2017 NACHA Third-Party Sender Initiatives
|
|
- Camilla Rose
- 6 years ago
- Views:
Transcription
1 2017 NACHA Third-Party Sender Initiatives Jordan Bennett Senior Director, Network Risk NACHA
2 2 MAC is an organization of Bankcard professionals involved in the risk management side of Card Processing. We have members from Banks, ISOs, Card Associations and others related to the risk management side of the industry. MAC s mission is to strengthen the payment ecosystem through ongoing education, communication and cooperation among acquirers, card brands and enforcement agencies. To learn more about MAC or to become a member of MAC please visit the website below.
3 3 NACHA s Risk Management Strategy Past and concurrent Third-Party initiatives include: NACHA Certified Third-Party Sender Registration Rule Risk Management Portal Third-Party Sender Identification Tool and online resources Third-Party Sender Operations Bulletin
4 NACHA Certified: NACHA s Certification Program for Third-Party Senders
5 5 What is NACHA Certified? NACHA Certified is a voluntary accreditation program for Third-Party Senders in the ACH Network The program includes a set of commonly understood requirements for conformance to sound business practices and standards NACHA Certified helps Third-Party Senders set themselves apart from their peers while improving the quality of the Network
6 6 Why Did NACHA launch NACHA Certified? NACHA recognizes that Third-Party Senders fill an important and vital role in the ACH Network! NACHA Certified provides value to industry participants and the network by improving self-governance Growth of third-party participation in the network to support new innovative payment methods many new market entrants act as Third-Party Senders and may not be familiar with compliance, risk management, and regulatory responsibilities Improve transparency for well-governed industry partners looking to do business together via public list of Third-Party Senders
7 7 What are the Benefits to the ODFI? Serves as a starting point for ODFI s own due diligence, as well as a source of validation for the ODFI s ongoing oversight for existing Third-Party Sender relationships Provides assurance that the Third-Party Sender has an understanding of NACHA Operating Rules compliance requirements, and has demonstrated sound practices related to ACH transaction processing Publicly available certification requirements set the standard that all Third-Party Senders should meet and improves awareness of governance expectations A public list of certified Third-Party Senders may smooth the way for more efficient and effective interactions with ODFI partners
8 8 What are the Benefits for Third-Party Senders? A public list of certified Third-Party Senders paves the way to a more positive interaction with ODFI partners All NACHA Certified Third-Party Senders may display the NACHA Certified seal and will have their names and company information displayed on the NACHA Certified website Third-Party Senders are able to set themselves apart from peers by meeting certification program standards Provides well-governed Third-Party Senders a mechanism to demonstrate sound corporate governance, risk management, and compliance with Rules, Laws and Regulations Provides Originators a level of assurance that their Third-Party Sender partner meets the NACHA Certified program standards
9 9 Certification Program Pillars All Third-Party Senders that apply for certification agree to submit to a review of the following by NACHA: NACHA Operating Rules Compliance Audit Background checks on applicant organization and key principals Audited annual and quarterly financial statements Compliance and Risk Management: Internal Risk Assessment Return Monitoring Program Statement attesting to adoption of policies, procedures and internal controls that satisfy the Program Criteria, as well as obligations under federal and state laws and regulations Upon NACHA s request, the applicant will make available all policies, procedures, internal controls and other documentation relating to the Applicant s Compliance and Risk Program
10 10 Some Details Who is eligible? All Third-Party Senders that have been in business for at least two years are eligible to become NACHA Certified What must be provided? Applicants must provide the following documentation: Independent NACHA Operating Rules Audit ACH Risk Assessment Attestation to Meeting Specified Compliance and Risk Program Elements Agreement to Criminal Background Check for all principals and key officers Audited Financial Statements What is the pricing? The pricing was designed to incent adoption by Third-Party Senders and to cover program costs The fee for application to apply to become NACHA Certified is $5,000 for the two year certification period The fee to maintain the certification in intervening years is $750
11 Risk Management Portal: NACHA s new home for all of our risk management databases
12 12 NACHA s Risk Management Portal NACHA s Risk Management databases are moving to the new Risk Management Portal. Required by the NACHA Rules Third-Party Sender Registration (New) Direct Access Registration (Re-attest) Voluntary Emergency Financial Institution Contact Database Terminated Originator Database Retiring Originator Watch List (OWL)
13 13 OWL Discontinuation NACHA discontinued OWL on September 29, 2017 in conjunction with launch of Risk Management Portal Enhancements in new Risk Management Portal creates improved efficiencies in NACHA s risk management tools OWL no longer provides incremental value in light of these alternative enhancements
14 14 NACHA s Risk Management Portal Each organization should register only once. NACHA uses information from the Accuity, the Routing Number (RTN) registrar, to link RTNs owned by the financial institution. Registering third-parties are linked by their US TIN. Each organization will select one employee to act as administrator and register for access to the Risk Management Portal. The administrator has the ability to add up to four additional users. Administrators and users have access to view and edit.
