O P C S. OPCS Overview 9/28/2017 (OPCS) The implementation of the Ohio Pooled Collateral System creates a unique partnership between:

Similar documents
O P C S (OPCS) opcs.ohio.gov

State Treasurer of Ohio Ohio Pooled Collateral System (OPCS) April 7, 2017

Fraud and Cyber Insurance Discussion. Will Carlin Ashley Bauer

Loaded Everyday card terms and conditions

2017 annual fraud update:

Year-end 2016 fraud update: Payment cards, remote banking and cheque

United Security Bank Online Banking Agreement

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently

Investment Funds Transfer Audit. October 03, 2008

DBS IDEAL 3.0 FAQ MAKING CASH TRANSACTIONS

Exactly what kind of bank is South State Bank?

Claims and Litigation Trends in Credit Unions. June 21, 2017

ATM/Debit. Terms and Conditions

Business Electronic Fund Transfer Agreement and Disclosure

Protecting against and recovering from fraud and identity theft WHAT TO DO

get cash withdrawals from savings account(s) with an ATM card get cash withdrawals from savings account(s) with a debit card

Bank of Ireland is regulated by the Central Bank of Ireland. Contactless R.6 (01/18)

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki:

You can perform many trade services through DBS IDEAL, including the following:

Bank Secrecy Act OFAC FinCEN

Kasasa Protect. FAQ and Product Overview

The Savings Bank's Online Banking Electronic Service Agreement and Disclosure

Tips for Preventing Credit Card Fraud and Avoiding Chargebacks

ELECTRONIC FUND TRANSFER DISCLOSURE

Beneficial State Bank ONLINE BANKING ACCESS AGREEMENT AND ELECTRONIC FUNDS TRANSFER ACT DISCLOSURE

Online Help for Client Employees

Protecting Yourself from Fraud including Identity Theft Advanced Level

Identity Theft Prevention Program Lake Forest College Revision 1.0

Commercial Banking Online Service Agreement

Main Street Bank EXTERNAL FUNDS TRANSFER AGREEMENT

mitigating Payments Fraud risk:

First Savings Bank of Hegewisch

Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation

Frequently Asked Questions

VISA DEBIT CARD RULES AND CARDHOLDER AGREEMENT

Identity Protection Services

CUA Credit Cards Conditions of Use and Credit Guide

ELECTRONIC FUND TRANSFER AGREEMENT AND DISCLOSURE

IDENTITY THEFT PROTECT YOUR MONEY

PRODUCTS AND SERVICES GUIDE INFORMATION ABOUT THE TRANSFER OF YOUR BUSINESS ACCOUNT FROM ALOSTAR TO CADENCE BANK. A division of Cadence Bank, N.A.

Community Resource Credit Union

A Definitions: Europ Assistance USA, Inc East-West Highway, Suite 1000, Bethesda, Maryland 20814

Evaluating Your Company s Data Protection & Recovery Plan

UCAA Expansion Application Insurer User Guide December 2017

FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools

Business Online Banking Services Agreement

Citibank Online & Citi Mobile App

YOUR RIGHTS AND RESPONSIBILITIES

EXCEL FEDERAL CREDIT UNION S Online Banking External Transfer Authorization and Service Agreement

Northern Bank & Trust Company Deposit Account Agreement

Following are the features offered by TBSB for Internet Banking; Index. Particulars

Fees There are currently no separate monthly or transaction fees assessed by the Bank for use of the Online Banking Service including the External

CUA Credit Cards. Conditions of Use and Credit Guide

January to June 2016 fraud update: Payment cards, remote banking and cheque

Business Online Banking Services Agreement

How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations

Privacy and Security Issues Facing Qualified Retirement Plans

State Bank Financial State Bank Shelby 4020 Mormon Coulee Road La Crosse WI ELECTRONIC FUND TRANSFER AGREEMENT AND DISCLOSURE

Consumer Internet Banking Agreement

Frequently Asked Questions Guide

2012 Payments Fraud Survey

Bank of Wisconsin Dells Personal Online Banking Agreement and Disclosures (05/2017)

