Building Bridges: Unleashing the Potential of Cross-Border Payment Interoperability

In today’s globalized world, cross-border payments have become an essential aspect of international trade and commerce. However, the existing clearing systems and processes for cross-border payments often lack interoperability, leading to delays, inefficiencies, and increased costs. Interoperability is crucial for ensuring smooth, secure, and efficient transactions between different clearing systems.

Understanding Cross Border Payments Interoperability

  • Cross-border payments interoperability refers to the ability of different payment systems, platforms, clearing systems & networks to work seamlessly with one another across national borders, enabling the efficient and secure transfer of funds between individuals, businesses, and financial institutions from different countriesin a standardized and efficient manner. It allows a smooth flow of funds and information across borders, reducing friction and facilitating international transactions.
  • Achieving cross-border payment interoperability requires collaboration between payment and clearing systems, networks, and financial institutions. It involves adopting common standards and protocols, improving infrastructure, and enhancing regulatory frameworks to ensure that cross-border payments are secure and efficient.

Benefits of Interoperability

1.Seamless Transactions:

Interoperability enables smooth and frictionless cross-border payments by allowing different payment systems and networks to communicate and transact with one another. It eliminates the need for having multiple intermediaries and complex routing processes, streamlining the transaction flow, and reducing processing times.

2.Enhanced Efficiency:

Inteoperability eliminates manual intervention, reduces redundant processes, and streamlines transaction flows. It enables automated settlement, reconciliation, and reporting, leading to faster payment processing and reduced settlement times, enhancing efficiency across the transaction life cycle.

3.Cost Savings:

By promoting interoperability, clearing systems can eliminate the need for multiple intermediaries, which often results in higher transaction costs. Streamlined processes and reduced manual intervention leading to cost savings for banks and financial institutions.

4.Increased Transparency:

Interoperability fosters greater transparency in cross-border payments by providing real-time visibility into transaction status, fees, and foreign exchange rates. This transparency reduces the risk of errors, disputes, and fraud and enhances trust among participants.

5. Improved access to financial inclusion:

Interoperability opens doors to previously underserved regions and markets. It enables smaller banks and payment service providers to connect with global clearing systems, expanding their reach and facilitating financial inclusion.

Overall, interoperability in cross-border payments brings numerous benefits, such as cost reduction, faster transactions, increased transparency, and expanded financial inclusion. By fostering seamless connectivity and collaboration among payment systems, interoperability contributes to international trade and finance growth.

Challenges to Achieving Interoperability:

There are multiple challenges to achieving interoperability. Technical challenges usually comprise systems that use different technical standards, communication protocols, and related software and hardware infrastructure, other challenges are related to data and semantics, and there are also legal and commercial challenges to achieving interoperability.

Some of the significant challenges around interoperability are:

1.Standardization:

Different clearing systems may operate on diverse protocols, messaging formats, and data standards. Achieving interoperability requires establishing common standards and protocols that enable seamless communication and data exchange across platforms. Adopting standardized messaging formats, such as ISO20022, is crucial in achieving interoperability.

2.Regulatory compliance:

Cross-border payments involve adherence to various regulatory frameworks and compliance requirements. Ensuring interoperability while complying with different regulations can be complex and requires coordination among multiple stakeholders.

3.Data Security and Privacy:

Interoperability raises data security and privacy concerns, as different systems must exchange sensitive information. Establishing robust security measures, data protection frameworks, and secure communication channels is critical to addressing these concerns.

4.Stakeholder Collaboration:

Achieving interoperability necessitates collaboration among banks, payment service providers, clearing houses, regulatory bodies, and technology providers. Collaboration efforts should focus on establishing common standards, developing interoperability frameworks, and addressing technical and operational challenges.

While international interoperability comes with a few challenges, overcoming them is possible with the support of regulators, global schemes, and a compatible business model across international borders and technology. Interoperability can also be challenging when dealing with legacy systems. Cross-border payments face four challenges, high cost, low speed, limited access, and insufficient transparency. These challenges arise from a series of frictions, including fragmented and truncated data formats, complex processing of compliance checks, limited operating hours, legacy technology platforms, long transaction chains, and high funding costs.

Legal, technical, and commercial changes are necessary for several areas to overcome these frictions, improvements in existing payment infrastructures and arrangements (e.g., operating hours, participation requirements, funding, and interlinking arrangements), and harmonization of market practices and standards (e.g., messaging standards) are required to make this happen.

There are ongoing projects to relieve the traditional cross-border payment system of some of these frictions, such as introducing a common messaging standard. However, such improvements on an already existing and complex structure can be costly and complicated.

Recent Developments

Instant payment systems (IPS) launched in different markets have been at the forefront in delivering significant benefits to end users and regulatory bodies alike, with substantial growth in adoption worldwide boosting digital economies. There are initiatives undertaken by the Central Banks of different countries collaborating to establish interoperability of fast payments by connecting their respective IPS systems. This initiative aims to achieve several significant outcomes, such as reducing transaction costs for cross-border payments in the respective regions. Moreover, it has broader objectives encompassing the promotion of inclusive growth, facilitation of cross-border trade, investment, financial deepening, remittance, tourism, and other economic activities.
CBDCs can also help to enhance cross-border payment interoperability in various ways. First, as with any new system, one key advantage of retail and wholesale CBDC is the opportunity to start with a “clean slate.” CBDC is new to all, and those central banks who choose to explore one must go through design and development phases. This provides an opportunity for central banks to take the cross-border dimension into account when designing their domestic CBDCs. For example, CBDC infrastructures could be made available 24/7, allowing for instant cross-border settlement and overcoming mismatches of operating hours between different jurisdictions.

Conclusion

Achieving interoperability in cross-border payments requires collaboration, standardization, and the establishment of technical and regulatory frameworks, such as having standardized messaging formats and harmonizing technical specifications, data structures, and protocols which will enable seamless communication and processing between diverse systems.

Interoperability In clearing systems for cross-border payments is essential for facilitating seamless and efficient cross-border transactions. By overcoming the challenges of standardization, regulatory compliance, data security, and stakeholder collaboration, the financial industry can unlock the benefits of interoperability, including increased efficiency, cost savings, transparency, and improved access to financial services.

Also, continued efforts to promote interoperability will contribute to the growth of global trade and economic development while enabling individuals and businesses to transact across borders easily.

Vikram Menon

 

Knowledge Engineering & Neural Network- A Hybrid Synergy

As the world becomes increasingly interconnected, the need for efficient and secure cross-border financial transactions continues to grow. Globalisation of trade and commerce, internationalisation of businesses are reshaping the extended needs of cross-border payment solutions. Adoption of common currencies, relaxation of border clearance formalities etc. have brought more seamless transfer of money within countries in selected blocs. Another great force behind the size of the cross border payment and transfer of money is the movements of the Diaspora Community from one to another Country or Continent. These communities significantly contribute to the economy of the host and respective home country as well.

