RCBC E-Banking Essay Sample

This memoranda is being issued to function as the Bank’s policy in consumer protection for e-banking merchandises and services. A. Policy
The Bank shall supply consumer protection applicable to e-banking merchandises and services. in conformity with Bangko Sentral ng Pilipinas ( BSP ) Circular No. 542 entitled Consumer Protection for Electronic Banking. In this respect. the Bank shall guarantee that the execution of its e-banking activities are in conformity with the demands to safeguard client information ; bar of money laundering and terrorist funding ; decrease of fraud and larceny of sensitive client information ; and publicity of legal enforceability of the Bank’s electronic understandings and minutess. This policy shall cover all e-banking merchandises and services offered by the Bank. including those that will be introduced subsequently on. B. Definition

Electronic banking ( e-banking ) by and large refers to the proviso of banking merchandises and services through electronic channels such as the personal computing machine. through land line and nomadic phone connexions. or through automated Teller machines ( ATMs ) . These electronic banking merchandises include the electronic money merchandises that are aimed at easing retail payments. Presently. the Bank has the undermentioned e-banking merchandises and services: 1. RCBC AccessOne ( Retail Internet Banking )

2. Enterprise Banking ( Corporate Internet Banking )
3. Phone Banking
4. Mobile Banking
5. ATM
6. Bills Payment machines
7. Cashless shopping utilizing P. O. S. ( Point of Sale )
8. MyWallet

In conformity with BSP Circular No. 542. the undermentioned guidelines shall cover all e-banking merchandises and services of the Bank: 1. E-Banking Oversight Function
A. The Bank’s Board of Directors and the Senior Management Committee shall be responsible for developing the Bank’s e-banking concern scheme and set uping an effectual direction inadvertence over e-banking services. This shall include the reappraisal and blessing of the cardinal facets of the Bank’s security control plan and procedure. such as the development and care of security control policies and substructure that decently safeguard e-banking systems and informations from both internal and external menaces. This will besides include a comprehensive procedure for pull offing hazards associated with increased complexness of and increasing trust on outsourcing relationships and third-party dependences to execute critical e-banking maps.

B. The Board of Directors and the Bank’s senior direction shall guarantee that the Bank’s hazard direction policies and procedures are updated and modified where necessary. to cover bing or planned e-banking services. C. The Bank’s Compliance Officer shall besides guarantee that proper controls are incorporated into the system so that all relevant conformity issues are to the full addressed. The merchandise directors and system interior decorators should confer with with the Compliance Officer during the development and execution phases of e-banking merchandises and services. This degree of engagement will assist diminish the Bank’s conformity hazard and may forestall the demand to detain deployment or redesign plans that do non run into regulative demands.

2. E-Banking Risk Management and Internal Control
D. Information Security Program
The Bank. through the Information Technology Shared Services Group ( ITSSG ) . shall set up and keep a comprehensive information security plan which must be decently implemented and purely enforced. The information security plan should include. at a lower limit. the undermentioned: 1. Designation and appraisal of hazards associated with e-banking merchandises and services ; 2. Designation of hazard extenuation actions. including appropriate hallmark engineering and internal controls ; 3. Information revelation and client privateness policy ; and 4. Evaluation of consumer consciousness attempts.

ITSSG shall set or update. as appropriate. the said information security plan in visible radiation of any relevant alterations in engineering. the sensitiveness of its client information. and internal or external menaces to information. E. Information Security Measures

5. ITSSG shall guarantee that the information security steps and internal controls related to electronic banking are installed. on a regular basis updated. monitored and are appropriate with the hazards associated with the merchandises and services. Please see Appendix A and Appendix B for the minimal security steps that the Bank should use in ATM installations and internet/mobile banking activities. severally. to protect depositors and consumers from fraud. robbery and other e-banking offenses. 6. ITSSG shall besides take into history other relevant industry security criterions and sound patterns as appropriate. and maintain up with the most current information security issues ( e. g. . security failings of the radio environment ) . by sourcing relevant information from well-known security resources and organisations. F. Authentication

