Академический Документы
Профессиональный Документы
Культура Документы
Confidential
Warning
This document is confidential and is intended for the use of Designated Director, Principal Officer and the
AML team only. Any circulation of this note to any other persons is prohibited. Co-operative Banks are
advised to ensure absolute confidentiality of this document .
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
INDEX
S.No.
I
II
III
Title
Page No.
General
Annexures
Annexure A - Alert indicators (Red Flag Alerts) for Centralized
AML cell.
16
19
25
28
31
32
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
1.
General
The Prevention of Money Laundering Act, 2002 (PMLA) brought into force with effect from 1 stJuly,
2005, is applicable to all the Reporting Entities (RE) as defined in the said Act. Section 12 of the PMLA
places certain obligations on the reporting entities which are as follows:
(a)
(b)
(c)
(d)
(e)
Maintain a record of all transactions, including information relating to transactions covered under
clause (b), in such manner as to enable it to reconstruct individual transactions;
Furnish to Director within such time as may be prescribed, information relating to such
transactions, whether attempted or executed, the nature and value as may be prescribed.
Verify the identity of its clients in such manner and subject to such conditions as may be
prescribed.
Identity the beneficial owner, in any, of such of its clients, as may be prescribed;
Maintain record of documents evidencing identity of its clients and beneficial owners as well as
account files and business correspondence relating to its clients.
The Prevention of Money Laundering Rules (PML Rules) have been framed under the PMLA.
Rule 3 of the PML Rules specifies the transactions, the records of which are to be maintained.
Rule 7 of the PML Rules prescribes the procedure and manner of furnishing information,
including an obligation to evolve an internal mechanism for detecting the prescribed
transactions. Rule 8 of the PML Rules prescribes the time of furnishing such information and
Rule 9 of the said Rules prescribes the procedure and manner of verification of records of
identity of clients.
The RE, its Designated Directors on the Board and employees are responsible for omissions and
commissions in relation to the reporting obligations under Chapter IV of the PMLA.
Rule 7 (1) of the PML, Rules requires that every RE should communicate to Director, FIU-IND,
the name, designation and address of the Designated Director and the Principal Officer. Rule (2)
(1) (ba) of the PML Rules defines Designated Director to mean a person designated by the
reporting entity to ensure overall compliance with the obligations imposed under Chapter IV of
the Act and the Rules and includes:(i) the managing Director or a whole time Director duly authorized by the Board of
Directors if the reporting entity is a company,
(ii) the managing partner if the reporting entity is a partnership firm,
(iii) the proprietor if the reporting entity is a proprietorship concern,
(iv) the managing trustee if the reporting entity is a trust
(v) a person or individual, as the case may be, who controls and manages the affairs of the
reporting entity if the reporting entity is an unincorporated association or a body of
individuals, and
(vi) Such other person or class of persons as may be notified by the Government if the
reporting entity does not fall in any of the categories above.
3
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
Principal Officer is defined in Rule (2) (1) (f) to mean an officer designated by a RE.
The role of the Designated Director is to ensure overall compliance with the obligations imposed
under Chapter IV of the PMLA and to keep the Board informed of the AML/CFT issues. The
role of the Principal Officer is to furnish all information to director, FIU-IND under Rule 7 and 8
of the PML Rules. Thus the role of the Designated Director is larger and includes all obligations
under Chapter IV of the PMLA.
In exercise of powers conferred under Rule 7(3) of the PML Rules, these guidelines are being
issued by Director, Financial Intelligence Unit-India (FIU-IND) for detecting suspicious
transactions referred to in Rule 3 (1) (D) of the PML Rules in consultation with the Regulator.
These guidelines are illustrative. The reporting entities are advised to generate any other alert, as
they deem fit, to track suspicious transactions based on the definition of suspicious transactions
as given in Rule 2 (g) and also based on maintenance of records of transactions (nature and
value) as given in Rule 3 (1)(D) of the PML Rules.
