Module 3 (Part 2) Flashcards

1
Q

What are the 4 pillars

A
  1. A system of internal controls
  2. compliance function/designated BSA officer
  3. Employee training
  4. Independent Review
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the first line of defense

A

effective policies, procedures, and internal controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what do these three parts do

A

define and support the entire AML/CFT program, while at the same time, act as a blueprint that outlines how an institution is fulfilling its regulatory requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the second line of defense

A

the compliance function/designated BSA officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is it the second line of defense

A

the compliance function is responsible for monitoring the controls of the business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

can the compliance function be designated with a one size fits all mentality

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

why

A

no two institutions will have exactly the same compliance structure because the risk facing each institution is going to be different as identified in their respective risk assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are the five factors in which the sophistication of the compliance function should be based upon

A

the institutions:

  1. nature
  2. Size
  3. Complexity
  4. Regulatory environment
  5. Specific risk associated with the products, services and clientele
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

in most cases what is the BOD responsible for

A

appointing a qualified individual as an institution’s AML/CFT Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is this compliance officer responsible for

A

managing all aspects of the AML/CFT compliance program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what can these duties consist of (5 items)

A
  1. designing and implementing the program
  2. making necessary changes and updates to the program
  3. disseminating information about the program’s successes and failures to key staff members
  4. constructing AML/CFT related content for staff training programs
  5. managing adherence to applicable AML/CFT laws and regulations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what should an effective AML/CFT training program do

A

explain the relevant AML/CFT laws and regulations

Cover the institutions’ policies and procedures used to mitigate money laundering risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is the first steep in designing an effective AML/CFT training program

A

identify the target audience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

will the topics to train be the same at every institution?

A

no, they will vary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are the matters that should be factored into training

A

general background and history pertaining to money laundering controls, including the definitions of money laundering and terrorist financing, why criminals do it, and why stopping them is important

legal framework on what aml/cft laws aply to institutions and their employees

penalties for violations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

how should training occur

What are the three key aspects of training to determine

A

it should be ongoing and on a regular schedule

  1. how to provide the training
  2. what to focus the training on
  3. who to train
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the third line of defense

A

independent audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

who must perform it

A

people not involved with the organizations AML/CFT compliance staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

why must it be independent

A

to ensure its effectiveness and to look for new risk factors

20
Q

who should those performing the audit report to

A

BOD or to a designated board committee composed primarily/completely of outside directors

21
Q

what must be created at a company

A

a culture of compliance

22
Q

What are the four measures that FATF recommends institutions incorporate into their CDD programs

A
  1. Identifying the customer and verifying the customer’s identity using reliable independent source documents, data, or information
  2. identifying the beneficial owner and taking reasonable measures to verify the identity of the beneficial owner
  3. Understanding and as appropriate, obtaining information on the purpose and intended nature of the business relationship
  4. Conducting ongoing due diligence on the business relationship and scrutiny of transactions undertaken throughout the course of the relationship to ensure that the transactions being conducted are consistent with the institution’s knowledge of the customer, their business, risk profile and, where necessary, the source of funds
23
Q

what should occur with higher risk customers and their transactions

A

should be reviewed even more closely at account opening and more frequently during their account relationships

24
Q

what should the bank do to verify the identify of the customer

A

use reliable, independent source documents, data or information

25
Q

what can be utilized for the verification

A

documentary or non documentary methods

26
Q

what do documentary verifications include

A

obtaining a copy of the certificate of incorporation, memorandum and articles of association, partnership agreement, or any other document certifying the existence of the entity

27
Q

what about for established corporate entities

A

reviewing a copy of financial statements

28
Q

what do non documentary verification methods include

A
  1. Undertaking a company search and/or other commercial inquiries to ascertain that the legal person has not been, or is not in the process of being, dissolved or terminated
  2. using an independent information verification process, such as by accessing public corporate registers, private databases or other reliable independent sources (lawyers and accountants)
  3. validating the legal entity identifier and associated data in the public access service
  4. obtaining prior bank references
  5. visiting the corporate entity, where practical
  6. contacting the corporate entity by telephone, mail, or e-mail
29
Q

what is a way to financially isolate a target

A

Economic Sanctions

30
Q

what are the 3 categories that sanctions can fall within

A
  1. Targeted sanctions
  2. Sectoral sanctions
  3. Comprehensive sanctions
31
Q

