RCBC E-Banking Essay Sample
A limited time offer!
Get a custom sample essay written according to your requirements urgent 3h delivery guaranteedOrder Now
RCBC E-Banking Essay Sample
This memorandum is being issued to serve as the Bank’s policy in consumer protection for e-banking products and services. A. POLICY
The Bank shall provide consumer protection applicable to e-banking products and services, in accordance with Bangko Sentral ng Pilipinas (BSP) Circular No. 542 entitled Consumer Protection for Electronic Banking. In this regard, the Bank shall ensure that the implementation of its e-banking activities are in compliance with the requirements to safeguard customer information; prevention of money laundering and terrorist financing; reduction of fraud and theft of sensitive customer information; and promotion of legal enforceability of the Bank’s electronic agreements and transactions. This policy shall cover all e-banking products and services offered by the Bank, including those that will be introduced later on. B. DEFINITION
Electronic banking (e-banking) generally refers to the provision of banking products and services through electronic channels such as the personal computer, through landline and mobile phone connections, or through automated teller machines (ATMs). These electronic banking products include the electronic money products that are aimed at facilitating retail payments. Currently, the Bank has the following e-banking products and services: 1. RCBC AccessOne (Retail Internet Banking)
2. Enterprise Banking (Corporate Internet Banking)
3. Phone Banking
4. Mobile Banking
6. Bills Payment machines
7. Cashless shopping using P.O.S. (Point of Sale)
In compliance with BSP Circular No. 542, the following guidelines shall cover all e-banking products and services of the Bank: 1. E-Banking Oversight Function
A. The Bank’s Board of Directors and the Senior Management Committee shall be responsible for developing the Bank’s e-banking business strategy and establishing an effective management oversight over e-banking services. This shall include the review and approval of the key aspects of the Bank’s security control program and process, such as the development and maintenance of security control policies and infrastructure that properly safeguard e-banking systems and data from both internal and external threats. This will also include a comprehensive process for managing risks associated with increased complexity of and increasing reliance on outsourcing relationships and third-party dependencies to perform critical e-banking functions.
B. The Board of Directors and the Bank’s senior management shall ensure that the Bank’s risk management policies and processes are updated and modified where necessary, to cover existing or planned e-banking services. C. The Bank’s Compliance Officer shall also ensure that proper controls are incorporated into the system so that all relevant compliance issues are fully addressed. The product managers and system designers should consult with the Compliance Officer during the development and implementation stages of e-banking products and services. This level of involvement will help decrease the Bank’s compliance risk and may prevent the need to delay deployment or redesign programs that do not meet regulatory requirements.
2. E-Banking Risk Management and Internal Control
D. Information Security Program
ITSSG shall adjust or update, as appropriate, the said information security program in light of any relevant changes in technology, the sensitivity of its customer information, and internal or external threats to information. E. Information Security Measures
5. ITSSG shall ensure that the information security measures and internal controls related to electronic banking are installed, regularly updated, monitored and are appropriate with the risks associated with the products and services. Please see Appendix A and Appendix B for the minimum security measures that the Bank should employ in ATM facilities and internet/mobile banking activities, respectively, to protect depositors and consumers from fraud, robbery and other e-banking crimes. 6. ITSSG shall also take into account other relevant industry security standards and sound practices as appropriate, and keep up with the most current information security issues (e.g., security weaknesses of the wireless environment), by sourcing relevant information from well-known security resources and organizations. F. Authentication
7. To authenticate the identity of e-banking customers, the product managers shall employ techniques appropriate to the risks associated with e-banking products and services. The implementation of appropriate authentication methodologies should start with a risk assessment process. The risk should be evaluated based on the following: a. type of customer;
b. customer transactional capabilities (e.g., bill payment, fund transfer, inquiry); c. sensitivity of customer information and transaction being communicated to both the Bank and the customer; d. ease of using the communication method; and
e. volume of transactions.
