, and lowered transaction
interfaces.
8. International ATMs:
Digital Banking Page 23
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Users can often use their debit or credit cards at international ATMs to
withdraw local currency, with currency conversion handled by the issuing
bank.
9. Technology Advancements:
Contactless Transactions: Some ATMs support contactless card
transactions for enhanced convenience.
Mobile Integration: ATMs may offer features for mobile-based
transactions and interactions.
10. Transaction Fees:
Depending on the user's bank and the ATM's operator, fees may be
associated with certain transactions, especially if using ATMs from other
banks.
11. Regulatory Compliance:
ATMs must comply with banking regulations and standards to ensure the
security and integrity of financial transactions.
ATMs have played a significant role in providing users with convenient and immediate
access to their funds, contributing to the evolution of banking services and enhancing
financial inclusion.
HWAK
Monetary hawk and dove are terms used to describe two different approaches or
attitudes towards monetary policy.
A hawkish approach is focused on controlling inflation, while a dovish approach is
focused on promoting economic growth.
These terms are often used in the context of central banks and their decision-making
processes, particularly in setting interest rates. For example, if the US Federal Reserve
Digital Banking Page 24
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
(Fed) is said to be hawkish, it means that they are likely to raise interest rates to combat
inflation. In the meantime, a dovish stance would indicate that the central bank is more
likely to keep interest rates low to stimulate the economy.
What is a monetary hawk?
A monetary hawk definition is a policymaker or economist who is focused on controlling
inflation as their primary objective in monetary policy. Hawks generally believe that
higher interest rates and tighter monetary policy are necessary to keep inflation in check.
Key characteristics of monetary hawks
Hawks are often more conservative in their approach to monetary policy and prioritise
maintaining the value of the currency over other economic objectives. They may be less
concerned about the negative impact these policies could have on consumer spending,
employment and overall economic growth.
Monetary hawks tend to be more cautious and less willing to take risks when it comes to
monetary policy, focused on long-term stability rather than short-term growth.
Impact on the economy
Potential short-term effects of hawkish monetary policy include:
Lower inflation rates as tighter monetary policy reduces the money supply and
the ability for consumers and businesses to spend.
Higher interest rates, which can make borrowing more expensive for businesses
and consumers.
Reduced consumer spending due to higher borrowing costs, which can lead to
decreased economic activity
Digital Banking Page 25
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Decreased business investment due to higher borrowing costs, which can result
in lower job creation and economic growth.
Decreased demand for goods and services due to lower consumer spending,
leading to potentially lower prices and deflation.
Slower economic growth as a result of higher interest rates and decreased
borrowing and spending.
Higher exchange rates as a result of higher interest rates, making exports more
expensive and imports cheaper.
Increased savings as higher interest rates could make it more attractive to save
money rather than spend or invest it.
Decreased asset prices, such as stocks, as investors move money out of riskier
assets and into safer investments like bonds.
Potential long-term effects of hawkish monetary policy include:
Lower inflation rates as a result of tighter monetary policy, which can help
maintain the value of money and prevent erosion of purchasing power.
Increased economic stability and reduced risk of economic bubbles, which
can lead to more sustainable economic growth over the long term.
Increased investor confidence in the economy due to the stability provided by
tighter monetary policy, which can lead to more long-term investment.
Lower household debt as consumers are less likely to take out loans with higher
interest rates.
It’s important to keep in mind that the impact of a hawkish stance on the economy
depends on a variety of factors, including the overall economic environment, the
effectiveness of inflation-controlling policies, and the views of other policymakers.
Digital Banking Page 26
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
PIN
A Personal Identification Number (PIN) is a numeric code used to authenticate the
identity of an individual accessing a system, device, or service. PINs are widely used in
various contexts, including banking, electronic devices, and access control systems.
Here are key aspects of PINs:
1. Purpose and Authentication:
The primary purpose of a PIN is to verify the identity of a user before
granting access to a system or authorizing a transaction.
PINs serve as a form of two-factor authentication when combined with
something the user possesses, such as a physical card or device.
2. Length and Complexity:
PINs are typically short numeric codes, often ranging from four to six digits.
The relatively short length is balanced by the assumption that the PIN will
be kept secret, making it difficult for unauthorized individuals to guess.
3. Security Considerations:
PINs provide a basic level of security, but their effectiveness relies on being
kept confidential.
Users are generally advised not to share their PINs with others and to
choose a PIN that is not easily guessable (avoiding common numbers like
birthdates).
4. Use in Banking:
In the context of banking, PINs are commonly associated with ATM
(Automated Teller Machine) transactions and debit/credit card usage.
Digital Banking Page 27
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Users enter their PIN at ATMs to access their accounts, withdraw cash, or
perform other transactions.
When making purchases with a debit or credit card, users may be required
to enter their PIN for additional security.
5. Mobile Devices:
Mobile devices, especially smartphones, may use PINs as a method of
unlocking the device for access.
For enhanced security, PINs are often combined with other authentication
methods, such as biometrics (fingerprint or facial recognition).
6. Access Control Systems:
PINs are frequently used in access control systems for secure entry into
buildings, rooms, or restricted areas.
Employees or individuals are issued unique PINs for personalized access.
7. Reset and Recovery:
In case a user forgets their PIN, systems may offer mechanisms for
resetting or recovering the PIN.
Recovery processes often involve additional identity verification steps to
ensure the rightful owner is regaining access.
8. PIN Security Practices:
Users are advised not to write down their PINs or store them in easily
accessible locations.
Changing the PIN periodically adds an extra layer of security.
Avoid using easily guessable sequences such as "1234" or "0000."
Digital Banking Page 28
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
9. Biometric Integration:
In some systems, PINs are used in conjunction with biometric
authentication methods (e.g., fingerprint or iris scan) for increased security.
10. Regulatory Compliance:
Various industries and sectors, especially those dealing with sensitive
information like financial services, adhere to regulatory standards regarding
PIN security and user authentication.
It's important for users to be vigilant in safeguarding their PINs to prevent unauthorized
access to their accounts, devices, or secured areas. Additionally, organizations must
implement robust security measures to protect PINs and ensure compliance with industry
regulations.
Electromagnetic Cards
Electromagnetic cards, commonly known as magnetic stripe cards, are a type of
plastic card with a stripe of magnetic material on the back. These cards store data
magnetically and are widely used for various purposes, including financial transactions,
access control, and identification. Here are key aspects of electromagnetic cards:
1. Magnetic Stripe Structure:
The magnetic stripe is typically made of iron-based magnetic particles
embedded in a plastic film.
The stripe is divided into three tracks, each capable of storing different
types of data.
2. Tracks on a Magnetic Stripe:
Track 1: Primarily used in financial transactions, it contains alphanumeric
data and has a higher bit density.
Digital Banking Page 29
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Track 2: Also used in financial transactions, it contains numeric data and is
the most commonly used track for credit and debit card transactions.
Track 3: Rarely used in payment cards, it has the highest bit density and
may store additional data.
3. Usage in Payment Cards:
Credit cards, debit cards, and ATM cards often have a magnetic stripe on
the back.
The stripe contains essential cardholder information such as the card
number, cardholder name, and expiration date.
4. Encoding Data:
Data is encoded on the magnetic stripe during the card manufacturing
process.
Magnetic stripe readers and writers can read and encode data onto the
stripe for various purposes.
5. Financial Transactions:
Magnetic stripe cards are commonly used in point-of-sale (POS) systems,
ATMs, and other payment terminals.
When a card is swiped through a magnetic stripe reader, the encoded data
is read, and the transaction is processed.
6. Access Control Systems:
Magnetic stripe cards are used in access control systems for secure entry
into buildings, rooms, or restricted areas.
Users may swipe their cards through magnetic stripe readers for
authentication.
Digital Banking Page 30
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
7. Identification Cards:
Magnetic stripe cards are used for identification purposes in various
industries.
Examples include employee ID cards, membership cards, and loyalty
cards.
8. Drawbacks:
Security Concerns: Magnetic stripe cards are susceptible to skimming,
where unauthorized devices capture the magnetic stripe data for fraudulent
purposes.
Limited Data Capacity: The amount of data that can be stored on a
magnetic stripe is limited compared to newer technologies like chip cards.
9. Transition to Chip Cards:
Many regions have transitioned to chip cards (EMV cards) that provide
enhanced security compared to magnetic stripe cards.
Chip cards use embedded microprocessors to generate dynamic
transaction data, reducing the risk of fraud.
10. Mobile Payments:
With the advent of mobile payment technologies, users can link their
magnetic stripe card information to mobile wallet apps for contactless
transactions.
11. Regulatory Compliance:
Various regulatory standards govern the use and security of magnetic
stripe cards, especially in the financial industry.
Digital Banking Page 31
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
While magnetic stripe cards remain in use, especially in regions where chip card
adoption is still evolving, there is a global trend toward adopting more secure
technologies to combat fraud and enhance transaction security.
Electronic Banking
Electronic banking, also known as e-banking or online banking, refers to the use of
electronic systems and technology to conduct various financial transactions and banking
activities over the internet. Electronic banking has become an integral part of modern
banking, offering customers the convenience of managing their finances anytime,
anywhere. Here are key aspects of electronic banking:
1. Online Account Management:
Customers can access and manage their bank accounts online through
secure websites or mobile apps.
Account information, including balances, transaction history, and account
statements, is readily available.
2. Fund Transfers:
Electronic banking allows users to transfer funds between their own
accounts, to other accounts within the same bank, or to external accounts
in different financial institutions.
Wire transfers and Automated Clearing House (ACH) transfers are
common methods for moving money electronically.
3. Bill Payments:
Customers can pay bills electronically, covering utilities, credit cards, loans,
and other recurring payments.
Digital Banking Page 32
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Scheduled payments and automatic bill payments can be set up for
convenience.
4. Mobile Banking:
Mobile banking apps provide a convenient way for users to perform
banking tasks using smartphones and tablets.
Features often include account access, fund transfers, mobile check
deposit, and notifications.
5. ATM Services:
Electronic banking extends to Automated Teller Machines (ATMs), allowing
users to withdraw cash, deposit funds, and perform other transactions
outside traditional banking hours.
6. E-Statements:
Instead of receiving paper statements, customers can opt for electronic
statements (e-statements) delivered through online banking platforms.
7. Investment Management:
Online banking platforms may offer features for managing investments,
including buying and selling stocks, bonds, and mutual funds.
8. Loan Applications and Repayments:
Users can apply for loans, mortgages, or credit cards online, and the
approval process is often faster.
Loan repayments and interest calculations can be tracked electronically.
9. Security Measures:
Digital Banking Page 33
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Robust security measures, such as encryption, secure sockets layer (SSL),
and multi-factor authentication, are implemented to protect customer
information and transactions.
Users are often encouraged to regularly update passwords and enable
additional security features.
10. Customer Support:
Online banking platforms provide customer support through various
channels, including chat, email, and telephone.
Frequently Asked Questions (FAQs) and online help resources are often
available.
11. Global Access:
Users can access their accounts and perform transactions from anywhere
in the world, provided they have internet connectivity.
International transactions and currency conversions can be facilitated
through online banking.
12. Integration with Other Financial Services:
Online banking platforms may integrate with other financial services, such
as financial planning tools, insurance services, and budgeting apps.
13. Regulatory Compliance:
Electronic banking services adhere to regulatory standards and compliance
requirements, ensuring the legality and security of financial transactions.
14. Innovations:
Ongoing innovations in financial technology (fintech) contribute to the
evolution of electronic banking, with features like contactless payments,
digital wallets, and open banking initiatives.
Digital Banking Page 34
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Electronic banking has transformed the way individuals and businesses manage their
finances, offering efficiency, accessibility, and a range of financial services at their
fingertips. As technology continues to advance, electronic banking is expected to evolve
with new features and enhanced security measures.
Signature Storage
Signature storage in the context of digital banking typically refers to the electronic
storage and management of digital signatures. Digital signatures are electronic
equivalents of handwritten signatures and are used to authenticate the identity of the
signer and ensure the integrity of digital documents or transactions. Here are key points
related to signature storage in digital banking:
1. Digital Signatures:
Digital signatures are generated using cryptographic algorithms and are
unique to the individual or entity possessing the associated private key.
They provide a way to verify the authenticity and origin of a digital message
or document.
2. Storage of Digital Signatures:
In digital banking, digital signatures may be used in various processes,
such as signing electronic documents, authorizing transactions, or
validating the identity of users. The storage of digital signatures involves
securely managing the private keys associated with the signatures.
3. Secure Key Management:
The security of digital signatures relies on robust key management
practices. Private keys, which are used to create digital signatures, must be
securely stored to prevent unauthorized access. Key management systems
may use hardware security modules (HSMs) or other secure methods to
protect private keys.
Digital Banking Page 35
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
4. Digital Signature Certificates:
Digital signature certificates are issued by trusted certification authorities
(CAs) and link the identity of the signer to their public key. These
certificates are used to verify the authenticity of digital signatures. In digital
banking, managing and storing these certificates securely is crucial.
5. Hardware Security Modules (HSMs):
HSMs are dedicated hardware devices designed to manage and safeguard
cryptographic keys. In digital banking, HSMs can be used to store and
protect the private keys associated with digital signatures, enhancing
overall security.
6. Biometric Signatures:
Some digital banking applications may utilize biometric signatures, such as
fingerprint or facial recognition, as a form of digital authentication. The
biometric data is securely stored and used for verification during relevant
transactions.
7. Legal Validity:
Digital signatures are often subject to legal frameworks that recognize their
validity. Many countries have adopted electronic signature laws that provide
legal recognition to digital signatures, making them legally equivalent to
traditional handwritten signatures.
8. Use Cases in Digital Banking:
Digital signatures are commonly used in digital banking for processes such
as signing electronic contracts, authorizing fund transfers, and approving
digital transactions. The secure storage of digital signatures is essential to
maintaining the integrity and authenticity of these processes.
9. Blockchain Technology:
Digital Banking Page 36
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
In some advanced digital banking systems, blockchain technology may be
employed to enhance the security and transparency of digital signatures.
Blockchain can provide a decentralized and tamper-resistant ledger for
signature-related transactions.
10. Regulatory Compliance:
Digital banking services need to adhere to regulatory requirements related
to digital signatures and electronic authentication. Compliance with
standards such as eIDAS in Europe or the Uniform Electronic Transactions
Act (UETA) and Electronic Signatures in Global and National Commerce
Act (ESIGN) in the United States is essential.
The secure storage and management of digital signatures play a crucial role in ensuring
the integrity, authenticity, and legal validity of digital transactions within the digital
banking landscape. Implementing robust security measures, including encryption, secure
key management, and adherence to relevant regulations, is essential for maintaining the
trust and confidence of users in digital banking systems.
Retrieval System
A retrieval system, in the context of information or data, refers to a system designed to
efficiently locate and present specific information from a larger collection or database.
Retrieval systems are employed in various fields, including libraries, databases, content
management systems, and search engines. Here are key aspects of retrieval systems:
1. Database Retrieval:
Retrieval systems are commonly used in databases to search and retrieve
specific records or information based on user queries.
Digital Banking Page 37
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Structured Query Language (SQL) is often used to formulate queries in
relational databases.
2. Information Retrieval (IR):
In information science, information retrieval refers to the process of
obtaining information from a document or a collection of documents.
Search engines on the internet, like Google, are examples of information
retrieval systems that use algorithms to return relevant results.
3. Library Catalogs:
Libraries use retrieval systems to manage and organize their collections.
Card catalogs, and more modern online library catalogs, facilitate the
search and retrieval of books, articles, and other materials.
4. Document Retrieval:
Document retrieval systems allow users to find and access specific
documents or files within a document management system.
This is common in business environments where a large number of
documents need to be organized and easily accessible.
5. Search Engines:
Search engines are sophisticated retrieval systems that index vast amounts
of information on the internet.
Algorithms determine the relevance of web pages to user queries and
return results accordingly.
6. Content Management Systems (CMS):
CMS platforms often include retrieval systems to help users find and
manage digital content, such as articles, images, and multimedia files.
Digital Banking Page 38
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
7. Digital Asset Management (DAM):
DAM systems use retrieval mechanisms to organize and retrieve digital
assets, including images, videos, and design files.
Metadata and tagging are commonly used to enhance retrieval capabilities.
8. Biomedical Information Retrieval:
In the field of healthcare, retrieval systems are used to access and retrieve
relevant medical and biomedical information.
This is crucial for healthcare professionals and researchers to access the
latest medical literature and research findings.
9. Geographic Information Systems (GIS):
GIS systems employ retrieval mechanisms to access and analyze spatial
data, such as maps and geographic information.
Spatial queries are used to retrieve information based on location.
10. Legal Document Retrieval:
In legal practice, retrieval systems assist in accessing legal documents,
cases, and statutes.
Legal databases allow lawyers and legal professionals to retrieve specific
information for research and case preparation.
11. E-commerce Product Retrieval:
In online shopping, retrieval systems help users find and purchase products
from vast e-commerce catalogs.
Filters, categories, and search functionalities enhance the retrieval
experience.
Digital Banking Page 39
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
12. Multimedia Retrieval:
Retrieval systems for multimedia content, such as images and videos, use
content-based and metadata-based methods to locate and present relevant
media.
13. Personalized Recommendations:
Some retrieval systems, particularly in content delivery platforms, leverage
user preferences and behavior to provide personalized recommendations.
Efficient retrieval systems are crucial for managing and accessing vast amounts of
information in various domains. These systems use indexing, search algorithms, and
metadata to quickly and accurately locate specific information, providing users with the
data they need in a timely manner.
CTS
Core Banking Technology Solutions (CTS) encompass the integrated technology
platforms and software applications that form the foundation of a bank's operations.
These solutions are designed to streamline and automate various banking processes,
providing a centralized and comprehensive approach to managing customer accounts,
transactions, and other essential banking functions. Here's a detailed overview of Core
Banking Technology Solutions:
1. Account Management:
Customer On boarding: CTS facilitates the seamless on boarding of
customers, capturing and verifying their information to create new
accounts.
Account Maintenance: Enables banks to manage customer accounts,
update information, and handle account-related requests efficiently.
2. Transaction Processing:
Digital Banking Page 40
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Payments and Transfers: CTS supports a variety of payment services,
including fund transfers between accounts, bill payments, and other
transactional activities.
Clearing and Settlement: Manages the clearing and settlement of
financial transactions, ensuring timely and accurate processing.
3. Credit and Lending:
Loan Origination: Allows for the initiation, processing, and approval of
loans and credit applications.
Credit Scoring and Risk Management: Utilizes analytics and risk
assessment tools to evaluate creditworthiness and manage lending risks.
4. Customer Relationship Management (CRM):
Customer Information: CTS centralizes customer data, providing a 360-
degree view of customer relationships and interactions.
CRM Tools: Supports customer engagement and relationship-building
activities, including targeted marketing and personalized services.
5. Channel Integration:
Online Banking: Integrates with online banking platforms, allowing
customers to access services and perform transactions through web and
mobile interfaces.
ATM and Branch Integration: Ensures consistency across various
banking channels, providing a seamless experience for customers.
6. Security and Compliance:
Data Security: Implements robust security measures to protect customer
data, transactions, and sensitive information.
Digital Banking Page 41
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Regulatory Compliance: Adheres to industry regulations and compliance
standards, such as anti-money laundering (AML) and know-your-customer
(KYC) requirements.
7. Analytics and Reporting:
Business Intelligence: Utilizes analytics tools to generate insights from
customer data, transaction patterns, and overall banking operations.
Reporting: Generates comprehensive reports for management, regulatory
authorities, and audit purposes.
8. Integration with Third-Party Services:
Payment Gateways: Integrates with external payment gateways and
networks to facilitate electronic transactions.
External APIs: Allows seamless integration with third-party services,
fostering innovation and expanding the range of available features.
9. Scalability and Flexibility:
Scalable Architecture: Designed to accommodate the growth of the bank
and handle increased transaction volumes.
Modular Design: Often employs a modular architecture, allowing for
flexibility in deploying specific modules or functionalities as needed.
10. User Experience:
Intuitive Interfaces: CTS platforms prioritize user-friendly interfaces for
both bank staff and customers.
Self-Service Options: Empowers customers to perform various
transactions and account management tasks independently.
11. Upgrades and Maintenance:
Digital Banking Page 42
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Regular Updates: Ensures that the system is equipped with the latest
features, security patches, and compliance enhancements.
Maintenance Support: Provides ongoing support and troubleshooting to
address any issues promptly.
12. Disaster Recovery and Redundancy:
Data Backup: Implements robust data backup and disaster recovery
mechanisms to ensure data integrity and availability.
Redundancy: Incorporates redundancy measures to minimize downtime
and service interruptions.
13. Innovation and Emerging Technologies:
Fintech Integration: Adapts to and integrates with emerging financial
technologies and innovations.
Blockchain and Digital Currencies: May explore the integration of
blockchain technology and digital currencies for enhanced services.
