<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:thr="http://purl.org/syndication/thread/1.0">
    <title>Bank Lawyer&#39;s Blog</title>
    <link rel="self" type="application/atom+xml" href="http://www.banklawyersblog.com/3_bank_lawyers/atom.xml" />
    <link rel="alternate" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/" />
    <id>tag:typepad.com,2003:weblog-29532</id>
    <updated>2015-05-10T14:03:37-05:00</updated>
    <subtitle>Commentary on Banking Law</subtitle>
    <generator uri="http://www.typepad.com/">TypePad</generator>
    <entry>
        <title>Vendor Mismanagement</title>
        <link rel="alternate" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2015/05/vendor-mismanagement.html" />
        <link rel="replies" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2015/05/vendor-mismanagement.html" />
        <id>tag:typepad.com,2003:post-6a00d8341c652b53ef01b8d111955a970c</id>
        <published>2015-05-10T14:03:37-05:00</published>
        <updated>2015-05-10T14:03:37-05:00</updated>
        <summary>While banks have complained about the crushing burden of regulations in a post-Franken-Dodd world, in one area they could use a little more regulation. Not of the banks, but of third-party service providers to banks. I have yapped repeatedly on...</summary>
        <author>
            <name>Kevin</name>
        </author>
        <category scheme="http://www.sixapart.com/ns/types#category" term="Banking Law-General" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Compliance" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Electronic Banking" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="FFIEC" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Governance" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="OCC" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Outsourcing" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Risk Management" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Web/Tech" />
        
        
<content type="xhtml" xml:lang="en-US" xml:base="http://www.banklawyersblog.com/3_bank_lawyers/">
<div xmlns="http://www.w3.org/1999/xhtml"><p><a class="asset-img-link" href="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef01b7c788133b970b-popup" onclick="window.open( this.href, &#39;_blank&#39;, &#39;width=640,height=480,scrollbars=no,resizable=no,toolbar=no,directories=no,location=no,menubar=no,status=no,left=0,top=0&#39; ); return false" style="float: left;"><img alt="Unreasonable" class="asset  asset-image at-xid-6a00d8341c652b53ef01b7c788133b970b img-responsive" src="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef01b7c788133b970b-120wi" style="margin: 0px 5px 5px 0px;" title="Unreasonable" /></a>While banks have complained about the crushing burden of regulations in a post-Franken-Dodd world, in one area they could use a little more regulation. Not of the banks, but of third-party service providers to banks.</p>
<p>I have yapped repeatedly on this rag sheet about how banks need to treat regulatory guidance seriously. While some regulators <a href="http://www.banklawyersblog.com/3_bank_lawyers/2014/04/a-recent-article-in-the-aba-banking-journal-by-steve-cocheoquotes-an-fdic-official-as-clarifying-a-point-that-needs-to-be-cla.html" target="_self">send confusing signals</a> about the legal enforceability of guidance, they have also made clear that <a href="http://www.banklawyersblog.com/3_bank_lawyers/2014/05/is-vendor-risk-scoring-mandatory.html" target="_self">they expect banks to comply with it</a>. Period.</p>
<p>One piece of guidance that we have discussed is <a href="http://www.occ.gov/news-issuances/bulletins/2013/bulletin-2013-29.html" target="_self">OCC Bulletin 2013-29</a> regarding third party relationships, which is a reworking and expansion of guidance first issued in in 2001 (OCC Bulletin 2001-47). Other federal financial institution regulators have issued similar guidance. One portion of that guidance deals with provisions that the OCC expects to be incorporated into written agreements between banks and their service providers. Banks who take regulatory guidance seriously attempt to ensure that their written agreements with their significant vendors meet the regulators&#39; expectations.</p>
<p>If some technology service providers are to be believed, not many banks take the guidance seriously.</p>
<p>Repeatedly, attorneys who advise banks on such agreements will hear a common complaint: the bank asking for such a contractual provision is the only bank that has ever asked the vendor for the same. Putting aside my stock response (&quot;You&#39;ll never be able to say that again, will you?&quot;), let&#39;s take them at their word and see what this means.</p>
<p>Let&#39;s pick two provisions, access by the bank&#39;s regulators to the service provider&#39;s records concerning the services it provides to the bank, and a binding agreement by the vendor to provide the bank with a disaster recover plan and modifications to it. These aren&#39;t the only provisions. There are many more, but I don&#39;t make a living off this blog, so they&#39;ll have to do for now.</p>
<p>OCC Bulletin 2013-29 provides in part as follows:</p>
<blockquote>
<p><em><strong>In contracts with service providers, stipulate that the performance of activities by external parties for the bank is subject to OCC examination oversight, including access to all work papers, drafts, and other materials. The OCC treats as subject to 12 USC 1867(c) and 12 USC 1464(d)(7), situations in which a bank arranges, by contract or otherwise, for the performance of any applicable functions of its operations. Therefore, the OCC generally has the authority to examine and to regulate the functions or operations performed or provided by third parties to the same extent as if they were performed by the bank itself on its own premises.</strong></em></p>
</blockquote>
<p>That&#39;s pretty clear. Yet, we have repeatedly encountered service providers, including one of the major technology service providers in the United States, who have resisted such a contractual &quot;stipulation&quot;. In one discussion, a service provider that was providing an online banking system and related customer-facing services asked the bank to cite the provision of the law that gave the OCC the right to have such access. When we gave it the citation to 12 USC 1867(c), it responded that its inside counsel did not agree with the OCC&#39;s interpretation of the Bank Service Company Act, and that examinations that it had permitted the OCC to make were purely voluntary and could be terminated at any time. We responded that we didn&#39;t give a flying fig in a rolling donut what its in-house counsel thought about the OCC&#39;s interpretation, since the law was clear on its face. In that case, we compromised on language that required such regulatory access &quot;as is required by applicable law.&quot; However, we were told by that vendor that other banks did not insist on such a provision in the agreement.</p>
<p>With respect to business continuity plans, OCC Bulletin 2013-29 provides the following:</p>
<blockquote>
<p><strong><em>Ensure that the contract requires the third party to provide the bank with operating procedures to be carried out in the event business resumption and disaster recovery plans are implemented. Include specific time frames for business resumption and recovery that meet the bank’s requirements, and when appropriate, regulatory requirements. Stipulate whether and how often the bank and the third party will jointly practice business resumption and disaster recovery plans.</em></strong></p>
</blockquote>
<p>Recently, we have encountered a technology service provider who provides a critical online banking service that absolutely refuses to agree to any provision in the agreement that addresses business continuity plans or procedures. While it states that it has such a plan and that the bank can review it, it will not agree to put anything in the contract regarding such plans. Again, the bank was informed by the vendor that it has never agreed to provide such contractual protection to a financial institution, and that no other bank has insisted upon it. Again, this is a critical service provider whose service, if it went &quot;offline&quot; for any length of time, would cause intense heartburn to the bank.</p>
<p>These are only two examples. There are many, many more. It&#39;s as if not only are many vendors unaware of requirements that their bank clients must meet (and that have been required for over a decade), but that many banks do not care about complying with regulatory guidance. In the case of smaller institutions, there is also the problem that they lack the expertise to negotiate, or perhaps they believe that they do not have sufficient importance to the vendor to bargain effectively. Whatever the reasons, many of them are rolling over with their paws in the air instead of trotting in the other direction.</p>
<p>This leaves those banks that take regulatory guidance seriously in a tough position. Some of them are simply walking away and trying to find vendors who &quot;get it,&quot; even if they are not the first choice from a purely business standpoint. Others end up negotiating with themselves to arrive at less-than-reasonable contractual compromises.</p>
<p>I have a couple of suggestions for the regulators. First, try enforcing the guidance across the board. There are financial institutions who are trying to &quot;do it right,&quot; but who are being undercut by those who aren&#39;t. Moreover, use your authority under the Bank Service Company Act and otherwise to bring home to the vendors directly that if they want to play in this arena, they need to play by your rules. Some of them are not getting the message. Perhaps it would be helpful to start naming names on both ends of the spectrum. Perhaps that would get some attention.</p>
<p>In fairness, there are technology service providers who are doing it right. They understand the guidance, and while they are not willing to fall over and play dead, they are willing to make a reasonable attempt to accommodate what is essentially appropriate risk allocation between the parties, and appropriate accommodation to their customers&#39; regulators&#39; expectations. They &quot;get it.&quot; Here&#39;s hoping that more of them eventually get the message, as well.</p></div>
</content>


