Information Technology Audit Considerations When Designing Audit Coverage For AML Applications
|
|
|
- Tyrone Walsh
- 9 years ago
- Views:
Transcription
1 Information Technology Audit Considerations When Designing Audit Coverage For AML Applications Peter D. Wild, FCA, CAMS The views expressed in this paper are solely those of the author and do not represent those of JPMorgan Chase.
2 Table of Contents 1. Introduction A Brief History of Auditing The AML Application Suite Information Technology Control Categories for Application Systems Security Operations Technology Operations Change Management Vendor Management Business Resiliency Information Management AML Application Controls that may require special audit emphasis Know Your Customer Automated Auditing Sanctions Name Screening Automated Auditing Transaction Monitoring Data Input Monitoring Logic Application Performance Data Output Automated Auditing Case Management Data Input Access Control Data Output Automated Auditing Model Risk Management Conclusion References CAMS AUDIT WHITE PAPER BY PETER D WILD FCA CAMS Page 2 of 19.
3 1. Introduction This paper is intended to provide a high-level introduction to some of the important considerations that should be kept in mind when designing the Information Technology {IT} audit coverage for the suite of applications that support the Anti- Money Laundering {AML} and Sanctions Screening business processes in a Financial Institution {FI}. It is possible that the AML Auditor may not be familiar with IT Audit techniques and it is also possible that the IT Auditor may not be familiar with AML audit requirements. This paper aims to assist that partnership in the design and maintenance of effective AML audit coverage and offers some suggestions on how the power of software can be harnessed to improve audit depth and efficiency, this is referred to as Automated Auditing. The scope of this paper does not include the following topics: The business processes to create and maintain the AML and Office of Foreign Assets Control {OFAC} risk profiles of the FI s customers, products and geographies. The Audit Risk Assessment process which is more than adequately covered in the ACAMS Audit White Paper by Jonathan Estreich entitled How to build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing 1. A complete and well-designed program of audit coverage will also include a Continuous Auditing component. Using this approach to monitor the important Key Performance Indicators {KPIs} and regulatory changes, the auditor will be in a position to make appropriate changes to the Audit Plan in flight in order that it remains contemporary with the changing AML risks. In this paper, the use of the term audit is intended to be synonymous with the independent testing requirement of Section 352 of the USA PATRIOT Act. 2. A Brief History of Auditing In the early days of financial reporting, in England, the auditor was basically an historian who provided an opinion on the truth and fairness of a set of financial statements as of a certain date which covered the results of the previous financial period. He had reviewed every transaction and placed a neat tick against every entry in the leather-bound General Ledger and Cash Book. His duty at the shareholders meeting was to read out the Balance Sheet, the Profit and Loss Account and the Audit Report. This was because, at that time, printing was not only expensive, but also the postal service was not considered reliable. At that time, there was a limited number of ways in which the accounts could be wrong. The auditor was defined as a watchdog and not a bloodhound in the UK court case of Kingston Cotton Mills Co. Ltd. in and therefore not expected to find fraud. CAMS AUDIT WHITE PAPER BY PETER D WILD FCA CAMS Page 3 of 19.
4 As companies grew, mechanization permitted transaction volumes to increase to the point where the auditor could no longer review every transaction. The introduction of computerization also gave birth to the systems approach to auditing and shifted the emphasis to testing the effectiveness of controls, within the business process, that are designed to either prevent or detect erroneous transactions. This also provided the opportunity to harness the power of computer software to support the audit process and improve the quality of the audit coverage. Today, the external auditor s opinion, which is included in a set of financial statements, is expressed as: The financial statements referred to above present fairly, in all material respects, the financial position of the Company as of December 31, XXXX, and the results of its operations and its cash flows for the year then ended in accordance with generally accepted accounting principles in (the country where the report is issued). The financial statements are required to be materially correct - rather than precisely accurate - hence the use of the term present fairly, in all material respects. The Generally Accepted Accounting Principles support the concept of materiality and this is interpreted to mean that each balance is correct to within a margin of approximately 5% depending upon the context. Therefore the accounting processes and financial reporting is tolerant of an acceptable error rate as is the audit process. In the AML world, there is the requirement to review customer transactions for patterns of potentially suspicious activity. The existing transaction processing systems which supply the financial accounting reporting systems are now supplying the data for the AML applications. Because the AML regime has very little tolerance for error, the auditor needs to adopt a different mindset that expects a much greater degree of precision and accuracy. Now the auditor must also place a greater emphasis on the design of a new level of controls in order to not only prevent AML events in the future but also detect those which may have occurred in the recent past. Therefore the concept of materiality, in the traditional financial context, cannot be considered a factor in either the design of the AML business processes and supporting computer systems or the related audit tests. Today, the vast majority of organizations, which are required to have a AML program, need to place significant reliance on computer systems in order for it to be effective. It therefore follows that successful AML audit coverage will be dependent upon good quality IT Audit support. This paper attempts to describe some of the important elements of an effective IT Audit approach to the AML operational processes with the emphasis on the controls which operate at the application systems level. It should be remembered, however, that, to be effective, the application controls must be supported by not only effective manual or clerical controls, but also by the general IT controls which operate at the infrastructure level (which are not within the scope of this paper). CAMS AUDIT WHITE PAPER BY PETER D WILD FCA CAMS Page 4 of 19.
5 3. The AML Application Suite The AML program will typically be supported by the following applications: A Know Your Customer {KYC} application which records the results of all levels of Customer Due Diligence. A Sanctions Screening application which compares the names of all customers, on a periodic basis, with the list provided by the relevant jurisdictions such as OFAC in the USA of the names of those with whom transactions are forbidden. This comparison must also be performed on wire transfer and ACH transactions whilst they are being processed. It also required during customer on-boarding. All name matches that are found must be reported to the local agency and the transaction must be frozen or rejected. There is also the requirement to identify Politically Exposed Persons {PEPs} who may represent a higher AML risk. A Transaction Monitoring application which analyzes the financial transactions for patterns of potentially suspicious activity which may be indicative of a predicate crime. A Case Management application which records the results of the investigations of potentially suspicious activity alerts and, when appropriate, files the Suspicious Activity Reports {SARs} electronically with the Financial Crimes Enforcement Network {FinCEN) in the United States or a Suspicious Transaction Report {STR} with the appropriate agency in foreign jurisdictions. There is also an application to fulfill the requirement, in the USA, to file Currency Transaction Reports which is outside the scope of this paper. 4. Information Technology Control Categories for Application Systems What follows is a list of standard categories of the Information Technology controls which should operate over and within all computer applications. The IT Audit plan should be designed to test them, over a reasonable period of time, as suggested by the Audit Risk Assessment. As mentioned previously, this list does not include the controls at the infrastructure level, such as the controls over the communications network and systems software Security Operations Security and access control management should include strong password syntax rules, the logging, reporting and escalation of security events, the administration of all types of users, this includes privileged access which is often required when the emergency Break Glass procedures are invoked to remediate a production problem. All user access rights should be recertified on an annual basis. CAMS AUDIT WHITE PAPER BY PETER D WILD FCA CAMS Page 5 of 19.