7. To authenticate the individuality of e-banking clients. the merchandise directors shall use techniques allow to the hazards associated with e-banking merchandises and services. The execution of appropriate hallmark methodological analysiss should get down with a hazard appraisal procedure. The hazard should be evaluated based on the followers: a. type of client ;

b. client transactional capablenesss ( e. g. . measure payment. fund transportation. enquiry ) ; c. sensitiveness of client information and dealing being communicated to both the Bank and the client ; d. easiness of utilizing the communicating method ; and

e. volume of minutess.
8. As engineering and other processs develop over clip. ITSSG. together with the Bank’s engineering service suppliers. shall continuously reexamine. measure and place hallmark engineering and guarantee appropriate alterations are implemented for each dealing type and degree of entree based on the current and altering hazard factors. 9. Account fraud and individuality larceny are often the consequence of single-factor ( e. g. . ID/password ) hallmark development. Where hazard appraisals indicate that the usage of single-factor hallmark is unequal. the merchandise directors and system interior decorators shall implement multifactor hallmark ( e. g. . ATM card and PIN ) . layered security. or other controls moderately calculated to extenuate those hazards. 10. The hallmark procedure should be consistent with and back up the Bank’s overall security and hazard direction plans. An effectual hallmark procedure should hold client credence. dependable public presentation. scalability to suit growing. and inter-operability with bing systems and future programs every bit good as appropriate policies. processs. and controls. G. Account Origination and Customer Verification

11. With the growing of e-banking and e-commerce. the Bank shall utilize dependable methods of arising new client histories in an electronic banking environment. Potentially important hazards may originate when a bank accepts new clients through the cyberspace or other electronic channels. Therefore. all concerned units/business centres shall guarantee that in arising new histories. the “Know Your Customer” or KYC policy of the Bank. which involves “face-to-face” contact. is purely adhered to. H. Monitoring and Reporting of E-banking Transactions

12. Monitoring systems can find if unauthorised entree to computing machine systems and client histories has occurred. The merchandise directors and system interior decorators must guarantee that a sound monitoring system is in topographic point. which should include audit characteristics that can help in the sensing of fraud. money laundering. compromised watchwords. or other unauthorised activities. 13. ITSSG shall be responsible for the activation and care of audit logs which can assist the Bank to place unauthorised activities. detect invasions. reconstruct events. and promote employee and user answerability. This control procedure can besides ease the Bank in the entry of leery activities studies as required by the Anti-Money Laundering Council ( AMLC ) and other regulative organic structures. 14. When users are no longer authorized to entree a peculiar system. the same must be reported quickly to the security decision makers for the timely remotion or suspension of user history entree. 15. Whenever critical systems or procedures are outsourced to 3rd parties. ITSSG shall guarantee that the appropriate logging and monitoring processs are in topographic point and that suspected unauthorised activities are communicated to the Bank in a timely mode. 16. An independent party ( e. g. . internal or external hearer ) should besides reexamine activity studies documenting the security administrators’ actions to supply the necessary cheques and balances for pull offing system security. 3. Consumer Awareness Program

I. Consumer consciousness is a cardinal defence against fraud and individuality larceny and security breach. Please see Appendix C for the minimal Consumer Awareness Program that the Bank should convey to its clients. J. To be effectual. the Channel Management and Product Development Division ( CMPDD ) under Retail Banking Group ( RBG ) shall implement and continuously measure its consumer consciousness plan. Methods to measure a program’s effectivity include tracking the figure of clients who report deceitful efforts to obtain their hallmark certificates ( e. g. . ID/password ) . the figure of chinks on information security links on web sites. the figure of enquiries. etc. 4. Disclosure and Business Availability

ALSO READ  üInitial Public Offering for a Global Firm Essay Sample

K. The Bank shall supply its clients with a degree of comfort sing information revelations or transparences. protection of client informations and concern handiness that they can anticipate when utilizing traditional banking services. L. To minimise operational. legal and reputational hazards associated with e-banking activities. the Bank shall do equal revelation of information and take appropriate steps to guarantee attachment to client privateness and protection demands. Please see Appendix D for the minimal revelation demands of the Bank. M. In order to run into customers’ outlooks. the Bank shall guarantee that effectual capacity. concern continuity and eventuality planning are in topographic point. The CMPDD. in coordination with ITSSG. must be able to present e-banking services to all end-users and keep such handiness in all fortunes ( e. g. . 24/7 handiness ) . Likewise. CMPDD must guarantee that effectual incident response mechanisms and communicating schemes are in topographic point to minimise hazards originating from unexpected events. including internal and external onslaughts. N. Safekeeping of Records

The Bank shall safekeep/monitor records or information sing e-banking fiscal minutess and revelations. merely like the record maintaining required in paper-based minutess. In this respect. all critical records associating to e-banking fiscal minutess and revelations shall be retained for a period of at least five ( 5 ) old ages or for good ( whenever applicable ) by all concerned units/business centres.

