Saturday, 29 June 2019

International trade policy framework




Organizational bodies


WTO


The World Trade Organization (WTO) is an intergovernmental organization that regulates international trade. The WTO officially commenced on 1 January 1995 under the Marrakesh Agreement, signed by 124 nations on 15 April 1994, replacing the General Agreement on Tariffs and Trade (GATT), which commenced in 1948. It is the largest international economic organization in the world.




The WTO deals with regulation of trade in goods, services and intellectual property between participating countries by providing a framework for negotiating trade agreements and a dispute resolution process aimed at enforcing participants' adherence to WTO agreements, which are signed by representatives of member governments and ratified by their parliaments. The WTO prohibits discrimination between trading partners, but provides exceptions for environmental protection, national security, and other important goals. Trade-related disputes are resolved by independent judges at the WTO through a dispute resolution process.




WTO came into being on 1995.


It has come into existence after GAAT General Agreement on Tariffs and Trade (GAAT)


It helps producers of good and services, importer, exporters to do their business


Uruguay rounds of talks made for the formation of WTO


Totally 164 countries present in WTO as of July 29th 2016


In 2000 agriculture and services discussions started in Doha round of talks


Fourth ministerial conference held in Doha Qatar in november20001


In the fourth conference non-agricultural tariff antidumping details are discussed


World bank identified 32 major regional trade blocks


Trade block means group of countries that have established preferential trade agreements among member countries


PTA stands for preferential trade agreements


Most commonly used PTA is Free Trade agreement


Free Trade Agreement means reducing or removing the tariff and non-tariff barrier between member nations but not with the non-member nations


A step forward for the FTA is the Custom Union (CU) where not only removing trade barrier with the member nations but also maintaining the identical trade with non-members.


Regional and Bi lateral trade agreements can cause trade diversion and trade distortions


List of RTB:


ASEAN: It was founded in August 8th 1967


Meeting will be held annually


APEC: Asia Pacific Economic Cooperation


It has 21 members called Member Economies


EAEC: East Asia Economic Caucus


It is known as Asian Plus Three


ASEM: Asia Europe Meeting


It is established in 1996


CHOGM: Common Wealth Heads of Government Meetings


EU: European Union strong international trade


There are five EU institutions namely European Parliament, Council of EU, E Commission, Court of Justice, Court of Auditors


NAFTA: North America Free Trade Agreement


CIS: Common Wealth of Independent States


COMESA: Common Market for Eastern and Southern Africa


SAARC: South Asian Association of Regional Cooperation established on Dec 8th 1985


ITR: Intellectual Property rights


It will be held annually.


MERCOSUR: It is a tariff union of South American Countries


It is the fastest growing trading blocks


G-15 group established in 1989


G7 economic power group became G8 after adding Russia


G77 is the third largest world coalition in United Nations


D8 is the group of developing eight countries


IOR-ARC (Indian Ocean Rim Association for Regional Cooperation) established in Mauritius March 1995

Current affair s on 29.06.2019

Today's Headlines from www:

*Economic Times*

📝 Google appears to have leveraged Android dominance: CCI

📝 Sebi allows Religare Finvest to sell assets to ARCs, restructure debt, raise capital

📝 Toyota Kirloskar Motor signs wage settlement agreement

📝 Tata Steel unveils work in high-speed transport in Europe

📝 M&M invests Rs 60 cr in digital marketing infra in last 3 yrs

📝 ONGC seeks partners to raise output from 64 small fields

📝 No proposal to fix MSP for milk: Government

📝 India to get over 65 million sq ft new mall space by 2022-end: Report

📝 Micro ATMs a big hit in rural India, transactions in May touch 33.5 million

*Business Standard*

📝 India's current account deficit narrows sharply to 0.7% of GDP in Q4

📝 SBI Mutual Fund bets big on Emami, increases stake from 0.68% to 8.8%

📝 Grounded Jet Airways' employees find an investor in Adi Partners

📝 LG India eyes double-digit market share in smartphones by mid-2020

📝 Warburg Venture bets on warehouses as e-commerce booms in India

📝 Finance Ministry cuts small savings interest rates for July-Sept quarter

📝 Fiscal deficit hits 52% of budgeted target in first two months of FY20

📝 Retail loan growth slows to 17% in May, reflects slowdown in economy

📝 Forex reserves hit lifetime high of $426 bn, thanks to currency swaps

📝 India's external debt rises 2.6% to $543 billion at March-end

*Financial Express*

📝 IL&FS panel to explore loan recast options

📝 Payment security mechanism for private power plants launched

📝 JLR looking at partnerships, cost cutting: Tata Sons chief

📝 JM Baxi Group in talks with private equity investors for $200 million funding

📝 Reliance Infra, RPower shares tank after Yes Bank invokes 9 crore shares

📝 NBFC share to promoter pledged shares half of total exposure in FY19

📝 SBI declares 10 corporate borrowers, their directors wilful defaulters

📝 DHFL resolution plan: Lenders to start work as per RBI guidelines, says SBI chairman

*Mint*

📝 FII inflows in first six months of 2019 at highest in five years

📝 RBI relaxes leverage ratio for banks to boost their lending capacity

📝 CARE Ratings downgrades two Essel Group Companies

📝 Sea levels along Indian coast rose by 1.3 mm/year during last 40-50 years: Govt

📝 Fashion retailer Zara reports 13% drop in FY19 profit in India

📝 Second phase of UPI mechanism for retail investors from 1 July: Sebi

📝 Centre approves 2.5 lakh more houses under PMAY

📝 RBI tweaks conditions for sale of asset by an ARC to another

📝 Crop planting slows in India on weak monsoon rains.

