You are on page 1of 31

University of Mississippi

eGrove

Industry Guides (AAGs), Risk Alerts, and American Institute of Certified Public
Checklists Accountants (AICPA) Historical Collection

1978

Audit considerations in electronic funds transfer systems;


Computer services guidelines
Dana R. Richardson

Follow this and additional works at: https://egrove.olemiss.edu/aicpa_indev

Part of the Accounting Commons, and the Taxation Commons

Recommended Citation
Richardson, Dana R., "Audit considerations in electronic funds transfer systems; Computer services
guidelines" (1978). Industry Guides (AAGs), Risk Alerts, and Checklists. 704.
https://egrove.olemiss.edu/aicpa_indev/704

This Book is brought to you for free and open access by the American Institute of Certified Public Accountants
(AICPA) Historical Collection at eGrove. It has been accepted for inclusion in Industry Guides (AAGs), Risk Alerts,
and Checklists by an authorized administrator of eGrove. For more information, please contact
egrove@olemiss.edu.
COMPUTER SERVICES GUIDELINES

Audit Considerations in
Electronic Funds
Transfer Systems

American Institute of Certified Public Accountants AICPA


Notice to R eaders

Computer services guidelines are published to assist members in


understanding and utilizing various aspects of data processing. These
guidelines represent the recommendations of the computer services
executive committee on the various topics covered.

Prepared by
Auditing Electronic Funds Transfer Systems Task Force
Dana R. Richardson, John F. Lehman
Chairman James Loud
Edward Arnold Ernst L. Schaefer, Jr.
John F. Kelly Don L. Sneary
Carol Schaller, Manager, Computer Services

Approved by
Computer Services Executive Committee (1977-78)
Richard J. Guiltinan, Richard F. Maginn
Chairman John W. Nuxall
Lois L. Cohn Phillip A. Parker
John P. Harrison William E. Perry
Karl G. King, III Walter D. Pugh
Albert A. Koch Joseph D. Wesselkamper
Donald L. Adams, Managing Director
Administrative Services, AICPA
Paul H. Levine, Manager, Computer Services
COMPUTER SERVICES GUIDELINES

Audit Considerations in
Electronic Funds
Transfer Systems

American Institute of Certified Public Accountants AlC


P
A
Copyright © 1978 by the
American Institute of Certified Public Accountants, Inc.
1211 Avenue of the Americas, New York, N.Y. 10036
First Impression 1978
Contents
PREFACE v

THE NATURE OF EFTS


Definition 1
Impact of EFTS 1
Types of EFT Systems 2

THE CURRENT STATUS OF EFTS REGULATIONS


Current Guidelines for National Banks 8
Current Guidelines for Federal Savings and Loan Associations 10
Current Legislation for State Financial Institutions 11
Summary 12

EFTS AND THE LEGAL ENVIRONMENT


Are Remote-Banking Terminals Branches? 13
What Are the Antitrust Implications of Shared EFT Networks and Terminals?
How Will Consumer Privacy Be Protected? 15
Who Will Be Liable for EFTS Errors or Irregularities? 16
Summary 16

INTERNAL CONTROL CONSIDERATIONS IN EFT SYSTEMS


The Extent of the Client’s System 17
Controls in EFT Systems 19
Physical Security 21
Application Controls 21
Study and Evaluation of Internal Control in EFT Systems 23
Summary 24
Preface
Almost 37 billion checks will be written per year other states. And, as a final example, thirty-two
by 1980 to pay personal, commercial, and gov­ separate automated clearing houses currently
ernmental obligations. During recent years, are clearing funds transactions electronically
financial institutions have been experimenting rather than through the physical movement of
with and, in many cases, implementing new paper payment instruments.
systems designed to reduce the need for “ paper EFT systems do not employ totally new
based” payments. Through the application of technology, but rather, adapt existing technology
computer and communications technologies, to provide a new method for exchanges of value.
these institutions are developing systems that This adaptation does not represent a revolu­
transfer funds electronically rather than tionary, but rather an evolutionary, change in
physically—electronic funds transfer systems auditing requirements or procedures.
(EFTS). These and other current developments as well
Initially, these new systems were limited as the potential for changes in the near future
in terms of the services provided and restricted have led to the development of this paper. The
in geographical area and so did not figure computer services executive committee of the
clearly in the future of electronic banking. AICPA requested it to ascertain the state of the art
Today, however, these systems are growing in electronic funds transfer systems and to
rapidly and are impacting far larger numbers determine the impact these systems will have on
of consumers and businesses, as the following the audits of business entities involved in EFTS.
examples illustrate. A large New York bank This guide is divided into four chapters.
recently installed approximately five hundred The first chapter addresses the nature of EFT
remote-banking terminals throughout its systems and provides background information
branch network, and an additional 3,500 on EFTS; chapters 2 and 3 cover the current
terminals in retail stores. In California, a new status of EFTS in government and the legal
centralized switching network is being installed community, respectively; and the final chapter
on a cooperative basis by a group of ninety- discusses the task force's initial assessment of
two savings and loan associations to allow the the audit impacts of EFT systems and is
transfer of funds between participating mer­ designed to present comments and suggestions
chants’ and customers’ savings accounts. for further research and professional
Similar networks have been formed in several deliberation.

v
Chapter 1

The Nature of EFTS


A key to any economy’s success is the proper form of credit, have become popular. Travelers’
functioning of one or more payment systems to checks, money orders, telegraph transfers, and
provide the means for conducting exchanges of letters of credit all have special characteristics
value. In most modern societies, these involve as payment mechanisms. The unique char­
exchanges of goods and services for money. acteristics of payment mechanisms and their
In recent years, substitutes for money, such various levels of acceptance impact their use.
as checks or other promissory obligations in the

Definition
Electronic funds transfer systems are another, economic exchange, are both dependent wholly
potentially more complex, payment mechanism. or in large part on the use of electronics. At a
Broadly speaking, electronic funds transfer more technical level, an EFT system can be
systems are payment systems in which the defined as a computer-based network that
processing and communications to effect enables payment-system transactions to be
economic exchange, and the processing and initiated, approved, executed, and recorded
communications for the production and distribu­ with electronic impulses and machine-sensible
tion of services incidental or related to data, rather than with paper.

Im pact of EFTS
In most electronic payment systems, the goal tages and disadvantages inherent in such
is to reduce the number of paper-based trans­ systems. Disadvantages center around con­
actions and thereby reduce the overall cost sumers’ perceived loss of control over the
of handling all transactions. This move toward payment process and the potential for lost
electronically based transactions will have privacy with respect to personal financial
major impacts on the business community, information. EFT does, however, provide several
financial institutions, consumers, and, certainly, advantages: Convenience and lower costs are
the certified public accountant. important positive considerations as are the
The business community will find that the new reduced need to carry large amounts of cash,
technology in the payment process will provide the elimination of personal bank reconciliations,
not only the potential for decreased costs of and fewer “ bills" to pay by check each month.
processing but also a potential risk of misappro­ The consumers’ costs associated with the
priation of funds through the electronic network. payment process can be reduced with EFT
Industry will likely find a reduction in bad systems. Fewer bills mean less postage and
debt expense. Certainly, many members of a potential reduction in checking account
the banking community are looking at the new charges and check printing costs.
electronic payment systems for their potential to Finally, the CPA providing audit services to
reduce the float currently provided to checking a client who either uses or maintains an elec­
account customers. However, financial institu­ tronic payment system will find significant
tions will have to consider the significant cost impacts in the nature of auditing procedures
to develop the EFT systems. currently performed within paper-based pay­
The consumer is an important link in most ment systems. Often no “visible” audit trail will
EFT systems because customer acceptance of be provided by management to the auditor.
EFTS is crucial to success. Such acceptance Tomorrow’s auditor will have to bring new and
can come only through increased awareness creative auditing techniques and concepts to
and an understanding of the potential advan­ an EFTS environment.

