Standards and Practices Report For Electronic and Mobile Payments
Standards and Practices Report For Electronic and Mobile Payments
Standards and Practices Report For Electronic and Mobile Payments
June 2012
This report was produced for review by the United States Agency for International
Development. It was prepared by Deloitte Consulting, LLP under the Global
Broadband Innovations Alliance (GBi).
Standards and Practices Report for Electronic and Mobile Payments iii
FTC Federal Trade Commission
GAO Government Accountability Office
GDP Gross Domestic Product
GSMA GSM Association (association of mobile operators)
IBAN International Bank Account Number
IC Card Integrated Circuit Card
ID Identification
IG Office of Inspector General
IMF International Monetary Fund
Imprest A petty cash reserve account
IPAC Intra-Governmental Payment and Collection
ISO International Standards Organization
ITU International Telecommunications Union
KEPSS Kenya Electronic Payment and Settlement System
KSH Kenyan Shilling
KYC Know Your Customer
LOC Letter of Credit
MDA Brazilian Ministry of Agrarian Development
MDS Brazilian Ministry of Social Development
MFI Microfinance Institution
ML Money Laundering
MMA Brazilian Ministry of the Environment
MNO Mobile Network Operator
MPFI Mobile Payments Forum of India
MSME Micro-, Small- and Medium- Scale Enterprise
MVNO Mobile Virtual Network Operators
NACHA National Automated Clearing House Association
NFC Near Field Communication
NGO Non-Governmental Organization
OAA Office of Acquisition and Assistance
OCB Brazilian Organization of Cooperatives
OCC Office of the Comptroller of Currency
OFAC Office of Foreign Assets Control
OFDA Office of Foreign Disaster Assistance
OGC Office of General Council
OMB Office of Management and Budget
OTA Over the Air
P2P Person-to-Person
PA-DSS Payment Application Data Security Standard
PCI Payment Card Industry
PCK Postal Corporation of Kenya
PED PIN Entry Device
1. OVERVIEW
The emergence of new electronic payment processing methods, including mobile phone
banking and mobile payments, has created enormous potential for the global marketplace,
offering convenience to consumers, new growth avenues to mobile carriers, differentiation
to financial institutions, loyal customers to merchants, and a significant leapfrog
opportunity for developing countries. Early successes in deploying such technology in a
development context have demonstrated profound transformative potential in providing
services to those Payment Beneficiaries who are traditionally difficult to reach in the
provision of foreign assistance. In pilot programs in Africa, South America and Southeast
Asia, for instance, development agencies and non-profit organizations have been able to
more easily manage microfinance programs, distributing microloans directly to small
entrepreneurs without the need to create a traditional bank account. It also helps such
entities empower women in male-dominated cultures. Aid organizations are able to
provide financial support directly to women through mobile devices or pre-paid cards,
giving them direct control over their money and empowering them to positively impact the
lives of their families. Electronic and mobile payments are also highly relevant to the
delivery of government services. In Kabul, the Afghanistan national police have piloted a
program to manage salaries through mobile banking services as a way to combat
corruption and to reduce funds leakages by thirty percent.
Early successes in the application of electronic and mobile payments are encouraging and
the potential benefits are well documented, both anecdotally and statistically.1 In
response, mobile network operators (MNOs) are beginning to provide mobile money
payment systems in some developing nations, major payment networks are offering
electronic payment options like pre-paid cards to specifically target the unbanked, and the
enabling technology and regulatory frameworks are evolving to address the risks emerging
out these new payments models. All of these trends converge to make the proliferation of
emerging electronic and mobile payments ever more likely.
But developing a vibrant mobile payments ecosystem requires more than just
technological progress. It is dependent on the concerted and collaborative efforts of aid
organizations, government entities, MNOs, financial institutions, merchants and others to
expand and standardize the use of such methods - in a manner that is mutually beneficial,
sustainable and appropriately managed and regulated.
By establishing a set of common practices and precedents for the use of electronic and
1
Sources for benefits of electronic and mobile payments:
- Dr. Ignacio Mas on Mobile Banking for the Poor. June 2010.
- It’s Better Than Cash: Kenya Mobile Money Market Assessment, Loretta Michaels, USAID (2011)
- Bangladesh Electronic Funds Transfer Network (BEFTN) Operating Rules. Payment Systems Division - Department of
Currency Management and Payment Systems. DCMPS Circular No. 09/2010 Bangladesh Bank.
- Update on Regulation of Branchless Banking in South Africa. Consultative Group to Assist the Poor (CGAP). January
2010.
· The dangers and inefficiency that may be present in the use of cash- and paper
voucher- based payments in some environments and in delivering financial
assistance to Payment Beneficiary populations who may be vulnerable to violence
while holding cash, such as women.
· Loss through illicit activities that is the result of an inability to effectively track the
disbursement of cash payments.
· A lack of sustainable development solutions through fee-for-service models across
agriculture, health and energy.
· Low financial services coverage amongst developing country populations, which
limits economic development and growth.
· Limited transparency into and digital tracking of the final stage in the disbursement
process (i.e., Payment Beneficiary’s receipt and use of funds) which increases the
risk of fund misuse (e.g., drug and human trafficking financing).
Electronic and mobile payments could be a powerful mechanism for supporting financial
services expansion and increasing the reach of development support to the unbanked.
However, cash payments may still be the most suitable and desirable option for some
foreign assistance programs, and traditional bank and wire transfers are the safest
methods for banked Payment Beneficiaries. Electronic and mobile payments have the
potential to enhance the impact of a wide range of USAID programs, including
microfinance, rural and agricultural finance, trade and competitiveness, social transfers
and cash-for-work programs, and other economic growth programming. To date, however,
a comprehensive strategy for assessing and evaluating payment alternatives in the
developing world has not emerged. If USAID were to take the lead in developing such a
strategy, it must be based on a thorough understanding of the existing regulatory
landscape, best practices in the payments industry, and the contextual benefits and risks of
each payment type in each specific program and country context.
2
See footnote number 1.
USAID’s policy-level support for the evaluation and adoption of electronic and mobile
payments is somewhat fractured, with most adoption occurring at the Mission or program
level. This is not surprising as the majority of electronic and mobile payment
disbursements are being driven by USAID Implementing Partners, buoyed by the rapid
development and proliferation of payment technology. USAID can play an active role in the
evaluation of electronic and mobile payments for potential adoption as a facilitator and a
broker between stakeholders at the Mission level, and as a supporter of standards and
practices from headquarters.
The agency can also help Missions to determine if three important conditions exist when
considering the adoption of electronic or mobile payments. First, at least one reliable
payment provider must be operating in the local environment. Second, there must be an
appropriate regulatory environment for payment transactions, at least the existence of a
local government regulatory body that is able to support the creation of such an
environment, or, in the absence of such a regulatory environment, sufficient internal
controls on the part of the provider to compensate for the lack of government regulation
or guidelines. Lastly, there must be sufficient reach among Payment Beneficiaries in the
target market for alternatives to cash payments.3
Using this analysis, the report provides an assessment framework that USAID can leverage
to assist Missions and Implementing Partners when evaluating local environments with
regard to the aforementioned conditions. This evaluation framework is a tool that will
enable decision-makers to create a risk profile for available payment types as a means to
select a proposed payment method. This analysis includes an assessment of project-level
risk tolerance based on program objectives, and the balancing of program goals related to
serving a Payment Beneficiary population against risks of payment failure.
3
Adapted from: USAID FS Series #9: Enabling Mobile Money Interventions, April 2010
check, which make up a large portion of disbursements to end Payment Beneficiaries in the
developing world. Cash is typically used if the Payment Beneficiary is unable to open a
bank account, or if the banking system is undeveloped in the country.
EFT is the standard method for making Federal payments and the preferred method for
disbursing funds to Payment Beneficiaries by USAID Missions and Implementing Partners, if
Payment Beneficiaries have (or are able to obtain) a bank account. EFT describes any
method used to transfer funds electronically. Most commonly this includes Automated
Clearing House (ACH) interbank payments, wire transfers between entities (not necessarily
limited to banks) and intra-bank transfers (movement of funds between accounts within a
single bank).
Electronic and mobile payments are examined here as an alternative to the existing
payment types; or at least an equally viable option for consideration by USAID Missions
and Implementing Partners. The form of electronic payment method focused on in this
report is pre-paid cards, which allow a Mission or Implementing Partner to disburse funds
through the issuance of payment cards that are pre-loaded with a fixed amount of money.
Electronic vouchers represent a restrictive type of pre-paid card where the Payment
Beneficiary is provided with a set amount of funding to use for a particular purpose at
participating merchants. The funding can be delivered through magnetic stripe or chip
based plastic cards. Other forms of electronic payment, such as credit cards (that extend
credit for purchases) or true debit cards tied to a current positive funds balance in a bank
account are characteristic of developed countries and banked populations, and so are not
evaluated here.
Mobile payments can include a number of technologies and methodologies. For the
purposes of this analysis, the report focuses on remote payments and proximity payments.
Remote payments provide flexibility in the kinds of transactions supported, allowing for
person to person (P2P) payments and non-face to face payments. Proximity payments are
used for point-of-sale transaction execution, typically between a business and an
individual. They make use of Near Field Communication (NFC) technology and require
physical proximity and Point of Sale (POS) infrastructure on the side of the business.
Figure 1 summarizes the benefits, limitations and suitability of each of these payment
types. These will be discussed in further detail later in the analysis.
Standards set by international bodies require implementation into local law by individual
countries in order for the standards to be enforceable domestically. The principles and
priorities established by such international standard-setting bodies create common
expectations among public and private sector counterparts. This plays a very important
role in the mitigation of risk associated with payment transactions, and as such, in the
growth of private organizations that are able to provide electronic and mobile payment
services.
When evaluating suitability of payment types for use at USAID Missions, it is important to
understand the current regulatory regime with regard to financial transactions and
payment entities. Throughout this report, local regulations and guidelines are reviewed
where relevant in the context of relevant examples of payment system deployments. In
addition, because they are important benchmarks for regulatory development in the
developing world, and because they are highly relevant to USAID and Implementing
Partners as the sender of funds, international and U.S. National Regulations have been
reviewed. The following regulations and frameworks are examined in greater detail in this
report:
Private sector entities and consortiums also play a significant role in encouraging the
development of local regulation, guidelines and policy for the electronic and mobile
payment industry. By aligning internal policy and industry best practices with international
standards (i.e., personal information protection and fund tracking), significant progress has
been made in mitigating real and perceived risks that exist today.
The following internal controls and guidelines are examined in greater detail later in this
report:
In addition to external regulations, policies and guidelines, this report is intended to form
part of the existing USAID operational framework. In this section the existing rules
governing the disbursement of aid funding by USAID are summarized and analyzed in the
context of payment type evaluation.
USAID funds disbursement and tracking guidelines establish circumstances for the transfer
of funds to “recipients” through “awards,” and also from “recipients” to “sub-recipients”
through “sub-awards.” The guidelines establish requirements for recipients and sub-
recipients, who are treated as entities that have a contractual relationship with the U.S.
government. The designations “recipient” and sub-recipient” represent specific
terminology used in the funds disbursement guidelines. For the purpose of clarity in this
report, recipients and sub-recipients (entities that have a contractual relationship with
USAID and are disbursing funds) will be generally referred to as Implementing Partners.
4
More detail on the Electronic Funds Transfer Act provided in Appendix A.2.
Internal USAID guidelines do not, however, articulate guidance with regard to Payment
Beneficiaries of foreign assistance funds, or to the entities that support payment
execution. This is highly relevant as it is the transfer of funds between recipients or sub-
recipients to Payment Beneficiaries that commonly occurs in cash in development
environments, and is the area in which electronic and mobile payments could potentially
become more prevalent.
If USAID guidelines around awards and funds disbursement were used as a benchmark for
evaluating the payment types, they could be said to represent guidelines for due diligence
against electronic or mobile payment providers. It is not intended that payment providers
necessarily meet each of these guidelines. For example, it is unrealistic to mandate that a
mobile payments provider submit to an audit by USAID. However, it is realistic to expect
that a mobile payments provider submit to an audit by a relevant local entity that could, in
specific country contexts, include outside auditors or relevant regulatory agencies. As
shown in this example, using the relevant ADS chapters as a baseline provides some
common ground for the decision-maker, but should not necessarily be interpreted literally.
Based on the ADS 630, Implementing Partners (direct recipients of USAID awards or funds)
must be pre-screened to ensure that they have the following:
Most Payment Beneficiaries of USAID development funds cannot meet the requirements
listed above, nor are they uniformly required to do so, according to disbursement
guidelines. For this reason, cash payments to Payment Beneficiaries are tracked with a
much smaller transparency and audit requirement, typically backed with paper receipts
authorized by the disbursing agent rather than an automated, digital accounting system
entry. However, an electronic or mobile payment provider could help to mitigate the risk
of disbursement of funds to Payment Beneficiaries by acting as a proxy to the Payment
Beneficiary with regard to funds tracking. This concept will be revisited in later sections of
this report.
The following USAID guidelines were reviewed and will be examined in detail throughout
this report. They are also summarized in greater detail in Appendix A.1.:
5
ADS stands for Automated Directives System
6
CFR stands for Code of Federal Regulations
7
OMB stands for Office of Management and Budget
2. STAKEHOLDERS
A stakeholder is defined as an actor, entity, or organization that is either directly impacted
or maintains oversight with respect to the processing of USAID payments. The purpose of
this section is to identify stakeholders, examine their interest and role, identify
motivations, and the potential for future changes within the payments process. The
complete process for programming, planning, obligating, and executing funds across the
USAID ecosystem contains many actors, stakeholders, and organizations. However, for the
purposes of this report, stakeholder relevance is bounded by the processing of USAID
payments.
8
The full list of USAID Bureaus and offices can be found at http://www.usaid.gov/who-we-are/organization/bureaus.
Enforcement Network and the Office of Foreign Assets Control, supervising national
banks through the Office of the Comptroller of the Currency, and leading U.S.
participation in the work of the FATF OFAC administers and enforces economic and
trade sanctions against countries, individuals, and organizations designated as a
threat to the national security, foreign policy or economy of the U.S. All U.S.
persons must comply with OFAC regulations, including all U.S. citizens and
permanent resident aliens regardless of where they are located, all persons and
entities within the U.S., all U.S. incorporated entities and their foreign branches.
Certain programs also require foreign persons in possession of U.S. origin goods to
comply.
· Other U.S. Government Compliance Organizations – In addition to Treasury and
the internal organizations of USAID, other bodies such as the Government
Accountability Office (GAO), the Office of Management and Budget (OMB), and the
Federal Trade Commission (FTC) have relevance to the USAID payment process.
Tasked with oversight or standards development for the whole of government, they
are not specifically focused on the USAID payment process, but either perform or
provide analysis and guidelines on aspects of payment processing. As this
document investigates the use of mobile payments, organizations such as the
Federal Communication Commission (FCC) are also included within this group. Each
of these compliance organizations provides binding regulations or general
guidelines that must be considered when establishing policies or best practices for
funds disbursements.
· Global Standards or Regulatory Bodies – This group includes the Basel Committee
on Banking Supervision and Committee on Payment and Settlement Systems of the
Bank for International Settlements, FATF, G-20, Organization for Economic
Cooperation and Development, International Telecommunications Union (ITU), and
the World Trade Organization. The organizations within this stakeholder group
develop global standards and facilitate global coordination and cooperation among
financial institutions with respect to payments processes. Their motivations include
facilitating financial access and inclusion, international trade, sound banking
practices, harmonized AML/CFT practices, and international cooperation among
civil supervisory authorities and among criminal enforcement authorities. These
organizations provide international best practices that can be used as a benchmark
for institutional maturity and good governance when evaluating country-specific
financial or payments practices.
· Advocacy and Trade Organizations – Comprised of organizations such as the GSM
Association (GSMA) – an international association of MNOs – this stakeholder
group is focused on advancing either specific initiatives or industries. Dependent on
the payment method or vehicles employed, the population of this group may
change. These organizations provide non-binding documentation on industry best
practices and standardization guidelines. While global regulatory bodies focus on
the aspects of country-specific maturity that can be directly influence by
government, advocacy and trade organizations target the private sector as an actor
for financial stability.
Beginning at the left of this illustration, the first stage of funds disbursement (for the
purposes of this analysis) is the award of funds between USAID headquarters and either a
USAID Mission or an Implementing Partner that has a contract relationship or agreement
with USAID for the provision of services. This part of the process is governed primarily by
ADS Chapter 630.
ADS Chapter 630 on payables management sets forth the principles, requirements, and
procedures that govern the examination, certification, and payment of basic vouchers,
invoices, contract financing requests, claims, and other payment requests. This internal
policy establishes two primary methods for USAID to execute payments – direct payment
and Intra-Governmental Payment and Collection (IPAC). EFT is the standard method for
making Federal payments, and includes multiple methods for transferring funds
electronically, including Fedwire, ACH transfers, IPAC and others.
ADS Chapter 636 on Program Funded Advances discusses payments made as advances
such as a letter of credit, direct and special letter of commitment, and bank letter of
commitment. The intent of this guideline is to prescribe policy on advances made to
program-funded contracts and assistance awards and to ensure that organizations
receiving USAID funds are provided appropriate financing for work carried out under
agreements with USAID. Policy on program funded advance payments is dependent to
some extent upon the type of obligation (or commitment) instrument under which the
advance is made. ADS 636 guidelines apply to advances made against USAID-direct
contracts, grants and cooperative agreements and host country direct aid contracts.
The preferred method for financing contracts, grants or cooperative agreements for non-
profit organizations is through Advance Payments (either LOC or Treasury check/ACH or
wire transfer). The method of advance funding is specifically authorized in the contract,
grant or cooperative agreement. For-profit organizations with a contract are expected to
finance contract working capital requirements with their own resources, and to submit
requests for reimbursement of applicable expenses with appropriate documentation to
verify valid disbursement of funds.
