Mal Module10
Mal Module10
Mal Module10
Notes
Learning objectives
The purpose of this module is to:
1.
What is CDD?
Customer Due Diligence (CDD) information comprises the information about a client
that enables an organisation to assess the extent to which that client exposes it to a
range of risks, including the risk of involvement in money laundering. CDD is often
referred to as KYC (Know Your Customer) information, although the terminology has
developed, as KYC was often associated with the client identification process, commonly
thought of as the passport and two utility bills approach to CDD. CDD is a far more
holistic concept than basic client identification measures, and encompasses a wider
range of information and processes, which need to be gathered, verified and assessed
throughout a client relationship.
More particularly, CDD information generally comprises information on the following
aspects of a client relationship.
residence
assets, and
business interests?
What is the nature of the clients business interests/occupation?
What is the commercial rationale for the relationship between the client and the
organisation (what is the client seeking to achieve)?
What is the clients source of funds?
What is the clients source of wealth?
What has been the historical pattern of the clients relationship activity with
the business, and has it been consistent with what was expected at the outset
of the relationship?
Is the current or proposed activity consistent with the clients prole and
commercial objectives?
211
2.
3.
212
documentation having policies and procedures that cover the above and
ensure effective accountability from the board and senior management down.
Notes
identify the money laundering and terrorist financing risks that are relevant to the firm
assess the risks presented by the firms particular:
customers
products
delivery channels
Risk assessment is a continuous process: policies and procedures must be reviewed and
updated to ensure they are still effective.
allows managers to differentiate between their clients in a way that matches the
risk in their particular business
allows senior management to apply its own approach to the firms procedures,
systems and controls, in particular circumstances
helps to produce a more cost-effective system, and
ensures that attention and resources can be concentrated where there is the
greatest risk.
213
Where the criminal risk of money laundering materialises, some form of regulatory risk
may also materialise.
3.3.3 Legal risk
This is the risk of exposure to litigation; it can occur in a variety of guises, including
action for breach of a constructive trust, or a breach of contract.
3.3.4 Reputational risk
This is the risk that the reputation of an organisation will be damaged in such a way that
it will be regarded less positively, or even damaged to such an extent that the business
is forced to close. Reputational damage always follows the materialisation of criminal or
regulatory risk.
3.3.5 Compliance risk
This can take on a variety of meanings but is often used to refer to the risk that a business
will fail to adhere to its own internal compliance procedures. The impact of such a risk
can result in both legal and regulatory liability as well as giving rise to the expense of
remediation to correct any past business failures. The concept of compliance risk will
become more significant when operating in a principles-based regime where more
generic regulation places increasing emphasis on businesses to devise internal compliance
arrangements appropriate to the nature and complexity of their own activities.
3.3.6 Concentration risk
This is a risk that generally applies in respect of both the assets and the liabilities
of banks. The risk is either that the assets of a bank will be too greatly concentrated
on certain borrowers or groups of related borrowers, or the risk that the liabilities of
the bank will be too concentrated on a small group or groups of depositors. This can
arise when criminals become the principal depositors and engage in capital flight to
avoid detection.
214
Notes
when there are requests to associate undue levels of secrecy with a transaction
situations where the origin of wealth and/or source of funds cannot be
easily verified or where the audit trail has been deliberately broken and/or
unnecessarily layered, and
the unwillingness of non-personal customers to give the names of their
businesss real owners and controllers.
215
3.4.3 How does the way the customer comes to the firm affect the risk?
For example the MLRO should evaluate the risks of:
consider whether the product features can be used for money laundering or
terrorist financing, or to fund other crime
consider whether the products allow or facilitate payments to third parties
understand that the main risk may be that inappropriate assets might be placed
with, or moved from, or through, the firm, and
consider the risk if a customer migrates from one product to another within the firm.
Notes
In June 2011 the Institute of International Finance (IIF) published a report entitled
Implementing Robust Risk Appetite Frameworks to Strengthen Financial Institutions. The IIF
states that the objective of its report is to provide insights and practical recommendations to
the different stakeholders in the design and implementation process of these frameworks. In
particular, the report contains recommendations for different levels of the management.
Board directors: this includes the need for such directors to ensure that they are
able to engage fully with firms risk and risk appetites.
Senior management: this includes the need for senior management to set the
tone and lead discussion regarding risk appetite.
