5. Role of Technology, List Screening & Other Operational Processes Contributing to an Effective and Efficient Sanctions Compliance Program Flashcards
Session 5
What does some agencies say sanctions screening is?
Wolfsberg - “Sanctions screening is a control employed within FIs to detect, prevent and manage sanctions risk and should be undertaken as part of an effective Financial Crime Compliance (FCC) programme, to assist with the identification of sanctioned individuals and organisations, as well as the illegal activity to which FIs may be exposed.”
EU - “{T}ransaction screening is the most critical element of an internal compliance programme.”
FFIEC - “With respect to U.S. banks, sanctions compliance systems should include screening.”
What was Wolfberg’s Guidance on Sanctions Screening?
Issued in 2019
Gives a good overview of what’s involved in a sanctions screening program.
Provide guidance to financial institutions as they assess the effectiveness of their sanctions screening controls, whether automated, manual or both.
What were the four core principles of Wolfsberg Guidance?
The basis for the design and implementation of sanctions screening systems:
- Articulate the specific sanctions risk the organization is trying to prevent or detect within its products, services and operations.
- Identify and evaluate the inherent potential exposure to sanctions risk presented by the FI’s products, services and customer relationships.
- Develop a well-documented understanding of the risks and how they are managed through the set-up and calibration of the screening tool
- Assess where, within the organization, the information is available in a format conducive to screening.
What were the two main screening controls in Wolfsberg Guidance?
FIs will deploy two main screening controls to achieve their objectives:
- Transaction screening is used to identify transactions involving targeted individuals or
entities (and sanctioned countries) - Customer or Name screening (reference data screening) is designed to identify targeted individuals or entities during on-boarding or the lifecycle of the customer relationship with the FI.
Together, they form a robust set of controls for identifying sanctions targets.
It should be recognized that there are a number of limitations in the way in which these controls are managed and should always be employed as part of a wider FCC program.
What were Wolfsberg 5 Fundamental Pillars of Sanctions Screening
Should be applied to screening, not in isolation, but in conjunction with other financial crime risk control processes:
- Policies and Procedures: defining requirements for what must be screened, in what context and at which frequency, and how alerts should be adjudicated, paying particular attention on how to resolve alerts where information is unavailable, incomplete or potentially unreliable.
*What screened, what context, what frequency?
- Responsible Person: ensuring appropriate skills and experience in understanding the nuances of often arcane sanctions requirements and how these might influence screening outcomes and decisions, as well as the technical capabilities of screening software.
*Who will perform the screening and who will interpret and act on results?
- Risk Assessment: applying risk based decisions to resolve specific questions of what data attributes to screen, when to screen, what lists to use and how exact or “fuzzy” to set the screening filter. The decision making and governance structure needs to be clearly articulated, documented and supported by analysis and testing.
*Identify what, how, and when to screen.
- Internal Controls: implementing screening control processes requires an understanding of the various methodologies and technologies available and their operational consequences.
- Testing: conducted to validate that the screening system is performing as expected and to assess its effectiveness in managing the specific risks articulated in the FI’s Risk Assessment. Regular testing of the system should be supported by metrics, analysis and reporting.
What were the 7 factors Wolfberg indicated may affect the design of a screening system?
Screening is based on Risk.
- The jurisdictions where the organization is located (determines the sanctions laws that apply)
- The proximity of the organization - geographically, culturally and historically - to countries subject to broad sanctions.
- The organization’s customers or clients, including:
- Whether they international or domestic
- If international, where they are located; and
- What their business is
- The volume of transactions.
*Determines how you screen (Manual or systemic)
- The complexity of transactions, including the distribution channels used.
- What products and services the organization offers and whether those products
reflect a heightened risk of sanctions violations. - The organization’s business processes, and in particular, how it sells and delivers
products.
What were Wolfsberg Principles for Generating Productive Alerts?
Identifying and implementing risk based screening decisions, in order to maximize alert quality and minimize the number of low quality or irrelevant alerts, should be undertaken
- prior to the deployment of a new screening system and thereafter
- on an on-going basis.
Risk based decisions may include:
§ Lists- an FI may establish criteria and technology processes to ensure that lists are only screened against a subset of data relevant to a specific jurisdiction
§ Exclusions – the addition of a party that poses low sanctions risk to a list of parties omitted from screening; or the use of conditional screening rules using list data or source data attributes
§ Suppression - use of suppression rules or “Good Guys” lists to manage common false positive alerts requiring unnecessary manual review
§ Data -removal of reference data from screening once the data is no longer risk relevant
What were Wolfberg Key Terms for alerts?
False Positive - is a result that indicates a potential hit on a sanctions list, but which, upon further investigation, is revealed to be innocuous. Example: “Havana Café”
*An alert that is not a true match or a true hit.
*False Negative - when no match is generated but there is a sanctions element in the transaction. (e.g. rules implemented for screening were added incorrectly) - getting a negative result when in fact there was a hit.
True Match - is a screening result, where the characters contained within the information being screened match the details of a designated entity on a list that is in scope for screening.
