332 QUARTERLY REPORT Funds Transfers under UCC Article 4A: What is a Commercially Reasonable Security System? By Stuart R. Hene Stuart R. Hene graduated from Oklahoma City University School of Law and was admitted to the State Bar of Texas in 2009. He is an associate attorney with ˇlowers Davis, P.L.L.C., in Tyler, Texas where he handles mostly oil and gas and insurance defense matters. However, Mr. Hene has a varied practice involving other areas of business law, oil & gas law, personal injury defense and insurance law. He is a member of: the State Bar of Texas; the Oil, Gas, and Energy Resource Law Section of the State Bar of Texas; the American Bar Association (ABA); the ABA Section of Environment, Energy, and Resources; the ABA Young Lawyers Division; the Smith County Bar Association; and the Tyler Young Lawyers Association. Mr. Hene serves on the Board of Directors for the Smith County Young Lawyers Association; and on “The Bridge Campaign” for St. Paul’s Children ˇoundation. Stuart completed his undergraduate studies at Baylor University in Waco, Texas where he earned a Bachelor of Arts in Political Science. After graduating from Baylor, he worked in Austin for State Representative Rob Eissler and then later as a campaign consultant for political campaigns in East Texas. He then attended Oklahoma City University School of Law where he received his Juris Doctor and a Certificate in Business Law—ˇinancial Services and Commercial Law Concentration in May 2009. During law school, Mr. Hene was: President of his class in 2006–2007; a member of the Texas Legal Society; a member of the ABA Law Student Division, where he served as Lt. Governor of Legislative Affairs for the Tenth Circuit from 2007–2008; and a member of the Energy Law Society and the ˇederalist Society, serving as President of the latter from 2007–2009. [Ed. note: The Oklahoma Bar Association (OBA) ˇinancial Institutions and Commercial Law Section, through its Legislative Review Subcommittee, reviews prospective legislation in Oklahoma to assess and better assure its fit into other, related Oklahoma law. The Section also participates in writing, in conjunction with the OBA Uniform Laws Committee, reports on new legislation and “Oklahoma Comments” for publication in the Oklahoma Statutes Annotated, once the legislation passes, to explain the impact of the bill on Oklahoma law and cases. See, e.g., ˇred H. Miller & Alvin C. Harrell, The Work of the Oklahoma Bar Uniform Laws Committee: Oklahoma Enacts UCC Article 3 and 4 and 4A Amendments, 63 Consumer ˇin. L.Q. Rep. 29 (2009). The members of the Section are among Oklahoma’s top specialists in the field. To encourage new, and younger, members, the Section also sponsors a writing contest for law students at Oklahoma law schools. This article is derived from a paper that won the writing contest. It is presented as a result of the work of the Section.] I. cash, but obviously coin and currency are not practical in these circumstances. Instead, a transfer of funds between two bank accounts and probably two different banks will be needed. Among the basic alternatives are: (1) the use of a negotiable instrument governed by Uniform Commercial Code (UCC) Articles 3 and 4; or (2) a funds transfer governed by UCC Article 4A. Today, the option chosen is increasingly likely to be the latter. This article analyzes the security system needs that should be considered in order to ensure a safe and non-fraudulent transfer of the funds from one bank to another under Article 4A. Article 4A funds transfers may be originated in numerous ways; e.g., a telephone call, a facsimile (ˇAX) message, or an internet transfer.1 Many of these transfers are now originated over the internet, and at the core of this information infrastructure is cyberspace:2 Cyberspace is [the] nervous system--the control system of our country. Cyberspace is composed of hundreds of thousands of interconnected computers, servers, routers, switches, and fiber optic cables that allow our critical infrastructures to work. Thus, the healthy functioning of cyberspace is essential to our economy and our national security.3 Introduction Suppose you are the owner of a multimillion dollar construction company and you want to obtain a new fleet of construction equipment vehicles. The sales price and other terms of the sales contract have been duly negotiated. ˇinancing has been arranged (as needed), and now it is time for the sale to be completed. This means it is time to transmit the payment for the vehicles and equipment. At that moment the buyer and seller face a choice among alternative payment systems. The seller wants to receive the equivalent of 1. See UCC Article 4A § 4A-103(a)(1), and id. § 4A-104, Official Comments 5 and 6. Section numbers cited herein reference UCC Article 4A unless otherwise noted. 2. See Executive Branch of the U.S. Government, The National Strategy to Secure Cyberspace 6 (2003), available at http: //www .dhs.gov/xlibrary/assets/Nationat Cyberspace_Strategy. pdf. 3. Id. at vii. QUARTERLY REPORT Because of the vast reliance on cyberspace for commerce in modern society, security in the transmission of financial information is a critical legal issue.4 In many cases, “all of a company’s daily transactions and all of its key records are created, used, communicated, and stored in electronic form using networked computer technology.”5 Electronic communication of such information is also essential to the functioning of electronic payment systems. A payment system “is a system that is used to transfer value from one person to another in order to pay for goods, services, real estate, or other desired items. A functioning payment system is a necessary component of economic development,” 6 as well as individual transactions. A primary example of a modern, functioning electronic payment system is the Article 4A funds transfer. Such transfers can be used for multiple purposes and are commonly relied on in commercial transactions. “A funds transfer should not be confused with a ‘money transfer.’ [That is ] where currency is exchanged from one person to another. Instead, a funds transfer is the transfer of bank credit.”7 During a funds transfer, each bank must make decisions with regard to a series of events within a short period of time. Issues that each bank must consider include: whether the payment is an authentic order; whether there are any errors in the payment order; and whether the bank should accept or reject the payment order.8 To originate a funds transfer, an instruction from the originator, called 4. See THOMAS J. SMEDINGHOˇˇ, THE EMERGING LAW Oˇ DATA SECURITY: A ˇOCUS ON THE KEY LEGAL TRENDS, at 13, 19 (PU Patents, Copyrights, Trademarks, and Literary Property, Course Handbook Series No. 14648, 2008). a payment order, is given to a bank.9 The payment order will call for the bank to transfer funds to a beneficiary.10 The funds transfer is complete when the beneficiary’s account receives a deposit representing the payment order from the beneficiary’s bank.11 More specifically, [ˇ]unds transfers are “credit transfers” that work by “pushing” funds from the bank account of an originator for credit to a beneficiary. They differ from “debit transfers,” such as checks, which authorize a payee or holder to “pull” funds from the drawer’s account by presenting the check for payment or furnishing other evidence of authority to cause an account to be debited.12 The Article 4A funds transfer system has made it faster and easier for individuals and companies to quickly and safely transfer large dollar amounts to a beneficiary’s account. However, a funds transfer still poses multiple potential risks to the parties involved in a payment transaction. These risks include, but are not limited to: a credit risk; a risk of electronic failures during the transactions; a risk that mistakes could be made during the transactions; the risk of costs exceeding the efficiency of the transactions; and a fraud risk.13 This article focuses on the latter risk--the risk of fraudulent transfers. A risk of fraud can arise when a “purported payor does not actually have the right to push value from the account in a particular transaction or where the payee does not actually have the right to pull value from the debit account.” 