15 15 Financial Institution Registration
16 16 Financial Institution Registration
17 17 Financial Institution Registration
18 18 Initial login NACHA must accept each registration most will be instant, but some may take up to 3 business days The admin and users will receive an with a welcome notice and temporary password. Login and change your password.
19 19 Two-Factor Authentication A One-Time Authentication Code is generated at each login. The One-Time Authentication Code is sent via . Type or copy and paste the One-Time Authentication Code. Users are logged out of the Risk Management Portal after five minutes of inactivity.
20 20 Financial Institution Registration Management View and edit FI information here. Print or export this screen for your records.
21 21 Financial Institution Registration Management The Edit icon (A) will let you edit FI information. The Deactivate icon (B) will deactivate the FI.
22 22 Third-Party Sender Registration Add, edit, view, and export TPS customers from the TPS tab. Tab is only enabled for FIs that attest to having TPS customers.
23 23 Third-Party Sender Registration two processes Manual Entry Enter TPS customer information into a standard form. Edit any entry (bulk or manual) Bulk Upload Upload or edit many TPS customers at one time. Templates available in Excel, CSV, and XML. Validations are performed by the portal. Files placed into queue and processed at midnight on the date of upload.
24 24 TPS Registration Manual Entry Select Manual Entry from the TPS DB Management Screen. A pop-up will appear. All fields marked with an * need to be completed.
25 25 TPS Registration - Manual Entry ODFI Routing Number is the RTN used by TPS customer being registered. Only register the TPS Company ID and TPS Name of the third-party sender
26 26 TPS Registration Bulk Upload Select Bulk Upload from the TPS drop down menu or from the TPS DB Management screen.
27 27 TPS Registration Bulk Upload Select a template. Add TPS customers or Modify current TPS customers. Save the file.
28 28 TPS Registration Bulk Upload Chose the file and select upload. The portal will perform schema validation and place the file into the processing queue.
29 29 Bulk Upload History Monitor submitted files in the Bulk Upload History. Files will remain in Pending status until midnight on the date the file was received.
30 30 Export TPS Entries Files can be exported in the bulk upload formats or the TPS table. Bulk upload formats can be modified and uploaded using the bulk upload process. The TPS table format includes the date registered, date modified, and modified by fields that are not part of the bulk upload formats.
31 31 Direct Access Debit Registration - Required All ODFIs will need to re-attest. NACHA has contacted all ODFIs that were registered in the legacy system as having a Direct Access Debit relationship. Direct Access (DA) menu is only enabled for FIs that have DA relationships. For new relationships, NACHA Staff will contact each FI that attest as to having direct access debit relationships. NACHA staff will confirm the direct access relationship and complete the registration with the financial institution
32 32 Terminated Originator Database (TOD) - Voluntary NACHA ended vender agreement for the TOD service and now offers without a charge to ODFIs and Third Parties. The TOD allows ODFIs and Third-Party Senders and Third-Party Service Providers to share information on terminated originators. ODFIs are not prohibited from doing business with originators listed in the TOD. NACHA recognizes that some ODFIs may have greater risk tolerance and risk management practices for managing an originator that other ODFIs may terminate.
33 33 TOD Contribute and Manage Contributions Select TOD DB Management from the TOD dropdown menu To add a new TOD contribution, select Contribute to TOD.
34 34 TOD - Contribute To contribute a new terminated originator or third-party sender, all fields marked with an * need to be completed.
35 35 TOD - Search Searches can be done on the complete legal name, tax ID or doing business as name (DBA). Only an exact match will return a result. No partial names or wildcards can be used to search TOD.
36 36 Emergency FI Contact Database - Voluntary NACHA provides an Emergency FI Contact Database as a vehicle for communication during a crisis: financial institutions can collaborate and share information as needed to mitigate threats impact on day-to-day operations. Financial institutions must register to contribute to the Emergency Financial Institution Contact Database.
