117
1. Introduction Central Background Information Banking is one of the most sensitive businesses all over the world. Banks play an important role in the economy and are considered as the backbone of an economy in every country and Pakistan is no exemption. Banks are custodian to the assets of the general masses. The banking sector plays a significant role in a contemporary world of money and economy. It influences and facilitates many different but integrated economic activities like resources mobilization, poverty elimination, production and distribution of public finance. Pakistan has a well- developed banking system, which consists of a wide variety of institutions ranging from a central bank to commercial banks and to specialized agencies to cater for special requirements of specific sectors. The country started without any worthwhile banking network in 1947 but witnessed phenomenal growth in decades to come. By 1970, it had acquired a flourishing banking sector. Nationalization of banks in the seventies was a major upset to domestic banking industry of the country, which changed the whole complexion of the banking industry. With irrational decision at the top all the commercial banks were made subservient to the political leadership and the bureaucracy. The commercial banks thus lost their assets management equilibrium, initiative and 1

Bank Alfaha

  • Upload
    mcb

  • View
    219

  • Download
    1

Embed Size (px)

DESCRIPTION

Banking information audit of Bank Alfaha

Citation preview

1. Introduction

Central Background InformationBanking is one of themost sensitive businesses all over the world. Banks play an important role in the economy and are considered as the backbone of an economy in every country and Pakistan is no exemption.Banks are custodian to theassets of the general masses. The banking sectorplays a significant role in a contemporary world ofmoney and economy. It influences andfacilitates many different but integrated economic activities like resources mobilization, poverty elimination, production and distribution ofpublic finance. Pakistan has a well-developed bankingsystem, which consists of a wide variety ofinstitutions ranging from a central bank to commercial banks and to specialized agencies to cater for special requirements of specific sectors. The country started without any worthwhile banking network in 1947 but witnessed phenomenal growth in decades to come.By 1970, it had acquired a flourishing banking sector. Nationalization of banks in the seventies was a major upset to domestic banking industry of the country, which changed the whole complexion ofthe banking industry. With irrational decision at the top all the commercial banks were madesubservient to the political leadership and the bureaucracy. The commercial banks thus lost their assets managementequilibrium, initiative and growth momentum. They ceased to be a business concern and became big bureaucracies. The era of nineties was theclimax of privatization, deregulation and restructuring in the domestic banking industry and financial institutions. The Muslim Commercial Bank waste first bank to privatize.Followed by Allied Bank limited, United Bank Limited and Habit Bank Limited have all been privatized.The portfolio concentrates on all aspectsof conventional banking as wellas the financial needs of corporate sector. Dynamic and high value product includes Car Financing , Funded and unfundedloans, Priority banking, Credits Cards, Debit Cards, On line Banking, ATM and money transfer etc. In addition to this, Islamic Banking Division is a separate working entity. The bank is committedto combine all its energies and resources tobring high value, security and satisfaction to its customers, employees andshareholder. Thebank has invested in revolutionary technology to have an extensive range of products and services. This facilitates commitment to a culture of innovation andseeks out synergies with client and service providers to ensure uninterrupted services to it customers.

2.Company BackgroundBank Alfalfah Limited (BAL) is a private bankin Pakistan owned by the AbuDhabi Group. Bank Alfalfah was incorporated on June 21, 1997 as a public limited company under the Companies Ordinance 1984. Bank Alfalah is registered at both Karachi and Lahore Stock Exchange with a ticker name of BAFL. Its banking operations commenced from November 1, 1997. The bank is engaged in commercial banking and related services as defined in theBanking companies ordinance, 1962, with the registered office at building, I.I.Chundrigar Road, Karachi. Since its inception, as the new identity of H.C.E.B (Habib Credit and Exchange BankLimited) after the privatization in 1997, themanagement of the bankstarted implementing strategies and policies to carve adistinct position for the bank in the market place. Now Bank Alfalah Limited ha a network of 282 branches that include 48 Islamic Banking branches..The portfolio concentrates on all aspectsof conventional banking as wellas the financial needs of corporate sector. Dynamic and high value product includes Car Financing ,Funded and unfundedloans, Priority banking, Credits Cards, Debit Cards, On line Banking, ATM and money transfer etc. In addition to this, Islamic Banking Division is a separate working entity. The bank is committedto combine all its energies and resources tobring high value, security and satisfaction to its customers, employees andshareholder. Thebank has invested in revolutionary technology to have an extensive range of products and services. This facilitates commitment to a culture of innovation andseeks out synergies with client and service providers to ensure uninterrupted services to its customers.

3.Visionvision statement identifies where the organization intends to be in the future or or where it should be to best meet the need of stakeholder .vision statement incorporated a shared understanding of the nature and purposes of the organization and uses this understanding to move the organization toward a greater purpose.

VisionTo be the premierorganizations operatinglocally and internationally that provided the complete range of financial services to all segments under one roofThe vision of Bank Alfalah is

Bank alfalah is one of the leading financial institutions ,bank alfalah operates only in Pakistan now soon it will go internationally ,and bank alfalah day by day increasing its product for all the segment in Pakistan for business .Industrial, agricultural and for the government bodies in the country. bank alfalah is trying to reach each segment in Pakistan and trying to provided its product at lowest changes and easiest way, under on roof.

4. Mission statement Mission statement are enduring statement of purposes that distinguish one business from other similar firm, a mission statement identifies the scope of firm operation in product and market terms. it addresses the basic question threat faces all strategists a clear mission statement describes the values and priorities of an organization. mission statement broadly Charts the future direction of an organization.

MISSIONTo develop and deliver the most innovative products, manage customers experience, deliver quality service thatcontributes to brand strength, establishes a competitive advantage and enhancesprofitability, thus providingvalue to the stakeholders of the bank

To provide the new and more innovative products than the other banks to the customers. To take and manage the ideas of the valuable customer for the Bank This is a one of the main component of Bank Alfalah Mission Statement that to deliver high quality and quick services to the customers, who are keep great value for Bank Alfalah. Bank Alfalah tries to promote those activities which give the fruitful result to the customers and the stakeholder of the bank.

5. Branches network Bank Alfalah is Pakistans sixth largest Bank and now boasts a branch network of 500 branches across 172 cities in Pakistan along with a presence in Bangladesh, Afghanistan, Bahrain and the UAE. It is also the largest acquirer of credit cards in Pakistan and enjoys a strong position in the SME and Islamic Banking segments.

6. PRODUCTS & SERVICESWith the mission to provide all-encompassing banking services tothe customers, BankAlfalah has a uniquely defined menuof financial products. Currently it is one of the most comprehensive portfolios of personalized financial solutions that are custom-tailored to serve the requirements not only of conventionalcustomers but also fulfill the needs of the corporate sector:

Product and services of bank Alfalah Personal banking Corporate & investment banking Treasury& institutional banking Business banking Branchless banking Self banking services Islamic banking

Personal banking Deposit Account Our deposit suite has been designed keeping the diverse needs of our customers. From basic banking accounts, term deposits, foreign currency to structured savings products, choose the option that best suits your needs and start enjoying your daily banking services through our vast branch network and self service banking solutions.

Alfalah Kamyab Karobar - Online Current Account Alfalah Kifayat Monthly Savings Account Alfalah Mahana Amdan Term Deposits Alfalah Current Account Alfalah Savings Account Alfalah Royal Profit Account Alfalah Basic Banking Account Alfalah Foreign Currency Accounts Alfalah Care Senior Citizens Savings Account Apply for Deposit Account

Alfalah Kamyab Karobar Online Current AccountEnjoy unmatched accessibility to funds anywhere in Pakistan with a host of free services. With Alfalah Kamyab Karobar Account, you grow your business while we take care of your banking needs.Features & Benefits Free online funds transfer through any Bank Alfalahbranches Free cheque book, pay orders and demand drafts Free online cash withdrawal and deposit transactions SMS alerts on every transaction Up to 90% financing facility on deposited amount Debit/ATM Card VISA accepted at over 30 million outlets and more than 2 million ATMs worldwide

Open with an initial deposit of Rs. 1,000 only by visiting your nearest Bank Alfalah branch from a network of over 540 online branches nationwide.

Alfalah Kifayat Monthly Savings AccountIf you are looking at earn monthly profits while enjoying ease and access to your growing savings at all times? Alfalah Kifayat Savings Account is what you are looking for!

Features Earn profit of up to 7%* per annum Profit is calculated on monthly average balance and paid every month Unlimited facility for cash deposit and withdrawal Minimum monthly balance requirement of Rs. 10,000 only Free monthly e-statements SMS alerts for every transaction Convenience of online banking across all Bank Alfalah branches nationwide, with no charges within city VISA ATM/Debit Card accepted at more than 4500 1-Link network ATMs and over 30 million outlets and more than 2 million ATMs worldwide.

Alfalah Mahana Amdan Term Deposits

If you looking to earn high rate of returns on your fixed deposits with the benefit of monthly profits, then Alfalah Mahana Amdan is best suited for you.