1
Types of EFT Systems
Electronic funds transfer systems can be ing the type of function to be performed—
grouped into three major functional areas: deposit, withdrawal, and so forth).
Once all the appropriate validation proce­
• Remote-banking services
dures for the transaction have been completed,
• Retail point-of-sale services the terminal either issues cash (in the case of
• Direct-deposit and preauthorized payment a cash withdrawal) or a receipt (in the case of
services a deposit, transfer, or other function), and then
All three types of systems involve computer returns the plastic card to the customer.
technology to perform part or all of the payment At various points in the transaction, the
and/or funds transfer functions. In both remote­ terminal can communicate with a central
banking and point-of-sale systems, remote computer system. If the central computer
computer terminal devices are connected to services a specific financial institution, the
one or more computer systems through a system is called a p ro p rie ta ry E F T s y s te m ; see
leased-line and/or direct-dial telephone com­ exhibit 1-1 for a graphic illustration. If the central
munications network. Direct-deposit and pre­ computer is a service center that switches
authorized payment systems closely resemble messages and/or settles accounts for several
traditional batch processing systems with one financial institutions, the system is called a
exception: Once the transactions have been s w itc h s y s te m (exhibit 1-2). The communica­
processed by the originating financial institution, tions between the terminal and the central
they are cleared and settled electronically computer are usually over a leased-line
through an automated clearing house (ACH) telephone network. In most systems, the com­
rather than through the traditional paper-based munication between the terminal and the central
clearing house. Each of three types of EFT computer is scrambled or “ encrypted” so that
systems is discussed in more detail below. anyone trying to tap the telephone network will
not be able to enter false transactions or obtain
Remote-Banking Services. These services valid card numbers and their associated PIN
are provided through the use of remote-banking numbers. In some systems, the terminal is not
terminals or touch-tone telephones. Remote­ continuously connected to a central computer
banking terminals are called a u to m a te d te lle r system but operates “off-line” ; at the end of the
m a c h in e s (ATMs), c u s to m e r /b a n k c o m m u n ic a ­ day, it sends the day’s data to the central facility
tio n s te rm in a ls (CBCTs) o r re m o te s e rv ic e u n its via a communications network or other means.
(RSUs). The functions that are normally per­ Automated telephone payment system s allow
formed by remote-banking EFT systems can be the transfer of funds by telephone between a
divided into five categories, depending on customer and a merchant through a financial
whether the system uses terminal devices institution. These systems also allow a
(terminal systems) or touch-tone telephones customer to inquire about the status of an
(automated telephone payment systems). account with a financial institution. Some
See table below. systems require voice communication with a
Terminal systems can provide twenty-four- teller; but, in others, the customer uses a touch-
hour banking services in a variety of locations. tone telephone to enter the data necessary to
The customer inserts a plastic card into the accomplish the desired transaction. The account
terminal and enters data for a specific transac­ number is entered along with the customer’s
tion. Usually, the first piece of data entered is PIN number. Participating merchants in the
a p e rs o n a l id e n tific a tio n n u m b e r (PIN). The telephone payment system are identified by a
EFT system uses this number to assure that the special number, which is also entered. Finally,
holder of the plastic card is its authorized user. the amount of the transfer is entered. At several
After the PIN number, the customer enters an points during the transaction, the central com­
amount and depresses a function key (specify­ puter system communicates with the customer.

T e rm in a l A u to m a te d T e le p h o n e
F u n c tio n S y s te m s P a y m e n t S yste m s

Deposits X
Withdrawals X
Transfers between accounts X X
Bill paying X X
Inquiry on account status X X

2
EXHIBIT 1-1
REMOTE BANKING-PROPRIETARY SYSTEM

EXHIBIT 1-2
REMOTE BANKING-SWITCH SYSTEM

3
This is done with a v o ic e -re s p o n s e s y s te m , On the customer’s side of the terminal is an
which groups prerecorded words into meaning­ enclosed numeric-key pad, which the customer
ful phrases to confirm to the customer the data uses to enter the PIN number associated
that has been entered into the system. with the debit card. At this point, the trans­
action is handled just as it is by the remote­
banking terminal for a funds-transfer trans­
Retail Point-of-Sale Services. Retail EFT action. The POS terminals are connected
facilitates financial transactions in supermarkets to the central computer through a leased-line
and other retail outlets, through the use of telephone network. As with remote-banking
electronics. Retail EFT services are provided services, the central computer can be either
through the use of p o in t-o f-s a le (POS) terminals. a proprietary EFT system or a switch system.
These POS terminals can vary widely in their Exhibit 1-3 contrasts the present method of
capabilities. The simplest of these devices paying for a purchase using a check with an
verify or guarantee checks or perform credit EFT system using a central switch.
card authorizations. The more sophisticated
units will be used not only to capture sales and Several in-store retail computer
D ata C a p tu re .
inventory data but also to transfer funds directly systems have developed capabilities to enter
from a customer’s account to the merchant’s product data through an electronic cash register.
account without the use of paper-based means They capture inventory data as well as pricing
of exchange. (These systems will continue to and discount information. Most of these systems
issue a customer’s receipt.) POS services can use a minicomputer located in the retail store.
be grouped into three functions: They can provide a natural extension of EFT
• Check verification/guarantee services by incorporating POS terminal func­
tions in existing electronic cash registers.
• Funds transfer These systems can use the independent mini­
• Data capture computer as a communications controller for the
Remote banking as described above may also out-going and in-coming EFT transmissions.
take place in a retail environment.
Direct-Deposit and Preauthorized Payment
This service
C h e c k V e rific a tio n /G u a ra n te e . Services. Direct-deposit and preauthorized
(though not truly an EFT service) has been payment systems are used to initiate and
implemented in various forms for several years. process recurring payments to and from
In most early systems, the retail clerk used the customers electronically without manual inter­
customer’s driver’s license number and possibly vention. These EFT systems, as mentioned
one or more other sources of identification to earlier, closely resemble traditional batch
verify a check. As check guarantee and check processing systems. The difference in'these
verification systems grew, this data was sub­ systems results from the substitution of elec­
mitted to a central system by telephone and an tronic impulses for paper-payment mechanisms.
oral authorization was obtained. In newer Thus, instead of transporting a batch of paper
systems, a plastic card is entered into a POS documents to a conventional clearing house,
terminal for direct communication with a central electronic data are batched and forwarded to
computer system. The central computer system a u to m a te d c le a rin g h o u s e s (ACHs) for clearing
transmits a simple electronic response back to and electronic settlement. Each system is
the POS terminal, for example, to light a green described in more detail below.
signal of valid authorization or a red signal of
“ not approved.” Some check-guarantee systems A direct-deposit system can
D ire c t-D e p o s it.
also transmit to the POS terminal an authoriza­ be defined as a process in which payments are
tion code, which the retail clerk writes on made directly to the recipient’s depository
the check. account at a financial institution.
The direct-deposit process begins when the
F u n d s T ra n sfer. Some retail POS systems can recipient issues a standing authorization to the
perform funds-transfer functions similar to paying organization (“ payer” ). Subsequently, as
remote-banking systems. These POS systems payment is due, the payer’s system produces
use a d e b it c a rd to facilitate the transfer of funds a machine-sensible credit, which is then
from the customer’s account to that of a forwarded to its financial institution. The payer’s
merchant. The debit card, in essence, provides financial institution debits the payer’s account,
for a charge to a depository account (rather posts credits of recipients with accounts in that
than extending credit, as c r e d it c a rd s do). The bank, and forwards the remaining credits to a
customer presents the debit card to the retail clearing house for distribution to the other
clerk, who enters the card into the POS terminal. appropriate recipient’s financial institution. The

4
EXHIBIT 1-3
PRESENT POINT-OF-SALE CHECK CYCLE

EFT POINT-OF-SALE FUNDS TRANSFER SYSTEM


USING A CENTRAL SWITCH

5
EXHIBIT 1-4
PRESENT PAYROLL CYCLE

Check

6
process is complete when the recipient’s sary, to an ACH for settlement.
financial institution posts the credit to the A memorandum bill is usually sent to the
recipient’s deposit account. Exhibit 1-4 shows bill payer showing the amount due and the date
the present payroll cycle contrasted with the that it will be charged to the account. Various
direct-deposit cycle. regulatory authorities have recommended that
this notice be mailed one week before payment.
The bill payer is responsible for ensuring that
Preauthorized Payments. A preauthorized enough funds are available to the account to
payment system is a process in which recurring carry out the payment.
payments are paid directly by the payer’s If bill payers question the amount of the memo
financial institution to the recipient’s financial bill, they can notify the financial institution to
institution, without a negotiable paper prevent any payment until the matter is settled.
document. An individual is usually allowed the option to
In a preauthorized payment system, the terminate participation in the program with
payer provides its financial institution with relatively short notice. A record of payment is
written authorization to pay one or more specific included in the bill payer's periodic account
recurring bills. When the financial institution statement, which serves as a receipt.
receives a bill, it verifies it using authorization A preauthorized payment plan, in addition
master files that contain all the preauthorizations to saving time and postage costs, also guar­
currently in effect. After validation and editing antees that the bill payer does not pay late
are complete, the bill payer’s account is charges in the event that the payment goes
charged for the amount and a machine-sensible astray.
credit is generated and forwarded, if neces­

