AN INTEGRATED APPROACH TO COMPLIANCE AND RISK MANAGEMENT IS THE BEST WAY FORWARD BY MARTIN WOODS OCTOBER 2011

Size: px
Start display at page:

Download "AN INTEGRATED APPROACH TO COMPLIANCE AND RISK MANAGEMENT IS THE BEST WAY FORWARD BY MARTIN WOODS OCTOBER 2011"

Transcription

1 AN INTEGRATED APPROACH TO COMPLIANCE AND RISK MANAGEMENT IS THE BEST WAY FORWARD BY MARTIN WOODS OCTOBER 2011

2 FOREWORD The global financial crisis has led banks, firms, governments and societies to the very edge of disaster, indeed with the potential for a double dip recession, the crisis is far from over. At the same time there have been a series of significant financial sanctions applied against banks and regulated firms for breaches related to serious financial crimes. It is universally acknowledged and accepted that many things went wrong, but this document is not about blame, rather it is an examination of historical compliance and risk management. Having assessed the history we can apply the lessons learned to the compliance and risk management processes of today and tomorrow. The fields of compliance, risk management, financial crime, sanctions and corruption have evolved at an ever increasing rate, concurrently, the demands upon and expectations of the risk and regulatory compliance functions have diversified and increased. This paper, which is focussed upon the management and application of client data and external data, is one in a series that will consider the present moment as an opportunity to redefine the compliance risk landscape, to meet the challenges head-on and in doing so drive effectiveness and efficiencies within amalgamated and integrated compliance risk management programs. 2 AN INTEGRATED APPROACH TO COMPLIANCE AND RISK MANAGEMENT IS THE BEST WAY FORWARD OCTOBER 2011

3 CONTENTS INTRODUCTION... 4 BACKGROUND... 5 THE WAY FORWARD...7 CONCLUSION AN INTEGRATED APPROACH TO COMPLIANCE AND RISK MANAGEMENT IS THE BEST WAY FORWARD OCTOBER 2011

4 INTRODUCTION In his 2010 book McMafia Misha Glenny portrays a global network of organized crime within which some criminal organizations franchise their business. In each chapter the author provides an insight into geographical regions and crime typologies, where the reader learns that crime has no boundaries, physical or cyber, and money has no colour. Significantly, the reader learns of a criminal world of integration, a world where opportunities, vulnerabilities and markets are identified and exploited. Traffickers do not restrict their business to product lines or commodities; on the contrary they diversify and offer their services to all customers including people traffickers, arms traffickers, terrorists, counterfeiters and even corrupt officials in governments. The service is based upon experience and expertise as well as a reputation for delivering the goods. At all times, traffickers and other criminals are vulnerable to a wide range of threats and to mitigate the same they apply a comprehensive integrated risk management program. The objectives of the program are survival and success. The foundations are confidentiality/ secrecy, with cooperation where necessary, and constant surveillance. The program evolves and develops from lessons learned in relation to the specific organisation, the business in which they operate and the actions of their enemies. Organized crime is often successful for a number of reasons but primarily successful criminals are effective at managing and mitigating risk through the acquisition and application of data. They seek to know their clients, victims and enemies. The more they know the better equipped they are to identify risks and ultimately succeed in their criminal objectives. The organized criminal network that is integrated is stronger and is therefore more likely to succeed and survive. Organized criminals react to change out of necessity as they have no third party to petition should things not go their way. Hence when money laundering became a criminal offence they adapted new methods and continued in their activities. Changes to anti-money laundering (AML) laws and regulations, changes in relation to sanctions, corruption and market abuse/ manipulation have all been positive and as such they need to be accepted and indeed promoted within firms and society as a whole. They also demand adjustments and enhancements to compliance risk management programs. Additionally there has been, and continues to be, considerable transformation to the global political landscape. The Arab Spring has maintained momentum and continues to drive regime changes across the Middle East. The impact upon firms is profound. Relationships with parties that were previously accepted and even endorsed are now the subject of new sanctions. Regulated firms need to be nimble and dynamic in reacting to the constantly changing lists of sanctioned parties/designated persons. With so many changes, matched by an equal number of additional demands upon finite compliance risk management resources, it is difficult to know where to start and how to respond. Likewise, this paper does not seek to address all such matters. Consequently, this first paper will focus upon the subject of the management and application of data. 4 AN INTEGRATED APPROACH TO COMPLIANCE AND RISK MANAGEMENT IS THE BEST WAY FORWARD OCTOBER 2011

5 BACKGROUND In many countries, the evolution of AML laws has followed a similar path. Initially they applied solely to drug trafficking crimes; this was later extended to incorporate all fiscal crimes. Post 9/11, the laws and considerable regulatory focus was upon counter terrorist financing (CTF). More recently the priority for law enforcement agencies, regulators and regulated firms has been breaches of, and compliance with, sanctions regimes. This shift of emphasis has called for an adjustment of thinking on the part of the compliance risk professional accompanied by a demand for improved data and enhanced data management technological solutions. The management of data can be broken down into a number of categories which include: The collection of client data The screening of client data The blending of client data The collection of client data Knowledge, information and data remain at the heart of risk management; this is particularly so in relation to the principals of know your client (KYC). It is only when risks are known or identified that they can be properly managed and controlled. Nowadays the KYC requirements are often far more than simple identification and verification of a client s identity, formerly referred to as ID & V. It is now necessary for regulated firms to have in place risk based policies, procedures and processes that mandate collection, retention and periodic maintenance of considerably more client data and information, which may include: The source of a client s wealth The source of the funds used by the client to fund an account or transaction The client s occupation/status/salary/fund ing/expected account activity For clients that are companies, partnerships, trusts, funds or corporate entities it may be necessary to collect, retain and periodically review and update information in relation to: The ultimate beneficial owners The ultimate controllers/directors/partners The finances The status of the client The nature of the client s business The source of the client s revenue The location of the client s business The nature of the client s own clients The screening of client data In addition, it is necessary for firms to screen client names and associated parties, including directors and ultimate beneficial owners, against prescribed lists of sanctioned parties as well as a list of politically exposed person, or PEPs. Importantly, regulated firms are required to maintain evidence which demonstrates such screening has taken place. Thereafter, the same names and information must be re-screened on a risk based periodic basis. In a firm with a significant number of clients this process needs to be automated and this is where the integration of data is becoming an increasing necessity. Currently many firms routinely screen the entire list of client names against up-to-date sanctions lists in order to avoid breaching sanctions legislation. As legal obligations and regulatory expectations increase, this procedure may soon be considered only partially compliant. The blending of data The problem which many firms face is that existing client data systems contain limited information. In the majority of instances the data systems do not contain the names, addresses and dates of birth of the ultimate beneficial owners, controllers or partners of corporate 5 AN INTEGRATED APPROACH TO COMPLIANCE AND RISK MANAGEMENT IS THE BEST WAY FORWARD OCTOBER 2011

