Risk Monitoring Policy- current version.docx
Risk Monitoring Policy |
Document information and change log
Document Information
Header | Information |
Next review | August 30, 2025 |
Status | Initial Release |
Regional scope & language | Territory of USA in English |
Applies to entities | GiveCorporation Inc |
Overall responsibility | Loraine Stewart, CCO |
Approved by | Joshua Rowley, CEO; Aaron Miller, CRTO; Michael Brinker, CBFO |
Change log
Date | Version | Reason for version |
Sep 30, 2023 | 1.0 | Initial Release |
August 30, 2024 | 2.0 | Annual Review; separate Policy and Procedure |
August 11, 2025 | 3.0 | Annual Review |
Gender And Entity Neutrality
The masculine form is used solely for the sake of better readability. It always refers to persons of any gender identity (m/f/diverse). This document uses the abbreviation “Give” for all legal entities and subsidiaries.
Table of Contents
Chief Compliance Officer (CCO) 6
2.1 Risk Assessment Procedure 9
Development of Risk Mitigation Strategies 10
Compliance with Standards and Regulations 10
Reporting and Communication 10
3.1 Risk Monitoring Strategy 10
Risk Tracking and Reporting 10
Compliance and Regulatory Alignment 11
Integration with Risk Assessment 11
Advanced Analytics and Forecasting 11
Training and Awareness Programs 11
Documentation and Record Keeping 11
3.2. Restricted MCC Code Monitoring 11
Potential Red Flags Payment Processors are being Used Illicitly 13
Mitigating Third-Party Payment Processor Risk 14
Red Flags Third Party Payment Processors Should Be Aware 15
3.6 Results Indicates the Risk is Increasing 16
4.1 Key Components of Risk Reporting 16
Mitigation Strategies and Progress 16
Compliance and Regulatory Updates 17
Clear and Accessible Format 17
4.2 Targeted Risk Analysis Reports 17
Trailing Twelve Month (TTM) Credit and Fraud Loss 17
Suspicious Activity Report (SAR) 18
Complaint Handling Reporting 19
1. Tagging and Identification of Exceptions 20
4. Oversight and Compliance 21
5.1 Key Components of Mitigation and Response 21
Strategy Development and Implementation 21
Training and Culture of Risk Awareness 21
Ongoing Monitoring and Strategy Adjustment 22
Incident Response Preparedness 22
Communication and Stakeholder Engagement 22
Regulatory Compliance and Alignment 22
Documentation and Continuous Improvement 22
Terminating a Merchant Account 22
6.1 Key Components of Review and Revision 23
Periodic Evaluation of Risk Management Processes 23
Incorporation of Feedback and Lessons Learned 23
Adaptation to Changing Business and Risk Landscape 23
Alignment with Regulatory Requirements and Industry Standards 23
Stakeholder Engagement and Communication 23
Documentation and Record Keeping 23
7. Custodial Account and Reserves 24
Appendix A: Merchant Risk Monitoring System 25
Merchant Risk System Screens 26
Merchant Risk Profile Screenshot 26
Merchant Risk Activity Screenshot 27
Merchant Risk Triggers Screenshot 28
Merchant Risk Indicators Screenshots 29
Appendix B: Transaction Monitoring System 31
Transaction List Screenshot 32
Quarantine Transaction List Screenshot 33
Geolocation and VPN Detection Screenshot 34
Transaction Activity Monitor Screenshot 35
Escalation Monitoring Screenshot 36
Transaction Risk Profile Analysis and Assessment Screenshots 37
Appendix C: Risk Alert Notifications System 38
Triggers for Alert Notifications 38
Chargeback Dispute Case Updated 39
Merchant Underwriting Approved 39
Merchant Risk Level Escalation 39
Activity Exceeded Volume and Swipe Limits 40
Multiple Authorizations, Exceeded Settlement 40
No Balance Merchant Batch Total, Activity on Closed Account, No Offset 40
Exhibit A. MCC Restrict List 41
Introduction
Within Give's comprehensive risk management policy and procedure, our commitment is to effectively manage potential threats and vulnerabilities across our operations. Our structured approach involves systematically recognizing, cataloging, evaluating, and addressing risks that our organization may encounter.
Our risk management framework encompasses various dimensions, including operational, financial, fraud-related, compliance, and strategic risks. These risks may span a range of factors such as system reliability, evolving regulatory landscapes, data security, fraud prevention, market competition, lending portfolios, interest rate sensitivities, operational integrity, and strategic decisions.
To manage these risks, we utilize a combination of methodologies, including data analytics, collaborative risk workshops, input from team members and stakeholders, and ongoing external monitoring. The objective is to create a comprehensive inventory of risks, allowing us to prioritize, assess, and manage them effectively. This empowers us to develop targeted risk mitigation strategies and establish robust risk management processes, safeguarding our interests and ensuring compliance with industry standards and regulations.
Our overarching Risk Policy and Procedure provide the framework for risk-awareness and resilience, enabling us to make informed decisions, allocate resources effectively, and maintain the integrity of our operations.
Roles and Responsibilities
Identify potential risks that could impact the organization's goals and operations and establish guidelines for recognizing threats and vulnerabilities.