    </entry>
    <entry>
        <title>What&#39;s Good For The Bank Is Good For The Bank Lawyer</title>
        <link rel="alternate" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2014/11/whats-good-for-the-bank-is-good-for-the-bank-lawyer.html" />
        <link rel="replies" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2014/11/whats-good-for-the-bank-is-good-for-the-bank-lawyer.html" />
        <id>tag:typepad.com,2003:post-6a00d8341c652b53ef01bb07a8914d970d</id>
        <published>2014-11-09T22:13:00-06:00</published>
        <updated>2014-11-09T22:13:00-06:00</updated>
        <summary>Recent articles in the Wall Street Journal (paid subscription required) point out an inconvenient truth for many bank law firms: as third party service providers, they, too, must ensure that their information security systems are &quot;up to snuff.&quot; Big banks...</summary>
        <author>
            <name>Kevin</name>
        </author>
        <category scheme="http://www.sixapart.com/ns/types#category" term="Banking Law-General" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="CFPB" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Compliance" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Contracts" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Current Affairs" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Electronic Banking" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Ethics" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="FFIEC" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Practice of Law" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Risk Management" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Web/Tech" />
        
        
<content type="xhtml" xml:lang="en-US" xml:base="http://www.banklawyersblog.com/3_bank_lawyers/">
<div xmlns="http://www.w3.org/1999/xhtml"><p><a class="asset-img-link" href="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef01b8d08d54e2970c-popup" onclick="window.open( this.href, &#39;_blank&#39;, &#39;width=640,height=480,scrollbars=no,resizable=no,toolbar=no,directories=no,location=no,menubar=no,status=no,left=0,top=0&#39; ); return false" style="float: left;"><img alt="Information Security" class="asset  asset-image at-xid-6a00d8341c652b53ef01b8d08d54e2970c img-responsive" src="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef01b8d08d54e2970c-120wi" style="margin: 0px 5px 5px 0px;" title="Information Security" /></a>Recent articles <a href="http://online.wsj.com/articles/banks-demand-that-law-firms-harden-cyberattack-defenses-1414354709" target="_self">in the Wall Street Journal</a> (<em>paid subscription required</em>) point out an inconvenient truth for many bank law firms: as third party service providers, they, too, must ensure that their information security systems are &quot;up to snuff.&quot;</p>
<blockquote>
<p><strong><em>Big banks are demanding that their law firms do more to protect sensitive information to ensure that they don’t become back doors for hackers.</em></strong></p>
<p><strong><em>Once given special status as trusted third parties, lawyers, particularly those who get access to sensitive bank information, now are more likely to get full background checks. The number of compliance checklists for law-firm technology systems and security procedures has ballooned. And law firms big and small increasingly are getting on-site audits to check who has access to documents and office servers.</em></strong></p>
<p><strong><em>[...]</em></strong></p>
<p><strong><em>The demands come as financial regulators are paying more attention to third-party vendors. <a href="http://topics.wsj.com/person/L/Benjamin-Lawsky/6754"> Benjamin Lawsky </a>, the superintendent of New York state’s Department of Financial Services, last week sent a letter to dozens of banks <a href="http://online.wsj.com/articles/lawsky-targets-banks-cyberattack-vulnerability-1413941506" target="_new">requesting information</a> on security risks relating to law firms, accounting firms and other third parties.</em></strong></p>
<p><strong><em>Law firms “can have access to a very large volume of sensitive data on a recurring basis and that makes them a point of vulnerability,” Mr. Lawsky said.</em></strong></p>
</blockquote>
<p>When &quot;Gentle Ben&quot; Lawsy speaks, lawyers better listen. Not because he possesses any special insight into the banks he regulates (his background in actual banking is non-existent), but because he&#39;s demonstrated that he intends to follow in the footsteps of his role model, Eliot &quot;Mess&quot; Spitzer, by pursuing publicity-laden enforcement actions against victims that the public loves to loathe. Banks and lawyers might as well have a bulls-eye painted on their foreheads.</p>
<p>Thus far, it appears that big banks and their big firm minions are first in line for proctoscopic examinations. However, how long will it be before the &quot;trickle down&quot; theory of bank regulation that we&#39;ve seen prove itself again and again since the creation of Franken-Dodd and its dark spawn, the CFPB, will spread this &quot;closer look&quot; process to smaller banks and their law firms? Not long, I think, even if you measure the passage of time in dog years.</p>
<p>It&#39;s hard to argue that law firms for banks of any size should be cut any slack. The <a href="http://www.federalreserve.gov/bankinforeg/interagencyguidelines.htm" target="_self">Interagency Guidelines Establishing Information Security</a>, the relevant regulatory guidance on third party relationships (such as <a href="http://www.occ.gov/news-issuances/bulletins/2013/bulletin-2013-29.html" target="_self">OCC Bulletin 2013-29</a>), and basic ethical requirements to protect the confidentiality of client information, should have impelled lawyers for banks to take information security in an online world quite seriously long before this point. In many cases, engagement agreements between law firms and bank clients already specifically require that law firms take the kind of security precautions that big banks are requiring of their law firms. True, &quot;one size does not fit all&quot; may be as true of bank law firms as it is of the banks they represent, so, perhaps, not every law firm will need to have inn place all of the precautions described in the linked article.</p>
<blockquote>
<p><strong><em>Some firms instruct attorneys not to open documents sent via email unless they are in a secure environmentin the office, or using a firm laptop on an encrypted line. For particularly sensitive matters, firms might restrict work to stand-alone computers that don’t connect to the Internet, said Mary E. Galligan, a Federal Bureau of Investigation veteran who now is a director of cyberrisk services at consulting and accounting firm Deloitte &amp; Touche LLP.</em></strong></p>
<p><strong><em>Mobile devices are a particular focus. Many firms can wipe data from smartphones and laptops that are lost or stolen, and most firms install some level of encryption.</em></strong></p>
<p><strong><em>Law firm Davis Polk &amp; Wardwell LLP in recent weeks added a new precaution: Lawyers must have a special application installed on their smartphones to open attachments sent to their firm addresses.</em></strong></p>
</blockquote>
<p>On the other hand, those security measures make sense and many of them are not unreasonably expensive to implement. Those firms that don&#39;t want to encounter a nasty (and expensive) surprise would be wise to take this concern seriously, and prepare for such an examination, whether or not one is ever actually performed.</p></div>
</content>


    </entry>
    <entry>
        <title>The Stickiness of Browsewrap</title>
        <link rel="alternate" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2014/09/the-stickiness-of-browsewrap.html" />
        <link rel="replies" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2014/09/the-stickiness-of-browsewrap.html" />
        <id>tag:typepad.com,2003:post-6a00d8341c652b53ef01b7c6db3751970b</id>
        <published>2014-09-07T21:41:00-05:00</published>
        <updated>2014-09-07T21:41:00-05:00</updated>
        <summary>A recent client alert from Arent Fox discusses a potential problem for every bank that has a website, which, I assume, means almost every bank. A decision of the US Ninth Circuit Court of Appeals held against Barnes &amp; Noble,...</summary>
        <author>
            <name>Kevin</name>
        </author>
        <category scheme="http://www.sixapart.com/ns/types#category" term="Consumer Law-General" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Contracts" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Electronic Banking" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Litigation" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Risk Management" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Web/Tech" />
        
