{"id":823,"date":"2025-01-23T17:50:05","date_gmt":"2025-01-23T17:50:05","guid":{"rendered":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/?post_type=chapter&#038;p=823"},"modified":"2025-05-05T21:07:04","modified_gmt":"2025-05-05T21:07:04","slug":"9__trashed","status":"publish","type":"chapter","link":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/","title":{"raw":"Chapter-9 Introduction to Fintech Regulations","rendered":"Chapter-9 Introduction to Fintech Regulations"},"content":{"raw":"https:\/\/youtu.be\/llRj0eo-Kek\r\n<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\">Learning Objectives<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n\r\nUpon completion of this chapter, students should be able to:\r\n<ul>\r\n \t<li>Analyze the role of FinTech regulations in ensuring consumer protection, financial stability, and market integrity.<\/li>\r\n \t<li>Evaluate the impact of insufficient regulation on financial crises, using the 2007\u20132008 housing bubble as a case study.<\/li>\r\n \t<li>Compare the regulatory requirements for different FinTech sectors, such as digital payments, peer-to-peer lending, and cryptocurrencies.<\/li>\r\n \t<li>Explain the significance of Know Your Customer (KYC) and Anti-Money Laundering (AML) regulations in preventing financial crimes.<\/li>\r\n \t<li>Assess the effectiveness of key U.S. financial regulations, such as the Dodd-Frank Act and the Bank Secrecy Act, in mitigating systemic risks.<\/li>\r\n \t<li>Describe how emerging technologies, including AI and blockchain, influence regulatory challenges and compliance requirements in FinTech.<\/li>\r\n \t<li>Discuss the role of rating agencies and regulatory bodies in maintaining financial stability and preventing deceptive financial practices.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n[ez-toc]\r\n<h2><strong>The Importance of FinTech Regulations<\/strong><\/h2>\r\nThe financial services industry is one of the most heavily regulated sectors globally due to its systemic importance, vulnerability to fraud, and its potential for abuse in areas like money laundering, terrorism financing, and fraudulent schemes. \u00a0FinTech amplifies these risks due to its reliance on emerging technologies and the speed at which it operates.\r\n\r\nEffective regulations serve several purposes:\r\n<ol>\r\n \t<li>Consumer Protection: Ensures that customers\u2019 data, money, and rights are safeguarded.<\/li>\r\n \t<li>Financial Stability: Protects against risks that could affect the broader economy.<\/li>\r\n \t<li>Market Integrity: Prevents fraud, insider trading, and market manipulation.<\/li>\r\n \t<li>Innovation Facilitation: Provides a framework for companies to innovate responsibly.<\/li>\r\n \t<li>Inclusion: Encourages access to financial services for underserved or unbanked populations.<\/li>\r\n \t<li>Cybersecurity and Data Privacy: Protects sensitive data from breaches and fraud.<\/li>\r\n<\/ol>\r\n<div class=\"textbox\">\r\n<h3><strong>Case Study 9-1 Signs of the Time \u2013 Burst of The Housing Bubble<\/strong><\/h3>\r\n<strong style=\"font-family: 'Sorts Mill Goudy', serif\">Fintech Regulations and Compliance (Regtech)<\/strong>\r\n\r\n[caption id=\"attachment_1142\" align=\"alignright\" width=\"300\"]<img class=\"wp-image-1142 size-medium\" src=\"http:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/foreclosure_image-300x300.jpg\" alt=\"A foreclosure sign on a home.\" width=\"300\" height=\"300\" \/> Foreclosure sign. Image generated by OpenAI\u2019s DALL\u00b7E[\/caption]\r\n<h4><strong>The \u201cHousing Bubble\u201d <\/strong><\/h4>\r\nThe 2007\u20132008 financial crisis was one of the most devastating economic events since the great depression in the United States, causing a global recession and exposing deep flaws in the US, as well as the global financial system (New Silver 2024). The crisis was rooted in a combination of risky financial practices, insufficient regulation, and a speculative housing bubble. This case study focuses on the US financial markets by examining the actions of key US institutions and the systemic weaknesses that collectively led to the near collapse of the US and the global banking sector.\r\n<h4><strong>The Housing Bubble and Subprime Lending<\/strong><\/h4>\r\nBetween 1997 and 2006, U.S. housing prices nearly doubled. This growth was fueled by low-interest rates, short supply of new housing starts, aggressive lending practices (e.g. Robo Signing), and speculative investment (Wikipedia 2024).\u00a0 Homeownership was marketed as a universally attainable goal, leading to a surge in mortgage demand. Subprime Lending became an acceptable form of lending and new investment vehicles were designed and marketed specifically targeting subprime markets.\u00a0 <em>Prime lending<\/em> refers to the rate published by industry associations in concert w\/ what the Federal Reserve Interest Rate charged (The Fed Reserve Prime rate for January 11th 2025 was 4.5%. with the financial industry lending rate at 3 % above prime.\u00a0 I.e., on January 11th, 2025 the overall interest rate for a prime mortgage was 7.5%). Prime represents the interest amount lenders can charge for individuals with low risk (i.e., stable career type and fully employed), high credit scores (better than 750) along with many other factors. <em>Subprime lending<\/em> is a form of lending to individuals with less than desirable credit worthiness. Subprime lending tends to be at a much higher interest rate and widely differs between one financial market vs. another.\u00a0 For example, credit card average interest rate on 11 January 2025 was nearly 28% with many credit card companies charging as high as 34% (Wallethub 2025).\r\n\r\nBack in 2006, many financial institutions, including Countrywide Financial and Ameriquest Mortgage, aggressively marketed subprime loans to borrowers with poor credit histories.\u00a0 These subprime mortgages often featured predatory terms, such as adjustable rates that significantly increased payments after an initial teaser period, high fees, and imposes unfair and abusive loan terms that strip the borrowers of equity.\r\n<h4><strong>Market Trading of Mortgage-Backed Securities (MBS)<\/strong><\/h4>\r\nInvestment banks, including Lehman Brothers, Bear Stearns, and Merrill Lynch, purchased subprime mortgages and bundled them into MBS. These securities were sold to institutional investors as high-yield, low-risk products, despite being backed by risky loans.\u00a0 Much higher risky activities included securitization of complex financial products such as Collateralized Debt Obligations (CDO).\u00a0 CDO were marketed by financial institutions like Goldman Sachs and Morgan Stanley that \u201cpooled\u201d various mortgage-backed securities into groups based on risk levels.\u00a0 Rating agencies, such as Moody\u2019s, Standard &amp; Poor\u2019s, and Fitch, assigned AAA ratings to many CDO groups, despite the underlying assets being subprime loans.\u00a0 Another \u201cmarketing\u201d scheme was known as Credit Default Swaps (CDS).\u00a0 American International Group (AIG) became a major seller of CDS, a type of insurance against the default of CDOs and other financial instruments. \u00a0AIG failed to set aside sufficient reserves to cover potential defaults, assuming housing prices would continue to rise.\r\n<h4><strong>Risky Leverage Ratios<\/strong><\/h4>\r\nInvestment banks like <strong>Lehman Brothers<\/strong> operated with leverage ratios exceeding 30:1, meaning they borrowed $30 for every $1 of equity. This made them highly vulnerable to declines in asset values.\r\n<h4><strong>Lack of Capital Reserves<\/strong><\/h4>\r\nMajor financial institutions relied on short-term funding through the <em>Repo market<\/em>. Repo is an agreement to sell securities at some point in time, with the intent to rebuy them at a better rate in the future (repurchase, or repo). An example of Repo loan is government securities such as bonds.\u00a0 Repo loans are essential liquidity assets however, their downside is that financial institutions buying the Repos have neglected to maintain adequate capital buffers.\u00a0 These buffers are established to help absorb losses when mortgage defaults surge.\r\n<h4><strong>\u00a0<\/strong><strong>Failures by Regulatory Bodies<\/strong><\/h4>\r\nDuring the later part of the 20th century, Financial Regulatory bodies allowed for security derivatives to be traded on what is known as Over The Counter (OTC) derivatives.\u00a0 Which meant that mortgages can be securitized and grouped as investment grade financial instruments to be sold on OTC\u2019s. This also allowed banks to exploit gaps in regulations pertaining to <em>Arbitrage. Arbitrage means to simultaneously buy and sell the same security priced lower on one exchange then immediately sell it on a different exchange listing it at a higher price<\/em>.\u00a0 This was the result of an act known as the <strong><em>Commodity Futures Modernization Act of<\/em> <em>2000<\/em><\/strong> which exempted over-the-counter derivatives from regulatory oversight.\u00a0 Shadow banking systems, including hedge funds and special-purpose vehicles (SPVs) operated outside traditional banking regulations.\r\n<h4><strong>Failures by Rating Agencies <\/strong><\/h4>\r\nRating companies, also known as credit rating agencies (CRAs), play a crucial role in financial markets by evaluating the creditworthiness of entities such as corporations, governments, and financial instruments such as stocks and bonds. These agencies assign ratings that indicate the likelihood of a borrower defaulting on their debt obligations. Credit ratings provide investors with a standardized measure of risk, which aids in making informed investment decisions.\u00a0 Although there are many rating companies, the three largest and most influential agencies are:\r\n<ol>\r\n \t<li>Standard &amp; Poor\u2019s (S&amp;P): Known for its credit ratings on various debt instruments and entities, S&amp;P provides ratings ranging from AAA (highest creditworthiness) to D (default).<\/li>\r\n \t<li>Moody\u2019s Investors Service: Like S&amp;P, Moody\u2019s rates the credit risk of debt issuers, assigning ratings from AAA (highest quality) to C (lowest quality, typically in default).<\/li>\r\n \t<li>Fitch Ratings: Fitch also evaluates credit risk and assigns ratings on a similar scale, helping investors gauge the likelihood of default.<\/li>\r\n<\/ol>\r\nThese agencies\u2019 ratings influence the interest rates that entities pay on their debt and the perception of risk associated with various investments.\r\n\r\nDuring the lead-up to the 2008 financial crisis, rating agencies played a controversial role by assigning high credit ratings to mortgage-backed securities (MBS) and collateralized debt obligations (CDOs), the majority of which were composed of subprime mortgages.\r\n\r\nDespite the inherent risks, rating agencies gave many of these financial products AAA ratings, suggesting they were as safe as government bonds. These high ratings made MBS and CDOs attractive to investors, including pension funds and financial institutions, which relied heavily on the agencies' assessments.\r\n\r\nHowever, as housing prices began to decline, many subprime borrowers defaulted on their loans, leading to significant losses for investors in these highly rated securities. The flawed ratings, combined with inadequate risk assessment and potential conflicts of interest (since agencies were paid by the issuers of the securities they rated), contributed to the collapse of the housing market and the broader financial crisis.\r\n\r\nIn the aftermath of the crisis, rating agencies faced widespread criticism and increased regulatory scrutiny. Reforms were introduced to improve transparency, address conflicts of interest, and enhance the accuracy of credit ratings to prevent a recurrence of such systemic failures.\r\n<h3><strong>Reflections for this case:<\/strong><\/h3>\r\n<ol>\r\n \t<li>What were the key triggers?<\/li>\r\n \t<li>Who were the financial institutions that failed?<\/li>\r\n \t<li>What were the effects on the economy?<\/li>\r\n \t<li>Did Regulations help? And what was clearly controlled by these regulations?<\/li>\r\n<\/ol>\r\n<\/div>\r\n<h3><strong>\u00a0<\/strong><strong>Key Areas of FinTech Regulation<\/strong><\/h3>\r\nFinTech is a broad industry encompassing various sectors, each subject to different types of regulations. Some of the key areas include:\r\n<h3><strong>Digital Payments and eMoney<\/strong><\/h3>\r\nRegulations in this area focus on ensuring the secure transfer of money and protecting consumer funds. Payment service providers and e-wallet platforms are often subject to:\r\n<ul>\r\n \t<li>Anti-Money Laundering (AML) and Know Your Customer (KYC) requirements.<\/li>\r\n \t<li>Licensing and operational standards to ensure fund protection.<\/li>\r\n \t<li>Compliance with international standards like <strong>PSD2<\/strong> in Europe, which focuses on securing electronic payments and fostering innovation by opening access to banking data.<\/li>\r\n<\/ul>\r\n<h4><strong>Peer-to-Peer Lending and Crowdfunding<\/strong><\/h4>\r\nP2P lending platforms and crowdfunding platforms enable direct lending between individuals or businesses without traditional financial institutions as intermediaries. These platforms are often regulated to:\r\n<ul>\r\n \t<li>Ensure transparency in the risk assessment process.<\/li>\r\n \t<li>Limit the amount individuals can borrow or invest.<\/li>\r\n \t<li>Provide clear guidelines on how the platforms handle investor funds and risks.<\/li>\r\n<\/ul>\r\n<h4><strong>Cryptocurrencies and Blockchain Technology<\/strong><\/h4>\r\nOne of the most challenging areas for regulators is cryptocurrencies and blockchain technology, given their decentralized nature and the borderless transactions they enable. Regulatory concerns include:\r\n<ul>\r\n \t<li>Preventing their use in illegal activities (e.g., money laundering, tax evasion).<\/li>\r\n \t<li>Clarifying their legal status (whether they are commodities, currencies, securities or digital assets and tokens).<\/li>\r\n \t<li>Ensuring that exchanges meet security standards to protect users from fraud.<\/li>\r\n \t<li>Emerging frameworks such as the <strong>Markets in Crypto-Assets Regulation (MiCA)<\/strong> in the EU aim to establish clear rules for crypto asset service providers.<\/li>\r\n<\/ul>\r\n<h4><strong>Insurtech<\/strong><\/h4>\r\nInsurance technology companies, or InsurTech\u2019s, are heavy users of AI and big data for Actuary, Underwriting, Claims Processing, and customer service. Regulatory challenges include:\r\n<ul>\r\n \t<li>Data privacy concerns regarding the use of consumer data.<\/li>\r\n \t<li>Transparency in how AI makes decisions in underwriting and claims settlement.<\/li>\r\n \t<li>Ensuring new insurance models comply with existing insurance laws.<\/li>\r\n<\/ul>\r\n<h4><strong>PayTech<\/strong><\/h4>\r\nOne of the most significant advancements within Fintech are electronic payments (ePayments). ePayment technologies include digital wallets, mobile payment systems, and peer-to-peer transfer platforms. While these innovations offer convenience, speed, and efficiency, they also introduce new regulatory challenges and risks. Regulatory concerns include:\r\n<ol>\r\n \t<li><strong>Consumer Protection:<\/strong> ePayment platforms handle vast amounts of sensitive personal and financial data. Regulators must ensure these platforms maintain robust data security and privacy standards to protect consumers from fraud and identity theft.<\/li>\r\n \t<li><strong>Anti-Money Laundering (AML) and Counter-Terrorism Financing (CTF):<\/strong> The digital nature of ePayments makes them susceptible to misuse for illegal activities. Regulatory frameworks often require stringent AML and CTF compliance measures, such as monitoring transactions and reporting suspicious activities.<\/li>\r\n \t<li><strong>Systemic Risk and Stability:<\/strong> As ePayment systems grow in scale, their failure could pose risks to the broader financial system. Regulators focus on ensuring these systems have proper risk management and contingency plans in place.