14 ˇor example: 9. See §§ 4A-103(a)(1) and 4A-104(a), and Official Comments thereto. 5. Id. 10. 6. Steven L. Harris, Reimagining Payment Systems: Allocation of Risk for Unauthorized Payment Inception, 83 Chi.Kent L. Rev. 561, 561-62 (2008). See §§ 4A-103(a)(2) and 4A-104(c) and (d), and Official Comments thereto. 11. See supra notes 9 and 10; §§ 4A-103(a)(3) and 4A-105(a)(1)(3). See also Working Group on Electronic ˇinancial Services, American Bar Association, Model ˇunds Transfer Services Agreement and Commentary 2-3 (1994) [Model agreement]. 12. See Model Agreement, supra note 11, at 4. 13. Harris, supra note 6, at 565-66. 14. Id. at 566. 7. 8. THOMAS C. BAXTER, JR. & STEPHANIE A. HELLER, THE ABCS Oˇ THE UCC ARTICLE 4A: ˇUNDS TRANSˇERS 1 (1997). Compare discussion of “debit” and “credit” transfers in UCC Article 4, § 4A-104, Official Comment 4. Baxter & Heller, supra note 7, at 7. See also, e.g., UCC Article 4A Part 2 (“Issue and Acceptance of Payment Order”). 333 If recovery is unavailable for some reason against the wrongdoer, then one of the parties to the payment transaction will bear that risk, even if that party acted innocently and with all due care. The risk of this type of fraud could rest on the payee, the payee’s bank, the purported payor, or the payor bank.15 The risk of a fraudulent transfer remains one of the greatest risks for parties engaged in payment transactions. In an effort to address the risks of unauthorized access and use, various laws and regulations have been enacted or issued.16 However, “[m]any transactions in which the payor’s instruction to its bank is made through some mechanism other than a check are governed by UCC Article 4A, or [related] funds-transfer system rules.”17 II. EFTA and the UCC A. Scope of the EFTA The Electronic ˇund Transfer Act of 1978 (EˇTA)18 governs electronic funds transfers to or from a consumer account.19 The EˇTA is implemented by Regulation E, as promulgated by the ˇederal Reserve Board (ˇRB).20 The ˇRB also prepares and updates an Official Staff Commentary to Regulation E (the Commentary).21 This Commentary provides essential guidance on application of the complex requirements set forth in 15. Id. at 566-67. 16. ˇor example, Article 4A § 4A-108 recognizes and defers to the federal Electronic ˇund Transfer Act, Pub. L. No. 95-630, 92 Stat. 3728 (codified at 15 U.S.C. §§ 1693 et seq.) “as amended from time to time,” for “retail” electronic funds transfers. Thus, retail or “point of sale” electronic fund transfers are governed by federal law, not Article 4A, as noted below. 17. Harris, supra note 6, at 564. 18. See supra note 16. 19. Id. 20. See, e.g., DONALD L. BAKER & ROLAND E. BRANDEL, THE LAW Oˇ ELECTRONIC ˇUND TRANSˇER SYSTEMS 12-23 (1988) (describing Regulation E, 12 CˇR pt. 205(1986)); Jeffrey P. Taft, An Overview of the Electronic Fund Transfer Act and Regulation E and Their Application to E-Commerce, 57 Consumer ˇin. L.Q. Rep. 205 (2003). A full description of the EˇTA and Regulation E is beyond the scope of this article. The reader is referred to these sources for that purpose. 21. See supra note 20. 334 the EˇTA. 22 Specifically, the EˇTA defines an electronic fund transfer as: any transfer of funds, other than a transaction originated by check, draft, or similar paper instrument, which is initiated through an electronic terminal, telephonic instrument, or computer or magnetic tape so as to order, instruct, or authorize a financial institution to debit or credit an account. Such term includes, but is not limited to, pointof-sale transfers, automated teller machine transactions, direct deposits or withdrawals of funds, and transfers initiated by telephone.23 Because such transfers are excluded from Article 4A,24 this EˇTA definition is important to the scope of Article 4A. There are two principal requirements in this definition of electronic fund transfer, as specified in the EˇTA, regarding an authorized electronic funds transfer.25 “ˇirst, the transaction must debit or credit an ‘account.’ Second, there must be a transfer of funds initiated by the specified electronic means.”26 This may sound similar to the Article 4A concept of a “payment order,” as defined at section 4A-103. However, the EˇTA is essentially limited to “retail” funds transfers by consumers. 27 The EˇTA defines an unauthorized electronic fund transfer as “an electronic fund transfer from a consumer’s account initiated by a person other than the consumer without actual authority to initiate such transfer and from which the consumer receives no benefit….”28 However, this definition of an unauthorized electronic funds transfer does not include: (1) transfers initiated by the QUARTERLY REPORT consumer with fraudulent intent or any person acting together with the consumer; (2) a transfer initiated by anyone who was given any means of access to the consumer’s account; or (3) a transfer in which there occurred an error on behalf of the bank.29 So, what happens under the EˇTA if a fraudulent transfer does occur? In such a case, the burden of proof lies with the bank to prove that the electronic fund transfer was either authorized by the consumer or, if unauthorized, meets the requirements for consumer liability.30 If it was unauthorized, the bank will be liable for a failure to follow the terms and conditions of the account in regards to the electronic funds transfer.31 B. Scope of Article 4A In comparison with the EˇTA (which is limited largely to error resolution and the allocation of liability for losses), UCC Article 4A governs the basic elements of an electronic fund transfer. However, as noted, Article 4A does not apply to a “retail” funds transfer that is governed by the EˇTA.32 In contrast, Article 4A governs: (1) ˇedWire; (2) CHIPS; (3) SWIˇT; or (4) telex; and (5) book transfers, which are simply transfers of credit across a single bank’s books from one account to another.33 Thus, a fundamental distiction is that “retail” EˇTA transactions are governed by private (e.g., contracual) funds transfer rules and the EˇTA dispute resolution rules, while Article 4A governs both the basic transactional elements and the error or fraud resolution issues in a “wholesale” Article 4A funds transfer (while being supplemented to some extent by contractual and private rules). As suggested above, Article 4A funds transfer transactions are com- 22. See Baker & Brandel, supra note 20, 12-23 and 12-24. 29. Id. 23. 15 U.S.C. § 1693a(6). 30. See id. § 1693g(b). 24. See supra note 16. 31. See id. § 1693h(a); supra note 20. 25. See Baker & Brandel, supra note 20, at 12-25. 32. See supra note 16;Baxter & Heller, supra note 7, at 5. 26. Id. 33. 27. Id.; EˇTA, 15 U.S.C. § 1693a(2), (6). 28. 