Tag Archives: RBI

Virtual Cards for Credit Cards also

RBI has issued  guidelines on tokenisation for debit / credit / prepaid card transactions as a part of its s endeavour to enhance the safety and security of the payment systems in the country.  Accordingly RBI will permit  authorised card payment networks to offer … Continue reading

Posted in Cyber Law | Tagged , , | Leave a comment

Is Rs 1 Crore fine on Indian Bank a sufficient deterrant?

The Reserve Bank of India in a press release dated December 11, 2018 imposed a monetary penalty of Rs 1 crore on Indian Bank for non compliance of its directions under the Cyber Security Framework of 2016 and the Master directions … Continue reading

Posted in Cyber Law | Tagged , , , | Leave a comment

RBI needs to Fight with Mazar Virus rather than fighting with the Government

The Reserve Bank of India is in the news for picking up a fight with the Central Government on the right to use its reserves in a manner it deems fit. The fight whether RBI is over capitalized with the … Continue reading

Posted in Cyber Law | Tagged , , | 1 Comment

Digital Banking in India is now under a serious threat… RBI needs to wake up

India has adopted a Governance policy involving high dependency on Digital Banking and this technological shift in Banking has the blessings of the Government, the RBI and also the Banks. Government is happy with Digital Banking because it is an … Continue reading

Posted in Cyber Law | Tagged , , , , , | 5 Comments

Bitcoin gets the Boot

Naavi.org has been consistently voicing its demand that Bitcoins should be banned in India and instead RBI should consider floating a crypto currency regulated by RBI. At last RBI seems to have taken one decisive step which has been interpreted … Continue reading

Posted in Cyber Law | Tagged , | Leave a comment

Appointment of Chairmen and Directors of Banks is the Weak link that caused PNB fraud

“Where there is Money, there will be Fraud” is a truth which all traditional Bankers know. Hence the essence of Good Banking is building security into the culture of the organization and into its systems. The legacy paper based systems … Continue reading

Posted in Cyber Law | Tagged , , , , , , | 1 Comment