Saturday, 7 July 2018

Micro finance

What is microfinance?
Microfinance, also known as microcredit, is a financial service that offers loans, savings and insurance to entrepreneurs and small business owners who don't have access to traditional sources of capital, like banks or investors. The goal of microfinancing is to provide individuals with money to invest in themselves or their business.

"Microfinance focuses on meeting the financial needs of populations that are financially underserved," said Tarsava. "These are individuals who usually lack the credit or resources to secure a loan and are unlikely to get approval from traditional banks. Typically, these consumers are seeking small-denomination loans … to finance the purchase of a specific equipment, or the capital to start a small business."

All the best for your exam

Luck is a funny thing because sometimes it can be good and sometimes it can be bad. So take matters in your own hand, study hard and stop relying on something so fickle. All the best.

The best way to motivate yourself is to stop stressing about what’ll happen when things go wrong and start thinking about how awesome life will be when they go right. Good luck.

wish you success in your exams messages

If you believe in yourself you do not have to fear any challenge. I wish you all the success for your exam!

You prepared well, You know it all right, Just relax over the night. Morning will come and so will the test Don’t you worry; you just need a little rest. Best of luck for exam!



Current Affairs on July 7th 2018

Today's Headlines from www:

*Economic Times*

📝 Forex reserve falls by $1.76 billion to $406 billion

📝 Tata Steel posts 8% growth in Q1FY19 sales

📝 Sterlite Tech's Italian unit to buy Metallurgica Bresciana for 47 million euros

📝 India's engineering exports up 20 per cent despite US-China trade war: EEPC

📝 Gold imports drop 25% in June on rupee plunge

📝 Six global companies respond to India's RFI for 110 fighter jets

📝 PNB invites bids to sell 3 NPA accounts to recover over Rs 136 cr

Friday, 6 July 2018

Cyber fraud exam:

cyber fraud exam:

 CRYPTOGRAPHY
There are two basic types of Encryption algorithms:

(i) Symmetric encryption
(ii) Asymmetric Encryption
Symmetric Encryption: In this encryption technique the sender and receiver encrypts and decrypts the message with the same key. Examples are Twofish, Serpent, AES (Rijndael), Blowfish, CAST5, Kuznyechik, RC4, 3DES, Skipjack etc.
Asymmetric encryption: In this encryption technique the sender encrypts the message with the receiver’s public key and the receiver decrypts the information with recipient’s private key. Hence this technique is called public key encryption. Examples are: Diffie-Hellman, RSA, ECC, ElGamal, DSA etc.
Among the various models of symmetric cipher analyzed the Rijndael is the best. Actually it is the role model of DES and AES. This model is adopted by different information security agencies like NSA, NIST and FIPS.

BCSBI Important Notes


                               INTRODUCTION
BCSBI:This is a voluntary Code, which sets minimum standards of banking
practices for banks to follow when they are dealing with individual
customers. It provides protection to you and explains how banks are
expected to deal with you for your day-to-day operations.
The Code does not replace or supersede regulatory or supervisory
instructions of the Reserve Bank of India (RBI) and we will comply with
such instructions/directions issued by RBI from time to time. Provisions
of the Code may set higher standards than what is indicated in the
regulatory instructions and such higher standards will prevail as the Code
represents best practices voluntarily agreed to by us as our commitment
to you.
In the Code, ‘you’ denotes the customer and ‘we’, the bank the customer
deals with.
1.1 Objectives of the Code
The Code has been developed to:
a. promote good and fair banking practices by setting minimum
standards in dealing with you
b. increase transparency so that you can have a better understanding
of what you can reasonably expect of the services
c. encourage market forces, through competition, to achieve higher
operating standards
d. promote a fair and cordial relationship between you and your bank
e. foster confidence in the banking system.
The standards of the Code are covered by the key commitments in Section 2.
1.2 Application of the Code
This Code applies to all the products and services listed below, whether
they are provided by branches or subsidiaries, agents acting on our behalf,
across the counter, over the phone, by post, through interactive electronic
devices, on the internet or by any other method. However, all products
discussed here may or may not be offered by us.
a. Current accounts, savings accounts, term deposits, recurring
deposits, PPF accounts and all other deposit accounts
3
b. Payment services such as pension, payment orders, remittances by
way of Demand Drafts, wire transfers and all electronic transactions
e.g. RTGS, EFT, NEFT

Code of Bank’s Commitment to Micro and Small Enterprises


Code of Bank’s Commitment to Micro and Small Enterprises – August 2015

                                              Introduction

This Code sets the minimum standards of banking practices that banks
will follow when they are dealing with Micro and Small Enterprises
(MSEs) as defined in the Micro, Small and Medium Enterprises
Development (MSMED) Act, 2006. It provides protection to you and
explains how banks are expected to deal with you in your day-to-day
operations and in times of financial difficulty.
The Code does not replace or supersede regulatory or supervisory
instructions issued by the Reserve Bank of India (RBI) and we will comply
with such instructions / directions issued by the RBI from time to time.
The provisions of the Code may have set higher standards than those
prescribed in the regulatory or supervisory instructions and such higher
standards will prevail, as the Code represents best practices agreed to
by us as our commitment to you.
In the Code, ‘you’ denotes the MSE Customer and ‘we’, the bank that
you deal with.
1.1 Objectives of the Code
The objectives of the Code are –
a. To give a positive thrust to the MSE sector by providing easy access
to efficient and appropriate banking services.
b. To promote good and fair banking practices by setting minimum
standards for dealings with you.
c. To increase transparency so that you can have a better understanding
of what you can reasonably expect of the services.
d. To improve our understanding of your business through effective
communication.
e. To encourage market forces, through competition, to achieve higher
operating standards.
f. To promote a fair and cordial relationship between you and us.
g. To ensure timely and quick response to your banking needs.
h. To foster confidence in the banking system.
The standards of the Code are covered by the key commitments in
Section 2.

