Online Banking
Online Banking
Online Banking
Final Draft
Banking Law
Online Banking
Submitted for the project work undertaken in the partial fulfillment of B.A. LL.B. (Hons.) 5
years integrated course of Dr. Ram Manohar Lohiya NLU, Lucknow.
SUBMITTED TO:
SUBMITTED BY:
Mr.Anil Sen
Tushar Sharma
Faculty of Law
5th Semester
1 | Page
INDEX
1. Introduction
2. Objective of the study
3. Hypothesis
4. The Concept of Online Banking
5. Types of Internet Banking
6. Benefits of Online Banking
7. Disadvantages of Online Banking
8. Internet Banking Frauds
9. Conclusion
10.References
2 | Page
INTRODUCTION
The concept of Online Banking is gaining more and more popularity day by day. With
everything just a click- away, online banking is the most user- friendly banking technique
in todays world. But, like other technological advancements, it also came with certain sideeffects. With the increasing popularity of the internet, more and more industries are seeking
ways to utilize this popular medium in an effort to keep up with the changing technological
preferences of their customers.
These days one can do just about anything online from grocery shopping to making a free
phone call to a friend in Tokyo through your PC. The possibilities of the internet are
seemingly endless and the banking industry has decided that it will not be left behind. While
most people have at least heard of online banking, the majority of them have probably not
tried it yet. Maybe it is because we find more comfort in working with real people and real
paper when it comes to money matters rather than performing transactions in the seemingly
impersonal universe of the World Wide Web.
Further, the risks involved in online banking, such as internet frauds and other disadvantages
of online banking, create a predicament for the customers, and they tend to vilify the worth of
online banking.
Whatever the case may be, there are both advantages and disadvantages to online banking. In
this project I shall endeavour to deal with the issue: Can the benefits of Online Banking
outweigh the risks involved in it?, emphasizing mainly on Internet Banking Frauds.
OBJECTIVE OF THE PROJECT
Now a day individual who are availing banking facilities rely mainly on online baking either
through ATMs, e-transfer etc. But sometimes it affects people in a bad way as some
individual are using fraudulent activities to thug individuals. So the researchers main
emphasis is on how online banking is useful, its advantages, disadvantages and some
suggestions also to improve online banking.
HYPOTHESIS
Although online banking is a boon for the people it still consists some loopholes in it proper
implication.
THE CONCEPT OF ONLINE BANKING
Banking industry the world over is yet another industry that is greatly benefited by the
ongoing Information Technology (IT) revolution. Globalization prompted relaxation of
banking regulations in several countries, promoting a reason for the banks to go global.
Advances in technology have enabled banks to manage larger information flows across more
locations, deliver better services, and manage risks making geographical disparities
3 | Page
irrelevant. These two phenomena have together facilitated global delivery of banking and
financial services at the lowest cost ever. Further, the growth in the international business
activities by multinationals, international trade and electronic commerce have created a
demand for new banking and financial services to be delivered across borders, hence have
paved the way for wide adoption of IT in banks globally.
Internet banking refers to systems that enable bank customers to access accounts and
general information on bank products and services through a personal computer (PC) or other
intelligent device. Internet banking products and services can include wholesale products for
corporate customers as well as retail and fiduciary products for consumers.1
Ultimately, the products and services obtained through Internet banking may mirror products
and services offered through other bank delivery channels.
Some examples of wholesale products and services include:
Cash management.
Wire transfer.
Automated clearinghouse (ACH) transactions.
Bill presentment and payment.
Examples of retail and fiduciary products and services include:
Balance inquiry.
Funds transfer.
Downloading transaction information.
Bill presentment and payment.
Loan applications.
Investment activity.
Other value-added services.2
Thus, the concept of online banking has resulted in a revolution in the banking industry,
where a person can now perform all the banking activities sitting in his bedroom, via his
personal computer, without actually going to a bank.
TYPES OF INTERNET BANKING
Understanding the various types of Internet banking products will help examiners assess the
risks involved. Currently, the following three basic kinds of Internet banking are being
employed in the marketplace:
Informational This is the basic level of Internet banking. Typically, the bank has
marketing information about the banks products and services on a stand-alone server. The
risk is relatively low, as informational systems typically have no path between the server and
the banks internal network. While the risk to a bank is relatively low, the server or Web site
1
Internet Banking, Comptrollers Handbook, (Comptroller of the Currency, Administrator of National Banks,
October, 1999) at 1.