8. As technology and other procedures develop over time, ITSSG, together with the Bank’s technology service providers, shall continuously review, evaluate and identify authentication technology and ensure appropriate changes are implemented for each transaction type and level of access based on the current and changing risk factors. 9. Account fraud and identity theft are frequently the result of single-factor (e.g., ID/password) authentication exploitation. Where risk assessments indicate that the use of single-factor authentication is inadequate, the product managers and system designers shall implement multifactor authentication (e.g., ATM card and PIN), layered security, or other controls reasonably calculated to mitigate those risks. 10. The authentication process should be consistent with and support the Bank’s overall security and risk management programs. An effective authentication process should have customer acceptance, reliable performance, scalability to accommodate growth, and inter-operability with existing systems and future plans as well as appropriate policies, procedures, and controls. G. Account Origination and Customer Verification
11. With the growth of e-banking and e-commerce, the Bank shall use reliable methods of originating new customer accounts in an electronic banking environment. Potentially significant risks may arise when a bank accepts new customers through the internet or other electronic channels. Thus, all concerned units/business centers shall ensure that in originating new accounts, the “Know Your Customer” or KYC policy of the Bank, which involves “face-to-face” contact, is strictly adhered to. H. Monitoring and Reporting of E-banking Transactions
12. Monitoring systems can determine if unauthorized access to computer systems and customer accounts has occurred. The product managers and system designers must ensure that a sound monitoring system is in place, which should include audit features that can assist in the detection of fraud, money laundering, compromised passwords, or other unauthorized activities. 13. ITSSG shall be responsible for the activation and maintenance of audit logs which can help the Bank to identify unauthorized activities, detect intrusions, reconstruct events, and promote employee and user accountability. This control process can also facilitate the Bank in the submission of suspicious activities reports as required by the Anti-Money Laundering Council (AMLC) and other regulatory bodies. 14. When users are no longer authorized to access a particular system, the same must be reported promptly to the security administrators for the timely removal or suspension of user account access. 15. Whenever critical systems or processes are outsourced to third parties, ITSSG shall ensure that the appropriate logging and monitoring procedures are in place and that suspected unauthorized activities are communicated to the Bank in a timely manner. 16. An independent party (e.g., internal or external auditor) should also review activity reports documenting the security administrators’ actions to provide the necessary checks and balances for managing system security. 3. Consumer Awareness Program
I. Consumer awareness is a key defense against fraud and identity theft and security breach. Please see Appendix C for the minimum Consumer Awareness Program that the Bank should convey to its customers. J. To be effective, the Channel Management and Product Development Division (CMPDD) under Retail Banking Group (RBG) shall implement and continuously evaluate its consumer awareness program. Methods to evaluate a program’s effectiveness include tracking the number of customers who report fraudulent attempts to obtain their authentication credentials (e.g., ID/password), the number of clicks on information security links on websites, the number of inquiries, etc. 4. Disclosure and Business Availability
K. The Bank shall provide its customers with a level of comfort regarding information disclosures or transparencies, protection of customer data and business availability that they can expect when using traditional banking services. L. To minimize operational, legal and reputational risks associated with e-banking activities, the Bank shall make adequate disclosure of information and take appropriate measures to ensure adherence to customer privacy and protection requirements. Please see Appendix D for the minimum disclosure requirements of the Bank. M. In order to meet customers’ expectations, the Bank shall ensure that effective capacity, business continuity and contingency planning are in place. The CMPDD, in coordination with ITSSG, must be able to deliver e-banking services to all end-users and maintain such availability in all circumstances (e.g., 24/7 availability). Likewise, CMPDD must ensure that effective incident response mechanisms and communication strategies are in place to minimize risks arising from unexpected events, including internal and external attacks. N. Safekeeping of Records
The Bank shall safekeep/monitor records or information regarding e-banking financial transactions and disclosures, just like the record keeping required in paper-based transactions. In this regard, all vital records relating to e-banking financial transactions and disclosures shall be retained for a period of at least five (5) years or permanently (whenever applicable) by all concerned units/business centers.
