ADC+Handbook+ +2014
ADC+Handbook+ +2014
ADC+Handbook+ +2014
A
N
D
B
O
ALTERNATIVE O
DELIVERY CHANNELS
AND TECHNOLOGY K
ACKNOWLEDGEMENTS
The authors would like to thank the IFC team: Andrew Lake, Charles Niehaus,
Joseck Luminzu Mudiri, Lowell Campbell, Greta Bull and Margarete Biallas for their
contributions to the development of this handbook including in-depth reviews and
invaluable insights. Also, many thanks go to Anna Koblanck and Bonny Jennings for
making this handbook a user-friendly and easy-to-read resource.
This handbook was inspired by our clients and partners, many of whom have shared
their experiences with us over the past few years and with whom we have partnered
to scale up the provision of financial services through alternative delivery channels.
In particular, we’d like to thank Denis Moniotte of Microcred, Nick Meakin of Urwego
Opportunity Microfinance Bank and Kea Borann of AMK Cambodia for either providing
specific feedback on the drafts or for allowing us to share their experiences in the
handbook. The authors would also like to acknowledge the partnership with The
MasterCard Foundation, particularly Ruth Dueck-Mbeba and the financial inclusion
team, without whom this handbook would not have been realized.
Finally, the authors would like to note that any errors, either of omission or
commission, in this document are entirely their own. The views presented herein
represent those of the authors and the IFC team working on this paper, and are not
an official position of the World Bank Group.
CHAPTER 2
CHAPTER 1 12
Alternative Delivery Channels......................................................................................................... 12
ADC risks................................................................................................................................................. 15
ADC devices........................................................................................................................................... 16
ADC applications................................................................................................................................. 16
CHAPTER 3
ADC communications......................................................................................................................... 20
Authentication...................................................................................................................................... 21
CHAPTER 2 24
Step 1: Define ADC objectives......................................................................................................... 25
Step 2: Assess the environment..................................................................................................... 26
External assessment........................................................................................................................... 27
Internal assessment............................................................................................................................. 30
CHAPTER 4
Case Study: MicroCred...................................................................................................................... 31
Step 3: Develop the channel strategy and the business case............................................ 34
Case Study: Buy, build or rent?...................................................................................................... 35
CHAPTER 3 37
Step 4: Identify the available options.......................................................................................... 38
Step 5: Gather influencing criteria................................................................................................. 39
CHAPTER 5
Step 6: Select the platform.............................................................................................................. 41
Decision tree: mobile banking........................................................................................................ 43
Decision tree: agency banking ...................................................................................................... 44
From a technology perspective..................................................................................................... 46
Applications........................................................................................................................................... 46
Devices..................................................................................................................................................... 48
CHAPTER 4 50
Selection overview.............................................................................................................................. 51
Initiation................................................................................................................................................... 51
Step 7: Collect the Requirements.................................................................................................. 52
Collect the requirements................................................................................................................... 52
Weigh the requirements.................................................................................................................... 52
Prepare requests for proposals...................................................................................................... 52
Step 8: Issue the RFP and evaluate proposals.......................................................................... 53
Who should be invited to the RFP................................................................................................ 53
How to evaluate the responses...................................................................................................... 53
Step 9: Contract the vendor............................................................................................................ 55
From a technology perspective..................................................................................................... 55
Front-end applications...................................................................................................................... 55
Back office systems............................................................................................................................ 56
Integration components.................................................................................................................... 59
ISO8583................................................................................................................................................... 60
HTTP/web APIs..................................................................................................................................... 60
EFT switches and middleware........................................................................................................ 60
Other requirements............................................................................................................................. 61
CHAPTER 5 64
Implementation methodology........................................................................................................ 64
Step 10: Prepare kick-off and analysis......................................................................................... 65
Project kick-off...................................................................................................................................... 66
Requirements analysis....................................................................................................................... 66
Hardware procurement...................................................................................................................... 67
CHAPTER 2
Data migration...................................................................................................................................... 69
Installation.............................................................................................................................................. 69
User acceptance testing.................................................................................................................... 69
Training.................................................................................................................................................... 70
Step 12: Pilot and go live................................................................................................................... 70
Maintenance and review.................................................................................................................... 70
Implementation tips............................................................................................................................ 71
CHAPTER 3
From a technology perspective..................................................................................................... 73
Integration.............................................................................................................................................. 75
CHECKLISTS 81
GLOSSARY 93
DR Disaster Recovery
IP Internet Protocol
MM Mobile Money
Mobile Network Operator/ Mobile Virtual
MNO/MVNO
Network Operator
mPOS Mobile Point of Sale
OS Operating System
10
Figure 1: ADC technology implementation process
platform(s) best suited to the strategy. This The handbook is structured as follows:
This framework step is a prerequisite to vendor selection, as it • Chapter 1 provides an overview of ADCs
forms an important input to the requirements
is based on the or specifications used to select the vendor(s).
and the technologies that underpin them.
• Chapter 2 offers guidelines to develop a
understanding that Once this information is available, and a
channel strategy, taking into account the
all ADC projects must vendor or partner selected, the FSP can finally
internal and external factors that impact
implement the preferred channel solution. This
be based on a well- framework will be referred to throughout the
strategy decisions.
researched channel handbook. In addition, the handbook contains
• Chapter 3 outlines the different components
of a technology platform, aiming to provide
strategy that guides a glossary to fully explain the terms used in
guidance on how the channel strategy
all future steps in the document. It may be advisable to review
can be mapped to a specific technology
this before launching into the handbook, to
the implementation refresh the reader’s understanding of the
platform.
process. key terms and concepts as a background to • Chapter 4 highlights the importance of
the discussion. Lastly, to help FSPs apply the identifying requirements and outlines the
information in this guide to real-life scenarios, steps involved in selecting the right provider
checklists are included at the end of the and solution.
handbook. These checklists will help FSPs • Chapter 5 introduces a best-practice
determine the key decisions or activities that implementation methodology and
should be completed at the strategy, selection key considerations for a successful
and implementation stages. implementation. In addition, the chapter
discusses how a channel should be
It is difficult to estimate how long an ADC monitored, maintained and scaled up after
project will take or what financial resources going live.
it will require, as institutional capacity and
context vary widely from situation to situation.
This guide should give a variety of FSPs some
fundamental direction for any ADC project
and equip project teams with the basic tools
TECHNICAL DISCUSSION
Those interested in a more technical discussion
to successfully navigate the process.
can refer to the “From a Technological
Perspective” sections included in most
chapters.
1
Given that FSPs are the target audience of this handbook, we will focus primarily on channels which are
used to connect customers to bank accounts held at a FSP, as opposed to other financial products such
as e-wallets and money transfer offered by non-bank financial services providers. An overlap clearly exists
wherein FSPs may opt to use these non-bank services as one of their channels, such as when banks are
linked to e-wallets services for cash in/out and payment purposes.
2
For the purpose of this handbook we have differentiated Extension Services from Agency Banking,
based on the user of the channel. While Agency Banking relies on use of third-party operators, Extension
Services involves equipping FSP staff with technology solutions.
12
Figure 2: ADC Ecosystem
cafe
customer can now PO
S
access financial le r Home
services. Tel
nch
Bra
Mobile
BAN
AGE ING
K
NT
POS
HQ
Tablet
FSP Back-office system:
• CBS Agent
• CRM
• Accounting
• Risk management EFT
• Card management Internet/
switch VPN
• Agent management
• Channel management POS
• Reporting Field staff
Internet
banking
VIC ON
interface
ES
SER ENSI
MOBILE
network Mobile POS
T
EX
merchant
Mobile
app
Mobile
E
BIL
C MO KING
CENALL BAN
TER
E-WALLET
ADC devices
The device is the physical object with
which a user interacts, such as a mobile
phone to access an e-wallet. Since
mobile phones are the newer entrants to
FROM A TECHNOLOGY PERSPECTIVE the ADC space and many FSPs now rely
extensively on them, it is useful to pay
For those readers interested in analyzing channels with a deeper technology
extra attention to these devices.
lens, the following section includes a more detailed summary of the
technology platforms that drive ADCs. For the purpose of this discussion, it Mobile phones can be classified as
is important to consider an ADC technology platform as the aggregation of being either basic, feature or smart.
four components: A basic phone has only voice, SMS,
and sometimes USSD capabilities, but
1. A physical device
no data or GPRS capabilities. Feature
2. An application running on the device phones have data connectivity in
3. A communication channel used to exchange data between the device and addition to the basic features, and can
the FSP’s host system therefore be used to connect to the
4. An authentication mode used to confirm the identity of the user of the Internet or run mobile applications.
channel. Lastly, smartphones are the most
advanced option, with processing
Figure 4 on the following page shows the options available per channel in
capacity nearing that of a computer, and
terms of device, type of application, communication, and the different types
are suitable for complex applications
of authentication modes used per channel.
or ‘smart apps’ in addition to the basic
features and Internet access. Each of
these classes of mobile phones use
different operating systems, most
commonly Android (Google), Windows
(Microsoft) or iOS (Apple). These
operating systems also apply to tablets.
ADC applications
The application layer of ADC solutions
consists of front-end applications, back-
office administration modules, and the
integrations between these systems
and the Core Banking System. These are
shown in Figure 5, with some examples
of the system or functionality available
at each layer.
ATM ATM, HSM Bespoke tech LAN (physical leased Card / PIN, bio, mobile
line, P2P satellite, VPN
over internet, wireless),
modem (GPRS, dial-up)
Agent / merchant Computer, phone, Web, POS, mobile Internet (mobile, PIN, card, bio, physical
tablet, POS wireless, leased line), ID
mobile data (GPRS,
3G, 4G)
Extension Computer, phone, Web, POS, mobile Internet (mobile, PIN, card, bio, physical
services, (field tablet, POS wireless, leased line), ID
staff, mini branch, mobile data (GPRS,
branch on wheels) 3G, 4G)
Mobile banking Phone Mobile Mobile data (GPRS, 3G, PIN, OTP
4G), SMPP, USSD
E-wallet Phone, computer, kiosk, Web, POS, mobile, Internet (mobile, PIN, card, physical ID
(m-wallets, ATM, POS bespoke tech (ATM) wireless, leased line),
prepaid cards, mobile data (GPRS,
store cards) 3G, 4G)
Figure 5: ADC Solution Architecture: Front End, Back Office and Integration
INTEGRATION
API EFT
SWITCH
ISO
is based on the WAP standard which is used to guide the design, creation, and display of
apps operate in online mode only and
a mobile website. Although it offers the benefit of running on millions of devices due to its hence are limited in terms of usability
historical use, WAP is being upstaged and therefore replaced by a newer standard, HTML5. in areas of poor or no connectivity.
HTML5 apps benefit from advancements in programming languages that mean they can
provide a range of key capabilities such as offline support, graphics and video, geolocation,
and field validation on the mobile browser. Currently, HTML5 can only run on mobile devices
with the Webkit engine and are therefore limited in coverage.
Back office the technology driving the channel. In could be over physical leased lines,
many cases, ADC solutions also require wireless connections, VSAT/satellite
While the front-office applications
multiple integrations with third parties or a Virtual Private Network. LAN/
are perhaps the most visible to users
(m-wallet providers, bulk SMS providers WAN is mostly just used with ATMs.
of an ADC, they are reliant on back-
and national switches), as well as several 2. Internet portals – Agents, extension
office applications which form a critical
in-house systems (m-banking software, services, and e-wallets may use
component of the ADC platforms. These
agency banking modules, accounting secure Internet portals to exchange
systems play many different roles but
software, and CBS). As with the back- information. Where ADCs use Internet
are typically used to drive the front-end
office components of an ADC solution, connectivity, a VPN is typically
applications and devices. They also allow
the integration software is often bundled configured to provide an additional
FSPs to administer the channel users,
with the solution, although increasingly, layer of security.
define the products and services offered
CBS providers are providing integration 3. Mobile data – Mobile applications
via the channel, control the security of
interfaces through which all external exchange information over mobile
the channel, and of course monitor
systems must communicate. The topic data services (GPRS, Edge, 3G or 4G4),
and report on the channel activity and
of integration is discussed in full in Wi-Fi connections, or satellite-based
performance. These administrative
Chapter 3. communications. For the purpose of
systems can be sold separately from
the front-end application, as is often the ADCs, mobile data services, which are
case with Card Management Systems ADC communications provided by the MNO and accessible
used with ATMs or POS, or could be wherever there is data coverage, are
All ADCs ultimately require the
bundled together with the front-end the most commonly used, although
exchange of financial or non-financial
application, as is commonly the case Wi-Fi and satellite may still be relevant
information between the FSP and the
for mobile banking and agency banking for some extension services.
customer, which typically occurs over
solutions. communication channels connecting the 4. USSD – The USSD communication
device and the back-office component channel is a standard, publically
available GSM technology, controlled
Integration of the ADC. There are currently six
by MNOs. As discussed above, USSD
communication channels for ADCs:
The final component of ADC application applications exchange information
involves integration between the various 1. Local area network / wide area over this channel. The use of USSD for
systems involved in the ADC platform. network – ATMs and extension services ADCs has achieved significant uptake
Introducing ADC technologies in most like mini branches communicate over in markets where there is high mobile
cases requires some level of integration the FSP’s LAN or WAN much like a penetration as a result of the user-
between the FSP’s back-office systems computer on an internal network. friendly, menu-based service. The
(such as CBS, Accounting and ERP) and Connectivity between these devices USSD communication channel creates
a real-time connection that is more
responsive and secure, as it does not
store the customer’s data.