In summary, Core Banking Technology Solutions are comprehensive platforms that
underpin the modern banking infrastructure, providing the necessary tools and
capabilities to deliver efficient, secure, and customer-centric banking services. The
adoption of CTS is crucial for banks to stay competitive, comply with regulations, and
meet the evolving needs of customers in the digital age.
Coin Counting Machines
Coin counting machines, also known as coin sorters or coin counting and sorting
machines, are automated devices designed to efficiently count and sort coins. These
machines are commonly used by banks, retail businesses, and individuals who need to
process and manage large volumes of coins. Here are key aspects of coin counting
machines:
Digital Banking Page 43
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
1. Coin Sorting and Counting:
The primary function of coin counting machines is to accurately count and
sort various denominations of coins.
Modern machines often use advanced technologies, such as sensors and
optical recognition, to identify and categorize different coins.
2. Coin Wrapping and Packaging:
Some coin counting machines are equipped with features that allow users
to wrap coins in paper rolls for easier handling and banking.
The machines may dispense pre-formed coin wrappers or allow users to
insert their own wrappers.
3. User-Friendly Interfaces:
Coin counting machines typically feature user-friendly interfaces with
touchscreens or buttons for users to input their preferences, such as
counting or sorting options.
Clear displays provide users with information on the total value and quantity
of counted coins.
4. High-Speed Processing:
Advanced coin counting machines are designed for high-speed processing,
enabling quick counting and sorting of large quantities of coins.
This efficiency is particularly valuable for businesses and financial
institutions that handle significant volumes of loose change.
5. Accuracy and Error Prevention:
Accuracy is a critical aspect of coin counting machines. They are designed
to minimize counting errors and ensure that the total value matches the
actual value of the coins.
Digital Banking Page 44
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Error prevention mechanisms may include anti-jamming features and
sensors to detect foreign objects or damaged coins.
6. Integration with Banking Systems:
Some coin counting machines are integrated with banking systems,
allowing users to directly deposit the counted coins into their bank
accounts.
Integration may involve providing a receipt that can be used for a cash
deposit at a bank branch.
7. Fee Structures:
In certain settings, coin counting machines may be available for public use,
often in retail locations or supermarkets.
Some machines charge a fee for their services, either as a percentage of
the total amount counted or a flat fee.
8. Maintenance and Cleaning:
Regular maintenance is essential to keep coin counting machines in
optimal working condition.
Users or operators are responsible for cleaning and maintaining the
machine to prevent jams and ensure accurate counting.
9. Portable and Desktop Models:
Coin counting machines come in various sizes and configurations, ranging
from portable, compact models suitable for small businesses to larger
desktop models for higher-volume operations.
10. Security Features:
Digital Banking Page 45
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Security is an important consideration for coin counting machines. They
may have features like secure access codes and tamper-evident
mechanisms to protect against unauthorized access or tampering.
11. Coin Value Display:
Some coin counting machines display the value of the counted coins in
addition to the quantity, providing users with a clear understanding of the
total monetary amount.
12. Coin Verification:
In addition to counting, some machines incorporate verification
mechanisms to ensure that only valid coins are processed, rejecting
counterfeit or foreign coins.
Coin counting machines offer a convenient solution for efficiently handling loose change,
reducing the manual effort involved in counting and sorting coins. They are widely used
in various industries to streamline cash management processes.
Microfiche
Microfiche is a flat sheet of microfilm, typically 4 by 6 inches (10.16 by 15.24 cm) in size,
that contains microphotographs of a series of documents or images. It is a format used
for the archival storage of large amounts of information in a compact form. Microfiche is
one of several microform technologies developed to preserve and manage documents in
a space-efficient manner. Here are key aspects of microfiche:
1. Microfilm Technology:
Microfiche is part of the broader microfilm technology, which involves the
reduction of documents to a much smaller size through microphotography.
Microphotography uses a reduction ratio to capture and store images or
text on a small piece of film.
Digital Banking Page 46
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
2. Microfiche Sheet:
A standard microfiche sheet is typically a rectangular piece of film that
contains multiple frames of microphotographs arranged in a grid pattern.
Each frame on the microfiche represents a document, page, or image.
3. Types of Microfiche:
There are different types of microfiche, classified based on the reduction
ratio and the number of frames per sheet. Common types include:
Jacketed Microfiche: Enclosed in a protective jacket or sleeve.
COM Microfiche: Contains computer output microfilm, capturing
data generated by computers.
Step-and-Repeat Microfiche: Repeats a single image multiple
times on the sheet.
4. Microfiche Readers and Printers:
Microfiche requires special equipment for viewing and printing. Microfiche
readers are devices equipped with magnification lenses and light sources
to display the microphotographs.
Microfiche printers can produce paper copies from microfiche sheets.
5. Applications:
Microfiche has been widely used for archival storage in libraries, archives,
and organizations with large document collections.
It was commonly employed for the storage of newspapers, periodicals,
historical records, engineering drawings, and other documents.
6. Advantages:
Digital Banking Page 47
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Space Efficiency: Microfiche allows for the compact storage of large
volumes of documents, reducing the physical space required for storage.
Preservation: Microfiche provides a stable and durable format for
preserving documents over the long term.
7. Disadvantages:
Limited Accessibility: Retrieving specific information from microfiche can
be time-consuming compared to digital formats.
Technological Obsolescence: With the advent of digital technologies,
microfiche has become less common, and accessing microfiche documents
may require specialized equipment.
8. Digital Conversion:
Many organizations are digitizing their microfiche collections to make the
content more accessible and to prevent loss due to physical deterioration.
9. Reduction Ratios:
Reduction ratios in microfiche creation determine how much the original
document is reduced in size on the microfiche. Common ratios include 24x,
42x, and 48x.
10. Archival Standards:
Archival standards, such as ANSI/AIIM (American National Standards
Institute/Association for Information and Image Management), provide
guidelines for the creation, storage, and retrieval of microforms, including
microfiche.
While microfiche played a significant role in document storage and preservation, its
usage has declined with the rise of digital technologies that offer more efficient and
accessible means of document management. However, existing microfiche collections
Digital Banking Page 48
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
remain valuable, and efforts are ongoing to digitize and preserve this historical
information.
NPC
The National Payments Corporation of India (NPCI) is a government-backed organization
that plays a pivotal role in the development and management of retail payment systems
in India. It was established in 2008 as a not-for-profit company under the provisions of
the Indian Companies Act 1956. NPCI is promoted by major banks in India, including
public sector, private sector, foreign, and cooperative banks.
Key functions and initiatives of NPCI in the realm of digital banking include:
1. Unified Payments Interface (UPI):
NPCI is the architect and operator of the Unified Payments Interface (UPI),
a real-time payment system that enables users to link multiple bank
accounts to a single mobile application. UPI facilitates the seamless
transfer of money between bank accounts using mobile devices.
2. Immediate Payment Service (IMPS):
NPCI introduced the Immediate Payment Service (IMPS), allowing
customers to make instant interbank electronic funds transfers. IMPS has
been a precursor to the UPI system.
3. RuPay Card:
NPCI launched the RuPay card, a domestic card network in India. RuPay
competes with international card networks and provides a cost-effective
alternative for electronic transactions.
4. National Financial Switch (NFS):
Digital Banking Page 49
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
NPCI operates the National Financial Switch (NFS), a network that
facilitates connectivity between ATMs and different banks, enabling
customers to access their accounts from any ATM.
5. Aadhaar Enabled Payment System (AePS):
NPCI has implemented the Aadhaar Enabled Payment System, which
allows customers to use their Aadhaar numbers and fingerprints for
financial transactions, promoting financial inclusion.
6. Bharat Bill Payment System (BBPS):
NPCI launched the Bharat Bill Payment System, a centralized bill payment
system that allows users to pay utility bills and make other payments
through a single platform.
7. National Automated Clearing House (NACH):
NPCI manages the National Automated Clearing House, an electronic
clearing system that facilitates high-volume, low-value electronic
transactions.
8. Cheque Truncation System (CTS):
NPCI has been involved in the implementation of the Cheque Truncation
System, which enables the electronic clearing of cheques, reducing the
need for physical movement of cheques.
9. Fastag:
NPCI oversees the Fastag program, which uses radio-frequency
identification (RFID) technology for electronic toll collection on highways,
streamlining the toll payment process.
10. Innovation and Expansion:
Digital Banking Page 50
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
NPCI continues to innovate and expand its offerings to promote a digital
and cashless economy. It collaborates with banks, fintech companies, and
government agencies to introduce new products and services.
NPCI has played a crucial role in transforming India's payments landscape by introducing
efficient, secure, and interoperable digital payment solutions. Its initiatives have
contributed significantly to financial inclusion and the adoption of digital transactions
across the country.
RUPAY
RuPay is a domestic card payment network in India, operated by the National Payments
Corporation of India (NPCI). It was introduced to provide an indigenous and cost-
effective alternative to international card networks like Visa and MasterCard. Here are
key features and aspects of RuPay:
1. Origin and Launch:
RuPay was launched by NPCI in March 2012 to promote electronic
payments and financial inclusion in India.
2. Debit and Credit Cards:
RuPay offers both debit and credit cards. These cards can be used at
various ATMs, Point of Sale (POS) terminals, and online merchants.
3. Cost-Effective Solution:
One of the key objectives of RuPay is to provide a cost-effective payment
solution. The lower transaction processing fees make it an attractive option
for banks and merchants.
Digital Banking Page 51
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
4. National and International Usage:
Initially designed for domestic transactions, RuPay cards can now also be
used for international transactions. NPCI has collaborated with international
card networks to enable RuPay cardholders to use their cards globally.
5. Financial Inclusion:
RuPay has played a significant role in promoting financial inclusion by
providing a card payment solution to individuals who may not have been
part of the formal banking system.
6. Integration with Government Schemes:
RuPay cards are often integrated with various government schemes and
initiatives, facilitating the distribution of benefits and subsidies to
cardholders.
7. Types of RuPay Cards:
RuPay offers a range of cards, including:
RuPay Debit Cards: Linked to savings or current accounts, used for
ATM withdrawals and POS transactions.
RuPay Credit Cards: Offer credit facilities with a predefined credit
limit.
8. Partnerships and Tie-Ups:
RuPay has formed partnerships with various banks and financial institutions
in India, allowing them to issue RuPay cards to their customers.
9. RuPay Contactless Cards:
RuPay offers contactless cards that allow users to make secure and quick
transactions by tapping the card on compatible POS terminals.
Digital Banking Page 52
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
10. RuPay for E-Commerce:
RuPay cards are widely accepted for online transactions, allowing users to
make purchases on e-commerce platforms.
11. RuPay Rewards Program:
Some RuPay cards come with a rewards program that offers benefits such
as cashback, discounts, and loyalty points for cardholders.
12. RuPay Global:
NPCI has introduced the RuPay Global card, enabling international
acceptance and usage. This allows RuPay cardholders to use their cards
for transactions outside of India.
13. Security Features:
RuPay cards incorporate security features such as two-factor
authentication to ensure secure transactions.
14. Digital Payments Ecosystem:
RuPay contributes to the overall digital payments ecosystem in India,
aligning with the government's initiatives to promote a cashless economy.
RuPay has gained popularity in India and has become a significant player in the
country's payment industry. Its focus on affordability, financial inclusion, and international
accessibility has contributed to its widespread adoption by individuals and businesses
across various sectors.
Digital Banking Page 53
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
UNIT II
Online Banking : Online Enquiry and Update Facilities – Personal Identification Numbers
and their use in conjunction with magnetic cards of both credit and debit cards, smart
cards, signature storage and display by electronic means, cheque truncation, note and
coin counting device
Online Banking
Online banking, also known as internet banking or electronic banking, refers to the use of
the internet to conduct various banking activities and financial transactions. It allows
customers to access and manage their bank accounts, perform transactions, and utilize
banking services from the convenience of a computer, tablet, or smartphone. Here are
key aspects of online banking:
1. Account Access:
Online banking provides customers with secure access to their bank
accounts through a web browser or dedicated mobile banking applications.
Digital Banking Page 54
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
2. Account Information:
Users can view real-time information about their account balances,
transaction history, statements, and other account details.
3. Fund Transfers:
Online banking enables users to transfer funds between their own
accounts, to accounts within the same bank, or to accounts in other
financial institutions.
4. Bill Payments:
Customers can pay bills online, covering utilities, credit cards, loans, and
other recurring payments. Many banks offer features for scheduling and
automating bill payments.
5. Mobile Banking:
Mobile banking apps allow users to access banking services and perform
transactions using smartphones or tablets. Features may include account
management, fund transfers, mobile check deposit, and notifications.
6. Alerts and Notifications:
Online banking platforms often provide customizable alerts and notifications
to keep users informed about account activities, low balances, or specific
transactions.
7. ATM Services:
Users can locate ATMs, check ATM balances, and perform other ATM-
related services through online banking platforms.
8. Investment Management:
Some online banking platforms integrate investment services, allowing
users to buy and sell stocks, bonds, and mutual funds.
Digital Banking Page 55
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
9. Loan Applications and Payments:
Users can apply for loans, mortgages, or credit cards online. Loan
repayments and interest calculations can also be managed through online
banking.
10. Customer Support:
Online banking platforms typically offer customer support through various
channels, including chat, email, and telephone. FAQs and online help
resources may also be available.
11. Security Measures:
Robust security measures, such as encryption, secure sockets layer (SSL),
and multi-factor authentication, are implemented to protect user information
and transactions.
12. Global Access:
Users can access their accounts and perform transactions from anywhere
with internet connectivity. International transactions and currency
conversions may be supported.
13. Integration with Other Financial Services:
Online banking platforms may integrate with other financial services, such
as budgeting apps, digital wallets, and financial planning tools.
14. E-Statements:
Instead of receiving paper statements, users can opt for electronic
statements (e-statements) delivered through online banking platforms.
15. Regulatory Compliance:
Online banking services adhere to regulatory standards and compliance
requirements to ensure the legality and security of financial transactions.
Digital Banking Page 56
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
16. Innovations:
Ongoing innovations in financial technology contribute to the evolution of
online banking, with features like contactless payments, digital wallets, and
open banking initiatives.
Online banking has become an integral part of modern banking, offering customers the
flexibility and convenience to manage their finances anytime, anywhere. As technology
continues to advance, online banking is expected to evolve with new features, enhanced
security measures, and improved user experiences.
Online Enquiry and Update Facilities
Online enquiry and update facilities in the context of digital banking refer to the features
that allow users to check and modify their account information, preferences, and details
through online channels. These facilities contribute to the convenience and efficiency of
managing financial accounts without the need for physical visits to a bank branch. Here
are common components of online enquiry and update facilities in digital banking:
1. Account Information:
Users can check real-time information about their account balances, recent
transactions, and account history.
2. Personal Details:
Online banking platforms often allow users to view and update personal
information, such as contact details, address, and email.
3. Account Preferences:
Users may have the option to customize account preferences, such as
setting notification preferences, choosing account nicknames, or
configuring security settings.
Digital Banking Page 57
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
4. Transaction Details:
Enquiry facilities enable users to review detailed information about specific
transactions, including date, time, amount, and transaction status.
5. Account Statements:
Users can access and download electronic account statements, including
monthly statements, tax statements, and transaction summaries.
6. Transaction Limits:
Some online banking platforms allow users to review and, in some cases,
update transaction limits for various types of transactions, such as fund
transfers.
7. Card Management:
Users can manage their debit or credit cards online, including viewing
recent transactions, blocking or unblocking cards, and setting transaction
limits.
8. Alerts and Notifications:
Enquiry facilities may include the ability to manage alerts and notifications,
allowing users to customize notifications for account activities, low
balances, and other relevant events.
9. Beneficiary Management:
Users can review, add, modify, or delete beneficiaries for fund transfers
through online banking.
10. Document Upload and Verification:
Some platforms may allow users to upload and verify supporting
documents for specific processes, such as updating KYC (Know Your
Customer) details.
Digital Banking Page 58
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
11. Secure Communication:
Users may have access to secure communication channels within the
online banking platform to communicate with the bank for inquiries or
support.
12. Address Change Requests:
Users can initiate requests to update their registered address through the
online banking platform.
13. Password and PIN Management:
Online banking users typically have the ability to manage their login
passwords, PINs, and other authentication credentials.
14. Profile Security:
Users can review and enhance their profile security settings, including
multi-factor authentication options and device management.
15. Service Requests:
Users may be able to initiate service requests online, such as ordering
checkbooks, requesting account statements, or updating account
preferences.
16. Regulatory Compliance:
Online enquiry and update facilities adhere to regulatory requirements and
security standards to ensure the confidentiality and integrity of user
information.
17. Audit Trails:
Digital banking platforms often maintain audit trails to track user activities,
providing transparency and security.
Digital Banking Page 59
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
These facilities empower users to have greater control over their financial accounts and
reduce the need for in-person visits to a bank branch. However, it is important for users
to follow best practices in securing their online banking credentials and devices to ensure
the safety of their financial information.
Personal Identification Numbers and their use in conjunction with magnetic cards
of both credit and debit cards
Personal Identification Numbers (PINs) play a crucial role in the security of credit and
debit cards, especially when used in conjunction with magnetic stripe cards. Here's how
PINs are utilized and contribute to the security of these cards:
1. Issuing Process:
When a customer receives a credit or debit card, the associated bank or
financial institution provides a unique PIN for the card. This PIN is typically
sent separately from the card for security reasons.
2. PIN Entry at ATMs:
One of the primary uses of PINs is at Automated Teller Machines (ATMs).
Cardholders are required to enter their PINs when withdrawing cash,
checking balances, or performing other transactions at ATMs.
3. Point-of-Sale (POS) Transactions:
For in-store transactions at point-of-sale terminals, cardholders may be
required to enter their PINs for debit card transactions. This adds an
additional layer of security beyond the card's magnetic stripe.
4. Security Enhancement:
The combination of a physical card and a unique PIN adds a two-factor
authentication layer to card transactions, enhancing security. Even if
Digital Banking Page 60
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
someone has the physical card, they cannot complete transactions without
the correct PIN.
5. Online and Remote Transactions:
While the magnetic stripe on cards is primarily used for in-person
transactions, the PIN can be used as a form of authentication for online or
remote transactions in some cases. This is commonly seen with debit
cards.
6. Magnetic Stripe Technology:
Magnetic stripe technology stores essential cardholder information on a
magnetic stripe located on the back of the credit or debit card. This includes
the card number, expiration date, and other details.
7. ATM Skimming Protection:
PINs provide protection against ATM skimming, a fraudulent activity where
criminals attempt to capture card information using unauthorized card
readers. Even if the card data is skimmed, the PIN is required for
transactions.
8. Lost or Stolen Card Protection:
In cases where a card is lost or stolen, having the correct PIN is crucial for
making unauthorized transactions more difficult. Without the PIN, a thief
would be limited in their ability to use the card.
9. Change or Reset of PIN:
Cardholders usually have the option to change or reset their PINs through
secure channels provided by their banks. This can add an extra layer of
personalization and security.
Digital Banking Page 61
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
10. Biometric Integration:
Some card issuers are integrating biometric authentication, such as
fingerprint recognition, in addition to PINs, further enhancing security.
11. Contactless Payments:
While contactless payments (using near-field communication or NFC
technology) are becoming more prevalent, traditional PINs are often
required for additional security measures, especially for high-value
transactions.
It's important for cardholders to keep their PINs confidential, not share them with others,
and follow best practices for card security. Additionally, the financial industry is
continually evolving to enhance security measures, including the adoption of chip
technology (EMV) and the development of more secure authentication methods.
Smart cards
Smart cards, also known as chip cards or integrated circuit cards, are plastic cards
embedded with a microprocessor chip. These cards are designed to provide enhanced
security and additional functionalities compared to traditional magnetic stripe cards.
Smart cards find applications in various industries, including finance, healthcare,
telecommunications, and government. Here are key features and uses of smart cards:
1. Microprocessor Chip:
The microprocessor chip embedded in a smart card contains memory and
processing capabilities. This chip enables the card to store and process
data securely.
2. Contact and Contactless Types:
Smart cards come in two main types: contact and contactless.
Digital Banking Page 62
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Contact Smart Cards: These cards require physical contact with a
card reader to establish communication.
Contactless Smart Cards: These cards use radio-frequency
identification (RFID) or near-field communication (NFC) technology
for wireless communication with compatible card readers.
3. Enhanced Security:
The use of a microprocessor chip enhances security by enabling
cryptographic operations and the storage of sensitive information within the
chip. This makes smart cards more resistant to cloning and fraud compared
to magnetic stripe cards.
4. Authentication and Authorization:
Smart cards are commonly used for secure authentication and
authorization processes. Users often need to enter a Personal Identification
Number (PIN) in conjunction with the smart card for access to services or
facilities.