2
Ibid.
4 | Page
Internet Banking, Comptrollers Handbook, (Comptroller of the Currency, Administrator of National Banks,
October, 1999) at 4.
5 | Page
Fourth, it is extremely beneficial for students as well, as they can perform various banking
activities at any time of the day, without affecting their studies or without forcing them to
bunk their classes in order to abide by the timings of the bank.
ATM Access:
The difference between Internet-only banks and brick-and-mortar banks is not only in the
buildings themselves. Your online financial institution may not own nor operate any ATMs,
so you will need to pay a fee to get cash. 5
Technical Difficulties:
4
Internet Banking, Comptrollers Handbook, (Comptroller of the Currency, Administrator of National Banks,
October, 1999) at 7.
5
Ibid.
6 | Page
Another problem with Internet banking appears to be access. Sometimes computers crash or
the Internet connection disappears. Your bank may need to shut down its website for
maintenance from time to time. It typically happens when you need to make an urgent
payment, transfer funds or view up-to-the-minute balance.
If your bank is online only, there wont be any backup branches that you can go to. Perhaps
you can try to handle matters by phone, but that can be rather difficult especially if you do
not have any bill or invoice to refer to.
Online Security:
Online security is the most important problem related to online banking. Cyber fraud has
become more difficult to detect. The information about hacking, electronic break-ins,
phishing scams, and Trojan viruses appear in news stories nearly every day.
Taking into consideration all risks, threats, and vulnerabilities existing in the Internet, 100%
online banking security is just a dream. People who aren't particularly tech savvy have a
tough time trying to protect their sensitive financial information. Security in the physical
world is easier to deal with because you can hide your check book or shield the keypad with
your hand when you are entering your PIN number. 6
Billing History:
Typically, banks keep your statements, bills, checks and other tax-related financial records for
up to two years. It means that your important documents may not be readily available when
you need them most. The IRS can generally audit taxpayers for three years after they
have filed their return. What would happen if the IRS decided to conduct an audit and
you didn't have any bills to refer to?
Complicated interface:
Some online banking systems are really difficult to use. Many customers tell that their banks
website has so many links and functions that they feel overwhelmed. Even if you are an
experienced Internet user, you can also got stuck and need to call to the customer assistance
department.7
6
Ibid.
Ibid.
7 | Page
SPAM:
Tan, Koon. "Phishing and Spamming via IM (SPIM)". Internet Storm Center. http://isc.sans.org/diary.php?
storyid=1905. Retrieved December 5, 2006.
9
Josang, Audun et al.. "Security Usability Principles for Vulnerability Analysis and Risk Assessment."
Proceedings of the Annual Computer Security Applications Conference 2007 (ACSAC'07).
http://www.unik.no/people/josang/papers/JAGAM2007-ACSAC.pdf. Retrieved 2007.
8 | Page
9 | Page
substantial, but very much smaller than the promised profits, are said to be required in
advance for bribes, fees, etc.this is the money being stolen from the victim, who thinks he
or she is investing to make a huge profit.
However, many scammers are part of less organized gangs or are operating independently;
such scammers have reduced access to the above connections and thus have little success
with wealthier investors or business entities attempting to research them, but are still
convincing to middle-class individuals and small businesses, and can make hundreds of
thousands of dollars from such victims.
SPYWARES:
Spyware is a type of malware that is installed on computers and that collects information
about users without their knowledge. The presence of spyware is typically hidden from the
user. Typically, spyware is secretly installed on the user's personal computer. Sometimes,
however, spywares such as key-loggers are installed by the owner of a shared, corporate, or
public computer on purpose in order to secretly monitor other users.11
While the term spyware suggests software that secretly monitors the user's computing, the
functions of spyware extend well beyond simple monitoring. Spyware programs can collect
various types of personal information, such as Internet surfing habits and sites that have been
visited, but can also interfere with user control of the computer in other ways, such as
installing additional software and redirecting Web browser activity. Spyware is known to
change computer settings, resulting in slow connection speeds, different home pages, and/or
loss of Internet or functionality of other programs.