The final stage of funds disbursement, as illustrated in Figure 3, is the payment of funds to
a Payment Beneficiary. This may include local vendors, local individuals hired to support a
project, individual service providers, consumers or other typically non-banked entities. As
indicated, the Payment Beneficiary may receive funds from the local contractor or sub-
contractor, directly from the Implementing Partner or indirectly through a subcontractor of
the local Implementing Partner.
The movement of funds to Payment Beneficiaries is not governed by existing USAID policy
and there are no overarching guidelines for the tracking of such funds. However, Mission
controllers, the USAID CFO’s office and OAA procurement officers have established
standard practices based on past audits of Implementing Partners and sub-contractors.
There are two main scenarios:
1. Final Payment Beneficiary can accept EFT payment – In this scenario, funds are
disbursed in accordance with established guidelines, treating the Payment
Beneficiary as a sub-recipient of a sub-award.
2. Final Payment Beneficiary cannot accept EFT payments – In this scenario, cash
payments are used and some form of paper receipt is provided to verify
disbursement.
These two scenarios are the focus of the remainder of this section of the report.
In the following sections we will examine EFT and cash payments in greater detail, and the
manner in which they are leveraged to disburse funds to Payment Beneficiaries.
EFT is the standard method for making Federal payments. EFT includes any method used to
transfer funds electronically, including Fedwire, ACH transfers, IPAC system, etc.
IPAC is used by Federal agencies to process transactions including transfers, collections and
adjustments. The IPAC application’s primary purpose is to provide a standardized inter-
The U.S. Treasury has replaced the Electronic Certification System (ECS) with a Secured
Payment System (SPS) for certifying and transmitting payment schedules for worldwide
payments. Both systems are well-suited for making EFT payments to the U.S. bank
accounts of vendors and employees without incurring any banking charges and posting
cash collection transactions to the United States Disbursing Officer (USDO).10
The Automated Clearing House (ACH) is an EFT utility that provides for the interbank
clearing of electronic payments and operates on a batch basis. Rules and regulations that
govern the ACH network are established by NACHA (formerly the National Automated
Clearing House Association) and the Federal Reserve. In the U.S. EFTs are regulated by the
Electronic Funds Transfer Act.11 This act defines the rights and responsibilities of EFT
consumers and providers and limits consumers’ liabilities arising from unauthorized
transactions.
There is both a private electronic funds ACH operator, the Electronic Payments Network
(EPN), which processes about 40% of transactions, as well as the Federal Reserve's
centralized process, the Fed ACH. Similar mechanisms exist in all developed payment
markets. Figure 3 illustrates a typical process for an ACH push transaction.
1
Recipient Originator
ACH
5 4 Operator 3 2
Recipient’s Originator’s
Bank Bank
9
USAID. ADS Chapter 630. Payables Management. November 30, 2011. Page 19.
10
Ibid, page 15
11
More detail on the Electronic Funds Transfer Act provided in Appendix A.2.
1. The Recipient of the ACH credit/debit entry authorizes the Originator to initiate a
credit/debit entry (note: the recipient can both receive and make a payment in this
process). Authorization from a recipient of an ACH transaction is required before a
transaction can be initiated.
2. The Originator then initiates an ACH debit/credit entry.
3. The Originator’s Bank forwards the debit/credit entry to the ACH operator.
4. The ACH operator submits the file to the Recipient’s Bank
5. The Recipient’s Bank receives the debit/credit entry from the ACH system and
credits or debits the Recipient’s account.
On the consumer side, the ACH process is typically used in the U.S. for payments from the
government to an individual, e.g. social security payments, or for payments by consumers
of monthly obligations such as mortgage payments. ETF payments conducted using the
ACH process require that the originator and recipient have a bank account and that an
established functioning clearing house exists. In the case of payments to Payment
Beneficiaries of aid in the developing world, the appropriate infrastructure in terms of
bank systems and Payment Beneficiary accounts regularly does not exist. As such, this is
not a viable option for the disbursement of funds to Payment Beneficiaries.
Wire transfer
Wire transfer is a method of EFT that facilitates the transfer of funds from one bank
account to another. It is a secure and compliant payment mechanism with both sender and
recipient identified as bank account holders.
In the U.S. wire transfer payments are executed through Fedwire or through the Clearing
House InterBank Payments System (CHIPS). Most international transfers are executed
through the Society for Worldwide Interbank Financial Telecommunications (SWIFT), a
nonprofit cooperative of member banks serving as a worldwide interbank payments
network. It is the primary message system employed by financial institutions worldwide to
transmit either domestic or international payment instructions.
International transfers involving the U.S. are subject to monitoring by the OFAC, which
monitors information provided in the text of the wire to ascertain whether money is being
transferred to terrorist organizations or countries or entities under sanction by the U.S.
government. If a financial institution suspects that funds are being sent from or to one of
these entities, it must block the transfer and freeze the funds, making this a relatively
secure payment method. Figure 4 illustrates the typical process for a wire transfer
transaction.
Recipient Originator
FedWire
4 3 SWIFT 2 1
Recipient’s Originator’s
Bank Bank
1. The Originator issues a payment instruction to its bank providing the recipient’s
information including International Bank Account Numbers (IBAN) and Bank
Identifier Codes (BIC) as well as the amount.
2. The Originator’s bank transmits a message, to a secure system (such as SWIFT or
Fedwire).
3. The Fedwire or SWIFT system transmits the message to the recipient’s bank,
requesting that it execute payment according to the instructions given. (If no direct
relationship exists between the banks, intermediary banks, also known as
correspondent banks, may be used).
4. The recipient’s bank credits the recipient’s account and the payment transaction is
complete.
Wire transfers are habitually used for business-to-business transactions and, in the field,
this is the most well-established method of distributing funds to Payment Beneficiaries by
USAID Missions and Implementing Partners – and the method around which USAID has the
most comprehensive guidelines. However, this form of EFT can only be used to disburse
funds to Payment Beneficiaries in a country with a relatively mature banking system. In
addition, it is only feasible for the execution of transactions between two entities that have
bank accounts. Any Payment Beneficiaries who are unable to obtain a bank account would
not be able to receive payments via wire transfer.
Intra-Bank Transfer
In many USAID Mission environments, where the banking system is not mature enough to
support bank-to-bank ACH or wire transfers, USAID Missions and Implementing Partners
will sometimes use intra-bank funds transfer. This process is, essentially, a bank-assisted
cash transaction but it does support more robust funds tracking than cash-only payments.
In an intra-bank transfer, the Mission or Implementing Partner will require that Payment
Beneficiaries open a bank account at the same bank that is holding the payer’s capital
funds. Payments will be executed (typically in person with representatives for both parties
present) by signing a funds transfer between accounts equal in value to a given invoice or
procurement document.
For this form of EFT, the traceability of payments to Payment Beneficiaries is as reliable as
other intra-bank payments. However, intra-bank transfers (those that are not also ACH
transfers) are typically leveraged when the banking sector is less developed. In addition,
intra-bank payments are vulnerable to fraud or corruption internally – particularly in
instances where bank transaction processes are manual and/or paper based. This is
regularly the case in post-conflict areas (e.g., Afghanistan and Iraq).
In short, while intra-bank transfers provide better payment traceability than cash, and
significantly more security from the perspective of the payee, there are still notable
weaknesses related to process execution and the reliability of documentation.
Cash continues to be the preferred payment tool for consumer-level transactions. Even in
highly developed payments markets such as the U.S., cash remains among the most
popular payment methods; in fact 28% of consumer payment transactions in 2009 were
conducted using cash.12 The popularity of cash extends to its wide use in developing
countries where the majority of the population is not banked or under-banked, and a large
percentage of disbursements to Payment Beneficiaries of USAID development dollars are
executed in cash. This category of payments, for the purposes of this report, also includes
any kind of check that can be cashed by a Beneficiary, even if he or she does not have a
bank account, as this payment method has a risk profile very similar to that of cash.
The use of cash to disburse funds has clear benefits for Payment Beneficiaries. Cash allows
for a great deal of flexibility in how funds are used (as long as transactions can be executed
face to face), and there are no limitations on access to funds once they are transferred to
the Payment Beneficiary. However, there are clear risks for the Beneficiary and the
Implementing Partner (the stakeholder disbursing funds on behalf of USAID) including: the
security of funds, misallocation of monies, theft, and traceability of payments to Payment
Beneficiaries.
As a result of the risks and limitations, a robust, and commonly accepted, set of standard
cash payment practices has been established through precedent of acceptance in USAID
audits, and through interpretation of USAID funds management guidelines. In practice,
implementation procedures vary, tailored to the unique local country environment.
However, cash payment disbursement activities can be categorized into four stages. These
are depicted in Figure 5 below.
12
Survey of Consumer Payment Choice 2009, published by Federal Reserve Bank of Boston
1. Payment Preparation – This first stage includes all of the activities that occur
before funds are made available in-country.
o The Implementing Partner or other disbursing entity will, if possible, select a
local bank to hold funds sufficient for a designated period of program activity.
o Bank selection will be based on an assessment of institutional stability, ability
to receive wire transfers for funds replenishment and a number of other tax
and legal issues.
o The partner will establish documented guidelines for the kinds of payments
that are reimbursable by USAID as well as procedures and preparations for
the secure storage and transportation of cash.
own cash reserves and they invoice for approved expense types.
o Payment Beneficiaries will be pre-selected, registered and verified for
eligibility under the program. This supports later monitoring and evaluation of
effective disbursement.
o If applicable, the Implementing Partner may use a microfinance institution
(MFI) or other cash transfer agency (CTA) to ultimately distribute funds to
Payment Beneficiaries. If so, a contract would be established with this entity,
and a certain amount of funds will be wire transferred to them from the
Imprest account.
o If direct cash payments are to be made, the partner will withdraw cash
sufficient for an individual disbursement period and store it in a secure
environment, likely in a safe of some kind.
including Imprest accounting records, registry sheets, bank records and paper
receipts.
While there is no formally documented process for the approval of payment to Payment
Beneficiaries by USAID, existing guidelines related to the responsibilities of award
recipients (Implementing Partners, most commonly) is generally applied. More specifically,
the responsibility and liability for proper disbursement of funds – and for verification that
payments were received by intended Payment Beneficiaries – lies with the Implementing
Partner. USAID ADS guidelines and the Electronic Code of Federal Regulations (e-CFR)
related to administration of non-governmental organization (NGO) operated USAID
programs provide instruction to Implementing Partners on their responsibility with regard
to funds management. It is commonly accepted interpretation of these regulations,
policies and guidelines that serves as the basis for the practices described above.
It is very likely that, despite the growth of cash alternatives, many Implementing Partners
will continue to employ cash payments for the disbursement of foreign assistance monies.
In some circumstances, those where the majority of Payment Beneficiaries are unbanked
and non-cash payment alternatives are unavailable, cash may still be the most viable or
reasonable payment type.
The ideal scenario would be one where Implementing Partners and USAID Missions could
determine if cash payments are the best option for that program, on a case-by-case basis
after a thorough evaluation of all possible options, consideration of Payment Beneficiary
needs, assessment of development program objectives and an evaluation of environmental
readiness, . In the following section, electronic and mobile payment methods are examined
in the context of USAID’s unique needs and circumstances to facilitate such an evaluation.
Within this context, we examine two additional payment types available for disbursement
to Payment Beneficiaries who may or may not maintain a banking relationship. Those
payment types are pre-paid cards and mobile.
Purchase
Payment Payee /
goods or
Beneficiary Merchant
services
USAID Mission Pre fund
or account for end
Implementing beneficiary
Partner Issue card
Description of Actors:
· Payment Beneficiary (Cardholder) – Generally, the end beneficiary of a payment or
benefit from USAID. The entity intended to spend the disbursed funds.
· Card Issuer – A bank or other pre-paid provider that physically issues the card as
well as maintains an account of available funds.
· Network – The provider of payment processing infrastructure, connecting all other
actors in the process.
· Acquirer – A bank or other institution that provides POS devices to payee
(merchant) and connects the payee to network. Underwrites merchant risk.
· Payee – The merchant or destination of funds spent by a Payment Beneficiary.
Pre-paid cards can be used for the purposes of disbursing funds beyond a USAID Mission or
Implementing Partner. A list and description of pre-paid card uses is presented below. This
list is not intended to be exhaustive, but does provide relevant examples that demonstrate
the applicability of the payment type to USAID activities.
This section describes the process by which a pre-paid card is both established and utilized.
For the purposes of disbursing funds to Payment Beneficiaries, the term “customer”
conceptually includes two actors. The first actor is the USAID Mission or Implementing
Partner who is funding the Payment Beneficiary. These actors are responsible for paying
the Issuer to establish an account. The second actors in the role of “customer” are the end
Payment Beneficiaries themselves, who would be able to spend the funds allocated to the
card.
Distribution channels
While pre-paid cards operate on global branded payment card networks, there are
additional stakeholders in the pre-paid value chain, mainly in the distribution and program
management functions. In both developed and developing markets the distribution
channels regularly involve retailers and kiosks. This allows for unbanked Payment
Beneficiaries to execute transactions that would have otherwise required access to credit
or a bank account. For example, Payment Beneficiaries who formerly received cash can use
pre-paid cards to access Internet or telephone-based merchants without having to qualify
for credit or maintain a bank account.
Account set-up
Payment Beneficiaries are then issued a card which may be a closed loop card, for example
a retailer gift card, or an open loop card, also known as General Purpose Reloadable card,
bearing the network logo (e.g., VISA, MasterCard, China Unionpay etc.). The card may then
be used to make purchases or withdraw funds similar to other payment card types (e.g.,
debit, credit etc.).
13
Public Benefits and Wages on Pre-paid Cards: Protecting Against Hidden Fees and Identity Theft, NCLC Consumer Rights
and Litigation Conference, November 2010
The pre-paid card payment type offers USAID Missions or Implementing Partners an
alternative to cash disbursements to Payment Beneficiaries. However, as with any
technological or process advancement there are use cases, limitations, risks, and potential
mitigants to risks that must be considered prior to making a decision. Risks and mitigation
strategies will be introduced here, and discussed in more detail in the Risk Assessment and
Mitigation section of this report.
· Point of Sale Transactions – Pre -paid cards are well suited for POS transactions.
While there is a notable limitation in that a vendor or merchant must have POS
infrastructure in place, the pre-paid card allows for convenient as well as
electronically traceable transactions.
· Non Face to Face Transactions – In comparison to cash, pre-paid cards can more
effectively support transactions where parties are not physically co-located. These
types of transactions typically occur over the Internet or telephone and allow for
access to goods and services that would be unavailable for purchase with cash.
· Cash Withdrawals – Depending on the makeup of actors in the transaction model,
pre-paid cards can provide relatively easy access to cash through ATMs.
· Network – Pre-paid cards generally function within an open loop network (e.g.,
VISA, MasterCard, China Unionpay etc.). In order to take part in a transaction all
actors need to be participants in the network. It may be the case that in some
developing countries, the types of actors required to execute a transaction may not
be present.
· Person to Person Payments – P2P payments are not part of core functionality.
· Infrastructure – Pre-paid cards rely on a physical network infrastructure that might
not exist on a nationwide basis in developing markets. As authorization is
performed in real time, they also require a stable and secure electricity supply – the
exception being smart cards or stored value cards that do not need real-time bank
authorization to complete a transaction.
· Point of Sale Devices – In order for Payment Beneficiaries to spend the funds
allocated to the pre-paid card, merchants and/or vendors must have matching POS
devices. Alternatively, the card could be configured for cash out via an ATM, but
this would instead require a viable electronic banking infrastructure to be in place.
· Theft and Loss – Pre-paid cards can be issued as PIN or signature enabled cards. If
issued as magnetic stripe signature enabled cards, as is common today, they are
exposed to the same theft risk as other magnetic stripe signature cards (e.g., fraud
· Multi Factor Authentication – Adding a PIN that is only known to and safeguarded
by the cardholder limits the value of the card to unauthorized third parties. Another
layer of security can be added by delivering pre-paid accounts via a mobile device:
the phone’s SIM card can act as another authentication factor.
· Fraud Monitoring – Fraud monitoring systems will flag suspicious activities and
allow banks to suspend usage of the card until a cardholder has been able to
demonstrate that he is the authorized user. Location based intelligence from GPS
enabled phones can be also be used to monitor transactions for evidence of fraud.
· Know Your Customer (KYC) Policies – Performing some level of customer due
diligence and registering users of pre-paid cards will mitigate the risk that pre-paid
cards are used for money laundering.
· Network Regulations – All card networks provide a comprehensive transaction
dispute management system. The dispute management system is an arbitration
system based on network rules. All network participants must adhere to network
rules, and network arbitration decisions are final. Dispute management procedures
allow cardholders to object to transactions that they believe have been incorrectly
or fraudulently applied to their accounts.
· Closed Loop Networks – Closed loop networks can be set up that carry less of a
cost burden than open loop networks and can be customized to the conditions in
the target country. As an example, USAID Missions or Implementing Partners could
establish the equivalent of a vendor or good-specific gift pre-paid card that could
only be used for a defined set of transactions.
As the pre-paid card payment type sits on top of relatively mature infrastructure, the
regulatory environment for has two major goals:
14
FATF Money Laundering and New Payment Methods, October 2011, page 24)
1. Consumer protection
2. Prevention of money laundering and terrorist financing
It is important to note that these goals are not specific to pre-paid cards and thus the
applicable regulatory bodies may address additional payment types. Additionally, these
issues are globally relevant and not specifically germane to emerging markets.