Features and Benefits Invest with a minimum deposit of Rs. 50,000 for1 year term deposit & Rs. 100,000 for 3 years term deposit Attractive rate of 8.5%* on 1 year term deposit & 9%* on 3 year term deposit Profit paid every month Financing facility up to 90% of the deposited amount Visa ATM/Debit Card accepted at more than 4500 1-Link network ATMs in Pakistan and over 30 million outlets and over 2 millionATMs worldwide

Alfalah Current AccountEnjoy your everyday banking needs with absolute ease through our non-interest bearing Current Account, giving you instant access to your cash from any branch across our growing network.Features & Benefits Minimum monthly balance requirement of Rs. 5,000 only. No restriction on number of monthly deposit or withdrawal transactions.

Easy access to funds through cheque book and VISA Debit/ATM Card that can be used globally at over 30 million outlets and at more than 2 millionATMs. Free online banking across Bank Alfalah branches nationwide

Alfalah Savings AccountEnjoy your basic banking needs with complete ease while you also start earning profits on your savingsfor a more protected tomorrow.

Features & Benefits Open with an initial deposit of Rs 100 only No monthly minimum balance requirement Profit is calculated on the average balance Profit if paid semi-annually No restriction on number of monthly deposit or withdrawal transactions Easy access to funds through cheque book and VISA Debit/ATM Card that can be used globally at over 30 million outlets and at more than 2 millionATMs Convenience of online banking across all Bank Alfalah branches nationwide.

Alfalah Royal Profit AccountIf you have a business that deals with large transaction volumes, then our Royal Profit Account is the best choice to meet your daily financial requirements. It encompasses the flexible features of a current account whilst also giving you the benefits of a savings account.

Features & Benefits Minimum monthly balance requirement of Rs. 50,000 only Profit is calculated on average balance and paid on a monthly basis. Higher returns on higher balances Unlimited monthly deposit and withdrawal transactions.

Alfalah Basic Banking AccountIf your basic banking requirements do not require multiple monthly cheque transactions, then our non-interest bearing Basic Banking account may fulfill your day to day banking needs with no minimum balance requirement or restrictions on ATM withdrawals.

Features Benefits Open with an initial deposit of Rs. 1,000 only No monthly minimum balance requirement 2 free deposits and 2 free withdrawal transactions every month through cheque VISA Debit/ATM Card accepted at over 30 million outlets and more than 1.5 million ATMs worldwide.

Alfalah Foreign Currency AccountsTo manage your foreign currency transactions with security, ease and convenience , you can place your funds in our Foreign Currency Current and Savings Accounts.

Foreign Currency Current Account Non-profit bearing checking account Account can be opened in US Dollar, Pound Sterling, Euro or Japanese Yen Minimum balance equivalent to 100 (USD, GBP, EUR) or 5,000 Yen No restriction on number of monthly deposit or withdrawal transactions.

Foreign Currency Savings Account Account can be opened in US Dollar, Pound Sterling, Euro or Japanese Yen Minimum balance equivalent to 250 (USD, GBP, EUR) or 10,000 Yen Profit is calculated on the daily balance and paid on a semi- annual basis No restriction on number of monthly deposit or withdrawal transactions.

LoansWe have designed our loan products keeping your individual needs in mind. With affordable tailor-made financing options that offer you the flexibility to choose your repayment plans, we help you stay in control of your finances and make the most of lifes opportunities today.

Alfalah Car FinancingGetting your dream car was never this easy. Personalized to perfectly suit your needs, Alfalah Car Financingoffers affordable, tailor-made financing options along with special features to help you enjoy your most preferred car in no time.

Features and Benefits You can choose a car that is new, used or imported Select your monthly installment plan from multiple tenure options up to 5 years Fixed and variable rate options to cater every budget Pay as much as you like with down payment flexibility Enjoy special comprehensive insurance rates for complete peace of mind No termination charges on car replacement Apply with minimum documentation and hassle free quick processing

Credit CardsBank Alfalah chip based credit cards open up a world of lifestyle privileges and financial freedom that allow you to enjoy living life today just the way you want to! The newly designed chip based credit card offers you enhanced security features to protect your information from fraudulent acts. The chip generates dynamic values for each transaction, providing greater security every time you swipe.

Your existing Alfalah Credit Card will soon be upgraded to a chip-based credit card or you can choose a card that best suits your lifestyle needs. Become part of the largest credit card family in the country and enjoy unparalleled service and discounts every time you travel, shop or dine out

Alfalah Platinum VISA Credit CardWelcome to the world of Alfalah Platinum. As an Alfalah Platinum Credit Card member, you can enjoy the finest privileges and the utmost level of services coupled with unmatched rewards and benefits.

Alfalah Titanium Master CardAs a Bank Alfalah Titanium Master Card member, you can enjoy countless benefits and privileges.

Features & Benefits Global Reach and Acceptability Fabulous Rewards Cash Advance Balance Transfer Facility E-statement Facility SMS Alerts Bill Payment Facility 24 Hour Customer Service

Alfalah VISA Gold & Classic Credit CardsWelcome to the world of Alfalah VISA Credit Cards. As an Alfalah VISA Credit Card member, you can enjoy numerous benefits and privileges.

Features & Benefits Global Reach and Acceptability Fabulous Rewards Cash Advance Balance Transfer Facility E-statement Facility SMS Alerts Bill Payment Facility 24 Hour Customer Service

BancassuranceOur Bancassurance solutions are specially designed to help you protect and secure a stable future with your loved ones. Partnering with leading insurance companies in the country, we offer a diverse range of insurance plans, customized to meet your savings, education, marriage and retirement needs at every stage in life.

Alfalah Qalam Education PlanAlfalah Qalam Education Plan is an education savings plan being offered in collaboration with EFU Life.Benefit Accidental Death & Disability Benefit Accidental Death Benefit Income Benefit

Alfalah Bandhan Marriage Plan

Features & BenefitsFund Selection OptionUnder this option the policy holder can select a unit fund based on their risk appetite and investment objective at the inception of their policies. The policy holder will have an option (conditions apply) to select from the following three unit funds: EFU Managed Growth Fund EFU Guaranteed Growth Fund EFU Aitemad Growth FundOptional Benefits Accidental death & disability benefit Accidental death benefit Income benefit

Eligibility The plan is available to all Bank Alfalah customers between 18 to 65 years of age.

Term of Plan Minimum Term: 10 yearsMaximum Term: 25 years subject to a maximum age of 75 years at the time of maturity.

Premium LimitMinimum: Rs. 25,000 annuallyMaximum: No limit

Alfalah Sakoon Retirement PlanWith this plan, your contributions are invested in accumulation units to build up substantial capital. At retirement, this capital is applied to provide a pension payment starting from the 60 years of age.

Optional Benefits:Available for working females only: Waiver of premium Family income benefit Additional term assurance Accidental death & disability benefit Accidental death benefit Medical recovery bene00fit Life care benefit Home RemittanceWe offer unmatched services for overseas Pakistanis to send money home fast and free across our large network of over 470 branches in more than 160 cities across Pakistan. Enjoy the convenience of sending home remittances to your loved one through our International Send Agents in any of the following modes. Cash over Counter:Your remittance can be collected by your loved one in cash of up to Rs. 500,000 from any of our branches across Pakistan. Cash over Account: You can send money to Pakistan through hassle free account credit in a Bank Alfalah maintained account or in an account in any RTGS member bank. Pay Order/ Demand Draft:If you are maintaining an account with a non-RTGS member bank, you can conveniently send money through Pay Order or Demand Draft facility.

Money Gram Services

Our collaboration with Money Gram a global leader in worldwide money transfer services, offers unmatched services to send and receive money from worldwide agents in 300,000 locations across 197 countries and territories worldwide. Our large network of over 470 branches in more than 160 cities across Pakistan gives you the same choice and convenience locally.

Feature & Benefit Its quick your money is where its needed in just 10 minutes.* Its convenient with 300,000money transfer agents around the world, youre never far away from Money Gram. Its available to everyone you dont need a bank account or credit card. Its easy just visit a Money Gram agent and complete one simple form. Its personal you can add a complimentary 10-word message.

Corporate banking Working FinanceSuccessful businesses often experience considerable pressure on the available finances due to timing difference of cash inflows and outflows, up-gradation of existing facilities and business expansion.

Our dedicated team of relationship managers can structure tailor-made credit solutions to meet yourspecific short-term or long-term funding requirements. The loans are provided at competitive rates and are structured to enhance your profitability by scheduling the repayment to match the cash flow available to repay the debt.Bank Alfalah offers working capital finance by way of overdraft or working capital loans suitably structured to your needs and your risk profile. These products are designed to ease the liquidity position of our clients.

Trade FinanceWe offer a wide range of trade services designed to meet a range of our corporate clients needs. We have Industry specialists who are professional and seasoned to make sure that all your trade finance requirements are taken care of with precision and skill. The team is strongly supported by a wide and effective correspondents network spread worldwide. Our team of specialists goes the extra mile to ensure that our customers` experience with the below mentioned services is nothing but exceptional. Letter of Credit Import Finance Export Finance Bank GuaranteeCapital Market OperationsWe provide capital market services to various companies including our existing customers. The following services are part of Capital Market Operations; Bankers to the Issue for Initial Public Offerings (IPOS) Offer for Sale of Shares (OFS) Right Share Issues Dividend RedemptionThe Bank also provides the requisite MIS of all the banker to the issue/dividend transactions on the prescribed format as and when required by the customer.

