This edition takes into account the very latest advances in electronic banking and treasury security. The electronic transmission of funds from companies to banks means that companies are responsible for high levels of risk previously covered by the bank's own security systems. This book is the definitive source of advice for all finance professionals.Electronic banking and treasury security covers everything from the systems themselves to the new documentation and includes contributions from leading figures in the banking, treasury and computing communities. This book is invaluable to corporate treasurers, finance directors, bankers and the financial advisory community.
Foreword x Tony Shaw NatWest Electronic Services xii List of contributors xv Acknowledgements xix Part 1 Electronic banking Electronic banking: background and history 3(10) Michael Deakin Claire Goddard The first steps 5(1) The search for efficiency 6(1) Improving clearing systems 7(1) Progress from technical developments 8(2) Weaknesses are uncovered 10(1) Recent times 11(2) The function of APACS 13(15) Richard Tyson-Davies History and background 13(1) The fundamental role of APACS 14(1) APACS structure 15(3) Clearing companies 18(1) Future developments in APACS 19(1) Future developments in payment systems and information systems 20(1) CHAPS 20(2) Security 22(4) Settlement risk 26(2) Global cash management and security 28(20) Charles Storer Definition and evolution 29(1) Principal cash management components 30(6) Issues to consider when establishing a global cash management structure 36(3) Potential cash management risks and security principles 39(2) Corporate security requirements and measures 41(2) Banking security requirements and measures 43(2) Additional measures 45(1) Other considerations 46(1) Conclusions 47(1) BACS: practical control issues 48(12) Tom Fallon Brian Welch BACS and the euro 50(1) BACS and year 2000 (Y2K) compliance 50(1) BACSTEL 51(1) File authentication 52(1) Control point 53(1) Validation 53(1) Preparation of media 54(1) Beneficiaries bank details 54(2) Transaction limit 56(1) Input report 56(1) Audit reports 57(1) Mandate 57(1) Controls checklist 58(2) Electronic banking documentation 60(11) Brain Welch Negotiating with the bank 62(1) Specific points of concern 63(3) Electronic Data Interchange (EDI) 66(1) Agreements by subsidiaries or associates 67(1) Electronic Funds Transfer Act 1978 (USA) 67(1) Computer Misuse Act 1990 (UK) 68(1) Electronic banking documentation checklist 69(1) Conclusion 70(1) Funds transfer laws 71(28) Tony de Caux UCC4A funds transfer law 72(18) The impact of UCC4A on US-based companies 90(1) The impact of UCC4A on companies based outside the US 90(1) UNCITRAL model law on international credit transfers 91(2) The EC cross-border payment directive 93(6) Part 2 Treasury and systems security Managing treasury security 99(18) Claire Goddard Michael Deakin Planning and organizational framework 101(1) Authorization procedures 102(2) Segregation of duties 104(2) Access control techniques 106(1) Dealing controls 107(1) Accurate recording 108(1) Settlement procedures 109(1) Prompt reconciliation 109(1) Independent valuation 110(1) Timely management monitoring 111(1) Treasury security checklist 112(5) Security and control of treasury systems 117(15) Brian Welch Definition 117(1) Description 118(1) Early treasury systems 119(1) Basic security considerations 120(1) Security and access 121(1) Password abuse 122(1) Audit trail 123(1) Back-up and recovery 124(1) System upgrades 124(1) Documentation 125(1) The unthinkable 126(1) In-house systems 126(1) Security and audit checklist 127(5) Security on the Internet 132(12) Roger Gate Tony Palmer Introduction 132(1) Internet/World Wide Web (WWW) 133(3) Intranets and extranets 136(1) Firewalls 137(1) Cryptography 137(1) Symmetric encryption (secret keys) 138(2) Asymmetric encryption (public/private key pairs) 140(1) Message authentication codes (MACs) 141(1) Trusted third parties and certification 141(1) Challenge and response 142(1) Secure Electronic Transaction (SET) Protocol 142(1) Summary 143(1) EDI security 144(33) John Sherwood What is EDI? 144(3) Why does EDI need security? 147(2) What are the security requirements for EDI? 149(4) How does EDI compare with traditional systems? 153(2) What international standards are available? 155(1) What are the security features of EDIFACT? 156(4) What cryptographic techniques are available? 160(4) How is encryption technology used to provide message security? 164(1) What special purpose does X.435 fulfil? 165(2) EDIFACT security or X.435 security? 167(2) What are the legal issues affecting EDI security? 169(1) EDI security checklist 170(7) Part 3 The future Future developments 177(10) Michael Deakin Claire Goddard Retail banking services 179(1) Corporate treasury services 180(3) The effect of continuous progress 183(4) Appendix 1: Selecting a new treasury system 187(30) Appendix 2: The London Code of Conduct 217(58) Glossary 275(6) Index 281
Brian Welch is Treasury Consultant with UserCare Limited with wide experience as a corporate treasurer and with treasury systems. He is an active member of The Association of Corporate Treasurers, having served as a Member of the Council, Chairman of the Publications Committee and currently as a member of the Programme Committee and the working party on the introduction of the Euro.