EFTA01382704.pdf
dataset_10 PDF 142.2 KB • Feb 4, 2026 • 1 pages
X- I/A
Table of Contents
and key injection; deployment, set-up and telephone training; equipment services; repair and replacement; remote terminal software
updates; technical support; customized reporting; and conversions. We provide these services to our direct and indirect channel
merchants.
• Output Services - Our output semi= team manages the printing and mailing of cardholder statements and other communications, such
as account notices, as well as the printing, embossing, personalization and mailing of plastic cards. This includes full support of newer
payment technologies such as HMV.
Remittance Processing - Our remittance team provides lockbox processing services in 8 state-of-the-art facilities throughout the United
States. We support processing of all methods of payment to banks and corporations. such as card issuers and telecommunications
companies, who receive payment remittances by postal mail from thcir clients.
Our Controls Organization
We face a range of strategic, reputational, financial, operational, and compliance risks inherent in our business. The objective of our
controls organization is to understand those risks and effectively manage, mitigate. and/or monitor those risks to protect First Data, our clients, and
our partners, as well as meet regulatory obligations. Reporting to the CEO, the Chief Control Officer (the CCO) leads our Controls Organization
and provides regular reporting on the state of controls to the Risk and Audit Committees of the Board. We have made significant investments in
strengthening controls. Our model includes three lines of defense:
First Line ofDefense
Business unit ownership. Our business unit, shared services and function executives are responsible for identifying, assessing,
managing, and controlling the risks they take or arc exposed to while conducting their activities. Additionally, we assign control officers for each
business, who are responsible for monitoring risk, advising on planned mitigation strategies, and monitoring corrective actions to address process
and control deficiencies.
SecondLine ofDefense
Oversight of the organization. Our compliance, anti-money laundering. OFAC, anti-bribery and corruption, privacy, third-party risk
management. enterprise risk management. operation risk, and credit risk functions all report to our CCO. These functions facilitate and monitor the
implementation of effective risk management practices. They are responsible for providing oversight to the busine.ss as well as independent
guidance and advice to the business in implementing risk policies. The second line of defense is also accountable for owning and developing the
risk and control frameworks, which the first line of defense uses to discharge its responsibilities.
ThirdLine ofDefense
Assurance through Audit. Our internal Audit functions, which provide independent assurance over the key risks to the organization,
including an independent annual assessment of the risk management and internal control systems to the Audit Committee of the Board of Directors.
Our Chief Auditor reports to the Chair of the Audit Committee of the Board.
146
http://wnw.see.gov/Archi vestedgar/data=3980/000119312515334479/d31022dsla.htmill0/14/2015 9:06:38 AM]
CONFIDENTIAL - PURSUANT TO FED. R. CRIM. P. 6(e) DB-SDNY-0082165
CONFIDENTIAL SONY GM_00228349
EFTA01382704
Entities
0 total entities mentioned
No entities found in this document
Document Metadata
- Document ID
- 8ec09502-bc5f-422f-9ecc-9029184680d0
- Storage Key
- dataset_10/d488/EFTA01382704.pdf
- Content Hash
- d488b7a7420a5c82d63f5f70c8274a36
- Created
- Feb 4, 2026