6 4.2. Technology Operations The production environment must be managed to ensure that computer processing is appropriately scheduled, monitored against the Service Level Agreements {SLA} with problems being promptly reported, analyzed and resolved. The backups of the data, programs and systems software must be taken at an appropriate frequency and stored in a secure offsite location Change Management It is important that a formal Systems Development Life Cycle {SDLC} is followed for both the development of new systems as well as changes to existing applications. This requires separation of the Production, Testing and Development environments which often relies upon access control to limit access to the minimum as defined by the user job function. A strong and disciplined testing methodology is essential to a satisfactory AML program. It is important that the program code is managed effectively and this typically involves the use of program library software to enforce version control. Strong controls are also required over Emergency Changes when problems with production processing are being urgently remediated Vendor Management Vendors need to be managed in order that they respect all internal policies and standards of the FI and meet the SLAs Business Resiliency The ability to recover the AML Suite of applications quickly is dependent upon an effective recovery plan which has been subjected to periodic and realistic testing. This testing should not only include moving processing to the recovery site, but also the move back to the production site which is often a more significant challenge Information Management This category has two important areas: Data Confidentiality and Data Integrity. Data Confidentiality covers the classification of data into Highly Confidential and Confidential to ensure that there is appropriate protection over the data wherever it is stored and how it is transmitted across the networks. Particular attention must be paid to the protection of data used In the Test and Development environments. This is particularly important when a copy of production data is used for testing. Data Integrity includes all the controls that ensure that the data is complete, accurate and timely. All file transmissions should be subject to reconciliations which prove that the correct number of records has been received. The file attendance controls will identify missing, late and duplicate files as they are received as defined by the SLAs. The edit features of the application should ensure that any erroneous data is identified and is subject to a correction process before being accepted for CAMS AUDIT WHITE PAPER BY PETER D WILD FCA CAMS Page 6 of 19.
7 further processing. The exception reports provide an opportunity for another decision point to review unusual data values for acceptability. 5. AML Application Controls that may require special audit emphasis The Audit Risk Assessment will guide the auditor in designing the appropriate audit coverage when the IT Application Controls are being considered for testing. All the IT Control categories should be covered, for each application, within a reasonable period of time, at least on a three year cycle. What follows are some of the special considerations with respect to IT Controls that should be considered when designing the audit coverage for each AML application. There are also some suggestions for Automated Auditing, these are not exhaustive, but are intended to stimulate discussion on the subject. Using Automated Auditing routines to provide independent error and exception reporting is extremely powerful. This provides the opportunity to effectively review the whole population and it can reduce the need for some of the manual testing using sampling Know Your Customer The KYC process should be closely integrated with the customer on-boarding process to ensure that business is not conducted with a prospective customer until the required level of due diligence process has been satisfactorily completed. The prospective customer names must be compared with the latest OFAC and PEP lists or their equivalent in other jurisdictions. The FI will also have a list of customers with whom it does not wish to do business and this is often considered to be highly confidential and, therefore, access and changes to this list must be strictly controlled. Since KYC applications must cater for all the FI s customers and record the correct combination of products and geographies, it is likely to be a very complicated set of rules. It is important to ensure that, as a result of each change to the program code, the KYC records retain their integrity. If a program change corrects an existing defect which had resulted in incomplete records, then those records need to be remediated promptly and this may need to be a manual process. It is also possible that a change could cause some records to become orphans and therefore inaccessible until a subsequent correcting program change. This situation demands comprehensive and rigorous testing. The auditor should review the testing management processes, including the quality of the test data that is used. The KYC application may have a formula which calculates an AML risk score or ranking for each customer based upon the profile in respect of the products and the geographies. This may mean that it could be classified as a Model and therefore be subject to the requirements of OCC Supervisory Guidance on Model Risk Management 3 which will be discussed later in this paper. This calculation should be tested to ensure it complies with the KYC Due Diligence policy and all manual CAMS AUDIT WHITE PAPER BY PETER D WILD FCA CAMS Page 7 of 19.
8 overrides of the automated risk rating must be reported in order to ensure they can be properly authorized. Accurate KYC metrics are very important in order to support, for example, effective management of workflow queues for renewals. With renewals, the frequency should be based upon AML customer risk so that high risk customers are renewed every year and low risk customers on, perhaps, a cycle of once every three years. The system should present the customer records for renewal at the appropriate time and warn if there is a backlog. Often the records are placed into work queues for each of the users and it is necessary for a supervisor to have the ability to re-assign work dynamically in order to smooth out peaks and troughs to keep the work on schedule. These queues should be reviewed for completeness and accuracy and the queue management functionality should be tested. The periodic reconciliation of the KYC records with the Customer Information File should also be tested Automated Auditing Consideration should be given to designing audit tests in the following areas: 1. Incorrect values in certain fields such as : Next renewal dates in the past or too far in future Last renewal dates outside the frequency required by policy Non-existent product codes Invalid country codes Invalid currency codes Invalid workflow queue codes 2. Multiple customers with the identical Social Security Number or Tax Identification Number. 3. Extracting samples of KYC records in order to review the quality of the evidence to support the customers who have been assigned High, Medium and Low AML Risk Ratings. 4. Determining that the renewal of the KYC data has been performed in accordance with the timing commensurate with policy in respect of the AML Risk Ratings. 5. For new customers in the previous year, comparing the date of the completion of the KYC review to ensure it is before the date of the first transaction. 6. Replicating the calculation of significant KPI s such as renewal volumes and renewal lateness. 7. Comparing the KYC customer records with those on the Customer Information File for completeness to ensure that a current KYC record exists for every customer. CAMS AUDIT WHITE PAPER BY PETER D WILD FCA CAMS Page 8 of 19.
9 5.2. Sanctions Name Screening The screening of names against the Specially Designated National {SDN} list provided by OFAC - or the equivalent list for other foreign jurisdictions - and also a PEP list must occur in three distinct places: During customer on-boarding. During the processing of certain transactions, such as wire transfers and ACH transactions. Periodic comparison of the authoritative list against the FI s customer names, given the fact that the official lists are constantly having names added. The common requirements in each of these different system environments, which need to be tested, are: 1. It essential to be able to easily demonstrate that all customers, accounts and transactions are included for screening with the appropriate control totals and reconciliations. 2. All the relevant data fields must be mapped precisely and correctly, from the source transaction processing systems, without any data truncation. 3. The OFAC list of names or the local equivalent - must always be the very latest. 4. The Change Management and testing processes over the screening logic are critical and may have to be subject to the requirements of OCC Supervisory Guidance on Model Risk Management, which will be discussed, in more detail, later in this paper. 5. The challenge with OFAC name screening is establishing and maintaining the thresholds which define the proximity of the matches. The auditor should review the periodic validation that is required. This involves testing below the threshold to demonstrate that nothing of significance is being missed. The design of the test data used for this testing should be reviewed in order to ensure that it provides positive confirmation of the validity of the thresholds. 6. In the case of wire transfers and ACH payments, the screening has to be done as part of the actual transaction processing. The suspect matches need to be visually reviewed very promptly by experienced personnel who decide whether to block or reject the payment. The history log of their actions should be tested for completeness and accuracy. Transactions which are a match must be placed in a blocked account and reported to OFAC or the local equivalent agency. 7. In the case where an FI has a number of different locations where sanctions screening takes place, it is important to test that the results are the same in all locations and this includes the facility provided for screening during client onboarding. 8. The change management and access controls over the special internal lists are very important. What is often called the Black List contains the names that the FI does not wish to do business with and the White List is used to suppress the reporting of matches. CAMS AUDIT WHITE PAPER BY PETER D WILD FCA CAMS Page 9 of 19.