        
<content type="xhtml" xml:lang="en-US" xml:base="http://www.banklawyersblog.com/3_bank_lawyers/">
<div xmlns="http://www.w3.org/1999/xhtml"><p><a class="asset-img-link" href="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef01b7c6db374b970b-popup" onclick="window.open( this.href, &#39;_blank&#39;, &#39;width=640,height=480,scrollbars=no,resizable=no,toolbar=no,directories=no,location=no,menubar=no,status=no,left=0,top=0&#39; ); return false" style="float: left;"><img alt="Binding_agreement" class="asset  asset-image at-xid-6a00d8341c652b53ef01b7c6db374b970b img-responsive" src="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef01b7c6db374b970b-120wi" style="margin: 0px 5px 5px 0px;" title="Binding_agreement" /></a>A recent <a href="http://www.arentfox.com/newsroom/alerts/ninth-circuit-website-owners-dont-bury-terms-use#.VAx7qBZ_MqR" target="_self">client alert from Arent Fox</a> discusses a potential problem for every bank that has a website, which, I assume, means almost every bank. A decision of the US Ninth Circuit Court of Appeals held against Barnes &amp; Noble, which attempted to force a customer to abide by the alternative dispute resolution terms that were contained in B&amp;N&#39;s &quot;terms of use&quot; (TOU) that governed the use of its website. Visitors to the website are notified of the existence of the TOU through a highlighted &quot;hyperlink&quot; at the bottom of the website&#39;s homepage (you can view B&amp;N&#39;s homepage <a href="http://www.barnesandnoble.com/" target="_self">here</a> and scroll to the very bottom of the page, left-hand corner, to see the link). The TOU also appeared, underlined and in different colored font, at the bottom of each web page that the customer used during the check-out process. According to the court, that wasn&#39;t sufficient notice of the TOU, at least not sufficient to bind a consumer to the binding arbitration provisions.</p>
<blockquote>
<p><strong><em>It then went on to explain that, in situations where a website owner wishes to bind a user to the terms in a browsewrap agreement, “the validity of the browsewrap agreement turns on whether the website puts a reasonably prudent user on inquiry notice of the terms of the contract” and that, in turn, “depends on the design and content of the website and the agreement’s webpage.”</em></strong></p>
<p><strong><em>[...]</em></strong></p>
<p><strong><em>In fact, the Ninth Circuit explicitly held that making the Terms of Use available for review via a conspicuous hyperlink is insufficient to create constructive notice:</em></strong></p>
<p style="margin-left: 20px;"><strong><em>[W]e therefore hold that where a website makes its terms of use available via a conspicuous hyperlink on every page of the website but otherwise provides no notice to users nor prompts them to take any affirmative action to demonstrate assent, even close proximity of the hyperlink to relevant buttons users must click on — without more — is insufficient to give rise to constructive notice. While failure to read a contract before agreeing to its terms does not relieve a party of its obligations under the contract … the onus must be on website owners to put users on notice of the terms to which they wish to bind consumers. Given the breadth of the range of technological savvy of online purchasers, consumers cannot be expected to ferret out hyperlinks to terms and conditions to which they have no reason to suspect they will be bound.</em></strong></p>
</blockquote>
<p>The author of the client alert, Dana Finberg, thinks that the implicit lesson of the decision may be that &quot;browsewrap&quot; TOU agreements may have to adopt many of the features of &quot;clickwrap&quot; TOU agreements (where the customer actually has to give affirmative consent to having read and agreed to the terms by &quot;clicking&quot; a &quot;I Agree&quot; button or via a similar process), &quot;at least as to individual consumers using commercial websites.&quot;</p>
<p>Obviously, using a &quot;clickwrap&quot; process, whereby all visitors to a bank&#39;s website, before they can use it, must affirmatively consent that they agree to the website&#39;s TOU, is the legally safest method of ensuring enforceability. It&#39;s also a process designed to discourage customers and potential customers from using the website, which is why most banks and other businesses don&#39;t use it (see, as only one example, <a href="https://www.chase.com/" target="_self">Chase Bank&#39;s website&#39;s homepage</a>, where the TOU is buried at the bottom of the page and not even highlighted).</p>
<p>A middle ground might be to draw the reader&#39;s attention to the TOU by other means, such as content that explicitly states that the use of the website is subject to the TOU and that draws the reader&#39;s attention through size, color, and/or other variations from the other content. At the very least, the business must consider the risks of using browsewrap rather than clickwrap agreements for its TOU, and consider the impact of those risks on the content of the TOU. For example, should binding arbitration provisions ever be contained solely in a TOU that is presented to a consumer solely as a &quot;browsewrap&quot; agreement? What other processes might make sense to ensure the enforceability of such critical terms? Should separate processes be used with respect to agreements with web site users who are not customers and web site users who are customers?</p>
<p>Are we having fun yet?</p></div>
</content>


    </entry>
    <entry>
        <title>BancSouth Wins Big</title>
        <link rel="alternate" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2014/06/bancsouth-wins-big.html" />
        <link rel="replies" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2014/06/bancsouth-wins-big.html" thr:count="0" />
        <id>tag:typepad.com,2003:post-6a00d8341c652b53ef01a511d2c24e970c</id>
        <published>2014-06-22T21:57:00-05:00</published>
        <updated>2014-06-22T21:57:00-05:00</updated>
        <summary>A recent Eighth Circuit Court of Appeals decision in favor of BankSouth bodes well for financial institutions who understand their obligations under UCC Article 4A and take those obligations seriously. Unlike consumer customers, who are pretty much protected against unauthorized...</summary>
        <author>
            <name>Kevin</name>
        </author>
        <category scheme="http://www.sixapart.com/ns/types#category" term="Banking Law-General" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Compliance" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Contracts" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Crime" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Deposits" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Electronic Banking" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="FFIEC" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Litigation" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Risk Management" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Web/Tech" />
        