5. Financial Applications:
In the financial sector, smart cards are used for credit and debit cards,
providing a more secure method of transaction compared to traditional
magnetic stripe cards. The global adoption of EMV (Europay, Mastercard,
Visa) standards involves the use of chip-enabled smart cards for payment
transactions.
6. Identification Cards:
Smart cards are widely used for identification purposes, including
government-issued ID cards, employee badges, and access control cards.
7. Healthcare Applications:
Digital Banking Page 63
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
In healthcare, smart cards can store patient information, medical records,
and insurance details, facilitating secure and efficient access to healthcare
services.
8. Telecommunications:
Subscriber Identity Module (SIM) cards used in mobile phones are a
common example of smart cards in the telecommunications industry. These
cards store subscriber information and enable network connectivity.
9. Transportation:
Smart cards are used in transportation systems for fare collection and
access control. Transit cards and contactless payment cards are examples
of smart cards in this context.
10. Electronic Passports:
Many countries use smart cards in electronic passports (e-passports) to
store biometric and personal information securely.
11. Secure Access Control:
Smart cards are employed for secure access control systems in corporate
environments, requiring users to authenticate themselves using their smart
cards and, in some cases, PINs.
12. Electronic Wallets:
Smart cards can be used in electronic wallets to store digital cash or
electronic money, enabling contactless payments and transactions.
13. Educational Institutions:
Smart cards are used in educational institutions as student ID cards,
facilitating access to facilities, tracking attendance, and managing library
services.
Digital Banking Page 64
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
14. Biometric Integration:
Some smart cards incorporate biometric authentication, such as fingerprint
or iris recognition, for an additional layer of security.
15. Durability:
Smart cards are generally more durable than traditional magnetic stripe
cards since the chip is less susceptible to physical wear and tear.
16. Multi-Application Cards:
Smart cards can support multiple applications on a single card, allowing
users to access various services with a single card.
The widespread adoption of smart card technology has contributed significantly to
improving the security and efficiency of various systems and services across different
industries.
Signature storage and display by electronic means
Storing and displaying electronic signatures involves using digital methods to capture,
store, and present a person's signature. Electronic signatures have become an integral
part of digital transactions and document management, providing a secure and
convenient way to verify the authenticity of a signer. Here's how signature storage and
display are typically implemented by electronic means:
1. Digital Signature Creation:
A digital signature is created through a process that involves cryptographic
algorithms. The signer uses a private key to generate a unique digital
signature, which is mathematically linked to the signed document.
2. Signature Capture Devices:
Digital Banking Page 65
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Electronic signatures can be captured using various devices, such as
stylus-based tablets, touchscreen devices, or signature pads. These
devices record the dynamic aspects of a signature, including the pressure,
speed, and trajectory.
3. Biometric Authentication:
Some electronic signature systems incorporate biometric authentication
methods, such as fingerprint or retina scans, to enhance the security and
uniqueness of the signature.
4. Document Integration:
The electronic signature is then integrated into the digital document. This
integration can involve embedding the signature image or storing the
signature data in a specific format within the document file.
5. File Formats:
Common file formats for storing electronically signed documents include
PDF (Portable Document Format) and various digital signature formats.
These formats allow for the preservation of the signature's integrity.
6. Secure Storage:
Signed documents are stored securely, often in encrypted databases or
document management systems. Access controls and encryption help
protect the confidentiality and integrity of the stored signatures.
7. Cloud-Based Solutions:
Many electronic signature services and platforms operate on cloud-based
infrastructure. Signed documents and associated signatures may be stored
securely in the cloud, providing accessibility from various locations.
8. Blockchain Technology:
Digital Banking Page 66
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Some advanced electronic signature solutions leverage blockchain
technology for secure and tamper-proof storage of signatures. Blockchain
ensures the immutability and traceability of signed documents.
9. User Authentication:
Before displaying a signature, systems typically verify the identity of the
user through authentication mechanisms, such as usernames, passwords,
or multi-factor authentication.
10. Signature Verification:
When displaying a signed document, the electronic signature can be
verified using the public key associated with the signer's digital certificate.
This ensures the integrity and authenticity of the signature.
11. Integration with Document Workflows:
Electronic signature solutions often integrate with document workflows,
enabling seamless collaboration, review, and approval processes within
organizations.
12. Mobile Devices:
Many electronic signature solutions support signature capture on mobile
devices, allowing users to sign documents using their smartphones or
tablets.
13. Audit Trails:
Robust electronic signature systems maintain detailed audit trails that
record when a document was signed, who signed it, and any changes
made to the document after signing.
14. Legal Compliance:
Digital Banking Page 67
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Electronic signatures are designed to meet legal requirements in various
jurisdictions. Compliance with electronic signature laws and standards is a
critical aspect of electronic signature implementation.
15. User-Friendly Interfaces:
The display of electronic signatures is often designed to be user-friendly,
providing a visual representation of the signer's signature on the document.
Electronic signature solutions offer a secure and efficient way to sign and manage
documents in the digital age. They are widely adopted across industries for their
convenience, speed, and the ability to streamline document workflows.
Cheque truncation
Cheque truncation is a process used in the banking industry to accelerate the clearing of
cheques by converting physical paper cheques into electronic images. Instead of
physically transporting paper cheques between banks, the electronic images are
exchanged, speeding up the clearing process and reducing the time and costs
associated with traditional cheque clearing methods. Here's how cheque truncation
works:
1. Capture of Cheque Images:
When a customer deposits a cheque at a bank, the bank captures high-
resolution images of the front and back of the cheque. This can be done
using specialized cheque scanners or imaging devices.
2. Data Entry and Validation:
Information from the cheque, such as the account number, cheque number,
amount, and payer details, is extracted from the image. Automated data
recognition and validation tools help ensure accuracy.
3. Creation of Electronic Cheque Images:
Digital Banking Page 68
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
The captured information is used to create electronic cheque images,
typically in the form of a front and back image file. These images are stored
securely in electronic databases.
4. Transmission to Clearing House:
The electronic cheque images, along with relevant transaction data, are
transmitted to a clearing house or a centralized clearing facility. This may
be facilitated through a secure network, often using standardized file
formats.
5. Interbank Exchange:
The clearing house electronically exchanges the cheque images and
transaction data with the paying bank or the bank on which the cheque is
drawn. This process is typically done overnight, allowing for a quicker
settlement cycle.
6. Verification and Reconciliation:
The paying bank verifies the electronic cheque images against its records
and performs necessary reconciliations. Any discrepancies or issues can
be addressed electronically.
7. Clearing and Settlement:
Once verification is complete, the clearing house facilitates the settlement
of funds between the banks involved. This settlement is based on the net
positions of cheques cleared and may involve the transfer of funds between
accounts.
8. Notification to Customers:
Banks may provide electronic notifications to customers, informing them
about the status of their cheques, including whether they have been
cleared or if there are any issues.
Digital Banking Page 69
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
9. Archiving:
The electronic cheque images and associated data are archived for record-
keeping purposes. This facilitates easy retrieval and auditing in case of
disputes or for compliance purposes.
Benefits of Cheque Truncation:
Faster Clearing Process: Cheque truncation significantly reduces the time
required for cheque clearing, often resulting in next-day or same-day clearing
cycles.
Cost Savings: By eliminating the need for physical transportation of cheques,
banks save on logistics and operational costs associated with traditional cheque
clearing methods.
Reduced Fraud: Electronic images are subject to advanced security measures,
reducing the risk of fraud associated with physical cheques.
Enhanced Efficiency: The automated processing of cheque images improves
overall efficiency in the clearing process, reducing manual errors and exceptions.
Cheque truncation has been implemented in many countries worldwide, transforming the
traditional cheque clearing process into a more streamlined and technologically
advanced system. This modernization enhances the efficiency of the banking system and
improves the overall customer experience.
Note and coin counting device
Note and coin counting devices are machines designed to accurately and efficiently
count large volumes of banknotes and coins. These devices are commonly used in
various industries, including banking, retail, and cash-intensive businesses, to streamline
the process of cash handling and reduce the likelihood of errors. Here's an overview of
note and coin counting devices:
1. Note Counting Machines:
Digital Banking Page 70
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Functionality: Note counting machines are designed to count and verify
the authenticity of banknotes. They can handle different denominations and
are equipped with advanced features for accuracy.
Detection Features: Some machines come with built-in counterfeit
detection features, such as ultraviolet (UV) detection, infrared (IR)
detection, and magnetic ink detection.
Batching and Sorting: Note counting machines often offer features for
batching and sorting banknotes based on their denominations, making cash
handling more organized.
2. Coin Counting Machines:
Functionality: Coin counting machines automate the counting and sorting
of coins. They are equipped with mechanisms to handle various coin
denominations.
Coin Hoppers: These machines typically have coin hoppers that can
accommodate large quantities of coins and dispense them into designated
bins or containers.
Sorting and Wrapping: Advanced coin counting machines can sort coins
into separate compartments for different denominations and even wrap
coins in coin rolls for easy banking.
3. Multi-Currency Counters:
Some advanced counting devices are capable of handling multiple
currencies. This is particularly useful for businesses or banks that deal with
international currencies.
4. Mixed Denomination Counters:
Digital Banking Page 71
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Certain machines are designed to count mixed denominations of
banknotes, providing a comprehensive solution for businesses that handle
a variety of notes.
5. Integration with Other Devices:
Note and coin counting devices may integrate with other cash handling
equipment or point-of-sale (POS) systems to create a seamless cash
management process.
6. Speed and Efficiency:
These devices are known for their speed and efficiency in counting large
volumes of cash, reducing the time and effort required for manual counting.
7. User-Friendly Interfaces:
Many counting devices feature user-friendly interfaces with digital displays,
touch screens, and intuitive controls to make them easy to operate.
8. Batching and Reporting:
Users can set batch limits for specific denominations, and the devices often
provide detailed reports of the counted cash, which can be useful for
record-keeping and reconciliation.
9. Portability:
Some models are designed to be portable, allowing businesses to move
the device to different locations as needed.
10. Maintenance and Cleaning:
Manufacturers provide guidelines for maintenance and cleaning to ensure
optimal performance and durability.
11. Customer Verification:
Digital Banking Page 72
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
In banking or retail settings, these machines may be used in front of
customers to provide transparency in the counting process, enhancing
trust.
It's important for businesses to choose note and coin counting devices that meet their
specific needs, considering factors such as the volume of cash transactions, currency
types, and additional features required for their operations. Regular maintenance and
calibration are essential to ensure accurate counting and prolonged device lifespan.
Digital Banking Page 73
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
UNIT III
Data Communication Network and EFT systems: Components & Modes of
Transmission; Major Networks in India; Emerging Trends in Communication Networks for
Banking; Evolution of EFT System; SWIFT; Automated Clearing Systems; Funds
Transfer Systems; Recent Developments in India
Data Communication Network and EFT systems
Data Communication Network (DCN) and Electronic Funds Transfer (EFT) systems play
crucial roles in the financial industry, facilitating the secure and efficient exchange of
financial information and electronic transactions. Here's an overview of these concepts:
Data Communication Network (DCN):
1. Definition:
A Data Communication Network (DCN) is a system of interconnected
computers, devices, and communication channels that allows the exchange
of data and information.
2. Purpose in Banking:
DCNs are integral to the banking industry for establishing communication
links between various entities such as banks, financial institutions, and
payment processors.
3. Key Components:
Digital Banking Page 74
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
DCN includes routers, switches, servers, and other network infrastructure
components. It may also involve technologies like Virtual Private Networks
(VPNs) to ensure secure data transmission.
4. Security Measures:
Security is a paramount concern in DCNs. Encryption protocols, firewalls,
and secure sockets layer (SSL) are implemented to protect sensitive
financial data during transmission.
5. Protocols:
Common protocols used in DCNs for financial transactions include
Transmission Control Protocol/Internet Protocol (TCP/IP), HTTPS (HTTP
Secure), and other secure communication protocols.
6. Redundancy and Reliability:
To ensure continuous availability, DCNs often incorporate redundancy and
failover mechanisms, reducing the risk of network downtime.
7. Integration with EFT Systems:
DCNs form the backbone for Electronic Funds Transfer (EFT) systems,
providing the communication infrastructure for secure and efficient financial
transactions.
Electronic Funds Transfer (EFT) Systems:
1. Definition:
Electronic Funds Transfer (EFT) refers to the computer-based systems
used to initiate, process, and facilitate financial transactions electronically,
without the need for paper documents.
2. Types of EFT Transactions:
Digital Banking Page 75
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
EFT systems handle various types of electronic transactions, including
electronic payments, wire transfers, direct deposits, automated
clearinghouse (ACH) transactions, and electronic bill payments.
3. EFT in Banking:
EFT has revolutionized the banking industry, allowing customers to transfer
funds, pay bills, and conduct financial transactions conveniently using
electronic means.
4. Components of EFT Systems:
EFT systems consist of electronic payment gateways, point-of-sale (POS)
terminals, ATMs, and backend systems that process and authorize
transactions.
5. Authorization and Authentication:
Security measures, such as tokenization, biometric authentication, and
secure PIN entry, are implemented to ensure the authorization and
authentication of EFT transactions.
6. Interbank Transactions:
EFT systems facilitate interbank transactions, enabling the transfer of funds
between accounts held at different financial institutions.
7. Real-Time Processing:
Many modern EFT systems offer real-time processing, allowing for
instantaneous fund transfers and quicker transaction confirmations.
8. Mobile and Online Banking:
EFT systems are integrated with mobile banking apps and online banking
platforms, providing users with seamless and secure electronic transaction
experiences.
Digital Banking Page 76
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
9. International EFT:
EFT systems support international transactions, enabling cross-border fund
transfers and foreign currency exchanges.
10. Compliance and Regulations:
EFT systems adhere to regulatory standards and compliance requirements,
ensuring the security and legality of electronic financial transactions.
11. Record Keeping and Reporting:
EFT systems maintain detailed records of transactions, aiding in auditing,
reconciliation, and regulatory reporting.
Both Data Communication Networks and Electronic Funds Transfer systems are pivotal
components of the modern financial landscape, providing the infrastructure and
functionality required for secure and efficient electronic financial transactions. Advances
in technology continue to shape and enhance the capabilities of these systems,
promoting innovation in the financial industry.
Components
In the context of digital banking, various components come together to create a
comprehensive and integrated system that enables financial institutions to offer online
and mobile banking services. These components work in tandem to facilitate secure,
efficient, and user-friendly banking experiences. Here are key components of digital
banking:
1. User Interface (UI) and User Experience (UX):
The user interface is the visual and interactive part of digital banking
applications that customers interact with. User experience design focuses
on creating a seamless and intuitive experience for users across devices.
2. Mobile Banking App:
Digital Banking Page 77
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
A dedicated application designed for mobile devices, allowing users to
perform banking transactions, check account balances, and access various
services on their smartphones or tablets.
3. Online Banking Platform:
The web-based platform that customers access through internet browsers
on desktop or laptop computers to manage their accounts, conduct
transactions, and access banking services.
4. Authentication Mechanisms:
Techniques to verify the identity of users, including username-password
combinations, biometric authentication (fingerprint, facial recognition), and
two-factor authentication (2FA).
5. Security Infrastructure:
Security protocols, encryption techniques, firewalls, and other measures to
ensure the confidentiality, integrity, and availability of customer data and
transactions.
6. Core Banking System:
The central banking system that manages the core financial and accounting
functions, including customer accounts, transactions, loans, and deposits.
7. Payment Gateway:
Facilitates the secure transfer of funds between the customer's account
and external accounts, merchants, or service providers during online
transactions.
8. APIs (Application Programming Interfaces):
Enable the integration of various third-party services, fintech applications,
or complementary financial products into the digital banking ecosystem.
Digital Banking Page 78
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
9. Customer Relationship Management (CRM) System:
Manages customer interactions, tracks customer behavior, and provides
insights to improve customer engagement and satisfaction.
10. Data Analytics and Business Intelligence:
Analytical tools and technologies that process and analyze large volumes
of data to derive insights into customer behavior, preferences, and trends.
This data-driven approach helps in decision-making and personalized
service delivery.
11. Chatbots and Virtual Assistants:
AI-powered tools that provide real-time assistance, answer queries, and
guide customers through various banking processes, enhancing customer
support and engagement.
12. Document Management System:
Manages and stores digital documents related to customer accounts,
transactions, and regulatory compliance.
13. Biometric Technology:
Enables secure authentication using biometric data such as fingerprints or
facial recognition, adding an extra layer of security to digital banking
transactions.
14. Regulatory Compliance Solutions:
Systems that ensure adherence to regulatory requirements and standards,
including Anti-Money Laundering (AML) and Know Your Customer (KYC)
regulations.
15. Blockchain and Distributed Ledger Technology:
Digital Banking Page 79
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Used for secure and transparent record-keeping, especially in processes
like cross-border payments, identity verification, and smart contracts.
16. ATM and POS Integration:
Seamless integration with Automated Teller Machines (ATMs) and Point-of-
Sale (POS) systems for a holistic banking experience.
17. Risk Management Systems:
Tools and algorithms to assess and mitigate risks associated with
transactions, cybersecurity threats, and other financial activities.
18. Digital Wallets:
Applications that enable users to store and manage digital versions of
payment cards, loyalty cards, and other payment instruments on their
mobile devices.
19. Personal Finance Management (PFM) Tools:
Features that help users track and manage their finances, set budgets, and
analyze spending patterns.
20. Emerging Technologies:
Components leveraging technologies like Artificial Intelligence (AI),
Machine Learning (ML), Augmented Reality (AR), and Virtual Reality (VR)
to enhance services and customer experiences.
These components collectively contribute to the digital transformation of banking
services, offering customers convenience, accessibility, and a range of innovative
features. The successful integration and coordination of these components are crucial for
the effectiveness and competitiveness of digital banking platforms.
Modes of Transmission
Digital Banking Page 80
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Modes of transmission refer to the methods or techniques used to send data from one
point to another in a communication system. In the context of networking and
telecommunications, there are several modes of transmission, each with its
characteristics and applications. The primary modes of transmission include:
1. Simplex Mode:
Definition: In simplex mode, data transmission occurs in only one
direction. It is a unidirectional communication mode.
Example: Television broadcasting is an example of simplex mode, where
the information flows from the broadcaster to the viewers.
2. Half-Duplex Mode:
Definition: Half-duplex mode allows data transmission in both directions
but not simultaneously. Communication alternates between sending and
receiving.
Example: Walkie-talkies operate in half-duplex mode. Users press a button
to speak and release it to listen.
3. Full-Duplex Mode:
Definition: In full-duplex mode, data can be transmitted in both directions
simultaneously. This allows for two-way communication without
interruptions.
Example: Telephone conversations and most modern data communication
systems, including the internet, operate in full-duplex mode.
4. Serial Transmission:
Definition: Serial transmission sends data one bit at a time over a single
communication channel. It is a sequential method.
Digital Banking Page 81
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Example: Sending data over a serial port, such as RS-232, is an example
of serial transmission.
5. Parallel Transmission:
Definition: Parallel transmission sends multiple bits simultaneously over
multiple parallel channels. It is faster than serial transmission.
Example: Data buses in computers often use parallel transmission to
transfer multiple bits in parallel.
6. Analog Transmission:
Definition: Analog transmission sends continuous signals representing
varying data. It is used for transmitting audio, video, and analog signals.
Example: Analog telephone lines transmit voice signals using analog
transmission.
7. Digital Transmission:
Definition: Digital transmission sends discrete signals, usually in the form
of binary code (0s and 1s). It is common in computer networks.
Example: Sending data over the internet or a digital communication
network involves digital transmission.
8. Guided Transmission Media:
Definition: Guided transmission media use physical pathways or cables to
transmit signals. Examples include twisted-pair cables, coaxial cables, and
fiber-optic cables.
Example: Ethernet cables in a local area network (LAN) use guided
transmission media.
9. Unguided Transmission Media (Wireless):
Digital Banking Page 82
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Definition: Unguided transmission media transmit signals without using
physical pathways. Examples include radio waves, microwaves, and
infrared.
Example: Wi-Fi networks use unguided transmission media to transmit
data wirelessly.
10. Simplex Fiber-Optic Transmission:
Definition: In simplex fiber-optic transmission, data travels in only one
direction using a single fiber-optic cable.
Example: One-way communication systems, such as cable television
(CATV) networks, may use simplex fiber-optic transmission.
These modes of transmission are fundamental to understanding how data is
communicated in various systems. The choice of a particular mode depends on the
requirements of the communication system, including factors like speed, cost, and the
nature of the data being transmitted.
Some of the major networks in India:
1. Telecommunications Networks:
Bharat Sanchar Nigam Limited (BSNL): BSNL is a government-owned
telecommunications company that provides a wide range of telecom
services across India.
Bharti Airtel: Airtel is one of the largest private telecommunications service
providers in India, offering mobile services, broadband, and digital TV.
Reliance Jio Infocomm: Jio, a subsidiary of Reliance Industries, has
emerged as a major player in the telecom industry with its 4G services,
digital ecosystem, and affordable plans.