Chief Risk Officer (CRO)
Responsible for overall risk of the entire company and communicating, reporting, and strategizing risk and compliance to CEO, Risk Board, Stakeholders, and public.
Chief Compliance Officer (CCO)
Responsible for the overall compliance of the entire company and communicating, reporting and strategizing to the Chief Risk Officer, CEO, Risk Board, Stakeholders, and public.
Compliance Manager
Responsible for managing compliance internally and communicating with external teams. Schedules, reporting, communication with internal and external teams.
Risk Manager
Responsible for managing the risk team and enforcing Merchant and Transaction Risk policy and procedures, monitoring and reporting. Making final determination in suspension and termination of a Merchant, reporting TTM Credit and Fraud Loss, reviewing and determining how to handle escalated merchant risk profiles per the Merchant Risk Response Playbook guidelines. Review quarantined and suspicious transaction activity and determine to report, manually block, void or refund, or set an automated blocked transaction as a false positive.
Risk Analyst
The Risk Analyst’s role is to review merchant risk alerts and set to ok or escalate the merchants risk per the Merchant Risk Response Playbook guidelines. In reviewing risk alerts to investigate the reasons for the risk alerts and document reasons and collect evidence in proof for or against reducing or elevating the risk level. Review quarantined and blocked transactions and make suggestions, provide evidence for false positives, refunds or suspicions of fraud to the risk manager.
1. Risk Identification
Our Risk Identification process is a foundational step in managing potential threats across Give's operations. It involves systematically recognizing and categorizing risks, covering operational, financial, compliance, and strategic areas. We use various methods, including data analysis, team input, and external monitoring, to create a comprehensive inventory of risks. This approach empowers us to prioritize and address risks effectively, develop mitigation strategies, and ensure compliance with industry standards and regulations.
Risk Categories
Operational Risk
- Service Disruptions
Risk of technical failures or system outages affecting payment processing.
- Regulatory Compliance
Risk of non-compliance with payments and applicable industry regulations and standards.
- Data Security Risk
Risk of data breaches, hacking, or cyberattacks on customer payment data.
- Internal Fraud Risk
Risk of fraudulent activities by employees or insiders.
Credit Risk
- Merchant Default
Risk of merchants failing to meet their financial obligations for processing payments.
- Chargebacks
Risk of excessive chargebacks due to disputes or fraudulent transactions.
- Loan Portfolio Risk
Risk of loan defaults or deteriorating credit quality within the loan portfolio.
- Concentration Risk
Risk of a significant portion of loans being concentrated in a specific industry.
Fraud Risk
- Payment Fraud
Risk of fraudulent transactions or fraudulent use of customer payment information.
- Identity Theft
Risk of customer identity theft leading to unauthorized payments.
Compliance Risk
- Regulatory Changes
Risk of changes in payment industry regulations affecting PSP operations.
- Anti-Money Laundering (AML) Risk
Risk of facilitating money laundering through payment services.
- Regulatory Compliance Risk
Risk of non-compliance with federal, state, or local banking regulations.
Market Risk
- Currency Exchange Rate Risk
Risk of adverse movements in exchange rates impacting cross-border vendor payments..
- Competitive Risk
Risk of losing market share to competitors offering better payment solutions.
- Interest Rate Sensitivity
Risk of adverse interest rate movements affecting the bank's net interest income.
- Reinvestment Risk
Risk of lower yields on reinvested funds from maturing investments.
Liquidity Risk
- Funding Risk
Risk of insufficient funds to meet daily operational requirements and obligations.
- Contingency Funding Risk
Risk of disruptions in accessing additional funding sources during stress scenarios.
Strategic Risk
- Business Model Risk
Risk associated with the organization's strategic decisions, including expansion or diversification.
- Competitive Risk
Risk of losing market share to competitors or disruptive financial technologies.
2. Risk Assessment
Our Risk Assessment process is a critical step in evaluating and understanding the potential impact and likelihood of identified risks across Give's operations. It enables us to make informed decisions by quantifying and qualifying risks in various areas, including operational, financial, compliance, and strategic dimensions. We employ standardized criteria and metrics, such as risk matrices and heat maps, to visualize and prioritize risks based on assessment results. All findings are thoroughly documented, facilitating the development of targeted risk mitigation strategies and resource allocation to effectively manage critical risks while ensuring compliance with industry standards and regulations.
2.1 Risk Assessment Procedure
Categorization of Risks
- Categorize the identified risks into specific areas, including operational, financial, compliance, and strategic dimensions.
Quantification of Risks
- Utilize standardized criteria and metrics to quantify the potential impact of each identified risk. Consider factors such as financial consequences, operational disruptions, and regulatory implications.
Qualification of Risks
- Assess the likelihood of each identified risk materializing and its potential consequences. Use risk matrices and heat maps to visualize and qualify risks.
Prioritization of Risks
- Prioritize identified risks based on their assessment results. Focus on risks with the highest potential impact and likelihood.
Documentation of Findings
- Thoroughly document all risk assessment findings, including the rationale for risk levels, quantification, qualification, and prioritization. Ensure that documentation is clear, organized, and easily accessible.