Cyber fraud full article

CYBER FRAUD
Introduction:
With the advances in information technology, most banks in India have migrated to core banking
platforms and have moved transactions to payment cards (debit and credit cards) and to electronic
channels like ATMs, Internet Banking and Mobile Banking. Fraudsters have also followed customers
into this space. However, the response of most of the banks to frauds in these areas needs further
improvement, thereby avoiding putting the entire onus on the customer. There is also a lack of clarity
amongst banks on the reporting of these instances as frauds. A need is therefore felt to have an industry wide framework on fraud governance with particular
emphasis on tackling electronic channel based frauds. This note endeavours to bring out the
challenges and suggests a framework which can be implemented across banks to effectively tackle

Thursday, 5 July 2018

PCI DSS 3.2 Resource Guide

PCI DSS 3.2 Resource Guide
The Payment Card Industry Security Standards Council (PCI SSC) has published a
new version of the industry standard that businesses use to safeguard payment data
before, during and after purchase. PCI Data Security Standard (PCI DSS) version 3.2
replaces version 3.1 to address growing threats to customer payment information.
Companies that accept, process or receive payments should adopt it as soon as
possible to prevent, detect and respond to cyberattacks that can lead to breaches.
Read on for answers to key questions about updates to the standard, timelines, and
resources available for understanding and adopting PCI DSS version 3.2.
Why is the PCI DSS being updated?
A: The Council updates the PCI DSS to ensure it continues to protect against old exploits that are still causing problems, addresses new
exploits and provides greater clarity for implementing and maintaining PCI DSS controls.
Why is it PCI DSS 3.2 and not PCI DSS 4.0?
A: The industry recognizes PCI DSS as a mature standard now, which doesn’t require the significant updates we have seen in the past.

TREASURY MANAGEMENT

TREASURY MANAGEMENT


1.  Fund management has been the primary activity of treasury, but treasury is also responsible for Risk Management & plays an active part in ALM.

2.  D-mat accounts are maintained by depository participants to hold securities in electronic form.

3.  In present scenario treasury function is liquidity management and it is considered as a service center.

4.  From an organizational point of view treasury was considered as a service center but due to economic reforms & deregulation of markets treasury has evolved as a profit center.

RISK MANAGEMENT 2

:UNIT – VI : RISK AND BANKING BUSINESS

1.  Risks are uncertainties resulting in adverse outcome, adverse in relation to planned objectives or expectations.

2.  Financial risks are uncertainties resulting in variation of profitability or outright losses.

3.  Factors that are responsible for creating uncertainties in cash inflow and cash outflow are the risk elements.

4.  Uncertainties in both cash inflow and cash outflow would result in net cash flow or profits.

5.  The possible unfavorable impact is the Risk of the business.

6.  Lower risk implies lower variability in net cash flow with lower upside & down side potential.

7.  Higher risk would imply higher upside and downside potential.

8.  Zero risk would imply no variation in net cash flow.

RISK MANAGEMENT NOTES

 COMPONENTS OF ASSETS AND LIABILITIES IN BANK’S BALANCE    SHEET AND THEIR MANAGEMENT

1.  ALM encompasses the analysis and development of goals and objectives, the development of long term strategic plans, periodic profit plans and rate sensitivity management.

2.  Assets represent the uses of funds to generate revenue for the Bank.

3.  Reserves and Surplus includes Share premium and balance in P&L account.

4.  Borrowings consists of Refinance from RBI and other institutions.

5.  Other Liabilities are Bills Payable, Inter-office adjustments, Interest accrued &  others like provision for IT, tax deductions at sources, interest tax, provisions etc.

6.  Money at Call and Short Notice includes all loans made in the inter bank  call money market that are repayable within 15 days notice.

7.  A major item in Bank’s Balance Sheet is investment in various securities.

8.  Cash credits, Overdrafts, and loans repayable on demand falls under the category of loans repayable on demand though they may have a specific due date.

9.  The income on Investments is of two types Dividends and Interest. 

10.  The other income includes profit on sale of Investments and other assets.

11.  Dividends from Subsidiaries and Joint ventures are part of Other Income.

12.  The heart of Bank’s financial management is Risk Management.

13.  The deregulated environment has not only led to introduction of discriminate pricing policies but also highlighted need to match maturities of assets & liabilities

14.  The ALM involves interest rates, exchange rates and liquidity risks.

15.  ALM is the act of planning, acquiring and directing the flow of funds through an organization.

16.  ALM requires understanding of market area in which Bank operates.

Risk management

Risk Management


CAPITAL MANAGEMENT AND PROFIT PLANNING
1) One of the important parameters of financial strength is Capital or Net worth.
2) The correlation between business level & capital position is called Capital Adequacy.
3) The incentive for doing business hails from profitability.

CAPITAL ADEQUACY – THE BASEL – II OVERVIEW
1) The Central bank Governors of 10 countries formed a committee on Banking Supervisory
Authorities in 1975.
2) The Banking Supervisory Authority Committee usually meets at the Bank of International
Settlements (BIS) at Basel, in Switzerland.
3) The Basel Committee provided the framework for Capital Adequacy in 1988 is known as the
Basel – I accord.
4) The Basel norms for Risk weights were more of a straightjacket nature.
5) As per Basel – I all exposures to sovereign were given 0% risk weight and all bank exposures
were given 20% Risk weight.
6) Assigning Risk Weightage to assets without considering the strengths and weaknesses of
individual entities was the main shortcoming of Basel – I.
7) The Basel – I defined components of Capital and allotted the Risk weights to different
categories of assets.
8) Basel – I stipulated minimum ratio of Capital to Risk weighted Assets.
9) The first round of proposal for changes in the Basel – I accord came up for deliberations and
consultative process in June 1999.
10) The Report of Basel – II Committee is titled as International Convergence of Capital
Measurement and Capital Standards a Revised frame work.
11) The Committee intends that the revised framework would be implemented by the end of year
2006.
12) The fundamental of Basel – II was to revise 1988 accord and to strengthen the soundness and
stability of banking system.

