SlideShare uma empresa Scribd logo
1 de 22
Presented By ManmeetThapar - 49  VishruthaMaarar - 20 ArtiGada - 03 DeepavaliVankalu - 04 SiddheshParab - 16 RammaniGupta - 10
Contents
What is Operational Risk A form of risk that summarizes the risks a company or firm undertaken when it attempts to operate within a given field or industry.  Operational risk is the risk that is not inherent in financial, systematic or market-wide risk. It is the risk remaining after determining financing and systematic risk, and includes risks resulting from breakdowns in internal procedures, people and systems.
Contd……………… Operational risk can be summarized as human risk; it is the risk of business operations failing due to human error.  Operational risk will change from industry to industry, and is an important consideration to make when looking at potential investment decisions. Industries with lower human interaction are likely to have lower operational risk.
What is Operational Risk The Basel Committee defines operational risk as: ‘’The risk of loss resulting from inadequate or failed internal processes, people and systems or from external events.’’  Credit risk or market risk is not a part of operational risk. 
Why Manage Operational Risk Operational risk can kill financial institution. Credit and market risk are now well known and understood and therefore more likely to merely wound. Operational risk is pervasive complex & dynamic unlike market and credit risk which tend to be isolated in the specific areas of the business. Operational risk pervades all business entities, hiding in wings , waiting to surface.
Advantages
Causes of Operational Risk Causes
Causes of Operational Risk Internal Processes People Contd……..
Causes of Operational Risk
Types Of Operational Risk Internal Fraud External Fraud Employment Practices and Workplace Safety Clients, Products and Business Practices Damage to Physical Assets Business Disruption and System Failures Execution, Delivery and Process Management Case Study – SBI- IT Related
Types Of Operational Risk Internal Fraud Unauthorised activity , theft of fraud that involves atleast one internal party. Eg: intentional ,misreporting of positions  Unauthorised undertaking of transactions  Insider trading Theft  Robbery Forgery
contd….. External Fraud External fraud refers to theft or fraud carried out by a third party outside the organisation. Eg Computer hacking damage and  theft of information
Contd…… Employment Practices and Workplace Safety This category refers to events relating to employee relations , safe working environment and discrimination. E.g.:  Employee compensation claims  Wrongful termination. Violation of health and safety rules  Discrimination claims  Harassment
Contd…… Clients, Products and Business Practices Operational losses in this category arise from a failure to meet an obligation to a client or from the nature or design of a product. eg misuse of confidential client information Money laundering Product defects Exceeding client exposure limits
Damage to Physical Assets This category accounts for losses as a result of disaster and other events. Eg: Natural disaster Terrorism  Vandelism Contd……….
Contd……. Business Disruption and System Failures Hardware and software failures telecommunication problem Utility outages and disruption
Contd… Execution, Delivery and Process Management This category covers risk events related to transaction processing or process management , trade counter parties and vendors. Eg: Miscommunication Data entry errors Accounting errors  Unapproved accesses given to client account Vendor disputes Outsourcing
Case Studies 1SBI – IT Related SBI, UK’s Treasury operations use the Reuters 3000 dealing system.  Dealers negotiate and confirm various deals . Deals were posted manually into the banking application. Risk of error prone entries, missed out deals, lack of suitable and timely checks & verification and inability to ascertain accurately counter party dealing limits. Requirement : ‘Straight through Processing’ from Reuters dealing server to the Misys-Equation platform to minimise operational risk.
Solution Technologies such as  Microsoft Windows 2000 server,  Access database, IBM MQ series, Misys Meridian middleware and IBM AS/400.
The process can be categorized as follows: • Electronic capture of deals via Reuter Ticket Output Feed (TOF).• Deal data processing with data validation and writing to database.• Deal data mapping, formatting and posting to Misys Equation using Meridian Middleware/IBM MQ Series.• Secure and user-friendly interface to monitor flow of deal data, correct any exceptions and review status of posting into Misys Equation.• Intelligent use of Reuters Current Interest Feed (CIF) to retrieve counter- party dealing limits and actual exposures from the Equation banking system and displaying the same back to the dealers.
Operational Risk

Mais conteúdo relacionado

Semelhante a Operational Risk

ERM Presentation
ERM PresentationERM Presentation
ERM PresentationH Contrex
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...balejandre
 