Safekeeping of these records or information means both hardcopies and softcopies (whenever applicable) of the same must be retained free from tampering or corruption within the assigned or applicable retention period. 5. Complaint Resolution
The Bank may receive customer complaint either through an electronic medium or otherwise, concerning an unauthorized transaction, loss, or theft in its electronic banking account. Therefore, the Bank shall ensure that controls are in place to review these notifications and that an investigation is initiated as required. To resolve disputes arising from the use of the electronic banking products and services, the concerned unit/business center shall immediately conduct an investigation. 6. Applicability
Although the above guidelines are focused on the risks and risk management techniques associated with an electronic delivery channel to protect customers and the general public, it should be understood, however, that not all of the consumer protection issues that have arisen in connection with new technologies are specifically addressed in this policy. Additional policies may be issued in the future to address other aspects of consumer protection as the financial service environment through electronic banking evolves. APPENDIX A
AUTOMATED TELLER MACHINE (ATM) SAFETY MEASURES
* To minimize/prevent ATM frauds and crimes, the Bank should, at a minimum, implement the following security measures with respect to automated teller machine facilities: * Locate ATM’s in highly visible areas;
* Provide sufficient lighting at and around the ATM;
* Where ATM crimes (e.g., robbery, vandalism) are high in a specific area or location, the Bank should install surveillance camera or cameras, which shall view and record all persons entering the facility. Such recordings shall be preserved by the bank for at least thirty (30) days; * Implement ATM programming enhancements like masking/non-printing or card numbers; * Educate customers by advising them regularly of risks associated with using the ATM and how to avoid this risks; * Conduct and document periodic security inspection at the ATM location, and make the pertinent information available to its clients; * Educate bank personnel to be responsive and sensitive to customer concerns and to communicate them immediately to the responsible bank officer; and
* Post near the ATM facility a clearly visible sign which, at a minimum, provides the telephone numbers of the bank as well as other banks’ hotline numbers for other cardholders who are allowed to transact business in the ATM, and police hotlines for emergency cases. * The Bank must study and assess ATM crimes to determine the primary problem areas. Procedures for reporting ATM crime should also be established. Knowing what crimes have occurred will aid the Bank in recognizing the particular crime problem and to what degree it exists so that it can implement specific prevention measures to mitigate the risk. In this connection, banks are encouraged to share information involving ATM fraud cases to deter and prevent proliferation of the crime. APPENDIX B
INTERNET AND WIRELESS BANKING SECURITY MEASURES
1. Network controls
* Implement adequate security measures on the internal networks and network connections to public network or remote parties. Segregate internal networks into different segments having regard to the access control needed for the data stored in, or systems connected to, each segment. * Properly design and configure the servers and firewalls used for the e-banking services either internet-based or delivered through wireless communication networks (e.g., install firewalls between internal and external networks as well as between geographically separate sites). Deploy strong and stringent authentication and controls especially in remote access or wireless access to the internal network. * Implement anti-virus software, network scanners and analyzers, intrusion detectors and security alert as well as conduct regular system and data integrity checks. * Maintain access security logs and audit trails. These should be analyzed for suspicious traffic and/or intrusion attempts. * Ensure that wireless software for wireless communication network includes appropriate audit capabilities (e.g., recording dropped transactions). * Develop built-in redundancies for single points of failure which can bring down the entire network. 2. Operating Systems Controls
* Harden operating system by configuring system software and firewall to the highest security settings consistent with the level of protection required, keeping abreast of enhancements, updates and patches recommended by system vendors. * Change all default passwords for new systems immediately upon installation as they provide the most common means for intruders to break into systems. 3. Encryption
* Implement encryption technologies that are appropriate to the sensitivity and importance of data to protect confidentially of information while it is stored or in passage over external and internal networks. * Choose encryption technologies that make use of internationally recognized cryptographic algorithms where the strengths of the algorithms have been subjective to extensive tests. * Apply strong “end-to-end” encryption to the transmission of highly sensitive data (e.g., customer passwords) so that the data are encrypted all the way between customers’ devices and the Bank’s internal systems for processing data. This would ensure that highly sensitive data would not be compromised even if the Bank’s web servers or internal networks were penetrated. 4. Website and Mobile Banking Authentication
* Authenticate official website to protect the Bank’s customers from spoofed or faked websites. The Bank should determine what authentication technique to use to provide protection against these attacks. * For wireless applications, adopt authentication protocols that are separate and distinct from those provided by the wireless network operator. 5. Physical Security
* House all critical or sensitive computers and network equipment in physically secure locations (e.g., away from environmental hazards, unauthorized entry and public disclosure, etc.). * Implement physical security measures such as security barriers (e.g., external walls, windows): entry controls (e.g., biometric door locks, manual or electronic logging, security guards) and physical protection facilities/devices (e.g., water and fire detectors, uninterruptible power supply (UPS), etc.) to prevent unauthorized physical access, damage to and interference with the e-banking services. 6. Developments and Acquisition
* Separate physical/logical environments for the development, testing, staging and production. * Provide separate environments for the development, testing, staging and production of internet facing web-based applications; connect only the production environment to the internet. 7. IT Personnel Training
* Provide appropriate and updated training to IT personnel on network, application and security risks and controls so that they understand and can respond to potential security threats. 8. Service Providers
* Perform due diligence regularly to evaluate the ability of the service providers (e.g., internet service provider, telecommunication provider) to maintain an adequate level of security and to keep abreast of changing technology. * Ensure that the contractual agreements with the service providers have clearly defined security responsibilities. 9. Independent Audit, Vulnerability Test and Penetration Testing * Conduct regular audit to assess the adequacy and effectiveness of the risk management process and the attendant controls and security measures. * Perform vulnerability test or assessment to evaluate the information security policies, internal controls and procedures, as well as system and network security of the Bank. Assessment should also include latest technological developments and security threats, industry standards and sound practices. * Conduct penetration testing at least annually.