6 clients. Frequently the details are maintained on an Excel spreadsheet, in some instances they remain on hard copy documents within individual client KYC files. Regulatory expectations have evolved and in doing so they have added considerable burden to firms at a time when the prevailing manual processes are resource intensive and subject to human error. The client data systems were designed to retain information in relation to a client s finances, including account balances, transactions and turnover. The critical data was the client name and account number. There was no requirement for the application of additional data and indeed the posting of such data would potentially increase the risks of fraud, identity theft and account takeover. Technology and automation The simple fact is that risks are now different and the only way to effectively manage and control these risks is to adjust, change and add supplementary data management technology solutions. The forward thinking compliance risk specialist is looking for the best data provider to reduce the number of false positives and in doing so to drive the improved efficiency and effectiveness of the sanctions risk management program. At the same time firms are reviewing the way in which KYC data is collected, recorded, retained and used. It is becoming increasingly important for regulated firms to proactively monitor and screen persons associated with corporate clients, including ultimate beneficial owners, directors, controllers and partners. By not periodically screening the names of these individuals against up-to-date sanctions lists, the regulated firm is running an increased level of risk which may not be acceptable to regulators. There is an absolute crucial requirement for audit trails to be maintained which clearly demonstrates and maked evident a firm s compliance with laws and regulations as they apply to client data. This will include the screening of all relevant names and parties, both at the time of originating a relationship and on an ongoing basis, as well as the subsequent analysis and investigation of the same. The ever increasing burden means assurances, efficiencies and perhaps even peace of mind are becoming more elusive and difficult to acquire. It is a never ending task, similar to applying paint to great bridges, where the completion of painting one side of the bridge is the signal to initiate re-painting the other side. Hence the age old saying for all never ending tasks, It s like painting the Forth Bridge! But behold, there are reports (Financial Times 6th September 2011) of a new paint that protects bridges for a period of 25 years. So what is the relevance and application of this story to the business of compliance and the role of the professionals? It is an enhanced, tried, tested and approved system; it is monumental change in the effective and efficient management of risk. For sure the paint will have an increased cost but it is an improvement to an existing process that will provide significant savings. Compliance risk professionals firms and shareholders can derive enormous benefits, in particular improved risk management and peace of mind, from the purchase and implementation of enhanced, integrated and automated risk management systems. In the long-term such systems have the potential to deliver real cost and resource savings, leading to increased profits and stronger controls. 6 AN INTEGRATED APPROACH TO COMPLIANCE AND RISK MANAGEMENT IS THE BEST WAY FORWARD OCTOBER 2011

7 THE WAY FORWARD The added regulatory requirements that have emerged and continue to emerge from the global financial crisis demand more: more capital (capital adequacy), more data (transaction reporting) and more transparency. The common denominator is information. Now more than ever firms need to collect, distribute and use an increasing volume of data. It is the management of this data collection and distribution processes which needs to be carefully administrated and well documented by the compliance risk professionals. Failure to properly collect, translate, use, distribute or forward relevant data can present serious regulatory jeopardy at the same time as creating a genuine financial crime risk to a firm. When collecting data, firms need to acquire PEP lists, which are regularly updated, and meet with regulatory requirements and expectations. As stated, the rapidly transforming political landscapes in the Middle East has resulted in an increased frequency of additional names being added to sanctions lists. The quality, adequacy, and completeness of data can reduce anxieties and drive efficiencies. Confidence in both a process and the data fed into a process is of paramount importance. The business of sanctions compliance is not minimalist and certainly not one where any form of corner cutting is acceptable. Recent, severe financial penalties bear testimony to an aggressive and robust regulatory regime within which systemic failures will not be tolerated. Ideally the data provided by vendors should also be blended and perhaps even categorised or graded. Data which has been analysed and investigated generates value added intelligence. This is particularly so in relation to PEPs and the management of the potential risks presented by PEPs. It is the additional intelligence, including allegations and negative media reports which present the compliance risk professional with the opportunity to focus risk management resources and determine levels of due diligence and subsequent account activity monitoring. Thus there is real benefit to be derived from intelligence related to a PEP s additional activities, corporate connections and business associates. It is the smart, innovative application of the data which increases efficiencies and engenders confidence of both the compliance risk professional and ultimately the regulators. At the same time such practices will deter criminals, including corrupt PEPs and money launderers. In essence the additional intelligence is an enabler which allows the compliance risk professional to implement an effective, robust, structured program which is graduated and subsequently managed accordingly. It is the presence or absence of additional intelligence which can drive the risk categorisation and the improved allocation of all too often finite risk management resources. The onus is upon the compliance risk professional to make an evaluation and this cannot be undertaken without intelligence. In the event the data provided by a vendor is raw, unchecked, unrefined and/or devoid of analysis, the value is reduced and at the same time the burden and demands upon the compliance risk professionals increase. The challenge facing firms and their compliance risk professionals is how to ensure all of the relevant names and data are captured within a screening process. Is there a system or a process which can efficiently and effectively transform hard copy KYC data into a format which can be screened in an automated environment? Do firms need to review entire client adoption and review processes? Is there a necessity for a new system, a new platform, indeed, a new way of thinking? Necessity is the mother of all invention and it is necessity which will continue to transform the compliance risk programs. It is necessity which will in fact revolutionize the ways in which firms obtain, use and maintain client data. The demands of yet more legislation are on the horizon, for example the Foreign Account Tax Compliance Act (FATCA) will soon become a contract between the US Government and banks. Quite simply, to remain in business the compliance risk professional needs to think ahead and evidence of actual compliance is vital. 7 AN INTEGRATED APPROACH TO COMPLIANCE AND RISK MANAGEMENT IS THE BEST WAY FORWARD OCTOBER 2011