Within the U.S., regulation currently happens at the Federal and State level. We will be
reviewing those briefly below as they draw attention to features of the pre-paid product
that should be considered by Implementing Partners in other markets as well. At the same
time, there are relevant international bodies that issue recommendations to various
national regulators to incorporate in their rulemaking; these can be leveraged for the
purposes of using pre-paid cards within the context of Payment Beneficiaries. As pre-paid
cards have existed in the U.S. for some time, the intent of their inclusion in this document
is to serve as a frame of reference for developing countries who may be investigating
national regulation.
As USAID examines the applicability of the pre-paid card payment type through the lens of
AML/CFT it can be difficult to determine in which countries national regulators adhere to
the guidelines provided by FATF. To aid in this task, the FATF provides a routinely updated
list of high-risk and non-cooperative jurisdictions via their website.15 The current list is
provided in Appendix A.3.
In late 2010, the FATF updated a report entitled “Money Laundering Using New Payment
Methods”16 that among other payment types, examines the use of pre-paid cards for the
purposes of money laundering and terrorist financing. Based on a review of case studies,
existing literature, and interview responses from 37 global jurisdictions, the report
identified areas where their existing standards did not adequately address the pre-paid
card payment type.17 Specifically, the report proposes additional guidelines concerning the
use of third parties such as agents or program managers in the distribution of pre-paid
cards as they currently fall out of scope of existing guidelines.
The pre-paid card market within the U.S. is significant at $333 Billion in value loaded in
200918 and continues to grow at double digit rates.19 As such, multiple Federal and State
regulations exist. As this document is intended to support decision-making for Payment
Beneficiaries in foreign countries, these regulations have been provided in an abbreviated
form, but can be used as a reference point as developing countries create their own
national regulations. Additional detail can be found in Appendix A.3.
15
The full list can be found at the following address: http://www.fatf-
gafi.org/pages/0,3417,en_32250379_32236992_1_1_1_1_1,00.html
16
http://www.fatf-gafi.org/dataoecd/4/56/46705859.pdf
17
Ibid, Page 8.
18
Mercator Advisory Group,
http://www.mercatoradvisorygroup.com/index.php?doc=Prepaid&action=view_item&id=519&catid=16
19
The 2010 Federal Reserve Payments Study, Noncash Payment Trends in the United States: 2006 – 2009, page 4
20
FEDERAL RESERVE SYSTEM 12 CFR Part 205 [Regulation E; Docket No. R–1377] Electronic Fund Transfers)
21
FDIC Deposit Insurance: The Federal Deposit Insurance Act
22
Card Act: The Credit Accountability, Responsibility and Disclosure Act of 2009 (CARD Act)
debit card interchange. Certain pre-paid cards are included in the provision.23
· The Office of the Comptroller of Currency (OCC) has addressed store value cards in
OCC Bulletin 2006-34, asking issuers to ensure they adequately inform consumers
and disclose certain information.24 See Appendix A.3. for a list of disclosure
requirements supported by OCC.
Developing a vibrant mobile payments ecosystem that brings together MNOs, financial
institutions, merchants, and a host of others to let Payment Beneficiaries use their mobile
devices to receive disbursements and in turn, pay for goods and services is no easy task.
Industry players are optimistic, but the challenges are daunting. Mobile payments have not
yet reached the state of maturity of credit card or pre-paid card payments common in
developed economies. In fact, there is not a standard definition of what constitutes a
mobile payment.
The term mobile payments means different things to different people. There are remote
payments and proximity payments. There are carrier-based billing and downloadable
wallets that enable existing credit cards. There are cloud based payments and many more
permutations. For the purposes of this report, the content is focused narrowly on mobile
payment methods – remote and proximity – currently in use or under consideration within
emerging economies where large segments of the population are under-banked.
It is assumed that in most countries where USAID operates, the current infrastructure and
technology adoption is better suited to remote payments than it is to proximity payments.
However, this document provides a brief description of proximity payments as their use is
growing at a rapid rate within developed markets and because NFC presents a leapfrog
opportunity for emerging markets where credit/debit card use is limited – as has been
evidenced by the launch of a Google wallet in the U.S. in 201125 and NFC based transit
23
Dodd-Frank Wall Street Reform and Consumer Protection Act , Pub.L. 111-203, H.R. 4173
24
OCC Bulletin 2006-34
25
Google, Citi, MasterCard, First Data and Sprint Team up to Make Your Phone Your Wallet” at:
http://www.google.com/press/pressrel/20110526_wallet.html
products such as the Oyster card in London,26and the increasing prevalence of NFC-based
payment technology in Asian markets.
Remote payments do not require the user to be in the vicinity of a card reader to conduct a
transaction. There are several technologies that enable remote payments, including
browser-based, native payment applications, bill to carrier, and messaging-based.
The Messaging-based approach uses either the Short Message Service (SMS) or
Unstructured Supplementary Service Data (USSD) to initiate or authorize a payment
transaction. At the time of writing, SMS and USSD are the predominant technologies used
for enabling mobile payments in many of the countries within which USAID operates. Our
subsequent review is focused on mobile payments enabled through SMS and USSD and
provides detailed information on viable models.
Native payment applications are software that can be downloaded from an app store
(such as the Android market place or Apple’s App Store) and installed on a smartphone.
These applications may provide an alternative way of accessing existing payment types,
e.g. pre-paid cards that reside on a web server. An example is the Starbucks pre-paid
payment app that can be downloaded from the app store. The consumer sets up his pre-
paid card to provide the payment functionality that is accessed by the app. At the POS, a
two dimensional bar code is generated on the phone that is presented to the cashier. The
cashier scans the barcode which is transmitted to Starbucks’ servers and which points to
the user’s account. The amount of the transaction is deducted from the pre-paid card and
the transaction completed at the POS. Although it looks like a proximity payment it is in
effect a remote payment.
The bill to carrier approach allows users to charge transactions to their mobile bill. This
works against either a pre-paid plan or a post-paid plan. Due to the risk inherent for the
MNOs they typically do not allow this to be used for higher ticket size transactions but
rather limit it to low ticket size high margin transactions such as digital downloads or ring
tones.
26
Transport for London to accept NFC payments from 2012” at: http://www.nfcworld.com/2011/07/12/38537/transport-
for-london-to-accept-nfc-payments-from-2012/
As the remote payments ecosystem is continuing to evolve and blurs traditional roles
between MNOs, financial institutions, and agents in the payments lifecycle, Figure 7 27
provides a high-level overview to guide the reader.
Figure 7: Mobile Payment Stakeholder Description
Limitations /
Stakeholder Assets / Capabilities Incentives Roles
Constraints
· Mobile · Acquire and · Provide · Regulation and policy
Infrastructure retain infrastructure and may limit ability to
· Retail outlet / agent customers communication provide financial
Mobile
network · Manage churn service services.
Network
· Branding · Increase
Operators
· Customer service revenue
· Meet service
obligations
· Banking license · Reduce cost of · Offer banking · Lack of experience
· Infrastructure delivering services via mobile with low-income
· Financial sector services · Hold float in customers
regulatory · Establish customer’s names · Stringent regulatory
experience presence in new · Ensure compliance regimes
Banks · Retail outlets customer with financial sector · Present only in areas
segments regulations with dense
· Support settlement populations
between mobile
money issuers and
agents
· Physical points of · Earn · Perform cash-in · Liquidity shortfalls
presence commissions on cash-out · Limited ability to
· Customer trust transactions transactions partner with larger
Agents · Knowledge of · Increase traffic · Handle account corporations
customer usage and sales opening procedures · Regulation and policy
habits and needs. potential. · Report suspicious may limit services
transactions.
There are several operating models for mobile payments that are currently implemented in
different markets. For the purposes of this report, we will follow the classification adopted
by USAID in the Mobile Financial Services Risk Matrix, published by USAID in July 2011.
· Bank Model – In a pure bank model the bank (or other formal deposit taking
institution) holds the license. Each client is required to have an established account
with the bank.
· MNO Model – A pure MNO service extends the wireless network messaging
functionality to provide payment services that enable customers to electronically
remit funds to others on the same network. Electronic funds can then be converted
to cash through the MNO's established agent network. Individual payment
transactions occur entirely within the MNO and do not require the Payment
Beneficiary to have a bank account.
27
Mobile Money Ecosystem Stakeholders (Adapted from: Developing mobile money ecosystems)
· Hybrid Models – Hybrid models include but are not limited to:
o MNO/Bank Model – Cell phone company-based payment services that handle
payments internally with cash in/out through the MNO's agent network, yet
link to formal banking by enabling communications with the bank and
transfers between the user's cell phone payment account and accounts at the
bank.
o Government Provider/Bank Model – A government sponsored interbank
clearing system includes consumer access functionality, either using smart
cards or smart cell phone Sims that temporarily act as a store of value and
synchronize with a formal bank account. The cell phone company, if involved,
provides communications services while the government operates the
payment switch between banks and between accounts within banks.28
o Integrated Payments Provider Model – A payments company that is not bank
owned or MNO affiliated and enables payment transactions leveraging a
variety of tender types, from paper vouchers to mobile P2P payments and
agent networks.29
Depending on the country USAID is operating within, the model used and the actors within
the model may change. However, Figure 8 provides a generalized view of the roles and
responsibilities within the most frequently used models.
Operating Deposit Account Account set- Cash In Cash Out Transactions Regulatory
Model Holder Holder up Framework
Bank Individual Customer ATM ATM Checks 1. Host country
identification Agents Agents Credit cards banking
performed in Branches Branches Debit cards regulation
Bank person by Pre-paid cards 2. International
bank EFT regulation:
employees Mobile AML, FATCA
P2P
Operating Deposit Account Account set- Cash In Cash Out Transactions Regulatory
Model Holder Holder up Framework
Bank MNO Customer ATM ATM Checks 1. Host country
(Trust identification Agents Agents Credit cards banking
Hybrid Account) performed in Branches Branches Debit cards regulation
MNO - person by MNO Retail Pre-paid cards 2. International
Bank bank Outlets EFT regulation:
employees Mobile AML, FATCA
P2P
The mobile remote payment type offers USAID Missions or Implementing Partners an
alternative to cash disbursements to Payment Beneficiaries. Depending upon the specific
implementation or availability of remote payment method, this particular payment type is
often best suited for use within the developing world. For example, with the significant
amount of existing and stable infrastructure to support messaging-based remote
payments, there are often very low barriers to entry for adoption. However, as with any
technological or process advancement there are use cases, limitations, risks, and potential
mitigants that must be considered prior to making a decision.
· Person to Entity Payments – Remote mobile payments can be used for bill or tax
payments to a private business or government entity.
· Internet transactions - Remote mobile payments can be used to complete internet
transactions via websites or through native applications.
· Cash Access – Currently there are no technologies that support the use of a remote
payment device to receive cash without converting the digital payment to physical
cash through an agent or secondary device.
· Infrastructure – Network coverage is required for Payment Beneficiaries to execute
transactions using a mobile device. In some environments, this may be limited to a
specific MNO network, as not all MNOs in a given country may offer mobile
payments services. This could be a significant inhibitor in rural areas where
appropriate network coverage is not yet available or is unreliable or when the
mobile payment services are offered by a single MNO
The regulation and guidelines for remote mobile payments is determined on a country
specific basis. While some countries have begun to set the standard for adaptation of
financial entity regulations to account for the emergence of remote mobile payments
models, there are no agreed upon standards and country-level adoption is inconsistent –
particularly in developing economies.30 As the mobile payments industry continues to
evolve, standards may emerge that, if followed, should be evaluated for their impact on
the risk of mobile payments. Depending on the framework, regulations that are prohibitive
or overly restrictive also may impede the offering of mobile payment systems, making
them unavailable or limited in a given local country context.
Proximity payments make use of NFC technology. NFC is a short range high frequency
wireless communication technology, typically presented on a chip that enables an
exchange of data between an initiator and a target. Chips can be embedded in cards,
presented as a key fob or integrated in mobile devices. The target, e.g. a card reader,
needs to have the required hardware and software components to accept these
communications.
NFC leverages existing contactless payment standards based on the EMV smartcard
protocol that has been rolled out across markets globally and currently represents the
most secure card technology in wide use. The chip enables dynamic authentication and has
been a proven tool in fraud reduction. Mobile applications that leverage NFC for
communicating with a card reader must address the security of user credentials. This is
done in Secure Element – a platform on the device that can be housed on the subscriber
30
Best Practices for Mobile Device Banking Security 2008, ATM Industry Association, pg 57
identity module (SIM) card or on a separate secure digital (SD) card. The underlying
payment instrument can be a debit card, pre-paid card or credit card. Proximity payments
therefore represent a new access tool for existing card products. However, the set-up of a
digital wallet requires extra steps and adds a new dimension to this product.
Account set-up
Transaction flows:
The transaction flows are identical to those of a regular card transaction as the telephone
is substituted for the plastic – and the terminal upgraded – and there is a change in form
factor but not in process.
The mobile proximity payment type offers USAID Missions or Implementing Partners an
alternative to cash disbursements to Payment Beneficiaries. However, as with any
technological or process advancement there are use cases, limitations, risks, and potential
mitigants that must be considered prior to making a decision.
· Point of Sale Transactions – Proximity payments are well suited for POS
transactions. While there is a notable limitation that a vendor or merchant must
have POS infrastructure in place, a proximity payment allows for convenient as well
as electronically traceable transactions.
· Non Face to Face Transactions – Due to the physical nature of proximity payments,
they are not viable for transactions that do not require an-in person interaction. By
definition, “proximity” restricts transaction types to those that can be accomplished
with both parties near one another.
· Person to Person Payments – Currently, P2P proximity payments require both
payer and payee to have NFC enabled devices. In most cases, a proximity payment
Standards and Practices Report for Electronic and Mobile Payments 37
Electronic and Mobile Payments: Mobile Payments
uses a device on the payer side of the transaction that communicates with a POS
device on the recipient side of the transaction.
· Cash Access – Currently there are no technologies that support the use of a
proximity payment device to receive cash other than receiving a “cash out” at a
retailer that is equipped with a proximity POS device.
· Point of Sale Devices – In order for Payment Beneficiaries to spend the funds
available via the proximity payment device, merchants and/or vendors must have
matching POS devices.
31
Mobile App Security and Payments. ViaForensics. Presented at 2012 Payments Forum.
32
ARM, Gemalto and Giesecke & Devrient Form Joint Venture to Deliver Next-Generation Security for Services Running
on Connected Devices “, April 3, 2012, as published on:
http://www.businesswire.com/news/home/20120402006967/en/ARM-Gemalto-Giesecke-Devrient-Form-Joint-Venture
Risk definitions are based on the USAID Mobile Financial Services Risk Matrix developed in
July 2010.33 Risk categories have been consolidated and summarized for the purpose of
this report. Additional risks and categories have been added to the analysis by the authors
of this document. Figure 9, below, provides a high-level definition for the risk categories
evaluated.
Figure 9: Risk Descriptions
Risk Description
Financial Risk of a single transaction failure in which the intended Payment
Beneficiary receives fewer funds that expected, or does not receive
payment at all
Systemic Risk of collapse of a financial system or market
Legal Risk which could result in lawsuits, judgment or contracts that could
disrupt or affect business practices. AML/CFT vulnerability is the
most significant legal risk in this context
Operational - General Risk which damages the ability of one of the payment stakeholders
to effectively operate their business, results in a direct or indirect
loss from failed internal processes, people, systems or external
events
Operational - Interoperability Risk that the lack of inter or intra network operability may prevent a
consumer from transacting successfully with the desired party
Operational– Customer ID and Authentication Risk that a transaction fails or that funds do not reach the Payment
Beneficiary due to inability to verify the validity of transfer parties
Operational– Provider Governance Risks to customer funds that arise out of a lack of appropriate
governance structure, standards and practices
Technology Risk that technology failure will result in a direct or indirect loss to a
stakeholder in the payment process
Reputational Risk that damages the image of one of the stakeholders, the mobile
system, the financial system, or of a specific product
The following sections further define each risk category and summarize the risks
encountered by stakeholders in the context of each payment type. Figure 10 provides a
summary overview of the risk burden for each payment type, as well as the types of
mitigations recommended.
33
Mobile Financial Services Risk Matrix July 2010
Transactions costs are fees or administrative costs, for which the sender and/or recipient
may be responsible, associated with execution payment transactions. These costs should
not uniformly be considered a financial risk, as in many cases, they are able to be
accurately estimated in advance of selecting a payment type. However, in some cases
transactions costs may not be made transparent by the provider, or may be variable based
on future environmental circumstances. In this manner, non-transparent or variable
34
Reg: Regulatory
IC: Internal Controls
IS: Industry Standards
Other: Variable or informal process-related
Fraud is defined as either criminal or wrongful deceit, with the intention to financially
benefit. This risk is presumably able to be mitigated through customer authentication and
authorization but should be understood as a component of overall risk.
Theft is inherent in the physical nature of cash. The transport required for physical
currency creates a theft risk. Unlike transactions processed via an electronic network, cash
requires transport and transfer of a physical currency with no ownership restrictions and
other than possession.
Transaction costs for cash include fees, personnel and equipment costs associated with the
acquisition, transportation, protection/security, or disbursement of physical currency. In
some environments, it may be possible to estimate these costs in advance, but there is
typically some risk that they will be higher than expected. Programs in an environment of
intermittent or ongoing conflict may experience fluctuations in the amount of security
required, for example.
