The Delayed FinTech Revolution

Technology has transformed how we work, communicate and travel. In contrast, modern digital technology has not yet transformed financial services. Open data is the key to change in this sector of the economy.

The time has come for the financial services industry to join the open data revolution. Open data means interoperability of digital information to increase its usability and accessibility. The Obama administration has done much to make open data a cornerstone of its digital government strategy.

 When open data is brought to the private sector, moreover, one of the benefits will be information portability for consumers. “Informational portability” means that consumers will be able to share and use their personal data in different individual services and products.

Consumers and businesses have, of course, long shared their key financial information with trusted third parties, such as accountants, lawyers and financial advisors. Today, advances in technology have made it easier for customers of banks and insurance companies, among other financial institutions, to share their information with others. Rather than storing key documents in shoe boxes and file folders, consumers and small businesses can pass along digital online and mobile banking credentials.

The promise of fintech is to bring consumer finance into the 21st Century. Fintech companies have already created products that enable consumers to budget, pay their bills, limit spending and identify fraudulent transactions on credit and debit card statements. These enterprises also offer sophisticated tools for facilitating individual investment, financial planning and portfolio management.

This happy story of progress, however, is far from complete because of concerns around privacy and security, and the intermittent choke-points on data sharing. Financial institutions, such as banks and insurance companies, warn against the risks that would follow from allowing their customers to authorize access by third parties to their digital account information.

The time has come for the financial services industry to join the open data revolution.

Financial entities have also periodically taken steps to prevent their users from delegating such access to third parties. These steps are based on understandable concerns about privacy and security.

In the Dodd-Frank Act, Congress took a major step toward ensuring open data. In its Section 1033, this law authorizes the Consumer Financial Protection Bureau (CFPB) to make rules requiring financial institutions to give consumers information upon request about their use of financial products and services.

Congress also authorized the CFPB to develop standardized formats for information. In light of the current absence of cross-industry cooperation, the CFPB should act to enable consumers to get the digital financial services they desire and deserve.

Three policy principles for CFPB rulemaking stand out.

First, the law should enable mechanisms that safeguard and promote consumer consent. Consumers should be in charge of the conditions under which third parties can access their financial information, be provided with clear information about the terms under which such functionality is permitted and be able to turn access on or off.

Second, the concerns regarding privacy and security have merit and banks deserve praise for their concern about them. At the same time, these issues are eminently solvable. Encryption enables firms to share information without making it visible to third parties. Identity management tools allow firms to build systems that provide access to some but not all information, much in the way that a valet key to a car allows someone to drive it but not open the glove box.

The first move should be to seek broad industry agreement on best practices in these areas. Only if there is gridlock regarding self-regulation, the CFPB should develop regulations to establish strong privacy and security requirements.

Finally, the CFPB should act to protect consumers from liability from data sharing, so long as they behave with reasonable care. This model already exists for electronic fund transfers due to measures such as the Federal Reserve’s Regulation E and Regulation Z. These regulations limit a consumer’s liability for unauthorized electronic transactions when using credit cards and debit cards. Similar regulations are needed in the fintech context to clarify questions regarding a consumer’s liability for harms following from delegated account access.

The digital revolution will come to financial services only if consumers are guaranteed consistent, secure and up-to-date access to their financial information. The time has come for the US government to take the first steps to guarantee financial data mobility.

TechCrunch: http://tcrn.ch/1SQ3AER

« Cyber Insurer Offers Some Ransomware Insights
Cyber Threat Intelligence: Sharing Is Caring »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

RISA

RISA

RISA solutions help to secure networks, improve overall network security, and achieve government regulatory compliance.

iboss Network Security

iboss Network Security

The iboss cloud is designed to deliver Network Security as a Service, in the cloud, using the best malware engines, threat feeds and log analytics engines.

Hodgson Russ

Hodgson Russ

Hodgson Russ is a US business law firm. Practice areas include Privacy, Data Breach & Cybersecurity.

Axis Capital

Axis Capital

AXIS Insurance’s Professional Lines Division is a leading underwriter of technology/cyber coverage and other specialty products around the globe.

Riscure

Riscure

Riscure is a global test lab and tools leader for device security. Core expertise in side channel analysis, fault injection and embedded device software.

StrongKey

StrongKey

StrongKey (formerly StrongAuth) is a leader in Enterprise Key Management Infrastructure, bringing new levels of capability and data security at a price point significantly lower than other solutions.

MrLooquer

MrLooquer

MrLooquer provide a solution to automatically discover the assets of organizations on the internet, determine the level of exposure to attacks and help to manage risk accurately.

Tangible Security

Tangible Security

Tangible employs the most sophisticated cyber security tools and techniques available to protect our clients’ sensitive data, infrastructure and competitive advantage.

eMazzanti Technologies

eMazzanti Technologies

eMazzanti Technologies provides IT consulting services for businesses ranging from home offices to multinational corporations throughout the USA and internationally.

Alibaba Cloud

Alibaba Cloud

Alibaba Cloud is committed to safeguarding the cloud security for every business by leveraging a comprehensive suite of enterprise security services and products on the platform.

TuxCare

TuxCare

TuxCare make Linux more secure. We take care of Linux so that organizations can use Linux to support environments that require high levels of Cybersecurity, stability, and availability.

Pointsharp

Pointsharp

Pointsharp delivers software and services that help organizations secure data, identities, and access in a user-friendly way.

Systems Engineering

Systems Engineering

Systems Engineering is a SOC 2, Type 2-certified IT strategy and managed technology services provider.

LevelBlue

LevelBlue

LevelBlue simplify cybersecurity through award-winning managed security services, experienced strategic consulting, threat intelligence and renowned research.

Stack Overflow

Stack Overflow

Founded in 2008, Stack Overflow’s public platform is used by nearly everyone who codes to learn, share their knowledge, collaborate, and build their careers.

Cytacs

Cytacs

Cytacs is the AI-powered cyber security platform specifically designed for small and medium-scale enterprises.