The Open Banking Standard
The Open Banking Standard
The Open Banking Standard
Standard
CONTENTS
1. Executive Summary............................................................................................................3
2. Introduction......................................................................................................................... 8
3. Foundations...................................................................................................................... 11
4. Opportunities and Challenges..........................................................................................14
5. Scope of Data................................................................................................................... 17
6. Customer Benefits............................................................................................................ 20
7. The Open Banking Framework.........................................................................................24
7a. Standards....................................................................................................................... 25
7b. Developer Resources.....................................................................................................37
7c. Security........................................................................................................................... 41
7d. Governance.................................................................................................................... 55
8. Regulatory and Legal Considerations...............................................................................64
9. Implementation Plan.........................................................................................................76
Appendices........................................................................................................................... 81
Glossary............................................................................................................................. 143
Acknowledgements............................................................................................................ 147
1. Executive Summary
Context
In the 2015 Budget HM Treasury announced its commitment to delivering an open standard for
Application Programming Interfaces in UK banking, to help customers have more control over their
data and to make it easier for financial technology companies (FinTechs) or other businesses to make
use of bank data on behalf of customers in a variety of helpful and innovative ways. The Government
explained that this could help to drive more competition in banking to improve outcomes for
customers, and further support the UKs world-leading FinTech industry.
In summer of last year, at the request of the Economic Secretary to the Treasury, Harriett Baldwin
MP, the Open Banking Working Group (OBWG) was established to take forward this work. Their
objective was to produce a detailed framework for how an Open Banking Standard could be designed
and delivered, with a timetable for achieving this. The OBWG comprised industry experts from
banking, open data, and consumer and business communities to ensure a diverse range of expert
views are represented. This report is the OBWGs detailed framework for delivering an Open Banking
Standard in the UK.
Leadership in this area will set precedents across many sectors; a strong data infrastructure will be as
important to the UKs economy today, as roads have been to our success in the industrial economy
for over a century. Banking as a service has long sat at the heart of the economy because of the
need to seamlessly and efficiently connect different economic agents who are buying and selling
goods and services. The need for that ease of connectivity only increases in a digitally enabled
economy, and the capabilities that underpin it necessitate that connections be made in very different
ways.
Trust will remain the single most important factor in determining how those different means of
connecting will be made beneficial. Our challenge has been to determine how best to enable high
security (a critical foundation to building and maintaining trust) while not impeding development in a
rapidly changing world.
The European Union is rapidly advancing legislation that will, upon implementation in the next two
years, require UK banks (subject to consent from individuals and businesses) to open access to their
customer data and payments capabilities. The UK has diligently fostered a vibrant financial
technology environment and stands ready to reap the benefits of that legislation sooner than many
other markets. Other markets (in the EU and beyond) have begun to implement aspects of an open
banking standard, but none have produced a definitive outline of such a standard, let alone a
roadmap for its implementation. There is, therefore, a significant opportunity for the UK economy if we
take a lead in this space. This will require that we invest rigorously in development over the next 6-12
months.
include a broad implementation plan, covering three distinct phases over the course of the next three
years.
The implementation plan will, by necessity, need to be flexible over the coming years both because
lessons will be learned as implementation gets underway and because the technology and standards
on which it will rely will continue to evolve at a rapid rate in ways that are impossible to anticipate
today. Execution of the plan, along with maintenance of the emerging standard itself, will require
careful stewardship. Clear and consistent communications will be required to continuously build
awareness, understanding and adoption not just with service developers, but also with the individuals
and businesses that will benefit.
This latter point is fundamental. Our aim in constructing this framework in the way that we have was
to ensure that such an open standard provides the highest quality of service for individuals and
businesses, that increases competitiveness, improves efficiency and stimulates innovation. This
standard will only be as good as the trust that all of the participants required to make it successful
have in it; that will ultimately rely on the trust of individuals and businesses.
an open API for data that is shared, including, but not limited to, customer data; and
an open data API for market information and relevant open data.
An open API is a means of accessing data based on an open standard: it is a public interface.
Data exists on a spectrum of accessibility. The data spectrum ranges from closed to shared to open.
The data accessed via an open API may be closed, shared or open data.
* See http://theodi.org/data-spectrum
In fact, it could include data considered to be proprietary. In that circumstance, the holder of rights to
any such proprietary data could choose to share (but could not be compelled to do so unless the
data was deemed not to be proprietary) that data via the open API, along with stipulations or
licensing terms related to its use by those with whom it chooses to share it.
Open data is data that anyone can access, use and share. An open data API, therefore, is a public
interface that provides access to open data. An example of open data in this context could be
financial product information.
Any individuals personal bank details or a companys transaction data are considered closed or
shared data. They will be made available via an open API as a result of the implementation of this
work, but access to them would be subject to consent of the individual or business to whom the data
belongs and specific governance related to that. Such data will not be licensed or made public as
open data as a result of this work.
A n open standard is developed and maintained collaboratively and transparently, and can be
accessed and used by anyone.
Key recommendations
There are, of course, significant technical considerations involved in defining and implementing an
Open Banking Standard. But the bulk of the work is not technical; there are critical issues to take
forward around governance, security, liability, standards, communications, regulation and legal.
The chapters of this report outline the working groups recommendations in each of these areas.
There are a number worth highlighting here because of their relative importance.
The Open Banking API should be built as an open, federated and networked solution, as
opposed to a centralised/hub-like approach. This echoes the design of the Web itself and
enables far greater scope for innovation.
Customer transaction data (data that is presented to customers in their financial statements,
including underlying transaction history, and data that relates to a customers account through
which payments can be initiated) should be made available, with consent, via the Open
Banking API as both customer-related data and aggregated data.
Protocols will be developed and shared with all participants in the Open Banking Standard to
ensure that redactions in data that is shared via the open APIs are truly exceptional, based on
specific risk considerations. Further work will be needed to explore the extent of redaction
and what alternatives may be available.
As a principle, existing standards, datasets and structures should be reused where possible
and appropriate.
The Open Banking Standard should be managed within a transparent and open governance
framework that will support accessibility, usability and innovation.
The Independent Authority would vet third parties, accredit solutions and publish its outcome
through a whitelist of approved third parties.
Customers (individuals and businesses) of services built through the Open Banking Standard
will need to understand their responsibility for ensuring their data is protected. When issues
arise between participants, third parties and data attribute providers would be expected to
resolve these quickly. Where customers are affected they should be able to contact either
their third party or data attribute provider to initiate this process. Where issues are not
resolved within a specific time period, participants can escalate them to the Independent
Authority, which will make a ruling as to whether standards have been breached.
The Open Banking Standard will have a clear and explicit versioning policy and procedure
and use an open repository to maintain and manage changes.
The Open Banking Standard will be made available under a licence that permits it to be freely
used, reused and distributed.
Permission to access data will only be granted on the basis of informed customer consent,
will be subject to constraints (e.g. duration or transaction size) and must be able to be
revoked by the customer as easily as they were granted, or, if required for objective reasons,
the data attribute provider
Permission to both read and write certain data should be granted to third parties via the
open API.
A control framework will be implemented to address the risk profile to set reasonable Open
Banking Security Standards in such a way that allows flexibility for future threats and technical
flexibility to allow innovation in implementation of the controls.
Delivery of a minimum viable product (MVP) including: 1) the establishment of required governance
entities (and their initial scope and processes) and 2) the launch of a tightly scoped Open Banking
API, enabling select, read-access, open data use cases. This release will focus on lower-risk, easily
implementable components of the Open Banking Framework.
Release 2 to be completed by end of Q1 2017
Extension through implementation of select, read-access capability for customer transaction data. By
this releases conclusion, third parties will be able to access the midata personal customer data sets
via the Open Banking API on a read-only basis.
Release 3 to be completed by end of Q1 2018
Significant build-out of governance entities and further development of the Open Banking API to
cover the majority of use cases supported by open data and anonymised and aggregated data.
Similar functionality outlined in Release 2 to also be provided for midata business customer data sets.
Release 4 to be completed by end of Q1 2019
All recommendations will be implemented by this stage. In particular, within this release, data and
services generally perceived as higher risk will be implemented and will require governance and
technical recommendations to have been fully implemented and tested. It will deliver full read and
write functionality under the Open Banking Standard as per its target scope.
The implementation section of the report provides more detail on each of these releases.
In closing
The recommendations set out in this report are purposely ambitious. We believe the opportunities to
the UK economy and to the individuals and businesses within that economy from the successful
creation of an Open Banking Standard that will lead the world are enormous. We believe that it is
incumbent upon all relevant stakeholders to turn their attention now to starting the important work
required to seize that opportunity.
We look to 2016 as the year in which significant momentum must be built. That will require investment
to build on open principles, standards and processes to develop the framework into a living Open
Banking Standard, continuously iterating to meet the needs of customers and our digital economy.
We need to establish a suitable and trusted Independent Authority; to develop and deploy
propositions; to create a calendar of events and materials through which we can stimulate action and
galvanise the community, especially individuals and businesses; and to develop a long-term business
model to make the Open Banking Standard sustainable.
We welcome the support of HM Treasury for the recommendations set out here and its recognition of
the importance the level of ambition they represent.
Getting to this stage was not a simple task. It involved the hard work and collaboration of a group of
individuals who came together for the first time only a short few months ago. We would like to thank
everyone in the team for their support, commitment, challenge and effort they achieved a
tremendous amount in a very short period of time.
We are enormously grateful and privileged to have played a role in helping create this report and look
forward to its evolution.
2. Introduction
2.1 Background
In September 2014 the Open Data Institute and Fingleton Associates published a report titled Data
Sharing and Open Data for Banks (hereafter referred to as the Fingleton Report) at the request of HM
Treasury and the Cabinet Office.
The Fingleton Report concluded that greater access to data has the potential to help improve
competition in UK banking and recommended that banks create standardised application
programming interfaces (APIs) that would be accessible by third parties (e.g. FinTechs, developers
and other corporates). To facilitate this, the publication recommended that open industry standards be
established for data-sharing in banking, thereby enabling the creation of standardised APIs.
Subsequent to publication of the Fingleton Report, HM Treasury undertook a consultation, sourcing
views from across the financial services industry, consumer and business groups and the FinTech
community.
The outcome of the consultation was published in March 2015, with many of the respondents
supporting the development of open industry standards for data-sharing in banking in the belief it
would increase competition and innovation in banking. The consultation also highlighted potential
risks around data privacy, consumer education and interoperability, and thus the role the government
could play in supporting and standardising the development of an Open Banking Framework.
Governance Diagram
3. Foundations
3.1 Chapter Outline
This chapter outlines key concepts and terminology referenced throughout this report. These explain
what data-sharing entails in the context of banking and financial services, and describe the key
mechanisms that are used to share data. They also provide definitions and conceptual overviews of
the Open Banking Standard
1. Where an individual or business consents to a third party accessing account-level data stored
with a data attribute provider (like their bank or financial services provider), typically on a
restricted basis;
2. Greater publication of standardised open data (e.g. bank product data released on money
supermarket/price comparison websites).
1. Data Standards: rules by which data are described and recorded, potentially including, among
other characteristics, agreements on representation, format, definition and structure. The
scope of data to which these standards will apply are detailed in Chapter 5: Scope of Data.
2. API Standards: specifications that inform the design, development and maintenance of an
API. This can include guidelines pertaining to architectural design, resource formats,
documentation and versioning.
3. Security Standards: security aspects of the API specification A common standard on the
underlying data and the mechanism for accessing it will reduce many of the frictions
associated with data-sharing and support materially higher customer and third party adoption
versus a non-standardised environment based on multiple bilateral relationships.
A Governance Model is also described in Chapter 7d.
1. Customers: individuals and businesses who share their data; publishers of open data and
2. Data attribute providers: banks, financial services companies and other organisations through
whom data is stored and shared;
3. Third parties: developers, FinTech, and other organisations who use data provided to design
and offer new products.
The framework therefore includes:
1. Data, API and Security Standards through which usability of data and APIs will be achieved
and customers data will be protected from malicious actors and access rights can be
securely delegated;
2. A governance model, which will develop trust, provide issue resolution mechanisms and
oversee the standards;
3. Developer resources, which will enable third parties to discover, educate and experiment.
Chapters 7a-7d outline in detail the aforementioned components and provide guidance on their
design and subsequent implementation.
4.2 Opportunities
4.2.1 Driving innovation through data-sharing
The mass adoption of the internet has demonstrated the powerful effect widespread access to data
can have.
Collectively, internet companies have collected and organised a vast array of data. This has resulted
in the development of a broad spectrum of innovative services ranging from reference sources
including the worlds largest encyclopaedia to the practically useful such as online maps with
integrated travel directions, to the niche such as how to videos on every imaginable subject.
At first, data was either public, or actively shared by individuals through personal homepages. As the
internet became commercialised, businesses began sharing corporate data (e.g. airplane ticket
prices, hotel room availability etc.) directly to the public and/or via intermediaries. Furthermore,
attitudes of individuals towards data-sharing has also evolved; consumers now use social networks to
interface with third-party services and regularly share information to compare prices and receive more
personalised services. To date, customers ability to use their bank data has been limited and
restricted to inconvenient workarounds.
data portability the individual may share their data freely with whomever they choose;
consent the individual must provide explicit consent to sharing their data;
specific usage the individuals data may only be used for the pre-agreed purposes.
GDPR provides an important framework under which customers banking data will be assessed and
ultimately shared.
The European Commission also issued a proposal for a revised Payment Services Directive (PSD2)
in July 2013. Central to its recommendations are requirements for Payment Account Providers to
allow third parties with appropriate consent to share account information and to initiate payments.
Member states are required to transpose PSD2 into national law and apply the majority of the
provisions from two years after publication in the Official Journal (which was published in December
2015). Therefore, transposition at a national level will occur by January 2018.
In order to comply with GDPR and PSD2, many of the components that will enable the Open Banking
Standard will have to be built. These components will include technical design and infrastructure as
well as an approach to sensitive customer issues such as consent, delegation of access rights,
authorisation and authentication, vetting, accreditation and governance.
The technique can fail when web pages are redesigned or new security measures are
adopted;
Consumers are uncertain about the procedure and have little recourse to their bank in case
something goes wrong.
1See htp://www.programmableweb.com/news/telco-apis-ofer-huge-revenue-if-carriers-can-handledisrupton/review/2015/09/21
2EY FinTech Index
4.3 Challenges
4.3.1 Converting customer interest
Earlier this year, Ipsos MORI was commissioned to conduct research on consumer and small
business attitudes to data-sharing. Through a combination of focus groups and online interviews,
respondents were introduced to a series of practical use cases based on exchange of financial
information between a bank (data attribute provider) and a third party.
While nearly 40% of consumers reacted positively to the concept of sharing financial data, 30% were
against the idea, while the remaining nearly 30% were uncertain.
One of the main sources of consumer concern is around security and redress for unauthorised
transactions. Generally consumers would expect bank-grade security around their finances, and
require some means of financial compensation for security breaches. The Ipsos MORI research finds
that consumers expect their bank to be involved in the administration of such claims. Finally,
consumers overwhelmingly (77%) believe that third parties accessing their financial data should be
regulated.
So while experts agree that data exchange should be able to bring good outcomes for customers,
appropriate security and governance safeguards will be needed to develop and maintain trust. In
addition, greater customer awareness of the potential benefits and best practice for safely sharing
financial information with third parties will be required.
We note the importance of sustained consumer education this goes beyond raising awareness and
helps consumers understand the value of their own personal data and what responsibilities they take
on when they share it with third parties. This report considers that the responsibility for consumer
education lies with a number of parties including banks, FinTechs, government, consumer and
business groups.
Finally it should be noted that this initiative could potentially widen the gulf for two important segments
of the UK population, the digital have-nots and the unbanked. Research suggests c.8m bank
customers do not engage digitally with their bank accounts in any form and a further 2m adults have
no bank account. It is recommended that further work is done to assess if the innovative use of bank
APIs can be used to actually help in attracting and serving these important groups with products and
services that are both relevant and valuable.
4.3.2 Security
Using APIs as a new method for accessing customer data presents cyber-criminals with a new attack
vector. Attacks can come in a number of different guises from those that target technical
infrastructure to those that are socially engineered and capitalise on lack of customer familiarity.