Resource Allocation
- Allocate resources effectively to address and mitigate high-priority risks. Ensure that resources are aligned with the organization's risk management strategy and objectives.
Development of Risk Mitigation Strategies
- Based on the assessment results, develop targeted risk mitigation strategies for high-priority risks. These strategies should include specific actions, responsibilities, timelines, and performance metrics.
Monitoring and Review
- Continuously monitor and review the effectiveness of risk mitigation strategies. Adjust strategies as needed to address changing risk landscapes.
Compliance with Standards and Regulations
- Ensure that the risk assessment process complies with industry standards and regulatory requirements. Stay current with evolving risk management best practices and regulatory updates.
Reporting and Communication
- Communicate risk assessment findings and progress to relevant stakeholders within the organization. Foster a culture of risk awareness and transparency.
Documentation Maintenance
- Maintain all risk assessment documentation in a secure and organized manner, ensuring that it is readily available for internal and external audit purposes.
3. Risk Monitoring
Implement ongoing surveillance of identified risks across various areas using real-time data analysis, team feedback, and external intelligence. Leverage technology for effective risk monitoring, including automated alerts and systems.
3.1 Risk Monitoring Strategy
Risk Tracking and Reporting
- Provide frequent updates on the status of risks and develop comprehensive reporting for internal stakeholders.
- Highlight risk trends, emerging threats, and mitigation efforts.
Response Mechanisms
- Establish immediate response protocols for critical risk events and outline escalation procedures for risks exceeding thresholds.
Performance Evaluation
- Regularly assess and adjust the effectiveness of risk mitigation strategies based on performance evaluations.
Compliance and Regulatory Alignment
- Continuously monitor and adapt to compliance with industry standards and regulations.
Integration with Risk Assessment
- Create a dynamic feedback loop between risk monitoring and assessment processes.
- Promote data sharing and collaboration for holistic risk management.
Stakeholder Engagement
- Maintain communication with internal teams and inform external stakeholders about risk monitoring outcomes.
Advanced Analytics and Forecasting
- Use predictive analytics for potential risk scenarios and proactive risk identification.
Training and Awareness Programs
- Conduct regular training sessions to enhance risk awareness and response capabilities.
- Foster a risk-aware culture throughout the organization.
Documentation and Record Keeping
Keep detailed records of all monitoring activities and ensure documentation is organized and audit-ready.
3.2. Restricted MCC Code Monitoring
Restricted MCCs will be monitored and reviewed monthly as they require Enhanced Due Diligence prior to being onboarded. Additionally the restricted MCC will be reviewed when the merchant’s risk level is elevated. Give will provide the Sponsor with a quarterly activity report for each Sub-Merchant. The following information will be included in the report:
- The Sub-Merchant’s name and location as appears in clearing records;
- The Sub-Merchant’s DBA name;
- The Sub-Merchant’s MCCs;
- The transaction sales count and amount for each MCC; and
- The transaction chargeback count and amount for each MCC.
Upon request, Give is also prepared to provide the Sponsor and card network with merchant activity reporting. Give will provide the following:
- The Sub-Merchant’s name as it appears in the merchant name field;
- The Sub-Merchant’s DBA name;
- The Payment Facilitator’s name;
- Monthly transaction count and amount; and
- Monthly dispute and fraud advice (TC40) count and amount.
The list of restricted Merchant Category Codes is detailed in Exhibit A of this document. The list can be updated at any time.
3.3. Chargeback Monitoring
The policy outlines monitoring and managing merchant chargeback activities through a series of rules that trigger based on specific thresholds of chargeback counts and ratios. These triggers are assessed daily from the time an account is created.
Give monitors for chargebacks daily. Chargebacks are included in triggers and the chargeback trigger is turned on when the account is opened. Chargeback thresholds of 0.01% and higher elevate the merchant’s risk level to “High” and require a remediation plan. The trigger points for chargeback ratios greater than 0.01% and equal to 1% will increase from 3 to 5 points. Chargeback ratios greater than 1% will be 7 trigger points.
For a merchant experiencing their first chargeback when the count exceeds one, an alert is permanently set without the possibility of a reset. This serves as an initial warning mechanism.
Further, there are three levels of alerts for merchants based on their chargeback ratios:
- An alert is raised if the chargeback ratio reaches or exceeds 0.1%. This alert can be reset if the ratio falls below this threshold for at least 30 days.
- A more severe alert is triggered when the chargeback ratio hits or surpasses 1.0%, with the possibility of reset under the same conditions as the first.
- The most critical alert is activated once the chargeback ratio climbs to 5.0% or more. This too can be reset after a 30-day period below the threshold.
These mechanisms are designed to keep track of merchant performance regarding chargebacks and adjust their risk profile as needed.
3.4 Account Changes
Account changes and its ownership will be verified using various verification methods such as; uploading bank statements, bank confirmation and verified third party subscription. The authenticated login credential of one signer is necessary as authorization for the changes. Senior management will review account change exceptions. Changes to the merchant will trigger a notification to verify CIP and CDD/EDD.
3.5 Red Flags
Potential Red Flags Payment Processors are being Used Illicitly
- Fraud
High rates of consumer complaints and chargebacks involving Payment Processors and their merchant clients can indicate potential unfair or deceptive practices, or fraud. Consumer account information has also been used to create unauthorized RCCs or ACH debits.