15 U.S.C. § 1693a(11). Baxter & Heller, supra note 7, at 6 (ˇedWire transfers are covered by reason of the incorporation of Article 4A in ˇRB Regulation J. See 12 CˇR pt. 210, Subpart B; 12 CˇR § 210.25(b). “CHIPS” and “SWIˇT” refer to other funds transfer systems.). monly referred to as a “wire transfer” or a “wholesale funds transfer.”34 “The term ‘wholesale’ distinguishes the Article 4A funds transfer from a [‘retail’] consumer electronic funds transfer governed by Regulation E and the EˇTA.”35 Article 4A defines the basic elements of a funds transfer, as a series of offsetting transactions which begins with an originator’s payment order and concludes with payment to the beneficiary of that order.36 C. Addressing Fraud Risk All payment systems have to contend with the risk of fraud, which in the case of commercial payment orders under Article 4A can be for very large amounts. Addressing this problem is critica1 to the usefulness of the Article 4A payment system.37 Therefore, in an effort to address and curtail fraudulent transfers, Article 4A includes a carefully-crafted commercially reasonable security procedure provision. 38 Article 4A requires a payment order to be authorized in order for the funds transfer to take place.39 “A payment order received by the receiving bank is the authorized order of the person identified as the sender if that person authorized the order or is otherwise bound by it under the law of agency.”40 Thus, a funds transfer will be effective whether or not the order is authorized if the originator is obligated under the rules governing vicarious or apparent authority. Often this will depend on whether the originator’s bank and the originator have agreed on verification security procedures.41 “[T]he security procedure [must be] 34. Baxter & Heller, supra note 7, at 2. 35. Id. 36. See § 4A-104(a); supra notes 1 and 9. 37. See, e.g., ˇREDRICK H. MILLER, THE LAWYER’S GUIDE TO MODERN PAYMENT METHODS: ACH, CREDIT, DEBIT, AND MORE 19 (2007). 38. See §§ 4A-201, 4A-202. 39. See §§ 4A-103(a)(1), 4A-202, and 4A-203; UCC Article 4A Prefatory Note. 40. See § 4A-202(a). 41. See § 4A-202(b). QUARTERLY REPORT a commercially reasonable method of providing security against unauthorized payment orders, and…the bank [must prove] that it accepted the payment order in good faith and in compliance with the security procedure.”42 A security procedure is established by agreement between the customer and the bank, in order to verify that a payment order is properly placed and is that customer’s payment order, and to detect errors in transmissions of payment orders.43 A crucial point is the commercial reasonableness of the security procedure. D. Commercial Reasonableness Commercial reasonableness is a question of law. There are several factors in determining whether a security procedure is commercially reasonable. Article 4A specifies certain factors that a court is to consider, namely whether: (i) the security procedure was chosen by the customer after the bank offered, and the customer refused, a security procedure that was commercially reasonable for that customer, and (ii) the customer expressly agreed in writing to be bound by any payment order, whether or not authorized, issued in its name and accepted by the bank in compliance with the security procedure chosen by the customer.44 Along with these two factors, a court may consider: whether the wishes of the customer were expressed to the bank; whether the circumstances of the customer were known to the bank, “including the size, type, and frequency of payment orders normally issued by the customer to the bank;” whether alternative security procedures were offered to the customer; and the security procedures in use by other banks in similar situations. 45 The foundational rule is that a bank is liable for any unauthorized payment it makes. However, it is the customer and not the bank who is liable for the loss if a commercially reasonable security system, agreed to by the customer, was in place, and the bank complied with it. Also, the customer is liable if the customer fails to notify the bank within one year of a fraudulent or erroneous electronic funds transaction.46 However, the bank can be liable for the loss if it agrees in writing to be liable for part of the loss or if the bank and customer agreed to a security procedure that was not commercially reasonable.47 In addition, “if the customer is able to establish that an unauthorized but effective order was not attributable to any responsible person entrusted to act for the customer or any access obtained from the customer’s side,”48 then the bank will be liable for the loss. These limits on the customer’s liability reflect a basic tenet that the bank is obligated to take reasonable steps to guard against fraud, critical risks, and security threats.49 Article 4A does not establish the specific parameters of a security procedure that will be accepted among the courts, recognizing that this is a matter for the development of commercial practice. However, Article 4A does state that “[a] security procedure may require the use of algorithms or other codes, identifying words or numbers, encryption, callback procedures, or similar security devices.”50 However, just because a bank uses one of these permissive approaches does not mean that a court will find that the bank had a commercially reasonable security system in place, or that another bank was unreasonable in using another approach. A commercially reasonable security procedure could utilize all of the elements, a portion of the elements, or entirely different techniques than those 335 described in section 4A-201.51 In order to facilitate the development of commercial practice, Article 4A leaves courts to consider, as a question of law, whether the procedures in place in a given case constitute a reasonable security procedure as adapted to the specific situation.52 III. The Courts’ Determinations of Commercially Reasonable Standards A. Introduction Reflecting this flexibility, the courts have not specified a single standard for determining whether a security system is commercially reasonable. In one instance a court may employ a specific set of factors; in another instance, the same court may recognize a different approach. Also, commercially reasonable security procedures may employ variations of different techniques in different combinations. One thing that is clear, however, is that determining whether a security system is commercially reasonable is a question of law.53 Therefore, the courts must review each scenario on a case-by-case basis to determine if the security procedure in question is commercially reasonable in that context, and the other requirements for a recovery have been met.54 ˇor example, in Covina 2000 Ventures Corp. v. Merrill Lynch, Pierce, Fenner & Smith, Inc.,55 the court applied Article 4A’s foundational rule, which states that a bank will bear the loss of any unauthorized funds transfer.56 The court noted that the rule is subject to an “exception when the bank and the customer agree on a ‘security procedure’ to ensure that payment orders received by the bank are 51. See § 4A-203, Official Comments 3 and 4. 52. See § 4A-201 - 4A-203, and Official Comments thereto. 53. See § 4A-203, Official Comment 4. 46. See Miller, supra note 37, at 20 (citing § 4A-505). 54. See, e.g., id, and discussion below. Id. 47. Id. (citing § 4A-203). 55. 43. See § 4A-201. 48. Id. Covina 2000 Ventures Corp. v. Merrill Lynch, Pierce, ˇenner & Smith, Inc., No. 06 Civ. 15497(DLC), 2008 WL 1821738 at *6 (S.D.N.Y. 2008) (citing N.Y. UCC §§ 4A-202(2), 4A204(1)). 44. See § 4A-202(c). 49. Id. 56. 