The result of such attacks, unless appropriately mitigated, can range from intermittent service
provision through to data loss, fraud and identity theft. Therefore it is important to embed best
practices in the security field to ensure processes, infrastructure and actors are adequately protected.
In addition to embedding the appropriate structural safeguards including protocols, processes,
controls and governance there is the additional challenge of increasing awareness and digital
literacy among users (i.e. individuals and businesses). Socially engineered threats (e.g. fake
applications) specifically target lack of user familiarity therefore it is important for customers
themselves to adopt a vigilant stance. This will require a general understanding of key processes,
safeguards and entities involved in an open banking environment.
5. Scope of Data
5.1 Chapter Outline
This chapter outlines the types of data to be covered by the Open Banking Standard and provides
details of their underlying characteristics and associated access rights envisaged (i.e. what third
parties will be able to use specific data types for).
In defining this scope, and as a driving principle, this report has sought alignment to products and
channels defined by PSD2 (see Appendix 1 for further details). This alignment delivers two key clear
advantages should recommendations from this report be acted upon; (1) it simplifies compliance
requirements on participating institutions, and (2) it simplifies communications to customers. It should
be noted, however, that as of the time this report was written, relevant regulations (such as PSD2 and
the EUs GDPR) had not been finalised. As such, subsequent work following this report may further
refine or expand the scope as appropriate.
Read access permission that is granted to a third party enabling them to read but not modify
a file, set of files, or set of data.
Write access permission that is granted to a third party to modify or execute a file, set of
files, and set of data. In the context of this report, write access includes payment initiation.
5.3.1 Detailed scope: data attributes by product, channel and access rights
Table 5.1 Scope and boundaries
Scope and
boundaries
Data granularity
Customer transaction
data
Individual
customer/business
account level
Interaction channel
Products
Open data
By design, this
should be noncustomer data (e.g.
product features)
Product availability
Mortgages
Only products
available for sale
on or after 1 Jan
2016
Open aggregated
data
Currently limited to
postal district (SW1A)
level. There are
c.2,500 districts in the
UK
Limited to at least 10year age bands
Data can describe all
channels (but will be
delivered online)
Individual & business
current accounts
Savings accounts
Credit cards
Loans
Mortgages
Only products
available for sale on
or after 1 Jan 2016
Interaction history
N/A not
customer-level data
N/A not
customer-level data
Market sectors
Data transit
mechanisms
Read-only API
Read-only API
Read-only API
Standardisation
Merchant metadata
Product definitions
Path to purchase
definitions (e.g. to
allow product
applications to be
compared across
providers
Account status
Read/write API
6. Customer Benefits
Standardised bank APIs have the potential to dramatically improve competition and innovation in UK
banking to the benefit of individuals and businesses. As financial services are brought into the API
economy, it is expected that existing providers and new entrants would compete to dramatically
improve existing products by making them more intuitive, personalised, convenient and integrated. In
addition, customers would be expected to benefit from a suite of new propositions that are enabled
through open APIs. While the breadth of innovation could be vast, this chapter seeks to highlight a
small number of the products and services that may arise in this new environment. The basic
customer journey, which forms the starting point for all the propositions, is outlined first.
The third party may only use the data for the specified purpose.
It should be noted that the customer has the ability to review permissions across all their data attribute
providers and third-party applications at any point and revoke them.
Six possible propositions are highlighted below that have the potential to deliver real utility to UK
individuals and businesses.
3
htp://www.theguardian.com/business/2015/oct/22/high-street-banks-survive-competton-inquiry
4
CMA: Retail banking market investgaton, November 2015
by allowing consumers to share their transaction data with price comparison websites. However,
midata usage has been relatively low as it is hard to use it requires the consumer to download a
CSV file, in Excel, from their bank and then upload it into the price comparison website.
An Open Banking API could eliminate the friction involved in the download/upload model and
materially improve the consumer experience. A consumer would simply give a price comparison
service permission to access their bank account data and the rest would happen behind the scenes
and in real time. This service could even be engaged as an ongoing service with regular automatic
reviews, or respond to new offers launched into the market. The principle could also be extended to
other personal financial products, in particular credit cards and mortgages.
The CMA also recommended making price comparison initiatives available to SMEs, which account
for 5.5m active business current accounts in the UK.
Required data:
Individual transactional (current account usage) data for individuals and businesses.
Certain data sets available as open data: current account tariffs as a minimum, but could be
extended to customer service, branch location, opening hours, digital functionality.
Further opportunity in credit cards, mortgage and other lending and savings products.
Historic transactional data is an important determinant of credit quality and real-time transactional
data is a valuable indicator in the ongoing serviceability of loans. Currently this information is only
available to the current account provider, which means third-party providers may not be able to offer
the best terms to users when they shop around. It is noted that c.90% of SMEs procure loans from
their primary banking relationships while c.50% of consumers 7 are likely to purchase new banking
products from their current bank. With an Open Banking API, individuals and businesses will be able
to share transactional data securely with potential providers of credit to achieve the best possible deal
(in terms of rate, quantum and speed).
An additional but related benefit is that consumers could tap third-party credit in real time to avoid
paying fees on unauthorised overdrafts. Unauthorised overdraft fees amount to c.600m per year for
UK consumers.8 With anOpen Banking API, customers would be able to share real-time balance
information with credit providers, which would fund the account on pre-agreed triggers using faster
payments. This would have the effect of unbundling lending from the current account.
Required data:
Individual current account data (balance and transactional) for individuals and
businesses.
Individual one-time current account data (balance and transactional) for individuals and
businesses.
7htps://www.pwc.com/gx/en/banking-capital-markets/publicatons/assets/pdf/pwc-new-digital-tpping-point.pdf
8htps://assets.digital.cabinet-ofce.gov.uk/media/53c834c640f0b610aa000009/140717_-_PCA_Review_Full_Report.pdf
9htps://www.gov.uk/government/statstcs/business-populaton-estmates-2015
Individual transactional (current account usage) data for individuals and businesses.
The six propositions described above were chosen from a long list to highlight the kind of innovative
and valuable propositions that Open Banking APIs could enable. Two propositions are notable by
their absence: KYC and payment initiation. KYC is a regulatory requirement all financial providers
must now undertake when onboarding new clients. In theory, an Open Banking API could be used to
port across a customers KYC profile to a third party; however, this becomes a form of identity that is
considered to be out of scope for this report (albeit it could be considered in conjunction with the
governments work on identity, particularly GOV.UK Verify). Payment initiation is the ability of third
parties to initiate payments on behalf of customers of financial institutions. It offers good utility to
users and dispenses with the need to input credit and debit card details multiple times in an online
environment. Payment initiation has not been included above, as it is a clear and stated objective of
PSD2.
10htp://www.fnancialfraudacton.org.uk/Fraud-the-Facts-2015.asp
1. Data Standards: rules by which data are described and recorded, potentially including,
among other characteristics, agreements on representation, format, definition and
structure. The scope of data to which these standards will apply are detailed in Chapter 5:
Scope of Data.
2. API Standards: specifications that inform the design, development and maintenance of an
API. This can include guidelines pertaining to architectural design, resource formats,
documentation and versioning.
7a. Standards
7a. 1 Outline
Standards are a key enabler to market-driven innovation. They provide uniform infrastructure to
compete and innovate upon, and when distributed on an open basis help reduce market inertia and
unlock network effect benefits from ubiquity. By improving access to APIs and data, a more diverse
ecosystem of third parties will be cultivated whose participation will lead to greater product innovation
and choice for customers.
This chapter outlines the underlying types of standards that should comprise the Open Banking
Standard. It provides an overview of their specifications and guiding principles for design,
development and delivery. Security Standards are addressed in Chapter 7c.
The Open Banking Standard will include both API and data standards, thereby addressing both the
underlying data and the mechanisms through which data is accessed. It will also include security
standards, which are addressed in Chapter 7c.
The API Standard should comprise the following specifications and/or meet the following criteria:
The API Standard should comply with the following versioning requirements:
11htp://restcookbook.com/Miscellaneous/richardsonmaturitymodel
o A controlled core hosting shared resources should be established and this should
represent the slowest-changing part of the standard;
o Local extensions at the edges should be permitted, allowing for API provider
innovations with subsequent potential incorporation back into the core;
The Open Banking Standard should endeavour to reuse and align with existing open
standards, data sets, structures and semantics wherever possible.
The Open Banking Standard should be provided on an open basis, available for access
and use by anyone.
The Open Banking Standard should be made available under a CC0 12 licence (effectively
public domain) to promote its use, reuse and distribution. Failing this, CC-BY 13
(attribution) would be recommended.
Open data in scope should be published under a CC0 licence (i.e. the same licence used
by the Global LEI14 system), thereby avoiding barriers to reuse and licence chains.
System software should be made available under a MIT Licence, allowing the software to
be as permissive as possible and thus avoiding difficulties when integrating with
proprietary software.
Openness ensuring accessibility for all interested parties, across a wide range of
participants, thereby incentivising adoption, distribution and participation.
Usability facilitating ease of implementation and a smooth user experience for participants.
12htps://creatvecommons.org/about/cc0
13htps://creatvecommons.org/licenses/by/4.0
14htps://www.gleif.org/en/lei-focus/what-is-an-lei
Reuse adopting and leveraging existing standards, taxonomies and data lists wherever
possible and practicable to avoid duplicative efforts and maximise interoperability.
Extensibility establishing flexibility and encouraging adoptees to build upon the standard
and innovate locally, while providing governance mechanisms to subsequently bring
extensions back to the core.
Stability ensuring the provision of a stable environment for all participants where change is
communicated, actioned and governed in a transparent and consistent manner.
Transparency providing visibility and clarity on issues pertaining to the standard and the
environment it operates in (for instance its design, specifications, governance).
published, thoroughly documented and made publicly available at zero or low cost;
15
Aligned to the European Interoperability Framework version 2.0.
Selection process if and how utilisation of a non-standard can qualify and be justified for
adoption.
Existing taxonomy and data lists (e.g. currency descriptions) should be used wherever
possible and in instances where the standard itself cannot be used.
Developer experience should play a significant role in informing design and a great developer
experience should be seen as a key outcome.
A working assumption has been made that the Open Banking API will initially be pull rather
than push and that streaming protocols will not be considered in early phases.
a tight API schema (URIs, request and response) on open repositories (e.g. GitHub);
minimum publishable Key Performance Indicators (KPIs) due to potential business criticality
and to manage expectations regarding performance;
clear change control and versioning procedures to lessen the impact on API providers and
consumers;
once developed, the Open Banking API should align to the principles and specifically exhibit:
It should be noted that there are a number of emerging financial API sets in the market, but there is
no existing standard that meets all requirements for an Open Banking API.
7a 4.5 Versioning
Change control, i.e. semantic versioning, 16 needs to be managed effectively otherwise adoption of the
Open Banking API could be negatively affected. Versioning should be explicit and a changed API
should not be released without a new version.
The versioning process should:
guarantee support for developers for major API versions, for a specified period;
apply to the data structures sent in the API requests and responses and, wherever possible,
follow W3C Best Practices.17
16
htp://semver.org/
17
htp://www.w3.org/TR/dwbp/#bestPractces
The core to the standard will specify resources that are common to all business areas, including
shared resources such as identity, core account information, core product information etc. Changes in
the core are expected to have an impact on every API and should therefore be managed carefully and
occur relatively infrequently (e.g. once per half-year); the core should represent the slowest-changing
part of the standard. Subsequent work will define the core in more detail.
Change should be managed in a manner that encourages innovation and quick changes to the
standard, while maintaining control of the core to minimise the impact of change. Its important for all
changes to be managed in an open manner, to be subject to critical review and to be documented
with a full audit trail, including explanations.
A number of models exist to facilitate management of a layered API. GitHub represents a good,
transparent implementation of a technical solution; it provides revision control and is well suited to
editing a file in a distributed fashion.
The specification for the API Standard needs to have an open licence (potentially a maximum
permissive licence, e.g. MIT) so users can fork and experiment. In GitHub there is still one canonical
standard; the forks are duplicates (i.e. they are not real until they are merged in), so API providers
can work on their own fork (see 7a. 5.1.2).
non-proprietary, so that they can be freely used within the system without adding IP
restrictions to data.
A good example of the trend towards unique, non-proprietary identifiers is the LEI, which identifies
legal entities involved in financial transactions. Overseen by the worlds financial regulators and
central banks, the LEI, and its associated reference data, is published under a CC0 licence allowing
for free and unrestricted use.
More work will be required to determine if identifiers are needed, the instances in which they are
needed and how a standard approach can be defined.
Sensitive information should not be included in URIs as they are not considered secure
(problems include attack vectors that leverage web server logging, caching, browser history,
user agents, referrer header, etc.).
Sensitive information should be replaced by a token, or with an indirect object reference (e.g.
account1 instead of an actual account number).
Granted entitlements should be kept separate from resource descriptions, to enable flexible
and sophisticated entitlements to be supported in the future.
More details on the security elements of the Open Banking Standard are available in Chapter 7c:
Security.
18
For an example of how this can be done, see htps://www.tbray.org/ongoing/When/200x/2009/07/02/Slow-REST
19
See
htp://www.wcoomd.org/en/topics/facilitaton/resources/~/media/70998C307D3C47C996DB047B664B92AE.ashx
20
See htps://www.iso20022.org/fnancial_repository.page
form part of the core Open Banking API and therefore needs to be consistently implemented across
all organisations.
Open data should also adhere to the principles of open access and treatment of IP (such as codes,
software, reference data, etc.). The licence rights to use open data need to be clear and potentially
included as a field within the JSON.
7a. 10 Governance
7a. 10.1 Decision-making
In terms of deciding what will be adopted into the API and Data Standards, it is recognised that there
are a variety of options (models such as Apache, W3C, OpenStack, etc.). It is recommended that any
control should be light touch and appropriate. It is this reports view that some kind of standard
moderator mechanism is required. What rights the body has and the precise mechanism defining how
decisions about changes to the core Open API and Data Standards are made will need to be
considered in the next stage of work. The decision-making process should be distributed in a way that
is accessible, open to challenge and agile.
The developer hub (see Chapter 7b: Developer Resources) could be used as a means of ensuring
process transparency. Those involved would not have preferential access for making changes, i.e.
they should not have a separate process because they are part of the group.
There may exist the possibility to reuse governance structures of existing standards bodies for the
Open Banking Standard, but this would need to be explored further.
Open Banking Standard (copyright): this should be made available under a CC0 licence
(effectively public domain) that permits it to be freely used, reused and distributed, or failing
that CC-BY (attribution).
Open data falling under the Open Banking Standard: any licence here would be a barrier to
reuse and potentially end up with long licence chains. Therefore open data should be made
available under a CC0 licence (the same licence used by the Global LEI system for its data).
System software, e.g. core libraries or sandbox (see Chapter 7b: Developer Resources).
Many banks will have difficulty in using software that is difficult to integrate with proprietary
software; therefore we recommend licensing under a MIT licence.
7a. 13 Landscape
A number of existing projects might be looked to in terms of reusing or utilising elements for use in the
Open Banking Standard. These are detailed in Appendix 8.
7b. 3 Purpose
On the assumption that an Open Banking world is in operation, with many provider APIs operating
under the Open Banking Standard, this chapter will outline the developer (third party) resources that
is required to facilitate discovery, play and engagement from a diverse developer community. It will
also outline further areas for consideration relating to developer adoption.
Hobbyist developers individuals who are building their own app to run or to gain experience;
FinTech developers highly technical developers working in companies of 10-100 who want
to experiment very quickly;
Digital agencies or SI partners technically adept developers who are building solutions for
other companies;
Corporate clients or large companies from both financial services and adjacent industries
who want to develop their own solutions.
contain reference documents for the API and a reference implementation of the core APIs;
contain an implementation register, listing API providers that have implemented the Open
Banking Standard, while also specifying which products and versions of the Open Banking
API they have adopted;
link to API providers that have implemented the Open Banking Standard (and potentially their
extensions) and provide information on their implementations;
hold all historic versions of the core Open Banking API, but implement the most recently
approved.
The developer hub should be advertised on developer news and information platforms (e.g.