- Accounts at Multiple Financial Institutions
Payment Processors that are engaged in questionable activities often spread their banking across multiple financial institutions. This tactic allows them to diversify their risk and avoid detection, as they anticipate that a bank might close their accounts upon spotting suspicious behavior. This shifting and distribution strategy can also involve moving from one bank to another in short intervals. There is an increased use of "check consolidation accounts" by some Payment Processors to obscure high rates of returns or chargebacks.
- Money Laundering
Criminals frequently exploit Payment Processors as tools to launder the proceeds of their illicit activities, including consumer fraud. These processors offer a veneer of legitimacy that can disguise illegal or suspicious transactions. Additionally, Payment Processors have been implicated in schemes where illegal funds are directly deposited into financial institutions. This is often done through ACH credit transactions that originate from foreign sources, further complicating the traceability and oversight of these funds. Such practices pose significant risks to the integrity of the financial system and require vigilant regulatory oversight.
- Enhanced Risk
Relationships with third-party entities, especially those involving foreign-located payment processors that handle transactions for telemarketers, online businesses, and other merchants, carry significant risks. These relationships can expose financial institutions to heightened regulatory and reputational risks. Consequently, they require stringent due diligence and ongoing monitoring to ensure compliance with legal standards and to protect against potential abuses such as fraud or money laundering. Vigilant oversight is crucial to mitigate the risks associated with these complex international payment processing arrangements.
- Solicitation for Business
Payment Processors involved in dubious activities often target financially distressed institutions, which might be more open to engaging in higher-risk transactions due to their need for revenue and capital. These processors may also offer to purchase stock in such institutions as a way to sweeten the deal, further incentivizing them to accommodate high-risk merchants. Typically, smaller community banks are the targets of such schemes. These banks often lack the robust infrastructure required to effectively manage and monitor the risks associated with a high-risk Payment Processor relationship. Additionally, it's not just the smaller banks that are involved; large financial institutions also sometimes unknowingly host accounts for fraudulent merchants through these payment processors. This highlights the pervasive risk across the banking spectrum, necessitating stringent oversight and preventive measures to safeguard against such exploitative practices.
- Elevated rate of return of debit transactions due to unauthorized transactions
Payment processors that are engaged in or complicit in suspicious activities might exhibit unusually high rates of returned debit items due to unauthorized transactions, significantly exceeding industry averages. While some payment processors might appear to operate within normal parameters when overall return rates are considered, a deeper analysis can reveal a different story. Specifically, when return rates are assessed based on the transaction volumes of individual originators rather than the total volume of the processor, these rates can be markedly higher. This discrepancy suggests that while on the surface things may seem compliant, certain segments or transactions could be particularly problematic, indicating potential abuse or misuse by criminals. Such patterns necessitate closer scrutiny and potentially enhanced regulatory oversight to prevent and address such malpractices effectively.
Mitigating Third-Party Payment Processor Risk
- Financial institutions should conduct a comprehensive onboarding due diligence that indicates if external investigations and or legal actions are pending against a Payment Processor or its owners and operators.
- Financial institutions should verify the Payment Processor has the necessary state licenses, registrations, and approvals.
- A financial institution is required to file a SAR if it suspects that a Payment Processor is trying to disguise illegal activity funds, evade regulations, or activity that lacks a legitimate business or apparent lawful purpose.
Red Flags Third Party Payment Processors Should Be Aware
- Large-value transactions processed through (ACH) often involve TPSP by originators who are not direct bank customers resulting in no or inadequate due diligence.
- TPSPs often violate ACH network rules, generate illicit transactions, or facilitate manipulated or fraudulent transactions for their customers.
- Several layers of TPSPs that are involved in transactions with no clear purpose.
- An unusually high number of Internet or telephone initiated transactions.
- ACH transactions that originate by the Internet or telephone are at risk for manipulation and fraud.
- Batch processing that hides the identities of the originators.
- ACH transactions may involve parties who are subject to OFAC or other Sanctions programs.
- Higher risk merchants tend to use third party processors.
Red Flags for Merchants
Colluding Merchants
Merchant and or its employees knowingly process transactions on reported lost, or stolen credit cards. The transactions are forced without a code. The merchants do not fight push back on these transactions.
New Merchant Bust-Out Schemes
A merchant sets up a fake business and opens several merchant accounts at various banks at the same time to process as many transactions as possible. The transactions come from fraudulent credit cards and no goods or services are rendered. The merchant disappears after receiving the funds.
Sales Draft Laundering or Factoring
A fraudster poses as a merchant and convinces an unsuspecting financially distressed merchant to deposit sales drafts for a percentage in their account. The activity continues for a short time. The merchant usually does not have enough to cover the chargebacks.
Merchant Cash Advances
A merchant uses their own credit card for a purchase, usually a large even dollar transaction. However, no goods or services are exchanged. The activity is conducted to fund the merchant’s account because usually these merchants have financial difficulties.
Merchant Credits
Someone fraudulently makes a credit return on their credit or debit card. However, there is no return of goods to match the credit. This is similar to the fraudulent merchant cash advance scam. The credit is either used to offset the credit card balance or withdrawn as cash from an Automated Teller Machine (“ATM”).