Digital Banking Page 83
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Vodafone Idea: Formed by the merger of Vodafone India and Idea
Cellular, Vodafone Idea is a major telecom operator providing mobile and
data services.
2. Television Broadcasting Networks:
Doordarshan (DD): Doordarshan is the public service broadcaster in India,
owned by Prasar Bharati. It operates multiple channels, including DD
National and DD News.
Star India: Star India is a prominent television network with a wide range of
channels, including Star Plus, Star Sports, and Star Movies.
Zee Entertainment Enterprises Limited (ZEEL): ZEEL is one of the
leading media and entertainment companies in India, operating popular
channels like Zee TV, Zee Cinema, and Zee News.
Sony Pictures Networks India (SPN): SPN owns and operates several
channels, including Sony Entertainment Television, Sony MAX, and Sony
SIX.
3. Internet Service Providers (ISPs):
Bharti Airtel: Apart from its telecom services, Airtel is a major player in the
broadband internet segment, providing high-speed internet services.
Reliance Jio Fiber: Jio Fiber offers high-speed broadband services with a
focus on fiber-to-the-home (FTTH) connections.
Hathway: Hathway is one of the leading cable broadband service providers
in India, offering high-speed internet services.
ACT Fibernet: ACT Fibernet is known for its high-speed broadband
services in several cities across India.
4. Banking Networks:
Digital Banking Page 84
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
National Payments Corporation of India (NPCI): NPCI is an umbrella
organization that operates major retail payment and settlement systems in
India, including UPI (Unified Payments Interface) and IMPS (Immediate
Payment Service).
State Bank of India (SBI): SBI is the largest public sector bank in India
and plays a key role in the country's banking network.
ICICI Bank: ICICI Bank is one of the major private sector banks in India,
providing a range of financial services.
HDFC Bank: HDFC Bank is another leading private sector bank with a
significant presence in the Indian banking sector.
Emerging Trends in Communication Networks for Banking
As technology continues to evolve, communication networks in the banking sector are
undergoing significant transformations. Several emerging trends are shaping the future of
communication networks in banking, enhancing efficiency, security, and customer
experience. Here are some key emerging trends:
1. 5G Technology:
The deployment of 5G technology is set to revolutionize communication
networks in banking. With higher data speeds, lower latency, and increased
network capacity, 5G will enable faster and more reliable communication
between banks, branches, and customers. This can lead to improved
mobile banking experiences, real-time transactions, and enhanced
connectivity for financial institutions.
2. Edge Computing:
Edge computing involves processing data closer to the source rather than
relying solely on centralized data centers. In banking, this trend allows for
Digital Banking Page 85
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
quicker data processing and analysis, leading to faster decision-making
and reduced latency. Edge computing is particularly beneficial for
applications such as real-time fraud detection and personalized customer
interactions.
3. Cloud-Based Solutions:
Cloud technology is becoming increasingly integral to communication
networks in banking. Cloud-based solutions offer scalability, flexibility, and
cost-effectiveness. Banks are leveraging cloud services for data storage,
computing power, and application deployment, enabling them to adapt
quickly to changing demands and improving collaboration across branches.
4. Secure Communication Protocols:
With the rising importance of cybersecurity, the banking industry is adopting
advanced and secure communication protocols. This includes the use of
Transport Layer Security (TLS) for encrypting data in transit, ensuring the
confidentiality and integrity of sensitive information during communication
between different banking systems, branches, and customers.
5. Internet of Things (IoT):
IoT devices are being integrated into the banking ecosystem to enhance
communication and streamline operations. Smart devices, such as ATMs,
point-of-sale terminals, and wearables, enable seamless interactions
between customers and the banking infrastructure. Additionally, IoT plays a
role in monitoring and maintaining the security of physical bank branches
and ATMs.
6. Blockchain and Distributed Ledger Technology (DLT):
Blockchain and DLT are transforming communication networks in banking
by providing secure and transparent methods of recording and verifying
transactions. These technologies enhance the efficiency of cross-border
Digital Banking Page 86
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
payments, reduce fraud, and improve the traceability of financial
transactions.
7. Application Programming Interfaces (APIs):
Open Banking initiatives are driving the use of APIs to enable seamless
integration between different banking systems and third-party applications.
APIs facilitate secure communication and data exchange, allowing
customers to access a broader range of financial services and enabling
banks to create innovative solutions.
8. Artificial Intelligence (AI) and Chatbots:
AI-powered communication tools, including chatbots, are being used in
banking for customer interactions, query resolution, and personalized
services. These technologies enhance customer engagement by providing
real-time assistance and improving the overall banking experience.
9. Biometric Authentication:
Biometric authentication methods, such as fingerprint recognition, facial
recognition, and voice authentication, are increasingly being integrated into
communication networks for enhanced security. These technologies play a
crucial role in securing transactions and accessing banking services.
10. Regulatory Compliance Solutions:
Communication networks are incorporating technologies to ensure
compliance with evolving regulatory requirements, such as data protection
and privacy laws. Banks are investing in solutions that help them adhere to
standards while maintaining efficient communication channels.
11. Hybrid Work Environments:
The rise of remote and hybrid work environments is influencing
communication networks in banking. Collaboration tools, video
Digital Banking Page 87
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
conferencing, and secure communication platforms are becoming essential
for maintaining effective communication among banking teams, irrespective
of their physical locations.
These emerging trends in communication networks for banking reflect the industry's
commitment to leveraging technology for improved services, enhanced security, and
increased operational efficiency. As the banking sector continues to evolve, staying
abreast of these trends is crucial for institutions to remain competitive and meet the
changing needs of their customers.
Evolution of EFT System
The evolution of Electronic Funds Transfer (EFT) systems has been a transformative
journey, marked by advancements in technology, changes in regulatory frameworks, and
shifts in consumer preferences. The timeline below provides an overview of the key
milestones in the evolution of EFT systems:
1. 1960s - Introduction of Credit Cards:
The concept of electronic funds transfer began with the introduction of
credit cards. Banks issued credit cards that allowed consumers to make
purchases on credit, initiating the shift from traditional cash-based
transactions.
2. 1970s - Automated Teller Machines (ATMs):
The 1970s witnessed the deployment of the first ATMs. These machines
allowed customers to withdraw cash, check account balances, and perform
basic transactions outside of traditional banking hours.
3. 1972 - Development of Electronic Funds Transfer at Point of Sale (EFTPOS):
EFTPOS systems were introduced, enabling electronic transactions at the
point of sale. Consumers could use debit cards to make purchases directly
from their bank accounts.
Digital Banking Page 88
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
4. 1974 - Establishment of the Interbank Card Association (ICA):
The ICA was formed to create a network for sharing ATM access among
various banks, laying the foundation for interconnected EFT systems.
5. 1978 - Introduction of Automated Clearing House (ACH):
ACH systems were implemented to facilitate batch processing of electronic
transactions, including payroll direct deposits, bill payments, and interbank
transfers.
6. 1980s - Emergence of Electronic Banking:
The 1980s marked the advent of electronic banking services, allowing
customers to access their accounts and perform transactions remotely
through computer terminals.
7. 1983 - SWIFT (Society for Worldwide Interbank Financial
Telecommunication):
SWIFT was established to facilitate secure and standardized
communication for international financial transactions. It played a crucial
role in the global expansion of EFT systems.
8. 1987 - Introduction of Debit Cards:
Debit cards gained popularity, allowing users to make electronic payments
directly from their bank accounts. This further reduced the reliance on
paper-based transactions.
9. 1990s - Rise of Online Banking:
The 1990s witnessed the rise of online banking, enabling customers to
access their accounts, transfer funds, and pay bills through the internet.
10. 1996 - Introduction of Electronic Check Conversion (ECC):
Digital Banking Page 89
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
ECC allowed paper checks to be converted into electronic transactions at
the point of sale, reducing processing time and enhancing efficiency.
11. Early 2000s - Mobile Banking and Payments:
The proliferation of mobile phones led to the introduction of mobile banking
and payments. Consumers could now perform financial transactions using
their smartphones.
12. 2008 - Launch of Contactless Payments:
Contactless payment methods, utilizing Near Field Communication (NFC)
technology, were introduced, allowing users to make payments by tapping
their cards or mobile devices.
13. 2010s - Implementation of Faster Payments:
Many countries implemented faster payment systems, enabling real-time or
near-real-time settlement of transactions. This accelerated the speed of
fund transfers.
14. 2010s - Emergence of Peer-to-Peer (P2P) Payments:
P2P payment services, facilitated by platforms like PayPal, Venmo, and
others, gained popularity, allowing individuals to transfer funds directly to
each other electronically.
15. Present - Blockchain and Cryptocurrencies:
The adoption of blockchain technology and cryptocurrencies is influencing
the EFT landscape. These technologies offer decentralized, secure, and
transparent alternatives for financial transactions.
16. Ongoing - Open Banking and APIs:
Open Banking initiatives are promoting the use of Application Programming
Interfaces (APIs) to facilitate secure and seamless data sharing between
Digital Banking Page 90
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
banks and third-party service providers, fostering innovation in EFT
services.
The evolution of EFT systems continues to be shaped by technological advancements,
regulatory changes, and the ongoing digital transformation in the financial industry. The
focus remains on enhancing the speed, security, and accessibility of electronic funds
transfer services to meet the evolving needs of consumers and businesses.
SWIFT
SWIFT, which stands for the Society for Worldwide Interbank Financial
Telecommunication, is a global messaging network and financial infrastructure used by
banks and financial institutions to securely and efficiently communicate and exchange
information. SWIFT does not facilitate funds transfer itself but provides a standardized
messaging system for financial transactions. Here are key aspects of SWIFT:
1. Messaging Platform:
SWIFT provides a standardized messaging platform that enables financial
institutions worldwide to exchange information about financial transactions
in a secure and standardized format.
2. Global Network:
SWIFT operates a global network that connects over 11,000 financial
institutions across more than 200 countries. This extensive network
ensures that banks can communicate and transact with each other globally.
3. Message Types:
SWIFT messages cover a wide range of financial transactions, including
payment instructions, trade finance, securities transactions, and treasury
operations. The messages are standardized using a set of codes and
formats defined by SWIFT.
Digital Banking Page 91
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
4. Security and Authentication:
Security is a paramount concern for SWIFT. The network uses various
security measures, including encryption, digital signatures, and secure
messaging protocols, to ensure the confidentiality and integrity of the
transmitted data.
5. Financial Information Transfer (FIN) Messages:
The most common type of messages on the SWIFT network are Financial
Information Transfer (FIN) messages. These messages use a specific
syntax and structure defined by SWIFT, allowing for consistency in
communication.
6. Business Identifier Code (BIC):
Each financial institution connected to the SWIFT network is identified by a
unique Business Identifier Code (BIC), commonly known as a SWIFT code.
The BIC is used to route messages to the correct destination.
7. SWIFT Categories:
SWIFT messages are categorized into different categories (e.g., MT1xx for
customer payments, MT2xx for financial institution transfers). Each
category corresponds to a specific type of financial transaction.
8. SWIFT Net:
SWIFT Net is an IP-based secure network infrastructure introduced by
SWIFT, enabling member institutions to connect and exchange financial
messages over the internet. It provides a more modern and efficient
alternative to traditional leased lines.
9. Compliance and Regulatory Reporting:
SWIFT has developed solutions to assist financial institutions in complying
with regulatory requirements and reporting standards. This includes tools
Digital Banking Page 92
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
for anti-money laundering (AML) compliance and the exchange of tax-
related information.
10. SWIFT GPI (Global Payments Innovation):
SWIFT GPI is an initiative aimed at enhancing the speed, transparency,
and traceability of cross-border payments. It provides real-time tracking of
payments and status updates, improving the overall customer experience.
11. Cybersecurity and Fraud Prevention:
Given the increasing threat of cyber attacks and fraud in the financial
industry, SWIFT has implemented measures to enhance cyber security,
including the Customer Security Program (CSP) that focuses on
strengthening the security of the entire SWIFT ecosystem.
12. SWIFT for Corporates:
While SWIFT has traditionally been used by financial institutions, SWIFT for
Corporates allows corporations to connect directly to the SWIFT network,
facilitating efficient and secure communication with their banking partners.
SWIFT plays a critical role in facilitating secure and standardized communication among
financial institutions globally. Its messaging standards and network infrastructure
contribute to the smooth operation of international financial transactions, trade finance,
and other financial services.
Automated Clearing Systems
Automated Clearing Systems (ACS) refer to electronic systems that automate the
process of clearing financial transactions, particularly electronic fund transfers, in a
secure, efficient, and standardized manner. These systems are designed to replace or
complement traditional paper-based clearing processes, enabling faster and more
streamlined settlement of financial transactions.
Digital Banking Page 93
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Key components and types of Automated Clearing Systems include:
1. Automated Clearing House (ACH):
ACH is a widely used type of Automated Clearing System that facilitates
electronic fund transfers and transactions in many countries, including the
United States. ACH processes various types of transactions, such as direct
deposits, payroll payments, utility bill payments, and electronic checks.
2. Direct Debit Systems:
Direct debit systems are a subset of Automated Clearing Systems that
allow individuals or businesses to authorize the automatic withdrawal of
funds from their bank accounts to pay recurring bills, subscriptions, or loan
payments.
3. Automated Clearing House Network:
ACH networks provide the infrastructure for processing electronic
transactions. Financial institutions and banks use ACH networks to
exchange transaction data securely and settle electronic fund transfers.
4. Batch Processing:
Automated Clearing Systems often use batch processing, where multiple
transactions are grouped together and processed as a batch at specific
intervals. This helps optimize efficiency and reduce processing costs.
5. Real-Time Gross Settlement (RTGS):
While traditional Automated Clearing Systems often rely on batch
processing, some modern systems, such as Real-Time Gross Settlement
(RTGS), enable real-time and immediate settlement of individual
transactions. RTGS systems are often used for high-value transactions that
require immediate clearing and settlement.
Digital Banking Page 94
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
6. Electronic Funds Transfer (EFT):
EFT refers to the electronic exchange of money between banks or financial
institutions. Automated Clearing Systems, especially ACH, are a key
component of EFT, facilitating the electronic transfer of funds between
accounts.
7. Cross-Border Payment Systems:
Some Automated Clearing Systems extend their services beyond national
borders, enabling cross-border payment transactions. These systems
enhance the efficiency of international fund transfers by automating the
clearing and settlement processes.
8. Check Truncation Systems:
Automated Clearing Systems also play a role in check truncation, where
paper checks are converted into electronic images for processing. This
eliminates the need for physical transportation of checks and accelerates
the clearing process.
9. SEPA (Single Euro Payments Area):
SEPA is an initiative in the European Union that harmonizes electronic
payments across participating countries. SEPA incorporates an Automated
Clearing House framework to facilitate cross-border euro-denominated
transactions.
10. ACH Operators:
ACH systems are often operated by central clearinghouses or financial
institutions that act as clearing and settlement intermediaries. These
operators facilitate the secure and efficient exchange of transaction data
between participating banks.
Benefits of Automated Clearing Systems:
Digital Banking Page 95
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Efficiency: ACS significantly reduces the time required for clearing and
settlement, enabling faster processing of financial transactions.
Cost-Effectiveness: By automating processes and reducing manual intervention,
ACS helps financial institutions and businesses lower operational costs.
Accuracy: Automated processes reduce the risk of errors associated with manual
data entry, enhancing the accuracy of transaction processing.
Accessibility: Automated Clearing Systems provide a standardized and
accessible platform for financial institutions, businesses, and individuals to
exchange electronic transactions.
Automated Clearing Systems have become integral to modern banking and financial
services, contributing to the digitization and automation of payment and fund transfer
processes. They play a crucial role in supporting the seamless flow of electronic
transactions within and across financial systems.
Funds Transfer Systems
Funds transfer systems refer to mechanisms and platforms that facilitate the movement
of money from one account to another, either within the same financial institution or
between different institutions. These systems have evolved over time, transitioning from
traditional paper-based methods to electronic and digital solutions. Here are some key
types of funds transfer systems:
1. Wire Transfer:
Wire transfers, also known as bank transfers or credit transfers, involve the
electronic transfer of funds from one bank account to another. They are
often used for high-value and time-sensitive transactions, both domestically
and internationally.
2. Automated Clearing House (ACH):
Digital Banking Page 96
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
ACH systems provide a batch-oriented, electronic funds transfer
mechanism that facilitates various transactions, including direct deposits,
payroll payments, vendor payments, and consumer bill payments. ACH is
widely used for recurring transactions and batch processing.
3. Real-Time Gross Settlement (RTGS):
RTGS systems enable the real-time settlement of individual transactions.
Funds are transferred instantly, and both the payer and payee's accounts
are updated in real time. RTGS is commonly used for high-value
transactions that require immediate clearing and settlement.
4. Peer-to-Peer (P2P) Payment Systems:
P2P payment systems allow individuals to transfer funds directly to each
other using electronic platforms or mobile applications. Examples include
services like Venmo, PayPal, Cash App, and others.
5. Mobile Banking and Wallets:
Mobile banking apps and digital wallets enable users to transfer funds
using their smart phones. These apps often support a variety of
transactions, including person-to-person transfers, bill payments, and
mobile recharge.
6. Online Banking Transfers:
Online banking platforms provided by financial institutions allow customers
to initiate funds transfers between their accounts or to other accounts within
the same bank. This is a convenient way for customers to manage their
finances.
7. Check Truncation Systems:
Digital Banking Page 97
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Check truncation involves converting physical paper checks into electronic
images for faster processing. Funds are transferred through electronic
clearing systems, eliminating the need for physical transportation of checks.
8. Automated Teller Machine (ATM) Transactions:
ATMs enable users to withdraw cash, deposit funds, and transfer money
between accounts. While primarily associated with cash transactions,
ATMs also support electronic funds transfers.
9. Cross-Border Payment Systems:
Cross-border payment systems facilitate the transfer of funds between
individuals, businesses, or financial institutions across different countries.
SWIFT (Society for Worldwide Interbank Financial Telecommunication) is
an example of a cross-border payment system.
10. Cryptocurrency and Blockchain-Based Transfers:
Blockchain technology has given rise to digital currencies and
cryptocurrencies. Platforms like Bitcoin and Ethereum enable decentralized
peer-to-peer transactions without the need for traditional financial
intermediaries.
11. Central Bank Digital Currencies (CBDC):
Some countries are exploring or implementing central bank digital
currencies, which are government-issued digital currencies. CBDCs could
potentially reshape the landscape of funds transfer systems.
12. Contactless Payments:
Contactless payment methods, utilizing near-field communication (NFC)
technology, allow users to make transactions by tapping their cards or
Digital Banking Page 98
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
mobile devices. These transactions often involve small, everyday
purchases.
Each funds transfer system has its unique characteristics, benefits, and use cases. The
evolution of technology continues to shape the landscape of funds transfer, introducing
faster, more secure, and convenient ways for individuals and businesses to manage their
financial transactions.
Recent Developments in India
Here are some trends and potential developments:
1. Digital Payments and UPI Growth:
The Unified Payments Interface (UPI) in India has witnessed tremendous
growth, becoming a popular and widely used platform for digital payments.
The government's push for a cashless economy and various initiatives by
financial institutions have contributed to the increased adoption of digital
payments.
2. Expansion of Neobanks:
The concept of neobanks or digital-only banks has been gaining traction.
These financial institutions operate exclusively online without physical
branches, offering innovative and user-friendly digital banking services. The
Indian market has seen the emergence of neobanks focusing on specific
niches or providing specialized services.
3. Integration of AI and Chatbots:
Banks are increasingly integrating artificial intelligence (AI) and chatbots
into their digital platforms to enhance customer service, automate routine
tasks, and provide personalized banking experiences. These technologies
contribute to improved efficiency and customer satisfaction.
Digital Banking Page 99
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
4. Open Banking Initiatives:
Open Banking initiatives, which involve sharing financial data with third-
party service providers through secure Application Programming Interfaces
(APIs), are gaining attention. This facilitates the development of innovative
financial products and services, offering customers more choices and
personalized solutions.
5. Digital Lending Platforms:
Digital lending platforms and fintech companies continue to play a
significant role in transforming the lending landscape. These platforms
leverage technology for quick and efficient loan approvals, often catering to
underserved segments of the population.
6. Cryptocurrency Regulations:
The regulatory environment around cryptocurrencies and digital assets is
evolving. There is ongoing discussion and consideration of regulations to
govern the use and trading of cryptocurrencies in India. The regulatory
framework will likely shape the future of digital assets in the banking sector.
7. Cybersecurity Focus:
With the increased reliance on digital banking services, there is a growing
emphasis on cybersecurity. Banks and financial institutions are investing in
robust cybersecurity measures to protect customer data, prevent fraud, and
ensure the overall security of digital transactions.
8. Financial Inclusion Initiatives:
Digital banking is playing a crucial role in advancing financial inclusion.