Programmable Web) to increase awareness. It is also proposed that developers register with the hub,
primarily so that notifications of change can be effectively disseminated.
implement all levels of security for APIs (note: Additional registration/identity management
may be required to provide developers access to higher levels of security, e.g. two-factor
authentication (2FA) (with test accounts/known responses) if required);
contain a set of executable tests that API developers can use to validate compliance;
For clarity, it should be noted that use of the sandbox does not imply accreditation; (see Chapter 7d:
Governance).
2. The Open Bank Project: recently launched an API explorer that has received positive
feedback. They let a developer access a dummy bank account making test calls with security
to quickly discover value.
limitations on use;
Constraints will vary depending on the API provider, so it is recommended that each provider gives
clear information about all constraints.
This information should be provided in the form of Key Performance Indicators (KPIs), e.g. the
number of calls per second allowed before throttling, maximum response time, etc. These KPIs
should provide clarity on the above constraints. In addition, as a principle API response time should
be at least as fast as the equivalent website (if this exists) so API access is not deterred.
Minimum service level agreements (SLAs) will not be imposed as this could present a barrier to entry.
Different providers are likely to operate under different SLAs.
7c. Security
7c. 1 Outline
This chapter covers three broad areas.
what they are providing authorisation for (i.e. what the authorisation will permit the third party
to do);
data attribute providers and third parties should retain control over authentication method.
OAuth 2.0 in conjunction with OpenID Connect are recommended as authentication protocols
of choice future work will be needed to specify the precise model.
The API should provide support for out-of-band (OOB 21) authentication.
21Out-of-band (OOB): Out-of-band is actvity outside a defned telecommunicatons frequency band, or, metaphorically,
outside some other kind of actvity.
Data Attribute Providers should be required to notify the user asynchronously/OOB when
significant actions have occurred (e.g. a change to a payee).
The API response should inform the third party that an OOB process is underway so that,
where appropriate, they can inform the customer.
The practicality of including fraud-relevant information (e.g. IP addresses) in the API return
message from the third party should be assessed in future work.
o Granting users and, in certain instances the data attribute provider revocation rights;
o Requiring data attribute providers to establish a mechanism through which users can
review and cancel their permissions;
Roles: a set of permissions and roles should be defined with a standardised nomenclature in
future work.
Encryption: API connections and data in transit should be encrypted using TLS v1.2 as a
minimum.
Certification: should be used to coordinate the management and issuing of digital certificates
with a whitelist of approved companies.
Security standards: it is suggested to use the Cheque Printers Accreditation Scheme (CPAS)
as a model, i.e. a security accreditation model based on ISO27001 with a specific minimum
threat profile, against which independent auditors can assess the security of data attribute
providers and third parties (it may be appropriate to grant a waiver to certain data attribute
providers, e.g. banks).
It is recommended that the task of defining a threat profile relevant to the open banking environment
be carried out by a body that includes relevant professional individuals and wider representative
stakeholders with experience of the financial sector and the threats the third parties and data attribute
providers are likely to face. A control framework should be implemented to address the risk profile to
set a reasonable industry standard security control. This should be done in such a way that allows
flexibility for future threats and technical flexibility to allow innovation in implementation of the controls.
7c. 4 Risks
The growing threat from cyber-criminals means that the adoption of the Open Banking API brings with
it significant security challenges. Banks have traditionally protected their clients' accounts and
information within a clearly defined and tightly controlled environment. Allowing customers to grant
third parties access to their data will expand the security perimeter beyond the data attribute
providers' control, and introduce new risks. Responsibility for protecting clients' data will be shared by
third parties.
The design of the Open Banking Standard must take account of this new security paradigm and
address the risks it brings.
The opportunity to mitigate the risk of such attacks is limited. Therefore, the Open Banking API should
include measures designed to minimise their impact if and when they do occur.
22
Recent research published by Ipsos MORI and Barclays shows that for customers using API-based products security is
important and consumer protecton needs to form a key part of any developments in this area. See htp://www.ipsosmori.com/researchpublicatons/publicatons/1769/Open-API-Exploring-the-views-of-consumers-and-small-businesses.aspx
Balancing usability and security inevitably requires a certain amount of risk acceptance. It is important
that consumers are made aware of and understand the risks they may be incurring by making use of
a third partys service or app.
what they are providing authorisation for (i.e. what the authorisation will permit thethird party
to do);
If the third party intends to share the customers information with another party, this must also be
made clear and the customer must be given the opportunity to opt out of having their data shared.
Customers must have the ability to review this information before, during and after authorisation has
been granted and to revoke any authorisation they have previously granted.
They must also have confidence that their data will not be retained by a third party unnecessarily
after authorisation to access it has expired or been revoked. It is the responsibility of each third party
and data attribute provider to ensure they are complying with relevant Data Protection Act (DPA).
7c. 5.3.2 Common terminology
The Open Banking Standard must define common terminology for describing the fine-grained
permissions defined by the API, as well as any roles that may be granted. Definitions must be simple,
concise and easily understood by customers. All parties should adhere to the standard terminology,
with any variance highlighted and explained clearly.
Where a data attribute provider extends the functionality of their API beyond the core Open Banking
API, care should be taken to ensure that users can distinguish between core and non-core
functionality.
Information about the authorisations the customer is being asked to grant, or has granted, to third
parties should be presented in clear and simple language (i.e. plain English). A standardised format
and lexicon for third parties terms and conditions governing customer data should form part of the
standard.
Explicit API functionality to support out of band challenges should be put in place to allow data
attribute providers to require an additional level of authentication before an action is authorised (e.g. a
new payment). Third parties should also be able to request/trigger re-authentication by the data
attribute provider (e.g. in the event that the third party detects suspicious activity that may not be
apparent to the data attribute provider).
The API should support the use of one-time transaction authorisation codes that are supplied out of
band to be submitted via the API, as well as transactions that must be authorised entirely outside the
API. The latter implies that the API must also support the concept of queued o r pending
transactions that must be authorised by the customer before the data attribute provider will
accept/action them.
We expect that data attribute providers will notify users asynchronously/ out of band (e.g. using SMS
or push notifications) in a timely manner when significant actions are carried out via the API (e.g. the
granting of permissions to a third party, the instruction of payments by third parties).
PCI DSS;
CPAS;
tScheme.
It is suggested to adopt a security standards approach based on the ISO/IEC 27000 series of
standards, with a tiered approach, i.e. the standard the third party is required to meet and the degree
of scrutiny to which it is subject should be commensurate with the access the third party seeks to
obtain. For lower levels of access (e.g. accessing open data), self-certification may be judged
sufficient while high levels may require that the third partys compliance with the relevant standards be
independently audited. This is the approach adopted by e.g. PCI DSS.
The servers and infrastructure operated by third parties and data attribute providers must be
protected against cyber-attack. Security standards should mandate security controls that are
commensurate with the nature of the data and functionality that is provided. At this stage, this report
is not broaching details pertaining to appropriate security controls, but it is expected they will include
the use of penetration testing, firewalls, intrusion detection systems, hardware security modules, OS
patching policies, etc. It is recommended that a specific workstream is established to define the
security standards in this area and then to review them at appropriate intervals to ensure that they are
kept up to date with emerging threats and technologies.
Existing financial institutions (i.e. future data attribute providers) have built up considerable
experience in this area; their input is expected to prove valuable.
The need and extent to include security testing of applications and servers on a timely basis is a topic
that should be covered in further detail in future stages of work.
There are a number of other working groups and standards bodies undertaking work that has bearing
on, or parallels with the Open Banking API, whose work could be leveraged as appropriate. Peer
review is also an important step in the design of security standards. It is recommended that
appropriate organisations and individuals be identified and invited to review and comment upon
proposals and drafts produced in the process of creating the Open Banking API.
It is also recommended that work towards the Open Banking API be conducted as openly as is
practicable and that the public is given the opportunity to review and comment on it informally (e.g.
through mailing lists or social media).
The customer authenticating themselves to an data attribute provider (in order to authorise a
third party);
The third party authenticating themselves to an data attribute provider (in order to access a
customers data);
Data attribute providers and third parties should own and control the method by which they
authenticate their customers.23 The methods by which a third party authenticates itself to a data
attribute provider, and a user may identify a third party, should form part of the Open Banking API
specification.
The process by which a customer authenticates themselves to a data attribute provider in order to
authorise the granting of permissions to a third party will be a tripartite process, which should be
designed in a way that minimises digital friction, to avoid discouraging or confusing customers. It will
potentially involve a hand-off of customer interaction from the third party to the data attribute provider
for the authentication to be carried out, followed by a redirect of the customer back to the third party
from the data attribute provider after the authentication and authorisation interaction process has
been completed.
This approach has the benefit of allowing the data attribute provider to continue to own and control
the method for authenticating its customers (thereby minimising the risk that a third party could obtain
permissions without explicit approval by the customer) and avoids mandating the use of specific
authentication methods. Separately, customers will also need to authenticate themselves to third
parties in order to gain access to the services or functionality being provided. The method used by
23
As previously noted, the EBA has already issued guidelines regarding authentcaton for internet payments (the Security
of internet Payment Guidelines) and further elaboraton on these rules in the context of third-party services is expected to
support the implementaton of PSD2.
both data attribute providers and third parties to authenticate customers should be appropriate to
adequately protect the data and functionality in question.
7c. 8.1.2 Selection of OAuth 2.0 with future consideration of OpenID Connect
The Fingleton Report recommended the use of the OAuth 2.0 protocol, which supports the tripartite
approach outlined in 7c. 8.1.1. This report endorses this recommendation, although further
consideration must be given to the specific implementation.
The OAuth 2.0 protocol supports a variety of different interpretations and styles of interaction, with
different security implications. The Open Banking API should prescribe how authentication and
authorisation aspects of the standard are implemented, so the appropriate levels of consistency,
interoperability and security are achieved. It is recommended that the OpenID Connect authentication
protocol (which provides an identity layer on top of the OAuth 2.0 protocol) be considered as part of
this process. Appendix 6 sets out some considerations pertaining OAuth 1.0 and 2.0 and OpenID
Connect.
Having been granted permission to access a customers account information and act on the
customers behalf, there must be a method whereby the third party can authenticate themselves to
the data attribute provider during subsequent interactions. OAuth 2.0 solves this through the use of a
token that is provided by the ASP to the third party at the point at which permission to access an
account is granted. The third party then presents the token to the each time it wishes to access the
account.
certificates. There must also be a method by which the data attribute provider may verify that a third
party is authorised to receive the permissions it is requesting.
7c. 9 Authorisation
7c. 9.1 The authorisation process
The OAuth model as it would apply to the Open Banking API is as follows:
In the course of an interaction with the third party, the customer communicates intent to grant the third
party access to account information held by a data attribute provider:
1. The third party requests access to the customers account information from the data attribute
provider;
4. The data attribute provider displays to the customer the access being requested by the third
party;
5. The customer reviews the access being requested by the third party and authorises the data
attribute provider to grant the requested access to the account information and act on the
customers behalf;
6. The data attribute provider grants the third party the requested access.
Steps 5 and 6 must not involve the third party; doing so would provide opportunities for a bad actor to
conceal the extent of the access being requested from the customer.
pertinent information about the third party (e.g. the company name, location, what level of
authorisation it has received);
After the fact, data attribute providers must provide an independent mechanism (i.e. without any third
party provided software or service) for customers to review the permissions they have granted and
revoke any.
Data attribute providers should also maintain the ability to limit, suspend or revoke a third partys
access if they detect suspicious activity or become aware that it is in the customers best interests to
do so (e.g. if a third party has been removed from the whitelist for failure to maintain required security
standards).
It is expected that each data attribute provider will issue its own authorisation tokens. Third parties are
expected to securely manage tokens relevant to each data attribute provider. data attribute providers
in turn, must ensure that the third party is in possession of legitimate authorisation tokens and that
the requested data or service relates to the customers legitimate account (i.e. the right customer is
accessing the right account via the right third party at the right time). Data attribute providers must
ensure that only valid tokens are accepted and that controls are in place to prevent common attack
scenarios such as replay, enumeration, denial of service attacks, etc.
permissions are granted by the data attribute provider to the third party;
evidence of authorisation is provided from the third party to the data attribute provider during
subsequent API sessions without requiring re-authentication and re-authorisation from the
customer (within the time limit of the permissions).
transient interaction versus persistent access over a long period). It may be expedient to draft some
guidelines that define what is appropriate. The customer must be able to override the duration (if any)
requested by the third party, both at the time permission is granted and at any point subsequently.
Permissions and authorisation
The data attribute provider must ensure that no permissions are granted to a third party without first
being displayed to and authorised by the customer. The customer must have the opportunity to opt
not to grant the third party any or all of the permissions being requested, or to apply relevant limits to
any permission (the data attribute provider may opt to apply default limits but these should not be
overly restrictive).
Benefit: giving customers a single view of their permissions dashboard (the permissions
they have granted across multiple organisation).
Risks: concentrating information for accounts that have profiles attractive to fraudsters in a
single repository makes them a high-value target; there may be possible privacy issues; the
cost of implementation may be high.
Future phases of work may want to undertake a more detailed evaluation on creating a central
permissions repository.
The case for message-level encryption is less straightforward. Existing bank apps and websites do
not use message-level encryption, so mandating its use would go beyond current industry norms. It
may also require significant changes to existing technology architecture deployed by many banks.
Unless stakeholders (data attribute providers in particular) indicate a strong preference for its
inclusion, it is suggested that message-level encryption should not form part of the Open Banking API
at this time. However, its inclusion should be considered in the future if the security threat
environment changes significantly and/or its use becomes more widespread.
Similarly, the case for including provision for (or mandating the use of) message authentication codes
in the Open Banking API should be assessed during the next phase, in consultation with data attribute
providers and third parties.
24
In an efort to prevent and/or mitgate payment fraud, FFA UK works very closely with UK banking insttutons to
facilitate and coordinate eCrime intelligence-sharing among them. In order to avoid any future gaps in the UKs eCrime
Data attribute providers should provide a channel for third parties to report any defects or bugs with
security implications, adopt formal procedures for acknowledging and investigating such reports,
addressing any security vulnerabilities discovered. In addition to existing statutory requirements, it is
recommended that third parties and data attribute providers be required to report any security
breaches that affect API data or functionality, to both the Independent Authority, and to any customers
affected. In the case of a third party suffering a security breach that affects API data obtained from a
data attribute provider, the data attribute provider should also be notified.
Protocols should be put in place to facilitate the exchange of information between third parties and
data attribute providers in support of investigation of potential fraud or security breaches.
intelligence picture, FFA UK proposes to incorporate 3PPs into its existng intelligence-sharing mechanism and threatmanagement process. This would enable 3PPs and banks to share fraud threat and risk intelligence to prevent and/or
reduce cases of fraud. These proposals stll need ratfcaton.
7d. Governance
7d. 1 Outline
This chapter further details the scope of governance required to operationalise the Open Banking
Standard. It outlines key governance entities required, their roles, responsibilities and activities. It also
provides an overview of how these governance entities engage with participants to ensure their
obligations are met and how issues that materialise between participants are resolved.
An effective governance model will require an Independent Authority with a clear mandate to
carry out its duties and sufficient funding to perform those duties effectively.
The primary role of the Independent Authority would be to ensure standards and obligations
between participants are upheld using a risk-based approach. These obligations cover issues
such as how customer complaints are handled, how data is secured once shared and the
security, reliability and scalability of the APIs provided, as set out elsewhere in this report.
It would work alongside an industry-led Standards Governing Body, whose primary role would
be to set and evolve all standards necessary to the success of the Open Banking Standard.
No direct contracts would exist between participants; rather, failure to meet the standard and
their obligations could result in the Independent Authority sanctioning participants. For third
parties this could mean withdrawal of. Further work is needed to determine appropriate
sanctions for data attribute providers.
The Independent Authority should vet third parties and accredit solutions. Obligations will
apply to third parties at both an organisational and application level. The approach taken will
be proportionate to the risk involved.
The Independent Authority may choose in the future to authorise other organisations to
perform vetting and/or accreditation, including platforms, trade associations or incubators.
This would reduce the authoritys workload and open up access to the Open Banking API.
Where customers are affected they should be able to contact either their third party or data attribute
provider to initiate this process. Where issues are not resolved within a specific time period,
participants can escalate them to the Independent Authority, which will rule on whether standards
have been breached. The role of the Financial Ombudsman Service needs to be explored further.