With the advent of fintech capabilities of Lulu Financial Holding( LFH), the landscape of remittance has experienced a paradigm shift, covering enhanced efficiency, speed, security and compliance giving rise to innovative solutions. Profile management of remitter and receiver as two sides of a coin with variety of needs, is prime focus with a highly adaptive regulatory compliant environment, global reach and a better cross currency transfer markup offering us edge over multiple solutions available for customers to choose the best to move money with a peace of mind. Biometric authentication like fingerprints, facial recognition are now mandatory technologies to ease the onboarding processes. Effort score of every customer to be the minimum while interacting with applications with a self-service driven model, which is the core focus area.

Variety of technology solutions has enhanced the possibility of transferring money more securely with digital payment platforms, Online Operations and Mobile apps, Real Time Settlements, Funding models and Aggregations, and a Blockchain powered Distributed Ledger model enabling seamless movement of individual transactional messages, settlements and journal entries, within multiple Service Providers. While every individual component in the domain in its capacity, building Data Analysis, Artificial Intelligence( AI), Regulatory Technology(RegTech), Financial APIs and Open Banking etc and are grown as independent solutions and have gained unique propositions over a period of time. Every lead player is leveraging such capabilities to attract other smaller players and likeminded partners to operate under those bigger platforms built for such scalable operations at any size and with a decent amount of customizations. Technology is ever changing which then primarily eases the efforts of moving money security and instantly. LFH is offering a variety of such solutions to the customers, both internally and externally across the globe.

It is not easy to establish an enterprise level Business Infrastructure with all such complex networks, relationships, partnerships, and with a variety of regulatory frameworks, and a scalable infra and application landscape, to handle massive numbers of messages and secure information management seamlessly. LFH already has this space and is building unique Infrastructure which allows potential solution providers to connect and consume such proven capabilities. Every such engagement is additionally building propositions which are good for the global business and our individual expansion plans. We do encourage such labs, experiments and transformation programs within, and with similar intensity like we do our regular businesses. Our global presence, multiple treasury vaults, variety of operational licences and products are helping to build extended infrastructure which will be beneficial for all kinds of consumers, both Individually and as a Shared Service Provider. Another set of challenges most of the companies are facing are about De-risking and Business Continuity. It is a major agenda in every organisation and we are not different too.

Technical Infrastructure scalability is another area, to handle all possible and anticipated Business & Tech challenges are to be addressed professionally. With an investment of our sizable tacit knowledge and professionalism acquired from our long standing existence in the industry, strong and sizable frameworks have been established which are helping organisations to meet any kind of such exigencies and operational requirements. With a stringent Regulatory Framework and Data Security Standards Globally, every such business provider would be facing tough tasks to meaningfully and logically keep such infrastructure presented with confidence and offer the most modern facilities to abide by the strict guidelines released from various regulatory bodies. LFH is always keen to keep such operational models security and owning responsibility to assist achieving the desired results.

Partnership and coexistence is an essential culture in the financial industry and it helps to grow together consuming shared technology capabilities of various service providers. Lulu is always keen to work closely with the leading service providers and adopt the extended capabilities of Financial APIs and Open Banking. Such seamless interoperability helps setting a healthy operational environment with competition and innovative mindsets. Cross Border Payment Solutions, Hard currency business solutions ( Bank Notes) and Purpose based Payments are adopting similar capabilities to co-create and optimise the cash flow management, upselling and enhance revenue from combination of services.

Data driven decisions are helping organisations to set the goals and strategies in the ever changing competitive environments. As a pioneer player in the financial industry, our Technology driven initiatives are largely controlled by Data driven models. It covers Transaction Monitoring & Security, Compliance and Regulatory Reporting, Risk Scoring, Automation and Efficiency Driven Programs, Innovation and Product Engineering, and most importantly Customer Experience and Personalization. Our Customer Data Platforms, publishing of our individual feature capabilities with exposed APIs for the consumer and partners based on our earned capabilities and experience in the industry is the key to retain us as a frontline player always.

It is essential to diversify and grow laterally as well. Our market presence and growth aspects are complementing existing products and services line extensions. Our applications listen to the customer interactions, valuable data, and the measurable output created out of such engagements, are helping to access the possibilities around. Measuring market trends, competitive landscape, and with the strategic partnerships and alliances introducing new product lines to the vertical. Technology assist designing prototypes and simulation tools, to add additional product verticals to the scalable platforms already built to showcase services. Every such intuitive, and a low cost design principles are a triggering force to work with less noise, high efficiency and launching in style.

While aggressively speaking about the AI and ML opportunities, core strength is our people and a tribe who do not allow settling into the BAU environment, are our strength. Thinking wild and experimenting to derive the best out of the possibilities around us, without a fear of failure are keeping our fire alive, and we do challenge our benchmarks regularly. Every lateral growth opportunity does not come to the table by luck, but it has to be captured using the intentional experimentation and to allow adopting failures from labs. We do encourage challenging our Tech landscapes to derive such surprises and outputs. At the group level, we follow 2023 as A Year To Redefine, and that exactly fueling the purpose of redefining our People, Process & Technology for our Customers to attain the next level of Service Excellence.

Sreekanth Ramakrishnan

Emerging Cyber Threats Against the Financial Industry: Protecting Critical Assets in the Digital Age

The financial sector is at the forefront of technology development, utilizing digital solutions to increase client comfort and efficiency. The industry is, however, also exposed to a variety of new cyber threats as a result of this digital revolution. Financial institutions are the subject of sophisticated cyberattacks by cybercriminals who are constantly changing their strategies in an effort to gain sensitive data, disrupt business, and take advantage of weaknesses. Let’s examine the most significant recent cyberthreats to the financial sector and consider preventative measures to protect against them.

1. Ransomware Attacks: Holding Data Hostage

Ransomware attacks have become a significant concern for the financial industry. Cybercriminals exploit vulnerabilities in systems to gain unauthorized access and encrypt critical data, demanding a ransom for its release. These attacks can cause severe operational disruptions, financial losses, and reputational damage. Financial institutions must take proactive measures to mitigate this risk, such as:

  • Robust Security Measures: Implement comprehensive security solutions, including advanced firewalls, intrusion detection and prevention systems (IDPS), and endpoint protection. Regularly update and patch systems to address known vulnerabilities.
  • Employee Education: Conduct ongoing cybersecurity training to educate employees about phishing techniques, social engineering, and safe browsing habits. Teach them to identify suspicious emails and avoid clicking on malicious links or downloading attachments from unknown sources.
  • Regular Data Backups: Implement robust backup processes to ensure critical data is regularly backed up and stored in secure off-site locations. Test the restoration process to guarantee data can be recovered in the event of a ransomware attack.

2. Advanced Persistent Threats (APTs): Stealthy and Targeted Attacks

Advanced Persistent Threats (APTs) are sophisticated, long-term cyber attacks orchestrated by skilled adversaries. APT actors, often state-sponsored, target financial institutions to gain unauthorized access to sensitive data, including customer information and intellectual property. To mitigate the risk of APTs, financial institutions should:

  • Multi-Layered Defense: Implement multiple layers of security controls, including network segmentation, strong authentication mechanisms, and robust endpoint protection. Employ next-generation firewalls, intrusion prevention systems (IPS), and security information and event management (SIEM) tools for real-time monitoring and threat detection.
  • Continuous Threat Intelligence: Stay up to date with the latest threat intelligence to understand evolving attack vectors and tactics employed by APT groups. Collaborate with industry peers, government agencies, and cybersecurity experts to share information and enhance threat detection capabilities.
  • Regular Security Assessments: Conduct periodic penetration testing, vulnerability assessments, and security audits to identify weaknesses in network infrastructure and applications. Implement timely remediation measures to address identified vulnerabilities.