        
<content type="xhtml" xml:lang="en-US" xml:base="http://www.banklawyersblog.com/3_bank_lawyers/">
<div xmlns="http://www.w3.org/1999/xhtml"><p><a class="asset-img-link" href="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef01a73dde0d91970d-popup" onclick="window.open( this.href, &#39;_blank&#39;, &#39;width=640,height=480,scrollbars=no,resizable=no,toolbar=no,directories=no,location=no,menubar=no,status=no,left=0,top=0&#39; ); return false" style="float: left;"><img alt="Cybercrooks" class="asset  asset-image at-xid-6a00d8341c652b53ef01a73dde0d91970d img-responsive" src="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef01a73dde0d91970d-120wi" style="margin: 0px 5px 5px 0px;" title="Cybercrooks" /></a>A recent Eighth Circuit Court of Appeals decision in favor of BankSouth <a href="http://krebsonsecurity.com/2014/06/ruling-raises-stakes-for-cyberheist-victims/" target="_self">bodes well for financial institutions</a> who understand their obligations under UCC Article 4A and take those obligations seriously. Unlike consumer customers, who are pretty much protected against unauthorized funds transfers by Regulation E if they examine their monthly bank statements and promptly inform their banks of any unauthorized transactions, business customers whose bank accounts are compromised by cybercrooks have much less protection. As the 8th Circuit points out, the inquiry in such instances is focused on whether the bank and customer had agreed upon commercially reasonable security procedures that the bank would use to determine whether or not a purported funds transfer was authorized by the customer and, if so, whether or not the bank employed those security procedures in good faith. If the bank meets that two-pronged test, the business customer is stuck with liability for any unauthorized transfer.</p>
<p>The controversy usually arises when an employee of the business customer has fallen for a &quot;phishing&quot; scheme, clicking on link in an email that causes malware to be downloaded that allows the crooks to learn the user name and password that the employee uses to log in to the online banking system of the bank. In the BancSouth case, that apparently occurred. However, regardless of how access to the password and user name was obtained, the focus of the court was, as it should have been, whether the agreed upon security procedures used by the bank were commercially reasonable and employed by the bank in good faith. In this instance, the court (and the trial court) found that they were.</p>
<p>While the customer&#39;s attorneys argued that the use of a user name and password was &quot;one-factor authentication&quot; that is contrary to FFIEC guidance that advises that &quot;multi-factor authentication&quot; processes should be used, the court countered that argument by finding that the bank offered &quot;dual controls&quot; for wire transfer (separate persons must authorize the initial funds transfer request and the confirmation of that transfer order), the customer opted not to use such a procedure on the grounds that it was &quot;inconvenient.&quot; More cautious banks not only offer dual controls, they require it unless the customer signs a separate agreement or waiver under which it indemnifies the bank from any claims, loss, or liability arising out of unauthorized transfers from the account under a single-control authorization process. BancSouth had such a waiver and the customer signed it.</p>
<p>BancSouth&#39;s online banking agreement also contained an indemnification provision that is common in online banking agreements in one form or another, pursuant to which the customer agreed to indemnify and hold the bank harmless from claims, losses, liabilities, costs and expenses, including reasonable attorneys&#39; fees, arising out of the bank&#39;s provision of services, as long as the bank fulfilled its obligations. The appellate court ruled that this provision provided a sufficient basis for the bank to pursue a claim against its customer for payment of attorneys&#39; fees, and overturned the trial court&#39;s denial of a counterclaim by the bank for such fees. Again, well-drafted online banking agreements ought to contain a similar provision.</p>
<p>Dan Mitchell, an attorney who has been involved in other high-profile litigation on this subject, and another commenter, had some cogent observations on the implications of this decision.</p>
<blockquote>
<p><strong><em>Perhaps most significantly, Mitchell said, the decision could be a blow to companies trying to recover cyberheist losses from their banks. Bancorp South had asserted at the trial court level that its contract with Choice Escrow indemnified it against paying legal fees in such a dispute. The trial court dismissed that claim, but the appeals court said in its decision that the bank could&#0160;recover the costs from the escrow firm. <span id="more-26477"></span></em></strong></p>
<p><strong><em>&quot;The bank had asserted a counterclaim that the customer should pay the bank’s legal fees,&quot; said Mitchell, who battled similar claims in which Patco — a Maine construction firm — <a href="http://krebsonsecurity.com/2012/07/court-ruling-could-be-boon-to-cyberheist-victims/" target="_blank" title="http://krebsonsecurity.com/2012/07/court-ruling-could-be-boon-to-cyberheist-victims/">successfully sued its bank over a $588,000 cyberheist</a>. &quot;There’s no other federal circuit court case other than Patco that has gotten up to that level. The appeals court said the bank can now pursue its legal fees against the customer. And that may end up being the important part of this opinion in the long run if [plaintiffs are]&#0160;looking at not only have to pay their lawyers to pursue a loss but also those of the bank.&quot;</em></strong></p>
<p><strong><em>Charisse Castagnoli, an&#0160;adjunct professor of law at the John Marshall Law School, said the appeals court decision means that indemnification is now the ‘law of the land’ in the 8th Circuit.</em></strong></p>
<p><strong><em>Castagnoli said she expects two results from this decision: that banks which don’t already have these clauses in their online banking agreements will add them; and that cyberheist victims&#0160;will think more cautiously about bringing a lawsuit.</em></strong></p>
<p><strong><em>&quot;This is the first time a court has ruled on fee shifting, and that will certainly have a chilling effect on litigation,&quot; Castagnoli said.</em></strong></p>
</blockquote>
<p>The opinion contains other nuances that are worth considering. The linked article from Brian Krebs&#39; excellent blog contains a link to the opinion.</p></div>
</content>


    </entry>
    <entry>
        <title>When Curry Speaks, All Banks Should Listen</title>
        <link rel="alternate" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2014/04/when-curry-speaks-all-banks-should-listen.html" />
        <link rel="replies" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2014/04/when-curry-speaks-all-banks-should-listen.html" thr:count="1" thr:updated="2014-04-18T12:26:42-05:00" />
        <id>tag:typepad.com,2003:post-6a00d8341c652b53ef01a511a230d8970c</id>
        <published>2014-04-17T21:45:00-05:00</published>
        <updated>2014-04-17T21:45:00-05:00</updated>
        <summary>The Comptroller of the Currency Thomas Curry gave a speech the other day (paid subscription required), and emphasized a couple of points that vendor management folks at financial institutions with various charters--state and federal, bank and credit union--and the lawyers...</summary>
        <author>
            <name>Kevin</name>
        </author>
        <category scheme="http://www.sixapart.com/ns/types#category" term="Banking Law-General" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Compliance" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Contracts" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Electronic Banking" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="FFIEC" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="OCC" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Officers &amp; Directors" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Outsourcing" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Risk Management" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Web/Tech" />
        
        
<content type="xhtml" xml:lang="en-US" xml:base="http://www.banklawyersblog.com/3_bank_lawyers/">
<div xmlns="http://www.w3.org/1999/xhtml"><p><a class="asset-img-link" href="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef01a73dad4112970d-popup" onclick="window.open( this.href, &#39;_blank&#39;, &#39;width=640,height=480,scrollbars=no,resizable=no,toolbar=no,directories=no,location=no,menubar=no,status=no,left=0,top=0&#39; ); return false" style="float: left;"><img alt="Thomas-curry" class="asset  asset-image at-xid-6a00d8341c652b53ef01a73dad4112970d img-responsive" src="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef01a73dad4112970d-120wi" style="margin: 0px 5px 5px 0px;" title="Thomas-curry" /></a>The Comptroller of the Currency Thomas Curry <a href="http://www.americanbanker.com/issues/179_74/occ-warns-about-vendor-concentration-foreign-subcontractors-1066939-1.html" target="_self">gave a speech the other day</a> (<em>paid subscription required</em>), and emphasized a couple of points that vendor management folks at financial institutions with various charters--state and federal, bank and credit union--and the lawyers who represent them,&#0160; would be wise to heed.</p>
<blockquote>
<p><em><strong>Comptroller of the Currency Thomas Curry said his agency is increasingly concerned about the cybersecurity risks from banks relying too much on certain vendors and using service providers in foreign countries.</strong></em></p>
<p><em><strong>Banks can end up becoming dependent on certain vendors because of consolidation in the service provider industry, Curry said in his prepared remarks for the Consumer Electronics Show&#39;s Government Summit in Washington. They can also be exposed to risks when they assign critical functions to outside vendors, including those that use foreign-based subcontractors.</strong></em></p>
<p><em><strong>&quot;Banks need to consider the legal and regulatory implications of where their data is stored or transmitted, and make a determination as to whether geographic limitations are needed in their contracts,&quot; Curry said. &quot;Finally — and perhaps most importantly — we are concerned about the access third parties have to large amounts of sensitive bank or customer data.&quot;</strong></em></p>
</blockquote>
<p>Here are a few take-aways:</p>
<p>First, cybersecurity due diligence of your vendor assumes critical importance when that vendor has access to customer data and other sensitive information of the institution. Access to sensitive information ought to make that vendor a &quot;critical&quot; vendor regardless of the dollar &quot;value&quot; of the contract. The institution needs to be able to document that it examined the information security procedures and systems and found that they met industry standards.</p>
<p>Second, the provisions of the agreement between the institution and such vendors on confidentiality and information security need to be &quot;robust.&quot; This is especially critical when one or a couple of vendors of the institution have access to a lion&#39;s share of sensitive data. Read OCC Bulletin 2013-29, FFIEC&#39;s handbooks on the outsourcing of technology services, and other regulatory guidance. Make sure you know what contractual assurances you need and then make sure they&#39;re in the agreement.</p>
<p>Third, the financial institution needs to monitor the compliance of these vendors with information security safeguards throughout the life of the relationship. If a critical vendor&#39;s not providing an annual SASE 16 audit report of an appropriate type (SOC 1 vs. SOC 2), and not addressing problems raised by such annual reviews, you&#39;ve got a problem.</p>
<blockquote>
<p><strong><em><span>&quot;We expect the board and management to ensure that appropriate risk management practices are in place, that clear accountability for day-to-day management of these relationships is established, and that independent reviews of these relationships will be conducted periodically,&quot; Curry said in his remarks Wednesday.</span></em></strong></p>
</blockquote>
<p><span>That&#39;s a red flag, no? </span></p>
<p>Fourth, you need to read between the lines of what Curry&#39;s saying about &quot;certain vendors.&quot; Pay attention to what&#39;s happening in the marketplace. If an article appears in the press that notes problems with a critical vendor, investigate and assure your self that any problems are being addressed. Review the web sites of the regulators for enforcement actions, and pay attention to what you find if a vendor is the subject. Pay attention to your own due diligence. If you gather necessary information but don&#39;t act upon it appropriately, your regulator will not be pleased.</p>
<p>Fifth, foreign subcontractors have become a &quot;hot button&quot; concern. I would recommend that in your vendor agreements with critical vendors you have adequate restrictions on the use of subcontractors. Among those restrictions ought to be that the use of a non-US based subcontractor requires your prior written consent. I represent banks that would never consent, but that&#39;s a story for another day.</p>
<p>If the vendor pushes back, that vendor ought to be a cause for grave concern. They&#39;re not doing you a favor by selling you their technology, although a few of the larger ones act that way, especially if you&#39;re a smaller institution. These concerns are regulatory concerns, matters of safety and soundness. If the vendor is large and representing a number of financial institutions, none of these issues should come as surprise to them. If you have concerns about a vendor, give your federal regulator a call and tell him or her about those concerns. As Curry makes clear, your regulator will be interested. Very interested.</p></div>
</content>


