Introduction

The io.network is an instant settlement network enabling customers of regulated financial institutions to transact with each other 24/7/365. It integrates as an extension of a core banking system, allowing fiat assets to be issued and redeemed from the network as long as its supply mirrors the equivalent balance within an omnibus account at the financial institution. As well as being deployed as a fully “ring-fenced” private network, controls are built natively into the network to ensure compliance and security. Client accounts need to be explicitly enabled before they can begin interacting with the network. After depositing funds into the omnibus account of the financial institution, or Principal Member, the Principal Member will explicitly approve and follow the issuance process to ensure the precise amount of fiat assets are sent to the customer’s network account. Once the customer wishes to withdraw funds from their network account back to their bank account, the Principal Member will have to explicitly approve or reject this request and follow the redemption process if approved. The redemption process involves sending the relevant amount of funds to the customer’s bank account and removing the appropriate fiat assets from circulation in the network (see “SOLUTION ARCHITECTURE” for a workflow visualisation).
To assist the financial institution in the investigation of unusual or suspicious activities on the network, the Compliance Engine monitors and alerts transactions that exceed established thresholds: 24-hour volume, 30-day volume, 24-hour number of transactions, 30-day number of transactions, and maximum transaction size. A “data lake” tool is also provided, empowering the financial institution to further investigate any unusual or suspicious activities using its insights, query tools, and exportable reports features. Based on the outcome of the investigation, the financial institution can either block the suspicious actor from the network, update their transaction profile, or continue to analyse and monitor their behaviour.
FUNCTIONALITY
SUPPORT STRUCTURE AND CONTINUOUS IMPROVEMENTS
MAINTENANCE & DATA
Data protection controls, access controls, reactive/proactive security, change management, policies and all other IT controls have all been certified and implemented according to SOC II requirements.
SOLUTION ARCHITECTURE
BASIC COPYRIGHT NOTICE & DISCLAIMER
© 2021 This presentation is copyright protected. All rights reserved. You may download or print out a hard copy for your private or internal use. You are not permitted to create any modifications or derivatives of this presentation without the prior written permission of the copyright owner.This presentation is for information purposes only, the opinions expressed in this presentation are solely those of Io FinNet and do not necessarily reflect the views of any third party. All statements made in this presentation are believed to be true and accurate at the time of publication, however, Io FinNet makes no representations or warranties of any kind, express or implied, regarding the completeness, accuracy, reliability, or suitability of the information provided. No reliance should be placed on the information provided herein without independent verification. Any decisions made based on the information presented here are at your own risk. In no event will Io FinNet be liable for any loss or damages of any kind, including any direct, indirect or consequential damages arising out of or in connection with the use of this presentation.