3. Insider Threats: The Risk Within

Insider threats pose a significant risk to the financial industry as employees or trusted individuals within an organization can misuse their access privileges. Insider threats can involve data theft, manipulation of transactions, or unauthorized disclosure of confidential information. Financial institutions should adopt the following measures to mitigate insider threats:

  • Access Controls: Implement strict access controls and user management processes, following the principle of least privilege. Continuously monitor and review user permissions to ensure they align with job roles and responsibilities.
  • Employee Vetting: Conduct comprehensive background checks during the hiring process to identify any red flags or prior incidents that could indicate potential insider threats. Implement a robust onboarding process to communicate security policies and expectations clearly.
  • Monitoring and Auditing: Employ monitoring systems to track user activities, network traffic, and access to sensitive data. Regularly review logs and conduct audits to detect and investigate any suspicious activities.
  • Employee Awareness Programs: Educate employees about the importance of data security, the consequences of insider threats, and the channels available for reporting suspicious activities. Foster a culture of security awareness and encourage employees to report concerns promptly.

4. Cloud-based Vulnerabilities: Protecting Data in the Cloud

The financial industry’s increasing adoption of cloud services brings scalability and cost-efficiency but also introduces unique security challenges. Misconfigured cloud instances, insecure APIs, and unauthorized access to data are potential risks. To enhance cloud security, financial institutions should:

  • Comprehensive Cloud Security Strategy: Develop a robust cloud security framework that includes encryption of data in transit and at rest, secure configuration management, and strict access controls. Leverage cloud security tools and services provided by reputable cloud service providers.
  • Continuous Monitoring and Auditing: Implement cloud security monitoring solutions to detect and respond to suspicious activities and potential breaches. Monitor access logs, network traffic, and user behavior to identify anomalies and potential security incidents.
  • Strong Authentication and Identity Management: Utilize multifactor authentication (MFA) mechanisms, role-based access control (RBAC), and identity and access management (IAM) solutions to manage user identities and ensure only authorized individuals can access cloud resources.
  • Regular Security Assessments: Conduct periodic security assessments and penetration testing of cloud environments to identify and remediate vulnerabilities. Stay informed about cloud service provider security practices and collaborate with them to address potential risks.

5. Mobile Banking Threats: Protecting Customers on the Go

With the rise of mobile banking apps, cybercriminals have shifted their focus to mobile platforms. Malicious apps, mobile phishing, and SIM swapping attacks are among the emerging threats facing the financial industry. Financial institutions should take the following steps to protect mobile banking users:

  • Secure App Development: Follow secure coding practices and conduct thorough security testing during the development of mobile banking applications. Implement measures to protect against reverse engineering, tampering, and code injection attacks.
  • Strong Authentication: Implement strong authentication mechanisms, such as biometric authentication, hardware tokens, or one-time passwords (OTP), to enhance the security of mobile banking transactions and prevent unauthorized access.
  • User Education and Awareness: Educate mobile banking users about the risks associated with downloading apps from unofficial sources, clicking on suspicious links, or sharing sensitive information. Encourage users to install reputable security software on their mobile devices and enable automatic app updates.
  • Monitoring for SIM Swapping Attacks: Collaborate with mobile network operators to detect and prevent SIM swapping attacks. Implement additional security measures, such as requiring customers to provide additional verification before making account changes.

The concerns listed above are merely the tip of the iceberg; every day, unforeseen risks appear. To counter such attacks, the defenders began utilizing AI (Artificial Intelligence) and ML (Machine Learning) technology. The most concerning aspect of this is that malicious actors may have already begun investigating these technologies for an offensive purpose.

As the financial industry continues to evolve in the digital age, it must remain resilient against emerging cyber threats. By understanding the evolving threat landscape and implementing proactive cybersecurity measures, financial institutions can safeguard their systems, data, and reputation. Robust security measures, employee education, continuous monitoring, and collaboration with industry peers are crucial in maintaining a secure environment and protecting the trust of customers and stakeholders in the financial industry’s future.

Midhun Kumar A.V

Five Decision-Making Models to Maximise Success

There is a wonderful saying that the world is a buffet of choices. And our life is an outcome of the choices we make. There is a strong correlation between effective decision-making and the quality of life. Every decision impacts us in some way, whether it is about our habits, career choices, building relationships, or going on vacations. Bigger the decision, higher the impact.

Quoting some examples, Mahatma Gandhi chose to lead the freedom movement solely on non-violence which made him one of the most respected leaders in the world. Sylvester Stallone made a choice of not just selling the script of the blockbuster Rocky movie but insisted on being hired as a lead actor in the movie. Satya Nadella made a choice of investing in AI technology to create the next big wonder ChatGPT. Whereas Mark Zuckerberg’s efforts of investing in the metaverse didn’t go well as expected so far. It is clear from these examples that decision-making impacts individuals, companies, and sometimes the entire nation in a big way. Therefore, one must give tremendous respect to the process of decision-making to ensure better outcomes. This article will cover five simple and practical models for effective decision-making.  So read on.

Decoding effective decision-making is like searching for precious gems and pearls. The journey to effective decision-making does have obstacles and distractions along the way. Some of these obstacles are biases, impulses, lack of self-awareness, greed, fear, uncertainty, and complexity. The influence of these obstacles can be so subtle that it is almost impossible to identify them. Only after making several wrong decisions, do people learn to differentiate the influence of these obstacles. The million-dollar question is, how can we overcome biases and other obstacles before making important decisions in our lives?

Most people are unconscious of their personal decision-making approach. Some people are skewed toward intuition and impulses for taking decisions while others are more logical and unemotional. Scientists believe, relying solely on logic or intuition may not always give a balanced view of the situation. Following an unconscious and skewed approach to decision-making may prove expensive and faulty. Scientists believe one must take cues from both intuition and logic to arrive at decisions. However, sometimes people are faced with situations where they don’t have prior information or experience to apply logic and intuition. They may feel extremely overwhelmed in such a situation and may end up taking a wrong decision. It can be extremely frustrating and stressful. They need a way to evaluate their option thoroughly to arrive at better decisions.

These five decision-making models can make life easy. While working with these models, it may further help to develop both logic and intuition. When there is logic and intuition, people are more confident to make wise decisions based on the big picture. Let us explore these decision-making models with the help of an example.

Consider a situation, where a person needs to choose between investing a windfall gain of USD 100000, in one of the two options –

  • A. Invest in a retirement fund
  • B. Buy a luxury car

Let us evaluate these options through 5 decision-making models such as –

1. Rating Model

2. Impact on Stakeholders Model

3. Ethics and Values Model

4. Personal Vision Model

5. Advisor Model

 

Rating Model  

The rating model is rational and logical in nature. In the model, you must identify important parameters for evaluating the alternatives. Give a score on each parameter ranging from 1 to 5 where 5 is the highest score. Total up the score for both alternatives. The alternative with the maximum score stands out. Take a look at the table given below to understand this better. The decision-maker identified 5 parameters that will be impacted by the decision, lifestyle, security, happiness, peace, and finance.