45. Id. 50. See § 4A-201. Id. at *1 (see also UCC Article 4 § 4-203, Official Comment 1, and Article 4 Prefatory Note). 42. 336 authorized.”57 In Covina, Mr. Ma opened a corporate account at Merrill Lynch for two different companies.58 One of these companies was Covina 2000 Ventures Corporation. Between the months of June 2002 and April 2004, $9 million was transferred out of these accounts.59 Merrill Lynch and Mr. Ma did not have an agreement referring to the security procedure necessary to authenticate a funds transfer.60 Twenty-one of the letters of authorization for the wire transfers contained a notation indicating confirmation from Mr. Ma and twentyfour of these authorizations also contained an apparent signature by Mr. Ma.61 In Corvina, Merrill Lynch (the bank) did not argue the issue of a commercially reasonable security procedure because the bank argued that the customer (the plaintiffs) were liable for the funds transfer on agency grounds. The bank also argued that the suit was brought more than four years after the fraudulent transfers occurred, contrary to the one-year requirement.62 The Covina court decided the case based on the latter requirement, i.e., that a customer of a bank cannot bring a claim for a fraudulent Article 4A transfer after one year.63 Thus, Covina does little to define what constitutes a reasonable security procedure. On this issue, the court merely stated: “[O]nly when a commercially reasonable security procedure is in place (or has been offered to the customer) may the bank disclaim its liability for unauthorized transfers.”64 QUARTERLY REPORT B. The Regatos Case In Regatos v. North Fork Bank,65 the court took a further step in articulating what constitutes a commercially reasonable security system. In Regatos, the plaintiff (Mr. Regatos) had opened an account with the Commercial Bank of New York (the bank). When Mr. Regatos opened this account he signed an Account Information form. This agreement stated that Mr. Regatos was allowed to make wire transfers out of his account via payment orders, transmitted from his home in Brazil.66 There was a specific procedure to be followed each time by the bank and Mr. Regatos to ensure valid transfers. ˇirst, Mr. Regatos would sign a payment order which would be faxed to the bank.67 Next, a confirmatory phone call would either be placed by Mr. Regatos to Ms. Abadi, a bank employee, or to Mr. Regatos from Ms. Abadi.68 After the confirmation of the amount, Ms. Abadi would ˇAX the payment order to New York where signature confirmation would take place by comparing the payment order and the signature on record.69 However, this security procedure lacked a password or algorithm element of identification.70 During the spring of 2001, two funds transfers were initiated from Mr. Ragatos account, both of which Mr. Ragatos claimed he did not authorize or initiate.71 The Regatos court applied the foundational rule of Article 4A, as in Covina: That is, foundationally, “the bank will bear the loss of any unauthorized funds transfer.” 72 However, the Regatos court noted that an exception to 65. See Regatos v. North ˇork Bank, 257 ˇ. Supp.2d 632, 635 (S.D.N.Y. 2003). See id. 66. See id. at 636. 59. See id. 67. Id. 60. See id. 68. Id. 61. See id. 69. Id. 62. See § 4A-505. 70. Id. 63. Covina, 2008 WL 1821738, at *7. 71. Id. 64. Id. at *6 (quoting Regatos, 5 N.Y.3d at 403, discussed infra). 72. Id. at 640 (citing N.Y. UCC §§ 4-A-202(l), 4-A-204(1)). See also supra note 56. 57. Id. 58. this rule is triggered when the bank and the customer agree to a security procedure that is commercially reasonable:73 A payment order accepted in good faith pursuant to a commercially reasonable security procedure is said to be “effective” as the order of the customer because it can be properly verified. Such an order is effective even if it is actually unauthorized, as in the case of a perfect forgery. But where a payment order is not effective—or where a payment order is unauthorized and there is no security procedure in place the bank has an invariable duty to refund the lost funds. 74 Therefore, the Regatos court noted that it had to decide whether there was a commercially reasonable security procedure in effect. ˇor every funds transfer, the bank and Mr. Regatos adhered to the same procedure.75 The court “[found] the security procedure followed by the Sao Paulo office, coupled with the signature comparison done at the New York office, to be commercially reasonable.”76 The court specifically concluded that, although comparison of a signature alone is not sufficient, with the other elements coupled to this procedure it was acceptable.77 The three-step process of a signed order, confirmatory phone call, and signature comparison was sufficient to constitute a commercially reasonable security procedure.78 Although the three-step procedure lacked recorded conversations and passwords or algorithms, the confirmatory phone call to or from the same preidentified bank representative ensured a commercially reasonable procedure.79 73. See Regatos, 257 ˇ. Supp.2d at 636. 74. Id. at 641 (citing N.Y. UCC §§ 4A-202(2), 4A-203). 75. See id. at 646. 76. Id. (citing N.Y. UCC § 4A-201). 77. See id. 78. Id. 79. Id. QUARTERLY REPORT C. The Braga Case Applying the standards articulated in Regatos, the court in Braga Filho v. Interaudi Bank80 set forth an additional example of commercial reasonableness. In Braga Filho, the plaintiff (Braga) opened an account at the lnteraudi Bank in New York City (the bank) while visiting New York on a trip from his home in Brazil. When the account was opened, Braga signed a Telecommunications Authorization agreement (the agreement).81 The agreement provided “that the Bank was authorized ‘to accept and immediately act upon instructions from [the customer] via telephone, telegram, telefacsimile, untested telex, electronic mail, or any other means of telecommunications.”82 The agreement also provided “that the Bank would ‘select security procedures for accepting instructions that are commercially reasonable for [the bank].’”83 The security procedures that the bank would adhere to were printed on an internal document not available to the bank’s customers, entitled “ˇunds Transfer Policy and Procedures.”84 This document contained instructions and procedures to which the bank’s staff was supposed to adhere. ˇor all funds transfer requests (i.e., payment orders), the bank would verify the customer’s signature on file with the signature on the payment order, confirm that the account contained sufficient funds, obtain approval from an account officer, and then forward the payment order to the bank’s Paying and Receiving Department.85 In addition, for requests made by email or fax, there were special guidelines. These guidelines stated that the customer had to be called before the request would be forwarded to the Paying and Receiving Department; the customer had to answer security questions when contacted, and the confirmation contact call was to be recorded.86 Two years after the account was opened, nearly one million dollars was transferred out of the account, unbeknownst to the plaintiff/customer (Braga). These funds transfers were based on payment orders in the form of fax requests, and Braga later claimed there was no confirmation telephone call for verification.87 Braga contacted the bank upon realizing that the money was no longer in his account. The woman with whom he spoke at the bank informed Braga that she had spoken with Braga several times and therefore knew that he was not Braga (even though he was Braga).88 Braga then brought an action to recover the funds from the fraudulent transfer. The court noted “that when a customer has agreed to a bank’s security procedure, the customer will bear the risk of loss if the security procedure was ‘commercially reasonable’ and if the bank followed that procedure.”89 The court then conducted an analysis based on that set forth in Regatos. The Braga court focused on the fact that the parties agreed to a three-part security procedure which consisted of a signed order, confirmation phone call, and a signature comparison.90 The court again noted that a signature comparison alone is not sufficient to establish commercial reasonableness. 