New Foreign exchange management 150 MCQs

FOREIGN EXCHANGE MANAGEMENT

Multiple Choice Questions.
1. Foreign exchange transactions involve monetary transactions
A. among residents of the same country
B. between residents of two countries only
C. between residents of two or more countries
D. among residents of at least three countries
ANSWER: B
2. Under FEMA, the RBI has been authorised to make ------ to carry out the provisions of the Act.
A. rules
B. regulations
C. both rules and regulations
D. notifications
ANSWER: B
3. A foreign currency account maintained by a bank abroad is its
A. nostro account
B. vostro account
C. loro account
D. foreign bank account
ANSWER: A

Srinivas kante

4. 'Non-resident Bank Accounts' refer to
A. nostro account
B. vostro account
C. accounts opened in offshore centres
D. none of the above
ANSWER: B
5. Non-resident bank accounts are maintained in
A. the permitted currencies
B. the currency of the country of the bank maintaining the account
C. the currencies in which FCNR accounts are permitted to be maintained
D. Indian Rupee
ANSWER: D

Forex mcqs for international banking


1. Foreign Exchange Management Act (FEMA) is administered by:
(a) RBI (b) Govt. of India (c) SEBI (d) Both (a) & (b) (d) All of these
2. A license to deal in foreign exchange to authorized dealers is issued by :
(a) DGFT (b) FEDAI (c) RBI (d) EXIM Bank(e) both (a) & (c)
3. All foreign exchange transactions in India are governed by :
(a) Foreign Exchange Regulation Act, 1973 (b) Reserve Bank of India Act, 1934
(d) Foreign Exchange Management Act, 1999 (e) Banking Regulation Act,1949
4. Restricted money changers are the firms/ organizations authorized to undertake :
(a) sale of foreign currency notes, coins and travellers' cheques to the public
(b) purchase of foreign currency notes, coins and travellers' cheques from the public
(c) issue of letters of credit for their importer customers
(d) both safe and purchase of foreign currency notes, coins, travellers' cheques to / from the public

Forex direct and indirect rates

Direct Rates

Foreign Currency is fixed ---say 1USD = INR 55.70

Indirect Rates
Local currency remains fixed---say Rs. 100 = 1.93 USD
At present, following 4 currencies are quoted in Indirect mode:
EURO, GBP, AUD and NZ$
Cross Rates
Cross rate is price of currency pair which is not directly quoted. It is arrived
at from price of two other currency equations.
1. Suppose bank hasto Quote GBP against INR, but in India, GBP is
not quoted directly. In India,
1USD =48.10 and GBP/USD is quoted as 1GBP= USD1.6000.
Therefore 1 GBP = 48.10X1.6 = 76.96
2. An Import bill of GBP 100000 has to be retired. Rates are:
1 GBP=1.5975/85 USD
1USD = 48.14/15 INR
TT margin =.20%
Here Cross selling rate of both currencies will apply.
Bank has to remit GBP. GBP/USD Quote (Indirect) will be available in
International market whereas USD/Rupee Quote (Direct) is available in
local market. Bank will sell USD to buy GBP.
While buying GBP, bank would like to quote higher rate as Buy high Sell
Low maxim will apply. 1GBP = 1.5985
While selling USD, bank will opt to quote higher rate as Buy Low Sell High
maxim will apply.
1GBP=1.5985*48.15 = 76.9675 + Margin@.20% = 77.1214 (say
77.1225)

TT buying and selling Rates

TT Rates and Bill Rates:;

Following 4 types of buying and selling rates are important:
1. TT Buying rate
2. Bill Buying rate
3. TT Selling rate
4. Bill Selling rate
In Interbank market, exchange rate is quoted up to 4 decimals in multiples of 0.0025. e.g.
1USD=53.5625/5650
For customers the exchange rate is quoted in two decimal places i.e. Rupees and paisa. e.g. 1
USD =Rs. 55.54.
Amount being paid or received will be rounded off to nearest Rupee.

TT Buying Rate:::

It is required to calculate when our Nostro account is already credited or
being credited without delay e.g. Receipt of DD, MT, TT or collection ofForeign bills. This rate is used for cancellation of Forward Sales Contract.
Calculation
Spot Rate – Exchange Margin

Bill Buying Rate::

Bill Buying Rate Bill Buying rate is applied when bank gives INR to the customer before
receipt of Foreign Exchange in the Nostro account i.e. Nostro account is
credited after the purchase transaction. In such cases.
Examples are:
 Export Bills Purchased/Discounted/Negotiated.
 Cheques/DDs purchased by the bank.
Calculation

Spot Rate + Forward Premium (or deduct forward discount) – Exchange margin.

TT Selling Rate::

TT Selling Rate Any sale transaction where no delay is involved is quoted at TT selling rate.
It is desired in issue of TT, MT or Draft. It is also desired in crystallization of
Export bills and Cancellation of Forward purchase contract.
Calculation
Spot Rate + Exchange Margin

Bill Selling Rate:::

Bill Selling Rate It is applied where handling of documents is involved e.g. Payment against
Import transactions:
Calculation
Spot Rate + Exchange Margin for TT selling + Exchange margin for Bill
Selling

Examples::

Q. 1
Bank received MT of USD 5000 on 15th Sep. The Nostro account was already credited. What
amount will be paid to the customer: Spot Rate 34.25/30. Oct Forward Differential is 22/24.
Exchange margin is .80%
Solution
TT buying Rate will be applied
34.25 - .274 = 33.976 Ans.

Q. 2
On 15th July, Customer presented a sight bill for USD 100000 for Purchase under LC. How
much amount will be credited to the account of the Exporter. Transit period is 20 days and
Exchange margin is 0.15%. The spot rate is 34.75/85. Forward differentials:
Aug: .60/.57 Sep:1.00/.97 Oct: 1.40/1.37
Solution
Bill Buying rate of August will be applied.
Spot Rate----34.75 Less discount .60 = 34.15
Less Exchange Margin O.15% i.e. .0512 =34.0988 Ans.
( Transit period is rounded to next month since currency will be cheaper as it is buy transaction)

Q. 3
Issue of DD on New York for USD 25000. The spot Rate is IUSD = 34.3575/3825 IM forward
rate is 34.7825/8250
Exchange margin: 0.15%

Solution:
TT Selling Rate will Apply
Spot Rate = 34.3825 Add Exchange margin (.15%) i.e. 0.0516
TT Selling Rate = Spot Rate + Exchange Margin = 34.4341 Ans.

Q. 4
On 12th Feb, received Import Bill of USD-10000. The bill has to retired to debit the account of
the customer. Inter-bank spot rate =34.6500/7200. The spot rate for March is 5000/4500. The
exchange margin for TT selling is .15% and Exchange margin for Bill selling is .20%. Quote rate
to be applied.
Solution
Bill Selling Rate will be applied.
Spot Rate + Exchange margin for TT Selling + Exchange margin for Bill selling =
34.7200+.0520+.0695 = 34.8415 Ans.