The governance entities should be introduced in phases, looking at specific use cases.
The governance model should cover but not be limited to the provisions of PSD2.
1. Data providers
2. Third parties
3. Customers
There will be a number of additional participants including e.g. regulators, government, consumer
advocacy groups and standards and other expert bodies. Any governance model must be futureproofed to account for the roles of different participants evolving over time.
The governance model will define and oversee the performance of all participants through all phases
of engagement. These phases are:
1. Discovery
2. Initial engagement
3. Active engagement
4. Issue resolution
It would also ensure that the physical elements of the ecosystem are effectively established and
maintained.
Be independent of third parties and data attribute providers to ensure their and customers
confidence in the ecosystem;
Act transparently;
Facilitate evolution of the ecosystem in line with new technologies and customer needs;
Oversee but not define the data, technical and security standards that apply to the
ecosystem;
Oversee but not define the standardisation of open data in the UK banking sector;
Create a clear process for issue resolution between participants and an escalation and appeal
process;
Establish a process through which interested parties can participate in an advisory capacity to
ensure the effective evolution of the ecosystem.
The ecosystem would thus include the following bodies alongside which the independent authority
would work:
A Standards Governing Body, whose primary role would be to set and evolve the data,
technical and security standards that would apply to the ecosystem;
A Strategy Forum where a broad range of stakeholders would input into the evolution of the
ecosystem as a whole.
The role, responsibilities and composition of all bodies will require further work. It is recognised that
there are existing and emerging models, expertise and capabilities across industry, as well as
internationally and from other sectors, which could provide useful reference.
There has been some debate about an approach that establishes the independent authority within an
existing regulator such as the FCA. Research conducted by Ipsos MORI, mentioned previously in this
report, suggests a consumer expectation that regulators would play a key role.
Reporting lines and accountability for the Independent Authority will require clarification.
7d. 5 Membership
Objective criteria to determine membership of each body should be established to ensure there are
no challenges of discrimination in terms of who can be a member. A right of appeal against
membership decisions should exist. A transparent approach should be taken to publishing all
membership decisions, including any complaints about third parties being excluded.
7d. 6 Scope
The work of the Independent Authority and related bodies as set out in this chapter will encompass all
activities pertaining to the open banking ecosystem by all participants, as set out above and
throughout this document.
the Open Banking Standard will be accessible by all parties on fair RAND terms.
It would lead to competition between different accreditation paths, speeding up time to market
for data recipients.
It would allow the independent authority to focus its resources towards areas of greatest risk
to the end-customer.
It may take time for appropriate organisations to emerge that could operate as access organisations
and therefore it is envisaged that the Independent Authority would retain a role in vetting third parties
and accrediting their solutions for the short to medium term.
7d 10.1 Discovery
This is the first stage for participants that wish to find out information about the Open Bank Standard
and how it might affect them. The Independent Authority will play a central role in ensuring that up to
date, relevant and accurate information is provided and that the language used for key terms is
consistent and that the information is accessible. Failure by data attribute providers or third parties to
provide access to up to date and accurate details to customers could lead to sanctions.
details about the role of the Independent Authority and the role of the other related bodies;
details of the SLAs/obligations between participating data attribute providers and third parties;
a helpline number, contact details email address and phone numbers for further questions.
For customers, additional information might include, for example, access to:
how they can identify vetted third parties and accredited solutions (kitemark details);
details of the type of solution and services that are available and from whom.
The Independent Authority will play a key role in providing access to relevant information and support
for all participants. This includes but is not limited to:
accreditation and vetting submissions from third parties, ensuring that these are handled
quickly and effectively;
providing third parties with timely and effective responses to legitimate API calls;
providing third parties with support contact details should queries arise;
providing customers with the ability to transfer their data to a third party;
the presentation of clear, fair and transparent terms and conditions to the customer;
where relevant, and where they wish to, providing their consent to the transfer of their data
from the data attribute provider to the third party.
mandate that data providers and third parties establish mechanisms to engage each other
should issues arise; and
act as an escalation point if the customer does not feel they have received adequate redress.
Customers should be able to contact their data attribute provider or third parties if they have a
complaint. Data attribute providers and third parties should be incentivised to resolve the customers
issue fairly and efficiently. If they fail to do so customers should be able to escalate the issue to the
authority, which can take appropriate action.
Third parties or data attribute providers that are found to have failed to meet the required standards,
or harmed the customer in some other way, may face action by the Independent Authority. This could
include a requirement to alter business practices within a specific time period, providing compensation
to customers who have been affected, enhanced vetting or a referral to a competent authority (e.g.
the ICO or FCA). In some cases, third parties and data attribute providers may find themselves barred
from accessing the ecosystem temporarily or permanently.
Third parties would be expected to hold insurance. As it is envisaged the standard could be
implemented ahead of PSD2 coming into full force, the FCA could bring forward guidance on the
insurance third parties should be expected to carry. This should be commensurate with the risk
different third parties pose to the customer and not present an undue barrier to new entrants.
It should be an ambition that the Independent Authority and ecosystem are ultimately self-funded.
This would normally be achieved through revenue-generating activities such as:
Further thought will need to be given as to the exact nature and quantum of such costs and how to
finance them. Funding governance should not become a barrier to new entrants either third parties
or data attribute providers.
One way of minimising costs, including those related to vetting and accreditation, would be to embed
the governance processes into an established body such as those listed below. However, there may
be some unique aspects to this ecosystem that dedicated groups or bodies would be required to
consider.
There are various accredited bodies that undertake certifications against defined standards. Some of
the more significant in the UK include:
The Big 4 auditing professional services firms (PWC, Deloitte, EY, KPMG) and other
professional services and consulting firms that provide many independent audit, certification
and accreditation services.
UKAS (UK Accreditation Services) the national accreditation body for the UK, appointed by
the government, to assess organisations that provide certification, testing, inspection and
calibration services. While primarily focused on providing accreditation to certification
providers, it does also perform some certification services itself.
The scope and reach of the final governance and certification requirements will have a substantial
impact on the level of costs that will be incurred in setting up and running the ecosystem, as will the
number of participants. However, both set-up and ongoing operational costs could be expected to
extend into several million pounds.
The Open Banking Standard should be designed taking into account GDPR and PSD2
principles and reviewed once the respective rules are finalised.
The sponsor of the Open Banking Framework should work with government and regulatory
bodies to ensure that the implementation of domestic legislation considers the effective
implementation of this initiative (and vice versa).
Further consideration should be given as to whether the Open Banking Standard requires
third parties to disclose to the customer whether they are regulated and the complaint
procedure (including any alternative dispute resolution service or lack thereof).
The Open Banking Standard will need to cater for, and reflect, the respective IP rights of
participating parties, including:
o determining appropriate sanctions if a party does not comply with the conditions of
the licence or terms of use.
Parties continue to have a responsibility to ensure they comply with third-party IP rights.
The Open Banking Standard develops minimum clear standards for what consent to sharing
of data might look like.
Consideration will also need to be given as to how the process will cater for fair processing
notices as part of the consent process.
Further work is required to consider how the Open Banking Standards caters for:
o more than one signatory on an account, e.g. joint accounts or corporate accounts;
o different access permissions on the underlying account, which can be common for
corporate accounts where there may be limits on the types of amounts of payments
that can be made by particular signatories.
The API should provide sufficiently granular control in terms of the data third parties are able
to obtain to mitigate the silent party risks, as it will be practically difficult to obtain consent
from parties whose personal data is included in the customers transactional information.
Beyond this, as part of the implementation of the Open Banking Standard, a focused working
group should develop a standardised approach to the measures outlined above:
o providing adequate assurance to all parties that privacy risks will be sufficiently
addressed;
Third parties should be directed to relevant ICO guidance to assist with compliance.
Each time anonymised data sets are added to the scope of the Open Banking Standard, a
standardised approach to anonymisation should be imposed to minimise risks of deanonymisation. The risk of data misuse can be mitigated by putting in place appropriate
sanctions such as temporary or permanent bans from API access for third parties that fail to
comply with their DPA or other legal obligations. This provides an added incentive to treat
data appropriately.
Data requests from third parties to data attribute providers should make clear from which
country the request is coming.
Further work is required to confirm how the Open Banking Framework will apply to third
parties based outside of the European Economic Area (EEA) (or transferring data outside of
the EEA) given DPA requirements, in particular in relation to European Commission
adequacy decisions or the requirement for model contracts. The utility of standardised
controller-processor agreements should be investigated. This could involve the use of
standard contractual clauses approved by the European Commission.
There is an opportunity to work with the EBA to maximise consistency between the regulatory
technical standards and the Open Banking Standards such discussion may be best led by
HM Treasury.
The GDPR will make wide-ranging changes to the data protection legal landscape in the UK and
across the EU. The GDPR has been the subject of intense debate and controversy since the original
draft was published in 2012. The GDPR was finalised in 2015, with an implementation period likely to
be two years. There is more information on the key changes relevant to the development of the Open
Banking Framework in Appendix 3; however, this is neither exhaustive nor certain, as at the time of
writing the text was not yet finalised.
2. The abuse of a dominant market position that has or is capable of having an effect on trade
within the UK.
Any new Open Banking Standard must ensure that no commercially sensitive information is shared
between competitors and not create unnecessary barriers to entry.
Competition law will need to be taken into consideration when setting the Open Banking Standard and
ensure that:
there is no obligation to use the standard, although if a party chooses to do so, they also
agree to comply with it; and
These principles have been applied in the recommendations throughout this report and will need to be
borne in mind as the framework develops.
The DPA requires the processing of personal data, i.e. data relating to an identifiable
individual, must be fair and lawful, that it must be transferred with adequate protection and
information must be kept secure. Personal data collected must not be excessive given the
purposes of the processing, must remain accurate and up to date, and be processed in line
with the rights of the individual.
Banks may have a common law duty of confidentiality to their customers. This will apply to
consumers and corporate customers.
Obligations arise under the Financial Services Regulatory Regime, including the Financial
Services and Markets Act 2000 and FCA/PRA Handbook(s) such as SYSC 3.2.6(R)
Information Security Requirements, the Electronic Money Regulations 2011 (EMR) and the
Payments Services Regulations 2009 (PSRs).
The UK ICO published guidance (non-binding, except to the extent that legal requirements
are described).
Below are some of the key issues that will need to be considered further as the Open Banking
Standard develops.
8.4.3.1 Should the framework differentiate between individuals and businesses that are in scope?
This reports recommendations do not differentiate between individuals and businesses. Although the
DPA does not apply to legal entities, in England banks have a common law duty of confidentiality to
their customers, including corporate customers. While it has not been established in case law that this
duty applies to other payment service providers (e.g. electronic money institutions and payment
institutions), nor that it applies in Scotland, it is common practice to apply this principle to protect
customers financial information.
In addition, the PSRs apply the same security obligations to both consumers and SMEs. These will be
extended further by PSD2 in respect of information services and initiation services. This report
recommends applying the same standards to both individual and business customers.
DPA obligations;
ensuring the data attribute provider has authority to share the information under its mandate.
DPA obligations
There are two key actors under the DPA: a data controller, who is the person that determines the
purposes for which and the manner in which any personal data are or will be processed, and who is
responsible for compliance with the DPA; and a data processor, who is a person who processes data
on behalf of a data controller. The analysis in this report assumes that both the data attribute provider
and the third party, once it receives customer personal data, will be considered data controllers under
the DPA. However, this will require further consideration as the Open Banking Standard develops.
Under the DPA, a data controller must rely on the following grounds to process personal data:
compliance with a legal obligation, e.g. which may be relevant to services within scope for
PSD2 and potentially data portability requirements under the GDPR;
necessary to pursue legitimate interests, provided that the processing is not unwarranted due
to a prejudicial effect on the rights, freedoms, or legitimate interest of the individual.
Where sensitive personal data (broadly, data relating to race, ethnicity, criminal offences, health,
political opinions, or religious beliefs) is to be processed, the data controller must have the explicit
consent of the customer, such as ticking a clearly labelled box on an online form. Explicit consent
cannot be inferred from data subject actions. The pursuit of legitimate interests is not available as a
basis for this processing under the DPA.
Given the wide range of personal data that may be transferred using the API, the framework currently
caters for explicit consent. The DPA also requires in most cases that the data subject be given a fair
processing notice or privacy notice that broadly sets out who the data controller is, how the data will
be processed and for what purpose.
For third parties, this requires consideration but should be relatively straightforward. In contrast, for
the data attribute provider there are some challenges as they do not control what the third party will
do with the data, making the provision of an accurate fair processing notice difficult. A pragmatic
solution (see Chapter 7c: Security) could be for the third party to include in its data request an
explanation of:
The data attribute provider could then provide a fair processing notice and request customer consent
on the above basis. This information is also likely to be required under PSD2 for in-scope accounts.
PSD2
Under PSD2, it will be necessary for third parties to obtain explicit consent from customers to provide
initiation or information services. This will need to be communicated to the data attribute provider, who
will also need to ensure that the third parties customer is authorised to give instructions on the
account.
Mandate
The data attribute provider will need to ensure that the customer is authorised to give the data
attribute provider instructions in relation to the account for which information has been requested.
Liability
An appropriate consent process functions less as a model to transfer liability, but to clarify the rights
and responsibilities. This places some of the responsibility on the customer to ensure they knew what
services they were using, and also places responsibilities on the third parties to process data
correctly.
Where customers grant consent for the use of their data, provided that consent is in a format easily
understood and verifiable by the all parties, there should be no ambiguity under law as to what data
was supplied and what it was to be used for.
time. However, this information is the personal data of Y, who will not have consented to processing
by third parties (the silent party).
Where a silent partys data is included in the financial transaction data, the third party subsequently
processing it needs an appropriate legal basis for that processing. As outlined above, lack of consent
does not prevent processing per se; other legal grounds for processing exist, in particular:
Where sharing the data is necessary to comply with a legal obligation, this can be grounds for
the processing. For transfers required under PSD2, this could be an available legal basis.
Where the transfer is not required by PSD2, the legitimate interests basis for processing can
be used, provided the processing does not have a prejudicial effect on the rights and
freedoms, or legitimate interests, of the individual (i.e. of the silent party data subject).
Beyond having a legal basis for processing this third-party data, controllers must also meet the other
requirements of the DPA, notably around fairness. As with consent, providing a fair processing notice
to silent party data subjects would probably not be practicable, as neither the third party nor the data
attribute provider would have a ready means to make contact. The DPA provides an exemption for
situations where providing the fair processing notice would involve disproportionate effort, but
controllers should still take steps to ensure that this data is not used in inappropriate ways that the
third party might not reasonably expect.
When considering whether the third party has met the legitimate interests condition, the ICO would
consider:
1. Whether the third party has requested only information it needs. Following discussion with the
ICO, it is recommended that the API should be built in such a way which allows for the
transfer of only those categories of data required (akin to permissions found on mobile
operating systems a flashlight app shouldnt need access to geolocation services, for
example).
2. What has been done with the data and whether it was being used in ways that could
adversely affect the unconnected third party, for example if data about the unconnected third
party was being used for marketing or determining differential pricing.
There are likely to be additional challenges where the silent partys personal data amounts to
sensitive personal data, e.g. a payment from the data subject to a silent party individual includes a
reference that suggests a medical condition or membership of a political party. Similarly, where the
customer is (for example) a trade union or medical centre, its transaction history would be likely to
contain sensitive data of members/customers.
Midata
This issue was considered as part of the PCA midata initiative and resolved by redacting or partly
redacting the descriptor field in some transactions to minimise the risk for silent party data appearing.
The PCA midata initiative had the specific objective of enabling consumer comparison of PCA options
and the redactions agreed were designed to have minimal impact on this use case. Replicating this
approach would be the surest way to address the silent party risk but the Open Banking initiative has
a wider objective than midata, and some of the use cases outlined in this report might require
unredacted descriptor fields in order to function. For example, small business accounting packages
may use the silent party data in descriptor fields to reconcile transactions in order into their books.
Another relevant difference between midata and the Open Banking initiative is that midata allowed
users to download their transaction history and then send it to anyone. In contrast, under the Open
Banking Standard, data would be shared by more secure channels directly between the data attribute
provider and athird party vetted by the Independent Authority. This reduces risks of third party misuse
of personal data and of inadequatethird party data security.