    </entry>
    <entry>
        <title>Vendor Management Is Still A Regulatory Hot Button</title>
        <link rel="alternate" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2013/02/vendor-management-is-still-a-regulatory-hot-button.html" />
        <link rel="replies" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2013/02/vendor-management-is-still-a-regulatory-hot-button.html" />
        <id>tag:typepad.com,2003:post-6a00d8341c652b53ef017ee8b59db3970d</id>
        <published>2013-02-24T21:42:00-06:00</published>
        <updated>2013-02-24T21:42:00-06:00</updated>
        <summary>According to the FDIC, a common theme in IT examination downgrades is poor vendor management by banks. Last year, in 46% of the FDIC IT examinations in which bank ratings were downgraded, inadequate vendor management was cited as a causal...</summary>
        <author>
            <name>Kevin</name>
        </author>
        <category scheme="http://www.sixapart.com/ns/types#category" term="Banking Law-General" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Compliance" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Contracts" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Credit Unions" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Electronic Banking" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="FDIC" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="FFIEC" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="NCUA" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="OCC" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Outsourcing" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Risk Management" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Web/Tech" />
        
        
<content type="xhtml" xml:lang="en-US" xml:base="http://www.banklawyersblog.com/3_bank_lawyers/">
<div xmlns="http://www.w3.org/1999/xhtml"><p>
<a class="asset-img-link" href="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef017c37127987970b-popup" onclick="window.open( this.href, &#39;_blank&#39;, &#39;width=640,height=480,scrollbars=no,resizable=no,toolbar=no,directories=no,location=no,menubar=no,status=no,left=0,top=0&#39; ); return false" style="float: left;"><img alt="Hot Button" class="asset  asset-image at-xid-6a00d8341c652b53ef017c37127987970b" src="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef017c37127987970b-120wi" style="margin: 0px 5px 5px 0px;" title="Hot Button" /></a>According to the FDIC, a common theme in IT examination
downgrades is <a href="www.ababj.com/tech-topics-plus/it-exams-recent-red-flags-related-to-vendor-risk-management-3684.html" target="_self">poor vendor management</a> by banks. </p>
<em><strong>
<blockquote>
<p>Last year, in 46% of the FDIC IT examinations in which bank
ratings were downgraded, inadequate vendor management was cited as a causal
factor, says Donald Saxinger, senior examination specialist in FDIC&#39;s
Technology Supervision Branch. </p>
<p>&quot;I&#39;m not saying it was the primal causal factor, but,
in 46% of the downgrades, vendor management was cited,&quot; Saxinger says. He
spoke during the recent ABA Telephone Briefing &quot;Vendor management: Unlocking
the value beyond regulatory compliance.&quot; </p>
</blockquote>
</strong></em>
<p>Although the most common “error” that FDIC examiners
discovered was the failure by banks to ask their vendors for copies of
regulatory examinations, that wasn’t the only nugget contained in the linked
article from the ABA Banking Journal. Among the others:</p>
<blockquote>
<p><strong><em>• Vendor management needs to consider all service providers
that hold sensitive customer information, not just IT vendors. These include
loan workout consulting, appraisal review companies, outside attorneys, and
others. </em></strong></p>
<p><strong><em>• Make sure to get the proper exam reports about individual
vendors. Some banks just obtain reports for the host data center, but not for the
specific application that the banks were using. </em></strong></p>
<strong><em>
• Even the proper reports don&#39;t cover everything that a bank must consider in its security risk management efforts. For example, one service provider with an otherwise clean report did not have an internal audit program and its business continuity
planning was poorly documented.</em></strong></blockquote>
<p>This is all sound advice, of course, but knowing what you need to ask for is only half the battle. You also need to make certain that the agreement with your vendor gives the bank <em>the right</em> to ask for, and the vendor <em>the obligation</em> to deliver to the bank, copies of the necessary reports. Relying on the goodwill of the vendor in coughing up examination and audit reports, especially when they may contain results that are less than flattering to the vendor, is &quot;unwise.&quot;</p>
<p>Here&#39;s one more tip: if the report reveals problems, the agreement with the vendor should require the vendor to notify the bank of what action the vendor intends to take to remedy the defects, and should also require the vendor to give the bank periodic progress reports on its progress in correcting those problems.</p>
<p>I&#39;ll be doing a webinar on March 6, 2013 on the topic &quot;<a href="http://www.bankershub.com/#!technology-service-agreements-/c1ahm" target="_self">Technology
Service Agreements: Meeting Regulator’s Expectations</a>.&quot; It covers regulatory guidance applicable to credit unions, banks, and thrifts, although the same essential principles apply to each. The goal is to discuss the provisions of a technology service agreement that regulators expect (and that sound business judgment requires) be included, and to give financial institutions guidance on how to approach the issues covered by each of those provisions so that the institution meets its regulator&#39;s expectations while also meeting the institution&#39;s business needs.</p></div>
</content>


    </entry>
    <entry>
        <title>Cyberheists: Big Banks Increase Small Banks&#39; Losses</title>
        <link rel="alternate" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2013/02/cyberheists-big-banks-increase-small-banks-losses.html" />
        <link rel="replies" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2013/02/cyberheists-big-banks-increase-small-banks-losses.html" />
        <id>tag:typepad.com,2003:post-6a00d8341c652b53ef017c368ce9d9970b</id>
        <published>2013-02-03T21:34:00-06:00</published>
        <updated>2013-02-03T21:34:00-06:00</updated>
        <summary>Internet security guru Brian Krebs had an excellent post a few weeks ago about much of the attention on cyberheists may be focused on the security vulnerabilities of small banks and their business customers, the large banks are playing a...</summary>
        <author>
            <name>Kevin</name>
        </author>
        <category scheme="http://www.sixapart.com/ns/types#category" term="Banking Law-General" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Compliance" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Contracts" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Crime" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Deposits" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Electronic Banking" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="FFIEC" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Litigation" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Outsourcing" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Risk Management" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Web/Tech" />
        