Measuring operational risk
Measuring operational riskMeasuring operational risk
Measuring operational riskUjjwal 'Shanu'
 
The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationIBM Security
 
Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Managementbanerjeerohit
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsSarah Cirelli
 
EIS Amendments CA INTER
EIS Amendments CA INTEREIS Amendments CA INTER
EIS Amendments CA INTERRaj Kumar
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachPECB
 
Taylor&Francis_White_Paper_Satyanandan atyam
Taylor&Francis_White_Paper_Satyanandan atyamTaylor&Francis_White_Paper_Satyanandan atyam
Taylor&Francis_White_Paper_Satyanandan atyamSatyanandan Atyam
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations centerCMR WORLD TECH
 
Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)Saras Singh
 
Operational risk management
Operational risk managementOperational risk management
Operational risk managementUjjwal 'Shanu'
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingTory Quinton
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Servicessarah kabirat
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls PresentationBill Lisse
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020Proofpoint
 

Semelhante a Operational Risk (20)

ERM Presentation
ERM PresentationERM Presentation
ERM Presentation
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...
 
Measuring operational risk
Measuring operational riskMeasuring operational risk
Measuring operational risk
 
The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and Reputation
 
Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Management
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
EIS Amendments CA INTER
EIS Amendments CA INTEREIS Amendments CA INTER
EIS Amendments CA INTER
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approach
 
Taylor&Francis_White_Paper_Satyanandan atyam
Taylor&Francis_White_Paper_Satyanandan atyamTaylor&Francis_White_Paper_Satyanandan atyam
Taylor&Francis_White_Paper_Satyanandan atyam
 
Cyber Risks - Maligec and Eskins
Cyber Risks - Maligec and EskinsCyber Risks - Maligec and Eskins
Cyber Risks - Maligec and Eskins
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
 
Operational risk management
Operational risk managementOperational risk management
Operational risk management
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge Training
 
Tft2 Task3 Essay
Tft2 Task3 EssayTft2 Task3 Essay
Tft2 Task3 Essay
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Services
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls Presentation
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
 

Mais de ITM Institute, Mumbai (Sion Br.) (7)

Gulf Cooperation Council (GCC)
Gulf Cooperation Council (GCC)Gulf Cooperation Council (GCC)
Gulf Cooperation Council (GCC)
 
Gulf Cooperation Council (GCC)
Gulf Cooperation Council (GCC)Gulf Cooperation Council (GCC)
Gulf Cooperation Council (GCC)
 
Omega Watch industry
Omega Watch industryOmega Watch industry
Omega Watch industry
 
Moser Baer
Moser BaerMoser Baer
Moser Baer
 
Asian Paint
Asian Paint Asian Paint
Asian Paint
 
Financial Planning project
Financial Planning projectFinancial Planning project
Financial Planning project
 
Dubai World Crisis
Dubai World CrisisDubai World Crisis
Dubai World Crisis
 

Último

原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证jdkhjh
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHenry Tapper
 
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证rjrjkk
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfshaunmashale756
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Sonam Pathan
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppmiss dipika
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...First NO1 World Amil baba in Faisalabad
 
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办fqiuho152
 
NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...
NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...
NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...Amil Baba Dawood bangali
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfHenry Tapper
 
Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintSuomen Pankki
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfMichael Silva
 
Ch 4 investment Intermediate financial Accounting
Ch 4 investment Intermediate financial AccountingCh 4 investment Intermediate financial Accounting
Ch 4 investment Intermediate financial AccountingAbdi118682
 
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...Amil baba
 
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)ECTIJ
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojnaDharmendra Kumar
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)twfkn8xj
 
Stock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfStock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfMichael Silva
 
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...yordanosyohannes2
 
212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technologyz xss
 

Último (20)

原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview document
 
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdf
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsApp
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
 
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
 
NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...
NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...
NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
 
Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraint
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdf
 
Ch 4 investment Intermediate financial Accounting
Ch 4 investment Intermediate financial AccountingCh 4 investment Intermediate financial Accounting
Ch 4 investment Intermediate financial Accounting
 
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
 
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojna
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)
 
Stock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfStock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdf
 