Investment BankingOur seasoned Investment Banking team is fully equipped to help you in the following areas:1. Leveraged and Structured Finance2. Project and Infrastructure Financing (Recourse & Non-recourse based)3. Debt Syndication (Conventional and Islamic both)4. Capital Market Issues (Listing and private placement of corporate bonds, sukuks, commercial papers, preference shares, right shares in addition to initial and secondary public offering of ordinary shares)

Treasury& institutional banking Foreign Exchange

Our FX desk is one of the most active participants in the interbank market dealing in ready, spot, forward and swap transactions for all major currencies. Our sizable FX Book allows us to be a market maker in the interbank markets of Pakistan, Afghanistan and Bangladesh.

Fixed IncomeOur dedicated fixed income trading desk is one of the most active participants in all segments of the domestic money and bond markets.

Derivatives and Structured ProductsWe offer advisory support to our customers on foreign exchange and interest rate hedging solutions.

Business banking

Alfalah SME ToolkitBank Alfalah is proud to be the first bank in Pakistan to introduce an SME toolkit in partnership with International Finance Corporation (IFC). It is an online business management tool dedicated to help small and medium enterprises to develop sustained growth through implementation of business practices based on information, communication and technology.

The need for supporting SMEs has never been stronger in Pakistan. Small businesses are amongst the highest with growth potential and innovation, with businessmen from all walks of life, working hard to positively impact the society and consumers with innovative products and services.

Business AccountsOur Business Banking team is committed to working in conjunction with our SME clients as trusted partners in their progress and success. Whether your operations include sole trading, manufacturing orexporter, we aim to understand your evolving business requirements needs and offer you a broad range of customized financial solutions and services to help you achieve your goals.Offering a complete product menu including Business Accounts, Loans, Working Capital Finance, Trade Finance, Transaction Banking and Financial Advisory Services, we work to enhance your business growth, access and convenience.

Alfalah Karobar FinanceAlfalah Karobar Finance offers running finance, LG, LC and other import/export related facilities against mortgage of residential/commercial property.

Feature and benefits Stock insurance not required. Only 25% cleanup required. Affordable markup rates to be paid on a quarterly basis Quick processing and loan disbursement Minimal processing charges

Alfalah Quick FinanceWith Alfalah Quick Finance you can meet your immediate personal or business expansion needs while keeping your savings secure. A personal/business loan which includes running finance as main limit and all other import/export related facilities as sublimit against National Saving Certificates, Prize Bonds and PKR/FCY deposit.

Features and benefits Up to 90% financing against security deposit A personal/business loan against National Saving Certificates, Prize Bonds & PKR/FCY deposit The amount of financing under Alfalah Quick Finance ranges from PKR. 50,000 to PKR. 300M Quick and convenient processing. Third party collateral acceptable Alfalah Debit Card facility

Lease FinanceWe work very closely with our clients and strive to deliver the most comprehensive and tailored leasing products to meet all their business needs. With one of the most competitively priced solutions, with flexible terms & conditions based on your choice of assets, repayment, pricing, and tenures, we can help you preserve working capital in your business, while benefiting from the use of the equipment.

Personal Savings & Banc assurance ProductsIn order to not simply grow your savings and protect your future, we offer a diverse range of Savings and Banc assurance solutions:

Alfalah Savings AccountAlfalah Kifayat Monthly Savings AccountAlfalah Mahana Amdan Term Deposit Agri LoansWe realize the strong contribution of agriculture in our countrys economy and the growing financial needs of our farmers. Our Rural Finance Program Alfalah Zarie Sahulat offers finance facilities covering an entire spectrum of farming and non-farming needs with a wide range of products on flexible short, medium and long term repayment tenures at affordable markup rates.

Branchless banking

Mobil paisaBank Alfalah has joined hands with Warid Telecom to launch Mobile Paisa; a branchless banking service which aims to provide innovative, technology based financial solutions to customers. Mobile Paisa currently offers customers with Over the Counter (OTC) facilities for making utility bill payments as well as Person to Person (P2P) funds transfer services via 2000 plus agent locations across Pakistan.

With the launch of Mobile Paisa, the Bank aims to support the creation of a branchless banking and alternate payments ecosystem which is likely to augment financial inclusion in the country, thereby reducing the gap between the banked and the yet-to-be-banked.

G2PBank Alfalah Limited has been selected as one of the partners for two key G2P projects, namely, Watan Card Programmed and the Benazir Income Support Program (BISP). In phase I, BAL disbursed Rs. 20,000 each to nearly 108,000 families. For this effort, BAL issued VISA debit cards, called Watan Cards, to beneficiaries identified by NADRA and GoP. BAL created 18 centers in Punjab and Gilgit-Baltistan provinces to disburse Cards and Cash to affected persons.

Phase II of this project constitutes a disbursement of Rs. 40,000 per beneficiary in two transactions as and when notified by NADRA/GoP. A total disbursement of Rs.1,597.12 million, as of November 2012, has been expended in districts of Gilgit, Hunza, Skardu, Jhang, Khushab, Sargodha, Multan and Rahim Yar Khan.

Self services banking Alfalah VISA Debit/ATM CardWelcome to our world of VISA Debit/ATM Cards; as an Alfalah VISA Debit/ATM Card member, you can enjoy the following countless benefits and services.

Features & Benefits Funds Transfer Bill Payment Facility Cash Deposit & Withdrawals SMS Alerts 24 Hour Customer Service Transaction Details on Statement Alfalah VISA Debit/ATM Card Guideline

SMS Alert ServiceWith our SMS Alerts Service, you can keep track of your transactions 24/7. By subscribing to the service, you can receive real-time SMS updates for transactions conducted on your Debit Card. It also helps you keep track of all your POS, ATM, in-branch and supplementary Card transactions as and when they are conducted.

E-statementsWith our e-statement service, you can receive monthly, quarterly or half-yearly account statements directly via email. This facility is offered to you at no extra cost, all you need is a personal e-mail address to which your e-statements will be sent.

7. Departments: Cash DepartmentThis Department is given the complete responsibility of Cash as a transaction in touch local and foreign currencies it is also responsible for the book keeping for these transactions and the safe custody of cash.This department performs the main function: Cash Receipts Cash Payments

Cash Receipts:In Cash Department Depositors use deposit slips for depositing the amount into their account the officer checks if the deposit slip is properly filled up containing title of account, A/C number and amount in words and figures.

Cash Payments:First the cheque is presented by the customer or holder to the cash payment officer. He confirms that it is drawn on the same branch and the particulars of cheque are properly filled. One Signature or the holder is taken on the back of the cheque.

Clearing DepartmentThe process by which cheque exchanged between the collecting and paying bank and the ensuing financial settlement is called clearing. This facility is provided by the state bank of Pakistan for offsetting of cross obligations between the different banks.Clearing is of two types:

Inward ClearingWhen Cheque drafts etc, of our branch presented to us for clearing by the SBP. Cheque to be honored by bank.

Outward ClearingThe Cheque of other banks, which the account holder deposit in their accounts is, sends for collection.

Remittance DepartmentThe need of remittance is commonly felt in todays business. A major function of any bank it to transfer of funds from one place to anther. Bank Alfalah uses the following modes of transfer of funds. Demand Draft (DD)Its an instrument, which is use to transfer from on city to another it can be made on cash as well as on cheque, if it is made through cheque that it is necessary the person must be account holder while in case of cash any person can make. It consists on three copies. 1) Original Copy, which is given to the account holder 2) DD advice sent to the central branch 3) Third party for reconciliation. Its photocopy is kept with bank while original is send to head office for reconciliation.

Telegraphic Transfer (TT)It is another mode of transfer of funds. It is quickest mode of transfer of funds from one city to another. For TT, client has to submit the application on a prescribed form of the bank. Client can deposit money in to the bank or can request the bank to deduct the amount against the TT along with the charges against the issuance of TT from his account. The charges against the issuance of TT charged by Bank Alfalah. Pay Order (PO)Written order which is issued and received to the save book or drawn or payable on same branch. Application form is given to the customer to fill two signatures are taken on the form one for request and the other for receiving the instrument.Call DepositWhen the party wants to give the payment from it self to another party then its makes call deposit the bank keeps it with itself unless it does not receive instruction from the bank. Normally it is pain in cash and goes in party account.

Pay SlipIt is use when bank itself pay for any transaction for e.g purchase of stationary.

Money GramIts basically a person to person money transfer service that allows consumer to receive money in just a few minutes.

Accounting DepartmentAccount department is the most important department of the bank because it is concerned with:

RevenueIncome from sales of goods and services, minus the cost associated with things like returned or undeliverable merchandise also called & quot ales&quot "Net Sales", "Net Revenue&quots and just plain " Revenue&quot.