Fuzzy Matching - is a varied and algorithm-based technique to match one name (a string of words), where the contents of the information being screened is not identical, but its spelling, pattern or sound is a close match to the contents contained on a list used for screening.
Reference Data Screening: Process of screening the information an FI collects and maintains on the parties it does business with, or specific types of products and services it offers. Any data set within the FI’s operations, separate from its transactional records, that may present a relevant sanctions risk indicator and be conducive to detection through screening on a periodic basis.
What are the 8 Steps of a screening process?
- Information is received
- Information to be screened is identified
- Screening system extracts relevant information
4 Screening for potential matches; system generates an alert
- Potential matches and alerts are examined
- If not false positive, forwarded for further investigation
- If match confirmed, system generates “True Hit”
- Action taken to address
We will now discuss each step in more detail
In the 8 Steps of screening what do we screen?
- Information that is received from the core banking system.
In a bank setting - Information that will be included in the screening tool typically comes from this solution.
Back-end system that processes daily banking transactions and posts updates to accounts and other financial records.
Typically include deposit, loan and credit processing capabilities, with interfaces to general ledger systems and reporting tools.
Contains information about customers, transactions, payments etc.
In the 8 Steps of screening, how do you identify what needs to be screened and how do you extract the relevant information?
You look for the common attributes of screened transactions:
The parties involved in a transaction, including the remitter and beneficiary (field 50/59 of SWIFT Message)
Agents, intermediaries and FIs
Vessels, including International Maritime Organization (IMO)
numbers, normally in Trade Finance related transactions
Bank Names, Bank Identifier Code (BIC) and other routing codes
Free text fields, such as payment reference information or the stated purpose of the payment in Field 70 of a SWIFT message
International Securities Identification Number (ISINs) or other risk relevant product identifiers, including those that relate to Sectoral Sanctions Identifications within securities related transactions …
Trade finance documentation, including the:
- Importer and exporter, manufacturer, drawee, drawer, notify party, signatories
- Shipping companies, freight forwarders
- Facilitators, such as insurance companies, agents and brokers
- FIs, including Issuing / Advising / Confirming / Negotiating /
Claiming / Collecting / Reimbursing / Guarantor Banks
Geography, including a multitude of addresses, countries, cities, towns, regions, ports, airports, such
as:
- Within SWIFT Fields 50 and 59
- Place of taking in Charge / Place of Receipt / Place of Dispatch /
Place of Delivery
- Place of Final Destination
- Country of origin of the goods /services / country of destination /
country of transshipment
- Airport of Departure / Destination
What is matching?
Processofcomparingtwodatasetsinordertoeitheridentifythe exact or potential match.
Revealstherelationshipbetweentwoelements.Helpsdefinerules for possible related items.
Basedonalgorithms,whereprocessorsperformsequentialanalyses of each individual piece of a data set, matching it against each individual piece of another data set, or comparing complex variables like strings for particular similarities.
Thematchingprocesslooksateverywordineachname/addressline and the complete string of words in the transactions.
In the 8 Steps of screening, When do you screen for potential matches and review system-generated alerts?
This step is the essence of screening.
- Transactions are normally screened for sanctions in real time, before they are executed.
- If there are a very large number of transactions of a certain type, though, or if the risk of a sanctions violation is small, it may be more efficient to use batch screening, i.e., screening all transactions of a given type at one time.
- Customer and business relation names should be screened before the customer is accepted or the business relationship established. For existing customers, whether or not a business re-screens its entire customer base every time a list changes or only at set intervals depends upon the organization’s risk profile.
- Another type of screening is event-driven screening, such as screening that occurs in response to adverse news about a customer. Integrating event-driven screening into the overall system requires some sort of method for monitoring relevant news and creating a link between that news and the screening tool.
In the 8 Steps of screening, what do you do with Potential Matches, how do you examine alerts and what do you do with a false positive and a “true hit”?
There are 3 steps
1) Examine the alert to determine any potential matches
2) Forwarding potential matches for further investigation (is it a hit or not?)
3) Confirming if the potential match is a “true hit”
Example:
~ Person A determines if alert generated by the system (whether automatically or manually) is/is not a false positive.
*The transactions must be held in suspense while a final determination is made.
Alternative 1: Person A investigates the alert further to determine whether it is an actual hit. (2 eye principle)
Alternative 2: Person A does just enough of an investigation to determine whether there is a potential hit, and then turn the investigation over to a specialized function.
Alternative 3: Person A reviews the initial alert; if they cannot dismiss it, they turn the matter over to someone else whose function is specifically to investigate potential hits.
*Alternative 2 & Alternative 3 is considered the “Four Eyes” principle.
How do you have an alert/hit?
Related Issue: how many people are required to confirm that a hit is a true hit?
Assessing a hit as “true” has potentially significant implications, such as rejection of a transaction, with possible harm to the customer and other parties involved. At most, it may require the freezing of property. Given this, the question is whether one person should be able to classify a hit as confirmed.
The “Four Eyes Principle”: requiring at least two people to assess a potential hit.