Basic Principles of Information Security:

Basic Principles of Information Security:

For over twenty years, information security has held confidentiality, integrity and availability (known as the CIA triad) to be the core principles. There is continuous debate about extending this classic trio. Other principles such as Authenticity, Non-repudiation and accountability are also now becoming key considerations for practical security installations.

 Confidentiality: Confidentiality is the term used to prevent the disclosure of information to unauthorized individuals or systems. For example, a credit card transaction on the Internet requires the credit card number to be transmitted from the buyer to the merchant and from the merchant to a transaction processing network. The system attempts to enforce confidentiality by encrypting the card number during transmission, by limiting the places where it might appear (in databases, log files, backups, printed receipts, and so on), and by restricting access to the places where it is stored. If an unauthorized party obtains the card number in any way, a breach of confidentiality has occurred. Breaches of confidentiality take many forms like Hacking, Phishing, Vishing, Email-spoofing, SMS spoofing, and sending malicious code through email or Bot Networks, as discussed earlier.

 Integrity: In information security, integrity means that data cannot be modified without authorization. This is not the same thing as referential integrity in databases.
Integrity is violated when an employee accidentally or with malicious intent deletes important data files, when he/she is able to modify his own salary in a payroll database, when an employee uses programmes and deducts small amounts of money from all customer accounts and adds it to his/her own account (also called salami technique), when an unauthorized user vandalizes a web site, and so on.

On a larger scale, if an automated process is not written and tested correctly, bulk updates to a database could alter data in an incorrect way, leaving the integrity of the data compromised. Information security professionals are tasked with finding ways to implement controls that prevent errors of integrity.

 Availability: For any information system to serve its purpose, the information must be available when it is needed. This means that the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly. High availability systems aim to remain available at all times, preventing service disruptions due to power outages, hardware failures, and system upgrades. Ensuring availability also involves preventing denial-of-service (DoS) and distributed denial-of service (DDoS) attacks.

 Authenticity: In computing, e-business and information security it is necessary to ensure that the data, transactions, communications or documents (electronic or physical) are genuine. It is also important for authenticity to validate that both parties involved are who they claim they are.

 Non-repudiation: In law, non-repudiation implies one's intention to fulfill one’s obligations under a contract / transaction. It also implies that a party to a transaction cannot deny having received or having sent an electronic record. Electronic commerce uses technology such as digital signatures and encryption to establish authenticity and non-repudiation.

In addition to the above, there are other security-related concepts and principles when designing a security policy and deploying a security solution. They include identification, authorization, accountability, and auditing.

 Identification: Identification is the process by which a subject professes an identity and accountability is initiated. A subject must provide an identity to a system to start the process of authentication, authorization and accountability. Providing an identity can be typing in a username, swiping a smart card, waving a proximity device, speaking a phrase, or positioning face, hand, or finger for a camera or scanning device. Proving a process ID number also represents the identification process. Without an identity, a system has no way to correlate an authentication factor with the subject.

 Authorization: Once a subject is authenticated, access must be authorized. The process of authorization ensures that the requested activity or access to an object is possible given the rights and privileges assigned to the authenticated identity. In most cases, the system evaluates an access control matrix that compares the subject, the object, and the intended activity. If the specific action is allowed, the subject is authorized. Else, the subject is not authorized.

 Accountability and auditability: An organization’s security policy can be properly enforced only if accountability is maintained, i.e., security can be maintained only if subjects are held accountable for their actions. Effective accountability relies upon the capability to prove a subject’s identity and track their activities. Accountability is established by linking a human to the activities of an online identity through the

security services and mechanisms of auditing, authorization, authentication, and identification. Thus, human accountability is ultimately dependent on the strength of the authentication process. Without a reasonably strong authentication process, there is doubt that the correct human associated with a specific user account was the actual entity controlling that user account when an undesired action took place.

Friday, 28 June 2019

Current affair s on 28.06.2019

Today's Headlines from www:

*Economic Times*

📝 National centre being planned to hold all public data

📝 Sun Pharma arm enters pact with China Medical System

📝 DGCA allows airlines to use Jet's domestic slots till September end

📝 Max India to divest entire stake in Pharmax to group firm for Rs 61 crore

📝 IPO price range values Swiss Re's ReAssure at up to $4.2 billion

📝 Govt sets up working group to revise WPI, give roadmap to shift to PPI

📝 Circular on TDS worries expat directors of MNC subsidiaries

📝 Nuclear-capable missile Prithvi II successfully test-fired

*Business Standard*

📝 Failure of large HFCs similar to bank collapse, says RBI report

📝 Ahead of meeting with Modi, Trump asks India to withdraw high duties

📝 Investors oust FundsIndia founders over differences on company's strategy

📝 Flipkart plans to roll out electric vehicles for last-mile deliveries

📝 Promoters infuse Rs 2,250 crore in DLF against issuance of new equity share

📝 Cox & Kings defaults on payments of Rs 150 crore, stock plummets 10%

📝 Finance Ministry tells state-run banks to shore up credit to MSMEs

📝 Sebi tightens norms for MFs, pledged shares to boost investor confidence

📝 Axis Bank considers $1.3 billion share sale to expand lending capacity

📝 5G auction: Reliance Jio joins industry chorus for low spectrum pricing

*Financial Express*

📝 Will complete Jaypee Infra's projects in 4 years, Adani tells committee of creditors

📝 EV plan: NITI Aayog extends deadline for auto companies to come with road map

📝 Kotak-led IL&FS board to discuss restructuring of group entities today

📝 NMDC to terminate BHEL contract for Nagarnar steel plant

📝 Vedanta says Sterlite closure led to $2 billion imports, seeks inquiry into violence

📝 Liechtenstein-based LGT buys majority stake in Validus Wealth

📝 SECI floats new tender for 1,800 MW wind power projects in FY20

📝 Don’t raise import duty on raw material: Plastic industry urges govt

*Mint*

📝 Finance ministry wants EPFO to lower provident fund (PF) interest rates: Report

📝 IndiGo hikes cancellation, changes fees for flights within 3 days of departure

📝 NPAs may fall to 9% by March: RBI report

📝 I Squared Cap to invest $300 million in telecom infra platform Lightstorm

📝 Bank of Maharasthra to raise up to ₹3,000 crore equity capital

📝 Finance ministry invites bids from advisors to launch financial sector ETF

📝 Godrej family, locked in a dispute over land, seeks external advice.

Information system for bankers recollected

Information system banker exam.

Some questions.....shared by members



CyAT

CAA

Digital Signature

BCP

Digital forensics

Normalisation

Internal audit

DBA responsibility

Telecommunications system audit

Power off switches

Cyber terbunal judge or magistrate

DS reissuance

Central depository of DS

Audit trail significance

Bottom up methodology

Audit plan

BCP

IDS

Virtual keyboard

IFMS full from

EFT

RBIA

Inherent risk

Insider threat

IS Audit policy

Information security officer role

DBA responsibility

Stress testing

BCNF

Critical applications

Poor architecture system

SDLC

Prototyping model

RTO application

IT Act 2000

Punishment for copyright as per IT Act

Controller of Certifying Authorities operates the National Repository of Digital Signatures (NRDC)

Function of modem, which is not an OOP Lang. C C++ Java C#, questns abt DRP, Trojan horse, sniffing, spoofing, availability, integrity, DBMS, preventive, corrective, detective controls, BCP

DDL DML DCL TCL commands, CA CCA-Digital certificates

Digital signature complete

Cyber apellate tribunal presiding officer

System testing

Compliance testing

Substantive testing

Telecom control

Db forms

Db commands

Risk based audit

It audit

Dba roles n resp

Prototyping model

Sdlc full

Interface testing

Rbeit ltd reg it subsidiary of rbi

Non repudiation

Bot stroke worms

Certified information System Banker



13.01.2019 3 PM Batch

Moderate Difficulty

Passing Mark 60

Each question carries 1 mark ( 100 questions )



Scored 55 marks



Recollected questions

DR centre location

Data warehouse

Audit charter/policy

Is audit 5 -10 questions

RAM and cache memory

Static RAM

Metadata

Which DB model used in CBS

Characteristics of a table

Many to Many relationship in DB

Simple ,self,outer join

Adaptive maintenance

Multiplexing

Packet switching

Full Duplex method

Bridge,router,switch,gateway

Diff between router and switch

Function of osi model layers 5 questions

Which protocol used in banking http,smtp,tcp/ip

Real time processing

Emergency response

Mirror site and reciprocal agreement

Trojan horse

E money

INFINET

CFMS

SFMS

Spoofing, piggybagging

Pervasive principle in GASSP

Classification of control

Boundary sub system

Audit trail

Attenuation

Types of noise (cross talk)

False positive and negative

Firewall

Intrusion detection systems and tuning

In what circumstances user ID and password will be given to user(emergency access)