Safekeeping of these records or information means both hardcopies and softcopies ( whenever applicable ) of the same must be retained free from fiddling or corruptness within the assigned or applicable keeping period. 5. Complaint Resolution

The Bank may have client ailment either through an electronic medium or otherwise. refering an unauthorised dealing. loss. or larceny in its electronic banking history. Therefore. the Bank shall guarantee that controls are in topographic point to reexamine these presentments and that an probe is initiated as required. To decide differences originating from the usage of the electronic banking merchandises and services. the concerned unit/business centre shall instantly carry on an probe. 6. Applicability

Although the above guidelines are focused on the hazards and hazard direction techniques associated with an electronic bringing channel to protect clients and the general populace. it should be understood. nevertheless. that non all of the consumer protection issues that have arisen in connexion with new engineerings are specifically addressed in this policy. Extra policies may be issued in the hereafter to turn to other facets of consumer protection as the fiscal service environment through electronic banking evolves. APPENDIX A

* To minimize/prevent ATM frauds and offenses. the Bank should. at a lower limit. implement the undermentioned security steps with regard to automated Teller machine installations: * Locate ATM’s in extremely seeable countries ;

* Provide sufficient lighting at and around the ATM ;
* Where ATM offenses ( e. g. . robbery. hooliganism ) are high in a specific country or location. the Bank should put in surveillance camera or cameras. which shall see and enter all individuals come ining the installation. Such recordings shall be preserved by the bank for at least 30 ( 30 ) yearss ; * Implement ATM programming sweetenings like masking/non-printing or card Numberss ; * Educate clients by reding them on a regular basis of hazards associated with utilizing the ATM and how to avoid this hazards ; * Conduct and document periodic security review at the ATM location. and do the pertinent information available to its clients ; * Educate bank forces to be antiphonal and sensitive to client concerns and to pass on them instantly to the responsible bank officer ; and

* Post near the ATM installation a clearly seeable mark which. at a minimal. provides the telephone Numberss of the bank every bit good as other banks’ hotline Numberss for other cardholders who are allowed to transact concern in the ATM. and police hotlines for exigency instances. * The Bank must analyze and measure ATM offenses to find the primary job countries. Procedures for describing ATM offense should besides be established. Knowing what offenses have occurred will help the Bank in acknowledging the peculiar offense job and to what degree it exists so that it can implement specific bar steps to extenuate the hazard. In this connexion. Bankss are encouraged to portion information affecting ATM fraud instances to discourage and forestall proliferation of the offense. APPENDIX B

1. Network controls
* Implement equal security steps on the internal webs and web connexions to public web or remote parties. Segregate internal webs into different sections holding respect to the entree control needed for the informations stored in. or systems connected to. each section. * Properly design and configure the waiters and firewalls used for the e-banking services either internet-based or delivered through radio communicating webs ( e. g. . put in firewalls between internal and external webs every bit good as between geographically separate sites ) . Deploy strong and rigorous hallmark and controls particularly in distant entree or wireless entree to the internal web. * Implement anti-virus package. web scanners and analysers. invasion sensors and security qui vive every bit good as behavior regular system and informations unity cheques. * Maintain entree security logs and audit trails. These should be analyzed for leery traffic and/or invasion efforts. * Ensure that radio package for radio communicating web includes appropriate audit capablenesss ( e. g. . entering dropped minutess ) . * Develop built-in redundancies for individual points of failure which can convey down the full web. 2. Operating Systems Controls

* Harden operating system by configuring system package and firewall to the highest security scenes consistent with the degree of protection required. maintaining abreast of sweetenings. updates and spots recommended by system sellers. * Change all default watchwords for new systems instantly upon installing as they provide the most common agencies for interlopers to interrupt into systems. 3. Encoding