Forex numerical

Foreign exchange::

Ex 1.
Calculate TT selling rate for GBP/INR, if USD/INR is 43.85/87 & GBP/USD is 1.9345/49. A
margin of 0.15% is to be loaded.
Solution ; TT selling rate of GBP/INR
1 GBP = 1.9349 USD
 = (1.9349 *43.87)+Margin 0.15%
 =84.8841+.1273=85.0114 INR 85.0114-------------------------Ans.
Ex.2
A foreign correspondent intends to fund his Vostro Account maintained with Mumbai branch of
SBI. What rate will be quoted if 1 USD = 44.23/27 and margin is 0.08%
Solution : TT buying rate will quoted
44.23-.035 = 44.195 ---------------------------------------Ans.
Ex.3
If Swiss Franc is quoted as USD = CHF 1.2550/54 and in India, USD =INR43.50/52, how much
INR will exporter get for his export bill of CHF 50000.
Solution :
Swiss Franc will be sold for USD in overseas market and USD will be bought in local market i.e.
Sell Rate of CHF and Buy rate of USD.(Buy Low Sell High in both quotations)
1 USD = 1.2554 CHF and 1USD=INR 43.50
1CHF=43.50/1.2554 = 34.6503
Amount as paid to exporter = 34.6503*50000=17,32,515/- ----------------Ans.
(Both are direct quotations and Maxim Buy Low Sell High will apply in both
Ex.4
If Swiss Franc is quoted as USD = CHF 1.2550/54 and USD =INR43.50/52, how much INR will
Importer pay for his import bill of CHF 50000.
Solution :
Swiss Franc will be bought against USD in overseas market and USD will be sold in local
market i.e. Buy rate of CHF and Sell rate of USD.
1 USD = 1.2550 CHF and 1USD=INR 43.52
1CHF=43.52/1.2550 = 34.6773
Amount to be received from Importer = 34.6773*50000
=17,33,865/- ----Ans.
(Both are direct quotations and Maxim Buy Low Sell High will apply in both)
Q. 5
Exporter received Advance remittance by way of TT French Franc 100000.
The spot rates are in India IUSD = 35.85/35.92 1M forward =.50/.60
The spot rates in Singapore are 1USD = 6.0220/6.0340 1M forward =.0040/.0045
Exchange margin = 0.8%
Solution
Cross Rate will apply
USD will be bought in the local market at TT Buying rate and sold at Spot Selling Rates in
Singapore for French Francs:
TT Buying Rates USD/INR = Spot rate – Exchange margin = 35.8500-.0287 = 35.8213
Spot Selling Rate for USD/Francs = 6.0340
Inference:
6.0340 Franc = 1USD
 = INR 35.8213
 1 franc = 35.8213/6.0340 = INR 5.9366 Ans.
(Both are direct quotations and Maxim Buy Low Sell High will apply

Forex for individuals

Forex Facilities for Residents
(Individuals):::::

Introduction

The legal framework for administration of exchange control in India is provided by the Foreign Exchange Management Act, 1999. Under the Act, freedom has been granted for buying and selling of foreign exchange for undertaking current account transactions. However, the Central Government has been vested with powers in consultation with Reserve Bank to impose reasonable restrictions on current account transactions. Accordingly, the Government has issued Notifications GSR.381(E) dated May 3, 2000, and S.O. 301(E) dated March 30, 2001, imposing certain restrictions on current account transactions in public interest.

These details are available on the Bank’s website besides with the authorised dealers and regional offices of the Foreign Exchange Department. Our experience so far has been that the residents like to get information on several matters relating to various current account transactions and other incidental issues. This pamphlet attempts to answer to all such questions in simple language. While preparing replies to questions, special care has been taken to ensure that the replies are drafted in simple words and reference to technical details are avoided.

 The Foreign Exchange Management Act,1999 (FEMA), has come into force with effect from June 1, 2000. With introduction of the new Act (in place of FERA), certain structural changes have been introduced and

Wednesday, 4 July 2018

VERY IMPORTANT FOREIGN EXCHANGE MCQs

VERY IMPORTANT FOREIGN EXCHANGE MCQs



1.Our Branches report their foreign currency transactions to __________________

(a) International Banking Department, Mumbai

(b) Treasury, Mumbai

(c) International Banking Division, LHO

(d) RBI

Ans: b

2.The foreign currency account maintained by our Foreign Department with our foreign

ranches/correspondents in different countries is known as __________________

(a) Special account...

(b) Vostro account

(c) Nostro account

(d) FCNR account

Ans: c

3.Transactions having international financial implications are regulated in our country by

(a) External Affairs Ministry, New Delhi

(b) The Foreign Exchange Dept., RBI, Mumbai

(c) Institute of Foreign Trade, New Delhi

(d) International Division, SBI, Bombay

Ans: b

4.All the forex transactions are reported to Treasury through

(a) Special account

(b) Branch Clearing General Account Schedules 3 and 7

(c) Foreign Currency General Account

(d) FCNR account

Ans: c



5.The account maintained by an our Foreign Branches / Correspondents with our domestic branch (in

India) is known as _________________

(a) Loro a/c

(b) Vostro a/c

(c) Special a/c

(d) Nostro a/c

Ans: b

6.Rate applied for a foreign exchange transaction which involves immediate conversion of currency is

known as _________________

.(a) ready rate

(b) forward rate

(c) merchant rate

(d) long rate

Ans: a

7.A quotation in which the home currency unit is the standard unit and the rate is expressed in variable

units of foreign currency is called _________________

(a) direct rate

(b) spot rate

(c) indirect rate

(d) forward rate

Ans: c

8.When conversion/exchange of currencies takes place at some future date at a rate of exchange agreed

upon now, such a transaction is known as

(a) spot transaction

(b) cover transaction

(c) cash transaction

(d) forward transaction

Ans: d




9.The maxim applied in respect of Direct Quotation is

(a) buy low, sell low

(b) buy low, sell high

(c) buy high, sell low

(d) buy high, sell high

Ans: b

10.A rate of exchange established between any two currencies on the basis of the respective quotation of

each currency in terms of a third currency is known as

(a) cross rate

(b) merchant rate

(c) wash rate

(d) composite rate

Ans: a

11.When branches pass forex transactions at provisional rates, the entries are passed by debit to

(a) Forex Clearing gen. a/c

(b) Br. Cl. Gen. a/c 3 and 7

(c) IBIT

(d) None of the above

.Continue....