10 Automated Auditing 1. Consideration should be given to downloading the current SDN List from the OFAC website and writing a computer program to convert this data into a file which is identical in format to the customer file that is subjected to the periodic name screening. The current sanctions screening production application is then copied into a test environment and executed against the test SDN file that was created. This should result in a 100% match, but any differences need to be explained and the alternative procedures for these situations must be reviewed. Consideration should be given to making this test a step in the regular change control process. 2. This test above can be supplemented by adding names where: the sequence of multiple names is changed as in: Maria Isabel Carrasco Maubras Gonzales Maria Gonzales Carrasco Isabel Carrasco Gonzales Maubras and single characters are changed: Maria Gonzalez Carrasco Isabel Carasco Gonzales CAMS AUDIT WHITE PAPER BY PETER D WILD FCA CAMS Page 10 of 19.
11 5.3. Transaction Monitoring Transaction monitoring systems are typically run after the transactions have been executed in the source systems. This can be weekly and/or monthly. The source transaction processing systems often have been in place considerably longer than the requirement for the stringent transaction monitoring requirements of today Data Input At some point, in the past, a program change was made to each of the transaction processing source systems to create files of transactions and reference data for transmission to the transaction monitoring application. It is important to test that the correct data fields have been accurately defined and that no data truncation occurs. This data flow must be tested to ensure that all the controls are working effectively. It is necessary to be able to demonstrate that all the appropriate transaction records are being delivered to the transaction monitoring application. Whilst record counts will prove the completeness of the transmission, it may be more difficult to use this count to demonstrate that all the eligible transaction records have been included. In the case of a checking account application, for example, not all transactions need to be sent for monitoring - such as interest and bank charges. It is important for the auditor to understand where the actual elimination of the ineligible records takes place, whether it is before the file is sent or after it has been received. It is considered preferable to make the selection after receipt by the Compliance Department and the selection logic should be coded in a manner where a new record type would cause an error since this could indicate, for example, the introduction of a new product. A very effective control which proves the completeness of the transactions sent to monitoring is to use the same financial control totals, for each transaction type, as those which are posted to the General Ledger. File attendance controls must be tested to ensure that they are in accordance with the SLAs and, therefore, files which are late, missing or duplicated are handled promptly and appropriately Monitoring Logic The logic used for monitoring financial transactions can be of two basic styles: value and volume and specific queries. The value and volume approach requires that similar accounts are placed in the same peer group by virtue of the expected transaction activity for that customer type, taking into account the products used and the geographies involved. The monitoring logic will report the transaction activity of those accounts which is outside the thresholds set for the average activity for that peer group. Specific queries are designed to identify transaction patterns that may be indicative of particular predicate crimes such as Structuring and Human Trafficking. These are often referred to as Typologies or Scenarios. CAMS AUDIT WHITE PAPER BY PETER D WILD FCA CAMS Page 11 of 19.
12 Value & Volume logic The Change Management and testing processes over the value and volume logic are critical and they may have to be subject to the requirements of OCC Supervisory Guidance on Model Risk Management, which will be discussed in more detail later in this paper. Consideration should be given to testing the following: 1. The assignment of the accounts into their Peer Groups, according to their AML risk profile, to ensure that every account resides in the appropriate group. 2. The change management process over the Peer Groups, including how accounts are added, deleted and moved. 3. The change management process over the thresholds for the Peer Groups with particular emphasis on the test documentation showing the results which support the validity of the thresholds. 4. The periodic validation of the Peer Groups, including the testing below the thresholds to ensure that there are no false negatives. Typology Logic Typologies are specific queries defining transaction patterns which are potentially suspicious and indicative of a predicate crime. The testing and validation of the typologies would most effectively be achieved by creating test data which is specifically designed to exercise all the logic paths in the program code. The auditor should review the Change Management process and expect that the test data is used and enhanced as necessary to reflect the nature of each subsequent change. Also the documentation describing the typologies and the computer source code itself should be regarded as confidential with appropriately strict access controls Application Performance The execution times for transaction monitoring in large FI s are often very long. Where, for example, the monthly run extends over twenty four hours, it is prudent to have checkpoints at certain intervals so, in the event of a systems problem, it will not be necessary to restart from the beginning. In these cases, consideration should be given to reviewing the trends in the execution times over a reasonable period perhaps the previous twelve months. The statistics that should be reviewed, beyond online response times and batch execution times, to include CPU and disk utilization. It is important to understand the head room that is available. For example, as a rough guide, the CPU utilization, on average, should not exceed 80%. This should permit continued processing during peaks in transaction volumes. The other trend is the growth in the disk space used. The trends shown in these statistics should be considered in terms of the scalability of the application in the context of the growth in future transaction volume estimates. In order to keep pace with the growth, the lead time required to install faster or more CPUs and increase the disk space must be taken into consideration. CAMS AUDIT WHITE PAPER BY PETER D WILD FCA CAMS Page 12 of 19.
13 Data Output The potentially suspicious alerts need to be transmitted to the Case Management application with appropriate control totals Automated Auditing Consideration should be given to designing audit tests in the following areas: 1. Incorrect values in certain fields such as : Invalid product codes Invalid country codes Invalid currency codes Invalid Peer Group codes Invalid workflow queue codes 2. Replicating the calculation of control totals over the data received from the transaction processing systems and the alerts sent to the Case Management application. 3. Replicating the logic of significant typologies Case Management The case management application plays a crucial rôle in the investigation process since it records the evidence to support the final disposition of all the potentially suspicious alerts Data Input The data transmitted to the case management application should not only include all the alerts generated by transaction monitoring with the related transaction data but also the associated reference data for the respective accounts and customers in order to facilitate the investigation process. It is important that the investigator is presented with all the relevant information about the customer. The controls and reconciliation processes which ensure the integrity of this data should be tested. This application will also typically include the facility to manage the queues of alerts as they are assigned and re-assigned amongst the investigators. This is important in order that the changing volume of alerts can be managed effectively to ensure that the legal deadlines are observed and that significant backlogs are not permitted to occur. The auditor should review the completeness and accuracy of the management of these queues and the queue management functionality. In order to enhance the efficiency of dispositioning the alerts, the investigator should be presented with as much related information as possible about the account and the customer relationship. The aggregation of all this relevant internal and external data requires appropriate controls to ensure completeness and accuracy. CAMS AUDIT WHITE PAPER BY PETER D WILD FCA CAMS Page 13 of 19.