<\/li>\r\n \t<li><strong>Licensing and Oversight:<\/strong> Governments and central banks have established licensing requirements for ePayment providers to ensure their operations align with financial regulations and that they are subject to regular audits.<\/li>\r\n<\/ol>\r\n<h4><strong>Robo-Advisors and Algorithmic Trading<\/strong><\/h4>\r\nAutomated investment platforms and algorithmic trading systems, driven by machine learning and AI, bring new regulatory challenges such as:\r\n<ul>\r\n \t<li>Ensuring that investment advice is suitable and, in the client\u2019s, best interests.<\/li>\r\n \t<li>Monitoring for potential market manipulation or trading abuse.<\/li>\r\n \t<li>Licensing requirements for platforms offering financial advice.<\/li>\r\n<\/ul>\r\n<h4><strong>\u00a0<\/strong><strong>US Financial Regulatory and Compliance System <\/strong><\/h4>\r\nThe United States financial system is one of the most complex and regulated in the world. Various federal and state agencies oversee different sectors of financial services, ensuring market stability, consumer protection, and the prevention of financial crimes. \u00a0The financial Industry serves the US economy and as such it is organized by several economic sectors such as Banking, Investment, etc. Moreover, many of the regulatory system requirements have been on the books, so to speak, for more than 100 years. \u00a0In this section we are only interested in key regulatory mandates of the last few decades.\u00a0 \u00a0In the US, the financial sector (i.e., what we spend money on) is composed of 11 sectors:\r\n<ul>\r\n \t<li>\u00a0Communication Services<\/li>\r\n \t<li>Consumer Discretionary (leisure, travel, entertainment, etc.)<\/li>\r\n \t<li>\u00a0Consumer Staples (food, education, clothing, transportation, etc.)<\/li>\r\n \t<li>Energy<\/li>\r\n \t<li>Financials (Banking, Insurance, Investments, etc.)<\/li>\r\n \t<li>Health Care<\/li>\r\n \t<li>Industrials (Machinery, Automotive, Furnishings, etc)<\/li>\r\n \t<li>Information Technology<\/li>\r\n \t<li>Materials (Think of Home depot)<\/li>\r\n \t<li>Real Estate, and<\/li>\r\n \t<li>Utilities.<\/li>\r\n<\/ul>\r\n<h3><strong>Banking Regulations<\/strong><\/h3>\r\nBanking regulations in the U.S. aim to ensure the soundness and stability of the financial system, safeguard consumer deposits, and promote fair lending practices.\r\n<h4><strong>Dodd-Frank Wall Street Reform and Consumer Protection Act (2010)<\/strong><\/h4>\r\nEnacted in response to the 2008 financial crisis, Dodd-Frank, as it is better known, is a comprehensive set of financial reforms aimed at reducing risks in the U.S. financial system (Dodd Frank 2010) . Key provisions of the act include:\r\n<ul>\r\n \t<li style=\"list-style-type: none\">\r\n<ul>\r\n \t<li>Established the <strong><em>Consumer Financial Protection Bureau (CFPB)<\/em><\/strong> to protect consumers from abusive financial practices. Specifically, its stated moto is \u201con your side\u201d(Consumer Finance 2025).\u00a0 It investigates and takes action against a credit card companies that may be charging excessive fees or engaging in deceptive practices when informing customers about their interest rates, essentially protecting consumers from unfair financial practices by monitoring companies and enforcing consumer protection laws.<\/li>\r\n \t<li>Introduced the <strong><em>Volcker Rule<\/em><\/strong>, limiting banks from engaging in proprietary trading. It prohibits banks short-term trading of certain securities, derivatives, commodity futures, and options for their own account.<\/li>\r\n \t<li>Created <strong><em>Systemically Important Financial Institutions (SIFIs)<\/em><\/strong>, requiring heightened oversight of large banks. A SIFI, are those that are viewed as \u201ctoo big to fail\u201d and imposed extra regulatory burdens to prevent them from going under (Investopedia 2023)<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<h4><strong>Federal Deposit Insurance Act (FDIA) (1950 - amended in 2023<\/strong><\/h4>\r\nFDIA was enacted in 1950 to ensure the proper governance and operations of the<strong> <em>Federal Deposit Insurance Corporation (FDIC 2023)<\/em><\/strong><em>.<\/em><strong>\u00a0 <\/strong>Its key provisions include:\r\n<ul>\r\n \t<li style=\"list-style-type: none\">\r\n<ul>\r\n \t<li>Ensures that depositors\u2019 accounts are insured up to $250,000 per depositor, per bank.<\/li>\r\n \t<li>The FDIC monitors the financial health of banks and can intervene in cases of bank failures.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<h4><strong>Gramm-Leach-Bliley Act (GLBA) (1999)<\/strong><\/h4>\r\nGLBA is also known as the Financial Modernization Act<strong>, <\/strong>\u00a0in response to technology advancement that hackers exploited. It repealed many sections of much older laws and enacted new ones such as safeguard rules against collection of personal information, prohibiting <em>pretexting<\/em> (pretending to be someone else to access their information under false pretenses) (TechTarget 2025). In addition, it allowed financial institutions to offer a combination of services such as commercial banking, securities, and insurance. GLBA key provisions include:\r\n<ul>\r\n \t<li style=\"list-style-type: none\">\r\n<ul>\r\n \t<li>Removed barriers preventing banks, securities companies, and insurance firms from merging.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<ul>\r\n \t<li style=\"list-style-type: none\">\r\n<ul>\r\n \t<li>Requires financial institutions to explain their information-sharing practices to consumers and to safeguard sensitive data.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<h4><strong>Community Reinvestment Act (CRA) (1977)<\/strong><\/h4>\r\nThe Community Reinvestment Act (CRA) was created to address the issue of \"redlining\", a practice where banks would refuse to provide loans or other financial services to residents of certain neighborhoods, usually low-income or minority communities, leading to systemic inequities in access to credit (Federal Reserve 1977). Essentially, the CRA aims to encourage banks to meet the credit needs of all communities they operate in, including low- and moderate-income neighborhoods, by making it a requirement to do so while maintaining safe and sound banking practices. CRA key provision include:\r\n<ul>\r\n \t<li style=\"list-style-type: none\">\r\n<ul>\r\n \t<li>Banks are evaluated based on their efforts to provide loans and investments to underserved areas.<\/li>\r\n \t<li>Making redlining illegal.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<h4><strong>Bank Secrecy Act (BSA) (1970)<\/strong><\/h4>\r\nThe Bank Secrecy Act was enacted to combat Money Laundering, Financial Fraud and other organized crime financial activities. It requires financial institutions to assist U.S. government agencies in detecting and preventing financial criminal activities. \u00a0\u00a0The act is managed by the US Dept of Treasury, office of Financial Crimes Enforcement Network (FinCEN 2025).\u00a0 Its key provisions include:\r\n<ul>\r\n \t<li style=\"list-style-type: none\">\r\n<ul>\r\n \t<li>Banks must report any transaction over $10,000. And must establishes reporting and recordkeeping requirements to track and identify the source, volume and movement of currency into \/ out of the US banking system.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<h3><strong>Securities Regulations<\/strong><\/h3>\r\nSecurities regulations in the U.S. focus on protecting investors, maintaining fair and efficient markets, and ensuring the integrity of securities markets.\r\n<ol>\r\n \t<li>\r\n<h4><strong>Securities Act of 1933<\/strong><\/h4>\r\n<\/li>\r\n<\/ol>\r\nWas enacted in response to the 1929 crash of the stock market.\u00a0 It regulates the issuance of new securities in the primary market, ensuring that investors receive significant information regarding securities being offered.\u00a0 Key Provisions:\r\n<ul>\r\n \t<li style=\"list-style-type: none\">\r\n<ul>\r\n \t<li>Require companies to register securities with the <strong><em>Securities and Exchange Commission (SEC), est. 1934<\/em><\/strong><\/li>\r\n \t<li>Mandates full and fair disclosure to prevent fraud in the sale of securities.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<strong>\u00a0<\/strong>\r\n\r\n[caption id=\"attachment_980\" align=\"alignnone\" width=\"652\"]<img class=\"wp-image-980\" src=\"http:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/1929-stock-market-crash-aftermath-300x171.jpg\" alt=\"Chaos and misery post 1929 stock market collapse\" width=\"652\" height=\"372\" \/> Images of chaos and misery post 1929 stock market collapse. Image generated by OpenAI\u2019s DALL\u00b7E[\/caption]\r\n<ol start=\"2\">\r\n \t<li>\r\n<h4><strong>Securities Exchange Act of 1934<\/strong><\/h4>\r\n<\/li>\r\n<\/ol>\r\nThe Securities and Exchange Commission (SEC 2025) was created in 1934 in response to the 1929 stock market crash, with the primary goal of restoring public confidence in the financial markets by regulating securities trading and ensuring companies provided accurate information to investors, thereby preventing fraudulent practices and market manipulation. The Key Provisions in the act are:\r\n<ul>\r\n \t<li style=\"list-style-type: none\">\r\n<ul>\r\n \t<li>Prohibits insider trading and market manipulation.<\/li>\r\n \t<li>Created the <strong>SEC<\/strong>, granting it broad authority over securities markets.<\/li>\r\n \t<li>Introduces periodic financial disclosures (such as 10-K, 10-Q filings).<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<h3><strong>\u00a0<\/strong><strong>Corporate and Consumer Financial Regulations<\/strong><\/h3>\r\nCorporate fraud has existed as long as corporations themselves, often driven by greed, the pressure to meet financial targets, or the desire to manipulate markets. It involves deceptive practices by a company or its executives for financial or personal gain, often at the expense of stakeholders, employees, or the public.\u00a0 Early corporate fraud examples include the Railroad Fraud and the Charles Ponzi scheme\r\n<ol>\r\n \t<li>\r\n<h4><strong>Sarbanes-Oxley Act\u00a0 2002 (SOX)\u00a0<\/strong><\/h4>\r\n<\/li>\r\n<\/ol>\r\nEnacted in response to corporate scandals like Enron and WorldCom, it seeks to protect investors by improving the accuracy and reliability of corporate disclosures (American University 2002<strong>)<\/strong>\r\n\r\n. Key provisions include:\r\n<ul>\r\n \t<li>Establishes requirements for corporate governance and internal controls.<\/li>\r\n \t<li>Requires the CEO and CFO to personally certify the accuracy of financial reports.<\/li>\r\n \t<li>Introduces criminal penalties for fraudulent financial activity.<\/li>\r\n<\/ul>\r\n<ol start=\"2\">\r\n \t<li>\r\n<h4><strong>Truth in Lending Act (TILA) (1968)<\/strong><\/h4>\r\n<\/li>\r\n<\/ol>\r\nThe Truth in Lending Act (TILA) is a federal law that protects consumers from unfair credit practices and helps them make informed decisions about loans.\u00a0TILA requires lenders to provide standardized information about the terms and costs of loans including Average Annual Percentages, the right to cancel certain loans, and the ability to shop and compare different lenders. \u00a0TILA key provisions include:\r\n<ul>\r\n \t<li>Mandates the clear disclosure of interest rates, terms, and fees on consumer loans and credit cards.<\/li>\r\n \t<li>Provides consumers the right to rescind certain credit transactions involving a lien on their principal dwelling.<\/li>\r\n<\/ul>\r\n<ol start=\"3\">\r\n \t<li>\r\n<h4><strong>Fair Credit Reporting Act (FCRA) (1970)<\/strong><\/h4>\r\n<\/li>\r\n<\/ol>\r\nThe Fair Credit Reporting Act (FCRA) is a federal law that protects the accuracy, fairness, and privacy of consumer information (FTC 2023). The FCRA applies to consumer reporting agencies (CRAs), which are the entities that collect and sell information about consumers, such as credit bureaus, medical information companies, and tenant screening services. Its key provisions include:\r\n<ul>\r\n \t<li>Governs how credit reporting agencies collect and share consumer credit information.<\/li>\r\n \t<li>Provides consumers the right to access and dispute their credit reports.<\/li>\r\n<\/ul>\r\n<ol start=\"4\">\r\n \t<li>\r\n<h4><strong>Equal Credit Opportunity Act (<\/strong>Federal Reserve 1974)<\/h4>\r\n<\/li>\r\n<\/ol>\r\nThe purpose of ECOA is \u201cto promote the availability of credit to all creditworthy applicants without regard to race, color, religion, national origin, sex, marital status, or age (provided the applicant has the capacity to contract); because all or part of the applicant\u2019s income derives from any public assistance program; or, because the applicant has in good faith exercised any right under the Consumer Credit Protection Act\u201d (NCUA 2023).\u00a0 Key provisions of the ECOA include:\r\n<ul>\r\n \t<li>Lenders must provide equal access to credit.<\/li>\r\n \t<li>Requires lenders to inform applicants about why credit was denied.<\/li>\r\n<\/ul>\r\n<ol start=\"5\">\r\n \t<li><strong>Fair Debt Collection Practices Act (FDCPA) (1977)<\/strong><\/li>\r\n<\/ol>\r\nThe purpose of FDCPA is to regulates the, sometimes, abusive deceptive and unfair conduct of debt collectors and to protecting consumers from these practices (FDCPA 2010).\u00a0 Its key provisions include:\r\n<ul>\r\n \t<li>Prohibits debt collectors from using deceptive, unfair, or abusive practices.<\/li>\r\n \t<li>Sets restrictions on how and when debt collectors can contact consumers.<\/li>\r\n<\/ul>\r\n<ol start=\"6\">\r\n \t<li><strong>Consumer Financial Protection Act (CFPA) (2010)<\/strong><\/li>\r\n<\/ol>\r\n<strong>CFPA was e<\/strong>stablished by the <strong>Consumer Financial Protection Bureau (CFPB)<\/strong> to oversee consumer financial products and services and to protect consumers by ensuring that financial markets are fair and competitive (FTC 2010). The CFPB was established by the Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010.\u00a0 Its key provisions include:\r\n<ul>\r\n \t<li style=\"list-style-type: none\">\r\n<ul>\r\n \t<li>Empowers the CFPB to regulate mortgages, credit cards, and other financial products.<\/li>\r\n \t<li>Enforces laws that prohibit unfair, deceptive, or abusive acts in the consumer finance market.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<ol start=\"7\">\r\n \t<li><strong>Insurance Regulations<\/strong><\/li>\r\n<\/ol>\r\nInsurance regulation in the U.S. is primarily date back to the founding era of the US in 1799. It mandated that Insurance regulations be conducted at the state level, with federal regulations applying in limited circumstances.\u00a0 \u00a0The most sweeping legislation on insurance, however occurred in 2010 with the passing of the Affordable Care Act of 2010 <i>(ACA 2010)<\/i>.\u00a0 The act, better known as Obamacare, in reference to President Obama, introduced comprehensive reforms to the health insurance market, aimed at increasing coverage, improving healthcare quality, and lowering costs.\u00a0 Its key provisions included:\r\n<ul>\r\n \t<li style=\"list-style-type: none\">\r\n<ul>\r\n \t<li>Requires insurance companies to cover pre-existing conditions.<\/li>\r\n \t<li>Mandates individuals to have health insurance or pay a penalty (individual mandate, later repealed in 2017).<\/li>\r\n \t<li>Sets up health insurance exchanges where consumers can compare and purchase insurance plans.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\nThe Affordable Care Act has seen many changes since its inception in terms of benefits, coverage availability, out of pocket expenses and monthly premium costs \u00a0<i>(ACA 2010)<\/i>.\r\n<h2><strong>Industry Financial Standards and Regulations<\/strong><\/h2>\r\n<strong>\u00a0<\/strong>The Financial Industry Regulatory Authority (FINRA 2025) was created in 2007 by merging the National Association of Securities Dealers (NASD) with the New York Stock Exchange's (NYSE) member regulation, enforcement, and arbitration functions.