Aml CFT P Guideline 23-12-2022
Aml CFT P Guideline 23-12-2022
Aml CFT P Guideline 23-12-2022
AND
FINANCIAL INTELLIGENCE
CENTRE
ANTI-MONEY
LAUNDERING/COMBATING THE
FINANCING OF TERRORISM
&
THE PROLIFERATION OF WEAPONS
OF MASS DESTRUCTION
(AML/CFT&P) GUIDELINE
DECEMBER, 2022
TABLE OF CONTENTS
DEFINITIONS ............................................................................................................................................. ix
i
2.3.4 ROLE AND DUTIES OF ANTI – MONEY LAUNDERING REPORTING OFFICER
(AMLRO) .......................................................................................................................................6
2.12.3 WHISTLEBLOWING................................................................................................................ 32
iii
3.5 CUSTOMERS TO BE VERIFIED .................................................................................... 35
3.9.4 VIRTUAL ASSETS (VAS) AND VIRTUAL ASSETS SERVICE PROVIDERS (VASPS) 43
APPENDIX C – SUPERVISORY GUIDANCE NOTE ON THE USE OF THE GHANA CARD .......... 61
REFERENCES ........................................................................................................................................... 78
iv
LIST OF ACRONYMS & ABBREVIATION
vi
FOREWORD
The world has experienced phenomenal growth in financial services over the last couple of
decades. This globalisation has led to increased cross-border activities enhancing global
financial intermediation. Unfortunately, this development has been accompanied by a spate of
transnational organized crime including Money Laundering, Terrorist Financing and Proliferation
Financing (ML/TF&PF) perpetuated by both formal and underground economies.
The emergence of technology and the increasing use of digital channels in Ghana, has made it
easier for unlawful activities to thrive. To help combat ML/TF&PF, AIs need to have robust Anti-
Money Laundering, Combating the Financing of Terrorism and the Proliferation of Weapons of
Mass Destruction (AML/CFT&P) regime.
ML/TF&PF affect whole economies, and consequently impact negatively on the economic,
political and social development, posing serious challenges across the globe.
The need for countries to have strong anti-money laundering mechanisms, coupled with the
enhancement of transparent financial integrity cannot therefore be over-emphasised. Ghana is
determined to maintain a sound financial system and to join global efforts to minimise the scourge
of ML/TF&PF.
In pursuit of the above goal and in order to avoid the risk of under-regulation, the Bank of Ghana
(BOG) and the Financial Intelligence Centre (FIC) hereby provide this Guideline to assist Bank
of Ghana Licensed Institutions design and implement their respective AML/CFT&P compliance
regime.
This Guideline is made in pursuance of sections 52 and 61 of the Anti-Money Laundering Act,
2020 (Act 1044) and section 92(2)(a)(vii) of the Banks and Specialized Deposit-Taking
Institutions, Act 2016, (Act 930).
vii
INTRODUCTION
The enactment of the now repealed Acts:- Anti-Money Laundering Act, 2008 (Act 749) and Anti-
Money Laundering (Amendment) Act, 2014 (Act 874), together with the Anti-Terrorism Act, 2008
(Act 762), Anti-Terrorism (Amendment Act), 2012 (Act 842), Anti-Terrorism (Amendment Act),
2014 (Act 875), Anti-Money Laundering Regulations, 2011 (L.I.1987) and the subsequent passage
of the Anti-Money Laundering Act, 2020 (Act 1044) has intensified Ghana’s efforts towards the
fight against money laundering, terrorism and proliferation financing (ML/TF&PF).
The purpose of Act 1044 will not be realized unless there is an effective implementation of the
collaborative measures being adopted by the Bank of Ghana (BOG) and the Financial Intelligence
Centre (FIC) as well as compliance by accountable institutions (AIs). It is against this background
that the BOG and FIC have developed this Guideline for AIs.
This Guideline has incorporated essential elements of Act 1044, Act 762 as amended and
Regulations, relevant Financial Action Task Force (FATF) Recommendations, the sound practices
of the Basel Committee on Banking Supervision and other international best practices on Anti-
Money Laundering and the Combating of the Financing of Terrorism and the Proliferation of
Weapons of Mass Destruction (AML/CFT&P).
To provide a compliance regime and to avoid ambiguity, the provision on KYC procedures are
also provided to assist AIs in their implementation of this Guideline.
viii
OBJECTIVE OF THIS GUIDELINE
This Guideline is being issued pursuant to section 52 of Act 1044 and intended to assist AIs to:
3. Understand the expectations of Bank of Ghana with respect to the minimum standards for
AML/CFT&P regime;
DEFINITIONS
Money Laundering (ML) is defined as the process where criminals attempt to conceal the illegal
origin and/or illegitimate ownership of property and assets that are proceeds of their criminal
activities. It is, thus, a derivative crime.
Terrorism Financing (TF) is defined here to include both legitimate and illegitimate money
characterised by concealment of the origin or intended criminal use of the funds.
Terrorist financing offences shall extend to any person who willfully provides or collects funds
by any means, directly or indirectly, with the unlawful intention that they should be used, or in
the knowledge that they are to be used, in full or in part to carry out a terrorist act by a terrorist
organization or by an individual terrorist.
Terrorist financing offences therefore do not necessarily require that the funds are actually used to
carry out or attempt a terrorist-act or be linked to a specific terrorist-act. Attempt to finance
terrorist/terrorism and to engage in any of the types of conduct as set out above is also an offence.
Terrorist financing offences are predicate offences for money laundering. Terrorist financing
offences therefore apply, regardless of whether the person alleged to have committed the offence
is in the same country or a different country from the one in which the terrorist or terrorist
organization is located or the terrorist act occurred or will occur.
ix
Proliferation Financing (PF) is defined by FATF as “the act of providing funds or financial services
which are used, in whole or in part, for the manufacture, acquisition, possession, development,
export, trans-shipment, brokering, transport, transfer, stockpiling or use of nuclear, chemical or
biological weapons and their means of delivery and related materials (including both technologies
and dual use goods used for non-legitimate purposes), in contravention of national laws or, where
applicable, international obligations.”
x
OVERVIEW OF THIS GUIDELINE
ML/TF&PF are global phenomena and there has been growing recognition in recent times, and
indeed well-documented evidence, that both ML/TF&PF pose major threats to international peace
and security which could seriously undermine Ghana’s development and progress.
Consequently, Ghana has made concerted efforts to check these crimes. AIs, in particular, have
come under sustained regulatory pressure to improve their monitoring and surveillance systems
with a view to detecting, preventing, and responding effectively to the threat of ML/TF&PF.
This Guideline covers among others the following key areas of AML/CFT&P policy:
AIs are exposed to varying ML/TF&PF risks and serious financial and reputational damage if
they fail to manage these risks adequately. Diligent implementation of the provisions of this
Guideline would not only minimise the risk faced by AIs of being used to launder the proceeds
of crime but also provide protection against economic and organised crime, reputational and
financial risks. In this regard, institutions are directed to adopt a risk-based approach in the
identification and management of their ML/TF&PF risks.
AIs are also reminded that AML/CFT&P policies governing their operations should not only
prescribe money laundering and predicate offences but also prescribe sanctions for non-
compliance with the relevant AML/CFT&P requirements. It is, therefore, in the best interest of
the institutions to entrench a culture of compliance which would be facilitated by this Guideline.
This revised AML/CFT&P Guideline comes into effect from the date of issue. All AIs must
conduct a gap analysis of their AML/CFT&P policies against the requirements of this Guideline
and submit the updated AML/CFT&P policies and the gap analysis report to Bank of Ghana and
the Financial Intelligence Centre.
