Welcome » Glossary
A B C D E F G H I K L M N O P R S T U V W X
AAcceptance Criteria - Pre-established standards or requirements a product or project must meet.Account Aggregation - A service that gathers information from many websites, presents that information to the customer in a consolidated format and, in some cases, may allow the customer to initiate activity on the aggregated accounts. Aggregation services typically involve three different entities: (1) The aggregator that offers the aggregation service and maintains information on the customer's relationships/accounts with other on-line providers. (2) The aggregation target or website/entity from which the information is gathered or extracted by means of direct data feeds or screen scraping. (3) The aggregation customer who subscribes to aggregation services and provides customer IDs and passwords for the account relationships to be aggregated.Account Balancing Monitoring System (ABMS) - The Federal Reserve’s computing system providing reserve account information to the Federal Reserve Banks and depository institutions (DI) on an intraday basis. ABMS serves both as an informational source and a monitoring tool. This information includes opening balances, funds and security transfers, accounting activity, and DI cap and collateral limits. Account Management - Activities such as balance inquiry, statement balancing, transfers between the customer’s accounts at the same financial institution, maintenance of personal information, etc.Account-To-Account Payment (A2A) - Payment system that allows the consumer to direct transfer of funds from one account to another account at a different financial institution. ACL - Access control list.ACL (1) - Acquirer Fee - Fee paid to the acquirer of the merchant sales draft. The acquirer of the sales draft collects a merchant discount fee (or processing fee) from the merchant for the costs associated with processing the transaction.Acquiring Bank and Acquirer - See "Merchant Acquirer".Address Verification Service (AVS) - Bankcard association service that verifies the customer provided billing address matches the billing address on their credit card account. The bankcard associations will not support merchants that opt not to use AVS if those transactions are disputed and will charge the merchant an additional 1.25 percent on those sales.Administrative Access - Individuals or terminals authorized to perform network administrator or system administrator functions.Agent Bank - A member of a bankcard association that agrees to participate in an acquirer’s merchant processing program. The agent may or may not be liable for losses incurred on its merchant accounts. An agent is usually a small community financial institution that wants to offer merchant processing services as a customer service. Agent banks that only refer merchants to an acquiring financial institution’s program are known as referral banks. Aggregate Short Position - Aggregate Short Position Limit - In respect of a Settlement Member, the maximum aggregate short position that such Settlement Member is permitted to incur at any time.Aggregation - See "Account Aggregation".Alternate Site Test/Exercise - A business continuity testing activity that tests the capability of staff, systems, and facilities, located at sites other than those generally designated for primary processing and business functions, to effectively support production processing and workloads. During the exercise, business line staff located at recovery site(s) participate in testing business functions and the supporting systems by performing typical production activities, including accessing applications and completing pending transactions. Staff members participate in testing alternate site facilities through the use of PCs, phones, and other equipment needed to perform testing of business activities.Antivirus Software - Computer programs that offer protection from viruses by making additional checks of the integrity of the operating system and electronic files. Also known as virus protection software.Applet - A small program that typically is transmitted with a Web page.Application - Software that performs automated functions for a user. Examples include home banking, word processing and payroll. Distinguished from operating system or utility software. Application Controls - Controls related to transactions and data within application systems. Application controls ensure the completeness and accuracy of the records and the validity of the entries made resulting from both programmed processing and manual data entry. Examples of application controls include data input validation, agreement of batch totals and encryption of data transmitted.Application System - An integrated set of computer programs designed to serve a well-defined function and having specific input, processing, and output activities (e.g., general ledger, manufacturing resource planning, human resource management).Asynchronous Data Replication - ATM - Asynchronous transfer mode. The method of transmitting bits of data one after another with a start bit and a stop bit to mark the beginning and end of each data unit. Can also mean automated teller machine.Audit Charter - A document approved by the board of directors that defines the IT audit function's responsibility, authority to review records, and accountability.Audit Plan - A description and schedule of audits to be performed in a certain period of time (ordinarily a year). It includes the areas to be audited, the type of work planned, the high-level objectives and scope of the work and includes other items such as budget, resource allocation, schedule dates, and type of report issued. Audit Program - The audit policies, procedures, and strategies that govern the audit function, including IT audit.AUP - An acceptable use policy. It documents permitted system uses and activities for a specific user and the consequences of noncompliance.Authentication - The process of verifying the identity of an individual user, machine, software component, or any other entity.Authorization - The process of giving access to parts of a system, typically based on the business needs and the role of the individual within the business.Authorization For ACH - A written or oral agreement between the originator and a receiver that allows payments processed through the ACH Network to be deposited in or withdrawn from the receiver’s account at a financial institution.Automated Clearing House (ACH) - An electronic clearing system in which a data processing center handles payment orders that are exchanged among financial institutions, primarily through telecommunications networks. ACH systems process large volumes of individual payments electronically. Typical ACH payments include salaries, consumer and corporate bill payments, interest and dividend payments, and Social Security payments. Automated Clearing House (ACH) Operator - A central clearing facility that depository financial institutions use to transmit and receive ACH entries. ACH operators are typically a Federal Reserve Bank or a private-sector organization that operates on behalf of a depository financial institution.Automated Controls - Software routines designed into programs to ensure the validity, accuracy, completeness, and availability of input, processed, and stored data.Automated Teller Machine (ATM) - An electronic funds transfer (EFT) terminal that allows customers using a PIN-based debit (ATM) card to initiate transactions (e.g., deposits, withdrawals, account balance inquiries).Automatic Log-On - A feature offered by some aggregation services allowing customers to log on by clicking on a hyperlink and thereby causing the usernames and passwords stored at the aggregator to be used to log onto other websites.BBack Office Conversion (BOC) - Under NACHA rules, BOC allows retailers and billers that accept checks at the point-of-sale or at manned bill payment locations to convert eligible checks to ACH debits in the back-office.Back-up Generations - A tape rotation methodology that creates three sets of back-up tapes: daily incremental sets or “sons,” weekly full sets or “fathers,” and end-of-month tapes or “grandfathers.” This back-up methodology is frequently used to refer to master files for financial applications.
Bandwidth - Terminology used to indicate the transmission or processing capacity of a system or of a specific location in a system (usually a network system) for information (text, images, video, sound). Bandwidth is usually defined in bits per second (bps) but also is usually described as either large or small. Where a full page of English text is about 16,000 bits, a fast modem can move approx. 15,000 bps. Full-motion, full-screen video requires about 10,000,000 bps, depending on compression. Bank Identification Number/Interbank Card Association (BIN/ICA) - A series of assigned numbers used to identify the settling financial institution for both acquiring and issuing bankcard transactions.Bank Secrecy Act - The Currency and Foreign Transactions Reporting Act, also known as the Bank Secrecy Act (BSA), and its implementing regulation, 31 CFR 103, is a tool the U.S. government uses to fight drug trafficking, money laundering, and other crimes. Congress enacted the BSA to prevent banks and other financial service providers from being used as intermediaries for, or to hide the transfer or deposit of money derived from, criminal activity.Bankcard - A general-purpose credit card, issued by a financial institution under agreement with the bankcard associations (Visa and MasterCard), that customers can use to purchase goods and services and to obtain cash against a line of credit established by the bankcard issuer.Bankcard Companies - Visa U.S.A. and MasterCard International Inc. are bankcard associations established as bank service companies. Financial institutions must be members of an association in order to offer their credit card services. The associations have established membership rights and obligations and membership is limited to financial institutions.Baseline - A documented version of a hardware component, software program, configuration, standard, procedure, or project management plan. Baseline versions are placed under formal change controls and should not be modified unless the changes are approved and documented.Batch Processing - The transmission or processing of a group of related payment instructions.Bilateral Key Security - A multi-level data encryption system, based on the exchange of Bilateral Keys, allowing users of SWIFT to create, send, and receive SWIFT messages. Bilateral Keys are unique authenticator keys possessed by only the two parties (either the provider or recipient of a message) involved and provide confirmation in both directions of the legitimacy of a message sent via SWIFT. Bill Payment - An e-banking application whereby customers direct the financial institution to transfer funds to the account of another person or business. Payment is typically made by ACH credit or by the institution (or bill payment servicer) sending a paper check on the customer's behalf.Bill Presentment - An e-banking service whereby a business submits an electronic bill or invoice directly to the customer's financial institution. The customer can view the bill/invoice on-line and, if desired, pay the bill through an electronic payment.Biometrics - The method of verifying a person's identify by analyzing a unique physical attribute of the individual (e.g., fingerprint, retinal scanning).BPS - Bits per second. A measurement of how fast data moves from one place to another. A 28.8 modem can move 28,800 bits per second.Business Continuity Plan (BCP) - A comprehensive written plan to maintain or resume business in the event of a disruption. BCP includes both the technology recovery capability (often referred to as disaster recovery) and the business unit(s) recovery capability.
Business Continuity Strategy - Comprehensive strategies to recover, resume, and maintain all critical business functions.