Consumer Electronic Fund Transfer Agreement and Disclosure

Federal Home Loan Bank of Boston Correspondent Services Control Standards for Members. Table of Contents

Open24 Online Banking Terms and Conditions

ELECTRONIC FUND TRANSFER DISCLOSURE AND AGREEMENT. Martha's Vineyard Savings Bank 78 Main Street Edgartown, MA

ONLINE BANKING SERVICE AGREEMENT

Online and Electronic Banking Services Agreement

Compliance With the Red Flags Rules

ALOSTAR BANK OF COMMERCE AGREEMENT FOR ONLINE SERVICES

Monterey County Bank Internet Banking Standard Services Agreement

Engage Current Account Terms & Conditions

A Review of Actual Fraud Cases in 2017 FRAUD REVIEW

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

How to Participate. March 21, 2016

business online banking agreement

THE ELECTRONIC BANKING SERVICES AGREEMENT I. ACCEPTING THE ELECTRONIC BANKING SERVICE AGREEMENT

THE COOPER UNION FOR THE ADVANCEMENT OF SCIENCE AND ART. February 24, 2010

Terms and Conditions Governing Electronic Banking Service

Advia Credit Union 24 Hour Online, Text and Mobile Banking Access Agreement

Pinnacle Bank Online Banking Services Agreement (version effective as of June 13, 2017)

MASTHAVEN BANK FIXED RATE BOND TERMS AND CONDITIONS

Bill Payment and Electronic Funds Transfer Service Agreement

Digital Banking Service Agreement (Consumer & Business) (Version December 2017)

first direct Credit Card Terms

Website Terms and Conditions

Manage Your Account. User Guide. Retirement planning made easier by Legal & General

Payment Center Quick Start Guide

Bank Secrecy Act OFAC FinCEN

Important Information on Security Regarding Electronic Account Access and Regular Payment Arrangements

SBA 7(a) Lender Portal Overview

Customer Protection Policy (Unauthorized Electronic Banking Transactions)

Guide to working with Smart Pension via pensionsync

Identity thieves use a variety of ways to gain access to your personal information:

Certifying Mortgages for Freddie Mac. User Guide

Terms and Conditions. Indian Rupee Travel Card

Financial Institution IOLTA Account Manual

BNC Online Banking Services Agreement (Version effective June 27, 2016)

ebanking Agreement and Disclosure

DISCLOSURE FOR ELECTRONIC FUND TRANSACTIONS (EFT) AND WIRE TRANSFER NOTIFICATION

Transcription:

O P C S (OPCS) opcs.ohio.gov 1 OPCS Overview The implementation of the Ohio Pooled Collateral System creates a unique partnership between: Treasurer s Office Financial Institutions Local Governments opcs.ohio.gov 2 1

OPCS Overview The Ohio Pooled Collateral System allows for participating Financial Institutions (FI) to pool collateral for Ohio Public Unit s (PU) deposits. The Treasurer of State (TOS) is the sole administrator and monitor of the program. FI s will chose to 1) participate in the pooling method (OPCS) collateralizing at 102% or a rate set by the Treasurer s Office in rule or 2) not participate in OPCS and collateralize all public entities with specific pledge method at 105%. opcs.ohio.gov 3 Benefits of OPCS Centralized collateral monitoring will save time and resources for local governments by shifting the administrative burden for managing pledged collateral to the Treasurer s Office. Provides administrative benefits for financial institutions by streamlining the processing and management of pledged collateral. Guards against fraud since the TOS will be able to see all pledged collateral compared to the total amount of public deposits at a financial institution. OPCS does not impact a local governments ability to select which eligible institution will hold its deposits. opcs.ohio.gov 4 2

Public Unit Responsibilities Public Units will Participate in OPCS Using the Following Methods: The Treasurer of State will provide market pricing of all collateral and publish the reports on the OPCS portal. Public Units will be responsible for reviewing and monitoring the reports posted, verifying the accuracy of reports of their itemized deposits, and reporting any discrepancies to their financial institution. The Treasurer of State will provide OPCS access to the public units. Public units shall periodically certify account details, including deposit balances, and contact details are correct, in accordance with the schedule set by the Treasurer of State. Public Units may negotiate a public unit negotiated collateral requirement for individual accounts with their financial institution, which may be higher than the statutory collateral requirement or the reduced collateral floor as applicable. opcs.ohio.gov 5 Why OPCS? opcs.ohio.gov 6 3