* Implement encoding engineerings that are appropriate to the sensitiveness and importance of informations to protect confidentially of information while it is stored or in transition over external and internal webs. * Choose encoding engineerings that make usage of internationally recognized cryptanalytic algorithms where the strengths of the algorithms have been subjective to extended trials. * Apply strong “end-to-end” encoding to the transmittal of extremely sensitive informations ( e. g. . client watchwords ) so that the informations are encrypted all the manner between customers’ devices and the Bank’s internal systems for treating informations. This would guarantee that extremely sensitive informations would non be compromised even if the Bank’s web waiters or internal webs were penetrated. 4. Website and Mobile Banking Authentication

* Authenticate functionary web site to protect the Bank’s clients from spoofed or faked web sites. The Bank should find what hallmark technique to utilize to supply protection against these onslaughts. * For radio applications. follow hallmark protocols that are separate and distinguishable from those provided by the radio web operator. 5. Physical Security

* House all critical or sensitive computing machines and web equipment in physically unafraid locations ( e. g. . off from environmental jeopardies. unauthorised entry and public revelation. etc. ) . * Implement physical security steps such as security barriers ( e. g. . external walls. Windowss ) : entry controls ( e. g. . biometric door locks. manual or electronic logging. security guards ) and physical protection facilities/devices ( e. g. . H2O and fire sensors. uninterruptible power supply ( UPS ) . etc. ) to forestall unauthorised physical entree. harm to and intervention with the e-banking services. 6. Developments and Acquisition

* Separate physical/logical environments for the development. proving. theatrical production and production. * Provide separate environments for the development. proving. theatrical production and production of internet confronting web-based applications ; link merely the production environment to the cyberspace. 7. IT Personnel Training

* Provide appropriate and updated preparation to IT forces on web. application and security hazards and controls so that they understand and can react to possible security menaces. 8. Service Providers

* Perform due diligence on a regular basis to measure the ability of the service suppliers ( e. g. . cyberspace service supplier. telecommunication supplier ) to keep an equal degree of security and to maintain abreast of altering engineering. * Ensure that the contractual understandings with the service suppliers have clearly defined security duties. 9. Independent Audit. Vulnerability Test and Penetration Testing * Conduct regular audit to measure the adequateness and effectivity of the hazard direction procedure and the attender controls and security steps. * Perform exposure trial or appraisal to measure the information security policies. internal controls and processs. every bit good as system and web security of the Bank. Assessment should besides include latest technological developments and security menaces. industry criterions and sound patterns. * Conduct incursion proving at least yearly.

ALSO READ  Client Server Networking Essay Sample

* The audit and trial should be conducted by security professionals or internal hearers who are independent in the development. execution or operation of e-banking services. and have the needed accomplishments to execute the rating. * For e-banking services provided by an outside seller or service supplier. guarantee that the above trials and audit are performed and the Bank is provided with the consequence and actions taken on system security failings. 10. Incident Response

* Establish an incident direction and response program and prove the predetermined action program associating to security incidents. APPENDIX C
To guarantee security in their e-banking minutess and personal information. consumers should be oriented of their functions and duties. which. at a minimal include the undermentioned: 1. Internet Products and Services

A. Secure Login ID and Password or PIN
* Do non unwrap Login ID and Password or PIN
* Do non hive away Login ID and Password or PIN on the computing machine. * Regularly alteration watchword or PIN and avoid utilizing easy-to-guess watchwords such as names or birthdays. Password should be a combination of characters ( uppercase and small letter ) and Numberss. and should be at least 6 figures in length. B. Keep personal information private.

* Do non unwrap personal information such as reference. mother’s inaugural name. telephone figure. societal security figure. bank history figure or e-mail reference – unless the one roll uping the information is dependable and trusty. * Keep records of on-line minutess

* Regularly check dealing history inside informations and statements to do certain that there are no unauthorised minutess. * Review and accommodate monthly recognition card and bank statements for any mistakes and unauthorised minutess quickly and exhaustively. * Check electronic mail for contacts by merchandisers with whom one is making concern. Merchants may direct of import information about dealing histories. * Immediately notify the Bank if there are unauthorised entries or minutess in the history. * Check for the right and unafraid web site.