\u00a0 FINRA writes rules and regulations for professionals in the financial industry, licenses these individuals and organizations, and provides avenues for compensation and complaints for victims of negligent financial advising.\u00a0 FINRA role in the economy is highlighted by its role in combatting financial crimes such as money laundering and financial fraud. FINRA conducts regulatory oversight of more than 5,000 securities firms and 666,000 registered representatives. It is responsible for rule writing, firm examination, enforcement and arbitration and mediation functions, along with all functions that were previously overseen solely by NASD, including market regulation under contract for NASDAQ, the American Stock Exchange, the International Securities Exchange and the Chicago Climate Exchange.\r\n<h2>Know Your Customer (KYC)<\/h2>\r\n<p data-pm-slice=\"1 3 []\">Know Your Customer (KYC) refers to the process through which businesses verify the identity of their clients. It is a critical component of risk management and compliance programs, particularly within the financial services industry. The primary purpose of KYC is to ensure that customers are who they claim to be, thereby minimizing the risk of fraud, money laundering, and other illicit activities.\u00a0 KYC protocols typically involve collecting and verifying customer information such as name, address, date of birth, and government-issued identification.<\/p>\r\n\r\n\r\n[caption id=\"attachment_981\" align=\"alignnone\" width=\"572\"]<img class=\"wp-image-981\" src=\"http:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/KYC-image-300x171.jpg\" alt=\"Depicting trading floor w\/ Morgan Stanley and Lehman Brother's \" width=\"572\" height=\"326\" \/> Depicting trading floor w\/ Morgan Stanley and Lehman Brother's highlighted. Image generated by OpenAI\u2019s DALL\u00b7E[\/caption]\r\n\r\n<em>Image 9-5 depicting trading floor w\/ Morgan Stanley and Lehman Brother's highlighted. Courtesy ChatGPT<\/em>\r\n<h3>KYC as a Regulation<\/h3>\r\nKYC is not merely a process; it is a regulatory requirement mandated by financial authorities worldwide. It forms the backbone of anti-money laundering (AML) and combating the financing of terrorism (CFT) frameworks. Regulatory bodies such as the Financial Action Task Force (FATF), the European Union\u2019s Anti-Money Laundering Directives (AMLD), and the U.S. Patriot Act have incorporated KYC requirements into their guidelines.\r\n\r\nFor instance, in the United States, the Financial Crimes Enforcement Network (FinCEN) enforces KYC under the Bank Secrecy Act (BSA). Financial institutions are <strong>legally obligated<\/strong> to perform customer due diligence (CDD) and enhanced due diligence (EDD) when dealing with high-risk customers or transactions. Failure to comply with KYC regulations can result in severe penalties, fines, and reputational damage for the institution.\r\n<h3>Historical Evolution of KYC<\/h3>\r\nKYC practices have evolved significantly over the years. The concept gained prominence in the 1990s and early 2000s, as global financial systems became increasingly interconnected and susceptible to abuse. The events of September 11, 2001, were pivotal in shaping modern KYC regulations. Governments and regulatory agencies around the world intensified efforts to combat terrorism financing, leading to stricter KYC and AML laws. The introduction of the USA Patriot Act in 2001 marked a watershed moment, mandating that financial institutions implement robust identity verification and transaction monitoring processes.\r\n\r\nAdditionally, international organizations such as FATF have played a significant role in standardizing KYC practices. FATF\u2019s 40 Recommendations outlining global best practices for AML and CFT and encouraging member countries to adopt comprehensive KYC frameworks.\r\n<h3>Who Uses KYC?<\/h3>\r\nKYC is utilized by a wide array of organizations across multiple industries, though it is most prominently associated with financial institutions. The following entities commonly employ KYC protocols:\r\n<ol start=\"1\" data-spread=\"false\">\r\n \t<li><strong>Banks and Credit Unions<\/strong>: To open accounts, approve loans, and monitor transactions.<\/li>\r\n \t<li><strong>Payment Processors<\/strong>: To verify users making online or cross-border transactions.<\/li>\r\n \t<li><strong>Insurance Companies<\/strong>: To identify policyholders and assess risks.<\/li>\r\n \t<li><strong>Fintech Companies<\/strong>: To onboard users and maintain regulatory compliance.<\/li>\r\n \t<li><strong>Cryptocurrency Exchanges<\/strong>: To prevent the use of digital assets for illicit activities.<\/li>\r\n \t<li><strong>Investment Firms<\/strong>: To comply with securities regulations and prevent insider trading.<\/li>\r\n \t<li><strong>Government Agencies<\/strong>: For social welfare programs and subsidies.<\/li>\r\n<\/ol>\r\n<h3>How KYC Is Used?<\/h3>\r\nThe KYC process typically involves several steps:\r\n<ol start=\"1\" data-spread=\"false\">\r\n \t<li><strong>Customer Identification Program (CIP)<\/strong>: Collecting basic information such as name, address, date of birth, and identification numbers.<\/li>\r\n \t<li><strong>Document Verification<\/strong>: Validating the authenticity of submitted documents, such as passports, driver\u2019s licenses, or utility bills.<\/li>\r\n \t<li><strong>Risk Assessment<\/strong>: Evaluating the customer\u2019s risk profile based on factors like geographic location, occupation, and transaction patterns.<\/li>\r\n \t<li><strong>Ongoing Monitoring<\/strong>: Continuously reviewing transactions and updating customer information to detect suspicious activities.<\/li>\r\n \t<li><strong>Enhanced Due Diligence (EDD)<\/strong>: Applying additional scrutiny to high-risk customers, such as politically exposed persons (PEPs).<\/li>\r\n<\/ol>\r\nTechnology has greatly enhanced the efficiency of KYC processes. Advanced tools such as artificial intelligence (AI), machine learning (ML), and biometric verification are increasingly used to streamline identity verification and detect anomalies.\r\n<h3>KYC In Fintech<\/h3>\r\nKYC has had a profound impact on the fintech industry. While fintech companies have introduced innovative financial solutions, they operate in a heavily regulated environment that demands stringent compliance with KYC norms. Here are some key impacts:\r\n<ol start=\"1\" data-spread=\"false\">\r\n \t<li><strong>Improved Trust and Security<\/strong>: KYC protocols build trust between fintech providers and their customers by ensuring secure transactions and protecting against fraud.<\/li>\r\n \t<li><strong>Operational Challenges<\/strong>: Implementing KYC processes can be resource-intensive, particularly for startups with limited budgets. Fintech companies often rely on third-party providers for KYC solutions.<\/li>\r\n \t<li><strong>Innovation in Verification<\/strong>: The need for compliance has driven technological advancements, such as automated KYC platforms, eKYC (electronic KYC), and blockchain-based identity solutions.<\/li>\r\n \t<li><strong>Market Expansion<\/strong>: Robust KYC practices enable fintech firms to expand into new markets by complying with local regulations.<\/li>\r\n \t<li><strong>Consumer Friction<\/strong>: Excessive or poorly implemented KYC processes can lead to user dissatisfaction and increased drop-off rates during onboarding.<strong>\u00a0<\/strong><\/li>\r\n<\/ol>\r\n<h2><strong>\u00a0<\/strong>Payment Card Industry Data Security Standard (PCI DSS)<\/h2>\r\nPayment Card Industry Data Security Standard (PCI DSS) is not a government regulation; it is a set of security standards established by the major credit card companies like Visa, Mastercard, and American Express, meaning it is enforced by the private sector through contractual agreements with merchants, not by a government agency.\r\n\r\nThe Payment Card Industry Data Security Standard (PCI DSS) is a set of 12 security standard requirements (designed to ensure that all entities that accept, process, store, or transmit credit card information maintain a secure environment (PCI Security Standards 2024). \u00a0Developed by the Payment Card Industry Security Standards Council (PCI SSC), PCI DSS aims to protect cardholder data and mitigate the risks associated with data breaches and fraud in payment transactions.\r\n\r\nThe PCI SSC was founded in 2006 by major payment card networks, including Visa, MasterCard, American Express, Discover, and JCB. The standard is widely adopted across industries that handle payment card data, ensuring a unified approach to data security.\r\n\r\n<strong>Key Points of PCI DSS<\/strong>\r\n\r\nThe PCI DSS standard is structured around six overarching goals, comprising 12 requirements. Below are the key points:\r\n\r\n<strong>Requirement 1<\/strong>: Install and maintain a firewall configuration to protect cardholder data.\r\n\r\n<strong>Requirement 2<\/strong>: Do not use vendor-supplied defaults for system passwords and other security parameters.\r\n\r\n<strong>Requirement 3<\/strong>: Protect stored cardholder data (e.g., encryption, masking).\r\n\r\n<strong>Requirement 4<\/strong>: Encrypt transmission of cardholder data across open, public networks.\r\n\r\n<strong>Requirement 5<\/strong>: Protect systems against malware and regularly update anti-virus software.\r\n\r\n<strong>Requirement 6<\/strong>: Develop and maintain secure systems and applications.\r\n\r\n<strong>Requirement 7<\/strong>: Restrict access to cardholder data by business need-to-know.\r\n\r\n<strong>Requirement 8<\/strong>: Identify and authenticate access to system components.\r\n\r\n<strong>Requirement 9<\/strong>: Restrict physical access to cardholder data.\r\n\r\n<strong>Requirement 10<\/strong>: Track and monitor all access to network resources and cardholder data.\r\n\r\n<strong>Requirement 11<\/strong>: Regularly test security systems and processes.\r\n\r\n<strong>Requirement 12<\/strong>: Maintain a policy that addresses information security for all personnel.\r\n<h2><strong>How PCI DSS Is Used<\/strong><\/h2>\r\nPCI DSS applies to all organizations that handle payment card data, including merchants, financial institutions, and service providers. Compliance is achieved through a combination of technical and operational measures, as outlined below:\r\n\r\n<strong>Self-Assessment or External Audits<\/strong>: Organizations determine their compliance level through self-assessment questionnaires (SAQs) or external audits by Qualified Security Assessors (QSAs).\r\n\r\n<strong>Implementation of Security Controls<\/strong>: Businesses deploy encryption, firewalls, intrusion detection systems, and other controls to safeguard cardholder data.\r\n\r\n<strong>Regular Scanning and Penetration Testing<\/strong>: Approved Scanning Vendors (ASVs) conduct periodic vulnerability scans to identify and mitigate security risks.\r\n\r\n<strong>Employee Training<\/strong>: Personnel are educated on best practices for handling payment card data and identifying potential security threats.\r\n\r\n<strong>Reporting and Documentation<\/strong>: Organizations submit compliance reports to acquiring banks or payment processors.\r\n<h2><strong>Implications of PCI DSS<\/strong><\/h2>\r\nThe adoption of PCI DSS has far-reaching implications for various stakeholders:\r\n<ol>\r\n \t<li><strong> For Merchants. <\/strong>Compliance enhances customer trust and reduces the risk of costly data breaches. Non-compliance, however, can result in fines ranging from $5,000 to $100,000 per month, depending on the severity of the violation.<\/li>\r\n<\/ol>\r\n<ol start=\"2\">\r\n \t<li><strong> For Consumers.\u00a0 <\/strong>PCI DSS provides an additional layer of security, reducing the likelihood of unauthorized access to personal and financial information.<\/li>\r\n<\/ol>\r\n<ol start=\"3\">\r\n \t<li><strong> For Fintech and Payment Processors.\u00a0 <\/strong>Fintech companies, which often handle high volumes of cardholder data, rely heavily on PCI DSS compliance to operate seamlessly. Compliance enables market expansion, partnerships with financial institutions, and a competitive edge in the industry.<\/li>\r\n<\/ol>\r\n<ol start=\"4\">\r\n \t<li><strong> For the Industry at Large. <\/strong>PCI DSS fosters a culture of security within the payment ecosystem, ensuring that all stakeholders adhere to a uniform set of standards.<\/li>\r\n<\/ol>\r\n<h2>EuroPay, Master Card and Visa (EMV) Standards Compliance for Point-of-Sale Systems<\/h2>\r\nEMV standards govern the use of chip-enabled cards, reducing the risk of fraud compared to magnetic stripe cards.\u00a0 POS systems must support EMV-compliant hardware to avoid liability for certain types of fraudulent transactions.\r\n<ol>\r\n \t<li><strong>Consumer Financial Protection Laws . <\/strong>POS systems must comply with laws ensuring clear and accurate disclosure of transaction details. For example, the Truth in Lending Act (TILA) requires transparency in credit card transactions, while the Electronic Fund Transfer Act (EFTA) covers debit card transactions.<\/li>\r\n<\/ol>\r\n<ol start=\"2\">\r\n \t<li><strong>Cash Transactions<\/strong><\/li>\r\n \t<li><strong>Anti-Money Laundering (AML) Regulations<\/strong><\/li>\r\n<\/ol>\r\nBusinesses must comply with AML laws, such as the Bank Secrecy Act (BSA), to prevent illegal financial activities. Large cash transactions may require reporting to the Financial Crimes Enforcement Network (FinCEN).\r\n\r\n<strong>Sales Tax Compliance.<\/strong> POS systems must accurately calculate and report sales taxes for cash transactions, ensuring compliance with local and state tax regulations.\r\n\r\n<strong>Check Verification and Fraud Prevention.\u00a0 <\/strong>POS systems that process checks must integrate verification tools to detect fraudulent or insufficiently funded checks. This may involve compliance with the Uniform Commercial Code (UCC) and applicable state laws.\r\n\r\n<strong>Electronic Check Processing (ECP) Standards<\/strong>.\u00a0 For businesses that use electronic check processing, compliance with the Federal Reserve\u2019s rules on electronic checks, including Regulation CC, is mandatory. POS systems must ensure secure storage and processing of check data.\r\n\r\n<strong>Digital Wallet Transactions &amp;\u00a0Tokenization and Encryption<\/strong>\r\n\r\nDigital wallets such as Apple Pay, Google Pay, and Samsung Pay rely on tokenization to protect transaction data.\u00a0 POS systems must support these technologies to ensure compliance with PCI DSS and other data protection standards such as consumer Data privacy laws.\u00a0 Digital wallet transactions often involve storing sensitive consumer data. POS systems that interact with Digital Wallets must comply with data protection laws such as the General Data Protection Regulation (GDPR) in the EU or the California Consumer Privacy Act (CCPA) in the United States. Businesses accepting cryptocurrencies must comply with AML and KYC regulations, ensuring that POS systems can verify the identity of users and track transaction origins.\r\n<ol start=\"5\">\r\n \t<li>Cryptocurrency Transactions<\/li>\r\n \t<li>Anti-Money Laundering (AML) and Know Your Customer (KYC) Requirements<\/li>\r\n<\/ol>\r\n<ol>\r\n \t<li>Tax Reporting<\/li>\r\n<\/ol>\r\nCryptocurrency transactions are subject to specific tax reporting requirements. POS systems must integrate with tools to calculate capital gains or losses and issue appropriate tax documentation.\r\n<ol>\r\n \t<li>Blockchain and Smart Contract Standards<\/li>\r\n<\/ol>\r\nPOS systems facilitating cryptocurrency payments may need to adhere to emerging standards for blockchain transactions to ensure interoperability and security.\r\n<ol start=\"6\">\r\n \t<li>Accessibility and Anti-Discrimination Laws<\/li>\r\n<\/ol>\r\nPOS systems must comply with accessibility standards such as the Americans with Disabilities Act (ADA) to ensure equitable access for individuals with disabilities. This includes offering features like tactile keypads or screen reader compatibility.\r\n<ol start=\"7\">\r\n \t<li>Security and Breach Notification Laws<\/li>\r\n<\/ol>\r\nMany jurisdictions require businesses to notify customers and authorities in the event of a data breach involving POS systems. These laws include:\r\n<ul>\r\n \t<li>The General Data Protection Regulation (GDPR) in the EU.