AIs will be required to conduct their AML/CFT&P audits using this revised AML/CFT&P
Guideline.
xi
This Guideline is structured as follows;
xii
PART A - OBLIGATIONS AND CO-OPERATIONS AMONG
COMPETENT AUTHORITIES
1. In compliance with sections 52(1) and (5) of Act 1044, Bank of Ghana is hereby designated as
a supervisory body to ensure supervision and enforcement of compliance by AIs in relation to
AML/CFT&P requirements.
1. In accordance with section 52(5)(f) of Act 1044, Bank of Ghana, shall co-operate and share
information with any other competent authorities in the performance of functions and the
exercise of powers under Act 1044.
1
1.2 ACCOUNTABLE INSTITUTION’S CO-OPERATION WITH COMPETENT
AUTHORITIES
1. AIs shall declare its commitment to comply promptly with all requests made pursuant to the
law and regulations and provide information to the BOG, FIC and other relevant competent
authorities.
2. AI’s procedures for responding to authorized requests for information on ML/TF&PF shall be
such that it can:
i. immediately search the institution’s records to enable it to respond to the request;
ii. report promptly to the requesting authority the outcome of the search; and
iii. protect the security and confidentiality of such requests.
2
PART B - ELEMENTS FOR EFFECTIVE AML/CFT&P REGIME
1. All AIs shall develop and implement policies indicating their commitment to comply
with AML/CFT&P obligations under Act 1044, this Guideline and other relevant
regulations to prevent ML/TF&PF risks.
2. AIs shall formulate and implement internal rules, procedures and other controls that will
deter criminals from using their facilities for ML/TF&PF activities and shall ensure
compliance with the relevant laws and regulations.
1. The AI’s AML/CFT&P risk management framework must be aligned and integrated with
their overall Enterprise Risk Management Framework (ERMF). AIs are required to take
appropriate steps to identify, assess and understand their ML/TF&PF risks in relation to
their customers, countries or geographical areas, products and services, transactions or
delivery channels in a form of an AML/CFT&P framework to guide the staff in the
organization.
3
AIs shall be guided by the results of the National Risk Assessment (NRA)Reports in conducting
their respective risk assessments.
2.2.1.1 AIs shall review, identify and record areas of potential ML/TF&PF risks and
submit to BOG for approval before new products, practices and technologies are
launched.
2.2.1.2 AIs are therefore required to review their AML/CFT&P risk frameworks from time
to time with a view to determining their adequacy and identifying other areas
of potential risks when introducing new products, practices and technologies.
Further Guidance on Risk Assessment and Risk Rating is provided in the Appendix D.
AIs shall submit copies of the approved AML/CFT&P policy and manual to the BOG within five
(5) working days
5
should identify and assess the ML/TF&PF risks arising from new
products/services and delivery channels; new business practices, new delivery
mechanisms and new or developing technologies for new and pre-existing
products; and put measures in place to manage and mitigate such risks. Risk
assessments should take place prior to the launch or use of such products/services,
channel, business practices and technologies.
2. The AMLRO shall report to the Board or a Sub-Committee of the Board to ensure
operational independence.
3. The AMLRO must have sufficient authority, independence and seniority to be able
to effectively carry out his duties in accordance with the Act 1044 and this
Guideline. The identity of the AMLRO must be treated with the strictest confidence
by the employees of the AI. The AI shall ensure that the AMLRO acquires
professional qualification in anti-money laundering and financial crime.
4. The duties of the AMLRO shall include but not limited to the following:
6
i. Develop written AML/CFT&P policies and procedures that are kept up to date
and approved by the Board;
ii. Have oversight of the AML/CFT&P control activity in all relevant business
areas for the purposes of establishing a reasonable risk level consistent across
the AI;
iii. Keep the AML/CFT&P programme current relative to the institution’s
identified inherent risks and give consideration to local and international
developments in ML/TF&PF;
iv. Receive and vet suspicious (unusual) transaction/activity reports from the
staff;
v. Conduct regular risk assessments of the inherent ML/TF&PF risks including
timely assessments of new products, services and business acquisition
initiatives to identify potential ML/TF&PF risks and develop appropriate
control mechanisms;
vi. File suspicious, Electronic Currency, Politically Exposed Persons, Cash
Transaction Reports and other relevant regulatory reports with the BOG and
FIC (where applicable);
vii. Conduct periodic assessments of AML/CFT&P control mechanisms to ensure
their continued relevance and effectiveness in addressing changing
ML/TF&PF risks, assess operational changes, including the introduction of
new technology and processes to ensure that ML/TF&PF risks are addressed;
viii. Ensure systems, resources, including those required to identify and report
suspicious transactions and suspicious attempted transactions, are appropriate
in all relevant areas of the institution;
ix. Ensure that ongoing training programmes on ML/TF&PF are current and
relevant and are carried out for all employees, senior management and the
Board;
x. Ensure that systems and other processes that generate information used in
reports to Senior Management and the Board are adequate and appropriate, use
reasonably consistent reporting criteria, and generate accurate information;
xi. Report pertinent information to the Board and Senior Management regarding
the adequacy of the AML/CFT&P framework or any associated issues; and
xii. Serve both as a liaison officer with the BOG and the FIC and a point-of-contact
for all employees on issues relating to ML/TF&PF.
AIs shall ensure that the AMLRO has access to all information that may be of assistance to him/her
in consideration of a suspicious or unusual transaction/activity report.
2. The AMLRO and appropriate staff are to have timely access to customer
7
identification data, CDD information, transaction records and other relevant
information.
AIs shall put in place a structure that ensures the operational independence of the AMLRO.
3. Where an AIs fails to engage the services of an auditor, the BOG shall appoint a
competent professional to perform those functions and the costs shall be borne by
the AI.
8
2.4 CUSTOMER DUE DILIGENCE PROGRAMME
1. AIs must develop and implement risk-based policies and procedures to mitigate the
ML/TF&PF risks identified in their business and customer risk assessments. The risk
assessment framework should identify which customers or categories of customers present
higher risk and therefore require the application of enhanced due diligence (EDD).
Similarly, where the AIs determine that a customer or a category of customers presents low
risk, simplified due diligence (SDD) should be applied. Where SDD measures are applied
on the basis of an assessment of low ML/TF&PF risk, the customer due diligence (CDD)
policies and procedures should clearly articulate the rationale and the applicable measures
to be undertaken.
2. CDD is the identification and verification of both the customer and beneficiary including
but not limited to continuous monitoring of the business relationship with the AIs. AIs are
not permitted to operate anonymous accounts or accounts in fictitious names.
3. AIs shall identify a beneficial-owner and take reasonable measures to verify his/her
identity using relevant information or data obtained from a reliable source to satisfy
themselves that they know who the beneficial-owner is.
4. AIs shall in respect of all customers determine whether or not a customer is acting
on behalf of another person. Where the customer or any other third party is acting
on behalf of another person or making deposits and withdrawals, the AI shall take
reasonable steps to obtain sufficient identification data and to verify the identity of
that other person as pertains in (a) above.
5. AIs shall take reasonable measures in respect of customers that are legal persons or
legal arrangements to:
i. understand the ownership and control structure of such a customer; and
ii. determine the natural persons that ultimately own or control the customer.
The natural persons include those persons who exercise ultimate and effective
control over the legal person or arrangement. Examples of types of measures
needed to satisfactorily perform this function include:
For companies - The natural persons are those who own the controlling interests
and those who comprise the mind and management of the company; and
For trusts – The natural persons are the settlor, the trustee and person exercising
effective control over the trust and the beneficiaries.