Business Continuity Test - A test of an institution’s disaster recovery plan or BCP.
Business Impact Analysis (BIA) - The process of identifying the potential impact of uncontrolled, non-specific events on an institution's business processes.
Business Recovery Test / Exercise - An activity that tests an institution’s BCP. CCall Tree - A documented list of employees and external entities that should be contacted in the event of an emergency declaration.Capacity Testing - Activities structured to determine whether resources (human and IT) can support required processing volumes in recovery environments. CAR - Courtesy amount recognition. The numeric amount of a check. Card Issuer - A financial institution that issues general-purpose credit cards carrying one of the two bankcard association logos. The issuing financial institution establishes the credit relationship with the consumer.Card Verification Code (CVC2) - Numeric security code printed on the back of MasterCard credit cards. CVC2 reduces credit card fraud and chargeback instances significantly when used in conjunction with AVS. (See Address verification service).Card Verification Value (CVV2) - Three-digit security number that is printed on the back of most Visa credit cards. CVV2 reduces credit card fraud and chargeback instances significantly when used in conjunction with AVS. Cash Letter - A group of checks accompanied by a paper listing sent to either a clearinghouse, Federal Reserve, or another financial institution. A cash letter contains a number of negotiable items, usually checks, accompanied by a letter listing the amounts and instructions for transmittal to another financial institution (may also be called a transmittal letter). An incoming cash letter is received by a financial institution from a clearinghouse, Federal Reserve, or another financial institution and contains checks written on accounts at the institution that were cashed elsewhere. An outgoing cash letter is sent to a clearinghouse, Federal Reserve, or another financial institution and contains checks deposited at the institution which are written on accounts at other institutions.Cellular Telephone - A wireless telephone that communicates using radio wave antenna towers, each serving a particular “cell” of a city or other geographical area. Areas where cellular phones do not work are referred to as “dead zones.”Certificate Authority (CA) - The entity or organization that attests using a digital certificate that a particular electronic message comes from a specific individual or system.Change Management - Change management refers to the broad processes for managing organizational change. Change management encompasses planning, oversight or governance, project management, testing, and implementation.Chargeback - A transaction generated when a cardholder disputes a transaction or when the merchant does not follow bankcard company procedures. The issuer and acquirer research the facts to determine which party is responsible for the transaction. If the merchant is unable to pay, the acquirer will have to cover the chargeback.Check - A written order from one party (payer) to another (payee) requiring the payer’s financial institution to pay a specified sum on demand to the payee or to a third party specified by the payee.Check 21 - The Check Clearing for the 21st Century Act (Check 21) which became effective on October 28, 2004. Check 21 authorizes the use of a new negotiable instrument called a substitute check and facilitates the broader use of electronic check processing without mandating that a financial institution change its current check collection practices.Check 21 Act - Formally known as the Check Clearing for the 21st Century Act. Creates a new document, the IRD (image replacement document or substitute check) that is the legal equivalent of the original check and should be accepted as such. The act does not require institutions to accept electronic images instead of checks or IRDs, but does require the acceptance of IRDs instead of paper checks. The exchange of electronic images is optional and will be done by agreements between individual institutions, groups of institutions, or clearinghouses.Check Clearing - The movement of a check from the depository institution at which it was deposited back to the institution on which it was written. The funds move in the opposite direction, with a corresponding credit and debit to the involved accounts.Check Digits - A digit in an account number that is calculated from the other digits in the account number and is used to check the account number’s correctness/validity.Check Image - Electronic or digital image of an original check that is created by a depositor, a bank or other participant in the check collection process. Check images can be exchanged electronically by financial institutions, printed for customer statement purposes, displayed on Internet banking websites, and used to create substitute checks.Check Truncation - The practice of holding a check at the institution at which it was deposited (or at an intermediary institution) and electronically forwarding the essential information on the check to the institution on which it was written. A truncated check is not returned to the writer.Checklist Review - A preliminary procedure to testing that employs information checklists to guide staff activities. For example, checklists can be used to verify staff procedures, hardware and software configurations, or alternate communication mechanisms. Clearance - The process of transmitting, reconciling, and in some cases, confirming payment orders or financial instrument transfer instructions prior to settlement.Clearing Corporation - Also known as a clearing house or clearing house association. A central processing mechanism whereby members agree to net, clear, and settle transactions involving financial instruments. Clearing corporations fulfill one or all of the following functions:
Net many trades so that the number and the amount of payments that have to be made are minimized, determine money obligations among traders, and guarantee that trades will go through by legally assuming the risk of payments not made or securities not delivered. The latter function is implied when it is stated that the clearing corporation becomes the “counterparty” to all trades entered into its system.
Clearinghouse Associations - Voluntary associations, formed by financial institutions that establish an exchange for checks drawn on those institutions. Typically, institutions participating in check clearinghouses use the Federal Reserve’s national settlement service for the checks exchanged each business day.Clearinghouse for Inter-Bank Payment Systems (CHIPS) - A “real time,” multilateral, final payments system for large dollar value, business-to-business payment transactions between domestic or foreign institutions that have offices located in the United States. CHIPS is run by CHIP Co. LLC, a subsidiary of The Clearing House Payments Company, LLC.Clustering - Connecting two or more computers together in such a way that enables them to act as a single computer. Clustering is used for parallel processing, load balancing, and fault tolerance.Code - Software program instructions.Commercially Reasonable - Practices and procedures in widespread use in the business community generally considered to represent prudent and reasonable business methods. Compared and Noncompared Transaction - See "Matching".Component - An element or part of a business process. Component Test / Exercise - A testing activity designed to validate the continuity of individual systems, processes, or functions, in isolation. For example, component tests may focus on recovering specific network devices, application restoration procedures, off-site tape storage, or proving the validity of data for a particular business line. Concentrator - In data transmission, a concentrator is a functional unit that permits a common path to handle more data sources than there are channels currently available within the path. A device that connects a number of circuits, which are not all used at once, to a smaller group of circuits for economy. Connectivity Testing - A testing activity designed to validate the continuity of network communications. Consumer - Usually refers to an individual engaged in noncommercial transactions.Consumer Account - A deposit account held by a participating DFI and established by a natural person primarily for personal, family, or household use and not for commercial purposes.Cookie - A message given by a Web server to a Web browser, stored by the Web browser, and returned to the Web server when requested.Core Firm - Core clearing and settlement organization that serves critical financial markets.Correspondent Bank - A financial institution, acting on behalf of other financial institutions (respondents) that can settle the checks they collect from them by using accounts on their books or by sending a wire transfers. Generally, a provider of banking and payment services to other financial institutions.COTS - Commercial off-the-shelf. COTS products include software and hardware products that are ready-made and available for sale to the general public. COTS products are typically installed in existing systems and do not require customization. Also known as “shrink-wrap” applications.Credit Card - A card indicating the holder has been granted a line of credit. It enables the holder to make purchases or withdraw cash up to a prearranged ceiling. The credit granted can be settled in full by the end of a specified period or can be settled in part, with the balance taken as extended credit. Interest is charged based on the terms of the credit card agreement and the holder is sometimes charged an annual fee. Credit Entry - An entry to the record of an account to represent the transfer or placement of funds into the account.Crisis Management - The process of managing an institution’s operations in response to an emergency or event which threatens business continuity. An institution’s ability to communicate with employees, customers, and the media, using various communications devices and methods, is a key component of crisis management. Crisis Management Test /Exercise - A testing exercise that validates the capabilities of crisis management teams to respond to specific events. Crisis management exercises typically test the call tree notification process with employees, vendors, and key clients. Escalation procedures and disaster declaration criteria may also be validated.Critical Financial Markets - Financial markets whose operations are critical to the economy. Critical financial markets provide the means for financial institutions to adjust their cash and securities positions and those of their customers in order to manage liquidity, market, and other risks to their organizations. Critical financial markets also provide support for the provision of a wide range of financial services to businesses and consumers in the United States and support the implementation of monetary policy. Examples of “critical financial markets” include:
- Federal funds, foreign exchange, and commercial paper;
- U.S. Government and agency securities; and
- Corporate debt and equity securities.