8 CONCLUSION At a time when profits are down and budgets are being cut the compliance risk professional is faced with ever increasing demands of new legislation and regulation. All the while it is essential that clients, transactions and indeed employees are screened and monitored. There are real resource implications, but now is not the time to gamble with a firm s or a senior manager s reputation when diluting and weakening the compliance risk function. The level of fiscal sanction for regulatory breaches is continuing to increase substantially; simultaneously regulators and law enforcement have targeted individuals, including owners and senior managers to make them accountable and responsible for their actions. This trend and pattern of sanction should be used by the compliance professional to stimulate the thinking of senior managers and provoke greater engagement in the risk management processes. It will be the presence of a well presented, documented, auditable process which will impress the regulators while conversely the absence of such will bring increased scrutiny and challenge. The compliance risk professional needs to use a system and process that they are comfortable with and confident in. The ideal solutions are automated, incorporating technology, the required, preferably blended data, appropriate, adequate screening and an audit functionality upon which all stakeholders can place reliance. It is critical that firms have in place the resources to deal with the output from the screening and a program which reacts quickly and dynamically to changing threats, new challenges, new names on sanctions lists, rogue PEPs and regulatory expectations. False positive matches between client/ transaction data and sanctions data cost time and money. The purchase and application of well managed, properly translated, blended and indexed data will undoubtedly generate regulatory approval and simultaneously, can actually have a positive impact upon resource costs and allocation. The Arab Spring has shown the compliance risk professional that yesterday s handshake means nothing in the transforming world of international politics. It can quickly be replaced with a war crime s indictment and a sanctioned status. Firms need to be reactionary to these developments and indeed anticipate them. It is vital that firms know whether their data provider is capable of monitoring these developments and making the necessary enhancements and adjustments to lists, which will safeguard the firm against potential sanction breaches. Integration demands reliance upon partners, systems, processes and staff. Reputations can take a life time to build, but can be destroyed in an instant. Money is short-term; reputations endure, good and bad. The role of the compliance risk professional is to protect firms, clients, shareholders, senior managers and their own reputation. There is a requirement for individuals to be fit and proper to perform their roles such credentials need to be maintained. It is not possible for any compliance risk professional to be all seeing in all places at all times. For reduced anxiety and ultimately peace of mind, he/she needs to be able to have full confidence in an integrated compliance risk management program that incorporates the requisite data, effective technology and like minded, positive thinking, hard working people with integrity and commitment. 8 AN INTEGRATED APPROACH TO COMPLIANCE AND RISK MANAGEMENT IS THE BEST WAY FORWARD OCTOBER 2011

9 THOMSON REUTERS ACCELUS Thomson Reuters Governance, Risk & Compliance (GRC) business unit provides comprehensive solutions that connect our customers business to the ever-changing regulatory environment. GRC serves audit, compliance, finance, legal, and risk professionals in financial services, law firms, insurance, and other industries impacted by regulatory change. The Accelus suite of products provides powerful tools and information that enable proactive insights, dynamic connections, and informed choices that drive overall business performance. Accelus is the combination of the market-leading solutions provided by the heritage businesses of Complinet, IntegraScreen, Northland Solutions, Oden, Paisley, West s Capitol Watch, Westlaw Business, Westlaw Compliance Advisor and World-Check. For more information, visit accelus.thomsonreuters.com 2011 Thomson Reuters L /01-12

THOMSON REUTERS ACCELUS

THOMSON REUTERS ACCELUS THOMSON REUTERS ACCELUS ACCELUS Screening Resolution Service Executive Summary Thomson Reuters Accelus offers Screening Resolution Service (SRS): an outsourced screening service for Corporates and Financial

More information

COMPLIANCE MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS COMPLIANCE MANAGEMENT SOLUTIONS

COMPLIANCE MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS COMPLIANCE MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS COMPLIANCE MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS Our solutions dynamically connect business transactions, strategy, and operations to the ever-changing regulatory environment,

More information

TRANSACTION MONITORING AN ESSENTIAL COMPONENT OF RISK COMPLIANCE

TRANSACTION MONITORING AN ESSENTIAL COMPONENT OF RISK COMPLIANCE TRANSACTION MONITORING AN ESSENTIAL COMPONENT OF RISK COMPLIANCE BY ROWAN BOSWORTH-DAVIES Statement of intent The current accepted wisdom is that businesses need to adapt to a changing environment and

More information

THOMSON REUTERS ACCELUS. Know Your Customer (KYC), Kontrol Your Costs (KYC) and Keep Your Customers (KYC) happy

THOMSON REUTERS ACCELUS. Know Your Customer (KYC), Kontrol Your Costs (KYC) and Keep Your Customers (KYC) happy THOMSON REUTERS ACCELUS Know Your Customer (KYC), Kontrol Your Costs (KYC) and Keep Your Customers (KYC) happy Know Your Customer (KYC), Kontrol Your Costs (KYC) and Keep Your Customers (KYC) happy Background

More information

ACCELUS COMPLIANCE MANAGER FOR FINANCIAL SERVICES

ACCELUS COMPLIANCE MANAGER FOR FINANCIAL SERVICES THOMSON REUTERS ACCELUS ACCELUS COMPLIANCE MANAGER FOR FINANCIAL SERVICES PROACTIVE. CONNECTED. INFORMED. THOMSON REUTERS ACCELUS Compliance management Solutions Introduction The advent of new and pending

More information

THE PRACTICE OF PROFILING BY DAVID THOMAS

THE PRACTICE OF PROFILING BY DAVID THOMAS PROFILING PART 3 THE PRACTICE OF PROFILING BY DAVID THOMAS Statement of intent This paper follows the two previous titles The Psychology of Money Launderers and the Psychology of Anti-Money Launderers