14 Access Control In 1992, Congress passed the Annunzio-Wylie Anti-Money Laundering Act which provides a safe harbor for financial institutions and their employees from civil liability for reporting known or suspected criminal offenses or suspicious activity by filing a SAR. In order to claim the safe harbor defense, the SAR information itself and the existence of a SAR should be given the highest Confidentiality rating. Because the Case Management application records not only the SAR information, but also the details of all investigations, the security and control over access to the application and the data it maintains is extremely important and should be subject to rigorous audit testing. It should also be remembered that even the existence of a SAR cannot be disclosed to unauthorized parties. The underlying documents supporting the SAR filing are not subject to the same restrictions. Consideration should be given to including the following in the audit coverage: 1. Review the design of the security architecture of the case management application to ensure that it provides the opportunity for appropriate division of duties and separation of the various types of investigation. For example, access to the investigations of employee fraud should be very limited. Also, in the case of a population of investigators in different jurisdictions, it will be necessary to ensure that all local privacy laws are enforced through access control. 2. Access to US SAR information must be restricted to authorized users who are part of the same legal entity and also they must be physically present at a location within the US borders. 3. The case management database should be encrypted and access by Data Base Administrators should be under dual control especially when database utilities are used to correct data errors. 4. Data transmissions and data backups must be encrypted. 5. Controls over the test data that is used, during the Change Management process, should be the same as for the production database. This is particularly important when the test data contains a copy of actual production data. It is often appropriate to carefully restrict access to the Development and Test environments and the source code of the application. This can also mean that, for FIs in the USA, the program coding and testing must be performed by personnel inside the US borders. 6. The administration of the users must be very effective and ensure that all access is appropriately approved and recertified. Users who leave or transfer must have their access promptly removed. It is important for the auditor to understand the consequences of a user being completely removed from the system because, in some systems, this can mean that the results of their work may also be removed Data Output In the USA, this application will most probably be the source for filing the SARs, within the required timeframes, with FinCEN and this must be done electronically. CAMS AUDIT WHITE PAPER BY PETER D WILD FCA CAMS Page 14 of 19.
15 The integrity of this process, in all jurisdictions, with control totals and confirmation of receipt is crucial. It is also very important to have an alternative filing facility in the event of a system failure Automated Auditing Consideration should be given to designing audit tests in the following areas: 1. Incorrect values in certain fields such as : Invalid product codes Invalid country codes Invalid currency codes Invalid dates Invalid workflow queue codes 2. Extracting a statistical sample of cases where a SAR was NOT filed to manually test that the documentation adequately supports the decision. This would include where the decision was made just before the end of the filing deadline. 3. Extracting a statistical sample of SARs filed to review the documentation supporting the investigation process. 4. Replicating the calculation of significant metrics, such as: Investigations which are late and beyond the required time limits Percentage of Alerts to Case Percentage of Cases resulting in a SAR Late SAR filings 5. Typically, a sequential control number will be automatically assigned to an alert entering the case management application. All items on a report of missing sequence numbers of Alerts and SAR s filed should be reviewed and satisfactory explanations obtained. It is very strongly recommended that copies of the SARs, which have been reviewed during the course of the audit work, and any related identifiable Personal Information about the subjects mentioned in the SAR s are NOT stored in the audit workpapers. CAMS AUDIT WHITE PAPER BY PETER D WILD FCA CAMS Page 15 of 19.
16 6. Model Risk Management On April 4 th, 2011, the OCC published Supervisory Guidance On Model Risk Management which is referred to as OCC This section of the white paper represents a very high-level introduction to this Guidance; it is strongly recommended that all AML auditors study this document. This Guidance defines a Model as follows: The term model refers to a quantitative method, system or approach that applies statistical, economic, financial or mathematical theories, techniques and assumptions to process input data into quantitative estimates. In recent times, the regulators have required that this Guidance be applied to the software that supports Sanctions Name Screening and Transaction Monitoring. It may also have to be applied to the functionality that provides an AML customer risk ranking, but this is outside the scope of this paper. Whilst the Guidance addresses quantitative models, it also states that qualitative processes should also be subject to a rigorous control process. It also states: Program code implementing the model should be subject to rigorous quality and change control procedures to ensure the code is correct and can only be altered by approved parties and all changes are logged and can be audited. Effectively, this Guidance requires a very high degree of formality and discipline over the development and change management processes. It, therefore, follows that this should be reflected in the audit coverage of these areas, both in depth and frequency. The Guidance also defines Validation as: Validation involves a degree of independence from model development and use. Generally, validation should be done by people who are not responsible for development or use and do not have a stake in whether a model is determined to be valid. This effectively means that whilst the regular control processes must be rigorous in of themselves, there is a requirement for an independent group, which is separate from Internal Audit, to perform the validation work annually and to approve the original implementation and all subsequent material changes. CAMS AUDIT WHITE PAPER BY PETER D WILD FCA CAMS Page 16 of 19.
17 The Guidance clearly defines the rôle of Internal Audit as: Internal Audit's rôle is not to duplicate model risk management activities. Instead, its rôle is to evaluate whether model risk management is comprehensive, rigorous, and effective. Consideration should be given to testing the following areas: The Model Inventory for completeness and accuracy. It should include all models, whether quantitative or qualitative. It would be beneficial if this list also included important attributes about each item, such as purpose, location, vendor name, date of last change, location of the report showing the last test results, and the date and report covering the last validation results. A comprehensive review of the change management process, including the quality of the documentation and the quality and rigour of the testing. The Guidance states that: Material changes to models should also be subject to validation. This not only includes the conventional changes to program code, but also changes to parameters in a software package acquired from a third party vendor. Therefore, the quality of the test data is very important. It is prudent, for the FI, to develop and retain a set of test data which is supplemented during each change to add data that is specifically designed to test that particular change. This approach can also ensure that data is included to test below the thresholds which is a requirement. This technique is often referred to as Base Case Testing and can be very efficient because data has been designed to exercise the important logic paths of the application and the results have already been precalculated. This test data and the related documentation and change management processes should be subject to audit review. Review the annual validation process by a group independent of the model developers and users and it may be appropriate for them to perform their work in a separate computer environment with their own test data. The auditor should also consider reviewing the qualifications of the personnel performing the validation work. Review all the emergency changes that have taken place to ensure that the controls have not been compromised. It may be appropriate for emergency changes to the program code to be made under dual control. The Guidance requires detailed documentation to be created, maintained and retained over all the processes which involve the models. The auditor should ensure conformance with this during all aspects of audit testing. Review and test the management reporting over the AML models, including that which is submitted to the Board of Directors, as required by the guidance. CAMS AUDIT WHITE PAPER BY PETER D WILD FCA CAMS Page 17 of 19.