Parameters Option A

Retirement Fund

Rating (1 – 5)

Option B

Luxury Car

Rating (1 – 5)

Lifestyle 1 4
Security 4 1
Happiness 3 4
Peace 4 2
Finance 5 2
Total 17 13

After the rating is given for each parameter, the total comes to 17 for option A and 13 for option B. In this model, Option A looks more promising than Option B.

 

Impact on Stakeholders Model 

This model is intuitive in nature. It considers the impact of the decision on the stakeholders. It measures the feeling of stakeholders about the decision. Identify the stakeholders affected by the decision. The impact and feeling may be observed as positive, negative, or neutral. Give a score of (+1) if the impact is positive, (-1) for negative, and (0) for neutral. Check the given table below for understanding it well.

Stakeholder Option A – Retirement Fund

(Sentiment)

Option B – Luxury Car

(Sentiment)

Self Positive (+1) Negative (-1)
Wife Positive (+1) Positive (+1)
Kid Neutral (0) Positive (+1)
Total 2 1

As per this model, the sentiment score for option A is higher than option B. Taking Option-A will make the majority of the stakeholders happier.

 

Ethics & Values Model

This model is based on ethics, personal values, belief system, integrity, and commitment. This model is intuitive in nature. These elements have a very profound impact on the decision-making. Hence, considering them is extremely important. This model enables people to listen to their inner voice and gauge their feeling toward the available options. The option that is aligned with ethics and personal values feels better. The inner voice will give subtle indications that need to be captured carefully. This is like a supercomputer doing quick calculations based on the software to give the final answer. This process is a very natural and powerful one. Go for the option that feels right. In this example, look at the responses captured by the decision-maker for both options. Option-A feels more right by the decision-maker.

Model Option A – Retirement Fund Option B – Luxury Car
Ethics & Values Model Yes, this is wise to invest in a retirement fund No, this is a wastage of money

 

Personal Vision Model

This model requires the decision-maker to match the available options with the personal vision. Having a personal vision is a great way to navigate oneself in life. Introspection at regular intervals may be useful to develop a personal vision. One must evaluate the consequences of each option on the personal vision. Find out which choice has a high potential to support the vision. A choice that supports the vision must be given due preference. Mark the choice as ‘Supportive’ or ‘Unsupportive’ against the choices. Let’s say the vision of the decision-maker is to buy a farmhouse in the hill station for spending retirement years and enjoy a peaceful life in nature. Look at the given table below for a clear understanding.

Model Option A – Retirement Fund Option B – Luxury Car
Personal Vision Supportive Unsupportive

As per this model, Option-A is marked as supportive compared to the other option.

 

Consultation Model

In this model, a decision-maker is expected to consult with people in the close network. It may consist of mentors, close friends, colleagues, family members, and professionals. It is important to carefully choose the people in the advising circle who can contribute with some valuable input in making decisions. Explain the situation to the advisors and share the available choices. Consult them and capture their responses for each alternative. Look at the table given below. In the end, check the number of ‘Yes’ for each choice. The choice with a majority of ‘Yes’ can be given a higher preference.

Advisors Option A – Retirement Fund Option B – Luxury Car
Mentor-1 Yes, go ahead No, leave this option
Mentor-2 Yes, go ahead No, leave this option
Friend-1 No, leave this option Yes, go ahead
Friend-2 No, leave this option Yes, go ahead
Friend-3 Yes, go ahead No, leave this option
Expert-1 Yes, go ahead No, leave this option
Expert-2 No, leave this option Yes, go ahead
Spouse Yes, go ahead No, may be later
Total Score 5 3

In this model, Option-A receives 5 Yes and Option-B gets only 3, hence investing in a retirement fund can be preferred.

At the end of this analysis, the decision-maker is in a better position to choose the right option. As per the analysis across the five (5) models of decision-making, Option-A (Building a retirement fund) is a clear winner.

At last, it can be concluded that decision-making is an important skill that shapes the fate of people, companies, and the nation. A good decision requires overcoming the influence of biases, impulses, greed, or fear. Scientists recommend considering both logic and intuition for a more balanced decision. Decision-making models can help people develop logic and intuition to make informed decisions with high conviction and confidence. It may increase their probability of success and eliminate the risk. Spending time developing and sharpening decision-making skills is of utmost importance. Let us become a better decision-makers to prosper well!

 

About the author:

Gaurav Warman is a Talent Development Practitioner with 17 years of experience in large organizations across Asia, Middle East, and the APAC region. He currently working as Head of Learning and Performance Management at Lulu Financial Holdings in Abu Dhabi (UAE). He is passionate about topics such as behavioral psychology, leadership, and personal effectiveness.  He loves reading, listening to music, and cycling.

Real-Time Risk Management Through Audit, Risk & Compliance: The Future Of Corporate Governance

The traditional approach to risk management involves periodic assessments and controls to identify and mitigate potential risks. However, in today’s rapidly changing business environment, organizations need to adopt a real-time approach to risk management to stay ahead of emerging threats.

Need for real-time risk management.
Here are some reasons why there is a need for real-time risk management:

Increasing complexity and speed of business: The pace of business is accelerating, and organizations are becoming more complex. Real-time risk management can help organizations keep up with this pace and address risks as they arise.

Emergence of new risks: New risks are constantly emerging, particularly in cybersecurity and data privacy areas. Real-time risk management can help organizations identify and address these risks quickly.

Regulatory requirements: Many regulatory requirements now require real-time monitoring of risks. For example, the General Data Protection Regulation (GDPR) requires organizations to report data breaches within 72 hours.

Impact of risks: The impact of risks can be significant and sometimes result in business failure. Real-time risk management can help organizations mitigate the impact of risks and minimize potential damage.

Changing business models: Many organizations are changing their business models, and real-time risk management can help ensure that risks associated with these changes are identified and addressed quickly.

Real-time risk management can help organizations stay ahead of the curve and address risks as they arise rather than reacting to them after the fact. By implementing real-time risk management processes, organizations can better protect themselves and their stakeholders from the negative impact of risks.

In this blog post, we will explore the concept of real-time risk management through audit, risk & compliance and its potential to revolutionize corporate governance.

What is real-time risk management?

Real-time risk management is an approach that enables organizations to identify, assess, and mitigate risks in real time. The goal is to prevent risks from materializing into significant problems by addressing them as soon as they are identified.

Real-time risk management through an audit, risk & compliance

The Audit, Risk, and Compliance Committee (ARC Committee) is a subcommittee of a company’s board of directors that oversees the company’s audit, risk management, and compliance functions. The committee’s primary role is to provide independent oversight of these functions to ensure that they are effectively managed and that the company is operating in accordance with relevant laws, regulations, and best practices.