More information

KNOW YOUR THIRD PARTY

KNOW YOUR THIRD PARTY Thomson Reuters KNOW YOUR THIRD PARTY EXECUTIVE SUMMARY The drive to improve profitability and streamline operations motivates many organizations to collaborate with other businesses, increase outsourcing

More information

IDENTITY MONITORING: KEEPING A FINGER ON THE PULSE OF CLIENT IDENTITY CHANGES

IDENTITY MONITORING: KEEPING A FINGER ON THE PULSE OF CLIENT IDENTITY CHANGES IDENTITY MONITORING: KEEPING A FINGER ON THE PULSE OF CLIENT IDENTITY CHANGES By Neil Jeans The views and opinions expressed in this paper are those of the authors and do not necessarily reflect the official

More information

SPECIAL REPORT: KYC AND AML POLICY IMPLEMENTING BEST PRACTICE IN AN EVER-CHANGING REGULATORY ENVIRONMENT

SPECIAL REPORT: KYC AND AML POLICY IMPLEMENTING BEST PRACTICE IN AN EVER-CHANGING REGULATORY ENVIRONMENT SPECIAL REPORT: KYC AND AML POLICY IMPLEMENTING BEST PRACTICE IN AN EVER-CHANGING REGULATORY ENVIRONMENT INTRODUCTION Heightened expectations from regulators have created an ever-more demanding regulatory

More information

OWN RISK AND SOLVENCY ASSESSMENT AND ENTERPRISE RISK MANAGEMENT

OWN RISK AND SOLVENCY ASSESSMENT AND ENTERPRISE RISK MANAGEMENT OWN RISK AND SOLVENCY ASSESSMENT AND ENTERPRISE RISK MANAGEMENT ERM as the foundation for regulatory compliance and strategic business decision making CONTENTS Introduction... 3 Steps to developing an

More information

INTEGRITY DUE DILIGENCE GUIDELINES FOR LENDING TRANSACTIONS

INTEGRITY DUE DILIGENCE GUIDELINES FOR LENDING TRANSACTIONS INTEGRITY DUE DILIGENCE GUIDELINES FOR LENDING TRANSACTIONS Introduction The Bank's mandate is to promote sustainable growth of its member countries by providing longterm financing to projects that strengthen

More information

ACCELUS ORG ID KYC MANAGED SERVICE

ACCELUS ORG ID KYC MANAGED SERVICE THOMSON REUTERS ACCELUS ACCELUS ORG ID KYC MANAGED SERVICE ACCELERATE ON-BOARDING ELIMINATE BURDEN OF REFRESH CONDUCT REMEDIATION EASILY ACCELUS ORG ID FOR FINANCIAL INSTITUTIONS TRANSFORM YOUR KYC PROCESS

More information

Foreign business partners under the FCPA

Foreign business partners under the FCPA Foreign business partners under the FCPA by Tom Fox 1 TITLE about the writer Thomas Fox has practiced law in Houston for 25 years. He is now assisting companies with FCPA compliance, risk management and

More information

USING SPREADSHEETS TO MANAGE GOVERNANCE, RISK AND COMPLIANCE:

USING SPREADSHEETS TO MANAGE GOVERNANCE, RISK AND COMPLIANCE: USING SPREADSHEETS TO MANAGE GOVERNANCE, RISK AND COMPLIANCE: PROS, CONS AND HIDDEN DANGERS MIKE ROST CONTENTS INTRODUCTION... 3 GRC DISCIPLINES REQUIRE PURPOSE-BUILT TECHNOLOGY... 3 USING SPREADSHEETS

More information

ACCELUS ORG ID FOR CLIENTS OF FINANCIAL INSTITUTIONS

ACCELUS ORG ID FOR CLIENTS OF FINANCIAL INSTITUTIONS THOMSON REUTERS ACCELUS ACCELUS ORG ID FOR CLIENTS OF FINANCIAL INSTITUTIONS SECURE SERVICE SIMPLIFYING EXCHANGE OF INFORMATION WITH COUNTERPARTIES IN A SECURE ENVIRONMENT, SIMPLIFY THE EXCHANGE OF INFORMATION

More information

Anti-Money Laundering and Counter- Terrorism Financial Policy

Anti-Money Laundering and Counter- Terrorism Financial Policy Anti-Money Laundering and Counter- Terrorism Financial Policy Version: March 2014 1. INTRODUCTION...3 2. DEFINITIONS...3 3. RISK-BASED APPROACH...3 4. AML COMPLIANCE OFFICER...4 5. SUSPICIOUS TRANSACTION

More information

THOMSON REUTERS ACCELUS. The FCA: A Game Changer

THOMSON REUTERS ACCELUS. The FCA: A Game Changer THOMSON REUTERS ACCELUS The FCA: A Game Changer for Company Training Statement of intent This whitepaper, brought to you by Thomson Reuters, discusses the implications of the new financial regulatory framework

More information

The proposed Fourth Money Laundering Directive

The proposed Fourth Money Laundering Directive The proposed Fourth Money Laundering Directive What the proposed Directive means and how to keep your business safe USING IDENTITY INTELLIGENTLY Money Laundering Directive What the proposed Directive means

More information

SECURING THE BOARD: THE RISKS AND REWARDS OF CLOUD-BASED COMMUNICATION NATHAN LYNCH

SECURING THE BOARD: THE RISKS AND REWARDS OF CLOUD-BASED COMMUNICATION NATHAN LYNCH SECURING THE BOARD: THE RISKS AND REWARDS OF CLOUD-BASED COMMUNICATION NATHAN LYNCH ABOUT THE AUTHOR Nathan Lynch is the head regulatory analyst for Thomson Reuters Governance, Risk and Compliance operations

More information

Financial Services Regulatory Commission Antigua and Barbuda Division of Gaming Customer Due Diligence Guidelines for

Financial Services Regulatory Commission Antigua and Barbuda Division of Gaming Customer Due Diligence Guidelines for Division of Gaming Customer Due Diligence Guidelines for Interactive Gaming & Interactive Wagering Companies November 2005 Customer Due Diligence for Interactive Gaming & Interactive Wagering Companies

More information

FIN-2014-A007 August 11, 2014

FIN-2014-A007 August 11, 2014 FIN-2014-A007 August 11, 2014 Advisory to U.S. Financial Institutions on Promoting a Culture of Compliance BSA/AML shortcomings have triggered recent civil and criminal enforcement actions FinCEN seeks

More information

Sanctions risk: what is the regulatory challenge for compliance officers?