5. SMS – SMS is a ‘store and forward’
communication channel that involves
4
This refers to the generation of wireless communication technology which is differentiated the use of the telecom network and
by the speed of data services available. GPRS and Edge are 2G technologies providing a SMPP protocol to send a limited
maximum download speed of 114kbps and 384kbps, respectively. 3G provides up to 3.2Mbps
and 4G up to 299.6Mbps
amount of text from one phone to
5
Note that SMTP is a different protocol traditionally used for sending email, but also another, or from one to many phones5.
commonly used for sending SMS messages via the Internet. Unlike true SMS on SMPP, SMTP The use of SMS for ADCs is extensive
does not use the telecom network, which can potentially be cheaper, but also presents issues and ranges from STK and native
in terms of reliability.
FACTOR
DEFINITION OPTION AVAILABLE
TYPE
6
Note that while USSD and pull SMS both use short codes, these are not necessarily the same
code and may require that a customer enter a different code depending on which action
they wish to take.
While exceptions exist for low- For ADCs, there are three commonly use at ATMs or on POS devices. Smart
value transactions, best practice for used options for authentication: cards are increasingly being produced,
authentication over ADCs dictates that payment cards, OTPs and biometrics distributed, and used according to
two-factor authentication should be (fingerprint, voice and iris). Each of EMV® Specifications7. These EMV cards,
used, meaning that a customer must these will be introduced here and referred to as ‘Chip and Pin’ cards, are
provide a combination of two different discussed in further detail in Chapter 3 steadily replacing the older magstripe
factors to access a system or transact to present the various advantages and cards.
on it. For example, an ATM transaction disadvantages of each.
requires both a card (Possession) These card types offer differing levels of
and a PIN (Knowledge). Two-factor security based on the PIN authentication
authentication should not be confused
Payment cards method. For instance, to authenticate
with two-step authentication whereby Payment cards are perhaps one of the the PIN associated with a magstripe
a customer must go through a couple more traditional means of authenticating card, communication with a security
of steps to access a system, but where users over ADCs. Cards are typically module is required. The function of a
these steps do not necessarily involve dependent on a PIN for authentication, security module is to issue, validate,
a combination of different factors (for and users are required to remember this and store certificates in a protected
example, a PIN plus a secret question). PIN and input it as a means of verification environment. A security module can be
The level of security delivered will be at the time of accessing the ADC. Two one of two types: a Software Security
influenced not only by the number of main types of cards are used; magnetic Module or a Hardware Security Module.
factors used in authentication but also strip (magstripe) cards and smart cards. The major difference is that an SSM is a
by the relative security of the factor The former uses a machine-readable program that runs on a general-purpose
itself. Therefore, poorly formatted magnetic strip on the back of the card computer, while an HSM is a dedicated
passwords will not protect systems in to store data about the customer, while computer specifically designed to
the same way as those which adhere the latter stores similar information on function in a security role. The HSM is
to best practice in terms of complexity an embedded microchip, which includes a physical device connected to the
and frequency of change. It is for this its own operating system, memory, network hosting the ATM, and has the
reason that authentication via biometric communications interface, security primary functionality to generate the
is typically used only as a single factor, features, and the ability to encrypt PIN numbers and store the encryption
since its level of complexity makes and decrypt data. While smart cards keys required to authenticate the PIN
it very difficult for this factor to be have many uses outside of the financial number provided8. In contrast, EMV
compromised. sector, FSPs issue these primarily for cards have stored encryption details
on the chip, which allows for a local
authentication of the PIN, which is
both faster and contributes to the high
security standard associated with these
7
EMVCo was established to facilitate worldwide interoperability and acceptance of secure
cards.
payment transactions by managing and evolving the EMV® Specifications and related testing
processes. Today there are EMV Specifications based on contact chip, contactless chip,
common payment application, card personalization, and tokenization. This work is overseen
by EMVCo’s six member organizations – American Express, Discover, JCB, MasterCard,
UnionPay, and Visa – and supported by banks, merchants, processors, vendors, and other
industry stakeholders who participate as EMVCo Associates. Adopting EMV cards enables
FSPs to not only ensure the highest standard of security for card transactions, but also
opens up the option of connecting local or closed systems to external networks, either
regional or international.
8
Note that the HSM actually authenticates the PIN Block rather than just the PIN number
itself. The PIN Block is made up of customer data read from the card combined with the
encrypted PIN, generated using the ATM/POS pin pad.
9
Contactless payment systems are credit cards and debit cards, key fobs, smartcards or other
devices that use radio-frequency identification for making secure payments. The embedded
chip and antenna enable consumers to wave their card or fob over a reader at the point of
sale. Some vendors claim that transactions can be almost twice as fast as a conventional
cash, credit, or debit card purchase.
10
TruID is a software token that creates OTPs which you use when logging on to the PortWise
Application Portal. TruID can be installed on computers, cell phones, or PDAs.
The channel strategy is informed by and is noted that a channel strategy does not imply
meant to contribute to the general business choice of a single channel, but could result
objectives of the FSP. For instance, if a in an integrated, multi-channel strategy that
FSP’s vision, mission, and business plan are combines several channels and technologies
focused on serving SMEs, this same focus to achieve the overall business objectives. This
should be reflected in the channel strategy. is a common trend, with FSPs starting with
A well-researched channel strategy should one channel (for example m-wallet) and then
identify the channels to leverage and should linking this with other channels (for example
be accompanied by a business case that m-banking or ATM). Finally, a channel strategy
considers the financial and operational can be vastly transformative to a FSP’s core
implications of each channel. These tools business, and therefore requires strong buy-in
will serve as a guide to all future steps in the and support at the board and executive levels.
implementation process.
This chapter focuses on how to assess market
The subject of a channel strategy is worthy conditions and the internal operations of
of a paper of its own and the purpose of a FSP, and to develop a channel strategy
this handbook is primarily to show what that is in line with the business’ objectives
information must be available as inputs to the and customers’ needs. The following steps,
technology decisions that will be discussed sometimes iterative, should guide the reader
in later chapters. While our process shows through the decision-making process:
a channel strategy as a prerequisite to the
technology platform selection, in many cases 1. Define the ADC objectives
there is a feedback loop between these 2. Assess the environment
steps, so that the strategy is only finalized 3. Develop the channel strategy and business
as/when a decision is taken regarding the case.
technology or platform. It should also be
24
STEP 1:
Define ADC objectives
STEP 2:
Assess the environment
The decision to pursue a specific channel or channels must take into consideration many
internal and external factors. These factors are summarized in Figure 6, which shows
how the channel strategy is influenced by both the internal and external environments
within which a FSP operates. The channel strategy therefore involves an assessment of
each of these factors separately and collectively, as outlined in this graphic.
INTERNAL EXTERNAL
New channel strategy
Client needs
Vision & Mission and demands
Mobile Call
banking Center E-wallet
production of a physical receipt for all the FSP’s strategy team or by external Next is to review the availability, quality,
transactions performed by third parties11, parties, can provide some insights and and affordability of the communication
meaning that a printer or receipt book is ideally would contain some additional options available to the target market.
required12. information, including which models of The FSP will need to identify which
each device are the most popular. This is communication channels are accessible
particularly important for mobile phones to the target market, considering the full
ICT landscape where the FSP will need to decide range of options, including SMS, USSD,
By definition, ADCs require users to which type of phone to cater for: basic mobile data services, Internet, LAN/
be able to access systems that are phones, feature phones or smartphones. WAN, IVR, or NFC. Market research on
remote to their location at the time of Included in this assessment should be these options should be conducted
transaction. Such access is dependent the projected future uptake of particular to identify which of these options are
on the availability of a supportive ICT devices to understand likely market reliable, affordable and have available
infrastructure for the end-users of the trends. Additionally, the cost per device bandwidth to support the traffic of
ADC. As discussed in Chapter 1, this – information infinitely easier to access the channel over time. In most cases
requires access to a physical device, an than market distribution – can provide – and unless using IVR or NFC – the
application running on the device, and a good proxy for penetration data, and FSP will be dependent on an MNO or
a communication channel to transfer will also be an important input to the other connectivity provider for this
data between the customer and FSP. As business case. component. Such partnerships can be
part of the external assessment, the FSP problematic for some FSPs, particularly
will need to analyze what is available Secondly, the FSP will need to assess where there is competition, real or
to target customers or users at each of the availability of options for the perceived, between the two parties.
these levels. application layer. Although important, This is most noticeable with the USSD
this information is less critical than option, which is well suited to host an
At the device level, it is important first the device or communication layer. ADC due to its compatibility with all
to know what types of devices – such Ideally, ADC solutions should work on types of mobile phones, but in many
as ATMs, POS, kiosks, computers and all operating systems, but the reality is markets is either restricted in terms of
mobile phones – are accessible to the that many solutions are not immediately availability, is subject to poor quality
target market. For some of these devices, cross-compatible and often require service, and/or is expensive to access.
information about distribution and additional resources that may not be This reality has forced some FSPs to
availability may be publically accessible, worth the investment. For example, consider alternative communication
as with POS or ATM networks, which knowing what proportion of the target options such as data services, STK, thin
are typically monitored by the regulator. market is using Windows phones may SIM, or IVR, so that they have more
By contrast, the statistics regarding help with the decision whether smart control over this critical component. At
the availability of personal computers apps should be built to work on this this stage of the analysis, the channel
or phones may be harder to access, platform. strategy team needs to invest time in
with only high-level statistics available. researching all of these options and
Market surveys, either conducted by
11
The Central Bank of Kenya website (https://www.centralbank.go.ke/index.php/
banksupervision#agent-banking) states: “Bank agents are required to issue receipts for
all cash deposit and withdrawal transactions. Additionally, the principal institutions are
required to have in place adequate agent identification arrangements and customer feedback
mechanisms to aid in the verification process. Further, bank customers are at liberty to verify
the status of particular agents from local branches of principal institutions before using the
services of any agent.”
12
http://www.bu.edu/bucflp/files/2012/01/Guideline-on-Agent-Banking-CBKPG15.pdf
Commercially aligned Product and service offering an existing mobile banking platform.
• The costs being charged must Developing an integrated multi-channel
ADCs by definition are a means for
be confirmed as affordable and strategy will increase the number of
the FSP to distribute its products and
competitive in the market, ideally with touch-points for the customer and
services. As such, any channel strategy
a business case to support the fact. streamline the customer experience.
needs to be designed with the specifics
For example, an existing mobile banking
• The partner’s business viability needs of the FSP’s products and services in
platform could potentially be used
to be confirmed so that the FSP is mind. Not every product and service
to direct clients to the nearest ATM
sure that it will play its role even in the is appropriate for every channel; the
location or to enable NFC technology
initial periods when the channel may FSP should review current and planned
on the mobile for cardless transactions
not be extremely profitable. products/services to determine which
at the ATM. Lastly, the sustainability and
• There should be benefit for all parties channel options would be most
cost of implementation of the existing
that is proportionate to the respective convenient for the customer to access
channels should be reviewed not only to
contributions to the partnership, these products/services. For instance,
ensure sustainability but also as inputs
whether this is through a revenue- a customer with a savings account
to the budgets required for future ADC
sharing model and commission needs access to deposit and withdrawal
projects (for example, cost of integration
arrangement or other means of shared services from this account outside of
and resources required to manage the
value, to properly motivate partners branch hours; a self-service mobile
project).
to participate over the duration of the banking application would not meet
relationship. this need because one cannot withdraw
• Lastly, it is good for FSPs to get a money from a phone. In this case, the IT environment and strategy
measure of how important it will be to channel strategy team should consider The assessment of the internal IT
the partner and to look at the relative channels that facilitate cash withdrawals environment needs to consider several
size of the two parties. Will it be a such as ATMs, POS, or agency banking. different areas, including the state of the
priority customer, a ‘big fish’ whom CBS, the IT strategy, and any existing or
the partner will work hard to keep Current channel strategy planned IT projects that could overlap
happy, or does its relative size mean with the ADC project. In terms of the
Should the FSP have existing channels
it is a ‘small fish’ that may struggle to CBS, the channel strategy team should
in operation, it is critical that it takes
get the partner’s attention? consider the current state of the CBS,
this opportunity to assess the success
including its stability, pending upgrades,
Internal assessment of these channels. This could include an
its capacity to support a full integration,
analysis of performance (usage rates,
While the external assessment can help and whether it is decentralized or
registration rates, and valued services)
identify consumer demand, market centralized. A weak or unstable CBS will
and operational efficiency. Additionally,
opportunities, and threats, an internal quickly sabotage any ADC project, and
customer feedback should be obtained
assessment allows an organization to difficult as the decision may be, FSPs
to determine what improvements or
evaluate its position with regards to may need to postpone ADC projects
changes would be of benefit. Existing
operational constraints and strengths. until their CBS is stable to the extent
channels should also be reviewed to
This assessment should ideally include that it can support the integration of a
understand how they could complement
five areas: channel, both functionally and from a
new channels, such as linking ATMs with
scalability point of view.