The audit, risk & compliance (ARC) function is critical to real-time risk management. It provides an integrated approach to risk management, ensuring that risks are identified and mitigated across the organization. The ARC function consists of three key components:

Audit: The audit component of ARC provides independent and objective assurance that the organization’s operations are conducted in compliance with relevant laws, regulations, policies, and procedures. It evaluates the adequacy and effectiveness of the organization’s internal controls, identifies potential risks, and provides recommendations to mitigate those risks.

Risk: The risk component of ARC identifies, assesses, and manages risks across the organization. It develops risk management strategies, monitors the effectiveness of risk mitigation efforts, and provides recommendations to improve risk management capabilities.

Compliance: The compliance component of ARC ensures that the organization operates within the legal and regulatory framework. It evaluates the organization’s compliance with relevant laws, regulations, policies, and procedures and provides recommendations to improve compliance where necessary.

By combining the audit, risk, and compliance functions into a single integrated framework, organizations can adopt a real-time approach to risk management. The ARC function can leverage advanced technology, such as artificial intelligence, machine learning, and predictive real-time data analytics, to monitor business operations, identify potential risks, and take corrective action in real time. This approach enables organizations to address risks as soon as they are identified rather than waiting for periodic assessments.

The benefits of real-time risk management through ARC
Real-time risk management through ARC provides several benefits for organizations, including:

Early identification and mitigation of risks: Real-time risk management enables organizations to identify and mitigate risks as soon as they are identified, reducing the likelihood of risks materializing into significant problems.

Improved decision-making: Real-time data analytics gives organizations real-time insights into business operations, enabling them to make better and more informed decisions.

Enhanced agility and responsiveness: Real-time risk management enables organizations to respond quickly to emerging risks, improving their agility and responsiveness to changing business conditions.

Improved compliance: Real-time risk management through ARC ensures that organizations operate within the legal and regulatory framework, reducing the risk of non-compliance.
Examples of real-time risk management in the money transfer business:

Compliance monitoring: Money transfer businesses must comply with various regulatory requirements and sanctions lists to prevent money laundering and terrorist financing. Real-time compliance monitoring enables businesses to monitor transactions in real time and identify any potential compliance violations before they occur.

Currency exchange rate monitoring: Currency exchange rates fluctuate constantly, and money transfer businesses must adjust their rates accordingly to remain competitive. Real-time monitoring of exchange rates enables businesses to adjust their rates in real-time, ensuring they stay competitive and profitable.

Risk-based transaction monitoring: Real-time risk-based transaction monitoring involves analyzing transactions in real time and identifying high-risk transactions based on various risk factors, such as transaction amount, destination country, and customer history. This approach enables businesses to prioritize their resources and focus on high-risk transactions, reducing the likelihood of financial losses due to fraud or non-compliance.

Real-time fraud monitoring: Money transfer businesses can leverage advanced analytics and machine learning algorithms to monitor real-time transactions and identify potentially fraudulent activity. By analyzing transactional data in real-time, companies can identify and prevent fraudulent activity before it causes significant financial losses.

Conclusion

Real-time risk management through audit, risk & compliance is the future of corporate governance. This approach enables organizations to adopt a real-time approach to risk management, leveraging advanced technology to monitor business operations, identify potential risks, and take corrective action in real time.

Real-time risk management through ARC provides several benefits for organizations, including early identification and mitigation of risks, improved decision-making, enhanced agility and responsiveness, and improved compliance. In addition, the ARC function provides an integrated framework for risk management, ensuring that risks are identified and mitigated across the organization.

As such, organizations should consider adopting a real-time approach to risk management through ARC to stay ahead of emerging threats and position themselves for future success.

About the Author:

Ramesh is a Chartered Accountant from ICAI, India, and a seasoned professional with 22 years of experience across various sectors such as Banking, Financial Services, Mutual Funds, Manufacturing & Retail, and IT Services. He has handled multiple roles such as Internal Audit, Risk Management & Governance, Sarbanes Oxley Compliance, Finance, Accounts, Management & Financial Reporting, and Outsourcing. Ramesh has worked with prominent UK-based banks, leading NBFCs, and other MNCs in India and UAE.

Resilient Leadership

Every human being has the inbuilt psychological need to reach their full potential during their lifetime. Success is a barometer to realize whether a person has achieved their full potential. Success incites strong emotions of happiness and joy among people. It makes people feel powerful and accomplished. However, we all know that success seldom comes easy. Every great success is built upon tremendous failure, pain, hardships, and sacrifices. It is during the phase of suffering that most people give up. Suffering has indeed killed more dreams than failure itself. Therefore, leading oneself to success requires much resilience. And when the scope of the goal is beyond oneself, where it is for a larger community, it requires resilience and leadership both. Resilient leadership is built on the foundation of a leader’s ability to persevere in tough times and strong people management.

Resilient leadership is a potent combination that increases the possibility of achieving success by many folds. People with resilient leadership find their way to gather the much-needed resources and motivation despite obstacles. They grow and mature with every hardship. They gain the right attitude, knowledge, skills, capital, or people over time. Resilient leadership has the magnetic power to pull all kinds of resources together to reach the finish line. Let us recall the inspirational life story of Nelson Mandela and his resilient leadership.

Mandela went on to lead the African National Congress struggle against the racially oppressive apartheid regime of South Africa. In 1963, he went to prison for 27 years for his efforts to bring peace and justice to his countrymen. During this time, he was diagnosed with tuberculosis and received the lowest treatment from prison workers as a Black political prisoner. However, while imprisoned, Mandela earned a Bachelor of Law degree. He gained tremendous public support and worldwide popularity despite being in prison. In 1993, Mandela was awarded the Nobel Peace Prize for their work toward demolishing apartheid in South Africa. In 1994, Mandela was elected president in South Africa’s first democratic elections. Nelson Mandela was an inspiration to millions, and through his speeches, he influenced the youth for the better. Mandela once quoted, “Do not judge me by my successes, judge me by how many times I fell down and got back up again.”

How to be a resilient leader?

⦁ Learn – Learn more to develop your wisdom to improve your reasoning. Better reasoning will make your arguments stronger to gain support and bring change. In addition, it will help in generating newer ideas and alternatives as solutions during hardships. A learning person may anticipate possible difficulties before the event occurs and prepare in advance.

⦁ Listen – Listen to the stakeholders, including sponsors, customers, team members, community, and beneficiaries, to understand the scope well. Understanding the scope well may reduce errors and will keep one on track. This will also help gain stakeholders’ support for better advice and other resources to meet the challenges.

⦁ Recall – Recall the past incidences where you handled the hardships well. Or think about someone who did a brilliant job managing the hardships and came out victorious. Recall the stories of Nelson Mandela, Gandhi, and Martin Luther King.

⦁ Ask questions – Ask questions to yourself and others when there is a hardship. Why is there hardship? Can you do something about it? Is it worth getting stressed about something you cannot control? What is under your control? What can you do best for the things under your control? How will your reaction impact your team members? Sometimes asking questions yourself gives the best answers. Discuss with your mentor and team members to clarify and identify the bottlenecks. You may carve out a better solution this way.

⦁ Relax to recover – Take a break when you hit a roadblock. Let the disappointment settle down. Gain energy during the break and start all over again with enthusiasm.