91 However, because the signature comparison was coupled with the other two elements, the Braga court found the procedure in that case to be commercially reasonable. 92 In applying the holding from Regatos, the Braga court reasoned that: 337 [b]y signing the Telecommunications Authorization, an “explicit agreement,” [the] plaintiffs agreed to the Bank’s security procedures, so long as they are found to be commercially reasonable. It does not matter that [the] plaintiffs did not know what the Bank’s security procedures were because [Article 4A] of the New York UCC compels banks to use commercially reasonable procedures.93 The Braga court then noted that the bank’s procedures in that case required a three-step process to be followed regarding any funds transfer request.94 In addition to the mandatory signature comparison, the three-step procedure included a confirmatory telephone call, an answer to security questions, and a recording of the confirmatory phone call.95 This security procedure was similar to that upheld in Regatos.96 However, in Regatos, the confirmatory phone call had to be placed with a previously identified bank agent every time.97 On the other hand, “in Regatos, there were no challenge questions and no telephone logs [or recordings] as there were here.”98 Thus, although there was a difference as compared to the procedure in Regatos, the security challenge questions and the phone recordings in Braga offset for the lack of a confirmatory telephone call to or from a previously identified bank agent.99 In the court’s words, “the required challenge questions and telephone logs [compensated] for the loss of the voice-recognition procedure 93. Id. at *4 (quoting Regatos, 257 ˇ.Supp.2d at 646) (citing N.Y. UCC § 4A-201, Official Comment: “The definition of security procedure limits the term to a procedure ‘established by agreement of a customer and a receiving bank.’ The term does not apply to procedures that the receiving bank may follow unilateral1y in processing payment orders.”). 86. See id. at *2. 87. See id. at *3. 94. See id. at *4. 88. See id. 95. See id. Id. (quoting the Telecommunications Authorization). 89. Id. (citing N.Y. UCC § 4A-202(2)). 96. See id. at *5. Id. 90. See id. 97. See id. 84. See id. 91. See id. (citing N.Y. UCC § 4A-201). 98. Id. 85. See id. 92. See id. 99. See id. 80. Braga ˇilho v. lnteraudi Bank, No. 03 Civ. 4795(SAS), 2008 WL 1752693 at *1 (S.D.N.Y. 2008). 81. See id. 82. 83. 338 QUARTERLY REPORT used in Regatos.”100 So, the confirmation telephone call, an answer to security questions during that confirmatory phone call, and a recording of the confirmatory phone call constituted a valid and commercially reasonable security procedure. orders, or non-orders. Because the telexes received were not the telexes sent by the banks, Centre-Point argued that a lack of a commercially reasonable security procedure existed in the transaction and was responsible for the loss. The Centre-Point court, applying Article 4A, adopted a two-part inquiry. The first part of the inquiry was whether the particular security procedure was commercially reasonable, and the second part of the inquiry was whether AEBL complied with the procedure.109 In applying this two-part inquiry, the court adopted a more definitive standard than those applied in Covina, Regatos and Braga.110 When determining whether or not a security system is commercially reasonable, the Centre-Point court held that: “[t]he standard is not whether the security procedure is the best available. Rather, it is whether the procedure is reasonable for the particular customer and the particular bank, which is a lower standard.”111 ˇor example, if both parties agreed on a procedure designed to eliminate fraud and adopted a security system to protect each party’s interests, it is likely to be commercially reasonable.112 Therefore, “[a] security procedure is not [going to be] commercially unreasonable simply because another procedure might have been better or because the judge deciding the question would have opted for a more stringent procedure.”113 ˇurthermore, to answer the question of commercial reasonableness, the court said it would analyze security procedures in place in similar situations between similar parties.114 Critiquing the system used by AEBL with the standard adopted, the Centre-Point court determined that the telex test key code was a commercially reasonable security system. 115 Centre-Point admitted that it never objected to the security procedure in place, and Centre-Point also admitted that all banks in Nigeria used essentially the same security procedure.116 In addressing the second part of the inquiry as set forth by the court, AEBL also confirmed that all test key codes received were tested properly and confirmed. Therefore, because AEBL received a valid test code, even though the codes were not legitimate, AEBL sufficiently complied with the security procedure agreed upon by both parties. Because the test key code was commonly used by all similar banks in the area and there was valid compliance, the court found “that the telegraphic test key [met] the ‘commercially reasonable’ standard required by the statute.”117 109. See id. at *4. 115. See id. 104. See id. 110. Covina, Regatos, and Braga are discussed supra at Parts III.B., C., and D., respectively. 116. See id. 105. Id. 111. Id. (see also UCC § 4A-203, Official Comment 4). 106. See id. 112. Id. 107. See id. 113. Id. 119. Grabowski v. Bank of Boston, 997 ˇ.Supp. 111, 115 (D. Mass. 1997). 108. See id. 114. See id. at. *5. 120. See id. D. The Centre-Point Case In Centre-Point Merchant Bank LTD v. American Express Bank LTD,101 the court adopted a more specific two-part analysis in determining whether the bank’s actions and procedures were commercially reasonable. Centre-Point, a Nigerian Bank, and American Express Bank LTD (AEBL), entered into a banking relationship. The two banks communicated by telex and used a telegraphic key code to conduct all transactions.102 ˇour years after the account was opened, CentrePoint telexed AEBL to debit a large sum from the account and invest that sum in a fixed deposit.103 The following day, AEBL replied via telex advising on the interest rate; however, Centre-Point never received this telex.104 “Instead, [Centre-Point] received an altered telex confirming that AEBL had followed its instructions and debited the account.”105 At the same time, AEBL received a cancellation telex from Centre-Point.106 AEBL then implemented the security procedure and applied the test key code, and this indicated that the key code was valid.107 Unbeknownst to any of the parties involved, a Centre-Point employee had altered the telexes that each bank received. 