Critical Market Participants - Participants in the financial markets that perform critical operations or provide critical services. Their inability to perform these operations or services could result in major disruptions in the financial system.Critical Path - The critical path represents the business processes or systems that must receive the highest priority during the recovery phase.Cross-Market Tests - Cross-market tests are also called market-wide tests or “street tests” that are sponsored by the Securities Industry Association, Bond Market Association, and Futures Industry Association. These tests validate the connectivity from alternate sites and include transaction, settlement, and payment processes, to the extent practical.Currency Balance - As at the time calculated, the current amount (positive or negative) of a particular eligible currency included in an account, as indicated on the books and records of CLS Bank. A currency balance is not a separate account.Custom Redirect Service - This service enables control over the location of incoming calls or the redirection of calls to various locations or pre-established phone numbers to ensure customer service continuity.DDASD - Direct access storage device. A magnetic disk storage device historically used in mainframe environments. DASD may also include hard drives used in personal computers. Data Mirroring - A back-up process that involves writing the same data to two physical disks or servers simultaneously.Data Replication - The process of copying data, usually with the objective of maintaining identical sets of data in separate locations. Two common data replication processes used for information systems are synchronous and asynchronous mirroring. Data Synchronization - The comparison and reconciliation of interdependent data files at the same time so that they contain the same information.Database - A database represents the collection of data that is stored on any type of computer storage medium and may be used for more than one purpose.Daylight Overdraft - A daylight overdraft occurs at any point in the business day when the balance in an institution’s account becomes negative. Daylight overdrafts can occur in accounts at Federal Reserve Banks as well as at private financial institutions. Daylight credit can also arise in the form of net debit positions of participants in private payment systems. A daylight overdraft occurs at a Federal Reserve Bank when there are insufficient funds in an institution’s Federal Reserve Bank account to cover outgoing funds transfers or incoming book-entry securities transfers. An overdraft can also be the result of other payment activity processed by the Federal Reserve Bank, such as check or automated clearinghouse transactions. Debit Card - A payment card issued as either a PIN-based debit (ATM) card or as a signature-based debit card from one of the bankcard associations. A payment card issued to a person for purchasing goods and services through an electronic transfer of funds from a demand deposit account rather than using cash, checks, or drafts at the point-of-sale. Debit Entry - An entry to the record of an account to represent the transfer or removal of funds from the account.Dedicated Synchronous Optical NETwork (SONET) - SONET is a standard for telecommunications transmissions over fiber optic cables. SONET is self-healing so that if a break occurs in the lines, it can use a back-up redundant ring to ensure that the transmission continues. SONET networks can transmit voice and data over optical networks.Deferred Net Settlement - See "National Settlement Service".Deliverable - A project goal or expectation. Deliverables include broadly-defined, project or phase requirements and specifically-defined tasks within project phases.Depositary Bank - The institution at which a check is first deposited. While this term is often used interchangeably with “depository,” “depositary” is a term of art in laws and regulations related to check processing. Depositary Bank (Check 21) - Also known as Bank of First Deposit (BOFD). The first bank to which a check is transferred even though it is also the paying bank or the payee. A check deposited in an account is deemed to be transferred to the financial institution holding the account into which the check is deposited, even though the check is physically received and endorsed first by another financial institution. Depository - An institution that holds funds or marketable securities for safekeeping. Depositories may be privately or publicly operated and allow securities transfers through book-entry and offer funds accounts permitting funds transfers as a means of payment.Dictionary Attack - Discovery of authenticators by encrypting likely authenticators and comparing the actual encrypted authenticator with the newly encrypted possible authenticators.Digital Certificate - The electronic equivalent of an ID card that authenticates the originator of a digital signature.Digital Subscriber Line (DSL) - DSL provides the ability to transmit high-speed digital signals over existing telephone lines.Direct Data Feed - A process used by information aggregators to gather information directly from a website operator rather than copying it from a displayed webpage.Direct Debit - Electronic transfer, usually through ACH, out of an individual's checking (or savings) account to pay bills, such as mortgage payments, insurance premiums, and utility payments. Also referred to as “direct payment.” Direct Deposit - Electronic deposits or credit, usually through ACH, to an individual’s deposit account. Common uses of direct deposit include payroll payments, Social Security benefits, and income from investments such as CDs, annuities, and mutual funds.Direct Presentment - Depositary banks can present checks directly to the paying institution. The paying institution may be the depositary bank (no settlement is needed), or, if not, may settle on the books of the Federal Reserve, using the Federal Reserve’s national settlement service.Disaster Recovery Exercise - A test of an institution’s disaster recovery or BCP. Disaster Recovery Plan - A plan that describes the process to recover from major processing interruptions.Disk Shadowing - A back-up process that involves writing images to two physical disks or servers simultaneously.Distributed Environment - A computer system with data and program components physically distributed across more than one computer.Diversity - A description of financial services sectors in which primary and back-up telecommunications capabilities do not share a single point of failure.DMZ - Abbreviation for “demilitarized zone.” A computer or small subnetwork that sits between a trusted internal network, such as a corporate private LAN, and an untrusted external network, such as the public Internet.DNS Server - Abbreviation for “Domain Name Service server.” A computer that determines Internet Protocol (IP) numeric addresses from domain names presented in a convenient, readable form.DSL - Digital subscriber line. A technology that uses existing copper telephone lines and advanced modulation schemes to provide high-speed telecommunications to businesses and homes. Dual Control - Dividing the responsibility of a task into separate, accountable actions to ensure the integrity of the process.EE-Banking - The remote delivery of new and traditional banking products and services through electronic delivery channels.Electronic Benefits Transfer (EBT) - A type of EFT system involving the transfer of public entitlement payments, such as welfare or food stamps, through direct deposit or point-of-sale technology (see POS). The recipient can be given an identification card, similar to a benefit card, and a PIN allowing access to the benefits through an electronic network.Electronic Bill Presentment and Payment (EBPP) - An electronic alternative to traditional bill payment, allowing a merchant or utility to present its customers with an electronic bill and the payer to pay the bill electronically. EBPP systems usually fall within two models: direct and consolidation-aggregation. In the direct model, the merchant or utility generates an electronic version of the consumer’s billing information, and notifies the consumer of a pending bill, generally via e-mail. The consumer can initiate payment of the electronically presented bill using a variety of payment mechanisms, typically a credit card. In the consolidation-aggregation model, the consumer’s bills are consolidated by a consolidator acting on behalf of merchants and utilities (or aggregated on behalf of the consumer), combining data from multiple bills and presenting a single source for the consumer to initiate payment. Some consolidators present bills at their own web sites, typically most support the aggregation of bills by consumer service providers such an Internet portals, financial institutions, and brokerage web sites. Electronic Check Conversion - The process by which a check is used as a source of information for the check number, the customer’s account number, and the number that identifies the financial institution. The information is used to make a one-time electronic payment from the customer’s account -- an electronic fund transfer. The check itself is not the method of payment.Electronic Check Presentment (ECP) - Check truncation methodology in which the paper check’s MICR line information is captured and stored electronically for presentment. The physical checks may or may not be presented after the electronic files are delivered, depending on the type of ECP service that is used.Electronic Commerce (E-Commerce) - A broad term encompassing the remote procurement and payment by businesses or consumers of goods and services through electronic systems such as the Internet.Electronic Data Capture (EDC) - Process used for capturing and transferring the encoded information on the magnetic strip from a bankcard or debit card at the point-of-sale to the processor’s database.Electronic Funds Transfer (EFT) - A generic term describing any transfer of funds between parties or depository institutions through electronic data systems.Electronic Funds Transfer Act (EFTA) - The Electronic Funds Transfer Act and Regulation E are designed to ensure adequate disclosure of basic terms, costs, and rights relating to electronic fund transfer (EFT) services provided to consumers. Institutions offering EFT services must disclose to consumers certain information, including: initial and updated EFT terms, transaction information, periodic statements of activity, the consumer’s potential liability for unauthorized transfers, and error resolution rights and procedures. EFT services include automated teller machines, telephone bill payment, point-of-sale transfers in retail stores, fund transfers initiated through the Internet, and pre-authorized transfers to or from a consumer’s account.Electronic Vaulting - A back-up procedure that copies changed files and transmits them to an off-site location using a batch process.Electronically Created Payment Orders - These are payment orders received by merchants from consumers, typically by telephone or the Internet. These payment orders are processed through the check processing system although they were not initiated as paper checks. These payment orders are not subject to check law and are not warranted by the Federal Reserve Banks. E-mail Server - A computer that manages e-mail traffic.Emergency Plan - The steps to be followed during and immediately after an emergency such as a fire, tornado, bomb threat, etc.Encryption - A data security technique used to protect information from unauthorized inspection or alteration. Information is encoded so that data appears as a meaningless string of letters and symbols during delivery or transmission. Upon receipt, the information is decoded using an encryption key.End User - An individual who will utilize a product or program.End-to-End Recoverability - The ability of an institution to recover a business process from initiation, such as customer contact, through process finalization, such as transaction closure. Enterprise Architecture - The configuration of computer systems within an organization. Includes local area networks (LANs), wide area networks (WANs), bridges, applications, etc.Enterprise-Wide - Encompassing an entire organization, rather than a single business department or function. Expedited Funds Availability Act (EFAA) - See "Regulation CC".Exploit - A technique or code that uses a vulnerability to provide system access to the attacker.Exposure - The potential loss to an area due to the occurrence of an adverse event.Exposure Limit - In reference to the settlement of operating services, this is the maximum amount an ACH originator is allowed to originate. This amount can be based on the originator’s credit rating, historical or predicted funding requirements, and the type of obligation.FFederal Reserve Banks - The Federal Reserve Banks provide a variety of financial services including retail and wholesale payments. The Federal Reserve Bank operates a nationwide system for clearing and settling checks drawn on depository institutions located in all regions of the United States.Fedwire® - The Federal Reserve Bank’s nationwide real time gross settlement electronic funds and securities transfer network. Fedwire® is a credit transfer system. Each funds transfer is settled individually against an institution’s reserve or clearing account on the books of the Federal Reserve. The transaction is considered an irrevocable payment as it is processed.Fedwire® Funds Service - The Federal Reserve Banks’ high-speed electronic funds transfer system. As a real-time gross settlement system, the Fedwire® Funds Service processes and settles individual payments between participants immediately in central bank money. Once processed, these payments are final.Fedwire® Securities Service - The Federal Reserve Banks’ high-speed electronic payments system for maintaining securities accounts and for effecting securities transfers. The Fedwire® Securities Service provides a real-time, delivery-versus-payment (DVP), gross settlement system that allows for the immediate, simultaneous transfer of securities against payment. Once processed, securities transfers are final.FEMA - FEMA is an acronym for Federal Emergency Management Agency.Fibre Channel - A high performance serial link supporting its own, as well as higher-level protocols such as the small computer system interface, high performance parallel interface framing protocol and intelligent peripheral interface. The Fibre Channel standard addresses the need for very fast transfers of large amounts of information. The fast (up to 1 Giga byte per second) technology can be converted for LAN technology by adding a switch specified in the Fibre Channel standard that handles multipoint addressing. Fibre Channel gives users one port that supports both channel and network interfaces, unburdening the computers from large number of input and output (I/O) ports. Fibre Channel provides control and complete error checking over the link. FIN (Financial Application) - The SWIFT application within which all SWIFT user-to-user messages are input and output.Finality - Irrevocable and unconditional transfer of payment during settlement.Financial Authority - A supervisory organization that is responsible for safeguarding and maintaining consumer confidence in the financial system.Financial EDI (FEDI) - Financial electronic data interchange. An instrument for settling invoices by initiating payments, processing remittance data and automating reconciliation, through the exchange of electronic messages.Financial Industry Participants - Financial institutions and other companies that are involved in the banking, securities, and/or insurance industry and are regulated by supervisory authorities.Firewall - A hardware or software link in a network that relays only data packets clearly intended and authorized to reach the other side. Float - Funds held by an institution during the check-clearing process before being made available to a depositor. Interest may be earned on these funds. Flowcharts - Traditional flowcharts involve the use of geometric symbols, such as diamonds, ovals, and rectangles to represent the sequencing of program logic. Software packages are available that automatically chart programs or enable a programmer to chart a program without the need to draw it manually.Frame Relay - A high-performance WAN protocol that operates at the physical and data link layers of the Open Systems Interconnect (OSI) reference model. Frame Relay is an example of a packet-switched technology. Packet-switched networks enable end stations to dynamically share the network medium and the available bandwidth. Frame relay uses existing T-1 and T-3 lines and provides connection speeds from 56 Kbps to T-1.Framing - A frame is an area of a webpage that scrolls independently of the rest of the webpage. Framing generally refers to the use of a standard frame containing information (like company name and navigation bars) that remains on the screen while the user moves around the text in another frame.FS/ISAC - Financial Services Information Sharing and Analysis Center.Full-Duplex - A communications channel that carries data in both directions.Full-Interruption/ Full-Scale Test (IT and Staff) - A business continuity test that activates all the components of the disaster recovery plan at the same time. Hardware, software, staff, communications, utilities, and alternate site processing should be thoroughly tested in this type of testing activity. The exercise should include the business line end users and the IT group to ensure that each business line tests its key applications and is prepared to recover and resume its business operations in the event of an emergency. The full test verifies that systems and staff can recover and resume business within established recovery time objectives. End users should verify the integrity of the data at the alternate site after the IT group has restored systems and applications needed for the staff to perform production activities.Functional Drill/Parallel Test - This test involves the actual mobilization of personnel at other sites in an attempt to establish communications and coordination as set forth in the BCP.Functional Requirements - The business, operational, and security features an organization wants included in a program.Functionality Testing - A test designed to validate that a business process or activity accomplishes expected results.GGap Analysis - A comparison that identifies the difference between actual and desired outcomes.Gateway Server - A computer (server) that connects a private network to the private network of a servicer or other business. General Controls - Controls, other than application controls, that relate to the environment within which application systems are developed, maintained, and operated, and that are therefore applicable to all the applications at an institution. The objectives of general controls are to ensure the proper development and implementation of systems, and the integrity of program and data files and of computer operations. Like application controls, general controls may be either manual or programmed. Examples of general controls include the development and implementation of an IT strategy and an IT security policy, the organization of IT staff to separate conflicting duties and planning for disaster prevention and recovery.GETS - Acronym for the Government Emergency Telecommunications Service card program. GETS cards provide emergency access and priority processing for voice communications services in emergency situations. Gramm-Leach-Bliley Act - The Gramm-Leach-Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999, (Pub.L. 106-102, 113 Stat. 1338, enacted November 12, 1999), repealed part of the Glass-Steagall Act of 1933, allowing commercial banks, investment banks, securities firms and insurance companies to consolidate.Grandfather-Father-Son - Retaining multiple versions of the back-up files off-site on a “grandfather-father-son” rotating basis is recommended. This tape methodology creates three sets of back-up tapes: daily incremental sets or “sons,” weekly full sets or “fathers,” and end-of-month tapes or “grandfathers.” HHacker - An individual who attempts to break into a computer without authorization.Haircut - With respect of an eligible currency, the percentage increase of a negative currency balance or reduction of a positive currency balance and is based on (a) the volatility of the historic foreign exchange movements in the applicable eligible currency determined by CLS Bank and (b) an add-on component.Hardening - The process of securing a computer’s administrative functions or inactivating those features not needed for the computer’s intended business purpose. Hash - A fixed length cryptographic output of variables, such as a message, being operated on by a formula or cryptographic algorithm.Hash Totals - A numerical summation of one or more corresponding fields of a file that would not ordinarily be summed. Typically used to detect when changes in electronic information have occurred.HBA - Host bus adapter. A host bus adapter provides I/O processing and physical connectivity between a server and storage. As the only part of a storage area network that resides in a server, HBAs also provide a critical link between the storage area network and the operating system and application software. Hierarchical Storage Management (HSM) - HSM is used to dynamically manage the back-up and retrieval of files based on how often they are accessed using storage media and devices that vary in speed and cost.Hijacking - The use of an authenticated user’s communication session to communicate with system components.Hop - Each step of a trip a data packet takes from its origination to its destination. For example, on the Internet a data packet may go through several routers before reaching its final destination. Host - A computer that is accessed by a user from a remote location.Hosting - See "Website Hosting".HTML - Abbreviation for “Hypertext Markup Language.” A set of codes that can be inserted into text files to indicate special typefaces, inserted images, and links to other hypertext documents.Hub - Simple devices that pass all data traffic in both directions between the LAN sections they link. Hubs forward every message they receive to the other sections of the LAN, even those that do not need to go there. HVAC - Heating, ventilation, and air conditioning.Hyperlink - An item on a webpage that, when selected, transfers the user directly to another location in a hypertext document or to another webpage, perhaps on a different machine. Also simply called a “link.”II/O - Input/output.IDS - Intrusion Detection System.Image Archive (Check 21) - Database for storage and easy retrieval of check images.Image Capture (Check 21) - The process of digitizing both sides of physical items and their assorted MICR information as they are processed at the Federal Reserve Bank. Also includes storage of the images for up to 60 days.Image Exchange (Check 21) - Exchange of some or all of the digitized images of a check.Indemnifying Bank (Check 21) - A financial institution that transfers, presents, or returns a substitute check or a paper or electronic representation of a substitute check for which it receives consideration. The financial institution shall indemnify the recipient and any subsequent recipient (including a collecting or returning financial institution, the depository financial institution, the drawer, the drawee, the payee, the depositor, and any endorser) for any loss incurred by any recipient of a substitute check if that loss occurred due to the receipt of a substitute check instead of the original. Independence - Self-governance, freedom from conflict of interest and undue influence. The IT auditor should be free to make his or her own decisions, not influenced by the organization being audited, or by its managers and employees. Independent Sales Organizations(ISO) - Industry Testing - A test designed to validate that business processes, integrated across firms and within the financial industry, which supports the business continuity objectives of the firms, both individually and collectively.Instruction - Means (i) any instruction submitted by a Member through the submission process directing CLS Bank to settle certain payment entitlements and obligations arising pursuant to an FX transaction eligible for settlement in CLS Bank and (ii) any instructions