* Before making any on-line minutess or directing personal information. do certain that right web site has been accessed. Beware of bogus or “look alike” web sites which are designed to lead on consumers. * Check if the web site is “secure” by look intoing the Universal Resource Locators ( URLs ) which should get down with “https” and a closed padlock icon on the position saloon in the browser is displayed. To corroborate genuineness of the site. double-click on the lock icon to expose security certification information of the site. * Always enter the URL of the web site straight into the web browser. Avoid being re-directed to the web site. or hyperlink to it from a web site that may non be as secure. * If possible. usage package that encrypts or scrambles the information when directing sensitive information or executing e-banking minutess online. * Protect personal computing machine from hackers. viruses and malicious plans.

* Install a personal firewall and a reputable anti-virus plan to protect personal computing machine from virus onslaughts or malicious plans. * Ensure that the anti-virus plan is updated and tallies at all times. * Always keep the operating system and the web browser updated with the latest security spots. in order to protect against failings or exposures. * Always cheque with an updated anti-virus plan when downloading a plan or opening an fond regard to guarantee that it does non incorporate any virus. * Install updated scanner packages to observe and extinguish malicious plans capable of capturing personal or fiscal information online. * Never download any file or package from sites or beginnings. which are non familiar or hyperlinks sent by aliens. Opening such files could expose the system to a computing machine virus that could commandeer personal information. including watchword or PIN. * Do non go forth computing machine unattended when logged-in.

* Log-off from the cyberspace banking site when computing machine is unattended. even if it is for a short piece. * Always retrieve to log-off when e-banking minutess have been completed. * Clear the memory cache and dealing history after logging out from the web site to take history information. This would avoid incidents of the stored information being retrieved by unwanted parties. * Check the site’s privateness policy and revelations. * Read and understand website revelations specifically on refund. transportation. history debit/credit policies and other bank footings and conditions. * Before supplying any personal fiscal information to a web site. find how the information will be used or shared with others. * Check the site’s statements about the security provided for the information divulged. * Some websites’ revelations are easier to happen than others – expression at the underside of the place page. on order signifiers or in the “About” or “FAQs” subdivision of site. If the client is non comfy with the policy. see making concern elsewhere. * Other internet security steps:

* Do non direct any personal information peculiarly watchword or PIN via ordinary electronic mail. Do non open other browser Windowss while banking online. * Avoid utilizing shared or public personal computing machines in carry oning e-banking minutess. * Disable the “file and pressman sharing” characteristic on the operating system if carry oning banking minutess online. Reach the banking establishment to discourse security concerns and redresss to any on-line e-banking history issues. 2. Other Electronic Merchandises

C. Automated Teller Machine ( ATM ) and debit cards
* Use ATMs that are familiar or that are in well-lit locations where one feels comfy. If the machine is ailing lit or is in a concealed country. utilize another ATM. * Have card ready before nearing the ATM. Avoid holding to travel through the billfold or bag to happen the card. * Do non utilize ATMs that appear to hold been tampered with or otherwise altered. Report such status to the Bank. * Memorize ATM personal designation figure ( PIN ) and ne’er unwrap it with anyone. Make non maintain those Numberss or watchwords in the billfold or bag. Never write them on the cards themselves. And avoid utilizing easy available personal information like a birthday. moniker. mother’s inaugural name or back-to-back Numberss. * Be mindful of “shoulder surfers” when utilizing ATMs. Stand near to the ATM and shield the computer keyboard with manus when keying in the PIN and dealing sum. * If the ATM is non working right. call off the dealing and utilize a different ATM. If possible. describe the job to the Bank. * Carefully procure card and hard currency in the billfold. pocketbook. or pocket before go forthing the ATM. * Do non go forth the reception behind. Compare ATM receipts to monthly statement. It is the best manner to guard against fraud and it makes record-keeping easier. * Do non allow other people use your card. If card is lost or stolen. describe the incident instantly to the Bank. D. Credit Cards

E. Never unwrap recognition card information to anyone. The deceitful usage of recognition cards is non limited to the loss or larceny of existent recognition cards. A capable condemnable merely needs to cognize the recognition card figure to fraudulently do legion charges against the history. F. Endorse or subscribe all recognition cards every bit shortly as they are received from the Bank. G. Like ATM card PINs. secure recognition card PINs. Do non maintain those Numberss or watchwords in the billfold or bag and ne’er compose them on the cards themselves. H. Photocopy both the forepart and dorsum of all recognition cards and maintain the transcripts in a safe and unafraid location. This will ease in the immediate cancellation of the card if lost or stolen. I. Carry merely the minimal figure of recognition cards really needed and ne’er leave them unattended. J. Never allow recognition card to be used as mention ( recognition card figure ) or as an designation card.