Various initiatives are being undertaken to bring unbanked and
Digital Banking Page 100
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
underbanked populations into the formal banking system through the use of
digital technologies.
UNIT IV
Role of Technology Up gradation and its impact on Banks: Trends in Technology
Developments; Role & Uses of Technology Up gradation; Global Trends; Impact of
IT on Banks- Preventive Vigilance in Electronic Banking Phishing; Customer Education;
Safety Checks; Precautions
Role of Technology Up gradation and its impact on Banks
Technology upgradation plays a crucial role in the banking sector, bringing about
significant transformations in operations, customer service, and overall efficiency. The
impact of technology upgradation on banks is multi-faceted and extends to various
Digital Banking Page 101
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
aspects of their functioning. Here are key areas where technology upgradation has a
notable impact:
1. Operational Efficiency:
Automation of Processes: Technology upgradation involves the automation
of routine and manual processes within banks, leading to increased
operational efficiency. Tasks such as account management, transaction
processing, and customer service can be streamlined, reducing the reliance
on manual intervention.
Workflow Optimization: Advanced technologies, including robotic process
automation (RPA) and workflow management systems, contribute to
optimizing internal processes. This results in faster decision-making,
reduced errors, and improved overall workflow efficiency.
2. Customer Experience:
Digital Banking Services: Technology enables the delivery of a wide range
of digital banking services, including online account management, mobile
banking apps, and digital wallets. Customers can access their accounts,
make transactions, and avail banking services conveniently from their
devices.
Personalization: Advanced analytics and artificial intelligence (AI) empower
banks to analyze customer behavior and preferences. This data-driven
approach allows for personalized services, targeted product offerings, and
customized communication, enhancing the overall customer experience.
Multichannel Banking: Technology upgradation facilitates multichannel
banking, enabling customers to interact with their banks through various
channels such as online banking, mobile apps, ATMs, and customer
service portals.
3. Security and Fraud Prevention:
Digital Banking Page 102
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Biometric Authentication: Banks are adopting biometric authentication
methods, including fingerprint recognition and facial recognition, to enhance
security and protect customer accounts from unauthorized access.
Advanced Encryption: Technology upgrades often involve implementing
advanced encryption methods to secure data during transmission and
storage. This is crucial for safeguarding sensitive customer information and
preventing data breaches.
Fraud Detection Systems: AI and machine learning algorithms are
employed to detect patterns indicative of fraudulent activities. Real-time
monitoring helps banks identify and mitigate potential risks promptly.
4. Digital Payments and Transactions:
Contactless Payments: The introduction of contactless payment methods,
such as near-field communication (NFC) and mobile payments, enhances
the speed and convenience of transactions. This is particularly relevant in
the context of changing consumer preferences and the move towards a
cashless economy.
Real-Time Payments: Technology upgrades support real-time payment
systems, allowing for immediate fund transfers between accounts. Real-
time gross settlement (RTGS) and instant payment systems contribute to
faster and more efficient financial transactions.
5. Regulatory Compliance:
Automated Compliance Systems: Banks leverage technology to ensure
compliance with evolving regulatory requirements. Automated compliance
systems help monitor transactions, report suspicious activities, and adhere
to regulatory standards, reducing the risk of non-compliance.
Digital Banking Page 103
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Blockchain for Compliance: Blockchain technology is explored for its
potential to enhance transparency and traceability in financial transactions,
aiding in regulatory compliance and reducing the risk of fraud.
6. Cost Reduction and Resource Optimization:
Cloud Computing: Cloud-based solutions enable banks to optimize their
infrastructure costs, as they can scale resources based on demand. Cloud
computing also enhances flexibility and agility in deploying new services
and applications.
Data Center Modernization: Upgrading data center infrastructure
contributes to improved reliability, faster processing speeds, and energy
efficiency, leading to cost savings in the long run.
7. Innovation and Product Development:
Fintech Collaborations: Banks are increasingly collaborating with fintech
companies to leverage innovative solutions. These collaborations enable
banks to introduce new products and services quickly, keeping up with
evolving customer expectations.
Digital Transformation Initiatives: Technology upgradation is often part of
broader digital transformation initiatives within banks. This involves
adopting emerging technologies, fostering a culture of innovation, and
embracing a customer-centric approach to business.
In summary, technology upgradation is a key enabler of progress in the banking sector. It
enhances efficiency, improves customer experiences, strengthens security measures,
and positions banks to adapt to the dynamic landscape of the financial industry. As
technology continues to evolve, banks that invest strategically in upgradation are better
positioned to stay competitive and meet the changing needs of their customers.
Trends in Technology Developments
Digital Banking Page 104
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
The ongoing evolution of technology and changing consumer expectations continued to
shape the way financial institutions provide services. Here are some key trends in
technology developments within the digital banking sector:
1. Digital Transformation Initiatives:
Financial institutions were actively investing in comprehensive digital
transformation strategies. This involved upgrading legacy systems,
adopting cloud technologies, and implementing advanced analytics to
enhance overall operational efficiency and customer experiences.
2. Open Banking and APIs:
Open Banking initiatives gained momentum, with banks opening up their
systems through secure Application Programming Interfaces (APIs). This
facilitated collaboration with third-party developers, enabling the creation of
innovative financial products and services.
3. Mobile-First Banking:
Mobile banking continued to be a focal point, with financial institutions
prioritizing the development of user-friendly and feature-rich mobile apps.
Enhanced mobile experiences included features like biometric
authentication, quick balance checks, and seamless fund transfers.
4. Contactless Payments and Digital Wallets:
The adoption of contactless payments and digital wallets increased, driven
by the growing popularity of mobile payment solutions. Users increasingly
preferred making transactions using their smartphones or wearable
devices.
5. AI-Powered Customer Service:
Artificial Intelligence (AI) and chatbots were integrated into digital banking
platforms to provide personalized customer service. AI-driven chatbots
Digital Banking Page 105
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
handled routine queries, offered financial advice, and assisted customers
with account-related tasks.
6. Personalization and Data Analytics:
Data analytics and machine learning were employed to analyze customer
behavior and preferences. This information was used to deliver
personalized banking experiences, recommend relevant financial products,
and tailor marketing efforts.
7. Real-Time Payments:
Real-time payment systems, facilitated by technologies like Immediate
Payment Service (IMPS) and Unified Payments Interface (UPI), gained
prominence. These systems enabled instantaneous fund transfers between
bank accounts.
8. Blockchain and Cryptocurrencies:
Blockchain technology continued to be explored for its potential in
enhancing security and transparency in digital transactions. Some financial
institutions were experimenting with blockchain for cross-border payments
and settlements.
9. Enhanced Security Measures:
Security remained a top priority, leading to the implementation of advanced
security measures. Multi-factor authentication, biometric identification, and
real-time fraud detection systems were integrated to safeguard digital
banking transactions.
10. Voice Banking:
Voice-activated banking services saw increased adoption. Users could
perform banking tasks, check balances, and initiate transactions using
voice commands through virtual assistants or smart speakers.
Digital Banking Page 106
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
11. Digital Identity Solutions:
Digital identity verification solutions became more sophisticated, enabling
secure and seamless onboarding of customers. Biometric identification,
document verification, and blockchain-based identity solutions were part of
this trend.
12. Regulatory Technology (RegTech):
The adoption of RegTech solutions increased to help banks comply with
regulatory requirements efficiently. Automated compliance monitoring, anti-
money laundering (AML) solutions, and data privacy tools were key
components.
13. Collaborations with Fintechs:
Banks collaborated with fintech companies to leverage their specialized
technologies. These partnerships facilitated faster innovation, allowing
banks to offer new services and stay competitive in the rapidly changing
digital landscape.
14. Remote Account Opening and Onboarding:
Digital banking platforms streamlined the account opening and onboarding
processes, allowing customers to complete these tasks remotely using
mobile apps or online interfaces.
15. Environmental, Social, and Governance (ESG) Integration:
Some digital banks incorporated ESG criteria into their offerings, reflecting
a broader industry trend toward sustainable and socially responsible
banking practices.
Role
Digital Banking Page 107
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
The role of digital banking encompasses a wide range of functions and capabilities,
transforming traditional banking services by leveraging digital technologies to meet the
evolving needs and preferences of customers. Here are key aspects of the role of digital
banking:
1. Customer Convenience:
24/7 Accessibility: Digital banking provides customers with round-the-
clock access to their accounts, enabling them to check balances, conduct
transactions, and access services at any time from anywhere with an
internet connection.
2. Online Account Management:
Account Monitoring: Customers can monitor their account activities, view
transaction history, and receive real-time updates on their financial status.
Transaction History: Access to detailed transaction records helps
customers track and manage their spending.
3. Digital Payments:
Fund Transfers: Digital banking allows customers to transfer funds
between accounts, both within the same bank and to external accounts.
Bill Payments: Paying bills, utilities, and making other financial
transactions can be conveniently done through digital banking platforms.
4. Mobile Banking:
On-the-Go Access: Mobile banking apps enable customers to manage
their finances using smartphones and tablets, providing flexibility and
mobility.
Mobile Payments: Mobile banking facilitates mobile payments, including
contactless payments and person-to-person (P2P) transfers.
Digital Banking Page 108
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
5. Multi-Channel Banking:
Omni-Channel Experience: Digital banking offers a seamless experience
across various channels, including online platforms, mobile apps, and other
digital touchpoints.
6. Digital Onboarding and KYC:
Account Opening: Customers can open new accounts and complete the
Know Your Customer (KYC) process digitally, reducing the need for
physical paperwork.
Remote Account Management: Manage account-related tasks without the
need to visit a physical branch.
7. Customer Service and Support:
Chat Support: Digital banking platforms often include chatbots and online
support to assist customers with queries, enhancing customer service.
Self-Service Features: Customers can resolve common issues, update
information, and request services through self-service options.
8. Security and Fraud Prevention:
Multi-Factor Authentication: Enhanced security features, such as two-
factor authentication (2FA), biometric authentication, and secure
encryption, help protect customer accounts.
Fraud Alerts: Real-time alerts and monitoring systems notify customers of
suspicious activities to prevent fraud.
9. Personalization and Data Analytics:
Customer Insights: Digital banking leverages data analytics to provide
personalized insights, recommendations, and offers based on customer
behavior.
Digital Banking Page 109
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Targeted Marketing: Banks can use customer data to deliver targeted
marketing messages and promotions.
10. Integration with Fintech Services:
API Integration: Digital banking platforms often integrate with third-party
fintech services, providing customers with access to a broader range of
financial products and services.
11. Emerging Technologies:
AI and Machine Learning: Digital banking may incorporate AI and
machine learning for fraud detection, credit scoring, and personalized
financial advice.
Blockchain: Some digital banking services explore the use of blockchain
for secure and transparent transactions.
12. Financial Inclusion:
Accessibility for All: Digital banking contributes to financial inclusion by
providing banking services to individuals who may not have easy access to
traditional branches.
13. Cost Efficiency:
Operational Efficiency: Digital banking helps financial institutions
streamline operations, reduce costs, and optimize resources.
14. Regulatory Compliance:
Automated Compliance: Digital banking systems are designed to comply
with regulatory requirements, facilitating automated compliance processes.
15. Evolving Services:
Robo-Advisors: Some digital banks offer robo-advisory services for
automated investment management.
Digital Banking Page 110
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Virtual Assistants: Integration of virtual assistants for customer queries
and assistance.
16. Cross-Border Transactions:
Global Access: Digital banking facilitates cross-border transactions and
international money transfers, enhancing global accessibility.
The role of digital banking is dynamic, continually evolving with technological
advancements and customer expectations. It plays a pivotal role in reshaping the
banking industry and enhancing the overall customer experience.
Uses of Technology Up gradation
Technology upgrades play a crucial role in various sectors, offering a range of benefits
that contribute to efficiency, innovation, and improved outcomes. Here are some key
uses and advantages of technology upgradation across different domains:
1. Enhanced Efficiency:
Automation of Processes: Technology upgrades often involve the
automation of routine and manual tasks, leading to increased operational
efficiency. This allows organizations to streamline workflows and allocate
resources more effectively.
Workflow Optimization: Advanced technologies help optimize internal
processes, reducing bottlenecks and accelerating the pace of tasks. This
results in quicker decision-making and improved overall organizational
efficiency.
2. Improved Productivity:
Digital Banking Page 111
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Faster Processing Speeds: Upgraded technology, including faster
processors and improved hardware, contributes to faster data processing
speeds. This is especially crucial for industries that rely on data-intensive
tasks.
Collaboration Tools: Modern collaboration tools and communication
platforms enable seamless interaction and information sharing among team
members, fostering a more productive work environment.
3. Cost Reduction:
Energy Efficiency: Upgrading to energy-efficient technologies, such as
servers and computing equipment, can lead to significant cost savings in
terms of electricity consumption and operational expenses.
Cloud Computing: Adopting cloud-based solutions allows organizations to
scale resources based on demand, reducing the need for large upfront
investments in physical infrastructure.
4. Innovation and Competitive Advantage:
Access to Cutting-Edge Solutions: Technology upgradation provides
access to the latest software, hardware, and tools, allowing organizations to
stay at the forefront of innovation and maintain a competitive edge in their
respective industries.
Rapid Prototyping: Advanced technologies enable rapid prototyping and
development cycles, facilitating the testing and implementation of new
ideas and products more efficiently.
5. Enhanced Customer Experience:
Personalization: Upgraded technologies, including data analytics and
artificial intelligence, enable organizations to analyze customer behavior
and preferences. This information can be used to personalize products,
services, and communication, enhancing the overall customer experience.
Digital Banking Page 112
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Multichannel Engagement: Improved digital capabilities support
multichannel engagement, allowing organizations to interact with customers
through various touchpoints such as websites, mobile apps, social media,
and more.
6. Security and Risk Management:
Advanced Security Measures: Technology upgradation often involves the
implementation of advanced cybersecurity measures, such as encryption,
biometric authentication, and real-time monitoring, to protect against
evolving threats.
Data Backup and Recovery: Upgraded technologies enhance data
backup and recovery capabilities, reducing the risk of data loss and
ensuring business continuity in the event of a disruption.
7. Regulatory Compliance:
Automated Compliance Systems: Upgraded systems assist
organizations in adhering to evolving regulatory requirements. Automated
compliance systems help monitor transactions, generate reports, and
ensure adherence to industry-specific standards.
Audit Trails and Documentation: Advanced technologies enable the
creation of detailed audit trails and documentation, facilitating compliance
audits and regulatory reporting.
8. Flexibility and Scalability:
Cloud-Based Solutions: Adopting cloud computing provides organizations
with the flexibility to scale resources up or down based on changing
business requirements. This scalability supports growth without the need
for significant upfront investments.
Digital Banking Page 113
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Agile Development Practices: Upgraded technologies often support agile
development practices, allowing organizations to adapt quickly to changing
market conditions and customer needs.
9. Sustainability and Environmental Impact:
Green Technologies: Upgraded technologies often include more energy-
efficient and environmentally friendly solutions, contributing to sustainability
efforts and reducing the overall environmental impact of operations.
Paperless Processes: Digital transformation initiatives often involve the
reduction of paper usage through the adoption of electronic documentation,
contributing to eco-friendly practices.
10. Employee Satisfaction and Collaboration:
Modern Collaboration Tools: Upgraded technologies support modern
collaboration tools, fostering a collaborative and flexible work environment.
This can enhance employee satisfaction and contribute to a positive
organizational culture.
Remote Work Capabilities: Advanced technologies enable remote work
capabilities, allowing employees to work from anywhere, promoting work-
life balance, and attracting a diverse talent pool.
In summary, technology upgradation is a strategic investment that brings about positive
changes across various aspects of an organization. Whether in terms of efficiency,
innovation, or customer experience, staying current with technology trends is essential
for organizations seeking sustained growth and competitiveness.
Global Trends
Here are some notable global trends in digital banking:
1. Contactless Payments and Digital Wallets:
Digital Banking Page 114
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
The adoption of contactless payments and digital wallets continued to rise
globally. Consumers preferred the convenience and security of making
payments using mobile devices or contactless cards.
2. Open Banking and API Integration:
Open Banking initiatives gained traction worldwide, with financial
institutions opening up their systems through secure APIs. This trend
fostered collaboration between banks and third-party developers, leading to
the creation of innovative financial products and services.
3. Neobanks and Challenger Banks:
Neobanks, or digital-only banks, and challenger banks continued to disrupt
traditional banking models. These fintech-driven institutions focused on
providing user-friendly, mobile-centric banking experiences with features
such as budgeting tools and real-time transaction notifications.
4. AI-Powered Personalization:
Artificial Intelligence (AI) and machine learning were increasingly used to
personalize banking experiences. AI-driven insights helped financial
institutions offer tailored product recommendations, personalized customer
service, and targeted marketing campaigns.
5. Enhanced Security Measures:
With the growing prevalence of cyber threats, there was a heightened
emphasis on advanced security measures in digital banking. Biometric
authentication, multi-factor authentication, and real-time fraud detection
became standard practices.
6. Robotic Process Automation (RPA):
Robotic Process Automation (RPA) found applications in automating
routine tasks and processes within digital banking operations. RPA
Digital Banking Page 115
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
contributed to increased efficiency, reduced errors, and faster transaction
processing.
7. Cryptocurrency and Blockchain Integration:
The exploration of cryptocurrencies and blockchain technology gained
momentum. Some banks and financial institutions began experimenting
with blockchain for cross-border payments, while interest in central bank
digital currencies (CBDCs) increased.
8. Digital Identity Solutions:
Digital identity verification solutions became integral to improving the
onboarding process for customers. Biometric identification, document
verification, and blockchain-based identity solutions were used to enhance
security and streamline account opening.
9. Real-Time Payments and Instant Settlements:
Real-time payment systems and instant settlement solutions were deployed
globally. Immediate Payment Service (IMPS), Faster Payments, and other
real-time payment networks facilitated instantaneous fund transfers
between accounts.
10. Voice and Conversational Banking:
Voice-activated technologies gained prominence in digital banking.
Conversational banking through virtual assistants allowed users to check
balances, transfer funds, and perform other banking tasks using voice
commands.
11. Sustainable Banking Practices:
Environmental, Social, and Governance (ESG) considerations became
increasingly important. Some digital banks incorporated sustainable and
Digital Banking Page 116
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
socially responsible banking practices, aligning their services with broader
environmental and social goals.
12. Cross-Border Collaboration and Partnerships:
Digital banks and fintech firms engaged in cross-border collaborations and
partnerships. These alliances aimed to expand market reach, share
expertise, and offer customers a broader range of financial services.
13. Financial Wellness and Education:
Digital banks focused on providing financial wellness tools and educational
resources to their customers. Features such as budgeting assistance,
savings goals, and educational content aimed to empower users in
managing their finances effectively.
14. Regulatory Technology (RegTech):
RegTech solutions gained prominence in assisting banks with regulatory
compliance. Automated compliance monitoring, anti-money laundering
(AML) tools, and data privacy solutions helped financial institutions
navigate complex regulatory landscapes.
15. Remote Customer Onboarding:
Enhanced by digital identity solutions, remote customer onboarding gained
importance. Users could open accounts and access banking services
without the need for physical visits to branches.
Impact of IT on Banks
Information Technology (IT) has had a profound impact on the banking sector,
transforming the way financial institutions operate, interact with customers, and deliver
services. Here are key ways in which IT has influenced and continues to impact banks:
Digital Banking Page 117
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
1. Automation of Processes:
IT has enabled the automation of numerous banking processes, from
transaction processing to account management. This has led to increased
operational efficiency, reduced errors, and faster service delivery.
2. Enhanced Customer Experience:
Digital banking platforms, enabled by IT, provide customers with convenient
and user-friendly interfaces. Online and mobile banking services allow
customers to access their accounts, make transactions, and manage
finances anytime, anywhere.
3. Internet Banking:
The advent of the internet brought about internet banking, allowing
customers to perform a wide range of banking activities through secure
online platforms. This includes checking account balances, transferring
funds, and paying bills.
4. ATMs (Automated Teller Machines):
IT played a pivotal role in the development and proliferation of ATMs.
These machines allow customers to perform basic banking transactions,
such as cash withdrawals, deposits, and balance inquiries, outside of
traditional banking hours.
5. Mobile Banking Apps:
Mobile banking apps, powered by IT, have become integral to the banking
experience. Customers can manage their accounts, make payments, and
even apply for financial products using smartphones and tablets.
6. Online Payment Systems:
IT has facilitated the development of various online payment systems,
including electronic funds transfer (EFT), digital wallets, and real-time
Digital Banking Page 118
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
payment systems. These systems have revolutionized the way individuals
and businesses conduct financial transactions.
7. Data Analytics and Business Intelligence:
IT enables banks to collect, analyze, and leverage vast amounts of data.
Advanced analytics and business intelligence tools help banks gain insights
into customer behavior, preferences, and market trends, allowing for
informed decision-making.