Where the customer or the owner of the controlling interest is a public company
subject to regulatory disclosure requirements (i.e. a public company listed on a
recognized stock exchange), the AI shall apply a risk-based approach to identify
and verify the identity of the shareholders of such a public company.
6. AI shall obtain information on the purpose and intended nature of the business
relationship of their potential customers.
7. AIs shall conduct ongoing due diligence on the business relationship as stated by
the customers above.
10
8. The ongoing due diligence above includes scrutinizing the transactions undertaken
by the customer throughout the course of the AI customer relationship to ensure
that the transactions being conducted are consistent with the AI’s knowledge of the
customer, its business and risk profiles, and the source of funds (where necessary).
9. In compliance with the above, AIs shall develop or acquire automated monitoring
tools to monitor all transactions aimed at detecting suspicious transactions by their
customers in real time or by close of day.
10. AIs shall ensure that documents, data or information collected under the CDD
process are kept up-to-date and relevant by undertaking reviews of existing records,
particularly the records in respect of higher-risk business relationships.
11. AIs shall screen all customers (existing and new customers) at onboarding and
periodically against all domestic and international sanctions lists.
2. AIs are permitted to complete the verification of the identity of the customer and
beneficial owner following the establishment of the business relationship, only
when:
i. this can take place as soon as reasonably practicable; and
ii. it is essential not to interrupt the normal business conduct of the customer;
and the ML/TF&PF risks can be effectively managed.
3. Examples of situations where it may be essential not to interrupt the normal conduct
of existing business are:
i. Non-face-to-face business;
ii. Securities transactions - In the securities industry, companies and
intermediaries may be required to perform transactions very rapidly,
according to the market conditions at the time the customer is contacting
them and the performance of the transaction may be required before
verification of identity is completed; and
iii. Life insurance business in relation to identification and verification of the
beneficiary under the policy. This may take place after the business
relationship with the policyholder is established, but in all such cases,
identification and verification should occur at or before the time of payout
or the time when the beneficiary intends to exercise vested rights under the
policy.
2. The AIs that has already commenced the business relationship as indicated in
this Guideline shall terminate the business relationship immediately and submit
STR/SAR to the Financial Intelligence Centre (FIC) within twenty-four hours.
3. The AIs shall properly identify the customer in accordance with the criteria above. The
customer identification records should be made available to the AMLRO, other appropriate
staff and competent authorities as and when is needed.
12
2. In the circumstances above, details of the previous account(s) and any
identification evidence previously obtained or any introduction records should be
linked to the new account-records and retained for the prescribed period in
accordance with section 32 of Act 1044.
13
2.6 HIGH-RISK CATEGORIES OF CUSTOMERS
1. AIs shall perform enhanced due diligence (EDD) for high risk categories of customers,
business relationship or transaction. AIs are to adopt EDD procedures on a risk sensitive
basis. In adopting the EDD procedures in determining the risk profile, AIs shall have regard
to the type of customer, product, transaction, the location of the customer and other
relevant factors.
3. AIs shall, in addition to performing EDD procedures, put in place appropriate risk
management systems to determine whether a potential customer or existing
customer or the beneficial-owner is a PEP.
4. AIs shall obtain senior management approval before they establish a business
relationship with PEP and all other high-risk customers.
5. Where a customer has been accepted or has an ongoing relationship with the AI
and the customer or beneficial-owner is subsequently found to be or becomes a PEP
or high-risk, the AI shall obtain senior management approval in order to continue
the business relationship.
6. AIs shall take reasonable measures to establish the source of wealth and the sources
of funds of customers and beneficial-owners identified as PEPs or high-risk and
report all anomalies immediately to the FIC and other relevant authorities.
16
2.7.4 NEW TECHNOLOGIES AND NON-FACE-TO-FACE TRANSACTIONS
1. The accelerated development and increased functionality of new technologies to
provide financial services create challenges for countries and private sector AIs in
ensuring that these types of payment products and services are not misused for
ML/TF&PF purposes. Virtual currencies and various forms of electronic money,
for example, are emerging as potential alternatives to traditional financial services.
2. AIs must assess the ML/TF&PF risks associated with the introduction of:
i. New financial products and services and/or changes to existing products and
services;
ii. New or developing technologies used to provide products and services.
2. AIs shall report suspicious transactions that have no apparent economic or visible
lawful purpose. The background and purpose of such transactions shall be
examined and written findings made available to assist FIC to carry out its duties.
3. AIs that do business with foreign institutions which, do not continue to apply or
insufficiently apply the provisions of FATF Recommendations, are required to take
measures such as the following:
i. Stringent requirements for identifying customers and enhancement of
advisories, including jurisdiction-specific financial advisories to AIs for
identification of the beneficial owners before business relationships are
established with individuals or companies from that jurisdiction;
18
ii. Enhanced relevant reporting mechanisms or systematic reporting of
financial transactions on the basis that financial transactions with such
countries are more likely to be suspicious;
iii. AIs, in considering requests for licensing or approval for the establishment
of subsidiaries or branches or representative offices, shall take into account
that the country does not have adequate AML/CFT&P systems and as such
conduct the appropriate EDD procedures;
iv. Advise customers that transact with natural or legal persons within that
country that there is a high risk of ML/TF&PF. The AI shall t h u s limit
business relationships or financial transactions with the identified country
or persons in that country.
2. AIs shall ensure that the above principle is observed with respect to their branches
and subsidiaries in countries which do not or insufficiently apply such requirements
as contained in this Guideline. Where these minimum AML/CFT&P requirements
and those of the host country differ, branches and subsidiaries or parent of AIs in
the host country are required to apply the higher standard and such must be applied
to the extent that the host country’s laws, regulations or other measures permit.
4. Where the foreign branches and majority owned subsidiaries are unable to observe
19
the appropriate AML/CFT&CPF procedures because they are prohibited by the
host country’s laws, regulations or other measures, the foreign branches and
majority owned subsidiaries shall apply appropriate additional measures to manage
the ML/TF&PF risks and the AI shall inform the BOG in writing.
5. AIs are subject to these AML/CFT&P principles and shall therefore apply
consistently the CDD/EDD procedures at their group level taking into account
the activity of the customer with the various branches and subsidiaries.
2. MVTS operators shall maintain a current list of its agents and quarterly returns of
such be submitted to the BOG. They are required to gather and maintain sufficient
information about their agents and correspondent operators or any other operators
or institutions they may do business with and maintain records in accordance with
section 32 of Act 1044.
4. In the case of an MVTS provider that controls both the ordering and the
beneficiary side of a wire/electronic transfer, the MVTS provider shall be required
to:
i. take into account all the information from both the ordering and beneficiary
sides in order to determine whether an STR/SAR has to be filed; and
ii. file an STR/SAR in any country affected by the suspicious
wire/electronic transfer, and make relevant transaction information
available to the FIU/FIC.
21
information can be made available to the beneficiary AI and appropriate authorities
by other means.
2. Where the information accompanying the domestic wire/electronic transfer can be
made available to the beneficiary AI and appropriate authorities by other means,
the ordering AI need only be required to include the account number or a unique
transaction reference number, provided that this number or identifier will permit
the transaction to be traced back to the originator or the beneficiary. The ordering
AI shall be required to make the information available within three business days
of receiving the request either from the beneficiary AI or from appropriate
competent authorities.
3. LEAs shall be able to compel immediate production of such information.
4. The ordering AI shall be required to maintain all originator and beneficiary
information collected, in accordance with Act 1044 and FATF Recommendation
11.
5. The ordering AI shall not be allowed to execute the domestic transfer if it does not
comply with the requirements specified above.