Financial Regulatory Bodies in India

Financial Regulatory Bodies in India


In India, the financial system is regulated with the help of independent regulators, associated with the field of insurance, banking, commodity market, and capital market and also the field of pension funds. On the other hand, the Indian Government is also known for playing a significant role in controlling the field of financial security and also influencing the roles of such mentioned regulators. You must be aware of the regulatory bodies and their functions, before a final say. The most prominent of all is RBI or Reserve Bank of India. Let us look in detail about various Financial Regulatory Bodies in India.
RBI – Reserve Banks of India :
Reserve Bank of India : Reserve Bank of India is the apex monetary Institution of India. It is also called as the central bank of the country.
 The Reserve Bank of India was established on April 1, 1935 in accordance with the provisions of the Reserve Bank of India Act, 1934. The Central Office of the Reserve Bank was initially established in Calcutta but was permanently moved to Mumbai in 1937. The Central Office is where the Governor sits and where policies are formulated. Though originally privately owned, since nationalization in 1949, the Reserve Bank is fully owned by the Government of India.
The Central Office is where the Governor sits and is where policies are formulated. Though originally privately owned, since nationalization in 1949, the Reserve Bank is fully owned by the Government of India.
SEBI – Securities and Exchange Board of India :

Glossary of Cybercrime Terms very important


Glossary of Cybercrime Terms
back door -- a vulnerability intentionally left in the security of a computer system or its software by its designers
biometrics -- the use of a computer user's unique physical characteristics -- such as fingerprints, voice, and retina -- to identify that user
black hat -- a term used to describe a hacker who has the intention of causing damage or stealing information
bypass -- a flaw in a security device
ciphertext -- data that has been encrypted
Computer Emergency Response Team (CERT) -- an organization that collects and distributes information about security breaches

Information Technology (Amendment) Act, 2008 full details

Information Technology (Amendment) Act, 2008
BRIEF HISTORY
The Indian Information Technology Act 2000 (“Act”) was a based on the Model Law on Electronic Commerce adopted by the United Nations Commission on International Trade Law[1]; the suggestion was that all States intending to enact a law for the impugned purpose, give favourable consideration to the said Model Law when they enact or revise their laws, in view of the need for uniformity of the law applicable to alternatives to paper-based methods of communication and storage of information. Thus the Act was enacted to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "electronic commerce", which involved the use of alternatives to traditional or paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies. Also it was considered necessary to give effect to the said resolution and to promote efficient delivery of Government services by means of reliable electronic records. The Act received the assent of the President on the 9th of June, 2000.

CYBER CRIME TERMINOLOGY

CYBER CRIME  TERMINOLOGY

 Adware – Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least.

Back Door – A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation. Sometimes crackers will create their own back door to a system by using a virus or a Trojan to set it up, thereby allowing them future access at their leisure.

Black Hat – Just like in the old westerns, these are the bad guys. A black hat is a cracker. To add insult to injury, black hats may also share information about the “break in” with other black hat crackers so they can exploit the same vulnerabilities before the victim becomes aware and takes appropriate measures.

Bot – A bot is a software “robot” that performs an extensive set of automated tasks on its own. Search engines like Google use bots, also known as spiders, to crawl through websites in order to scan through all of your pages. In these cases bots are not meant to interfere with a user, but are employed in an effort to index sites for the purpose of ranking them accordingly for appropriate returns on search queries. But when black hats use a bot, they can perform an extensive set of destructive tasks, as well as introduce many forms of malware to your system or network. They can also be used by black hats to coordinate attacks by controlling botnets.

CERT-In (the Indian Computer Emergency Response Team)


CERT-In (the Indian Computer Emergency Response Team)

CERT-In (the Indian Computer Emergency Response Team) is a government-mandated information technology (IT) security organization. The purpose of CERT-In is to respond to computer security incidents, report on vulnerabilities and promote effective IT security practices throughout the country.
CERT-In was created by the Indian Department of Information Technology in 2004 and operates under the auspices of that department. According to the provisions of the Information Technology Amendment Act 2008, CERT-In is responsible for overseeing administration of the Act.
CERT organizations throughout the world are independent entities, although there may be coordinated activites among groups. The first CERT group was formed in the United States at Carnegie Mellon University.
CERT-In is operational since January 2004. The constituency of CERT-In is the Indian Cyber Community. CERTIn
is the national nodal agency for responding to computer security incidents as and when they occur.
In the recent Information Technology Amendment Act 2008,CERT-In has been designated to serve as the national
agency to perform the following functions in the area of cyber security:
Collection,analysis and dissemination of information on cyber incidents.
Forecast and alerts of cyber security incidents
Emergency measures for handling cyber security incidents
Coordination of cyber incident response activities.
Issue guidelines,advisories,vulnerability notes and whitepapers relating to information security
practices,procedures, prevention,response and reporting of cyber incidents.
Such other functions relating to cyber security as may be prescribed



Very important Cyber fraud and management exam


Short notes ( Important Points for Prevention of cyber fraud & crime exam point of view)



l  3 aspects of crime fraud triangle are 1.Need 2. Opportunity 3. Rationalization( Criminal commits the crime himself)

l  cyber-crime is not defined in IT act 2000 and amendment 2008 also

l  Crimes comes under Indian penal code 1860

l  Script kiddies means hacker who is having lacks of any serious technical expertise like child –like manner

l  Spammers ..spam like keep sending advertisement and discount offer  mails

l  Vulnerabilities are the opportunities provided by system itself

l  Threat vector to understand the modes of operandi

l   In case of copy right  infringement  to the actual offender  Vitim can apply for John doe order

Kyc aml cuckoo surfing

cuckoo smurfing.::

In 2005, FATF added a new term to the vast money laundering
lexicon – “cuckoo smurfing.