8. Cybersecurity Measures:
The rise of digital banking has brought increased attention to cybersecurity.
IT plays a critical role in implementing robust security measures, including
encryption, multi-factor authentication, and real-time monitoring, to
safeguard customer data and prevent fraud.
9. Core Banking Systems:
IT is at the core of modern banking systems. Core banking solutions
integrate various banking functions, such as customer accounts,
transactions, and loan processing, into a centralized system, streamlining
operations and improving data accuracy.
10. Blockchain Technology:
Blockchain, a decentralized and distributed ledger technology, is explored
by banks for its potential in enhancing security, transparency, and
efficiency. Some banks are experimenting with blockchain for cross-border
payments, settlements, and smart contracts.
11. Regulatory Compliance (RegTech):
IT solutions, collectively known as Regulatory Technology (RegTech), help
banks comply with regulatory requirements. Automated systems assist in
Digital Banking Page 119
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
monitoring transactions, reporting suspicious activities, and ensuring
adherence to industry-specific standards.
12. Artificial Intelligence and Machine Learning:
AI and machine learning applications in banking range from chatbots for
customer service to predictive analytics for risk management. These
technologies contribute to personalized customer experiences and more
efficient decision-making processes.
13. Remote Banking Services:
The COVID-19 pandemic underscored the importance of remote banking
services. IT infrastructure allowed banks to continue operations, support
remote work, and maintain customer service during lockdowns.
14. Financial Inclusion:
IT has played a role in advancing financial inclusion. Digital banking
services, including mobile money and agent banking, extend financial
services to unbanked and underbanked populations in remote areas.
15. Cloud Computing:
Cloud computing technologies have become prevalent in the banking
sector. Cloud solutions offer scalability, flexibility, and cost efficiency,
allowing banks to optimize their IT infrastructure.
In summary, IT has been a driving force behind the evolution of banking, enabling
institutions to adapt to changing customer expectations, improve operational efficiency,
and navigate complex regulatory environments. The ongoing integration of emerging
technologies ensures that the impact of IT on banks will continue to shape the industry's
future.
Preventive Vigilance in Electronic Banking Phishing
Digital Banking Page 120
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Preventive vigilance is crucial in electronic banking to mitigate the risks associated with
phishing attacks. Phishing is a fraudulent attempt to obtain sensitive information, such as
usernames, passwords, and financial details, by posing as a trustworthy entity in
electronic communication. Here are key preventive measures to enhance vigilance and
protect against phishing in electronic banking:
1. Customer Education and Awareness:
Educate customers about phishing risks, common tactics used by
attackers, and the importance of verifying the authenticity of electronic
communications. Regularly communicate security best practices and
caution against sharing sensitive information online.
2. Multi-Factor Authentication (MFA):
Implement multi-factor authentication for online banking transactions. MFA
adds an extra layer of security by requiring users to provide multiple forms
of identification, such as passwords, security tokens, or biometric
verification.
3. Secure Communication Channels:
Encourage the use of secure communication channels for sensitive
transactions. Ensure that websites use HTTPS (Secure Hypertext Transfer
Protocol) to encrypt data in transit, protecting it from interception by
malicious actors.
4. Regular Security Updates:
Keep banking systems and software up to date with the latest security
patches. Regularly update antivirus software, firewalls, and other security
measures to protect against known vulnerabilities.
5. Email Security:
Digital Banking Page 121
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Implement robust email security measures to detect and filter phishing
emails. Use email authentication protocols like DMARC (Domain-based
Message Authentication, Reporting, and Conformance) to verify the
authenticity of email senders.
6. Anti-Phishing Technologies:
Utilize anti-phishing technologies that can analyze and identify phishing
attempts in real-time. These technologies may include email filtering, web
filtering, and threat intelligence tools.
7. Transaction Monitoring:
Implement real-time transaction monitoring systems to detect unusual or
suspicious activities. Automated systems can flag potentially fraudulent
transactions for further investigation.
8. Customer Verification Procedures:
Establish secure customer verification procedures for high-value
transactions or changes to account details. This may include additional
authentication steps or verification through multiple channels.
9. Security Training for Staff:
Conduct regular security training for bank staff to raise awareness about
phishing threats. Staff members should be vigilant in recognizing and
reporting phishing attempts, both internally and externally.
10. Phishing Simulations:
Conduct phishing simulation exercises to test and reinforce the awareness
of employees and customers. These simulations can help identify areas
that require additional training and highlight the importance of staying
vigilant.
11. Incident Response Plan:
Digital Banking Page 122
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Develop and regularly update an incident response plan that outlines the
steps to be taken in the event of a phishing attack. This includes
communication protocols, incident reporting procedures, and coordination
with law enforcement.
12. Customer Reporting Mechanism:
Provide customers with a straightforward mechanism to report suspicious
emails, messages, or activities. Establish a dedicated customer support
channel for reporting phishing incidents and responding promptly to
customer concerns.
13. Legal and Regulatory Compliance:
Ensure compliance with relevant laws and regulations related to electronic
banking security. Stay informed about legal requirements for reporting
security incidents and protecting customer information.
14. Collaboration with Industry Partners:
Collaborate with industry partners, law enforcement agencies, and
cybersecurity organizations to share threat intelligence and best practices.
Participate in forums that focus on combating electronic banking fraud and
phishing.
15. Continuous Monitoring and Evaluation:
Regularly monitor and evaluate the effectiveness of preventive measures.
Stay informed about emerging phishing tactics and adjust security
measures accordingly to address new threats.
By implementing a comprehensive and proactive approach to preventive vigilance, banks
can significantly reduce the risk of falling victim to phishing attacks and protect the
integrity of electronic banking systems. Regular updates and collaboration with
customers and industry stakeholders are key components of a robust defense against
phishing threats.
Digital Banking Page 123
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Customer education
Customer education is a critical component of ensuring a secure and trustworthy banking
environment, particularly in the context of electronic banking where cyber threats, fraud,
and scams are prevalent. Educating customers helps empower them to make informed
decisions, recognize potential risks, and adopt secure practices. Here are key aspects of
customer education in the banking sector:
1. Phishing Awareness:
Educate customers about phishing attacks, which often involve fraudulent
attempts to obtain sensitive information through deceptive emails,
messages, or websites. Provide guidance on recognizing phishing attempts
and the importance of verifying the authenticity of communications.
2. Secure Password Practices:
Promote the use of strong, unique passwords for online banking accounts.
Encourage customers to regularly update their passwords and avoid using
easily guessable information, such as birthdays or names.
3. Multi-Factor Authentication (MFA):
Highlight the importance of enabling multi-factor authentication (MFA) for
added security. Explain how MFA provides an additional layer of protection
by requiring users to verify their identity through multiple means.
4. Safe Online and Mobile Banking Practices:
Provide guidelines for safe online and mobile banking, including the use of
secure Wi-Fi connections, logging out after sessions, and being cautious
about accessing banking services on public computers or devices.
5. Email Security and Scams:
Digital Banking Page 124
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Educate customers about email security and common scams. Advise them
to be skeptical of unexpected emails, especially those requesting sensitive
information or urgent actions. Explain the importance of verifying the
legitimacy of email communications.
6. Secure Communication Channels:
Emphasize the use of secure communication channels, such as encrypted
websites (HTTPS), for accessing online banking services. Remind
customers to look for secure indicators in the browser address bar.
7. Protecting Personal Information:
Instruct customers on the importance of safeguarding personal and
financial information. Remind them not to share sensitive details like
account numbers, PINs, or passwords with anyone and to be cautious
about sharing information on social media.
8. Mobile App Security:
Guide customers on securing their mobile banking apps. Encourage them
to use official app stores for downloads, enable app lock features, and keep
their devices and apps updated with the latest security patches.
9. Transaction Monitoring:
Make customers aware of the importance of monitoring their account
transactions regularly. Prompt them to report any unauthorized or
suspicious activities promptly to the bank.
10. Social Engineering Awareness:
Educate customers about social engineering tactics used by fraudsters to
manipulate individuals into divulging sensitive information. Provide
examples of common social engineering techniques and advise on how to
stay vigilant.
Digital Banking Page 125
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
11. Financial Scams and Fraud Prevention:
Inform customers about various financial scams and fraud schemes, such
as investment fraud, lottery scams, or identity theft. Empower them to
recognize red flags and report any suspicious activities.
12. Regular Security Updates:
Encourage customers to keep their devices and software up to date with
the latest security patches. Regular updates help protect against
vulnerabilities that could be exploited by cybercriminals.
13. Customer Support Awareness:
Make customers aware of the official channels for seeking customer
support. Emphasize that banks will never ask for sensitive information,
such as passwords or PINs, through unsolicited calls or messages.
14. Reporting Mechanisms:
Clearly communicate reporting mechanisms for suspected fraud or security
incidents. Provide contact information for reporting incidents to the bank's
customer support and relevant authorities.
15. Continual Education and Updates:
Establish ongoing educational initiatives to keep customers informed about
emerging threats, new security features, and best practices. Regularly
update educational materials and communicate with customers through
various channels.
Effective customer education is a collaborative effort between banks, financial
institutions, and customers themselves. By fostering a culture of cybersecurity
awareness, banks can empower customers to play an active role in protecting their
financial information and contribute to a safer digital banking environment.
Digital Banking Page 126
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Safety checks
Safety checks in the context of banking and electronic transactions involve various
measures and procedures to ensure the security of customer accounts, transactions, and
sensitive information. These checks are implemented to protect against fraud,
unauthorized access, and other security threats. Here are some key safety checks
commonly employed in the banking sector:
1. Multi-Factor Authentication (MFA):
Implement multi-factor authentication to add an extra layer of security.
Require users to provide multiple forms of identification, such as
passwords, security tokens, or biometric verification, to access their
accounts or perform sensitive transactions.
2. Transaction Monitoring:
Employ real-time transaction monitoring systems to detect unusual or
suspicious activities. Automated monitoring can flag transactions that
deviate from a customer's typical behavior, helping identify potential
fraudulent activities.
3. Fraud Detection Algorithms:
Utilize advanced fraud detection algorithms that analyze transaction
patterns, customer behavior, and other factors to identify anomalies or
patterns indicative of fraudulent activities.
4. Velocity Checks:
Implement velocity checks to monitor the frequency and volume of
transactions. Unusual spikes or a high number of transactions within a
short time frame may signal fraudulent activity.
5. Geographical Checks:
Digital Banking Page 127
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Monitor the geographical locations associated with transactions. Unusual or
unexpected changes in transaction locations, especially those from
different regions or countries, may trigger alerts for further investigation.
6. Device Recognition:
Employ device recognition technology to identify and authenticate the
devices used by customers for banking activities. This helps detect
unauthorized access attempts from unfamiliar devices.
7. Biometric Verification:
Implement biometric verification methods, such as fingerprint or facial
recognition, to enhance the security of authentication processes. Biometrics
add an additional layer of identity verification.
8. Secure Communication Channels:
Ensure that all communication channels between customers and the bank
are secure. This includes using encrypted connections (HTTPS) for online
banking websites and secure messaging protocols.
9. User Behavior Analytics (UBA):
Utilize user behavior analytics to analyze patterns in user interactions with
banking systems. UBA can help identify deviations from normal behavior
that may indicate a compromised account.
10. Alerts and Notifications:
Enable alerts and notifications for customers to receive real-time updates
on their account activities. This allows customers to quickly identify and
report any unauthorized transactions.
11. Customer Verification Procedures:
Digital Banking Page 128
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Implement secure customer verification procedures, especially for high-
value transactions or changes to account details. This may involve
additional authentication steps or verification through multiple channels.
12. Two-Factor Authorization for Transactions:
Require two-factor authorization for certain types of transactions, especially
those involving fund transfers or changes to account settings. This ensures
an additional layer of confirmation before sensitive actions are executed.
13. Regular Security Audits:
Conduct regular security audits and assessments to identify vulnerabilities
in the banking system. Regular audits help ensure that security measures
are up to date and effective.
14. Legal and Regulatory Compliance:
Ensure compliance with legal and regulatory requirements related to safety
and security in banking operations. Stay informed about industry standards
and best practices.
15. Continuous Improvement:
Establish a continuous improvement process to adapt safety checks to
evolving security threats. Regularly update security measures based on the
latest threat intelligence and technological advancements.
Implementing a comprehensive set of safety checks helps banks create a secure
environment for electronic transactions, protecting both customers and the integrity of the
financial system. Regular training for staff and customers on security best practices is
essential to maintaining a proactive and vigilant approach to safety in banking
operations.
Precautions
Digital Banking Page 129
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Precautions in the context of banking and electronic transactions involve a set of
measures and practices to safeguard against various risks, including fraud, identity theft,
and unauthorized access. Both financial institutions and customers need to take
precautions to ensure the security and integrity of electronic banking transactions. Here
are essential precautions for banks and customers:
Precautions for Banks:
1. Robust Security Infrastructure:
Invest in and maintain a robust security infrastructure that includes
firewalls, intrusion detection systems, and encryption technologies to
protect against cyber threats.
2. Regular Security Audits:
Conduct regular security audits and vulnerability assessments to identify
and address potential weaknesses in the banking system.
3. Employee Training:
Provide comprehensive cybersecurity training for bank employees to
ensure awareness of security best practices and to recognize and respond
to potential threats.
4. Incident Response Plan:
Develop and regularly update an incident response plan to effectively
manage and mitigate the impact of security incidents or breaches.
5. Regulatory Compliance:
Stay compliant with industry regulations and standards, implementing
measures to protect customer data and maintain the confidentiality of
financial transactions.
6. Collaboration with Law Enforcement:
Digital Banking Page 130
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Collaborate with law enforcement agencies and cybersecurity organizations
to share threat intelligence and coordinate efforts to combat cybercrime.
7. Secure Authentication Methods:
Implement secure authentication methods, including multi-factor
authentication (MFA) and biometric verification, to enhance the security of
customer accounts.
8. Transaction Monitoring Systems:
Deploy advanced transaction monitoring systems to detect and prevent
fraudulent activities in real time.
9. Regular Software Updates:
Ensure that all software and systems are regularly updated with the latest
security patches to address vulnerabilities and protect against known
exploits.
10. Customer Communication:
Regularly communicate with customers about security measures, potential
threats, and best practices to ensure they are informed and vigilant.
Precautions for Customers:
1. Secure Passwords:
Create strong, unique passwords for online banking accounts, and avoid
using easily guessable information such as birthdays or names.
2. Multi-Factor Authentication (MFA):
Enable MFA for online banking accounts to add an extra layer of security to
the authentication process.
3. Secure Wi-Fi Connection:
Digital Banking Page 131
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Use secure Wi-Fi connections for online banking activities, especially when
accessing accounts from public places.
4. Phishing Awareness:
Be cautious of phishing attempts and verify the authenticity of emails,
messages, or websites before providing any sensitive information.
5. Regular Account Monitoring:
Regularly monitor bank account transactions and report any unauthorized
or suspicious activities to the bank immediately.
6. Update Contact Information:
Keep contact information up to date with the bank to ensure timely
notification of any suspicious activities or account changes.
7. Secure Devices:
Ensure that devices used for online banking, including smartphones and
computers, are protected with updated antivirus software and secure
passwords.
8. Safe Storage of Credentials:
Avoid storing passwords or sensitive information on devices in an easily
accessible manner. Use secure password manager tools if necessary.
9. Regular Software Updates:
Keep devices and software updated with the latest security patches to
address vulnerabilities and enhance overall security.
10. Educate Yourself:
Digital Banking Page 132
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Stay informed about common cybersecurity threats and best practices for
online security. Regularly review and adhere to the bank's security
guidelines.
11. Two-Factor Authorization:
Enable two-factor authorization for sensitive transactions or account
changes, if offered by the bank.
12. Avoid Public Computers:
Avoid accessing online banking accounts from public computers or shared
devices to reduce the risk of unauthorized access.
13. Use Official Banking Apps:
Download and use official banking apps from authorized app stores to
ensure the legitimacy of the application.
14. Regularly Review Statements:
Regularly review bank statements and account summaries to identify any
discrepancies or unauthorized transactions.
15. Report Lost or Stolen Devices:
Immediately report lost or stolen devices to the bank to prevent
unauthorized access to banking information.
By taking these precautions, both banks and customers can contribute to creating a
secure electronic banking environment, protecting against potential threats and ensuring
the confidentiality and integrity of financial transactions.
UNIT V
Security Considerations Risk Concern Areas; Types of Threats; Control Mechanism;
Digital Banking Page 133
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Computer Audit; IS Security; IS Audit; Evaluation Requirements Overview of IT Act
Gopalakrishna- Committee Recommendations
Security Considerations Risk Concern Areas
Security considerations and risk concerns are paramount in the realm of digital banking
due to the sensitive nature of financial transactions and the increasing prevalence of
cyber threats. Here are key areas of security consideration and associated risk concerns
in digital banking:
1. Data Security:
Risk Concerns:
Unauthorized Access: Hackers attempting to gain unauthorized
access to sensitive customer data.
Data Breaches: Theft or compromise of confidential customer
information.
Security Measures:
Encryption: Implement end-to-end encryption to protect data in
transit and at rest.
Access Controls: Strict access controls to limit data access based
on roles and responsibilities.
2. Authentication and Authorization:
Risk Concerns:
Identity Theft: Fraudsters impersonating legitimate users.
Unauthorized Transactions: Malicious actors gaining access to
user accounts.
Digital Banking Page 134
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Security Measures:
Multi-Factor Authentication (MFA): Combine multiple
authentication methods for enhanced security.
Biometric Verification: Use fingerprints, facial recognition, or other
biometric data for identification.
3. Phishing and Social Engineering:
Risk Concerns:
Fraudulent Activities: Users tricked into revealing sensitive
information.
Compromised Credentials: Theft of login credentials through
deceptive means.
Security Measures:
User Education: Conduct regular training to educate users on
recognizing phishing attempts.
Email Filtering: Implement email filtering solutions to detect and
block phishing emails.
4. Mobile Banking Security:
Risk Concerns:
Malware: Installation of malicious software on mobile devices.
App Vulnerabilities: Security flaws in mobile banking applications.
Security Measures:
App Security: Regularly update and secure mobile banking apps.
Digital Banking Page 135
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Device Security Recommendations: Advise users on securing
their mobile devices.
5. Transaction Security:
Risk Concerns:
Unauthorized Transactions: Illicit transactions initiated by
cybercriminals.
Man-in-the-Middle Attacks: Interception of communication between
the user and the bank.
Security Measures:
SSL/TLS Protocols: Use secure communication protocols to
encrypt transaction data.
Transaction Monitoring: Employ real-time monitoring to detect and
prevent fraudulent transactions.
6. Cloud Security:
Risk Concerns:
Data Breaches: Compromise of data stored in cloud environments.
Lack of Control: Limited control over the underlying infrastructure.
Security Measures:
Encryption: Encrypt data before storing it in the cloud.
Access Controls: Implement strong access controls and regular
security audits.
7. Endpoint Security:
Risk Concerns:
Digital Banking Page 136
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Compromised Devices: Infection of user devices with malware.
Data Theft: Unauthorized access to sensitive data on endpoints.
Security Measures:
Endpoint Protection: Use antivirus software and endpoint
protection solutions.
Regular Updates: Ensure devices are updated with the latest
security patches.
8. Insider Threats:
Risk Concerns:
Unauthorized Access: Employees accessing or sharing sensitive
information.
Data Leaks: Intentional or unintentional release of confidential data.
Security Measures:
Employee Training: Educate staff on security policies and the
consequences of insider threats.
Access Controls: Limit access based on job roles and implement
monitoring.
9. Regulatory Compliance:
Risk Concerns:
Legal Consequences: Fines and legal actions due to non-
compliance.
Reputational Damage: Loss of trust from customers and
stakeholders.
Digital Banking Page 137
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Security Measures:
Regular Audits: Conduct regular audits to ensure compliance with
industry regulations.
Adherence to Standards: Follow established security standards
and guidelines.
10. Third-Party Security:
Risk Concerns:
Security Flaws: Vulnerabilities in third-party services or
applications.
Data Breaches: Compromise of customer data held by third-party
providers.
Security Measures:
Vendor Risk Assessments: Evaluate the security measures of
third-party vendors.
Contractual Obligations: Ensure vendors adhere to security
standards through contracts.
These detailed security considerations and measures highlight the complex landscape of
digital banking security. It's crucial for financial institutions to adopt a layered and
proactive approach to mitigate risks and protect the confidentiality, integrity, and
availability of customer data and transactions.
Types of Threats
In the context of digital banking, various types of threats pose risks to the security and
integrity of financial systems, customer data, and transactions. These threats can come
from a range of sources, including cybercriminals, malicious actors, and even
unintentional internal actions. Here are some common types of threats in digital banking:
Digital Banking Page 138
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
1. Phishing:
Description: Phishing involves fraudulent attempts to obtain sensitive
information, such as usernames, passwords, and financial details, by
posing as a trustworthy entity.