108 Therefore, neither bank was aware of the fraudulent payment E. The Grabowski Case In contrast to the Regatos, Braga, and Centre-Point cases,118 Grabowski v. Bank of Boston119 illustrates an instance in which a commercially reasonable security system was not present. In Grabowski, the plaintiffs entered into various agreements with the Kinder Company (Kinder), which operated an investment program for buying and selling prime commercial debt instruments and securities. Kinder proposed that the plaintiffs open the accounts at the Bank of Boston (the Bank) and execute powers of attorney granting Epstein, the principal for Kinder, control over the accounts.120 “Kinder’s agents told the plaintiffs [that] this power of attorney would protect their funds and the account would hold cash and securities, 100. Id. 101. Centre-Point Merchant Bank LTD v. American Express Bank LTD, No. 95 Civ. 5000 LMM, 2000 WL 1772874 at *1 (S.D.N.Y 2000). 102. See id. 103. See id. 117. Id. 118. Discussed above at Parts III.C., D., and E., respectively. QUARTERLY REPORT which the Bank would authenticate.”121 ˇunds were eventually transferred into the accounts and, simultaneously, Epstein directed the bank to execute funds transfers from these accounts.122 While directing the Bank to withdraw funds from the accounts, Epstein failed to replace “the funds with an equivalent amount of prime bank instruments or invoices,”123 as the agreement between the plaintiffs and Kinder required. Defending the commercial reasonableness of its security procedure, the Bank argued that it was not liable for the funds transfers. Although the court found that the Bank was not liable (because the transfers were authorized), the court also determined that there was no commercially reasonable security procedure in place. Article 4A eliminates the liability of a bank if the customer and the bank have agreed to a security procedure for verifying the authenticity of any transfers.124 The Grabowski court concluded that: “[t]he Commercial Deposit Account Resolution [Account Resolution] relied on by the Bank here is not an enforceable modification of the loss allocation scheme set forth in Article 4A.” 125 The Account Resolution was not an enforceable modification because it contained only “a general modification of liability under Article 4A without an accompanying commercially reasonable security procedure.”126 No security procedures, such as verification callbacks, recordings of the call, or secure passwords existed in the Commercial Deposit Account Resolution.127 Instead, the Account Resolution provided only an indemnity provision.128 Therefore, “because the Account Resolution [purports 121. Id. to be] a modification of the baseline loss allocation scheme of [A]rticle 4A and not an agreement on a security procedure, the general indemnity provision relating to unauthorized payment orders is unenforceable under…[A]rticle 4A.”129 The Grabowski case makes clear that an indemnity provision in a deposit account agreement, alone, will not suffice to establish a commercially reasonable security procedure. In the final analysis, an agreement between the bank and the customer needs to be reached, regarding not only an indemnification provision but a commercially reasonable security procedure as well. At a minimum, features like the procedures upheld in Regatos and Braga should be considered. IV. A. So Exactly What is Commercially Reasonable? Introduction As noted, there is no precise definition or rule that lays out specific requirements for a commercially reasonable security procedure.130 On one hand, a commercially reasonable security procedure might include several procedures lumped together to create a commercially reasonable system.131 On the other hand, a commercially reasonable security procedure could consist of one specific procedure that is considered commercially adequate.132 However, there is a growing trend concerning certain practices and techniques that seem to be developing as an industry standard and custom for what constitutes a commercially reasonable security procedure. Many businesses, in addition to banks, are operating online banking and funds transfers systems, effectively operating the business in cyberspace, and are implementing security procedures for these transactions. 339 B. Wheatman Recommendations Many of these companies, including banks and other financial institutions, are adopting innovative procedures and policies to ensure that they are complying with the requirements for a commercially reasonable security procedure. ˇor instance, Vic Wheatman with the Gartner Company, a provider of market research covering the information technology industry, has explained eight steps that he believes are needed to define a commercially reasonable security system. ˇirst, “[o]rganizations need to examine the status of commercially available computer technology and, specifically, information security technology.”133 In this stage, banks and other financial institutions need to be made aware of the fact that there are different systems to protect different types of information. Of course, the larger and more complex the financial institution, the more extensive and complex the system needed. Secondly, “[o]rganizations always need to assess the affordability of security technologies, procedures and techniques.”134 Because larger and more complex financial institutions will need larger and more complex systems, these systems will cost considerably more than smaller systems. Small institutions and small businesses need to carefully weigh the costs against the potential loss from fraudulent transfers and hackings before expanding into areas of operation that will require implementing the most expensive security system. Third, “[g]iven the growing list of failures in systems, the likelihood of a technological security failure should be considered fairly high.”135 Technology is not perfect and is always subject to glitches and malfunctions. Therefore, backup 122. See id. at 117. 123. Id. 124. See id. at 120 (and UCC Article 4A §§ 4A-201, 4A-202, and 4A-203). 125. Id. 129. Id. at 120. 126. Id. 130. See supra Part II.D. 133. Vic Wheatman, Management Update: Eight Steps Needed to Define Reasonable Security, June 8, 2005, available at http://www.solutions-me.com/DataiNesletters/CWP%20%20Gartner_8Steps _ To _ Security.pdf (last visited ˇeb. 2, 2009). 127. See id. 131. Id.; see also supra Parts III.B.-E. 134. Id. 128. See id. at 116. 132. Id. 135. Id. 340 systems and manual systems need to be in place to ensure the authenticity and validity of transfers and to decrease the chances of fraudulent transfers occurring. ˇourth, an institution must consider the harm that can result from a security failure.136 The potential harm to consider has at least two fronts. One is the potential harm to a customer whose private information could be leaked on the internet or who could be the victim of a fraudulent transfer.137 The other potential harm is the risk to the bank in a situation where there is a breach or fraudulent transfer. The financial institution could be subject to liability for the amount of the transfer or for penalties assessed on it by a court or a state or federal government.138 ˇifth, financial institutions and companies need to anticipate security threats.139 Obviously the internet is not always a safe environment. Hackers are always trying to get into secure systems. ˇurthermore, dishonest employees must be kept at bay and not tempted to steal personal information or induce fraudulent transfers. Sixth, “[r]easonable security in the absence of widely accepted standards is difficult.”140 There isn’t a single security system that is the best or is the most commercially reasonable security system in all contexts. Different