{"id":2459,"date":"2014-01-30T16:24:53","date_gmt":"2014-01-30T16:24:53","guid":{"rendered":"http:\/\/ncjolt.org\/?p=2459"},"modified":"2020-06-04T20:53:57","modified_gmt":"2020-06-04T20:53:57","slug":"mobile-banking-a-gateway-to-21st-century-bank-robbery-or-a-worthwhile-convenience","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/mobile-banking-a-gateway-to-21st-century-bank-robbery-or-a-worthwhile-convenience\/","title":{"rendered":"Mobile Banking: a Gateway to 21st Century Bank Robbery or a Worthwhile Convenience?"},"content":{"rendered":"<p>I hardly remember the last time I went in a bank.\u00a0 I seldom carry cash so the vast majority of my banking can be completed from home, or perhaps on the bus, or at work\u2014anywhere really because I do it all from my phone.\u00a0 And I\u2019m certainly not alone as there are already more <a href=\"http:\/\/www.cutimes.com\/2014\/01\/08\/5-mobile-banking-trends-to-watch-in-2014?t=technology&amp;page=2\">transactions completed on cell phones<\/a> than on computers.\u00a0 It is undeniable that mobile banking is a rapidly growing technology that makes life more convenient, as we <a href=\"http:\/\/www.cutimes.com\/2014\/01\/16\/boa-10-of-check-deposits-thru-mobile\">no longer even need to take checks to the bank<\/a> to deposit them. However, an important consideration in the midst of the transition from web-based banking to mobile banking is whether users are trading security for convenience.<br \/>\nPeople have grown accustomed to the concept of the computer viruses because of prolonged exposure, but people <a href=\"http:\/\/www.reuters.com\/article\/2014\/01\/27\/us-kaspersky-cyber-idUSBREA0Q12620140127\">seldom associate cyber-attacks with their mobile device<\/a>.\u00a0 Nonetheless, those of us relying on mobile devices to complete daily banking transactions need to be aware of the risks.\u00a0 A r<a href=\"http:\/\/www.reuters.com\/article\/2014\/01\/27\/us-kaspersky-cyber-idUSBREA0Q12620140127\">ecent story<\/a> stated that 99 percent of mobile attacks are currently directed at Android-based phones, thus putting Android users at a particular risk.\u00a0 Nonetheless, these risks remain fairly small in comparison with computer-based security threats.\u00a0 However, <a href=\"http:\/\/money.cnn.com\/2012\/08\/08\/pf\/mobile-banking.moneymag\/\">experts expect the problem to become worse<\/a> as mobile reliance continues to grow. Thus, security risks are certainly out there.<\/p>\n<blockquote><p>In the aftermath of the <a href=\"https:\/\/corporate.target.com\/about\/payment-card-issue.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Target security breach<\/a>, our financially vulnerability has been in the public discourse.\u00a0 Thus, it is important to keep these issues in mind before logging in to complete your next mobile banking transaction.<\/p><\/blockquote>\n<p>Mobile banking, however, is far from a lawless free-for-all.\u00a0 Banks remain committed to the same regulations put forth by the Federal Financial Institutions Examinations Council (FFIEC) and the <a href=\"http:\/\/www.fdic.gov\/regulations\/examinations\/supervisory\/insights\/siwin11\/mobile.html\">Federal Deposit Insurance Corporation provides further regulatory considerations<\/a>.\u00a0 This explains why logging in to complete mobile banking is so often a multi-step process as regulation requires banks take a <a href=\"http:\/\/www.aba.com\/Products\/bankcompliance\/Documents\/SeptOct12CoverStory.pdf\">multi-layered approach<\/a> to user security. Further security is required by CTIA (The Wireless Association) which is an industry trade group that provided guidelines for <a href=\"http:\/\/files.ctia.org\/pdf\/CTIA_MFS_Guidelines_BP_Final_1_14_09.pdf\">Mobile Financial Services<\/a>.\u00a0 Nonetheless, wireless providers \u201c<a href=\"http:\/\/www.aba.com\/Products\/bankcompliance\/Documents\/SeptOct12CoverStory.pdf\">currently have no federal laws regarding protection of customers who utilize mobile banking services<\/a>.\u201d<br \/>\nIn the aftermath of the <a href=\"https:\/\/corporate.target.com\/about\/payment-card-issue.aspx\">Target security breach<\/a>, our financially vulnerability has been in the public discourse.\u00a0 Thus, it is important to keep these issues in mind before logging in to complete your next mobile banking transaction.\u00a0 Nonetheless, it appears that the greatest risk to mobile banking is not viruses or cyber-attacks, but rather <a href=\"http:\/\/www.experian.com\/blogs\/data-breach\/2012\/07\/17\/a-mobile-test-of-human-threats\/\">in-person unauthorized access<\/a> through the mobile device. \u00a0Based on this, a small handful of steps, including password protecting devices, making sure to log out of banking applications, and avoiding losing said devices can go a long way in ensuring financial security on mobile devices.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I hardly remember the last time I went in a bank.\u00a0 I seldom carry cash so the vast majority of my banking can be completed from home, or perhaps on the bus, or at work\u2014anywhere really because I do it all from my phone.\u00a0 And I\u2019m certainly not alone as there are already more transactions <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/mobile-banking-a-gateway-to-21st-century-bank-robbery-or-a-worthwhile-convenience\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/2459"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=2459"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/2459\/revisions"}],"predecessor-version":[{"id":7520,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/2459\/revisions\/7520"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=2459"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=2459"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=2459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}