ExpensesAll operating, overhead and production costs incurred in producing gross revenue. AssetsAssets include holdings of obvious market value (cash, real estate), harder-to-measure value (inventory, aging equipment), and other quantities (pre-paid expenses, goodwill) considered an asset by accounting conventions but possibly having no market value at all.

LiabilitiesAn obligation to pay. These include accounts payables, and bond and bank debt.

Short Term LiabilitiesWhich are expected to be paid with in one year.

Long Term LiabilitiesWhich are expected to be paid in more than one year.

Business DepartmentAt branch level it is branch managers job to bring business. He goes to the market and convinces customer or clients for loans and deposits.

Operation Department:When customer come in the branch for deposits or taking loan here operation managers job starts he perform different functions on such as opening an account, demand draft, issue cheque books.

Credit Department:This department engages in the function of granting loan to borrowersi.e. consumers, small and medium enterprises and corporate level after scrutinizing their ability to repay and other requirements. Credit officer deals these kinds of activities in big branches he is also known as credit manager.

Compliance Department:This department performs the function of checking of rules and regulation according to which loans are granted either is it according to the prudential regulations or not. This department performs regulatory services.

Administration Department:Administration department perform admin functions as well like payment of salaries to employees, security and other functions. Foreign Exchange Department:This department does not exist in every branch of bank but also specific main branches. This department is designed to manage the foreign exchange transaction just like import or export Letter of Credit and other dealings with foreign country. IT DepartmentOverview:The IT Department's mission is to provide the information technology required for the fulfillment of the laboratorys mission in an efficient and effective manner through building world-class competencies in the technical analysis, design, procurement, implementation, operation and support of computing infrastructure and services.The IT Department is a highly demanding computing environment, maintaining extensive networks on both local and global scales, pushing new technologies to their limits and providing a neutral ground for carrying out advanced R&D with various partners.Responsibilities of IT departments:Now a days it department is considered a brain of any organization because its provide 24 hour services to ensure that every thing is running smoothly and bank system are exposed to out scale the world.1. All communication throughout the branches1. Monitoring the existing application running inside the organization.1. Monitoring the critical1. Provide services to operation department1. Network and other communication media1. Security of network and critical in house security issueIts Department1. network and communication1. service management1. relationship management1. security and risk1. technical support system8. Network and communication:This department is responsible of managing existing data network, managing the voice network, managing the fax network such as internet, intranet & extranet, lain, ,man ,wan and medium of communication just like telephone calls etc. Service management:This department is responsible for providing the service to new as well as existing customer & this department try to deliver best and reliable services to customer such as Online banking Online bill payment Fund transferMobile rechargeThis department is responsible to mentoring the critical application to avoid any financial loss& for the betterment of employee working. Relationship management:This department provide services to enhance the relationship of customer with bank and provide the services like birthday wishing, wedding wishing ,sms alerts balance inquiry, information about the product and services and create link with customer up to time. Security and risk :This department safe the organization from hacking with the help of fire wall.This department also responsible for inside and outside security problems & manage security with the help of cctv camera and fire wall.Technical support system :This department main aims to solve the problem through remote location. this department solve the problem through reviewer softwares .If any problem occur then we call the IT office then IT department correct it.5. Net work topology Network topology refers to the physical or logical layout of a network. It defines the way different nodes are placed and interconnected with each other. Example of net work topology is local area net work. Types of topologyPhysical topologyPhysical topology emphasizes the physical layout of the connected devices lain and nodes.Logical topology Logical topology focuses on the pattern of data transfer between network nodes.

Physical topology Star topology Tree topology Bus topology Mash topologyRing topology

Star topology

All the nodes are connected with central hub. Central hub control all the computer hub exchanges the information. Transmission occurred with hub. If a person want to send a data other device firstly send the data hub then hub transfer the data other device.

Advantages of star topology Less expensive. Easy installation and configuration. Easy to fault identify. No disturbed the device connecting and removing the device. Less cable need.Disadvantages of star topology Depend a whole network with single hub. Performance depends upon a central hub. Limited capacity of nodes.Applications Local area net work High speed LAN used .

Bas topology

Every work station connected with main cable or transmission cable . Work station directly connected with other work station . Bus topology used for small net work. Send and receiving the sms at same time .Advantages of bus topology Easy installation Used a less cable Easy expand the bus net work Bus topology used for small business . Well suited for temporary net work.Disadvantages of bus topology Difficult to administer/trouble shoot . Difficult add new device. If one node fails, the whole network will shut down. Maintenance costs may be higher in the long run.Applications Most computer mother board

Ring topology

In which each node connects to exactly two other nodes. Data travel from node to node, with each node along the way handling every packet. Workstations are directly connected with other stations. Advantages of Ring topology Don not required a central hub . Point to point configuration easy identify problem. Data is quickly transferred(very fast, all data traffic is in the same direction) Adding additional nodes has very little impact on bandwidthDisadvantages of ring topology All computers to communicate with each other, all computers must be turned on. Total dependence upon the one cable. Data packets must pass through every computer its slow. Applications Used of offices building and school campus.

Tree topology

Alternative as a star bus topology. Two or more star networks connected together. Tree is also link central hub that controls the traffic of all net work. Central hub is an active hub. Advantages of tree topology Expansion of Network is possible and easy. Huge devices are connected If one segment is damaged, other segments are not affected. Error detection and correction is easy

Disadvantages of tree topology It is more expensive due to cable Whole connection depend a central hub if the central hub stop a working all the devices are stop. Increase the signals of distance. Applications Used multinational companies

Mesh topology

Each workstation is connected directly to each of the others. Some workstations are connected to all the others, and some are connected only to those other nodes with which they exchange the most data. Each computer connected with all the computer Advantages of Mash topology If a one link damage they cannot effected the other link It gives a privacy and security. Fault identify easyDisadvantages of mash topology Ports required a very large. Headwear required connected each device is expensive.Applications Telephone regional office 6. What is Intranet? A within-organization computer network that uses Internet technologies to communicate. Accessed only by authorized persons, especially members or employees of the organization.Applications of Intranet Sharing of company policies/rules & regulations Access employee database Distribution of circulars/Office Orders Access product & customer data Sharing of information of common interest Launching of personal/departmental home pages Submission of reports Advantages of intranet Fast easy low cast to implement Based on open standards Many tools available Improvement communication Support links with customer and partner Disadvantages of intranet Security from within New budget Cost training Cost maintaining Separate software might be needed for internet and e-mail

What is ExtranetAn extranet is a private network that uses Internet technology and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses.Applications of Extranet Supply-chain management Customer communications Distributor promotions Online continuing education/training Customer service Order status inquiry Inventory inquiry Account status inquiry Warranty registrationAdvantages of Extranet Improved quality. Lower travel costs. Lower administrative & other overhead costs. Reduction in paperwork. Delivery of accurate information on time. Improved customer service. Better communication.Disadvantages of Extranet Faceless contact. Information can be misused by other competitors. Fraud may be possible. Technical Employees are required Supplier and customer are not proper knowledge

What is Internet? It is a Global network of computers, (servers or clients) to exchange information. It is a "network of networks" that includes millions of private and public, academic, business, and government networks (local or Global),linked by copper wires, wireless connections, and other technologies

Applications of internet Download programs and files E-Mail Voice and Video Conferencing E-Commerce File Sharing Information browsing Search the web addresses for access through search engine Chatting and many more

7. Network:Network is a collection of computers and devices connected together via communication device and transmission media. Many business network their computers to gather to facilitate communication, share hardware, share data and information, share software and transfer fund. A network can be internal to an organization or span to world by connecting to the internet. TYPES OF NETWORK:1. LAN2. MAN3. WANthe main differentiate among these classification is their area of coverage.LAN: It stand for local area net work. it connects the computer and devices in a limited geographical area(in a few meter)such as a home, school computer laboratory, office building. Each computer/device on a network is called node. Often share resources such as printer, large hard disk and programs. In this type of network the communication cost is very low. The smallest LAN consists of exactly two computers, while a large one can accommodate many thousands of computers. Most local area networks useWi-FiorEthernetfor connectivity between devices.

MAN:A network in a city with high speed data transfer, which connects various locations such as campuses, offices, government, and so on. It stand for metropolitan area network. Is a high speed network that connects local area network in a metropolitan area such as city, town ( in a few km mostly 10 to 50 miles) etc. It handle the bulk of communication in that region. A MAN includes one or more LAN sbutr cover smaller geographical area than WAN. MAN is mostly used by telephone companies, cable television operators etc. In this type of network the communication cost is very medium. Communication technology is ATM and frame relay, x-25 and ip.