22
2. For cross-border wire/electronic transfers of a threshold USD 1000 or Cedi
equivalent or more, a beneficiary AI shall be required to verify the identity of the
beneficiary. If the identity has not been previously verified and maintained, this
new information shall be retained in accordance with Act 1044 and FATF
standards.
3. Beneficiary AIs shall be required to have risk-based policies and procedures for
determining:
a. when to execute, reject, or suspend a wire/electronic transfer lacking required
originator or required beneficiary information; and
b. the appropriate follow-up action.
3. As part of the CDD/EDD process, AIs shall carry out due diligence against publicly
available terrorist lists and monitor on an ongoing basis whether funds are being sent
to high-risk countries. A non-profit association should be registered in Ghana and
where it is registered as an external entity, then the AI shall as additional due
diligence checks contact the appropriate overseas competent authority to confirm its
existence. AI shall satisfy themselves as to the legitimacy of the organization by, for
example, requesting a copy of the constitution.
23
1. AIs shall subject Charities to EDD procedures in regards to identification
procedures required for onboarding. For emphasis, accounts for charities in Ghana
shall be operated by a minimum of two signatories, duly verified and
documentation evidence obtained.
2. When dealing with an application from a registered charity, the AI shall obtain and
confirm the name and address of the charity concerned.
3. To guard against the laundering of proceeds from unlawful activity (where the
person making the application or undertaking the transaction is not the official
correspondent or the recorded alternate) an AI shall send a letter to the official
correspondent, informing him of the charity’s application before it. The official
correspondent shall be requested to respond as a matter of urgency especially where
there is a reason to suggest that the application has been made without due
authority.
4. Where a charity is opening a current account, the identity of all signatories shall be
verified initially and when the signatories change, care should be taken to ensure
that the identity of any new signatory is verified.
1. AI shall have a written policy framework that would guide and enable its staff to
monitor, recognize and respond appropriately to suspicious transactions. A list of
Money Laundering “Red Flags” is provided in the Appendix of this Guideline.
24
2. AMLROs shall supervise the monitoring and reporting of suspicious
transactions/activities.
3. AIs shall be alert to the various patterns of conduct that have been known to be
suggestive of ML/TF&PF and maintain a check list of such transactions/activities
which shall be disseminated to the relevant staff.
4. When any staff of AI detects any “red flag” or suspicious ML/TF&PF activity, the
staff is required to promptly report to the AMLRO. Every action taken shall be
recorded. The institution and its staff shall maintain confidentiality in respect of
such investigation and any suspicious transaction report that may be filed with the
FIC. This action is, however, in compliance with the provisions of Act 1044 which
criminalizes “tipping off” (i.e. doing or saying anything that might alert or give
information to someone else that he/she is under suspicion of ML/TF&PF).
5. AIs that suspect or has reason to suspect that funds or the proceeds of unlawful
activity are related to terrorist financing, shall report within twenty-four (24) hours,
its suspicions to the FIC. All suspicious transactions, including attempted
transactions are to be reported regardless of the amount involved. This requirement
to report suspicious transactions shall apply regardless of whether they are thought,
among other things, to involve tax matters.
6. AIs, their directors and employees (permanent and temporary) are prohibited from
disclosing the fact that a report is required to be filed or has been filed with the FIC
and any competent authority.
2. AIs are required to examine as far as possible the background and purpose of such
transactions and to set forth their findings in writing. They are required to
report such findings to the FIC within twenty-four (24) hours upon confirmation of
suspicion.
2. AIs shall implement processes to analyse transactions, patterns and activities to determine
if they are suspicious and meet the reporting threshold.
5. AIs shall also have systems and procedures to deal with customers who have not had
contact for some time, such as dormant accounts or relationships, to be able to identify
future reactivation and unauthorized use.
8. AIs shall refer to the guidance on conducting ML/TF&PF risk assessment of customers in
the Appendix of this Guideline for the implementation of a robust transaction monitoring
system.
2. Notices issued by the FIC in this regard and the consolidated list shall be duly
communicated to AIs.
3. In accordance with section 63 of Act 1044, AIs shall have specific obligations to
immediately report to the FIC where any of the following apply:
i. A person or entity named on the UN or third party lists has funds in the AI;
ii. The AI has reasonable grounds to believe that the designated person or entity has
funds in Ghana; and
iii. If the designated person or entity attempts to enter into a transaction or continue a
business relationship, a suspicious transaction/activity report must be submitted
immediately to the FIC.
4. The AI shall not enter into or continue such transaction with the designated person or entity.
Funds already deposited with or held by the AI must remain frozen subject to the laws of
Ghana.
5. It shall be noted that third party lists as set out in section 63 of Act 1044 and Act 762 as
amended include an obligation to immediately freeze the funds of the listed entity.
27
6. In such cases, where the AI identifies funds of a listed person in Ghana, the AI should treat
such funds as frozen pursuant to the Act 1044 and Act 762 as amended.
7. Terrorist screening is not a risk-based due diligence measure and must be carried out
regardless of the customer’s risk profile. AIs shall have processes in place to screen
customer details and payment instructions against the designated lists of persons and
entities and to ensure that the lists being screened against are up to date.
28
3. AIs shall be aware of such sanctions and consider whether these affect their operations
and any implications to the AI’s policies and procedures particularly with respect to
international transfers and its correspondent relationships. In addition to screening
payment instructions to identify designated terrorists, AIs shall screen or filter payment
instructions prior to their execution in order to prevent making funds available in breach
of sanctions, embargoes or other measures.
4. In processing wire/electronic transfers, AIs shall take freezing action and comply with
prohibitions from conducting transactions with designated persons and entities, as per
obligations set out in the relevant UNSCRs relating to the prevention and suppression
of terrorism and terrorist financing, such as UNSCRs 1267 and 1373 and their
successor resolutions.
2. Consequently, AIs shall undertake due diligence on prospective employees and throughout
the course of employment.
4. AIs shall in addition maintain records of the names, addresses, position, titles and other
official information pertaining to employees appointed or recruited in accordance with
section 32 of Act 1044.
5. AIs, to the extent permitted, shall ensure the laws of the relevant country and similar
recruitment policies are followed by its branches, subsidiaries and associate companies
abroad, especially in those countries which are not sufficiently compliant with FATF
standards.
7. AIs shall establish and maintain procedures to ensure high standards of integrity among
employees, including the meeting of statutory “fit and proper” criteria of the officers of the
AI. Integrity standards shall be documented and accessible to all employees. These internal
procedures may include standards for:
i. acceptance of gifts from customers;
ii. social liaisons with customers;
iii. disclosure of information about customers who may be engaged in criminal
activity;
iv. confidentiality;
v. detection of any unusual growth in employees’ wealth; and
vi. deterring employees from engaging in illegal activities that can be detected by
reference to his investment records.
8. The standards shall include a code of ethics for the conduct of all employees and procedures
shall allow for regular reviews of employees’ performance and their compliance with
established rules and standards. It shall also provide for disciplinary action in the event of
breaches of these rules.
2. AIs shall also subject employees’ accounts, including accounts of key management
personnel, to the same AML/CFT&P procedures as applicable to other customers’
accounts. This is required to be performed under the supervision of the AMLRO.
30
The AMLRO’s account is to be reviewed by the Internal Auditor or any other
Senior Officer designated by the Management of the AI. Compliance reports
including findings on the AMLRO’s account shall be submitted to the BOG and
FIC on or before 15th July (half-year) and on or before 15th January (End of
Year) of the following year.
Institutional Policy
1. AIs shall design comprehensive employee education and training programmes not
only to make employees fully aware of their obligations but also to equip them
with relevant skills required for the effective discharge of their AML/CFT&P
tasks. Indeed, the establishment of such an employee training programme is not
only considered as best practice but also a statutory requirement.