7
Chapter 2

The Current Status of


EFTS Regulations
Government regulation of EFTS can be divided Federal Regulations, 12 C.F.R. 545.4-2, and the
into several areas: national bank regulations, Federal Home Loan Bank Board Office of Exami­
federal savings and loan regulations and exami­ nations and Supervision’s Examination Objec­
nation guidelines, and state regulations for tives and Procedures (EOP) Manual, section
financial institutions. In addition, the National EOP-011. Section 545.4-2 deals primarily with
Credit Union Administration has recently consumer issues and physical security of
proposed regulations in this area and Congress remote facilities. The EOP manual sets forth
has been considering a number of bills guidelines and related review procedures for
addressing certain consumer issues.1 examiners reviewing EFT systems. The guide­
Current EFTS guidelines for national bank lines are concerned with evaluating the
examiners are set forth in Banking Circular operating system and related physical security
no. 66, issued April 16, 1976.2 The circular and accounting controls and with the planning
emphasizes that the guidelines do not represent and development process for the investment in
regulations, but merely the “ current thinking” the EFT system.
offered for the consideration of bank examiners State legislation for EFTS facilities deals
reviewing EFT systems. The guidelines are primarily with consumer protection and with
primarily concerned with consumer safeguards competitive balance between federal and state
and the security and systems integrity of ter­ chartered financial institutions, between
minal-network operations. large and small financial institutions, and
The current guidelines for federal savings between commercial and noncommercial
and loan examiners are found in the Code of banking institutions.

Current G uidelines for National Banks


The primary reference source for EFTS and various research groups and deals primarily
guidelines for national banks used in this dis­ with consumer rights and liabilities in EFTS. The
cussion is Banking Circular no. 66, issued second focuses attention on safeguarding the
April 16, 1976. In the circular’s cover letter security and systems integrity of terminal-
addressed to the presidents of all national network operations. The following recommenda­
banks, James E. Smith, former comptroller of the tions are those presented in the circular.
currency, stated, in part:
Consumer Guidelines. The circular dis­
These guidelines are by no means regulations, cusses several major consumer guidelines. It
nor are they to be interpreted as operating states that the bank should assure its customers
standards nor as static and timeless thoughts. that it will use the personal and financial informa­
They are simply representative of our current
thinking and offered for your consideration as new
tion collected by the EFT system only for
systems are developed or existing systems banking purposes. The bank should not sell
reviewed. or divulge such information without the cus­
tomers’ written instructions unless it is legally
The circular expresses two basic sets of required to do so or the situation is within
concerns. The first represents the concerns accepted banking practices. When a national
expressed by consumer advocates, individuals, bank uses the services or computer systems

1 Also, the Federal Reserve Board has promulgated regulation J, which governs the respective rights and liabilities of
member banks using the Fed. Wire.
2 EFTS Guidelines, Banking Circular no. 66 (Washington, D.C.: Comptroller of the Currency, 1976).

8
of another firm, a contract between the bank and Terminal and operator authentication codes
such firm should indicate that any information should be used. If a retail electronic cash
compiled by the servicer must be treated with register is used as a terminal, the contract with
the same degree of confidentiality as transac­ the retailer should stipulate that an adequate
tions handled entirely within the bank. audit trail will exist and that transactions can be
Customers should be provided with the name adequately identified through an audit or edit
and telephone number of the banking depart­ routine within the retailer’s system.
ment to notify if they lose the card, find a The circular has several guidelines regarding
statement error, or have complaints. At each physical control over the use of personal iden­
terminal location, the bank should provide tification numbers. They are primarily concerned
customer instructions in the event a transaction with preventing unauthorized association of the
is denied at the point of sale. This will encourage identification number with the customer account
the customer to determine the cause of the number. Accordingly, the circular enumerates
problem immediately when a transaction is specific procedures, including retention cycles
denied and will reduce the potential for mistakes for tapes and print-outs used in the encoding
or adverse customer reaction. No account of identification and account numbers, physical
balance, specific overdraft information, or controls over the supply of blank cards and
similar specific dollar amount information encoding equipment, and suggested proce­
should be transmitted to a remote terminal dures and policies for mailing and physical
operator other than a duly authorized bank distribution of cards.
employee or the customer. However, adminis­ Automated teller machines that operate in an
trative information such as customer identifica­ off-line mode should have files adequate to
tion and instructions should be permitted. accommodate the “ bad card” identification
Customers should be notified seven calendar information for a period of two years or a period
days before processing any preauthorized debit that reasonably exceeds the card expiration/
transactions. This guideline allows the customer reissue cycle, whichever is shorter. These files
time to stop payment on otherwise preauthor­ should be updated daily. The circular recom­
ized transactions. mends conversion of off-line terminals to
The circular states that banks should develop on-line as soon as is economically and opera­
reasonable procedures to prevent unauthorized tionally feasible.
withdrawals from customer accounts. Liability Although specific guidelines are not set forth,
for such losses should be clearly stated in the the circular recommends that the physical
contractual relationship between the bank and controls over the computer room be at least as
the customer. Although the circular states that stringent as those provided for the terminal
the bank will bear the liability for such losses network. Segregation of functions should be
except in cases of customer fraud or negligence, enforced, and the systems should be fully
federal law limits the liability of credit card documented and audited.
holders to $50 regardless of whether or not the When a bank contemplates installation and
cardholder has been negligent.3 operation of a banking facility in a non-bank
Card transactions should provide for commercial establishment, whether operated
adequate customer identification and authen­ by the merchant or bank personnel, bank
tication. The circular uses the example of management should review the security devices
personal identification numbers as an accept­ and procedures in effect in the location before
able technique. Such a system should avoid use installation. Even though retail POS devices
of numbers such as social security numbers or are not covered by the Bank Protection Act, the
birth dates. The customer should be cautioned availability and accessibility of an alarm system
against writing the identification number on the should be considered. In case a POS system
card itself or giving it verbally to a terminal fails, the merchant should be aware of the
operator. backup procedures, applicable credit limits,
and provisions for restoring service.
Security Guidelines. The circular discusses Although the circular does not discuss
several important security guidelines. It recom­ specific guidelines to detect fraud or criminal
mends protection of data transmissions between abuse, sufficient controls should be established
terminals and the computer facility from external over data flow in a multibank switching environ­
threats such as tapping, surveillance, and ment. The circular identifies message encryption
message insertion by security techniques such as a recognized technique for this purpose;
as message encryption. however, alternative techniques may become

3 Note that federal law deals solely with individual consumers, rather than corporate users of EFTS.

9
available as a result of technological or systems the circular was issued primarily in response
innovation. to numerous requests for such guidelines from
The bank should review its Bankers Blanket banks interested in developing EFT systems and
Bond coverage with its insurance carrier to to provide guidance in the development and
determine whether and to what extent EFT improvement of EFT systems without the
systems are covered. Bank management and the negative effects of additional regulations.
board of directors should be fully aware of the Major concerns of the OCC in EFT develop­
potential liability assumed by the bank if it ment are consumer acceptance and controls to
elects to self-insure. protect consumers from fraud and abuse. The
OCC official emphasized controls over custody
Supervisory Action. The circular states that and distribution of cards to prevent counter­
the examining staff of the office of the comp­ feiting and unauthorized association of personal
troller of the currency (OCC) will review bank- identification numbers with account numbers.
customer agreements and the underlying rights Controls mentioned included dual control over
and liabilities of all parties in such contractual the supply of cards, separate mailing of per­
arrangements. Furthermore, security safeguards sonal identification numbers and related cards,
and operator procedures for terminal-network and encryption of identification numbers on
EFT systems will be reviewed in the same plastic cards.
manner as other operating systems. The OCC Also of major concern are the physical
will initiate corrective action where the examin­ controls over computer hardware and software
ing staff detects consumer abuse of the system to detect and prevent unauthorized access to
or imprudent procedures by the bank. information or disruption due to sabotage or
catastrophe. Controls in this area included
Current Emphasis of OCC. In two separate encryption of messages from terminals to CPU,
speeches in October and November of 1976, backup hardware facilities (including disaster
an official of the OCC emphasized current areas plans), and adequate insurance coverage of
of concern over the control and planning func­ EFTS transactions.
tions of EFT systems. The OCC indicated that