* The audit and test should be conducted by security professionals or internal auditors who are independent in the development, implementation or operation of e-banking services, and have the required skills to perform the evaluation. * For e-banking services provided by an outside vendor or service provider, ensure that the above tests and audit are performed and the Bank is provided with the result and actions taken on system security weaknesses. 10. Incident Response
* Establish an incident management and response plan and test the predetermined action plan relating to security incidents. APPENDIX C
ELECTRONIC BANKING CONSUMER AWARENESS PROGRAM
To ensure security in their e-banking transactions and personal information, consumers should be oriented of their roles and responsibilities, which, at a minimum include the following: 1. Internet Products and Services
A. Secure Login ID and Password or PIN
* Do not disclose Login ID and Password or PIN
* Do not store Login ID and Password or PIN on the computer. * Regularly change password or PIN and avoid using easy-to-guess passwords such as names or birthdays, Password should be a combination of characters (uppercase and lowercase) and numbers, and should be at least 6 digits in length. B. Keep personal information private.
* Do not disclose personal information such as address, mother’s maiden name, telephone number, social security number, bank account number or e-mail address – unless the one collecting the information is reliable and trustworthy. * Keep records of online transactions
* Regularly check transaction history details and statements to make sure that there are no unauthorized transactions. * Review and reconcile monthly credit card and bank statements for any errors and unauthorized transactions promptly and thoroughly. * Check e-mail for contacts by merchants with whom one is doing business. Merchants may send important information about transaction histories. * Immediately notify the Bank if there are unauthorized entries or transactions in the account. * Check for the right and secure website.
* Before doing any online transactions or sending personal information, make sure that correct website has been accessed. Beware of bogus or “look alike” websites which are designed to deceive consumers. * Check if the website is “secure” by checking the Universal Resource Locators (URLs) which should begin with “https” and a closed padlock icon on the status bar in the browser is displayed. To confirm authenticity of the site, double-click on the lock icon to display security certificate information of the site. * Always enter the URL of the website directly into the web browser. Avoid being re-directed to the website, or hyperlink to it from a website that may not be as secure. * If possible, use software that encrypts or scrambles the information when sending sensitive information or performing e-banking transactions online. * Protect personal computer from hackers, viruses and malicious programs.
* Install a personal firewall and a reputable anti-virus program to protect personal computer from virus attacks or malicious programs. * Ensure that the anti-virus program is updated and runs at all times. * Always keep the operating system and the web browser updated with the latest security patches, in order to protect against weaknesses or vulnerabilities. * Always check with an updated anti-virus program when downloading a program or opening an attachment to ensure that it does not contain any virus. * Install updated scanner softwares to detect and eliminate malicious programs capable of capturing personal or financial information online. * Never download any file or software from sites or sources, which are not familiar or hyperlinks sent by strangers. Opening such files could expose the system to a computer virus that could hijack personal information, including password or PIN. * Do not leave computer unattended when logged-in.