The internal assessment must also of authentication used to verify a derived by the channel is also fed into
consider the FSP’s IT strategy and customer’s identity, as introduced in this new data warehouse.
how ICT will be used to deliver the Chapter 1. This typically involves a review
The internal analysis must also consider
organizational strategy. Most FSPs who of existing modes of authentication,
the financial, operational and human
are designing or updating an IT strategy be they cards, biometric or PIN/
resources available to launch and
will feature ADC technologies as one password systems to determine the
manage a channel strategy. The financial
of the business’ critical systems. While appropriateness of these authentication
resources required to introduce a new
a linkage between the IT strategy and methods to any channel. For example,
channel can vary depending on the
the channel strategy must exist, these the cost and logistics of distributing
scope of the project, and while the
are very different plans, with the former cards for FSPs looking to launch a mass-
IT systems component may be one
primarily being determined by the IT market savings product may result in the
of the larger elements of the budget,
department, while the channel strategy conclusion that biometrics, as a mode
provisions need to be made for channel
is a result of inputs across the business of authentication, is more reliable and
development, marketing, operational
as a whole, with key components which easier to administer than PIN/password-
pilots, and channel support services. The
require input and support from the IT based systems. Additionally, FSPs may
channel strategy team should consider
department. The direction outlined in wish to make decisions regarding the
the significant cost implications of the
the IT strategy must be considered in interoperability of the authentication
initial technology procurement, but also
the formulation of the channel strategy mode, perhaps standardizing the use
the running costs associated with the
to ensure that they are well aligned. of EMV cards across all channels. This
channel. An estimated budget should
Topics of particular importance will topic will be revisited in detail during
be assigned from the beginning and
be the strategy for the procurement the requirements analysis phase. At
stakeholder commitment obtained to
of IT systems, preference for different this point the goal is simply to audit the
ensure that the funds required will be
hosting scenarios, disaster recovery/ existing authentication methods, and if
allocated to this project. The subsequent
backup policies, business continuity14, relevant, decide which method is most
vendor selection process can help to
security standards, and if available, any suitable.
finalize the exact budgets required to
protocols for the integration of systems.
The final area for consideration is the finance an ADC project, but high-level
At this point of strategy formulation, it
existence of IT projects which may estimates should be considered at this
is important to review and incorporate
overlap with the timing of the ADC point based on information obtained
any existing IT policies that are relevant
project, or perhaps limit the resources from the assessment exercise.
to the channel strategy, or potentially
available to allocate to it. From a
create new policies to complement the The resource assessment should also
technical perspective, the impact and
new channels. consider the skills and availability of
potentially the integration of a new ADC
staff to manage both the channel
Either as part of the IT strategy review, will need to be considered. For example,
implementation and ongoing operations.
or perhaps as a direct assessment of if there is a plan to implement a new
Required skills include project
the existing internal security policy, data warehouse, the ADC project should
management, channel management,
the FSP needs to consider the mode bear this in mind and ensure that data
A Business Continuity Plan (BCP) is of particular importance for FSPs to enable critical services or
14
products to be continually delivered to clients despite system interruptions or disaster. The business
continuity planning process involves the recovery, resumption, and maintenance of the entire business,
not just the technology component. While the restoration of IT systems and electronic data is important,
recovery of these systems and data will not always be enough to restore business operations. The
Federal Financial Institutions Examination Council offers the IT Examination Handbook, which includes a
booklet on BCP, at http://ithandbook.ffiec.gov/it-booklets/business-continuity-planning.aspx.
Digital Financial Services Risk Assessment for Microfinance Institutions Pocket Guide
15
(September 2014). The Digital Financial Services Working Group, Washington, D.C.
STEP 3:
Develop the channel
strategy and business case
compared with commercial software. • Option to customize with support of vendor • No hardware investment required (if cloud
• FSP will own the system. expertise. based).
• Offers full control over data. • Flexible solution and could potentially lower • Minimal IT dependency for application and
• Cost of in-house support potentially lowers costs, with more efficient workflows and hardware maintenance.
ongoing maintenance costs. added functionality. • Solutions can be easily scaled up or down
• Ownership of tangible software/hardware • Offers full control over data with little time and effort.
assets. • Ownership of tangible software/hardware • SaaS upgrades are iterative, with limited
assets. involvement required.
• Higher upfront investment, including additional • Higher upfront investment, including • Usually not customizable and limited in
hardware purchases if needed. additional hardware/software purchases if functionality.
• May take much longer to implement. needed. • May not support all required functionality.
• Fully dependent on expertise and reliability of • May require FSP to compromise to suit • Long-term cost can turn out to be higher for
Disadvantages
The business case 1. Assumptions based on the internal ‘reduce account opening time to two
and external analyses, such as the size hours’), or sustainability (for example,
A well-researched channel strategy
of the addressable market, growth ‘achieve operational profitability in
should be accompanied by a business
projections, transaction volumes and two years’). The Chapter 2 checklist
case that considers the financial and
values, or other cost and revenue at the end of this handbook provides
operational characteristics of each
drivers. an example of a summary business
channel. The business case can be a basic
2. Distribution of ADCs – the number of case document for an ADC, with some
five-year financial model that captures
touch points and projected growth proposed critical indicators to monitor.
the investment required, ongoing costs,
new revenue streams, and cost savings over time.
As a last step, the channel strategy
that are attributed to this new channel. 3. Cost structure, including capital
team should test the business case
While a positive financial return from expenditures, staff costs, and
against global/regional benchmarks or
transaction revenues would be the ideal marketing and IT costs.
case studies. For instance, if in a similar
output of the business case, some FSPs 4. Pricing structure and other fees per regional market, an ADC project typically
may pursue a channel strategy despite transaction type or per product for breaks even by Year 5, then a business
a poor return on the channel alone, as each channel. case that promises break-even in Year
there may be indirect benefits to the rest 5. Number and types of partners and 1 would not be realistic. Global and
of the business, such as opportunities the fees and costs accruing to each. regional benchmarks can be obtained
to cross-sell, deposit mobilization, and 6. Projected cost savings and operational through secondary research (such as
lower costs. Regardless of the profit efficiencies accruing to the FSP as annual reports or industry reports), as
motive, FSPs deploying new channels a result of the new ADC, such as a well as from experts, practitioners, and
should monitor the trend in transaction reduction in the cost of funds and vendors. Some FSPs may also wish to
volumes, as this ultimately impacts on increased staff productivity. build a separate business case for other
both costs and revenues. For instance, stakeholders, such as agents or MNOs,
a high volume of transactions has cost The financial model can help the FSP to confirm that incentives are structured
implications in terms of license fees to build KPIs and targets that can be used in a way that ensures the viability of
be paid to vendors, commissions to be during and after implementation to the channel and also to quantify the
paid to agents, or USSD charges levied assess the success of the ADC solution. investments (for example, in an agent
by MNO partners. Similarly, knowing KPIs can be centered on outreach channel) or costs (for example, USSD
how many transactions per customer (for example, ‘ADC will help reach 2 costs) over time.
are required to break even can inform million clients’), impact (for example,
marketing strategies to increase ‘15 percent of new customers will come
customer adoption and usage of the from rural areas’), market share (for
channel. Ideally, the channel business example, ‘become the leader in money
case should include the following inputs: transfer’), efficiency (for example,
Equipped with an ADC strategy, FSPs are therefore enables the FSP to meet its business
frequently tempted to select a vendor in a objectives. Determining the technology
rush or to commence in-house development platform, which requires decisions at both the
with little or no consideration for which application and device layer, needs to happen
enabling technology best suits its strategy. before a FSP can proceed to vendor selection
For some channels such as ATM or and implementation activities. This chapter
Internet banking, this approach, while not aims to guide the reader on how to identify
recommended, can still yield success, as the the right technology platform and involves
solutions available to run these channels are the following steps:
quite well defined and the technology is more
1. Identify the technology options available
or less inherited by the choice of channel. In
contrast, agency banking, extension services, 2. Confirm the criteria that will influence the
mobile banking, and e-wallets present a decision
broader suite of choices involving a host of 3. Select the preferred platform.
different technology platforms, which offer
very different user experiences. It is important For the more technical reader we will discuss
that FSPs carefully consider the implications in detail the benefits and disadvantages of
of using one technology over another to different applications and devices used for
ensure that the technology platform selected mobile-based channels, as these are by far
is aligned with the channel strategy and the most complex channels in the market at
present.
Call
center
Website SMS USSD
Tablet
Laptop Mobile phone STK
• Smart
• Feature
PC Native app
Internet banking, • Basic
extension services –
Mobile phone mini branch, branch kiosk Tablet
• Bank led e-wallet
• Mobile banking
• SMS banking Web app
• Agent banking
INTERNET • Extension services –
field staff
ATM/POS MOBILE • Extension services
switch MNO led – bank on wheels
POS
3rd Party led INTEGRATION POS
WITH 3RD app
PARTY ATM Closed user group, shared
network
POS FSP
Back-office systems
ATM
Card+PIN • Well-established process which is used • Expensive to produce, distribute and maintain
globally as the most common way to secure cards (and PINS).
financial transactions. • Not accepted widely in all markets (especially
• Possession of cards can be seen as a status outside urban centers).
symbol. • Customers have issues remembering the PIN
• Convenient for customer to store value or write it directly on card.
without carrying cash. • Cards can be misplaced or stolen.
• Introduces options for a range of card-based
products.
Biometric • After upfront investment, cheaper to maintain • Not yet as widely used across all channels
after one-off registration (bio cannot be lost so may need to be used in conjunction with
or forgotten). card/PIN (few biometric ATMs).
• Well suited to non-literate populations and • Upfront investment requires distribution of
where no national ID card exists. biometric readers which can be expensive.
• Provides additional functionality such as • Device failure/unreadable bio records can
deduplication. occur and needs to be catered for with a
• High-quality authentication factor, that is, backup process.
hard to falsify so can be used as part of a • Quality of finger prints depend on profile of
single factor authentication. customer – for example, people who perform
manual labour such as in agriculture may
have damaged finger prints.
OTP • Cheapest option from the FSP perspective as • Transaction times will be influenced by
no devices, cards to distribute. delivery time of the OTP which can be
• User-friendly workflow. unpredicatable in many countries.
• Requires all customers to have a phone which
is pre-registered with the FSP.
• Lower grade of authentication factor so must
be part of a two-factor process.
For mobile banking, the communication connectivity, although this will introduce choice. For areas where data connectivity
and devices that are available to the target some limitations on the types of services is unavailable, or too expensive, the only
market dictate the technology choices. that will be available due to the size of the option is to use SMS. If we have data but
In this decision tree, we have opted to message that can be communicated. no smartphones, then a Web app running
consider the income level of the FSP’s on a feature phone would be the ideal
The second option identified is where the
target market as the initial input to the option, as it requires no installation by the
FSP’s market is purely in the lower-income
decision. The order in which these input customer.
segment, in which case the key decision
factors are applied could be switched, or
would be availability of the USSD channel, The only option that has not been discussed
indeed, considered through a different
which would be the recommended option, in this graphic is a J2ME app, which could
proxy, such as type of handset available to
as it runs on all handsets and is an easy- be another consideration where the Web
customers – smart, feature, or basic. The
to-use, menu-based application. In case app has been recommended, as both run
decision about which to use may depend
this channel is not available, and only on feature phones. The major difference
on the data available from the assessment
very basic handsets are used, then the between these two is the requirement
phase (for example, the question would
only choice is SMS, which has limitations for J2ME to be manually installed
be: “do we have a comprehensive survey
in terms of security and complexity of and updated, which for customer-level
of customer handsets?”). For those FSPs
transactions supported. solutions is not ideal.
targeting only higher-income customers,
we presume a smartphone would be Our last option on the decision tree is
available and that these users would be where a FSP wants to introduce a service
more tech-savvy and hence capable of that caters to all market segments, which
installing a native app. To finalize the again needs to consider USSD availability,
decision for these users, we would need to which, if available, should be used. If only
know the quality and availability of data data services are available from a mobile
services on the customers’ phones, which, phone and smartphone penetration is
if available, would imply using a smart high, then a smart app would be the logical
app over a mobile data connection. If data
is not available, a smart app could still be
used, but with SMS as the means of data
VIA DATA
SMART APP
USSD VIA SMS
AVAILABLE?
