This webinar will look at who has the right to endorse the back of a check and where is proper endorsement placement. We will look at what happens if a check is not endorsed properly, when it may be best not to accept the check at all due to missing or problem endorsements, why we do not put business checks into personal accounts and why we do not give less cash on business accounts.. Many “tricky” issues will be discussed, such as deceased customers, business accounts, endorsements for minors, income tax check endorsements, trustee endorsements, and endorsements by powers of attorney.
Congratulations! You just got the best deal on the market. Your iTold Yearly Subscription enables you to attend 100 iTod webinars, and provides you with access to our entire OnDemand training library. Thank you for your business and Happy Training!
As organizations extend credit, sooner or later, some borrowers will find it hard to repay as agreed. Effective credit risk management includes sound problem asset management. Join Dev Strischek as he offers advice on identifying potential problem loans, writing and implementing policies to management problem loans and a problem loan portfolio, choosing the appropriate resolution strategy, and minimizing future problem assets.
Wednesday, April 25, 2018 - 11:00 AM - 12:30 PM ET
Excel has many built-in functions that help you deal with that data. It is very important that you know how to use some of these functions to get the most out of your data in a time efficient manner. This way, you can turn the data into meaningful information and then provide the answers that you need for yourself, your boss, your company or your organization.
Wire transfer fraud has been around almost as long as the payment system itself despite numerous federal regulations intended to combat the problem. We all have a role to play in stopping wire transfer fraud before losses rack up. Discussion includes examples of wire fraud, laws that direct liability, and best practices to mitigate risk.
After attending this webinar, you will walk away with a deeper knowledge of Cash Management, conduct a risk assessment on any new products, and bring back ideas to your bank on how to market Cash Management products and services to your business clients. In addition, your team will also work better together knowing how critical each area is to the success of the implementation and sale of these products and services.
we will use a 10-Step Cybersecurity Checklist to review best practices your Institution can take to prevent cyber incidents from arising at all. We will review relevant laws and regulations, and examine case law trends.You will learn what types of cyber threats to expect, and how to properly train your personnel. We will also explore incident management and discuss the procedures you need to have in place so that you can immediately respond to a cyber incident.
Internal fraud risk assessments are critical to a credit union’s security posture. These assessments help the institution identity possible internal fraud and gaps in security. Best practices, resources, sound business practices and examples provided to help institutions perform effective assessments and improve internal controls. Takeways – resources and a checklist to developing an internal fraud RA.
Many account holders use trusts to plan for their estate, family, taxes, etc. When opening these special accounts, you need to know about proper documentation, CIP and signature card responsibilities. You must also understand the trustee(s) authority and duties and your financial institution’s responsibility and liability. This webinar will cover standard trust-opening procedures and many questions that arise as trusts and account holder situations change.
The focus of this interactive webinar is to limit your financial institution’s liability. This session outlines your responsibilities to the Federal Government if a beneficiary is deceased but still receiving benefit payments. The NACHA Operating Rules still apply when processing these payments but the Green Book outlines the exceptions when handling DNEs (Death Notification Entries) and Federal Government Reclamations.
Despite the fact that a majority of United States organizations have experienced a cyber-attack either directly or through a vendor, U.S. businesses do not consistently address cyber threats. This webinar will help: (1) you focus on what you can control to mitigate litigation and reputational risk; (2) your organization create a culture of cybersecurity continuity; and, (3) ensure everyone in your Institution understands the role s/he plays in protecting information, customers, assets, other employees, and your corporate mission.
A 10-Step Checklist will be used throughout the session to help you learn how to design, implement, and monitor an efficient Cybersecurity Program.
You will also receive a complimentary 9-part Toolkit to help your Institution comply with federal and state cyber laws.
How can you keep your employees safe at your financial institution during a robbery? During this webinar, we will review the ABC’s of security devices, discuss methods of how to prevent robberies and what to do before, during and after a robbery. We will cover some details on how to detect counterfeit money and what are the security features of the “old” and “new” bills in circulation at this time.
This program will answer commonly asked frontline questions and it will go over the red flags for money laundering for deposits and loans. You won't want to miss this fun frontline approach to red flags and your anti-money laundering program.
Credit policies work best if they are easy to understand, practical to follow, and realistic to use. Join Dev Strischek in this webinar to learn how to write succinct, readable policies that incorporate the basic components of policies and reflect the organization's credit and lending strategies, policies that cover topics such as credit analysis and repayment ability, credit proposals and credit decisions, loan rating systems and policy exceptions.
Participants will understand what constitutes a well planned institutional loan policy that is in accordance with sound practices as well as regulatory requirements. You will also discover how to devise clear, precise, and meaningful procedures to audit the loan function.
In this session, we will examine the CFPB's broad application of its UDAAP authority. Taken together with an exploration of the CFPB's various informal guidance documents addressing debt collection issues, we will determine what constitutes a potential UDAAP violation according to the Bureau.
We will also review the Federal Deposit Insurance Corporation's (FDIC) debt collection recommendations for 1st party collectors, as well as compliance points related to the Fair Credit Reporting Act (FCRA), the Fair and Accurate Credit Transaction Act (FACTA), and the Fair Debt Collection Practices Act (FDCPA). Finally, we will explore the recent verdicts and rulings that affect how you handle slow-paying accounts.