resulting from the split of Settlement Eligible Instructions.Integrated Services Digital Network (ISDN) - Integrated Test / Exercise - This integrated test/exercise incorporates more than one component or module, as well as external dependencies, to test the effectiveness of the continuity plans for a business line or major function. Interbank Checks - Checks that are not “on-us.” They are cleared and settled either by direct presentment, a clearinghouse association, a correspondent bank, or a Federal Reserve Bank.Interchange - Exchange of transactions between financial institutions participating in a bank card network, based on a common set of rules. Card interchange allows a financial institution’s customers to use a bank credit card at any card honoring merchant and to gain access to multiple ATM systems from a single ATM.Interchange (fees) - Fees paid by one financial institution to another to cover handling costs and credit risk in a financial institution card transaction. Interchange fees generally flow toward the institution funding the transaction and assuming the risk. In a credit card transaction, the interchange fee is paid by the merchant acquirer accepting the merchant’s sales draft to the card-issuing institution, which, in turn, passes the fee to its merchants. In EFT/POS transactions, interchange flows in the opposite direction: the card-issuing institution (or customer) pays the fee to the terminal-owning institution. When a transaction is an off-line debit sale, the card-issuing institution collects an interchange fee from the merchant, rather than from the customer, unlike in an EFT/POS transaction, where the customer pays the interchange fee. Interchange revenue is derived from fees set by the card associations. Depending on the card association, fees can range from 1% to 3% of the value of the transaction. Interchange revenue is recognized as a card issuer’s second largest revenue line item. Interdependencies - Where two or more departments, processes, functions, and/or third parties support one another in some fashion. Interface - Computer programs that translate information from one system or application into a format required for use by another system or application.Internet - A worldwide network of computer networks, governed by standards and protocols developed by the Internet Engineering Task Force (IETF).Internet Protocol (IP) - IP is a standard format for routing data packets between computers. IP is efficient, flexible, routable, and widely used with many applications, and is gaining acceptance as the preferred communication protocol. Internet Service Provider (ISP) - A company that provides its customers with access to the Internet.Interoperability Standards/Protocols - Commonly agreed on standards that enable different computers or programs to share information. Example: HTTP (Hypertext Transfer Protocol) is a standard method of publishing information as hypertext in HTML format on the Internet.Intrusion Detection System (IDS) - Software/hardware that detects and logs inappropriate, incorrect, or anomalous activity. IDS are typically characterized based on the source of the data they monitor: host or network. A host-based IDS uses system log files and other electronic audit data to identify suspicious activity. A network-based IDS uses a sensor to monitor packets on the network to which it is attached.IPS - Intrusion Prevention System.IPv6 - Version 6 of the Internet Protocol.ISAC - Information Sharing and Analysis Center.iSCSI - Internet small computer system interface. An Internet protocol based storage networking standard for linking data storage facilities, used to facilitate. iSCSI is data transfers over intranets and to manage storage over long distances.ISDN - Integrated systems digital networking. A hierarchy of digital switching and transmission systems that provides voice, data, and image in a unified manner. ISDN is synchronized so that all digital elements communicate in the same protocol at the same speed.ISO - International Organization for Standards.Iterative - Repetitive or cyclical. Iterative software development involves the completion of project tasks or phases in repetitive cycles. Tasks and phase activities are repeated until a desired result is achieved.KKey Fob - A small portable device equipped with chip technology allowing the holder the ability to access network systems, such as those used for payments, and to store personal data.Kiosk - A publicly accessible computer terminal that permits customers to directly communicate with the financial institution via a network. LLAN - Local Area Network.LAR - Legal amount recognition. The handwritten dollar amount of the check.Large Value Funds Transfer System - A wholesale payment system used primarily by financial institutions in which large values of funds are transferred between parties. Fedwire® and CHIPS are the two large-value transfer systems in the United States.Legacy Systems - A term commonly used to refer to existing computers systems and applications with which new systems or applications must exchange information.Lockbox - Deposit mechanism used by commercial firms and businesses to facilitate their deposit transaction volume. Typically, commercial firms and businesses direct customers to send payments directly to a financial institution address or post office box controlled by the institution. Financial institution personnel record payments received and prepare deposit slips, and subsequent processing proceeds as with other deposit taking activities.Lockout - The action of temporarily revoking network or application access privileges, normally due to repeated unsuccessful logon attempts.Long Position - In respect of a currency balance that is greater than zero, the amount by which such currency balance is greater than zero. A position that appreciates in value if market prices increase. When one buys a currency, their position is long.MMagnetic Ink Character Recognition (MICR) - Magnetic codes found on the bottom of checks, deposit slips, and general ledger debit and credit tickets that allow a machine to scan (capture) the information. MICR encoding on a check includes the account number, the routing number, the serial number of the check, and the amount of the check. The amount of the check is encoded when the proof department processes the check. Mainframe - An industry term for a large computer, typically used for the commercial applications of businesses and other large-scale computing purposes. Generally, a mainframe is associated with centralized rather than distributed computing. Man-In-The-Middle Attack - A man-in-the-middle attack places the attacker’s computer in the communication line between the server and the client. The attacker’s machine can monitor and change communications.Market-Wide Tests - Market-wide tests are also called cross-market tests or “street tests” that are sponsored by the Securities Industry Association, Bond Market Association, and Futures Industry Association. These tests validate the connectivity from alternate sites and include transaction, settlement, and payment processes, to the extent practical.Matched Instructions - Two Instructions in which the information set forth in a specific CLS Bank Rule is matched in accordance with the parameters and procedures set forth in the CLS Bank Rules.Matching - With respect to compared and non-compared transactions, the process of comparing the trade or settlement details provided by counterparties to ensure they agree with respect to the terms of the transaction. Also called comparison checking.Media - Physical objects that store data, such as paper, hard disk drives, tapes, and compact disks (CDs).Merchant Acquirer - Bankcard association members that initiate and maintain contractual agreements with merchants for the purpose of accepting and processing bankcard transactions. Merchant Processing - Activity for the acceptance and settlement of bankcard products and transactions from merchants through the payment system.Metrics - A quantitative measurement.MICR - Magnetic ink character recognition. Magnetic codes found on the bottom of checks, deposit slips, and general ledger debit and credit tickets that allow a machine to scan (capture) the information. MICR encoding on a check includes the account number, the routing number, the serial number of the check and the amount of the check. The amount of the check is encoded when the proof department processes the check.MICR-line information - Magnetic codes found on the bottom of checks, deposit slips, and general ledger debit and credit tickets that allow a machine to scan (capture) the information. MICR encoding on a check includes the account number, the routing number, the serial number of the check, and the amount of the check. The amount of the check is encoded when the proof department processes the check.Microwave Technology - Narrowband technology that requires a direct line-of-sight to transmit voice and data communications and is used to integrate a broad range of fixed and mobile communication networks.Midrange - Computers that are more powerful and capable than personal computers but less powerful and capable than mainframe computers.Milestone - Major project event.MIPS - Millions of instructions per second. A general measure of computing performance and, by implication, the amount of work a larger computer can do.Mirroring - A process that copies data to multiple disks over a computer network in real time or close to real time. Mirroring reduces network traffic, ensures better availability of the website or files, or enables the site or downloaded files to arrive more quickly for users close to the mirror site.MIS - Management information systems. A general term for the computer systems in an enterprise that provide information about its business operations. Mnemonic - A symbol or expression that can help someone remember something. For example, the phrase “Hello! My name is Bill. I'm 9 years old.” might help an individual remember a secure 10-character password of “H!MniBI9yo.”Modeling - The process of abstracting information from tangible processes, systems and/or components to create a paper or computer-based representation of an enterprise-wide or business line activity. Module - A combination of various components of a business process or supporting system. Module Test / Exercise - A test designed to verify the functionality of multiple components of a business line or supporting function at the same time. Multi-Factor Authentication - Strong authentication mechanism relying on more than one type of authentication. A PIN or password alone is representative of single factor authentication. Adding additional authentication mechanisms would result in multi-factor authentication.Multilateral Netting Settlement System - Multilateral netting is an arrangement among three or more parties to net their obligations. In these settlement systems transfers are irrevocable but are only final after the completion of end-of-day-settlement.Multiplexers - A device that encodes or multiplexes information from two or more data sources into a single channel. They are used in situations where the cost of implementing separate channels for each data source is more expensive than the cost and inconvenience of providing the multiplexing/de-multiplexing functions.NNACHA – The Electronic Payments Association (NACHA) - The national association that establishes the rules and procedures governing the exchange of ACH payments.NAS - Network attached storage. Hard disk storage set up with its own network address rather than being attached to the department computer that is serving applications to a network's workstation users. By removing storage access and its management from the department server, both application programming and files can be served faster because they are not competing for the same processor resources. The network-attached storage device is attached to a local area network (typically, an Ethernet network) and assigned an IP address. File requests are mapped by the main server to the NAS file server.National Settlement Service (NSS) - Also referred to as Deferred Net Settlement. The Federal Reserve Banks’ multilateral settlement service. NSS is offered to depository institutions that settle for participants