<\/li>\r\n \t<li>State-specific breach notification laws in the United States, such as California\u2019s Civil Code \u00a71798.82.<\/li>\r\n<\/ul>\r\n<div class=\"textbox\">\r\n<div class=\"group\/conversation-turn relative flex w-full min-w-0 flex-col agent-turn\">\r\n<div class=\"flex-col gap-1 md:gap-3\">\r\n<div class=\"flex max-w-full flex-col flex-grow\">\r\n<div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"5555fc12-a2a4-4540-bc00-a0effb0de35c\" data-message-model-slug=\"gpt-4o\">\r\n<div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\">\r\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\r\n<h3><strong>Licenses and Attribution<\/strong><\/h3>\r\n<h4>CC Licensed Content, Original<\/h4>\r\n<span data-teams=\"true\">This educational material includes AI-generated content from ChatGPT by OpenAI. The original content created by Mohammed Kotaiche from Hillsborough Community College is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License (<a id=\"menur5so\" class=\"fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn\" title=\"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/deed.en\" href=\"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/deed.en\" rel=\"noreferrer noopener\" aria-label=\"Link CC BY-NC 4.0\">CC BY-NC 4.0<\/a>).\u00a0<\/span>\r\n<div class=\"flex-shrink-0 flex flex-col relative items-end\">\r\n<div>\r\n<div class=\"pt-0\">\r\n<div class=\"gizmo-bot-avatar flex h-8 w-8 items-center justify-center overflow-hidden rounded-full\">\r\n<div class=\"relative p-1 rounded-sm flex items-center justify-center bg-token-main-surface-primary text-token-text-primary h-8 w-8\">All images in this textbook generated with DALL-E are licensed under the terms provided by OpenAI, allowing for their free use, modification, and distribution with appropriate attribution.<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n\r\n<hr \/>\r\n\r\n<\/div>\r\n<\/div>\r\n<div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\">\r\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\r\n<div>\r\n<h4><strong>CC Licensed Content Included<\/strong><\/h4>\r\n<ul>\r\n \t<li><b>FDIC 2023.<\/b> <i>90 Years of Financial Security<\/i>. Retrieved from <a href=\"https:\/\/www.fdic.gov\/90years#:~:text=September%2021%2C%201950%20The%20Federal,Truman.\" target=\"_blank\" rel=\"noopener\">FDIC\u2019s 90 Years of Financial Security<\/a>.<\/li>\r\n \t<li><b>Federal Reserve.<\/b> <i>Fair Lending Regulation B<\/i>. Retrieved from <a href=\"https:\/\/www.federalreserve.gov\/boarddocs\/supmanual\/cch\/fair_lend_reg_b.pdf\" target=\"_blank\" rel=\"noopener\">Federal Reserve\u2019s Fair Lending Regulation B<\/a>.<\/li>\r\n \t<li><b>FTC.<\/b> <i>Fair Debt Collection Practices Act<\/i>. Retrieved from <a href=\"https:\/\/www.ftc.gov\/legal-library\/browse\/rules\/fair-debt-collection-practices-act-text#802\" target=\"_blank\" rel=\"noopener\">FTC\u2019s Fair Debt Collection Practices Act<\/a>.<\/li>\r\n \t<li><b>FTC 2010.<\/b> <i>Fair Credit Reporting Act 2023<\/i>. Retrieved from <a href=\"https:\/\/www.ftc.gov\/legal-library\/browse\/statutes\/fair-credit-reporting-act\" target=\"_blank\" rel=\"noopener\">FTC\u2019s Fair Credit Reporting Act<\/a>.<\/li>\r\n \t<li><b>HHS.<\/b> <i>About the Affordable Care Act (ACA) 2010<\/i>. Retrieved from <a href=\"https:\/\/www.hhs.gov\/healthcare\/about-the-aca\/index.html\" target=\"_blank\" rel=\"noopener\">HHS\u2019s Overview of the Affordable Care Act<\/a>.<\/li>\r\n \t<li><b>KFF.<\/b> <i>Health Policy 101: The Affordable Care Act<\/i>. Retrieved from <a href=\"https:\/\/www.kff.org\/health-policy-101-the-affordable-care-act\/?entry=table-of-contents-what-is-the-affordable-care-act\" target=\"_blank\" rel=\"noopener\">KFF\u2019s Guide to the Affordable Care Act<\/a>.<\/li>\r\n \t<li><b>NCUA.<\/b> <i>Equal Credit Opportunity Act (Regulation B) 2023<\/i>. Retrieved from <a href=\"https:\/\/ncua.gov\/regulation-supervision\/manuals-guides\/federal-consumer-financial-protection-guide\/compliance-management\/lending-regulations\/equal-credit-opportunity-act-regulation-b\" target=\"_blank\" rel=\"noopener\">NCUA\u2019s Equal Credit Opportunity Act Regulation B<\/a>.<\/li>\r\n \t<li><b>SEC.<\/b> <i>U.S. Securities and Exchange Commission<\/i>. Retrieved from <a href=\"https:\/\/www.sec.gov\/\" target=\"_blank\" rel=\"noopener\">U.S. Securities and Exchange Commission (SEC)<\/a>.<\/li>\r\n \t<li><b>Wikipedia.<\/b> <i>2010 United States Foreclosure Crisis<\/i>. Retrieved from <a href=\"https:\/\/en.wikipedia.org\/wiki\/2010_United_States_foreclosure_crisis\" target=\"_blank\" rel=\"noopener\">Wikipedia\u2019s 2010 United States Foreclosure Crisis<\/a>.<\/li>\r\n<\/ul>\r\n<\/div>\r\n\r\n<hr \/>\r\n\r\n<h4>Other Licensed Content Included<\/h4>\r\n<ul>\r\n \t<li><b>American University.<\/b> <i>Program Evaluation: The Sarbanes-Oxley Act of 2002<\/i>. Retrieved from <a href=\"https:\/\/www.american.edu\/spa\/publicpurpose\/upload\/program-evaluation-the-sarbanes-oxley-act-of-2002.pdf\" target=\"_blank\" rel=\"noopener\">American University\u2019s Report on the Sarbanes-Oxley Act<\/a>.<\/li>\r\n \t<li><b>CFTC.<\/b> <i>Dodd-Frank Act Overview<\/i>. Retrieved from <a href=\"https:\/\/www.cftc.gov\/LawRegulation\/DoddFrankAct\/index.htm\" target=\"_blank\" rel=\"noopener\">CFTC\u2019s Overview of the Dodd-Frank Act<\/a>.<\/li>\r\n \t<li><b>Congress.<\/b> <i>The Dodd-Frank Wall Street Reform and Consumer Protection Act<\/i>. Retrieved from <a href=\"https:\/\/www.congress.gov\/111\/plaws\/publ203\/PLAW-111publ203.pdf\" target=\"_blank\" rel=\"noopener\">Congress\u2019s Full Text of the Dodd-Frank Act<\/a>.<\/li>\r\n \t<li><b>Consumer Financial Protection Bureau 2025.<\/b> Retrieved from <a href=\"https:\/\/www.consumerfinance.gov\/\" target=\"_blank\" rel=\"noopener\">Consumer Financial Protection Bureau (CFPB)<\/a>.<\/li>\r\n \t<li><b>Deloitte.<\/b> <i>RegTech: Gaining Momentum<\/i>. Retrieved from <a href=\"https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/in\/Documents\/risk\/in-risk-RegTech-Gaining-momentum-noexp.pdf\" target=\"_blank\" rel=\"noopener\">Deloitte\u2019s RegTech: Gaining Momentum Report<\/a>.<\/li>\r\n \t<li><b>Federal Reserve History.<\/b> <i>Community Reinvestment Act 1977<\/i>. Retrieved from <a href=\"https:\/\/www.federalreservehistory.org\/essays\/community-reinvestment-act\" target=\"_blank\" rel=\"noopener\">Federal Reserve History\u2019s Community Reinvestment Act<\/a>.<\/li>\r\n \t<li><b>FINRA.<\/b> <i>Financial Industry Regulatory Authority<\/i>. Retrieved from <a href=\"https:\/\/www.finra.org\/\" target=\"_blank\" rel=\"noopener\">FINRA\u2019s Official Website<\/a>.<\/li>\r\n \t<li><b>FinCEN 2025.<\/b> <i>Financial Crimes Enforcement Network<\/i>. Retrieved from <a href=\"https:\/\/www.fincen.gov\/\" target=\"_blank\" rel=\"noopener\">FinCEN\u2019s Official Website<\/a>.<\/li>\r\n \t<li><b>Investopedia 2023.<\/b> <i>Systemically Important Financial Institution (SIFI)<\/i>. Retrieved from <a href=\"https:\/\/www.investopedia.com\/terms\/s\/systemically-important-financial-institution-sifi.asp\" target=\"_blank\" rel=\"noopener\">Investopedia\u2019s Explanation of SIFI<\/a>.<\/li>\r\n \t<li><strong>PCI Security Standards Council. (2024).<\/strong> <em>Homepage<\/em>. <a href=\"https:\/\/www.pcisecuritystandards.org\/\" target=\"_new\" rel=\"noopener\">PCI Security Standards Council<\/a><\/li>\r\n \t<li><b>New Silver 2024.<\/b> <i>History of Housing Market Crashes<\/i>. Retrieved from <a href=\"https:\/\/newsilver.com\/the-lender\/history-of-housing-market-crashes\/\" target=\"_blank\" rel=\"noopener\">New Silver\u2019s History of Housing Market Crashes<\/a>.<\/li>\r\n \t<li><b>TechTarget 2025.<\/b> <i>Gramm-Leach-Bliley Act<\/i>. Retrieved from <a href=\"https:\/\/www.techtarget.com\/searchcio\/definition\/Gramm-Leach-Bliley-Act\" target=\"_blank\" rel=\"noopener\">TechTarget\u2019s Gramm-Leach-Bliley Act Overview<\/a>.<\/li>\r\n \t<li><b>WalletHub 2025.<\/b> <i>Current Credit Card Interest Rates<\/i>. Retrieved from <a href=\"https:\/\/wallethub.com\/edu\/cc\/current-credit-card-interest-rates\/128285\" target=\"_blank\" rel=\"noopener\">WalletHub\u2019s Current Credit Card Interest Rates<\/a>.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>","rendered":"<p><iframe loading=\"lazy\" id=\"oembed-1\" title=\"Introduction to Fintech Regulations\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/llRj0eo-Kek?feature=oembed&#38;rel=0\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<p>Upon completion of this chapter, students should be able to:<\/p>\n<ul>\n<li>Analyze the role of FinTech regulations in ensuring consumer protection, financial stability, and market integrity.<\/li>\n<li>Evaluate the impact of insufficient regulation on financial crises, using the 2007\u20132008 housing bubble as a case study.<\/li>\n<li>Compare the regulatory requirements for different FinTech sectors, such as digital payments, peer-to-peer lending, and cryptocurrencies.<\/li>\n<li>Explain the significance of Know Your Customer (KYC) and Anti-Money Laundering (AML) regulations in preventing financial crimes.<\/li>\n<li>Assess the effectiveness of key U.S. financial regulations, such as the Dodd-Frank Act and the Bank Secrecy Act, in mitigating systemic risks.<\/li>\n<li>Describe how emerging technologies, including AI and blockchain, influence regulatory challenges and compliance requirements in FinTech.<\/li>\n<li>Discuss the role of rating agencies and regulatory bodies in maintaining financial stability and preventing deceptive financial practices.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<p><span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav>\n<ul class='ez-toc-list ez-toc-list-level-1 ' >\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#The_Importance_of_FinTech_Regulations\" >The Importance of FinTech Regulations<\/a>\n<ul class='ez-toc-list-level-3' >\n<li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Case_Study_9-1_Signs_of_the_Time_%E2%80%93_Burst_of_The_Housing_Bubble\" >Case Study 9-1 Signs of the Time \u2013 Burst of The Housing Bubble<\/a>\n<ul class='ez-toc-list-level-4' >\n<li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#The_%E2%80%9CHousing_Bubble%E2%80%9D\" >The \u201cHousing Bubble\u201d<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#The_Housing_Bubble_and_Subprime_Lending\" >The Housing Bubble and Subprime Lending<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Market_Trading_of_Mortgage-Backed_Securities_MBS\" >Market Trading of Mortgage-Backed Securities (MBS)<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Risky_Leverage_Ratios\" >Risky Leverage Ratios<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Lack_of_Capital_Reserves\" >Lack of Capital Reserves<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#_Failures_by_Regulatory_Bodies\" >\u00a0Failures by Regulatory Bodies<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Failures_by_Rating_Agencies\" >Failures by Rating Agencies<\/a><\/li>\n<\/ul>\n<\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Reflections_for_this_case\" >Reflections for this case:<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#_Key_Areas_of_FinTech_Regulation\" >\u00a0Key Areas of FinTech Regulation<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Digital_Payments_and_eMoney\" >Digital Payments and eMoney<\/a>\n<ul class='ez-toc-list-level-4' >\n<li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Peer-to-Peer_Lending_and_Crowdfunding\" >Peer-to-Peer Lending and Crowdfunding<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Cryptocurrencies_and_Blockchain_Technology\" >Cryptocurrencies and Blockchain Technology<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Insurtech\" >Insurtech<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#PayTech\" >PayTech<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Robo-Advisors_and_Algorithmic_Trading\" >Robo-Advisors and Algorithmic Trading<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#_US_Financial_Regulatory_and_Compliance_System\" >\u00a0US Financial Regulatory and Compliance System<\/a><\/li>\n<\/ul>\n<\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Banking_Regulations\" >Banking Regulations<\/a>\n<ul class='ez-toc-list-level-4' >\n<li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Dodd-Frank_Wall_Street_Reform_and_Consumer_Protection_Act_2010\" >Dodd-Frank Wall Street Reform and Consumer Protection Act (2010)<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Federal_Deposit_Insurance_Act_FDIA_1950_%E2%80%93_amended_in_2023\" >Federal Deposit Insurance Act (FDIA) (1950 &#8211; amended in 2023<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Gramm-Leach-Bliley_Act_GLBA_1999\" >Gramm-Leach-Bliley Act (GLBA) (1999)<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Community_Reinvestment_Act_CRA_1977\" >Community Reinvestment Act (CRA) (1977)<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Bank_Secrecy_Act_BSA_1970\" >Bank Secrecy Act (BSA) (1970)<\/a><\/li>\n<\/ul>\n<\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Securities_Regulations\" >Securities Regulations<\/a>\n<ul class='ez-toc-list-level-4' >\n<li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-26\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Securities_Act_of_1933\" >Securities Act of 1933<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-27\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Securities_Exchange_Act_of_1934\" >Securities Exchange Act of 1934<\/a><\/li>\n<\/ul>\n<\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-28\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#_Corporate_and_Consumer_Financial_Regulations\" >\u00a0Corporate and Consumer Financial Regulations<\/a>\n<ul class='ez-toc-list-level-4' >\n<li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-29\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Sarbanes-Oxley_Act_2002_SOX\" >Sarbanes-Oxley Act\u00a0 2002 (SOX)\u00a0<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-30\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Truth_in_Lending_Act_TILA_1968\" >Truth in Lending Act (TILA) (1968)<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-31\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Fair_Credit_Reporting_Act_FCRA_1970\" >Fair Credit Reporting Act (FCRA) (1970)<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-32\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Equal_Credit_Opportunity_Act_Federal_Reserve_1974\" >Equal Credit Opportunity Act (Federal Reserve 1974)<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-33\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Industry_Financial_Standards_and_Regulations\" >Industry Financial Standards and Regulations<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-34\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Know_Your_Customer_KYC\" >Know Your Customer (KYC)<\/a>\n<ul class='ez-toc-list-level-3' >\n<li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-35\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#KYC_as_a_Regulation\" >KYC as a Regulation<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-36\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Historical_Evolution_of_KYC\" >Historical Evolution of KYC<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-37\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Who_Uses_KYC\" >Who Uses KYC?<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-38\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#How_KYC_Is_Used\" >How KYC Is Used?