Mobile Banking

Total Page:16

File Type:pdf, Size:1020Kb

Mobile Banking MOBILE BANKING Overview of the banking industry The Indian Banking industry, which is governed by the Banking Regulation Act of India, 1949 can be broadly classified into two major categories, non-scheduled banks and scheduled banks. Scheduled banks comprise commercial banks and the co-operative banks. In terms of ownership, commercial banks can be further grouped into nationalized banks, the State Bank of India and its group banks, regional rural banks and private sector banks .These banks have over 67,000 branches spread over the country.The first phase of financial reforms resulted in the nationalization of 14 major banks in 1969 and resulted in a shift from Class banking to Mass banking. This in turn resulted in a significant growth in the geographical coverage of banks. Every bank had to earmark a minimum percentage of their loan portfolio to sectors identified as “priority sectors”. After the second phase of financial sector reforms and liberalization of the sector in the early nineties, the Public Sector Banks (PSB) s found it extremely difficult to compete with the new private sector banks and the foreign banks. The new private sector banks first made their appearance after the guidelines permitting them were issued in January 1993. Eight new private sector banks are presently in operation. These banks due to their late start have access to state-of-the-art technology, which in turn helps them to save on manpower costs and provide better services. Current scenario The industry is currently in a transition phase. On the one hand, the PSBs, which are the mainstay of the Indian Banking system, are in the process of shedding their flab in terms of excessive manpower, excessive non-Performing Assets (Npas) and excessive governmental equity, while on the other hand the private sector banks are consolidating themselves through mergers and acquisitions. Private sector Banks have pioneered internet banking, phone banking, anywhere banking, and mobile banking, debit cards, Automatic Teller Machines (ATMs) and combined various other services and integrated them into the mainstream banking 1 MOBILE BANKING arena, while the PSBs are still grappling with disgruntled employees in the aftermath of successful VRS schemes. Also, following India‟s commitment to the W To agreement in respect of the services sector, foreign banks, including both new and the existing ones, have been permitted to open up to 12 branches a year with effect from 1998-99 as against the earlier stipulation of 8 branches. A wide spectrum of Mobile/branchless banking models is evolving. However, no matter what business model, if mobile banking is being used to attract low-income populations in often rural locations, the business model will depend on banking agents, i.e., retail or postal outlets that process financial transactions on behalf of banks. The banking agent is an important part of the mobile banking business model since customer care, service quality, and cash management will depend on them. Many Telco‟s will work through their local airtime resellers. However, banks in Colombia, Brazil, Peru, and other markets use pharmacies, bakeries, etc. Already, banks such as ICICI Bank and HDFC Bank have forged alliances with Prudential Life and Standard Life respectively. This is one segment that is likely to witness a greater deal of action in the future. In the near term, the low interest rate scenario is likely to affect the spreads of majors. This is likely to result in a greater focus on better asset-liability management procedures. Consequently, only banks that strive hard to increase their share of fee-based revenues are likely to do better in the future. 2 MOBILE BANKING CHAPTER 1 Introduction Mobile banking is a way for the customer to perform banking actions on his or her cell phone or other mobile device. It is a quite popular method of banking that fits in well with a busy, technologically oriented lifestyle. It might also be referred to as M- banking or SMSbanking. The amount of banking one is able to do on their cell phone varies depending on the banking institution one uses. Some banks offer only the option of text alerts, which are messages sent to their cell phone that alert them to do activity on their account such as deposits, withdrawals, and ATM or credit card use. This is the most basic type of mobile banking. A more involved type of mobile banking allows the user to log into his or her account from a cell phone, and then use the phone to make payments, check balances, transfer money between accounts, notify the bank of a lost or stolen credit card, stop payment on a check, receive a new PIN, or view a monthly statement, among other transactions. This type of banking is meant to be more convenient for the consumer than having to physically go into a bank, log on from their home computer, or make a phone call. While all of this is true, some are concerned about the security of mobile banking. Most experts advise against performing any large transactions over mobile banking, which is good advice. However, it is equally important to use an alphanumeric password and to keep your PIN safe. Change your password often, and do not use your pets' names, your child's name, or any birthdays. This advice applies to all passwords, not just those used for mobile banking. Though you are logging on to a secure server at the bank through your cell phone, you need to do your part to protect your information. For this reason, many banks are now sending one-time use passwords for an extra step in security. A one-time use password might be sent to a cell phone or other device whencustomerwishes to log into their account. You will then usually need to enter both the password you have already set, along with the one-time use password, 3 MOBILE BANKING within a certain period of time. The one-time use password expires, naturally, after