* Do not send any personal information particularly password or PIN via ordinary e-mail. Do not open other browser windows while banking online. * Avoid using shared or public personal computers in conducting e-banking transactions. * Disable the “file and printer sharing” feature on the operating system if conducting banking transactions online. Contact the banking institution to discuss security concerns and remedies to any online e-banking account issues. 2. Other Electronic Products
C. Automated Teller Machine (ATM) and debit cards
* Use ATMs that are familiar or that are in well-lit locations where one feels comfortable. If the machine is poorly lit or is in a hidden area, use another ATM. * Have card ready before approaching the ATM. Avoid having to go through the wallet or purse to find the card. * Do not use ATMs that appear to have been tampered with or otherwise altered. Report such condition to the Bank. * Memorize ATM personal identification number (PIN) and never disclose it with anyone. Do not keep those numbers or passwords in the wallet or purse. Never write them on the cards themselves. And avoid using easily available personal information like a birthday, nickname, mother’s maiden name or consecutive numbers. * Be mindful of “shoulder surfers” when using ATMs. Stand close to the ATM and shield the keypad with hand when keying in the PIN and transaction amount. * If the ATM is not working correctly, cancel the transaction and use a different ATM. If possible, report the problem to the Bank. * Carefully secure card and cash in the wallet, handbag, or pocket before leaving the ATM. * Do not leave the receipt behind. Compare ATM receipts to monthly statement. It is the best way to guard against fraud and it makes record-keeping easier. * Do not let other people use your card. If card is lost or stolen, report the incident immediately to the Bank. D. Credit Cards
E. Never disclose credit card information to anyone. The fraudulent use of credit cards is not limited to the loss or theft of actual credit cards. A capable criminal only needs to know the credit card number to fraudulently make numerous charges against the account. F. Endorse or sign all credit cards as soon as they are received from the Bank. G. Like ATM card PINs, secure credit card PINs. Do not keep those numbers or passwords in the wallet or purse and never write them on the cards themselves. H. Photocopy both the front and back of all credit cards and keep the copies in a safe and secure location. This will facilitate in the immediate cancellation of the card if lost or stolen. I. Carry only the minimum number of credit cards actually needed and never leave them unattended. J. Never allow credit card to be used as reference (credit card number) or as an identification card.
Never give your credit card account number over the telephone unless dealing with a reputable company or institution. K. When using credit cards, keep a constant eye on the card and the one handling it. Be aware of the “swipe and theft” scam using card skimmers. A skimmer is a machine that records the information from the magnetic stripe on a credit card to be downloaded onto a personal computer later. The card can be swiped on a skimmer by a dishonest person and that data can then be used to make duplicate copies of the credit card. L. Do not leave documents like bills, bank and credit card statements in an unsecured place since these documents have direct access to credit card and/or deposit account information. Consider shredding sensitive documents rather than simply throwing them away. (Some people will go through the garbage to find this information). M. Notify the bank in advance of a change in address.
N. Open billing statements promptly and reconcile card amounts each month. * Do not let other people use your card. If card is lost or stolen, report the incident immediately to the Bank. O. Mobile Banking
* Do not disclose your Mobile Banking Pin (MPIN) to anyone. * Regularly change the MPIN.
* Do not let other people use your mobile phone enrolled in a mobile banking service. If the phone is lost or stolen, report the incident immediately to the Bank. * Be vigilant. Refrain from doing mobile banking transactions in a place where you observe the presence of “shoulder surfers”. * Keep a copy of the transaction reference number provided by the Bank whenever you perform a mobile banking transaction as an evidence that the specific transaction was actually executed. Since customers may find it difficult to take in lengthy and complex advice, the Bank should devise effective methods and channels for communicating with them on security precautions. The Bank may make use of multiple channels (e.g., Bank’s website, alert messages on a customer’s mobile phone, messages printed on customer statements, promotional leaflets, circumstances when the Bank’s frontline staff communicate with their customers) to enforce these precautionary measures. APPENDIX D
1. General Requirement
Bank offering electronic banking services have to adopt responsible privacy policies and information practices. They should provide disclosures that are clear and readily understandable, in writing, or in a form the consumers may print and keep.
Bank should also ensure that consumers who sign-up for a new banking service are provided with disclosures (e.g., pamphlet) informing him of his right as a consumer.
At a minimum, the following disclosures should be provided to protect consumers and inform them of their rights and responsibilities. *
Information on the duties of the banking institution and customers. * Information on who will be liable for unauthorized or fraudulent transactions. * Mode by which customers will be notified of changes in terms and conditions. * Information relating to how customers can lodge a complaint, and how a complaint may be investigated and resolved. * Disclosures that will help customers in their decision-making (e.g., PDIC insured, etc.) * For internet environment, information that prompt in the bank’s website to notify customers that they are leaving the banking institutions’ website and hence they are not protected by the privacy policies and security measures of the banking institutions when they hyperlink to third party’s website. 2. Disclosure Responsibility
* Compliance officers should review bank’s disclosure statements to determine whether they been designed to meet the general and specific requirements set in this circular. * For banks that advertise deposit products and services on-line, they must verify that proper advertising disclosures are made (e.g., whether the product is insured or not by the PDIC; fees and charges associated with the product or services, etc.). Advertisements should be monitored to determine whether they are current, accurate, and compliant. * For banks that issue various products like stored value cards, e-wallets, debit cards, they must provide information to consumers regarding the features of each of these products to enable consumers to meaningfully distinguish them. Additionally, consumers would find it beneficial to receive information about the terms and conditions associated with their usage. Example of these disclosures include: * PDIC insured or non-insured status of the product; * Fees and charges associated with the purchase, use or redemption of the product; * Liability for lost;
* Expiration dates, or limits on redemption; and
* Toll-free telephone number for customer service, malfunction and error resolution.