        
<content type="xhtml" xml:lang="en-US" xml:base="http://www.banklawyersblog.com/3_bank_lawyers/">
<div xmlns="http://www.w3.org/1999/xhtml"><p>
<a class="asset-img-link" href="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef017d40bb79fa970c-popup" onclick="window.open( this.href, &#39;_blank&#39;, &#39;width=640,height=480,scrollbars=no,resizable=no,toolbar=no,directories=no,location=no,menubar=no,status=no,left=0,top=0&#39; ); return false" style="float: left;"><img alt="Cybercrime 4" class="asset  asset-image at-xid-6a00d8341c652b53ef017d40bb79fa970c" src="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef017d40bb79fa970c-120wi" style="margin: 0px 5px 5px 0px;" title="Cybercrime 4" /></a>Internet security guru Brian Krebs had <a href="http://krebsonsecurity.com/2013/01/big-bank-mules-target-small-bank-businesses/#more-18091" target="_self">an excellent post a few weeks ago</a> about much of the attention on cyberheists may be focused on the security vulnerabilities of small banks and their business customers, the large banks are playing a large role in small banks&#39; losses.</p>
<blockquote>
<p><strong><em>A $170,000 cyberheist last month against an Illinois nursing home 
provider starkly illustrates how large financial institutions are being 
leveraged to target security weaknesses at small to regional banks and 
credit unions.</em></strong></p>
<p><strong><em>I have written about <a href="http://krebsonsecurity.com/category/smallbizvictims/" target="_blank" title="http://krebsonsecurity.com/category/smallbizvictims/">more than 80 organizations</a>
 that were victims of cyberheists, and a few recurring themes have 
emerged from nearly all of these breaches. First, a majority of the 
victim organizations banked at smaller institutions. Second, virtually 
all of the money mules — willing or unwitting individuals recruited to 
help launder the stolen funds — used accounts at the top five largest 
U.S. banks.</em></strong></p>
</blockquote>
<p>Krebs responds to a question often asked of him, whether it&#39;s safer for a business to bank with a large bank rather than a small bank, by asserting that it&#39;s a difficult question to answer &quot;because banking online remains a legally and financially risky affair 
for any business, regardless of which bank it uses&quot; </p>
<blockquote>
<p><strong><em>Businesses do not 
enjoy the same fraud protections as consumers; if a Trojan lets the bad 
guys siphon an organization’s online accounts, that victim organization 
is legally responsible for the loss. The financial institution may 
decide to reimburse the victim for some or all of the costs of the 
fraud, but that is entirely up to the bank.</em></strong></p>
</blockquote>
<p>That&#39;s right. Regulation E does not apply to business customers. That&#39;s something that sometimes comes as a shock to small business customers, especially those who were too cheap to hire legal counsel to review the account and other online banking agreements before they were signed. &quot;Forewarned is forearmed&quot; is an old adage with a lot of wisdom behind it. It&#39;s not that banks will negotiate the terms of their agreements (most of them will not, especially with small customers), but that customers who understand their legal position going into the relationship are more likely to be concerned about doing due diligence on the bank&#39;s security procedures and track record and considering other methods to lessen and cover their risks (I&#39;ve seen a few who suddenly realize that having a PC dedicated solely to online banking transactions and no other activities is not such a waste of money, after all).</p>
<p>Krebs also points out that since larger banks are more likely to have the resources to settle even large losses to avoid the reputational risk of cyberheists, it may be difficult to know how many instances of loss occur. However, it&#39;s reasonable to assume that the large banks spend a lot more money and person-power on security measures than do small banks.</p>
<blockquote>
<p><strong><em>Wearing my cyberthief glasses, if I’m looking at a huge pile of data 
stolen from thousands of victims, I’m probably more apt to target 
victims at smaller banks based on one simple assumption: Because I’m 
going to have a much higher success rate than I would targeting 
customers of larger institutions.</em></strong></p>
</blockquote>
<p>Krebs takes a shot at technology service providers who service many of the smaller banks for not doing more to secure online banking transactions. </p>
<blockquote>
<p><strong><em>Case in point:&#0160;Optimumbank’s service provider is Fiserv, one of the largest banking industry service providers. According to <a href="http://www.fiserv.com/payments/ach-payments-solutions.htm" target="_blank" title="http://www.fiserv.com/payments/ach-payments-solutions.htm">Fiserv’s site</a>,
 at least 52 percent of the nation’s $19 billion in ACH payments are 
processed using Fiserv software. If this is true, one might think that 
Fiserv’s systems handled about half of the mule transfers that were sent
 from Niles Nursing’s hacked bank account.</em></strong></p>
<p><strong><em>But according to Murray Walton, Fiserv’s chief risk officer, the software that most of its customer banks run — called&#0160;<a href="http://www.checkfreesoftware.com/cda/software/L5.jsp?layoutId=42417&amp;contentId=62072&amp;menuId=60524&amp;pId=60524" target="_blank" title="http://www.checkfreesoftware.com/cda/software/L5.jsp?layoutId=42417&amp;contentId=62072&amp;menuId=60524&amp;pId=60524">PEP+</a>&#0160;–
 is a client solution that does not interact with the company’s data 
centers. He said while Fiserv does offer an antifraud solution called <a href="http://www.checkfreecorp.com/cda/corp/L5.jsp?layoutId=47914&amp;contentId=47917&amp;menuId=47915&amp;pId=51498" target="_blank" title="http://www.checkfreecorp.com/cda/corp/L5.jsp?layoutId=47914&amp;contentId=47917&amp;menuId=47915&amp;pId=51498">FraudNet</a>, that tool is designed for online bill pay services that banks can use to detect fraud patterns on consumer accounts.</em></strong></p>
<p><strong><em>“There are vendors who can knit it all together for banks, but that 
isn’t what we do,” Walton said in an interview. “For various and sundry 
reasons we don’t offer an engine that does the same thing as [an 
anti-fraud provider like] Guardian Analytics. Realistically, the client 
and end-user have responsibilities that they can’t abdicate to us. 
Everyone in this needs to take it seriously and not think that someone 
else has their back.”</em></strong></p>
</blockquote>
<p>I understand Walton&#39;s point, but on the other hand, a small bank&#39;s takeaway from those three paragraphs might be &quot;Fiserv doesn&#39;t have your back, so look elsewhere.&quot; A competing core platform and processing vendor that &quot;does have your back&quot; might have a tag line to use.</p>
<p>Large banks are also lambasted for allowing so many &quot;mule accounts&quot; to be established.</p>
<blockquote>
<p><strong><em>As it stands, the big banks don’t have an incentive to police new 
accounts for mule activity, because it’s generally not their customers 
who are getting robbed from this activity, said Avivah Litan, a fraud analyst with Gartner Inc.</em></strong></p>
<p><strong><em>“The bad guys shouldn’t be able to set up these mule accounts in the 
first place,” Litan said. “The bigger banks are not doing a good job of 
screening for this activity because they’re not the ones eating the 
fraud on these attacks on smaller bank customers. [The bank service 
providers] should be spending more money. And the regulators should be 
coming down on them harder.”</em></strong></p>
</blockquote>
<p>Krebs suggests that, perhaps, &quot;small, regional and local banks can pool their clout and resources to extract more from service providers than what those companies are 
currently offering.&quot; Fat chance. Several years ago, some of the largest users of technology services in the country made a concerted effort to get giant service providers to take more contractual responsibility for the performance, and vulnerabilities, of their technology. It fell flat. Unless the bank regulatory agencies intervene directly with the service providers, they&#39;ll continue to do what they do best: collect fees and deny liability.</p>
<p>As for watching your own back as it applies to business customers, Krebs offers some good suggestions, among them:</p>
<ul>
<li>Shop around for banks until you find one that assures you that it uses layered security.</li>
<li>Use &quot;Positive Pay&quot; if your bank offers it because it not only deters check fraud but other unauthorized transfers, online and off (I heartily concur).</li>
<li>Use <a href="http://krebsonsecurity.com/2012/07/banking-on-a-live-cd/" target="_self">Live CD </a>to temporarily covert your PC from Microsoft to Linux for doing online banking transactions.</li>
</ul>
<p>Krebs also offers an <a href="http://krebsonsecurity.com/online-banking-best-practices-for-businesses/" target="_self">online &quot;best practices&quot; guide for businesses</a>. As with much of his material, it&#39;s good stuff.</p></div>
</content>