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
 
212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology
 

Operational Risk

  • 1. Presented By ManmeetThapar - 49 VishruthaMaarar - 20 ArtiGada - 03 DeepavaliVankalu - 04 SiddheshParab - 16 RammaniGupta - 10
  • 3. What is Operational Risk A form of risk that summarizes the risks a company or firm undertaken when it attempts to operate within a given field or industry. Operational risk is the risk that is not inherent in financial, systematic or market-wide risk. It is the risk remaining after determining financing and systematic risk, and includes risks resulting from breakdowns in internal procedures, people and systems.
  • 4. Contd……………… Operational risk can be summarized as human risk; it is the risk of business operations failing due to human error. Operational risk will change from industry to industry, and is an important consideration to make when looking at potential investment decisions. Industries with lower human interaction are likely to have lower operational risk.
  • 5. What is Operational Risk The Basel Committee defines operational risk as: ‘’The risk of loss resulting from inadequate or failed internal processes, people and systems or from external events.’’ Credit risk or market risk is not a part of operational risk. 
  • 6. Why Manage Operational Risk Operational risk can kill financial institution. Credit and market risk are now well known and understood and therefore more likely to merely wound. Operational risk is pervasive complex & dynamic unlike market and credit risk which tend to be isolated in the specific areas of the business. Operational risk pervades all business entities, hiding in wings , waiting to surface.
  • 8. Causes of Operational Risk Causes
  • 9. Causes of Operational Risk Internal Processes People Contd……..
  • 11. Types Of Operational Risk Internal Fraud External Fraud Employment Practices and Workplace Safety Clients, Products and Business Practices Damage to Physical Assets Business Disruption and System Failures Execution, Delivery and Process Management Case Study – SBI- IT Related
  • 12. Types Of Operational Risk Internal Fraud Unauthorised activity , theft of fraud that involves atleast one internal party. Eg: intentional ,misreporting of positions Unauthorised undertaking of transactions Insider trading Theft Robbery Forgery
  • 13. contd….. External Fraud External fraud refers to theft or fraud carried out by a third party outside the organisation. Eg Computer hacking damage and theft of information
  • 14. Contd…… Employment Practices and Workplace Safety This category refers to events relating to employee relations , safe working environment and discrimination. E.g.: Employee compensation claims Wrongful termination. Violation of health and safety rules Discrimination claims Harassment
  • 15. Contd…… Clients, Products and Business Practices Operational losses in this category arise from a failure to meet an obligation to a client or from the nature or design of a product. eg misuse of confidential client information Money laundering Product defects Exceeding client exposure limits
  • 16. Damage to Physical Assets This category accounts for losses as a result of disaster and other events. Eg: Natural disaster Terrorism Vandelism Contd……….
  • 17. Contd……. Business Disruption and System Failures Hardware and software failures telecommunication problem Utility outages and disruption
  • 18. Contd… Execution, Delivery and Process Management This category covers risk events related to transaction processing or process management , trade counter parties and vendors. Eg: Miscommunication Data entry errors Accounting errors Unapproved accesses given to client account Vendor disputes Outsourcing
  • 19. Case Studies 1SBI – IT Related SBI, UK’s Treasury operations use the Reuters 3000 dealing system. Dealers negotiate and confirm various deals . Deals were posted manually into the banking application. Risk of error prone entries, missed out deals, lack of suitable and timely checks & verification and inability to ascertain accurately counter party dealing limits. Requirement : ‘Straight through Processing’ from Reuters dealing server to the Misys-Equation platform to minimise operational risk.
  • 20. Solution Technologies such as Microsoft Windows 2000 server, Access database, IBM MQ series, Misys Meridian middleware and IBM AS/400.
  • 21. The process can be categorized as follows: • Electronic capture of deals via Reuter Ticket Output Feed (TOF).• Deal data processing with data validation and writing to database.• Deal data mapping, formatting and posting to Misys Equation using Meridian Middleware/IBM MQ Series.• Secure and user-friendly interface to monitor flow of deal data, correct any exceptions and review status of posting into Misys Equation.• Intelligent use of Reuters Current Interest Feed (CIF) to retrieve counter- party dealing limits and actual exposures from the Equation banking system and displaying the same back to the dealers.