Frequently Asked Questions (FAQ) for Corporate Internet Banking What is Corporate Internet Banking? Corporate Internet Banking (CIB) is an online service offered by Bandhan Bank to its corporate customers to manage their Bandhan bank accounts using a desktop or laptop through Internet. What are the features available with Corporate Internet Banking?  View Account Summary & Account Details  View account statements (download account activity in CSV, Excel or PDF format).  Transfer funds between the entity’s own accounts,  Transfers to other Bandhan Bank accounts  Transfer to other bank’s accounts via NEFT and RTGS  Cheque Book Request  Stop Cheque Request  Cheque Status Inquiry Who is eligible for Bandhan Bank’s Corporate Internet Banking? The following types of entities can apply for Corporate Internet Banking.  Private Limited Company  Local Body  Public Sector Undertaking  Institutions Viz Universities Etc  Clubs/Committees  Partnership Firms  Government Body  Proprietorship firms  Trusts  Public Listed Company  Cooperatives/Societies  Joint Sector How to get access to Corporate Internet Banking? To avail this facility, you need to submit the duly filled Corporate Internet Banking Registration form. This form is available at all Bandhan Bank branches or can be downloaded from website. The duly filled application form can be submitted at your base branch. FAQ

Page 1 of 10

Do I need to submit any Board resolution or Mandate Letter? Yes, you need to submit the supporting documents at the base branch to get access to Corporate Internet Banking (Board resolution in case of Firms/Companies, letter from Partners in case of Partnership, letter from Trust/Society/Association/Club, letter from Sole Proprietor) What should I do if I am not able to read passwords properly in PIN mailer? The Password is randomly generated by the system, and the only person having access to it is you. We would therefore request you to apply for regeneration of the password. Fill the request form available in banks website (www.bandhanbank.com) and submit it to your base branch. Whom should I contact for any queries after I have submitted the forms or for any operational issue on the Corporate Internet Banking platform? You can send an email to ______________or contact your base branch or contact your Relationship Manager.

FAQ

Page 2 of 10

What happens when I login for the first time in CIB? After successful login, the system will display the last login date and time. For a new user last login date and time will not be displayed and the system will automatically prompt for change of password and to select secure image. Whether secure image is shown when I login for the first time in CIB? Secure image is not shown when you login for the first time in CIB. After successful login for the first time, the system will automatically prompt for change of password and to select secure image. What is Secure Message, I need to enter along with Secure Image? Secure message is a personalized message which you need to enter when you login for the first time into CIB. This message will be shown along with the secure image every time you try to login into CIB. What could be the possible reasons if I am unable to login? There could be various reasons:  The Corporate ID, Net Banking ID and password are case-sensitive and may not have been 

entered in the same lower or upper case as mentioned in the IPIN envelope sent to you. The account has not been accessed for more than 180 days.

How can I unlock my CIB ID? To unlock your CIB ID:  Please send an email from your registered email id to ____________________  Please download the CIB service request form and submit the form duly signed by the authorized signatory(s) at the base branch I am unable to use my old or new password. What should I do? The possible reasons could be:  You have not entered the new password correctly OR  After three unsuccessful attempts, access to Net Banking has been disabled for security 

reasons. You are requested to fill the request form for password regeneration available in website www.bandhanbank.com and submit to your base branch.