Remote Access

OS tasks

Travelling virus procedure

Public and private key encryption

Thursday, 27 June 2019

Very important article on Assets and Liabilities management

Asset Liability Management (ALM) can be defined as a mechanism to address the
risk faced by a bank due to a mismatch between assets and liabilities either due to
liquidity or changes in interest rates. Liquidity is an institution’s ability to meet
its liabilities either by borrowing or converting assets. Apart from liquidity, a bank
may also have a mismatch due to changes in interest rates as banks typically tend to
borrow short term (fixed or floating) and lend long term (fixed or floating).
A comprehensive ALM policy framework focuses on bank profitability and long-
term viability by targeting the net interest margin (NIM) ratio and Net Economic
Value (NEV), subject to balance sheet constraints. Significant among these
constraints are maintaining credit quality, meeting liquidity needs and obtaining
sufficient capital.
An insightful view of ALM is that it simply combines portfolio management
techniques (that is, asset, liability and spread management) into a coordinated
process. Thus, the central theme of ALM is the coordinated – and not piecemeal –
management of a bank’s entire balance sheet.
Although ALM is not a relatively new planning tool, it has evolved from the simple
idea of maturity-matching of assets and liabilities across various time horizons into a
framework that includes sophisticated concepts such as duration matching, variable-
rate pricing, and the use of static and dynamic simulation.
Measuring Risk
The function of ALM is not just protection from risk. The safety achieved through
ALM also opens up opportunities for enhancing net worth. Interest rate risk (IRR)
largely poses a problem to a bank’s net interest income and hence profitability.
Changes in interest rates can significantly alter a bank’s net interest income (NII),
depending on the extent of mismatch between the asset and liability interest rate
reset times. Changes in interest rates also affect the market value of a bank’s equity.
Methods of managing IRR first require a bank to specify goals for either the book
value or the market value of NII. In the former case, the focus will be on the current
value of NII and in the latter, the focus will be on the market value of equity.
In either case, though, the bank has to measure the risk exposure and formulate
strategies to minimise or mitigate risk.
The immediate focus of ALM is interest-rate risk and return as measured by a bank’s
net interest margin.

NIM = (Interest income – Interest expense) / Earning assets
A bank’s NIM, in turn, is a function of the interest-rate sensitivity, volume, and mix
of its earning assets and liabilities. That is, NIM = f (Rate, Volume, Mix)
Sources of interest rate risk
The primary forms of interest rate risk include repricing risk, yield curve risk, basis
risk and optionality.
Effects of interest rate risk
Changes in interest rates can have adverse effects both on a bank’s earnings and its
economic value.
The earnings perspective:
From the earnings perspective, the focus of analyses is the impact of changes in
interest rates on accrual or reported earnings. Variation in earnings (NII)
is an important focal point for IRR analysis because reduced interest earnings will
threaten the financial performance of an institution.
Economic value perspective:
Variation in market interest rates can also affect the economic value of a bank’s
assets, liabilities, and Off Balance Sheet (OBS) positions. Since the economic value
perspective considers the potential impact of interest rate changes on the present
value of all future cash flows, it provides a more comprehensive view of the potential
long-term effects of changes in interest rates than is offered by the earnings
perspective.
Interest rate sensitivity and GAP management
This model measures the direction and extent of asset-liability mismatch through
a funding or maturity GAP (or, simply, GAP). Assets and liabilities are grouped
in this method into time buckets according to maturity or the time until the
An insightful view of ALM is that it simply
combines portfolio management techniques
into a coordinated process.
Sl.
No.
Type of GAP Change in Interest Rates
(∆r)
Change in Net Interest
Income (∆NII)
1 RSA = RSLs Increase No change
2 RSA = RSLs Decrease No change
3 RSAs ≥ RSLs Increase NII increases
4 RSAs ≥ RSLs Decrease NII decreases
5 RSAs ≤ RSLs Increase NII decreases
6 RSAs ≤ RSLs Decrease NII increases

first possible resetting of interest rates. For each time bucket the GAP equals the
difference between the interest rate sensitive assets (RSAs) and the interest rate
sensitive liabilities (RSLs). In symbols:
GAP = RSAs – RSLs
When interest rates change, the bank’s NII changes based on the following
interrelationships:
∆NII = (RSAs - RSLs) x ∆r
∆NII = GAP x ∆r
A zero GAP will be the best choice either if the bank is unable to speculate interest
rates accurately or if its capacity to absorb risk is close to zero. With a zero GAP, the
bank is fully protected against both increases and decreases in interest rates as its
NII will not change in both cases.
As a tool for managing IRR,
GAP management suffers from
three limitations:
• Financial institutions in the normal course are incapable of out-predicting the
markets, hence maintain the zero GAP.
• It assumes that banks can flexibly adjust assets and liabilities to attain the
desired GAP.
• It focuses only on the current interest sensitivity of the assets and liabilities,
and ignores the effect of interest rate movements on the value of bank assets
and liabilities.
Cumulative GAP model
In this model, the sum of the periodic GAPs is equal to the cumulative GAP
measured by the maturity GAP model. While the periodic GAP model corrects
many of the deficiencies of the GAP model, it does not explicitly account for the
influence of multiple market rates on the interest income.
Duration GAP model (DAGAP)
Duration is defined as the average life of a financial instrument. It also provides an
approximate measure of market value interest elasticity. Duration analysis begins
by computing the individual duration of each asset and liability and weighting the
individual durations by the percentage of the asset or liability in the balance sheet to
obtain the combined asset and liability duration.
DURgap = DURassets – Kliabilities DURliabilities
Where, Kliabilities = Percentage of assets funded by liabilities
DGAP directly indicates the effect of interest rate changes on the net worth of the
institution. The funding GAP technique matches cash flows by structuring the
short-term maturity buckets. On the other hand, the DGAP hedges against IRR