    </entry>
    <entry>
        <title>PATCO Played Out: A Few Lessons Learned</title>
        <link rel="alternate" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2013/01/patco-played-out-a-few-lessons-learned.html" />
        <link rel="replies" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2013/01/patco-played-out-a-few-lessons-learned.html" />
        <id>tag:typepad.com,2003:post-6a00d8341c652b53ef017d401e47f3970c</id>
        <published>2013-01-17T22:05:00-06:00</published>
        <updated>2013-01-17T22:05:00-06:00</updated>
        <summary>The last time we discussed the PATCO decision, the appellate court had found that the bank&#39;s security procedures to defeat account takeover were not &quot;commercially reasonable,&quot; but had sent the case back down to the trial court to determine what...</summary>
        <author>
            <name>Kevin</name>
        </author>
        <category scheme="http://www.sixapart.com/ns/types#category" term="Banking Law-General" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Compliance" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Contracts" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Crime" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Deposits" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Electronic Banking" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Life (In General)" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Litigation" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Marketing" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Practice of Law" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Risk Management" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="State Law" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Web/Tech" />
        
        
<content type="xhtml" xml:lang="en-US" xml:base="http://www.banklawyersblog.com/3_bank_lawyers/">
<div xmlns="http://www.w3.org/1999/xhtml"><a class="asset-img-link" href="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef017c35ef575a970b-popup" onclick="window.open( this.href, &#39;_blank&#39;, &#39;width=640,height=480,scrollbars=no,resizable=no,toolbar=no,directories=no,location=no,menubar=no,status=no,left=0,top=0&#39; ); return false" style="float: left;"><img alt="Lessons_learned" class="asset  asset-image at-xid-6a00d8341c652b53ef017c35ef575a970b" src="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef017c35ef575a970b-120wi" style="margin: 0px 5px 5px 0px;" title="Lessons_learned" /></a>
<p>The last time <a href="http://www.banklawyersblog.com/3_bank_lawyers/2012/07/patco-and-experi-metals-how-much-hope-do-they-really-give-small-businesses.html" target="_self">we discussed the PATCO decision</a>, the appellate court had found that the bank&#39;s security procedures to defeat account takeover were not &quot;commercially reasonable,&quot; but had sent the case back down to the trial court to determine what legal responsibility the customer might have to prevent account takeover. Following that action, the bank and PATCO settled the case, so that burning legal issue was not resolved.</p>
<p>Recently, <a href="http://www.bankinfosecurity.com/patco-settlement-what-means-a-5373/p-2" target="_self">PATCO co-owner Mark Patterson and counsel Dan Mitchell were interviewed by Bank Info Security&#39;s Tracy Kitten</a> about the lessons they think they learned from the case. Among those (along with my observations) are:</p>
<ul>
<li>PATCO approached the bank within the first month of the incident with a settlement proposal that turned out to be a heck of a lot less than what the bank eventually paid in settlement after three years of litigation. Both sides ended up enriching their legal counsel needlessly. Sweet!</li>
<li>Community banks seem more willing to settle quickly than do larger banks. Mitchell and Patterson think that&#39;s because community banks are more concerned about the reputational risk if the dispute hits the press. Might this be a potential competitive marketing advantage for community banks? &quot;Bank with us! <span style="text-decoration: underline;">We&#39;ll</span> pay for <span style="text-decoration: underline;">your</span> negligence!&quot;</li>
<li>Most cases of corporate account takeover are settled quickly, and off the radar screen. That certainly appears to be accurate from our personal experience. While many lawyers live to engage in disputes, bankers live to make money the old fashioned way: by doing business. It&#39;s hard to do business when you&#39;re the defendant and your customer is the plaintiff.</li>
<li>Prospective litigation costs and reputational risk can be as much of a deterrent to bank customers pursuing litigation as they can be to banks. </li>
<li>There&#39;s not much case law on these issues. Until there is, there is likely to be much jockeying for position, blustering and posturing by lawyers for both sides, unless responsible business leaders on each side of the table seize control early in the game and keep their eyes on the prize: salvaging the relationship (if possible) without breaking either the bank or the customer.</li>
<li>Patterson thinks ACH should not be done by businesses, no matter how allegedly &quot;strong&quot; the security devices or procedures used. He claims that his business will use ACH only for tax payments. The reasons for his revulsion: the one-sided nature of the agreements prepared by the banks, which place almost all liability on the customer. Hey, that&#39;s why banks pay us the big bucks, Mark!</li>
<li>Patterson and Mitchell do believe that customers have &quot;some responsibility&quot; for protecting their accounts from takeover. However, they claim that banks bear more responsibility than customers because they are &quot;in a better position&quot; to prevent and detect takeovers. While I don&#39;t disagree that banks should be more sophisticated in this area than the average small business owner, I&#39;m still not willing to go as far as Patterson and claim that using a dedicated separate PC solely for online banking (and not for cruising Internet porn sites) is cost prohibitive for most small businesses. That simply doesn&#39;t pass the smell test for me. On the other hand, I&#39;m an alleged elitist, so perhaps my view is slanted toward my liege lords and masters, &quot;The Banks.&quot; Perhaps a refurbished eMachine for $250 is simply beyond the reach of the average small business. If that&#39;s the case, how much money would they stand to lose from any of their corporate accounts? Wouldn&#39;t cybercrooks just enter, laugh, and leave?</li>
</ul>
<p>Whether you represent banks or bank customers, Mitchell&#39;s final words ring true.</p>
<blockquote>
<p><strong><em>I would bet my bottom dollar that there will be more lawsuits in the 
future in this area. What types of questions will come up really will 
depend on the unique circumstances of each case. But given the 
prevalence of corporate account takeover, you can bet that there will be
 more cases.</em></strong></p>
</blockquote></div>
</content>


    </entry>
    <entry>
        <title>The Problem With The Cutting Edge</title>
        <link rel="alternate" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2013/01/the-problem-with-the-cutting-edge.html" />
        <link rel="replies" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2013/01/the-problem-with-the-cutting-edge.html" />
        <id>tag:typepad.com,2003:post-6a00d8341c652b53ef017ee7558ccf970d</id>
        <published>2013-01-13T22:04:00-06:00</published>
        <updated>2013-01-13T22:04:00-06:00</updated>
        <summary>In an interview by Tom Fields of Bank Info Security, Matthew Speare, SVP of IT for M&amp;T Bank, talks about a painful truth regarding inflicting pain on cybercrooks who steal from banks: You’ll never be able to beat them. The...</summary>
        <author>
            <name>Kevin</name>
        </author>
        <category scheme="http://www.sixapart.com/ns/types#category" term="Compliance" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Consumer Law-General" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Crime" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Electronic Banking" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Governance" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Life (In General)" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Marketing" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Risk Management" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Web/Tech" />
        