Process Requirements for Cash Payments
An example of cash transaction • The Area Supervisor collects and verifies attendance
lists with each Site Supervisor.
costs comes from an Implementing
Partner supporting a USAID civil • The Area Supervisor works with finance staff to
prepare payment vouchers and bank transfer
society strengthening program in
requests (as appropriate), indicating days/ hours
Kenya who reported that, including worked and total payments per work group.
salaries, transportation, fuel and • On payday, the Area Supervisor visits the worksite
other costs, the total transaction with attendance lists and explains the payment
cost associated with paying cash for process together with the Site Supervisor.
a single training workshop was Ks • All beneficiaries present identification or, if
46,500, or almost $560. In this case, identification does not exist, a Group Leader or
because security was not a major community representative who knows the
participants must be present to verify identities.
issue, it may have been possible for
the Implementing Partner to • Literate beneficiaries should be enlisted to assist
others.
anticipate those costs, thus
minimizing transaction cost risk. • Beneficiaries receive the exact amount due and sign
the cash payment sheet (Annex 13) on receipt or put
However, a similar program in a thumbprint next to their name in recognition of
Afghanistan would need to consider received payment.
the risk that these costs would • All payments sheets must be countersigned.
increase in times of elevated • Payment vouchers and attendance lists are re-
conflict. This could possibly be tabulated and reconciled by Finance Officers.
contrasted with other payment
types. For instance, when the - MercyCorps Guide to Cash-for-Work Programming
program in Kenya adopted mobile
payments through M-Pesa, total transaction costs were reduced to Ks 3,750, or $35.35
More importantly, those transaction fees are much less variable based on environmental
conditions. A recent study commissioned by CALP, the Cash Learning Partnership, found
that “the emerging evidence suggests that there may be cost savings in switching to new
technologies, especially over a longer time horizon.”36
Cash transaction fraud occurs in two primary ways. The most common is through graft and
corruption. Government officials, payment intermediaries or some other actor in the cash
transaction intercept cash payments or misrepresent the Payment Beneficiary. As a result,
funds are not applied as expected and transaction costs for people and businesses are
increased. In many cases of graft and corruption with cash transactions, the payment
provider is unaware that fraud has occurred, making it difficult to determine the full extent
of fraud impact.
The second form of cash transaction fraud is the distribution and use of counterfeit
currency. In this circumstance, an actor in the process of supplying physical currency for
the payment of Payment Beneficiaries substitutes counterfeit currency for legitimate
funds. In the case of counterfeiting, fraud is more often detected.
The transport required for physical currency creates a theft risk. Unlike transactions
processed via an electronic network, cash requires transport and transfer of a physical
currency with no ownership restrictions other than possession. In violent or conflict-prone
geographies, the known distribution of cash can increase the financial risk to the Payment
Beneficiary as well as create a physical threat. An example of how this impacts citizens in
Haiti and the potential for improvement was provided by the authors of a recent study on
Haiti. ”Bianca, a vendor who sells vegetables on Route Delmas and a TchoTcho customer,
told us that an advantage of mobile money is that she can deposit her day’s wages at an
agent near her stall and withdraw at an agent in her neighborhood. Bianca thereby avoids
the stress of travelling with money and the possibility of being robbed as she travels home.
She says that she would rather pay the cost of withdrawing money than risk losing
everything.”37 However, this can create the unique risk of relying on agents, rather than
bank branches, to manage cash payments. These agents, who need to maintain liquidity
for mobile money transactions then become known as a habitual carriers of cash. This can
have the dangerous effect of increasing risk of theft rather than decreasing it, in some
environments.
Mitigation of financial risk for cash transactions is often managed through adoption of
strong internal controls and audits by donor organizations and Implementing Partners.
35
It’s Better Than Cash: Kenya Mobile Money Market Assessment; Loretta Michaels; USAID, p. 32
36
New technologies in cash transfer Programming and Humanitarian Assistance, CALP, page 46
37
“Mobile Money in Haiti: Potentials and Challenges”. Institute for Money, Technology and Financial Inclusion April 2011,
page 7
1. Limit cash access. Implement specific procedures to define who has access to cash
and the manner in which cash movements are executed. Vary transport routes and
distribution centers or timing and use cash transport companies (i.e. armored cars).
2. Impose tracking requirements. Implement policies on receipt requirements for cash
disbursements.
3. Conduct regular reconciliations. Require to validation of receipts against approved
expenses and cash stores.
It should also be noted that the adoption of a more secure and transparent payment type
as an alternative to cash is a reliable method for mitigating financial risk. This will be
discussed in greater detail later in this document.
Transaction costs for EFT are typically a straightforward fixed fee per transaction. Payment
recipients’ banks will often charge a fee to receive the funds and to disburse them to the
Payment Beneficiary. Because such fees are almost universally transparent, transaction
costs are not really a financial risk factor for EFT.
In addition, EFT is typically done through the SWIFT system, a high standardized, global
system that has established policies and procedures. As with any system requiring human
input, EFT systems are susceptible to fraud from both employees and intruders. As
instructions for wire transfers or ACH entries are processed by employees, there is the
possibility of error or misdirection of the transfers to persons other than the intended
recipients. Similarly, those with access to the systems executing the transactions can alter
data to re-direct funds. This represents vulnerability in all environments where non secure
devices, e.g. a computer connected to a server via the Internet, are used to carry out these
processes.
The risk of fraud in EFT is inversely related to the rigor of the controls put in place, and to
the degree of transparency with regard to the process actors. For this reason, intra-bank
transfers are the form of EFT most susceptible to fraud. Intra-bank transfers are often used
when the banking system in a given country is not mature enough to support consistent,
reliable, and low cost inter-bank transfers.
Financial risk is already significantly lower for EFT payments than for any other payment
option. For this reason USAID leverages EFT for payment execution when it is an available
option. Financial risk mitigation is best achieved through adoption of standard banking
industry internal controls with regard to transaction tracking and monitoring, redundant
roles and responsibilities and regular internal audits.
Pre-paid cards can carry both costs to the consumer and to the merchant where cards are
used. In situations where cards are loaded by one funding entity to benefit many (e.g.
disbursement of monthly benefits) there may also be fees and charges to the funding
entity. Costs to the consumer associated with pre-paid cards fall into three categories:
· Load fees for adding funds to the account either at account opening or
subsequently
· Usage charges for purchases, bill payment and cash withdrawals
· Service fees, e.g. for balance inquiries or paper statements
These fees are almost usually transparent – at least when the pre-paid card provider is an
established global credit card company and the payment type is a simple pre-paid debit
card. As such, this is not really a financial risk, but more of a financial consideration.
The fees are often designed to drive consumer behavior that minimizes costs to the bank
by pushing them to the purchasing entity or to the merchant at the transaction level. This
may reduce the utility of pre-paid cards to some Payment Beneficiaries, making transaction
costs an important consideration.
The two major fraud categories perpetrated on credit, debit and pre-paid cards are internal
and external fraud. Internal fraud typically takes the form of data breaches where payment
service company employees provide criminals access to accounts through stolen
credentials. While these types of attacks are infrequent, they can result in millions of cards
being exposed and occur in any geography, including both the U.S. and emerging markets.
External fraud is typically due to customer loss of a card or capture of a customer’s card
information by a merchant or other third party. External fraud can also arise from a card
processing failure. This can create exposure to the possibility of card counterfeiting during
the process of personalization, during transactions or at the various locations pre-paid
cards need to be stocked before delivery to the recipient. In each of these cases,
information is stolen at points in the payment process and used to wrongly disburse or use
funds.
Regulation and standards are one of the mitigants for high transaction costs being charged
to consumers. In terms of fees being charged to single funding units such as a government
agency, a competitive Request for Proposal (RFP) process will generate lower fees and also
allow the funding agency to negotiate terms for the consumer usage.
There has yet to emerge a clear standard for transaction costs associated with mobile
money given the variety of business models for delivering such services, however current
trends from influential mobile payments providers point toward full transparency, which
likely means that undisclosed transaction fees are not a notable financial risk factor for
mobile payments. The transaction fee rate card for M-Pesa, which is seen as a leading
mobile money provider in terms of adoption, can serve as a notable example. M-Pesa have
a tiered fee per transaction pricing structure, for which the sender is responsible.
M-Pesa transaction costs fall into several categories and are listed here in Kenyan Shilling
(85 KSH = $1.00 as of May 2012).
Figure 11: M-Pesa Tariff Example39
Transaction Type Cost (KSH) Cost ($) Tiers
Deposit cash KSH 0 $0.00
Send money to registered user Flat 30 KSH Flat $0.36
Send money to non - registered Tiered KSH 75-400 Tiered $0.90 - (1.14% to 3.00%)
user $4.80
Withdrawal reg. user at Tiered KSH 25-170 Tiered $0.30 - (0.49% to 1.00%)
registered outlet $2.40
Withdrawal reg. user at PESA Tiered KSH 30-175 Tiered $036 - $2.10 (0.88% to 1.20%)
Point ATM
Withdrawal by non-registered KSH 0 $0.00
user
Mobile payments are inherently network-based, interfacing with the mobile device’s
platform to authenticate and process transactions. Account registration and device
recognition are used to support transaction accuracy. As with other network-based
38
Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that
handle cardholder information for the major debit, credit, pre-paid, e-purse, ATM, and POS cards.
39
http://www.safaricom.co.ke/fileadmin/M-PESA/Documents/MPESA_TARRIF.pdf
However, in a recently reported fraud case involving mobile money in Uganda, the
perpetrators executed a classic internal fraud scheme and unlawfully transferred funds
from victims’ accounts using stolen access credentials.40 Fraud at an individual customer
level, in which a customer’s credentials are stolen, will be described in more detail in the
section on operational risk. Fraud linked to the device will be covered in more detail in the
section on technology risks.
Regulation, standards and market competition are the best methods for driving down
transaction fees, so encouragement of such a competitive environment is a long term
mitigation strategy. In the immediate term, it is generally challenging to negotiate lower
transaction fees on behalf of consumers when emerging players are still in the
development phase and need to charge higher fees before they reach scale in their
operations. It may also be the case, those disbursing funds to Payment Beneficiaries may
elect to absorb the transaction fees as part of programming costs reducing the risk to the
Payment Beneficiary. Transaction fees may apply to transactions following disbursement,
such as cash-out withdrawals or purchase of goods, which may impose a cost on the
Payment Beneficiary not typically associated with cash.
Mitigants for general fraud risk associated with mobile payments are similar to those of
EFT payments and pre-paid cards. Strong regulation or standards and robust internal
controls allow for mitigation of general fraud risk. The ability to track mobile payments by
location and the creation of a digital transaction footprint provide a means by which
potentially fraudulent activity can be discovered, investigated and potentially prevented.
More specific mitigants, such as two-factor authentication for individual customer-level
fraud, are described in more detail in the section on Operational Risks. Mitigants for fraud
linked to the device are covered in more detail in the section on Technology Risks.
Mitigating financial risk as described within this section, is directly related to the delivery of
effective foreign aid. As financial risk increases the possibility of Payment Beneficiaries
either not receiving or being defrauded of intended funds, this category of risk is of the
utmost importance. While it is not possible to wholly eliminate financial risk, there are
steps USAID Missions or Implementing Partners can take to make informed decisions with
respect to payment type options.
40
http://mobilemoneyafrica.com/mtn-uganda-loses-billions-to-mobile-money-fraud-involving-employees/
EFT at both the inter- and intra-bank level is the least susceptible to financial risk where
there is reasonably high trust in the viability and maturity of the banking industry as well as
a high percentage of banked Payment Beneficiaries. Where EFT is not possible, electronic
or mobile payments providers have demonstrated the capability of providing similar
protections against financial risk – particularly fraud and theft – when proper controls are
in place. These factors must be considered by USAID and Implementing Partners when
evaluating these payment types in a specific country context.
Despite these options, there are circumstances where cash is the only viable option. If
identified Payment Beneficiaries are unbanked and mobile money or pre-paid card
providers are unavailable - or if pre-paid cards and mobile money present total transaction
costs that make them undesirable options in comparison to cash – payers may determine
the best method to mitigate financial risk is to use cash payments.
USAID can play a role in the development of a mobile money ecosystem that serves
consumer needs by encouraging Implementing Partners to work with MNOs and banks
that have appropriate fraud controls in place. In order to accurately make decisions with
respect to a payment type, USAID Missions or Implementing Partners must understand
financial risk specific to their unique environment.
More simply, systemic risk is the risk of collapse of a financial system or market, as
opposed to risk associated with any one individual entity, group or component of a system.
In selecting a payment method for disbursement of funds to Payment Beneficiaries, an
Implementing Partner and USAID must consider the implications of payment failure on the
stability of the overall system. For example, if an audit revealed that 25% of Payment
Beneficiary payments made on a given contract were misappropriated for the purpose of
money laundering or graft, would that destabilize the entire payment system?
A number of sub-risks fall into the category of systemic risk. Summarized below, the major
systemic risks comprise:
41
USAID Mobile Financial Services Risk matrix, page 3
The implications of payment failure for cash are quite different than for payment methods
that rely on larger payment systems. Cash payments, by their nature, are treated as
individual transactions and not necessarily as part of a payment system. The failure of a
single cash payment does not necessarily imply anything, in terms of risk, on future cash
payments to another Payment Beneficiary or vendor. An instance of fraud or theft is
unlikely to cast doubt on the entire system of currency. For this reason, systemic risk for
cash payments is very low and somewhat irrelevant, even though financial risk – the risk of
a single instance of fraud - is generally higher.
It should be noted that the application of systemic risk to cash payments precludes the
collapse of country’s native currency. While currency failure is indeed a systemic risk, the
term “cash” applies to all possible physical currencies. Thus, in the event of a currency
failure, another country’s currency could supplant the failed native instrument.
Though currency is vulnerable to general systemic risk associated with currency stability
(inflation, devaluation, etc.) these issues are likely to affect all payment types. As such, no
For EFT, the implications of a single payment failure are significant. For example, if one out
of every four EFT payments fails or is untraceable, it could potentially cast doubt on the
security of the bank or the entire banking system in that country. These circumstances are
far less likely for EFT than for cash, of course, as EFT payments are designed to maximize
the traceability of transactions. Therefore, systemic risk is more relevant to EFT payments
than to cash payments, but the circumstances that generate systemic instability are
uncommon and at low risk of occurring.
The mitigation for systemic risk related to EFT is similar to the mitigation for financial risk.
Proper regulation of the banking system, insurance of bank transactions and transparency
and accountability in funds management all contribute to overall trust and stability of the
banking system
The implications of payment failure for pre-paid cards vary, based on the location of the
failure. As pre-paid cards operate on existing card processing infrastructure, the failure of a
MasterCard instrument may not necessarily induce a failure of a VISA instrument.
Essentially, pre-paid cards do not necessarily represent a single system, and thus are not
completely susceptible to a perceived total failure of the payment type. Additionally, the
processing networks for pre-paid cards are built to serve global needs, providing
redundancy and monitoring capabilities. However, if a USAID Mission or Implementing
Partner chooses a specific pre-paid card provider to execute all transactions, it may be the
case that a failure of a payment casts doubts on the provider-specific system.
Similar to pre-paid cards, the mobile payment type may not represent a complete or single
system. In addition to the possibility of multiple providers, this issue is further
compounded by multiple methods for executing a mobile payment. For example, a
payment failure using a messaging-based approach may not necessarily cast doubt upon a
proximity payment provider. This separation of mobile payment failure from the larger
financial system of the country does present unique risks. While most governments
provide some level of insurance on bank deposits there is generally no such standard
requiring insurance for deposits in mobile banking systems. If a mobile payment provider
collapses, user funds may be at increased risk.
However, as MNOs were originally positioned to serve customers with high network usage
needs, most MNOs are vigilant with the monitoring and real time operations of their
networks. The 24/7 nature of the mobile phone business tends to provide faster resolution
times with respect to system outages as well as proactive avoidance of failures.
The mitigations for systemic risk with regard to electronic and mobile payments are quite
similar, and also related to regulation and payment system oversight.
At the same time that governments are looking to create or increase regulation or
guidelines for electronic and mobile payments, they also recognize the benefits provided
by alternatives to a bank-based financial system for increasing financial inclusion. In
countries where the majority of the population is unbanked or under-banked and an equal
percentage is equipped with mobile phones, there is a tremendous opportunity to bring
more citizens into the financial system. Additionally, decreasing cash transactions generally
increases the ability of the government to track and regulate payments.
Finding this balance and determining the right degree of legislative or supervisory
government involvement is the major challenge in developing a viable framework for
regulating electronic and mobile forms of payment.
Understanding that payment systems oversight is the best mitigation of systemic risk for
electronic and mobile payments, the G20 has adopted regulatory guidelines that will
support the effort to increase financial inclusion through regulation. Full details can be
found in Appendix A, but it can be summarized by the following:
42
Developing Mobile Money Ecosystems, Beth Jenkins
43
FATF Guidance Anti-money laundering and terrorist financing measures and Financial Inclusion, page 54
The intent of this effort by the G20 is to establish financial inclusion as a priority, and to
support the efforts of local governments in establishing regulations for oversight of
financial entities in a manner that supports this priority. The Philippines provide an
excellent example of regulators specifically addressing the issue of mobile payments. While
incorporating a number of the principles laid out by the G-20, the Philippine Central Bank
(BSP) also provides legal certainty to an evolving market. These rules have been put into
practice in the form of Circular 649 on the Issuance of Electronic Money by the BSP. On 26
February 2009, the BSP, with support from USAID, issued an ‘e-money’ circular that opens
e-money issuance to non-banks. Such e-money regulation enables non-banks to offer
electronic money solutions and e-money issuance is open to banks and non-banks under
the same rules. The Circular was the result of a collaborative process between the BSP and
MNOs. While the BSP allowed the market to develop without regulation at first they
formalized regulatory requirements to provide legal certainty once the market has reached
a critical point.
Figure 12: Key Provisions of the Philippine Central Bank E-Money Circular
As systemic risk for each of the payment types varies, USAID Missions or Implementing
Partners are presented with tradeoffs. For example, cash may be the payment type with
the lowest systemic risk, but may be completely unsuitable with respect to financial or
other risk types.
Cash payments are generally subject to higher legal risk than other payment types. Cash
provides neither recipient identification (establishing the identity of the recipient) nor
recipient authentication (establishing that the recipient is entitled to receive the funds).