by structuring the portfolios of assets and liabilities to change equally in value
whenever the interest rate changes. If DGAP is close to zero, the market value of the
bank’s equity will not change and, accordingly, become immunised to any changes
in interest rates.
DGAP analysis improves upon the maturity and cumulative GAP models by taking
into account the timing and market value of cash flows rather than the horizon
maturity. It gives a single index measure of interest rate risk exposure.
The application of duration analysis requires extensive data on the specific
characteristics and current market pricing schedules of financial instruments.
However, for institutions which have a high proportion of assets and liabilities
with embedded options, sensitivity analysis conducted using duration as the sole
measure of price elasticity is likely to lead to erroneous results due to the existence
of convexity in such instruments. Apart from this, duration analysis makes an
assumption of parallel shifts in the yield curve, which is not always true. To take
care of this, a high degree of analytical approach to yield curve dynamics is required.
However, immunisation through duration eliminates the possibility of unexpected
gains or losses when there is a parallel shift in the yield curve. In other words, it is a
hedging or risk-minimisation strategy; not a profit-maximisation strategy.
Simulation analysis
Simulations serve to construct the risk-return profile of the banking portfolio.
Scenario analysis addresses the issue of uncertainty associated with the future
direction of interest rates by allowing the analysis of isolated attributes with the
use of ‘what if’ simulations. However, it is debatable if simulation analysis, with its
attendant controls and ratification methods, can effectively capture the dynamics of
yield curve evolution and interest rate sensitivity of key financial variables.
Managing Interest Rate Risk
Depending upon the risk propensity of an institution, risk can be controlled using
a variety of techniques that can be classified into direct and synthetic methods. The
direct method of restructuring the balance sheet relies on changing the contractual
characteristics of assets and liabilities to achieve a particular duration or maturity
GAP. On the other hand, the synthetic method relies on the use of instruments
such as interest rate swaps, futures, options and customised agreements to alter the
balance sheet risk exposure. Since direct restructuring may not always be possible,
the availability of synthetic methods adds a certain degree of flexibility to the asset-
liability GAP management process. In addition, the process of securitisation and
financial engineering can also be used to create assets with wide investor appeal in
order to adjust asset-liability GAPs.
Using interest rate swaps to hedge interest rate risk
Interest rate swaps (IRS) represent a contractual agreement between a financial
institution and a counterparty to exchange cash flows at periodic intervals, based
on a notional amount. The purpose of an interest rate swap is to hedge interest rate


risk. By arranging for another party to assume its interest payments, a bank can
put in place such a hedge. Financial institutions can use such swaps to synthetically
convert floating rate liabilities to fixed rate liabilities. The arbitrage potential
associated with different comparative financing advantages (spreads) enables both
parties to benefit through lower borrowing costs.
In case of a falling interest rate scenario, prepayment will increase with an attendant
shortening of the asset’s average life. The financial institution may have to continue
exchanging swap cash flows for a period longer than the average life of the asset. In
order to protect such situations, options on swaps or ‘swaptions’ may be used. Call
options on swaps allow the financial institution to call the swap, while put options
on swaps allow the institution to activate or put the swap after a specific period.
Using financial futures to hedge interest rate risk
A futures contract is an agreement between a buyer and seller to exchange a fixed
quantity of a financial asset at an agreed price on a specified date. Interest rate
futures (IRF) can be used to control the risk associated with the asset/liability GAP
either at the macro-level or at the micro-level. A macro-hedge is used to protect
the entire balance sheet, whereas a micro-hedge is applied to individual assets or
transactions. A buyer, holding a long position, would purchase a futures contract
when interest rates are expected to fall. The seller of a futures contract, on the other
hand, would take a short position in anticipation of rising rates. The protection
provided by financial futures is symmetric in that losses (or gains) in the value of
the cash position are offset by gains (or losses) in the value of the futures position.
Forward contracts are also available to hedge against exchange rate risk.
Futures contracts are not without their own risks. Among the most important is
basis risk, especially prevalent in cross hedging. Financial institutions must also pay
close attention to the hedging ratio, and managements must be careful to follow
regulatory and accounting rules governing the use of futures contracts.
Using options to hedge interest rate risk
Options can be used to create a myriad risk-return profiles using two essential
ingredients: calls and puts. Call option strategies are profitable in bullish interest
rate scenarios. With respect to the ALM process, options can be used for reducing
risk and enhancing yield. Put options can be used to provide insurance against price
declines, with limited risk if the opposite occurs. Similarly, call options can be used
to enhance profits if the market rallies, with the maximum loss restricted to the
upfront premium.
Customised interest rate agreements
‘Customised interest rate agreements’ is the general term used to classify
instruments such as interest rate caps and floors. In return for the protection against
rising liability costs, the cap buyer pays a premium to the cap seller. The pay-off
profile of the cap buyer is asymmetric in nature, in that if interest rates do not
rise, the maximum loss is restricted to the cap premium. Since the cap buyer gains