The term, mentioned in the organization’s 2005 Typologies Report,
refers to a form of money laundering linked to alternative
remittance systems, in which criminal funds are transferred through
the accounts of unwitting persons who are expecting genuine
funds or payments from overseas. The term cuckoo smurfing first

Kyc aml FATF recommendations

THE FATF RECOMMENDATIONS:: Total 40

A – AML/CFT POLICIES AND COORDINATION

1 - Assessing risks & applying a risk-based approach *
2 - National cooperation and coordination

B – MONEY LAUNDERING AND CONFISCATION

3 Money laundering offence *
4 Confiscation and provisional measures *

C – TERRORIST FINANCING AND FINANCING OF PROLIFERATION

Tuesday, 3 July 2018

Current Affairs on July 3rd 2018

Today's Headlines from www:

*Economic Times*

📝 Govt rules out bad bank, unveils five-point plan to clean NPA mess

📝 India's May core industries output slows to 3.6%

📝 Flipkart deal in line with government's FDI policy: Walmart

📝 ITC to add 2500 rooms in 5 yrs, mulls foray to healthcare space

📝 NTPC power generation up 7.45pc in April-June at 69.2 BU

Monday, 2 July 2018

KYC AML VERY IMPORTANT



1.1.      Know Your Customer (KYC) Norms/Anti-Money Laundering (AML) Measures/Combating of Financing of Terrorism (CFT)/Obligations of banks under PMLA, 2002

The objective of KYC/AML/CFT guidelines is to prevent banks from being used, intentionally or unintentionally, by criminal elements for money laundering or terrorist financing activities. KYC procedures also enable banks to know/understand their customers and their financial dealings better which in turn help them manage their risks prudently.

1.2.      Definition of Customer

For the purpose of KYC policy, a ‘Customer’ is defined as:

a        a person or entity that maintains an account and/or has a business relationship with the bank;

b      one on whose behalf the account is maintained (i.e. the beneficial owner). [Ref: Government of India Notification dated February 12, 2010 - Rule 9, sub-rule (1A) of PMLA Rules - 'Beneficial Owner' means the natural person who ultimately owns or controls a client and or the person on whose behalf a transaction is being conducted, and includes a person who exercise ultimate effective control over a juridical person]

c        beneficiaries of transactions conducted by professional intermediaries, such as Stock Brokers, Chartered Accountants, Solicitors etc. as permitted under the law, and

d       any person or entity connected with a financial transaction which can pose significant reputational or other risks to the bank, say, a wire transfer or issue of a high value demand draft as a single transaction.

2            Guidelines

1  1.General

(c)   Banks  should  keep  in  mind  that  the  information  collected  from  the customer for the purpose of opening of account is to be treated as confidential and details thereof are not to be divulged for cross selling or any other like purposes. Banks should, therefore, ensure that information
sought from the customer is relevant to the perceived risk, is not intrusive, and is in conformity with the guidelines issued in this regard. Any other information from the customer should be sought separately with his/her consent and after opening the account
26.  Banks should ensure that any remittance of funds by way of demand draft, mail/telegraphic transfer or any other mode and issue of travellers’ cheques for value of Rupees fifty thousand and above is effected by debit to the customer’s account or against cheques and not against cash payment

27.  With effect from April 1, 2012, banks should not make payment of cheques/drafts/pay orders/banker’s cheques bearing that date or any subsequent date, if they are presented beyond the period of three months from the date of such instrument.
28.  Banks should ensure that the provisions of Foreign Contribution (Regulation) Act, 2010, wherever applicable, are strictly adhered to.

2.2.            KYC Policy

Banks should frame their KYC policies incorporating the following four key elements:

1    Customer Acceptance Policy;

2    Customer Identification Procedures;

3    Monitoring of Transactions; and

iv)Risk Management.

KYC AML SHORT NOTES 4

KYC AML SHORT NOTES 4



49.  Banks/FIs should ensure that records pertaining to the identification of the customers and their address (e.g. copies of documents like passports, identity cards, driving licenses, PAN card, utility bills, etc.) obtained while opening the account and during the course of business relationship, are properly preserved for at least five years after the business relationship is ended as required under Rule 10 of the Rules ibid. The identification of records and transaction data should be made available to the competent authorities upon request.

50.  Banks/FIs may maintain records of the identity of their clients, and records in respect of transactions referred to in Rule 3 in hard or soft format.

51.  Combating Financing of Terrorism : The United Nations periodically circulates the following two lists of individuals and entities, suspected of having terrorist links, and as approved by its Security Council (UNSC).

(a)  The “Al-Qaida Sanctions List”, includes names of individuals and entities associated with the Al-Qaida.

(b)  The “1988 Sanctions List”, consisting of individuals (Section A of the consolidated list) and entities.

52.  The United Nations Security Council Resolutions (UNSCRs), received from Government of India, are circulated by the Reserve Bank to all banks and FIs. Banks/FIs are required to update the lists and take them into account for implementation of Section 51A of the Unlawful Activities (Prevention) (UAPA) Act, 1967, discussed below. Banks/FIs should ensure that they do not have any account in the name of individuals/entities appearing in the above lists. Details of accounts resembling any of the individuals/entities in the list should be reported to FIUIND.

53.  Freezing of Assets under Section 51A of Unlawful Activities (Prevention) Act, 1967 :

(a)  The Unlawful Activities (Prevention) Act, 1967 (UAPA) has been amended by the Unlawful Activities (Prevention) Amendment Act, 2008. Government has issued an Order dated August 27, 2009 (Annex II of this circular) detailing the procedure for implementation of Section 51A of the Unlawful Activities (Prevention) Act, 1967 for prevention of, and for coping with terrorist activities.

In terms of Section 51A, the Central Government is empowered to freeze, seize or attach funds and other financial assets or economic resources held by, on behalf of or at the direction of the individuals or entities listed in the Schedule to the Order, or any other person engaged in or suspected to be engaged in terrorism and prohibit any individual or entity from making any funds, financial assets or economic resources or related servicesavailable for the benefit of the individuals or entities listed in the Schedule to the Order or any other person engaged in or suspected to be engaged in terrorism.

57.  Jurisdictions that do not or insufficiently apply the FATF Recommendations:

(a)  Banks/FIs are required to take into account risks arising from the deficiencies in AML/CFT regime of the jurisdictions included in the FATF Statement. In addition to FATF Statements circulated by Reserve Bank of India from time to time, banks/FIs should also consider publicly available information for identifying countries, which do not or insufficiently apply the FATF Recommendations. It is clarified that banks/FIs should also give special attention to business relationships and transactions with persons (including legal persons and other financial institutions) from or in countries that do not or insufficiently apply the FATF Recommendations and jurisdictions included in FATF Statements. (b) Banks/FIs should examine the background and purpose of transactions with persons (including legal persons and other financial institutions) from jurisdictions included in FATF Statements and countries that do not or insufficiently apply the FATF Recommendations. Further, if the transactions have no apparent economic or visible lawful purpose, the background and purpose of such transactions should, as far as possible be examined, and written findings together with all documents should be retained and made available to Reserve Bank/other relevant authorities, on request.