The risk management function: for example, the need for risk management to
provide clarity of concept, definition and support regarding risk and risk appetite
within an organisation.
firms should initiate a dialogue across businesses, risk, IT, and operations on how
to redesign the risk IT architecture to fill gaps in functionality, especially with
respect to simulations, including stress-testing
firms should consider establishing a single point of responsibility to oversee the
development of new risk applications
firms should develop data collection capabilities that provide senior
management with timely views of the whole firms exposures to any given firm or
sector, and
firms should aim to create a common data model, including standard definitions
of all risk-related data and, where appropriate, also consider the consolidation of
their data into a small number of data warehouses.
The report offers practical insights and case studies on how embedding a risk appetite
into the firm can be achieved.
4. CDD in Malaysia
4.1 AMLATFA provisions
In Malaysia requirements, under section 16 of AMLAFTA, specify that a reporting institution:
a)
b)
b)
A reporting institution shall take reasonable measures to obtain and record information
about the identity of the person on whose behalf an account is opened or a transaction
217
is conducted if there are any doubts that any person is not acting on his own behalf,
particularly in the case of a person who is not conducting any commercial, financial or
industrial operations in the foreign State where it has its headquarters or domicile.
For purposes of this section person shall include any person who is a nominee, agent,
beneficiary or principal in relation to a transaction.
Reporting institutions should ensure that the CDD information that they hold on the
customer is regularly reviewed and updated, especially when there are changes in the
circumstances of the individuals business or employment.92
The general principle when conducting CDD on a customer is to ensure that there is
satisfactory evidence and proper records relating to the identity and legal existence of the
potential customer. The documentary support materials should be reliable and independent.
If a customer fails to provide the necessary information or fails to cooperate with the
reporting entity then this constitutes suspicious activity in itself and any new relationship
should be inserted and the lodging of an STR considered. Occasionally a period of
grace, circa 14 days, may be given where there is genuine reason for non-production of
information and the risk category of the customer is low.
218
5.
Notes
It is also expected this will be carried out in a risk-based way in order that firms can
apply resources to CDD appropriately. For example, the level of CDD and resources
applied to a salaried individual working for a multinational company who wants a credit
card should differ considerably from that of an SME based in a country with a reputation
for high levels of corruption and poor regulation that is seeking a series of products
including trade finance and large term deposits.
In some firms this may be relatively straightforward, if the customer base is small, and the
product offering and geographic footprint are limited. For others it presents a considerable
challenge to differentiate the risk posed by the many types of potential customer.
A key area of challenge for many firms is the interpretation of what regulations mean
when they use phrases such as understanding the nature of business or the purpose and
reason for opening the account. The first table below looks at how firms may consider
explaining to those of their staff responsible for CDD how these could be interpreted.
Table 4.1: The practical application of regulatory expectations
Regulatory
expectation
Practical application
Understand the
nature and details
of the business
(ii)
An understanding of
the business activities
The purpose and reason Demonstrate understanding of the customers need for
for opening the account the services and/or products to be provided, as in the
or establishing
examples below
the relationship
(i)
Customer needs a collection product to manage
retail receipts.
(ii)
Customer needs trade finance facilities to support
import-export business between China and Europe.
(iii) Customer needs a short-term finance facility to support
operations during quiet periods in the property market.
As such the products that the customer will use could be:
Trade Finance LCs, Export documentary collection, etc.,
Financial Markets FX, bonds, interest rate swaps, equity
derivatives, etc., Cash Management current account with
cheque books, overdraft, etc.
An understanding of
the anticipated volume
of activity for
the products used by
the customer
The source
of funds
220
Practical Applications
Standard Guidelines
Full name
NRIC passport
number
Permanent and
mailing address
Date of birth
Nationality
Sectoral guidelines
In certain cases, the individual required to be verified is wellknown (e.g. well-known businessman often in the public
domain) and sighting of any document as mentioned above
may not be always be practical. Although all efforts should be
taken to obtain such documents, where this is not practical,
reliance may be made on any publicly available documents
containing photographs of the individual. However, this
process may be risky at times when the opening of account
is via an intermediary/third party acting on behalf of the
individual VVIP. The third party has not had the privilege of a
face to face with the VVIP and thus it will not be able to confirm
to the bank that the VVIP is the same as that in the photo.