Current G uidelines for Federal Savings


and Loan Associations
To date, federally chartered savings and loan authorizes the use of remote-banking terminals
associations have operated EFTS units as pilot and describes minimum standards for physical
projects under the authority of temporary security of these facilities. It also authorizes the
regulations of the Federal Home Loan Bank FHLBB to require a financial institution to
Board (FHLBB). The FHLBB’s official position provide EFT services to other financial institu­
regarding EFT systems has been set forth in the tions under certain conditions. Although the
following: FHLBB does not consider remote terminals
to be branches or satellite facilities, as a matter
• Code of Federal Regulations (the temporary of policy it has not permitted federally chartered
EFTS regulations), section 545.4-2. financial institutions to establish facilities on
• The FHLBB office of examinations and an interstate basis. In addition, the FHLBB
supervision’s Examination Objectives and position on the “ branch” issue is currently
Procedures Manual, section EOP-011. being litigated.
In addition, part 563a of the C.F.R. insurance The physical controls over remote terminals
regulations, which deals with physical security are incorporated by reference to section 563a
in savings and loan offices, is incorporated by of the insurance regulations. Minimum physical
reference in section 545.4-2. A permanent security standards are presented in an appendix
regulation has replaced the temporary provi­ to section 563a and provide specific guidelines
sions of section 545.4-2 as of July 1, 1978. for the weight of the unit, thickness of the
Certain of its provisions differ from those of the exterior walls of the unit, and tensile strength
temporary EFTS regulation. of the steel used in the unit. According to the
section, the terminal “ should also be designed
Section 545.4-2. The board’s EFTS regulation, so as to be protected against actuation by
in both its temporary and permanent forms, unauthorized persons, should be protected by

10
a burglar alarm, and should be located in a The guidelines also list examination objec­
well-lighted area.” tives and procedures that are designed primarily
to ensure that EFT systems follow FHLBB
EOP-011. This section of the EOP manual policies and regulations. Such procedures rely
provides guidance to examiners reviewing EFT largely on the individual examiner’s experience
systems. The guidelines are primarily concerned and judgment to evaluate the adequacy of the
with two phases of EFT systems: procedures and controls of the EFT system.
• The propriety and reasonableness of the
development process and investment in the Recent Emphasis of FHLBB. As indicated
system. above, on July 1, 1978, a permanent EFTS
• The functional system and related physical regulation has replaced the temporary provisions
security and accounting and control proce­ of section 545.4-2. The new regulation will
dures. include consumer protection provisions, clarify
application procedures, and require federally
The guidelines describe several considerations chartered associations to take reasonable
for the evaluation of an association’s operating measures to secure adequate bonding and
policies and practices: security. Both the temporary and permanent
• A feasibility and marketing study should be EFTS regulations contain a number of conditions
performed. Such a study should include a for approving individual applications to operate
cost/benefit analysis, which should be remote terminals. However, as a matter of policy,
updated on an on-going basis. the board will not approve an application for
a remote terminal unless—
• The integrity, business history, and financial
stability of hardware and software suppliers before the applicant begins to operate its
should be investigated. remote service unit system, it [has], to the satis­
• Safeguards should be built into the system faction of the Board’s staff, fulfilled] the following
to protect against over-withdrawals, provide requirements:
adequate security over personal identification (1) Designed] the remote service unit system
numbers, protect the main EDP system from to provide for on-line real-time operation
at all times that the remote service units at
penetration by taps into communication lines,
the merchant locations are operational, or
and provide physically safe operating otherwise provide[d] that financial transactions
conditions for users and servicers of remote at a remote service unit result in instantaneous
terminals. debits and credits to all affected accounts at
• Written customer agreements outlining the the time the transaction occurs.
terms of plastic card use, liability for un­ (2) Design[ed] a settlement procedure with the
authorized use, and conditions under which merchants so that at no time will a merchant
account information may be released to third be the recipient of funds from the applicant
which constitutes unsecured lending; and
parties should be developed.4 (3) Submit[t e d ] executed copies of all agree­
• Internal and procedural controls should be ments between the applicant and each of the
sufficient to provide an audit trail for transac­ respective merchants concerning the remote
tions processed through the EFT system. service units.

Current Legislation for State Financial


Institutions
The primary reference source used in this It appears that there is no uniform approach to
discussion of current legislation for state banks EFTS legislation by the various states. The states
is a summary developed by the director for take different positions with respect to such
education and research of the Conference of issues as (1) whether all or certain EFTS units
State Bank Supervisors. The summary was are branches and subject to state restrictions on
issued in April, 1976, but the information con­ branching, (2) whether EFTS units may be
tained in it is still reasonably accurate. manned by nonbank personnel, (3) whether all

4 Effective July 1, 1978, this will be part of section 545.4-2, as well as the guidelines.

11
institutions must be allowed to share remote­ legislation for EFT systems for state chartered
banking terminals, and (4) whether additional financial institutions allows such institutions to
regulation is required to protect the consumer. remain competitive with federally chartered
Thirty-two states (as of May, 1978) have en­ financial institutions located within the state and
acted legislation or have had regulatory inter­ with financial institutions in other states that
pretations that (1) allow electronic off-premise allow EFT systems; (2) EFTS legislation can
facilities and (2) do not consider such facilities affect the competitive balance between com­
branch banks. Of these thirty-two states, mercial and noncommercial financial institu­
nineteen require some form of mandatory tions; (3) the consumer’s liability for fraud,
sharing of such facilities under specified condi­ theft, or unauthorized use of cards should have
tions, eight states permit sharing facilities but specific limits; (4) information gathered by EFT
do not require it, and five do not mention the systems should be protected to the same degree
sharing issue.5 of confidentiality as transactions handled
Of the remaining eighteen states, seventeen entirely within the financial institution; (5) the
view electronic off-premise facilities as branch competitive balance between large and small
banks under existing statute. One state, Nevada, financial institutions should be maintained by
has not taken any statutory or regulatory action allowing smaller institutions to share the EFT
regarding such facilities. facilities of larger institutions, or by removing
A review of examples of specific EFT geographical limitations and/or capital
legislation enacted by several states indicates requirements which otherwise apply to
some of the legislators’ concerns: (1) enabling branches.

Summary
EFTS regulations enacted to date principally security and control. Most jurisdictions require
address consumer safeguards, competition regulatory approval for remote-banking
among financial institutions, and system terminals.

5Analysis of Enacted EFTS State Legislation (Washington, D.C.: American Bankers Association, May 1978).

12
Chapter 3

EFTS and the Legal


Environment
Currently, several major legal issues involving legislative action that would resolve the
EFTS remain to be resolved. These issues are confusion and provide for consumer protection.
being addressed by the courts, various regula­ On March 7, 1977, the commission published
tory authorities, and individual state legislatures. its preliminary recommendations and on
Overlapping responsibilities, and in some October 28, 1977, it issued its final report.
instances, conflicting decisions have con­ The NCEFT recommendations will have a
tributed to the uncertainty. At the same time, the significant impact on action taken by Congress
development of EFT systems has continued. as well as by other legal and regulatory
Congress realized that large EFT systems authorities.
were in development and was aware of the In this chapter, three of the major legal
potential problems; it, therefore, established issues are discussed. Each has a brief explana­
the National Commission on Electronic Fund tion, followed by some of the related court
Transfers (NCEFT). The purpose of this com­ cases and the recommendations of the
mission was to develop recommendations for NCEFT.

Are Remote-Banking Term inals Branches?


This issue is most significant in states that the comptroller had taken the position that remote
either (1) have more liberal branching provisions banking terminals were not branches, but, in
for one type of financial institution than for other the cases described below, his position was
institutions or (2) limit bank branching. The challenged and ultimately rejected.
more liberal the branching laws, the less Terminals authorized by the FHLBB may
significant this issue. Consider a state, for perform deposit services, withdrawals, and
example, which limits the number or the transfers between accounts but may not be used
locations of a financial institution’s branches to open new accounts. The regulations govern­
(or which requires a high level of capital for each ing the terminals expressly state that the
branch). If a remote-banking terminal is deemed terminals are not to be deemed branches. As
not to be a branch, the financial institution may indicated below, this issue is being litigated.
place terminals throughout the state, thus An additional issue exists with respect to federal
expanding their market area free of those savings and loan associations—namely,
restrictions or requirements.6 whether state EFTS legislation can supersede or
One aspect of the branching issue concerns supplement the FHLBB regulations.
the types of transactions terminals may handle The court cases to date have been primarily
without being considered branches. In several in unit-banking states and have primarily
unit-banking states, a terminal can dispense involved a challenge to the comptroller’s
cash, transfer money, and provide account definition of “ branch” under the McFadden Act.7
balance information. However, the terminals are The McFadden Act applies only to commercial
not permitted to accept deposits. Until recently, banks; thus, savings and loan associations and

6 If a remote-banking terminal established by a national bank is deemed a branch, the comptroller must, under the McFadden
Act, impose the same requirements for the establishment of the terminal as the state in which the financial institution
is located imposes on its state chartered institutions.
7 The McFadden Act is an amendment to the National Bank Act that describes a “ branch" as including any additional
office or branch or place of business where deposits are received, or checks paid, or money lent.

