版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
1、IT Booklets:Outsourcing Technology Services(美國FFIEC技術(shù)服務(wù)外包IT檢查手冊)IntroductionThe financial services industry has changed rapidly and dramatically. Advances in technology enable institutions to provide customers with an array of products, services, and delivery channels. One result of these changes is
2、 that financial institutions increasingly rely on external service providers for a variety of technology-related services. Generally, the term outsourcing is used to describe these types of arrangements.The Federal Financial Institutions Examination Council (FFIEC) Information Technology Examination
3、 Handbook (IT Handbook) Outsourcing Technology Services Booklet (booklet) provides guidance and examination procedures to assist examiners and bankers in evaluating a financial institutions risk management processes to establish, manage, and monitor IT outsourcing relationships.The ability to contra
4、ct for technology services typically enables an institution to offer its customers enhanced services without the various expenses involved in owning the required technology or maintaining the human capital required to deploy and operate it. In many situations, outsourcing offers the institution a co
5、st effective alternative to in-house capabilities. Outsourcing, however, does not reduce the fundamental risks associated with information technology or the business lines that use it. Risks such as loss of funds, loss of competitive advantage, damaged reputation, improper disclosure of information,
6、 and regulatory action remain. Because the functions are performed by an organization outside the financial institution, the risks may be realized in a different manner than if the functions were inside the financial institution resulting in the need for controls designed to monitor such risks.Finan
7、cial institutions can outsource many areas of operations, including all or part of any service, process, or system operation. Examples of information technology (IT) operations frequently outsourced by institutions and addressed in this booklet include: the origination, processing, and settlement of
8、 payments and financial transactions; information processing related to customer account creation and maintenance; as well as other information and transaction processing activities that support critical banking functions, such as loan processing, deposit processing, fiduciary and trading activities
9、; security monitoring and testing; system development and maintenance; network operations; help desk operations; and call centers. The booklet addresses an institutions responsibility to manage the risks associated with these outsourced IT services.Management may choose to outsource operations for v
10、arious reasons. These include: Gain operational or financial efficiencies; Increase management focus on core business functions; Refocus limited internal resources on core functions; Obtain specialized expertise; Increase availability of services; Accelerate delivery of products or services through
11、new delivery channels; Increase ability to acquire and support current technology and avoid obsolescence; and Conserve capital for other business ventures. Outsourcing of technology-related services may improve quality, reduce costs, strengthen controls, and achieve any of the objectives listed prev
12、iously. Ultimately, the decision to outsource should fit into the institutions overall strategic plan and corporate objectives.Before considering the outsourcing of significant functions, an institutions directors and senior management should ensure such actions are consistent with their strategic p
13、lans and should evaluate proposals against well-developed acceptance criteria. The degree of oversight and review of outsourced activities will depend on the criticality of the service, process, or system to the institutions operation.Financial institutions should have a comprehensive outsourcing ri
14、sk management process to govern their technology service provider (TSP) relationships. The process should include risk assessment, selection of service providers, contract review, and monitoring of service providers. Outsourced relationships should be subject to the same risk management, security, p
15、rivacy, and other policies that would be expected if the financial institution were conducting the activities in-house. This booklet primarily focuses on how the bank regulatory agencies review the risk management process employed by a financial institution when considering or executing an outsourci
16、ng relationship.To help ensure financial institutions operate in a safe and sound manner, the services performed by TSPs are subject to regulation and examination.1 The federal financial regulators have the statutory authority to supervise all of the activities and records of the financial instituti
17、on whether performed or maintained by the institution or by a third party on or off of the premises of the financial institution. Accordingly, the examination and supervision of a financial institution should not be hindered by a transfer of the institutions records to another organization or by hav
18、ing another organization carry out all or part of the financial institutions functions.2Many of the general principles on effective management of outsourcing relationships discussed in this booklet can and should be applied to managing the outsourcing of software development. Outsourcing of activiti
19、es related to software development is addressed in the IT Handbooks, Development and Acquisition Booklet.This booklet rescinds and replaces Chapter 22 of the 1996 FFIEC Information Systems Examination Handbook, IS Servicing - Provider and Receiver.Board and Management ResponsibilitiesAction SummaryT
20、he financial institutions board and senior management should establish and approve risk-based policies to govern the outsourcing process. The policies should recognize the risk to the institution from outsourcing relationships and should be appropriate to the size and complexity of the institution.T