WAN: it stand for wide area network. A WAN can be consist of two or more LANs connected together. it cover the large geographical area (several thousand km) such as city country or world by using communication channel that combine many type of media such as telephone lines, cables, and radio waves. The internet is the worlds largest WAN In this type of network the communication cost is very high. Share information/files over a larger area Networkusers can communicate byemailandinstant messenger9. List of hard wearNo Name of hard wear Modal price Total quantity Total amount

1

Computer Dell380008304000

2Printer HP LaserJet Pro P1102w

16000232000

3ScannerHP Scanjet G2410730017300

4Bar coad reader Metrologic MS 9520 voyager 14000114000

5Telephone Hair 150046000

6ATM Hantel MB1700w ATM2245001224500

7CCTV Swann DVR-8-15007500860000

8USPSUA5000R5TXFMR80000180000

9Router netgear

17000234000

10Battery

AGS 200004100000

11Cash counting machineXd 282819899119899

12Emergency alarmZAB-898600016000

13Generator5 KVA DENYO/HONDA 1100001110000

14Water cooler VOLTAS800018000

15AC BS-Q126B8A4474904189960

CCTVE TheSwann DVR8-1500 D1 4-Ch DVR With 500GB & 8 x Pro-540 Day/Night Camerasis a basic indoor/outdoor surveillance system with an eight channel DVR and two indoor/outdoor, day/night weatherproof cameras. The DVR features a pre-installed 500GB HDD so you can begin recording immediately back up 90 days. Leans quality is a good.UPS Output Power Capacity4000Watts /5000 VAMax Configurable Power4000Watts /5000 VANominal Output Voltage120V, 208VOutput Voltage Distortion47 - 53 Hz for 50 Hz nominal, 57 - 63 Hz for 60 Hz nominal

TopologyTree Topology

Computer Dell OptiPlex 755 DesktopSpecifications

ProcessorIntel I3 2.1 Ghz

Memory4GB DDR2 (512 x 2)

Hard Drive500GB SATA

Optical DriveDVDRW

Printer Wireless networking helps reduce cable clutter. Fast, efficient printing up to 19 pages per minute in black. Direct print lets you print on the go from your smartphone or tablet. 150-sheet paper tray capacity can handle your larger jobs. 10-sheet priority feed slot is great of letterhead, envelopes and more.

Router

Emergency alarm LCD screen display with menu and voice prompt Support 99 Wireless defense zones. Each can be defined as one of the 5 zone types optional Four groups scheduled arm/disarm Store 6 alarm phone number Support ISD automatic voice mailbox for playback message upon alert. Maximum support 100pcs remote control and 150pcs sensors. Remote Arming /Disarming/Monitoring by phone Can connect wireless intelligent switch for electrical appliances, support up remote control of up to 99 sets appliance Built-in booking function , can control 4 sets of appliance's on /off.Unique black box function, can display recent 56 disarmed records and 72 recent alarmrecording.Wireless frequency :315/433Mhz

Cash counting machine

Banknote size: 90mm x 175mm -- 50mm x 100mm Counting & Batch number display: 4 / 3 digits LED Counting Speed: >900pcs. / min Gross Weight: 6.5 kg Hopper Capacity: 300 pcs. Net Weight: 5.0 kgs Power Consumption: < 80W Power supply: AC220V, 50 Hz

10. Security riskTo Mitigate the security risk highly focus on the internal security measures alone with physical security staff, and have a handsome check on security, it use CCTV Cameras, Fire alarm, smoking alarm and a fit staff of Guards. To secure information bank also have system security measure like firewall, anti malware safeguard.

11. FirewallA part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

Advantage A firewall defines a single choke point that keeps unauthorized users out of the protected network. A firewall provides a location for monitoring security-related events. Audits and alarms can be implemented on the firewall system. A firewall can serve as the platform for IP Security.Disadvantage The firewall does not protect against internal threats. Firewall cannot protect against attacks that bypass the firewall. The firewall cannot protect against the transfer of virus-infected programs or files email, messages.

12. What is virus? A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.What is a Trojan Virus?Trojans are malicious programs that perform actions that have not been authorized by the user. These actions can include: Deleting data Blocking data Modifying data Copying data Disrupting the performance of computers or computer networks

What is a Trojan horsesTrojan horses are one of the most common methods a criminal uses to infect your computer and collect personal information from your computer.Purposes of Trojan virus Crashing the computer, e.g. with "blue screen of death" (BSOD) Data corruption Formattingdisks, destroying all contents Use of the machine as part of abonnet(e.g. to perform automatedspammingor todistribute Denial-of-service attacks) Electronic moneytheft Infects entire Network banking information and other connected devices Data theft, including confidential files, sometimes forindustrial espionage, and information with financial implications such as passwords andpayment cardinformation Modification ordeletion of files Downloading or uploadingof files for various purposes Downloading and installing software, including third-partymalwareandransomware Keystroke logging Watching the user's screen Viewing the user'swebcam Controlling the computer system remotely Encrypting files; a ransom payment may be demanded for decryption, as with theCrypto Lockerransom ware System registry modificationSpread the Trojan virus Trojans are the first stage of an attack and their primary purpose is to stay hidden while downloading and installing a stronger threat such as a bot. Unlike viruses and worms, Trojan horses cannot spread by themselves. They are often delivered to a victim through an email message where it masquerades as an image or joke, or by a malicious website, which installs the Trojan horse on a computer through vulnerabilities in web browser software such as Microsoft Internet Explorer.

Other types of Trojans include:

Trojan-ArcBomb Trojan-Clicker Trojan-Notifier Trojan-Proxy Trojan-PSW

How to protect yourself against TrojansBy installing effective anti-malware software, you can defend your devices including PCs, laptops, Macs, tablets, and smart phones against Trojans. A rigorous anti-malware solution such asKasper sky Anti-Virus 2014 will detect and prevent Trojan attacks on your PC, whileKasper sky Mobile Securitycan deliver world-class virus protection for Android smart phones. Kasper sky Lab has anti-malware products that defend the following devices against Trojans: Windows PCs Linux computers Apple Macs Smart phones Tablets

What is a Computer Worm?A computer worm is a self-replicating computer program that penetrates an operating system with the intent of spreading malicious code. Worms utilize networks to send copies of the original code to other computers, causing harm by consuming bandwidth or possibly deleting files or sending documents via email. Worms can also install backdoors on computers.Spread the worm in computer Most known computer worms are spread in one of the following ways: Files sent as email attachments Via a link to a web or FTP resource Via a link sent in an ICQ or IRC message Via P2P (peer-to-peer) file sharing networks Some worms are spread as network packets. These directly penetrate the computer memory, and the worm code is then activated.VirusesViruses can be divided according to the method that they use to infect a computer: File viruses Boot sector viruses Macro viruses Script viruses How can viruses spread through email? Viruses can easily be transferred from one computer to another through sending mails. They may come as an attachment along with the emails. Even if you receive a mail in your inbox, it can contain virus in it. When you open and run the attached file, you are indirectly allowing the virus to into your computer system. This will slowly affect your hard drive and the entire system. Often there will be mails like Spot offer, Lottery money, Free loan which will be very attractive to read through.To prevent such virus attacks, you need to Keep your operating system updated Install and update the anti virus tool on a regular basis Do not download the attachments directly Always open the attachments in the mail only after scanning them with an anti virus software. Keep your Microsoft office products in a secured level Keep your Firewall on all the timesHow to avoid email viruses and worms Use a professional anddedicated email servicesuch as Run box with strong virus filtering. Make sure that yourRun box virus filteris activated. If you receive an attachment in an e-mail make sure who is sending e mail. Make sure that firewall is turned on in order to prevent unauthorized to access to your network. Ignore or delete messages withattachmentsappearing to be sent from official Run box email addresses. Maintain independent email accounts. If a virus infects your business email address, youll be in trouble. Regularly backup your data and store them into portable media such as DVD, and CD. What is software Theft?It is an unauthorized copying and distribution of copyright protected software.When does it occur? Steal software media Intentionally erases the program. Illegally copy a program.Safeguard against software theft:To protect software media from being stolen, there should be an authorized person for the use of software.There should be an eye to check the terminated employees and unhappy employees also called x-time bomb or on those who are going to leave the bank in near future.Safeguard against Information theft:Bank use the computer media to store information and valuable data , so we need a security system which protect our computer system.Verify your mailing address with the post office and financial institutions.Identity bandits may fill out change of address forms so that delinquent credit notices remain off your paper billing radar.Boost your defenses against online fraudWhen it comes to identity fraud, even antivirus software and a firewall aren't always enough. That's because criminals can bypass these defences, to pry on your login details.

How we protect and safeguard online:1. Antivirus- helps to stop threats, by scanning your PC and looking for suspicious files1. 1. Firewall- hides your computer from attackers, and helps stop criminals getting data in and out of your PC1. Protecting your details, even if your computer is infectedAnti-spywareProtect yourself from spraying eyesSpyware is malicious software that monitors the activity on your computer - such as password details or the websites you have visited.1. Anti Spyware stop hi jacking of system1. Information security must be managed as a separate business unit to be effective.Safeguard to System Failure:RapportIt locks down the connection between your machine andNatWestOnline banking. It checks our site is genuine, and stops your data going to counterfeit sitesRapport works by helping to make sure you really are connected to your bank. This protects your valuable personal information - without slowing down your PC like some security software.Shielding your online banking details from prying eyesSafeguarding your identity

UpdatesWindows and all of the other software on your computer systems needs to be updated regularly to fix bugs and remove security flaws

BackupsBack up your data regularly, either manually or using an automated backup system. Backups can be copied onto an external hard drive or you can back up data onto a Web-based storage area using an online service.Physical DamageUse an uninterruptible power supply so that blackouts, brown-outs and spikes in the electricity supply don't harm your computer systems or cause data loss. Educate staff not to place liquids, magnets or hot items on or near computers. Safety tools for unauthorized accessUnauthorized access Generally refers to the viewing or possession of something without legal authority.