DATA
LOW AVAILABLE?
HIGH
TARGET
MARKET
USSD APP
BY
INCOME
DATA
AVAILABLE AND
HIGH
AFFORDABLE? LOW
ALL
USSD
AVAILABLE?
SMS
BANKING
WEB APP
VIA DATA
First, the use of peripherals may be suited when only financial transactions Other types of mobile applications,
considered and this will be influenced are required, using high-security cards including J2ME and Web apps, also
not only by the level of authentication or biometrics. Alternatively, smart apps have a potential role in agency banking
required – which will dictate the need for are more appropriate when no USSD is technology, although each cater for quite a
either a card reader or a bio reader – but available. They can also be used for card specific set of circumstances and one could
also by the regulatory requirements for transactions, although the security may easily argue against using them, as the
physical receipts to be produced, which be less than with a POS device, unless primary use is when there is a preference
could introduce the need for a printer. an external pin pad or card encryption for a solution to run on feature phones.
For FSPs using cards, an important factor is used. Smart apps will also play a role Given that agency banking works with
to be considered is the level of security when a FSP wants to do non-financial a controlled group of users (agents and
or card standard (EMV) that it wishes transactions, with options to use either a staff), FSPs may decide to invest in smart
to apply, as this will impact both on the phone for small amounts of data entry, or handsets, given that the price differential
device (the need for encrypted pin pads) a tablet for larger amounts of data. between smartphones and feature phones
and on the application standards and is quickly disappearing, primarily due to
certification. Other important factors USSD also plays a role in agency the decreasing cost of smartphones.
include the amount of data captured banking, although it is limited to financial
and the functionalities for non-financial transactions and typically requires both
transactions, such as loan applications the customer and the agent, on different
and social performance data. A decision USSD sessions, to securely complete
is required if all data should be input both cash in and out (cash out would be
(“does the FSP want to go digital in initiated by the customer on one USSD
terms of data capture?”) and if any other and cash in would be initiated by the
data types (such as GPS coordinates of agent on another session). The major
client location, taking of a client photo, limitation with USSD for agency banking
signature, or biometric data) need to be is that printed receipts, biometrics, and
considered. cards cannot be used with this technology.
POS
SMART APP
EMV/HSM
FINANCIAL
PRINTER)
USSD
AVAILABLE SMART
APP
ONLY
SMARTPHONE HIGH
PENETRATION WEB APP
LOW
TRANSACTION
TYPE HIGH
DATA
AVAILABILITY
WITH SMART APP
NON-FINANCIAL LOW
ON MOBILE
AMOUNT BASIC
OF DATA
REQUIRED SMART APP
ON TABLET NON-SMART
GPS (J2ME) APP
ADVANCED
Applications
Apart from ATM and Internet banking channels, which have standard software, all
other ADCs operate on a variety of customisable software applications. Each of these
applications has certain advantages and disadvantages, as outlined in Table 3. Smart
and non-smart native apps have been combined as the major difference between the
two is in the choice of device and not the application functionality. While SMS has
mostly been talked about as a communication option, we include it in the analysis of
potential applications to show how it can still provide some limited functionality as
an application.
SMS • Available in all countries and relatively easy to set up. • Very limited functionality due to limit of message size and non-
• Accessible on all handsets. real-time connection.
• Lower dependency on relationship between the MNO and • Limited security, as data entered in SMS is available as clear text in
the FSP (can send to all networks unlike USSD, which is per sent messages.
network). • Delay in delivery of messages can occur and is beyond control of
• Easy to use and most customers familiar with the the FSP.
technology.
NATIVE • User-friendly and rich user interface. • Manual intervention required to install and updates often required.
MOBILE • More functionality available – camera, signature, and GPS. • Requires support for specific or multiple devices/operating
APPS • Supports connections to peripherals: bio devices, card systems, so different versions are required (Java, Android, or iOS).
readers, and Bluetooth printers. • Security must be built in and is not automatically present.
• Can work offline/online and even in online mode can be • Multiple functionalities typically require use of external devices.
more forgiving of poor quality connections. • Compatible handsets tend to be more expensive (feature phone or
• Suited to both financial and non-financial transactions. smartphone), hence less accessible to the full market.
WEB APPS • No software installation required. • Requires good continuous data connectivity.
• User-friendly and rich user interface. • No offline support.
• Full functionality available, but limited access to peripherals. • Security must be built in and is not automatically present.
• Can be used on different devices (mobile/tablet/netbooks/ • Requires support of multiple browsers.
notebooks). • Limited access to peripherals.
• Suited to both financial and non-financial transactions. • Compatible handsets tend to be more expensive (feature phone or
smartphone), hence less accessible to the full market.
WEB • Can use CBS directly if a Web-based system is available. • Requires a reliable and continuous data connection to use (no
PORTAL • No software installation required. offline support).
• User-friendly and rich user interface. • Limited access to peripherals (Bluetooth printers and card
• Full functionality available, but limited access to peripherals. readers).
• Can be used on different devices (mobile/tablet/netbooks/ • When used on a tablet/smartphone, usability may not be as good
notebooks), with some limitations. as a mobile application.
IVR • Ability to serve large numbers of customers simultaneously. • Speech recognition makes it more difficult to navigate an IVR and
• Pre-recorded messages for consistent accurate customers will be inclined to speak with a live person.
communication of information. • Complicated menu levels and choices; it can be easy to get lost in
• Limited human intervention to maintain – enables IVR.
customers to do their own transactions without having to • Cost of hosting can be high, depending on the usage.
talk with someone.
• Hosted solutions for small institutions with limited
technology experience.
Devices
Devices, whether used by the end-customer or an agent/staff member, carry with
them many advantages and disadvantages that need to be considered during the
selection phase. Some of these are outlined below, with the exception of the POS
device, as the application and device need to be considered as one for this channel
technology.
BASIC PHONE • Cheapest handset/device available. • Only compatible with USSD and STK applications.
FEATURE PHONE • Still relatively low cost compared with other options. • More expensive than basic phones.
• Good battery life (compared to smartphones). • Phone features may limit its function and usability (GPS,
• Flexible in many ways: operation types, peripherals, Bluetooth, touch screen – model dependent).
multi-purpose. • Peripheral functionality is managed on separate devices (bio
• Good usability if used for small amounts of data. reader and printers) and not in-built as with a POS.
• Excellent portability. • Less popular platform for app development so may have less
• Embedded data transfer/GPS capabilities. access to other apps (if required).
• Peripherals are limited and need to be managed separately.
• Not suited to entry of large amounts of data.
• No in-built security.
SMARTPHONE • Moderate hardware cost relative to processing • Peripheral functionality is managed on separate devices (i.e. bio
capacity. reader, printers) and not in-built as with a POS
• Flexible in many ways: operation types, peripherals, • Battery life may limit some uses (Bluetooth and GPS).
multi-purpose. • Not suited to entry of large amounts of data.
• Good usability if used for small to moderate amounts • No in-built security, but can be added as peripherals or
of data. embedded in app.
• Excellent portability. • More expensive option compared with feature/basic phones.
• Embedded data transfer/GPS capabilities.
• Access to a wide variety of apps/popular
development platform.
LAPTOP/ • Flexible in many ways: operation types, peripherals, • Requires more training/support and computer literacy.
NETBOOK multi-purpose. • Less portable.
• Excellent usability. • Potentially less battery life.
• Longest battery life for specific models. • No in-built security, but can be added as peripherals.
• Can potentially extend the use: access Web-based • Most expensive device option.
CBS and other systems directly.
• Significant computational power compared with
mobile devices.
POS • Strong in-built security. • Restricted functionality due to numeric keypad (mostly suitable
• Device is portable and durable. for financial transactions).
(DEVICE + APP) • Specialized training required for users to operate and
• Single device for multiple functions (bio, print, card
reader, SIM card) which is a must for many agent troubleshoot the devices/application.
banking platforms that require receipts. • Installation and updates support is required often, with some
• Fast operation. level of manual intervention.
• Limited misuse. • Communication capabilities are optional and influence the price
(SIM card versus cable or Wi-Fi).
• Limited offline capabilities.
• Limited vendors/developers and often have restricted access to
device.
• Cost of device.
Depending on the size and scale of the equipped with a deeper understanding
ADC project, the FSP may choose to of the vendor’s solution and skills before
follow a formal Request for Proposal commencing the full implementation.
process. This decision will likely be This chapter will still focus on the more
influenced by the FSP’s procurement formal, comparative RFP process,
process, the available budget and although the same points covered
previous experience. Some FSPs have could be applied to a non-comparative
found that an in-depth gap analysis or competitive selection. Regardless of
or requirements workshop with a which approach is used, this stage of
small number of prequalified vendors the project must help the FSP define
can still yield a successful selection. its needs, build consensus and obtain
While this approach typically requires stakeholder buy-in for the project, and
some consulting fees up front, it can ideally foster a rational and transparent
contribute to considerable cost savings selection process.
in the long term because the FSP will be
50
Selection overview
The selection process can be divided
into three main stages, as shown below:
Initiation
Provided that a FSP has invested selection process, the scope of work
the time in the previous stages, the and selection timelines in accordance
initiation stage of the selection process with specific procurement policies and
should be quite straightforward, as the requirements. Ensuring full participation
business case and objectives would across the business at the outset can
already be known. However, identifying help build critical support for the
stakeholders and a specific project project and protect against selection
team to lead the selection process of a system that does not adequately
should ensure representation from represent the full needs of the business.
across the relevant business units (IT, This selection team typically becomes
audit, operations, and finance) so all the implementation team such that
will have an opportunity to have their continuity exists between these two
priorities considered. This project team critical stages.
will be responsible for defining the
STEP 7:
Collect the requirements
project, as this way, cost proposals can Depending on the FSP’s procurement How to evaluate the
be aligned to the actual timing of when
the functionality will be used.
policy, the timeline for the selection
process and the organization’s
responses?
knowledge of the market, the FSP Evaluation needs to include several
Clear directions and expectations need may choose to publish an open RFP steps to analyze the proposals received,
to be provided as part of the RFP or to invite only selected vendors. calculate and compare the financials
document so that vendors know what The latter is more efficient and can be and then to qualify this information by
should be included in proposals. Ideally achieved with a formal prequalification viewing a product demonstration and
each vendor’s proposal should include round, referred to as a Request for speaking with existing customers in the
the following: Information or Expression of Interest, or market. In cases where there are more
informally through some research into than three qualified participants, the
• Executive summary. the potential vendors. While the formal organization can choose to rank the
• Company information. prequalification round can help narrow participants and only evaluate the top
• Scope of the solution. down a short list, it requires additional three participants further.
• Requirements fulfilment (showing time for review and assessments of
how vendor systems meet the submissions. Plot, analyze, and compare
stated functional, technical and responses
implementation requirements) and Who should be invited to Scoring RFP responses is the
compatibility with back- and front-
end interface.
the RFP? most straightforward part of the
evaluation. Compute the percentage
• Proposed architecture. An Internet search is the easiest way to
of the requirements that is met with
narrow the list of firms invited to respond
• Project implementation approach consideration to the weighting of these
to the RFP. Technology conferences are
– including design, piloting, risk requirements. Usually, a 75 percent fit is
also useful, as are conversations with
assessment, audit considerations. good enough, as it is unlikely that a single
consultants and peers. The selection
• Training and documentation. solution will meet all of the requirements.
team can then contact the vendors to:
• Description of support services and This step must be done with a certain
location. amount of scepticism, as it is quite easy
1. Check if the vendor qualifies based
for vendors to indicate on paper that
• Cost for the solution, including on high-level requirements (online
they can meet certain requirements, and
license, implementation, upgrades, versus offline, and what applications/
later have difficulty demonstrating these
and support. modules are available).
capabilities or providing references in a
• Payment terms. 2. Confirm that the vendor is interested
live environment.