At a minimum, a balance is needed between privacy concerns and ensuring data-sharing is sufficient
to enable the provision of useful services.
Alternative solutions
Both third parties and data providers need to be able to comply with their obligations and manage
their risks. Following discussion with the ICO, the report believes that forthird parties this is likely to
involve:
Careful selection of data to ensure only that necessary for the service is requested from data
attribute providers.
Not processing the personal data of silent party individuals in ways that could be seen as
unfair, or outside of the reasonable expectations of these silent parties (for example, a third
party accounting system provider using these silent party individual data to reconcile
customers financial records would probably be reasonable, but using it to prepare a direct
marketing list or to profile the silent party individuals would probably not be).
Data attribute providers also need to manage their risk. Where a data attribute provider shares a
silent party individuals data with a third party, and that third party uses it inappropriately, there is a
risk that this third-party individual could take action against the data provider for having shared the
data without acquiring consent. Given that data providers cannot control the processing done by third
parties, this legal risk carried by data providers must be managed by other means.
Insofar as PSD2 requires the data provider to transfer the data to the third party, this could provide an
alternative legitimate basis for the transfer and should protect the data provider to an extent.
However, not all services provided, or all accounts accessed using the Open Banking API may be in
scope for PSD2. Where the transfer is not required under PSD2 (or other legal requirements) other
options must be used. Several options are available.
Ensure the API allows for requests of precise data points so as to minimise the sharing of
data not required for the third partys service.
Targeted redactions should be considered where data fields are likely to involve silent party
individuals data, especially sensitive data. However, not all IT systems will be able to redact
data at a granular level, so this kind of mitigation would need to be implementable in practice.
Terms and conditions account providers may need to consider updating their T&Cs to
reflect data processing under the Open Banking Standard.
Guidance on appropriate usage of silent party individuals data could be developed to assist
third parties to ensure they treat this data appropriately. Existing ICO guidance could be used
and further ICO input sought.
Governance and enforcement where the ICO takes action against a third party for
inappropriately processing the data of silent parties, this should result in appropriate action by
the Independent Authority, for example, consideration could be given to a temporary or even
permanent ban. This would help reassure data attribute providers that data they share will not
be used inappropriately and reinforce customer confidence in the framework.
There are a number of outstanding uncertainties that make it difficult to fully resolve this issue at this
time, for example the impact of GDPR and PSD2 is still to be understood. The above potential
measures will therefore need to be developed further during the implementation of the Open Banking
Framework.
Anonymised data
Anonymisation is where personal data is rendered anonymous in such a way that the data subject is
no longer identifiable. The ICO draws a distinction between anonymisation techniques used to
produce aggregated information, for example, and those such as pseudonymisation that produce
anonymised data but on an individual-level basis. The latter can present a greater privacy risk, but not
necessarily an insurmountable one.
The DPA should not apply where data is genuinely anonymised. However, it is possible in some
cases to convert this type of data into personal data by combining it with other data in order to
reverse engineer the identity of the data subject(s), also known as de-anonymisation.
The general view from the ICO is that a data controller that links various anonymised/aggregated data
sets together in order to identify individuals (and thus create personal data) will not be complying with
data protection obligations, except in exceptional circumstances. This is because the data is received
on the basis that it is anonymous and the data subjects will not have received an appropriate privacy
notice. Certainly, it is difficult for them to consent to processing.
Third parties seeking to acquire multiple sets of anonymised data will need to ensure they have
measures in place, such as silos and company policies, to ensure that such de-anonymisation does
not occur. The ICOs code of practice on anonymisation will prove a useful resource.
8.6 Security
8.6.1 Designing a secure system
Payment Services Providers have a duty under the DPA (Principle 7) and the Financial Services
Regulatory Regime (SYSC 3 banks, Reg. 6(5) EMR - electronic money institutions, and Reg. 6(5)
PSR payment institutions) to ensure data is kept secure and protected from fraud and misuse of
personal data.
PSD2 will also introduce obligations between data attribute providers and third parties to authenticate
themselves and communicate securely. At the date of this report, the EBA has issued a discussion
paper on strong customer authentication and secure communication, in relation to its mandate to
develop regulatory technical standards. The security requirements of the Open Banking Standard will
need to be further developed as the requirements under PSD2 are finalised.
8.6.1.1 What happens if the third party misuses data or uses it beyond the permission granted?
Under the DPA and pursuant to any duties of confidentiality owed, the information must be used in
accordance with the permission granted by the customer. In addition, PSD2 will also place restrictions
on the use of data beyond the purposes explicitly agreed to by the customer. This means that if the
fair processing notice provided only allows for specific uses, the third party cannot use the data for
non-approved purposes without first seeking further consent from the customer.
Once the third party receives the information from the data attribute provider, it is assumed that it will
be doing so (where personal data is in scope) as a data controller and therefore will be responsible for
ensuring compliance with the DPA. This means the liability for misuse of data sits firmly with the third
party.
However, despite this legal reality, the perception of the customer might not consider this subtlety
and, indeed, the customer may assume that as the data attribute provider has allowed for data to be
sent to the third party, they are still in control of the information and therefore liable should anything
go wrong. (And indeed, if the data attribute provider does not have a valid legal basis for the data
transfer, it will at law be liable.)
Such misuse or further incompatible uses might comprise profiling of individuals, direct marketing
(without consent), selling of customer information to third parties (without consent) and other uses for
which the customer will not have provided consent, nor been provided notice. Furthermore, the
information gathered by third parties may lead to insights and profiling possibilities that cannot yet be
foreseen, giving rise to wider data privacy concerns and the potential to significantly undermine
customer trust in the Open Banking Standard.
Much of the discussion around open data and an open API naturally focuses on the data within
scope. With a proper system of governance and clearly defined roles and responsibilities, it would be
possible to achieve a degree of clarity as to how liability flows from the actions of those involved in the
chain. If the data is already open, then logically interception presents no legal issues. For
anonymised, aggregated, non-personal data; much will depend on the extent to which that data is
currently freely available (and is therefore a subset of open data). However, where that data is only
provided under an API either to specific individuals or under a contract, then there would be scope for
those parties to agree at that time who would be liable in the event of a breach.
Transaction data, whether under PSD2 or otherwise, presents more of a problem; while banks have
obligations to refund customers for unauthorised transactions (see below), an API standard
introduces a further element of risk and data attribute providers would need to be comfortable in the
robustness of the standard in order minimise their credit risk. One option would be to mitigate their
risk with insurance. As noted in Chapter 7c: Security, it is likely that cyber-criminals will specifically
focus on the open API as a new attack vector. It is impossible to predict how attacks may be carried
out, but malware-type attacks constantly present difficulties for banks, in that customers must take
some degree of responsibility for the security of their own devices and security details.
DPA breaches might also be problematic. Loss of data resulting from a breach caused by malware
might be covered by appropriate customer communications/disclaimers. A systematic non-customerdriven breach (perhaps via a distributed DOS attack) might need to be covered by insurance.
In the event of a data breach (such as hacking), the relevant data controller will be liable and
responsible for any reporting. Reporting will also be required under PSD2 if the service is in scope.
Each party therefore needs to be clear throughout the process as to its obligations, particularly where
it is a data controller. The data controller might not necessarily be clear to the data subject, which
could lead to confusion.
1. Data attribute providers are under broad duties to ensure that information supplied is correct.
It is unlikely they would be prepared to accept any specific contractual liability, provided that
the data they are supplying is factually correct, clear, fair and not misleading, defamatory, or
discriminatory, and not infringing on the IP rights of others. Ultimately, data would be provided
as is.
2. The vetting/accreditation procedure would not seek to alter or transfer liability between the
data attribute provider and third parties, but function purely as a way of providing access to
the API.
3. Anyone supplying or accessing data already has obligations under existing legal and
regulatory frameworks, such as the Data Protection regime. An API Standard would not seek
to alter that.
4. Where customers grant consent for the use of their data, provided that consent is in a format
easily understood and verifiable by the all parties, there should be no ambiguity under law as
to what data was supplied and what it was to be used for. The role of any authority would be
to set minimum clear standards for what that consent might look like.
5. This incentivises all parties to ensure that customers understand what their data is to be used
for and how it will be accessed, and each organisation must therefore take steps to mitigate
any losses they may suffer for their own mishandling of the data (for example, using data
outside the scope of their consent, or breaching the provisions of the data protection regime).
6. Where something goes wrong, the customer is unlikely to be concerned with who is to blame.
The way access to the API is governed will not change that, but the governance structure
could make it clear that the customer could contact either the data attribute provider or third
party in the first instance, and it would be up to those parties to resolve the issue themselves.
Ultimately, as noted above, liability would flow from existing legal rights and obligations.
7. Insofar as the API is used to provide commercial services, between any or all of the data
attribute providers, third parties and customers, it will be the contractual arrangements
between the parties that make it clear where liability resides.
The vetting/accreditation procedure would not seek to alter or transfer liability between the data
attribute provider and third parties, but function purely as a way of providing access to the API. This
would help further the aim of the framework to promote competition and innovation.
However, data attribute providers may feel nervous about exposing large quantities of data to third
parties, some of which may not be subject to any existing regulatory framework; while under PSD2,
account aggregation and information services would be regulated, there may be many others that are
not. Therefore, it is logical for data attribute providers risks to be mitigated and for third parties risks
to be covered by the governance framework making it clear what those accessing the API need to
achieve by way of baseline standards, such as data storage and access, and possibly insurance or
capitalisation requirements.
9. Implementation Plan
9.1 Outline
This chapter proposes recommendations on how the Open Banking Standard can be operationalised.
The aspiration is to cover the full extent of its scope by Q1 2019 in time for PSD2 (as detailed in
Chapter 5: Scope of Data).
Proposals take into account both near-term and medium-term considerations; the former address
points for imminent action (i.e. within a six-month horizon) and the latter provides an indicative
roadmap to a live and fully operational Open Banking API. Steps should be taken to ensure that the
momentum, interest and progress that has been made to date are maintained as future phases of
work are initiated.
Launch of a minimum viable product (MVP) based on open available data by Q4 2016.
Progression towards the Open Banking Standards full scope (as per Chapter 5: Scope of
Data) by Q1 2019.
9.3 Overview
Production of this report completes the first phase of work: delivering a framework from which an
Open Banking Standard can be developed, governed and adopted. It outlines key assets, entities,
activities and protocols that are needed to facilitate data-sharing across financial services. Assuming
Phase 1 has been completed, it is proposed that subsequent work will be completed across three key
phases.
Phase 2 (Q1 2016) Mobilisation and socialisation: Establishing an OBIE to take forward the
proposals presented in this report and engage in formal consultations and broader community
engagement activities.
Phase 3 (Q2 2016) Design and funding: Completing a detailed specification for the Open
Banking Standard and designing target operating models for new entities. This phase should
culminate in the securement of funding and commitments of participation from first-adopter
data attribute providers.
OBIE will further develop both the framework and its underlying components, with the subsequent
piloting and launch of the Open Banking Standard, its associated governance entities and developer
resources (under a phased, iterative approach).
The OBIE should seek membership and/or representation from key industry and regulatory bodies,
including those from the banking, data and technology sectors. Requirements from future phases of
work should contribute to the identification of members and participants needed. This should include
adequate participation from regulatory bodies, given the need to comply with ongoing and incoming
regulation and the need to launch governance entities to oversee the rights and obligations of those
participating. Due consideration should also be given to adjacent industry participation, particularly in
light of potential learnings from security practices, and future cross-industry collaboration potential.
Given the significance of its mandate, the OBIE should be appropriately funded and resourced. Initial
funding should cover at minimum phases 2 and 3 and ideally with a longer-term time horizon in mind
(e.g. two years).
political stakeholders;
industry bodies;
A range of engagement mechanisms will be used depending on the audience. These will include
events, roundtables, forums and ongoing communication through both the press and other channels.
Trade associations are expected to play a key role, either directly supporting in events and
programmes and/or assisting in ongoing communications through leveraging their own channels. It
would also be beneficial for government to assume a role in future communications, thereby raising
awareness of both the Open Banking Standard and the profile of the OBIE once established.
Further detail is presented in the indicative release schedule outlined in Figure 9.2.
Figure 9.2 Indicative release schedule (Phase 4: Development and implementation deep-dive)
Operationalisation of the standard is expected to proceed on an agile, iterative, adept basis, refining
and updating approaches at each phase. This is expected to take into account an expanding range of
views and opinions from those participating and those seeking to participate. Ultimately, this approach
is viewed as cultivating a federated ecosystem with a multitude of players whose participation will help
drive increased interoperability and portability of data.
A rich ecosystem with a range of developers will help to better identify consumer preferences and
needs. Therefore innovations and use cases not yet considered or featured in this report (see Chapter
6: Benefits) are likely to surface through the implementation process. These will require refinements
to the Open Banking Standard; the implementation approach should retain flexibility to respond to
these changes going forward.
Appendices
1. PSD2 overview
81
95
98
101
104
111
118
129
130
132
It is intended to promote the emergence of new players (e.g. FinTechs) and the development
of innovative mobile and internet payments in Europe to encourage EU competitiveness
worldwide.
Payers have the right to make use of a payment initiation service provider (PISP) and account
information service provider (AISP) where the payment account is accessible online. PISPs
and AISPs cannot be required to enter into contractual relationships with account-servicing
PSPs (AS PSPs).
Access to payment accounts, to address PSPs ability to open and maintain payment
accounts with credit institutions with such access to be on an objective, non-discriminatory
and proportionate basis.
Requirements regarding the management of operational and security risks and incident
reporting to be consistent with the approach being adopted under the Network and
Information Security Directive, which is still going through the EU legislative process.
PSD2 is expected to confer a number of mandates on the EBA, consisting of six technical standards,
five guidelines and the development of a register. One of these mandates requires the EBA to
develop RTS on strong customer authentication and secure communication channels between
account-servicing PSPs and PISPS, AISPs and card-based PIIs, application of which is subject to a
separate implementation timeframe from the other PSD2 provisions. The EBA will need to submit the
draft RTS to the European Commission within 12 months from entry into force of PSD2. Dependent
upon how long it takes the Commission to adopt the RTS (thought to be anywhere between four to
nine months, although this is not fixed), the RTS are to be applied 18 months after their adoption and
entry into force (current assumption: sometime between November 2018 and April 2019).
Figure A1.1 PSD2 timeframes
HM Treasury (HMT), which is responsible for transposing PSD2 in the UK, is proposing to
engage with a range of stakeholders. This is expected to take place in early 2016.
In 2016 HMT will continue to work closely with stakeholders, the FCA and the Payment
Systems Regulator (PSR) to draft the implementing legislation. At present it is understood
that HMT plans to consult on the draft legislation around the end of Q1 2016 with an aim to
publish its legislation a year prior to the transposition deadline (i.e. by the end of 2016).
access from their core account providers. It could facilitate easier access for customers to
competitors who might have keener price points and more innovative or user-friendly
functionality. It may also incentivise existing banks to develop and match these innovative
features.
This report recognises the overlaps between the PSD2 requirements and the proposals as set forth in
the Fingleton Report; each of the subgroups has consciously acknowledged any prescriptions already
laid down in the near-final text. However, the two proposals do not overlap fully.
The timelines of the PSD2 proposals and the API proposals do not entirely align. As noted
above, PSD2 is running to a regulatory timetable that does not align fully with the timelines as
proposed by HMT in its March statement.
The scope of the two sets of requirements overlaps in some areas but there are also some
significant differences. PSD2 was conceived primarily with payment initiation services in mind
(write access); the Fingleton proposals are based on the concept of more openness of
customer data, albeit with an acknowledgement of write access. These different requirements
necessarily result in quite different governance and technical approaches.
As a result of the PSD2 requirements, the EBA will be tasked with developing RTS. These RTS will
be legally binding on all PSPs across the EU. They will therefore trump anything done at a national
level. The EBAs remit will cover aspects including (but not limited to):
the Open Banking Working Group has already been in contact with the EBA, which is apprised of the
work taking place. Further liaison between HMT and the EBA is scheduled for 2016.