18 7. Conclusion It is hoped that this paper provides some useful high-level guidance which will enhance the effectiveness of the AML audit program and support the partnership between Operational and IT Audit. As the independent testing expectations continue to mature, IT Audit techniques can continue to provide an effective contribution to improve the efficiency and effectiveness of AML audit coverage. The annual AML audit report, to the Board of Directors, is obviously a very important document which, apart from providing a summary of the audit results, could also include an opinion on the quality of the controls operating over the applications which play such a significant rôle in the effectiveness of the overall AML program. CAMS AUDIT WHITE PAPER BY PETER D WILD FCA CAMS Page 18 of 19.
19 8. References 1. ACAMS White Paper entitled How to build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing by Jonathan Estreich. 2. The judgment in the UK court case of Kingston Cotton Mills Co. Ltd. in q=kingston+cotton+mills+co.+ltd&source=bl&ots=rdmvmwsada&sig=x8chvdhht Y8pfAa9f4HztfYUajY&hl=en&sa=X&ei=laMSU7mcE8bT0wGLloBA&ved=0CC8Q6AE wajgu#v=onepage&q=kingston%20cotton%20mills%20co.%20ltd&f=false 3. OCC , Supervisory Guidance on Model Risk Management CAMS AUDIT WHITE PAPER BY PETER D WILD FCA CAMS Page 19 of 19.
Validating Third Party Software Erica M. Torres, CRCM
Validating Third Party Software Erica M. Torres, CRCM Michigan Bankers Association Risk Management & Compliance Institute September 29, 2014 MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT
DEVELOPING AN AML (ANTI-MONEY LAUNDERING) PROGRAM:
DEVELOPING AN AML (ANTI-MONEY LAUNDERING) PROGRAM: Although the Department of the Treasury has not issued specific rules for hedge funds and hedge fund managers, hedge fund managers should adopt and implement
IDENTITY MONITORING: KEEPING A FINGER ON THE PULSE OF CLIENT IDENTITY CHANGES
IDENTITY MONITORING: KEEPING A FINGER ON THE PULSE OF CLIENT IDENTITY CHANGES By Neil Jeans The views and opinions expressed in this paper are those of the authors and do not necessarily reflect the official
HIGH-RISK COUNTRIES IN AML MONITORING
HIGH-RISK COUNTRIES IN AML MONITORING ALICIA CORTEZ TABLE OF CONTENTS I. Introduction 3 II. High-Risk Countries 3 Customers 4 Products 7 Monitoring 8 Audit Considerations 8 III. Conclusion 10 IV. References
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
AML Topics Using analytics to get the most from your transaction monitoring system
www.pwc.com AML Topics Using analytics to get the most from your transaction monitoring system March 2011 Contents Components of the AML Compliance Program... 1 Transaction Monitoring... 1 Transaction
RECOMMENDED CORE ELEMENTS OF AN AML TRAINING PROGRAM FOR LIFE INSURANCE AGENTS AND BROKERS
RECOMMENDED CORE ELEMENTS OF AN AML TRAINING PROGRAM FOR LIFE INSURANCE AGENTS AND BROKERS NOTICE: This document is provided to assist life insurance companies in the integration of their agents and brokers,
Product. AML Risk Manager for Life Insurance Complete End-to-End AML Coverage for Life Insurance
Product AML Risk Manager for Life Insurance Complete End-to-End AML Coverage for Life Insurance A Comprehensive Solution for AML Detection, Investigation, Case Management and Reporting Illegal money laundering
Wolfsberg Statement on AML Screening, Monitoring and Searching (2009)
Wolfsberg Statement on AML Screening, Monitoring and Searching (2009) 1. Introduction The Wolfsberg Group 1 issued its initial paper examining how financial institutions could develop suitable screening,
Bank Secrecy Act, Anti-Money Laundering, and Office of Foreign Assets Control
Bank Secrecy Act, Anti-Money Laundering, and Office of Foreign Assets Control Overview The Bank Secrecy Act (BSA) was created in 1970 to assist in criminal, tax, and regulatory investigations. The Financial
Basel Committee on Banking Supervision. Consolidated KYC Risk Management
Basel Committee on Banking Supervision Consolidated KYC Risk Management October 2004 Table of contents Introduction...4 Global process for managing KYC risks...5 Risk management...5 Customer acceptance
AML Rule Tuning: Applying Statistical and Risk-Based Approach to Achieve Higher Alert Efficiency
AML Rule Tuning: Applying Statistical and Risk-Based Approach to Achieve Higher Alert Efficiency By: Umberto Lucchetti Junior, CAMS-FCI Table of Contents 1. Executive Summary... 3 2. Introduction... 4
INTERNATIONAL MONEY EXPRESS (IME) LIMITED ONLINE REMIT USER AGREEMENT
INTERNATIONAL MONEY EXPRESS (IME) LIMITED ONLINE REMIT USER AGREEMENT This User Agreement is version 1.01 and is effective from This Agreement Between International Money Express (IME) Limited (hereafter
UnityLink Online Money Transfer Terms and Conditions
UnityLink Online Money Transfer Terms and Conditions These terms and conditions apply to Unitylink s Financial services Online Money Transfer ('the service') and are in addition to the other Terms and
Risk Based Approach putting it into practice
Risk Based Approach putting it into practice Collin Lobo Regional Head of Financial Crime Risk Middle East, Pakistan and Africa Disclaimer This presentation / document has been prepared to assist improve
Electronic Trading Information Template
Electronic Trading Information Template Preface This Electronic Trading Information Template (the "Template") has been created through the collaborative efforts of the professional associations listed
GROUP POLICY TO COMBAT MONEY LAUNDERING AND TERRORIST FINANCING. Anti-Money Laundering Policy
PAG. 1 DI 37 GROUP POLICY TO COMBAT MONEY LAUNDERING AND TERRORIST FINANCING Anti-Money Laundering Policy MACROPROCESS PROCESS TITLE DATE OF UPDATE PROTOCOL NO. 6 INTERNAL AND DEVELOPMENT PROCESSES 6.02
Regulatory Compliance and Trade
Regulatory Compliance and Trade Global Transaction Services Cash Management Trade Services and Finance Securities Services Fund Services Regulatory Compliance and Trade 2007 These materials are provided
AML & Mortgage Fraud Compliance Program v. 08.2013 ANTI-MONEY LAUNDERING & MORTGAGE FRAUD COMPLIANCE PROGRAM
ANTI-MONEY LAUNDERING & MORTGAGE FRAUD COMPLIANCE PROGRAM Version: 2.0 dated 08.2013 TABLE OF CONTENTS AML & Mortgage Fraud Compliance Program 1.0 PURPOSE AND SCOPE... 3 2.0 APPLICABLE REGULATIONS AND
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Bank Secrecy Act Anti-Money Laundering Examination Manual
Bank Secrecy Act Anti-Money Laundering Examination Manual Core Overview - Customer Identification Program Assess the bank's compliance with the statutory and regulatory requirements for the Customer Identification
Aetna Anti-Money Laundering and Financial Sanctions Compliance Policy
Aetna AML and Financial Sanctions Compliance Policy Aetna Anti-Money Laundering and Financial Sanctions Compliance Policy Originating Department: Aetna s AML Compliance Office Effective Date: January 1,
Privacy Impact Assessment of Automated Loan Examination Review Tool
Privacy Impact Assessment of Automated Loan Examination Review Tool Program or application name: Automated Loan Examination Review Tool (ALERT) System Owner: Board of Governors of the Federal Reserve System
Presented By Greg Baldwin
ANTI-MONEY LAUNDERING COMPLIANCE OFFICER TRAINING Presented By Greg Baldwin THE ANTI-MONEY LAUNDERING COMPLIANCE OFFICER We re going to cover: Basis for the requirement to have a Compliance Officer The
Part A OVERVIEW...1. 1. Introduction...1. 2. Applicability...2. 3. Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...