2. The timing, coverage and content of the employee training programme shall be
tailored to meet the perceived needs of the AIs. A comprehensive training
programme is however required to encompass staff/areas such as reporting
officers; new staff (as part of the orientation programme for those posted to the
front office); banking operations/branch office staff (particularly cashiers, account
opening, mandate, and marketing staff); internal control/audit staff and managers.
5. At a minimum, an AI shall;
i. Develop an appropriately tailored training and awareness programme consistent
with the AI’s size, resources and type of operation to enable relevant employees
to be aware of the risks associated with ML/TF&PF. The training should also
ensure employees understand how the institution might be used for
ML/TF&PF; enable them to recognize and handle potential ML/TF&PF
transactions; and to be aware of new techniques and trends in money laundering
and terrorist financing;
ii. Document, as part of their AML/CFT&P policy/manual, their approach to
training, including the frequency, delivery channels and content;
iii. Ensure that all employees are aware of the identity and responsibilities of the
AMLRO to whom they shall report unusual or suspicious transactions;
iv. Establish and maintain a regular schedule of new and refresher programmes,
appropriate to their risk profile, for the different types of training required for:
31
a. new employees;
b. operations employees;
c. agents;
d. supervisors/line managers;
e. Board and Senior Management; and
f. audit and compliance employees.
v. Obtain an acknowledgement from each employee on the training received;
vi. Assess the effectiveness of training; and
vii. Provide all relevant employees with reference manuals/materials that outline
their responsibilities and the institution’s policies. These shall complement
rather than replace formal training programmes.
6. The employee training programme shall include but not limited to the following:
i. AML regulations and offences;
ii. The nature of ML/TF&PF;
iii. Money laundering ‘red flags’ and suspicious transactions, including trade-
based money laundering typologies;
iv. AML/CFT&P reporting requirements;
v. Customer due diligence;
vi. Risk-based approach to AML/CFT&P regime;
vii. Record keeping and retention policy; and
viii. Any other relevant AML/CFT&P topic
7. AIs are also required to maintain records of employee training which at a minimum
shall include:
i. Details of the content of the training programmes provided;
ii. The names of employees who have received the training;
iii. The date on which the training was delivered;
iv. The results of any testing carried out to measure employees understanding of
the anti-money laundering requirements; and
v. An on-going training plan.
8. AIs shall submit half yearly report on their level of compliance to the BOG and
FIC by July 15 of the year under review and January 15 of the following year.
2.12.3 WHISTLEBLOWING
33
PART C - KNOW YOUR CUSTOMER (KYC) / CUSTOMER DUE
DILIGENCE (CDD) PROCEDURES
AIs shall not establish a business relationship until all relevant parties to the relationship have
been identified, verified and the nature of the business they intend to conduct ascertained. Once
an on-going business relationship is established, any inconsistent activity can then be examined to
determine whether or not there is an element of ML/TF&PF suspicion.
b. AIs shall take reasonable steps to keep the information up to date as the
opportunities arise, such as when an existing customer opens a new account.
Information obtained during any meeting, discussion or other communication
with the customer shall be recorded and kept in the customer’s file to ensure, as
far as practicable, that current customer information is readily accessible to the
AMLRO or relevant regulatory bodies.
2. “Transaction” in this Guideline is defined to include giving of advice. The “advice” here
does not apply when information is provided about the availability of products or
services nor when a first interview/discussion prior to establishing a relationship takes
place.
2. AIs shall verify the identity of the person acting on behalf of another and obtain and
verify identities of the other persons involved.
35
3. AIs shall take appropriate steps to identify directors and all signatories to an account.
5. For high risk business undertaken for private companies (i.e. those not listed on the stock
exchange) sufficient evidence of identity and EDD procedures shall be conducted in
respect of:
i. the principal underlying beneficial owner(s); and
ii. persons with controlling interest in the company.
6. AIs shall be alert to circumstances that might indicate any significant changes in the
nature of the business or its ownership (controlling interest) and make enquiries
accordingly and to observe the additional provisions for High Risk Categories of
Customers as provided in this Guideline.
7. Trusts – AIs shall obtain and verify the identity of those providing funds for the trust.
They include the settlor and those who are authorized to invest, transfer funds or make
decisions on behalf of the trust such as the principal trustees and controllers who have
power to remove the trustees.
8. When one AI acquires the business and accounts of another AI, it shall identify all the
acquired customers. It is also mandatory to carry out due diligence procedures to confirm
that the acquired institution had conformed with the requirements in this Guideline prior
to the acquisition.
36
3. AI shall however start processing the business or application immediately, provided that
it:
i. promptly takes appropriate steps to obtain identification evidence; and
ii. does not transfer or pay any money out to a third party until the identification
requirements have been satisfied.
5. AIs shall have in place written and consistent policies of closing an account or reversing
a transaction where satisfactory evidence of identity cannot be obtained.
2. The identification evidence collected at the outset shall be viewed against the
inherent risks in the business or service.
1. With a risk-based approach, where the identified ML/TF&PF risks are low, AIs
shall apply SDD. SDD shall be commensurate with the identified low risk factors
(e.g. the simplified measures may relate only to customer acceptance measures or
to aspects of ongoing monitoring). It shall be noted that SDD never means a
complete exemption or absence of CDD measures but rather, AIs may adjust the
frequency and intensity of measures to satisfy the minimum CDD standards. AIs
37
are reminded that simplified measures are not acceptable whenever there is
suspicion of ML/TF&PF risks or where specific high risk is determined.
3. This Guideline identifies the specific instances when SDD measures may be
applied including where low risks have been identified through a national risk
assessment or through an adequate assessment of ML/TF&PF risk by the AI.
4. In addition, AIs shall, based on their risk assessments, apply SDD to specifically
defined low risk customers or products and services. Such instances may include
but are not limited to:
5. For customers who do not have photo identification or have limited identification
documentation such as tourists or those who are socially or economically
vulnerable such as the disabled, elderly, minors or students, a ‘tiered’ SDD
approach allows financial access with limited functionality. For example, AI shall
offer banking accounts with low transaction/payment/balance limits with reduced
documentation requirements. Access to additional services such as higher
transaction limits or account balances or access to diversified delivery channels
shall only be allowed if and when the customer can satisfy additional identification
requirements. Where this applies AIs shall have monitoring systems to ensure that
transaction and balance limits are observed. The AIs shall ensure that the customer
shall provide the valid identification (Ghana Card) within ninety (90) days.
6. Where there is suspicion of ML/TF&PF risk, the AIs shall not apply SDD
measures.
AIs shall verify the customer’s or beneficial owner’s identity after the
establishment of the business relationship where financial products or
services provided have limited functionality or restricted services to certain
types of customers for financial inclusion purposes. For example, limits shall
be imposed on the number or total value of transactions per week/month; the
product or service shall only be offered to nationals or only domestic
transactions shall be allowed.
Similarly, general insurance products such as car insurance present low
ML/TF&PF risk so verification of identity may be postponed until there is a
claim or until the customer requests additional insurance products. In such
instances, AIs must ensure that:
i. This does not result in a de facto exemption from SDD and that
the customer or beneficial owner’s identity will ultimately be
verified.
ii. The threshold or time limit is set at a reasonably low level;
iii. Systems are in place to detect when the threshold or time limit has
been reached; and
iv. SDD is not deferred or obtaining relevant information about the
customer is not delayed where high risk factors exist or where
there is suspicion of ML/TF&PF.