Unlike viruses and worms, spyware does not usually self-replicate. Like many recent viruses,
however, spywareby designexploits infected computers for commercial gain. Typical
tactics include delivery of unsolicited pop-up advertisements, theft of personal information
(including financial information such as credit card numbers), monitoring of Web-browsing
activity for marketing purposes, and routing of HTTP requests to advertising sites.
In one case, spyware has been closely associated with identity theft.12 In August 2005,
researchers from security software firm Sunbelt Software suspected the creators of the
11
Ecker, Clint (2005). Massive spyware-based identity theft ring uncovered. Ars Technica, August 5, 2005.
10 | P a g e
common CoolWebSearch spyware had used it to transmit "chat sessions, user names,
passwords, bank information, etc.",13 however it turned out that "it actually (was) its own
sophisticated criminal little trojan that's independent of CWS."14 This case is currently under
investigation by the FBI.
The Federal Trade Commission estimates that 27.3 million Americans have been victims of
identity theft, and that financial losses from identity theft totalled nearly $48 billion for
businesses and financial institutions and at least $5 billion in out-of-pocket expenses for
individuals.15
All of the aforementioned types of internet frauds generally results in identity theft and
ultimately in the loss of victims money. These are the major risks involved in online banking
and despite of the various benefits of online banking, they create trepidation in the minds of
online banking customers that their money is unsafe.
13
14
15
FTC Releases Survey of Identity Theft in U.S. 27.3 Million Victims in Past 5 Years, Billions in Losses for
Businesses and Consumers. Federal Trade Commission, September 3, 2003.
11 | P a g e
If you receive an e-mail allegedly from your bank, never click the link in the e-mail message.
Instead, type the URL of your bank right into the browser's Address bar yourself, and forward
the e-mail to a known, legitimate bank e-mail address.
If you believe you've reached your bank's Web site, check the security certificate before you
type in any personal information. In Internet Explorer, select File, Properties and click the
Certificate button. The name on the certificate should match your bank's name. Then select
View, Privacy Report to see more details about the site's privacy policies.
Most banks insist that you use a browser with at least 128-bit encryption. Also, most Trojan
horse viruses are aimed at Internet Explorer. To be extra safe, try using an alternative
browser, such as Mozilla, Mozilla Firefox, Opera, or Netscape.16
Further, digital signatures, firewalls, etc. are also very efficient in this regard.
Online banking is extremely beneficial in todays fast and globalized world and one can enjoy
all its benefits by avoiding risks by just being more careful, while working online.
REFERENCES
1. Internet Banking, Comptrollers Handbook, (Comptroller of the Currency,
Administrator of National Banks, October, 1999) at 1.
2. Tan, Koon. "Phishing and Spamming via IM (SPIM)". Internet Storm Center.
http://isc.sans.org/diary.php?storyid=1905. Retrieved December 5, 2006.
3. Josang, Audun et al.. "Security Usability Principles for Vulnerability Analysis and Risk
Assessment." Proceedings of the Annual Computer Security Applications Conference 2007
(ACSAC'07). http://www.unik.no/people/josang/papers/JAGAM2007-ACSAC.pdf. Retrieved
2007.
4. Nigerian Scam". Snopes. 2003-09-06. http://www.snopes.com/crime/fraud/nigeria.asp.
Retrieved 2006-07-09.
5. http://www.pctools.com/security-news/what-is-spyware/ as accessed on October, 19, 2013.
16
Ibid.
12 | P a g e
6. Ecker, Clint (2005). Massive spyware-based identity theft ring uncovered. Ars Technica,
August 5, 2005.
7. Eckelberry, Alex. "Massive identity theft ring", SunbeltBLOG, August 4, 2005.
8. Eckelberry, Alex. "Identity Theft? What to do?", SunbeltBLOG, August 8, 2005.
9. FTC Releases Survey of Identity Theft in U.S. 27.3 Million Victims in Past 5 Years,
Billions in Losses for Businesses and Consumers. Federal Trade Commission, September 3,
2003.
13 | P a g e