Security ResourcesPassword SecuritySecurity Procedures to Protect YourConfidential InformationProtect Your ComputerProtect Your InformationProtect Your IdentityProtect Yourself on Social MediasProtect Your Business Bank Account

PASSWORD SECURITYYour online passwords are the keys to protecting your personal and financial information. Changing your password regularly will help ensure the security of all your online accounts as well as the information. When changing your password be sure to use strong passwords. Strong passwords are considered to be at least 8-characters long and maximum 12. World Wide Banker passwords need to be a minimum of 8 digits in length and any combination of alpha, numeric, uppercase, lowercase and special characters up to 25 digits in length. Make your password easy to remember but hard to guess. Use combinations that you know but wouldnt make sense to others. A good password could be 26kDw*gm4. In addition, you should never use the same password on multiple sites. If one site is compromised your other accounts could possibly be accessed by the thieves.SECURITY PROCEDURES TO PROTECT YOURCONFIDENTIAL INFORMATION. A basic element of safeguarding your confidential information is to guard against unauthorized access or use of this information. The Bank of Elk River maintains physical, electronic and procedural safeguards personal information against unauthorized access or use.PROTECT YOUR COMPUTERYour computer can be a goldmine of personal information to an identity thief. Heres how you can safeguard your computer and the personal information it stores:Install and update your anti-virus and anti-spyware software frequently. Computer viruses can have damaging effects, including introducing program code that causes your computer to send out files or other stored information. Never open or download attachments from unverified or unknown sources. Use a firewall, especially if you have a high-speed or always on connection to the internet. The firewall allows you to limit uninvited access to your computer. Without a firewall, hackers can take over your computer and access sensitive information. When youre submitting information, look for the lock icon on the status bar. Its a symbol that your information is secure during transmission. Avoid using an automatic login feature that saves your user name and password. Remember to sign-off when youre finished banking online or leave the room for a few minutes. Delete any personal information stored on your computer before you dispose of it.PROTECT YOUR INFORMATIONThere are a number of ways to help guard against unauthorized use of your account and protect your identity: If you do not recognize the sender of an email or have any doubts about the authenticity of an email, do not respond and delete it immediately. Do not open an email or click on links or attachments, especially if they tell you the problem is urgent or the attached file ends in Always use secure passwords. A secure password consists of upper and lower case letters, numbers and special characters (see: Password Security section above). Never share your password with anyone. Do not include personal or sensitive data in, or in response to, an email. When you finish your online banking sessions, be sure to log out.PROTECT YOUR IDENTITY. Here are some tips on how you can prevent ID theft. Protect your Social Security number. Dont carry your Social Security card in your wallet or write your number on a check. Give it out only when absolutely necessary. Dont give our personal information on the phone, through the mail or over the internet unless youve initiated the contact or you can confirm that the individual and company are legitimate..

PROTECT YOURSELF ON SOCIAL MEDIASUse social media wisely. Social media connects families and friends with colleagues and businesses through powerful online communities. However, just as in real world communities, you should be careful what you share and how you share it to stay safe online.Use privacy controls to restrict who can see your profile and posts. Options change frequently and you should check and update your settings often.Dont reveal too much information. Personal information such as where you live, work, or go to school could be used against you. Revealing travel plans can give an indication that your home may be unoccupied.PROTECT YOUR BUSINESS BANK ACCOUNTHere are some tips on how to protect your business bank accounts: Electronic banking should be done by two different people, one to initiate and one to confirm a transaction. It is best practice to segregate duties among two or more people so no one person has too much access or control. Educate your staff about risks and how to avoid them. (see: "Password Security" section above). Do not delay in terminating the rights to electronic banking applications of former employees.

Punishments for hacking crimeHacker is a term used by some to mean "a clever programmer" and by others, especially those in popular media, to mean "someone who tries to break into computer systems.TERRORISMHacking crime will be treated under terrorism act.OTHER CRIMESDepending on the circumstances, a person who hacks into another's computer could be punished by a number of generally applicable crimes.For example, if the hacking is done to take personal identifying information for certain purposes, it could be punishable as identity theft. Penalties for identity theft range from a class D to class B felony, primarily based on the value of property taken through the use of personal identifying information and the .A person could also hack into a computer to commit larceny. Larceny is intentionally and wrongfully taking, obtaining, or withholding property from an owner in order to appropriate it to himself, herself, or another. The penalties for larceny range from a class C misdemeanor (punishable by up to three months in prison, a fine of up to $500, or both) to a class B felony, primarily based on the value of the property CIVIL ACTIONSThe law specifically authorizes someone harmed by a computer or unauthorized use crime to bring a civil lawsuit against the perpetrator. These civil actions are in addition to any other grounds for a civil action that the injured party may have.PenaltiesBecause there are numerous different types of computer and internet crimes, there are also a wide range of potential penalties. Some computer crimes have minor penalties associated with them, while more serious crimes can impose significant fines and lengthy prison sentences. Fines.Fines for a conviction of various computer and internet crimes range widely. fines of a few hundred dollars, and possibly up to a $1,000 to $100,000. Jailorprison.A person convicted of certain internet or computer crimes may also face a jail or prison sentence. The most serious crimes, such as possessing child pornography, can result in a prison sentence of 20 years or more. Probation.Probation sentences for computer crimes are also possible as either individual penalties or in addition to jail or fines. Probation terms can differ widely, but typically last at least one year and require the person on probation to not commit more crimes, maintain employment, report to a probation officer, and pay all court 13. Prevention from hackingBank can provided the safe guard against hacking bank install the ant various sophos ant various. That provide safe guard of banking software .

14. Call center Our state-of-the-art Contact Centre is available 24 hours a day, staffed by professionally trained consultants who can provide you with a range of customer care and banking services.The Standard Chartered hotline offers a wide range of customer service and support solutions:Account-related Services Balance enquiry Transaction enquiry Account and loan statement requests Cheque book request Cheque book activation Debit Card activation Loan-related enquiries Salary enquiry Cheque stop instruction Debit Card stop

Products Information Deposit Accounts Personal Loans Savings / Current Accounts Debit Card Interest rates enquiry Account Tariff enquiry Foreign Currency Exchange rates Lending rates Deposit ratesOther Services Complaint / compliments / feedback Account opening procedure Account closing procedure Request for change of account details Online Banking Mobile Banking15. Fire alarm system:Afire alarm systemis number of devices working together to detect and alert people through visual and audio appliances whensmoke/fireis present. These alarms may be activated fromsmoke detectors, andheat detectors. They may also be activated viaManual fire alarm activation devices such as manual call points or pull stations.16. ATM On most modern ATMs, the customer is identified by inserting a plasticATM cardwith amagnetic stripeor a plasticsmart cardwith achipthat contains a unique card number and some security information such as an expiration date orCVVC(CVV). Authentication is provided by the customer entering apersonal identification number(PIN).Using an ATM, customers can access their bank deposit or credit accounts in order to make a variety of transactions such ascash withdrawals, check balances, or credit mobile phones. If the currency being withdrawn from the ATM is different from that in which the bank account is denominated the money will be converted at an officialexchange rate. Thus, ATMs often provide the best possible exchange rates for foreign travelers, and are widely used for this purpose.17. Soft ware used in ATMmajority of ATMs worldwide use a Microsoft Windows operating system, primarilyWindows XP ProfessionalorWindows XP Embedded. A small number of deployments may still be running older versions ofWindows OSsuch asWindows NT, Windows CE, or Windows 2000.18. Main soft ware used in branchMain soft ware used in branch T24 cost of the soft ware is 100 million .this soft ware is used for all operation of a business like recording the recording sending and receiving the transaction and perform the online function. 19. Information Systems AuditAninformation technology audit, orinformation systems audit, is an examination of the management controls within anInformation technology(IT)infrastructure. The evaluation of obtained evidence determines if the information systems are safeguarding assets, maintainingdata integrity, and operating effectively to achieve the organization's goals or objectives. These reviews may be performed in conjunction with afinancial statement audit,internal audit, or other form of attestation engagement.IT audits are also known as "automated data processing (ADP) audits" and "computer audits". They were formerly called "electronic data processing(EDP) audits".

