6

Collateral Management -An Approach to Automation – Part-1

Friends, we are starting this multi-part series to cover collateral management from a lender’s perspective and scenarios important for automating Collateral Life Cycle Management. We trust that the contents of this series will ignite thought process in the community which is predominantly manual as on date

Collaterals are the first and most important credit risk mitigate available to a lender, however, collateral management is predominantly a manual process. Considering the proliferation of digitization and automation in the financial industry, collateral management automation is still not a priority area. Our objective of this series is to bring forth the critical aspects of the collateral management process and considerations for automation of life cycle management of collaterals from a lender’s perspective.

While sanctioning a secured loan, the lenders secure collaterals under their charge using different methodologies depending on the type of collateral being created out of the lender’s funds or offered by the customer. Accordingly, the collaterals may be broadly categorized into two categories: Primary Collaterals: The asset which is created out of the funds is considered as primary collateral. Say loans given to purchase vehicles, plant and machinery etc will create assets as vehicle/ plant & machinery that will be hypothecated to the bank but will remain under the procession of the borrower. In this case, the asset created out of funds of the lender will used for use by the borrower.

Secondary Collaterals: many times lenders resort to securing their funds by taking additional collaterals which are in most cases Immovable Property. Such additional collateral is termed Secondary collaterals. Secondary collaterals serve as additional collateral coverage to the exposure of the lender and primarily the title and/ or the asset will remain in possession of the lender.

However, such categorization may become blurred in many cases like loans against customer’s FDR, Shares, NSC, KVP, Gold etc. are often considered as primary collaterals in banking parlance whereas in actual sense these are secondary collateral, since the funds given by the lender are going to be utilized by the customer for either creation of other assets or purely for expanses.

For creating a charge on the collateral offered/created needs to undergo different perfection events depending on the type of collateral, once the collateral is perfected it is available for onboarding and tagging at various levels of the limit hierarchy of the customer. Based on the tagging of the collateral at the respective limit hierarchy level, the value of the collateral is distributed among various facilities of the customer.

Post onboarding of the collateral, two important aspects need to be performed, firstly, if there is any deviation in the pre-onboarding perfection process that should be complied with at the earliest and post onboarding activities like post disbursement inspection and registration of charge with competent authority also need to be performed. The charge on the collateral is registered with the respective authority depending on the type of collateral.

Subsequently, regular maintenance like insurance, re-valuation and re-inspection are the activities that need to be carried out by the lender for upkeeping of the collateral good and realizable till the existence of the tagged exposure so that delinquency risk is mitigated.

Finally, once the loan is repaid by the customer, the collateral needs to be released (release of title documents on which the charge was created) to the customer upon due acknowledgement.

In the Next Part – Various Types of Collaterals

Author: VC Sharma

Disclaimer: The views expressed in the blog are entirely personal to the author. There is no direct/ indirect responsibility of the publisher whatsoever.

0

Open Banking and Risks. Were you aware of this? 

BFSI players can leverage Open Banking and APIs to their advantage while safeguarding customer data, maintaining compliance, and driving innovation in the financial sector. While Open Banking and APIs offer great potential for innovation and convenience in the BFSI industry, they also come with inherent risks that need to be carefully managed. Here are some key ones: 

Data Security and Privacy: 

  • Increased attack surface: Open APIs create more entry points for hackers to access sensitive financial data. 
  • Data breaches: Third-party providers (TPPs) accessing data could be compromised, leading to leaks and unauthorized access. 
  • Accidental data exposure: Human errors or misconfigurations in API implementation can lead to accidental data exposure. 

Regulatory Compliance: 

  • Complex compliance landscape: Banks need to comply with various regulations regarding data sharing, user consent, and security, which can be challenging with Open Banking. 
  • KYC/AML risks: Verifying the identity and Anti-Money Laundering (AML) checks for TPPs add complexity and potential for fraud. 

Business Model Disruption: 

  • Commoditization of services: Open APIs can make core banking services accessible to new players, potentially eroding traditional banks’ competitive edge. 
  • Loss of customer relationships: If customers migrate to TPPs for specific services, banks may lose valuable customer data and engagement. 

Other Risks: 

  • Third-party risk management: Assessing and monitoring the security and reliability of TPPs requires robust due diligence processes. 
  • Operational complexity: Implementing and managing Open Banking infrastructure requires significant investment and ongoing maintenance. 
  • Lack of trust and transparency: Some customers may be hesitant to share their data due to privacy concerns and lack of transparency in data usage. 

However, the risks can be mitigated with these strategies: 

  • Robust security measures: Employ strong encryption, authentication protocols, and regular security audits. 
  • Strict data governance: Implement clear data access controls, consent management, and data usage policies. 
  • Thorough TPP vetting: Conduct rigorous due diligence and ongoing monitoring of TPPs’ security and compliance practices. 
  • Customer education and transparency: Clearly communicate data sharing practices, privacy policies, and customer control mechanisms. 
  • Investment in technology and compliance: Allocate resources to build secure and compliant Open Banking infrastructure. 

While the open banking landscape might seem like a thrilling tightrope walk, remember, you don’t have to navigate it alone. With the comprehensive risk management solutions, you can transform the thrill into a smooth, controlled ascent, reaching new heights of innovation and customer satisfaction.