37 37 Emergency FI Contact Database - Contribute
38 38 Emergency FI Contact Database - Contribute A single contact can be associated with every RTN owned by the FI. Phone number is a required field. is optional.
39 39 Emergency FI Contact Database - Search The Emergency FI Contact Database can be searched by Routing Number or Financial Institution Name
40 40 Additional Resources NACHA links
41 41 SAVE THE DATE MAC 2018 Annual Conference March 13-15, 2018 SLS Hotel - Las Vegas, NV Register online at Don t miss the premier payments industry risk conference.
NACHA S Risk Management Portal Instruction Manual for Financial Institutions
NACHA S Risk Management Portal Instruction Manual for Financial Institutions NACHA s Risk Management Portal is the single resource to access all of our risk databases. The Third Party Sender Registration
More informationNACHA S Risk Management Portal Instruction Manual for Financial Institutions
NACHA S Risk Portal Instruction Manual for Financial Institutions NACHA s Risk Portal is the single resource to access all of our risk databases. The Third Party Sender Registration Database, the Direct
More informationNACHA S Risk Management Portal Instruction Manual for Financial Institutions
NACHA S Risk Management Portal Instruction Manual for Financial Institutions NACHA s Risk Management Portal is the single resource to access all of our risk databases available to financial institutions
More informationKNOWLEDGE BURST - NACHA
Copyright 2017 MAC. All Rights Reserved. Copyright 2017 2018 MAC. All Rights Reserved. KNOWLEDGE BURST - NACHA Jordan Bennett Senior Director, Network Risk, NACHA NACHA Third-Party Sender Updates Jordan
More informationDirect Access Registration
Direct Access Registration Definitions Sound Business Practices Registration Instructions Examples 2 What is Direct Access? By definition, Direct Access involves a separation of control and responsibility.
More information2017 National ACH Association Rules
2017 National ACH Association Rules Michael Lopes & Michelle Balboni Senior Internal Auditors MEMBER OF ALLINIAL GLOBAL, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2017 Wolf & Company, P.C. Before we
More informationPublications. ACH Audit Requirements. A new approach to payments advising SM. Sound Practices Checklists
Publications ACH Audit Requirements Sound Practices Checklists Price: $150 Member Discounted Price: $75 (489) Revised: 02/2019 A new approach to payments advising SM Purpose of this Document WesPay Advisors
More informationNew York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines
New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities
More information2018 ACH RULE CHANGES AND UPDATES. Jessica Lelii & Jill Lamb, AAP EFT Specialist, MY CU Services, LLC. Disclaimer
2018 ACH RULE CHANGES AND UPDATES Jessica Lelii & Jill Lamb, AAP EFT Specialist, MY CU Services, LLC www.mycuservices.com Disclaimer This material is not intended to provide any warranties or legal advice,
More informationIdentifying, Registering, and Auditing your Third Party Senders. Presented by Michele Barlow, AAP NCP Vice President
Identifying, Registering, and Auditing your Third Party Senders Presented by Michele Barlow, AAP NCP Vice President Audio Handouts Questions Presented by Michele Barlow, AAP/NCP PAR/WACHA-The Premier Payments
More informationACH Rules Compliance Audit Requirements Request for Comment
ACH Rules Compliance Audit Requirements Request for Comment Proposed Modifications to the Rules May 11, 2018 (Proposed effective date January 1, 2019, to apply to audits due by December 31, 2019) ARTICLE
More informationBENEFITS of MEMBERSHIP FOR YOUR INSTITUTION
PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment
More informationACH Audit Guide Step-by-Step Guidance and Interactive Form For Internal ACH Audits Audit Year 2018
Publications ACH Audit Guide Step-by-Step Guidance and Interactive Form For Internal ACH Audits Audit Year 2018 Price: $399 Member Price: $199 (Publication #500-18) A new approach to payments advising
More informationCOMPANY (MU1) FORM FILING - EXTENDED