Telemarketing Scams
Individual customers make a purchase from a telemarketer. The price of the product is usually much lower than the price the customer is charged. The customer is charged repeatedly either monthly, same day or within a short period of time.
3.6 Results Indicates the Risk is Increasing
When results from an investigation indicate a merchant's risk is increasing the following may apply, extend the period on the WatchList, update reserve amount, temporarily suspend deposits, close account, and or add the merchant to MATCH. A reserve may be required to cover the potential risk of a restricted merchant.
4. Risk Reporting
Risk Reporting is a crucial aspect of our comprehensive risk management framework. This process is centered around the generation of regular, detailed reports aimed at senior management and the board of directors. These reports serve as a critical tool for decision-making and strategic planning, ensuring that leadership is fully informed about the organization's risk landscape.
4.1 Key Components of Risk Reporting
Regular Reporting Schedule
Establishing a consistent schedule for delivering risk reports to ensure timely and regular dissemination of crucial risk information.
Detailed Risk Information
Each report includes comprehensive details on identified risks. This involves outlining the nature of each risk, its potential impact, and the areas of the organization it affects.
Assessment Overview
The reports provide an overview of recent risk assessments. This includes insights into the likelihood of risk occurrence, the potential magnitude of impact, and any other relevant metrics or indicators used in the risk assessment process.
Mitigation Strategies and Progress
A critical part of these reports is the update on current mitigation strategies. This includes information on the implementation of these strategies, their effectiveness to date, and any adjustments or refinements that have been made.
Future Risk Outlook
The reports also look forward, offering an analysis of potential emerging risks and changing risk dynamics. This helps in preparing the organization for future challenges.
Actionable Insights
The aim is to provide actionable insights to senior management and the board, enabling them to make informed decisions about risk management priorities and resource allocation.
Compliance and Regulatory Updates
Including updates on compliance with relevant regulations and standards, and how these might impact risk profiles and mitigation strategies.
Clear and Accessible Format
Ensuring that the reports are clear, concise, and accessible, enabling quick understanding and facilitating informed decision-making.
4.2 Targeted Risk Analysis Reports
Trailing Twelve Month (TTM) Credit and Fraud Loss
- Calculation of TTM Losses
Regularly calculate the trailing twelve months (TTM) credit and fraud losses by summing up the total losses incurred over the past twelve months. This calculation should encompass all relevant loss types, including chargebacks, fraud incidents, and credit defaults.
- Regular Report Generation
Generate TTM Credit and Fraud Loss reports periodically. These reports should include actual loss figures and compare them against established thresholds. Ensure these reports are comprehensive and provide an accurate representation of the loss landscape.
- Escalation Protocols
Establish clear protocols for escalation in cases where TTM losses exceed predefined thresholds. Promptly escalate such instances to senior management and the board of directors, accompanied by detailed explanations, analyses, and proposed remedial actions.
- Documentation and Record Keeping
Maintain meticulous records of all TTM credit and fraud loss monitoring activities. This should include detailed documentation of analyses conducted, actions taken in response to breaches in thresholds, and outcomes of those actions. Ensure that these records are stored in a centralized repository for easy access and review by relevant stakeholders.
Suspicious Activity Report (SAR)
- Detection and Identification: Implement systems and training for employees to detect and identify actions that qualify as suspicious activities, such as unusual transaction patterns, significant changes in account activities, or transactions that lack a legitimate business purpose.
- Immediate Documentation: Once a suspicious activity is identified, prompt documentation should be initiated. This includes gathering all relevant information about the transaction, parties involved, and the nature of the suspicious activity.
- Evaluation and Decision-Making: Conduct a thorough evaluation of the documented information to determine if the activity meets the criteria for filing a SAR. This decision should ideally involve the compliance team or designated officers.
- Filing the Report: If the activity is deemed reportable, complete and file the SAR with the appropriate regulatory authority, following the prescribed format and within the stipulated time frame.
- Confidentiality and Record-Keeping: Maintain strict confidentiality during and after the reporting process. Securely store all records related to the SAR, including the report itself, supporting documentation, and details of the decision-making process, in accordance with legal requirements and company policy.
Merchant Risk Report
- Identification of Critical and High-Risk Merchants
Develop criteria to identify merchants who pose critical or high risks. This could include factors like transaction volumes, chargeback rates, nature of business, financial stability, or history of compliance issues.
- Regular Monitoring and Analysis
Implement continuous monitoring mechanisms for identified high-risk merchants. Regularly analyze their transaction patterns, financial health, customer complaints, and any red flags that may arise in their dealings.
- Escalation Triggers
Clearly define specific triggers for escalation. These might include exceeding a certain chargeback ratio, sudden spikes in transaction volumes, reports of fraudulent activities, or significant changes in business practices that increase risk.
- Timely Response Protocols
Establish strict protocols for responding to escalated cases. Outline the maximum response times for different levels of risk, ensuring swift action is taken to mitigate potential threats or losses.
- Reporting and Documentation
Maintain detailed reports on high-risk merchants, including their risk profiles, reasons for classification as high risk, and any incidents or escalations. Document all actions taken in response to escalated situations.