⦁ Look at the big picture – Go back to basics and look at the big picture. Why did you start this journey, and what was the ultimate objective? Hardships may push you hard to quit. Quitting the mid-way sounds easy, but it may be a bad decision in the long term for oneself and others. If quitting is bad in the long term, then remind yourself to persevere and continue.

At last, resilient leadership may prove to be extremely powerful in achieving the dreams and goals of oneself and the larger community. Every hardship provides an opportunity to develop resilient leadership. One must take this as an opportunity. People love resilient leaders as they are truly inspirational and give better outcomes.

About the author:

Gaurav Warman is a Talent Development Practitioner with 17 years of experience in large organizations across Asia, the Middle East, and the APAC region. In his current position as Head of Learning and Development at Lulu Financial Holdings in Abu Dhabi (UAE), he successfully manages talent development requirements for a large and diverse workforce across 11 countries. He has delivered over 1200 workshops, trained more than 45000 professionals, and developed over 300 training programs. He is passionate about behavioral psychology, leadership, and personal effectiveness. In addition, he loves reading, listening to music, and cycling long-distance rides. He specializes in Executive Coaching, Talent Development, Leadership Development, Learning & Development, Quality Management, Project Management, and Keynote Speaking.

9 Success Stories of Intrapreneurship

As per Gallup research, “Companies who listen to employees are 21% more profitable than the competition”. Intrapreneurship is becoming more relevant in today’s era of rising competition and the shrinking life span of the organization. The culture of intrapreneurship creates an apt environment for breeding innovation. Organizations have started establishing incubation centers to promote intrapreneurship and innovation within the workplace. In this article, you will discover some of the most prominent success stories of Intrapreneurship.

⦁ Frito-Lay – Flamin’ Hot!


In the mid-1980s, to boost revenue the Frito-Lay CEO announced an initiative for all 300,000 employees to “adopt an owner’s mindset.” All employees were invited to share innovative ideas to boost the growth of the organization. A janitor named Richard Montañez, shared an idea with the CEO. Noticing that there was no product catering to the Latino community, he added a home-made spice mix to some Cheetos and brought them to his meeting. The management was stunned by the taste. His idea was chosen for implementation right away.

“If you’re afraid of looking foolish, you’re never going to achieve anything great”. – Richard Montañez

⦁ McDonald’s – The happiest meal

In 1977, St. Louis Regional Manager, D. Brams began trying a new meal just for kids. He pitched his boxed idea to management, and two years later, McDonald’s rolled out its first circus-themed Happy Meal.
Result: Happy Meals have become so essential to McDonald’s business and brand identity that 3 million Happy Meals are sold every day.

⦁ Amazon Prime


Amazon’s The Prime membership idea was created by Amazon employees led by Amazon VP Greg Greeley, who believed that customers would pay more to be part of an exclusive membership that gave them two-day delivery, considered a luxury back then.

⦁ Starbucks – A tall order


Starbucks, founded in 1971 had a mission to become a “third place” to go, to provide a relaxing environment and experience for its customers. One barista decided to start writing the names of customers on cups.
Result: The idea was shared with the corporate office. Months later, this ‘first-name’ approach became a standard at every Starbucks store. The company has since launched designated advertising efforts to promote this personalized touch. Today, this ‘first-name’ approach is used four billion times a year at 30,000 locations globally.

⦁ Sony – Persistence plays


While now a globally recognized phenomenon, the PlayStation was initially a project that garnered resistance. Sony junior staff member Ken Kutaragi, a self-proclaimed ‘tinkerer’ worked with Nintendo developers to make the PlayStation a reality.
Result: Nintendo rejected the idea, but Sony Computer Entertainment (SCE) has become the company’s most profitable business line. Kutaragi became the Chairman and Group CEO of SCE and became “The Father of the PlayStation.”

“I wanted to prove that even regular company employees could build something big”. – Ken Kutaragi

⦁ 3M – Made to stick


3M Spencer Silver invented a sticky adhesive that Art Fry, a fellow 3M employee discovered when searching for a way to keep pages in his books.
Result: Silver and Fry began developing the product after realizing the potential to share messages around the office. Fry supplied the company with the sticky notes, and they were loved by everyone. Post-Its now generate ~$ 1 billion annually.

“I thought, what we have here isn’t just a bookmark. It’s a whole new way to communicate.” – Art Fry

⦁ Gmail by Google


Gmail is a successful outcome of intrapreneurship at Google with their legendary 20%-time policy allowing employees to utilize part of their work hours for personal projects, Paul Buchheit took that chance to create Gmail, which went on to become an important piece of Google’s lineup.
Result: Gmail didn’t just blow away Hotmail and Yahoo Mail, the main free webmail services of the day, but it went on to become a dominant email service. Today Gmail has reportedly more than 1.5 billion global active users, it has gone from a small experiment to becoming a key service of Google’s product offering.

⦁ ITC India


ITC is known to foster the culture of employee ownership and to give them enough autonomy. It is the concept of intrapreneurship that allowed the company to procure agri-products directly from farmers while allowing farmers online access to faraway markets. The idea of e-choupal germinated when Sivakumar, a manager in the ITC Group’s agribusiness unit, approached ITC’s chairman, with a request of Rs 50 lakh to test an idea. He wanted to procure farm produce from soya farmers in Madhya Pradesh, thereby eliminating middlemen.
Result: Today, e-Choupal, reaches out to millions of farmers growing a range of crops in over 40,000 villages in India. It provides valuable information to farmers such as weather forecasts, domestic and international commodity prices, and better crop management methods. It has boosted the productivity of farmers and made the agri-products market more competitive.

⦁ Southwest Airlines


Flight attendant Martha Cobbs became tired of her standard safety announcement monologues and decided to add some humor and heart to it. “In the event, you haven’t been in an automobile since 1960, our flight attendants will now show you how to fasten a seatbelt.” Comments like these would leave passengers laughing.
Result: Cobbs garnered YouTube fame through recordings of her announcements, and Southwest began to encourage staff to embrace humor. Southwest Airlines’ safety announcements are estimated to be worth $140m a year in increased customer loyalty.

Conclusion:

Intrapreneurship carries tremendous potential for organizations. It increases the probability of organizational success by taking the first-mover advantage and beating the competition. The leadership team must encourage employees to adopt the mindset of business owners. Employees with a business-owner mindset are more engaged and satisfied compared to their peers. It increases their chances of growth within the organization.

** The end**

Gaurav Warman

About the author: Gaurav Warman is a Talent Development Practitioner with 15 years of experience in large organizations across Asia, Middle East, and the APAC region. In his current position as Head of Learning and Chief Ideas Enabler at Lulu Financial Holdings in Abu Dhabi (UAE), he is successfully managing the talent development and innovation for a large and diverse workforce across 11 countries. He has delivered over 1200 workshops, trained more than 45000 professionals, and developed over 300 training programs. He is passionate about topics such as behavioral psychology, leadership, and personal effectiveness. He loves reading, listening to music, and cycling long-distance rides. He specializes in Executive Coaching, Talent Development, Leadership Development, Learning & Development, Quality Management, Project Management, and Keynote Speaking.

