preview

Disadvantages And Disadvantages And Challenges Of E-Banking In India

Better Essays

The process of globalization and liberalization has virtually transformed the way of running business across the globe. Technology has entered into every sphere of the human life and the financial sector is no exception to it. E-banking, a product of the research conducted in the field of banking and financial services over the last century, is being used in India for some time now in the form of digital data in computers, Automated Teller Machines, credit and debit cards, mobile banking and net banking. Internet or e-banking means that any user with a personal computer and a browser can get connected to his bank’s website to perform any of the virtual banking functions. E-banking services can be availed for payment of bill, fund transfer, …show more content…

There are various advantages and disadvantages of introduction of technology in banking system. The work of the law starts where there are disadvantages to the public in general and individual in particular. There are certain challenges that banking is facing which are due to obligations imposed by law on the one hand and the invention of new technology and its adoption at the other. This necessitates introduction of new guidelines by the RBI. There is no dedicated Internet banking laws in India but the RBI has issued some guidelines in this regard via notification number DBOD.COMP.BC.No.130/ 07.03.23/ 2000-01 on 14th June 2001. Reserve Bank of India, being the highest authoritative bank and the regulator of all the nationalized banks in India, had set up a ‘Working Group on Internet Banking’ to examine different aspects of Electronic Banking. The Group had focused on three major areas of E-banking, i.e. (i) technology and security issues, (ii) legal issues and (iii) regulatory and supervisory issues. As per the guidelines issued for implementation by the banks, they are required to designate a network and database administrator with clearly defined roles. They should introduce logical access controls to data, application and system software, utilities, telecommunication lines, etc. All computer accesses, including messages received, must be logged. Security violations (suspected or attempted) should be reported and follow up action taken should be kept in mind while framing future

Get Access