when interest rates rise, the purchase of a cap is comparable to buying a strip of
put options. Similarly, in return for the protection against falling asset returns, the
floor buyer pays a premium to the seller of the floor. The pay-off profile of the floor
buyer is also asymmetric in nature since the maximum loss is restricted to the floor
premium. As interest rates fall, the pay-off to the buyer of the floor increases in
proportion to the fall in rates. In this respect, the purchase of a floor is comparable
to the purchase of a strip of call options.
By buying an interest rate cap and selling an interest rate floor to offset the cap
premium, financial institutions can also limit the cost of liabilities to a band of
interest rate constraints. This strategy, known as an interest rate ‘collar,’ has the
effect of capping liability costs in rising rate scenarios.
The role of securitisation in ALM
By using securitisation, financial institutions can create securities suitable for resale
in capital markets from assets which otherwise would have been held to maturity.
In addition to providing an alternative route for asset/liability restructuring,
securitisation may also be viewed as a form of direct financing in which savers are
directly lending to borrowers. Securitisation also provides the additional advantage
of cleansing the balance sheet of complex and highly illiquid assets as long as the
transformations required to enhance marketability are available on a cost-effective
basis. Securitisation transfers risks such as interest rate risk, credit risk (unless the
loans are securitised with full or partial recourse to the originator) and pre-payment
risk to the ultimate investors of the securitised assets.
Besides increasing the liquidity and diversification of the loans portfolio,
securitisation allows a financial institution to recapture some part of the profits of
lending and permits reduction in the cost of intermediation.
Conclusion
As the landscape of the financial services industry becomes increasingly competitive,
with rising costs of intermediation due to higher capital requirements and deposit
insurance, financial institutions face a loss of spread income. In order to enhance the
loss in profitability due to such developments, financial institutions may be forced
to deliberately mismatch asset/liability maturities in order to generate
higher spreads.
ALM is a systematic approach that attempts to provide a degree of protection to
the risk arising out of the asset/liability mismatch. ALM consists of a framework
to define, measure, monitor, modify and manage liquidity and interest rate risk. It
is not always possible for financial institutions to restructure the asset and liability
mix directly to manage asset/liability GAPs. Hence, off-balance sheet strategies
such as interest rate swaps, options, futures, caps, floors, forward rate agreements,
swaptions, and so on, can be used to create synthetic hedges to manage asset/
liability GAPs.

Current affair s on 27.06.2019

Today's Headlines from www:

*Economic Times*

📝 Amid NBFC crisis, HDFC Bank is planning $1.4 bn IPO of financial services unit

📝 Telecom FDI falls sharply to $2.66 billion in FY19 vs over $6.21 billion in FY18

📝 Govt can raise Rs 95,000 crore from infra bonds to boost growth: BofA

📝 Fed's Powell resists pressure for hefty rate cut, sends global stocks down

📝 Bajaj Allianz Life expects biz from pension to jump to 15-18% in FY'20

📝 Havells targets Rs 1,000 crore revenue from switchgears in three years

📝 Future Group diary JV targets Rs 6,000 crore topline in 5 years

📝 Ethanol-blending in petrol rises to record 6.2%

📝 NHB lowers refinance rates in order to transmit the policy rate cuts

*Business Standard*

📝 American investments worth trillions waiting for India, says Pompeo

📝 Coca-Cola in talks to pick stake in Cafe Coffee Day after pocketing Costa

📝 At 48.3% in 2018, corporate taxes in India among highest in the world

📝 Centre revives plan to float holding company for state-owned banks

📝 Electrosteel in expansion mode, eyes 10 mt capacity in 5-6 years

📝 DHFL promoters ready to sell controlling stake to global PE funds

📝 India taps EU to adopt bloc's security recommendations for 5G network

📝 Payments data must be stored in systems located in India, says RBI

📝 IndiaMart IPO subscribed 36 times; receives bids for 96.92 mn shares

📝 Godrej family hires top law firms to untangle land holdings worth Rs 20k-cr

*Financial Express*

📝 UCO Bank aims at recovering Rs 8,000 crore of bad loans this fiscal

📝 Income tax trouble for Cognizant; HC upholds Rs 2,500 crore demand

📝 Housing finance companies asked to raise capital adequacy to 15 %

📝 Oil ministry seeks Rs 33,000 crore more for subsidy payout

📝 NCLAT slams Amtek CoC for issuance of fresh information memorandum

📝 Realty sector sees $ 3.9-billion private equity inflows in first 6 months of 2019

📝 No proposal to close MTNL, BSNL; revival plan under preparation, says Ravi Shankar Prasad

📝 Flipkart to roll out reward system SuperCoins from July

*Mint*

📝 OYO warns of legal action against vested groups for tying to disrupt business

📝 HSBC issues notice to IL&FS arm seeking its dues

📝 Icra cuts long-term debt rating of Piramal Capital, Edelweiss firms by a notch

📝 US set to delay more China tariffs ahead of G20 summit

📝 Uber buys artificial intelligence firm to advance push on autonomous cars

📝 Falling LNG prices to revive prospects of stressed power units

📝 Canara Bank to raise ₹1,500 crore via bonds

📝 Over 6.84 lakh vacant posts in central government departments

📝 India's May steel exports drop to lowest in 3 years.