it is used once or after a time limit has passed. Using two passwords increases the security of the account, an important concern with mobile banking. The kind of banking and financial service that gives a real-time mobile access to customer on the move is called mobile banking. Mobile banking to the banking activity that is carried out on mobile (cell) phones that is banking is enabled even while a person is on the move. In modern times, information exchange takes place at great speed. The dependence of people on computing devices such as computers, cellular phone, pager, facsimile machine, e-mail and internet is growing at galloping rate. Such as growth has made the real time exchange of information a reality. At the same time it has also thrown challenges to modern enterprises. Which prompt them to act in a proactive manner so as to stay competitive in the business world. The constant innovation happening in the realm of electronic banking and financial services has contributed to a new development called „mobile banking‟ this may be attributed to the forth coming demand from the mobile workforce. The increasingly growing number of mobile workforce has really given a cutting edge to the progress of the electronic banking. The information which includes checking of account balance, request for a Cheque book, stop payment instruction, changing primary operation account, request for current periods‟ account statement to the mailed and access summaries of last three transactions performed on the account. The number of people using mobile banking services has increased. While the trend is growing, lack of awareness of services, apart from perceived security issues are inhibiting faster takeoff. It was clear at the start itself that this would be a battle focused not on technology, but on the mindset of the target audience. Over two years after the launch of mobile banking services in the country, that bridge has been reached and many are beginning to walk those cautious steps across it. Yes, the usage of mobile banking services is increasing, and fast against Dataquest‟s estimated user base of under 10,000 for mobile banking services in 2000, there are over 120,000 today who SMS from their banking. Even despite targeting a respondent profile that would bring in more positive answers than negative, threw up very low usage numbers. Also, 4 MOBILE BANKING E-commerce as a medium of purchasing and transacting has not really caught on, and the basket of mobile banking offerings is, in itself, very limited. The good news the technology backbone is in place, and getting better. There‟s CDMA, there‟s GSM. Forget their battles on the mobile telephony front from the consumer‟s point of view; he never had it so good. The recent price cuts are also likely to help, “say banking experts, adding that this will lead to “increasing willingness to move on to mobile, and therefore, to the value-added services that most operators offer today “The Internet is revolutionizing the way the financial industry conducts business, empowering organization with new business model and new ways to interact with customers. The ability to perform banking transactions online banks and brokers who offer personalized services through their web portals. This increased competition is driving traditional financial institutions to find new ways to add value to their product and services, gain competitive advantage and increase customer loyalty while also attracting new, high-value client. A mobile banking conceptual model:- In one academic model mobile banking is defined as: "Mobile Banking refers to provision and an ailment of banking- and financial services with the help of mobile telecommunication devices. The scope of offered services may include facilities to conduct bank and stock market transactions, to administer accounts and to access customized information." According to this model Mobile Banking can be said to consist of three inter-related concepts: Mobile Accounting Mobile Brokerage Mobile Financial Information Services 5 MOBILE BANKING Most services in the categories designated Accounting and Brokerage are transaction-based.
Recommended publications
  • We Are on the Right Track for Ensuring Our Success
    s »We have made great progress in »We are on the right track for networking our internal value ensuring our success as the chain electronically and in linking it to our customers, suppliers and Global network of innovation.« partners. This is enabling us to accelerate processes and cut costs.« Annual Report 2001 Annual s Annual Report 2001 Siemens Aktiengesellschaft Order No. A19100-F-V055-X-7600 Siemens Siemens is a network encompassing well over 400,000 people in 190 countries. information on contents for external orders We take pride in possessing in-depth knowledge of customers' requirements, the Telephone +49 89 636-33032 (Press Office) e-mail [email protected] expertise to create innovative solutions in electrical engineering and electronics, and +49 89 636-32474 (Investor Relations) Internet http://www.siemens.de/geschaeftsbericht_2001/order Fax +49 89 636-32825 (Press Office) Telephone +49 89 636-32910 the experience to successfully navigate even rough economic waters. But our greatest +49 89 636-32830 (Investor Relations) Fax +49 89 636-32908 e-mail [email protected] asset is undoubtedly our people, with their unparalleled motivation and their passion [email protected] for outperforming our competitors. Linked via a global network that enables them address for internal orders to exchange ideas with colleagues around the world, Siemens employees strive Siemens AG Wittelsbacherplatz 2 LZF, Fürth-Bislohe continuously to increase company value. D-80333 Munich Intranet http://c4bs.spls.de/ We at Siemens do not measure value solely in terms of short-term profitability. For Federal Republic of Germany Fax +49 911 654-4271 Internet http://www.siemens.com German Order no.