<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-39\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#KYC_In_Fintech\" >KYC In Fintech<\/a><\/li>\n<\/ul>\n<\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-40\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#_Payment_Card_Industry_Data_Security_Standard_PCI_DSS\" >\u00a0Payment Card Industry Data Security Standard (PCI DSS)<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-41\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#How_PCI_DSS_Is_Used\" >How PCI DSS Is Used<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-42\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Implications_of_PCI_DSS\" >Implications of PCI DSS<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-43\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#EuroPay_Master_Card_and_Visa_EMV_Standards_Compliance_for_Point-of-Sale_Systems\" >EuroPay, Master Card and Visa (EMV) Standards Compliance for Point-of-Sale Systems<\/a>\n<ul class='ez-toc-list-level-3' >\n<li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-44\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Licenses_and_Attribution\" >Licenses and Attribution<\/a>\n<ul class='ez-toc-list-level-4' >\n<li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-45\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#CC_Licensed_Content_Original\" >CC Licensed Content, Original<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-46\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#CC_Licensed_Content_Included\" >CC Licensed Content Included<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-47\" href=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/chapter\/9__trashed\/#Other_Licensed_Content_Included\" >Other Licensed Content Included<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/nav>\n<\/div>\n<h2><span class=\"ez-toc-section\" id=\"The_Importance_of_FinTech_Regulations\"><\/span><strong>The Importance of FinTech Regulations<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The financial services industry is one of the most heavily regulated sectors globally due to its systemic importance, vulnerability to fraud, and its potential for abuse in areas like money laundering, terrorism financing, and fraudulent schemes. \u00a0FinTech amplifies these risks due to its reliance on emerging technologies and the speed at which it operates.<\/p>\n<p>Effective regulations serve several purposes:<\/p>\n<ol>\n<li>Consumer Protection: Ensures that customers\u2019 data, money, and rights are safeguarded.<\/li>\n<li>Financial Stability: Protects against risks that could affect the broader economy.<\/li>\n<li>Market Integrity: Prevents fraud, insider trading, and market manipulation.<\/li>\n<li>Innovation Facilitation: Provides a framework for companies to innovate responsibly.<\/li>\n<li>Inclusion: Encourages access to financial services for underserved or unbanked populations.<\/li>\n<li>Cybersecurity and Data Privacy: Protects sensitive data from breaches and fraud.<\/li>\n<\/ol>\n<div class=\"textbox\">\n<h3><span class=\"ez-toc-section\" id=\"Case_Study_9-1_Signs_of_the_Time_%E2%80%93_Burst_of_The_Housing_Bubble\"><\/span><strong>Case Study 9-1 Signs of the Time \u2013 Burst of The Housing Bubble<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong style=\"font-family: 'Sorts Mill Goudy', serif\">Fintech Regulations and Compliance (Regtech)<\/strong><\/p>\n<figure id=\"attachment_1142\" aria-describedby=\"caption-attachment-1142\" style=\"width: 300px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1142 size-medium\" src=\"http:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/foreclosure_image-300x300.jpg\" alt=\"A foreclosure sign on a home.\" width=\"300\" height=\"300\" srcset=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/foreclosure_image-300x300.jpg 300w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/foreclosure_image-150x150.jpg 150w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/foreclosure_image-768x768.jpg 768w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/foreclosure_image-65x65.jpg 65w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/foreclosure_image-225x225.jpg 225w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/foreclosure_image-350x350.jpg 350w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/foreclosure_image.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption id=\"caption-attachment-1142\" class=\"wp-caption-text\">Foreclosure sign. Image generated by OpenAI\u2019s DALL\u00b7E<\/figcaption><\/figure>\n<h4><span class=\"ez-toc-section\" id=\"The_%E2%80%9CHousing_Bubble%E2%80%9D\"><\/span><strong>The \u201cHousing Bubble\u201d <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>The 2007\u20132008 financial crisis was one of the most devastating economic events since the great depression in the United States, causing a global recession and exposing deep flaws in the US, as well as the global financial system (New Silver 2024). The crisis was rooted in a combination of risky financial practices, insufficient regulation, and a speculative housing bubble. This case study focuses on the US financial markets by examining the actions of key US institutions and the systemic weaknesses that collectively led to the near collapse of the US and the global banking sector.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"The_Housing_Bubble_and_Subprime_Lending\"><\/span><strong>The Housing Bubble and Subprime Lending<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Between 1997 and 2006, U.S. housing prices nearly doubled. This growth was fueled by low-interest rates, short supply of new housing starts, aggressive lending practices (e.g. Robo Signing), and speculative investment (Wikipedia 2024).\u00a0 Homeownership was marketed as a universally attainable goal, leading to a surge in mortgage demand. Subprime Lending became an acceptable form of lending and new investment vehicles were designed and marketed specifically targeting subprime markets.\u00a0 <em>Prime lending<\/em> refers to the rate published by industry associations in concert w\/ what the Federal Reserve Interest Rate charged (The Fed Reserve Prime rate for January 11th 2025 was 4.5%. with the financial industry lending rate at 3 % above prime.\u00a0 I.e., on January 11th, 2025 the overall interest rate for a prime mortgage was 7.5%). Prime represents the interest amount lenders can charge for individuals with low risk (i.e., stable career type and fully employed), high credit scores (better than 750) along with many other factors. <em>Subprime lending<\/em> is a form of lending to individuals with less than desirable credit worthiness. Subprime lending tends to be at a much higher interest rate and widely differs between one financial market vs. another.\u00a0 For example, credit card average interest rate on 11 January 2025 was nearly 28% with many credit card companies charging as high as 34% (Wallethub 2025).<\/p>\n<p>Back in 2006, many financial institutions, including Countrywide Financial and Ameriquest Mortgage, aggressively marketed subprime loans to borrowers with poor credit histories.\u00a0 These subprime mortgages often featured predatory terms, such as adjustable rates that significantly increased payments after an initial teaser period, high fees, and imposes unfair and abusive loan terms that strip the borrowers of equity.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Market_Trading_of_Mortgage-Backed_Securities_MBS\"><\/span><strong>Market Trading of Mortgage-Backed Securities (MBS)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Investment banks, including Lehman Brothers, Bear Stearns, and Merrill Lynch, purchased subprime mortgages and bundled them into MBS. These securities were sold to institutional investors as high-yield, low-risk products, despite being backed by risky loans.\u00a0 Much higher risky activities included securitization of complex financial products such as Collateralized Debt Obligations (CDO).\u00a0 CDO were marketed by financial institutions like Goldman Sachs and Morgan Stanley that \u201cpooled\u201d various mortgage-backed securities into groups based on risk levels.\u00a0 Rating agencies, such as Moody\u2019s, Standard &amp; Poor\u2019s, and Fitch, assigned AAA ratings to many CDO groups, despite the underlying assets being subprime loans.\u00a0 Another \u201cmarketing\u201d scheme was known as Credit Default Swaps (CDS).\u00a0 American International Group (AIG) became a major seller of CDS, a type of insurance against the default of CDOs and other financial instruments. \u00a0AIG failed to set aside sufficient reserves to cover potential defaults, assuming housing prices would continue to rise.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Risky_Leverage_Ratios\"><\/span><strong>Risky Leverage Ratios<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Investment banks like <strong>Lehman Brothers<\/strong> operated with leverage ratios exceeding 30:1, meaning they borrowed $30 for every $1 of equity. This made them highly vulnerable to declines in asset values.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Lack_of_Capital_Reserves\"><\/span><strong>Lack of Capital Reserves<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Major financial institutions relied on short-term funding through the <em>Repo market<\/em>. Repo is an agreement to sell securities at some point in time, with the intent to rebuy them at a better rate in the future (repurchase, or repo). An example of Repo loan is government securities such as bonds.\u00a0 Repo loans are essential liquidity assets however, their downside is that financial institutions buying the Repos have neglected to maintain adequate capital buffers.\u00a0 These buffers are established to help absorb losses when mortgage defaults surge.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"_Failures_by_Regulatory_Bodies\"><\/span><strong>\u00a0<\/strong><strong>Failures by Regulatory Bodies<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>During the later part of the 20th century, Financial Regulatory bodies allowed for security derivatives to be traded on what is known as Over The Counter (OTC) derivatives.\u00a0 Which meant that mortgages can be securitized and grouped as investment grade financial instruments to be sold on OTC\u2019s. This also allowed banks to exploit gaps in regulations pertaining to <em>Arbitrage. Arbitrage means to simultaneously buy and sell the same security priced lower on one exchange then immediately sell it on a different exchange listing it at a higher price<\/em>.\u00a0 This was the result of an act known as the <strong><em>Commodity Futures Modernization Act of<\/em> <em>2000<\/em><\/strong> which exempted over-the-counter derivatives from regulatory oversight.\u00a0 Shadow banking systems, including hedge funds and special-purpose vehicles (SPVs) operated outside traditional banking regulations.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Failures_by_Rating_Agencies\"><\/span><strong>Failures by Rating Agencies <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Rating companies, also known as credit rating agencies (CRAs), play a crucial role in financial markets by evaluating the creditworthiness of entities such as corporations, governments, and financial instruments such as stocks and bonds. These agencies assign ratings that indicate the likelihood of a borrower defaulting on their debt obligations. Credit ratings provide investors with a standardized measure of risk, which aids in making informed investment decisions.\u00a0 Although there are many rating companies, the three largest and most influential agencies are:<\/p>\n<ol>\n<li>Standard &amp; Poor\u2019s (S&amp;P): Known for its credit ratings on various debt instruments and entities, S&amp;P provides ratings ranging from AAA (highest creditworthiness) to D (default).<\/li>\n<li>Moody\u2019s Investors Service: Like S&amp;P, Moody\u2019s rates the credit risk of debt issuers, assigning ratings from AAA (highest quality) to C (lowest quality, typically in default).<\/li>\n<li>Fitch Ratings: Fitch also evaluates credit risk and assigns ratings on a similar scale, helping investors gauge the likelihood of default.<\/li>\n<\/ol>\n<p>These agencies\u2019 ratings influence the interest rates that entities pay on their debt and the perception of risk associated with various investments.<\/p>\n<p>During the lead-up to the 2008 financial crisis, rating agencies played a controversial role by assigning high credit ratings to mortgage-backed securities (MBS) and collateralized debt obligations (CDOs), the majority of which were composed of subprime mortgages.<\/p>\n<p>Despite the inherent risks, rating agencies gave many of these financial products AAA ratings, suggesting they were as safe as government bonds. These high ratings made MBS and CDOs attractive to investors, including pension funds and financial institutions, which relied heavily on the agencies&#8217; assessments.<\/p>\n<p>However, as housing prices began to decline, many subprime borrowers defaulted on their loans, leading to significant losses for investors in these highly rated securities. The flawed ratings, combined with inadequate risk assessment and potential conflicts of interest (since agencies were paid by the issuers of the securities they rated), contributed to the collapse of the housing market and the broader financial crisis.<\/p>\n<p>In the aftermath of the crisis, rating agencies faced widespread criticism and increased regulatory scrutiny. Reforms were introduced to improve transparency, address conflicts of interest, and enhance the accuracy of credit ratings to prevent a recurrence of such systemic failures.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Reflections_for_this_case\"><\/span><strong>Reflections for this case:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ol>\n<li>What were the key triggers?<\/li>\n<li>Who were the financial institutions that failed?<\/li>\n<li>What were the effects on the economy?<\/li>\n<li>Did Regulations help? And what was clearly controlled by these regulations?<\/li>\n<\/ol>\n<\/div>\n<h3><span class=\"ez-toc-section\" id=\"_Key_Areas_of_FinTech_Regulation\"><\/span><strong>\u00a0<\/strong><strong>Key Areas of FinTech Regulation<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>FinTech is a broad industry encompassing various sectors, each subject to different types of regulations. Some of the key areas include:<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Digital_Payments_and_eMoney\"><\/span><strong>Digital Payments and eMoney<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Regulations in this area focus on ensuring the secure transfer of money and protecting consumer funds. Payment service providers and e-wallet platforms are often subject to:<\/p>\n<ul>\n<li>Anti-Money Laundering (AML) and Know Your Customer (KYC) requirements.<\/li>\n<li>Licensing and operational standards to ensure fund protection.<\/li>\n<li>Compliance with international standards like <strong>PSD2<\/strong> in Europe, which focuses on securing electronic payments and fostering innovation by opening access to banking data.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Peer-to-Peer_Lending_and_Crowdfunding\"><\/span><strong>Peer-to-Peer Lending and Crowdfunding<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>P2P lending platforms and crowdfunding platforms enable direct lending between individuals or businesses without traditional financial institutions as intermediaries. These platforms are often regulated to:<\/p>\n<ul>\n<li>Ensure transparency in the risk assessment process.<\/li>\n<li>Limit the amount individuals can borrow or invest.<\/li>\n<li>Provide clear guidelines on how the platforms handle investor funds and risks.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Cryptocurrencies_and_Blockchain_Technology\"><\/span><strong>Cryptocurrencies and Blockchain Technology<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>One of the most challenging areas for regulators is cryptocurrencies and blockchain technology, given their decentralized nature and the borderless transactions they enable. Regulatory concerns include:<\/p>\n<ul>\n<li>Preventing their use in illegal activities (e.g., money laundering, tax evasion).<\/li>\n<li>Clarifying their legal status (whether they are commodities, currencies, securities or digital assets and tokens).<\/li>\n<li>Ensuring that exchanges meet security standards to protect users from fraud.