PurposeAn IT audit is different from afinancial statement audit. While a financial audit's purpose is to evaluate whether an organization is adhering tostandard accounting practices, the purposes of an IT audit are to evaluate the system's internal control design and effectiveness. This includes, but is not limited to, efficiency and security protocols, development processes, and IT governance or oversight. Installing controls are necessary but not sufficient to provide adequate security. People responsible for security must consider if the controls are installed as intended, if they are effective if any breach in security has occurred and if so, what actions can be done to prevent future breaches. These inquiries must be answered by independent and unbiased observers. These observers are performing the task of information systems auditing. The primary functions of an IT audit are to evaluate the systems that are in place to guard an organization's information. Specifically, information technology audits are used to evaluate the organization's ability to protect its information assets and to properly dispense information to authorized parties. The IT audit aims to evaluate the following:Will the organization's computer systems be available for the business at all times when required? (known as availability) Will the information in the systems be disclosed only to authorized users? (known as security and confidentiality) Will the information provided by the system always be accurate, reliable, and timely? (measures the integrity) In this way, the audit hopes to assess the risk to the company's valuable asset (its information) and establish methods of minimizing those risks.

HistoryThe concept of IT auditing was formed in the mid-1960s. Since that time, IT auditing has gone through numerous changes, largely due to advances in technology and the incorporation of technology into business.Currently, there are many IT dependent companies that rely on the Information Technology in order to operate their business e.g. Telecommunication or Banking company. For the other types of business, IT plays the big part of company including the applying of workflow instead of using the paper request form, using the application control instead of manual control which is more reliable or implementing the ERP application to facilitate the organization by using only 1 application. According to these, the importance of IT Audit is constantly increased. One of the most important role of the IT Audit is to audit over the critical system in order to support the Financial audit or to support the specific regulations announced e.g. SOX.Types of it auditVariousauthoritieshave created differingtaxonomiesto distinguish the various types of IT audits. Goodman & Lawless state that there are three specific systematic approaches to carry out an IT audit:[3] Technological innovation process audit. This audit constructs a risk profile for existing and new projects. The audit will assess the length and depth of the company's experience in its chosen technologies, as well as its presence in relevant markets, the organization of each project, and the structure of the portion of the industry that deals with this project or product, organization and industry structure. Innovative comparison audit. This audit is an analysis of the innovative abilities of the company being audited, in comparison to its competitors. This requires examination of company's research and development facilities, as well as its track record in actually producing new products. Technological position audit: This audit reviews the technologies that the business currently has and that it needs to add. Technologies are characterized as being eisther "base", "key", "pacing" or "emerging".Others describe the spectrum of IT audits with five categories of audits: Systems and Applications: An audit to verify that systems and applications are appropriate, are efficient, and are adequately controlled to ensure valid, reliable, timely, and secure input, processing, and output at all levels of a system's activity. Information Processing Facilities: An audit to verify that the processing facility is controlled to ensure timely, accurate, and efficient processing of applications under normal and potentially disruptive conditions. Systems Development: An audit to verify that the systems under development meet the objectives of the organization, and to ensure that the systems are developed in accordance with generally accepted standards forsystems development. Management of IT and Enterprise Architecture: An audit to verify that IT management has developed an organizational structure and procedures to ensure a controlled and efficient environment forinformation processing. Client/Server, Telecommunications, Intranets, and Extranets: An audit to verify thattelecommunicationscontrols are in place on the client (computer receiving services), server, and on thenetworkconnecting the clients and servers.And some lump all IT audits as being one of only two type: "general control review" audits or "application control review" audits.A number of IT Audit professionals from theInformation Assurancerealm consider there to be three fundamental types ofcontrolsregardless of the type of audit to be performed, especially in the IT realm. Many frameworks and standards try to break controls into different disciplines or arenas, terming them Security Controls, Access Controls, IA Controls in an effort to define the types of controls involved. At a more fundamental level, these controls can be shown to consist of three types of fundamental controls: Protective/Preventative Controls, Detective Controls and Reactive/Corrective Controls.In an IS system, there are two types of auditors and audits: internal and external. IS auditing is usually a part of accounting internal auditing, and is frequently performed by corporate internal auditors. An external auditor reviews the findings of the internal audit as well as the inputs, processing and outputs of information systems. The external audit of information systems is frequently a part of the overall external auditing performed by a Certified Public Accountant (CPA) firm.[1]IS auditing considers all the potential hazards and controls in information systems. It focuses on issues like operations, data, integrity, software applications, security, privacy, budgets and expenditures, cost control, and productivity. Guidelines are available to assist auditors in their jobs, such as those from Information Systems Audit and Control Association.[1]Areas covered by Information System Audit Systems and Applications: an audit to verify that systems and applications are appropriate to the entity's needs, are efficient, and are adequately controlled to ensure valid, reliable, timely, and secure input, processing, and output at all levels of a system's activity. Information Processing Facilities: an audit to verify that the processing facility is controlled to ensure timely, accurate, and efficient processing of applications under normal and potentially disruptive conditions. Systems Development: an audit to verify that the systems under development meet the objectives of the organization, and to ensure that the systems are developed in accordance with generally accepted standards for systems development. Management of IT and Enterprise Architecture: an audit to verify that IT management has developed an organizational structure and procedures to ensure a controlled and efficient environment for information processing. Client/Server, Telecommunications, Intranets, and Extranets: an audit to verify that controls are in place on the client (computer receiving services), server, and on the network connecting the clients and servers.Definitions:Analysisandevaluationof a firm's information system(whethermanualor computerized) to detect and rectify blockages, duplication, and leakage ofinformation. Theobjectivesof thisauditare toimproveaccuracy, relevance,security, and timeliness of the recorded information.auditing is an examination of accounting records under taken with a view to establish true and fair view of financial system and whether they completely reflect the transaction to which they relate.DefinitionAudit is systematic and scientific examination of books of accounts of the organization.Information systems auditThe effectiveness of an information systems controls is evaluated through an information systems audit. An audit aims to establish whether information systems are safeguarding corporate assets, maintaining the integrity of stored and communicated data, supporting corporate objectives effectively, and operating efficiently.Information Systems -Information systems audits focus on security controls of physical and logical security of the server including change control, administration of server accounts, system logging and monitoring, incident handling, system backup and disaster recovery.DefinitionThe purpose of an IS audit is to review and evaluate the internal controls that protect the system.Definition Auditing is a process by which a competent independent person accumulates and evaluates evidence about various assertions contained in financial statement of an easily for the purpose of determining and reporting the quality of disclosure of financial information. DefinitionInformation systems audit, is an examination of the management controls within anInformation technology(IT)infrastructure. The evaluation of obtained evidence determines if the information systems are safeguarding assets, maintainingdata integrity, and operating effectively to achieve the organization's goals or objectives.. Benefits of an AuditThe benefits of an audit are numerous. Audits can improve a companys efficiency and profitability by helping the management better understand their own working and financial systems. The management, as well as shareholders, suppliers and financers, are also assured that the risks in their organization are well-studied, and effective systems are in place to handle them.Audits can also identify areas in an organizations financial structure that need improvement, and how to implement the proper changes and adjustments. Having an audit also lessens the risk and therefore the cost of capital.An audit can uncover inaccuracies and discrepancies within an organizations records, which may be indications of weak financial organization or even internal fraud, although fraud detection is not the main purpose of an audit.20. The benefits of an audit: Analyze and understand your companys financial records. Identify key areas for improvement in your company. Assess risks, economy, efficiency and quality. Evaluate new technology. Prevention and detection of the fraudulent or other illegal activities within your company. Reinforce and strengthen internal control. Its increase the owner satisfaction . it helps you obtain an independent opinion from the auditor concerning your business It helps to keeps moral check on employees because before entering into fraudulent activities the will be fear that their fraud will be located by audit.

Sr. No.ParticularsObservations1.0Hardware installed at Data Centre / Branch:ItemQty.Average age1.1Computer System with Hard Disk831.2Computer System without Hard disk821.3Servers1continues1.4Thin-client821.5Router221.6Switches5031.7Hubs521.8Modems331.9Scanners141.10Printer (Dot Matrix)-1.11Printers (Inkjet/Laserjet)211.12Passbook Printers-1.13UPS141.14Others-1.15Lease Line211.16Dial up net work-1.17ISDN Lines-1.18Wire less Network111.19LAN Cabling2121. Questionnaire

2.0Installation of Computers:yesRefer Annexture-1 /Computer Dos & Donts.2.1Whether computers are maintained in dust freeenvironment?Yes2.2Whether computers were kept clean?Yes2.3Whether separate electrical supply line has beenprovided for computer equipment withnecessary circuit breakers?Yes2.4Whether computers have been housed inseparate cabins or on kept at the counter withfacility of locking?Yes2.5Whether earthing for electrical line is checked atperiodic intervals? (Reading on the voltagemeter on neutral points should show between0-5 ampere)No2.6Whether Earthing of the building is checked atperiodic intervals?No2.7Whether detailed map of the cable lay outincluding the hubs is available with the branch?(It will facilitate fast repairs to LAN cable faults)No2.8Whether HUBS have been installed in a securedplace? (To avoid possible physical tampering)Yes2.9Whether LAN cables have been allowed to trailon the floor?No2.10Whether any heavy article is kept on the cables?(To avoid possible data loss)No2.11Whether EDP department monitors Volume /Space information periodically?Yes2.12Whether LAN Network diagram is available?(Branch/DC/DR)no