• References. in participating in the RFP.
• CVs of key team members. 3. Ask for the estimated price range to Flesh out the financial
make sure that the solution is within
• A copy of the License Agreement and
the budget. While not all vendors will
proposition
Service Level Agreement for support.
be willing to share this information, The cost of an ADC, just like any system,
it is usually possible to at least get a continues past the implementation
ballpark estimate of costs. phase. In comparing the costs for
each of the solutions, it is important to • Travel and accommodation costs (if to interact with the vendor and get a
consider the Total Cost of Ownership needed). sense of the ability to respond to ad hoc
of the system over three to five years. • Hardware cost and/or hosting cost. questions. However, in this connected
While costs in the initial year are typically • Initial and recurring connectivity cost world, many vendors can provide
easier to estimate, and hopefully clearly (data, SMS, and USSD). online demos, provided that clear
laid out in the cost proposals from expectations are set regarding what
• Supporting licenses cost (operating
the vendors, costs for the second and should be covered during the course
system and database licenses).
subsequent years should anticipate of the demonstration. While it may not
• Cost of devices and/or peripherals.
enhancements to the system on top be possible to demonstrate all of the
of the annual maintenance or support • Annual maintenance (or support) fee. functionality requested in the RFP, the
fee. Additionally, it is critical that ‘like • Revenue share (if applicable). core requirements should be shown so
is being compared with like’, both • Vendor daily fees for customizations/ that the selection team can get a good
from a functional standpoint but also enhancements after the first year. impression of both the front and back
financially, where vendors have used Of course, the financial decision can end of the solution. Those participating in
different costing models. For instance, also be based on other criteria such as the demonstration should be prompted
it is tempting to conclude that SaaS or the payment terms. The FSP (based on to give feedback to the selection team,
revenue share models are much cheaper strategy and/or cash flow) may prefer noting their impressions of the system
than upfront licensing when only a solution that costs less initially as and any concerns that they have.
transaction levels for the first couple of opposed to the one with the lesser TCO.
years are considered, but these figures Obtaining references from existing
can quickly change as volumes and customers will help the selection team
usage increase over time. Computing the
Request demonstrations and evaluate the quality of the solution as
TCO compares the financial evaluation seek references well as the quality of the implementation
for the buy, build, or rent options. The proof of vendor quality lies in the and ongoing support services. A strong
ability to demonstrate the functionality demonstration without corresponding
The TCO should include the following: of the system, but also to provide clear positive references should be of
evidence of satisfied customers using concern. Nevertheless, new vendors are
• The solution’s license fee and/or the systems. This is therefore a critical emerging continuously and FSPs should
usage fee for a ‘rent’ option. step in the evaluation process and due be aware that taking a calculated risk to
• Implementation cost. care should be taken to ensure that it is go with a newcomer who may not have
• Integration cost – both to the CBS carried out properly. Demonstrations of a long list of referees can at times pay
and to any third parties that will be the systems should ideally be done in off.
included in the channel. person, as this also gives an opportunity
3. Registration – Most ADC solutions in terms of how user friendly the phone number verification step, but
need to provide some support to application should be. This should typically also involves linking the
cover the registration of users on the include any language preferences/ agent to a float account that will be
system. This is typically initiated via translation requirements and whether used as the contra account for all
a back-office administration system the interface needs to be designed for transactions posted by the agent.
and then completed through some low-literacy target markets as this can Registration of agents also involves
interaction between the front-end influence the design considerably. defining what operations they can
application and the end-user. For access on the system and very often
example for a channel such as mobile Back-office systems defines the hierarchy by which they
banking, a customer would typically will be managed- i.e. master agent,
The back-office systems for ADCs are
request access to the channel through aggregator. Lastly, the registration of
the systems which are used to administer
an online application form. The FSP’s agents, which is typically bundled as
the products and services offered via the
back-office staff would then process an agent management solution, must
channel and which support all processes
this request by putting in the details also help to define the limits that are
associated with their use. These systems
into the registration module of the applied to agent-initiated transactions
are typically accessible only to the FSP
ADC solution. and the commissions that they
staff, most often the IT department
should be paid for conducting these
FSPs should be clear about their responsible for the administration of
transactions.
expectations in terms of this the systems. Some examples of such
registration process, which typically systems include: agency management, Registration at the back office is
overlaps with the capture of the agreed an ATM device management system closely linked to user management,
mode of customer authentication or the administration of an Internet which involves the administration of
such as a biometric registration banking platform which would be used access rights and roles for end-users of
or PIN creation. Where customer- to subscribe customers for the service. the channel, as well as administrators
driven registration is required, the When considering selection of the of the system. Both back- and front-
registration process needs to carefully back-office components of an ADC office systems must adhere to best
consider the limitations of the solution the FSP should consider the practice in terms of user access roles
technology used; for example, if using following functionalities, some of which and rights to ensure that all different
USSD, the amount of data that can be are generic to all ADCs while others are types of users – from customers to
input should be minimized to avoid relevant only for some channels. agents and system administrators –
sessions being disconnected before 1. Registration – As discussed above, have appropriate access to perform
completion of the process. the functionality to register customers their roles. The chosen back-office
or agents typically involves both front solution must be able to standardize
4. User interface – Although somewhat and back-office applications. From the this user administration task, and
difficult to specify in a quantifiable back-office perspective, particularly of course ensure that all access and
way, the usability of the application for mobile channels, functionality use of the system is supported by a
needs to be considered, particularly should be available to confirm the detailed and accessible audit trail.
where end-users or third parties customer’s phone number, either
are interacting with the front-end directly with the customer or with 2. Fee management – Back-office
application. Within the RFP it may another source of information such systems should also provide the
be wise to mention any specific as an MNO database. Registration necessary configuration tools to
design criteria, usability metrics of agents may include this same administer the products and services
or expectations that the FSP has
For FSPs that do decide to bring this file that is compatible with the card the channel usage and performance.
function in-house, a Card Management producer. These reports will differ per system
System will be required to support the and FSP but could roughly be grouped
following functions at a minimum: 6. Settlement and reconciliation – Any as follows:
card setup, application, production, solution that includes transactions »» Audit reports – Used to trace
management (black listing, account passing through more than one system the usage of the system and help
blocking, and card status changes), will need a reconciliation process to the FSP support team track any
setup of system codes, fees, limits, and ensure that all information is matching problems which may occur.
very often complaints management. between the various systems. While
»» Channel performance reports –
The CMS will need to be connected systems should be available to
Show the volumes of transactions on
to a HSM or SSM, which is responsible support reconciliation, the extent to
the platform, ideally by transaction
for generation and verification of which this process can be automated
type and in both a summarized view
PINs, generating encrypted card will depend on the availability of a
and a detailed listing. Additional
values such as Card Verification unique identifier stored in all of the
metrics include the number of users
Values, encryption key generation and reconciling systems. Ideally, back-
registered, transaction growth
management. The HSM is typically office systems will include such
rates, and other metrics to measure
connected to a designated printer for automated reconciliation support,
channel uptake. These reports will
PIN Mailers and typically both printer or at the minimum, the reports to
be key for management to measure
and HSM should be purchased in support the manual reconciliation
the success of the channel, based
duplicate for redundancy purposes. process.
on a set of KPIs.
CMS systems very often contain Functionality to support the »» Security/suspicious transactions
a customer management or issue settlement process will be required – The ADC platform should
management system for use by the for ADCs involving merchants or third contain reports to show any
help desk running a card center to party card transactions. Settlement suspicious transactions which
record and manage the customer can either be done manually using could be extracted, either based
service side of card services. reports as a means of identifying on AML standards or using custom
For those FSPs that opt for funds due/owed followed by manual definitions, and escalated for
outsourcing, a CMS can be eliminated transfers. Alternatively where a further analysis by the FSP’s risk
although it may still be necessary for settlement bank is in place, with all management team.
some system, either the back-office parties holding an account at this »» System administration reports –
administration system or the CBS, bank, settlement could be automated Used to show platform availability,
to record card numbers allocated to as long as rules and schedules are up time, and transaction
customers for reference purposes. clearly established between all parties. performance.
Additionally, a robust process needs Functional requirements surrounding
to be agreed on with the partner to settlement will really depend on the While the back-office systems are
ensure that the application process role of the FSP in the network and necessary to support the operations of
is seamless and completed in the whether they are the issuer, acquirer the channel, they also play a key role in
shortest possible time. If only the card or payment service provider. the risk management of the channel. In
production process is outsourced many cases these are the systems that
7. Reporting – All ADC systems need to are used to monitor the suitability of
then the CMS is still required and will
contain a suite of reports to help the the controls put in place to protect the
need to generate a card production
administrators and managers monitor channel. Risk managers and auditors
MESSAGING PROTOCOL ISO 8583, ATM management protocols (NDC, AANDC, DDC)
IN-HOUSE FSP would be responsible for the • Limited/no dependency on third • Dedicated resources required to manage
SERVERS / procurement of the servers, either parties so FSP has full control of the the hardware.
environment. • Risk that in-house resources not specialist
DATA CENTER through a direct purchase or leasing
model. Typically, responsibility for • No requirement for connectivity to in this area, opening the FSP to risk of
external hosting center and/or cloud. systems unavailability due to hardware
maintenance is in-house, although issues.
• No challenge with regulators, as
there may be potential to outsource database is stored locally; regulators • Costs are incurred upfront on
just the maintenance. are most familiar with this model, so no procurement rather than spread over
need to educate. time based on usage.
• Requires excellent planning to cater for
growth and ensure that the servers are
not limiting the system performance.
• Planning and execution of systems to
support disaster recovery lies fully with
the FSP.
EXTERNAL FSP would contract server space • Skills to manage the servers is left • Reliance on a third-party provider to
DATA CENTER through a third-party company who with specialists with no need to bring ensure that business-critical systems
maintains a physical data center that in-house. remain available. Not all data centers are
• Generally is easier to scale up equal in quality, so this risk depends on
they rent to the FSP. The FSP would
performance by just renting additional the market/vendor.
then set up a reliable connection space/processing capacity. • Regulators may raise issues with systems
so that end-users can access these • Physical servers can be visited. not being in-house.
servers as if they were in-house. • System availability dependent on
connectivity to data center.
CLOUD FSP contracts with a hosting • Skills to manage the servers are left • Reliance on a third-party provider to
company that provides access to with specialists, with no need to bring ensure that business-critical systems
servers hosted in the cloud. Like with in-house. remain available.
a data center the FSP would then • Generally it is easier to scale up • Regulators may raise issues with systems
performance by just renting additional not being in-house and not being able to
need a strong connection for end- space/processing capacity. visit the physical data center.
users to reliably access the system. • System availability dependent on
Unlike with a data center, these cloud connectivity to cloud.
servers cannot be physically accessed.
64
01_TEAM 02_KICK-OFF 03_REQUIREMENT 04_HARDWARE 05_TRAINING
INFORMATION ANALYSIS PROCUREMENT
STEP 10:
Prepare kick-off and
analysis
Most financial
institutions opt The purpose of this step is to identify the of ‘super users’ or champions of the system.
to launch a pilot Core Implementation Group who will likely Where the vendor adopts a ‘train the trainers’
initially, with a consist of members from the project team approach, this group will receive this training
closed group of that participated in the selection stage, as well and be responsible for end-user training prior
as relevant representatives from finance, IT, to going live. The CIG will take most of the
users. customer service, marketing, operations and day-to-day decisions regarding the project
audit. This operational group will be involved and work directly with the project manager
in training, requirements analysis, and testing and team appointed by the vendor.
of the systems, and typically form a group
PROJECT
SPONSOR
STEERING
COMMITTEE
PROJECT
MANAGER
CIG
TECH PLATFORM Which technology is best suited to our strategy? Agents to be given smartphones running an application and
IDENTIFICATION connected to a biometric device for authentication.
SELECTION What exactly do we expect the ADC solution to do, Support both financial and non-financial transactions with
PROCESS both for short- and longer-term planning? biometrics. Provide a full agent management system. Integrate to
the CBS using available web APIs.
IMPLEMENTATION How do we configure / customize the solution for the Agents to be organized into a three-level hierarchy. Allowed
initial implementation? Define the project phases and transactions restricted to cash in / out and customer registration.
scope of each. Phase 1 with Phase 2 to include loan applications.
