Harmonisation of Turn Around Time (TAT) and customer compensation for failed transactions using authorised Payment Systems

The principle behind the TAT is based on the following:

(a). If the transaction is a ‘credit-push’ funds transfer and the beneficiary account is not credited while the debit to originator has been effected, then credit is to be effected within the prescribed time period failing which the penalty has to be paid to the beneficiary;

(b). If there is delay in the initiation of a transaction at the originator bank’s end beyond the TAT, then penalty has to be paid to the originator.

(c). A ‘failed transaction’ is a transaction which has not been fully completed due to any reason not attributable to the customer such as failure in communication links, non-availability of cash in an ATM, time-out of sessions, etc. Failed transactions shall also include the credits which could not be effected to the beneficiary account on account of lack of full information or lack of proper information and delay in initiating a reversal transaction.

Here is the link to RBI circular 20-sep-19Harmonisation of TAT using authorised Payment Systems.PDF

Network Security – How To Secure Wi-Fi Networks Effectively From Hackers – A Complete Guide

Wireless security is specifically created to keep unauthorized users from accessing your Wireless Network and stealing sensitive information. The type of Wireless security that an individual uses is identified by its wireless protocol. Today, numerous homes and companies operate and rely on Wireless Networking. Wi-Fi is incredibly efficient in keeping users connected to the internet.

For more details refer https://gbhackers.com/wireless-security/

 

It is our 10th Birthday

 

 


10 years ago on the 27th of August 2001, we started our journey under the corporate identity of “Qadit Systems & Solutions Pvt Ltd”, to provide quality Information Security Assurance & Consultancy services.

 


Today as we enter our 11th year, we wish to
Thank all our Clients, Associates, Partners and Well-Wishers for being part of this enjoyable journey and for

 


    your words of wisdom, encouragement and appreciation;

 


    the opportunities provided for helping us improve and expand our service offerings;

 


    your suggestions and honest opinions that have helped us ensure the quality of our service; and

 


    the constant support and strength that your association has provided us.

 

 

We look forward to your continued patronage and good wishes in our ongoing journey.

 

 

A Heartfelt

 

from The Team @ Qadit.

Business Model for Information Security – What is it all about?

The role of information security has not been clearly defined in many organizations and these organizations face challenges such as lack of senior management’s commitment to information security initiatives, poor security planning, integration issues between business goals and information security, issues relating to accountability for implementing, monitoring and reporting on information security and so on. Continue reading “Business Model for Information Security – What is it all about?”

Qadit moves to a newer and bigger premises

On the strength of the long standing and excellent relationship with our valued clients, associates, ecosystem partners and friends, Qadit Systems and  group entities have grown both in terms of service offerings and service quality.

This has necessarily added to another dimension-  the quantum of human resources in our fold.

With a view to constantly raising the bar as far as client deliverables go and as a concomitant, providing the right ambience for our human resources to serve you, we have moved to bigger premises supported by stateof- the- art infrastructure at :

1st Floor, Balammal Building (above Canara Bank)

33, Burkit Road, T.Nagar

Chennai 600 017

Phone:  044-42791150 to 52, 6547 7225

Fax: 044-42791149

Understanding RAID

RAID or Redundant Array of Inexpensive Disks is a technology for storing the same data across different disks to ensure data redundancy. RAID also employs data stripping (a process where data is divided into blocks and spread over several disks) which improves performance. A RAID appears to the operating system as a single logical hard disk. Continue reading “Understanding RAID”

Information Rights Management – An Introduction

Information rights management is a technology which aims to protect sensitive and critical documents and information while at the same time ensuring that it is made available for genuine needs. For example, two companies may negotiate to trade a patent during which the patent details would be made available to the buying company. Despite signing an NDA, if the deal doesn’t happen, the company which was supposed to buy the patent can come out with a new product based on that patent (whose details were made available to it during negotiation stage) with some modifications. Continue reading “Information Rights Management – An Introduction”

Working of a digital signature

The Information Technology Act gives legal validity to internet based communications / transactions like email and EDI etc, i.e. e-commerce in short.In these internet based transactions, a digital signature serves the purpose of identifying the originator of the transaction and ensuring that the communication has happened without any intermediary disturbance like data tampering or modification. Continue reading “Working of a digital signature”