OPCS Portal opcs.ohio.gov 7 OPCS opcs.ohio.gov 8 4

OPCS Home Page This dashboard will allow you to see if your financial institution has submitted their files on time to TOS opcs.ohio.gov 9 OPCS Dashboards This dashboard will display collateral sufficiency information for your Local Government. The information on the dashboards can be exported to excel. opcs.ohio.gov 10 5

OPCS Dashboards opcs.ohio.gov 11 SCALE opcs.ohio.gov 12 6

Model Objectives The Treasurer's Office used the following objectives when drafting the Model: o o o o o o Be stringent, but fair Be transparent, objective, and externally reproducible be predictable Only use data for evaluation from externally and publically available sources, no additional data requested from FIs Evaluate a FI s micro-economic condition, as well as its relative position to Ohio, regional, and national peer groups Evaluate and take into account macro-economic issues indicators Recognize and risk account when external market data elements are unavailable for a FI opcs.ohio.gov 13 SCALE SCALE Components Sensitivity to Risk is the degree to which changes in interest rates, foreign exchange rates, commodity prices, or equity prices can adversely affect a bank s earnings or economic capital. Capital Adequacy is a measurement of a bank to determine if solvency can be maintained due to risks that have been incurred as a course of business. Asset Quality evaluates risk, controllability, adequacy of loan loss reserves, and acceptable earnings; and the effect of off-balance sheet earnings and loss. Liquidity is what a bank requires if funding is interrupted and the bank must still be able to meet certain obligations, i.e. the bank's ability to repay depositors and other creditors without incurring excessive costs. Earnings determine the ability of a bank to increase capital (through retained earnings), absorb loan losses, support the future growth of assets, and provide a return to investors. opcs.ohio.gov 14 7

Questions 15 Thank You! 16 8

Agenda 1 Types of Fraud 2 Why it Matters? Price to Pay? Statistics 3 Samples of Fraud 4 Tools to ID Fraud 5 Legislation to Address 9

2016 9/28/2017 Types of Fraud Four types of risk to watch for in all daily operations Check ACH/Wire Card Cyber Four areas we ll discuss today Statistics How can you detect fraud Visual samples How can you mitigate the risk of fraud payment fraud affected 73% OF ORGANIZATIONS with typical loss of $20,000* 2016 AFP Payments Fraud and Control Survey; * 2015 AFP Payments Fraud and Control Survey 10

71% 39% Check Fraud Card Fraud 48% 25% Wire Fraud ACH / Debit Fraud Wire Fraud 2016 AFP Payments Fraud and Control Survey $2,500 $2,000 $150,046 $1,500 $1,221 $1,000 $730 $500 $0 $105 $138 $217 Debit Card Credit Card ATM Withdrawals ACH Check Wire 2013 Federal Reserve Payments Survey 2015 Wire Fraud Stats - Internet Crime Complaint Center (IC3) Business E-mail Compromise.htm 11

Statistics 91% of successful data breaches started with a spear phishing attack. Ransomware was a 1 Billion dollar criminal business in 2016 and continues to grow. There was a 752% increase in new ransomware families in 2016. Less than half that paid the ransom (45%) got their information back. CEO Fraud (aka) Business Email Compromise) causes $5.3 billion in damages. Recent studies show that over 54% of users click on a phishing link in under 60 minutes Average cost per record of a data breach is $221 in the US Average cost per incident of a data breach is $7 million in the US Information from IBM/Ponemon Institute 2016 Study ACH/Wire Check Card Cyber 12

Samples of Fraud Check Fraud Altered dollar amount Forgery Stolen or reprinted stock Check ACH/Wire Card Cyber Check ACH/Wire Card Cyber 13