Compliance with AML/CFT regulations is a significant legal challenge due to the absence of
such verification.
The process for executing cash payments, as described earlier in this report, has been
44
Circular No. 649. Banko Sentral ng Philipinas. http://www.cgap.org/gm/document-1.9.44821/Circular%20649.pdf
45
Circular No. 704. Banko Sentral ng Philipinas.
http://www.bsp.gov.ph/downloads/regulations/attachments/2010/c704.pdf
The financial risk mitigations for cash are also the best method for mitigating legal risk.
Additionally, some Implementing Partners will leverage cash transfer agencies or MFIs to
disburse funds to un-banked Payment Beneficiaries in order to avoid disbursing physical
currency themselves, and to add an additional layer of personal identification and payment
documentation. Oxfam has developed well-documented procedures for executing
payments through a CTA intermediary, which does provide some legal and financial risk
mitigation.
Figure 13: Oxfam Procedures for Cash Payments with a Cash Transfer Agency
Cash Delivery Activity Actor Responsible
Beneficiary identification Local partners or Oxfam staff
Beneficiary verification Oxfam staff
Beneficiary lists prepared including name, ID number, Oxfam staff
telephone number, address
Payment request made to Finance and list sent to Finance Oxfam staff
List sent to the cash transfer agency (CTA) Oxfam finance team
CTA sent unique pin numbers per beneficiary that Oxfam CTA to Oxfam finance team
then printed on to vouchers
Vouchers distributed to beneficiaries via partner Oxfam and local partners
organizations
Beneficiaries required to go to the CTA with their vouchers
and ID cards in order to receive payment. CTA also sent
text message alerts to notify beneficiaries that payments
were ready for pick-up.
Beneficiaries without ID cards had their vouchers stamped Oxfam staff
with an Oxfam stamp to certify to the bank that Oxfam
agreed to the payment
Monitoring and evaluation follow-up checks performed on Oxfam staff
a sub-set of beneficiaries to validate proper receipt
It should additionally be noted that transitioning to a payment methodology that allows for
stronger mitigation against legal risk is a possible mitigation strategy for cash payments.
Legal risk, as defined here, has very similar implications as financial risk, in practice. The
risk profiles for EFT and cash are roughly the same as in the case of fraud. There is assumed
to be less legal risk with EFT as the sender and recipient have been subject to an identity
verification process. Payment Beneficiaries of foreign assistance monies are typically pre-
qualified to ensure eligibility, and if they are able to get a bank account or validate their
identity for a wire transfer, this creates a relatively low risk scenario with regard to the
Standards and Practices Report for Electronic and Mobile Payments 53
Risk Analysis and Mitigation: Legal Risk
misappropriation of funds. The chain of ownership and receipt is all objectively verifiable
through bank records.
In addition to the mitigation strategies described for financial risk, government regulation
is an important mitigant against legal risk. In the U.S. FATF regulations require financial
institutions to assist the government in detecting and preventing money laundering. There
is a specific requirement to report withdrawals or deposits of more than $10,000 in cash –
an amount which may vary based on the country’s economic environment. Financial
institutions are also required to monitor and report any suspicious activity.
Pre-paid cards, while more digital in nature, can retain some anonymity if not
authenticated, and can represent moderate to significant legal risk. In developed countries,
pre-paid cards have become prime vehicles for money laundering due to their relatively
anonymous nature. Also, pre-paid cards are very portable and allow money to move across
country borders with little control. However, in the case of USAID Missions or
Implementing Partners it is possible to implement controls to eliminate anonymity and to
embed merchant category controls to reduce misuse of funds. This may include Payment
Beneficiary pre-screening and post-disbursement verification, as well as pre-paid card
distribution controls.
Mobile payments platforms have the potential to reduce financial exclusion and transition
the cash economy to a more transparent and traceable digital payment economy. FATF, an
inter-governmental body that sets standards to combat money laundering and terrorist
financing, has noted that the prevalence of a large, informal, unregulated, and
undocumented economy negatively affects AML/CFT efforts and can generate significant
money laundering and terrorist financing risks.46
There are some unique legal risks associated with mobile transactions due the nature of
the mobile payment ecosystem. Namely, the anonymity of the device and the rapidity with
which transactions can be conducted present opportunity for money laundering activity.47
The GSMA has further defined the risk by stage in the mobile money process. Figure 14
details the Mobile Money Methodology for Assessing Money Laundering and Terrorist
46
FATF Guidance Anti-money laundering and terrorist financing measures and Financial Inclusion, June 2011)
47
While a few countries have passed mandatory identification for cell phone buyers, a bill introduced in the U.S. Congress
in the aftermath of the attempted bombing of Times Square in 2010, S 3427 Pre-paid Mobile Device Identification Act,
was not passed
Financing Risk.48
Figure 14: Mobile Money Methodology for Assessing Money Laundering and Terrorist Financing Risk
General Risk Factors Loading Transferring Withdrawing
Multiple accounts can be Suspicious names cannot Allows for cashing-out of
opened by criminals to be flagged by system, illicit or terrorist funds
Anonymity hide the true value of making it a safe zone for
deposits known criminals and
terrorists
49
Criminals can “smurf” Criminals can perform “Smurfed” funds from
proceeds from criminal multiple transactions to multiple accounts can be
Elusiveness
activity into multiple confuse the money trail withdrawn at the same
accounts and origin of funds time
Illegal monies can be Transactions occur in real Criminal money can be
quickly deposited and time leaving little time to moved through the
Rapidity transferred out to another stop it if suspicious of system rapidly and
account terrorist financing or withdrawn from another
laundering account
As with systemic risk, the mitigation strategy for legal risk with regard to electronic
payments and mobile payments are quite similar. As leaders in AML/CFT have advocated,
legal risk must be considered and regulated in proportion to the magnitude of risk.
Without said proportionality, payment systems could become excessively difficult in a
given country.
With large percentages of the world’s population currently unbanked, there is a potential
for mobile financial services to increase financial inclusion. Imposing strict regulatory
burdens that this segment of the population can’t fulfill will keep them excluded from
financial access. It will also keep cash payments out of the scope of supervision, thereby
enabling the very money laundering and terrorist financing that regulation was enacted to
prevent. Current research on this topic advocates that measures be put in place to allow
more consumers to use formal financial services to reach the AML/CFT goals.50
However, steps must still be taken to minimize legal risk to the extent possible while
maintaining focus on financial inclusion. FATF proposes a risk-based approach (illustrated
in Figure 15) to decision- and policy-making with regard to AML/CFT objectives. The intent
is to retain a firm stance on the criminality of money laundering and terrorism financing,
while allowing for sufficient flexibility in the adoption of local policies and standards that
48
Adapted from “GSMA Mobile Money for the Under-Banked: Mobile Money Methodology for Assessing Money
laundering and Terrorist Financing Risk”, page 15
49
Smurfing is the practice of executing financial transactions (such as the making of bank deposits) in a specific pattern
calculated to avoid the creation of certain records and reports required by law
50
Bester, H., D. Chamberlain, L. de Koker, C. Hougaard, R. Short, A. Smith, and R. Walker. 2008. Implementing FATF
Standards in Developing Countries and Financial Inclusion: Findings and Guidelines. The FIRST Initiative. World Bank,
Washington, DC
This approach allows governments and private institutions, depending on which is driving
modernization in the area of electronic and mobile payments, to focus on due diligence
and prevention within the framework of an accepted benefit/cost determination. By
adopting such an approach, competent authorities and financial institutions are able to
ensure that measures to prevent or mitigate money laundering and terrorist financing are
commensurate with the risks identified.
The GSMA has also developed a Methodology for Assessing Money Laundering and
Terrorist Financing Risk, which is illustrated in Figure 15, below. The Methodology
elaborates a systematic approach for assessing the vulnerabilities of mobile money to legal
risks, understanding how these vulnerabilities could be exploited by money launderers and
terrorists, and identifying appropriate and effective tools to mitigate identified risks.52
Figure 15: Comparative risks of mobile money and cash, before and after controls applied
General Risk Mobile Money Mobile Money
Description of Controls
Factors Before Controls After Controls
High Risk Low Risk · Customer profile building – includes registration
Anonymity
info (name, unique phone number, etc.)
High Risk Low Risk · Limits on amount, balance, frequency and number
Elusiveness of transactions
· Real-time monitoring
Low Risk Low Risk · Real-time monitoring
· Frequency restrictions on transactions
Rapidity
· Restrictions on transaction amount and total
account turnover in a given period
Lack of Oversight High Risk Low Risk · N/A
51
FATF: International Standards on Combating Money Laundering and the Financing of Terrorism & Proliferation,
February 12th
52
GSMA Mobile Money for the Under-Banked: Mobile Money Methodology for Assessing Money laundering and Terrorist
Financing Risk, page 18.
53
10 Things You Thought You Knew About M-Pesa. CGAP. November 22, 2010.
http://technology.cgap.org/2010/11/22/10-things-you-thought-you-knew-about-m-pesa/
54
Haiti Leads in Mobile Payments. Partners in Pre-paid. April 23, 2012.
https://www.partnersinpre-paid.com/topics/articles/haiti-leads-in-mobile-payments.html
By assessing risk both before and after such mitigating controls are in place, service
providers and regulators can evaluate the appropriateness of such mechanisms. A risk
assessment once such controls have been applied then becomes an input to the
establishment of standardized customer due diligence requirements that are appropriate
to the unique risk profile of a given environment.
· Interoperability
· Customer identification and authentication
· Provider governance
Operational risks are significantly different for mature payment types (EFT and cash) than
they are for pre-paid cards and mobile payments. For ease of understanding, this section
focuses on general accessibility and security-related operational risks for EFT and cash
payments only. The following sections will go into each of the three operational sub-risks in
the context of electronic and mobile payments.
regions with no national identification system. This can lead to identification issues that
can result in fraud and the misappropriation of funds. In addition, there is significant
opportunity for theft throughout the transfer process, and once stolen or redirected, cash
can be easily reused without any traceability. Operational risk with cash is significant.
The most important aspect of operational risk for cash is physical security of currency.
Standards and practices for the safe storage and transportation of cash can be
implemented to mitigate this form of operational risk.
Many USAID Implementing Partners have developed best practices for cash payments,
based on their experience in the field, that help to mitigate accessibility and security risks.
It is clear, based on the analysis of current payment types, that there is significantly higher
operational risk associated with cash than with EFT. EFT payments presuppose that both
the distributor of funds and the Payment Beneficiary have bank accounts. In this case,
funds accessibility and security are guaranteed by the bank. In a given USAID Mission
environment, operational risk related to EFT is negatively correlated with the strength and
maturity of the banking sector.
Mitigations for operational risk in EFT payments are related to proper assessment of
banking sector strength and stability, as well as a review of bank policies with regard to
guarantee of payments, transfers and insurance of funds.
Operational risks are perhaps the most significant consideration for USAID, as this risk
category serves to highlight important differences in the way the four payment types
function in practice. As will be made clear in the following sections, a number of new
operational risks must be considered with the introduction of electronic and mobile
payments, and, if evaluated in a vacuum, those risks may result in a biased evaluation.
When applying this information to a country-specific payments evaluation, Mission
personnel and Implementing Partners should consider risks related to interoperability,
electronic customer authentication and provider governance in parallel to realistic
evaluation of funds security risks for cash and EFT transactions.
In order for electronic and mobile payment systems to be interoperable, three conditions
must be met:
55
International Standards Organization, http://www.iso.org/iso/home.htm
A certain level of interoperability has been achieved for electronic payments in the form of
pre-paid cards. As long as a merchant has a point-of-sale device that can accept card
transactions for the associated payment network, the underlying technology is in place to
transfer payment data regardless of the data service provider.
True interoperability has not yet been achieved for mobile payments. Market competition
in mobile network technology has resulted in the development of different transaction sets
and message formats. There does not yet exist a mobile operator “switch” that could be
compared to the switches operated by payment networks.
Beyond just technology issues, there are interoperability issues related to business
relationships. The multiple players in the mobile payments ecosystem have yet to establish
general economic terms of participation, indicating roles, fee structures for network
transfers and terms for data-sharing.
56
Interoperability and related issues in branchless banking and mobile money: by Kabir Kumar and Michael Tarazi :
Monday, January 9, 2012
57
Figure 17: Interoperability Issues
For these reasons, establishing and enforcing common standards to ensure interoperability
is currently in the domain of national governments or supra governmental organizations.
The extent to which this occurs, and the effectiveness of such efforts will, of course, vary
from country to country, however there are some international standards that can be used
to develop local policies. The European Union, for example, has released Mobile
Contactless Single Euro Payments Area (SEPA) Card Payments Interoperability
Implementation Guidelines (EPC58 178-10) through its European Payments Council. The
stated objectives for these guideless include:
· Clarify the position of the European Payments Council (EPC) to ensure the interests
with regard to standardization and industry bodies.
· Define the minimum level of security for the whole mobile payment value chain in
order to establish confidence in this environment.59
In contrast to the concerted effort made by the European Union, there are few individual
countries that have developed interoperability mandates. In many markets, however,
industry associations and standards bodies have started formulating interoperability
standards that local country competitors can adopt to support growth in their local
markets. One example is the Mobile Payments Forum of India (MPFI) and the
Interoperability Standards for Mobile Payments. The standards cover typical transaction
flows as well as technical and security standards.
In many markets, MNOs are leading the development of mobile payment system
standards. The GSMA, a global MNO trade organization, weighs the consumer demand for
interoperability and the investment required on the part of mobile money stakeholders.
Given that the “walls” in the walled gardens of mobile money are, as we have seen,
porous, it is not obvious that imposing interconnection would create significant
welfare gains for customers. Indeed, it might have the opposite effect, if mobile
operators must raise prices or curtail investment in other areas in order to
implement interconnectivity.60
While global standards and leading practices are still emerging, there are some examples in
the market of successes in interoperability for mobile payments. For example, M-Pesa
allows consumers to send money to any phone, even outside of the Safaricom network
(which is M-Pesa’s exclusive partner). Non-Safaricom Payment Beneficiaries are sent a
voucher with a one-time PIN, which they can take to Safaricom agents to withdraw cash.
This is not a technology solution to interoperability, but it does allow for mobile payment
execution across networks.
There are similar examples for pre-paid cards. Smart Communications in the Philippines
has partnered with MasterCard to issue Smart Money MasterCard debit cards that enable
consumers to use their mobile money wherever MasterCard is accepted, domestically and
internationally. Wizzit in South Africa has done the same thing. Where ATMs are available,
Wizzit subscribers can use their Wizzit MasterCards to deposit and withdraw cash. Where
merchants have MasterCard terminals at the POS, Wizzit subscribers can use their cards to
make payments using their Wizzit accounts.61
59
Mobile Contactless SEPA Card Payments Interoperability Implementation Guidelines
60
GSMA — Mobile Money for the Unbanked. The case for interoperability: Assessing the value that the interconnection
of mobile money services would create for customers and operators
61
Developing Mobile Ecosystems, Beth Jenkins
With respect to USAID Missions or Implementing Partners investigating the use of mobile
payments, interoperability may be one of the most important factors. The idea of
mandating use of a specific MNO in order to received funding is counter to effective
delivery of foreign aid. As noted in prior sections, when examining payment types that
differ from the current state, a thorough analysis of benefits to Payment Beneficiaries is
strongly recommended. However, in the interim USAID may find it beneficial to collaborate
with either direct or indirect stakeholders to support mitigation of interoperability risk.
This may include:
· Standards Development – Similar to the standards that have been set by the
mobile industry to facilitate the sending and receiving of SMS messages, standards
for mobile payments could be developed by payment networks or mobile operator
associations such as GSMA or Cellular Telecommunications and Internet Association
(CTIA). This approach might be premature as the market is still developing new
technical solutions and innovation could be dampened. However, it is possible
USAID could be a key collaborator in this process.
· Payment Hubs – Create payment hubs that participants in the market can connect
to similar to payment switches. This is an approach that will require an upfront
commitment by a group of market participants in the software and hardware
industries. Potentially, this investment could include participation from USAID.
· Coalition Building – In the absence of standards or hubs, bi-lateral agreements
between service providers can expand access for the use base of both service
providers without having to gain cooperation of all participants in the marketplace.
approaches have been identified by USAID, international standards bodies and in- country
regulation to address these questions.
In this section we look in detail at the requirements for conducting customer due diligence,
best practices in customer authentication and finally data security standards for personally
identifiable customer data.
Operational risk related to customer identification and authentication for electronic and
mobile payments is very similar to financial and legal risk. If a payment system is unable to
reliably and consistently validate the actors in a payment transaction, the risk of fraud and
misallocation of funds for illicit purposes is present. Customer identification and
transaction monitoring not only help to mitigate against money laundering, but also play
an important role in marketing and fraud prevention.
Customer Identification
The process to address the initial customer identification must be designed to address the
following areas:
While global standards for this process continue to emerge, FATF has provided guidelines
with respect to the due diligence process for financial institutions. Specifically, “[u]nder
AML/CFT legislation, customer due diligence (CDD) policy objectives are to ensure that
financial institutions can effectively identify, verify and monitor their customers and the
financial transactions in which they engage, in accordance to the risks of money laundering
and terrorism financing that they pose.”62 These guidelines, in addition to approaches
identified by USAID, in-country regulators, and other international standards bodies,
provides a framework for addressing each of the four aforementioned areas.
Figure 18 provides a table for assessing the different types of customer identification
processes and actors typically available in countries where electronic and mobile payments
are an option.
62
FATF Guidance, Anti-money laundering and terrorist financing measures and Financial Inclusion, page 25
Additionally, the Customer Identification Program (CIP) final rule, interpreting Section 326
of the USA Patriot Act63 provides the following minimally required data elements for
opening individual customer accounts.
· Name
· Date of Birth
· Residential address
· Identification number
In addition to these data elements, mobile money initiatives have access to the unique
identifiers of Phone number and SIM card ID, and pre-paid card transactions have the
ability to track payments through the unique payment card ID number.