COMPANY (MU1) FORM FILING - EXTENDED Updated: 3/31/2014 Copyright 2008 State Regulatory Registry LLC Table of Contents General Overview 3 How to Submit the Company (MU1) Filing 4 Initial Account Login
More informationISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006
ISO / IEC 27001:2005 A brief introduction Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 Information Information is an asset which, like other important business assets, has value
More informationPOSITION DESCRIPTION
UNCLASSIFIED IT Security Certification Assessor POSITION DESCRIPTION Unit, Directorate: Location: IT & Physical Security, Protective Security Wellington Salary range: H $77,711 - $116,567 Purpose of position:
More informationRed Flags/Identity Theft Prevention Policy: Purpose
Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and
More informationMNsure Privacy Program Strategic Plan FY
MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term
More informationBUSINESS ACH. ibanking
BUSINESS ACH ibanking January 23, 2017 Table of Contents Business ACH & ibanking Terminology... 3 End User Guide... 4 Getting Started... 4 Participants... 4 Creating a participant... 4 The Participants
More informationTEL2813/IS2820 Security Management
TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management
More informationACH Audit Guide for Third-Party Senders Step-by-Step Guidance and Interactive Form For Internal ACH Audits Audit Year 2017
Publications ACH Audit Guide for Third-Party Senders Step-by-Step Guidance and Interactive Form For Internal ACH Audits Audit Year 2017 Price: $250 Member Price: $125 (Publication #505-17) A new approach
More informationONLINE BANKING COMMERCIAL CASH MANAGEMENT ACH END-USER GUIDE
ONLINE BANKING COMMERCIAL CASH MANAGEMENT ACH END-USER GUIDE 1 P a g e TABLE OF CONTENTS CASH MANAGER ACH... 3 CREATE ACH BATCH... 4 ACH BATCH LIST... 4 MANUALLY CREATE AN ACH BATCH... 5 UPLOADING A NACHA
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate
More informationAdd/Manage Business Users
Primary and Secondary Administrators are created by First Interstate Bank and have full access to functionality; these Administrators set up other employees as Business Banking users via the Entitlements
More informationNERC Staff Organization Chart Budget 2018
NERC Staff Organization Chart Budget 2018 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Officer Senior Vice President, General Counsel and Corporate
More informationACH Rules Update for Originating Companies
2013 ACH Rules Update for Originating Companies EPCOR, as a Direct Member of NACHA, is a specially recognized and licensed provider of ACH education, publications and support. 2013, EPCOR Published by
More informationThank you, and enjoy the webinar.
Disclaimer This webinar may be recorded. This webinar presents a sampling of best practices and overviews, generalities, and some laws. This should not be used as legal advice. Itentive recognizes that
More informationCanadian Registered Safety Professional (CRSP) Certification AUDITING ASSOCIATION OF CANADA BCRSP CERTIFICATION; AN OVERVIEW
Canadian Registered Safety Professional (CRSP) Certification AUDITING ASSOCIATION OF CANADA BCRSP CERTIFICATION; AN OVERVIEW JOHN HOLLOHAN, CRSP, BOARD GOVERNOR, HALIFAX, NOVA SCOTIA, SEPTEMBER 16, 2015
More informationSecurity Management Models And Practices Feb 5, 2008
TEL2813/IS2820 Security Management Security Management Models And Practices Feb 5, 2008 Objectives Overview basic standards and best practices Overview of ISO 17799 Overview of NIST SP documents related
More informationPartner Side SMART Guide
Partner Side SMART Guide Table of Contents 1. Introduction... 3 2. Partner Registration Process... 3 3. Additional Form... 12 4. Scorecard... 13 5. View Buyer Profile... 14 Partner Side User Manual 31
More informationNeedham Bank Business Online Banking
Needham Bank Business Online Banking Published December 2017 Contents ACH & NB Business Online Banking Terminology... 2 Getting Started... 4 Participants... 5 Creating a Participant... 5 Updating a Participant...