    [Show full text]
  • The Economics of Information the Relationship Between IT Spending, Profits, and Knowledge Capital®
    Concept Report Research and Advisory Services The Economics of Information The Relationship Between IT Spending, Profits, and Knowledge Capital® Concept Report, July 2001 Research by: Paul Strassmann Editied by: Jacques Halé Publishing by: Peter Bristow Chris Dickinson Steve Duke Samantha Henry Paul Makey Published July 2001 © 2001 by Paul A. Strassmann Important Notice The information available in this publication is given in good faith and is believed to be reliable. Butler Group expressly excludes any representation or warranty (express or implied) about the suitability of materials in this publication for your purposes and excludes to the fullest extent possible any liability in contract, tort or howsoever for implementation of, or reliance upon, the information contained in this publication. © P a u l A . S t r The Economics of Information a s s m a n n J u l y 2 0 0 CONCEPT REPORT 1 CONTENTS 5 Management Summary 11 Part 1: Transforming IT Costs into Profits 11 1.1 The Challenge 21 1.2 The Strategic Positioning of a Firm in Relation to IT 29 1.3 The Competitive Advantage in the Information Age 39 Part 2: Knowledge Capital® in European Firms 41 Introduction 45 2.1 Analysis of European Firms 55 2.2 Country Case – The UK Knowledge Capital® 65 Appendix A: Valuation of Knowledge Capital® 71 Appendix B: Valuation of Knowledge Capital® Rankings by Country 71 Belgian Firms 77 Danish Firms 83 Dutch Firms 91 Finnish Firms 97 French Firms 119 German Firms 139 Irish Firms 143 Italian Firms 151 Norwegian Firms 157 Portuguese Firms 161 Spanish Firms 167 Swedish Firms 177 UK Firms C o n c e p t R e p o r t Management Summary Concept Report, July 2001 © P a u l A .
    [Show full text]
  • List of Section 13F Securities, Fourth Quarter 2001
    OFFICIAL LIST OF SECTION 13(F) SECURITIES USER INFORMATION SHEET General This list of "Section 130securities" as defined by Rule 13f-1(c) [I7 CFR 240.13f-1 (c)] is made available to the public pursuant to Section13 (f) (3) of the Securities Exchange Act of 1934 [15 USC 78m(f) (3)]. It is made available for use in the preparation of reports filed with the Securities and Exhange Commission pursuant to Rule 13f-1 [17 CFR 240.13f-'I] under Section 13(f) of the Securities Exchange Act of 1934. An updated list is published on a quarterly basis. This list is current as of December. 15. 2001 ,and may be relied on by institutional investment managers filing Form 13F reports for the calendar quarter ending December30. 2001 . Institutional investment managers should report holdings-number of shares and fair market value--as of the last day of the calendar quarter as required by [ Section 13(f)(1) and Rule 13f-11 thereunder. Features (1) Additions and Deletions: Revisions made to the list of Section 13(f) securities are indicated in a column titled "STATUS." The word "ADDED" in the status column opposite the name of a security indicates that the security has become a Section 13(f) security. The word "DELETED" in the status col~~mnopposite the name of a security indicates that the security ceases to be a 13(f) security since the date of the last list. (2) List of options: An asterisk is placed next to the name of any security having a listed option and each option is individually listed with its own CUSlP number immediately below the name of the security having the option.