Occupation,
type/selfemployed
Name of
employer or
nature of self
employment/
nature of business 1.
Contact
number (home,
office. Mobile)
International
best practice
Notes
Anticipated level
and number of
transactions
The purpose of, 2.
and reasons for
opening, the
account (if not
implicit in the
products taken)
Source of wealth
passport
driving licence
NRIC for Malaysian/permenant resident
ID Card issued by Electoral Office.
Other methods
(i)
(ii)
221
3.
222
Non face-to-face
opening account.
(Where customer is
not met personally
while opening account,
e.g. request through
mail, Internet)
Customers who
cannot provide
standard evidence
(such as customers in
low-income groups;
with legal, mental or
physical inability to
manage their affairs;
people under care of
others; dependent
spouses or minors;
students, refugees,
migrant workers;
and prisoners)
Notes
Practical application
Standard Guidelines
Memorandum/
Articles/
Certificate of
incorporation/
partnership
Identification
document
of Directors/
Shareholders/
Partners
Authorisation
for any person
to represent
the company/
business
Relevent
documents
to identity of
the person
authorised
to represent
the company/
business in the
dealings with
the reporting
institution
b)
c)
d)
e)
224
Privately owned
Record names of all directors,
partners, proprietors
Unwrapping ownership
structures
Record names of all beneficial
owners identified through the
unwrapping process
Record names of shareholders
owning at least 25% of the
shares/capital or voting rights
Record names of all authorised
signatories
Nature and details of the
business
Purpose and reason for opening
the account or establishing
the relationship
The anticipated volume of
activity for the products used
by the customer
Whether the customer
conducts business with any
countries subject to sanctions.
Type of Customer
Source of funds
Record names of shareholders
owning at least 10% of the
shares/capital or voting rights
Record names of all beneficial
owners at 10% level
Detailed description of the
business activities
Conduct additional media
searches
225
226
Authority of authorised
signatory(ies) to open and
operate the account
2.
Source of funds
Detailed description of the
business activities
Conduct additional
media searches
1.
(iv)
(ii)
(iii)
(i)
SWEPEs may be
limited companies,
sole proprietorships or
partnerships. A SWEPE
should have:
Definitions:
Notes
Information
1.
Verification
Clubs/Societies
and Charities
Source of funds
Describe how members or
associates use or benefit from
the club/society/charity
Conduct additional
media searches
Certificate of registration
Legal status of the club/society
1.
2.
Verification:
227
228
Recreational club: the
members are entitled to the
use of the recreational facilities,
e.g. golf courses. available in
the country as well as overseas
where the club operates.
Where the club operates in
different countries, record all
the geographic locations.
The above tables set out a significant proportion of the type of CDD situations likely to be encountered whatever the type of regulated industry in which
a firm may operate in. The CDD requirements relate to individuals or non-individuals and, as mentioned, the above situations provide practical albeit
theoretical CDD considerations in a risk based way.
Identity and
legal status of the club/society
Identity of the officers
(number of signatories) who
have authority to operate an
account or to give instructions
concerning the use
or transfer of funds
or assets
Verification that the person
has been
duly authorised by the club/
society to open and operate
the account.
The reporting institution
should closely scrutinise the
accounts of clubs, societies and
charities for discrepancies.
Notes
Verification:
Notes
even where there is no business relationship but only a one off transaction,
CDD will still be required, and
CDD will also be required where a business relationship is established yet there
are no transactions (e.g. advisory services).
229
Practical approaches to all types of CDD and examples of more complex CDD situations,
including beneficial ownership, are considered later in this module providing potential
solutions to these challenges.
Law enforcement searches for the individual who benefits from a structure when
they investigate complex and opaque structures and money flows.94 A legal person
230
93. Executive Summary page 3 World Bank's Puppet Masters Report 2011.
94. World Bank's Puppet Masters Report 2011 page 18
Notes
The essence of beneficial ownership is not ownership but control. It is important not to
confuse the concept of legal ownership with the concept of control.96
A formal approach, based on percentage thresholds of ownership may yield useful
information about ultimate ownership or control and may lead to identification of
people of interest who possesses information regarding the beneficial owners. However,
the percentage approach has significant limitations.