Sanctions risk: what is the regulatory challenge for compliance officers? Sanctions risk: what is the regulatory challenge for compliance officers? Nov 02 2012 Miriam Gonzalez, John Forrest and Chloe Barker Compliance with domestic and international sanctions regimes has become

More information

Client Update Fourth Anti-Money Laundering Directive Comes Into Force

Client Update Fourth Anti-Money Laundering Directive Comes Into Force 1 Client Update Fourth Anti-Money Laundering Directive Comes Into Force OVERVIEW LONDON Karolos Seeger kseeger@debevoise.com Matthew Howard Getz mgetz@debevoise.com Alex Parker aparker@debevoise.com Ceri

More information

building a business case for governance, risk and compliance

building a business case for governance, risk and compliance building a business case for governance, risk and compliance contents introduction...3 assurance: THe last major business function To be integrated...3 current state of grc: THe challenges... 4 building

More information

Cyber Security & Managing KYC Data

Cyber Security & Managing KYC Data SPECIAL REPORT Cyber Security & Managing KYC Data The views and opinions expressed in this paper are those of the author(s) and do not necessarily reflect the official policy or position of Thomson Reuters.

More information

Anti-Money Laundering and International Sanctions guidance for Coverholders

Anti-Money Laundering and International Sanctions guidance for Coverholders Anti-Money Laundering and International Sanctions guidance for Coverholders Introduction The purpose of this document is to provide general high-level guidance in relation to antimoney laundering ( AML

More information

Achieving governance outcomes through risk management and process automation. Thomson reuters

Achieving governance outcomes through risk management and process automation. Thomson reuters Achieving governance outcomes through risk management and process automation Thomson reuters CONTENTS INTRODUCTION... 0 Building a framework... 5 The changing investor relationship... 6 A unified approach...

More information

Purpose of this document

Purpose of this document Independent Financial Advisors (IFAs), Mortgage Brokers and Retail Intermediaries: Identifying Risks to your Business and Reporting Suspicious Activity This is a United Kingdom Financial Intelligence Unit

More information

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can

More information

HIGH-RISK COUNTRIES IN AML MONITORING

HIGH-RISK COUNTRIES IN AML MONITORING HIGH-RISK COUNTRIES IN AML MONITORING ALICIA CORTEZ TABLE OF CONTENTS I. Introduction 3 II. High-Risk Countries 3 Customers 4 Products 7 Monitoring 8 Audit Considerations 8 III. Conclusion 10 IV. References

More information

ANTI-MONEY LAUNDERING/ COUNTER TERRORISM FINANCING POLICY

ANTI-MONEY LAUNDERING/ COUNTER TERRORISM FINANCING POLICY ANTI-MONEY LAUNDERING/ COUNTER TERRORISM FINANCING POLICY TABLE OF CONTENTS EXECUTIVE SUMMARY... 3 Preamble... 3 Policy Parameters... 4 KEY TERMS... 4 POLICY OBJECTIVE, RATIONALE AND DELIVERABLES... 6

More information

Wolfsberg Frequently Asked Questions ( FAQs ) on Politically Exposed Persons ( PEPs )

Wolfsberg Frequently Asked Questions ( FAQs ) on Politically Exposed Persons ( PEPs ) Wolfsberg Frequently Asked Questions ( FAQs ) on Politically Exposed Persons ( PEPs ) 1. Preamble The continuing threat of money laundering through Financial Institutions is most effectively managed by

More information

Basel Committee on Banking Supervision. Consultative Document. Sound management of risks related to money laundering and financing of terrorism

Basel Committee on Banking Supervision. Consultative Document. Sound management of risks related to money laundering and financing of terrorism Basel Committee on Banking Supervision Consultative Document Sound management of risks related to money laundering and financing of terrorism Issued for comment by 27 September 2013 June 2013 This publication

More information

MPS GROUP GLOBAL ANTI-MONEY LAUNDERING POLICY

MPS GROUP GLOBAL ANTI-MONEY LAUNDERING POLICY Siena, march 2012 Pag. 1 di 5 MPS GROUP 1 - A p p l i c a t i o n This Global Anti-Money Laundering Policy (Policy) applies to all Banca Monte dei Paschi di Siena subsidiaries and branches (collectively

More information

The proposed legislation would end the all too frequent use of loopholes in State incorporation laws to hide money.

The proposed legislation would end the all too frequent use of loopholes in State incorporation laws to hide money. Testimony of Jack A. Blum, Esq. before The United States Senate Committee on Homeland Security and Governmental Affairs on S.569, the Incorporation Transparency and Law Enforcement Assistance Act November

More information

ACCOUNTANTS AND TAX ADVISORS

ACCOUNTANTS AND TAX ADVISORS ACCOUNTANTS AND TAX ADVISORS Sector Specific AML/CFT Guidance Notes May 2015 Whilst this publication has been prepared by the Financial Supervision Commission, it is not a legal document and should not

More information

FINRA E-Learning Courses

FINRA E-Learning Courses FINRA E-Learning Courses The Definitive Source for Firm Element Training FINRA develops a wide range of e-learning courses for registered representatives, supervisors, operations staff, compliance personnel

More information

AUSTRAC. supervision strategy 2012 14

AUSTRAC. supervision strategy 2012 14 AUSTRAC supervision strategy 2012 14 Commonwealth of Australia 2012 This work is copyright. You may download, display, print and reproduce this material in unaltered form only (retaining this notice) for

More information

Fit and Proper Assessment Best Practice

Fit and Proper Assessment Best Practice Fit and Proper Assessment Best Practice Final Report EMERGING MARKETS COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS DECEMBER 2009 CONTENTS Chapter Page 1 Introduction 3 1.1 Objectives

More information

CORRUPTION. A Reference Guide and Information Note. to support the fight against Corruption. Safeguarding public sector integrity