Complaint Handling Reporting
- Categorization and Tracking
Systematically categorize and track complaints into types such as transaction disputes, service issues, fraud-related concerns, billing and fees, customer service, compliance and regulatory matters, and refunds and returns. Ensure accurate recording of each complaint's nature for reporting purposes.
- Regular Reporting Schedule
Establish a regular schedule for generating comprehensive reports on complaints received. These reports should detail the number, type, and trends of complaints over specific periods.
- Analysis of Complaint Data
Analyze complaint data to identify common issues, patterns, or recurring problems. Include metrics such as average resolution time, complaint frequency, and resolution success rates.
- Resolution and Response Overview
Provide an overview of how complaints are resolved, highlighting effective strategies and areas needing improvement. Include information on the time taken to resolve different types of complaints.
- Feedback and Continuous Improvement
Utilize the insights from complaint reports to recommend improvements in products, services, and customer interaction processes. Highlight how customer feedback is being used to drive organizational changes.
- Compliance and Regulatory Reporting
In cases involving compliance and regulatory issues, report on how these complaints are handled in adherence to legal and regulatory standards.
Incident Response Report
- Incident Classification and Documentation
Classify and document incidents based on their nature and severity. This includes security breaches, data leaks, system outages, or any other operational disruptions. Ensure detailed recording of the incident's specifics, including time, scope, and impact.
- Immediate Reporting of Incidents
Establish a protocol for the immediate reporting of incidents to relevant authorities within the organization. This ensures prompt initiation of the response process and minimizes potential damage.
- Analysis and Investigation
Conduct a thorough analysis and investigation of each incident. This should include identifying the cause, the extent of the impact, and any vulnerabilities exploited.
- Resolution and Mitigation Measures
Document the steps taken to resolve the incident and mitigate its effects. Include details of the response actions, parties involved in the resolution, and the time taken to address the incident.
- Post-Incident Review and Reporting
After resolving the incident, compile a comprehensive report. This report should cover the incident's timeline, the effectiveness of the response, lessons learned, and recommendations for preventing similar incidents in the future.
- Continuous Improvement
Use insights from incident reports to refine and improve the incident response plan. Update policies, procedures, and preventive measures based on these insights.
- Regulatory Compliance and External Reporting
Where applicable, ensure that the incident reporting complies with legal and regulatory requirements. Report incidents to external authorities as required by law or industry standards.
Exception Reporting
Overview
While Give does not currently allow force sale, force posts, or force capture, the inclusion of these in the transaction process would necessitate stringent oversight and agreement from the Risk and Compliance teams. The adoption of such practices must be paired with comprehensive exception reporting to maintain transaction integrity and ensure compliance with regulatory standards.
Procedures for Monitoring and Reporting
1. Tagging and Identification of Exceptions
- Tagging System Implementation: A tagging system will be introduced within the transaction processing software to automatically flag any transactions identified as force sales, force posts, or force captures.
- Transaction Flagging: Transactions categorized under these exceptions will be tagged at the point of entry. Each tag will record details such as the transaction date, type, and the specific reason for the exception.
2. Monthly Reporting
- Monthly Exception Reports: Exception reports will be compiled monthly, providing analysis and summaries of all flagged transactions. These reports are crucial for understanding the scope and details of exceptions handled.
- Contents of the Reports: Reports will include:
- Total count of exception transactions.
- Breakdown by type (force sale, force post, force capture).
- Detailed accounts of the resolution process for each transaction.
- Identification of any patterns or recurrent issues.
3. Data Archiving
- Exception Reporting Archives: An archive for exception reports and related documents will be maintained. This archive will be secure, compliant with data protection standards, and accessible for audit purposes.
- Retention Period: A specific retention period for these documents will be established, conforming to legal and regulatory requirements.
4. Oversight and Compliance
- Regular Audits: Audits of the exception reporting system and its archives will be conducted regularly to ensure adherence to policies and regulatory standards.
- Training and Awareness: Continuous training will be provided to all personnel involved in transaction processing and exception handling to familiarize them with the policies, procedures, and their responsibilities.
Conclusion
The establishment of exception reporting for practices such as force sales, force posts, and force captures at Give, should they be allowed, will necessitate thorough preparation, vigilant monitoring, and detailed reporting. By designing these protocols, Give prepares to maintain proactive compliance and security in its transaction processing operations, readying the organization for any potential policy changes in the future.
5. Mitigation and Response
Mitigation and Response is an integral part of our comprehensive risk management framework. This area focuses on developing and executing strategies to effectively manage and reduce the impacts of identified risks. These efforts play a pivotal role in ensuring that risks are not only recognized and evaluated but are also actively addressed and controlled, with efficient response mechanisms for any emerging incidents or issues.
5.1 Key Components of Mitigation and Response
Strategy Development and Implementation
- Formulate specific mitigation strategies tailored to various identified risks such as operational, compliance, financial, and strategic.
- Integrate these strategies into the organization’s overall business planning and operational processes.
Training and Culture of Risk Awareness
- Conduct regular training for employees on risk mitigation methods and emergency response procedures.
- Cultivate a culture within the organization that values risk awareness and proactive risk management.