in clearinghouses, financial exchanges, and other clearing and settlement groups. Settlement agents acting on behalf of those depository institutions electronically submit settlement files to the Federal Reserve Banks. Files are processed on receipt, and entries are automatically posted to the depository institutions’ Reserve Bank accounts. Entries are final when posted.Net Debit Cap - The maximum dollar amount of uncollateralized daylight overdrafts that an institution is authorized to incur in its Federal Reserve account. The net debit cap is generally equal to an institution’s capital times the cap multiple for its cap category.Network - Two or more computer systems that are grouped together to share information, software, and hardware.Network Administrator - The individual responsible for the installation, management, and control of a network.Network Attached Storage (NAS) - NAS systems usually contain one or more hard disks that are arranged into logical, redundant storage containers much like traditional file servers. NAS provides readily available storage resources and helps alleviate the bottlenecks associated with access to storage devices. Non-Repudiation - Ensuring that a transferred message has been sent and received by the parties claiming to have sent and received the message. Non-repudiation is a way to guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message.OObject Code - Software program instructions compiled (translated) from source code into machine-readable formats.Object Program - A program that has been translated into machine language and is ready to be run (i.e., executed) by the computer.Office of Foreign Asset Control (OFAC) - The Office of Foreign Assets Control, United States Department of the Treasury, administers and enforces economic sanctions programs primarily against countries and groups of individuals such as terrorists and narcotics traffickers. The sanctions can be either comprehensive or selective, using the blocking of assets and trade restrictions to accomplish foreign policy and national security goals.On-Us Checks - Checks that are deposited into the same institution on which they are drawn.Open Market Operations - The buying and selling of government securities in the open market in order to expand or contract the amount of money in the banking system.Operating System - Programs that collectively manage application programs. Operating systems allocate system resources, provide access and security controls, maintain file systems, and manage communications between end users and hardware devices.Originating Depository Financial Institution (ODFI) - A participating financial institution that originates entries at the request of and by agreement with its originators in accordance with the provisions of the NACHA rules.Originator - A person that has authorized an ODFI to transmit a credit or debit entry to the deposit account of a receiver at an RDFI.Outsourcing - The practice of contracting with another entity to perform services that might otherwise be conducted in-house. PP2P - Peer-to-peer communication, the communications that travel from one user’s computer to another user’s computer without being stored for later access on a server. E-mail is not a P2P communication since it travels from the sender to a server, and is retrieved by the recipient from the server. On-line chat, however, is a P2P communication since messages travel directly from one user to another.Pandemic - An epidemic or infectious disease that can have a worldwide impact.Passwords - A secret sequence of characters that is used as a means of authentication. Patch - Software code that replaces or updates other code. Frequently patches are used to correct security flaws.Patching - Software code that replaces or updates other code. Frequently patches are used to correct security flaws.Paying Bank - A paying bank is the institution where a check is payable and to which it is sent for payment.Payment - A transfer of value.Payment System - The mechanism, the rules, institutions, people, markets, and agreements that make the exchange of payments possible.Payments System Risk Policy (PSR) - The Federal Reserve’s Payments System Risk (PSR) policy addressing the risks that payment systems present to the Federal Reserve Banks, the banking system, and to other sectors of the economy. Payroll Card Account - A bank account that is established directly or indirectly by an employer on behalf of an employee to which an electronic funds transfers the employee’s wages or compensation on a recurring basis. The payroll card, often branded by one of the credit/debit card associations, provides the employee access to the funds. PBX - Private branch exchange. A telephone system within an enterprise that switches calls between enterprise users on local lines while allowing all users to share a certain number of external phone lines.PCI Security Standards Council - The governing body, representing key participants of the payment card industry, which establishes and maintains security standards for payment cards.Penetration Test - The process of using approved, qualified personnel to conduct real-world attacks against a system so as to identify and correct security weaknesses before they are discovered and exploited by others. Permanent Virtual Circuit (PVC) - PVC is a pathway through a network that is predefined and maintained by the end systems and nodes along the circuit, but the actual pathway through the network may change due to routing problems. The PVC is a fixed circuit that is defined in advance by the public network carrier. Refer to switched virtual circuit for an additional virtual circuit option.Personal Digital Assistant (PDA) - A pocket-sized, special-purpose personal computer that lacks a conventional keyboard.Person-To-Person (P2P) Payment - Online payments using electronic mail messages to invoke a transfer of value between the parties over existing proprietary networks as on-us transactions.Phase - A project segment.PKI - Abbreviation for “public key infrastructure.” The use of public key cryptog-raphy in which each customer has a key pair (i.e., a unique electronic value called a public key and a mathematically-related private key). The private key is used to encrypt (sign) a message that can only be decrypted by the cor-responding public key or to decrypt a message previously encrypted with the public key. The public key is used to decrypt a message previously encrypted (signed) using an individual's private key or to encrypt a message so that it can only be decrypted (read) using the intended recipient’s private key. See "Encryption".Platform - The underlying computer system on which applications programs run. A platform consists of an operating system, the computer system's coordinating program, which in turn is built on the instruction set for a processor or microprocessor, and the hardware that performs logic operations and manages data movement in the computer. POD - Proof of deposit. The verification of the dollar amount written on a negotiable instrument being deposited. Point-Of-Sale (POS) Network - A network of institutions, debit cardholders, and merchants that permit consumers to make direct payment electronically at the place of purchase. The funds are withdrawn from the account of the cardholder.Pop-Up Box - A dialog box that automatically appears when a person accesses a webpage.Port - Either an endpoint to a logical connection or a physical connection to a computer.POTS - Plain old telephone system. Basic telephone service.Presentment Fee - A fee that an institution receiving a check may impose on the institution that presents the check for payment. No presentment fee may be charged for checks presented by 8 a.m. local time.Private Key - See "PKI".Private Label Card - See "Store Card".Project - A task involving the acquisition, development or maintenance of a technology product.Project Management - Planning, monitoring, and controlling an activity.Protocol - A format for transmitting data between devices.Proxy Server - An Internet server that controls client computers’ access to the Internet. Using a proxy server, a company can stop employees from accessing undesirable websites, improve performance by storing webpages locally, and hide the internal network's identity so monitoring is difficult for external users.Public Key - See "PKI".RRAID - Redundant array of independent disks. The use of multiple hard disks to store the same data in different places. By placing data on multiple disks, I/O operations can overlap in a balanced way, improving performance. Since multiple disks increase the mean time between failures (MTBF), storing data redundantly also increases fault-tolerance. Real Time Gross Settlement (RTGS) System - A type of payments system operating in real time rather than batch processing mode. It provides immediate finality of transactions. Gross settlement refers to the settlement of each transfer individually rather than netting. FedwireÒ is an example of a real time gross settlement system.Receiver - An individual, corporation, or other entity that has authorized a company or an originator to initiate a credit or debit entry to a transaction account belonging to the receiver held at its RDFI.Receiving Depository Financial Institution (RDFI) - Any financial institution qualified to receive debits or credits through its ACH operator in accordance with the ACH rules.Reciprocal Agreement - An agreement whereby two organizations with similar computer systems agree to provide computer processing time for the other in the event one of the systems is rendered inoperable. Processing time may be provided on a “best effort” or as “time available” basis; therefore, reciprocal agreements are not usually acceptable as a primary recovery option.Reconverting Bank (Check 21) - The financial institution that creates a substitute check. With respect to a substitute check that was created by a person that is not a financial institution, the reconverting bank is the first financial institution that transfers, presents, or returns that substitute check or, in lieu thereof, the first paper or electronic representation of that substitute check. The reconverting bank warrants that (1) the substitute check is the legal equivalent of the original check; and (2) the original check cannot be presented again in any form so the customer pays the check only once.Recovery Point Objectives (RPOs) - RPOs represent the amount of data that can be lost without severely impacting the recovery of operations or the point in time in which systems and data must be recovered (e.g., the date and time of a business disruption). Recovery Site - An alternate location for processing information (and possibly conducting business) in an emergency. Usually distinguished as “hot” sites that are fully configured centers with compatible computer equipment and “cold” sites that are operational computer centers without the computer equipment.Recovery Time Objectives (RTOs) - RTOs represent the maximum allowable downtime that can occur without severely impacting the recovery of operations or the time in which systems, applications, or business functions must be recovered after an outage (e.g. the point in time that a process can no longer be inoperable). Recovery Vendors - Organizations that provide recovery sites and support services for a fee. Regulation CC - A regulation (12 CFR 229) promulgated by the Board of Governors of the Federal Reserve System regarding the availability of funds and the collection of checks. The regulation governs the availability of funds deposited in checking accounts and the collection and return of checks.Regulation E - A regulation (12 CFR 205) promulgated by the Board of Governors of the Federal Reserve System to ensure consumers a minimum level of protection in disputes arising from electronic fund transfers.Regulation Z - Regulation Z, the Truth in Lending Act (TILA) (12 CFR 226) promulgated by the Board of Governors of the Federal Reserve System. The regulation prescribes uniform methods for computing the cost of credit, disclosing credit terms, and resolving errors on certain types of credit accounts.Remittance Cards - Payment cards that are typically used to facilitate cross-border movement of funds by individuals and for