It is also expected that the output from the Open Banking Working Group will help HMT and the FCA
in shaping the transposition and implementing legislation of PSD2. Again, further liaison on this point
is scheduled for early 2016.
Confrmaton on
availability of funds
PSD2 also includes a new provision (Artcle 65) that will require account-servicing
PSPs to provide a confrmaton (yes/no answer) on the availability of funds, i.e.
whether an amount necessary for the executon of a card-based payment
transacton is available on the payment account of the payer upon request of a
card-based payment instrument issuer, subject to certain conditons being met.
The AS PSP to provide the confrmaton immediately provided that:
The payer has given explicit consent to the PSP to request the
confrmaton.
The payer has initated the card-based payment transacton using a cardbased instrument issued by the PSP.
The PSP authentcates itself towards the AS PSP before each confrmaton request,
and securely communicates with the AS PSP in accordance with the common and
secure open standards of communicaton to be determined in the EBA draf RTS
(which will also apply to PIS and AIS).
It is understood the card-issuing PSP will need to have appropriate authorisaton
(e.g. a licence to issue payment instruments as well as ofer direct debits, credit
transfers with credit line services as per PSD2 Annex 1 services points 4 and 5). As
the PSP would receive the consumer funds, authorisaton for PIS would not be
enough.
Account type
Card-based PIIs could have either a relatonship with the PSU, or with the
merchant, or both.
Payment account: an account held in the name of one or more PSUs which is
used for the executon of payment transactons. Whether an account is deemed
to be a payment account depends on its underlying purpose. The FCA Perimeter
Guidance (PERG) Ch. 15.3 sets out the factors to consider and indicates that such
accounts can include current accounts, e-money accounts, fexible savings
accounts, credit card accounts and current account mortgages.
Conversely, the PERG does not view fxed-term deposit accounts (where there are
restrictons on the ability to make withdrawals), child trust fund deposit accounts
and cash Individual Savings Accounts (ISAs) as payment accounts.
PSD2 introduces the term Account-Servicing PSP (AS PSP), i.e. a PSP providing and
maintaining a payment account for a payer.
Geography and
currency
PSD2 applies on a pan-European basis and, unlike PSD1, will extend many of the
provisions to one-leg transactons and all currencies, not just the euro and other
member state currencies. Solutons will need to work seamlessly within a natonal
community and on a cross-border basis.
All AS PSPs need to be able to interact with any or all PISPs or AISPs on a panEuropean basis if the payment account is accessible online. Accessible online,
while not explicitly defned, is understood to mean the use of all common types of
devices (e.g. computers, tablets and mobile phones).
A number of AS PSPs online banking propositons may have an entrely domestc
(or eurozone only) focus (refectng their existng client base and business model)
and do not enable PSUs to initate cross-border payments in another currency.
This reports view is that AS PSPs can only be required to execute those payment
types that are currently ofered by their existng model. In other words, an AS PSP
should not be forced to ofer e.g. SEPA DD just because of PIS and PSD2.
Governance
Payment service
providers and
authorisaton
PSD2 distnguishes between six categories of PSP: (1) credit insttutons; (2)
electronic money insttutons; (3) post ofce giro insttutons; (4) payment
insttutons; (5) the European Central Bank and natonal central banks when not
actng in their capacity as monetary authority or other public authorites; and (6)
member states or their regional or local authorites when not actng in their
capacity as public authorites.
Undertakings - other than those referred to above as (1), (2), (3), (5) and (6) or
beneftng from a waiver under Artcle 32 or 33 - that intend to provide payment
services are required frst to obtain authorisaton as payment insttutons. A frm
wishing to ofer PIS that was not already an authorised PSP would need to seek
authorisaton as a payment insttuton.
Authorisaton shall only be granted to a legal person established in a member
state.
Artcle 33 defnes the supervisory regime for AISPs that are treated as payment
insttutons, but only subject to some of the PSD2 provisions. If a frm wished to
start ofering AIS and was not already authorised as a PSP, it would need to seek
authorisaton to do so. Recital 48 indicates that AISPs should be allowed to
provide services on a cross-border basis, beneftng from the passportng rules. If
an AISP that was not already an authorised PSP also wished to provide add-on PIS,
it would need to seek authorisaton as a payment insttuton.
Transiton
PSD2 lays down the authorisaton regime for payment insttutons. Artcle 5 deals
with the subject of applicatons for authorisaton. Such applicatons must include,
for example, a security policy document describing measures taken to protect
PSUs from fraud, illegal use of sensitve and personal data. The capital held by
payment insttutons providing PIS shall at no tme be less than EUR 50,000.
According to Artcle 115 of PSD2, member states should allow those who have
provided PIS or AIS before PSD2 enters into force to contnue to do so during the
transitonal period pending transpositon of PSD2 into natonal law and pending
applicaton of the security measures to be defned by the EBA RTS.
PISPs and AISPs can be PSPs (e.g. credit insttutons such as banks) that provide
other regulated payment services and niche players who are specifcally
authorised to carry out PIS or AIS. AS PSPs can ofer PIS and AIS if they wish.
Registraton in the
home member state
EBA Register
The AS PSP must treat payment orders transmited through a PISP without any
discriminaton for other than objectve reasonsin terms of tming, priority or
charges vis--vis payment orders transmited directly by the payer.
The AS PSP cant refuse to execute an authorised payment order irrespectve of
whether the payment order is initated by a payer via a PISP, unless prohibited by
other relevant EU or natonal law.
Provision of PIS or AIS shall not be made dependent on the existence of a
contractual relatonship between the PISP, AISP and AS PSP for that purpose.
Consent
PIS - Artcle 66(2) states that the payer gives explicit consent for a payment to be
executed in accordance with Artcle 64, which allows for consent to be given in a
form agreed between the payer and the PSP and also allows for consent to be
given via the PISP.
Artcle 80(2) states that the payer shall not revoke the payment order afer giving
consent to the PISP to initate the payment transacton.
Artcle 80(5): Afer the tme limits specifed in paras 1 to 4, the payment order
may be revoked only if and in so far as agreed between the PSU and the relevant
PSPs.
AIS - Artcle 67(2) indicates the AISP should provide services only where based on
the PSUs explicit consent and access only the informaton from designated
accounts and associated payment transactons.
Artcle 94(2) states that PSPs shall only access, process and retain personal data
necessary for the provision of their payment services, with the explicit consent of
the PSU.
This report believes the AS PSP needs to be assured on a transactonal basis of the
genuineness of the PSUs consent.
Clarity is required regarding what informaton can be accessed in terms of the
data to be exchanged. The implicaton of Artcle 94(2) is that the extent of the
informaton accessible to third partes is at the PSUs discreton.
Various mandate management issues need consideraton. How can the AS PSP
be assured genuine consent is given by the PSU to initate a payment transacton
if the frst communicaton is received through the PISP? It also needs to be made
clear to the AS PSP what the PSU is consentng to. For example, with the use of an
AISP, what informaton has the PSU consented to be shared and what happens if
consent is subsequently withdrawn or altered? How is the AS PSP informed if the
PSU withdraws consent? Clarity will also be needed on this from a liability context.
Liability/recourse
Professional
indemnity insurance
At present, it remains unclear how the AS PSP will be able to obtain recourse from
the PISP in the absence of any agreed resoluton mechanism. This report considers
it will be necessary for the EBA RTS to provide a communicaton channel for this
purpose as part of the fows of informaton to be exchanged between the AS PSP
and PISP.
Undertakings applying for authorisaton to provide PIS are required to hold
professional indemnity insurance, covering the territories in which they ofer
services, or some other comparable guarantee against liability to ensure that they
can cover their liabilites (Artcle 5). Similar provisions apply in the context of AIS
to cover their liability vis--vis the AS PSP or the PSU resultng from nonauthorised or fraudulent access to or non-authorised or fraudulent use of payment
account informaton.
The EBA will be mandated to issue guidelines on the criteria on how to stpulate
the minimum monetary amount of the professional indemnity insurance or
comparable guarantee. In doing so it is to take account of:
The size of the actvity (for PIS this means the value of the transactons
involved and for AIS the number of clients that make use of the AIS);
PIS
AIS
Type of PSU
Defniton
PIS
PIS can take place in (but is not limited to) the context of an e-commerce scenario
where the PISPs relatonship is with the merchant and interactons with the PSU
may be on a one-of or ad-hoc basis. Recital 27 describes such payment services as
establishing a sofware bridge between the website of the merchant and the
online banking platorm of the payers AS PSP in order to initate internet
payments on the basis of a credit transfer.
It is understood PIS may also be ofered as an add-on service alongside AIS (where
the provider has the necessary authorisaton) e.g. to move funds from one
payment account to another.
PSD2 (Recital 28) describes AIS as providing the PSU with aggregated online
informaton on one or more payment accounts held with one or more other PSPs
and accessed via online interfaces of the AS PSP. The PSU is able to have an overall
view of its fnancial situaton immediately at any given moment. Artcle 67 simply
refers to enabling access to payment account informaton, where the account is
accessible online.
In the context of AIS there would be a direct relatonship between the AISP and
the PSU.
While much of the context given in the PSD2 Recitals appears to be writen from a
consumers perspectve, it is understood there is nothing in the provisions relatng
to PIS and AIS that would prevent such services being ofered to all types of PSU,
businesses as well as consumers.
Data
Sensitve payment data Artcle 4(32) data, including personalised security
credentals that can be used to carry out fraud. For the actvites of PISPs and
AISPs, the name of the account owner and the account number do not consttute
sensitve payment data.
The PISP shall:
ensure that any other informaton about the PSU, obtained when
providing PIS, is only provided to the payee and only with the PSUs
explicit consent;
not use, access or store any data for the purposes other than for the
provision of PIS as explicitly requested by the payer;
not modify the amount, the payee or other feature of the transacton.
Artcle 47 requires the PISP to make available to the payers AS PSP the reference
of the payment transacton.
The AS PSP shall:
AIS
Defnitons
Authentcaton Artcle 4(29) a procedure that allows the PSP to verify the
identty of a PSU or the validity of the use of a specifc payment instrument,
including the use of the users personalised security credentals.
Strong customer authentcaton Artcle 4(30) an authentcaton based on the use
of two or more elements categorised as knowledge (something only the user
knows), possession (something only the user possesses) and inherence
(something the user is) that are independent, in that the breach of one does not
compromise the reliability of the others, and is designed in such a way as to
protect the confdentality of the authentcaton data.
Personalised security credentals Artcle 4(31) personalised features provided by
the PSP to a PSU for the purposes of authentcaton.
Sensitve payment data Artcle 4(32) data, including personalised security
credentals that can be used to carry out fraud. For the actvites of PISPs and
AISPs, the name of the account owner and the account number do not consttute
sensitve payment data.
Personalised security
credentals
There are ambiguites and seeming contradictons in the PSD2 text as to whether
the PSUs personalised security credentals can be shared directly with the PISP or
AISP or not.
Artcle 97(3) - in reference to situatons where the payer accesses his account
online, initates an electronic payment transacton or carries out any acton,
through a remote channel, which may imply a risk of payment fraud or other
abuse - refers to PSPs having in place adequate security requirements to protect
the confdentality and integrity of the PSUs personalised security credentals
while Artcle 66(3b) and Artcle 67(2b) oblige the PISP and AISP to ensure that the
personalised security credentals of the PSU are not, with the excepton of the user
and the issuer of the personalised security credentals, accessible to other
partes.
While Artcle 69 requires the PSU to take all reasonable steps to keep its
personalised security credentals safe, Recital 69 states that terms and conditons
or other obligatons imposed by PSPs on PSUs in relaton to keeping personalised
security credentals safe should not be drafed in a way that prevents PSUs from
taking advantage of services ofered by other PSPs, including PIS and AIS.
Clarity is needed from the Commission during transpositon as to whether the
intenton is to provide access to informaton and communicaton to initate a
payment rather than access to the payment account itself.
It is unclear if the intenton is that AS PSPs will be required to develop and issue
new sets of personalised security credentals to all PSUs which will come at a
signifcant cost that can, somehow, be made invisible when used with PISPs and
AISPs.
Authentcaton
EBA RTS
EBA Register
EBA RTS
Ensure an appropriate level of security for PSUs and PSPs through the
adopton of efectve and risk-based requirements;
communicaton should:
allow for the provision of online payment services and should ensure
the interoperability of diferent technological communicaton solutons.
ensure that PISPs and AISPs communicate with the AS PSP and with
customers involved in a secure manner.
In developing those requirements, EBA should pay partcular atenton to the
fact that the standards to be applied are to allow for the use of all common types
of devices (such as computers, tablets and mobile phones) for carrying out
diferent payment services. It should also take into account the privacy
dimension, in order to identfy the risks associated with each of the technical
optons available and the remedies that could be put in place to minimise threats
to data protecton.
It is understood that the EBA will issue a discussion paper once the fnal PSD2 text
is published in the Ofcial Journal of the EU (January 2016?) to check whether it
has identfed all of the key issues. A formal public consultaton on the draf RTS
will subsequently be undertaken, probably a few months later. Feedback will be
used to fnalise the draf RTS before submission to the European Commission for
adopton by January 2017(?). EBA has indicated it will be considering the current
guidelines on the security of internet payments when developing the RTS and the
extent to which they are aligned with PSD2, need to change or be adapted to
refect evolving market conditons.
The EBA has explained the diference between guidelines and RTS, which this
report understands to be as follows:
EBA can only issue RTS if given an explicit mandate. Once RTS are adopted by the
EC (and published in the Ofcial Journal) they become EU law and must be
complied with. Member states and natonal authorites do not need to issue
secondary legislaton.
EBA does not need a mandate to issue guidelines, which should be reviewed afer
two years; guidelines are not directly applicable in EU law. Natonal authorites are
expected to integrate into their natonal supervisory regimes and take acton. In
cases of non-compliance this should be reported to the EBA. However, natonal
authorites also have the opton not to comply, e.g. the guidelines on the security
of internet payments where the UK, Estonia and Slovakia have not complied as
the natonal authorites lacked the legal power to do so.
Guidelines are addressed to frms. However, if a natonal authority decided not (or
was unable) to implement the guidelines it is unlikely that the EBA would pursue a
specifc frm for breach of EU law (although it has the power to do so). However,
there is an obligaton on frms to make their best eforts to comply. If a third party
launched a legal challenge against a frm for non-compliance, legal interpretaton
of the extent of compliance would be for the court or ombudsman to determine.
Firms need to be able to explain the reasoning behind why the guidelines have
been followed or why they have not.
2. Developments in the UK
There are a wide variety of activities underway in the market, both in the UK and internationally. It is
not possible to provide an exhaustive list here. However, these are some of the more relevant ones in
the UK when considering the OBWG API Framework.
25
Within the banking infrastructure, electronic/digital ID for business use, e.g. authentcaton and digitally signing
transactons, is more common. Many UK and US banks partcipate in the IdenTrust Framework, which provides a global
common identty standard that provides non-repudiable, legally enforceable, contractually bound digital signatures that
are interoperable across geographies, companies and applicatons.
26
Eurosmart: The Future Digital Identty Landscape. A country with good penetraton of digital identty is Estonia, which
ofers e-Residency a transnatonal digital identty available to anyone in the world interested in administering a locatonindependent business online. e-Residency additonally enables secure and convenient digital services that facilitate
credibility and trust online. Note, however, that the Estonian system also relies on use of a smartcard and, for example, to
establish an Estonian bank account currently requires an in-person meetng at the bank.
called GOV.UK Verify.27 It allows citizens to prove they are who they say they are (to a level of
confidence) when they sign in to government services that require an online identity authentication.
Users of the online government services (i.e. UK citizens) need to register themselves via an identity
provider (IDP),28 which is a private sector organisation certified against government standards (as
defined in the Good Practice Guides). The IDP will perform checks to confirm the users identity, issue
a credential and then assert that identity to the government department via GOV.UK Verify. The
service has been running in beta alongside government department services since October 2014 and
aims to become the default way for people to access government digital services by April 2016.
GDS has been engaging widely with industry about the development of GOV.UK Verify. It is clear that
for the government and its citizens there would be benefit in wider use of the services offered by
IDPs. At present this remains a decision for individual firms and the programme would need to align
with their own market strategy and risk appetite. GDS is also exploring whether the trust framework
created through the Good Practice Guides could be extended into the private sector (an early adopter
may be the TISA Digital ID project: see below). This work is ongoing but it would clearly be valuable
to monitor it in the next phase of this work.