Never give your recognition card history figure over the telephone unless covering with a reputable company or establishment. K. When utilizing recognition cards. maintain a changeless oculus on the card and the one handling it. Be cognizant of the “swipe and theft” cozenage utilizing card skimmers. A skimmer is a machine that records the information from the magnetic band on a recognition card to be downloaded onto a personal computing machine subsequently. The card can be swiped on a skimmer by a dishonorable individual and that informations can so be used to do duplicate transcripts of the recognition card. L. Do non go forth paperss like measures. bank and recognition card statements in an unbarred topographic point since these paperss have direct entree to recognition card and/or sedimentation history information. See tear uping sensitive paperss instead than merely throwing them off. ( Some people will travel through the refuse to happen this information ) . M. Notify the bank in progress of a alteration in reference.

ALSO READ  Dilemma Between the Rights and Choices of Children Essay Sample

N. Open charge statements quickly and reconcile card sums each month. * Do non allow other people use your card. If card is lost or stolen. describe the incident instantly to the Bank. O. Mobile Banking

* Do non unwrap your Mobile Banking Pin ( MPIN ) to anyone. * Regularly alteration the MPIN.
* Do non allow other people use your nomadic phone enrolled in a nomadic banking service. If the phone is lost or stolen. describe the incident instantly to the Bank. * Be argus-eyed. Refrain from making nomadic banking minutess in a topographic point where you observe the presence of “shoulder surfers” . * Keep a transcript of the dealing mention figure provided by the Bank whenever you perform a nomadic banking dealing as an grounds that the specific dealing was really executed. Since clients may happen it hard to take in drawn-out and complex advice. the Bank should invent effectual methods and channels for pass oning with them on security safeguards. The Bank may do usage of multiple channels ( e. g. . Bank’s web site. watchful messages on a customer’s Mobile phone. messages printed on client statements. promotional cusps. fortunes when the Bank’s frontline staff communicate with their clients ) to implement these precautional steps. APPENDIX D

1. General Requirement
Bank offering electronic banking services have to follow responsible privateness policies and information patterns. They should supply revelations that are clear and readily apprehensible. in composing. or in a signifier the consumers may publish and maintain.

Bank should besides guarantee that consumers who sign-up for a new banking service are provided with revelations ( e. g. . booklet ) informing him of his right as a consumer.

At a lower limit. the undermentioned revelations should be provided to protect consumers and inform them of their rights and duties. *
Information on the responsibilities of the banking establishment and clients. * Information on who will be apt for unauthorised or deceitful minutess. * Mode by which clients will be notified of alterations in footings and conditions. * Information associating to how clients can lodge a ailment. and how a ailment may be investigated and resolved. * Disclosures that will assist clients in their decision-making ( e. g. . PDIC insured. etc. ) * For cyberspace environment. information that prompt in the bank’s web site to advise clients that they are go forthing the banking institutions’ web site and hence they are non protected by the privateness policies and security steps of the banking establishments when they hyperlink to third party’s web site. 2. Disclosure Duty

* Compliance officers should reexamine bank’s revelation statements to find whether they been designed to run into the general and specific demands set in this handbill. * For Bankss that advertise sedimentation merchandises and services on-line. they must verify that proper advertisement revelations are made ( e. g. . whether the merchandise is insured or non by the PDIC ; fees and charges associated with the merchandise or services. etc. ) . Ads should be monitored to find whether they are current. accurate. and compliant. * For Bankss that issue assorted merchandises like stored value cards. e-wallets. debit cards. they must supply information to consumers sing the characteristics of each of these merchandises to enable consumers to meaningfully separate them. Additionally. consumers would happen it good to have information about the footings and conditions associated with their use. Example of these revelations include: * PDIC insured or non-insured position of the merchandise ; * Fees and charges associated with the purchase. usage or salvation of the merchandise ; * Liability for lost ;

* Expiration day of the months. or bounds on salvation ; and
* Toll-free telephone figure for client service. malfunction and mistake declaration.