procedures, systems, and techniques may work differently in different situations. A key solution is to look to the industry custom or at what other financial institutions in the market are using as their commercially reasonable security procedure. Seventh, an organization should look at the best practices on the market.141 “An organization should at least do what its peers are doing.”142 ˇinally, Wheatman recomends that a financial institution or QUARTERLY REPORT company implement routine audits.143 Security systems and technology are always changing. As noted, hackers are always finding ways around current security systems. ˇurthermore, new systems are being developed each day. “Self-assessment is a useful information-gathering technique that can help determine the degree to which a chosen standard is being met….”144 Wheatman emphasizes that having the right managerial procedures in place makes it more likely that a commercially reasonable security system will be implemented and maintained. C. Password Systems Currently, the most commonly used security system for online transactions requires a complex password containing more than six keys and at least one number. As noted below, however, over the past few years at least two major internet sites have been compromised, revealing all related passwords. Although neither of the sites involved commercial transactions, many other sites are following their lead in changing their password requirements. In 2007, the social networking site of Myspace was compromised. This “hacking” revealed 30,000 passwords and usernames.145 More recently, the site of phpbb.com was compromised revealing 20,000 passwords.146 ˇollowing the hacking of this site, a study of the type of passwords chosen was conducted by Robert Graham.147 Graham determined that the common approach, as to how people choose their password, is to use an ordinary, easily identified password if there were no password requirements. Among the leading choices were people’s first names, patterns on the keyboard, or variations of the word “password.”148 Using a password that matches the user’s first name constitutes zero security protection. A password in th form of the user’s first name is just the username typed a second time. The user’s name appears on the screen and the hacker doesn’t even have to guess. Similarly, people’s choices of patterns on the keyboard often provide zero security protection. Common choices for keyboard sequences include: “1234,” “qwerty,” or “asdf.”149 Again, this takes the probability of having a safe password out of the equation. A hacker can easily access any personal or financial information if a user employs a password of this sort. Therefore, “[t]he widely-deployed use[s] of user ID/password protection schemes are no longer considered adequate protection for online information. Though user ID/PIN/password are still the most common solution for online authentication, there is significant interest in replacing passwords with more robust multifactor authentication.”150 D. Other Procedural Safeguards Although the use of user identification (ID), personal identification numbers (PIN’s), and similar passwords is commercially reasonable under UCC Article 4A,151 there is a trend toward adoption of more secure methods of commercially reasonable security procedures in the banking industry, at least for large or sophisticated transactions. ˇor example, it has been recommended, in the use of a call-back procedure to verify authentication, that three different employees be used, in order to reduce the opportunities for fraud.152 “One…employee receives the information and prepares the transfer 148. See id. 136. See id. 137. See id. 143. See id. 149. Id. 138. See id. 144. Id. 150. http://www.umacha.org/pdf/webbriefcommerciaI041007. pdf. 139. See id. 140. Id. 145. See PHPBB Password Analysis, http://www.darkreading.com/ blog/archives/2009/02/phpbb---’password.html (ˇeb. 6, 2009, 17:56). 151. See supra Parts II.D. and III.B.- E. 141. See id. 146. See id. 142. Id. 147. See id. 152. See Dana Turner, ˇunds Transfer Developing Commercially Reasonable Security Procedures ˇor Your Bank, Part J, July 23, 2001, available at http://www.bankersonline.com/security/ funds.html (last visited ˇeb. 2, 2009). QUARTERLY REPORT instructions; [o]ne…employee validates (determines that the information exists) and verifies (tests the truthfulness or accuracy of the information); and [o]ne… employee sends the transfer order.”153 Obviously, when more eyes are used to ensure authenticity, it is harder for an invalid transfer or fraudulent intent to go unnoticed. But, importantly, no matter how many employees are involved, the receiving employee must verify the identity of the customer to ensure the authenticity of the customer placing the order transfer.154 The receiving employee should confirm the bank account number, PIN, and signature of the customer with the payment order being received. Also, the receiving employee, when documenting the payment order, should verify additional security information such as Social Security number, driver’s license number, signature comparison, photo comparison, and/or notarized statements.155 The bank will have a better chance of ensuring a valid funds transfer for each additional security check or authentication implemented. Next, the verification employee should institute the security safeguard of a call-back.156 In this call-back, the verification employee double-checks important information with the customer placing the payment order. The verification employee will ask questions regarding the amount of the funds transfer, the destination of the transfer, the security code provided by the bank to the customer placing the order, and/or the destination account number. ˇinally, the third employee, the sending employee, will verify all of the documentation filled out by the previous two employees and then will execute the payment order. 157 In this system, instead of one employee or one pair of eyes implement- ing the entire security procedure, there are three different employees verifying various aspects of the customer’s security information and payment order before the order is accepted and executed.158 Although this process might be time-consuming, and not suitable for every type of transaction, the liability risks of the bank should be reduced. E. Encryption The use of encryption or encoding in user authentication ensures extra security in the funds transfer. Encryption “protects data from unauthorized disclosure [and] is a process in which the data is ‘scrambled or coded’ before it passes through the network.”159 This process uses a series of mathematical formulas and steps to transform sensitive data into a secured, encrypted form. Many banks have now adopted the American National Standards Institute (ANSI) and the International Standards Organization (ISO) standards of encryption. The “American National Standards Institute sets standards for the banking industry [and the] International Standards Organization…sets international standards.”160 The standards set by these institutions include various types of data encryption protections. ˇor example, a bank could use data encryption, user authentication, message authentication, or key management secret.161 Large banks and financial institutions commonly use the ANSI X9.17 standard which consists of the key management secret.162 “With the rapid adoption of…[these] systems by many banks across the U.S., a standard for commercially reasonable security is emerging.”163 The adoption of data encryption, 158. See definitions of this Article 4A terminology at UCC §§ 4A-104, 4A-105, 4A-209, and 4A-301. 