FAQ

Page 3 of 10

Is there any limit on the amounts of funds that can be transferred through CIB? Yes. You can specify and set the user level limit. A per transaction upper limit needs to be set up by filling up the Corporate Internet banking form for each of the authorized user/ approver This is similar to Cheque signing powers in the physical world. Is there any charge for using Bandhan Bank’s Corporate Internet Banking? No. Currently, Corporate Internet Banking is provided free of charge to all our corporate customers. How secure is Bandhan Bank Corporate Internet Banking? The security of your accounts is our top priority. Bandhan Bank uses the latest technology with robust security methods, including 128-bits SSL encryption, firewalls, and access blocking in case of repeated incorrect password entry, to ensure the security and confidentiality of your personal and financial information. Other features include a separate login ID, password that only you will know, which even the Bank employees will not have access. Back and Forward buttons are disabled so that nobody will be able to use the same for security reasons. If the screen is not used for 5 minutes, it automatically logs you out from Corporate Net Banking. Additionally the security image and message also helps you know you are logging in to the Bandhan Bank Corporate Internet banking. I was already having access of Corporate Internet Banking access, will I be able to login and get transaction facility access with my current login ID and Password? You will not be able to login to the new CIB with your existing User ID/Password. To avail this facility, you need to submit the duly filled Corporate Internet Banking Registration form. This form is available at all Bandhan Bank branches or can be downloaded from website. The duly filled application form can be submitted at your base branch. What is 128-bit Secure Socket Layer? SSL stands for "Secure Sockets Layer". It is a protocol designed to enable applications to transmit information back and forth securely. Applications that use this protocol inherently FAQ

Page 4 of 10

know how to give and receive encryption keys with other applications, as well as how to encrypt and decrypt data sent between the two. SSL has been universally accepted on the World Wide Web for authenticated and encrypted communication between the customer's computer and servers. Some applications that are configured to run SSL include web browsers like Internet Explorer and Netscape, email programs like GroupWise, Outlook, and Outlook Express, FTP (file transfer protocol) programs, etc. These programs are automatically able to receive SSL connections. To send an SSL connection, however, or to open a secure connection, your application must first have an encryption key assigned to it by a Certification Authority. Once it has a unique key of its own, you can establish a secure connection with every other application that can "speak" the SSL protocol.

FAQ

Page 5 of 10

What is the difference between 40-bit encryption and 128-bit encryption? 40-bit and 128-bit refer to the size of the key used to encrypt information. To use the lock and key analogy, the greater the number of keys, the more difficult it is to find the correct key to fit into the lock that protects the information. Therefore, the larger the size of the encryption level, the more difficult it is to find the right key to unlock the information. What is my role in enhancing security of my online banking experience? 1. 2. 3. 4. 5. 6.

Always ensure your PC is updated with latest anti-virus and operating system patches. Install personal firewall and anti-spy ware to protect your PC from internet attacks. Always change your online banking passwords periodically say every month. Review bank statements regularly and report any irregularities to the bank. You report any suspicious or fraudulent e-mail/sites to the bank immediately. Always read the online security tips provided by the bank from time to time.

How is my information transmitted safely over the Internet? Web browsers use standard security protocols like SSL, and S-HTTP to enable private information to be transmitted safely over the Internet. When you visit a Web site with the SSL protocol, a secure connection is created between your computer and the Web site server you are visiting. Once this connection is established, you can transmit any amount of information to the Web server safely. In contrast, the S-HTTP is designed to transmit individual messages. What is a Digital Certificate and how does it help to ensure security? Digital certificates are issued by certification authorities to authenticate a Web site or elements of Web sites. The certificate identifies the originator of the site, or element, and verifies that it has not been tampered with. When your Web browser is presented with a certificate, it will check to see if a legitimate certification authority issued the certificate. If there is a match, your session will continue. Otherwise, your browser will issue a warning and your safest action is to cancel your activity. Can other people view my personal information when I am using the Internet? If a secure session is established and the information is encrypted during transmission, then others will not be able to view your information. However, you should be aware that some Web FAQ