58.  In terms of the Rule 3 of the PML (Maintenance of Records) Rules, 2005, banks/FIs are required to furnish information relating to cash transactions, cash transactions integrally connected to each other, and all transactions involving receipts by non-profit organisations (NPO means any entity or organisation that is registered as a trust or a society under the Societies Registration Act, 1860 or any similar State legislation or a company registered (erstwhile Section 25 of Companies Act, 1956 ) under Section 8 of the Companies Act, 2013), cash transactions ;where forged or counterfeit currency notes or bank notes have been used as genuine, cross border wire transfer, etc. to the Director, Financial Intelligence Unit-India (FIU-IND).

59.  FIU-IND has released a comprehensive reporting format guide to describe the specifications of prescribed reports to FIU-IND. FIU-IND has also developed a Report Generation Utility and Report Validation Utility to assist reporting entities in the preparation of prescribed reports. The Office Memorandum issued on Reporting Formats under Project FINnet dated 31st

March, 2011 by FIU containing all relevant details are available on FIU’s website. Banks/FIs should carefully go through all the reporting formats prescribed by FIU-IND.

60.  FIU-IND have placed on their website editable electronic utilities to file electronic Cash Transactions Report (CTR)/ Suspicious Transactions Report (STR) to enable banks/FIs which are yet to install/adopt suitable technological tools for extracting CTR/STR from their live transaction data base. It is, therefore, advised that in cases of those banks/FIs, where all the branches are not fully computerized, the Principal Officer of the bank/FI should cull out the transaction details from branches which are not yet computerized and suitably arrange to feed the data into an electronic file with the help of the editable electronic utilities of CTR/STR as have been made available by FIU-IND on their website http://fiuindia.gov.in.

In terms of Rule 8, while furnishing information to the Director, FIU-IND, delay of each day in not reporting a transaction or delay of each day in rectifying a misrepresented transaction beyond the time limit as specified in the Rule shall constitute a separate violation. Banks/FIs are advised to take note of the timeliness of the reporting requirements.

62.  Reports to be furnished to FIU-IND :

1)  Cash Transaction Report (CTR)

2)  Suspicious Transaction Reports (STR)

3)  Non-Profit Organisation

4)  Cross-border Wire Transfer

63.  The CTR for each month should be submitted to FIU-IND by 15th of the succeeding month. Cash transaction reporting by branches to their controlling offices should, therefore, invariably be submitted on monthly basis and banks/FIs should ensure to submit CTR for every month to FIU-IND within the prescribed time schedule.

64.  All cash transactions, where forged or counterfeit Indian currency notes have been used as genuine should be reported by the Principal Officer of the bank to FIU-IND in the specified format(Counterfeit Currency Report – CCR), by 15thday of the next month. These cash transactions should also include transactions where forgery of valuable security or documents has taken place and may be reported to FIU-IND in plain text form.

65.  While filing CTR, details of individual transactions below Rupees Fifty thousand need not be furnished. CTR should contain only the transactions carried out by the bank on behalf of their clients/customers excluding transactions between the internal accounts of the bank.

66.  A summary of cash transaction reports for the bank as a whole should be compiled by the Principal Officer of the bank every month in physical form as per the format specified. The summary should be signed by the Principal Officer and submitted to FIU-IND. In case of CTRs compiled centrally by banks for the branches having Core Banking Solution (CBS) at their central data centre, banks may generate centralised CTRs in respect of the branches under core banking solution at one point for onward transmission to FIU-IND, provided the CTR is to be generated in the format prescribed by FIU-IND.

KYC AML SHORT NOTES 3



KYC short Notes:


1.     The objective of KYC/AML/CFT guidelines is to prevent banks/FIs from being used, intentionally or unintentionally, by criminal elements for money laundering or terrorist financing activities.

2.     The PMLA came into effect from 1st July 2005. Necessary Notifications / Rules under the said Act were published in the Gazette of India on 1st July, 2005 by the Department of Revenue, Ministry of Finance, Government of India. The PMLA has been further amended vide notification dated March 6, 2009 and inter alia provides that violating the prohibitions on manipulative and deceptive devices, insider trading and substantial acquisition of securities or control as prescribed in Section 12 A read with Section 24 of the Securities and Exchange Board of India Act, 1992 (SEBI Act) will now be treated as a scheduled offence under schedule B of the PMLA.

3.     KYC procedures also enable banks/FIs to know/understand their customers and their financial dealings better and manage their risks prudently.

4.     For the purpose of KYC Norms, a ‘Customer’ is defined as a person who is engaged in a financial transaction or activity with a reporting entity and includes a person on whose behalf the person who is engaged in the transaction or activity, is acting.

5.     “Designated Director" means a person designated by the reporting entity (bank, financial institution, etc.) to ensure overall compliance with the obligations imposed under chapter IV of the PML Act.

SHORT NOTES 2 KYC AML


 SHORT NOTES  2 KYC AML

5. Terrorism Financing are 3 types



A.    State financing: Separate entities are created with organizational and financial support of the state

B.    Legimate modes : Donations by business,individuals and charity funds

C.    Private funding:by criminal activities by bank robberies, drug trafficking, kidnaps,exortion..



6. Money laundering can take several forms, although most methods can be categorized into one of a few types. These include "bank methods, smurfing [also known as structuring], currency exchanges, and double-invoicing".

 Structuring: Often known as smurfing, this is a method of placement whereby cash is broken into smaller deposits of money, used to defeat suspicion of money laundering and to avoid anti-money laundering reporting requirements. A sub-component of this is to use smaller amounts of cash to purchase bearer instruments, such as money orders, and then ultimately deposit those, again in small amounts.

·         Bulk cash smuggling: This involves physically smuggling cash to another jurisdiction and depositing it in a financial institution, such as an offshore bank, with greater bank secrecy or less rigorous money laundering enforcement

·         Cash-intensive businesses: In this method, a business typically expected to receive a large proportion of its revenue as cash uses its accounts to deposit criminally derived cash. Such enterprises often operate openly and in doing so generate cash revenue from incidental legitimate business in addition to the illicit cash – in such cases the business will usually claim all cash received as legitimate earnings. Service businesses are best suited to this method, as such enterprises have little or no variable costs and/or a large ratio between revenue and variable costs, which makes it difficult to detect discrepancies between revenues and costs. Examples are parking structures, strip clubs, tanning salons, car washes, arcades, bars, restaurants, and casinos.