21、he responsibility for properly overseeing outsourced relationships lies with the institutions board of directors and senior management. Although the technology needed to support business objectives is often a critical factor in deciding to outsource, managing such relationships is more than just a t
22、echnology issue; it is an enterprise-wide corporate management issue. An effective outsourcing oversight program should provide the framework for management to identify, measure, monitor, and control the risks associated with outsourcing. The board and senior management should develop and implement
23、enterprise-wide policies to govern the outsourcing process consistently. These policies should address outsourced relationships from an end-to-end perspective, including establishing servicing requirements and strategies; selecting a provider; negotiating the contract; and monitoring, changing, and
24、discontinuing the outsourced relationship.Factors institutions should consider include: Ensuring each outsourcing relationship supports the institutions overall requirements and strategic plans; Ensuring the institution has sufficient expertise to oversee and manage the relationship; Evaluating pros
25、pective providers based on the scope and criticality of outsourced services; Tailoring the enterprise-wide, service provider monitoring program based on initial and ongoing risk assessments of outsourced services; and Notifying its primary regulator regarding outsourced relationships, when required
26、by that regulator.1 The time and resources devoted to managing outsourcing relationships should be based on the risk the relationship presents to the institution. To illustrate, outsourcing processing of a small credit card portfolio will require a different level of oversight than outsourcing proce
27、ssing of all loan applications. Additionally, smaller and less complex institutions may have less flexibility than larger institutions in negotiating for services that meet their specific needs and in monitoring their service providers.Risk ManagementRisk management is the process of identifying, me
28、asuring, monitoring, and managing risk. Risk exists whether the institution maintains information and technology services internally or elects to outsource them. Regardless of which alternative they choose, management is responsible for managing risk in all outsourcing relationships. Accordingly, in
29、stitutions should establish and maintain an effective risk management process for initiating and overseeing all outsourced operations.An effective risk management process involves several key factors: Establishing senior management and board awareness of the risks associated with outsourcing agreeme
30、nts in order to ensure effective risk management practices; Ensuring that an outsourcing arrangement is prudent from a risk perspective and consistent with the business objectives of the institution; Systematically assessing needs while establishing risk-based requirements; Implementing effective co
31、ntrols to address identified risks; Performing ongoing monitoring to identify and evaluate changes in risk from the initial assessment; and Documenting procedures, roles/responsibilities, and reporting mechanisms. Typically, this process incorporates the following activities: Risk assessment and req
32、uirements definition; Due diligence in selecting a service provider; Contract negotiation and implementation; and Ongoing monitoring. The preceding comments focus on risk elements specifically associated with outsourcing. For a broader perspective on IT transactional and operational risk, refer to t
33、he IT Handbooks Supervision of Technology Service Providers (TSP) Booklet, which addresses outsourcing risk from the service provider perspective.SubsectionsRisk Assessment and RequirementsAction SummaryManagement should: Assess the risk from outsourcing; Involve stakeholders in creating risk-based
34、written requirements to control an outsourcing action; and Use the written requirements to guide and manage the remainder of the outsourcing process. Outsourced IT services can contribute to operational risks (also referred to as transaction risks). Operational risk may arise from fraud, error, or t
35、he inability to deliver products or services, maintain a competitive position, or manage information. It exists in each process involved in the delivery of the financial institutions products or services. Operational risk not only includes operations and transaction processing, but also areas such a
36、s customer service, systems development and support, internal control processes, and capacity and contingency planning. Operational risk also may affect other risks such as interest rate, compliance, liquidity, price, strategic, or reputation risk as described below. Reputation risk-Errors, delays,
37、or omissions in information technology that become public knowledge or directly affect customers can significantly affect the reputation of the serviced financial institutions. For example, a TSPs failure to maintain adequate business resumption plans and facilities for key processes may impair the
38、ability of serviced financial institutions to provide critical services to their customers. Strategic risk-Inadequate management experience and expertise can lead to a lack of understanding and control of key risks. Additionally, inaccurate information from TSPs can cause the management of serviced
39、financial institutions to make poor strategic decisions. Compliance (legal) risk-Outsourced activities that fail to comply with legal or regulatory requirements can subject the institution to legal sanctions. For example, inaccurate or untimely consumer compliance disclosures or unauthorized disclos
40、ure of confidential customer information could expose the institution to civil money penalties or litigation. TSPs often agree to comply with banking regulations, but their failure to track regulatory changes could increase compliance risk for their serviced financial institutions. Interest rate, li