13
credit unions have had little legal restriction, a federal savings and loan association sued
at the federal level, on their remote terminals. a retail store, the FFILBB, and the board mem­
bers, challenging the validity of the FHLBB’s
Related Court Cases. In In d e p e n d e n t B a n k e rs temporary regulation governing remote-banking
A s s o c ia tio n o f A m e ric a (IB A A ) v. J a m e s E. terminals. The plaintiffs contended that the
S m ith , C o m p tro lle r o f th e C u rre n c y (No. 75-0089, board had exceeded its statutory authority in
D.D.C. (Oct. 10, 1975)), the court of appeals promulgating the regulation, and that the board
upheld the district court's ban on remote­ did not obey its own office-location regulations
banking terminals. The comptroller was ordered in authorizing remote terminals. The Nebraska
to rescind a ruling that remote terminals were federal district court upheld the FHLBB, finding
not branches and to consider them as branches that its statutory authority was broad enough
subject under the McFadden Act to state to encompass issuance of the regulations
branching restrictions. Other courts reached and that the office-location rules only applied to
similar decisions, such as in S tate o f M is s o u ri savings and loan branches, and, by the court’s
v. F irs t N a tio n a l B a n k o f St. L o u is (No. 75-113, interpretation of previous regulations as well as
D. Mo. (Nov. 18, 1975)), and S tate o f Illin o is v. according to the temporary regulation, remote­
C o n tin e n ta l N a tio n a l B a n k a n d S tate o f Illin o is v. banking terminals are not branch offices.
F irs t N a tio n a l B a n k o f C h ic a g o (409 F. Supp. The regulations have also been challenged in
1167, N. D. III. (Dec. 10, 1975)). In d e p e n d e n t B a n k e rs A s s o c ia tio n o f A m e ric a
In an Oklahoma case decided on December v. F e d e ra l H o m e L o a n B a n k B o a rd , No. 76-0105
23, 1975, however, the court upheld the comp­ (D.D.C., filed Jan. 19, 1976). The case is still
troller of the currency’s interpretive ruling that pending.
the terminals are not branches and thus can
be deployed remotely and offer a full line of Recommendations of the NCEFT. The
services including deposits. NCEFT recommends allowing depository institu­
On October 4, 1976, the Supreme Court tions to deploy their terminals for all typical
refused to hear an appeal of In d e p e n d e n t banking transactions, including the acceptance
B a n k e rs A s s o c ia tio n v. J a m e s E. S m ith, of deposits, anywhere within a state. In addition,
C o m p tro lle r o f the C u rre n c y ; S tate o f Illin o is v. the terminals could also be deployed and
C o n tin e n ta l N a tio n a l B a nk, and S tate o f Illin o is provide the same services to contiguous states
v. F irs t N a tio n a l B a n k o f C h ic a g o , thereby within the depository institution’s natural
permitting the lower court decisions to remain in market area.
place. The Illinois banks and eventually the Nondepository institutions, such as retailers
First National Bank of St. Louis were required and supermarkets who allow their customers to
to discontinue use of their remote-banking use terminals to communicate with depository
terminals. institutions, should not be considered to be
The FHLBB’s regulations were challenged in regulated depository institutions. Thus, they
B lo o m fie ld F e d e ra l S a v in g s a n d L o a n A s s o c ia ­ would not fall under the jurisdiction of the
tio n v. A m e ric a n C o m m u n ity S to re s C o rp ., Federal Reserve Board, comptroller of the
396 F. Supp. 384 (D. Neb. 1975). In this case, currency or other regulatory body.

What Are the Antitrust Im plications of


Shared EFT Networks and Term inals?
In many cases, remote-banking terminals and shared or cooperative networks may not provide
merchant point-of-sale terminals have been sufficient competition to ensure high quality
deployed on a shared basis. Essentially, there services and the lowest possible prices to the
are two types of shared networks. In one case, consumer and merchant. An additional concern
a single financial institution develops the system is that large financial institutions will establish
and makes it available to other financial EFT networks and not allow smaller institutions
institutions for a "per transaction” fee. Another to join, thus diminishing their ability to compete.
approach has been the joint development and
operation by a group of financial institutions. Related Court Cases. Most of the legal
Both approaches have caused some concern activity concerning mandatory sharing has
about the impact of a small number of shared occurred within state legislatures and the
EFT networks versus a larger number of com­ Justice Department. The American Bankers
peting networks. The major concern is that large Association noted in A n a ly s is o f E n a c te d EFTS

14
that nineteen states have some
S tate L e g is la tio n 3. All commercial banks were allowed to join
form of mandatory sharing legislation.8 and were required to share terminals;
The Justice Department has urged both the however, savings and loan associations and
Federal Reserve Board and the FHLBB to credit unions were precluded from
minimize their efforts in the area of POS to participating.
encourage competition among the financial
institutions. The NETS board stated that they intended
On March 7, 1977, the Justice Department to continue the program and will determine how
outlined its antitrust objections to the Nebraska to comply.
Electronic Transfer System (NETS). The
primary objections were:
Recommendations of the NCEFT. According
1. As of October, 1977, NETS membership to the NCEFT, shared EFT systems should be
represented 86 percent of all commercial established on a pro-competitive basis that
deposits, and it was expected to approach provides free choice within federal antitrust
100 percent. The Justice Department’s laws. Decisions whether or not the network is
available evidence did not support the pro-competitive should be made individually,
necessity of an all-encompassing joint based upon—
venture.
2. The system was designed to retard individual 1. The feasibility and likelihood that two or more
member initiative by requiring that all competing networks could be developed in
services be designed collectively and that the same area.
terminals bear no corporate identification of 2. The effect on actual or potential competition
the installer. in the market.

How W ill Consum er Privacy Be Protected?


The privacy of the individual is becoming an The law was enacted to enable law enforcement
increasingly important issue. The major concern agencies to summon the individual's financial
is unauthorized storage of and access to per­ information without notifying the subject of
sonal data gathered by banks, insurance the inquiry.
companies, credit bureaus, government, and In the case of U n ite d S tate s v. M ille r (425
other institutions. Problems relate to the U.S. 435 (1976)), the Supreme Court denied that
unauthorized access to data, provision of an individual has a constitutionally protected
incorrect o r out-of-date information, and the interest in transaction information maintained by
unauthorized sale of name lists and other his depository institution, holding that the
personal data. The advent of EFT systems and information was freely given and that it is the
expanded technological capabilities provide property of the financial institution.
the potential for even greater problems. EFT
systems will be able to capture most of an Recommendations of the NCEFT. The
individual’s financial transactions at the place NCEFT recommends enacting federal legislation
and time they occur. Expanded technological to grant individuals the right to contest any
capabilities will make possible the storage and government access to their financial informa­
rapid retrieval of this massive amount of data. tion, and to provide prior notification to indi­
viduals of any subpoena or summons to access
Related Court Cases. In the case of C a lifo rn ia information. This legislation should consider
v. S h u ltz (416 U.S. 21, 39
B a n k e rs A s s o c ia tio n law enforcement and other government
(1974)), the Supreme Court upheld the con­ requirements.
stitutionality of the Bank Secrecy Act and found Additional legislation should be enacted to
that the act’s recordkeeping provisions did not prevent third-party private sector use of informa­
violate the individual’s Fourth and Fifth Amend­ tion concerning a consumer’s depository
ment rights. The Bank Secrecy Act requires account without specific consent except for the
substantial collection, storage, and reporting of information necessary to verify or complete a
individual financial data by financial institutions. transaction.