2.
2.1
Rule 7(3) of the PML Rules empowers the Director, FIU-IND to issue guidelines in consultation with the
regulator with regard to transactions referred to in Rule 3(1). Rule 3(1)(D) of the PML Rules pertains to
suspicious transactions.
The terms transaction and suspicious transaction have been defined in the Prevention of
Money Laundering Rules (PML Rules) as follows:
Transaction is defined under Rule 2(h) of the PML Rules and means a purchase, sale, loan, pledge, gift,
transfer, delivery or the arrangement thereof and includes(i)
(ii)
(iii)
(iv)
(v)
(vi)
(vii)
Opening of an account
Deposits, withdrawal, exchange or transfer of funds in whatever currency, whether in cash or
by cheque, payment order or other instruments or by electronic or other non-physical means.
The use of a safety deposit box or any other form of safe deposit.
Entering into any fiduciary relationship.
Any payment made or received in whole or in part of any contractual or other legal
obligation.
Any payment made in respect of playing games of chance for cash or kind including such
activities associated with casino and.
Establishing or creating a legal person or legal arrangement.
Suspicious transaction is defined under Rule 2(g) of the PML Rules and means a transaction whether or
not made in cash which, to a person acting in good faith4
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
(i)
(ii)
(iii)
(iv)
gives rise to a reasonable ground of suspicion that it may involve the proceeds of crime; as
per schedule A to PMLA; or
appears to be made in circumstances of unusual or unjustified complexity; or
appears to have no economic rationale or bonafide purpose; or
gives rise to a reasonable ground of suspicion that it may involve financing of activities
relating to terrorism.
Rule 8 of the PML Rules provides the timelines for reporting of transactions to FIU-IND. As per Rule
8(2) of the PML Rules, the Principal Officer of a RE is required to furnish the information regarding a
suspicious transaction not later than seven working days on being satisfied that the transaction is
suspicious.
As per Rule 8 (4) of the PML Rules, delay of each day in not reporting a transaction or delay of each day
in rectifying a mis-reported transaction beyond the time limit as specified in the rule shall constitute a
separate violation and penalty can be levied under section 13 of the PMLA.
2.2
2.2.1 Rule 9(12) of the PML Rules requires every reporting entity to exercise ongoing due diligence with
respect to the business relationship with every client and closely examine the transactions in order to
ensure that they are consistent with their knowledge of the client, his business and risk profile and where
necessary, the source of funds. It has also been prescribed that when there are suspicions of money
laundering or financing of the activities relating to terrorism or where there are doubts about the adequacy
or veracity of previously obtained client identification data, the reporting entity shall review the due
diligence measures including verifying again the identity of the client and obtaining information on the
purpose and intended nature of the business relationship, as the case may be. The reporting entity is also
required to apply client due diligence measures to existing clients on the basis of materiality and risk, and
conduct due diligence on such existing relationships at appropriate times or as may be specified by the
regulator, taking into account whether and when client due diligence measures have previously been
undertaken and the adequacy of data obtained.
2.2.2 Rule 9(13) of the PML Rules requires every reporting entity to carry out risk assessment to identify,
assess and take effective measures to mitigate its money laundering and terrorist financing risk for clients,
countries or geographic areas, and products, services, transactions or delivery channels. The risk
assessment should(a) be documented;
(b) consider all the relevant risk factors before determining the level of overall risk and the
appropriate level and type of mitigation to be applied;
(c) be kept up to date; and
(d) be available to competent authorities and self-regulating bodies.
2.2.3 RE should identify the criteria to measure potential money laundering and financing of terrorism
risks of both the customers and transactions.
5
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
2.2.4 Risk associated with a geographic area, in conjunction with other risk factors, provides useful
information as to potential money laundering risks. Factors that may result in a determination that certain
geographic areas pose a higher risk include:
Countries subject to sanctions, embargoes or similar measures issued by, for example, the United
Nations (UN). In addition, in some circumstances, countries subject to sanctions or measures
similar to those issued by bodies such as the UN, but which may not be universally recognized,
may be given credence by a company because of the standing of the issuer and the nature of the
measures.
