Banking and information technology
1 / 39

Banking and Information Technology - PowerPoint PPT Presentation

  • Updated On :

Banking and Information Technology Group 1 – DeKalb Lori Wonser Henry Fischer Greg Johnson Aaron Boehm Mia Hannon Check Clearing Lori Wonser Checks Next to cash, checks are the most frequently used method of payment in the U.S. Account for about 70 % of the total number of payments

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'Banking and Information Technology' - benjamin

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Banking and information technology l.jpg

Banking and Information Technology

Group 1 – DeKalb

Lori Wonser

Henry Fischer

Greg Johnson

Aaron Boehm

Mia Hannon

Check clearing l.jpg

Check Clearing

Lori Wonser

Checks l.jpg

  • Next to cash, checks are the most frequently used method of payment in the U.S.

  • Account for about 70 % of the total number of payments

Clearing checks is a two part process l.jpg
“Clearing” checks is a two part process

  • Clearance

  • Settlement

Federal reserve system l.jpg
Federal Reserve System process

  • Commonly called the "Fed"

  • Created by Congress in 1913 to serve as central bank of the U.S.

  • Made up of 12 regional Reserve Banks and the Board of Governors in Washington D.C.

  • One of the major reasons for creating the Federal Reserve was to ensure that the nation had a safe and efficient means for transferring funds within the banking system

Technology changes over time l.jpg
Technology Changes Over Time process

  • Manual operation - all paper records and courier service

  • Check encoding, machine readable

  • Small banks to larger banks

  • Larger banks to Fed

  • Proofing machines & Mag-card readers

  • PC's and software for sending electronic files.

  • Imaging machines

  • MICR standardization

Fed s check modernization initiative four key points l.jpg
Fed's Check Modernization Initiative Four Key Points process

  • A standard item-processing platform

  • A standard image platform with a national archive

  • A streamlined adjustments process using a national adjustments system

  • Nationally delivered Check Services via FedLine for the Web

Electronic check conversion l.jpg
Electronic Check Conversion process

  • Intermediate Step

  • EFT Processed through ACH (Automated Clearing House)

Automated clearing house l.jpg
Automated Clearing House process

  • Transfers funds electronically without the paper trail

  • Almost 8 billion payments through ACH in 2001

  • Amount expected to double by 2006

E banking l.jpg

E-Banking process

Mia Hannon

Electronic banking l.jpg
Electronic Banking process

  • Provides enormous benefits

  • Has been around for a long time as ATMs and telephone transactions

  • Transformed by the Internet

  • Internet services are cost-efficient

  • Customers can compare banks’ services

  • Allows banks to expand geographical reach

Internet banking l.jpg
Internet Banking process

  • Concentrated in the largest U.S. banks

  • Mid-2001, 44% of national banks maintained transactional websites

  • In 2001 only 6 percent of U.S. consumers that had internet bank services used them

Pc banking l.jpg
PC Banking process

  • Computer hardware, software and telecommunication systems needed to access bank information through a personal computer

  • Telecommunication links may include:

    • Private networks

    • Public networks

  • Handles many bank transactions:

    • View account balance

    • Request transfer between accounts

    • Pay bills electronically

Atm automated teller machine l.jpg
ATM, Automated Teller Machine process

  • Simple data terminal communicating through a host processor

  • Can be connected through:

    • a dedicated telephone line

    • dail-up modem

    • Internet service provider

Atm automated teller machine18 l.jpg
ATM, Automated Teller Machine process

  • Money moves electronically from user’s account to host account to merchant’s account.