Where the risk associated with all aspects of the relationship is very low, AIs
shall rely on the source of funds to meet some of the SDD requirements. For
example, the purpose and intended nature of the relationship shall be inferred
where the sole inflow of funds are government pension or benefit payments.
c. Adjust the frequency of SDD updates and reviews of the business relationship
This shall be applied for example when trigger events occur such as the
customer requesting a new product or service or when a certain transaction
threshold is reached. AIs shall ensure that this does not result in a de facto
exemption from keeping SDD information up-to-date.
Where AIs choose to do SDD procedures, they shall ensure that the threshold
is set at a reasonable level and that systems are in place to identify linked
transactions which, when aggregated, exceed the threshold.
39
3.9.1.2 FINANCIAL INCLUSION
1. AIs shall have financial inclusion policies for the socially and financially
disadvantaged citizens in Ghana.
2. The AI’s policy framework shall therefore include a description of the type of
customers that are likely to pose higher than average risk and the EDD procedures
to be applied in such instances. The commencement of a business relationship with
a high-risk customer shall be approved by senior management. Senior
management shall receive sufficient information to make an informed decision on
the level of ML/TF&PF risk the institution would be exposed to if it enters into or
continues that business relationship and how well equipped it is to manage that
risk effectively.
40
3. AIs shall also ensure that monitoring systems are appropriately tailored and
provide timely and comprehensive reports to facilitate effective monitoring of
such relationships and periodic reporting on such relationships to Board and senior
management.
4. Act 1044 and this Guideline identify specific instances that AIs must always treat
as high risk and to which EDD must be applied. EDD shall be applied in the
following circumstances:
i. Business transactions with persons and AIs in or from other countries which
do not or insufficiently comply with the FATF Standards;
ii. Complex, unusual or large transactions, whether completed or not, to all
unusual patterns of transaction and to insignificant but periodic transactions
which have no apparent economic or visible lawful purpose;
iii. Where ML/TF&PF risks are high;
iv. When establishing correspondent banking relationships;
v. Where high risks have been identified with a PEP customer; and
vi. Non-face to face business relationships or transactions
5. AIs shall exercise due caution if entering into business relationships or otherwise
doing business with persons from high risk jurisdictions named in Public
Statements issued by international organisations such as OFAC, EU, His Royal
Majesty (UK), UNSCRs, FATF, AU and ECOWAS.
41
view of the nature of activity and whether it fits with the initial risk profile of the
customer.
iv. Establish the source of funds or source of wealth of the customer. Where the risk
associated with the customer is particularly elevated, intrusive measures to verify
the source of funds and wealth may be the only adequate risk mitigation measure.
Possible sources may be reference to VAT and income tax returns, pay-slips, title
deeds or, if from an inheritance, request a copy of the will or documentation to
evidence divorce settlement or sale of property or other assets.
v. Evaluate the principals and conduct reference checks and checks of electronic
databases;
vi. Review current financial statements; and
vii. Conduct enhanced, ongoing monitoring of the business relationship, by increasing
the number and timing of controls applied, and through more frequent formal
reviews.
2. The availability and use of other financial information held is important for reducing
the additional costs of collecting customer due diligence information and can help
increase AI’s understanding of the risk associated with the business relationship. Where
appropriate and practical and where there are no data protection restrictions, AIs shall
take reasonable steps to ensure that where customer due diligence information is
available in one part of the business, there are information sharing mechanisms to link
it to information held in another.
42
3.9.4 VIRTUAL ASSETS (VAS) AND VIRTUAL ASSETS SERVICE
PROVIDERS (VASPS)
1. FATF defines Virtual Asset (VA) as a digital representation of value that can be
digitally traded or transferred and can be used for payment or investment purposes.
Virtual assets do not include digital representations of fiat currencies, securities,
and other financial assets that are already covered elsewhere in the FATF
Recommendations
2. Virtual Asset Service Provider (VASP) means any natural or legal person who is
not covered elsewhere under the Recommendation and as a business conducts one
or more of the following activities or operations for or on behalf of another natural
or legal person:
i. Exchange between virtual assets and fiat currencies;
ii. Exchange between one or more forms of virtual assets;
iii. Transfer of virtual assets;
iv. Safekeeping and/or administration of virtual assets or instruments enabling
control over virtual assets; and
v. Participation in and provision of financial services related to an issuer’s
offer and/or sale of a virtual asset.
3. The emergence of VAs such as virtual currencies has attracted investments and
payment infrastructure that provides new methods for creating and transmitting
value. Transactions in VAs are largely untraceable and anonymous and making it
susceptible to ML/TF&PF activities. VAs are traded on exchange platforms that
are unregulated in some jurisdictions. Customers may therefore lose their
investments without any regulatory intervention in the event that a VASP collapses
or closes their business.
4. AIs shall identify and assess the ML/TF&PF risks that may arise in relation to the
development of new products and new business practices, including new delivery
mechanisms, and the use of new or developing technologies such as virtual assets
and virtual asset service providers for both new and pre-existing products.
5. AIs shall undertake risk assessment prior to the launch, use or establishment of
business relationship with customers in new or developing technologies, products
and practices such as VA/VASP.
6. AIs shall identify and assess the ML/TF&PF risks emerging from virtual assets
activities and the activities or operations of VASPs.
7. AIs shall take appropriate measures to manage and mitigate such risks.
43
8. AIs, based on their understanding of their risks shall apply a risk-based approach
to ensure that measures to prevent or mitigate ML/TF&PF are commensurate with
the risks identified.
9. AIs shall take steps to identify natural or legal persons that carry out VASP
activities without the requisite license or registration.
10. AIs shall report SAR/STR on identified VASP activities to the FIC within 24 hours.
NB: Please note VASPs are not currently licensed by Bank of Ghana
44
APPENDIX A - DEFINITION OF TERMS
For the proper understanding of this Guideline, certain terms used within are defined as follows:
Terms Definition
Applicant for Business The person or company seeking to establish a ‘business relationship’
or an occasional customer undertaking a ‘one-off’ transaction whose
identity must be obtained and verified.
Batch transfer A batch transfer is a transfer comprising a number of individual
wire/electronic transfers that are being sent to the same Bank of
Ghana licensed institutions, but may/may not be ultimately intended
for different persons.
Beneficial owner Beneficial owner refers to the natural person(s) who ultimately owns
or controls a customer and/or the person on whose behalf a
transaction is being conducted. It also incorporates those persons who
exercise ultimate effective control over a legal person or arrangement.
45
Cross-border transfer Cross-border transfer means any wire/electronic transfer where the
originator and beneficiary institutions are located in different
jurisdictions.
This term also refers to any chain of wire/electronic transfers that has
at least one cross-border element.
Designated categories of Designated categories of offences mean:
offences
participation in an organised criminal group and racketeering;
terrorism, including terrorist financing, proliferation
financing;
trafficking in human beings and migrant smuggling;
sexual exploitation, including sexual exploitation of
children;
illicit trafficking in narcotic drugs and psychotropic
substances;
illicit arms trafficking;
illicit trafficking in stolen and other goods;
corruption and bribery;
fraud;
counterfeiting currency;
counterfeiting and piracy of products;
environmental crime;
murder, grievous bodily injury;
kidnapping, illegal restraint and hostage- taking;
robbery or theft;
smuggling;
tax evasion
extortion;
forgery;
piracy; and
insider trading and market manipulation;
any other similar offence or related prohibited activity
punishable with imprisonment of not less than twelve (12)
months;
any activities that occurred in another country which
constitute an offence in that country and which would have
constituted an unlawful activity had it occurred in Ghana; and
a contravention of a law in relation to a serious offence which
occurs in the country or elsewhere.
46
Designated non-financial Designated non-financial businesses and professions means:
businesses and professions Casinos (which also includes internet casinos).