person-to-person transactions.Remote Access Capabilities - The ability to obtain access to a computer or network from a remote distance.Remote Capture - Process that is used to scan and transmit check images and data electronically.Remote Control Software - Software that is used to obtain access to a computer or network from a remote distance.Remote Deposit Capture (RDC) - A service that enables users at remote locations to scan digital images of checks and transmit the captured data to a financial institution or a merchant that is a customer of a financial institution.Remote Journaling - Process used to transmit journal or transaction logs in real time to a back-up location.Remotely Created Check (RCC) - A check that is drawn on a customer account at a financial institution, is created by the payee, and does not bear a signature in the format agreed to by the paying financial institution and customer. RCCs are also known as “demand drafts,” “telechecks,” “preauthorized drafts,” “paper drafts,” or “digital checks.” Replay Attack - The interception of communications, such as an authentication communication, and subsequently impersonation of the sender by retransmitting the intercepted communication.Repudiation - The denial by one of the parties to a transaction of participation in all or part of that transaction or of the content of the communication.Reserve Account - A non-interest-earning balance account institutions maintain with the Federal Reserve Bank or with a correspondent bank to satisfy the Federal Reserve’s reserve requirements. Reserve account balances play a central role in the exchange of funds between depository institutions.Reserve Requirements - The percentage of deposits that a depository institution may not lend out or invest and must hold either as vault cash or on deposit at a Federal Reserve Bank. Reserve requirements affect the potential of the banking system to create transaction deposits.Resiliency - The ability of an organization to recover from a significant disruption and resume critical operations.Resiliency Testing - Testing of an institution’s business continuity and disaster recovery resumption plans.Retail Payments - Payments, typically small, made in the goods and services market.Return (ACH) - Any ACH entry that has been returned to the ODFI by the RDFI or by the ACH operator because it cannot be processed. The reason for each return is included with the return in the form of a “return reason code.” (See the NACHA “Operating Rules and Guidelines” for a complete reason code listing.)Risk - The possibility of an act or event occurring that would have an adverse effect on the organization and its information systems. Risk Assessment - A prioritization of potential business disruptions based on severity and likelihood of occurrence. The risk assessment includes an analysis of threats based on the impact to the institution, its customers, and financial markets, rather than the nature of the threat. Router - A hardware device that connects two or more networks and routes incoming data packets to the appropriate network.Routing - The process of moving information from its source to the destination.Routing Number - Also referred to as the ABA number. A nine-digit number (eight digits and a check digit) that identifies a specific financial institution.SSAN - Storage area network. A high-speed special-purpose network (or sub-network) that connects different types of data storage devices with associated data servers on behalf of a larger network of users. SAS 70 Report - An audit report of a servicing institution prepared in accordance with guidance provided in the American Institute of Certified Public Accountant's Statement of Auditing Standards Number 70.Satellite Technology - These links efficiently extend the reach of typical communication systems to distant areas and provide alternative traffic routing in an emergency.Scalability - A term that refers to how well a hardware and software system can adapt to increased demands. For example, a scalable network system would be one that can start with just a few nodes but can easily expand to thousands of nodes. Scalability can be a very important feature because it means the entity can invest in a system with confidence they will not quickly outgrow it. Script - A file containing active content; for example, commands or instructions to be executed by the computer.SCSI - Small computer systems interface (pronounced ”scuzzy”). A standard way of interfacing a computer to disk drives, tape drives, and other devices that require high-speed data transfer. Also, a secondary SAN protocol that allows computer applications to talk to storage devices.SDLC - Systems Development Life Cycle. A project management technique.Security Event - An event that compromises the confidentiality, integrity, availability, or accountability of an information system.Security Procedure Agreement - An agreement between a financial institution and a Federal Reserve Bank whereby the financial institution agrees to certain security procedures if it uses an encrypted communications line with access controls for the transmission or receipt of a payment order to or from a Federal Reserve Bank.Server - A computer or other device that manages a network service. An example is a print server, which is a device that manages network printing.Settlement - The final step in the transfer of ownership involving the physical exchange of securities or payment. In a banking transaction, settlement is the process of recording the debit and credit positions of the parties involved in a transfer of funds. In a financial instrument transaction, settlement includes both the transfer of securities by the seller and the payment by the buyer. Settlements can be “gross” or “net.” Gross settlement means each transaction is settled individually. Net settlement means parties exchanging payments will offset mutual obligations to deliver identical items (e.g., dollars or EUROS), at a specified time, after which only one net amount of each item is exchanged.Settlement Date (ACH) - The date on which an exchange of funds with respect to an entry is reflected on the books of the Federal Reserve Bank.Settlement Eligible Instructions - See "Matched Instructions". Short Position - In respect of a currency balance that is less than zero, the amount by which such currency balance is less than zero. An investment position that benefits from a decline in market price. When one sells a currency their position is short.Short Position Limit - In respect of an eligible currency, the maximum short position a Settlement Member may have at any time in that eligible currency and, unless otherwise reduced pursuant to the CLS Bank Rules, shall equal (i) the total amount of all available committed liquidity facilities in such eligible currency (or such lesser amount that CLS Bank may determine from time to time) minus (ii) the amount of the largest available committed liquidity facility among such liquidity facilities (after taking into account any amounts already drawn. Significant Firms - Firms that process a significant share of transactions in critical financial markets. Simulated Loss of Data Center Site(s) Test / Exercise - A type of disaster recovery test that involves the simulation of the loss of the primary, alternate, and/or tertiary data processing sites to verify that the institution can continue its data processing activities. Simulation - The process of operating a model of an enterprise-wide or business line activity in order to test the functionality of the model. Computer systems may support the simulation of business models to aid in evaluating the BCP. Single-Entry (ACH) - A one-time transfer of funds initiated by an originator in accordance with the receiver’s authorization for a single ACH credit or debit to the receiver's consumer account.SLA - Service level agreement. SLAs detail the responsibilities of an IT service provider, the rights of the service provider’s customers, and the penalties assessed when the service provider violates any element of the SLA. SLAs also identify and define the service offering itself, plus the supported products, evaluation criteria, and quality of service customers should expect. SLAs are typically measured in terms of metrics. Examples include processing completion times and systems availability times.Smart Cards - A card with an embedded computer chip on which information can be stored and processed.Sniffing - The passive interception of data transmissions.Social Engineering - Obtaining information from individuals by trickery.SONET - Synchronous optical network. A standard that defines interface standards for connecting fiber-optic transmission systems. Sound Practices - Defined in the “Interagency Paper on Sound Practices to Strengthen the Resilience of the U.S. Financial System,” which was issued by the Board of Governors of the Federal Reserve System, Office of the Comptroller of the Currency, and Securities and Exchange Commission. Source Code - Software program instructions written in a format (language) readable by humans.Source Program - A program written in a programming language (such as C, Pascal, or COBOL). A compiler translates the source code into a machine-language object program.Spiral Development - An iterative project management model that focuses on the identification of project and product risks and the selection of project management techniques that best control the identified risks.Split Processing - The ongoing operational practice of dividing production processing between two or more geographically dispersed facilities.Spoofing - A form of masquerading where a trusted IP address is used instead of the true IP address as a means of gaining access to a computer system.Spot - The most common foreign exchange transaction. Spot or spot date refers to the spot transaction value date that requires settlement within two business days, subject to value date calculation.Sreen Scraping - A process used by information aggregators to gather information from a customer’s website, whereby the aggregator accesses the target site by logging in as the customer, electronically reads and copies selected information from the displayed webpage(s), then redisplays the information on the aggregator’s site. The process is analogous to “scraping” the information off the computer screen. SSL (Secure Socket Layer) - An encryption system developed by Netscape. SSL protects the privacy of data exchanged by the website and the individual user. It is used by websites whose names begin with https instead of http.Standard Entry Class (SEC) Code - Three-character code in an ACH company/batch header record used to identify the payment type within an ACH batch.Stateful Inspection - A firewall inspection technique that examines the claimed purpose of a communication for validity. For example, a communication claiming to respond to a request is compared to a table of outstanding requests.Storage Area Network (SAN) - SAN represents several storage systems that are interconnected to form one back-up network, which allows various systems to be connected to any storage device and prevents dependence on a single line of communication.Storage Virtualization - The process of taking many different physical storage networks and devices, and making them appear as one “virtual” entity for purposes of management and administration.Store Card - A credit card issued by a financial institution for a specific merchant or vendor that does not carry a bankcard association logo. Store cards can only be used at the merchant or vendor whose name appears on the front of the card.Stored-Value Card - A card-based payment system that assigns a value to the card. The card’s value can be stored on the card itself (i.e., on the magnetic stripe or in a computer chip) or in a network database. As the card is used for transactions, the transaction amounts are subtracted from the card’s balance. As the balance approaches zero, some cards can be "reloaded" through various methods and others are designed to be discarded. These cards are often used in closed systems for specific types of purchases.Stovepipe Application - Stand-alone programs that may not easily integrate with other applications or systems.Street Tests - Street tests are also called cross-market