  • New innovations: machines that verbally prompt

Credit cards l.jpg
Credit Cards process

  • 3 ways credit card purchases are conducted:

    • merchant uses voice authentication

    • or electronic data capture/magstripe-card swipe terminals

    • or virtual terminals on the Internet

Smart cards l.jpg
Smart Cards process

  • Contains an embedded microprocessor

  • Microprocessor enforces access to the data on the card

    • Identity of card user must be confirmed for each transaction

    • Card and card reader verify that each is legitimate

    • Then transaction is carried out in an encrypted format

Smart cards cont l.jpg
Smart Cards Cont. process

  • Most common smart card applications are:

    • Credit cards

    • Electronic cash

    • Computer security systems

    • Wireless communication

    • Loyalty systems (frequent flyers points)

    • Banking

    • Satellite TV

    • Government identification

Other forms of electronic banking l.jpg
Other Forms of Electronic Banking process

  • Direct Deposit

  • Pay-by-Phone

  • Electronic Bill Payment

  • Debit Cards

  • Electronic Check Conversion

  • eChecks

  • Cash Value Stored

Loan and credit processing is labor intensive l.jpg
Loan and Credit Processing is Labor Intensive process

  • Because they both rely heavily on the:

    • Gathering of Information

    • Processing of Information

    • Analyzing of Information

A challenge for financial institutions l.jpg
A Challenge for Financial Institutions process

  • Streamline and Standardize the Loan Origination and Credit Approval Process

How can this be done l.jpg
How can this be done? process

  • The Use of Technology to automate the workflow of the Loan Process

  • Technology to shorten the length of the Credit Approval Process

Slide28 l.jpg

  • Automating The Loan Process process

  • Workflow Management Systems Application Software allows Loan Officers and the Loan Team to:

    • Manage

    • Prioritize

    • Measure

  • New Mortgages and Loans

Credit processing l.jpg
Credit Processing process

  • Successful financial institutions must be able to make rapid, accurate, and successful credit decisions

  • To do this financial institutions must embrace technology

Slide30 l.jpg

The ever-increasing emergence of E-commerce, demands that financial institutions be more efficient and better meet customers’ needs

To do this

There are several web-based applications available to lenders and financial institutions to assist in credit decisions

Slide31 l.jpg

  • Web-based applications allow loan processing teams to be more competitive by:

    • Offering flexible, real-time credit decisions systems

    • Customizable lender guidelines

    • Generation of instant loan pre-qualification

    • Connectivity to third-party providers

    • Response time within minutes, 24/7

Physical security l.jpg

Physical Security more competitive by:

Aaron Boehm

Introduction l.jpg
Introduction more competitive by:

  • Physical security in the bank goes beyond the traditional armed security guards.

  • Physical security devices are as important inside a bank as protection software is to e-banking.

Physical security devices l.jpg
Physical Security Devices more competitive by:

  • Non-traditional

    • Micro-Branch systems

    • Drive-up Pneumatic systems

  • Traditional

    • Vaults

    • Safes

    • Bullet-resistive products

Security guard duties training l.jpg
Security guard duties/training more competitive by:

  • The oldest form of security in banks is the security guard.

  • Security guard duties include: the protection of people and property from harm, theft, or unlawful activity, deterring, detecting, observing, and reporting unlawful or unauthorized activity, and responding to security alarm systems.

  • Security guards must pass a 47-hour firearm training course in order to have the authorization to carry a firearm while on duty.

  • Guards undergo training in camera systems and alarm systems.

  • While the security guard is the oldest form of bank security but they are still proven to be effective.

Electronic security l.jpg

Electronic Security more competitive by:

Greg Johnson

Understanding the risks l.jpg
Understanding the Risks more competitive by:

  • Unauthorized Access

  • Data Alteration

  • Monitoring

  • Spoofing

  • Service Denial

  • Repudiation

Suggested items l.jpg
Suggested Items more competitive by:

  • Smart Cards

  • Encryption

  • Behavior Software

  • Informing Employees

  • Removing Instant Messengers

    • Subvert Antivirus Wear

    • File Swapping

    • Piggy Backing/Access

Conclusion l.jpg
Conclusion more competitive by:

From all of this, we have learned that information technology has spurred competition from nonbanks, encouraged financial innovations that have allowed firms to directly access financial markets, and empowered customers and businesses with information needed to make better investment decisions. At the same time, IT is allowing banks to offer new products, operate more efficiently, raise productivity, expand geographically and compete globally. A more efficient, productive banking industry is providing services of greater quality and value.