    [Show full text]
  • Weblogic Server 6.0 Review Inside Page 30
    WEBLOGIC SERVER 6.0 REVIEW INSIDE PAGE 30 TM The World’s Leading Java Resource Java COM June 2001 Volume:6 Issue:6 FREE! PRODUCT Sept 23–26, 2001 New York, NY PAGE 16 SHOWCASE CD! INSIDE! SHOW PROGRAM 183 From the Editor by Alan Williamson pg. 7 Industry Commentaries by Richard Green pg. 8 by Bruce Scott pg. 146 EXCLUSIVE: INTERVIEW WITH KEYNOTER...SCOTT DIETZEN Product Reviews Sun Blade pg. 20 WebLogic 6.0 pg. 30 JDJJ2EE: The Challenges and Pitfalls of J2EE Chris Kampmeier 36 ServletExec pg. 54 iPlanet pg. 62 2.0J2EE: Growing JSP and Servlet Sites Patrick Sean Neville 44 J2EE Editorial SPECIAL FOCUS by Ajit Sagar pg. 22 ON J2EE, J2SEJ2EE: & J2ME WebSphere Column Brady Flowers 56 Interview J2EE: The Impact of EJB 2.0 Tyler Jewell 64 Larry Freeman, Manager J2EE Blueprints Team pg. 26 J2SE: Building a Telephone/Voice Portal Klinner & Walker 78 First Look Optimal J pg. 140 J2SE: Making a Mountain out of an Anthill Neal Ford 86 J2ME Editorial J2SE: JNI Programming in C/C+ Blair Wyman 96 by Jason Briggs pg. 144 J2SE: Evolving Functionality Satya Komatineni 104 $AVE BIG J2SE: Optimization and Java Irvin J. Lustig 110 J2SE: Using JavaBeans in Dreamweaver Barbarelli & Deming 118 J2SE: Deployment of JavaServer Pages John Goodson 126 J2SE: Java Quirks – Dates and Calendars Roedy Green 134 ONE-TIME OFFER! J2ME: The Incredibly Shrinking Platform Jason Briggs 148 Stop by our booth for special pricing J2ME: A UI Framework for the MIDP API Glen Cordrey 154 J2ME: Java Thick Clients with J2ME Glenn Coates 164 Sonic Software www.sonicsoftware.com 2 JUNE 2001 Java COM Zero G www.zerog.com/installs JUNE 2001 3 Java COM BEA www.developer.bea.com 4 JUNE 2001 Java COM BEA www.developer.bea.com JUNE 2001 5 Java COM TogetherSoft www.togethersoft.com/jdjspecial.html 6 JUNE 2001 Java COM FROM THE EDITOR ALANWILLIAMSON, EDITOR-IN-CHIEF The rational The Dawn alternative of Content Version 4.5 t has been one hell of a journey to get where here at JDJ are looking forward to working with we are today.
    [Show full text]
  • Safari | J2EE" Technology in Practice: Building Business Applications With
    Table of Contents Foreword..............................................................................................................................................................1 Acknowledgments...............................................................................................................................................3 About the Editors................................................................................................................................................5 Chapter 1. A Multi−Vendor Standard for Distributed Enterprise Applications.........................................7 1.1 The Networked Economy..................................................................................................................7 1.2 Why Standardize?..............................................................................................................................7 1.3 Why Standardize on J2EE?................................................................................................................8 1.4 Why a Standard Based on Java Technologies?................................................................................10 1.5 Why a Book of Success Stories?.....................................................................................................11 Chapter 2. Overview of the J2EE Technology and Architecture.................................................................13 2.1 The Evolution of Distributed, Multitier Applications.....................................................................13
    [Show full text]
  • Growing Development of Foreign Encryption Products in the Face of U
    10 June 1999 Source: http://www.seas.gwu.edu/seas/institutes/cpi/library/docs/cpi-1999-02.pdf Growing Development of Foreign Encryption Products in the Face of U. S. Export Regulations Lance J. Hoffman David M. Balenson Karen A. Metivier-Carreiro Anya Kim Matthew G. Mundy June 10, 1999 Report GWU-CPI-1999-02 Cyberspace Policy Institute The George Washington University School of Engineering and Applied Science 2033 K St. NW Suite 340 . Washington, DC 20006 Phone: 202.994.5512 . Fax: 202.994.5505 Website: http://www.seas.gwu.edu/seas/institutes/cpi/ Email: [email protected] GROWING DEVELOPMENT OF FOREIGN ENCRYPTION PRODUCTS IN THE FACE OF U.S. EXPORT REGULATIONS Lance J. Hoffman* David M. Balenson** Karen A. Metivier-Carreiro* Anya Kim* Matthew G. Mundy** June 10, 1999 Report No. GWU-CPI-1999-02 *Cyberspace Policy Institute, School of Engineering and Applied Science, The George Washington University, Washington, DC **NAI Labs, The Security Research Division of Network Associates, Inc., Glenwood, MD This research was supported in part by Americans for Computer Privacy (ACP). EXECUTIVE SUMMARY Development of cryptographic products outside the United States is not only continuing but is expanding to additional countries; with rapid growth of the Internet, communications-related cryptography especially is experiencing high growth, especially in electronic mail, virtual private network, and IPsec products. This report surveys encryption products developed outside the United States and provides some information on the effect of the United States export control regime on American and foreign manufacturers. We have identified 805 hardware and/or software products incorporating cryptography manufactured in 35 countries outside the United States.