The requirements analysis work done at FSP is aware of the existing functionality be customized to meet the FSP’s
the implementation phase is typically of the system and can simply overlay requirements.
led by the vendor, as they will know new needs onto this system, thereby 4. Reporting – List of expected reports
what their system is capable of doing minimizing customization, which is from the system, ideally with detailed
and should advise on the best way to always a risky and often costly task. specification as to what information is
map this to the FSP’s products and Investing time in this initial workshop contained.
processes in a gap analysis exercise. will not only help understand fully the
For some ADC projects, particularly implications of decisions made in this At the end of this phase, the vendor
those that involve the introduction of specification phase, but will also be a should be able to provide the FSP with a
new channels, the requirements analysis foundation on which the training for final project plan, since up until this point
done in the previous stages of the UAT can build. all plans were based on assumptions
overall project will be a critical input rather than clear requirements. Many a
to this phase. If such requirements are At the end of this phase, a detailed project faces its first obstacle at this point
not available, this requirements analysis specification document should be when the vendor provides a delivery
with the vendor can easily become a available and must be signed off by date beyond the FSP’s expectation. If
prolonged exercise and at worst result in the vendor and the FSP, as it will form so, a compromise may be reached by
the vendor rather than the FSP driving the basis against which delivery will splitting the project into phases, which is
the channel implementation. Suffice to be measured in the later phases of recommended so that requirements can
say that this is one of the most critical implementation. Changes may arise at a potentially be revisited or revised based
steps in the implementation process, later point, but these should be tracked on inputs from live use of the systems.
with many failed projects attributed to separately, usually through a change For many new channels, it is difficult
a poor requirements analysis stage. It is request process. The specification for the FSP to envision exactly which
imperative that at the end of this step, the document should ideally contain the functionality will be most important and
CIG is comfortable with the functionality information listed below, and in general how users and customers will respond,
that will be delivered and whether this the more detail available the better as it and hence a phased rollout will provide
will entail configuration of existing will limit the risk of misunderstandings an opportunity to incorporate feedback
system parameters, customization of between the FSP and the vendor. from live operations rather than building
new functionality or a mixture of both. systems based on expected usage.
Appendix 1 provides some guidance on 1. Process workflows that will be used
with the system – Touches on how a
the key decisions to be made during this
phase. transaction will be initiated, validated Hardware procurement
and processed. For those ADC systems that require the
Different vendors will employ different 2. Configuration settings to be made FSP to procure supporting hardware
methods to extract the FSP’s needs; – Relates to the products, fees, or implement new networks, this
some may employ presentations or commissions, user roles, workflow, and project phase should clearly identify
demos, others may conduct a gap screens that should be configured. these requirements and follow through
analysis and others still may come with 3. Customizations – Functional with the necessary procurement. The
a blank slate. A gap analysis workshop description of how the system will specific hardware needed will clearly
is preferable, as it helps ensure that the depend on the ADC technology being
implemented, which can typically be loans for the device to be owned by the strategy and associated business case,
split between front-end devices, used employee as a means of encouraging but may need to be revised based on
by customers and staff, versus the back- users to take care of the devices. For the final decisions taken regarding
office servers hosting the applications. agents, both models are observed and configuration/customization.
Care must be taken to ensure that the the decision will really depend on the
vendor of the ADC applications has fully types of agents that are available in ATM and other channels reliant on the
tested these devices and can confirm the market, their willingness to either use of cards will require some specific
that they are compatible with the invest some funds as a precondition to hardware ranging from the front-end
software. Additionally, with an increased becoming an agent, or their existing ATM itself to the HSM and card printers
number of options on the market, access to phones/tablets/laptops prior in case cards are being produced in-
compatibility with the vendor’s solution to signing up as an agent with the FSP. house. For all of these systems, the
or other systems in use by the FSP can FSP will need to research the available
be a serious challenge. For the back office and for ADC vendors and with inputs from the vendor,
systems that will be installed in-house, confirm on which to procure. Disaster
Procurement requirements for front-end the implementation team will need to recovery or replacement systems need
devices will also be heavily influenced identify or procure servers to host the also to be considered to ensure that the
by the strategy the FSP has decided system. While many FSPs may have channel remains reliable and available
to take with regards to the ownership requested these hardware specifications for the end-users.
of these devices. Where agents will be during the RFP process, these may be
required to procure their own devices, confirmed at this stage as it is only at
the responsibility of the FSP will be less, this point that the vendor will have a
although the issues of compatibility may very clear sense of how the FSP intends
be more pressing given that the FSP will to use its system, and hence can provide
have less control over which specific accurate sizing requirements. In the
device is used. In many cases where this preparation of these specifications
ownership strategy is desired, the FSPs and associated procurement needs,
may discover that hardware/devices the implementation team needs to
still need to be provided to agents to consider not only the hardware needed
conduct the pilot or beta testing. This for production environments, but also
will not only provide an opportunity to for backup/disaster recovery as well as
test the solution working on different training. Typically most mid to large FSPs
models but will also give these users the will require all systems to be available in
opportunity to appreciate the potential triplicate: one for production, one for
benefits that the system can bring to backup/disaster recovery and another
them, hence convincing them of the for UAT or training. Lastly, procurement
need to invest in the device. For staff of servers needs to take into account the
users, it is typically the FSP that provides estimated transaction volumes expected
the required devices, although some over this channel. Ideally this information
have created incentive schemes or staff will be available from the channel
Based on the output of the requirements how data will be migrated from the include both positive cases (that is,
analysis phase, the vendor may need legacy system during the requirements the system behaves as expected when
to configure or potentially customize phase. The implementation team and correct criteria is input) and negative
the ADC system to meet the agreed vendor should agree on the data to be cases (the system does not allow
specification. For the FSP, this phase may transferred, and cut-off dates. During operations if incorrect input) to ensure
not require active involvement, although this analysis, it is not uncommon that the system is fully compliant with
constant communication needs to be for some FSPs to encounter issues the FSPs requirements. Prior to this UAT,
maintained between the implementation with compatibility, particularly of some training is typically required, so
team and the vendor to ensure that authentication data such as biometric that those involved in the testing are
progress is being made as expected records or PINs. This data is normally equipped with the skills to adequately
and to handle any arising issues. By the stored as encrypted data, which may test the system. Additionally, some FSPs
end of this phase, the vendor should be complicate the extent to which the new may choose to have a smaller team
ready with a version of its software that vendor can access and migrate it to its prequalify the system before bringing
is fully configured to meet the FSP’s systems. Difficult decisions may need to on-board a larger UAT team. This can
requirements, with all configurations and be taken regarding resetting of PINs or help make the testing more efficient
customizations tested by the vendor’s re-registering of biometric data. and really focus on pulling in end-user
quality assurance team. feedback rather than have the UAT team
interrupted by critical bugs which may
Where the channel requires integrations Installation prevent it from completing its task. It is
with third parties, this step will help to For ADC systems that will be installed on important to realize that this step will
accomplish this task, which typically the FSP’s infrastructure, the installation be the first presentation of a working
requires direct communication between of systems need to be done after the system to a group of end-users, and
the ADC solution vendor and the third vendor confirms that the version is fully the way in which this introduction is
party. This integration work will require configured or customized and has passed managed will influence the buy-in and
decisions regarding integration protocols, through a quality assurance testing uptake of the system. Prolonged UAT
a topic discussed later in this chapter. and the FSP has procured the required which is constantly interrupted by bugs
devices, if applicable. This installation is and change requests will deflate the
The FSP should also prepare UAT test typically done by the vendor although UAT team and sow seeds of doubt in
cases at this stage. Test cases need to be ideally the FSP’s IT resources will be team members’ minds about the ability
as detailed as possible to avoid missing trained on how to do this installation at of the system to deliver, which will likely
out on bugs or issues. For example, a test the same time, so that for future releases propagate throughout the business.
case to check that a customer withdrawal the task can be done in-house with less
is functioning properly would outline the dependency on the vendor. UAT is a notoriously difficult exercise
expected debits and credits, any fees for both FSP and vendors to navigate.
or commissions to be calculated and Inevitably, changes or omissions from
posted, and any reports to be generated. User acceptance testing the specification stage will arise once
Once the vendor has installed the the system is in front of the users and
system, the CIG can commence testing the team can finally visualize and
Data migration (if applicable) the system to confirm it meets the interact with it directly. Assumptions
Projects that involve replacement of an agreed specifications using the test of what the system is expected to do,
existing system will also need to consider cases prepared. These test cases must and possibly cannot do, may arise
STEP 12:
Pilot and go live
INTERNET BANKING
AGENCY
• How to match incoming payments to the correct customer account i.e. which identifier: phone number, national ID,
account number.
• What business rules to apply to incoming payments: overpayments, group accounts, split to savings.
• Outward payments – how to validate a customer’s phone number: one-off registration versus confirmation at time of
sending.
• How / when to reconcile payments between the systems: automated versus manual, daily.
• Receipting payments received via M-wallet: manually versus SMS versus no receipt.
• How to handle group loans over this channel: individual versus batch.
M-WALLET
INTEGRATION
M-BANKING
• Registration.
x x x x • Who / where to reset PINS.
PIN
File transfer (local or FTP) Various file format batch or semi- • Typically easy to organize and • Errors on upload typically requires follow up
real time. to maintain. manually resolution.
• Low cost. • Dependent on the file structure work.
• Typically lower security as the files can
be compromised as they are waiting for
processing.
Low level TCP Such as ISO 8583, SMPP, SMTP, • Immediate notification in case • The standards are implemented in various ways
ATM management protocols (NDC, of errors. by the vendors.
AANDC, DDC), HSM protocols. • Fastest network integration • The communication is not human readable
protocol. which makes it difficult to trace problems.
• Dependent on constant network availability.
Database Usually stored procedures. • Immediate notification in case • Requires access and deep understanding of the
of errors. database.
• No requirements for additional • Lower security due to the access to the
middleware / system. database.
• Dependent on the database type / dialect.
HTTP-web services Such as REST, JSON, XML, SOAP. • Immediate notification in case • Not suitable for big data processing (relatively
of errors. slow).
• Not dependent on the • Dependent on constant network availability.
programming language. • It is adding processing overhead.
Other API’s Usually integration with vendor • Immediate notification in case • Usually propriety.
libraries (DLL, operating system of errors. • Requires vendors to provide detailed
API). • As it is provided by the vendor documentation.
it should be the best and most • Hard to trace problems as it acts as a ‘black
robust way to integrate with box’.
the system. • Very often it is dependent on the programming
language.
1
networks/
LES
platforms to test
out new channels
Where possible, build on existing networks decision of whether to rent, buy, or build. SaaS
rather than launching your own, especially models can provide options to test out new
if this is the first foray into ADCs. This may channels using partner platforms, which make
mean looking for integrations to third-party commercial sense while transaction volumes
networks/providers such as ATMs, agents or are low. However, one should be careful of
m-wallets rather than launching these services lock-in periods which are sometimes applied
yourself. Integrations to existing networks are with these costing models. Nevertheless,
not only cheaper in terms of technology, but establishing a proprietary network may be
also allow you to observe responses from the justified when customer experience with
market to see if the uptake warrants the larger existing networks is poor, for instance due to
investments required for proprietary solutions. poorly trained agents, high prices, or frequent
This same lesson could easily be applied to the network downtime.
N
SON Challenge SO Pick partners others, and hence must be considered
2 3
your current carefully in the formulation of any partnership.