        
<content type="xhtml" xml:lang="en-US" xml:base="http://www.banklawyersblog.com/3_bank_lawyers/">
<div xmlns="http://www.w3.org/1999/xhtml"><p>
<a class="asset-img-link" href="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef017c35b23cc2970b-popup" onclick="window.open( this.href, &#39;_blank&#39;, &#39;width=640,height=480,scrollbars=no,resizable=no,toolbar=no,directories=no,location=no,menubar=no,status=no,left=0,top=0&#39; ); return false" style="float: left;"><img alt="Customer-complaint" class="asset  asset-image at-xid-6a00d8341c652b53ef017c35b23cc2970b" src="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef017c35b23cc2970b-120wi" style="margin: 0px 5px 5px 0px;" title="Customer-complaint" /></a>In <a href="http://www.bankinfosecurity.com/interviews/tackling-authentication-challenge-i-1755" target="_self">an interview by Tom Fields of Bank Info Security</a>, Matthew
Speare, SVP of IT for M&amp;T Bank, talks about a painful truth regarding
inflicting pain on cybercrooks who steal from banks: You’ll never be able to
beat them. The best a bank can do is make it so painful for the bad
guys to try to steal from your bank that they decide to “go down the street” and pick
on a 98-pound weakling of a community bank that thinks “multi-factor
authentication” means having a password stronger than your social security
number.</p>
<p>Other participants in the interview are Christopher Paidhrin, the IT security
compliance officer at PeaceHealth Southwest Medical Center, and Elayne Starkey,
the CSO for the State of Delaware. Among the new authentication technologies
that they discuss are “biomettics,” including iris scans, voice recognition,
and fingerprint and palmprint identification techniques. Speare also discusses “soft”
tokens as something his bank has experimented with as an alternative to the
traditional “hard” tokens. Many of those technologies have been around for a
number of years, and in the health care and governmental fields, appear to be gaining
acceptance as part and parcel of daily life. That also seems to be the case
with authentication technologies that are employed by bank personnel that do not directly impact bank
customers. </p>
<p>Speare, however, discusses a problem with the use of such “cutting
edge” authentication techniques by bank customers: “the end user experience.”&#0160; He asserts that password-based
authentication has become so ingrained in the minds of bank customers, even
business customers, that adding additional requirements to the authentication
process that slow down or otherwise impede the customer in the performance of banking transactions becomes an issue where
bank marketing and customer relationship personnel begin to push back, as their
customers squawk like we used to squawk to our mothers when we were little kids. “Why
do I have to do this? None of the other kids’ mothers makes them do it!”</p>
<p>Here’s my not-so-novel suggestion: spend more time thinking
about how to educate your customers as to the benefits of these new techniques
and to “sell” them on those benefits, rather than to moan to bank security
officers about customer resistance. You could even invite them to a free lunch
or cocktail hour seminar at which your favorite lawyer and/or IT security
expert could elevate their collective consciousness to a higher plane. Yes, this
is more work than simply resisting change and increasing risk to both bank and
customer, but we’re now well into the second decade of the twenty-first
century, and the criminals are ahead of the banks and so far out ahead of the customers that they&#39;re in danger of actually lapping them, so maybe it’s time for everyone to at least try to power on up the
sophistication curve. An added benefit is that you could use those sessions to fulfill your duty under the 2011 FFIEC Supplement to its Online Authentication Guidance to educate your customers about how to better protect themselves in a cruel online banking world.</p>
<p>What do you say?</p></div>
</content>


    </entry>
    <entry>
        <title>An Act of War: Against Banks</title>
        <link rel="alternate" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2012/09/an-act-of-war-against-banks.html" />
        <link rel="replies" type="text/html" href="http://www.banklawyersblog.com/3_bank_lawyers/2012/09/an-act-of-war-against-banks.html" />
        <id>tag:typepad.com,2003:post-6a00d8341c652b53ef017c322ebab0970b</id>
        <published>2012-09-27T21:37:00-05:00</published>
        <updated>2012-09-27T21:37:00-05:00</updated>
        <summary>Supporting terrorist groups worldwide is a very bad thing. Killing your own people when they publicly oppose the existing government is a very bad thing. Building a nuclear weapon and threatening to annihilate your neighbors is a very bad thing....</summary>
        <author>
            <name>Kevin</name>
        </author>
        <category scheme="http://www.sixapart.com/ns/types#category" term="Crime" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Current Affairs" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Electronic Banking" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Life (In General)" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Risk Management" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="War" />
        <category scheme="http://www.sixapart.com/ns/types#category" term="Web/Tech" />
        
        
<content type="xhtml" xml:lang="en-US" xml:base="http://www.banklawyersblog.com/3_bank_lawyers/">
<div xmlns="http://www.w3.org/1999/xhtml"><p>
<a class="asset-img-link" href="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef017c322eb937970b-popup" onclick="window.open( this.href, &#39;_blank&#39;, &#39;width=640,height=480,scrollbars=no,resizable=no,toolbar=no,directories=no,location=no,menubar=no,status=no,left=0,top=0&#39; ); return false" style="float: left;"><img alt="Cyber_warfare" class="asset  asset-image at-xid-6a00d8341c652b53ef017c322eb937970b" src="http://www.banklawyersblog.com/.a/6a00d8341c652b53ef017c322eb937970b-120wi" style="margin: 0px 5px 5px 0px;" title="Cyber_warfare" /></a>Supporting terrorist groups worldwide is a very bad thing. Killing your own people when they publicly oppose the existing government is a very bad thing. Building a nuclear weapon and threatening to annihilate your neighbors is a very bad thing. Having a president who wears a bomber jacket, sports a three-day growth of beard, and goes by a moniker that sounds like &quot;I&#39;m-A-Major-Whack-Job&quot; is a very bad thing. However, <a href="http://www.bankinfosecurity.com/blogs/banks-expect-more-attacks-p-1361" target="_self">launching denial-of-service attacks on bank webistes</a> is beyond the pale.</p>
<blockquote>
<p><em><strong>The website glitches and outages that affected Bank of America and 
Chase last week are rumored to be just that sort of attack. In fact, 
financial fraud sources say both banks were hit with denial-of-service 
attacks likely backed by Iran. </strong></em></p>
<p><em><strong>Experts say banks better brace themselves, and they&#39;re right. With 
the U.S. election approaching, institutions can count on more DDoS 
attacks sponsored by nation-states.</strong></em></p>
</blockquote>
<p>Nation &quot;states&quot;? It sounds one nation &quot;state&quot; to me. I suppose this is to be expected from a government with whom this country and its ally, Israel, have been waging an undeclared war that, according to some sources, includes <a href="http://www.itpro.co.uk/642502/the-stuxnet-legacy" target="_self">the introduction of destructive computer viruses</a> into Iranian computer systems and <a href="http://www.nytimes.com/2012/07/12/world/middleeast/book-contends-iranian-scientists-were-killed-by-israeli-mossad.html" target="_self">the delivery of bullets to the heads of Iranian scientists</a>.</p>
<p>The experts were correct about banks bracing themselves for further attacks, because following the date the above-linked blog post was posted, <a href="http://online.wsj.com/article/SB10000872396390444358804578018812198349592.html?mod=googlenews_wsj" target="_self">Wells Fargo was also hit</a>. What are banks supposed to do?</p>
<blockquote>
<p><em><strong>A <a href="http://www.ic3.gov/media/2012/FraudAlertFinancialInstitutionEmployeeCredentialsTargeted.pdf" target="_blank">fraud alert</a>
 issued Sept. 17 by FS-ISAC, the Federal Bureau of Investigation and the
 Internet Crime Complaint Center, suggests 17 steps institutions should 
take to mitigate risks posed by cyberthreats...</strong></em></p>
<p><em><strong>Among those steps: </strong></em></p>
<ul>
<li><em><strong>Educate employees about phishing e-mails and suspicious attachments;</strong></em></li>
<li><em><strong>Monitor site traffic spikes, which could indicate a DDoS attack; </strong></em></li>
<li><em><strong>Limit employees&#39; ability to remotely access internal networks and work-related e-mails from personal devices.</strong></em></li>
</ul>
<p><em><strong>[...]</strong></em></p>
<p><em><strong>&quot;Traditional preventive measures, such as bandwidth over-provisioning, 
firewalls and intrusion prevention systems, continue to provide some 
protection. However, traditional measures are ineffective against 
today&#39;s DDoS attacks,&quot; the FS-ISAC says, calling for the use of layered 
defenses.</strong></em></p>
<p><em><strong>[...]</strong></em></p>
<p><em><strong>Banks and credit unions should ensure that their tellers and other 
branch personnel are well-educated about all the security steps the 
organization is taking and can communicate that information clearly to 
customers.</strong></em></p>
</blockquote>
<p>As if banks didn&#39;t have enough to do merely trying to survive the terror imposed by the CFPB. Now they have to deal with cyber-terror launched by a nation whose leaders make even Liz Warren seem rational in comparison.</p></div>
</content>


    </entry>
 
</feed>

<!-- ph=1 -->