RCBC AccessOne is an Internet Banking installation that enables you to entree your RCBC Accounts and make banking minutess online 24/7.

RCBC eShop New!
RCBC eShop allows clients enrolled in RCBC AccessOne wage online purchases done in the partner-merchant’s web site. Read more about RCBC eShop| eStatement New!
One of the installations of RCBC AccessOne that allows look intoing history holders to download the on-line bank statements up to three old months. Read more about eStatement| Account Information

View real-time current and available balances. * Current/Savings Accounts * Time Deposit Accounts * All Internal Accounts| Fund Transfer * Own Account Transfer – reassign financess between your enrolled histories * Other RCBC Accounts – reassign financess from your RCBC enrolled histories to other RCBC histories. An enhanced characteristic allows you the option to take frequent beneficiary–who you pre-registered in “Add Frequent Beneficiary”–to whom you do regular fund transportations. * Add Frequent Beneficiary – facilitates pre-enrollment of RCBC history holders as your regular donees. * Search Frequent Beneficiary – hunts for your requested beneficiary and enables you to update any information. Option to take a beneficiary from your Frequent Beneficiary list is besides available. * Pending Transportations – shows all pending fund transportations. Option to interrupt/stop the dealing is besides available. * Fund Transfer Status Inquiry – displays the position and inside informations of all fund transportations. | Bankard * Registration – register your Bankard recognition card by merely come ining your card figure. * Credit Card Details – displays your Bankard’s outstanding balance and available recognition. * Transaction Inquiry – displays all your card minutess. | Time Deposit

Online arrangement and payout of Time Deposit to your enrolled histories. * Placement – facilitates the choice of term. colony history. and adulthood direction of the Time Deposit to be placed. * List of TD Placement – displays all the Time Deposits placed in RCBC AccessOne. | Remittance

Inquire position of RCBC Telemoney Remittance by come ining the mention or OR figure. | Inter-Bank Fund Transfer ( IBFT )
Transfer financess from your RCBC enrolled histories to other BANCNET member Bankss. This map is merely available for enrolled ATM Accounts. Maximum sum for Inter Bank Fund Transfer is Php 50. 000. 00 with Php 27. 50 charge. * Add Beneficiary – facilitates pre-enrollment of histories from other BANCNET member Bankss as your regular donees. Once you signed them up. you no longer necessitate to retype their history Numberss the following clip you transfer financess to them. * Beneficiary Search – hunts for your requested beneficiary and enables you to update any information. Option to take a donee is besides available. * Initiate Payments – initiates the transportation of financess from your enrolled RCBC histories to other BANCNET member Bankss. * Completed Payments – shows the position and inside informations of all inter bank fund transportations harmonizing to the day of the month requested. LIST OF BANCNET MEMBER BANKS IN RCBC ACCESSONE| Allied Bank

Asia United Bank
Banco Filipino
Banco San Juan
Centennial Savings Bank
Chinatrust Bank
Citibank Savings Bank
City State Bank| EastWest Bank
Export & A ; Industry Bank
Green Bank
Malayan Bank

Manila Bank Merchants Bank
Opportunity Microfinance Bank
Phil. Postal Bank
Philtrust Bank| PS Bank
Quezon Capital Rural Bank
RCBC Savingss

Real Bank
Security Bank
Standard Chartered Bank
Sterling Bank of Asia
Tong Yang Savings Bank
World Partners Banks

Bills Payment
Allows you to settle your payment to our available merchandisers. * Register Frequent Billers – facilitates pre-enrollment of regular billers. Once you signed them up. you no longer necessitate to retype the mention Numberss the following clip you pay your measures. * View Registered Billers – hunts for your requested biller and enables you to update any information. Option to take a biller is besides available. * Frequent Billers – novices payment to your registered billers. * One Time Payment – initiates payment to non-registered billers. * Pending Payment – displays your hereafter dated payments. Option to edit/stop such payments is besides available. * Bills Payment Status Inquiry – displays the position and inside informations of all measures payment made harmonizing to the day of the month requested. | Requests

Allows you to bespeak chequebooks and directors check. * New Request – facilitates the petition of chequebook and directors check. * Query Request – displays the position and inside informations of all the petitions made. | Mails

Send and have electronic mails to and from RCBC. |
Profile Care
Update your personal profile. alter your watchword. and add extra histories. |