1 / 24

Near Field Communication

Near Field Communication. Safeguarding the Mobile Marketplace. Our speakers. Larry Collins Head of e-Solutions Zurich Services Corporation Christopher O’Donnell, CPCU ARM Administrative Vice President Director of Corporate Insurance & Risk M&T Bank.

Download Presentation

Near Field Communication

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Near Field Communication Safeguarding the Mobile Marketplace

  2. Our speakers • Larry CollinsHead of e-SolutionsZurich Services Corporation • Christopher O’Donnell, CPCU ARMAdministrative Vice PresidentDirector of Corporate Insurance & RiskM&T Bank

  3. Conducting business online in an increasingly mobile society • Cyber security was named one of the top five global risks for companies in 2012 at the World Economic Forum in Davos, Switzerland • Companies that have traditionally had little data about their customers now must become accustomed with data privacy and security laws, and protect their customers’ personal information

  4. What is Near Field Communication (NFC)? • “A wireless technology that has a range of only a few inches. It is based on the magnetic field induction between readers and tags in a radio frequency identification (RFID) system. Adhering to the ISO 14443 international standard for smart cards, near field communication (NFC) is compatible with the countless ID card terminals in use around the world.” (PC Mag)

  5. How big is the market? Juniper Networks

  6. How the Technology Works 1) Coil in the first smart phone sets up a current that is picked up a second smart phone or reader. 2) The second smart phone receives the “induced current” from the first, recognizes it as a valid signal and offers a connection. 3) The first cell phone accepts the connection and begins the transaction.

  7. How the Technology Works 1) Coil in the smart phone sets up a current that is picked up by the smart tag 2) The smart tag receives the “induced current” from the cell phone, recognizes it as a valid signal and offers a connection to the cell phone. 3) The cell phone accepts the connection and begins the transaction

  8. Users of NFC-enabled devices can: • Make payments or use coupons via devices, instead of credit or debit cards • Transfer files and share documents • Download information about objects, services or places from “smart posters” • Display electronic identity documents, like air travel boarding passes

  9. What are some examples of the technology?

  10. What are the risks? • Privacy • What data is being captured, processed or stored? • Information Privacy and security rules apply! • How does a customer opt-out? • Security • If you capture store or process data, you have to protect it. • Lost smart phones are now an exposure. Can you shut them down remotely? • Sentinel Hacking • A hacker can establish a “sentinel” tag, fixed in one place, to receive and download information from passing smart phones. • Any NPI on the smart phone can then be down loaded • Loss of privacy • Loss of financial info – credit card #s

  11. Businesses that rely on NFC to share company information can: • Automatically shut-off of an employee’s smart phone if it’s lost, so information can’t be accessed by unauthorized parties. • Enlist the company’s telecommunications and information technology department to limit the content that employees can download or store. • Enforce a password requirement. • Encrypt data so it can’t be easily read.

  12. Businesses that rely on NFC to acquire customer information can: • Use transmitted data for the purpose it was collected: If a customer shared personal information solely to pay for something, don’t then use that data for targeted marketing. • Secure collected data with encryption, passwords and by restricting access. • Determine how long data should be stored; create a data purging cycle. • An educated team, aware of global privacy laws, should be in place. • Limit data-reading devices’ power, allowing them to receive data only from short distances. Limit the content that devices display during transactions. • Implement the electronic security measures that a near field system requires.

  13. Risk management in practice: M&T Bank • Our risk management process involves a number of “moving parts” including: • Corporate Risk Management • Corporate Insurance • New Products & Services Committee • Corporate Operational Risk Committee • Management Group

  14. Risk management in practice: M&T Bank • We are in the process currently to review “alternative channels” of banking service. • The following slides will take us through a view of how we vet the risks associated with these “alternative channels.”

  15. Benefits *Source: Mercatus

  16. Competitive Analysis

  17. Business Initiative Risks

  18. Business Initiative Risks

  19. Loss Scenarios • Worst Case Loss Scenario • Patent infringement lawsuit, external fraud or data breach at the customer level. The risks would be reputational in nature. • Likely Loss Scenario • Mistaken internal transfer between a user’s account • Unintended bill payment to an existing payee

  20. Mobile Banking Enrollment* Total Unique Mobile Users: 128,854, or 21% of active Web Banking** 76,895Mobile Web Users 12% of active Web Banking 63,296Mobile Text Users 10% of active Web Banking Enrolled Customers Profile of Mobile Customer*** *71% of users are under the age of 36; about 26% are between the ages of 36-55. *Users are profitable.  They have high balances & cross-sell. *Users have a higher CQI than non-users. *A disproportionately high share of mobile users are in the Baltimore region. 24,957 App Downloads Number of Days *Reporting through 1/12/2010 **Web Banking Active Users: 628,541 ***DataMart 20

  21. Current EnvironmentIndustry Trends • Chat • Video • Facebook • Twitter 1980 2000 Today • Alternative Channels growing in transaction, sales, and research activities • Forrester predicts that one-third of all checking sales will come via the Internet by 2013 • 2009 survey by the American Bankers Association finds that customers under the age of 55 prefer to bank online

  22. Small Business Owners Use Smartphones Small Business Adoption Outpaces Consumer While only 17% of Americans own smartphones…49% of small business owners are reported to own smartphones. Source: Forrester, September 2010 22

  23. Current EnvironmentIndustry Transaction Trends • Mobile and Online transactions will grow at a significantly higher rate than other transactions over the next 3 years (TowerGroup) • More than 1.5B check deposit transactions will shift from the branch to mobile check deposit by 2014 (Mercatus’ Remote Deposit Capture Adoption Research Study, 2/2012) • According to Nielsen, by the middle of 2011 over 50% of mobile phones sold in the U.S. are expected to be smart phones, or other all in one device Source: TowerGroup

  24. Q&A

More Related