25% of organizations were subject to at least one ACH fraud attempt in 2015 resulting in financial loss Share rises to 26% among large organizations with more than 100 accounts Reasons why the organization was financially responsible for the losses sustained from the ACH fraud include: Not reconciling accounts on a timely basis Not using ACH debit blocks or ACH debit filters and ACH Positive Pay Frequency of Attempted or Actual ACH Fraud (Percentage Distribution of Organizations Subject to At Least One Attempt at ACH Fraud in 2015) # of ACH Fraud Attempts All Respondents 1 to 5 72% 6 to 10 13% 11 to 20 5% 16-20 2% 21 or more 9% ACH return not being timely Check ACH/Wire Card Cyber 2016 AFP Payments Fraud and Control Survey Business E-Mail Compromise Growing number of email accounts of authorized officers within corporate companies are compromised by fraudsters called Masquerading The fraudster takes over an executive s email or uses a spoofed email that appears to be from the executive. The fraudster, posing as the executive, emails lower lever employees instructing them to send a wire or ACH. The employees receiving the request do not question the email and have the wire or ACH imitated (usually internationally). Mitigation Strategies Instituting maximum online security including strong authentication practices on your email and your entire network to mitigate this fraud. Do not rely on written email payment orders or faxed payment order requests as your approval as authorization to execute your wires, instead call your Sr. Managers to confirm Check ACH/Wire Card Cyber Jan 2015 Public Service Announcement by the Department of Justice: FBI Wire Fraud Stats - Internet Crime Complaint Center (IC3) Business E-mail Compromise.htm 14

Sample of Masquerading Check ACH/Wire Card Cyber Check ACH/Wire Card Cyber 15

Action Steps Clear Logins and Passwords, especially if using a public computer Be alert for phishing always verify a site is secure (indicated by https://) when entering card info Verify your address with both the Post Office and your financial institution; notify card companies prior to a change in address Utilize authorization controls to restrict purchases Monitor transaction activity on an ongoing basis Reconcile accounts on a regular basis at minimum monthly Things to Avoid Avoid leaving your card(s) unattended at work more credit card thefts occur in the workplace than anywhere else Avoid giving your card number over the phone whenever possible; only give it when you have initiated the call and need to place an order Do not leave your card in a vehicle loose cash and cards are easy targets Avoid signing a blank receipts (or leaving any line incomplete) most often occurs at resturants or bars Check ACH/Wire Card Cyber Authorization Controls Set specific authorization parameters including: Corporate Credit Limit Determines the maximum amount that may be spent through combined purchasing activity of all cardholders in the organization. Cardholder Credit Limit Determines the total purchasing activity available per cardholder or card. Dollars per Transaction Restricts the maximum dollar amount of any purchase made. Dollars and Transactions Limit Establishes the maximum dollar amount or number of transactions that will be authorized each specified period (i.e., day, month, cycle, year). Merchant Category Codes (MCC) Enables your organization to restrict use of card at specific categories of business Check ACH/Wire Card Cyber 16

Check ACH/Wire Card Cyber How to Detect Cyber Fraud Urgency to click on a link to update or verify account information and often mention negative consequences for failing to respond. Unexpected and may be inconsistent with other emails from the company. Sometimes contain spelling errors and bad grammar. May come from a company with whom you do not currently do business. Ask for information they should already know or shouldn t need to know. Contain a link in the email that you are urged to click and when you hover over that link, it does not appear to be related to the company sending the message. Includes an attachment you are urged to open or download. Check ACH/Wire Card Cyber 17

Check ACH/Wire Card Cyber Check ACH/Wire Card Cyber 18

Check ACH/Wire Card Cyber Detecting Malware How can I tell if my computer has spyware running on it? By design, spyware is difficult to detect, but here are some things you may notice: Additional toolbars added to your web browser that you did not authorize. Pop-up windows that advertise services that you did not request. Unusual windows that show up and possibly go away when you start your computer or are browsing the Internet. Unusual links showing up in web pages where there are not usually links. These links will probably lead to web pages advertising some service. An unusual slow down in your computer s performance. The appearance of unexpected programs in your computer s startup folder. Check ACH/Wire Card Cyber 19

Legislation Ohio Revised Code Current Legislation - Ohio House Bill 312 Commercial Card / Purchasing Cards Requires controls and policies Best Practices ORC 135.185 Ohio Collateral Reform Thank You For Your Time 20