RMG220 -- Hot Topic Near Field Communications (2)

advertisement
Near Field Communication
Safeguarding the Mobile Marketplace
Our speakers
• Larry Collins
Head of e-Solutions
Zurich Services Corporation
• Christopher O’Donnell, CPCU ARM
Administrative Vice President
Director of Corporate Insurance & Risk
M&T Bank
Conducting business online in an
increasingly mobile society
• Cyber security was named one of the top five
global risks for companies in 2012 at the
World Economic Forum in Davos, Switzerland
• Companies that have traditionally had little
data about their customers now must become
accustomed with data privacy and security
laws, and protect their customers’ personal
information
What is Near Field Communication
(NFC)?
• “A wireless technology that has a range of only
a few inches. It is based on the magnetic field
induction between readers and tags in a radio
frequency identification (RFID) system.
Adhering to the ISO 14443 international
standard for smart cards, near field
communication (NFC) is compatible with the
countless ID card terminals in use around the
world.” (PC Mag)
How big is the market?
Juniper Networks
How the Technology Works
1) Coil in the first smart phone sets up a current that is picked up a
second smart phone or reader.
2) The second smart phone receives the “induced current” from the first,
recognizes it as a valid signal and offers a connection.
3) The first cell phone accepts the connection and begins the transaction.
How the Technology Works
1) Coil in the smart phone sets up a current that is picked up by the smart
tag
2) The smart tag receives the “induced current” from the cell phone,
recognizes it as a valid signal and offers a connection to the cell phone.
3) The cell phone accepts the connection and begins the transaction
Users of NFC-enabled devices can:
• Make payments or use coupons via devices,
instead of credit or debit cards
• Transfer files and share documents
• Download information about objects, services
or places from “smart posters”
• Display electronic identity documents, like air
travel boarding passes
What are some examples of the
technology?
What are the risks?
• Privacy
– What data is being captured, processed or stored?
– Information Privacy and security rules apply!
– How does a customer opt-out?
• Security
– If you capture store or process data, you have to protect it.
– Lost smart phones are now an exposure. Can you shut them down
remotely?
• Sentinel Hacking
– A hacker can establish a “sentinel” tag, fixed in one place, to receive
and download information from passing smart phones.
– Any NPI on the smart phone can then be down loaded
– Loss of privacy
– Loss of financial info – credit card #s
Businesses that rely on NFC to share
company information can:
• Automatically shut-off of an employee’s smart
phone if it’s lost, so information can’t be
accessed by unauthorized parties.
• Enlist the company’s telecommunications and
information technology department to limit
the content that employees can download or
store.
• Enforce a password requirement.
• Encrypt data so it can’t be easily read.
Businesses that rely on NFC to acquire
customer information can:
• Use transmitted data for the purpose it was collected: If a customer
shared personal information solely to pay for something, don’t then
use that data for targeted marketing.
• Secure collected data with encryption, passwords and by restricting
access.
• Determine how long data should be stored; create a data purging
cycle.
• An educated team, aware of global privacy laws, should be in place.
• Limit data-reading devices’ power, allowing them to receive data
only from short distances. Limit the content that devices display
during transactions.
• Implement the electronic security measures that a near field
system requires.
Risk management in practice:
M&T Bank
• Our risk management process involves a
number of “moving parts” including:
– Corporate Risk Management
– Corporate Insurance
– New Products & Services Committee
– Corporate Operational Risk Committee
– Management Group
Risk management in practice:
M&T Bank
• We are in the process currently to review
“alternative channels” of banking service.
• The following slides will take us through a
view of how we vet the risks associated with
these “alternative channels.”
Benefits
Measurable Benefits
• Reduce telecom costs due to deflection from the IVR to mobile channel - $336M
• Account acquisition – $5.75MM
• Mobile financial service capabilities are more impactful in a consumer's decision to
select a bank than availability of online banking, access to ATMs, or nearby
branches. Additionally, banks offering mobile financial services should anticipate
as much as a sixty percent increase in sales lift*
Other Benefits
• Provides the bank with a competitive advantage
• Establishes a credible presence in mobile banking
• Creates infrastructure that can be leveraged for Commercial and Business Banking
• Lays the foundation for alerts, mobile check deposit and P2P
*Source: Mercatus
15
Competitive Analysis
Company
SMS
Mobile Web
Application
iPhone App
Bank of America




BB&T









Capital One
Citibank


Comerica

Fifth Third
First Horizon
Huntington Bank

Key Bank

M&I Bank

PNC

Regions Financial

Sun Trust

Synovus

U.S. Bancorp




Wells Fargo




USAA






Zions
16

Business Initiative Risks
Operational Risks
• External fraud
• Authenticity of the mobile application
• Technology failure
• Vendor failure
• Ability to handle customer service inquiries
• Vulnerability of transmitting data wirelessly
Legal/Compliance Risk
• Patent Infringement – Some cases related to mobile banking exist
• Legal / FDIC disclosures on mtb.com and in the mobile banking
application
Strategic Risks
• Failure to create a credible mobile banking channel that will attract new
customers
17
Business Initiative Risks
Reputational Risks
• Patent infringement lawsuits
• Compromise of customer data
• Failure of technology
Controls
• Timeouts
• Apple store
• ClairMail controls and contract
• Gradual migration
• Secure transactions
• Process controls: use of Web Banking User ID and passcode, no reset
from mobile device, user agent string capture
• Information Security is assessing the risk of each mobile feature
18
Loss Scenarios
•
Worst Case Loss Scenario
• Patent infringement lawsuit, external fraud or data breach at the customer
level. The risks would be reputational in nature.
•
Likely Loss Scenario
• Mistaken internal transfer between a user’s account
• Unintended bill payment to an existing payee
19
Mobile Banking Enrollment*
90,000
Total Unique Mobile Users: 128,854, or 21% of active Web Banking**
80,000
76,895 Mobile Web Users
12% of active Web Banking
63,296 Mobile Text Users
70,000
10% of active Web Banking
Enrolled Customers
60,000
50,000
Mobile Text
Mobile WAP
40,000
iPhone App
Profile of Mobile Customer***
30,000
20,000
*71% of users are under the age of 36; about 26% are
between the ages of 36-55.
*Users are profitable. They have high balances & cross-sell.
*Users have a higher CQI than non-users.
*A disproportionately high share of mobile users are in the
Baltimore region.
24,957 App
Downloads
10,000
0
0
30
60
90
120
150
180
210
Number of Days
*Reporting through 1/12/2010
**Web Banking Active Users: 628,541
***DataMart
20
240
270
300
330
360
Current Environment
Industry Trends
1980
2000
Today
– Chat
– Video
– Facebook
– Twitter
• Alternative Channels growing in transaction, sales, and research
activities
• Forrester predicts that one-third of all checking sales will come via the
Internet by 2013
• 2009 survey by the American Bankers Association finds that customers
under the age of 55 prefer to bank online
Small Business Owners Use
Smartphones
Small Business Adoption
Outpaces Consumer
While only 17% of Americans own
smartphones…49% of small
business owners are reported to
own smartphones.
Source: Forrester, September 2010
22
Current Environment
Industry Transaction Trends
• Mobile and Online transactions will grow at a significantly higher rate than other
transactions over the next 3 years (TowerGroup)
• More than 1.5B check deposit transactions will shift from the branch to mobile check
deposit by 2014 (Mercatus’ Remote Deposit Capture Adoption Research Study, 2/2012)
• According to Nielsen, by the middle of 2011 over 50% of mobile phones sold in the U.S.
are expected to be smart phones, or other all in one device
Source: TowerGroup
Q&A
Download