Part A OVERVIEW...1 1. Introduction...1 2. Applicability...2 3. Legal Provision...2 Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...3 4. Guiding Principles...3 Part C IMPLEMENTATION...13 5. Implementation
An Oracle White Paper November 2011. Financial Crime and Compliance Management: Convergence of Compliance Risk and Financial Crime
An Oracle White Paper November 2011 Financial Crime and Compliance Management: Convergence of Compliance Risk and Financial Crime Disclaimer The following is intended to outline our general product direction.
MEMBER REGULATION NOTICE SUITABILITY
Contact: Ken Woodard Director, Communications and Membership Services Phone: (416) 943-4602 Email: [email protected] MR-0069 April 14, 2008 (Revised February 22, 2013) MEMBER REGULATION NOTICE SUITABILITY
Enhanced Customer Due Diligence ADVISORY / FINANCIAL SERVICES
Enhanced Customer Due Diligence ADVISORY / FINANCIAL SERVICES Prof. Dr. Peter A.M. Diekman RA Aruba, 16 November 2010 Content Banking requirements Correspondent banking Monitoring and Filtering 1 Banking
INDIVIDUAL CLIENT AGREEMENT AGILITY FOREX LTD INDIVIDUAL CLIENT AGREEMENT
INDIVIDUAL CLIENT AGREEMENT INDIVIDUAL CLIENT AGREEMENT The following terms and conditions apply to individuals who are transacting: for their own account, as a sole proprietor of a business, as a trustee
INFORMATION TECHNOLOGY CONTROLS
CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,
BANK EXAMINERS MANUAL FOR AML/CFT RBS EXAMINATION
BANK EXAMINERS MANUAL FOR AML/CFT RBS EXAMINATION 1 Contents 1. EXAMINATION PROCEDURES ON SCOPING AND PLANNING 1..1 2. EXAMINATION PROCEDURES OF AML/CFT COMPLIANCE PROGRAM...3.. 3 3. OVERVIEW OF AML/CFT
MTN Mobile Money 2012
MTN Mobile Money 2012 Anti-Money Laundering It is the policy of MTN to prohibit and actively prevent the use of its money transfer services to facilitate money laundering, the funding of terrorists or
INTEGRITY DUE DILIGENCE GUIDELINES FOR LENDING TRANSACTIONS
INTEGRITY DUE DILIGENCE GUIDELINES FOR LENDING TRANSACTIONS Introduction The Bank's mandate is to promote sustainable growth of its member countries by providing longterm financing to projects that strengthen
Anti-Money Laundering and Counter- Terrorism Financial Policy
Anti-Money Laundering and Counter- Terrorism Financial Policy Version: March 2014 1. INTRODUCTION...3 2. DEFINITIONS...3 3. RISK-BASED APPROACH...3 4. AML COMPLIANCE OFFICER...4 5. SUSPICIOUS TRANSACTION
Wolfsberg Anti-Money Laundering Principles for Correspondent Banking
Wolfsberg Anti-Money Laundering Principles for Correspondent Banking 1 Preamble The Wolfsberg Group of International Financial Institutions 1 has agreed that these Principles constitute global guidance
Review of banks anti-money laundering systems and controls
Review of banks anti-money laundering systems and controls Stewart McGlynn Anti-Money Laundering Banking Supervision Department Hong Kong Monetary Authority 22 & 23 April 2013 Disclaimer This presentation
DO NOT DIVULGE DETAILS OF THIS MONEY TRANSFER TO A THIRD PARTY.
Disclaimers 1) If the exchange rate for your transaction was determined at the time you sent the money, the currency to be paid out and the exchange rate are listed on your receipt. Otherwise, the exchange
Basic Securities Reconciliation for the Buy Side
Basic Securities Reconciliation for the Buy Side INTRODUCTION This paper focuses on the operational control requirements of a buy-side securities trading firm with particular reference to post trade reconciliation.
FRAMEWORK FOR THE PREPARATION OF ACCOUNTS. Best Practice Guidance
FRAMEWORK FOR THE PREPARATION OF ACCOUNTS Best Practice Guidance Revised Edition April 2010 PUBLISHED IN APRIL 2010 THE INSTITUTE OF CHARTERED ACCOUNTANTS OF SCOTLAND This document is published by the
INTERNATIONAL CORRESPONDENT BANKS. Knowing Your Customer (KYC) Anti-Money Laundering Prevention of Terrorist Financing
INTERNATIONAL CORRESPONDENT BANKS Registered Name Commercial name (if applicable) Full address of the registered office of the financial institution (Street, town and country) VAT number BIC code Website:
Risk Management of Remote Deposit Capture
Federal Financial Institutions Examination Council 3501 FAIRFAX DRIVE ROOM 3086 ARLINGTON, VA 22226-3550 (703) 516-5487 http://www.ffiec.gov Background and Purpose Risk Management of Remote Deposit Capture
Advisory Guidelines of the Financial Supervisory Authority. Requirements regarding the arrangement of operational risk management
Advisory Guidelines of the Financial Supervisory Authority Requirements regarding the arrangement of operational risk management These Advisory Guidelines have established by resolution no. 63 of the Management
Wolfsberg Anti-Money Laundering Principles for Private Banking (2012)
Wolfsberg Anti-Money Laundering Principles for Private Banking (2012) Preamble The following Principles are understood to be appropriate for private banking relationships. Principles for other market segments
Anti-Money Laundering Program and Suspicious Activity Reporting Requirements For Insurance Companies. Frequently Asked Questions
Anti-Money Laundering Program and Suspicious Activity Reporting Requirements For Insurance Companies Frequently Asked Questions We are providing the following Frequently Asked Questions to assist insurance
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL OFFICE OF FOREIGN ASSET CONTROL COMPLIANCE REVIEW Report #OIG-06-09 December 18, 2006 William A. DeSarno Inspector General Released By:
Treasury Department Proposes Anti-Money Laundering Regulations for Investment Advisers
CLIENT MEMORANDUM Treasury Department Proposes Anti-Money Laundering Regulations for Investment Advisers August 28, 2015 AUTHORS Benjamin J. Haskin Russell L. Smith Barbara Block On August 25, 2015, the
Data Processing Agreement for Oracle Cloud Services
Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services
IT-Based Anti-Money Laundering and Anti-Fraud in Banks and Insurance Companies
IT-Based Anti-Money Laundering and Anti-Fraud in Banks and Insurance Companies Added Value through a Holistic GRC Approach Frank Holzenthal, computer scientist* 1 Today, a holistic Governance, Risk & Compliance
Government Crime Prevention Regulations. Richard Fraher VP & Counsel to the Retail Payments Office Federal Reserve Bank of Atlanta
Government Crime Prevention Regulations Richard Fraher VP & Counsel to the Retail Payments Office Federal Reserve Bank of Atlanta The Big Disclaimers The views expressed in this presentation are those
UNDERSTANDING MONEY LAUNDERING
UNDERSTANDING MONEY LAUNDERING Preface In light of the international concerns growing on money laundering and the financing of terrorist activities, many countries have taken rigorous measures to curb
Client Asset Requirements. Under S.I No.60 of 2007 European Communities (Markets in Financial Instruments) Regulations 2007
Client Asset Requirements Under S.I No.60 of 2007 European Communities (Markets in Financial Instruments) Regulations 2007 Instructions Paper November 2007 1 Contents 1 Contents 2 Introduction 1 2.1 Scope
Information Technology General Controls Review (ITGC) Audit Program Prepared by:
Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the
Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister
Using COBiT For Sarbanes Oxley Japan November 18 th 2006 Gary A Bannister Who Am I? Who am I & What I Do? I am an accountant with 28 years experience working in various International Control & IT roles.