8 Analysis of Enacted EFTS State Legislation (Washington, D.C.: American Bankers Association, May 1978).

15
Who W ill Be Liable for EFTS Errors
or Irregularities?
Under the Uniform Commercial Code (UCC), Recommendations of the NCEFT. The
which covers paper-based payment systems, NCEFT recommends that the depository
there are specific rules governing the liability institution should be liable for erroneous,
of the bank or consumer in the event of an error, unauthorized, or fraudulent use of an account
irregularity, or fraud. The consumer assumes no unless the depository institution can demon­
liability for fraudulent checks, for example, strate its use of reasonable care and that
unless there is proof of negligence and the consumer negligence or fraud substantially
negligence substantially contributed to the loss. contributed to the act.
The UCC’s application to the new electronic The consumer who reports to the depository
payment systems is unclear at best. As a institution the loss of a card, compromise of an
result, the rights and liabilities of the respective identification code, or unauthorized use, shall
parties of an EFTS transaction are unresolved not be liable for unauthorized transactions from
in the absence of specific contractual agree­ the same source occurring thereafter but may
ment. In many instances, contracts between the be liable without any ceiling for losses occurring
providers and users of EFT services either before notification. The consumer has the
absolve the provider of all liability or fail to responsibility to examine statements and to
address the issue at all. On the individual con­ report errors or irregularities to the depository
sumer level, however, existing or pending institution within a reasonable amount of time.
legislation allocates primary responsibility (and Failure to report would make the consumer bear
liability) for errors or irregularities to the financial the loss if the depository institution had acted
institution providing the EFT service. The 1970 with due care. Contrary to the NCEFT’s
amendments to the Truth in Lending Act limited recommendation, the pending legislation would
the consumer’s liability on credit cards to $50. limit the consumer’s liability to $50 for un­
Although those provisions do not cover debit authorized transactions occurring before or after
cards, pending legislation would extend them to his notification to the depository institution.
debit cards.

Summary
Several legal issues related to electronic funds The Justice Department and NCEFT emphasis
transfer systems have not been completely on competition should insure that consumer
resolved. However, NCEFT recommendations acceptance or rejection will have a significant
will provide at least the starting point from impact on the eventual design of the EFT
which consistent legislation can be developed. products and their pricing.

16
Chapter 4

Internal Control Considerations


in EFT System s
The Extent of the C lient’s System
EFTS can connect many different organizations boundary of the client’s flow of transactions.
into one vast system. The auditor of each Therefore, the client’s system would encompass
organization must consider what portions of all aspects of the system from the point of
EFT systems are a part of his client’s system origination through recording in the books of
of internal accounting controls. Statement on account (including, if applicable, notification
Auditing Standards no. 3, paragraph 24, defines to the customer by statement or other means).
the extent of the client’s system of internal This extent may vary based on the types of
control and auditor’s review of that system as transactions processed by the EFT system.
follows: The following discussion will address the
potential impact on the extent of the client’s
An auditor’s review of the client’s system of system of internal control of each of the
accounting control should encompass all sig­ following categories of the EFT systems and
nificant and relevant manual, mechanical, and their related transactions: remote-banking
EDP activities and the interrelationship between
services, retail point-of-sale services, and
EDP and user departments. The review should
comprehend both the control procedures related direct-deposit/preauthorized payment services.
to transactions from origination or source to
recording in the accounting records and the Remote-Banking Services. The most
control procedures related to recorded account­ prevalent transactions in remote-banking EFT
ability for assets.9 systems are deposits and withdrawals. In both
cases, an exchange of assets occurs at the
SAS no. 3 also states that “the preliminary terminal. Because this exchange occurs at the
phase of an auditor’s review should be designed terminal itself, all portions of the EFT system
to provide an understanding of the flow of linking the terminal to the financial institution’s
transactions through the accounting computer would be considered part of the
system. . . .” 10 The problem in EFT systems is financial institution’s overall system. Both bill
determining where the “flow of transactions” payment transactions and transfers between
for a particular organization starts and stops. accounts represent some combination of a
SAS no. 1 states that— deposit and withdrawal and therefore are
accounting transactions that originate at the
Transactions include exchange of assets or remote-banking terminal.
services with parties outside the business entity
Remote-banking terminals do, in some
and transfers or use of assets or services within
it. The primary functions involved in the flow of cases, provide for customer inquiry about
transactions and related assets include authoriza­ account status and/or balance. Technically,
tion, execution, and recording of transactions such activity is not an accounting transaction
and the accountability for resulting assets.11 because it does not involve an exchange of
assets or services. However, inquiries do
In EFT systems, the point at which authoriza­ represent a potential exposure to the financial
tion for the transaction occurs and assets or institution because of possible misuse of the
services are exchanged will determine the outer information obtained by such inquiries.

9 The Effects of EDP on the Auditor's Study and Evaluation of Internal Control, SAS no. 3, in Professional Standards, vol. 1,
AU sec. 321.24 (New York: AICPA, 1975).
10 Ibid, AU sec. 321.25.
11 The Auditor’s Study and Evaluation of Internal Control, SAS no. 1, in Professional Standards, vol. 1, AU sec. 320.20 (New
York: AICPA, 1974).

17
Retail Point-of-Sale Services. As mentioned The retailer has another means of payment but
earlier, retail POS services include check has not extended his system. The boundaries
verification, check guarantee, and funds transfer of the financial institution’s system have been
for purchases and returns. Check verification extended to the remote terminal where account­
activities are not accounting transactions ing transactions are initiated. Neither the
between the customer and the financial institu­ financial institution portion nor the terminal
tion because no exchange of assets or services portion of the system is part of the switch’s
occurs. Such activity is, in essence, an inquiry system of internal accounting control because
to some portion of an EFT system. The check none of the transactions processed through the
guarantee process may or may not result in an EFT system are recorded on the books of
accounting transaction. Those guarantee record for the switch.
functions that do not encumber a customer’s
account for the amount of the check are
inquiries, not accounting transactions between Direct-Deposit/Preauthorized Payment
the customer and the financial institution. Services. As discussed in chapter 1, direct
However, those POS systems that interact deposits and preauthorized payments are
directly with a financial institution to encumber processed through an automated clearing house
or place a hold on the customer’s account for (ACH). The ACH functions in the clearing
the amount of the check would, in fact, result process by receiving deposits or payments in
in an accounting transaction. In theory, such machine-sensible form from a member financial
transactions represent the transfer of funds institution. The information received is similar
between a customer’s account and the financial to the information magnetically encoded on a
institution’s holding account. In such systems, check. The computer at the ACH sorts the
the financial institution has covered its future deposits and payments by bank number and
liability to pay the paper instrument by assuring forwards them to the appropriate financial
that funds available at the time of the guarantee institution, again in machine-sensible form. The
are not subsequently withdrawn, transferred by function of the ACH is essentially the same as
the customer, or used for other purposes. the function performed by the Federal Reserve
In either the check verification or check System in the clearing of paper checks.
guarantee process, the agreement between the The financial institution’s system of internal
POS merchant and one or more other par­ accounting control begins with the payments
ticipants in the EFT system may require a fee or deposits received from its customer and ends
for the process of check verification or guar­ with the sending of machine-sensible deposits
antee. The extent of the financial institution’s and payments to the ACH and the recording
accounting system for these fee transactions of the transaction in the books of record
would depend on the portions of the EFT system (including the amount due to or due from
involved in generating both the revenue and the ACH).
receivable portions of the transaction. The customer’s system of internal accounting
Retail POS systems also allow direct funds control ends when deposits or payments in
transfer for the purchase and/or return of goods. machine-sensible form are sent to the financial
Funds transfers are accounting transactions institution and the transaction has been
because they too involve an exchange of assets recorded in the customer’s books of record.
or services. These transactions differ slightly For both direct-deposit and preauthorized
from those previously discussed in that more payment transactions, the EFT system does not
than one transaction within the EFT system is change the extent of any client’s system; rather,
involved. For example, a purchase would it provides a new mode of payment or deposit.
generally involve three separate transactions: In essence, a business entity presenting
• A transaction between the customer and his machine-sensible deposit or payment transac­
or her financial institution to remove payment tions to its financial institution is effecting an
funds from a depository account. exchange of assets between itself and the
• A transaction between the merchant and the financial institution. For example, a local utility
customer involving the receipt of goods or company could collect cash or checks over the
services for the corresponding payment. counter and transmit those payments to its
financial institution as a deposit. Similarily, the
• A transaction between the merchant and the
utility company could present its financial
merchant’s financial institution for the deposit
institution with a file of machine-sensible pre­
of the funds.
authorized payment transactions which are, in
The boundaries of the retail merchant’s effect, the same payments in a form other than
system of internal accounting control have not cash or checks. The deposit is the same,
changed with the introduction of the EFT system. regardless of the form.