LES
LES
While it may be challenging to strike
processes successful partnerships in MFS, other
to maximize ADCs such as outsourced ATM/POS
impact networks provide good examples of
how partnerships can be designed to
work for all involved. FSPs need to
To get maximum benefit from ADCs, a Most ADC projects require some invest time and resources to critically
FSP must be ready to really challenge type of partnership between the FSP assess compatibility, strategic focus,
existing processes or ways of doing and other parties, such as m-wallet and commercial alignment to create a
business and to include business providers, USSD aggregators, MNOs, win-win partnership.
process reengineering as part of the or a technology vendor. The success of
SON Prioritize
implementation process. FSPs need the the ADC may ultimately depend on the
4
courage to leave old processes behind strength of these partnerships, making it
flexibility and
LES
in order to enhance the customer a worthwhile investment to spend time
experience and take full advantage in the initial selection process and to
scalability
of potential cost and time savings, as continually review these arrangements
well as to optimize operations. This over time. A critical review of four MFS
is especially necessary for extension implementations around the world
service channels whereby third parties revealed the importance of ensuring Although flexibility is important in all
or remote users are now embedded in that the business model for the channel IT systems for FSPs, it is perhaps even
processes that were either branch or sustains all parties involved and of more critical with respect to ADCs, as in
paper-based before and now have the ensuring that competitive forces are many cases the FSP does not yet know
potential to be fully digitized. Change aligned for the greater good of the how the market will respond or what
management is critical for such projects partnership. The same study showed will be needed in future. Parameters
so that key users and decision makers that partnerships must be both patient such as fees, commissions, and types of
are involved in the redesign process and enough to cope with slow growth operations can be altered over time in
buy into the need to change the status initially and yet flexible enough to adapt response to feedback from the market.
quo. Despite the tendency to blame and scale in response to the market A foundation infrastructure built around
failed ADC projects on technology, in over time. Additionally, partners need a centralized integration platform or
many cases deeper investigation often to consider both direct and indirect switch can ease the burden of adding
reveals the root cause as poor change value that may arise from the ADC, such new channels or integration partners
management, with internal factors as the additional revenues earned by over time and give the FSP assurance that
preventing the overall success of the agents who find customers purchasing integrations are done against a common
project. Addressing this resistance to goods from their shops/kiosks at the standard. Having catered for this level of
change, which may exist within the time of cash out. Lastly, the role of flexibility, it is important for the FSP not
organization at the outset of the project regulations and the restrictions they to adopt new technology too quickly,
and continually through implementation, impose on partners can undermine but rather take the time to see which
will help minimize the risk of project a partnership, providing competitive technologies are proving themselves
failure due to a lack of buy-in from advantage to some partners over in the market before incorporating
within the FSP.
these in its ADC solution. A balance change strategy should evolve with
needs to be struck between staying in the clients’ needs and expectations,
touch with the market demands of the the business and the external market
customers and ensuring a stable and in which it is operating. This does not
reliable transactional platform on which mean reinventing the channel strategy
to extend services. on an annual basis, but rather making
adjustments and enhancements
5
conditions. These reviews should be
the context
LES
supported by pre-defined performance
carefully metrics or KPIs, which measure use,
user satisfaction, volumes, down-time,
and other relevant statistics which can
be extracted via tools and reports that
monitor channel operations over a
FSPs should remember that there is no
period of time to compare trends and
‘one size fits all’ in terms of channels.
benchmark with other market data.
FSPs need to consider both the
Depending on the results of these
external and internal environments, as
reviews, FSPs may need to go back to
discussed in Chapter 2, and care must
the drawing board periodically to adapt
be taken to not presume that what was
to changes in technology, demand, and
successful in one place will necessarily
competition. The technology that makes
be successful in another place.
up the ADCs should be dynamic and
flexible enough to support this evolving
channel strategy.
SON An ever-
6
LES
evolving
strategy
or signature requirements? What of these channels, are upgrades 2. A market analysis, including market
indirect regulation could impact the or customizations required, what research, competitor, and regulatory
design of a delivery channel (for costs should be considered (for reviews.
example, signature, biometric, or example, if paying per user, will 3. An analysis of the proposed channels
national ID)? each new agent be considered as and technology (device, application,
»» ICT landscape – What a new user)? How does the current and communication) and how they
communications are available: SMS, IT strategy impact the channel will meet business goals and customer
USSD, mobile data services, Internet, strategy and what internal security needs.
LAN/WAN, IVR, or NFC? Review the policies should be incorporated? 4. A SWOT analysis of the proposed
availability, quality, and affordability How will the customer’s identity be channels and technology.
of the communication options authenticated?
5. A recommendation, based on the
available to the target market. What »» Capacity – Financial: what is analysis above, of which ADC solution
devices are accessible to the target the budget allocated for this to pursue.
market? Is there electricity and project (inclusive of technology
6. An operational, financial, and
connectivity in the locations where systems, marketing, operations,
IT requirements analysis and a
your target market is based? and support)? Resources: what
recommendation of whether to ‘buy’,
»» Strategic partnerships – Are there is the capacity of the IT team and
‘rent’, or ‘build’.
existing providers that we could IT infrastructure? Should the ADC
7. A high-level timeline and project plan,
partner with? Are potential partners technology be bought, built, or
including the roles and responsibilities
operationally, technically, and rented? What human resources
of key stakeholders or internal teams.
commercially aligned? and skills are required to support
the project implementation and 8. A high-level budget, including the
2. Internal environment
continue operations? source and uses of funds.
»» Product and service offering – What
»» Internal risk and compliance – What 9. A risk analysis, including potential
transactions, products, or services
additional risk do ADCs expose the impact and mitigation.
are currently offered, or do you
have plans to offer in the short to organization to? How can these
The matrix in Table 10 provides channel-
medium term? Should these be self- risks be mitigated, controlled, and
specific questions and considerations
service or OTC? monitored? Are there any potential
for each of the channels discussed in
compliance issues which should be
»» Current channel strategy – How are Chapter 1. The selected channels will
considered? To what extent will the
existing channels performing with be justified by the channel strategy
business use paper versus digital
regards to use and efficiency? How document, which summarizes the
for the operations supported? Do
are we performing against our goals objectives, market analysis, and initial
we still use paper account opening
with the current channel strategy? project plan detailing the operational,
forms, do we need paper receipts for
What are the opportunities for financial, and IT requirements and a
transactions? What do regulations
improvement? What bottlenecks high-level project plan.
say about going paperless?
exist in the current operations
that would be resolved or reduced
by an alternative channel? What Step 3: Define the channel
adjustments are needed in the strategy
operations to make it happen? Define the channel strategy, which must
»» IT environment and strategy – Is the include the following information:
CBS stable, centralized, and capable
1. The business goals and objectives that
of integration (is an API available)?
the proposed channels are meant to
How will the CBS support the addition
address.
82 ALTERNATIVE DELIVERY CHANNELS AND TECHNOLOGY
Table 10: Channel-specific Considerations
Extension Field staff • Ability to handle cash operations versus non-cash. What functionality available from this point of service?
services • Communication infrastructure: the need for online versus offline.
• Physical devices available/affordable.
• Security environment: will users be safe carrying tablets/phones/cash.
• Printing, signing, and authentication requirements.
Mini branch • Ability to handle cash operations versus non-cash. What functionality available from this POS?
• Communication infrastructure: the need for online versus offline.
• Existing devices available at mini-branch locations.
• Printing, signing, and authentication requirements.
Bank on wheels • Number of locations and potential clients that could be serviced (Where would the vehicle go? How
often?).
• Communication infrastructure: the need for online versus offline.
• Level of security required both in terms of the vehicle and the escorts required for cash security.
• Existing devices available at mini-branch locations.
• Printing, signing, and authentication requirements.
Mobile banking n/a • Availability of mobile devices with clients, with percentage of smartphones versus feature phones.
• Availability of USSD in country: is this service interoperable, what is the cost, what is the quality, and who
will provide access?
• Availability of payment and channel aggregators to have a single point of contact to connect to all MNOs
and frequently used billers.
• Client comfort level with mobile: will they know how to use it?
• Linkage/dependencies to other channels: withdrawal from m-wallet requires customer-initiated
transaction, hence m-banking required.
• Willingness of clients to pay for the service.
• Revenue model of m-banking service providers: SaaS, revenue share, on-premise solution.
CHANNEL BUSINESS CASE SUMMARY TABLE Year 0 Year 1 Year 2 Year 3 Year 4
KEY INDICATORS
Core customers/accounts (#)
Interest on float
Interest on float
Fees Potentially all 1. What types of fees should be charged for registration and transactions on the
channel?
2. How are fees calculated and applied?
3. Where will these fees be configured?
Interoperability Primarily mobile and ATM 1. What level of interoperability will be required from a user’s perspective?
2. What operating systems should be supported for mobile and Web platforms?
3. If biometrics are to be used, how to ensure compatibility?
Scalability All 1. What are the expected transaction levels with projections for five years?
2. What number of users will be accessing the system?
Standards All 1. Does the channel strategy dictate any specific standard that must be adhered to (for
example, EMV or ISO)?
Online/Offline Potentially all 1. For extension services, what systems, or functions, should be available in offline
mode?
2. What should be the behavior of the ADC when/if the CBS is offline for end of day/
month?
Integration/ All 1. What front-office and back-office systems will need to be integrated?
2. What type of integration? Batch or real-time?
Middleware 3. What functionality must each interface support?
Security All 1. What systems are required to support the preferred mode of customer authentication?
Are these systems going to be external from CBS or within it?
2. How will the physical devices used for data entry be secured (agency or extension
services)?
3. How will the communication networks required be secured?
4. What security measures are expected from the ADC back-office systems?
5. What support is required to fully audit the ADC and monitor the controls in place
(system-based controls, audit reports, and additional systems – AML)?
ATM/POS ATM (in-house) 1. Which system will drive and manage the ATM/POS devices?
management 2. What system will be used for CMS?
3. Which Security Module will be used? HSM vs SSM?
Step 3: Vendor selection • Which vendors have a reputation requirements, the financial costs, and
for providing the type of product/ feedback from demos /references.
1. Prepare the RFP
services that are required?
• Brief background about the FSP.
• Confirm with the vendors who will be Step 4: Contracting
• Business and channel strategy (may participating and clearly communicate 1. Review the contracts with due care
include a phased approach). the timeframe for the process so they and pay specific attention to:
• Overview of project: objectives, can plan accordingly. • License terms
scope, and related projects. 3. RFP issue • Project deliverables
• Selection process and deadlines. • Decide who to invite to the RFP and • Milestones
• Criteria for decision making, including whether they should be pre-qualified. • Payment terms
preferences on different licensing • Issue the RFP with clear instructions to • Responsibilities on both sides
structures (license versus SaaS versus vendors on the information required
revenue share). • Support level agreements after ‘go
and the deadlines. live’.
• Expected content and format for the • How will the responses be evaluated?
response. 2. Negotiate and sign the required
Specify the criteria before the process contracts with the vendors, considering
• Functional requirements with begins so there is no bias. both initial implementation and
weighting to reflect priority. • Request an estimated price based ongoing support. It is advised that
• Technical requirements (overview of on the requirements in the RFP to FSPs allocate sufficient time for
CBS and current infrastructure). test financial proposals against the contracting. This process typically
• Project timing. business case. takes longer than expected and
• Expected services from the vendor. • Request contract templates to get can delay the project start if terms
2. Vendor shortlist familiar with payment, service, and cannot be negotiated in a timely
• What criteria are being used for pre- support terms. manner. FSPs should consider that
qualification? 4. Evaluation not all vendor contracts are identical
• Which vendors are serving or have a • Calculate the scores based and contracting multiple technology
presence in this market, most likely on proposals, references and vendors will require a resource to be
working with your competitors or FSP demonstrations. responsible for vendor management.
peers? • Evaluate the proposals received
considering the match to the
4th Generation Mobile Fourth generation of mobile telephony technology, succeeding 3G and preceding 5G. As opposed to earlier
Network (4G) generations, a 4G system does not support traditional circuit-switched telephony service, but all-Internet Protocol-
based communication such as IP telephony, and provides higher download speeds relative to 3G.
Agent A person or business contracted to process transactions for users. The most important of these are cash in and cash
out (that is, loading value into the mobile money system, and then converting it back out again); in many instances,
agents register new customers too. Agents usually earn commissions for performing these services. They also often
provide front-line customer service, such as teaching new users how to complete transactions on their phone.
Typically, agents will conduct other kinds of business in addition to mobile money. Agents will sometimes be limited
by regulation, but small-scale traders, microfinance institutions, chain stores, and bank branches serve as agents in
some markets. Some industry participants prefer the terms ‘merchant’ or ‘retailer’ to avoid certain legal connotations
of the term ‘agent’ as it is used in other industries. (GSMA, 2014).
Aggregator Servicer provider with existing integrations to a number of MNOs and/or PSPs to facilitate billing, technical, and
operational relationships and interfacing across operators via one link to the aggregator, as opposed to separate
integrations with each provider.
Alternative Delivery Channels that expand the reach of financial services beyond the traditional branch. These include ATMs, Internet
Channels (ADCs) banking, mobile banking, e-wallets and extension services.
Android A Linux-based mobile operating system originally developed by Android and currently developed by Google. With
a user interface based on direct manipulation, Android is designed primarily for touchscreen mobile devices such
as smartphones and tablet computers.
Anti-Money Laundering/ AML/CFT are legal controls applied to the financial sector to help prevent, detect, and report money-laundering
Combating the activities.
Financing of Terrorism
(AML/CFT)
Application A method of specifying a software component in terms of its operations by underlining a set of functionalities that
Programming Interfaces are independent of their respective implementation. APIs are used for real-time integration to the CBS/MIS, which
(API) specify how two different systems can communicate with each other through the exchange of ‘messages’. Several
different types of APIs exist, including those based on the Web, TCP communication, and direct integration to a
database, or proprietary APIs written for specific systems.
Basic phone The most basic type of mobile handset available on the market. This phone has no data or GPRS capabilities and for
MFS is only compatible with USSD and STK applications.