FEDERAL DEPOSIT INSURANCE CORPORATION WASHINGTON, D.C. ) ) ) ) ) ) ) )
FEDERAL DEPOSIT INSURANCE CORPORATION WASHINGTON, D.C. In the Matter of BURKE & HERBERT BANK & TRUST COMPANY ALEXANDRIA, VIRGINIA (Insured State Nonmember Bank CONSENT ORDER FDIC-14-0103b The Federal Deposit
Department of Financial Services Superintendent s Regulations
Department of Financial Services Superintendent s Regulations Part 504 BANKING DIVISION TRANSACTION MONITORING AND FILTERING PROGRAM REQUIREMENTS AND CERTIFICATIONS (Statutory authority: Banking Law 37(3)(4)
The Requirements Compliance Matrix columns are defined as follows:
1 DETAILED REQUIREMENTS AND REQUIREMENTS COMPLIANCE The following s Compliance Matrices present the detailed requirements for the P&I System. Completion of all matrices is required; proposals submitted
ANTI-MONEY LAUNDERING COMPLIANCE GUIDE
LATIN AMERICA AND THE CARIBBEAN ANTI-MONEY LAUNDERING COMPLIANCE GUIDE REPORTING REQUIREMENTS RECORDKEEPING EMPLOYEE TRAINING PREVENTION OF TERRORISM FINANCING COMPLIANCE WITH LOCAL REGULATIONS COMPLIANCE
Solvency II Data audit report guidance. March 2012
Solvency II Data audit report guidance March 2012 Contents Page Introduction Purpose of the Data Audit Report 3 Report Format and Submission 3 Ownership and Independence 4 Scope and Content Scope of the
Anti-Money Laundering Policy Manual Table of Contents [Sample Client] Table of Contents
Table of Contents [ Client] Table of Contents TABLE OF CONTENTS... 1 CHAPTER 1 INTRODUCTION... 3 1.1 GOALS AND OBJECTIVES... 3 1.2 REQUIRED REVIEW... 3 1.3 APPLICABILITY... 3 1.4 MONEY LAUNDERING DEFINED...
Identifying Key Risk Indicator
PUERTO RICO PAYMENTS SYMPOSIUM Identifying Key Risk Indicator EPOCPR Services Agenda for Today Background History Regulators & Risk Management Let s have fun Regulators & Risk Assessment ACH Risks Categories
FIN-2014-A007 August 11, 2014
FIN-2014-A007 August 11, 2014 Advisory to U.S. Financial Institutions on Promoting a Culture of Compliance BSA/AML shortcomings have triggered recent civil and criminal enforcement actions FinCEN seeks
Broker-Dealer Concepts
Broker-Dealer Concepts Broker-Dealer AML Program Checklist/Gap Analysis Published by the Broker-Dealer & Investment Management Regulation Group September 2011 I. GENERAL REQUIREMENTS AML AML Program Components
Full Compliance Contents
Full Compliance for and EU Annex 11 With the regulation support of Contents 1. Introduction 2 2. The regulations 2 3. FDA 3 Subpart B Electronic records 3 Subpart C Electronic Signatures 9 4. EU GMP Annex
ACH Internal Control Questionnaire
ACH Internal Control Questionnaire AUTOMATED CLEARING HOUSE (ACH) Assessment of the Adequacy of Internal Controls Completed by: Date Completed: Quality of Management and Support for ACH Processing Activity
Why implement an AML system? 10/9/2014 AML SYSTEMS -- DATA VALIDATION. OceanSystems ECS Verafin. AML Manager. Yellow Hammer BSA
AML SYSTEMS -- DATA VALIDATION FLORIDA BANKERS ASSOCIATION OCTOBER 2014 Kristen J. Stogniew, Esq., AAP, Shareholder Saltmarsh, Cleaveland & Gund, CPA s 2 I am --- 2 nd generation consultant to the industry
C2 Financial Corporation Anti Money Laundering Program and Suspicious Activity Reporting (AML Program)
C2 Financial Corporation Anti Money Laundering Program and Suspicious Activity Reporting (AML Program) Purpose: This program is being established and implemented by C2 Financial Corporation (C2) as an
Internal Control Systems and Maintenance of Accounting and Other Records for Interactive Gaming & Interactive Wagering Corporations (IGIWC)
Internal Control Systems and Maintenance of Accounting and Other Records for Interactive Gaming & Interactive Wagering Corporations (IGIWC) 1 Introduction 1.1 Section 316 (4) of the International Business
How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing
How to Build an Audit Risk Assessment Tool to Combat Money Laundering and Terrorist Financing EQUIPPING YOUR LAST LINE OF DEFENSE A white paper by Jonathan Estreich December 2013 The objective of this
Anti-Money Laundering and Economic Sanctions
Anti-Money Laundering and Economic Sanctions 1 Meet Your Instructor Denise Whiting, CAMS Manager, Risk Advisory, Charlotte Uptown 14 years experience in the financial services industry Extensive knowledge
Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
What Insurance Agents and Brokers Should Expect under the New Anti-Money Laundering Regulations for Life Insurance Companies
What Insurance Agents and Brokers Should Expect under the New Anti-Money Laundering Regulations for Life Insurance Companies The USA PATRIOT Act includes provisions intended to prevent the financial services
Mobile Deposit Policy
Mobile Deposit Policy Mobile Deposit, a deposit transaction delivery system, allows the Credit Union to receive digital information from deposit documents captured at remote locations (i.e., the Credit
Effective AML Model Risk Management for Financial Institutions: The Six Critical Components
August 2012 Effective AML Model Risk Management for Financial Institutions: The Six Critical Components A White Paper by John A. Epperson, Arjun Kalra, and Brookton N. Behm Audit Tax Advisory Risk Performance
7.0 Information Security Protections The aggregation and analysis of large collections of data and the development
7.0 Information Security Protections The aggregation and analysis of large collections of data and the development of interconnected information systems designed to facilitate information sharing is revolutionizing
Policy on Prevention of Money Laundering and Terrorist Financing ABH Holding S.A.