Wednesday, 26 June 2019

Types of Equity Funds .........NISM

Types of Equity Funds
Equity funds invest in equity instruments issued by companies. The funds target long-term appreciation in the value of the portfolio from the gains in the value of the securities held and the dividends earned on it. The securities in the portfolio are typically listed on the stock exchange, and the changes in the price of the securities is reflected in the volatility in the returns from the portfolio. These funds can be categorized based on the type of equity shares that are included in the portfolio and the strategy or style adopted by the fund manager to pick the securities and manage the portfolio.
Diversified equity fund is a category of funds that invest in a diverse mix of securities that cut across sectors and market capitalization. The risk of the fund’s performance being significantly affected by the poor performance of one sector or segment is low.
Market Segment based funds invest in companies of a particular market size. Equity stocks may be segmented based on market capitalization as large- cap, mid-cap and small-cap stocks.
• Large- cap funds invest in stocks of large, liquid blue-chip companies with stable performance and returns.
• Mid-cap funds invest in mid-cap companies that have the potential for faster growth and higher returns. These companies are more susceptible to economic downturns and evaluating and selecting the right companies becomes important. Funds that invest in such companies have a higher risk of the companies selected not being able to withstand the slowdown in revenues and profits. Similarly, the price of the stocks also fall more when markets fall.
• Small-cap funds invest in companies with small market capitalisation with intent of benefitting from the higher gains in the price of stocks. The risks are also higher.
Sector funds invest in only a specific sector. For example, a banking sector fund will invest in only shares of banking companies. Gold sector fund will invest in only shares of gold-related companies. The performance of such funds can see periods of under-performance and out-performance as it is linked to the performance of the sector, which tend to be cyclical. Entry and exit into these funds need to be timed well so that the investor does not invest when the sector has peaked and exit when the sector performance falls. This makes the scheme more risky than a diversified equity scheme.
Thematic funds invest in line with an investment theme. For example, an infrastructure thematic fund might invest in shares of companies that are into infrastructure construction, infrastructure toll-collection, cement, steel, telecom, power etc. The investment is thus more broad-based than a sector fund; but narrower than a diversified equity fund and still has the risk of concentration

Strategy-based Schemes have portfolios that are created and managed according to a stated style or strategy. Equity Income / Dividend Yield Schemes invest in securities whose shares fluctuate less, and the dividend represents a larger proportion of the returns on those shares. They represent companies with stable earnings but not many opportunities for growth or expansion. The NAV of such equity schemes are expected to fluctuate lesser than other categories of equity schemes. Value fund invest in shares of fundamentally strong companies that are currently under-valued in the market with the expectation of benefiting from an increase in price as the market recognizes the true value. Such funds have lower risk. They require a longer investment horizon for the strategy to play out. Growth Funds portfolios feature companies whose earnings are expected to grow at a rate higher than the average rate. These funds aim at providing capital appreciation to the investors and provide above average returns in bullish markets. The volatility in returns is higher in such funds. Focussed funds hold portfolios concentrated in a limited number of stocks. Selection risks are high in such funds. If the fund manager selects the right stocks then the strategy pays off. If even a few of the stocks do not perform as expected the impact on the scheme’s returns can be significant as they constitute a large part of the portfolio.
Equity Linked Savings Schemes (ELSS) are diversified equity funds that offer tax benefits to investors under section 80 C of the Income Tax Act up to an investment limit of Rs. 150000 a year. ELSS are required to hold at least 80% of its portfolio in equity instruments. The investor’s the investment is subject to lock-in for a period of 3 years during which period it cannot be redeemed, transferred or pledged.
Rajiv Gandhi Equity Savings Schemes (RGESS) too, as seen earlier, offer tax benefits to first-time investors. Investments are subject to a fixed lock-in period of 1 year, and flexible lock-in period of 2 years.