More informationProperty Tax Oversight Certification & Training Online Payment System. How to create and submit an order online
Property Tax Oversight Certification & Training Online Payment System How to create and submit an order online Revised 10-2017 Table of Contents Step Pages 1. Getting Started 3-4 2. Select Transaction
More informationVERIFICATION METHOD. Deskside User Guide
VERIFICATION METHOD Deskside User Guide OVERVIEW Our company considers the security of your financial information a top priority. We employ extensive security measures designed to provide a safe and reliable
More informationFederal Registry Functionality Summary
Copyright 2011 State Regulatory Registry LLC Page 1 of 13 Contents 1 Overview... 3 2 Entitlement... 3 2.1 Institutions... 3 2.2 Individuals (MLOs)... 4 3 Two-Factor Authentication... 4 4 Federal Agency-Regulated
More informatione-services User Manual
Chhattisgarh Commercial Tax Department e-services User Manual Return Processing System & Tax Assessment System And Dealer Information System Software Application For Online Services and Portal Table of
More informationEnhanced Framework for Implementing Partnership with UNHCR PARTNER USER GUIDE UNHCR Partner Portal Phase 1
Enhanced Framework for Implementing Partnership with UNHCR PARTNER USER GUIDE UNHCR Partner Portal Phase 1 Version 1.1 3 February 2015 DFAM - IPMS Document Revision Version Modified on Modified by Comments
More informationSOC for cybersecurity
April 2018 SOC for cybersecurity a backgrounder Acknowledgments Special thanks to Francette Bueno, Senior Manager, Advisory Services, Ernst & Young LLP and Chris K. Halterman, Executive Director, Advisory
More informationNYDFS Cybersecurity Regulations: What do they mean? What is their impact?
June 13, 2017 NYDFS Cybersecurity Regulations: What do they mean? What is their impact? Gus Coldebella Principal, Boston Caroline Simons Principal, Boston Agenda 1) Overview of the new regulations 2) Assessing
More informationFirstNet for Business
Page 1" First State Community Bank FirstNet for Business End-User Guide Page 2" Table of Contents" Logging In... 3% Changing Your Password... 4% Cash User Login Screen... 4% Navigation... 7% Account Listing
More informationREPORT 2015/186 INTERNAL AUDIT DIVISION
INTERNAL AUDIT DIVISION REPORT 2015/186 Audit of information and communications technology operations in the Secretariat of the United Nations Joint Staff Pension Fund Overall results relating to the effective
More informationGMEI UTILITY PORTAL USER'S GUIDE OCTOBER 11, 2017
GMEI UTILITY PORTAL USER'S GUIDE OCTOBER 11, 2017 @ 2017, The Depository Trust & Clearing Corporation and/or its affiliates. All rights reserved. The services described herein are provided under the DTCC
More informationSecurity and Privacy Governance Program Guidelines
Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by
More informationTHE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK
GAIN RECOGNITION AS AN APPROVED PROVIDER UNDER ISO/IEC 17024 AND JOIN OUR NETWORK OF TRUSTED PROVIDERS THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER
More informationYou are signing up to use the Middlesex Savings Bank Person to Person Service powered by Acculynk that allows you to send funds to another person.
Middlesex Bank Person to Person Service You are signing up to use the Middlesex Savings Bank Person to Person Service powered by Acculynk that allows you to send funds to another person. This Agreement
More informationNERC Staff Organization Chart Budget 2017
NERC Staff Organization Chart Budget 2017 President and CEO Administrative Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel
More informationFrequently Asked Questions
Frequently Asked Questions ISO 15189 Accreditation Program cap.org Contents ISO and the International Organization for Standardization What does ISO stand for? (page 3) What is the International Organization
More informationCommercial Online Banking. Quick Reference
Commercial Online Banking Quick Reference . All rights reserved. This work is confidential and its use is strictly limited. Use is permitted only in accordance with the terms of the agreement under which
More informationDraft Applicant Guidebook, v3
Draft Applicant Guidebook, v3 Module 5 Please note that this is a discussion draft only. Potential applicants should not rely on any of the proposed details of the new gtld program as the program remains
More informationHow PayPal can help colleges and universities reduce PCI DSS compliance scope. Prepared by PayPal and Sikich LLP.