Real estate agents.
Dealers in precious metals.
Dealers in precious stones.
Lawyers, notaries, other independent legal professionals and
accountants – this refers to sole practitioners, partners or
employed professionals within professional firms. It is not
meant to refer to “internal” professionals that are employees
of other types of businesses, nor to professionals working for
government agencies, who may already be subject to
measures that would combat ML/TF&PF.
Trust and Company Service Providers refers to all persons or
businesses that are not covered elsewhere under the FATF
Recommendations, and which as a business, provide any of
the following services to third parties:
i. acting as a formation agent of legal persons;
ii. acting as (or arranging for another person to act as) a director
or secretary of a company, a partner of a partnership, or a
similar position in relation to other legal persons;
iii. providing a registered office; business address or
accommodation, correspondence or administrative address for
a company, a partnership or any other legal person or
arrangement;
iv. acting as (or arranging for another person to act as) a trustee
of an express trust;
v. acting as (or arranging for another person to act as) a nominee
shareholder for another person.
Domestic transfer Domestic transfer means any wire/electronic transfer where the
originator and beneficiary institutions are both located in Ghana. This
term therefore refers to any chain of wire/electronic transfers that
takes place entirely within Ghana’s borders, even though the system
used to effect the wire/electronic transfer may be located in another
jurisdiction.
The FATF The Financial Action Task Force Recommendations refers to the
internationally endorsed global standards against ML/TF&PF
Recommendations
Financial institutions Financial institutions (under correspondent banking) means any entity
outside Ghana who conducts a correspondent banking relationship
either as an ordering or intermediary for or on behalf of a customer.
Funds Transfer The terms funds transfer refers to any transaction carried out on
behalf of an originator person (both natural and legal) by electronic
means with a view to making an amount of money available to a
beneficiary person. The originator and the beneficiary may be the
same person.
47
High Net Worth High Net Worth means individuals who have been classified by the
AIs as High Net Worth person per the internal policies and
procedures.
Legal arrangement(s) Legal arrangement means a trust or partnership or other entity created
between parties which lacks separate legal personalities.
Legal person(s) Legal persons refer to a separate legal entity (body corporate,
foundations, partnerships, or associations, or any similar bodies) that
can establish a permanent customer relationship with AI or otherwise
own property.
Non-profit Organizations/ The term non-profit organization/non- governmental organizations
Non-governmental refers to a legal entity or organization that primarily engages in
Organizations raising or disbursing funds for purposes such as charitable, religious,
cultural, educational, social or fraternal purposes, or for the carrying
out of other types of good works.
Originator The originator is the account holder, or where there is no account, the
person (natural or legal) that places the order to perform the
wire/electronic transfer.
One-off Transaction A one-off transaction means any transaction carried out other than in
the course of an established business relationship. It is important to
determine whether an applicant for business is undertaking a one-off
transaction or whether the transaction is or will be a part of a business
relationship as this can affect the identification requirements.
Payable through account Payable through account refers to correspondent accounts that are
used directly by third parties to transact business on their own behalf.
Physical presence means the physical location of the AI and its’ management in a
country.
Proceeds Proceeds refer to any property derived from or obtained, directly or
indirectly, through the commission of an offence.
Property Property means assets of every kind, whether corporeal or
incorporeal, moveable or immoveable, tangible or intangible, and
legal documents or instruments evidencing title to, or interest in such
assets.
Risk All references to risk in this Guideline refer to the risk of money
laundering and/or terrorist financing.
Settlor Settlors are persons or companies who transfer ownership of their
assets to trustees by means of a trust deed. Where the trustees have
some discretion as to the investment and distribution of the trust’s
assets, the deed may be accompanied by a non-legally binding letter
setting out what the settlor wishes to be done with the assets
48
Shell bank Shell bank means a bank that has no physical presence in the country
in which it is incorporated and licensed, and which is unaffiliated
with a regulated financial services group that is subject to effective
consolidated supervision.
Simplified Due Diligence Simplified due diligence is the lowest level of due diligence that can
be completed on a customer. Simplified due diligence is applied when
a risk assessment has shown low risk of ML/TF&PF.
Source of Funds Source of funds is the origin of funds used for transactions or
activities that occur within the business relationship or occasional
transaction. In establishing the source of funds, one must understand
not only where the funds are coming from but the activities that were
involved in generating those funds.
Source of Wealth Source of wealth describes the economic, business and or
commercial activities that generated or significantly contributed to
the customers’ overall net worth/entire body of wealth. Examples of
source of wealth includes salaries, inheritances, investments,
business ownership, property or gifts.
Terrorist It refers to any natural person who:
49
Terrorist act A terrorist act includes but are not limited to:
Terrorist financing Terrorist financing (TF) refers to any person, group, undertaking or
other entity that provides or collects, by any means, directly or
indirectly, funds or other assets that may be used, in full or in part, to
facilitate the commission of terrorist acts, or to any persons or entities
acting on behalf of, or at the direction of such persons, groups,
undertakings or other entities.
This includes those who provide or collect funds or other assets with
the intention that they should be used or in the knowledge that they
are to be used, in full or in part, in order to carry out terrorist acts.
Terrorist financing offence A terrorist financing (FT) offence refers not only to the primary
offence or offences, but also to ancillary offences.
50
Terrorist organization Refers to any group of terrorists that:
Wire/Electronic transfer The term wire/electronic transfer refers to any transaction carried out
on behalf of an originator person (both natural and legal) by
electronic means with a view to making an amount of money available
to a beneficiary person. The originator and the beneficiary may be
the same person.
51
APPENDIX B - INFORMATION TO ESTABLISH IDENTITY
Supplementary requirement
Proof of Residential Address (local)
i. GPS Address, or
ii. Tenancy Agreement, or
iii. Any other relevant document
Proof of Residence
i. GPS Address
ii. Tenancy / Hostel Agreement
iii. Any other relevant document
issued by an authorized
government agency or
institution.
Minors Ghana Card KYC Data Set of
Parent/Guardian
Parent / Guardian
Proof of Address Residential
i. GPS Address, or
ii. Tenancy Agreement, or
iii. Any other relevant document
issued by an authorized
government agency or
institution.
Refugees and Asylum Seekers Non- Citizen Card KYC Data Set
Proof of Corporate/Residential
Address (local) for each Foreign
Director/Shareholder/Ultimate
Beneficiary Owner
i. GPS Address, or
ii. Tenancy Agreement, or
iii. Any other relevant document.
i. Certificate of Incorporation
ii. Certificate to Commence
Business
Proof of Corporate/Residential
Address (local) for each Foreign
Director / Shareholders / Ultimate
Beneficiary Owner
i. GPS Address, or
ii. Tenancy Agreement, or
iii. Any other relevant document.
i. Utility Bill, or
ii. Tenancy Agreement, or
iii. Any other relevant document
Local UBO Ghana Card KYC Data Set for each
Director/Shareholder/Ultimate
Beneficiary Owner
i. Certificate of Incorporation
ii. Certificate to Commence
Business
Proof of Corporate/Residential
Address (local) for each Foreign
Director/Shareholder/Ultimate
Beneficiary Owner
i. GPS Address, or
ii. Tenancy Agreement, or
iii. Any other relevant document.
i. Utility Bill, or
ii. Tenancy Agreement, or
iii. Any other relevant document
60
APPENDIX C – SUPERVISORY GUIDANCE NOTE ON THE USE OF THE
GHANA CARD
For the complete guidance note on the use of the Ghana Card, please refer to supervisory guidance
note on the use of the Ghana Card for accountable institution issued by the Bank of Ghana in June
2022 and available on the Bank of Ghana Website.