Risk: Compromised credentials, unauthorized access to accounts.
2. Malware:
Description: Malicious software, including viruses, trojans, and
ransomware, designed to disrupt, damage, or gain unauthorized access to
computer systems.
Risk: Compromised systems, data breaches, financial losses.
3. Man-in-the-Middle (MitM) Attacks:
Description: Attackers intercept and possibly alter communication
between two parties without their knowledge.
Risk: Unauthorized access to sensitive information, transaction tampering.
4. Distributed Denial of Service (DDoS) Attacks:
Description: Overwhelming a system, network, or website with a flood of
traffic to disrupt its normal functioning.
Risk: Service disruptions, downtime, potential financial losses.
5. Insider Threats:
Description: Threats originating from within an organization, either
unintentional (negligence) or intentional (malicious actions) by employees
or trusted individuals.
Risk: Unauthorized access, data leaks, internal fraud.
Digital Banking Page 139
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
6. Data Breaches:
Description: Unauthorized access and exposure of sensitive data, often
resulting in the compromise of customer information.
Risk: Loss of customer trust, financial and reputational damage.
7. Identity Theft:
Description: Fraudulently obtaining and using someone's personal
information, such as social security numbers or account details.
Risk: Unauthorized transactions, financial losses for individuals.
8. Brute Force Attacks:
Description: Repeated, rapid attempts to guess passwords or encryption
keys to gain unauthorized access to an account or system.
Risk: Compromised credentials, unauthorized access.
9. Social Engineering:
Description: Manipulating individuals to disclose sensitive information
through psychological manipulation and deception.
Risk: Compromised credentials, unauthorized access.
10. SQL Injection:
Description: Exploiting vulnerabilities in web applications by injecting
malicious SQL code to gain access to a database.
Risk: Unauthorized access to and manipulation of databases.
11. Cross-Site Scripting (XSS):
Description: Injecting malicious scripts into web pages that are viewed by
other users, potentially leading to the theft of sensitive information.
Digital Banking Page 140
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Risk: Compromised user accounts, unauthorized access.
12. Payment Card Skimming:
Description: Illegally capturing payment card information during legitimate
transactions.
Risk: Unauthorized use of payment card details, financial losses.
13. Advanced Persistent Threats (APTs):
Description: Sophisticated and prolonged cyber attacks that target specific
entities to gain unauthorized access and maintain a presence within a
network.
Risk: Long-term data breaches, espionage.
14. Zero-Day Exploits:
Description: Attacks that target undisclosed vulnerabilities in software or
hardware before a fix or patch is available.
Risk: Unauthorized access, potential widespread impact.
15. Cryptojacking:
Description: Illegitimate use of a computer's processing power to mine
cryptocurrencies without the owner's consent.
Risk: Performance degradation, potential financial losses.
Digital banking institutions employ a variety of security measures, including encryption,
firewalls, multi-factor authentication, and regular security audits, to mitigate these threats
and ensure the safety of customer information and financial transactions. Staying
informed about emerging threats and implementing proactive security measures is
essential in the dynamic landscape of digital banking.
Digital Banking Page 141
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Control Mechanism
Control mechanisms in the context of digital banking refer to measures and safeguards
put in place to manage, monitor, and mitigate risks associated with financial transactions,
customer data, and the overall security of banking operations. These control
mechanisms help ensure compliance with regulatory standards, protect against fraud
and cyber threats, and maintain the confidentiality and integrity of sensitive information.
Here are key control mechanisms commonly employed in digital banking:
1. Access Controls:
Description: Limiting access to systems, applications, and data based on
user roles and responsibilities.
Purpose: Prevent unauthorized access and restrict privileges to only those
necessary for job functions.
2. Encryption:
Description: Converting sensitive data into a secure, unreadable format
using encryption algorithms.
Purpose: Protect data confidentiality during transmission and storage,
ensuring that only authorized parties can decipher the information.
3. Multi-Factor Authentication (MFA):
Description: Requiring users to provide multiple forms of identification
before granting access.
Purpose: Enhance authentication security by adding an extra layer beyond
passwords.
4. Firewalls:
Description: Network security devices that monitor and control incoming
and outgoing network traffic.
Digital Banking Page 142
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Purpose: Prevent unauthorized access and protect against malicious
activities, such as DDoS attacks.
5. Intrusion Detection and Prevention Systems (IDPS):
Description: Monitoring network or system activities to identify and
respond to potential security threats.
Purpose: Detect and prevent unauthorized access, malware, or other
malicious activities.
6. User Activity Monitoring:
Description: Tracking and logging user activities within the banking
system.
Purpose: Monitor for suspicious behavior, unauthorized access, or policy
violations.
7. Regular Security Audits:
Description: Periodic assessments of the security infrastructure, policies,
and procedures.
Purpose: Identify vulnerabilities, ensure compliance, and address security
gaps through regular evaluations.
8. Incident Response Plan:
Description: A documented plan outlining procedures to follow in the event
of a security incident.
Purpose: Efficiently respond to and mitigate the impact of security
breaches or unexpected events.
9. Vendor Risk Management:
Digital Banking Page 143
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Description: Evaluating and managing the security risks associated with
third-party vendors and service providers.
Purpose: Ensure that external partners adhere to security standards and
do not introduce vulnerabilities.
10. Data Loss Prevention (DLP):
Description: Implementing policies and tools to prevent unauthorized
access, use, or disclosure of sensitive data.
Purpose: Safeguard customer information and prevent data breaches.
11. Patch Management:
Description: Regularly applying updates and patches to software and
systems to address known vulnerabilities.
Purpose: Close security gaps and protect against exploits that target
outdated software.
12. Biometric Authentication:
Description: Using unique physical or behavioral characteristics
(fingerprint, retina scan) for user identification.
Purpose: Enhance authentication security with a more robust and
personalized approach.
13. Network Segmentation:
Description: Dividing a network into segments to limit the potential impact
of security incidents.
Purpose: Contain and isolate security breaches to specific network
segments.
14. Security Awareness Training:
Digital Banking Page 144
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Description: Educating employees and customers about security best
practices and potential threats.
Purpose: Mitigate risks associated with human error, social engineering,
and phishing attacks.
15. Endpoint Protection:
Description: Implementing security measures on end-user devices to
safeguard against malware and other threats.
Purpose: Protect devices used for banking activities from compromise.
16. Regular Security Updates:
Description: Keeping software, applications, and systems up to date with
the latest security patches.
Purpose: Address known vulnerabilities and reduce the risk of exploitation.
17. Penetration Testing:
Description: Simulating cyber attacks to identify and address
vulnerabilities in a controlled environment.
Purpose: Assess the effectiveness of security measures and proactively
identify weaknesses.
18. Secure Development Practices:
Description: Integrating security measures into the software development
lifecycle.
Purpose: Minimize vulnerabilities in banking applications and systems from
the outset.
Implementing a combination of these control mechanisms forms a comprehensive
strategy to protect digital banking systems, customer information, and financial
Digital Banking Page 145
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
transactions from potential threats and risks. Regular updates, training, and adaptation to
emerging security challenges are crucial for maintaining a robust control environment in
the dynamic landscape of digital banking.
Computer Audit
A computer audit, also known as an IT audit or information systems audit, is a systematic
examination of an organization's information technology infrastructure, systems, policies,
and procedures. The primary goal of a computer audit is to assess the effectiveness,
efficiency, and security of an organization's IT environment. Here are key aspects of a
computer audit:
1. Scope and Objectives:
Scope: Define the boundaries of the audit, including the systems,
networks, and processes to be examined.
Objectives: Clearly outline the goals of the audit, such as assessing
compliance, identifying risks, or evaluating controls.
2. Compliance Assessment:
Regulatory Compliance: Ensure that the organization adheres to relevant
laws, regulations, and industry standards.
Policy Compliance: Assess compliance with internal IT policies and
procedures.
3. Security Assessment:
Network Security: Evaluate the effectiveness of firewalls, intrusion
detection systems, and other security measures.
Access Controls: Review user access permissions, authentication
mechanisms, and authorization processes.
Digital Banking Page 146
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Vulnerability Assessment: Identify and address potential vulnerabilities in
systems and applications.
4. Data Protection and Privacy:
Data Encryption: Assess the use of encryption to protect sensitive data.
Data Handling: Ensure that proper procedures are in place for the
collection, storage, and transmission of data.
Privacy Compliance: Evaluate adherence to privacy regulations and
policies.
5. Incident Response and Disaster Recovery:
Incident Response Plan: Assess the organization's ability to detect,
respond to, and recover from security incidents.
Disaster Recovery Plan: Evaluate the effectiveness of plans for data
backup, system recovery, and business continuity.
6. System Development and Change Management:
Change Control Procedures: Review processes for implementing
changes to IT systems.
System Development Life Cycle (SDLC): Assess adherence to secure
development practices and SDLC procedures.
7. IT Governance:
Management Oversight: Evaluate the effectiveness of IT governance and
management oversight.
IT Strategy Alignment: Assess how IT initiatives align with the
organization's overall business strategy.
8. Infrastructure and Network Architecture:
Digital Banking Page 147
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Hardware and Software Inventory: Review and update inventories of IT
assets.
Network Architecture: Evaluate the design and configuration of the
organization's network.
9. Audit Trail and Logging:
Logging Practices: Assess the completeness and accuracy of logs for
system activities.
Audit Trail Analysis: Review logs to detect and investigate suspicious or
unauthorized activities.
10. User Training and Awareness:
Security Awareness Programs: Evaluate the effectiveness of programs to
educate users about IT security.
Training Records: Ensure that employees receive and document security
training.
11. Cloud Computing and Outsourced Services:
Security of Cloud Services: Assess the security measures of cloud
service providers.
Vendor Risk Management: Evaluate risks associated with outsourced IT
services and vendors.
12. Physical Security:
Data Center Security: Assess physical security controls at data centers.
Access Controls to Facilities: Review procedures for controlling access
to IT facilities.
13. Performance and Efficiency:
Digital Banking Page 148
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
System Performance: Evaluate the efficiency and responsiveness of
critical systems.
Capacity Planning: Assess the organization's ability to handle increasing
IT demands.
14. Documentation and Recordkeeping:
Policy Documentation: Ensure that IT policies and procedures are
documented and up to date.
Record Retention: Review practices for retaining and managing IT
records.
15. Reporting and Communication:
Audit Findings Reporting: Clearly communicate audit findings and
recommendations to management.
Follow-up Procedures: Establish procedures for monitoring the
implementation of audit recommendations.
Computer audits are essential for organizations to identify and address vulnerabilities,
enhance security, and ensure the proper functioning of their IT systems. They also play a
critical role in meeting regulatory requirements and maintaining the trust of stakeholders.
Regularly scheduled computer audits help organizations stay ahead of evolving threats
and technology changes.
IS Security
Information Systems (IS) security, also known as cybersecurity or information security,
involves the protection of information and information systems from unauthorized access,
disclosure, disruption, modification, or destruction. Ensuring the security of information
systems is crucial for maintaining the confidentiality, integrity, and availability of sensitive
data. Here are key aspects of IS security:
Digital Banking Page 149
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
1. Confidentiality:
Definition: Ensuring that information is accessible only to authorized
individuals, entities, or systems.
Measures: Encryption, access controls, and secure communication
protocols.
2. Integrity:
Definition: Safeguarding the accuracy and reliability of information and
preventing unauthorized modification.
Measures: Digital signatures, data validation checks, and version control.
3. Availability:
Definition: Ensuring that information and information systems are available
and accessible when needed.
Measures: Redundancy, backups, disaster recovery planning, and robust
network architecture.
4. Authentication:
Definition: Verifying the identity of users, systems, or entities attempting to
access information or systems.
Measures: Passwords, biometric authentication, multi-factor authentication
(MFA).
5. Authorization:
Definition: Granting appropriate access privileges to authenticated users
based on their roles and responsibilities.
Measures: Access controls, role-based access management, and least
privilege principles.
Digital Banking Page 150
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
6. Network Security:
Definition: Protecting the security of data during transmission over
networks.
Measures: Firewalls, intrusion detection/prevention systems, virtual private
networks (VPNs), and secure sockets layer (SSL)/transport layer security
(TLS) protocols.
7. Endpoint Security:
Definition: Protecting individual devices (endpoints) such as computers,
laptops, and mobile devices.
Measures: Antivirus software, endpoint protection, and device encryption.
8. Security Awareness and Training:
Definition: Educating users and staff about security policies, best
practices, and potential threats.
Measures: Security awareness programs, regular training sessions, and
phishing simulation exercises.
9. Incident Response:
Definition: Preparing and responding to security incidents to minimize their
impact.
Measures: Incident response plans, security incident reporting
mechanisms, and regular drills.
10. Vulnerability Management:
Definition: Identifying, assessing, and addressing vulnerabilities in
information systems.
Digital Banking Page 151
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Measures: Regular security assessments, vulnerability scanning, and
patch management.
11. Security Policies and Procedures:
Definition: Establishing and communicating rules and guidelines to
safeguard information and systems.
Measures: Develop and enforce security policies, conduct regular policy
reviews, and ensure compliance.
12. Cryptography:
Definition: The use of mathematical techniques to secure communication
and protect information.
Measures: Encryption algorithms, secure key management, and
cryptographic protocols.
13. Security Monitoring and Logging:
Definition: Continuous monitoring of system activities and logging relevant
information for analysis.
Measures: Security information and event management (SIEM) systems,
log analysis, and real-time alerts.
14. Physical Security:
Definition: Protecting the physical infrastructure and assets of information
systems.
Measures: Access controls, surveillance systems, and environmental
controls.
15. Risk Management:
Digital Banking Page 152
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Definition: Identifying, assessing, and mitigating risks to information
systems and data.
Measures: Risk assessments, risk analysis, and risk treatment plans.
16. Secure Software Development:
Definition: Integrating security into the software development lifecycle to
prevent vulnerabilities.
Measures: Secure coding practices, code reviews, and application security
testing.
17. Mobile Device Security:
Definition: Ensuring the security of mobile devices and the data they
process.
Measures: Mobile device management (MDM), encryption, and secure app
development.
18. Cloud Security:
Definition: Addressing security considerations in cloud-based services and
infrastructure.
Measures: Data encryption, access controls, and third-party risk
management.
IS security is a dynamic field that requires ongoing attention and adaptation to evolving
threats and technologies. Organizations must adopt a holistic approach, combining
technical measures, user education, and effective governance to create a robust security
posture for their information systems.
IS Audit
Digital Banking Page 153
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
An Information Systems (IS) audit is a comprehensive examination and evaluation of an
organization's information systems, processes, and controls to ensure the confidentiality,
integrity, and availability of information. The primary goal of an IS audit is to assess the
effectiveness of information systems, identify vulnerabilities, and ensure compliance with
relevant policies, regulations, and industry standards. Here are key aspects of an IS
audit:
1. Scope Definition:
Define the Scope: Clearly outline the boundaries of the audit, specifying
the systems, processes, and locations to be included.
Determine Objectives: Establish the goals and objectives of the audit,
such as assessing security controls, evaluating compliance, or identifying
vulnerabilities.
2. Regulatory Compliance:
Assess Compliance: Evaluate the organization's adherence to relevant
laws, regulations, and industry standards.
Data Privacy Compliance: Verify compliance with data protection and
privacy regulations.
3. Risk Assessment:
Identify Risks: Identify and assess potential risks to information systems,
data, and operations.
Risk Mitigation: Recommend strategies to mitigate identified risks.
4. Security Controls Assessment:
Evaluate Controls: Assess the effectiveness of security controls, including
access controls, encryption, and network security.
Digital Banking Page 154
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Incident Response: Evaluate the organization's ability to detect and
respond to security incidents.
5. Data Management:
Data Quality and Integrity: Assess the accuracy, completeness, and
reliability of data.
Data Classification: Review data classification policies and practices.
6. Network and Infrastructure:
Network Security: Evaluate the security of network architecture and
communication protocols.
Physical Security: Assess the physical security controls in place for data
centers and critical infrastructure.
7. Identity and Access Management (IAM):
Authentication and Authorization: Evaluate IAM processes, including
user authentication, authorization, and access management.
User Provisioning and De-provisioning: Review procedures for on
boarding and off boarding users.
8. Change Management:
Review Change Control Procedures: Assess how changes to information
systems are managed and controlled.
Configuration Management: Evaluate the configuration of systems and
applications.
9. Incident Response and Disaster Recovery:
Digital Banking Page 155
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Incident Response Plan: Assess the organization's ability to respond to
and recover from security incidents.
Disaster Recovery Plan: Evaluate the effectiveness of plans for business
continuity.
10. Vendor and Third-Party Risk Management:
Assess Third-Party Relationships: Review security measures in place for
third-party vendors.
Contractual Security Obligations: Verify that vendors comply with
security requirements as per contracts.
11. Training and Awareness:
Employee Training: Assess the effectiveness of security awareness
programs for employees.
Security Policies Awareness: Verify that employees are aware of and
adhere to security policies.
12. Security Governance:
Governance Structure: Evaluate the effectiveness of security governance
and oversight.
Policy Development: Assess the development and enforcement of
security policies.
13. Audit Trails and Logging:
Log Analysis: Evaluate the completeness and accuracy of logs for system
activities.
Security Incident Logging: Assess the logging of security-relevant events
for incident response.
Digital Banking Page 156
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
14. Cryptographic Controls:
Review Encryption Practices: Assess the use of encryption for protecting
sensitive information.
Key Management: Verify the effectiveness of key management practices.
15. Cloud Security:
Cloud Services Security: Assess security measures in cloud-based
services and infrastructure.
Data Protection in the Cloud: Verify that data stored in the cloud is
adequately protected.
16. Mobile Device Security:
Mobile Device Management (MDM): Assess controls in place for securing
mobile devices.
BYOD Policies: Evaluate policies for securing personally-owned devices
used for work.
17. Application Security:
Secure Software Development Practices: Assess the integration of
security into the software development lifecycle.
Code Review and Testing: Verify the effectiveness of code reviews and
application security testing.
18. Physical Security:
Data Center Security: Assess physical security controls at data centers
and critical facilities.
Access Controls to Facilities: Review procedures for controlling access
to IT facilities.
Digital Banking Page 157
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
19. Documentation and Recordkeeping:
Policy Documentation: Ensure that IT policies and procedures are
documented and up to date.
Record Retention: Assess practices for retaining and managing IT
records.
20. Reporting and Communication:
Audit Findings Reporting: Clearly communicate audit findings and
recommendations to management.
Follow-up Procedures: Establish procedures for monitoring the
implementation of audit recommendations.
IS audits play a crucial role in helping organizations identify weaknesses in their
information systems, improve security postures, and demonstrate compliance with
regulatory requirements. Conducting regular IS audits ensures that organizations are
proactive in addressing emerging threats and maintaining the resilience of their
information systems.
Evaluation Requirements
In the context of digital banking, evaluation requirements focus on assessing the
effectiveness, security, and compliance of the various components and processes within
the digital banking ecosystem. The unique characteristics of digital banking, including
online transactions, mobile applications, and interconnected systems, require specific
evaluation criteria. Here are key evaluation requirements for digital banking:
1. Regulatory Compliance:
Compliance with Financial Regulations: Evaluate adherence to
regulatory standards and guidelines set by financial authorities.
Digital Banking Page 158
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Data Privacy Compliance: Ensure compliance with data protection and
privacy regulations specific to the banking industry.
2. Security Controls Assessment:
Authentication and Authorization: Evaluate the effectiveness of
authentication mechanisms and access controls.
Transaction Security: Assess the security measures in place for online
and mobile transactions.
Endpoint Security: Evaluate controls to secure devices used for digital
banking activities.
3. Data Management and Privacy:
Data Encryption: Verify the use of encryption for protecting sensitive
customer information during transmission and storage.
Customer Data Handling: Assess the security of processes for collecting,
storing, and managing customer data.
4. Identity and Access Management (IAM) Evaluation:
User Authentication: Evaluate the security of user authentication
methods, including multi-factor authentication (MFA).
Access Controls: Assess the adequacy of controls governing user access
to digital banking services.
5. Transaction Monitoring and Fraud Detection:
Real-time Monitoring: Evaluate systems for real-time monitoring of
transactions to detect and prevent fraudulent activities.
Fraud Detection Mechanisms: Assess the effectiveness of fraud
detection algorithms and tools.
Digital Banking Page 159
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
6. Mobile Banking Security Assessment:
Mobile App Security: Evaluate the security features of mobile banking
applications.
Secure Mobile Transactions: Assess the security of transactions
conducted through mobile devices.
7. Cloud Security Evaluation:
Cloud Service Security: Assess the security measures implemented for
cloud-based banking services.
Data Protection in the Cloud: Verify the security of customer data stored
in cloud environments.
8. API Security:
Security of APIs: Evaluate the security controls in place for Application
Programming Interfaces (APIs) used in digital banking.