The report makes the point that beneficial ownership cannot be resolved without
knowing more about the context. Therefore simple rules or formulas whilst helpful are
not of themselves dispositive of the issue.97
The Wolfsberg Group has aligned itself to a substantive approach to beneficial
ownership rather than a formal one.98
The Report noted that many corporate vehicles are established solely to gain access
to financial institutions.99 The provision by financial institutions of services that may be
used for receiving, holding, or conveying the illicit proceeds of corruption is a critical
part of the laundering process. Hence the nexus between beneficial ownership and
legal entities and ML/TF risk is plain to see.100
6.2.3 Common practice
The Puppet Masters Report made the following findings regarding the KYC information
typically present in Financial Institutions files:
231
The OECD report Behind the Corporate Veil: Using Corporate Entities for Illicit
Purposes 2001.
The International Trade and Investment Organization and the Society of Trust and
Estate Practitioners report Towards a Level Playing Field: Regulating Corporate
Vehicles in Cross-Border Transactions in 2002.
The FATFs report The Misuse of Corporate Vehicles in 2006.
The Caribbean FATF-style regional bodys report Money Laundering Using Trust
and Company Service Providers on Money Laundering in 2010.
232
Notes
Front men cannot hide behind banking secrecy laws or legal professional privilege and
are more likely to cooperate if pursued by law enforcement.104
2.6.10 Trust and corporate service providers (TCSPs)
Reporting entities that deal with companies and trusts established outside Malaysia
should read section 4.3 of Trust and Company Services Providers in the Puppet Masters
Report. TCSPs are crucial to the formation of corporate vehicles and trusts and thus in
their licit and illicit use. In addition to handling the incorporation of establishment of
the vehicle they may also handle renewal fees, provide mail- forwarding facilities, virtual
office facilities, act as registered local agents, resident secretaries, nominee services, as
well as acts as intermediaries and introducers to financial institutions.105 Their business
models vary enormously across this spectrum of services.
Many TCSPs promote their services promising anonymity or secrecy, qualities which are
attractive to those seeking to protect their assets from creditors and former spouses as
well as those involved in money laundering, terrorism financing or predicate crimes to
money laundering.
233
high-net-worth individuals
non-resident customers
customers from locations known for their high rates of crime (e.g. drug
producing, trafficking, smuggling)
customers from countries or jurisdictions with inadequate AML/CTF laws and
regulations as highlighted by the FATF
PEPs
customers that are involved in legal arrangements that are complex (e.g.
trusts, nominees)
businesses/activities identified by the FATF as of higher money laundering and
financing of terrorism risk
234
Notes
the spouse
any partner considered by national law as equivalent to the spouse
the children and their spouses or partners
the parents.
any natural person who is known to have joint beneficial ownership of legal
entities and legal arrangements, or any other close business relationship with
the PEP
any legal entity or legal arrangement whose beneficial owner is the PEP alone
and which is known to have been set up for the benefit of the PEP.
One significant challenge is whether to include domestic PEPs in this definition. While
most regulators only refer to foreign PEPs many financial services groups, especially
those that operate across borders, have set aside this exclusion. The FATF encourages
countries to include domestic PEPs in their definition.
Knowing whether or not a client is a PEP is an essential element of CDD for all
relationships. Many firms now employ databases to assist in the identification of PEPS.
The recently published (2011) FSA thematic review of Banks Management of High Money
Laundering Risk Situations has commented that firms need to seriously consider whether
the use of such databases should be their sole method of identifying PEPs or whether
they need additional methods to assist in this process.
For instance, a relationship managers personal knowledge of the customer could be
viewed as a critical source of information. In addition, a PEP may be identified through
methods including:
Nonetheless, databases are merely a tool to assist in identifying potential PEPs and any
hits can only be used as a reference/guide for determining whether an individual is
actually a PEP. In addition, the absence of a match from online research is not a reason
to ignore the possibility that a person is a PEP.
Given the potentially high money laundering risk posed by PEPs there are enhanced
due diligence (EDD) requirements that should include an understanding of, as well as
information, and corroboration of:
source of wealth (the economic activities that have generated the clients net worth)
source of funds (the origin and means of transfer for monies that are accepted for
the account)
the commercial rationale for the arrangement/relationship, and
the need to conduct enhanced continuous monitoring of a business relationship.
Additionally, PEP relationships should have senior management sign off or approval.