63
USA Patriot Act of 2001. Public Law 107–56—Oct. 26, 2001, Section 326.
Realistically, there are countries in which USAID Missions and Implementing Partners
operate where no government issued ID exists, where birth records are unavailable and
where residential addresses are not used. If possible identity should be verified through
alternative sources. For example, if available, third party databases or financial IDs
established by banking consortia or credit agencies can provide an alternative source.
However, making use of such resources requires thorough and well-structured due
diligence on the part of the payment provider. The proper standard of due diligence,
however, is not static and should be commensurate with the risk profile of the payment
environment.
Compliance of customer due diligence processes with any established national standards is
dependent upon the entity performing the due diligence. In some countries the
identification of potential customers is performed by government agencies, which is
generally considered to be the strongest form of customer identification. As a standard
business practice, customer identification should be performed by the account holding
entity, whether that is a bank, credit card company or MNO. As discussed below in the
section on agent governance, the process for performing customer due diligence can also
be performed by a third party, but the responsibility remains with the account holding
entity.
Customer Authentication
Once a customer’s identity has been confirmed and an account set up, the customer has to
be provided with tools to access his or her account that will identify him as the authorized
user. For card-based electronic payments there are two types of points of interaction (POI)
where consumers are authenticated: POS payments and Card Not Present (CNP)
transactions, such as on-line shopping.
The strengths and limitations of current card based customer authentication methods are
apparent. At the POS, customers are authenticated by presenting their card and signing the
receipt where the signature is compared to that on the card, or by entering a PIN that is
validated off-line or on-line.
64
USAID Mobile Financial Services Risk Matrix , published by USAID in July 2011
In CNP transactions, customers enter their card details but there is currently no widely
accepted method for validating that the transaction is being conducted by the authorized
user. (VISA and MasterCard have launched additional verification tools such as MasterCard
Secure Code but they have not been adopted widely). Fraud in CNP transactions therefore
tends to be more common than fraud at the POS. One method increasingly used by on-line
merchants and banks is to perform “device fingerprinting” that prevents IP addresses
originating from high risk areas from transacting.
Building on best practices from card-based electronic payments and leveraging the
additional data provided by the mobile device, the best practice for mobile financial
services authentication is two-factor authentication. Two-factor authentication is best
described as something that you have (phone, SIM card) and something that you know (a
bank issued PIN). This helps to address efforts to defraud a mobile payment system
through “spoofing” of SIM IDs in a single authentication transaction. This occurs when an
attacker sends SMS messages into the messaging network with “spoofed” originator IDs in
an attempt to either withdraw money from the account, or to encourage the mobile
account-holder to send funds to a fraudulent recipient.65
The leading mobile carrier association in the U.S. CTIA has published best practices and
guidelines on customer authentication, including:
· Encourage regular PIN changes – Offer the opportunity for customers to change
their PINs on a regular basis. This reduces the risk of jeopardizing an old PIN. Note
the difference between a SIM/phone PIN and a bank-issued PIN.
· Provide tiered access – Base available functionality on the level of authentication
used to access the service.
· Use information available – Certain unique information about the SIM card (IMSI)
may be obtained working in cooperation with the network service providers. Use
this information as a second factor authentication mechanism, to allow you to
identify when a fraudulent SIM swap happens.66
Strong customer authentication processes are essential to verify that card and mobile
device transactions are conducted only by authorized users. Unfortunately, breaches at
65
Risks and Threats Analysis and Security Best Practices: Mobile 2-Way Messaging Systems. Mobile Payment Forum. May
13, 2003.
66
Best Practices and Guidelines for Mobile Financial Services. CTIA
card processors have increased, and the importance of safeguarding customer data cannot
be overemphasized.
Maintaining customer data security is a challenge for which the electronic payments
industry has put standards in place, namely the Payment Card Industry (PCI) standard. In
major debit and credit card markets, PCI Data Security Standard (PCI DSS) compliance is
required for all entities that store, process and/or transmit cardholder data. While
compliance with PCI standards67 is perceived to place a reporting and financial burden on
payment system stakeholders, adoption of the standards has helped reduce fraud across
the system. CTIA has adapted the card industry’s PCI DSS to ensure protection of customer
data on the phone:
For Mobile Phone Banking PCI potentially applies on several levels. Securing
the network that stores, processes and/or transmits cardholder data.
Ensuring the devices used are PCI [PIN Entry Device] PED or Encrypting PIN
Pad (EPP) compliant. Ensuring the devices use only applications that comply
with the [Payment Application Data Security Standard] PA-DSS requirements
such that cardholder activity is always secured.68
Mitigating customer identification and authentication risk is critical to the proper design of
any program that includes payments to Payment Beneficiaries. In the case of cash
payments, USAID Missions and Implementing Partners have long been addressing this
concern through the use of potentially cumbersome processes and burdensome logistics.
(See Figure 5 in Section 3.2.2.) USAID understands that when examining new payment
types, it is important that lower cost processes or logistics not undermine the need for
identification and authentication.
67
See Appendix A.4. for PCI DSS Rules
68
Best Practices and Guidelines for Mobile Financial Services. CTIA
Poor provider governance can result in a number of risks to the consumer and the systems.
The most important of these are:
· Lack of provider stability and the potential loss of a customer’s funds.
· Lack of sufficient agent supervision and the potential for fraud.
Whether the account holder is a MNO or a bank, the provider of the mobile money service
will play a key role in ensuring the execution of the end-to-end financial transaction.
Ensuring that the provider selected to operate a pre-paid card or mobile money service has
the adequate processes and controls in place is the first step to minimizing risks arising
from poor provider governance. While there are specific requirements that the local
partner needs to meet in order to address these potential risks, the first screening process
should use the general intent of the USAID ADS 630.
Mobile money providers need to demonstrate that they are able to deliver the service to
the intended recipient in a compliant way. This includes having robust standards and
procedures for governance and operations and infrastructure that adhere to best practices
commonly associate with financial institutions and/or those advocated by organizations
like the GSMA.
Mobile money providers should also demonstrate awareness of regulatory guidelines that
apply to mobile payment products and services, produce a plan to ensure compliance with
such regulation, provide reporting on operational metrics and be able to flag potential
compliance issues.
Figure 19 below details the areas in which standards and procedures should be evaluated
when considering the state of provider governance.
Mobile money providers have also developed and rolled out transaction confirmation
processes that provide transaction documentation for control and audit purposes. This
documentation is available on-line and includes sender, recipient, amount, date and
transaction status. Two examples are included below. Figure 20 shows the “Completed
Transaction Report” provided by Orange Money.
USAID should encourage Implementing Partners to conduct due diligence with respect to
provider governance. For example the existence of adequate provider governance reduces
risks associated with Payment Beneficiary identity. This may be especially important in post
or current conflict environments where the perception of receiving funds from the U.S.
government could cause physical security and safety concerns. Additionally, the presence
of sufficient internal and governance controls can serve to mitigate risks created by an
immature regulatory or enforcement environment.
The frequency of service and power outages in local environments that would affect the
ability of Payment Beneficiaries to access funds are an important environmental condition,
and a contributor to the overall technology risk for EFT, pre-paid cards and mobile
payments. This kind of risk it typically difficult to mitigate at the program-level, so it is
better considered as a precondition to adopting any electronic payment type.
The risk of technology evolution and eventual obsolescence has fewer short-term
implications for Payment Beneficiaries. Evolutions within a payment technology tend to be
incremental and backwards compatibility is typically taken into consideration by providers
in order to encourage adoption. However, technological capability may also evolve to
make a payment technology obsolete. For example, if a new form of technology-specific
authentication is developed, it could make older iterations of similar technology without
such authentication capability obsolete. This kind of risk should be a consideration when
determining suitability for USAID programs.
Cash payments are executed through physical in person methods. These methods are not
supported by technology solutions and do not require technology to operate. As a result,
no technology risks exist for cash payment methods.
Additionally, these systems are vulnerable to cyber-crime, whereby the system is targeted
by cyber-criminals with the objective of stealing confidential payments information or
embezzlement. This is considered a lesser risk due to the insulation of the systems on bank
platforms within the banking network and the relative sophistication of system security
and procedural controls.
For EFT payments vulnerable to system outages due to country utility infrastructure issues
risks can be mitigated by individual institutions. This can be achieved through the
establishment of disaster recovery programs and the maintenance of independent power
facilities and offsite system replication capabilities. This type of emergency contingency
planning is a standard part of corporate practice in developed economies. USAID can
encourage institutions to make contingency planning part of standard business practices to
reduce the risk from utility infrastructure issues.
Pre-paid card payments are executed using payment card network technology. These
systems are owned and operated by payments network schemes (VISA, MasterCard, China
UnionPay etc.). In order to issue pre-paid cards, participants must be "certified" by
network schemes. A rigorous technology assessment is conducted of applicant issuer
systems prior to network scheme approval. As a result, technology risk for pre-paid cards is
driven primarily by circumstances within each country (e.g., system outages due to
national utility infrastructure failures or limitations of national payments systems).
Pre-paid card payment methods are also susceptible to technology risk through hardware
exploitation. The most popular form of this is called "skimming", where the criminal
appends a piece of hardware to an ATM or POS device that duplicates and saves the
confidential card details. These details are then used to create a replica card that can be
used to embezzle funds.
Finally, pre-paid cards payments are also vulnerable to cyber-crime. In this instance, cyber-
criminals attack network systems through the internet with the objective of stealing
confidential payments information. This is considered a lesser risk due to the insulation of
the systems on network platforms and the general sophistication of these systems.
For pre-paid card payments vulnerable to system outages due to country infrastructure
issues, risks can be mitigated by individual institutions through the establishment of
disaster recovery programs and the maintenance of independent power facilities and
offsite system replication capabilities. This type of emergency contingency planning is a
regular part of corporate practice in developed economies.
The risk of fraud through "skimming" has been successfully lowered in developed
economies by the introduction of new technology (e.g., Chip and PIN) using the EMV
standard. This technology requires the user to enter a pin number to authenticate every
transaction. Cardholder and ATM/POS operator education can also be effective tools in
preventing card "skimming". The large networks also operate fraud detection software
that tracks patterns to provide early warning fraud alerts. Cards identified using this
method are stopped for payments until the issue is investigated and resolved.
In addition, mobile payments are executed using a variety of payment technologies (e.g.,
NFC, browser, native payment application, bill to carrier, and message based). These
technologies span mobile proximity payments and mobile remote payments and each
contains specific risks. These can be categorized into three primary risk groups: hardware
risk, software risk, and operating platform risk.
Hardware technology risk for mobile remote payments is risk associated with the physical
elements of mobile devices (e.g., SIM card, SD card etc.). The risk associated with hardware
failure is low as the majority of hardware used in mobile devices is established and tested
in the consumer environment.
Some software technology risks for mobile remote payments exist. As previously noted this
software can take the form of a mobile web-browser, a native application, or a SMS
payment. The technology risk is significant as technology security is relatively weak and
proven industry security standards do not exist. In addition, mobile web-browsers and
native applications store sensitive consumer data and operate weak encryption technology
that is vulnerable to cyber-attack. In these instances attackers can target software
weaknesses to steal sensitive payment information (e.g., account and security
information). SMS payments can also be compromised by baseband attacks, whereby the
attacker can access the mobile device through the baseband by replicating a cell tower,
also potentially gaining access to sensitive payment information. However, it must be
noted that, to date, no mobile payments software breach has resulted in a significant
financial loss or a loss of data.
Operating platform technology risk for mobile remote payments is centered on wireless
internet and telecommunication networks. Technology risk for these elements is notable
as a proven industry standard does not exist and relatively weak encryption can be
As above, hardware technology risk for mobile proximity payments is risk associated with
the physical elements of mobile devices (e.g., NFC chip, SIM card, SD card etc.). Again, the
risk associated with hardware failure is low as the majority of hardware used in mobile
devices is established and tested in the consumer environment. NFC communication also
utilizes the proven security technology standard EMV. The risk of compromise from cyber-
attack is also low. This can take the form of "sniffing" or "listening", where a third party
intercepts payments data broadcast via the NFC chip. This is deemed a low risk as the
broadcast range and duration of NFC transmissions is short (up to 10 cm and generally 1
second) and listening devices would be visible to the mobile phone user.71
Software technology risk for mobile proximity payments is centered on native applications
that are downloaded to the mobile device and used as virtual wallets. Technology risks for
these elements exist as the applications are not designed to any industry standards and
new technologies are unproven in security terms. Tests performed by ViaForensics on the
Google wallet application revealed significant weaknesses that allowed the tester to access
a significant amount of confidential consumer data housed in the application (e.g., balance,
limits, transaction information, PIN numbers).72 However, to date there has been no
significant instance of payments fraud for mobile proximity payments.
Operating platform technology risk for mobile proximity payments is not applicable as
neither a wireless network nor a mobile phone network is utilized to execute the
transaction.
As noted above a significant technology risk for this payment method is derived from the
coverage and functionality of the network infrastructure and the country utilities
infrastructure. Country utility infrastructure issues can be mitigated by individual
69
A packet sniffer is software that captures data packets as data streams flow across a network, decodes the packet's raw
data, showing the values of various fields in the packet, and analyzes its content.
70
A Man-in-the-Middle attack is a form of active eavesdropping in which the attacker makes independent connections
with the victims and relays messages between them, making them believe that they are talking directly to each other
over a private connection.
71
Oracle, An Introduction to Near-Field Communication and the Contactless Communication API, June 2008
72
Mobile App Security and Payments, ViaForensics. Presented at 2012 Payments Forum
institutions through disaster recovery programs but these risks need to be individually
evaluated based on the specific circumstances of each particular case.
In addition to those listed above, user education activities can be used to mitigate the risk
of loss from technology failure. In this case, users are educated to recognize and report
incidents of fraud (e.g., phishing attacks) and mandated to change their PIN numbers at
regular intervals. In addition, users are regularly reminded of security risk and informed of
best practice for guarding sensitive information, SIM cards, and phones. Around-the-clock
service support is also provided, where security breaches (e.g., lost / stolen phones) can be
reported and cancellation procedures implemented.
Though there is no direct ability for USAID to influence technology standards applied
across the various payment methods, USAID is in a position to encourage Missions and
Implementing Partners to evaluate electronic and mobile payments providers based on the
standards and practices that they have put in place with the technology that they use, as
well as the degree to which they have identified and documented the unique risk profile of
the local environment. Ideally, payment providers will have also established reasonable
and logical customer due diligence procedures that will help to mitigate technology risks.
USAID HQ þ þ þ þ
USAID
Missions þ þ þ þ
Stakeholders
USAID
Implementing þ þ þ
Partners
Payment
Providers þ þ þ þ þ
Payment
Beneficiaries þ
Good communication is vital to protect against - and repair - reputational damage. This is
particularly important in a crisis when the ability to respond quickly and effectively to a
difficult situation can enable an organization to defend and oftentimes enhance its
reputation.74
The reputational risk associated with cash disbursements is primarily focused on fraud and
theft. For example, reputational risk arises when cash disbursements are intercepted and
redirected from intended sources through corrupt government or payment partner
practices. The Payment Beneficiary may become disenfranchised and the reputation of
USAID can be damaged as a result of the incident. The long term impact on the USAID
brand through association with corrupt or partners, or partners incapable of mitigating
payment risk, can ultimately limit USAID’s ability to meet development objectives.
Reputational risk associated with the transfer of funds using EFT systems is focused
primarily on payment partner selection. The ability of a selected institution to deliver on
the agreed terms of service will reflect on the brand and reputation of USAID. The risk
associated with a given partner varies based primarily on the honesty of the employees
working for the institution and the strength and sophistication of both operating controls
and system security in place.
In general, interbank EFT systems are strong, internationally-recognized systems that form
part of country payment networks and are regulated by government regulatory
authorities, normally a financial services regulatory body or the central bank. The
reputational risk associated with these types of systems is low due to strong system
security and associated procedural controls. However, intra-bank EFT systems can be
proprietary bank systems that can vary significantly in terms of process and system
strength and sophistication. The reputational risk associated with this payment type must
be evaluated based on the individual circumstances of each institution.
Reputational risk from EFT payments is already lower than that of other payment methods
due to the presence of strong system security and associated procedural controls at the
established system providers. Further mitigation can be achieved through implementation
of a rigorous partner selection process, whereby partners are evaluated against best
practice operating standards to ensure capability to deliver to agreements in a manner
acceptable to USAID.
In addition, exposure to reputational risk caused by failure of the EFT payment method can
be mitigated by the establishment of strong communications channels with payments
partners and ensuring appropriate response procedures are in place to manage developing
situations, including escalation criteria.
Reputational risk associated with pre-paid cards has a number of distinct elements. These
can be grouped into: fees, illicit activities, and functionality / partner selection.
As noted previously, pre-paid cards are operated using a fee-based revenue model
whereby both the cardholder and the merchant can be charged a fee during the execution
of a transaction. These fees are effectively the price for the service. However, unlike the
price paid for other goods and services, it is often difficult to discern the exact fee being
charged. This can lead to cardholder and merchant dissatisfaction and create ill-will toward
the service provider. If the fees are not disclosed, this could cause brand and reputation
damage to USAID through association.
Pre-paid cards can also be used for illicit activities such as embezzlement and money
laundering. As previously noted, this is due to the relative anonymity associated with this
method where cardholder authentication is not required and the size of the card makes it
easy to store and carry large quantities of money across borders. This type of activity could
cause damage to the product by reducing market confidence in it as a tool and
consequently limit its effectiveness for payment disbursement.