<\/li>\n<li>Emerging frameworks such as the <strong>Markets in Crypto-Assets Regulation (MiCA)<\/strong> in the EU aim to establish clear rules for crypto asset service providers.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Insurtech\"><\/span><strong>Insurtech<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Insurance technology companies, or InsurTech\u2019s, are heavy users of AI and big data for Actuary, Underwriting, Claims Processing, and customer service. Regulatory challenges include:<\/p>\n<ul>\n<li>Data privacy concerns regarding the use of consumer data.<\/li>\n<li>Transparency in how AI makes decisions in underwriting and claims settlement.<\/li>\n<li>Ensuring new insurance models comply with existing insurance laws.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"PayTech\"><\/span><strong>PayTech<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>One of the most significant advancements within Fintech are electronic payments (ePayments). ePayment technologies include digital wallets, mobile payment systems, and peer-to-peer transfer platforms. While these innovations offer convenience, speed, and efficiency, they also introduce new regulatory challenges and risks. Regulatory concerns include:<\/p>\n<ol>\n<li><strong>Consumer Protection:<\/strong> ePayment platforms handle vast amounts of sensitive personal and financial data. Regulators must ensure these platforms maintain robust data security and privacy standards to protect consumers from fraud and identity theft.<\/li>\n<li><strong>Anti-Money Laundering (AML) and Counter-Terrorism Financing (CTF):<\/strong> The digital nature of ePayments makes them susceptible to misuse for illegal activities. Regulatory frameworks often require stringent AML and CTF compliance measures, such as monitoring transactions and reporting suspicious activities.<\/li>\n<li><strong>Systemic Risk and Stability:<\/strong> As ePayment systems grow in scale, their failure could pose risks to the broader financial system. Regulators focus on ensuring these systems have proper risk management and contingency plans in place.<\/li>\n<li><strong>Licensing and Oversight:<\/strong> Governments and central banks have established licensing requirements for ePayment providers to ensure their operations align with financial regulations and that they are subject to regular audits.<\/li>\n<\/ol>\n<h4><span class=\"ez-toc-section\" id=\"Robo-Advisors_and_Algorithmic_Trading\"><\/span><strong>Robo-Advisors and Algorithmic Trading<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Automated investment platforms and algorithmic trading systems, driven by machine learning and AI, bring new regulatory challenges such as:<\/p>\n<ul>\n<li>Ensuring that investment advice is suitable and, in the client\u2019s, best interests.<\/li>\n<li>Monitoring for potential market manipulation or trading abuse.<\/li>\n<li>Licensing requirements for platforms offering financial advice.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"_US_Financial_Regulatory_and_Compliance_System\"><\/span><strong>\u00a0<\/strong><strong>US Financial Regulatory and Compliance System <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>The United States financial system is one of the most complex and regulated in the world. Various federal and state agencies oversee different sectors of financial services, ensuring market stability, consumer protection, and the prevention of financial crimes. \u00a0The financial Industry serves the US economy and as such it is organized by several economic sectors such as Banking, Investment, etc. Moreover, many of the regulatory system requirements have been on the books, so to speak, for more than 100 years. \u00a0In this section we are only interested in key regulatory mandates of the last few decades.\u00a0 \u00a0In the US, the financial sector (i.e., what we spend money on) is composed of 11 sectors:<\/p>\n<ul>\n<li>\u00a0Communication Services<\/li>\n<li>Consumer Discretionary (leisure, travel, entertainment, etc.)<\/li>\n<li>\u00a0Consumer Staples (food, education, clothing, transportation, etc.)<\/li>\n<li>Energy<\/li>\n<li>Financials (Banking, Insurance, Investments, etc.)<\/li>\n<li>Health Care<\/li>\n<li>Industrials (Machinery, Automotive, Furnishings, etc)<\/li>\n<li>Information Technology<\/li>\n<li>Materials (Think of Home depot)<\/li>\n<li>Real Estate, and<\/li>\n<li>Utilities.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Banking_Regulations\"><\/span><strong>Banking Regulations<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Banking regulations in the U.S. aim to ensure the soundness and stability of the financial system, safeguard consumer deposits, and promote fair lending practices.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Dodd-Frank_Wall_Street_Reform_and_Consumer_Protection_Act_2010\"><\/span><strong>Dodd-Frank Wall Street Reform and Consumer Protection Act (2010)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Enacted in response to the 2008 financial crisis, Dodd-Frank, as it is better known, is a comprehensive set of financial reforms aimed at reducing risks in the U.S. financial system (Dodd Frank 2010) . Key provisions of the act include:<\/p>\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li>Established the <strong><em>Consumer Financial Protection Bureau (CFPB)<\/em><\/strong> to protect consumers from abusive financial practices. Specifically, its stated moto is \u201con your side\u201d(Consumer Finance 2025).\u00a0 It investigates and takes action against a credit card companies that may be charging excessive fees or engaging in deceptive practices when informing customers about their interest rates, essentially protecting consumers from unfair financial practices by monitoring companies and enforcing consumer protection laws.<\/li>\n<li>Introduced the <strong><em>Volcker Rule<\/em><\/strong>, limiting banks from engaging in proprietary trading. It prohibits banks short-term trading of certain securities, derivatives, commodity futures, and options for their own account.<\/li>\n<li>Created <strong><em>Systemically Important Financial Institutions (SIFIs)<\/em><\/strong>, requiring heightened oversight of large banks. A SIFI, are those that are viewed as \u201ctoo big to fail\u201d and imposed extra regulatory burdens to prevent them from going under (Investopedia 2023)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Federal_Deposit_Insurance_Act_FDIA_1950_%E2%80%93_amended_in_2023\"><\/span><strong>Federal Deposit Insurance Act (FDIA) (1950 &#8211; amended in 2023<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>FDIA was enacted in 1950 to ensure the proper governance and operations of the<strong> <em>Federal Deposit Insurance Corporation (FDIC 2023)<\/em><\/strong><em>.<\/em><strong>\u00a0 <\/strong>Its key provisions include:<\/p>\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li>Ensures that depositors\u2019 accounts are insured up to $250,000 per depositor, per bank.<\/li>\n<li>The FDIC monitors the financial health of banks and can intervene in cases of bank failures.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Gramm-Leach-Bliley_Act_GLBA_1999\"><\/span><strong>Gramm-Leach-Bliley Act (GLBA) (1999)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>GLBA is also known as the Financial Modernization Act<strong>, <\/strong>\u00a0in response to technology advancement that hackers exploited. It repealed many sections of much older laws and enacted new ones such as safeguard rules against collection of personal information, prohibiting <em>pretexting<\/em> (pretending to be someone else to access their information under false pretenses) (TechTarget 2025). In addition, it allowed financial institutions to offer a combination of services such as commercial banking, securities, and insurance. GLBA key provisions include:<\/p>\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li>Removed barriers preventing banks, securities companies, and insurance firms from merging.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li>Requires financial institutions to explain their information-sharing practices to consumers and to safeguard sensitive data.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Community_Reinvestment_Act_CRA_1977\"><\/span><strong>Community Reinvestment Act (CRA) (1977)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>The Community Reinvestment Act (CRA) was created to address the issue of &#8220;redlining&#8221;, a practice where banks would refuse to provide loans or other financial services to residents of certain neighborhoods, usually low-income or minority communities, leading to systemic inequities in access to credit (Federal Reserve 1977). Essentially, the CRA aims to encourage banks to meet the credit needs of all communities they operate in, including low- and moderate-income neighborhoods, by making it a requirement to do so while maintaining safe and sound banking practices. CRA key provision include:<\/p>\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li>Banks are evaluated based on their efforts to provide loans and investments to underserved areas.<\/li>\n<li>Making redlining illegal.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Bank_Secrecy_Act_BSA_1970\"><\/span><strong>Bank Secrecy Act (BSA) (1970)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>The Bank Secrecy Act was enacted to combat Money Laundering, Financial Fraud and other organized crime financial activities. It requires financial institutions to assist U.S. government agencies in detecting and preventing financial criminal activities. \u00a0\u00a0The act is managed by the US Dept of Treasury, office of Financial Crimes Enforcement Network (FinCEN 2025).\u00a0 Its key provisions include:<\/p>\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li>Banks must report any transaction over $10,000. And must establishes reporting and recordkeeping requirements to track and identify the source, volume and movement of currency into \/ out of the US banking system.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Securities_Regulations\"><\/span><strong>Securities Regulations<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Securities regulations in the U.S. focus on protecting investors, maintaining fair and efficient markets, and ensuring the integrity of securities markets.<\/p>\n<ol>\n<li>\n<h4><span class=\"ez-toc-section\" id=\"Securities_Act_of_1933\"><\/span><strong>Securities Act of 1933<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<\/li>\n<\/ol>\n<p>Was enacted in response to the 1929 crash of the stock market.\u00a0 It regulates the issuance of new securities in the primary market, ensuring that investors receive significant information regarding securities being offered.\u00a0 Key Provisions:<\/p>\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li>Require companies to register securities with the <strong><em>Securities and Exchange Commission (SEC), est. 1934<\/em><\/strong><\/li>\n<li>Mandates full and fair disclosure to prevent fraud in the sale of securities.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>\u00a0<\/strong><\/p>\n<figure id=\"attachment_980\" aria-describedby=\"caption-attachment-980\" style=\"width: 652px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-980\" src=\"http:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/1929-stock-market-crash-aftermath-300x171.jpg\" alt=\"Chaos and misery post 1929 stock market collapse\" width=\"652\" height=\"372\" srcset=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/1929-stock-market-crash-aftermath-300x171.jpg 300w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/1929-stock-market-crash-aftermath-1024x585.jpg 1024w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/1929-stock-market-crash-aftermath-768x439.jpg 768w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/1929-stock-market-crash-aftermath-65x37.jpg 65w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/1929-stock-market-crash-aftermath-225x128.jpg 225w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/1929-stock-market-crash-aftermath-350x200.jpg 350w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/1929-stock-market-crash-aftermath.jpg 1343w\" sizes=\"auto, (max-width: 652px) 100vw, 652px\" \/><figcaption id=\"caption-attachment-980\" class=\"wp-caption-text\">Images of chaos and misery post 1929 stock market collapse. Image generated by OpenAI\u2019s DALL\u00b7E<\/figcaption><\/figure>\n<ol start=\"2\">\n<li>\n<h4><span class=\"ez-toc-section\" id=\"Securities_Exchange_Act_of_1934\"><\/span><strong>Securities Exchange Act of 1934<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<\/li>\n<\/ol>\n<p>The Securities and Exchange Commission (SEC 2025) was created in 1934 in response to the 1929 stock market crash, with the primary goal of restoring public confidence in the financial markets by regulating securities trading and ensuring companies provided accurate information to investors, thereby preventing fraudulent practices and market manipulation. The Key Provisions in the act are:<\/p>\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li>Prohibits insider trading and market manipulation.<\/li>\n<li>Created the <strong>SEC<\/strong>, granting it broad authority over securities markets.<\/li>\n<li>Introduces periodic financial disclosures (such as 10-K, 10-Q filings).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"_Corporate_and_Consumer_Financial_Regulations\"><\/span><strong>\u00a0<\/strong><strong>Corporate and Consumer Financial Regulations<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Corporate fraud has existed as long as corporations themselves, often driven by greed, the pressure to meet financial targets, or the desire to manipulate markets. It involves deceptive practices by a company or its executives for financial or personal gain, often at the expense of stakeholders, employees, or the public.\u00a0 Early corporate fraud examples include the Railroad Fraud and the Charles Ponzi scheme<\/p>\n<ol>\n<li>\n<h4><span class=\"ez-toc-section\" id=\"Sarbanes-Oxley_Act_2002_SOX\"><\/span><strong>Sarbanes-Oxley Act\u00a0 2002 (SOX)\u00a0<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<\/li>\n<\/ol>\n<p>Enacted in response to corporate scandals like Enron and WorldCom, it seeks to protect investors by improving the accuracy and reliability of corporate disclosures (American University 2002<strong>)<\/strong><\/p>\n<p>. Key provisions include:<\/p>\n<ul>\n<li>Establishes requirements for corporate governance and internal controls.<\/li>\n<li>Requires the CEO and CFO to personally certify the accuracy of financial reports.<\/li>\n<li>Introduces criminal penalties for fraudulent financial activity.<\/li>\n<\/ul>\n<ol start=\"2\">\n<li>\n<h4><span class=\"ez-toc-section\" id=\"Truth_in_Lending_Act_TILA_1968\"><\/span><strong>Truth in Lending Act (TILA) (1968)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<\/li>\n<\/ol>\n<p>The Truth in Lending Act (TILA) is a federal law that protects consumers from unfair credit practices and helps them make informed decisions about loans.\u00a0TILA requires lenders to provide standardized information about the terms and costs of loans including Average Annual Percentages, the right to cancel certain loans, and the ability to shop and compare different lenders. \u00a0TILA key provisions include:<\/p>\n<ul>\n<li>Mandates the clear disclosure of interest rates, terms, and fees on consumer loans and credit cards.<\/li>\n<li>Provides consumers the right to rescind certain credit transactions involving a lien on their principal dwelling.<\/li>\n<\/ul>\n<ol start=\"3\">\n<li>\n<h4><span class=\"ez-toc-section\" id=\"Fair_Credit_Reporting_Act_FCRA_1970\"><\/span><strong>Fair Credit Reporting Act (FCRA) (1970)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<\/li>\n<\/ol>\n<p>The Fair Credit Reporting Act (FCRA) is a federal law that protects the accuracy, fairness, and privacy of consumer information (FTC 2023). The FCRA applies to consumer reporting agencies (CRAs), which are the entities that collect and sell information about consumers, such as credit bureaus, medical information companies, and tenant screening services. Its key provisions include:<\/p>\n<ul>\n<li>Governs how credit reporting agencies collect and share consumer credit information.