235
236
The AML risks in the country of establishment and the country of operation of
the customer (whichever is higher).
The transactions that the customer will support for its customers.
Is it a downstream correspondent clearer (i.e. the Respondent that receives
correspondent banking services from the Correspondent and itself provides
correspondent banking services to other financial institutions in the same
currency as the account it maintains with its Correspondent)?
Whether it gives its clients access to the firms correspondent accounts.
The businesses undertaken by the Respondent such as:
Internet only
trade finance.
shell companies.
The Respondents ownership:
controlled by a PEP, or
Notes
In order to obtain credible responses to the above firms should seriously consider
using an appropriate questionnaire (one based on the Wolfsberg Questionnaire for
correspondent banking). However, firms also need to ensure their processes do not
encourage a mere tick box approach with common answers being applied to the
questionnaires year after year.
The Malaysian Sectoral Guidelines for Banking and Financial Institutions prescribe that
in respect of correspondent banking the procedure below shall be followed.
i.
ii.
iii.
The reporting institution should also document the responsibilities of the respective
parties in relation to the correspondent banking relationship, in particular, matters
in relation to customer due diligence for all products and services.
iv.
v.
vi.
vii.
What this means in practice is that if the nature of business being conducted fits within
one of the above categories a firm may apply a lighter touch in terms of the extent of
CDD undertaken.
This approach may provide opportunities to reduce costs and remove paperwork from
account opening processes. For example, in respect of a simple term assurance life
insurance policy, minimal documents and information may be collected at account
opening, with greater checks in place at the claim payout stage.
Nonetheless, it is important to note that any such decision must be carefully
documented and be justifiable in the eyes of the regulators. An example of this
challenge concerns financial institutions and the apparent contradiction relating to
correspondent banking.
238
Notes
Again, most regulations require firms to assess their own money laundering risk in all
other cases and apply a risk-based approach to the level of due diligence to be applied.
This has seen many manifestations over the years of money laundering regulation,
such as the application of High, Medium and Low risk ratings by some firms, just High
and Low by others and still other firms categorising even further to High High, High
Medium, etc.
There is no right or wrong categorisation provided the approach is proportionate to the
overall money laundering risks encountered by the firm, which will depend on the type
of business it is in (e.g. insurance, money transfer, eMoney, credit provision) and the
scale of its operation (e.g. domestic, international).
The considerations above will determine the level of sophistication required for risk
assessment and whether to employ the assistance of an automated system in the process.
However a firm applies its risk-based approach there is a regulatory expectation that
a number of factors will be considered when applying a risk-based approach to all
other customers.
6.6.1 Clients deemed to be unacceptable
A firm, in considering money laundering risks, regulations and guidance may consider
certain types of relationship as unacceptable to them. An example of one that FATF
refers to would be shell banks (defined as banks that: (i) do not conduct business at
a fixed address in a jurisdiction in which they are authorised to engage in banking
activities; (ii) do not employ one or more individuals on a full-time business at this fixed
address; (iii) do not maintain operating records at this address; (iv) are not subject to
inspection by the banking authority that licensed it to conduct banking activities; and
(v) are unaffiliated with a regulated financial group).
Quite clearly another example would be individuals or entities that are on relevant
sanctions lists issued by countries in compliance with UN resolutions or those to which
countries have applied sanctions unilaterally (UK, US and others).
To capture such individuals and entities many firms now use name screening systems
and processes. In many situations these systems will also capture other adverse
information from media reports as well as identifying PEPs (see section 6.3 above).
It is a matter for firms how they use such intelligence in their risk-based approach to
CDD but it should seriously be considered as an ingredient in any risk assessment.
Having determined those clients that are unacceptable, along with those that will
require mandatory EDD or be allowed Simplified Due Diligence (as described in section
6.4 above) the large population remaining needs to be risk rated on the basis of a
number of factors, which may include those discussed in section 6.6.2 below.
6.6.2 Risk-rating clients
the product offering of the firm and the product taken up by a customer
geographic risk (e.g. whether the country is renowned for narcotics production
and/or distribution)
the customer type (e.g. salaried, sole proprietor, specific professions)
whether the customer is resident or non-resident
any adverse information gleaned from name screening
the delivery channels offered (e.g. no face-to-face interaction)
239
the various segments a customer may be aligned to in the firm (e.g. large
multinational corporates, small to medium enterprises (SME), Private Banking)
the type of business of a customer (e.g. cash intensive), and
the length of time the customers business has been in operation.