Page 6 of 10

browsers will store information on your computer even after you are finished conducting your online activities, this is called caching. Therefore, you should close your browser once you are finished using the Internet, particularly if you visit secure sites to conduct financial transactions, check account balances or view any other information that you regard as private and confidential. There is a 'Java Script Error' on my computer. What should I do? Double click on java script and check the error message. Take screenshot along with java script error and send the same to _______________________ I am experiencing slow response when accessing Bandhan Bank Internet Banking. What is wrong? The slow response that you are experiencing could be due to the following: 1. You are not using the recommended browser, operating system and hardware. 2. Your Internet Service Provider, Local Area Network or our system is facing intermittent slowness. How can I recognize a scam e-mail? Without using additional measures such as a digital signature, it is easy for fraudsters to imitate e-mails. But that doesn't mean you can't recognize scam e-mails. Cyber-criminals often place alarming, enticing or exciting subjects in their e-mails with the hope of tempting you to respond impulsively and divulge the requested information. So, always take your time to read the e-mail carefully. In case of doubt, it is better not to respond. If you do choose to respond, always first check that the mail is genuine by contacting the company that is the apparent sender by telephone, for instance. What is phishing? 'Phishing' refers to the practice of fraudsters 'fishing' for your details in order to find out and misuse sensitive personal and financial information. Criminals may, for instance, make identical copies of existing corporate websites, or send scam e-mails to elicit a response from you and trick you into divulging your personal information. FAQ

Page 7 of 10

What is a worm? A worm is a virus that does not infect other programs. It makes copies of itself, and infects additional computers (typically by making use of network connections) but does not attach itself to additional programs; however a worm might alter, install, or destroy files and programs. Melissa: The Melissa Worm, also known as "Mailissa", "Simpsons", "Kwyjibo", or "Kwejeebo", is a computer worm that also functions as a macro virus, hence making it a "multipartite virus". Code Red: The Code Red worm was a computer worm released via the Internet on July 13, 2001 affecting computers running Microsoft's Internet Information Server (IIS) web server. The programmers at eEye Digital Security who reported it named it after both the Mountain Dew soft drink and the phrase "Hacked By Chinese!" (See Red Scare) that it propagated. The worm exploited vulnerability in the indexing software distributed with IIS and did several things: * It defaced the affected web site to display:*: "H

FAQ

Page 8 of 10

What is Money Mules? By phishing or other means of customer identity theft, the fraudster harvests customer NetBanking credentials i.e. NetBanking ID and IPIN (Password) with a motive to transfer money from customer account to another account holder of the same or different bank. The beneficiary account holder is referred as a "Money Mule". The beneficiary becomes accomplice unknowingly by social engineering techniques employed by the fraudster. How does the Fraudster operate? These fraudsters generally operate from across a country other than where the fraud is to be committed to keep themselves away from local law enforcement agencies. They either maintain anonymity or use fictitious identity to commit these frauds. Fraudsters launch their attack using social engineering techniques by contacting the prospective money mules either by sending emails, in chat rooms, job search websites or through internet blogs. Fraudsters lure the prospective money mules to share their bank account details by telling them a fake story and convincing them to receive money in their accounts. Fraudsters also offer a part of their money or commission and persuade them to unknowingly act as money mules. Fraudsters then transfer money from the bank customer account whose NetBanking ID and IPIN (Password) has been harvested either by means of phishing or through other means of identity theft. Money Mule is then directed by the fraudster to retain commission and transfer balance money either through wire transfer or to an account of another money mule by means of online transfer or cash deposit thereby forming a chain of fraud. Such money transfers would ultimately lead to funds transfer into fraudster's account thereby maintaining anonymity. When such frauds are reported the money mules become the target of law enforcement agencies as their bank accounts are used and their identity is established.

FAQ

Page 9 of 10

How do you protect yourself from becoming a money mule? The fraudster may cook different stories, however his motive will be to convince you to share your bank account details, receive money and act as per his directions. Do not respond to email from strangers asking you for your bank account details. For any overseas job offer, confirm the identity and contact details of the company offering the job to you. They may have hosted a company website to make it look authentic, but there may not exist any company at all in reality. Do not get carried away by attractive offers or prizes. What is a firewall and how does it protect my information? One of the security mechanisms we use to protect our systems and your information is called a firewall. Our firewalls use a combination of industrial strength computer hardware and software that is designed to securely separate the Internet from our Internal Web servers, computer systems, networks and databases. During your secure online sessions with RBC Web sites, firewalls prevent unauthorized Internet traffic from entering our Web servers, systems and network.

FAQ

Page 10 of 10