Third-Party API Security: Assess the security of APIs provided by third-
party services integrated into the digital banking ecosystem.
9. Incident Response and Cyber Resilience:
Incident Response Plan: Evaluate the organization's ability to respond to
and recover from security incidents.
Cyber Resilience: Assess the overall readiness to withstand and recover
from cyber threats.
10. Customer Education and Awareness:
Security Awareness Programs: Assess the effectiveness of programs
educating customers about digital banking security.
Digital Banking Page 160
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Communication of Security Best Practices: Verify that customers are
informed about security best practices.
11. Digital Payment Security:
Secure Digital Payment Methods: Evaluate the security measures for
digital payment options, including mobile wallets and digital cards.
Payment Gateway Security: Assess the security of payment gateways
used in digital transactions.
12. Blockchain and Cryptocurrency Security:
Security of Blockchain Transactions: Assess the security controls in
place for blockchain-based transactions.
Cryptocurrency Wallet Security: Evaluate measures to secure
cryptocurrency wallets and transactions.
13. User Experience and Accessibility:
Usability and Accessibility: Evaluate the user experience of digital
banking platforms while ensuring accessibility for diverse user groups.
Security without Compromising Usability: Assess the balance between
security measures and user-friendly design.
14. Social Engineering and Phishing Prevention:
Customer Education on Phishing: Assess efforts to educate customers
about phishing risks.
Anti-Phishing Measures: Evaluate the effectiveness of measures to
prevent social engineering attacks.
15. Regulatory Reporting:
Digital Banking Page 161
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Timely Regulatory Reporting: Ensure that the organization can provide
timely and accurate reports to regulatory authorities.
Compliance Audits: Assess the effectiveness of internal audits related to
regulatory compliance.
These evaluation requirements are essential for maintaining the security, integrity, and
trustworthiness of digital banking services. Regular assessments help financial
institutions stay ahead of emerging threats, comply with regulatory standards, and
provide a secure and seamless digital experience for customers.
Overview of IT Act
The Information Technology Act, 2000, is a comprehensive law that addresses various
legal aspects related to electronic governance, digital signatures, cybercrime, and
electronic commerce. Below is an overview of the Information Technology Act, 2000:
Information Technology Act, 2000:
1. Enactment:
The Information Technology Act, 2000, was enacted on October 17, 2000,
with the primary objective of providing legal recognition for electronic
transactions and fostering e-commerce.
2. Key Objectives:
Legal Recognition: Provide legal recognition to electronic records and
digital signatures.
Cybercrime Prevention: Define offenses related to the misuse of
computers and data.
Electronic Governance: Facilitate electronic filing of documents,
contracts, and records.
Digital Banking Page 162
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Digital Signatures: Recognize and regulate the use of digital signatures
for authentication.
3. Key Provisions:
Digital Signatures: The Act provides legal recognition to digital signatures,
specifying the use of a valid digital signature for electronic documents and
transactions.
Cyber Offenses: It defines various cyber offenses such as unauthorized
access, hacking, identity theft, and spreading computer viruses, prescribing
penalties for these offenses.
Data Protection and Privacy: While the Act addresses certain aspects of
data protection, comprehensive data privacy provisions were introduced
later, notably through the Personal Data Protection Bill, which was under
consideration.
Electronic Governance: The Act enables the use of electronic records
and digital signatures in government and administrative processes to
promote e-governance.
4. Adjudication and Authorities:
The Act establishes adjudicating officers and appellate tribunals to handle
disputes and offenses related to electronic transactions.
5. CERT-In (Indian Computer Emergency Response Team):
The Act empowers CERT-In to issue guidelines and advisories to prevent
and respond to cybersecurity incidents.
6. Amendments:
The Information Technology (Amendment) Act, 2008, brought significant
changes to the original Act, including the introduction of new offenses,
enhanced penalties, and provisions related to data protection.
Digital Banking Page 163
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
7. Recent Developments:
The landscape of digital technologies and cyber threats has evolved since
the enactment of the IT Act. India is currently working on a comprehensive
data protection framework, with the Personal Data Protection Bill, 2019,
being a significant development in this regard.
8. International Cooperation:
The Act facilitates cooperation with foreign governments and international
organizations in matters related to cybersecurity and electronic
transactions.
The evaluation requirements in the context of information systems and security refer
to the criteria and standards used to assess the effectiveness, performance, and
compliance of various aspects within an organization's IT environment. Evaluation is
essential for identifying strengths and weaknesses, ensuring adherence to policies and
regulations, and making informed decisions for improvement. Here are key evaluation
requirements:
1. Compliance Evaluation:
Regulatory Compliance: Assess adherence to relevant laws, regulations,
and industry standards.
Policy Compliance: Evaluate compliance with internal IT policies and
procedures.
2. Security Controls Assessment:
Access Controls Evaluation: Assess the effectiveness of access controls
and permissions.
Encryption Assessment: Verify the implementation and strength of
encryption measures.
Digital Banking Page 164
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Network Security Evaluation: Evaluate the security of network
infrastructure and protocols.
3. Risk Assessment:
Identify Risks: Evaluate the identification and assessment of potential
risks to information systems.
Risk Mitigation Strategies: Assess the effectiveness of risk mitigation
strategies.
4. Data Management Evaluation:
Data Quality and Integrity Assessment: Verify measures to ensure the
accuracy and integrity of data.
Data Classification and Handling: Assess compliance with data
classification policies.
5. Identity and Access Management (IAM) Evaluation:
Authentication and Authorization Assessment: Evaluate the
effectiveness of IAM processes.
User Provisioning and De-provisioning Review: Verify procedures for
user on boarding and off boarding.
6. Change Management Evaluation:
Change Control Procedures Assessment: Assess the management of
changes to information systems.
Configuration Management Review: Evaluate the configuration of
systems and applications.
7. Incident Response and Disaster Recovery Assessment:
Digital Banking Page 165
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Incident Response Plan Review: Evaluate the organization's ability to
respond to security incidents.
Disaster Recovery Plan Assessment: Verify the effectiveness of plans for
business continuity.
8. Vendor and Third-Party Risk Management Evaluation:
Third-Party Relationships Assessment: Review security measures in
place for third-party vendors.
Contractual Security Obligations Verification: Ensure that vendors
comply with security requirements.
9. Training and Awareness Assessment:
Employee Training Effectiveness: Assess the impact and effectiveness
of security awareness programs.
Policy Awareness Review: Verify that employees are aware of and
adhere to security policies.
10. Security Governance Evaluation:
Governance Structure Assessment: Evaluate the effectiveness of
security governance and oversight.
Policy Development Review: Assess the development and enforcement
of security policies.
11. Audit Trails and Logging Assessment:
Log Analysis Review: Evaluate the completeness and accuracy of logs for
system activities.
Security Incident Logging Assessment: Assess the logging of security-
relevant events for incident response.
Digital Banking Page 166
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
12. Cryptographic Controls Evaluation:
Encryption Practices Review: Assess the use of encryption for protecting
sensitive information.
Key Management Verification: Verify the effectiveness of key
management practices.
13. Cloud Security Evaluation:
Cloud Services Security Assessment: Assess security measures in
cloud-based services and infrastructure.
Data Protection in the Cloud Review: Verify that data stored in the cloud
is adequately protected.
14. Mobile Device Security Assessment:
Mobile Device Management (MDM) Evaluation: Assess controls in place
for securing mobile devices.
BYOD Policies Review: Evaluate policies for securing personally-owned
devices used for work.
15. Application Security Evaluation:
Secure Software Development Practices Assessment: Assess the
integration of security into the software development lifecycle.
Code Review and Testing Verification: Verify the effectiveness of code
reviews and application security testing.
16. Physical Security Evaluation:
Data Center Security Assessment: Assess physical security controls at
data centers and critical facilities.
Digital Banking Page 167
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Access Controls to Facilities Review: Evaluate procedures for controlling
access to IT facilities.
17. Documentation and Recordkeeping Assessment:
Policy Documentation Review: Ensure that IT policies and procedures
are documented and up to date.
Record Retention Verification: Assess practices for retaining and
managing IT records.
18. Reporting and Communication Assessment:
Audit Findings Reporting Effectiveness: Evaluate how audit findings and
recommendations are communicated to management.
Follow-up Procedures Verification: Ensure that there are procedures for
monitoring the implementation of audit recommendations.
These evaluation requirements provide a framework for assessing the effectiveness of
information systems, security controls, and related processes within an organization.
Regular evaluations help organizations stay proactive in addressing emerging threats
and vulnerabilities, ensuring a resilient and secure IT environment.
Gopalakrishna- Committee Recommendations - Digital banking
The Reserve Bank of India has constituted the working group on Electronic Banking,
Information Technology, Cyber fraud, and Technology Risk Management. The report on
this factor was produced in January of 2011. This was guided by Mr Gopalakrishnan and
was popularly known as the Gopalakrishnan Committee Report. The main purpose of
this committee is to define a structure for the use of NPD. The Ministry of Electrons
constituted it. Information Technology also takes an important part in this factor. It deals
with various issues that are related to the non-personal data that was submitted in 2020.
Recommendations given by the NPD Committee in the report:
The following are the highlights and recommendations of the report:
Digital Banking Page 168
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
1. Definition of NPD: NPD is defined as ‘data that is not personal data, or when it is
without any personally identifiable information’. It includes data that- (a) never related to
an identified or identifiable natural person; (b) anonymized personal data, and
aggregated data to which certain data transformation techniques are applied to the
extent that individual specific events are no longer identifiable. Three categories of NPD
have been recommended:
(i) Public NPD: Data collected or generated by any government agency, and includes
data collected during execution of all publicly funded works;
(ii) Private NPD: NPD collected by entities/persons other than governments through
assets and processes privately owned by the entity/person. It includes derived/observed
data collected through private effort, such as through use of algorithms or proprietary
knowledge; and
(iii) Community NPD: Data that pertains to a community of natural persons. It can include
NPD about animate and inanimate things or phenomena. Such data shall not include
private NPD. The definition of community NPD is wide in its ambit, with a community
defined as any group of people that are bound by common interests and purposes, and
involved in social and/or economic interactions. Examples cited include data collected by
municipal corporations and public electric utilities. It also includes user information
collected by telecom companies, e-commerce players, and ride-hailing platforms.
2. Sensitive NPD: The NPD committee has recommended classification of NPD into
general NPD, sensitive NPD and critical NPD- just like the classification of personal data
under the PDP Bill. The classification of NPD will be on the basis of the category of the
underlying PD under the PDP Bill. For example, all health-related NPD will be classified
as sensitive NPD, as health data qualifies as SPD under the PDP Bill.
Similar to the PDP Bill, storage restrictions will also apply to NPD based on sensitivity-
(a) general NPD can be stored anywhere in the world; (b) sensitive NPD can be
transferred outside India, but it must be stored in India, and (c) critical NPD (subject to
the definition of critical PD, which is yet to be defined) must be stored in India.
Digital Banking Page 169
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Further, some NPD may ‘qualify’ as sensitive, even if the underlying PD is not SPD as
per the PDP Bill. Factors for determining sensitivity of NPD include- (a) national security
or strategic interests; (b) risk of collective harm to a group; (c) business sensitive or
confidential information, or (d) anonymised data, which carries the risk of re-identification
3. Consent requirement for collection and processing of NPD: For anonymised personal
data, the individual(s) to whom the data pertains must be considered as the data
principal of such NPD. Thus, at the time of collecting the data principal’s PD, the entity
must take the data principal’s consent for- (a) anonymising the data principal’s data, and
(b) for usage of anonymised data.
4. Different roles in the NPD ecosystem: The following different roles have been
proposed in the NPD ecosystem-
(a) Data principal: This is essentially the entity/individual to whom the collected data
pertains. It will vary depending on the category of NPD. For example, in case of census
data, the citizens will be the data principal. In case of vendor registration or vendor
product information, the vendor will be the data principal.
(b) Data custodian: The entity that undertakes collection, storage and processing of data,
keeping in mind best interest of the data principal. It is similar to a data fiduciary under
the PDP Bill. It has a ‘duty of care’ to the concerned community to which the NPD
pertains; this ‘duty of care’ will be defined through a defined set of obligations.
(c) Data trustee: The data principal or community will exercise its rights through a data
trustee. The NPD legislative framework will provide guidelines for who can act as an
appropriate data trustee for a group/community. For a lot of community data, the
corresponding govt. entity or community body may act as a data trustee. For example,
the Ministry of Health and Family Welfare could be the trustee for data on diabetes
among Indians. Citizens/NGOs in a local area can act as data trustees for data related to
solid waste management in that area.
Digital Banking Page 170
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Data trustees can recommend to the ‘data regulator’ for enforcement of ‘soft obligations’
on data custodians, like transparency and reporting mechanisms, or even stronger ones
involving regulation of data practices. Data sharing will be enforced by the data regulator
in collaboration with a data trustee- for example, govt. transport dept. will work with data
regulator on whether, how and with whom the community data related to modes of
transportation is shared
(d) Data trusts: Institutional structures for sharing a given dataset as per specified rules
and protocols. It will pertain to a particular sector, and can contain data from multiple
sources/custodians. Data sharing can be voluntary or mandatory. Government/data
trustees can seek mandatory data sharing for a given sector for specific purposes.
5. Ownership of data: The NPD committee adopted the notion of ‘beneficial
ownership/interest’ of data, as many actors may have simultaneous ownership rights and
privileges to data, due to the non-rivalrous nature of data. Public NPD will be treated as a
‘national resource’. For NPD derived from PD of an individual, that individual will act as
the data principal of such NPD. For community NPD, the data trustee will be the ‘closest
and most appropriate’ representative for that community, which will be a community body
or Central/State/Local government agency in many cases. The community should have
the right to determine and control how such data and intelligence is used, presumably
through the data trustee, so as to determine how to maximize benefits and minimize
harms for the community.
6. Introducing a new category of ‘data businesses’: Entities involved in data collection or
processing will be classified as ‘data businesses’ based on a certain threshold of data
collected/processed. Businesses below the threshold can register as a data business
voluntarily.
Data businesses will have to furnish a lot of information during ‘initial registration’,
including business ID, business name, associated brand names, rough data traffic and
cumulative data collected in terms of number of users, records and data; nature of data
business, kinds of data collection, aggregation, processing, uses, selling, data-based
services developed etc. Some of this information will also have to be provided as part of
disclosure requirements.
Digital Banking Page 171
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
If the data collection exceeds a certain threshold, the ‘data business’ entity will have to
submit meta-data about data user and community from which data is collected, with
details such as classification, closest schema, volume etc. This meta-data will be stored
digitally in meta-data directories in India, which will be made available on an open access
basis to citizens and organizations. Based on this meta data, ‘potential users’ can identify
opportunities for combining data from multiple data businesses or governments to
develop products and services. Data requests may be made for the detailed underlying
data for the meta-data.
7. Sharing of NPD: There are various grounds specified for sharing of data, including
national security, law enforcement, community use, policy development and better
delivery of public services. The NPD committee has recommended that India should
specify a new class of ‘high value’ or ‘special public interest’ datasets, which can include
health, geospatial and transportation data.
Only raw/factual data will have to be shared by a private organization. Depending on the
level of ‘value-add’ to the NPD, the mechanism of remuneration for the requested NPD
will be determined. For example, in case of low value add, the data sharing will be done
on FRAND (fair, reasonable and non-discriminatory) basis. In case of high value add, the
private organization can determine how it wishes to use the NPD.
The report suggests various ‘checks and balances’ for ensuring compliance with data
sharing and other requirements. Other than the local storage requirements based on
sensitivity of NPD, the report provides for an ‘expert probing’ measure. Registered
experts, academic labs and Indian organizations, registered through a self-serve peer
review, will probe the released/share aggregate data, the cloud defences and cloud
internals for vulnerabilities.
The report also suggests that ‘data spaces’ can be created to promote intensive data-
based research by various stakeholders. These can be sectoral spaces, with sector
specific clouds. The report also suggests setting up ‘data and cloud innovation labs and
Digital Banking Page 172
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
research centres’, which will act as physical environments/field validation centres where
organizations will test and implement digital solutions.
8. NPD Regulatory Authority: Along with having an enforcing role (to ensure that all
stakeholders in the NPD ecosystem follow rules and regulations, enforce valid data
sharing requestsetc.), it will also have an ‘enabling role’, which is quite broad. The
Authority will have the power to address market failures in terms of lack of information
about the quantum and nature of actual NPD assets held by an entity, or harms arising
from processing activities, including re-identification or discrimination. It will also ensure a
‘level playing field’ with fair and effective competition in digital and data markets.
The report ‘suggests’ that data businesses will have to integrate their raw data pipes with
the Authority within a specified time period for submission of raw data upon request. The
Authority will also enforce compliance requirements for data businesses, irrespective of
whether they are currently regulated by a sectoral regulator. Additional requirements can
be provided for by the sectoral regulator in addition to these requirements.
9. On technology architecture: The following guiding principles have been suggested for
a technology architecture to digitally implement the rules for data sharing:
(i) Mechanism for accessing data: All shareable NPD and datasets created/maintained
by government agencies, companies, start-ups, universities, research labs, non-
government organisations, etc. should have Representational State Transfer (“REST”)
API for accessing data. Additionally, data sandboxes can be used for experiments and
deploying algorithms wherein only the output, not the data itself, is shared.
(ii) Distributed storage for data security: This will ensure that there is no single point of
leakage. All sharing should be done via APIs so that all data requests can be tracked and
logged.
(iii) Standardised data exchange approach: The collected data should be made available
through a data exchange for stakeholders. A data exchange should be able to accept
data in any form and produce output that is standardised and usable by all stakeholders.
(iv) Prevent de-anonymisation: Use different techniques to prevent re-identification.
Digital Banking Page 173
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
The NPD committee has also suggested an illustrative three-tiered system architecture
covering safeguards, technology and compliance to enable data sharing. This includes
the suggestion of a ‘Policy Switch’, which would enable a single digital clearing house for
regulatory management of NPD.
Summary
In conclusion, digital banking represents a transformative shift in the financial services
landscape, bringing forth a host of innovations and conveniences for both financial
institutions and customers. The advent of digital technologies has redefined how banking
services are delivered, offering a myriad of benefits such as accessibility, efficiency, and
enhanced customer experiences.
Key aspects of digital banking include:
1. Convenience and Accessibility:
Digital banking provides customers with 24/7 access to their accounts,
allowing them to manage finances, conduct transactions, and access a
range of services at their convenience.
2. Technological Advancements:
The integration of emerging technologies such as artificial intelligence,
machine learning, and blockchain has further enriched digital banking,
enabling advanced functionalities like predictive analytics, robo-advisors,
and secure authentication mechanisms.
3. Mobile Banking Revolution:
The rise of mobile banking has revolutionized the way customers interact
with their finances. Mobile apps offer on-the-go access, mobile payments,
and real-time account monitoring.
Digital Banking Page 174
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
4. Security Measures:
Digital banking platforms prioritize robust security measures, including
encryption, multi-factor authentication, and real-time fraud detection, to
ensure the protection of customer data and transactions.
5. Financial Inclusion:
Digital banking plays a crucial role in promoting financial inclusion by
providing services to individuals who may be underserved or excluded from
traditional banking channels.
6. Enhanced Customer Experiences:
Personalization, data analytics, and customer-centric design contribute to
enriched user experiences. Digital banks leverage insights to offer tailored
recommendations and targeted services.
7. Cost Efficiency and Operational Streamlining:
Digital banking facilitates operational efficiency, reduces costs, and
optimizes resources for financial institutions through automation, process
streamlining, and the elimination of physical paperwork.
8. Global Transactions and Cross-Border Services:
The ability to perform cross-border transactions and international money
transfers enhances global accessibility, supporting individuals and
businesses in the interconnected world.
9. Regulatory Compliance:
Digital banking systems are designed to adhere to regulatory requirements,
ensuring compliance with industry standards and promoting a secure and
trustworthy financial environment.
10. Innovation and Collaboration:
Digital Banking Page 175
DIRECTORATE OF DISTANCE AND CONTINUING EDUCATION
Manonmaniam Sundaranar University
Collaboration with fintech partners and the integration of innovative
technologies continue to drive evolution in the digital banking sector,
fostering a dynamic ecosystem.
As digital banking continues to evolve, it will likely shape the future of finance by
introducing new technologies, expanding service offerings, and addressing emerging
challenges. Financial institutions and regulators must remain vigilant in adapting to this
evolving landscape, ensuring that security, privacy, and regulatory compliance are
prioritized to maintain the trust and confidence of users.
In summary, digital banking represents a pivotal shift toward a more accessible, efficient,
and customer-centric financial ecosystem, setting the stage for ongoing innovation and
transformative changes in the banking industry.
*****************************************************************************************************
[Link],
Chairperson – School of Business Studies,
Professor & Head,
Department of Commerce,
Manonmaniam Sundaranar University,
Tirunelveli – 627 011.
Digital Banking Page 176