341 in addition to other security procedures commonly in place, decreases the likelihood of a fraudulent funds transfer taking place. Therefore, some large banks and other institutions are implementing data encryptions systems in addition to the use of passwords, user names, and PINs. F. Summary: Procedural Safeguards Nothing is fail-safe; however, the more procedures the bank implements, the greater the likelihood the security procedure will be considered commercially reasonable. Security call-back procedures, recorded calls, multiple employees screening the funds transfer request and payment order, password/PIN/user name, and data encryption, in some combination coupled together, will greatly increase the odds of the security procedure satisfying the commercial reasonableness requirement of UCC Article 4A, compared to any such feature standing alone. It should be emphasized again, however, that the law does not require any specific procedure or feature in a given context. V. Conclusion Because a commercially reasonable security procedure can employ one or more of several different types of security techniques, it is best to craft a commercially reasonable security procedure “that corresponds to commonly accepted commercial practices among commonly situated Originators conducting similar types of transactions.”164 Therefore, other things being equal in a specific instance, the bank or other company should employ security procedures that are equivalent to what other similarly-situated financial institutions or companies are doing.165 In addition, although the use of a password, PIN, or user name is still the most common form of cyberspace security, other, multifactor authentication 153. Id. 159. Douglas Kozlay, The Importance of Security Standards, available at http://www.firstvpn.comlpapers/ire/Standards.pdf (last visited ˇeb. 2, 2009). 154. See id. 160. Id. 155. See id. 161. See id. 156. See id. 162. See id. 164. http:www.umacha.org; Wheatman, supra note l33; Turner, supra note 152. 157. See id. 163. Id. 165. See id. 342 QUARTERLY REPORT systems are increasingly being utilized in sophisticated transactions.166 These systems may include the use of a verification of customer identity by various means, including the use of a customer computer, customer voice or fingerprint verification, and customer geo-location verification.167 It should be emphasized again that the laws governing commercially reasonable security procedures can only be used as guidelines.168 Commercially reasonable security procedures have not been specifically limited or defined in the law. This is an appropriate approach because: [f]irst, prescribing solutions for all cases is impossible, since the circumstances are so varied that no law could begin to anticipate them all. Second, [information technology] changes so fast that what is an adequate solution today could be antiquated in just a year or two. ˇurther, because the threat environment is changing, any definition of “good enough” is only temporary. Specificity has deliberately been left out of most regulations to accommodate such factors. 169 Thus, a standard for determining exactly what constitutes a commercially reasonable security procedure has not been clearly established by the courts or the industry. However, most financial institutions and other companies take reasonable measures to protect themselves and their customers against fraudulent funds transfers. “Banks literally spend hundreds of thousands of dollars on their security systems, and as between [the customer] and the bank, it is almost always the case that it was the customer’s system which was hacked….”170 A good strategy entails balancing the costs generated by alternative security procedures against the intensity of the security needed.171 In determining an appropriate approach, one should endeavor to ensure that the security procedure meets the prevailing banking standards and industry customs. If the security procedure meets prevailing industry standards, the system will have a greater chance of being held to comply with the commercially reasonable requirements of UCC Article 4A. 170. William G. Compton, Fraudulent Wire Transfers: The Russian Connection, August 28, 2008, available at http: www.andrewskurth.comlpressroom-clientalerts-30.htm (last visited ˇeb. 2, 2009). 166. See id. 167. See id. 168. See, e.g., Wheatman, supra note 133. 171. LARY LAWRENCE, AN INTRODUCTION TO PAYMENT SYSTEMS 454 (1997) (citing UCC § 4A-203, Official Comment 4). 169. Id. Clarifications to Interim Rule… (Continued from page 403) implementation of changes in an index value.13 The foregoing disclosure must be in a format substantially similar to Model Clause H-4(I) in Appendix H of Regulation Z and must be placed in a box directly beneath the associated required table.14 Model Clause H-4(I) reads as follows: [Introductory Rate Notice D. Disclosures for Negative Amortization Mortgages With respect to a negative amortization mortgage,15 the creditor must disclose the following items: • 15. The term “negative amortization” means payment of periodic payments that will result in an increase in the principal balance under the terms of the legal obligation and that the term “negative amortization loan” means a loan, other than a reverse mortgage subject to Regulation Z § 226.33, 12 CˇR § 226.33, that provides for a minimum periodic payment that covers only a portion of the accrued interest, resulting in negative amortization. 14. Presumably, the associated required table would be Table H4(ˇ). the maximum interest rate that could apply when the consumer must begin making fully amortizing payments under the terms of the legal obligation; • if the minimum required payment will increase before the consumer must begin making fully amortizing payments, the maximum interest rate that could apply at the time of the first payment increase and the date the increase is scheduled to occur; and • if a second increase in the minimum required payment may occur before the consumer must begin making fully amortizing payments, the maximum interest rate that could apply at the time of the second payment increase and the date the increase is scheduled to occur. the interest rate at consummation and, if it will adjust after consummation, the length of time until it will adjust, and the label “introductory” or “intro”; You have a discounted introductory rate of ___% that ends after (period). In the (period in sequence), even if market rates do not change, this rate will increase to ___%.] 13. ˇor example, if the contract specifies that rate changes are based on the index value in effect 45 days before the change date, creditors may use any index value in effect during the 45 days before consummation (or any earlier date of disclosure) in calculating the fully-indexed rate to be disclosed. • The September Interim Rule previously stated that the term “negative amortization” would mean payment of periodic payments that will result in an increase in the principal balance under the terms of the legal obligation and that the term “negative amortization loan” would mean a loan that permits payments resulting in negative amortization, other than a reverse mortgage. The Commentary notes that the creditor must assume that interest rates rise as quickly as possible after consummation, in accordance with any interest rate caps under the legal obligation. ˇor (Continued on page 330)
© Copyright 2026 Paperzz