41、quidity, and price (market) risk-Processing errors related to investment income or repayment assumptions could lead to unwise investment or liquidity decisions thereby increasing market risks. Quantity of Risk ConsiderationsThe quantity of risk associated with an outsourced IT service is subject to
42、the function outsourced, the service provider, and the technology used by the service provider. Management should consider the following factors in evaluating the quantity of risk at the inception of an outsourcing decision. Risks pertaining to the function outsourced include: o Sensitivity of data
43、accessed, protected, or controlled by the service provider; o Volume of transactions; and o Criticality to the financial institutions business. Risks pertaining to the service provider include: o Strength of financial condition; o Turnover of management and employees; o Ability to maintain business
44、continuity; o Ability to provide accurate, relevant, and timely Management Information Systems (MIS); o Experience with the function outsourced; o Reliance on subcontractors; o Location, particularly if cross-border (See Appendix C, Foreign-Based Third-Party Service Providers); and o Redundancy and
45、reliability of communication lines. Risks pertaining to the technology used include: o Reliability; o Security; and o Scalability to accommodate growth. Requirements DefinitionThe definition of business requirements sets the stage for all outsourcing actions and forms the basis for subsequent manage
46、ment of the outsourced activity. The requirements are developed through a process that identifies the functions or activities to be outsourced, assesses the risk of outsourcing those functions or activities, and establishes a baseline from which appropriate control measures can be identified. These
47、requirements provide a basis for an understanding between the financial institution and the service provider as to what the risks are and how they will be managed and controlled.Key PracticesSound practices for the development of requirements include: Stakeholder involvement-All organizational group
48、s who will be directly involved with the service provider or in using the contracted service should be represented in the development of product and service requirements. Integration-The development should result in requirements that support the subsequent steps of solicitation, selection, contracti
49、ng, and monitoring. Documentation-Documentation will greatly assist in ensuring that the service contracted and delivered meets the institutions requirements. Documentation will also allow for subsequent reviews of the processes adequacy and integrity. ComponentsThe requirements definition phase sho
50、uld result in a detailed document containing descriptions of the institutions expectations relative to the outsourced service. The requirements document may consider, but is not limited by, the following high level topical components: Scope and nature o Service description; o Technology; and o Custo
51、mer support. Standards and service levels o Availability and performance; o Change management; o Financial reporting; o Quality of service; o Security; and o Business continuity. Minimum acceptable service provider characteristics o Industry experience; o Management experience; o Technology and syst
52、ems architecture; o Process controls; o Financial condition; o Reputation, including references; o Degree of reliance on third parties, subcontractors, or partners; o Legal, regulatory, and compliance history; and o Ability to meet future needs. Monitoring and reporting o Measurements and reporting
53、criteria; o Right to audit; o Third-party reports; and o Coordination of responses to security events. Transition requirements o Initial migration of data to the service provider; o Implementation of necessary communications mechanisms; o Migration of data from the service provider at termination of
54、 contract; and o Staff training. Contract duration, termination, and assignment o Start and term; o Conditions and right to cancel; o Ownership of data; o Timely return of data in machine-readable format; o Costs of transition; o Limitations, as appropriate, governing assignment to third party; o Di
55、spute resolution; and o Confidentiality of institution data. Contractual protections against liability o Indemnification; o Limitation of liability; and o Insurance. When outsourcing to a subsidiary or affiliate is considered, management must assure that the components outlined above evidence an arm
56、s-length transaction. An arrangement between a financial institution and an affiliate or subsidiary should be on terms that are substantially the same, or at least as favorable to the institution, as those prevailing at the time for comparable transactions with a non-affiliated third party.Service P
57、rovider SelectionAction SummaryManagement should: Evaluate service provider proposals in light of the institutions needs, including any differences between the institutions solicitation and the service provider proposal; Perform due diligence on the prospective service providers; Ensure that selecti
58、on of affiliated parties as service providers is done at arms length in accordance with regulations and guidance issued by the institutions primary regulator; and Evaluate foreign-based third-party service providers in light of the guidance found in this section and in Appendix C, Foreign-Based Third-Party Service Providers. After identifying the work to be performed and the necessary controls, a financial institution solicits responses from prospective service providers. The primary tool for th
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 電影行業(yè)安全生產(chǎn)工作總結(jié)
- 傳統(tǒng)制造業(yè)技術(shù)職位展望
- 二零二五年度航空航天材料試驗委托協(xié)議3篇
- 二零二五年度房屋收購合同環(huán)保驗收與評估范本3篇
- 二零二五版養(yǎng)老院專業(yè)保潔及消毒服務(wù)合同2篇
- 二零二五版?zhèn)€人二手房購房合同與產(chǎn)權(quán)過戶指導書
- 航空行業(yè)助理的職位介紹
- 汽車行業(yè)財務(wù)預(yù)測分析工作總結(jié)
- 二零二五年度產(chǎn)品責任糾紛民事答辯狀范文3篇
- 二零二五年度木材市場樹木買賣協(xié)議3篇
- 成人學士學位英語單詞(史上全面)
- 26個英文字母書寫(手寫體)Word版
- KAPPA-實施方法課件
- GB/T 13813-2023煤礦用金屬材料摩擦火花安全性試驗方法和判定規(guī)則
- 日語專八分類詞匯
- GB/T 33084-2016大型合金結(jié)構(gòu)鋼鍛件技術(shù)條件
- 高考英語課外積累:Hello,China《你好中國》1-20詞塊摘錄課件
- 航道整治課程設(shè)計
- 茶文化與茶健康教學課件
- 降水預(yù)報思路和方法
- 抖音品牌視覺識別手冊
評論
0/150
提交評論