RCBC AccessOne is an Internet Banking facility that enables you to access your RCBC Accounts and do banking transactions online 24/7.
RCBC ACCESSONE FEATURES|
RCBC eShop New!
RCBC eShop allows clients enrolled in RCBC AccessOne pay online purchases done in the partner-merchant’s website. Read more about RCBC eShop| eStatement New!
One of the facilities of RCBC AccessOne that allows checking account holders to download the online bank statements up to three previous months. Read more about eStatement| Account Information
View real-time current and available balances. * Current/Savings Accounts * Time Deposit Accounts * All Internal Accounts| Fund Transfer * Own Account Transfer – transfer funds between your enrolled accounts * Other RCBC Accounts – transfer funds from your RCBC enrolled accounts to other RCBC accounts. An enhanced feature allows you the option to choose frequent beneficiary–who you pre-registered in “Add Frequent Beneficiary”–to whom you do regular fund transfers. * Add Frequent Beneficiary – facilitates pre-enrollment of RCBC account holders as your regular beneficiaries. * Search Frequent Beneficiary – searches for your requested beneficiary and enables you to update any information. Option to remove a beneficiary from your Frequent Beneficiary list is also available. * Pending Transfers – displays all pending fund transfers. Option to interrupt/stop the transaction is also available. * Fund Transfer Status Inquiry – displays the status and details of all fund transfers.| Bankard * Registration – register your Bankard credit card by simply entering your card number. * Credit Card Details – displays your Bankard’s outstanding balance and available credit. * Transaction Inquiry – displays all your card transactions.| Time Deposit
Online placement and payout of Time Deposit to your enrolled accounts. * Placement – facilitates the selection of term, settlement account, and maturity instruction of the Time Deposit to be placed. * List of TD Placement – displays all the Time Deposits placed in RCBC AccessOne.| Remittance
Inquire status of RCBC Telemoney Remittance by entering the reference or OR number.| Inter-Bank Fund Transfer (IBFT)
Transfer funds from your RCBC enrolled accounts to other BANCNET member banks. This function is only available for enrolled ATM Accounts. Maximum amount for Inter Bank Fund Transfer is Php 50,000.00 with Php 27.50 charge. * Add Beneficiary – facilitates pre-enrollment of accounts from other BANCNET member banks as your regular beneficiaries. Once you signed them up, you no longer need to retype their account numbers the next time you transfer funds to them. * Beneficiary Search – searches for your requested beneficiary and enables you to update any information. Option to remove a beneficiary is also available. * Initiate Payments – initiates the transfer of funds from your enrolled RCBC accounts to other BANCNET member banks. * Completed Payments – displays the status and details of all inter bank fund transfers according to the date requested. LIST OF BANCNET MEMBER BANKS IN RCBC ACCESSONE| Allied Bank
Asia United Bank
Banco San Juan
Centennial Savings Bank
Citibank Savings Bank
City State Bank| EastWest Bank
Export & Industry Bank
Manila Bank Merchants Bank
Opportunity Microfinance Bank
Phil. Postal Bank
Philtrust Bank| PS Bank
Quezon Capital Rural Bank
Standard Chartered Bank
Sterling Bank of Asia
Tong Yang Savings Bank
World Partners Banks
Allows you to settle your payment to our available merchants. * Register Frequent Billers – facilitates pre-enrollment of regular billers. Once you signed them up, you no longer need to retype the reference numbers the next time you pay your bills. * View Registered Billers – searches for your requested biller and enables you to update any information. Option to remove a biller is also available. * Frequent Billers – initiates payment to your registered billers. * One Time Payment – initiates payment to non-registered billers. * Pending Payment – displays your future dated payments. Option to edit/stop such payments is also available. * Bills Payment Status Inquiry – displays the status and details of all bills payment made according to the date requested.| Requests
Allows you to request checkbooks and managers check. * New Request – facilitates the request of checkbook and managers check. * Query Request – displays the status and details of all the requests made.| Mails
Send and receive emails to and from RCBC.|
Update your personal profile, change your password, and add additional accounts.|