18
The above discussion has described the system in which the client participates. These
most common activities and transactions functions will determine the extent of the client’s
involved in EFT systems today. Clearly,as EFT system and, thus, the nature and extent of the
technology evolves, the auditor will need to auditor’s review.
consider the functions performed by the EFT

Controls in EFT Systems


Although the objectives and essential charac­ of functions within the EDP department. These
teristics of accounting control do not change controls have greater significance in an EFTS
with the method of data processing, the environment because the output of transactions
organization and control procedures used in is often cash or the distribution of goods or
EFT systems may differ from those used in services.
manual systems or less complex EDP systems. Plastic cards and PIN numbers should not
According to SAS no. 3, the two basic types be issued by computer programmers or
of EDP accounting control procedures are operators. Programmers and operators may
(1) general controls, which relate to all EDP be able to use their knowledge of the system to
activities and (2) application controls, which circumvent control procedures or programmed
relate to specific accounting tasks. The AICPA controls. Similarly, POS system personnel who
audit and accounting guide, The A u d ito r ’s S tu d y are responsible for assisting merchants with
a n d E v a lu a tio n o f In te rn a l C o n tro l in E D P authorization when the merchants’ terminals are
S ystem s (1977) relates to batch-oriented inoperative should not be computer pro­
systems and discusses these two control grammers or operators.
categories, listing basic controls. The guide Because of the sensitive nature of the
provides an explanation of the purpose of each information in an EFT system, segregation of
control, suggests audit procedures and com­ functions should also be considered in systems
pliance tests, and discusses the possible audit development. Control is enhanced if no one
effects of a weakness in each control area. individual has a complete, detailed knowledge
Although many of the control objectives and of and access to an entire EFT application.
techniques are applicable to EFT systems, this
chapter does not repeat that discussion. Rather,
S yste m s D e v e lo p m e n t a n d D o c u m e n ta tio n
this chapter covers
C o n tro ls . These general controls relate to
1. Aspects of the controls that differ between (1) the review, test, and approval of new sys­
batch-oriented systems and EFT systems. tems, (2) control over program changes, and
2. Controls that change in significance in EFT (3) documentation procedures. Areas of par­
systems. ticular importance in EFT systems include—
3. New control elements not included in the • Testing of new financial institution interfaces
audit and accounting guide. (for example, between the bank and the
switch).
General Controls. The guide classifies • Testing of new terminal interfaces to the
general controls as follows: switch.
1. Organization and operation controls • Testing of new application features at the
switch that impact internal processing at the
2. Systems development and documentation financial institution (that is, new transactions
controls
that require new control procedures).
3. Hardware and systems software controls
4. Access controls In addition, there is an even greater need to
monitor and control program changes in EFT
5. Data and procedural controls systems.
The
O rg a n iz a tio n a n d O p e ra tio n C o n tro ls .
controls in this category involve (1) segregation H a rd w a re a n d S y s te m s S o ftw a re C o n tro ls.
of functions between the EDP department and The control features inherent in the computer
users, (2) provision for general authorization hardware, operating system, and other sup­
over the execution of transactions (for example, porting software should be used to the maximum
prohibiting the EDP department from initiating possible extent to provide control over opera­
or authorizing transactions), and (3) segregation tions and to detect and report hardware mal-

19
functions.12 This control category has increased enforced. They should be confidential, and, if
importance in systems involving data commu­ possible, changed frequently.
nications. Transmission error detection methods Although physical security practices vary,
between financial institutions and remote many terminals are unguarded twenty-four hours
terminals should be employed. In addition, a day. Accordingly, the units should be strong
transmission should include time and date and secure enough to prevent physical penetra­
coding, transaction sequence numbers, tion. Federal regulatory authorities have
employee identification codes, and terminal prescribed specific minimum physical
and merchant authorization codes, if applicable. standards for remote-banking terminals.
POS terminals, which are smaller and more
Access Controls. Access controls provide portable than remote-banking terminals, require
safeguards over the use of documentation, data different security systems. In addition to other
files and programs, and the computer hardware controls, physical access to POS devices should
itself. Access limitations are important, not only be controlled. When a POS terminal is installed
to prevent unauthorized transactions, but also in a store, the financial institution should
to meet privacy requirements. Customer account establish procedures and training programs to
numbers, account balances, and account make the merchant aware of the minimum
relationships should not be made available to security standards required by the financial
merchants or other third parties, except as institution.
provided by law. Controls should be established
to prevent one financial institution from access­ Data and Procedural Controls. Controls to
ing another’s data, or one user from accessing ensure prompt and accurate processing include
another user’s data. (1) a control or balancing function, (2) written
Distribution and handling of plastic cards manuals in support of systems and procedures,
should be carefully controlled. User cards and (3) capability to restore or replace lost,
should be mailed only to existing customers. damaged, or incorrect files.13
Supplies of blank cards and equipment used Because the direct output of many EFTS
to personalize cards should be guarded and applications includes disbursement of cash and
subject to restricted access. In systems where payment for merchandise, a control group that is
institutions share terminals, cards for all member organizationally independent of EDP operations,
institutions must be accepted by the same units. systems, or programming is essential. The
The card construction therefore should be control group should be responsible for per­
nearly identical. Accordingly, each member forming many of the application controls
institution should agree to procedures to discussed below.
exercise proper control over the manufacture, In shared EFT systems, an agreement
storage, and distribution of the cards. between the concerned parties should'be written
Another consideration is access to the before the system is implemented. This agree­
system through the use of unauthorized equip­ ment should outline security and maintenance
ment. For example, telephone lines are the procedures, transaction fees (if applicable),
usual communication link between on-line liability in case of damage or errors or irregular­
remote-banking terminals and the financial ities, and procedures for termination of the
institution’s data processing facility; however, agreement. Institutions sharing remote-banking
telephone lines are susceptible to wire taps. terminals should agree to the physical security
The system could be protected by disguising over the units. The members should share
transmissions between the terminal and CPU responsibility for the safety and security of the
and by positive identification of the transmitting units unless the system provides that the
terminal. The National Bureau of Standards and members own the terminals separately. In that
various terminal vendors have devised encryp­ case, each institution should assure the others
tion algorithms. Such codes require a significant that the terminals are properly maintained.
amount of time to decipher, unless an appro­ Capability to restore or replace lost,
priate decoder is used. Positive terminal damaged, or incorrect files gains importance in
identification can be accomplished by the use EFT systems because the nature of the applica­
of answerback code transmission. tion increases exposure, and the real-time
Access control over both the PIN encoding environment makes recovery more complex.
algorithms and tables and the communication Recovery procedures provide a means of
line encryption algorithms should be strictly reproducing paperless transactions in the event

12 The Auditor's Study and Evaluation of Internal Control in EDP Systems (New York: AICPA, 1977), p. 37.
13 The Auditor’s Study and Evaluation of Internal Control in EDP Systems, p. 43.

20
of equipment malfunction. Backup and restart the terminal and transported to the central
procedures should minimize downtime and computer facility. Alteration of these records
maintain the integrity of data while the system is before they are input into the central system
down. In addition, manual procedures to would be difficult to detect.
originate transactions during periods of For on-line terminals, transaction logs should
equipment downtime should be specified. be maintained both at the main computer and
For example, an off-line remote-banking at the terminal. The main computer file would
terminal’s transaction file initially stands alone serve as the original record of the transaction
as the source document for a transaction. Were and the terminal file would serve as support. The
a terminal to malfunction while in use, the file should be organized by terminal code and
transaction occurring could be difficult to list account numbers and amounts without
reconstruct. Therefore, two recording systems revealing PIN numbers or other identification
(hard copy and magnetic or paper tape) should codes. If an unusual transaction is detected or
be built into each off-line terminal. If one system otherwise selected for testing, the transaction
should fail, the other would maintain the audit can be traced to the terminal from which it
trail. A disadvantage of off-line terminals is the originated and compared to the terminal file.
requisite daily removal and processing of the Any discrepancy would indicate that an un­
terminal’s transaction file. Security should be authorized entry into the EFT system may
maintained when the records are removed from have occurred.

Physical Security
Physical security over the host computer should attempts to repair a malfunctioning terminal.
be effective because a catastrophe involving Instructions about whom to contact in case of
an EFT system would be more difficult to recover malfunction should be displayed prominently on
from than a similar disaster in a less compre­ each terminal. Unauthorized repairof a damaged
hensive system. Emergency plans and backup terminal may destroy the reliability of the audit
should exist and be periodically tested. trail. Backup systems should be developed for
Procedures should be established to assure the period when processing is interrupted or
that no one outside of the maintenance staff when units are undergoing regular maintenance.