There are a number of external reference points to assist in the determination of risk in
these areas.
Geography or jurisdiction
Information may be given from: FATF Mutual Evaluation Reports, Transparency
International Corruption Perception Index (CPI), CIA The World Factbook, International
Narcotics Control Strategy Reports (INCSR), and official lists of High Intensity Drug
Trafficking Areas (HIDTA), High Intensity Financial Crime Areas (HIFCA) FINCEN Jurisdictions
of Primary Money Laundering Concern, and Countries subject to OFAC Sanctions.
240
Notes
Are you convinced that the funds and wealth can be reasonably established to
be legitimate?
Can you independently obtain the evidence of the clients source of wealth for
higher-risk accounts and relationships?
Are you able to establish the relationship between the client and the third party
where accounts are funded by a third party?
Do you continue asking and go all the way in seeking clarity wherever the
circumstances are unclear or account structures are complex?
There is a wide array of sound practices to answer these questions and be satisfied that
a customers source of wealth has been corroborated. These could include:
in depth interviewing
collection of documentary information
reference to publicly available information.
241
Additionally similar reviews would be expected at appropriate prompts or triggers such as:
242
Notes
In short, there should not be a one size fits all approach to CDD in higher-risk situations.
Some of the more challenging issues here relate to PEP identification (e.g. how widely
one should look beyond the internationally understood definition) and whether firms
could or should re-visit those lists periodically and consider removing the PEP status (i.e.
once a PEP always a PEP, or not?).
Another move in regulators expectations as regards CDD is their desire for banks to do
more extensive vetting of beneficial account-owners who have minority stakes but still
are able to exert control.
Also in relation to CDD, regulators increasingly expect banks to include a proactive element
in their risk management programme for AML governance. This expectation is most acute
in the transaction and monitoring context, but it is increasingly extending to CDD. Financial
institutions are now expected to implement procedures to monitor customer behaviours
and subject them to periodic testing and evaluation and amend customer risk ratings
accordingly (i.e. a customer originally risk rated as Medium Risk should be considered for
a move to High Risk if developments warrant it (e.g. one who suddenly receives funds
from High Risk jurisdictions). One significant challenge here is the ability of firms to take
meaningful data on expected activity, record it and measure behaviour against it.
The areas of ML risk related to criminality are also expanding as regulator expectations
increase so that firms are identifying, for example, possible nuclear proliferation. These
new areas pose real challenges for firms, not least in their ability to understand what
exactly they may be looking for. This will require firms to have more detailed knowledge
of various business sectors.
Much of the above would, for simplicity, have firms consider extending the lists of the
types of relationship they would designate an unacceptable to on-board i.e. take out
the risk completely. At the same time, however, regulators are averse to seeing blanket
exclusions based on a single risk factor. Instead, they expect firms to have nimble risk
assessment processes.
Some argue the risk-based approach merely complicates the situation and that a
standard, prescriptive, rules-based approach to CDD would take away the potential
for differing interpretations of the level of CDD to be applied. An example given is the
difficulty of applying a risk-based approach yet at the same time needing to satisfy
sanctions legislation where the requirements are absolute.
The UK governments recent response to a review of the current AML regulations
(June 2011) was that the risk-based approach was largely welcomed and that a pure
rules-based prescriptive approach would encourage a tick box method of CDD, actual
consideration of money laundering risk would decline and criminals could concentrate
on meeting these limited tests.
243
There are other challenges in CDD related to the customer experience. For example
having to provide ID documents to different parties in the same transaction (e.g. buying
a house estate agent, solicitor and bank). The ability to rely on the identification
performed by another institution has not taken hold as much as expected or allowed in
the regulations. The perception is that this is due to a lack of confidence in firms to rely
on others (this can also happen within the same firm).
One area with significant scope for change in the near future concerns much better
clarity on beneficial ownership. What is clear is that bodies such as the FATF, World
Bank, Anti Corruption NGOs and Global Witness and Transparency International expect
institutions to do more.
The issue in question is the need for firms to go beyond establishing legal ownership
but ascertaining the true beneficial ownership. This also applies to where PEPs attempt
to hide their actual control of entities. Again the expectation is for firms to dig deeper
to find potentially criminal beneficial owners and corrupt PEPs. The challenge again is
how deep and to what level?