2.2 The Tax Incentivised Savings Association (TISA) digital ID for consumers
of UK financial services
In February 2015, TISA launched The Savings and Investments Policy Project (TSIP), a coalition of
more than 50 companies and trade bodies, which published a report for the government entitled
Saving our Financial Future. The report sought to promote greater levels of saving among UK
consumers and made a number of recommendations, including one on the creation of a digital ID. It
identified that one of the barriers to customers switching or changing financial services providers was
the difficulty associated with onboarding because of a lack of an ability to assert a digital identity.
Consequently, TISA established a digital ID project to take forward the work. The TISA project
proposes the potential reuse of some of the GOV.UK Verify framework.
If both projects above proceed as planned, it is likely that within the next few years citizens and
financial services customers will have become more accustomed to obtaining and using digital
identities.
27
See htps://identtyassurance.blog.gov.uk/
28 Current IDPs include the Post Ofce, Experian, Digidentty and Verizon, Barclays, GB Group, Morpho, PayPal and Royal
Mail.
29
A trust framework is a certfcaton program that enables a party that accepts a digital ID credental (called the relying
party) to trust the identty, security and privacy policies of the party that issues the credental (called the identty service
provider) and vice versa.
customers, such as ease of access to services, in that they are issued just one electronic ID to access
a range of services. However, there are downsides as well, such as the risks inherent if the users
credentials are breached.
This report recommends that organisations (e.g. ASPs and 3PPs) should own and control the method
by which they authenticate their own users. This means (at least for the short to medium term) that it
should remain a commercial decision whether an organisation chooses to take advantage of a digital
identity mechanism to authenticate its users. However, the market is likely to be driven by customer
demand, and if demand for using ubiquitous digital identities is present then this may lead to changes
to current authentication processes, e.g. if customers show preference for using a single set of
credentials across numerous providers.
At this stage the OBWG API Framework has not been designed to rely on digital identities. However,
if the use of a digital ID model(s) were to grow then the authentication processes as described in this
report should be able to accommodate this.
30
See the paper published by OIX: The use of bank data for identty verifcaton, htp://www.oixuk.org/wp-
content/uploads/2015/08/THE-USE-OF-BANK-DATA-FOR-IDENTITY-VERIFICATION-OIX-White-Paper-FINAL-August-2015.pdf
Impact/comment
CHANGE: If the EP text prevails, rather than requiring data collected
not to be excessive (current DPA requirement), the requirement would
instead be to ensure that only the minimum necessary for the
intended purposes is processed.
IMPACT: Data attribute providers and 3PPs will need to have refined
and clear data-processing purposes in order to ensure that only the
minimum is shared, and the API framework will need to allow for a
minimum of unnecessary data-sharing in each instance.
Profiling and
information to be
provided to the data
subject (Article 20)
CHANGE:
IMPACT: The range of use cases that could be provided through the
open data initiative could be curtailed.
CHANGE: Although the details vary between the two texts, broadly the
data subject has the right to receive their personal data (where they
have provided it to the controller) and transfer it to another controller.
There is an exemption to protect IP rights under the Council text.
IMPACT: The API framework could form an efficient means of meeting
this obligation, both for data attribute providers and 3PPs.
Data protection by
design and by default
(Article 23)
CHANGE: Controllers will need to notify the ICO and data subjects in
the event of a data breach. The minimum severity threshold for these
two types of notification, and the timeframes for compliance, are yet to
be finalised. Under Article 26, processors must assist controllers to
comply with this requirement.
IMPACT: For processors, they must ensure that they have systems in
place to notify the controller of data breaches. For controllers, in the
event of a data breach at a 3PP that crosses the severity threshold,
the 3PP will need to notify the affected data subject(s). This does
appear to overlap with requirements proposed under PSD2 and further
work will be required to understand how the two regimes will work
together.
Codes of conduct
(Article 38)
CHANGE: Contrary to the DPA, the GDPR does not require data
controllers to register with the ICO.
Banks that have committed to deliver midata downloads will provide personal current account
customers, registered for online banking, with their own current account transaction data, on
demand, in electronic format, by 31 March 2015.
This data will be available for customers to access and download, anonymised as appropriate
and provided in a format that is consistent with this agreed industry standard.
Downloads include 12 months of transaction history, transaction type, descriptor field and amounts.
Midata files could theoretically be used for many purposes but the focus of the initiative was on PCA
comparison. The content and design were agreed with this purpose in mind through a working group
of participating banks, PCWs and government observers.
either the payer or payee. Fraudulent websites could seek to take advantage of this, as could hackers
gaining access to poorly secured (but legitimate) websites that store customer data.
Data protection issues
The DPA sets rules to protect the privacy and data of individuals. These rules were highly relevant to
the midata initiative, as midata files could contain personal data, including potentially sensitive
personal data. Transaction histories in midata files can often include the personal data of third parties.
This is particularly the case for standing orders and other transfers to friends and family, which will
frequently have that persons name in the descriptor line and may also include account numbers.
A more detailed explanation of data protection issues is contained in the Chapter 8: Regulatory and
Legal Considerations.
Trust
It is important that consumers have faith in the process. This requires effective protection of their data,
transparency and also reasonable standards of accuracy in comparison calculations.
Technical
Transactional data is not structured the same way in each bank. This has an impact on third parties
ability to analyse files, which will look different for each bank, despite the standardised content and
format. For example, transaction codes vary between banks as do the entries in the descriptor field,
even for identical transactions. These differences in the information in descriptor lines for transactions
also mean that data protection and fraud risks are potentially different for different banks.
There are also technical limitations to banks ability to redact data. Redacting numbers in certain fields
is feasible, as is redacting certain fields entirely. But more complex approaches, such as
distinguishing between the names of individuals versus companies, is not technically possible.
Oversight
Although midata files were designed with current account comparisons as the primary purpose,
consumers could theoretically upload a file to any site that requests it. There is no control over what
customers do with their files and offering midata services is not a regulated activity, so there is no
licensing framework (although FCA licensing would be needed for websites providing a credit-broking
service).
The DPA and other laws still apply, but the absence of supervision or licensing does increase risks to
consumers.
4. Mitigations
The midata working group sought the advice of the ICO and a privacy impact assessment was
conducted. There were extensive discussions of the data necessary for comparisons to occur, the
fraud and data protection compliance risks, and the technical limitations faced by banks seeking to
redact unnecessary or sensitive data.
Ultimately, a range of measures were agreed to address the issues above:
(Imperfect) anonymity midata files do not directly include the consumers name or account
number, although it was recognised that a PCW could easily request the consumers name at
the time of upload.
Redactions the consumers name or account number (or those of silent third parties) would
sometimes appear in certain transactions descriptor fields. Therefore, redactions were
agreed to minimise the chance of this occurring:
o Transaction types identified as being less relevant to account comparison and more
likely to contain third parties data were subject to standardised redactions, in line with
the DPA requirement for data processing not to be excessive.
ATM transactions, debit card/point of sale transactions, direct debits (because of their
relevance to account provider rewards), and fees, charges and interest. These
transaction types are subject to little or no redaction.
o This was done on the basis of transaction codes, although these vary between banks,
creating a possibility of slightly different application in practice.
o The most recent months data is excluded from the file, as this is more commonly
used in banks identification and verification (ID&V) processes.
Transparency disclosures by the bank and the websites, describing the process, risks, the
data in the files and how this would be used.
Code of conduct a voluntary industry code of conduct was prepared by participating banks,
certain participating PCWs, and in consultation with the government in order to clarify best
practice.
Purpose although midata files could in theory be uploaded anywhere, they were designed
particularly for analysis of account usage and the recommendation of account options. The
Open Banking API initiative is much broader of purpose, as indicated in the range of use
cases in this report.
Scope of data midata files content is standardised to include specific data points.
Therefore, third parties receiving uploads see all of this data, irrespective of the service (or
purported service) to be provided to the customer. Under the Open Banking initiative, a wide
range of data points would be within scope, but different third-party service providers would
be able to tailor the data requested to fit the service they provide.
Data delivery method midata provides the customer with a standard file, which the customer
can then do with as desired. This creates a risk that the customer would supply it to third
parties that are not transparent about how they would use the data (e.g. mining it for insights
into the consumers behaviour in order to target marketing material, or selling it on without
disclosing this properly to the consumer), or even to fraudulent sites seeking to acquire
customer data to impersonate that customer and gain access to their bank account. Under
the Open Banking initiative there is greater scope for control of who receives the customers
data via a vetting of 3PPs.
For a more detailed explanation of the midata initiative, the code of conduct and the content of midata
files, see http://www.pcamidata.co.uk.
Req.
ref
Data class
Schema
Attribute L1
R001
Open data
R002
Open data
Provider
name
Branch(s)
R003
Open data
Location
R004
Open data
Address
R005
Open data
Hours
R006
Open data
Facilities
R007
Open data
Services
R008
Open data
R009
Open data
Type
R010
Open data
Contact
R011
Open data
Purpose
R012
Open data
Note
R013
Open data
R014
Open data
Location
R015
Open data
Address
R016
Open data
Services
R017
Open data
Status
R018
Open data
R019
Open data
Type
R020
Open data
URL
R021
Open data
Requirements
R022
Open data
Note
R023
Open data
Contact(s)
ATM(s)
Digital
service(s)
Product(s)
Attribute L2
Attribute L3
R024
Open data
Type
R025
Open data
Description
R026
Open data
Benefits
R027
Open data
Charges
R028
Open data
Demographic
R029
Open data
Accept rate
R030
Open data
Legacy
R031
Open data
Eligibility
R032
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
R033
R034
R035
R036
R037
R038
R039
R040
R041
R042
R043
R044
R045
Account
holder
Account
holder DOB
Account
holder
address
Account
holder
contact(s)
Type
Contact
Account(s)
Account name
Account type
Activity
available from
Account
number
Sort code
IBAN
Balance
R046
R061
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Proprietary data
R062
Proprietary data
R063
Proprietary data
R064
Proprietary data
R065
Proprietary data
R066
Proprietary data
R047
R048
R049
R050
R051
R052
R053
R054
R055
R056
R057
R058
R059
R060
Statement
from
Statement to
Opening
balance
Closing
balance
Debit system
Card type
ATM limit
Manage via
Branch
Online
Post
Post office
Telephone
Text alerts
Smartphone
Interest
payment
frequency
Interest
payment
method
Interest rate
type
Representativ
e example
Benefit(s)
Type
R067
Proprietary data
Note
R068
Proprietary data
R069
Proprietary data
Age min
R070
Proprietary data
R071
Proprietary data
Business only
R072
Proprietary data
R073
Proprietary data
R074
Proprietary data
Visa holders
allowed
Northern Ireland
only
Islamic law
R075
Proprietary data
Students only
R076
Proprietary data
R077
Proprietary data
Upgrading
customers only
Fundings
R078
Proprietary data
Financial income
R079
Proprietary data
Residency
R080
Proprietary data
R081
Proprietary data
Type
R082
Proprietary data
Frequency
R083
Proprietary data
Amount
R084
Proprietary data
Tier lower
R085
Proprietary data
Tier higher
R086
Proprietary data
R087
Proprietary data
R088
Proprietary data
R089
Proprietary data
R090
Proprietary data
R091
Proprietary data
Applies to
R092
Proprietary data
R093
Proprietary data
R094
Proprietary data
R095
Proprietary data
R096
Proprietary data
R097
Proprietary data
Eligibility
Fee(s)
Fee cap(s)
Rate(s)
Annual interest
AER
Annual interest
EAR
Annual interest
percentage type
Annual interest
yearly
Applies to
R098
Proprietary data
Frequency
R099
Proprietary data
Period lower
R100
Proprietary data
Period upper
R101
Proprietary data
Tier lower
R102
Proprietary data
Tier upper
R103
Proprietary data
R104
Proprietary data
Transferred
accounts only
Type
R105
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
R106
R107
R108
R109
R110
R111
R112
R113
R114
R115
R116
R117
R118
R119
Overdraft
Buffer(s)
Type
Applies to
Amount
Note
Repayment
Minimum
payment required
Minimum
payment due
Charge(s)
Statement of
arrears?
Transaction(s)
Transaction ID
Posted date
Transaction date
Amount
R120
R121
R122
R123
R124
R125
R126
R127
R128
R129
R130
R131
R132
R133
R134
R135
R136
R137
R138
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Description
Credit/debit
Currency
Type
Is recurring
Recurring
frequency
Merchant
Merchant ID
Merchant
category code
Merchant
category code
name
Merchant name
Merchant
location
Market segment
code
Transaction auth
date
Transaction auth
time
Authorisation
time of
transaction
Approval/denial
reason code
Approval denial
reason type
Cash back flag
R139
R140
R141
R142
R143
R143
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer facing
data
Non-public
customer related
data
Non-public
customer related
data
Non-public
customer related
data
System
transaction code
Cardholder ID
method
POS entry mode
Maintainer
Created date
Last updated
Impact
Mitigation examples
fraud
prevention
Adopt measures to detect infection
and deny API access to infected
devices
Develop a visible kitemark scheme
to give users confidence that apps
and software are accredited (can
be spoofed)
Provide a lookup service so users
can independently check approved
3PPs
Use of mutual authentication
techniques to show the user they
are interacting with legitimate
software (e.g. show personalised
attributes such as a picture
provided by the user)
OOB authentication/authorisation
challenges for high-risk actions
(e.g. making payments)
Behavioural monitoring
Security standards to protect
fraud
fraud
patterns
Behavioural monitoring
Impact
Mitigation examples
User education
intended
takeover
do not place an
undue/unreasonable burden on
3PPs
Adopt standardised vetting
processes and certification that
allow financial institutions to remain
aligned with FCA recommendations
Adopt a tiered approach to security
vetting that aligns the level of
vetting with the risk associated with
the permissions the 3PP wishes to
be able to obtain
as intermediaries or platforms
been vetted
fraud
take-up
phishing
Require OOB verification of high-
fraud
ASPs
customers to authenticate a
take-up
the source
Avoid storing data on EUDs where
data
take-up
Risk
ASP RISKS
Impact
systems
presence of 3PPs as an
back to ASPs
measures.
fraud
engineering attacks
Risk
Impact
password resets
Mitigation examples
ECOSYSTEM RISKS
Lack of public confidence in
Standard
take-up
When users data is stored in multiple
Standard
Define common security standards
fraud
When users data is stored in multiple
breach
straightforward
information-sharing)
breaches
assignment of responsibility/liability
reliably assigned
Organisations that wish to become
fraud
take-up
Users may wish to opt out of allowing
individuals to have
http://www.pulsetoday.co.uk/your-
practice/practice-topics/it/nhs-
overriding-700000-patient-opt-outs-to-
engineering
gp-data-beingshared/20009761.fullarticle
risk assessment
ID&V processes
Cons
Concerns mixed-resource
server and authorisation server,
also request signing
OAuth 2.0
OpenID is on track to be an
accredited IETF standard
1. Discovery
Table A7.1 Discovery
From
Government,
Independent
Data
regulators,
authority
providers
industry
bodies and
other relevant
To
third parties
Government,
A central standards
regulators,
industry
bodies other
relevant, up to date
relevant third
and complete
parties
information relating to
the operation of the
overall ecosystem
and the related
participants and
bodies
Relevant content for
inclusion on
government/regulator
s websites and other
third-party websites
3PPs
Customers
Independent
Relevant
Relevant
Relevant
authority
content, as
content, as
content, as
requested, for
requested, for
requested, for
inclusion on the
inclusion on
inclusion on
central
the central
the central
standards
standards
standards
website
website
website
Up to date,
relevant and
accurate
content on their
own website(s)
about the
standards and
the ecosystem
including a link
to the central
standards
website.