Policy on Prevention of Money Laundering and Terrorist Financing ABH Holding S.A. 2013 CONTENT 1. GENERAL PROVISIONS... 3 2. THE SCOPE AND APPLICABILITY... 3 3. THE PURPOSE OF THE POLICY... 3 4. OBJECTIVES...
SPECIAL REPORT: KYC AND AML POLICY IMPLEMENTING BEST PRACTICE IN AN EVER-CHANGING REGULATORY ENVIRONMENT
SPECIAL REPORT: KYC AND AML POLICY IMPLEMENTING BEST PRACTICE IN AN EVER-CHANGING REGULATORY ENVIRONMENT INTRODUCTION Heightened expectations from regulators have created an ever-more demanding regulatory
CORRUPTION. A Reference Guide and Information Note. to support the fight against Corruption. Safeguarding public sector integrity
FINANCIAL ACTION TASK FORCE CORRUPTION A Reference Guide and Information Note on the use of the FATF Recommendations to support the fight against Corruption The Financial Action Task Force (FATF) is the
THE FORTY RECOMMENDATIONS OF THE FINANCIAL ACTION TASK FORCE ON MONEY LAUNDERING
THE FORTY RECOMMENDATIONS OF THE FINANCIAL ACTION TASK FORCE ON MONEY LAUNDERING 1990 A. GENERAL FRAMEWORK OF THE RECOMMENDATIONS 1. Each country should, without further delay, take steps to fully implement
CONSUMER ONLINE BANKING DISCLOSURE AND AGREEEMENT
CONSUMER ONLINE BANKING DISCLOSURE AND AGREEEMENT This Agreement describes your rights and obligations as a user of the Online Banking service and/or the Bill Payment and Presentment service ("Services").
Written Supervisory Procedures ( WSP ) Review Checklist for Proprietary Trading Firms
Written y Procedures ( WSP ) Review Checklist for Proprietary Trading Firms This WSP Checklist is an outline of selected key topics representative of the range of business activities typically proposed
The 2006 FFIEC Bank Secrecy Act/Anti-Money Laundering Examination Manual:
The 2006 FFIEC Bank Secrecy Act/Anti-Money Laundering Examination Manual: Knowing the Risks Is It Possible to Keep Pace and Manage Them All? By: Carmina Hughes, Executive Director and Patricia McKeown,
SCHEDULES OF CHAPTER 40B MAXIMUM ALLOWABLE PROFIT FROM SALES AND TOTAL CHAPTER 40B COSTS EXAMINATION PROGRAM
7/30/07 SCHEDULES OF CHAPTER 40B MAXIMUM ALLOWABLE PROFIT FROM SALES AND TOTAL CHAPTER 40B COSTS Instructions: EXAMINATION PROGRAM This Model Program lists the major procedures and steps that should be
Selecting a Secure and Compliant Prepaid Reloadable Card Program
Selecting a Secure and Compliant Prepaid Reloadable Card Program Merchants and other distributors of prepaid general purpose reloadable (GPR) cards should review program compliance as an integral part
SUMMARY: This Interpretive Release sets forth an interpretation of the regulation
[Billing Code 4810-02-P] United States Department of Treasury Financial Crimes Enforcement Network 31 CFR Part 103 Interpretive Release 2004-1 Anti-Money Laundering Program Requirements For Money Services
BANK OF UGANDA MOBILE MONEY GUIDELINES, 2013 ARRANGEMENT OF PARAGRAPHS
BANK OF UGANDA MOBILE MONEY GUIDELINES, 2013 ARRANGEMENT OF PARAGRAPHS PART I PRELIMINARY 1. Citation and Commencement... 2 2. Background... 2 3. Objectives... 3 4. Application... 3 5. Interpretation...
SFC ELECTRONIC TRADING REGIME
SFC ELECTRONIC TRADING REGIME CompliancePlus 2013 Year End Training 18 December 2013 Limited 801, Two Exchange Square, 8 Connaught Place, Central, Hong Kong Tel: (852) 3487 6903 www.complianceplus.hk Disclaimer
Cayman Islands Compliance Officer and the Role of the Money Laundering Reporting Officer
Cayman Islands Compliance Officer and the Role of the Money Laundering Reporting Officer Introduction Money laundering is the process by which the direct or indirect benefit of crime is channelled through
Information Systems and Technology
As public servants, it is our responsibility to use taxpayers dollars in the most effective and efficient way possible while adhering to laws and regulations governing those processes. There are many reasons
Account Opening/Client Identification Program and Monitoring Client Activity
Account Opening/Client Identification Program and Monitoring Client Activity To help the government fight the funding of terrorism and money laundering activities, federal law requires all financial institutions
It s a Regulatory Requirement But does it help and what does this really mean?
AML Compliance: Risk Based Approach It s a Regulatory Requirement But does it help and what does this really mean? Presented by: Jennifer Fiddian-Green Patrick Ho Grant Thornton LLP April 30, 2012 AML
Outsourced Third Party Relationship Management/ Vendor Management. TTS Webinar July 15, 2015 Susan Orr CISA, CISM, CRISC, CRP
Outsourced Third Party Relationship Management/ Vendor Management TTS Webinar July 15, 2015 Susan Orr CISA, CISM, CRISC, CRP 1 Risk Management Guidance 2 3 Appendix J: 4 - Key Elements Third Party Management
Designing an Operational Risk Program for a Community Bank Stephan Salvador Managing Director, Risk Management Consulting
Consulting and Professional Services Designing an Operational Risk Program for a Community Bank Stephan Salvador Managing Director, Risk Management Consulting Designing an Operational Risk Program for
FEDERAL DEPOSIT INSURANCE CORPORATION WASHINGTON, D.C. ) CONSENT ORDER. ) FDIC-13-0450b
FEDERAL DEPOSIT INSURANCE CORPORATION WASHINGTON, D.C. In the Matter of THE BANK OF PRINCETON PRINCETON, NEW JERSEY (INSURED STATE NONMEMBER BANK) ) ) ) ) CONSENT ORDER ) ) ) FDIC-13-0450b ) The Federal
Commercial Internet Banking Agreement and Disclosures
Rev. 4/2015 Commercial Internet Banking Agreement and Disclosures 1. Coverage. This Agreement applies to your use of our commercial Internet Banking Service, which permits you to access your accounts with
IT Application Controls Questionnaire
IT Application Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks A1.a. MULTIPLE USER PROCESSING INPUT CONTROLS Input controls are the procedures and methods utilized by