A comparison of CDD requirements across major jurisdictions such as US, UK, HK and
Singapore shows how the FATF desire and pressure to see a level playing field with
global standards is working. The general requirements for CDD are fairly standard with
only minor differences related to for example:
7. Record-keeping
7.1 Policy Issues
A principal objective of all AML/CTF legislation around the world is the successful
prosecution of money launderers and financiers of terrorism. That can only be achieved
if reporting entities keep adequate records of what they know about customers and
what transactions they do.
Records hold the data that identifies people, customers and the transactions they do.
Records are the base data which supplies information for transaction monitoring and
reporting purposes.
Records are used to assist investigations into alleged money laundering or terrorism
financing prior to filing suspicious matter reports and also by law enforcement.
Records are used as critical evidence in criminal prosecutions of money launderers and
terrorist financiers.
244
Notes
Separately, a reporting entity needs to keep records of its AML/CTF actions in order
to demonstrate to regulators that it has complied with its obligations. Otherwise a
reporting entity cannot prove the level and quality of its compliance.
Record-making and keeping is critical to the management of an AML/CTF regime.
The regulator wants reporting entities to confirm that they do or do not have
a relationship with a certain person (most likely in a terrorism financing event
or investigation).
Law enforcement is seeking information about persons whom it is investigating
or whose assets it is seeking to confiscate or restrain.
The regulator is conducting an on-site review and seeking access to records as
part of that visit.
245
7.7.1 Scope
Many reporting entities fail to define what information must be kept and what may be
discarded. This results in everything being kept, but not necessarily kept in a way which
is retrievable when required. The paper search requirement of FATCA will add additional
stress to such an approach.
It is essential to define what records must be kept and what may be discarded. This
allows for an orderly destruction of records and information which is not required to
meet legal and regulatory obligations. Reporting entities should then follow through
with regular records destruction processes in accordance with their policies. Approval
from internal or external lawyers should be sought on record-keeping policies to protect
against risks of improper record destruction.
7.7.2 Understand the rationale for the collection of data
Reporting entities collect the data elements about persons, customers and transactions
for a variety of purposes, including business, marketing, regulatory and compliance
purposes. When deciding what data elements are being collected for AML/CTF purposes
(which give rise to record-keeping obligations) the hierarchy of selection should be:
If the answer is yes to the first two questions as well as yes for AML/CTF purposes,
then the record-keeping requirements for all those purposes must be understood and
complied with.
7.7.3 All information held has meaning for AML/CTF
All information held by a reporting entity about a customer, their transactions, and
about persons associated with the customer is information that must be understood for
AML/CTF purposes. It might be irrelevant or it might be relevant, it might be of marginal
significance or highly significant.
Controls are therefore essential around what information is captured and how it is
understood and managed.
Even if information is gathered for business purposes and has no immediate nexus to an
AML/CTF procedure it still must be understood and analysed in terms of its relevance to
the identification of ML/TF risk or neutralised. It ought not to be ignored.
A starting point when designing ML/TF risk assessments and controls is to understand
what information they do know about their customers. This information will either have
the presence of absence of risk indicators and red flags.
246
Notes
Instead there are many repositories for data and information and it is also kept in many
different formats which may not be amenable to merger.
The objective of the single or composite view is to consolidate customer data in such
a way that the reporting entity and its systems has a complete understanding of the
customer, its relationships, its transactions, and any related transaction. Pursuit of this
objective is driven by cost, competing projects and the business and regulatory benefits.
For some reporting entities the first step towards a single view of a customer is to move
from separate account identifiers to also have unique identifiers for each customer.
Where a reporting entity cannot uniquely identify each customer and natural person
it needs to consider mapping techniques so that different identifiers used by different
systems for the same customer or natural person can find each other. Otherwise the
reporting entity cannot see the full relationship it has with the customer.
7.7.5 Duplicates and close matches
Closely aligned with a single customer view capability is the ability to be able to
routinely monitor for duplicate customer names, close matches as well as customers
sharing contact details such as an address or telephone number. These could be the red
flags of false identity where a person is running a number of identities with the same
reporting entity.