There is also reputational risk associated with functionality / partner selection for this
payment method. As most of the operators in this space are large global corporations this
is a lesser concern than other risk elements. However, there are a growing number of
national network providers (e.g., Australia - EFTPOS, China – China Unionpay, and Canada -
Interac) and as an exercise in prudence partner ability to deliver agreed services and
partner operating practice standards should be evaluated in the context of potential
impact on reputational risk.
In order to mitigate the risk associated with existing pre-paid card scheme fee
infrastructure, a number of financial services regulators have initiated regulatory reform
aimed at increasing transparency and competition in the payments process (e.g., Canadian
2010 Code of Conduct Legislation75, U.S. Durbin Amendment76, etc.). These regulations
impose requirements and standards with regard to fee transparency, contract cancelation
policy and network compatibility to prevent technology-driven monopolies. Some
countries have established national payments networks as a means of improving
stakeholder confidence in the system. For examples, India recently launched the new
Rupay network for domestic transactions. A network initiative aimed at increasing
merchant participation in the payments system through the provision of transaction
services for a flat low cost fee. 77
To mitigate against reputational risk derived from illicit activities, payment card network
75
Code Of Conduct for the Credit and Debit Card Industry in Canada. http://www.fin.gc.ca/n10/data/10-049_1-eng.asp
76
Anisha. The Durbin Amendment Explained. NerdWallet.com. http://www.nerdwallet.com/blog/banking/durbin-
amendment-explained/
77
Deloitte Research, 2012
schemes are increasing card security through the introduction of two-factor identification
processes for transaction execution. This has proved an effective deterrent to criminals
when applied to other payment card products (e.g., debit and credit chip and PIN).
Functionality / partner selection reputational risk mitigation is similar to that described in
the EFT section, where a rigorous partner selection process is required to ensure that all
approved partners can deliver on agreements in a manner acceptable to USAID.
Similar to pre-paid payments the reputational risk factors associated with Mobile
payments can be grouped into: fees, illicit activities, and functionality / partner selection.
As previously described, there is no standard fee model for mobile payments. As a result
the fees charged to the mobile phone user and merchant are often confusing. This could
cause user and merchant dissatisfaction and lead to a loss of confidence in the payment
method. If the fees are not disclosed, this could cause brand and reputation damage to
USAID through association.
Mobile payments can also be used for illicit activities such as embezzlement and money
laundering. This is due to the relative anonymity associated with this method where user
authentication is not always required and transactions can be executed remotely. In
additional mobile payments are also deemed more susceptible to "smurfing" (the practice
of splitting transactions into smaller sums to avoid notice).78 This type of activity could
cause damage to the product by reducing Payment Beneficiary and merchant confidence in
the payment system, and consequently limit its effectiveness for payment disbursement. If
associated with illegal drugs or terrorist activities these could cause significant brand
damage to USAID.
There is also reputational risk associated with functionality / partner selection for this
payment method. As many of the operators in this space are large global corporations,
such as Vodafone, MTN, this is a lesser concern than other risk elements. However, there
are a significant number of national network providers and as an exercise in prudence
partner ability to deliver agreed services and partner operating practice standards should
78
Integrity in Mobile Phone Financial Services Measures for Mitigating Risks from Money Laundering and Terrorist
Financing, World Bank Paper No. 146, 2008
Fee issues for mobile payments can be mitigated in the same manner as pre-paid cards
where the financial services regulators have initiated regulatory reform aimed at increasing
transparency and participation in the payments process. Mobile payments that leverage
payments cards will benefit from existing initiatives, aimed at introducing a standard flat
rate fee for transactions. However, other forms of mobile payments will require specific
regulation. Competition among mobile money providers may also put downward pressure
on fees as has been the case with airtime charges.
Reputational risk derived from illicit activities can be addressed through increased
technology security (e.g., two-factor identification processes for transaction execution).
This has proved an effective deterrent to criminals when applied to payment card products
(e.g., chip and pin). In addition, functionality / partner selection reputational risk mitigation
is similar to that described in the pre-paid card and EFT sections, where a rigorous partner
selection process is required to ensure that all approved partners can deliver on
agreements in a manner acceptable to USAID.
Generally speaking, decision-makers should seek, first, to understand the environment and
payment type options that exist in a given environment, and to determine which payment
types will best serve the needs of the Payment Beneficiaries. Once a level of understanding
is achieved regarding availability and utility of payment types (in the context of program
objectives) payment alternatives can be evaluated against risk factors specific to the
environment. The following sections provide a decision tree and framework to support
such an evaluation.
Determine Risk
Evaluate Decide on
Profile for Evaluate Cost
Payment Type Sutiable Level
Applicable Effeciency
Options Of Risk
Payment Types
This section of the document provides a decision tree for determining which payment
types are to be evaluated and a checklist of potential risks and mitigants. Throughout the
document, a “guidepost” version of Figure 23 will aid the evaluator in identifying which
step of the process they are currently addressing. The first step in this process is to identify
payment type options for evaluation.
type for a specific program, it is necessary to first assess availability and utility of payment
alternatives.
Availability and utility are equally important factors in determining whether a payment
alternative should be considered for use on a USAID program. For example, a target
country may have mature mobile payments system in place, with multiple competitors and
strong regulation. However, if the Payment Beneficiary population is out of range of a
mobile network tower, or if Payment Beneficiaries need to use funds to make purchases
from a vendor that does not accept mobile payments, mobile payments are not really a
viable option for consideration.
Figure 24 provides a decision tree to guide the evaluator in selecting payment types for
evaluation.For each payment alternative, there is a short list of initial screening questions
to help determine if that payment type is both available and useful. If the payment
alternative is determined to meet both criteria, it should be added to the evaluation
queue.
• Is there a notable factor that makes cash payments a non-viable payment method for Payment
Beneficiaries?
• IF NO, ADD CASH TO THE QUEUE
Cash
• Does a functioning banking infrastructure exist?
• Is the banking infrastructure capable of processing international and national EFT requests?
• Are Payment Beneficiaries banked or able to obtain bank accounts?
• Would bank deposits be a useful and viable method for Payment Beneficiaries to receive, access and
make use of funds?
EFT
• IF YES TO ALL, ADD EFT TO THE QUEUE
• Does a functioning credit card payments infrastructure exist (e.g., payments processing, network
schemes, issuing banks, merchant infrastructure)?
• Are Payment Beneficiaries educated on the use of pre-paid cards, or can they be easily educated?
• Would pre-paid cards be a useful and viable method for Payment Beneficiaries to receive, access and
Pre-paid make use of funds?
Cards • IF YES TO ALL, ADD PRE-PAID CARDS TO THE QUEUE
• Does a functioning mobile payment infrastructure exist (e.g., mobile telecommunications network,
mobile payments products, mobile payments infrastructure etc.)?
• Does the Payment Beneficiary population have mobile phones compatible with the payment system?
• Are Payment Beneficiaries educated on the use of mobile payments, or can they be easily educated?
• Would mobile payments be a useful and viable method for Payment Beneficiaries to receive, access and
Mobile make use of funds?
• IF YES TO ALL, ADD MOBILE TO THE QUEUE
Each section provides a specific set of risks as well as three levels of potential mitigants or
current states that the evaluator will use to rate or “score” a specific payment type.
Depending upon the specific risk, the mitigant or current state may not be addressable by
the evaluator. For example, if there is risk with respect to the regulatory environment and
the current state provides for weak amount of mitigation, it may be beyond the control of
the evaluator to directly mitigate. Conversely, if there is risk associated with mobile
penetration rates, it may be possible for the evaluator to directly impact the rating by
providing mobile phones to the Payment Beneficiaries. The ability of the program actors to
influence risk factors by supplying mitigants should be considered during evaluation.
The tables in the following sections should only be completed if the corresponding
payment types passed the criteria in Step 1, and are in the evaluation queue. Additionally,
as risks will change over time, the tables can be appended by the evaluator to account for
either unique environmental concerns or changes since the writing of this document.
The evaluator should complete Figure 25 by checking the corresponding column in each
row for the current state. For many of the risk types, the inherent nature of cash makes it
difficult to establish “Strong” controls.
Documented guidelines
Payment
None for the kinds of N/A
Preparation payments.
Procedures and
preparations for the
secure storage and
transportation
Wire funds into the local
Imprest account.
Payment Beneficiaries
will be pre-selected,
registered and verified
Pre- for eligibility. If
None N/A
disbursement applicable, use a MFI or
CTA
Validate disbursement
schedule against
Disbursement None N/A
Payment Beneficiary
registry and verify chain
of ownership.
Signed and
countersigned registry
sheet with receipt.
Imprest account updated
and budget reconciled
against disbursement
M&E methodology to
Post
verify proper use by N/A
Disbursement Payment Beneficiaries.
The evaluator should complete Figure 26 by checking the corresponding column in each
row for the current state. As noted in previous sections, this table should only be
completed if EFT has passed the initial screening and added to the queue for evaluation.
· Banking System
Unstable Emerging Stable
Stability79
Provider Capability
· Liquidity Established liquidity
management (loan policies but does not Complies with
: deposit ratios, Not documented comply with relevant relevant international
international standards
tier 1 capital
standards
reserve ratios)
Established and Established and
· Internal financial documented financial documented financial
management Not documented management system management system
but not audited by subject to audit by
system
outside entity outside entity
79
Definition: “ A financial system is in a range of stability whenever it is capable of facilitating (rather than impeding) the
performance of an economy, and of dissipating financial imbalances that arise endogenously or as a result of significant
adverse and unanticipated events.” (Source: International Monetary Fund WP/04/187, IMF Working Paper, October
2004)
General Technology
Risk
The evaluator should complete Figure 27 by checking the corresponding column in each
row for the current state. As noted in previous sections, this table should only be
completed if pre-paid cards have passed the initial screening and added to the queue for
evaluation.
· Banking None
Emerging supervisory Established supervisory
Supervision system system
· E-Money None
Emerging electronic Mature electronic
Regulation payment regulation payment regulation
· Issuer
Registration
licensing / None Licensing Requirement
Requirement
registration
Banking System
80 Unstable Emerging Stable
Stability
80
Definition: “ A financial system is in a range of stability whenever it is capable of facilitating (rather than impeding) the
performance of an economy, and of dissipating financial imbalances that arise endogenously or as a result of significant
adverse and unanticipated events.” (Source: International Monetary Fund WP/04/187, IMF Working Paper, October
2004)
General
Technology Risk
· Stability of Service or power outages Occasional service or Service or power outages
service and common or power outages and/or are infrequent and
power unpredictable and/or provider has provider has strong
provider has weak or no contingencies that contingencies
network
contingencies reasonably protect
customers
The evaluator should complete Figure 28 by checking the corresponding column in each
row for the current state. As noted in previous sections, this table should only be
completed if mobile has passed the initial screening and added to the queue for
evaluation.
Government/
Regulatory
Framework
Full FATF Standards
· AML/CFT GSMA standards
adapted to local
No Regulation adapted to local
Regulation requirements and risk
requirements
environment
Segregated accounts
· Consumer for mobile money held Bank Deposit Insurance
None
Protection in bank or trust Fee and rate regulation
accounts
Banking System
Unstable Emerging Stable
Stability81
Provider Capability
Established and Established and
· Internal documented financial documented financial
financial Not documented management system management system
management but not audited by subject to audit by
system outside entity outside entity
81
Definition: “ A financial system is in a range of stability whenever it is capable of facilitating (rather than impeding) the
performance of an economy, and of dissipating financial imbalances that arise endogenously or as a result of significant
adverse and unanticipated events.” (Source: International Monetary Fund WP/04/187, IMF Working Paper, October
2004)
· Alternative
Access to Alternative access Alternative access
Funds by Entity No alternative access
enabled enabled at same cost
Other than
Provider
General Technology
Risk
· Stability of Service or power Occasional service or Service or power
service and outages common or power outages and/or outages are infrequent
power network unpredictable and/or provider has and provider has
provider has weak or contingencies that strong contingencies
no contingencies reasonably protect
customers
In Step 2 of the evaluation process, evaluators are given the option of weighting risk
criteria and sub-criteria. By lowering the weights of higher risk criteria, it would be possible
to produce a lower average risk that is not fully representative in order to avoid separately
documenting a risk tolerance justification. A more useful evaluation process includes both
realistic risk weighting and assessment, examined in the context of program-level risk
tolerance.
After the evaluator has completed the tables for each of the payment types in the queue,
there will be a corresponding amount of “Strong”, “Acceptable”, and “Weak” ratings for
controls and mitigating factors for each of the risks, as well as a determination of weight
based on likelihood and magnitude. The aggregate risk should be considered, qualitatively,
against risk tolerance.
Transactions costs are fees to which an individual payment transaction may be subject, and
which may be imposed on the sender, the recipient or both. In Step 2, the risks of unknown
or variable transaction costs were evaluated. In this section, evaluators should consider all
known costs of payment alternatives as part of the overall evaluation process. These costs
will vary by payment type:
· Transaction costs for cash include any monetary fee and cost of personnel and
equipment involved in the acquisition, transportation, or disbursement of physical
currency.
· Transaction costs for EFT are typically a straightforward fixed fee per transaction.
Payment recipients’ banks will often charge a fee to receive the funds and to
disburse them to the Payment Beneficiary.
· Pre-paid cards can carry transaction costs to both the consumer and to the
merchant where cards are used. In situations where cards are loaded by one
funding entity to benefit many (e.g. disbursement of monthly benefits) there may
also be fees and charges to the funding entity.
· Transaction costs for mobile payments are not yet standardized, but successful
providers (such as M-Pesa) have implemented a fairly transparent tiered fee
structure based on the amount of funds being transferred. The fee is typically
incurred by the sender of funds.
Figure 29 below is intended to apply to any payment type that made it into the evaluation
queue and was analyzed for risk.
Figure 29: Cost Efficiency Evaluation
Weak Control or Acceptable Control Strong Control or Evaluator Risk
Cost Factor
Mitigants or Mitigants Mitigants Rating Weighting
Requires significant
and manual either Payment process is
logistical or Some automation of mostly automated
Administrative administrative payment process and requires limited
support in order to manual intervention.
execute a payment.
Clearly disclosed and
Sender costs Not disclosed Clearly disclosed
competitive
Clearly disclosed and
Recipient costs Not disclosed Clearly disclosed
competitive
Disbursements do not
Disbursements can be
Disbursements cannot require additional
Productivity accomplished with
be executed without dedicated staff but
opportunity minimal additional
significant dedicated take significant time
level-of-effort from
cost time and staff away from other
existing staff
program activities.
partnership should include fallback provisions for all parties involved so that in the
event a systemic failure occurs, the Payment Beneficiaries are not left without
payment. Additionally, provisions may include extra audit, insurance, or
infrastructure requirements. The use of these collaborations provides a relatively
lower risk profile and allows for experimentation to prove longer term viability.
· Regulatory Strengthening or Evolution – Local regulatory bodies and government
entities may respond to the market and modify local regulations to include
consideration of electronic and mobile payment types. If this occurs it could
significantly impact the risk assessment for a relevant program
· Change in Competitive Landscape – If additional electronic or mobile payments
providers enter the market (or if existing entities begin providing mobile payments
services), it could significantly alter the quality and cost of payments services. Of
particular note would be if an established payments provider from another market
– one that had already adopted established industry standards – it could potentially
shift the quality of the entire market.
Offices with responsibility for funds disbursement, which include USAID Mission
Controllers, the Bureau for Management, Office of the Chief Financial Officer, Cash
Management and Payments division, are required to maintain appropriate internal
controls to process payments in the correct amounts payable to the proper vendors within
the specific timeframe established by the Prompt Pay Regulations.
82
CFR stands for Code of Federal Regulations
83
OMB stands for Office of Management and Budget
84
http://www.usaid.gov/policy/ads/500/591saa.pdf
ADS Chapter 625 on accounts receivables and debt collection includes debt
determinations, proper billing methods and routine servicing of USAID accounts
receivables. This section links the electronic paper check conversion to the U.S. Treasury
Automated Clearing House (ACH) system for debit or credit transactions through online
applications. Under ADS Chapter 625, collection by Electronic Funds Transfer (EFT) or
through the Automated Clearing House (ACH) is the preferred method of receiving funds.
The Billing Office must ensure that collection and deposit of funds are made by
M/CFO/WFS or cashier offices at overseas locations in a timely manner.
The ADS Chapter 630 on payables management sets the principles, requirements and
procedures that govern the examination, certification, and payment of basic vouchers,
claims, and other payment requests between certain entities. The payment relationships
covered in this chapter are:
Regulations in ADS 630 also speak to direct payments and intra-governmental payments
and collections (IPAC). However, the chapter does not clearly articulate the payment
process relationship between USAID or contractor and the final Recipient. This is highly
relevant to evaluation of electronic and mobile payment types. It indicates that the part of
the payment process that is most likely to leverage electronic and mobile payments –
contractor or sub-contractor to end recipient – is not addressed by ADS guidelines on
payments.
Under direct payments, USAID reimburses the recipient/contractor or host country for
eligible expenditures that the recipient/contractor incurs and pays. USAID may use this
method of payment with any USAID grant or contract.
The IPAC method of transferring funds between Federal agencies is a component of the
U.S. Treasury Government On-line Link Service (GOALS), and is used primarily for funds
transfer between Federal agencies. USAID accomplishes payment and collection activity for
interagency 632(b) reimbursable agreements between agencies using IPAC for both
payment and collection activity. USAID also uses the IPAC system as a method of funds
transfer between USAID Missions and USAID/W.
There are four key functional roles involved in the USAID payment process.
· The CFO periodically reviews USAID disbursement systems to ensure that USAID
uses the most effective techniques and procedures.
· The Mission Controllers maintain appropriate internal controls to process payments
in the correct amount, payable to the proper vendor and within the timeframe
established by Prompt Pay Regulations.
· The COTRs perform administrative approval on all vouchers submitted under USAID
direct contracts, host country contracts, and inter-agency agreements. The COTRs
will know whether goods or services received conform to what was requested and
whether payment is in order.