·         Trade-based laundering: This involves under- or over-valuing invoices to disguise the movement of money. For example, the art market has been accused of being an ideal vehicle for money laundering due to several unique aspects of art such as the subjective value of artworks as well as the secrecy of auction houses about the identity of the buyer and seller.

·         Shell companies and trusts: Trusts and shell companies disguise the true owners of money. Trusts and corporate vehicles, depending on the jurisdiction, need not disclose their true owner. Sometimes referred to by the slang term rathole, though that term usually refers to a person acting as the fictitious owner rather than the business entity.

·         Round-tripping: Here, money is deposited in a controlled foreign corporation offshore, preferably in a tax haven where minimal records are kept, and then shipped back as a foreign direct investment, exempt from taxation. A variant on this is to transfer money to a law firm or similar organization as funds on account of fees, then to cancel the retainer and, when the money is remitted, represent the sums received from the lawyers as a legacy under a will or proceeds of litigation.

·         Bank capture: In this case, money launderers or criminals buy a controlling interest in a bank, preferably in a jurisdiction with weak money laundering controls, and then move money through the bank without scrutiny.

·         Casinos: In this method, an individual walks into a casino and buys chips with illicit cash. The individual will then play for a relatively short time. When the person cashes in the chips, they will expect to take payment in a check, or at least get a receipt so they can claim the proceeds as gambling winnings.

·         Other gambling: Money is spent on gambling, preferably on high odds games. One way to minimize risk with this method is to bet on every possible outcome of some event that has many possible outcomes, so no outcome(s) have short odds, and the bettor will lose only the vigorish and will have one or more winning bets that can be shown as the source of money. The losing bets will remain hidden.

·         Real estate: Someone purchases real estate with illegal proceeds and then sells the property. To outsiders, the proceeds from the sale look like legitimate income. Alternatively, the price of the property is manipulated: the seller agrees to a contract that underrepresents the value of the property, and receives criminal proceeds to make up the difference.

·         Black salaries: A company may have unregistered employees without written contracts and pay them cash salaries. Dirty money might be used to pay them.

·         Tax amnesties: For example, those that legalize unreported assets and cash in tax havens.

·         Life insurance business: Assignment of policies to unidentified third parties and for which no plausible reasons can be ascertained.

·         By using national banking services smurfing, Muiltiple tier of accounts,funnel accounts,Contra transactions,DD,cash depost and transfer fund connected accounts, front companies, legimate accounts, dormant accounts(Mostly used by terrorists) and wire transfer

·         Using remittance ,prepaid cards, money changers,credit and debit cards

By using The credit card industry includes: case study


 Credit card associations, such as American Express,MasterCard and Visa, which license member banks toissue bankcards, authorize merchants to accept thosecards, or bothIssuing banks, which solicit potential customers and issue the credit cards.Acquiring banks, which process transactions for merchants who accept credit cards.
 Third-party processors, which contract with issuing or acquiring banks to provide transaction processing andother credit card–related services for the banks.Credit card accounts are not likely to be used in the initialplacement stage of money laundering because the industrygenerally restricts cash payments. They are more likely to be usedin the layering or integration stages.
Example
Money launderer Josh prepays his credit card using illicit funds that he has already introduced into thebanking system, creating a credit balance on his account. Josh then requests a credit refund, whichenables him to further obscure the origin of the funds, which constitutes layering. Josh then uses the illicitmoney he placed in his bank account and the creditcard refund to pay for a new kitchen that he bought.Through these steps he has integrated his illicit fundsinto the financial system.

·         A money launderer could put ill-gotten funds in accounts at banksoffshore and then access these funds using credit and debitcards associated with the offshore account. Alternatively, he couldsmuggle the cash out of one country into an offshore jurisdictionwith lax regulatory oversight, place the cash in offshore banks and— again — access the illicit funds using credit or debit cards.In a 2002 Report called “Extent of Money Laundering throughCredit Cards Is Unknown,” the U.S. Government AccountabilityOffice, the Congressional watchdog of the United States, offered hypothetical money laundering scenarios using credit cards. One
example was: “[Money launderers establish a legitimate businessin the U.S. as a ‘front’ for their illicit activity. They establish a bank account with a U.S.-based bank and obtain credit cards and ATM cards under the name of the ‘front business.’ Funds from theirillicit activities are deposited into the bank account in the United States. While in another country, where their U.S.-based bank hasaffiliates, they make withdrawals from their U.S. bank account,
using credit cards and ATM cards. Money is deposited by one of their cohorts in the U.S. and is transferred to pay off the credit cardloan or even prepay the credit card. The bank’s online services make it possible to transfer funds between checking and creditcard accounts.”



6.ML Global measures can be achieved by



A.    Engagement of international organizations

B.    UNO initiatives like Vienna convention in 1988, Political declaration in 1998  , The Palermo convention in 2003

C.    International monetary fund

D.    Financial intelligence units (In india 15th nov 2004 , Director EIU economic intelligence council, Headed by finance Minister)

E.    Egmont group of FIUs..1995 (151  FIUs)



CASE STUDY KYC AML


Online or Internet Banking ( Special Case study how Money laundering 3 steps Happens):: Very important
Placement — Launderers want to get their proceeds into legitimate repositories such as banks, securities or real estate, with as little trace of the source and beneficial ownership as possible. Often, cyberspace banks do not accept conventional deposits. However,cyberbanks could be organized to take custodial-like forms — holding, reconciling and transferring rights to assets held in different forms around the world. Money launderers can create their own systems shadowing traditional commercial banks in order to acceptdeposits, perhaps as warehouses for cash or otherbulk commodities. Thus, cyberspace banks have thepotential to offer highly secure, uncommonly private“placement” vehicles for money launderersLayering — Electronic mail messages, aided by encryption and cyberspace banking transfers, enablelaunderers to transfer assets around the world manytimes a day.
 Integration — Once layered, cyberspace bankingtechnologies may facilitate integration in two ways.If cyberbanking permits person-to-person cash-like transfers, with no actual cash involvement, existing currency reporting regulations do not apply. Using“super smart-card” technologies, money can be movedaround the world through ATM transactions. These smart cards permit easy retrieval of the “account”balance by the use of an ATM card