Branchless banking The delivery of financial services outside of conventional bank branches through the use of retail agents and ICT. For
the purpose of this handbook we have considered this term to be equal to ADC and e-banking.
Call center A centralized office used for the purpose of receiving or transmitting a large volume of requests by telephone. In
this context, as well as handling customer complaints and queries, it is also used as an alternative delivery channel to
improve outreach and attract new customers via various promotional campaigns.
Card Management The system used by businesses to manage the full administration and support associated with payment cards. A CMS
System (CMS) will typically provide functionality to manage card product definition, application processes, production, and issuing,
blocking, and managing transactions along with the card balances, if required. A CMS will be required for any FSP
that wants to use either POS or ATMs with cards as the means of customer authentication.
Channel The customer’s access point to a FSP, namely who or what the customer interacts with to access a financial service
or product.
Core Banking System The core system used by a FSP to manage all of its key business processes, including front- and back-office
(CBS) components. Most CBSs provide CRM functionality, loan portfolio tracking, accounting, and reporting. For the
purpose of this handbook we have used the term synonymously with Management Information System.
Core Implementation A group of staff from the FSP charged with making the day-to-day decisions regarding the ADC project
Group (CIG) implementation. This group will be involved in training, requirements analysis, and testing of the systems and typically
form a group of ‘super users’ or champions of the system.
Electronic banking The provision of banking products and services through electronic delivery channels.
(e-banking)
Enabling technology For the purpose of this handbook we refer to the enabling technology as the underlying technology platform used
to drive an ADC. It includes the hardware devices, software systems, and the technological processes that enable the
provision of financial products and services over ADCs.
Europay, MasterCard, EMV stands for Europay, MasterCard, and Visa, a global standard for the inter-operation of integrated circuit cards
and Visa (EMV) (IC cards or ‘chip cards’) and IC card-capable POS terminals and ATMs, for authenticating credit and debit card
transactions (Wikipedia, 2014).
E-wallets/e-money Short for ‘electronic money’, it is stored value held in virtual wallets or cards. Typically, the total value of e-money is
mirrored in bank account(s), so that even if the provider of the e-wallet service were to fail, users could recover 100
percent of the value stored in their accounts. Bank deposits can earn interest, while e-money cannot.
Extension services Field-based banking services often performed by FSP staff. This includes remote data capture, mini branches and
branch on wheels.
Feature phone A mobile handset that is more advanced than a basic handset by the fact that it contains embedded data transfer/
GPS capabilities. A feature phone can be used to connect to the Internet or to run mobile applications dependent
on data connectivity. Unlike smartphones, feature phones have no in built security and limited peripherals and
applications.
Financial Service A provider of financial services including credit unions, banks, non-banking financial institutions, microfinance
Providers (FSP) institutions, and mobile financial services providers.
General Packet Radio A packet-data technology that allows GSM operators to launch wireless data services, such as e-mail and Internet
Service (GPRS) access, via a SIM card. This is a 2G grade of wireless communication with maximum download speeds of 114kbps.
Global Positioning A space-based satellite navigation system that provides location and time information in all weather conditions,
System (GPS) anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites.
Global System for An open, digital cellular technology used for transmitting mobile voice and data services. It is the most common
Mobile Communications standard for mobile communication, with over 90 percent market share.
(GSM)
Hardware Security A physical device used as part of the payment card issuing and authentication process. The HSM is connected to the
Module (HSM) network hosting an ATM or POS, with the primary functionality of generating PIN numbers and in some cases storing
encryption keys required to authenticate the PIN number provided.
Hypertext Transfer An application protocol for distributed, collaborative, hypermedia information systems – it is the foundation of data
Protocol (HTTP) communication for the World Wide Web. Hypertext is structured text that uses logical links (hyperlinks) between
nodes containing text.
Interactive Voice A technology that allows a computer to interact with humans through the use of voice and DTMF tones input
Response (IVR) via keypad. IVR allows customers to interact with a company’s host system via a telephone keypad or by speech
recognition.
International Mobile A unique 15-digit serial number, assigned to every single mobile phone. It can normally be found on the back of the
Equipment Identity phone, under the battery. IMEI consists of four groups of numbers. The first group identifies the type approval code,
(IMEI) the second the manufacturer, the third the serial number, and the fourth group is a single digit (usually a zero).
Internet banking An electronic payment system that enables customers to conduct financial transactions on a secure website
operated by a FSP.
J2ME app J2ME is a Java programing platform designed for building applications to run on mobile devices. It is commonly used
to build mobile apps that need to run on devices with limited memory, display, and power capacity, such as feature
phones.
Kiosk A computer terminal featuring specialized hardware and software that provides access to information and
applications for communication, commerce, entertainment, and education. Integration of technology allows kiosks to
perform a wide range of functions, evolving into self-service kiosks.
Know your customer Rules related to AML/CFT that compel providers to carry out procedures to identify a customer and that assess the
(KYC) value of the information for detecting, monitoring, and reporting suspicious activities.
Local Area Network/ LAN is a computer network covering a small geographic area, like a home, office, school, or group of buildings.
Wide Area Network WAN is a computer network that covers a broad area (for example, any network whose communications links across
(LAN/WAN) metropolitan, regional, or national boundaries over a long distance).
Magstripe/ magnetic A type of plastic card which stores data about the customer on a machine-readable magnetic strip on the back of
strip card the card. Magstripe cards have been used with ATMs and POS devices, although they are slowly being replaced by
EMV/ chip and pin cards.
Merchant A person or business that provides goods or services to a customer in exchange for payment.
Microfinance Institution A financial institution specializing in banking services for low-income groups, small-scale businesses, or individuals.
(MFI)
Mobile banking The use of a mobile phone to access banking services and execute financial transactions. This covers both
transactional and non-transactional services, such as viewing financial information on a bank customer’s mobile
phone. Sometimes called ‘m-banking’.
Mobile Financial A general term referring to the use of mobile technologies to access financial services. This includes mobile banking
Services (MFS) and mobile money / m-wallets.
Mobile Money A service in which the mobile phone is used to access financial services (GSMA, 2014).
Mobile Network A company that has a government-issued license to provide telecommunications services through mobile devices.
Operator (MNO)
Mobile Point of Sale A mobile application designed to mimic the same functionality offered by a traditional physical POS device. mPOS
(mPOS) applications typically interact with a card reader and/or printer to replicate the full functionality of the traditional POS
device.
Mobile wallet (m-wallet) An e-money account that is primarily accessed using a mobile phone that is held with the e-money issuer. It is
typically linked to a unique mobile phone number.
Native apps Mobile applications that are manually installed on the phone and run in almost the same way as a computer program
installed on a PC. Native apps can be categorized by the operating systems running on the mobile phone, with the
most common being Google (Android) and Apple (iOS), and Windows for smartphones and Java/J2ME apps for
feature phones. Native applications can be developed to serve as a user interface for a variety of business uses,
including mPOS, agent apps or field-based data capture apps. Native apps can operate in either online or offline
mode, depending on the design of the application and the quality of the communications available.
Near Field A method of contactless card payment (without a PIN), which uses short-range radio signals to exchange
Communication (NFC) information between a card or mobile device and a terminal.
One Time Passwords A security protocol that works on the basis of one factor of authentication being generated only when needed,
(OTP) namely at log in or transaction posting, and acts as a single use password or PIN.
Over The Counter (OTC) Channels that require the customer to interact with a member of the FSP staff or a third-party representative to
transact.
Point of Sale (POS) Electronic device used to process card payments at the point at which a customer makes a payment to the merchant
device/terminal in exchange for goods and services. The POS device is a hardware (fixed or mobile) device that runs software to
facilitate the transaction. The hardware used may vary.
Premium Rate Service An intermediary provider, licensed by the MNOs and usually the government, to offer bulk SMS, USSD, and short
Provider (PRSP) code services. The regulation governing these businesses will vary from country to country, with some places
allowing for only a direct relationship with the MNOs for these services. Where regulations for PRSP exist, a FSP will
need to contract with these parties in order to access bulk SMS and/or USSD channels, although these services will
still require a tripartite agreement between the FSP, MNO, and PRSP. For this handbook we have considered a PRSP
as the same as an Aggregator.
Request for Proposal A solicitation made by a company to initiate a bidding process to procure a commodity, service, or valuable asset
(RFP) from potential vendors who are requested to submit business proposals. The RFP should provide all the information
and requirements that a FSP has identified as necessary or desirable to assist vendors to prepare a suitable proposal
for their services and products.
Self Service Channel A channel that is available to customers without any other human interaction.
Short Code Short codes (also known as short numbers) are special telephone numbers, significantly shorter than full telephone
numbers, that can be used either to initiate a USSD session or to request a pull SMS. Short Codes are issued either by
the communications authority, MNO or, where applicable, the PRSP.
Short Message Peer-to- An open telecommunications industry standard protocol designed to provide a flexible data communication interface
Peer (SMPP) for the transfer of short message data. It is used to process bulk SMS messaging.
Short Message Service A ‘store and forward’ communication channel that involves the use of the telecom network and SMPP protocol to
(SMS) send a limited amount of text from one phone to another, or one to many.
SIM Application Toolkit A standard of the GSM system which enables the Subscriber Identity Module, or SIM, to initiate actions which can be
(STK) used for various value-added services.
Smart app An application software designed to run on smartphones, tablet computers and other mobile devices.
Smart card A smart card, chip card, or integrated circuit card is any pocket-sized card with embedded integrated circuits.
Smart cards can provide identification, authentication, data storage, and application processing via an embedded
microchip.
Software as a Service SaaS is s software licensing delivery model in which software is licensed on a subscription basis and made accessible
(SaaS) via the Internet as a hosted service, instead of installing and maintaining software.
Transaction A security protocol that works on the basis of one factor of authentication being generated only when needed,
Authentication Numbers namely at log in or transaction posting, and acts as a single-use password or PIN. The term is interchangeable with
(TAN) One Time Passwords.
Unstructured A protocol used by GSM mobile devices to communicate with the service provider’s computers/network. This
Supplementary Service channel is supported by all GSM handsets, enabling an interactive session consisting of a two-way exchange of
Data (USSD) messages based on a defined application menu.
User Acceptance Testing The testing process that occurs at the end of a software development process whereby the actual software users test
(UAT) the software to make sure it can handle the required tasks in real-world scenarios, according to specifications. In this
context, the ADC system would be tested to confirm it meets the agreed specifications and requirements of the FSP.
Virtual Private Network A private data network that makes use of the public telecommunication infrastructure, maintaining privacy through
(VPN) the use of a tunnelling protocol and security procedures. It enables a computer to send and receive data across
shared or public networks as if it is directly connected to the private network, while benefiting from the functionality,
security, and management policies of the private network.
Web API A set of HTTP request messages that have defined structured response messages. These messages can be written in
various languages such as XML or JSON format.
Web app A software application that is created in a browser-supported programming language (such as the combination of
JavaScript, HTML, and CSS) and runs in a Web browser relying on the browser to render the application. Web apps
function very much as a standard Internet website using a URL, but the size and features are designed to display and
interact better on a mobile device than on a traditional website.
Wi-Fi Local area wireless technology that allows an electronic device to exchange data or connect to the Internet using
radio waves.
Charlene Bachman
Charlene Bachman is a development finance professional working as the Business
Development Manager for Software Group in Asia Pacific. With experience working
with financial institutions across Latin America, Asia and the Pacific, Charlene
promotes the use of delivery channels and technology solutions that aim to expand
the reach of financial inclusion, increase operational efficiency and facilitate access
to financial services. Prior to joining Software Group, Charlene worked in Global
Investments at Accion International where she supported multiple impact investing
funds targeting the MFI and Fintech sectors with a range of business development,
investment analysis and portfolio management activities. Charlene holds dual
bachelor degrees in Business Administration and International Studies from American
University in Washington, DC.
Software Group
Software Group is among the leading global vendors of delivery channels solutions
for Microfinance Industry with experience in over 50 countries. They are helping their
clients to address the financial inclusion challenge by providing a variety of innovative
delivery channel solutions that helps expand outreach and improve efficiency. Learn
more about Software Group’s products and services at www.softwaregroup-bg.com
IFC
IFC, a member of the World Bank Group, is the largest global development institution
focused exclusively on the private sector. Working with private enterprises in about
100 countries, we use our capital, expertise, and influence to help eliminate extreme
poverty and boost shared prosperity. In FY14, we provided more than $22 billion
in financing to improve lives in developing countries and tackle the most urgent
challenges of development. For more information, visit www.ifc.org.
CONTACT DETAILS
Anna Koblanck
IFC, Sub-Saharan Africa
[email protected]
www.ifc.org/financialinclusionafrica