· The Contract Agreement Officers ensure that USAID include payment terms and
when payments need to be made by. This includes electronic funds transfers.
ADS Chapter 636 on program funded advances discusses payments made as advances such
as a letter of credit, direct and special letter of commitment, and bank letter of
commitment.
A Periodic advance by treasury check, ACH or EFT is an advance when payment is made to
the recipient by issuance of a Treasury Check, through the Automated Clearing House
(ACH), or by electronic fund transfer (EFT). This method is used when an advance is
justified but the conditions for a Letter of Credit (LOC) cannot be met.
The Electronic Code of Federal Regulations, Part 226, details the administrative
requirements for grants and cooperative agreements awarded by USAID to U.S. institutions
of higher education, hospitals, and other non-profit organizations, to U.S. commercial
organizations and to subawards thereunder.
Standards and Practices Report for Electronic and Mobile Payments 100
Appendix A: Supplemental Information: A.1. Regulatory Environment
A subrecipient is the legal entity to which a subaward is made and which is accountable to
the recipient for the use of the funds provided.
The standards in 226.21 define requirements for recipient’s financial systems, indicating
that, in order to be eligible to receive an award from USAID, a recipient must have in place
a financial accounting system that meets an established threshold. The subarticles of the
regulations specifically require that a recipient’s financial management systems provide:
· Records that identify adequately the source and application of funds for federally-
sponsored activities. These records shall contain information pertaining to all
Federal awards, authorizations, obligations, unobligated balances, assets, outlays,
income and interest.
· Effective control over and accountability for all funds, property and other assets.
Recipients shall adequately safeguard all such assets and assure they are used
solely for authorized purposes.
· Comparison of outlays with budget amounts for each award. Whenever
appropriate, financial information should be related to performance and unit cost
data.
· Written procedures to minimize the time elapsing between the transfer of funds to
the recipient from the U.S. Treasury and the issuance or redemption of checks,
warrants or payments by other means for program purposes by the recipient. To
the extent that the provisions of the Cash Management Improvement Act (CMIA)
(Pub. L. 101–453) govern, payment methods of State agencies, instrumentalities,
and fiscal agents shall be consistent with CMIA Treasury-State Agreements or the
CMIA default procedures codified at 31 CFR part 205, “Withdrawal of Cash from the
Treasury for Advances under Federal Grant and Other Programs.”
Standards and Practices Report for Electronic and Mobile Payments 101
Appendix A: Supplemental Information: A.1. Regulatory Environment
Article 226.53 of this regulation covers the record retention requirements for recipients of
awards. It states that “Financial records, supporting documents, statistical records, and all
other records pertinent to an award shall be retained for a period of three years from the
date of submission of the final expenditure report or, for awards that are renewed
quarterly or annually, from the date of the submission of the quarterly or annual financial
report, as authorized by USAID.”
Closeout procedures
Article 226.71 establishes a term of 90 days for recipients to submit “all financial,
performance, and other reports as required by the terms and conditions of the award.”
OMB Circular A-133: Audits of States, Local Governments and Non-Profit Organizations
OMB Circular A-133 establishes guidelines for the performance of audits on public and
non-profit entities.
Audit requirements
Scope of audit
Standards and Practices Report for Electronic and Mobile Payments 102
Appendix A: Supplemental Information: A.2. Mature Payment Methods
the auditee are presented fairly in all material respects in conformity with generally
accepted accounting principles. The auditor shall also determine whether the schedule of
expenditures of Federal awards is presented fairly in all material respects in relation to the
auditee's financial statements taken as a whole.
(c) Internal control. (1) In addition to the requirements of GAGAS,the auditor shall perform
procedures to obtain an understanding of internal control over Federal programs sufficient
to plan the audit to support a low assessed level of control risk for major programs.
(d) Compliance. (1) In addition to the requirements of GAGAS, the auditor shall determine
whether the auditee has complied with laws, regulations, and the provisions of contracts
or grant agreements that may have a direct and material effect on each of its major
programs.”
The Electronic Funds Transfer Act is from the Financial Institutions Regulatory and Interest
Rate Control Act of 1978 (9). This act defines the rights and responsibilities of EFT
consumers and providers. For example, the act: sets limits on the liability of consumers if
there are errors in an EFT transaction or if an improperly authorized transaction is
executed; establishes the responsibility of consumers for ensuring the security of their EFT
accounts and for reviewing statements provided by the financial institutions; establishes
requirements for the documentation of an EFT transaction that must be provided to the
consumer, including definition of the contents of a receipt provided at the time of a
transaction and the timing and content of periodic statements that are issued by the
service operator; establishes rules governing the issuance of EFT access devices.
OFAC
International transfers involving the U.S. are subject to monitoring by the Office of Foreign
Assets Control (OFAC), which monitors information provided in the text of the wire to
ascertain whether money is being transferred to terrorist organizations or countries or
entities under sanction by the U.S. government. If a financial institution suspects that funds
are being sent from or to one of these entities, it must block the transfer and freeze the
funds.
In Title IV, the law prescribed additional obligations regarding disclosure of account terms,
stricter regulation of allowable fees, and protection of consumers from losses associated
with expiring cards.
Title V, Section 503 required the Treasury Department to issue regulations in final form
Standards and Practices Report for Electronic and Mobile Payments 103
Appendix A: Supplemental Information: A.3. Electronic and Mobile Payments
implementing the Bank Secrecy Act, regarding the sale, issuance, redemption of
international transport of stored value, including stored value cards. The Treasury has since
taken up the issue and proposed a rule (the notice period has ended but a final rule has not
been published as of the writing of this report). The proposed rule:
Office of the Comptroller of the Currency (OCC): The OCC has also addressed store value
cards in OCC Bulletin 2006-34 asking issuers to ensure they adequately inform consumers
and disclose:
· How, when and where to use the card
· How to increase the balance
· Whether interest, dividends or other return is paid on the electronic cash
· All fees charged
· Name of issuer and its obligation to redeem the electronic cash
· What happens to abandoned or expired funds
· Where liability lies if a transaction is not properly consummated
· Where, how and when to redeem cash
· Whether customer is protected if card is lost or stolen
· Whether the amount is insured by the FDIC
· How consumers can resolve disputes involving transactions
· Circumstances under which information about transactions may be disclosed to
third parties
· When the cards are issued by banks, per the same Bulletin they need to:
· Establish that Cards are Issued by a Federally-Chartered Institution
· Consumer’s agreement is with the bank
· Card and disclosures identify the bank as the issuer [advertisements, point-of-sale
materials, Terms and Conditions, collateral, card carrier, and agreements with card
program partners should all reflect bank as issuer
· Bank establishes and imposes the fees and terms
· Bank controls the net proceeds of the fees
· Bank has financial responsibility to merchants that honor the card (holds the funds)
Standards and Practices Report for Electronic and Mobile Payments 104
Appendix A: Supplemental Information: A.4. Risk Analysis and Mitigation
In order to protect the international financial system from money laundering and financing
of terrorism (ML/FT) risks and to encourage greater compliance with the AML/CFT
standards, the FATF identified jurisdictions that have strategic deficiencies and works with
them to address those deficiencies that pose a risk to the international financial system.
Jurisdictions subject to a FATF call on its members and other jurisdictions to apply
counter-measures to protect the international financial system from the on-going
and substantial money laundering and terrorist financing (ML/TF) risks emanating
from the jurisdictions*.
· Iran
· Democratic People's Republic of Korea (DPRK)
Jurisdictions with strategic AML/CFT deficiencies that have not made sufficient
progress in addressing the deficiencies or have not committed to an action plan
developed with the FATF to address the deficiencies**. The FATF calls on its
members to consider the risks arising from the deficiencies associated with each
jurisdiction, as described below.
· Cuba**
· Bolivia
· Ethiopia
· Ghana
· Indonesia
· Kenya
· Myanmar
· Nigeria
· Pakistan
· São Tomé and Príncipe
· Sri Lanka
· Syria
· Tanzania
· Thailand
· Turkey
*The FATF has previously issued Public Statements calling for counter-measures on Iran
and DPRK. Those Statements are updated below.
**Cuba has not engaged with the FATF in the process.
85
http://www.fatf-gafi.org/topics/high-riskandnon-cooperativejurisdictions/documents/fatfpublicstatement-
16february2012.html
Standards and Practices Report for Electronic and Mobile Payments 105
Appendix A: Supplemental Information: A.4. Risk Analysis and Mitigation
data
· Requirement 2: Do not use vendor-supplied defaults for system passwords and
other security parameters
· Protect Cardholder Data
· Requirement 3: Protect stored cardholder data
· Requirement 4: Encrypt transmission of cardholder data access on open, public
networks
Standards and Practices Report for Electronic and Mobile Payments 106
Appendix B: Source List: B.1. Overview
Standards and Practices Report for Electronic and Mobile Payments 107
Appendix B: Source List: B.2. Mature Payment Methods
http://www.cgap.org/p/site/c/template.rc/1.9.47443/
16. Islamic Republic of Afghanistan, Da Afghanistan Bank. Article Two: Money Service
Providers Regulation.
17. The Central Bank of Reserve of the Philippines Circular No. 542. Consumer
Protection for Electronic Banking. 2006.
http://www.bsp.gov.ph/regulations/regulations.asp?type=1&id=1025
18. OFAC. http://www.treasury.gov/about/organizational-
structure/offices/Pages/Office-of-Foreign-Assets-Control.aspx
19. Developing and least developed countries legal framework on e-commerce, digital
signatures, e-certification, e-transactions, CAs and RAs, EC-DC project participant
countries, Monday, February 26, 2001. http://www.itu.int/ITU-
D/ecdc/activities/legalframeworks/legalrequirements26feb01.pdf
Standards and Practices Report for Electronic and Mobile Payments 108
Appendix B: Source List: B.3. Electronic and Mobile Payments
4. McKinsey & Company. Inclusive growth and financial security: The benefits of e-
payments to Indian society. November 2010.
http://mckinseyonsociety.com/downloads/reports/EconomicDevelopment/epayme
nts_benefits_to_Indian_society_USD_191110.pdf
5. Verifone. Payware Mobile and Visa Best Practices.
http://www.verifonezone.com/fstore/0a463145bbfccb42_-9c93e9_1307fabb92e_-
5004/Visa%20Best%20Practices%20White%20Paper%206%2024%2011.pdf. June
2011
6. William Jack (Georgetown University) and Tavneet Suri (Mit Sloan).The Economics
of M-Pesa. August 2010
7. Developing Mobile Money Eco-Systems
(Harvard).http://www.hks.harvard.edu/mrcbg/papers/jenkins_mobile_money_sum
mer_008.pdf
8. GSMA: What makes for a successful mobile money implementation? Learnings
from M-Pesa in Kenya and Tanzania.
http://www.ifc.org/ifcext/gfm.nsf/AttachmentsByTitle/Tool6.11.GSMAReport-
ComparingMPESAKenyaandM-PESATanzania/$FILE/Tool+6.11.+GSMA+Report+-
+Comparing+MPESA+Kenya+and+M-PESA+Tanzania.pdf
9. 10 Things You Thought You Knew About M-Pesa. CGAP. November 22, 2010.
http://technology.cgap.org/2010/11/22/10-things-you-thought-you-knew-about-
m-pesa/
10. Haiti Leads in Mobile Payments. Partners in Pre-paid. April 23, 2012.
https://www.partnersinpre-paid.com/topics/articles/haiti-leads-in-mobile-
payments.html
11. Mwangi S. Kimenyi. Expanding the Financial Services Frontier: Lessons from Mobile
Phone Banking in Kenya. Brookings Institute. October 2009.
http://www.brookings.edu/articles/2009/1016_mobile_phone_kimenyi.aspx
12. ISACA. Mobile Payments: Risk, Security and Assurance Issues. November 2011
13. The Federal Reserve Bank of Chicago. Improving Security for Remote Payments.
Chicago Fed Letter. December 2011
14. Deloitte. Mobile Payments: Risk Management Approach. January 2012
15. Mobile Financial Services and Risk Management. Deloitte. October 2011
16. Mobile Commerce Guide 2011. Sybase
17. Davis, Wright. Mobile Payments 101. Tremaine LLP. June 2011
18. Deloitte. Mobile Payments: A Deloitte Analysis. Managing change in the mobi-
payscape
19. Suzanne Kluckey. Mobile Payments 101: Retail. www.mobilepaymentstoday.com.
2011
20. World Economic Forum and Boston Consulting Group. The Mobile Financial Services
Development Report 2011.
21. Haiti Mobile Case Study. http://mmublog.org/wp-
Standards and Practices Report for Electronic and Mobile Payments 109
Appendix B: Source List: B.3. Electronic and Mobile Payments
content/files_mf/dalberghmmicasestudyfinal.pdf
22. USAID. Accelerating Mobile Money in Indonesia, an Opportunity Assessment
(USAID FS Share/Chemonics). October 2011
23. World Economic Forum. Galvanizing Support: The Role of Government in Advancing
Adoption of Mobile Financial Services. 2012
24. Deloitte. Emerging Markets Mobile Banking & Payments: Regulatory Approaches.
April 2010. EM Mobile Banking and Payments Regulation
25. Official Journal of the European Union. Directive 2009/110/EC of the European
Parliament and of the Council. On the taking up, pursuit and prudential supervision
of the business of electronic money. October 2010.
http://eurlex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2009:267:0007:0017:E
N:PDF
26. Timothy R. McTaggart. An Overview of Mobile Payments and Their Regulation. The
Banking Law Journal. June 2010.
http://www.pepperlaw.com/publications_article.aspx?ArticleKey=1813
27. Lyman, Timothy, Mark Pickens, and David Porteous. Regulating Transformational
Branchless Banking: Mobile Phones and Other Technology to Increase Access to
Finance. 2008. CGAP Focus Note 43.
http://www.cgap.org/p/site/c/template.rc/1.9.2583/
28. International Treasury Services (ITS.gov). Financial Management Service (FMS).
http://www.fms.treas.gov/itsgov/index.html
29. A.K.M Fazlur Rahman , Deputy General Manager. Guidelines on Mobile Financial
Services (MFS) for the Banks. DCMPS (PSD) Circular Letter no.11. December 20,
2011
30. Haiti Case Study: http://www.ssireview.org/pdf/HMMI_-
_Plugging_Into_Mobile_Money_Platforms_FINAL.pdf
31. GSMA. The case for global interoperability. http://mmublog.org/wp-
content/files_mf/mmu_interoperability.pdf
32. GSMA. Mobile Money Transfer. http://216.239.213.7/mmt/regulatory-impact.asp
33. CTIA. Best Practices and Guidelines for Mobile Financial Services. January 28, 2009.
http://files.ctia.org/pdf/CTIA_MFS_Guidelines_BP_Final_1_14_09.pdf
34. CGAP. Haiti Case Study. http://www.cgap.org/gm/document-
1.9.56287/From_Market_Opportunity_to_Sustainable_Business_Rev.pdf
35. USAID FS Share/Chemonics. FS Series #9: Enabling Mobile Money Interventions:
Primer, Diagnostic Checklist and Model Scopes of Work. April 2010
36. USAID. USAID Mobile Solutions Team Draft. Mobile Money Diagnostic Tool. January
2012
37. Pepper Hamilton LLP. An Overview of Mobile Payments and Their Regulation.
http://www.pepperlaw.com/publications_article.aspx?ArticleKey=1813. June 18,
2010
38. Risks and Threats Analysis and Security Best Practices: Mobile 2-Way Messaging
Systems. Mobile Payment Forum. May 13, 2003.
Standards and Practices Report for Electronic and Mobile Payments 110
Appendix B: Source List: B.4. Risk Analysis and Mitigation
Standards and Practices Report for Electronic and Mobile Payments 111
Appendix B: Source List: B.6. Other
5. Global Standard-Setting Bodies and Financial Inclusion for the Poor toward
Proportionate Standards and Guidance. http://www.gpfi.org/sites/default
6. Branchless Banking in Brazil. http://www.cgap.org/gm/document-
1.9.50801/CGAP_Technology_Program_Country_Note_Brazil_Public_Rev.pdf.
CGAP. December 2010
7. Department of Currency Management and Payment Systems - Bangladesh Bank
Head Office. Bangladesh Electronic Funds Transfer Network - Operating Rules.
DCMPS Circular No. 09/2010. 25 August 2010
8. Honorable Prime Minister Sheikh Hasina. Bangladesh Post Office - Electronic Money
Transfer. March 26, 2010. Network Partner: BanglaLink
9. Dr. Md. Ezazul Islam and Md. Salim Al Mamum. Financial Inclusion: The Role of
Bangladesh Bank. Working Paper Series: WP1101. December 2011. Research
Department, Bangladesh Bank Head Office, Dhaka
10. Global Partnership for Financial Inclusion. Bringing the Principles to Life. 11 Country
Case Studies. 2011
B.6. Other
1. Bill and Melinda Gates Foundation. Financial Services for the Poor Website.
http://www.gatesfoundation.org/financialservicesforthepoor/Pages/default.aspx
2. Consumer Financial Protection Bureau (CFPB). Supervision and Examination
Manual. October 2011
3. Deloitte Development LLC. Cell me the money: Unlocking the value in the mobile
payment ecosystem. 2011
4. Alliance for Financial Inclusion research and work. http://www.afi-global.org/
5. Regulatory Framework for Mobile Payments Services in Nigeria.
http://www.cenbank.org/OUT/CIRCULARS/BOD/2009/REGULATORY%20FRAMEWO
RK%20%20FOR%20MOBILE%20PAYMENTS%20SERVICES%20IN%20NIGERIA.PDF
6. ITU Manual for Measuring ICT Access and Use by Households and Individuals. (2009
EDITION)
7. U.S. Treasury Agency Self-Certification Guide
Standards and Practices Report for Electronic and Mobile Payments 112