How PayPal can help colleges and universities reduce PCI DSS compliance scope. Prepared by PayPal and Sikich LLP. Reduce time and resources needed for PCI DSS compliance. Campus merchants want to offer
More informationNEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE
COMPLIANCE ADVISOR NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE A PUBLICATION BY THE EXCESS LINE ASSOCIATION OF NEW YORK One Exchange Plaza 55 Broadway 29th Floor New York, New York 10006-3728 Telephone:
More informationhuntington Business security suite user guide
huntington Business security suite user guide Contents Welcome 3 Section 1: Getting Started Logging In 5 Section 2: ACH Positive Pay Overview 7 Filters 8 managing exceptions 11 warehouse 14 approvals 15
More informationPhase II CAQH CORE 202 Certification Policy version March 2011 CAQH 2011
CAQH 2011 Phase II CAQH CORE 202 Certification Policy GUIDING PRINCIPLES Phase II CORE 202 Certification Policy After signing the CORE Pledge and/or Addendum, the entity has 180 days to complete CORE certification
More informationACH Rules Update for Originating Companies
2015 ACH Rules Update for Originating Companies EPCOR, as a Direct Member of NACHA, is a specially recognized and licensed provider of ACH education, publications and support. 2015, EPCOR Published by
More informationNAVIGATION GUIDE FEDERAL REGISTRY. General Information
NAVIGATION GUIDE FEDERAL REGISTRY General Information Purpose This navigation guide is designed to provide institution and individual users with a general concept and navigation of NMLS. Copyright 2014
More information(EHR) Incentive Program
REGISTRATION USER GUIDE For Eligible Professionals Medicare Electronic Health Record (EHR) Incentive Program JULY 2012 (07.02.12 ver8) CONTENTS Step 1...Getting started 3 Step 2... Login 5 Step 3...Welcome
More informationINBUSINESS BANKING SYSTEM
Introducing your new INBUSINESS BANKING SYSTEM Companion Guide to Business Banking Video Tutorials Updated 0.09.8 WELCOME TO THE INBUSINESS SYSTEM The InBusiness System will help you efficiently and securely
More informationSpecialty Contractor User Manual. Table of Contents. Specialty Contractor User Manual Version 1 11/16/15
Specialty Contractor User Manual Welcome to the C3 Training Database for Construction Career Collaborative! This software is where you keep track of your employees' training and safety credentials, project
More informationNOTICE OF AMENDMENT TO THE 2014 NACHA OPERATING RULES SUPPLEMENT #1-2014
NOTICE OF AMENDMENT TO THE 2014 NACHA OPERATING RULES February 11, 2014 SUPPLEMENT #1-2014 Clarification of Third-Parties in the ACH Network Effective Date: March 21, 2014 2014 NACHA The Electronic Payments
More informationGMEI PORTAL USER'S GUIDE FEBRUARY 05, 2018
GMEI PORTAL USER'S GUIDE FEBRUARY 05, 2018 Copyright 2018 DTCC. All rights reserved. This work (including, without limitation, all text, images, logos, compilation and design) is proprietary and protected
More informationPROJECT: NEW JERSEY WATER QUALITY DATA EXCHANGE WQX REPORTER USER S GUIDE. Prepared for New Jersey Department of Environmental Protection
PROJECT: NEW JERSEY WATER QUALITY DATA EXCHANGE WQX REPORTER USER S GUIDE Prepared for New Jersey Department of Environmental Protection January 29, 2009 11 Princess Road, Unit A Lawrenceville, New Jersey
More informationACH Audit Guide Step-by-Step Guidance and Interactive Form For Internal ACH Audits Audit Year 2016
ACH Audit Guide Step-by-Step Guidance and Interactive Form For Internal ACH Audits Audit Year 2016 Price: $399 Member Price: $199 (Publication #500-16) Sharing Our Passion For Payments ACH Audit Guide
More informationNERC Staff Organization Chart Budget 2017
NERC Staff Organization Chart Budget 2017 President and CEO Administrative Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel
More informationJune 30, Phyllis Schneider, AAP, Director, Network Rules ᅳ Rules Development & Technical Support
June 30, 2010 TO: FROM: ACH Rulebook Subscribers Phyllis Schneider, AAP, Director, Network Rules ᅳ Rules Development & Technical Support RE: 2010 ACH Rulebook ᅳ Supplement #1-2010 Rules Simplification
More informationSERVICE DESCRIPTION & ADDITIONAL TERMS AND CONDITIONS VERSIEGELTE CLOUD. Service description & additional terms and conditions VERSIEGELTE CLOUD
Service description & additional terms and conditions VERSIEGELTE CLOUD Last revised: March 19, 2018 Page 1 of 10 PUBLICATION DETAILS Published by Telekom Deutschland GmbH Landgrabenweg 151 53227 Bonn
More informationWe offer background check and identity verification services to employers, businesses, and individuals. For example, we provide:
This Privacy Policy applies to the websites, screening platforms, mobile applications, and APIs (each, a Service ) owned and/or operated by Background Research Solutions, LLC ("we"/ BRS ). It also describes
More informationReference Framework for the FERMA Certification Programme
Brussels, 23/07/2015 Dear Sir/Madam, Subject: Invitation to Tender Reference Framework for the FERMA Certification Programme Background The Federation of European Risk Management Associations (FERMA) brings
More information(EHR) Incentive Program
REGISTRATION USER GUIDE For Eligible Professionals Medicaid Electronic Health Record (EHR) Incentive Program DECEMBER 2010 (12.28.10 ver2) CONTENTS Step 1... Getting started 3 Step 2... Login instruction
More informationOracle Banking Digital Experience
Oracle Banking Digital Experience FCUBS Originations Saving Account User Manual Release 18.3.0.0.0 Part No. F12056-01 December 2018 Preface FCUBS Originations Saving Account User Manual December 2018 Oracle
More informationOregon registration will open next Monday, the 26th. First register with CMS, then with your state.