3.0Server Farm / Room:3.1Whether server room is away from the maindoor, windows, passage and customer area?yes3.2Whether server room is located not endangeredby rain, wind, dust etc. which will reduce thelife of the server?yes3.3Whether AC provides adequate cooling andhumidity for the server farm /room?Yes3.4Whether additional ACs has been installed towork in rotation with a Timer?Yes3.5Whether temperature measuring instrumentand smoke & fire detectors has been installed inserver room?NoAmbient temperature normally recommended is 18 C.3.6Whether server room is locked?Yes3.7Whether entry to server room is restricted?Yes3.8Whether the new user entry policy has been set,documented and evaluated regularly?Yes3.9Whether entry of outsiders to server room isapproved by competent official?Yes3.10Whether record of visitors & reason for allowingaccess to server room has been maintained?Yes3.11Whether access is controlled through biometricor smart cards in order to prevent authorizedaccess?No3.12Whether controlling devices are in workingcondition?Yes3.13Whether AMC has been given for maintenanceof controlling devices?No3.14Whether audit trails of key card access systems

is checked daily?no3.15Whether failed logs are investigated?No3.16Whether Monitoring or Surveillance system(CCTV) has been installed in Data Centre?Yes3.17Whether numbers of cameras are adequate tocover the entire area?Yes3.18Whether recording is done simultaneously byall cameras?Yes3.19Whether control panel displays the images fromall cameras in a single screen with a facilitychange over to the particular camera?Yes3.20Whether notice board namely Area is coveredby CCTV has been displayed in the data centre?No3.21How many days recording of CCTV are madeavailable?90 days3.22Whether server has been installed in a roomwith atleast one wall of glass panel permittingthe view from outside?Yes3.23Whether Data centre follows the PasswordPolicy at all times?Yes3.24Whether is it supervised?YesRefer Sr. No.15.2 / Password3.25Whether System Administrator access is underthe two factor access?Yes3.26Group Ids should not be made but onlyindividual to pin responsibility. Whethercomplied?Yes3.27Whether server is password protected?Yes3.28Whether server room is maintained clean ?Yes3.29Whether printer has been kept in server room?No

3.30Whether record of failure of lease line /dial upnet work has been maintained and analyzed?Yes4.0Scanner:4.1Whether scanner has been kept under lock,when not in use?No4.2If scanner is attached to a particular terminal,whether the said terminal is passwordprotected?No5.0Fire Extinguishers:5.1Fire extinguishers of CO2 inert gas type canonly be used on computer equipment (in theevent of fire breaking out)SMIEC COMPANY( imported from chines ) with 6 kg wiaght and 4m pressure5.2Whether fire extinguishers have been installed?Yes5.3If yes, whether in up to date condition?yes5.4Next service due onJanuary 5.5Whether staff members have been givenadequate training to use fire extinguishers incase of need?no6.0Physical Security:6.1Whether computer items are properlynumbered and entered in the dead stockregister?yes6.2Whether machines under warranty period aremarked separately with date of purchase?yes6.3Whether physical verification of computers etc.is done periodically?yes6.4If yes, date of last such verification & by whom? Nov 30, 2014 Auditor 6.5Whether any discrepancy was noticed?no

6.6Whether any items have been sent for servicing/ repairs?Yes6.7Whether any item is in irreparable condition?Yes6.8Whether any surplus hardware is lying with thebranch? With whom?Yes7.0Insurance:(Electronic Equipment Policy)7.1Whether insurance policy has been taken?iInsurance CompanyiiPolicy NumberiiiSum insuredRs.ivValid up tovRisk coveredviPremiumRs.7.2Whether movement of hardware from one officeto another office is informed to Insurancecompany?7.3Details of pending claims:iDate of incident / loss etc.iiLoss estimatedRs.iiiSurvey carried onivExisting status8.0Hardware Maintenance:8.1Whether service contract (AMC) has been givenfor following items?Yes / NoPeriodiComputer System with Hard Diskyes3iiComputer System without Hard diskYes2iiiServersYescontinuesivThin-clientYes2vRouter2viSwitches3viiHubs2viiiModems3ixScanners4xPrinter (Dot Matrix)-xiPrinters (Inkjet/Laserjet)1xiiPassbook Printers-xiiiUPS4xivOthers-xvLease Line1xviDial up net work-xviiISDN Lines-xviiiWire less Network1xixLAN Cabling18.2Whether preventive maintenance is done?8.3If yes, what is the frequency?8.4Date of last such maintenance8.5Comments on quality of service ---- PreventiveComments on quality of service ---- Breakdown8.6Whether a log-sheet of hardware (Computers,UPS & Printers) problems is maintained?8.7If yes, whether updated regularly?8.8Whether visit report of service personnel aregiven bySolvedonOFFSign.12iiiServers3continuesivThin-client22vRoutercontinues2viSwitches23viiHubs2

2viiiModems Yes3ixScannersYes4xPrinter (Dot Matrix)Yes-xiPrinters (Inkjet/Laserjet)Yes1xiiPassbook Printers--xiiiUPSYes4xivOthers--xvLease LineYes1xviDial up net work--xviiISDN Lines-xviiiWire less NetworkYes1xixLAN CablingYes18.2Whether preventive maintenance is done?8.3If yes, what is the frequency?8.4Date of last such maintenance8.5Comments on quality of service ---- PreventiveComments on quality of service ---- Breakdown8.6Whether a log-sheereviewed by Branch official, EDP department?8.9Whether name, address, telephone numbers,Name of the concerned engineer etc. is noted inthe said register?Deals head office8.10Who is the system administrator of the Branch /Data Centre / D. R. Centre?9.0UPS:9.1Whether power supply has been provided tocomputers through UPS?9.2Whether UPS room is locked?9.3Whether entry to UPS room is restricted?9.4Whether UPS system is free of load fromelectrical equipments such as fan, AC, tubelights etc.?9.5Whether batteries are kept for charging afteroffice hours?9.6Whether periodic checking of UPS & batteries isdone?9.7Whether record to that effect has been kept?9.8What is the duration for which computer systemcan function on UPS?9.9When UPS was put to use last?9.10What was the approx. duration?9.11Whether register has been maintained to recordpower failure?9.12Whether loss of data is confirmed after everypower failure?t of hardware (Computers,UPS & Printers) problems is maintained?8.7If yes, whether updated regularly?8.8Whether visit report of service personnel are

reviewed by Branch official, EDP department?8.9Whether name, address, telephone numbers,Name of the concerned engineer etc. is noted inthe said register?Deals by head office8.10Who is the system administrator of the Branch /Data Centre / D. R. Centre?Mr.Bilal Khan9.0UPS:9.1Whether power supply has been provided tocomputers through UPS?Yes9.2Whether UPS room is locked?no9.3Whether entry to UPS room is restricted?No9.4Whether UPS system is free of load fromelectrical equipments such as fan, , tubelights etc.?Yes9.5Whether batteries are kept for charging afteroffice hours?Yes9.6Whether periodic checking of UPS & batteries isdone?No9.7Whether record to that effect has been kept?No9.8What is the duration for which computer systemcan function on UPS?2 hour9.9When UPS was put to use last?Daily basis9.10What was the approx. 10.0Anti-Virus:10.1Whether Anti-virus software is used?Yes10.2Details.Sophos antivirus10.3Whether this is the licensed copy of software?Yes10.4Whether the said version is latest?Yes10.5Date of last updating.6 mnth ago10.6Whether the anti-virus program is activated atfixed time?10.7Whether Anti-virus software has been loadedeven on PCs with hard disk?11.0Software:11.1Which software does the branch use?11.2Whether it is latest?11.3Whether it is authorized copy?11.4Whether MS-Office installed at the branch is anauthorized copy of software?11.5Whether any unauthorized software is installedat the branch? To Specify.11.6Whether any games have been installed inserver / hard disk?11.7Whether any Authorized Freewares is installed?11.8Whether any unauthorized Freewares have beeninstalled?11.9Whether latest service pack for operating systemsoftware (OS) has been installed?duration?9.11Whether register has been maintained to recordpower failure?9.12Whether loss of data is confirmed after everypower failure?

10.0Anti-Virus:10.1Whether Anti-virus software is used?yes10.2Details.Sphos anti virus10.3Whether this is the licensed copy of software?Yes10.4Whether the said version is latest?Yes10.5Date of last updating.6 month ago10.6Whether the anti-virus program is activated atfixed time?No10.7Whether Anti-virus software has been loadedeven on PCs with hard disk?Yes11.0Software:11.1Which software does the branch use?T-twenty four11.2Whether it is latest?Yes11.3Whether it is authorized copy?Yes11.4Whether MS-Office installed at the branch is anauthorized copy of software?Office 2013 instaled11.5Whether any unauthorized software is installedat the branch? To Specify.No11.6Whether any games have been installed inserver / hard disk?No11.7Whether any Authorized Freewares is installed?Yes12.0Software Maintenance:12.1Who is responsible for software maintenance?It