CORRUPTION. A Reference Guide and Information Note. to support the fight against Corruption. Safeguarding public sector integrity FINANCIAL ACTION TASK FORCE CORRUPTION A Reference Guide and Information Note on the use of the FATF Recommendations to support the fight against Corruption The Financial Action Task Force (FATF) is the

More information

Regulatory Change Management:

Regulatory Change Management: Regulatory Change Management: the critical compliance competence CONTENTS Understanding the Challenge... 3 The Context... 3 Current Methodologies... 5 How do compliance departments cope?... 6 The future

More information

UNDERSTANDING MONEY LAUNDERING

UNDERSTANDING MONEY LAUNDERING UNDERSTANDING MONEY LAUNDERING Preface In light of the international concerns growing on money laundering and the financing of terrorist activities, many countries have taken rigorous measures to curb

More information

A guide to reducing the cost of AML compliance with electronic identity verification

A guide to reducing the cost of AML compliance with electronic identity verification A guide to reducing the cost of AML compliance with electronic identity verification Legal firms often struggle with the cost of compliance associated with Anti-Money Laundering Regulations. Electronic

More information

BIG SHIFTS WHAT S NEXT IN AML

BIG SHIFTS WHAT S NEXT IN AML Commercial Solutions Financial Crimes Commercial Solutions BIG SHIFTS WHAT S NEXT IN AML The next big shift in the fight against financial crime and money laundering is advanced machine learning and sophisticated

More information

LexisNexis UK Anti-Money Laundering (AML) White paper

LexisNexis UK Anti-Money Laundering (AML) White paper LexisNexis UK Anti-Money Laundering (AML) White paper The Financial Services Authority Thematic Review Banks management of high money-laundering risk situations. How banks deal with high-risk customers

More information

Bank Secrecy Act Anti-Money Laundering Examination Manual

Bank Secrecy Act Anti-Money Laundering Examination Manual Bank Secrecy Act Anti-Money Laundering Examination Manual Core Overview - Customer Identification Program Assess the bank's compliance with the statutory and regulatory requirements for the Customer Identification

More information

PROFIT OR PROVENANCE OR BOTH?

PROFIT OR PROVENANCE OR BOTH? PROFIT OR PROVENANCE OR BOTH? By Rear Admiral Chris Parry CBE Statement of intent Companies and institutions are familiar with the frailties and risks inherent in supply chains, whether caused by natural

More information

Adopted by the Board of Directors of the Nordic Investment Bank on 17 December 2009 COMPLIANCE POLICY

Adopted by the Board of Directors of the Nordic Investment Bank on 17 December 2009 COMPLIANCE POLICY Adopted by the Board of Directors of the Nordic Investment Bank on 17 December 2009 COMPLIANCE POLICY 1 PREFACE This Policy is approved by the Board of Directors and enters into force as of 1 January 2010.The

More information

Financial services firms approach to UK financial sanctions. Financial Services Authority

Financial services firms approach to UK financial sanctions. Financial Services Authority Financial Services Authority Financial services firms approach to UK financial sanctions Financial Crime and Intelligence Division (FCID) Foreword by Philip Robinson, Director of FCID April 2009 Foreword

More information

Information Technology

Information Technology Information Technology Information Technology Session Structure Board of director actions Significant and emerging IT risks Practical questions Resources Compensating Controls at the Directorate Level

More information

AML Topics Using analytics to get the most from your transaction monitoring system

AML Topics Using analytics to get the most from your transaction monitoring system www.pwc.com AML Topics Using analytics to get the most from your transaction monitoring system March 2011 Contents Components of the AML Compliance Program... 1 Transaction Monitoring... 1 Transaction

More information

ENTERPRISE RISK MANAGEMENT ASSESSMENT GUIDE

ENTERPRISE RISK MANAGEMENT ASSESSMENT GUIDE ENTERPRISE RISK MANAGEMENT ASSESSMENT GUIDE WHITEPAPER CONTENTS CONTENTS INTRODUCTION 1 IS YOUR RISK MANAGEMENT PROCESS REALLY ASSESSING RISK? 1 IS YOUR RISK ASSESSMENT CONTEXT DRIVEN? 2 DOES YOUR RISK

More information

ICMA Private Wealth Management Charter of Quality

ICMA Private Wealth Management Charter of Quality ICMA Private Wealth Management Charter of Quality Preamble 1. The Private Wealth Management Charter of Quality ( the Charter of Quality ) is a voluntary standard of recommended minimum good market practice.

More information

GUIDANCE NOTE NATURAL PERSONS CARRYING ON A SINGLE CLASS OF TRUST COMPANY BUSINESS (APPLICATION PROCESS AND ON-GOING REGULATORY REQUIREMENTS)

GUIDANCE NOTE NATURAL PERSONS CARRYING ON A SINGLE CLASS OF TRUST COMPANY BUSINESS (APPLICATION PROCESS AND ON-GOING REGULATORY REQUIREMENTS) GUIDANCE NOTE NATURAL PERSONS CARRYING ON A SINGLE CLASS OF TRUST COMPANY BUSINESS (APPLICATION PROCESS AND ON-GOING REGULATORY REQUIREMENTS) Issued: February 2009 Last revised: August 2013 Contents 1

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

The Association of Registered Agents and the National Public Records Research Association

The Association of Registered Agents and the National Public Records Research Association The Association of Registered Agents and the National Public Records Research Association Best Practices Recommendations to Prevent the Exploitation of the Company Formation Agent Industry for Criminal

More information

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance

More information

Wolfsberg Anti-Money Laundering Principles for Correspondent Banking

Wolfsberg Anti-Money Laundering Principles for Correspondent Banking Wolfsberg Anti-Money Laundering Principles for Correspondent Banking 1 Preamble The Wolfsberg Group of International Financial Institutions 1 has agreed that these Principles constitute global guidance

More information

LEICESTERSHIRE COUNTY COUNCIL RISK MANAGEMENT POLICY STATEMENT 2011-2012

LEICESTERSHIRE COUNTY COUNCIL RISK MANAGEMENT POLICY STATEMENT 2011-2012 106 LEICESTERSHIRE COUNTY COUNCIL RISK MANAGEMENT POLICY STATEMENT 2011-2012 Leicestershire County Council believes that managing current and future risk, both opportunity and threat, is increasingly vital