 

References:
⦁ 14 inspiring examples of intrapreneurship and employee ideas in action, Available at – https://ideas.sideways6.com/article/inspiring-examples-of-intrapreneurship-and-employee-ideas-in-action
⦁ 10 Inspiring Examples of Intrapreneurship, Available at – https://unyscape.com/inspiring-examples-of-indian-intrapreneurship/
⦁ Intrapreneurship Examples: Top 5 Stories from Google, Airbus and More, Available at – https://studiozao.com/resources/intrapreneurship-examples
⦁ Leaving the cult of entrepreneurship: Intrapreneurs are the true drivers of innovation, Available at – https://bigthink.com/smart-skills/intrapreneurs/
⦁ Intrapreneurship Stories To Learn From, Available at – https://lmarks.com/our-blog/intrapreneurship-stories-to-learn-from/
⦁ 30 Books Every Intrapreneur Should Read in 2022, Available at – https://intrapreneurnation.com/skills/books-for-intrapreneurs/

Compliance Risk Management and Technology

It is globally observed that amid continuous changes in Regulations within the Financial Services industry and political instability worldwide, compliance costs are increasing rapidly. The United Nations Security Council and most governments are continuously imposing financial and other types of sanctions on targeted countries and designated individuals to support world peace; these sanctions come as an alternative to war but increase the pressure on Financial Services providers, requiring continuous updates and more controls in place to identify cases related to financial crime and sanctions evasion. How can a Financial Services provider be continuously updated on all these changes? How can a Financial Services provider continuously update its controls to comply with all these Regulatory requirements? All these have a financial cost; hence the increasing requirements directly relate to the increase in the cost of compliance. Lulu Financial Holdings Limited and all subsidiary companies and associates worldwide (the “Group”) seriously consider the need for compliance and the cost of compliance; these issues are promptly addressed and actioned. The first solution to the issue is “investment in the latest technology”; the Group must continuously implement automation and tools to identify, assess, and manage compliance risks, including sanctions evasion, money laundering, and terrorist financing, production of arms for mass destruction (proliferation), and other types of financial crime including fraud.
Financial Crime Investigation Platforms are provided by software companies specializing in this sector. Most of them use extended Artificial Intelligence to identify compliance risks exposing the Group and resulting from its business and operations. Artificial Intelligence and Machine Learning capabilities are used as enablers within the Compliance Function to identify risks, whereas the human factor is still critical in the investigation and decision- making process.

The second solution to the issue is “investment in appropriate resources”; even though compliance risk management is highly demanding human resources, people are the most costly asset the Group has. The overall human resources cost may vary in the different sectors of the Financial Services Industry, but the Regulators would like to see a serious investment done for this besides pressure on financial performance and profitability; if the Group considers increasing the human resources proportionately to the increase in Regulatory requirements, then the cost of compliance shall increase disproportionately to the revenue incurred. So, the Group prudently invests more in qualified and experienced compliance human resources and robotic technology to speed up compliance risk management decisions. Applying a risk-based approach through a speedy decision-making process is essential for the Group and its operations. The third solution to the issue is “investment in knowledge”; the more educated the front- line members and all other employees of the Group are on matters related to sanctions violations identification, anti-money laundering, and counter-terrorism financing, non-proliferation, and anti-financial crime techniques, the less shall be the exposure to these compliance risks. The Group has a diversified portfolio of compliance training programs, blended between face-to-face and virtual delivery techniques. The latest trends are for the Group to use virtual conferences and eLearning platforms to increase knowledge, which can easily and quickly be amended to incorporate changes in the regulatory requirements; additionally, this is an efficient and effective way to create a learning culture among the Group’s employees.
The benefits of using technology in compliance are multiple; however, the most evident ones are related to “time”, i.e., the speed of dealing with compliance risks, the “quality”, i.e., the efficiency and effectiveness of controls if appropriately used, and “reduced overall cost”, i.e., the capital investment in compliance resources, human and technical, to reduce the Regulatory implications for non-compliance leading to reputation damages and heavy financial penalties.

We, the Compliance Team within the Group, are proud to use and continuously upgrade our technology to manage compliance risks related to business and operations; we are pioneers in using every useful compliance technological tool to support the compliance professionals in making appropriate decisions and adequately train all our employees to avoid been engaged in business and operations that expose us into unbearable risks. Ultimately, we are trying to maintain the overall financial cost of compliance at a low level and avoid any possible regulatory exposure and reputation risk.

Christos Christou, Aifs, MBA, CAMS, CGSS
Chief Compliance Officer
Lulu Financial Group

Impact of UAE Central Bank’s New Consumer Protection Regulations and its accompanying Standards

Post-Covid 19 pandemic, the laws governing consumer protection in UAE are gaining much prominence and are continuously evolving. While the free zones of DIFC and ADGM have their own sector-specific Consumer Protection Regulations (“CPR’s”), there is a pressing need to adopt CPR’s within the financial services sector as an important step toward safeguarding the rights of the consumers.
Accordingly, the Central Bank of the UAE issued the Consumer Protection Regulation (Circular No. 08 of 2020) on 31st December 2020. The CPR’s and its associated standards set out the basic requirements for a Licensed Financial Institution to apply the necessary protocols or safeguards while dealing with sensitive consumer data. Since Companies in the financial sector are required to handle diversified and most sensitive consumer protection data, it is very much imperative for such to analyze and understand the intricacies of CPRs and its accompanying standards.
Licensed Financial Institutions are mandated to comply with the new regulations and standards maximum by 31st December 2022.

Why Consumer Protection Regulations and how it can be effectively implemented:
The Pandemic has drastically impacted the consumer’s financial health and therefore regaining and rebuilding the confidence and trust of the consumers is one of the competitive and paramount challenges faced by any Licensed Financial institutions. Further, the technological advancements in the digital landscape necessitated the need to process consumer data effectively, which emphasized the need for CPR’s and its associated standards. Below are the key highlights of CPR’s:

⦁ Ensure the quality and timing of effective disclosure to the consumers by Licensed Financial Institutions concerning the matters or risks that may affect a consumer’s decision to purchase a financial product or service.

⦁ Providing consumers with the access to the right information at the right time to enable them the opportunity to make informed decisions.

⦁ Addressing unreasonable barriers and limits to fair competition and giving importance to consumer choice.

⦁ Implementing a proper forum and mechanism for redress of consumer complaints including the need to establish a department dedicated to managing consumer protection data.

⦁ Licensed Financial Institutions should report in a timely manner consumer data breaches to the UAE Central Bank. A proper mechanism and protocol to be put in place in the event of the occurrence of a consumer data breach. Adequate training programs need to be conducted by the Company for the employees, to ensure adequate data protection for the consumers. UAE Federal Data Protection Laws require organizations to adopt an organized and collaborative approach to conducting data privacy programs that aim to uphold the privacy rights of individuals in the UAE.
Paradigm Shift while dealing with the Consumers:
⦁ All Licensed Financial Institutions, prior to providing information to the consumers must independently assess and seek only the relevant data required for the financial product and services. The Consumer Protection policies should be framed in such a manner so as to minimize data collection and retention (presently for a period of five years) and consumers should be made aware of the Company’s retention policies. The formats and templates of consumer protection policies should be framed to suit the best needs of the consumers.