Content will be
defined
by/agreed with
the independent
authority and
hence
consistent with
other details
shown
elsewhere
Data
A central standards
providers
3PPs
A central standards
website from which
3PPs and their
customers can
access relevant, up to
date and complete
information relating to
the operation of the
overall ecosystem
and the related
participants and
bodies
Relevant content for
inclusion on 3PPs
own websites
Clarity about the
process that will apply
to ensuring that
content is provided
where relevant by
3PPs and that the
content is up to date,
Customers
A central standards
Up to date,
Up to date,
website that
relevant and
relevant and
customers can
accurate
accurate
content on
content on
a link from
their own
their own
government,
website(s)
website(s)
regulators, data
about the
about the
providers or 3PPs
standards and
standards and
the ecosystem
the ecosystem
contain relevant, up
including a link
including a
to the central
link to the
information relating to
standards
central
website.
standards
overall ecosystem
Content will be
website.
defined
Content will
participants and
by/agreed with
be defined
bodies
the
by/agreed with
independent
the
authority and
independent
hence
authority and
consistent with
hence
other details
consistent
shown
with other
elsewhere
details shown
Process of ensuring
that information is
provided by data
providers and 3PPs
where required and
that the content is up
to date, relevant and
accurate
elsewhere
2. Initial engagement
At the initial engagement stage, data providers will be able to obtain additional information and
support that would include, for example, access to:
details about the overall operation of the ecosystem, the role of the independent authority and
the role and composition of the other related bodies and other participants;
the technical details of the open data and open API standards;
details of the role of the independent authority and to whom it is ultimately responsible;
details of the sanctions that will apply for non-conformance to the standards and other
SLAS/obligations (including existing regulatory provisions);
o how do the standards and ecosystem overlap with or align with PSD2?
o where does the consumer see liability falling?
o how do banks ensure that data is secure?
o how does the independent authority ensure that the 3PP has accreditation status in
real or near real time?
o are the standards secure enough (particularly if they are below what is already in
place)?
o what is the benchmark standard? Has it been defined and how can it be divided up
for products of single products, rather than applied as it would be applied to a bank
with its full panoply of products, e.g. Squirrel?
o how or will requests for new open data from 3PPs be processed?
o could an open data standard restrict innovation?
o what service levels will apply regarding the provision of open data?
o how will we handle the increased customer and 3PPs queries regarding open data?
o how will we know who has accessed our open data if the access is not directly
through my portal?
a helpline number, contact details, email address and phone numbers for further questions.
For 3PPs, this additional information and support will include, for example, access to:
details about the overall operation of the ecosystem, the role of the independent authority and
the role and composition of the other related bodies and other participants;
the technical details of the open data and open API standards;
details of the role of the independent authority and to whom it is ultimately responsible;
details of the sanctions that will apply for non-conformance to the standards and other
SLAs/obligations (including existing regulatory provisions);
details about the criteria, process and costs applicable to participation including organisation
accreditation and solution vetting;
details about access to and use of the central and data providers sandboxes;
details about the SLAs applicable to the accreditation and vetting processes;
a comprehensive set of FAQs covering questions of particular importance to 3PPs such as:
o what happens if a 3PP is not or cannot get accredited, e.g. can they (still) use APIs to
access data on behalf of customers?
o how do I get access to sandbox environments will be there one sandbox, or many?
a helpline number, contact details email address and phone numbers for further questions.
For customers, this additional information and support will include, for example, access to:
details of the type of solution and services that are available and from whom;
how they can identify vetted 3PPs and accredited solutions/services (whitelist/kitemark
details);
o how do I understand what benefit solutions developed by 3PPs will provide to me/my
business, e.g. comparing different products, more informed decisions/choice?
o if my data provider does not enable me to gain access to my data in order to use an
approved 3PP, to whom do I go?
accreditation and vetting submissions from 3PPs ensuring that these are handled quickly
and effectively and that any third parties engaged in the process, e.g. access organisations,
standards bodies, perform their role in accordance with defined SLAs;
Government,
Independent
Data
regulators,
authority
providers
industry
To
bodies and
other relevant
third parties
3PPs
Customers
Government,
APIs
Solutions/service
regulators,
independent authority
delivered in
s delivered in
industry
accordance
accordance with
with the
the standards
bodies and
other
relevant
third parties
standards
and the
defined SLAs
Independent
Mandate to
APIs
Solutions/service
authority
operate
developed,
s developed,
tested and
tested and
delivered in
delivered in
accordance
accordance with
with the
the standards
standards
and the
SLAs
Funding?
defined SLAs
Contact for
Contact for
queries arising
queries
arising
Data
providers
As above, plus:
Solutions/service
s delivered in
A comprehensive set
accordance with
of FAQs covering
the standards
questions of
particular importance
SLAs
to data providers
Helpdesk
access/clear
point of contact
for queries
arising
3PPs
As above, plus:
A comprehensive set
of FAQs covering
questions of
particular importance
to 3PPs
APIs
developed
and tested in
accordance
with the
standards
and the
defined SLAs
API access
delivered in
accordance
with the
standards
and the
defined SLAs
Helpdesk
access/clear
point of
contact for
queries
arising
Customers
Additional relevant
APIs
Solutions/service
information on the
delivered in
s delivered in
central website
accordance
accordance with
including:
with the
the standards
standards
and the
SLAs
defined SLAs
Clear advice
guidance in
and guidance
relation to how
in relation to
transfer of
data to 3PPs
line with
independent
independent
authority
authority
guidelines)
guidelines)
Helpdesk
Helpdesk
access for
access/clear
queries
point of contact
arising
for queries
arising
3. Active engagement
For data providers, this includes but is not limited to:
providing 3PPs with timely and effective responses to legitimate API calls;
the presentation of clear, fair and transparent terms and conditions to the customer.
reading and accepting the terms and conditions presented by the 3PP for the
service/solutions being provided;
where relevant, providing their consent to the transfer (either one-off or ongoing) of their data
from the data provider to the 3PP;
Government,
Independent
regulators, industry
authority
Data providers
3PPs
Enforce security
standards
Point of contact
Store data security
once shared
Inform data
breaches
Enforce SLAs
Point of contact
Enforce security
Quality of data
standards
provided through
Sandbox
Dispute resolution
API
Security, reliability
and scalability of API
Open, nondiscriminatory
access
Inform data
breaches
Customers
Clearly written
guidance
Provision of secure
API in accordance
with standard and
consent
Visibility of consents
and ability to retract
case of issues
Point of contact in
case of issues
4. Issue resolution
Table A7.4 Resolution
From
Government,
Independent
regulators, industry
authority
Data providers
3PPs
Government,
regulators,
industry
bodies and
other relevant
third parties
Independent
authority
Data providers
Point of contact in
escalation
case of issues
Dispute resolution
3PPs
Point of contact
escalation
in case of issues
Dispute resolution
Deny access
Customers
Point of contact
Point of contact in
escalation
in case of issues
case of issues
Dispute resolution
W3C standards
Most W3C work revolves around the standardisation of Web technologies. To accomplish this work,
W3C follows processes that promote the development of high-quality standards based on the
consensus of the community. W3C processes promote fairness, responsiveness and progress: all
facets of the W3C mission.
The W3C technical report development process is the set of steps and requirements followed by W3C
working groups to standardise Web technology. Through this process, W3C seeks to maximise
consensus about the content of a technical report, to ensure high technical and editorial quality, to
promote consistency among specifications and to earn endorsement by W3C and the broader
community.
31
see htps://www.iso20022.org/intellectual_property_rights.page)
32
www.iso.org/directves
o Instructions: https://github.com/OpenBankProject/OBP-API/wiki/Sandbox
o Download: https://hub.docker.com/r/openbankproject/obp-full/
o Fork: https://github.com/OpenBankProject/OBP-Docker
1. Allowing existing bank customers to remote control their own data, accounts and use-related
banking services;
2. Enabling third-party service providers (3PPs) to offer all kind of services (apps) to the bank
customers, including access to customer and account data if the account holder gives their
consent (technically based on OAuth2);
3. All current and future front-end development (mobile, Web, back office, branch terminals, etc)
for Fidor Bank and all white label banking customers (no-stack banking) use the very same
APIs.
For API discovering, testing and debugging, Fidor offers publicly accessible documentation
(http://docs.fidor.de/ and https://developer.fidor.de/api-browser/), a developer community forum
(https://developer.fidor.de/) and an application management environment with starter kits and
sandbox (https://apm.fidor.de/). Depending of the type of application and scope of API usage, existing
bank customers may even self-approve their application in order to switch to production systems.
GitHub resources:
Documentation: https://github.com/fidor/api-docs
33
See htp://www.hbci-zka.de/english
the technological tools they would need to create apps that either fulfil the wishlist or are based on
ideas they've dreamed up themselves.
The financial application marketplace has proven to be something of a showpiece for what can
happen when the banking industry works with third parties on technology advancements.
The CAStore uses an open API, in which technology is shared freely with outside developers so that it
can be integrated into new programs, without compromising compatibility. 34
One example of a solution developed using the Credit Agricole API is the Whats-ThatLine app
developed by FinTech company Wassa. The app lets customers mark bank transactions that they
have questions about and allows them to share the information with their financial advisers or any
other contact they choose. The sharing application focuses on a very specific need that Wassa
identified some customers have. The main rationale was to create a simple mobile solution for people
who don't always need huge dashboards full of numbers when checking their account, but just want to
check if everything is fine with their account.35
34
See htps://www.creditagricolestore.fr/castore-data-provider/docs/V1/index.html
35 See htp://www.americanbanker.com/magazine/123_8/open-api-for-bank-apps-can-credit-agricoles-model-work1060535-1.html
Glossary
3rd Party App (3PApp): A software application provided by a 3PAP.
3rd Party App Provider (3PAP): Provides a software application that runs on the users device (e.g.
smartphone or PC) and makes use of the API (client-side) to access user data but does not process
or store it anywhere other than on the users device.
3rd Party Provider (3PP): A counterparty making API requests, with the end intention of providing a
product or service to a user (as defined above). These counterparties can be both FinTechs and
existing banks and financial service providers. Either a 3PAP or a 3PSP.
3rd Party Service Provider (3PSP): Provides a service (and, optionally, a software application to
interact with that service) that makes use of the API (client-side) to access user data, and processes
(and, optionally, stores) it on the 3PSPs servers. e.g. mint.com.
Access token: An access token contains the security credentials for a login session and identifies the
user, the user's groups, the user's privileges and, in some cases, a particular application.
Account-Servicing Provider (ASP): A current provider of financial services (e.g. banks) that
manages existing customer accounts and retains and hosts customer data that could be made
available upon consent through APIs; and therefore in the context of OBWG - will likely act as a data
attribute provider.
Aggregated data: Sets of averaged or aggregated data across transactions, balances or other data.
No individual customer data discernible (at least in principle - see Chapter 9, Regulatory and Legal).
Examples include: average number of cash withdrawals per month across a group of customers.
API: Application programming interface. It is a means of accessing data based on a standard. The
data accessed via an API may be closed, shared or open data.
APX: API developer experience.
Authentication: The process by which one party proves their identity to another.
Authorisation: The process of granting permissions to another party to carry out certain activities
(NB: Not FCA-style authorisation).
Big data: A vendor-driven term often used to describe large quantities of rapidly changing data being
collected from various sources.
Closed data: Data that can only be accessed by its subject, owner or holder.
Customer-facing data (non-public): Data and attributes about account use for an individual data
subjects account
Customer-related data (non-public): Data about a data subject not directly related to the use of an
account. Examples include data relating to a customer derived from KYC/KYB processes, AML
checks or credit score checks.
Data attribute provider: The counterparty who is responding to an API request for information, or
who is publishing a set of Open Data to the market. These will include ASPs.
Data subject: The personal or commercial party who is the subject of the data.
banks, and to provide for a level playing field by harmonising consumer protection and the rights and
obligations for payment service providers and users. PSD2 is in progress.
Permissions: Rules that grant access to data (e.g. an account balance) or functions (e.g. the ability
to instruct a payment).
Personal data: Data from which a person can be identified (as per UK Data Protection Act definition).
Note: personal data can be closed, shared with specific people or organisations, or made public.
Proprietary data: Sensitive data including documents, strategy, price-setting, policies and algorithms
that are not in scope for the OBWG. At a data subject level, this may include data about overall
customer portfolio performance or bank profitability that reveals proprietary or competitive insight
about a players performance, e.g. the average credit score across a customer population, average
margin.
Public access: Data that is available to anyone but not under terms and conditions that are open.
Usage may be restricted by either the terms and conditions, or the licence, e.g. data may only be
used for non-commercial purposes, data may not be adapted etc.
RAND: Reasonable and non-discriminatory terms. There is currently no universally agreed definition.
Read access: Permission that is granted to a counterparty/counterparties enabling them to read but
not modify a file, set of files, set of data.
REST (REpresentational State Transfer): REST is a lighter-weight alternative to SOAP that
describes the architectural style of the Web. So-called RESTful APIs follow REST style and use URIs
to address resources, HTTP methods and headers for actions, and representations for transferring
state.
Roles: Collections of permissions.
Service level agreement: A service level agreement (SLA) is a contract between a service provider
(either internal or external) and the end-user that defines the level of service expected from the
service provider. SLAs are output-based in that their purpose is specifically to define what the
customer will receive.
Shared data: Data that is shared specifically with named individuals and organisations, specifically
with groups that satisfy certain criteria, or anyone else, but under terms and conditions that are not
open. Named access, group-based access, and public access are three types of shared data.
SOAP (Simple Object Access Protocol): A popular and standardised RPC protocol originally
developed by Microsoft as a replacement for older technologies that werent optimised for the internet.
SOAP is based on XML, which works better over the internet than older RPC protocols that used
binary messaging.
Two-factor authentication (2FA): Two-factor authentication (also known as 2FA or 2-Step
Verification) is a technology that provides identification of users by means of the combination of two
different components. These components may be something that the user knows, something that the
user possesses or something that is inseparable from the user. For example, to withdraw money from
a cash machine, only the correct combination of a bank card (something that the user possesses) and
a PIN (personal identification number, something that the user knows) allows the transaction to be
carried out.
User: A user of (and/or account holder of) commercial products or services offered through digital
channels. For the purposes of this report these will primarily relate to financial services propositions.
Vishing: Voice phishing (vishing) is the criminal practice of using social engineering over the
telephone to gain access to private personal and financial information from the public for the purpose
of financial reward. Vishing is typically used to steal credit card numbers or other information used in
identity theft schemes from individuals.
Write access: Permission that is granted to a counterparty/counterparties to modify or execute a file,
set of files, set of data. In the context of work conducted by the OBWG, write access includes
payment initiation.
Acknowledgements
Editor
Louise Bolotin
Secretariat
Rhiannon Butterfield (Payments UK), Daniel Cichocki (BBA), Irene Graham (Scale-up Institute
(current); BBA (former)), Sameer Gulati (Innovate Finance), Matthew Herbert (BBA), Henry Kuang
(EY), Walter McCahon (BBA), Dan Morgan (Innovate Finance).
Sub-group: Governance
Chairs: Fedelma Good (Barclays), John Midgley (Intuit)
Louise Beaumont (GLI Finance), Adrian Black (Contego), Mark Bradbury (Apply Financial), Claire
Calmejane (Lloyds Banking Group), Serge Eaton (HSBC), Jan Heinsbroek (SWIFT), Louise Johnston
(Tesco Bank), Sarah Lynch (JPM), James McMorrow (Lloyds Banking Group), Eric Mouilleron
(Bankable), Jason O'Shaughnessy (Yodlee), Giles Watkins (Digital Catapult), Nicholas Webb (FCA,
observer), Phil Whelan (ThinkMoney), Sarah Williams-Gardener (Starling Bank), Stephen Wright
(RBS).
Sub-group: Data
Chairs: Gary Sanders (Lloyds Banking Group), James Varga (MiiCard)
Liz Brandt (Ctrl-Shift Ltd), Garreth Cameron (ICO, observer), Christophe Chazot (HSBC), James Dear
(iwoca), Justin Fitzpatrick (DueDil), Bernie Grady (Experian), Jo Green (Santander), Nick Hall
(Barclays), Celia Hannon (Nesta), Stuart Lang (EY), Ian Major (Runpath), Patrick Mang (HSBC), Andy
McComb (Danske Bank), Lorraine McDerment (Clydesdale Bank), Rob McKendrick (EY), Nick
Middleton (Nationwide), John Rendle (RBS), Mark Rosel (Capital One), Chris Taggart (Open
Corporates), Leanne Willis (AIB).