Sent: Tuesday, September 20, 2011 2:53 PM Subject: Meaningful Use Registration I want to make sure that the Portland Area I/T/U's are on track to receive the EHR Incentive payments. So far, who has registered
More informationFedACH Risk Origination Monitoring Service
FedACH Risk Origination Monitoring Service FedACH Risk Origination Monitoring Service Handbook September 2016 Table of Contents Introduction 2 Service Overview 2 Description 2 Service Feature Examples
More informationBLOOMBERG LEGAL ENTITY IDENTIFIER (LEI) USER GUIDE
BLOOMBERG LEGAL ENTITY IDENTIFIER (LEI) USER GUIDE LEGAL ENTITY IDENTIFIER // 1 TABLE OF CONTENTS The Bloomberg LEI Web Portal User Guide is a step by step guide to provide you assistance when using the
More informationHANDBOOK. Institute of Bankers In South Africa (IOBSA)
HANDBOOK Institute of Bankers In South Africa (IOBSA) Page 1 of 16 IOBSA HANDBOOK CONTENT 1. INTRODUCTION AND BACKGROUND... 3 1.1 Background... 3 1.2 Our Vision... 4 1.3 Our Motto... 4 1.4 Our Mission...
More informationPROVIDER WEBSITE SITE ADMINISTRATOR GUIDE » PATIENT INQUIRY» CLAIM CENTER» FIND A DOCTOR» CLAIMS EDITING SYSTEM (CES)
PROVIDER WEBSITE SITE ADMINISTRATOR GUIDE» PATIENT INQUIRY» CLAIM CENTER» FIND A DOCTOR» CLAIMS EDITING SYSTEM (CES) 2018 WPS Health Plan, Inc. 1 All rights reserved. JO7048 28898-085-1801 ADMINISTRATIVE
More informationPhase I CAQH CORE 102: Eligibility and Benefits Certification Policy version March 2011
Phase I CAQH CORE 102: Eligibility and Benefits Certification Policy GUIDING PRINCIPLES After signing the CORE Pledge, the entity has 180 days to complete CORE certification testing. CORE will not certify
More informationKroger Supplier Hub QRG September 2017
Version 14.0.4 September 2017 2017 1. Process Overview... 3 2. Invitation to the Hub... 4 3. First Login and Password Requirements... 5 4. General Information... 5 5. Imported Products and Packaging...
More informationCanada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?
Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY
More informationSuperannuation Transaction Network
Superannuation Transaction Network Process and Requirements for New Gateway Operators Version 2.1 November 2016 For further information or questions, contact the GNGB secretariat via email at contactus@gngb.com.au
More informationHandbook December 2018
Handbook December 2018 Table of Contents About this Handbook... 3 The EEP Program... 3 Objectives... 3 Benefits... 3 Education Provider Requirements... 4 Fees... 4 Features... 5 Benefits... 6 Application
More informationCHAPTER 13 ELECTRONIC COMMERCE
CHAPTER 13 ELECTRONIC COMMERCE Article 13.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial
More informationCertified Exporter Approved Provider Program
Certified Exporter Approved Provider Program administered by The International Import-Export Institute at Dunlap-Stone University Phoenix, Arizona D S Globalization is Happening! The goal of this program
More informationAPPLICATION FORM FOR AFFILIATION WITH GEM & JEWELLERY SKILL COUNCIL OF INDIA AS AN ASSESSMENT AGENCY
APPLICATION FORM FOR AFFILIATION WITH GEM & JEWELLERY SKILL COUNCIL OF INDIA AS AN ASSESSMENT AGENCY P a g e 1 GJSCI AA Affiliation Document January 2016 GENERAL INSTRUCTIONS 1. A print-out of this application
More informationACH IMPORT. User Guide
ACH IMPORT User Guide 1 TABLE OF CONTENTS Overview... 2 ACH Detail Screen & Cutoff Times... 3 ACH Batches: Non-NACHA Import.... 4 ACH Import: Non-NACHA Import.... 5 ACH Batch Activation: Non-NACHA & NACHA
More informationDriving Global Resilience
Driving Global Resilience Steve Mellish FBCI Chairman, The Business Continuity Institute Monday December 2nd, 2013 Business & IT Resilience Summit New Delhi, India Chairman of the Business Continuity Institute
More informationMANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors
Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative
More informationOverview. Business Online Banking BASIC OVERVIEW PAGE 1
Overview Business Online Banking BASIC OVERVIEW PAGE 1 Basic Overview Business Online Banking Main navigation: My Accounts, Move Money, and Additional Services. Admins have full access to all accounts
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationUSER GUIDE: NMLS Course Provider Application Process (Initial)
USER GUIDE: NMLS Course Provider Application Process (Initial) Version 2.0 May 1, 2011 Nationwide Mortgage Licensing System & Registry State Regulatory Registry, LLC 1129 20 th St, N.W., 9 th Floor Washington,
More informationSECURITY & PRIVACY DOCUMENTATION
Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive
More informationCybersecurity and Data Protection Developments
Cybersecurity and Data Protection Developments Nathan Taylor March 8, 2017 NY2 786488 MORRISON & FOERSTER LLP 2017 mofo.com Regulatory Themes 2 A Developing Regulatory Environment 2016 2017 March CFPB
More informationOracle Data Cloud ( ODC ) Inbound Security Policies
Oracle Data Cloud ( ODC ) Inbound Security Policies Contents Contents... 1 Overview... 2 Oracle Data Cloud Security Policy... 2 Oracle Information Security Practices - General... 2 Security Standards...
More informationExtractive Sector Transparency Measures Act. NRCan eservices Portal User Guide
Extractive Sector Transparency Measures Act NRCan eservices Portal User Guide 2 Contents Introduction... 4 Accessing the eservices Portal with a Sign-in Partner... 5 Accessing the eservices Portal with
More informationA Framework for Managing Crime and Fraud
A Framework for Managing Crime and Fraud ASIS International Asia Pacific Security Forum & Exhibition Macau, December 4, 2013 Torsten Wolf, CPP Head of Group Security Operations Agenda Introduction Economic
More informationLampen-Recycling und Service GmbH WEEE. Black Box Participant User. Guide. Updated Dezember 2011 (registration instructions)
Lampen-Recycling und Service GmbH WEEE Black Box Participant User 2011 Guide Updated Dezember 2011 (registration instructions) TABLE OF CONTENTS: I want to Register with LARS... 3 I want to make my monthly
More informationCoreFirst Bank & Trust
CoreFirst Bank & Trust New Commercial Internet Banking Frequently Asked Questions ACCOUNT OVERVIEW 1. Q: Why are some of my account numbers highlighted and marked with an asterisk A: Highlighted account
More informationJHA Payment Solutions. MASTER Site Funds Verification jxchange. Client Training Guide. ipay Solutions December 2016
JHA Payment Solutions MASTER Site Product Training... 1 Learning Objectives... 1 Recommended Audience... 1 Contact FI Support for Assistance... 1 MASTER Site Training... 2 Login Screen... 2 Home Page...
More informationDistrict Facilitator Dashboard. Guide
District Facilitator Dashboard Guide This guide will serve as a quick reference for the features included on your District Facilitator Dashboard. Your Dashboard is divided into Quick Links and Message
More informationNERC Staff Organization Chart
NERC Staff Organization Chart President and CEO Administrative Associate Director to the Office of the CEO Associate Director, Member Relations and MRC Secretary Senior Vice President and Chief Reliability
More informationAUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS
AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS MAC Webinar July 30, 2015 Dave Lott Retail Payments Risk Forum The views expressed in this presentation are those of the presenter and do not necessarily
More informationICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)
ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) June 2017 INSERT YEAR HERE Contact Information: Jeremy Dalpiaz AVP, Cyber and Data Security Policy Jeremy.Dalpiaz@icba.org ICBA Summary
More information