61
APPENDIX D - FURTHER GUIDANCE ON RISK ASSESSMENT AND
BUSINESS/CUSTOMER RISK RATING
62
The steps taken to identify and assess ML/TF&PF risk must be proportionate to the nature, size
and complexity of the AI. AIs that do not offer complex products or services and have limited or
no international exposure may not need an overly sophisticated risk assessment. However, where
products and services offered by the AI are more varied and where there are multiple subsidiaries
and different business units catering to a more diverse customer base through multiple delivery
channels, the AI shall conduct a more comprehensive risk assessment and identify and assess the
ML/TF&PF risks on a group-wide level across all its business units, product lines and delivery
channels.
In conducting the risk assessment to identify those areas of its business that may be susceptible to
ML/TF&PF risk, the AI shall consider the following risk factors where applicable:
i. In relation to customers:
Target customer markets and segments;
Profile and number of customers identified as higher risk;
Complexity, volume and size of its customers’ transfers, considering the usual
activity and the risk profile of its customers (e.g. whether the ownership structure
is highly complex; whether the customer is a PEP; whether the customer’s
employment income supports account activity).
ii. In relation to the countries or jurisdictions the AI is exposed to, either through its cross
border and international operations or through the activities of its customers, including
correspondent relationships, the AI shall consider the countries or jurisdictions:
The AML/CFT laws, regulations and standards of the country or jurisdiction and
quality and effectiveness of implementation of the AML/CFT regime;
Contextual factors such as political stability, maturity and sophistication of the
regulatory and supervisory regime, level of corruption, financial inclusion etc.
iii. In relation to the products, services, transfers and delivery channels of the AI shall
consider:
Nature, scale, diversity and complexity of the financial institution’s business
activities including its geographical diversity;
Nature of products and services offered by the financial institution;
63
Delivery channels, including the extent to which there is direct interaction between
the financial institutions and the customer or the extent to which reliance is placed
on technology, intermediaries, third parties, correspondents or non-face to face
access;
the degree to which the operations are outsourced to other entities in the Group or
third parties; and
The development of new products and new business practices, including new
delivery mechanisms and partners; or the use of new or developing technologies
for both new and pre-existing products.
AI’s in its risk assessment framework shall identify the risks various delivery channels pose. AIs
shall understand and evaluate the specific risks associated with their delivery channels.
Delivery channels, includes the extent to which there is direct interaction between the AIs and
the customer or the extent to which reliance is placed on technology, intermediaries, third
parties, correspondents or non-face-to-face.
Examples include:
1. Branch Banking
2. Mobile/ Phone Banking
3. ATM/POS channel of banking
4. Tele-Banking
5. Self- Service banking
6. Internet / Online/ E- banking
66
4. Location and delivery channel of the transaction
Audit shall review the AI’s risk assessment for adequacy and completeness. Additionally,
management shall consider the staffing resources and the level of training necessary to promote
adherence with these policies, procedures, and processes. For those AIs that assume a high-risk
AML/CFT&P profile, management shall provide a more robust AML/CFT&P compliance
programme that specifically monitors and controls the high risks that management and the board
have accepted.
To avoid having an outdated understanding of the AML/CFT&P risk exposures, the bank
should continually reassess its AML/CFT&P risks, review its risk rating of customers and
communicate with business units, functions, and legal entities. The identification of an
AML/CFT&P risk or deficiency in one area of business may indicate concerns elsewhere in the
67
organization, which management shall identify and control.
68
APPENDIX E - MONEY LAUNDERING, TERRORISTFINANCING AND
PROLIFERATION FINANCING “RED FLAGS”
INTRODUCTION
Monitoring and reporting of suspicious transactions is key to AML/CFT&P effectiveness and
compliance. AIs are, therefore, required to put in place effective and efficient transaction
monitoring programmes to facilitate the process. Although the types of transactions which could
be used for ML/TF&PF are numerous, it is possible to identify certain basic features which tend
to give reasonable cause for suspicion of ML/TF&PF. This appendix, which lists various
transactions and activities that indicate potential ML/TF&PF, is not exhaustive. It does reflect
the ways in which ML/TF&PF have been known to operate.
Transactions or activities highlighted in this list are not necessarily indicative of actual ML/TF&PF
if they are consistent with a customer’s legitimate business. Identification of any of the types
of transactions listed here shall put AIs on enquiry and provoke further investigation to
determine their true legal status.
69
within a short period out of the account to a destination not normally
associated with the customer.
b. Unusually large cash deposits made by an individual or a business entity
whose normal business is transacted by cheques and other non-cash instruments.
c. Frequent exchange of cash into other currencies.
d. Customers who deposit cash through many deposits slips such that the amount
of each deposit is relatively small, the overall total is quite significant.
e. Customers whose deposits contain forged currency notes or instruments.
f. Customers who regularly deposit cash to cover applications for bank drafts.
g. Customers making large and frequent cash deposits but with cheques always
drawn in favour of persons not usually associated with their type of business.
h. Customers who request to exchange large quantities of low denomination
banknotes for those of higher denominations.
i. Branches of AIs that tend to have far more cash transactions than usual, even
after allowing for seasonal factors.
j. Customers transferring large sums of money to or from overseas locations with
instructions for payment in cash.
v. Lending Activity
a. Customers who repay delinquent loans unexpectedly.
72
b. A customer who is reluctant or refuses to state the purpose of a loan or the source of
repayment or provides a questionable purpose and/or source of repayment.
c. Loans secured by pledged assets held by third parties unrelated to the borrower.
d. Loans secured by deposits or other readily marketable assets, such as securities,
particularly when owned by apparently unrelated third parties. Loans are made
for, or are paid on behalf of, a third party with no reasonable explanation.
e. Loans lack a legitimate business purpose, provide the AI with significant fees for
assuming minimal risk, or tend to obscure the movement of funds (e.g. loans made
to a borrower and immediately sold to an entity-related to the borrower).
74
APPENDIX F - STATUTORY RETURNS
RECEPIENT
TYPE OF REPORT CHANNEL FREQUENCY
BODY
Compliance Report
This shall include but not limited to the
following keys areas
1. Staff AML/CFT&P Trainings
2. Additional AML/CFT&P Risk
Assessment
3. Additional Procedures and
Mitigants
4. New Technologies’/Products,
Non-face-to-face Transactions
HALF YEARLY (not
5. Reliance on Intermediaries or later than the 15th day
Third-Party Service Providers of the month after the
6. Update appointment / re- half year); and
Hardcopy or E-mail
designation / dismissal /
BOG & FIC ([email protected] /
resignation / retirement
[email protected])
END OF YEAR (not
7. Monitoring of Employee
later than the 15th day
Conduct
of the month after the
8. Fraud activities end of year)
9. Review of Risk Assessment
Conducted
10. Review of AML/CFT&P
policy/framework
11. Record Keeping Procedures
12. Update on AML/CFT&P
Software/Application
13. Statistics of STRs, CTRs and
ECTRs submitted to the FIC
during the review period
75
14. Other relevant compliance
activities
QUARTERLY (not
ORASS / Email later than the 15th day
Quarterly Returns (Data Capture) BOG
([email protected]) of the month after the
end of the quarter)
QUARTERLY (not
Email later than the 15th day
Updated PEP List BOG
([email protected]) of the month after the
end of the quarter)
ORASS / Email
Fraud and Defalcation Report BOG As and When
([email protected])
ORASS / Email
Disengaged Staff Return BOG As and When
([email protected])
76
Hardcopy / Email
Engaged Staff (BoG opinions) BOG As and When
([email protected])
77
REFERENCES
78