Ongoing Monitoring and Strategy Adjustment
- Continuously monitor the effectiveness of risk mitigation strategies and adjust them in response to new insights from risk monitoring and reporting.
- Update and refine strategies based on changing risk landscapes and organizational needs.
Incident Response Preparedness
- Develop comprehensive and updated incident response plans for potential risk events, ensuring they are practical and actionable.
- Regularly test and revise these plans to keep them relevant and effective.
Communication and Stakeholder Engagement
- Maintain clear communication channels for risk reporting and incident response.
- Keep internal and external stakeholders informed about risk mitigation efforts and responses to incidents.
Regulatory Compliance and Alignment
- Align mitigation and response activities with applicable regulations and industry standards, adapting to regulatory changes when necessary.
- Ensure compliance is an integral part of all mitigation and response actions.
Documentation and Continuous Improvement
- Document all actions and outcomes related to risk mitigation and incident response.
- Use these records for ongoing learning, improvement, and evidence of compliance.
Terminating a Merchant Account
There will be instances where it will be necessary to close a merchant’s account either by Give or at the request of the Sponsor. Some of the reasons for closure include fraud or other financial crimes.
6. Review and Revision
Review and Revision is a critical component of our comprehensive risk management framework, focusing on the continuous evaluation and updating of our risk management practices. This process ensures that our risk management strategies remain effective, relevant, and aligned with the evolving business environment, regulatory changes, and emerging risks.
6.1 Key Components of Review and Revision
Periodic Evaluation of Risk Management Processes
Schedule regular reviews of the entire risk management framework, including risk identification, assessment, monitoring, reporting, mitigation, and response processes.
Assess the effectiveness of current risk management strategies and tools in addressing the identified risks.
Incorporation of Feedback and Lessons Learned
Integrate feedback from different stakeholders, including management, employees, and external parties, into the risk management process.
Analyze incidents, near-misses, and successful risk mitigations to gather lessons learned and best practices.
Adaptation to Changing Business and Risk Landscape
Update risk management processes to reflect changes in the business environment, such as new technologies, market shifts, or operational changes.
Stay abreast of emerging risks and modify risk strategies to account for these new challenges.
Alignment with Regulatory Requirements and Industry Standards
Regularly review and update risk management practices to ensure compliance with the latest regulatory requirements and industry best practices.
Adjust policies and procedures to reflect changes in legal and regulatory landscapes.
Stakeholder Engagement and Communication
Actively involve relevant stakeholders in the review and revision process to ensure a comprehensive understanding of risk perspectives.
Communicate changes and updates in the risk management framework to all relevant parties, ensuring clarity and understanding.
Documentation and Record Keeping
Maintain thorough documentation of the review and revision processes, including rationale for changes, impact assessments, and revised procedures.
Ensure that all modifications are well-documented and accessible for reference, training, and compliance purposes.
7. Custodial Account and Reserves
Funds processed for sub-merchant funds and fees are transferred into Give’s FBO account. The funds are then distributed to the sub-merchants via a daily ACH file from the FBO bank account.
Appendix A: Merchant Risk Monitoring System
The risk monitoring system oversees all approved merchants for processing. Each merchant is assigned a risk profile, consisting of risk points categorized by color-coded risk levels. Whenever a risk event is detected, corresponding risk points are appended to the merchant's risk profile.
Any risk level prompts an email notification to the compliance team. Elevated risk levels may lead to automated suspension of the merchant's processing and/or money transfer capabilities.
Risk Activity
- Sudden or unusual changes in sales volume, transaction velocity, transaction averages etc.
- High amount of chargebacks, refunds, prepaid cards in relation to approved transactions (per Visa’s established monitoring thresholds)
- New or Inactive merchant activity sales volume or transaction spike
- Force transaction activity (too many invalid CVV attempts, incorrect card numbers, declined transactions, etc..)
- High volume of low value transactions in a short period of time
- Transaction attempts with credit cards that have been determined to be lost or stolen
- Previously blocked credit card numbers, IP/User Agents, email address
- High occurrences of transactions with rounded amounts (e.g. 1.00)
- Customers’ with same credit card number
Risk Indicators
- Global and Merchant specific moving averages for; sales volume, transaction average, transaction count
- Individual Merchant moving averages compared against their own activity and the global mean moving averages
- The merchants chargeback percent and velocity compared to their own activity and the global mean
- The merchants refund percent and velocity compared to their own activity and the global mean
- The merchants prepaid credit card percent and velocity compared to their own activity and the global mean
Merchant Risk System Screens
Merchant Risk Profile Screenshot
Merchant Risk Activity Screenshot
Merchant Risk Triggers Screenshot
Merchant Risk Indicators Screenshots
Merchant Risk Point System
Appendix B: Transaction Monitoring System
Give software solutions for transaction monitoring and fraud prevention monitors every transaction and automatic action is taken when fraudulent behavior or activity is detected.
The transaction monitoring system creates a profile for each transaction using the IP address / User Agent. Activity is recorded and the monitor looks for unusual behavior. If fraud is detected the profile is automatically blocked from making further transaction attempts.
Transaction Risk Activity
- Force transaction activity (too many invalid CVV attempts, incorrect card numbers, declined transactions, etc..)