<\/li>\n<li>Provides consumers the right to access and dispute their credit reports.<\/li>\n<\/ul>\n<ol start=\"4\">\n<li>\n<h4><span class=\"ez-toc-section\" id=\"Equal_Credit_Opportunity_Act_Federal_Reserve_1974\"><\/span><strong>Equal Credit Opportunity Act (<\/strong>Federal Reserve 1974)<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<\/li>\n<\/ol>\n<p>The purpose of ECOA is \u201cto promote the availability of credit to all creditworthy applicants without regard to race, color, religion, national origin, sex, marital status, or age (provided the applicant has the capacity to contract); because all or part of the applicant\u2019s income derives from any public assistance program; or, because the applicant has in good faith exercised any right under the Consumer Credit Protection Act\u201d (NCUA 2023).\u00a0 Key provisions of the ECOA include:<\/p>\n<ul>\n<li>Lenders must provide equal access to credit.<\/li>\n<li>Requires lenders to inform applicants about why credit was denied.<\/li>\n<\/ul>\n<ol start=\"5\">\n<li><strong>Fair Debt Collection Practices Act (FDCPA) (1977)<\/strong><\/li>\n<\/ol>\n<p>The purpose of FDCPA is to regulates the, sometimes, abusive deceptive and unfair conduct of debt collectors and to protecting consumers from these practices (FDCPA 2010).\u00a0 Its key provisions include:<\/p>\n<ul>\n<li>Prohibits debt collectors from using deceptive, unfair, or abusive practices.<\/li>\n<li>Sets restrictions on how and when debt collectors can contact consumers.<\/li>\n<\/ul>\n<ol start=\"6\">\n<li><strong>Consumer Financial Protection Act (CFPA) (2010)<\/strong><\/li>\n<\/ol>\n<p><strong>CFPA was e<\/strong>stablished by the <strong>Consumer Financial Protection Bureau (CFPB)<\/strong> to oversee consumer financial products and services and to protect consumers by ensuring that financial markets are fair and competitive (FTC 2010). The CFPB was established by the Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010.\u00a0 Its key provisions include:<\/p>\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li>Empowers the CFPB to regulate mortgages, credit cards, and other financial products.<\/li>\n<li>Enforces laws that prohibit unfair, deceptive, or abusive acts in the consumer finance market.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ol start=\"7\">\n<li><strong>Insurance Regulations<\/strong><\/li>\n<\/ol>\n<p>Insurance regulation in the U.S. is primarily date back to the founding era of the US in 1799. It mandated that Insurance regulations be conducted at the state level, with federal regulations applying in limited circumstances.\u00a0 \u00a0The most sweeping legislation on insurance, however occurred in 2010 with the passing of the Affordable Care Act of 2010 <i>(ACA 2010)<\/i>.\u00a0 The act, better known as Obamacare, in reference to President Obama, introduced comprehensive reforms to the health insurance market, aimed at increasing coverage, improving healthcare quality, and lowering costs.\u00a0 Its key provisions included:<\/p>\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li>Requires insurance companies to cover pre-existing conditions.<\/li>\n<li>Mandates individuals to have health insurance or pay a penalty (individual mandate, later repealed in 2017).<\/li>\n<li>Sets up health insurance exchanges where consumers can compare and purchase insurance plans.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>The Affordable Care Act has seen many changes since its inception in terms of benefits, coverage availability, out of pocket expenses and monthly premium costs \u00a0<i>(ACA 2010)<\/i>.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Industry_Financial_Standards_and_Regulations\"><\/span><strong>Industry Financial Standards and Regulations<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>\u00a0<\/strong>The Financial Industry Regulatory Authority (FINRA 2025) was created in 2007 by merging the National Association of Securities Dealers (NASD) with the New York Stock Exchange&#8217;s (NYSE) member regulation, enforcement, and arbitration functions.\u00a0 FINRA writes rules and regulations for professionals in the financial industry, licenses these individuals and organizations, and provides avenues for compensation and complaints for victims of negligent financial advising.\u00a0 FINRA role in the economy is highlighted by its role in combatting financial crimes such as money laundering and financial fraud. FINRA conducts regulatory oversight of more than 5,000 securities firms and 666,000 registered representatives. It is responsible for rule writing, firm examination, enforcement and arbitration and mediation functions, along with all functions that were previously overseen solely by NASD, including market regulation under contract for NASDAQ, the American Stock Exchange, the International Securities Exchange and the Chicago Climate Exchange.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Know_Your_Customer_KYC\"><\/span>Know Your Customer (KYC)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p data-pm-slice=\"1 3 []\">Know Your Customer (KYC) refers to the process through which businesses verify the identity of their clients. It is a critical component of risk management and compliance programs, particularly within the financial services industry. The primary purpose of KYC is to ensure that customers are who they claim to be, thereby minimizing the risk of fraud, money laundering, and other illicit activities.\u00a0 KYC protocols typically involve collecting and verifying customer information such as name, address, date of birth, and government-issued identification.<\/p>\n<figure id=\"attachment_981\" aria-describedby=\"caption-attachment-981\" style=\"width: 572px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-981\" src=\"http:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/KYC-image-300x171.jpg\" alt=\"Depicting trading floor w\/ Morgan Stanley and Lehman Brother's\" width=\"572\" height=\"326\" srcset=\"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/KYC-image-300x171.jpg 300w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/KYC-image-1024x585.jpg 1024w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/KYC-image-768x439.jpg 768w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/KYC-image-65x37.jpg 65w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/KYC-image-225x129.jpg 225w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/KYC-image-350x200.jpg 350w, https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-content\/uploads\/sites\/96\/2025\/01\/KYC-image.jpg 1454w\" sizes=\"auto, (max-width: 572px) 100vw, 572px\" \/><figcaption id=\"caption-attachment-981\" class=\"wp-caption-text\">Depicting trading floor w\/ Morgan Stanley and Lehman Brother&#8217;s highlighted. Image generated by OpenAI\u2019s DALL\u00b7E<\/figcaption><\/figure>\n<p><em>Image 9-5 depicting trading floor w\/ Morgan Stanley and Lehman Brother&#8217;s highlighted. Courtesy ChatGPT<\/em><\/p>\n<h3><span class=\"ez-toc-section\" id=\"KYC_as_a_Regulation\"><\/span>KYC as a Regulation<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>KYC is not merely a process; it is a regulatory requirement mandated by financial authorities worldwide. It forms the backbone of anti-money laundering (AML) and combating the financing of terrorism (CFT) frameworks. Regulatory bodies such as the Financial Action Task Force (FATF), the European Union\u2019s Anti-Money Laundering Directives (AMLD), and the U.S. Patriot Act have incorporated KYC requirements into their guidelines.<\/p>\n<p>For instance, in the United States, the Financial Crimes Enforcement Network (FinCEN) enforces KYC under the Bank Secrecy Act (BSA). Financial institutions are <strong>legally obligated<\/strong> to perform customer due diligence (CDD) and enhanced due diligence (EDD) when dealing with high-risk customers or transactions. Failure to comply with KYC regulations can result in severe penalties, fines, and reputational damage for the institution.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Historical_Evolution_of_KYC\"><\/span>Historical Evolution of KYC<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>KYC practices have evolved significantly over the years. The concept gained prominence in the 1990s and early 2000s, as global financial systems became increasingly interconnected and susceptible to abuse. The events of September 11, 2001, were pivotal in shaping modern KYC regulations. Governments and regulatory agencies around the world intensified efforts to combat terrorism financing, leading to stricter KYC and AML laws. The introduction of the USA Patriot Act in 2001 marked a watershed moment, mandating that financial institutions implement robust identity verification and transaction monitoring processes.<\/p>\n<p>Additionally, international organizations such as FATF have played a significant role in standardizing KYC practices. FATF\u2019s 40 Recommendations outlining global best practices for AML and CFT and encouraging member countries to adopt comprehensive KYC frameworks.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Who_Uses_KYC\"><\/span>Who Uses KYC?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>KYC is utilized by a wide array of organizations across multiple industries, though it is most prominently associated with financial institutions. The following entities commonly employ KYC protocols:<\/p>\n<ol start=\"1\" data-spread=\"false\">\n<li><strong>Banks and Credit Unions<\/strong>: To open accounts, approve loans, and monitor transactions.<\/li>\n<li><strong>Payment Processors<\/strong>: To verify users making online or cross-border transactions.<\/li>\n<li><strong>Insurance Companies<\/strong>: To identify policyholders and assess risks.<\/li>\n<li><strong>Fintech Companies<\/strong>: To onboard users and maintain regulatory compliance.<\/li>\n<li><strong>Cryptocurrency Exchanges<\/strong>: To prevent the use of digital assets for illicit activities.<\/li>\n<li><strong>Investment Firms<\/strong>: To comply with securities regulations and prevent insider trading.<\/li>\n<li><strong>Government Agencies<\/strong>: For social welfare programs and subsidies.<\/li>\n<\/ol>\n<h3><span class=\"ez-toc-section\" id=\"How_KYC_Is_Used\"><\/span>How KYC Is Used?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The KYC process typically involves several steps:<\/p>\n<ol start=\"1\" data-spread=\"false\">\n<li><strong>Customer Identification Program (CIP)<\/strong>: Collecting basic information such as name, address, date of birth, and identification numbers.<\/li>\n<li><strong>Document Verification<\/strong>: Validating the authenticity of submitted documents, such as passports, driver\u2019s licenses, or utility bills.<\/li>\n<li><strong>Risk Assessment<\/strong>: Evaluating the customer\u2019s risk profile based on factors like geographic location, occupation, and transaction patterns.<\/li>\n<li><strong>Ongoing Monitoring<\/strong>: Continuously reviewing transactions and updating customer information to detect suspicious activities.<\/li>\n<li><strong>Enhanced Due Diligence (EDD)<\/strong>: Applying additional scrutiny to high-risk customers, such as politically exposed persons (PEPs).<\/li>\n<\/ol>\n<p>Technology has greatly enhanced the efficiency of KYC processes. Advanced tools such as artificial intelligence (AI), machine learning (ML), and biometric verification are increasingly used to streamline identity verification and detect anomalies.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"KYC_In_Fintech\"><\/span>KYC In Fintech<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>KYC has had a profound impact on the fintech industry. While fintech companies have introduced innovative financial solutions, they operate in a heavily regulated environment that demands stringent compliance with KYC norms. Here are some key impacts:<\/p>\n<ol start=\"1\" data-spread=\"false\">\n<li><strong>Improved Trust and Security<\/strong>: KYC protocols build trust between fintech providers and their customers by ensuring secure transactions and protecting against fraud.<\/li>\n<li><strong>Operational Challenges<\/strong>: Implementing KYC processes can be resource-intensive, particularly for startups with limited budgets. Fintech companies often rely on third-party providers for KYC solutions.<\/li>\n<li><strong>Innovation in Verification<\/strong>: The need for compliance has driven technological advancements, such as automated KYC platforms, eKYC (electronic KYC), and blockchain-based identity solutions.<\/li>\n<li><strong>Market Expansion<\/strong>: Robust KYC practices enable fintech firms to expand into new markets by complying with local regulations.<\/li>\n<li><strong>Consumer Friction<\/strong>: Excessive or poorly implemented KYC processes can lead to user dissatisfaction and increased drop-off rates during onboarding.<strong>\u00a0<\/strong><\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"_Payment_Card_Industry_Data_Security_Standard_PCI_DSS\"><\/span><strong>\u00a0<\/strong>Payment Card Industry Data Security Standard (PCI DSS)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Payment Card Industry Data Security Standard (PCI DSS) is not a government regulation; it is a set of security standards established by the major credit card companies like Visa, Mastercard, and American Express, meaning it is enforced by the private sector through contractual agreements with merchants, not by a government agency.<\/p>\n<p>The Payment Card Industry Data Security Standard (PCI DSS) is a set of 12 security standard requirements (designed to ensure that all entities that accept, process, store, or transmit credit card information maintain a secure environment (PCI Security Standards 2024). \u00a0Developed by the Payment Card Industry Security Standards Council (PCI SSC), PCI DSS aims to protect cardholder data and mitigate the risks associated with data breaches and fraud in payment transactions.<\/p>\n<p>The PCI SSC was founded in 2006 by major payment card networks, including Visa, MasterCard, American Express, Discover, and JCB. The standard is widely adopted across industries that handle payment card data, ensuring a unified approach to data security.<\/p>\n<p><strong>Key Points of PCI DSS<\/strong><\/p>\n<p>The PCI DSS standard is structured around six overarching goals, comprising 12 requirements. Below are the key points:<\/p>\n<p><strong>Requirement 1<\/strong>: Install and maintain a firewall configuration to protect cardholder data.<\/p>\n<p><strong>Requirement 2<\/strong>: Do not use vendor-supplied defaults for system passwords and other security parameters.<\/p>\n<p><strong>Requirement 3<\/strong>: Protect stored cardholder data (e.g., encryption, masking).<\/p>\n<p><strong>Requirement 4<\/strong>: Encrypt transmission of cardholder data across open, public networks.<\/p>\n<p><strong>Requirement 5<\/strong>: Protect systems against malware and regularly update anti-virus software.<\/p>\n<p><strong>Requirement 6<\/strong>: Develop and maintain secure systems and applications.<\/p>\n<p><strong>Requirement 7<\/strong>: Restrict access to cardholder data by business need-to-know.<\/p>\n<p><strong>Requirement 8<\/strong>: Identify and authenticate access to system components.<\/p>\n<p><strong>Requirement 9<\/strong>: Restrict physical access to cardholder data.<\/p>\n<p><strong>Requirement 10<\/strong>: Track and monitor all access to network resources and cardholder data.<\/p>\n<p><strong>Requirement 11<\/strong>: Regularly test security systems and processes.<\/p>\n<p><strong>Requirement 12<\/strong>: Maintain a policy that addresses information security for all personnel.