Chapter 17: Information Management in Treasury Outline: Basics of E-Commerce EDI Infrastructure Treasury Management Systems (TMSes) Other Issues in Treasury Technology v3.0 © 2011 Association for Financial Professionals. All rights reserved. Session 12: Module 6, Chapter 17 - 1 Basics of E-Commerce Terminology Electronic commerce Electronic data interchange (EDI) Electronic funds transfer (EFT) Benefits Improved productivity No data reentry Lower error rates Faster data processing v3.0 © 2011 Association for Financial Professionals. All rights reserved. Eliminates mail time Improved communication capabilities Session 12: Module 6, Chapter 17 - 2 The Languages of E-Commerce Electronic data interchange (EDI) HyperText markup language (HTML) eXtensible markup language (XML) eXtensible business reporting language (XBRL) v3.0 © 2011 Association for Financial Professionals. All rights reserved. Session 12: Module 6, Chapter 17 - 3 Basics of E-Commerce Security Privacy Assurance that the message is readable only to the intended recipient and that data will not be used for unintended purposes Authentication The ability to know, with a reasonable amount of certainty, who sent or received a message Integrity The ability to ensure that a message was not modified in transit, which is especially important for financial transactions Non-repudiation The inability of the sender or receiver of a message to deny having sent or received the message v3.0 © 2011 Association for Financial Professionals. All rights reserved. Session 12: Module 6, Chapter 17 - 4 TMS Security Database management issues Security risks Data loss Unauthorized user access Computer viruses Security safeguards Disaster recovery and business continuity v3.0 © 2011 Association for Financial Professionals. All rights reserved. Session 12: Module 6, Chapter 17 - 5 Security Safeguards Storing computer systems and software in a location with restricted access Instituting basic access requirements (e.g., passwords) Monitoring log-on activity Using digital certificates Limiting sign-on attempts Using smart card and/or biometric controls Enforcing periodic password changes v3.0 © 2011 Association for Financial Professionals. All rights reserved. Establishing different levels of access and segregation of duties Using backup storage Scanning information at the system-wide and workstation levels to ensure that data are not compromised Employing electronic security (e.g., encryption and message authentication) by means of electronic signatures or certificates Removing or disabling computer access of former employees Session 12: Module 6, Chapter 17 - 6 Exam Preparation Steps Complete the online posttest to practice for the CTP exam. Complete the online flashcards. Review the test-yourunderstanding questions at the end of each chapter. Complete or review all Exam Practice (Describe and Differentiate) questions. Review the online calculations. (Each has four variations.) Review the online TestTaking Tips. v3.0 © 2011 Association for Financial Professionals. All rights reserved. Session 12: Module 6, Summary - 7