What are targeted sanctions

A

aimed at specifically named individuals

32
Q

what do these sanctions often include

A

the freezing of assets and travel bans where possible

33
Q

what are sectoral sanctions

A

aimed at key sectors of an economy to prohibit a very specific subset of financial dealings within those sectors to impede future growth

34
Q

what are comprehensive sanctions

A

generally prohibit all direct or indirect import/export, trade brokering etc.

35
Q

what are they often aimed at

A

regimes responsible for gross human rights violations and nuclear proliferation

36
Q

what should be done before a financial institution starts doing business with a new customer

A

review the various country sanction program requirements as well as published lists of known or suspected terrorists, narcotics traffickers, and other criminal actors for potential matches

37
Q

what does KYE stand for

A

know your employee

38
Q

what does this program mean

A

that the institution has a program in place that allows it to understand an employee’s background, conflicts of interest, and susceptibility to money laundering complicity

39
Q

what is the deal with the sheer number of people and volume of regulations

A

makes manual compliance difficult, if not impossible

40
Q

what have most institutions done

A

have designated technology systems to automate their compliance activities,

41
Q

what should the automated system have the ability to do (5 items)

A
  1. Monitor transactions and identify anomalies that might indicate suspicious activity
  2. gather CDD information for new and existing customers, score customer responses, and store CDD data for subsequent use
  3. conduct advanced evaluation and analysis of suspicious/unusual transactions identified by the monitoring system in the context of each client’s risk profile and that of their peer group
  4. view individual alerts within the broader context of the client’s total activity at the institution
  5. use data from the institution’s core customer and transaction systems and databases to inform/update monitoring and case management services
42
Q

what are the 5 ML/TF red flags

A
  1. Unusual customer identification circumstances
  2. Unusual cash transactions
  3. Unusual wire transfer transactions
  4. Unusual activity indicative of trade based money laundering
  5. unusual activity indicative of human trafficking
43
Q

what are some examples of an unusual customer identification circumstance

A

customer furnishes unusual or suspicious ID documents or declines to produce originals for verification

customer is unwilling to provide personal background info when opening an account

customer does not wish a statement of his account or any mail sent to him

customer’s internet protocol (IP) address does not match the identifying info provided during online registration

44
Q

what are some unsual cash transactions

A

customer makes large cash deposit containing many larger denomination bills

customer withdraws cash In amounts under the reporting threshold

customer makes frequent deposits or withdrawals of large amounts of currency for no apparent business reason, or for a business that generally does not generate large amounts of cash

45
Q

what are some unusual wire transfer transactions

A

wire transfers are sent or received from the same person to or from different accounts

wire transfer activity to and from secrecy havens or higher risk geographic locations without apparent business reason or is inconsistent with customer’s transaction history

an increase in international wire transfer activity in an account with no history of such activity or where the stated business of the customer does not warrant it

46
Q

what are unusual activity indicative of trade based money laundering

A

discrepancies in the description of goods or commodity in the invoice or of the actual goods shipped

no apparent business relationship between the parties and transactions

frequent transactions in round or whole dollars

lack of appropriate documentation to support transactions

47
Q

what are examples of activity indicative of human trafficking

A

a business customer does not exhibit normal payroll expenditures pay roll costs can be non existent or extremely low for the size of the customers alleged operations, workforce and/or business line/model

multiple, apparently unrelated, customers sending wire transfers to the same beneficiary

payments to employment or student recruitment agencies that are not licensed/registered or that have labor violations

a customer establishes an account or visits a branch to conduct transactions while escorted by a third party

inflows are largely received in cash where substantial cash receipts are inconsistent with the customer’s line of business, extensive use of cash to purchase assets and to conduct transactions