    [Show full text]
  • Innovation in Financial Services: Home Banking
    INDUSTRIAL PERFORMANCE CENTER Massachusetts Institute of Technology Cambridge, MA 02139 I NNOVATION IN FINANCIAL SERVICES CASE STUDY : H OME B ANKING Jeremy Shapiro MIT IPC Working Paper 99-004 March 1999 The views expressed herein are the author’s responsibility and do not necessary reflect those of the MIT Industrial Performance Center or the Massachusetts Institute of Technology. Innovation in Financial Services Case Study: Home Banking I. THE DEFINITION OF HOME BANKING AS AN INNOVATION.......................1 II. CONTEXT: MARKET STRUCTURE AND REGULATORY SYSTEM................5 A. UNITED STATES: A PORTRAIT OF FRAGMENTATION...............................................................5 B. GERMANY: ORGANIZED COMPETITION.................................................................................8 III. HISTORY AND STATE OF HOME BANKING ..........................................13 A. UNITED STATES ..............................................................................................................13 B. GERMANY......................................................................................................................22 IV. CONCLUSION: THE HOME BANKING INNOVATION IN COMPARATIVE PERSPECTIVE .....................................................................................34 A. SOURCES OF INNOVATION................................................................................................34 B. COMPARISON OF THE INNOVATION PROCESS.......................................................................35 I. The
    [Show full text]
  • Executive Summary
    EXECUTIVE SUMMARY Mobile banking is a system that allows customers of a financial institution to conduct a number of financial transactions through a mobile device such as a mobile phone or personal digital assistant.There are three types of mobile banking technology used.They are receive and send data via text messaging, web browsers and smart phone applications.The mobile banking services are funds transfer of inter bank and intra bank, balance enquiry services, request services like cheque book, bill payments and credit card payments, demat account services, mobile top up ,merchant payment, life insurance premium and stop payment instructions. The mobile banking service is benefitted to the customers and thebanks. The customers benefits are the funds or the banking transactions can be done without visiting the bank and there is no need of internet facility. It is also more secure than online banking. Any transactions taken is immediately made noticed to the customers thus reducing the frauds. It is cost saving to banks thus helps them to give more attention to their loyal customers and can perform better customer relationship. The mobile banking also has its other side of the coin. The banks charge the customers for providing them this service thus increasing their expense. The customers cannot do much transaction due to limit on the transaction. The profit earned by the banks is low due to increase in the expense in providing the service. The disadvantage of development in mobile banking is handset operability, security, reliability and scalability, application distribution and personalization. The precaution to be taken before using mobile banking are see that the mobile banking is activated the auto lock, keep the confidential details are not disclosed,download those sites which is a trustworthy and keep the Bluetooth always switched off because virus can destroy it.
    [Show full text]
  • Mastering Enterprise Javabeans™
    Mastering Enterprise JavaBeans™ Second Edition Mastering Enterprise JavaBeans™ Second Edition Ed Roman Scott Ambler Tyler Jewell Wiley Computer Publishing John Wiley & Sons, Inc. NEW YORK • CHICHESTER • WEINHEIM • BRISBANE • SINGAPORE • TORONTO Publisher: Robert Ipsen Editor: Robert M. Elliott Developmental Editor: Emilie Herman Managing Editor: John Atkins Associate New Media Editor: Brian Snapp Text Design & Composition: MacAllister Publishing Services, LLC Designations used by companies to distinguish their products are often claimed as trade- marks. In all instances where John Wiley & Sons, Inc., is aware of a claim, the product names appear in initial capital or ALL CAPITAL LETTERS. Readers, however, should con- tact the appropriate companies for more complete information regarding trademarks and registration. This book is printed on acid-free paper. Copyright © 2002 by The Middleware Company. All rights reserved. Published by John Wiley & Sons, Inc. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copy- right Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4744. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 605 Third Avenue, New York, NY 10158-0012, (212) 850-6011, fax (212) 850- 6008, E-Mail: [email protected]. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered.