tests or market-wide tests that are sponsored by the Securities Industry Association, Bond Market Association, and Futures Industry Association. These tests validate the connectivity from alternate sites and include transaction, settlement, and payment processes, to the extent practical. Substitute Check (Check 21) - Also known as the Image Replacement Document (IRD). A paper reproduction of an original check that (1) contains an image of the front and back of the original check; (2) bears a MICR line that, except as provided under ANS X9.100-140, contains all the information appearing on the MICR line of the original check when it was issued and any additional information that was encoded on the original check’s MICR line before an image of the original check was captured; (3) conforms in paper stock, dimension, and otherwise with ANS X9.100-140; and (4) is suitable for automated processing in the same manner as the original check. The Federal Reserve Board of Governors can by rule or order determine different standards. Suspicious Activity Report (SAR) - Reports required to be filed by the Bank Secrecy Act when a financial institution identifies or suspects fraudulent activity. Sustainability - The period of time for which operations can continue at an alternate processing facility. Switch - A device that connects more than two LAN segments that use the same data link and network protocol. Switched Virtual Circuit (SVC) - SVC is a temporary connection between workstations that is disabled after communication is complete. Refer to Permanent Virtual Circuit (PVC) for an additional communication method using circuits.Synchronous Data Replication - A process for copying data from one source to another in which an acknowledgement of the receipt of data at the copy location is required for application processing to continue. Consequently, the content of databases stored in alternate facilities is identical to those at the original storage site, and copies of data contain current information at the time of a disruption in processing.System Resources - Capabilities that can be accessed by a user or program either on the user’s machine or across the network. Capabilities can be services, such as file or print services, or devices, such as routers.Systems Development Life Cycle - An approach used to plan, design, develop, test, and implement an application system or a major modification to an application system. TT-1 Line - A special type of telephone line for digital communication and transmission. T-1 lines provide for digital transmission with signaling speed of 1.544Mbps (1,544,000 bits per second). This is the standard for digital transmissions in North America. Usually delivered on fiber optic lines.Table Top Exercise/ Structured Walk- Through Test - TCO - Total cost of ownership. A term defining the true cost of ownership of a PC or other technology system. TCO includes:
- Original cost of the computer and software;
- Hardware and software upgrades;
- Technical support; and
- Training TCP/IP - Transmission control protocol/Internet protocol. A communication standard for transmitting data packets from one computer to another. TCP/IP is used on the Internet and other networks. The two parts of TCP/IP are TCP, which deals with constructions of data packets, and IP, which routes them from machine to machine. Terminal Services - A component of Microsoft Windows operating systems (both client and server versions) that allows a user to access applications or data stored on a remote computer over a network connection.Test Assumptions - The concepts underlying an institution’s test strategies and plans. Test Key - Internal controls used to verify the authenticity of incoming wire requests involve the use of test keys. A test key is a formula used to develop or interpret test codes or test words. Test codes or words consist of a series of numbers signifying different types of information and usually precede the text of the message. As an example, a test code may contain a bank number, the amount of the transaction, and a number indicating the day and week of the month. As an additional precaution, many test codes contain a variable (sequence number) based on the number of messages received. Test Plan - A document that is based on the institution’s test scope and objectives and includes various testing methods. Test Scenario - A potential event, identified as the operating environment for a business continuity or disaster recovery test, which the institution’s recovery and resumption plan must address. Test Scripts - Documents that define the specific activities, tasks, and steps that test participants will conduct during the testing process. Test Strategy - Testing strategies establish expectations for individual business lines across the testing life cycle of planning, execution, measurement, reporting, and test process improvement. Testing strategies include the testing scope and objectives, which clearly define what functions, systems, or processes are going to be tested and what will constitute a successful test.Third-Party Sender - A special subset of a technology service provider that is authorized to transmit ACH files on behalf of an originator. Typically, the ODFI must rely upon warranties by the third- party sender regarding the originators’ identity and credit worthiness, which places additional risks on the ODFI.Third-Party Service Provider (TPSP)(For ACH) - A third party, other than the ODFI or RDFI, that performs any function on behalf of the ODFI or the RDFI related to ACH processing. These functions would include the creation and sending of ACH files or acting as a sending or receiving point on behalf of a participating depository financial institution. Tokens - A small device with an embedded computer chip that can be used to store and transmit electronic information. Topology - A description of any kind of locality in terms of its physical layout. In the context of communication networks, a topology describes pictorially the configuration or arrangement of a network, including its nodes and connecting communication lines.Transaction Testing - A testing activity designed to validate the continuity of business transactions and the replication of associated data. Trojan Horse - Malicious code that is hidden in software that has an apparently beneficial or harmless use.Truncating Bank (Check 21) - The financial institution that truncates the original check. If a person other than a financial institution truncates the original check, the truncating bank is the first financial institution that transfers, presents, or returns, in lieu of such original check, a substitute check or, by agreement with the recipient, information relating to the original check (including data taken from the MICR line of the original check or an electronic image of the original check), whether with or without the subsequent delivery of the original check.Two-way Polling - An emergency notification system that allows management to ensure that all employees are contacted and have confirmed delivery of pertinent messages.UUltra Forward Service - This service allows control over the re-routing of incoming phone calls to pre-determined alternate locations in the event of a telecommunications outage.UPS - Uninterruptible power supply. A device that allows your computer to keep running for at least a short time when the primary power source is lost. A UPS may also provide protection from power surges. A UPS contains a battery that "kicks in" when the device senses a loss of power from the primary source allowing the user time to save any data they are working on and to exit before the secondary power source (the battery) runs out. When power surges occur, a UPS intercepts the surge so that it doesn't damage your computer. URL - Abbreviation for “Uniform (or Universal) Resource Locator.” A way of specifying the location of publicly available information on the Internet, in the form: protocol://machine:port number/filename. Often the port number and/or filename are unnecessary.USA Patriot Act - The USA PATRIOT Act (Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (Public Law Pub.L. 107-56), commonly known as the "Patriot Act", was enacted by Congress to deter and punish terrorist acts in the United States and around the world by enhancing the law enforcement investigatory tools of both domestic law enforcement and foreign intelligence agencies.Utility - A program used to configure or maintain systems, or to make changes to stored or transmitted data.Utility programs - A program used to configure or maintain systems, or to make changes to stored or transmitted data.VVESDA - Very early smoke detection alert. A system that samples the air on a continuing basis and can detect fire at the pre-combustion stage.Virtual Mall - An Internet website offering products and services from multiple vendors or suppliers.Virtual Private Network (VPN) - A network where data is transferred over the Internet using security features preventing unauthorized access.Virus - Malicious code that replicates itself within a computer.VLAN - Virtual local area network.Voice over Internet Protocol (VoIP) - The transmission of voice telephone conversations using the Internet or Internet Protocol networks.VOIP - Voice over Internet protocol. A term used in IP telephony for a set of facilities for managing the delivery of voice information using the Internet Protocol. Vulnerability - A flaw that allows a person to operate a computer system with authorization in excess of that which the system owner specifically granted to him or her.WWalk-Through Drill/Simulation Test - This test represents a preliminary step in the overall testing process that may be used for training employees but not as a preferred testing methodology. During this test, participants choose a specific scenario and apply the BCP to it. Wallet Card - Portable information cards that provide emergency communications information for customers and employees. Warehouse Attack - The compromise of systems that store authenticators.WEB SEC Code - An ACH debit entry initiated by an originator resulting from the receiver’s authorization through the Internet to make a transfer of funds from a consumer account of the receiver.Weblinking - The use of hyperlinks to direct users to webpages of other entities.Website - A webpage or set of webpages designed, presented, and linked together to form a logical information resource and/or transaction initiation function.Website Hosting - The service of providing ongoing support and monitoring of an Internet-addressable computer that stores webpages and processes transactions initiated over the Internet.Wide-Scale Disruption - An event that disrupts business operations in a broad geographic area. Wireless Application Protocol (WAP) - A data transmission standard to deliver wireless markup language (WML) content.Wireless Communication - The transfer of signals from place to place without cables, usually using infrared light or radio waves.Wireless Gateway Server - A computer (server) that transmits messages between a computer network and a cellular telephone or other wireless access device. Wireless Phone - See "Cellular Telephone".Work Program - A series of specific, detailed steps to achieve an audit objective. Workstation - Any computer connected to a local-area network. Work-Transfer - Work-transfer is a process whereby the staff located at a recovery site accepts the workload of staff located at a primary production site, and a data center located at a recovery site accepts the workload of the primary data processing site. Worm - A program that scans a system or an entire network for available, unused space in which to run. Worms tend to tie up all computing resources in a system or on a network and effectively shut it down. WORM (Acronym) - Write once, read many times. A type of optical disk where a computer can save information once, can then read that information, but cannot change it.XXML - XML (Extensible Markup Language) is a ”metalanguage” – a language for describing other languages – which lets you design your own customized markup languages for different types of documents. It is designed to improve the functionality of the Web by providing more flexible and adaptable information identification.