A pplication Controls
Application controls relate to specific The input controls listed in the audit and
accounting tasks. SAS no. 3 categorizes accounting guide include (1) authorized input,
application controls as— (2) code verification and input conversion,
(3) data movement, and (4) error handling.
• Input controls
• Processing controls Authorized Input. In an EFTS environment,
• Ouput controls many people may have access to the system.
Where applicable, input controls should ensure
that a valid card was used by the valid card­
Input Controls
holder from a terminal authorized to perform
Input controls are designed to provide reasonable that transaction.
assurance that data received for processing by For example, one common method of user
EDP have been properly authorized, converted identification is the use of a magnetic-striped
into machine-sensible form and identified, and
that data (including data transmitted over com­
card combined with a unique PIN number
munication lines) have not been lost, suppressed, known only to the user. (Other more advanced
added [to], duplicated, or otherwise improperly identification methods such as finger- or voice-
changed. Input controls include controls that print analysis are presently not cost effective.)
relate to rejection, correction, and resubmission To operate the terminal, the user inserts a card
of data that were initially incorrect.14 and enters the PIN number on the terminal’s

14 SAS no. 3, in Professional Standards, vol. 1, AU sec. 321.08a.

21
keyboard. If the user is unable to enter the PIN The log should also maintain the date and time
number correctly or if the terminal recognizes of the transaction. Further, it would be desirable
the card as being invalid (stolen, counterfeit) to maintain control totals for each terminal by
the user cannot enter the system. Some systems transaction type.
do not return the invalid card but store it within
the terminal until removed by an authorized Data Movement. Assurance should be given
individual. To help assure that an invalid user that data are not lost, suppressed, added to,
will not obtain both the card and PIN number, duplicated, or otherwise altered. In an on-line
they should be mailed to the user separately. environment involving data communications
An on-line terminal has direct access to the networks, this is much more complex than in a
central computer file of invalid cards while an batch environment. The auditor should consider
off-line terminal should maintain its own file for evaluating the controls related to message
such cards. Off-line files will not be as current transmission and data security. The auditor
and may require larger terminal storage should determine that a satisfactory technique
capability than on-line terminals. is used to validate the receipt and transmission
While the cost of a card-PIN system is less of messages (transactions) originating through
than other systems, physical security may not the terminal. A transaction identifier should
be as good as some alternative system. Cus­ include not only the terminal device identifica­
tomers frequently write their PIN number on the tion but also other control information such as
card or give the number to other customers. message type indicator (that is, debit, credit,
Coded messages on a plastic card’s magnetic high-value debit), message sequence number
stripe can be duplicated. In some systems, generated at the terminal, designation or
a PIN number or portion of a PIN number can routing indicator(s), and character count. The
be obtained by observing the user entering the message sequence number can be used to
number at the terminal. trace the transaction along the complete data
Several methods exist to make cards more stream and, if necessary, back to the originating
secure. Most involve machine-sensible mes­ station and person. The system should also be
sages encased within a plastic card, or use of designed to respond to the terminal device
radioactive isotopes. Each card should contain acknowledging receipt of the message. If there
a unique random factor so that no two would be is a problem with validation of the message
alike. Another method to discourage counterfeits header or transaction, the computer system
is the use of heat- or pressure-sensitive plastic, should request retransmission using the same
causing the card to be damaged by conven­ sequence number.
tional duplicating techniques.
Another control to help assure authorized Error Handling. The correction of errors and
input is to restrict the types of transactions that resubmission of the corrected transactions
can be made from certain terminals (for should be controlled. The errors should be
example, restrict the terminals from which corrected either by the person who caused them
adjustments may be made or high-value (for example, reentering a transaction that was
transactions may be initiated). A terminal that improperly input at the terminal) or by an
handles customer deposits and withdrawals independent third party who reviews them with
should not be capable of obtaining information the originator. Terminals from which error
or accessing files other than those necessary to correction transactions can be made should be
complete the specified transactions. The limited in number and subject to strict access
system can identify the terminal by use of an controls.
“ answerback” feature.
Processing Controls. Processing controls are
Code Verification and Input Conversion. Data designed to provide reasonable assurance that
entry errors and the loss or dropping of data can electronic data processing has been performed
be a major source of error in EFT systems. The as intended for the particular application, that
system should be designed to verify each is, that all transactions are processed as
transaction before acceptance by the system. authorized, that no authorized transactions are
The user could then eliminate mistakes before omitted, and that no unauthorized transactions
the transaction is entered into the files. This are added.15 Controls in this category include
edit/validation process of input transactions use of control totals, limit and reasonableness
should involve validation of the transaction checks, and run-to-run controls.
content, formatting of data, and writing a log The following are examples of some process­
record including the transaction serial number. ing controls in an EFTS environment:

5
1 SAS no. 3, in Professional Standards, vol. 1, AU sec. 321.08b.

22
• Comparison of daily batch totals from the oped and the “ before” totals compared with the
main computer to corresponding totals main­ “ after” and “transaction” totals.
tained by the terminal device and/or switch. The customer or user of the terminal can
• Balancing by account of terminal and/or serve a valuable control function. Customers
switch transactions for total dollar amount and should be given printed evidence of the transac­
number of items. tion when it is complete. They should also be
• Monitoring activity logs to identify unusual given periodic statements and have the
transactions. The monitoring may include opportunity to challenge the charges recorded.
establishing limits based upon the number Mailing of the statements, and handling and
and dollar amount of transactions. These investigation of customer inquiries should be
limits may be monitored by terminal, type of performed by the control group or other function
merchant, and financial institution. The that is independent of the processing of EFTS
objective is to identify potential errors or transactions.
irregularities as they occur.
Distribution Controls. Because the direct
Output Controls. Output controls are output of an EFT system can be cash or the
designed (1) to assure the accuracy of the distribution of goods or services, output control
processing result and (2) to assure that only over these applications is essential. Control over
authorized persons receive the output.16 output of information from EFTS files is also
important because of the sensitive nature of the
Accuracy of Processing Results. During the information and the privacy regulations
processing of EFTS transactions, it may be governing its distribution. One example of this
desirable to save the master file’s “ before” and type of control would be to limit customer
“ after” processing image on a log. Control totals information inquiries, based upon the terminal
over selected data elements could be devel­ and person performing the inquiry.

Study and Evaluation of Internal Control


in EFT Systems
Once the auditor has determined the extent accounting applications is limited or extensive and
of the client’s system, the auditor has a respon­ whether the EDP facilities are operated under the
sibility to obtain an understanding of the flow of direction of the auditor's client or a third party.17
transactions through the system, the extent to
which EDP is used in each significant account­
ing application, and the basic structure of There are two types of switches used in
accounting control within that system. remote-banking and point-of-sale services. They
In many EFT systems, third parties are are referred to here as “ message-passing” and
responsible for some portion of the processing “ bank” switches. A message-passing switch
of transactions. For example, the third party may performs only straightforward data communica­
provide the switching data center, the tele­ tions between the financial institution and the
communications network, the terminals, or all of terminals. A bank switch can route transactions
the foregoing. To the extent that the client’s between financial institutions and may provide
system of accounting control includes process­ some control or accounting functions. Both
ing performed by a third party, the auditor types of switches are within the financial institu­
should consider this processing during the tion’s system.
preliminary phase of the review. SAS no. 3 Because of the limited function performed by
indicates— message-passing switches, the auditor’s review
of the switch will normally be concerned only
When EDP is used in significant accounting with (1) determining which type of switch it is
applications, the auditor should consider the EDP and (2) reviewing the financial institution’s
activity in his review and evaluation of accounting controls to ensure that the switch only transmits
control. This is true whether the use of EDP in the data and does not alter it.

16 SAS no. 3, in Professional Standards, vol. 1, AU sec. 321.08c.


17 SAS no. 3, in Professional Standards, vol. 1, AU sec. 321.03.

23
The auditor’s review of bank switches, owned by a third party should be considered
however, would be based on the functions a service center.
they perform. As indicated above, a bank switch

Summary
This chapter has discussed two problems facing • What controls have increased importance in
the auditor of EFT systems: EFT systems? How can certain control
objectives listed in the audit guide18 be met
in EFT systems?
• How much of the EFT system linking many
organizations is included in the client’s This discussion is the task force’s initial
system? What parts of the system should the assessment of these questions. Further research
auditor consider in the study and evaluation and professional deliberation will be needed as
of internal control? auditors gain experience with these systems.

18 The Auditor’s Study and Evaluation of Internal Control in EDP Systems.

24

You might also like