More information

Ultimate Beneficial Ownership The Implications of Not Knowing

Ultimate Beneficial Ownership The Implications of Not Knowing White Paper Ultimate Beneficial Ownership The Implications of Not Knowing September 2014 Ultimate Beneficial Ownership The Implications of Not Knowing Author: Ana Maria H. de Alba Beneficial ownership

More information

FAQs Organised Crime and Anti-corruption Legislation Bill

FAQs Organised Crime and Anti-corruption Legislation Bill FAQs Organised Crime and Anti-corruption Legislation Bill What is organised crime? Organised crime normally refers to an organisation of criminals who engage in illegal activity on a large, centralised

More information

FINANCIAL SERVICES FLASH REPORT

FINANCIAL SERVICES FLASH REPORT FINANCIAL SERVICES FLASH REPORT The Fourth European Union Anti-Money Laundering Directive July 2015 The Fourth European Union (EU) Anti-Money Laundering Directive (Fourth Directive) was approved by the

More information

Security and Privacy Trends 2014

Security and Privacy Trends 2014 2014 Agenda Today s cyber threats 3 You could be under cyber attack now! Improve 6 Awareness of cyber threats propels improvements Expand 11 Leading practices to combat cyber threats Innovate 20 To survive,

More information

Compliance and Ethics at the Federal Reserve Bank of New York

Compliance and Ethics at the Federal Reserve Bank of New York Compliance and Ethics at the Federal Reserve Bank of New York Operational Risk and Internal Audit Course Marina Adams, Compliance Officer and AVP David K. Clune, Compliance and Ethics Officer Kevin White,

More information

FRANCHISORS AND FRANCHISEES: UNDERSTANDING COMPLIANCE RISKS

FRANCHISORS AND FRANCHISEES: UNDERSTANDING COMPLIANCE RISKS FRANCHISORS AND FRANCHISEES: UNDERSTANDING COMPLIANCE RISKS Franchisors and Franchisees: Understanding Compliance Risks What do KFC, Liberty Tax Service, Fatburger, and Orkin have in common? In addition

More information

You Can t Afford the Risks

You Can t Afford the Risks Anti-Money Laundering You Can t Afford the Risks Audit Tax Advisory The Risks Associated With AML/Sanctions Compliance Are Just Too Great to Ignore Continued increases in regulatory scrutiny and rigorous

More information

Cybercrime: risks, penalties and prevention

Cybercrime: risks, penalties and prevention Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,

More information

FSA reports on how banks deal with high-risk customers, correspondent banking relationships and wire transfers

FSA reports on how banks deal with high-risk customers, correspondent banking relationships and wire transfers July 2011 FSA reports on how banks deal with high-risk customers, correspondent banking relationships and wire transfers FSA reports on how banks deal with high-risk customers, correspondent banking 1

More information

IT-Based Anti-Money Laundering and Anti-Fraud in Banks and Insurance Companies

IT-Based Anti-Money Laundering and Anti-Fraud in Banks and Insurance Companies IT-Based Anti-Money Laundering and Anti-Fraud in Banks and Insurance Companies Added Value through a Holistic GRC Approach Frank Holzenthal, computer scientist* 1 Today, a holistic Governance, Risk & Compliance

More information

PART 3 The Basics 10

PART 3 The Basics 10 PART 3 The Basics 10 PART 3 The Basics A. What is Money Laundering? 3.1 Put simply, money laundering covers all kinds of methods used to change the identity of illegally obtained money (i.e. crime proceeds)

More information

Information Security Management System Policy

Information Security Management System Policy Information Security Management System Policy Public Version 3.3 Issued Document Name Owner P079A ISMS Security Policy Information Security Security Policies, Standards and Procedures emanate from the

More information

OECD PROJECT ON CYBER RISK INSURANCE

OECD PROJECT ON CYBER RISK INSURANCE OECD PROJECT ON CYBER RISK INSURANCE Introduction 1. Cyber risks pose a real threat to society and the economy, the recognition of which has been given increasingly wide media coverage in recent years.

More information

Basel Committee on Banking Supervision

Basel Committee on Banking Supervision Basel Committee on Banking Supervision Sound management of risks related to money laundering and financing of terrorism January 2014 This publication is available on the BIS website (www.bis.org). Bank

More information

Information Security Management System Information Security Policy

Information Security Management System Information Security Policy Management System Policy Version: 3.4 Issued Document Name: Owner: P079A - ISMS Security Policy Classification: Public Security Policies, Standards and Procedures emanate from the Policy which has been

More information

Navigate the regulatory maze

Navigate the regulatory maze www.pwc.com.cy Navigate the regulatory maze Delivering Regulatory Compliance services to the Financial Services industry September 2014 As at July 2014 there were more than 40 licensed banking institutions

More information

Accelus Audit Manager THOMSON REUTERS ACCELUS

Accelus Audit Manager THOMSON REUTERS ACCELUS THOMSON REUTERS ACCELUS Accelus Audit Manager THOMSON REUTERS ACCELUS Our solutions dynamically connect business transactions, strategy, and operations to the ever-changing regulatory environment, providing

More information

CAPABILITY STATEMENT CONTROL RISKS MEXICO

CAPABILITY STATEMENT CONTROL RISKS MEXICO CAPABILITY STATEMENT CONTROL RISKS MEXICO GENERAL 15 AUGUST 2012 Control Risks Mexico, S.A. de C.V. Cottons Centre Cottons Lane London SE1 2QG United Kingdom T: +5255 5000 1700 www.controlrisks.com TABLE

More information

Keeping watch over your best business interests.

Keeping watch over your best business interests. Keeping watch over your best business interests. 0101010 1010101 0101010 1010101 IT Security Services Regulatory Compliance Services IT Audit Services Forensic Services Risk Management Services Attestation

More information

Chairman Frank, Members of the Committee, the Isle of Man Government welcomes the opportunity to submit written testimony to your Committee.