⦁ Disclosure documents of a financial product and service must necessarily contain ‘Warning Statements’ and should clearly intimate to the consumer the consequences in the event of the Consumer’s failure to meet the Licensed Financial Institution’s terms and conditions. Also, use ‘Warning boxes’ to highlight key risks related to the purchase of financial products and services.

⦁ Disclosure to the third parties or related parties of the consumers shall be made only after obtaining written consent from the consumers. The forms should necessarily contain a clause pertaining to this condition.

It is very much imperative for the Licensed Financial institutions to comply with the disclosure obligations seriously as the UAE Central Bank may impose huge fines and penalties in the event of non -compliance of the same.

Conclusion:

When the UAE Central Bank issued the CPR’s on 31.12.2020, it was welcoming news for the consumers. It was aimed at better protection for the consumers, intended to cut red tape, and put in place a simpler and clearer consumer protection law that would be easier to interpret and enforce. The parameters contained in CPR’s are in tune with the changing times and is comparable with the standards of the European Union General Data Protection Regulation (EU GDPR). The UAE Federal Data Protection Law also combines the leading practices from global data protection laws including EU GDPR and other forward-looking technological concepts.
As consumers remain more wary, while sharing sensitive data with Licensed Financial Institutions, proper protocols and data security policies are to be framed by the Fintech firms, which will be further explored in the coming articles.

Ms. Deepthi Azad

Shared Vision… Common Goal

Successful Organisations are set up on the tripod of Vision, Mission, and Values.

The mission statement communicates the purpose of the organization. The vision statement provides insight into what the company hopes to achieve or become in the future. The values statement reflects the organization’s core principles and ethics.

Let us look closely at the relevance of ‘Vision’ for an Organisation.

Organizations draw up Vision Statement to provide a sense of purpose and direction for their business. Vision is the picture of the future that an Organisation desires to embrace. Vision projects before the Organisation the goal which it strives to reach, an embodiment of its hopes and dreams, giving focus and a clear road map to success.

Vision, more than just an Organisational aspiration, is the committed, concerted, conviction of all the stakeholders about the futuristic icon imaging all aspects of the Organisation. For the Vision to be truly potent and fruitful, it must be shared by all the stakeholders of the organization, unifying, inspiring, motivating, and synergizing the efforts of all in an ambitious and sincere way.

In the Management parlance and OB (Organisational Behaviour) discussions in Business Governance, management maestros draw the analogy of an Elevator/Lift to explain the importance of shared vision and conceiving a common goal by all the people in the Organisation.

Imagine you are working in a Corporate Office in the heart of a busy metropolitan city. Your office is on the 12th Floor of a twenty-storeyed building housing many large and small offices, working mostly from 10 a.m. to 5 p.m. It is common, on most of the working days, to see a small crowd of employees of these offices reaching the building a few minutes before 10 O’clock by different modes of transport- by trains, buses, four-wheelers, two wheelers, etc. anxiously waiting for the Lift. Yes, there will be a crowd on the ground floor, in front of the Lift, as the employees wait for the Lift to reach their respective offices. When the Lift comes and its door opens, people step in, and when the capacity load is reached, the door closes, leaving many behind waiting for the next trip. Usually, the person standing close to the panel- board of buttons indicating the floor numbers, presses the requisite buttons as the other persons enter the Lift request. When the Lift goes up and reaches, say 3rd Floor, the person who has to get down on that floor might be standing at the rear of the Lift, away from the door, as he would have entered with the first few at the head of the crowd waiting initially at the ground floor. When the Lift door opens on the 3rd Floor other persons standing on the front side of the Lift, nearer to the door, would make room for the 3rd-floor person to offboard. For this, sometimes, a few will have to even step out of the Lift. Likewise, the Lift moves up, stopping at different floors with people stepping out or in, and after the ascend to the top ultimately continues the mobility with the descend for the next trip.

Now, let us observe the Lift journey a bit closely:

(i)      Usually, individuals enter the Lift in a disciplined way, not pushing out others along the way, on a ‘first come first in’ principle. If the capacity of the Lift is for 10 people, and you are not in a lot of the first 10 on arrival at the Lift front, you will stand back for the next trip. Of course, there might be a few unconcerned, unruly guys, jostling in! But these are exceptions!
(ii)     Once inside the Lift, the person standing near the buttons goes on pressing the floor-indicator buttons as per the request of the person standing away from the panel of buttons. Seldom does he say, “I am not your servant; if you want, come here and press the button yourself”.
(iii)    Nobody standing nearer to the gate usually stands rooted in his position, unbudging when a person standing in the rear wants to get out, with cursing and grumbling that “if you wanted to get out first, you should stand close to the door.”
(iv)    When we enter the Lift, our perception is that it is a neat, small room well paneled with switches, buttons, and lights, sometimes with fans and music. But there are much more to a Lift – -pulleys, chains, different bolts, nuts, gears, etc. which we rarely think about. All of these help the smooth functioning of the Lift. A small bolt, which may have a financial worth of less than a rupee, is equally important as the sturdy chains that hold the Lift, for if this small bolt is broken, the entire machinery may come to a grinding halt!
Let us examine the behavioral pattern of the passengers in the Lift as seen in points (i), (ii), and (iii) above. The behavior exhibited indicates an unspoken and sometimes unconscious effort on the part of the persons to adjust, accommodate and cooperate with each other.
Why is this?
All the persons boarding the Lift have a common goal; the goal is to reach their respective offices on time, before 10, and mark their attendance. Visualizing and sharing this simple but important requirement, each one desists himself from any action that would delay realizing or reaching the goal. It is the shared vision of reaching one’s work desk in time that prompts everyone to adjust and cooperate to the maximum!
Lift itself is akin to an Organisation ascending to the success of reaching the vision of goal-realization and each employee in the Organisation, like every passenger in the Lift has to imbibe in himself the importance of a shared vision of success and a focussed view of purpose behind any effort. We have seen that in a Lift every single nut or bolt is important and indispensable. Similarly, in an Organisation, every employee is important, whether he is a Peon or the Managing Director and each one must play a significant and crucial role in the smooth running and progress of the Organisation.

This is the gist of the “Elevator Theory” in Organisational management.

A tailpiece:

Why is ‘shared vision’ important for an Organisation?

Peter Senge, the author of “The Fifth Discipline: The Art and Practice of the Learning Organization” sites ‘shared vision’ as one of the cardinal disciplines necessary to create a learning organization. Continuous improvement, even in the midst of changes constantly happening, is the mainstay of progress for any organization committed to growth. Continuous improvement requires a commitment to learning. To render focus and purpose to learning, there should be a beacon to guide you and that bright beacon is the vision you hold. Each employee should fervently believe in the vision- a belief strong enough to evangelize it to others and ultimately support the team, in its pursuit.
AS Senge emphasizes “A shared vision is not an idea. It is not even an important idea such as freedom. It is, rather, a force in people’s hearts, a force of impressive power.” We should keep ourselves open to continuously court this impressive power in our hearts as well as in our organization.

Mr. Mathew Vilayil

Enquire Now