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_PCI_DSS_Is_Used\"><\/span><strong>How PCI DSS Is Used<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>PCI DSS applies to all organizations that handle payment card data, including merchants, financial institutions, and service providers. Compliance is achieved through a combination of technical and operational measures, as outlined below:<\/p>\n<p><strong>Self-Assessment or External Audits<\/strong>: Organizations determine their compliance level through self-assessment questionnaires (SAQs) or external audits by Qualified Security Assessors (QSAs).<\/p>\n<p><strong>Implementation of Security Controls<\/strong>: Businesses deploy encryption, firewalls, intrusion detection systems, and other controls to safeguard cardholder data.<\/p>\n<p><strong>Regular Scanning and Penetration Testing<\/strong>: Approved Scanning Vendors (ASVs) conduct periodic vulnerability scans to identify and mitigate security risks.<\/p>\n<p><strong>Employee Training<\/strong>: Personnel are educated on best practices for handling payment card data and identifying potential security threats.<\/p>\n<p><strong>Reporting and Documentation<\/strong>: Organizations submit compliance reports to acquiring banks or payment processors.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Implications_of_PCI_DSS\"><\/span><strong>Implications of PCI DSS<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The adoption of PCI DSS has far-reaching implications for various stakeholders:<\/p>\n<ol>\n<li><strong> For Merchants. <\/strong>Compliance enhances customer trust and reduces the risk of costly data breaches. Non-compliance, however, can result in fines ranging from $5,000 to $100,000 per month, depending on the severity of the violation.<\/li>\n<\/ol>\n<ol start=\"2\">\n<li><strong> For Consumers.\u00a0 <\/strong>PCI DSS provides an additional layer of security, reducing the likelihood of unauthorized access to personal and financial information.<\/li>\n<\/ol>\n<ol start=\"3\">\n<li><strong> For Fintech and Payment Processors.\u00a0 <\/strong>Fintech companies, which often handle high volumes of cardholder data, rely heavily on PCI DSS compliance to operate seamlessly. Compliance enables market expansion, partnerships with financial institutions, and a competitive edge in the industry.<\/li>\n<\/ol>\n<ol start=\"4\">\n<li><strong> For the Industry at Large. <\/strong>PCI DSS fosters a culture of security within the payment ecosystem, ensuring that all stakeholders adhere to a uniform set of standards.<\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"EuroPay_Master_Card_and_Visa_EMV_Standards_Compliance_for_Point-of-Sale_Systems\"><\/span>EuroPay, Master Card and Visa (EMV) Standards Compliance for Point-of-Sale Systems<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>EMV standards govern the use of chip-enabled cards, reducing the risk of fraud compared to magnetic stripe cards.\u00a0 POS systems must support EMV-compliant hardware to avoid liability for certain types of fraudulent transactions.<\/p>\n<ol>\n<li><strong>Consumer Financial Protection Laws . <\/strong>POS systems must comply with laws ensuring clear and accurate disclosure of transaction details. For example, the Truth in Lending Act (TILA) requires transparency in credit card transactions, while the Electronic Fund Transfer Act (EFTA) covers debit card transactions.<\/li>\n<\/ol>\n<ol start=\"2\">\n<li><strong>Cash Transactions<\/strong><\/li>\n<li><strong>Anti-Money Laundering (AML) Regulations<\/strong><\/li>\n<\/ol>\n<p>Businesses must comply with AML laws, such as the Bank Secrecy Act (BSA), to prevent illegal financial activities. Large cash transactions may require reporting to the Financial Crimes Enforcement Network (FinCEN).<\/p>\n<p><strong>Sales Tax Compliance.<\/strong> POS systems must accurately calculate and report sales taxes for cash transactions, ensuring compliance with local and state tax regulations.<\/p>\n<p><strong>Check Verification and Fraud Prevention.\u00a0 <\/strong>POS systems that process checks must integrate verification tools to detect fraudulent or insufficiently funded checks. This may involve compliance with the Uniform Commercial Code (UCC) and applicable state laws.<\/p>\n<p><strong>Electronic Check Processing (ECP) Standards<\/strong>.\u00a0 For businesses that use electronic check processing, compliance with the Federal Reserve\u2019s rules on electronic checks, including Regulation CC, is mandatory. POS systems must ensure secure storage and processing of check data.<\/p>\n<p><strong>Digital Wallet Transactions &amp;\u00a0Tokenization and Encryption<\/strong><\/p>\n<p>Digital wallets such as Apple Pay, Google Pay, and Samsung Pay rely on tokenization to protect transaction data.\u00a0 POS systems must support these technologies to ensure compliance with PCI DSS and other data protection standards such as consumer Data privacy laws.\u00a0 Digital wallet transactions often involve storing sensitive consumer data. POS systems that interact with Digital Wallets must comply with data protection laws such as the General Data Protection Regulation (GDPR) in the EU or the California Consumer Privacy Act (CCPA) in the United States. Businesses accepting cryptocurrencies must comply with AML and KYC regulations, ensuring that POS systems can verify the identity of users and track transaction origins.<\/p>\n<ol start=\"5\">\n<li>Cryptocurrency Transactions<\/li>\n<li>Anti-Money Laundering (AML) and Know Your Customer (KYC) Requirements<\/li>\n<\/ol>\n<ol>\n<li>Tax Reporting<\/li>\n<\/ol>\n<p>Cryptocurrency transactions are subject to specific tax reporting requirements. POS systems must integrate with tools to calculate capital gains or losses and issue appropriate tax documentation.<\/p>\n<ol>\n<li>Blockchain and Smart Contract Standards<\/li>\n<\/ol>\n<p>POS systems facilitating cryptocurrency payments may need to adhere to emerging standards for blockchain transactions to ensure interoperability and security.<\/p>\n<ol start=\"6\">\n<li>Accessibility and Anti-Discrimination Laws<\/li>\n<\/ol>\n<p>POS systems must comply with accessibility standards such as the Americans with Disabilities Act (ADA) to ensure equitable access for individuals with disabilities. This includes offering features like tactile keypads or screen reader compatibility.<\/p>\n<ol start=\"7\">\n<li>Security and Breach Notification Laws<\/li>\n<\/ol>\n<p>Many jurisdictions require businesses to notify customers and authorities in the event of a data breach involving POS systems. These laws include:<\/p>\n<ul>\n<li>The General Data Protection Regulation (GDPR) in the EU.<\/li>\n<li>State-specific breach notification laws in the United States, such as California\u2019s Civil Code \u00a71798.82.<\/li>\n<\/ul>\n<div class=\"textbox\">\n<div class=\"group\/conversation-turn relative flex w-full min-w-0 flex-col agent-turn\">\n<div class=\"flex-col gap-1 md:gap-3\">\n<div class=\"flex max-w-full flex-col flex-grow\">\n<div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"5555fc12-a2a4-4540-bc00-a0effb0de35c\" data-message-model-slug=\"gpt-4o\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n<h3><span class=\"ez-toc-section\" id=\"Licenses_and_Attribution\"><\/span><strong>Licenses and Attribution<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><span class=\"ez-toc-section\" id=\"CC_Licensed_Content_Original\"><\/span>CC Licensed Content, Original<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><span data-teams=\"true\">This educational material includes AI-generated content from ChatGPT by OpenAI. The original content created by Mohammed Kotaiche from Hillsborough Community College is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License (<a id=\"menur5so\" class=\"fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn\" title=\"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/deed.en\" href=\"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/deed.en\" rel=\"noreferrer noopener\" aria-label=\"Link CC BY-NC 4.0\">CC BY-NC 4.0<\/a>).\u00a0<\/span><\/p>\n<div class=\"flex-shrink-0 flex flex-col relative items-end\">\n<div>\n<div class=\"pt-0\">\n<div class=\"gizmo-bot-avatar flex h-8 w-8 items-center justify-center overflow-hidden rounded-full\">\n<div class=\"relative p-1 rounded-sm flex items-center justify-center bg-token-main-surface-primary text-token-text-primary h-8 w-8\">All images in this textbook generated with DALL-E are licensed under the terms provided by OpenAI, allowing for their free use, modification, and distribution with appropriate attribution.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<hr \/>\n<\/div>\n<\/div>\n<div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n<div>\n<h4><span class=\"ez-toc-section\" id=\"CC_Licensed_Content_Included\"><\/span><strong>CC Licensed Content Included<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><b>FDIC 2023.<\/b> <i>90 Years of Financial Security<\/i>. Retrieved from <a href=\"https:\/\/www.fdic.gov\/90years#:~:text=September%2021%2C%201950%20The%20Federal,Truman.\" target=\"_blank\" rel=\"noopener\">FDIC\u2019s 90 Years of Financial Security<\/a>.<\/li>\n<li><b>Federal Reserve.<\/b> <i>Fair Lending Regulation B<\/i>. Retrieved from <a href=\"https:\/\/www.federalreserve.gov\/boarddocs\/supmanual\/cch\/fair_lend_reg_b.pdf\" target=\"_blank\" rel=\"noopener\">Federal Reserve\u2019s Fair Lending Regulation B<\/a>.<\/li>\n<li><b>FTC.<\/b> <i>Fair Debt Collection Practices Act<\/i>. Retrieved from <a href=\"https:\/\/www.ftc.gov\/legal-library\/browse\/rules\/fair-debt-collection-practices-act-text#802\" target=\"_blank\" rel=\"noopener\">FTC\u2019s Fair Debt Collection Practices Act<\/a>.<\/li>\n<li><b>FTC 2010.<\/b> <i>Fair Credit Reporting Act 2023<\/i>. Retrieved from <a href=\"https:\/\/www.ftc.gov\/legal-library\/browse\/statutes\/fair-credit-reporting-act\" target=\"_blank\" rel=\"noopener\">FTC\u2019s Fair Credit Reporting Act<\/a>.<\/li>\n<li><b>HHS.<\/b> <i>About the Affordable Care Act (ACA) 2010<\/i>. Retrieved from <a href=\"https:\/\/www.hhs.gov\/healthcare\/about-the-aca\/index.html\" target=\"_blank\" rel=\"noopener\">HHS\u2019s Overview of the Affordable Care Act<\/a>.<\/li>\n<li><b>KFF.<\/b> <i>Health Policy 101: The Affordable Care Act<\/i>. Retrieved from <a href=\"https:\/\/www.kff.org\/health-policy-101-the-affordable-care-act\/?entry=table-of-contents-what-is-the-affordable-care-act\" target=\"_blank\" rel=\"noopener\">KFF\u2019s Guide to the Affordable Care Act<\/a>.<\/li>\n<li><b>NCUA.<\/b> <i>Equal Credit Opportunity Act (Regulation B) 2023<\/i>. Retrieved from <a href=\"https:\/\/ncua.gov\/regulation-supervision\/manuals-guides\/federal-consumer-financial-protection-guide\/compliance-management\/lending-regulations\/equal-credit-opportunity-act-regulation-b\" target=\"_blank\" rel=\"noopener\">NCUA\u2019s Equal Credit Opportunity Act Regulation B<\/a>.<\/li>\n<li><b>SEC.<\/b> <i>U.S. Securities and Exchange Commission<\/i>. Retrieved from <a href=\"https:\/\/www.sec.gov\/\" target=\"_blank\" rel=\"noopener\">U.S. Securities and Exchange Commission (SEC)<\/a>.<\/li>\n<li><b>Wikipedia.<\/b> <i>2010 United States Foreclosure Crisis<\/i>. Retrieved from <a href=\"https:\/\/en.wikipedia.org\/wiki\/2010_United_States_foreclosure_crisis\" target=\"_blank\" rel=\"noopener\">Wikipedia\u2019s 2010 United States Foreclosure Crisis<\/a>.<\/li>\n<\/ul>\n<\/div>\n<hr \/>\n<h4><span class=\"ez-toc-section\" id=\"Other_Licensed_Content_Included\"><\/span>Other Licensed Content Included<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><b>American University.<\/b> <i>Program Evaluation: The Sarbanes-Oxley Act of 2002<\/i>. Retrieved from <a href=\"https:\/\/www.american.edu\/spa\/publicpurpose\/upload\/program-evaluation-the-sarbanes-oxley-act-of-2002.pdf\" target=\"_blank\" rel=\"noopener\">American University\u2019s Report on the Sarbanes-Oxley Act<\/a>.<\/li>\n<li><b>CFTC.<\/b> <i>Dodd-Frank Act Overview<\/i>. Retrieved from <a href=\"https:\/\/www.cftc.gov\/LawRegulation\/DoddFrankAct\/index.htm\" target=\"_blank\" rel=\"noopener\">CFTC\u2019s Overview of the Dodd-Frank Act<\/a>.<\/li>\n<li><b>Congress.<\/b> <i>The Dodd-Frank Wall Street Reform and Consumer Protection Act<\/i>. Retrieved from <a href=\"https:\/\/www.congress.gov\/111\/plaws\/publ203\/PLAW-111publ203.pdf\" target=\"_blank\" rel=\"noopener\">Congress\u2019s Full Text of the Dodd-Frank Act<\/a>.<\/li>\n<li><b>Consumer Financial Protection Bureau 2025.<\/b> Retrieved from <a href=\"https:\/\/www.consumerfinance.gov\/\" target=\"_blank\" rel=\"noopener\">Consumer Financial Protection Bureau (CFPB)<\/a>.<\/li>\n<li><b>Deloitte.<\/b> <i>RegTech: Gaining Momentum<\/i>. Retrieved from <a href=\"https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/in\/Documents\/risk\/in-risk-RegTech-Gaining-momentum-noexp.pdf\" target=\"_blank\" rel=\"noopener\">Deloitte\u2019s RegTech: Gaining Momentum Report<\/a>.<\/li>\n<li><b>Federal Reserve History.<\/b> <i>Community Reinvestment Act 1977<\/i>. Retrieved from <a href=\"https:\/\/www.federalreservehistory.org\/essays\/community-reinvestment-act\" target=\"_blank\" rel=\"noopener\">Federal Reserve History\u2019s Community Reinvestment Act<\/a>.<\/li>\n<li><b>FINRA.<\/b> <i>Financial Industry Regulatory Authority<\/i>. Retrieved from <a href=\"https:\/\/www.finra.org\/\" target=\"_blank\" rel=\"noopener\">FINRA\u2019s Official Website<\/a>.<\/li>\n<li><b>FinCEN 2025.<\/b> <i>Financial Crimes Enforcement Network<\/i>. Retrieved from <a href=\"https:\/\/www.fincen.gov\/\" target=\"_blank\" rel=\"noopener\">FinCEN\u2019s Official Website<\/a>.<\/li>\n<li><b>Investopedia 2023.<\/b> <i>Systemically Important Financial Institution (SIFI)<\/i>. Retrieved from <a href=\"https:\/\/www.investopedia.com\/terms\/s\/systemically-important-financial-institution-sifi.asp\" target=\"_blank\" rel=\"noopener\">Investopedia\u2019s Explanation of SIFI<\/a>.<\/li>\n<li><strong>PCI Security Standards Council. (2024).<\/strong> <em>Homepage<\/em>. <a href=\"https:\/\/www.pcisecuritystandards.org\/\" target=\"_new\" rel=\"noopener\">PCI Security Standards Council<\/a><\/li>\n<li><b>New Silver 2024.<\/b> <i>History of Housing Market Crashes<\/i>. Retrieved from <a href=\"https:\/\/newsilver.com\/the-lender\/history-of-housing-market-crashes\/\" target=\"_blank\" rel=\"noopener\">New Silver\u2019s History of Housing Market Crashes<\/a>.<\/li>\n<li><b>TechTarget 2025.<\/b> <i>Gramm-Leach-Bliley Act<\/i>. Retrieved from <a href=\"https:\/\/www.techtarget.com\/searchcio\/definition\/Gramm-Leach-Bliley-Act\" target=\"_blank\" rel=\"noopener\">TechTarget\u2019s Gramm-Leach-Bliley Act Overview<\/a>.<\/li>\n<li><b>WalletHub 2025.<\/b> <i>Current Credit Card Interest Rates<\/i>. Retrieved from <a href=\"https:\/\/wallethub.com\/edu\/cc\/current-credit-card-interest-rates\/128285\" target=\"_blank\" rel=\"noopener\">WalletHub\u2019s Current Credit Card Interest Rates<\/a>.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"author":123,"menu_order":9,"comment_status":"open","ping_status":"closed","template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-823","chapter","type-chapter","status-publish","hentry"],"part":3,"_links":{"self":[{"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/pressbooks\/v2\/chapters\/823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/wp\/v2\/users\/123"}],"replies":[{"embeddable":true,"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/wp\/v2\/comments?post=823"}],"version-history":[{"count":68,"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/pressbooks\/v2\/chapters\/823\/revisions"}],"predecessor-version":[{"id":1249,"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/pressbooks\/v2\/chapters\/823\/revisions\/1249"}],"part":[{"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/pressbooks\/v2\/parts\/3"}],"metadata":[{"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/pressbooks\/v2\/chapters\/823\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/wp\/v2\/media?parent=823"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/pressbooks\/v2\/chapter-type?post=823"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/wp\/v2\/contributor?post=823"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.hcfl.edu\/introtofintech\/wp-json\/wp\/v2\/license?post=823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}