    [Show full text]
  • Siemens Aktiengesellschaft
    As filed with the Securities and Exchange Commission on December 6, 2002 SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 20-F REGISTRATION STATEMENT PURSUANT TO SECTION 12(b) OR (g) OF THE SECURITIES EXCHANGE ACT OF 1934 n OR ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended September 30, 2002. ¥ OR TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to . n Commission file number: 1-15174 Siemens Aktiengesellschaft (Exact name of Registrant as specified in its charter) Federal Republic of Germany (Jurisdiction of incorporation or organization) Wittelsbacherplatz 2 D-80333 Munich Federal Republic of Germany (Address of principal executive offices) Securities registered or to be registered pursuant to Section 12(b) of the Act: Name of each exchange Title of each class on which registered American Depositary Shares, each representing one New York Stock Exchange Common Share, no par value Common Shares, no par value* New York Stock Exchange * Listed, not for trading or quotation purposes, but only in connection with the registration of American Depositary Shares pursuant to the requirements of the Securities and Exchange Commission. Securities registered or to be registered pursuant to Section 12(g) of the Act: None Securities for which there is a reporting obligation pursuant to Section 15(d) of the Act: None The number of outstanding shares of each of the issuer’s classes of capital or common stock as of September 30, 2002: 890,374,001 common shares, no par value.
    [Show full text]
  • Siemens Aktiengesellschaft
    As filed with the Securities and Exchange Commission on August 27, 2002 SECURITIES ANDEXCHANGE COMMISSION Washington, D.C. 20549 FORM 20-F/A REGISTRATION STATEMENT PURSUANT TO SECTION 12(b) OR (g) OF THE SECURITIES EXCHANGE ACT OF 1934 □ OR ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended September 30, 2001. ࠚ OR TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to . □ Commission file number: 1-15174 Siemens Aktiengesellschaft (Exact name of Registrant as specified in its charter) Federal Republic of Germany (Jurisdiction of incorporation or organization) Wittelsbacherplatz 2 D-80333 Munich Federal Republic of Germany (Address of principal executive offices) Securities registered or to be registered pursuant to Section 12(b) of the Act: Name of each exchange Title of each class on which registered American Depositary Shares, each representing one NewYork Stock Exchange Common Share, no par value Common Shares, no par value* NewYork Stock Exchange * Listed, not for trading or quotation purposes, but only in connection with the registration of American Depositary Shares pursuant to the requirements of the Securities and Exchange Commission. Securities registered or to be registered pursuant to Section 12(g) of the Act: None Securities for which there is a reporting obligation pursuant to Section 15(d) of the Act: None The number of outstanding shares of each of the issuer’s classes of capital or common stock as of September 30, 2001: 888,230,245 common shares, no par value.
    [Show full text]
  • List of Section 13F Securities, First Quarter 2002
    OFFICIAL LIST OF SECTION 13(F) SECURITIES USER INFORMATION SHEET General This list of "Section 13(f) securities" as defined by Rule 13f-1(c) [I7 CFR 240.13f-1 (c)] is made available to the public pursuant to Section13 (f) (3) of the Securities Exchange Act of 1934 [15 USC 78m(f) (311. It is made available for use in ,the preparation of reports filed with the Securities and Exhange Commission pursuant to Rule 13f-1 [17 CFR 240.13f-I] under Section 130of the Securities Exchange Act of 1934. An updated list is published on a quarterly basis. This list is current as of March, 15.2002, and may be relied on by institutional investment managers filing Form 13F reports for the calendar quarter ending March 30, 2002. Institutional investment managers should report holdings--number of shares and fair market value-as of the last day of the calendar quarter as required by [ Section 13(f)(l) and Rule 13f-11 thereunder. Features (1 ) Additions and Deletions: Revisions made to the list of Section 13(f) securities are indicated in a column titled "STATUS." The word "ADDED" in the status column opposite the name of a security indicates that the security has become a Section 13(f) security. The word "DELETED" in the status column opposite the name of a security indicates that the security ceases to be a 13(f) security since the date of the last list. (2) List of options: An asterisk is placed next to the name of any security having a listed option and each option is individually listed with its own CUSlP number immediately below the name of the sec~~rityhaving the option.
    [Show full text]