Digital banking recollcetd


Digital Banking Recollected questions:::
1.CTS abbreviation cheque truncation system
2. What is firewall?: A software programme for protecting against unauthorized access to the information.
3.BBPS … Bhatart Bill payment sytem
4.MDR: merchant discount rate
5. minimum amount which can be remitted under RTGS by a customer: Minimum Rs. 2 lac and no Maximum.
6.Max amount of NEFT can be remitted ..no limit
7. AEPS stands for : Aadhar Enabled Payment System.
8. CPPC stands for : Central Pension Processing Cell.
9. IBPP stands for : Internet Bill Presentation & Payment.
10. Rupay Platform refers to: National Payments Corporation of India (NPCI) initiated the launch of RuPay card in India. It was
done with the intention of integration of payment systems in the country. It has led to lower transaction cost as
processing is being done within country. Also, transactions will be faster.
11. Encryption means: Conversion of plain language into secret language, i.e., coding and The extent of coverage under
12. Maximum RTGS Charge for Rs.2 lac to 5 lac: Rs.25.00 + service tax
13. Application under ASBA can be applied for: a) IPO b) Right Issue c) Mutual fund
14. E-sahyog portal:belongs to Income Tax
15. A Proxy server is for: To provide security against unauthorized users
16. Phising?: To steal the customers personal / confidential data
17. In case of failed ATM transaction customer will get money in 7 working days after compliant
18. CVV: Customer Verification Value
19.NPCI: National Payment Corporation of India.
20. NUUP: National Unified USSD Platform.
21.IMEI: International Mobile Equipment Identity.
22. CVD: Customer Verification Data.
23.STP straight through process
24. . Forward Market Commission is established for:.- Commodity futures
25. Full form of ALU: Arithmetical Logical Unit
26. Full form of HTTP: Hyper Text Transfer Protocol
27. Full form of INFINET? Indian Financial Network
28. GBM: Govt. Business Module
29. IBPP stands for: Internet Bill Presentation & Payment
30. IMPS: Immediate Mobile Payment Service - Mobile to account
31. Starting of a computer is called: Booting
32. Universal set of standards and guidelines for communication by EDI is called: EDIFACT.
33. Full form of ISDN: Integrated Services Digital Network.
34. RTGS amount limit for customers: Min Rs.2 lac and no max
35. Which bank has max share in INFINO PAYTECH Ltd : ICICI Bank
36. USSD: Unstructured Supplementary Service Data.
37. LAN: Local Area Network
38. AEPS stands for : Aadhar Enabled Payment System
39 ATM : Anywhere, anytime,
40. BCP- Business continuity Plan
41. First committee on computerization in banks was headed by: Dr C Rangarajan.
42. In an Organisation communication between the same organization, what type of system applicable: Intranet.
43. In CBS, signatures are loaded through scanning.. 
44. WAN: Wide area network 
45.WAN uses ….interconnecting computers at different Geographical locations
46.CHI : Clearing Housing interface
47.ECE: electronic clearing system
48.APB: Aadhaar pay bridge
49. When in a computer network one network protocol encapsulates a different payload protocol, it is called: Tunnel.
50 Computer Security Day : 30th November
51. customer’s account should be credited within how many days of the complaint?: 7 working
52. First step towards computerisation in Banking: Setting up ALPM (Advance Ledger Posting Machine)
53. CIDR: central identities data repository
54.BBPCU:Bharat bill payment central unit

MSME Recollected


MSME recollected questions
1. Micro, small & medium sector
2. Priority sector classification (esp foreign banks less than 20 branches etc)
3. One sum on calculation of NWC
4. CLUSTER development features
5. TIFAC full form, CODISSIA located at?
6. Mahila schemes implemented by SIDBI
7. Which are NOT included under plant & machinery
8. HUF, LLP questions on minor admissibility
9. Common seal compulsory for companies/LLP
10. GRAY sick area
11. Ots implemented by? - individual banks
12. Highest investment by overseas investors is under which sectors
13. Study report Of DIC recommendations
14. Federation of msme for West Bengal state? ITCOT located in which state? MSME council located? Msme as per constitution is state/central/concurrent subject?

FX OPERATIONS

FX OPERATION:-
Recollected questions are:
1) How many incoterms?
2) Full form of DAT
3)Few questions from doc letter of credit .
4)Nearly 8 questions on LRS
5)NRI remittances limits etc
6)Basic questions on URR 725,
7)URC 522
8)ISP 98
9)Known holiday in forex
10)One question on section of fema
11)Ecgc scheme
12)Question on customs related
13)TT buying TT selling 
14)Bill discounting
15)Insurance docs in LC
16) three numericals on cross rates
Many of them are direct questions from FEDAI books.

Foreign exchange operations Syllabus ::



I. a) FEDAI Role and Rules

b) Foreign Exchange Rates and Risk Management

c) Code of Conduct, Ethics / Compliance, Corporate Governance

II. Regulatory Requirements under FEMA for Resident / Non-resident Individuals

a) Remittance Facilities under LRS

b) Other Remittance Facilities for Resident indians / others

c) Various foreign currency accounts in india / Abroad

d) Acquisition of Assets, Immovable properties outside India, including

investments in securities abroad

e) Remittance of Assets

f) Facilities for Non-resident Indians - Deposits Accounts, Investments,

Borrowing etc.

III. Regulatory Requirements under FEMA for Resident / Non-resident Entities

a) Import of Goods & Services and other non-import remittance

b) External commercial borrowing

c) Export of goods and services

d) Investments outside India

e) Investments in India by non-resident Corporates / FPIs / Others Entities

f) Establishments of LO / BO / PO in India by foreign entities

IV. Documentary Credits & Standby Credits

a) ICC guidelines pertining to INCOTERMS 2010, URC 522



b) UCP 600, eUCP version 1.1

c) ISBP - ICC PUB. 745, URBO - ICC PUB. 750, URDG 758

d) DOCDEX Rules - ICC PUB.

872 V. Export Finance

a) Various finance available by way for Pre-shipment / Post-shipment

finance in Rupes and Foreign Currency

b) International Factoring, Forfaiting

c) Export Credit Guarantee Corporatio (ECGC)

VI. Foreign Trade Policy (FTP) 2015-20

a) Various policy issues withspecific relevance to AD Banks with latest

updations

..



Purchase FEDAI 7 BOOKS as mentioned by the IIBF and use my FX individual PDF and by topic wise i have updated in blog also use it.... No need separate PDF.. same like BFM 1st module and practice more numerical s form blog








https://iibfadda.blogspot.com/search/label/Forex