Tech Tag

Financial Inclusion is a state where financial services are delivered by a range of providers, mostly the private sector, to reach everyone who could use them. Specifically, it means a financial system that serves as many people as possible in a country. In recent time, financial Inclusion has assumed a critical development policy priority in many countries, particularly in developing economies. (cbn.gov.ng). Financial inclusion means that individuals and businesses have access to useful and affordable financial products and services that meet their needs – transactions, payments, savings, credit and insurance – delivered in a responsible and sustainable way- (worldbank.org). With the aim to “make financial services accessible at affordable costs to all individuals and businesses, irrespective of net worth and size respectively”, financial inclusion is important for the development of any economy. It means that people who have better access to financial services through traditional, bank accounts and digital payments have greater control over their money, and their savings, securing business loans, insurance and are better prepared for financial emergencies.  Also, this would provide the possibilities for the creation of a large depository of savings, investable funds, investment and therefore global wealth generation. In other words, access to financial services, that are well suited for low-income earners promote enormous capital accumulation, credit creation and investment boom. Over the years, the government and monetary authorities have introduced varying policies aimed at deepening financial inclusion within the economy. The policies ranged from various institutional involvements such as the establishment of community and microfinance banks to specific policies and programs designed to facilitate access of the financially excluded to formal financial services. The...

Access control systems are a vital part of ensuring the security of your business. These systems, as a priority, allow you to determine who is allowed entry to certain sensitive areas of your premises, so that you can keep unauthorized individuals out. They do this using ID’s (cards, tags, keys), PIN’s or by using some biometric method. This last method, biometry, is by far the most secure but is also the slowest which means many end users still opt for cards and tags. To help you determine the best Access Control system for your needs, here are the types that are currently available: Stand-alone systems: Do not require any type of infrastructure or connectivity, the Access Control terminal itself has the memory and the capability to manage users. These entry-level systems are usually limited by the number of users which can be stored and generally don’t allow for scheduling. One or two entrances can be controlled. They are ideal for small shops, offices, warehouses, etc. with a maximum of 30 registered users. A variation of stand-alone systems is telephone entry systems. These systems provide the option for a guest to call up to a resident so that they can remotely open the door for them. These types of systems are generally found in apartment buildings and they effectively act as an automated doorman who screens guests and determines who is allowed in or not.   Managed systems: Are networked and connected to a central software application from which users are administered, hours and calendars are controlled together with entry permissions. This allows security personnel to not only restrict access but also monitor who...

Africa is far behind in terms of provision of financial services for its bulging population, and it needs to urgently deliver a robust financial infrastructure that enables prosperity for the people.  For almost a decade, the global community and national governments have made concerted efforts to expand financial inclusion—creating a financial system that wors for all and opens the doors to greater stability and equitable progress. The progress towards financial inclusion in East Africa is evident. In Kenya and Tanzania, it is easier than ever to access financial services with only a mobile phone. But it is far different in West Africa, where the slower pace of development of mobile money has meant limited financial inclusion for some of the poorest communities on the continent. Although the root cause of this predicament is multifaceted, new thinking and innovation in financial services, which includes the provision of appropriate financing instruments targeted at this group of the population, has become critical these past years. It is clear that the main impediments to financial inclusion in Africa are the high cost of opening and maintaining formal bank accounts, the long distances to bank branches and the daunting list of personal information that banks require to support applications to open an account. Sometimes, the erratic nature of Central Bank financial policies and regulations also discourages people from engaging with formal financial institutions. These constraints have stimulated a high level of demand for alternatives to the traditional banking and financing system.   Mobile Phones to the Rescue While mobile phones are quickly becoming more affordable, digital financial solutions that are tailored to very poor and remote communities are urgently...

THE ABC OF BIG DATA The phrase ‘Big Data’ has in recent times become a popular jargon. It has been used, overused and used incorrectly that it is difficult to decipher what it really means. In this post, we shall be demystifying Big data and seeing why it is considered one of the most promising technologies of the decade. Big data refers to the massive volume of both structured and unstructured data that is so large it is difficult to process using traditional techniques. So Big Data is just what it sounds like – a whole lot of data. Social media, online books, videos, music and all kinds of information have all added to the staggering amount of data that is available, as more of this information have become digitized. All these data can then be analyzed, and value can be gotten from it. Categories of Big Data Big Data may be well-organized, unorganized or semi-organized. Based on the data form in which it is stored, the data is categorized into three forms: Structured Data – Data accessed, processed, and stored in a fixed format or form is called as structured data. The example of this data form is a table ‘Student’ storing different fields for the different students containing the data in rows and columns. Unstructured Data – Data without any structure or a specific form is called as unstructured data. It becomes difficult to process and manage unstructured data. Examples of unstructured data may be data sources with images, text, videos, etc. Semi-structured Data – This kind of data contains the combination of both structured and unstructured data. It has a structured form...

As customers’ financial behaviors evolve to include digital banking and financial technologies—like peer-to-peer payment, virtual currency, mobile payments and mobile wallets—tokenization is one of the most important new technologies merchants can leverage to stand in the way of cybercriminal access to customer payment information. What is Tokenization? It is recommended that consumers use a paper shredder to destroy bank account statements, checkbook registers, tax forms, payment receipts and similar documents that include sensitive data because any account number reflected on the document that wasn’t destroyed beyond recognition could be used fraudulently. Similarly, when a shopper buys something online, they are required to divulge confidential and sensitive information, such as their address and ATM card info.  Giving out this information online is risky since it may be stolen and used fraudulently. Much like a paper shredder renders account information meaningless so that it’s made nearly impossible to re-assemble, repurpose or identify, the same theory applies to tokenization—through technology. Basically, tokenization is the process of replacing sensitive data with unique identification symbols that capture all the vital information about the data without compromising its security. The algorithmically generated number used to replace the sensitive data is called a token. How It Works Typical consumer credit/debit (ATM) cards come with names, 16-digit personal account numbers (PANs), expiration dates and security codes — any of which can be "tokenized." When a merchant swipes a customer's credit card, the PAN is automatically replaced with a randomly generated alphanumeric ID (“token”). The original PAN never enters the merchant's payment system; only the token ID does. The merchant can use this special token ID to keep records of the...