- High volume of low value transactions in a short period of time
- Transaction attempts with credit cards that have been determined to be lost or stolen
- Previously blocked credit card numbers, IP/User Agents, email address
- High occurrences of transactions with rounded amounts (e.g. 1.00)
- Customers’ with same credit card number
- Multiple attempts with unusual or suspicious emails / name on the card
Transaction List
Transactions are monitored in real-time and can be filtered and sorted to gain insight into patterns that could indicate an attack or suspicious behavior.
Transaction List Screenshot
Blocked List Screenshot
Quarantine Transaction List Screenshot
Transaction Risk Profile
Geolocation and VPN Detection Screenshot
Transaction Activity Monitor Screenshot
Escalation Monitoring Screenshot
Transaction Risk Profile Analysis and Assessment Screenshots
Appendix C: Risk Alert Notifications System
Notification Mechanisms
Our risk management system incorporates both push and email notifications as essential tools for communication. These automated alerts are configured to inform the compliance team and any team members who have appropriate permissions and are subscribed to the alert notifications. This approach ensures timely and efficient dissemination of critical risk-related information to the relevant personnel.
Triggers for Alert Notifications
The alert notifications are activated in a range of scenarios to promptly flag various types of risk-related events. The activation of these alerts is crucial for maintaining ongoing monitoring and enabling quick response to potential threats in our operations. Below is a comprehensive list of scenarios and conditions that trigger these alert notifications
New Chargeback
An alert is triggered whenever a new chargeback is detected.
Chargeback Dispute Case Updated
This alert is sent when a chargeback dispute case is updated, requiring a response.
Chargeback Reversal
An alert is generated when a chargeback is reversed.
Create Merchant
This alert is sent when a new merchant signs up or is added to the portfolio manager.
Merchant Underwriting Approved
Whenever a new merchant receives approval from the underwriting process, this alert is issued.
Merchant Risk Level Escalation
An alert is sent when an event triggers the escalation of a merchant's risk level.
Negative Balance
This alert is activated when a merchant's daily balance goes negative due to factors like chargebacks, refunds, or direct debits.
New Bank Account
An alert is generated whenever a new bank account is added by the merchant.
New Team Member Invited
This alert is sent when a new team member is invited to join the portfolio manager.
OFAC Match
An alert is issued when an OFAC check returns with a match.
PEP Match
This alert is sent when a business owner is identified as a politically exposed person (PEP).
Blocked Transaction
This alert is sent when a transaction is blocked either by the system or manually.
Refund
An alert is triggered whenever a refund transaction occurs.
The following Triggers are required by the Sponsor
Activity Exceeded Volume and Swipe Limits
The merchant exceeded their established authorization swiping and volume limits.
Multiple Authorizations, Exceeded Settlement
There are triggers that capture multiple authorizations on the same card number, for the same amount or exceeded settlement.
No Balance Merchant Batch Total, Activity on Closed Account, No Offset
Triggers for zero or negative batch total, deposits on closed account or credit with no offset.
Exhibit A. MCC Restrict List
Airlines, Air Carriers ( not listed elsewhere)
Automobile and Truck Dealers (Used Only)
Bail and Bond Payments
Computer Software Stores
Counseling Service – Debt, Marriage, Personal
Court Costs, including Alimony and Child Support
Digital Goods- Applications (Exclude Games)
Discount Stores
Door-to-Door Sales
Financial Institutions – Manual Cash Disbursements
Financial Institutions – Manual Cash Disbursements
Financial Institutions – Merchandise and Services
Government Licensed On-Line Casinos (On-Line Gambling) (US Region only)
Government-Licensed Horse/Dog Racing (US Region only)
Government-Owned Lotteries (US Region only)
Lodging – Hotels, Motels, Resorts, Central Reservation Services (not elsewhere classified)
Marketplaces
Money Orders – Wire Transfer
Non-Financial Institutions – Foreign Currency, Money Orders (not wire transfer) and Travelers Cheques
Real Estate Agents and Managers- Rentals
Security Brokers/Dealers (Non High Risk)
Steamship and Cruise Lines
Theatrical Producers (Except Motion Pictures), Ticket Agencies
Timeshares (straight sales only)
Travel Agencies and Tour Operations
The information contained herein is intended to provide a general overview of the Company’s policies and procedures relating to compliance with this Policy and does not constitute legal advice or a complete description of the laws and regulations relating to this Policy. The Company has made every effort to ensure the accuracy and completeness of this Policy. This document is intended to provide guidance to employees of Company on how to comply with applicable laws and regulations related to this Policy. Employees should consult with the Legal or Compliance Department if they have any questions about the Policy or how to comply with it. Company reserves the right to modify or update this Policy at any time without notice. Employees are responsible for reviewing the Policy on a regular basis to ensure that they are aware of any changes. This Policy applies to all employees of Company, regardless of their position or location unless stated otherwise in the Policy. Employees are responsible for complying with the Policy and for reporting any suspected violations to their respective supervisor, the Legal Department, AMLCO or respective recipient of such violation as outlined in this Policy.
Copyright © GiveCorporation Inc. etc. All Rights Reserved