Chairman Frank, Members of the Committee, the Isle of Man Government welcomes the opportunity to submit written testimony to your Committee. House Financial Services Committee Hearing Can Internet Gambling be Effectively Regulated to Protect Consumers and the Payments Systems June 8, 2007 Statement for the Hearing Record Submitted by Mary Williams,

More information

VENDOR MANAGEMENT. General Overview

VENDOR MANAGEMENT. General Overview VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor

More information

An Oracle White Paper October 2009. An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions

An Oracle White Paper October 2009. An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions An Oracle White Paper October 2009 An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions Executive Overview Today s complex financial crime schemes pose

More information

G0: Customer Due Diligence Guidelines for International Banking Corporations

G0: Customer Due Diligence Guidelines for International Banking Corporations G0: Customer Due Diligence Guidelines for International Banking Corporations G0: Customer Due Diligence for Banks G0: Customer Due Diligence for Banks I. Introduction 1. The risk of money laundering and

More information

Operational Risk Management Policy

Operational Risk Management Policy Operational Risk Management Policy Operational Risk Definition A bank, including a development bank, is influenced by the developments of the external environment in which it is called to operate, as well

More information

Diligence Management Consultants Company profile. Middle East - Africa - South Asia

Diligence Management Consultants Company profile. Middle East - Africa - South Asia Diligence Management Consultants Company profile Middle East - Africa - South Asia Chapter 1 Who we are Established in 2008 in the United Arab Emirates, Diligence has emerged as the primary security and

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

Care Providers Protecting your organisation, supporting its success. Risk Management Insurance Employee Benefits Investment Management

Care Providers Protecting your organisation, supporting its success. Risk Management Insurance Employee Benefits Investment Management Care Providers Protecting your organisation, supporting its success Risk Management Insurance Employee Benefits Investment Management Care providers are there to help those in need. But who helps the care

More information

REGULATORY COMPLIANCE. Dynamic Solutions. Superior Results.

REGULATORY COMPLIANCE. Dynamic Solutions. Superior Results. REGULATORY COMPLIANCE Dynamic Solutions. Superior Results. STREAMLINE, STRENGTHEN AND SIMPLIFY YOUR COMPLIANCE EFFORTS CSI S AUTOMATED, DYNAMIC SOLUTIONS MITIGATE RISK, DECREASE COSTS AND IMPROVE COMPLIANCE

More information

FMCF certification checklist 2014-15 (incorporating the detailed procedures) 2014-15 certification period. Updated May 2015

FMCF certification checklist 2014-15 (incorporating the detailed procedures) 2014-15 certification period. Updated May 2015 FMCF certification checklist 2014-15 (incorporating the detailed procedures) 2014-15 certification period Updated May 2015 The Secretary Department of Treasury and Finance 1 Treasury Place Melbourne Victoria

More information

Successfully identifying, assessing and managing risks for stakeholders

Successfully identifying, assessing and managing risks for stakeholders Introduction Names like Enron, Worldcom, Barings Bank and Menu Foods are household names but unfortunately as examples of what can go wrong. With these recent high profile business failures, people have

More information

Anti-money laundering and countering the financing of terrorism the Reserve Bank s supervisory approach

Anti-money laundering and countering the financing of terrorism the Reserve Bank s supervisory approach Anti-money laundering and countering the financing of terrorism the Reserve Bank s supervisory approach Hamish Armstrong In September 2010, a Bulletin article set out the Reserve Bank of New Zealand s

More information

the evolving governance Model for CYBERSECURITY RISK By Gary owen, Director, Promontory Financial Group

the evolving governance Model for CYBERSECURITY RISK By Gary owen, Director, Promontory Financial Group the evolving governance Model for CYBERSECURITY RISK By Gary owen, Director, Promontory Financial Group 54 Banking PersPective Quarter 2, 2014 Responsibility for the oversight of information security and

More information

AML & CFT Innovations to Mitigate Risks Lessons from the e-money

AML & CFT Innovations to Mitigate Risks Lessons from the e-money AML & CFT Innovations to Mitigate Risks Lessons from the e-money industry Presentation to the World Bank Workshop in Bangkok 25 June 2008 Dr Thaer Sabri Chief Executive Electronic Money Association 05

More information

Know Your Customer (KYC), Customer Due Diligence (CDD) and Enhanced Due Diligence (EDD)

Know Your Customer (KYC), Customer Due Diligence (CDD) and Enhanced Due Diligence (EDD) Know Your Customer (KYC), Customer Due Diligence (CDD) and Enhanced Due Diligence (EDD) Vanessa Read, Acting Head AML Supervision Christiane Chidiac, Manager AML Supervision Agenda Introduction KYC Principles

More information

HANDBOOK FOR FINANCIAL SERVICES BUSINESSES ON COUNTERING FINANCIAL CRIME AND TERRORIST FINANCING

HANDBOOK FOR FINANCIAL SERVICES BUSINESSES ON COUNTERING FINANCIAL CRIME AND TERRORIST FINANCING HANDBOOK FOR FINANCIAL SERVICES BUSINESSES ON COUNTERING FINANCIAL CRIME AND TERRORIST FINANCING 15 December 2007 (updated March and April 2013) (Chapters 10 and 14 updated in accordance with Instructions

More information

Business Plan 2012/13

Business Plan 2012/13 Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,

More information

BDO NORDIC. Investigation, fraud prevention and computer forensics. You can guess. You can assume. Or you can know. And knowing is always better.

BDO NORDIC. Investigation, fraud prevention and computer forensics. You can guess. You can assume. Or you can know. And knowing is always better. BDO NORDIC Investigation, fraud prevention and computer forensics You can guess. You can assume. Or you can know. And knowing is always better. CONTENT OUR SERVICES 3 Investigation - Identifying the facts

More information

A tool for small-to-medium sized businesses. Anti-Money Laundering and Counter-Terrorism Financing Act 2006

A tool for small-to-medium sized businesses. Anti-Money Laundering and Counter-Terrorism Financing Act 2006 Australian Government Australian Transaction Reports and Analysis Centre Risk management A tool for small-to-medium sized businesses Anti-Money Laundering and Counter-Terrorism Financing Act 006 Contents

More information

ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES

ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES THIS POLICY SETS OUT THE REQUIREMENTS FOR SAFEGUARDING COMPANY ASSETS AND RESOURCES TO PROTECT PATIENTS, STAFF, PRODUCTS, PROPERTY AND

More information