7.7.6 Changes to customer information
The obligation to keep the original information gathered during a customer acceptance
procedure is not changed if a customer changes an element of information captured
during that procedure. For example, a customer may change its registered office
address. The reporting entity is still required to keep the original address within its
record-keeping processes for the required period.
7.7.7 Customer type
An ML/TF risk assessment may treat some customer types as higher ML/TF risk than
others, for example, private companies, trusts, foundations and unincorporated
structures. It follows that in an ideal world, a reporting entity would be able to see the
customer type of its customers. Few reporting entities can achieve this. Some may
partially achieve it through searches for key words in customer names, but this is only as
precise as the naming conventions used for customer names.
7.7.8 Record-keeping and list scanning
Record-keeping issues arise with list scanning:
If a reporting entity does not keep or have access to the lists as scanned on any one
day or in any scan then there is no evidence to support the results in the event of
subsequent regulatory enquiry.
If the scanning results are not kept to support the final scanning result then the
reporting entity does not have the evidence to prove the basis for the results of the scan.
247
If alerts are managed without recording the reasons for decisions then the reporting
entity cannot prove why an alert was handled the way that it was.
Lists change frequently. Best practice record-keeping would be to keep the old versions
of the lists. Where a reporting entity performs list scanning through a vendor, these
matters may become service levels or business functions that must be met by the
successful vendor.
7.7.9 Customer authentication
The processes by which customers authenticate themselves may be embedded in
transaction records which means they will also be kept as part of the transaction record
for six years from the date of the transaction. Authentication records may contain
information which is about physical location at the time of a transaction instruction (for
example an IP address, or a sending facsimile number) which is information a reporting
entity may need to manage for AML/CTF and sanctions and FATCA purposes.
7.7.10 Retrieval capability
Retrieval approaches will differ by record type. Customer identification procedures at
a minimum need to be retrievable by customer name and ideally by customer type.
Transactions at a minimum need retrievable by customer name and account.
7.7.11 Aggregation capability
The board of a reporting entity and senior management have an oversight responsibility
regarding the AML/CTF function. A record-keeping consideration is what data can be
extracted and aggregated to provide management information reporting. Examples of
aggregated data could include:
Each of the above examples calls for planning in the record-keeping procedure phase of
AML/CTF Program implementation and management.
This kind of reporting can be used to assess whether or not key staff with AML/CTF
responsibilities have met their compliance gateways or obligations.
7.7.12 Staff access rights
Certain data generated within the AML/CTF Program should be protected by restricted
access (whether electronic or physical) such as:
Case investigations.
Suspicious matter reports.
Meeting minutes of customer acceptance and exit committees.
Due diligence reports commissioned from third parties.
Monitoring parameters for monitoring of employees.
Sensitive parameters such as the parameters used to search for structuring behaviour.
A customers ML/TF risk rating (this might not be relevant to all businesses).
Notes
7.7.14 Decisions
A reporting entity will make many decisions in the operation of its AML/CTF Program.
Examples of decisions are:
Decisions made should be recorded with sufficient detail so that the reasons for making
the decisions are documented and available if the decision is reviewed in retrospect.
Recording decisions should be done in language which a reporting entity is prepared to
see published in a public forum and/or to defend in a regulatory or judicial proceeding.
7.7.15 Best practice for record-keeping procedures
The following elements are best practice for record-keeping procedures:
249
Tasks
1.
2.
3.
4.
5.
6.
7.
8.
9.
250
Assess the adequacy of the risk proling procedures within your organisation.
How could they be improved?
Assess the CDD procedures in your organisation. What use is made of KYC
information throughout the duration of each client relationship?
Draft a memorandum to senior management explaining the types of risk faced
by your business and what can be done to reduce them.
Consider how the value of KYC and the reasons for it are communicated to
employees within your organisation. Is there a danger that it suffers from the
CDD image problem? If so, how can this be overcome?
Consider what measures your organisation takes to ascertain whether a client
is a PEP.
Write a short paper for senior management explaining PEP risk and how your
organisation can protect against it.
Evaluate how criminals seek to hide the proceeds of crime in complex financial
structures where beneficial ownership is difficult to trace.
Write a short paper summarising how your organisation records and keeps its
customer information. Identify any short comings in the system.
Read the World Bank Puppet Masters report, 2011.
Self-assessment questions
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
Notes
251
Module outcomes
By the end of this unit you should:
252