Countries identified by the Financial Action Task Force (FATF) as non-cooperative countries and
territories (NCCT) in the fight against money laundering or identified by credible sources as
lacking appropriate money laundering laws and regulations.
Countries identified by credible sources as providing funding or support for terrorist activities
Countries identified by credible sources as having significant levels of corruption, or other
criminal activity.
2.2.5 Similarly, risks posed by a client provide significant input into the overall money laundering risk
assessment. Below listed characteristics of clients have been identified with potentially higher money
laundering risks:
money services businesses (remittance houses, money transfer agents and bank note
traders)
casinos, betting and other gambling related activities, or
businesses that while not normally cash intensive, generate substantial amounts of cash
for certain transactions.
Unregulated charities and other unregulated not for profit organisations (especially
those operating on a cross-border basis).
Dealers in high value or precious goods (e.g jewel, gem and precious metals dealers, art
and antique dealers and auction houses, estate agents and real estate brokers).
Clients that are Politically Exposed Persons or PEPs
2.3
2.3.1
Alert Generation
Alert generation is a process by which the preliminary details of suspicious/unusual transactions are
generated to enable the Principal Officer (PO) to analyse and review the details and arrive at a conclusion
as to whether a transaction is suspicious.
An alert is the first step in identification of a suspicious transaction and is a red flag which is generated
arising out of a transaction. Once the alert is generated, it has to be analysed to confirm whether the
transaction is ultimately suspicious or not based on the above definition.
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
2.3.2
Source of Alert
i.
System Dependent: A Cooperative Bank must have system in place to generate alerts
based on certain threshold on the transactions of the client to identify suspicious
transactions. Details of probable system based alerts are at Annexure A.
ii.
2.3.3
An element of subjectivity and application of mind of the Principal Officer (PO) is involved in the
decision making process for reporting suspicious transactions. The PO is expected to gather as much
information as possible from all relevant sources, to arrive at the decision on an alert. The PO and the
staff assisting him in execution of AML/CFT guidelines should have timely access to customer
identification data, other KYC information and records.
While the activities of analysing alert and preparing the documents for managing the alert can be
delegated within the AML compliance team, the ultimate analysis and decision making rests with the PO.
The records verified by and papers related to this decision need to be recorded and retained for audits.
Where the PO is of the opinion that a transaction is not reportable, decision on closure and reporting
should be taken by the PO and it must be ensured that reason for not reporting the suspicious transactions
are clearly recorded.
An independent review of the process of generation of alerts by an independent person, would confirm
whether all the alerts which are required to be generated, are indeed generated as per the rules. The
responsibility of deciding on the alerts and reporting/non-reporting of the Suspicious Transactions to FIUIND cannot be delegated to any regional team members as there is a risk of the information being tippedoff.
The PO also needs to review the list of alerts and the approach from time to time to ensure that the
reporting mechanism is complete and is in line with the expectations. It is equally important that the PO
conducts surprise checks of the data being monitored by the AML compliance unit and check few random
transactions to ensure that there is no gap and all unusual transactions have been indeed highlighted to the
PO on a regular basis.
2.3.4
The PMLA and the PML Rules require every reporting entity (which includes Co-operative Banks) to
furnish prescribed reports, including suspicious transaction report (STR) to FIU-IND. The reports are to
7
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
be furnished through the FINnet gateway portal (FINgate), covering the details mentioned in Annexure C
which is an extract of the Reporting Format Guide. Details like information regarding clients,
Receipt/payment received from client should be covered under ground of suspicion. A few illustrative
examples of Grounds of Suspicion and Subjective test for identifying suspicious transactions are given
in Annexure D.
Indicative list of customers with potentially high ML/TF risk is given in Annexure E. Indicative
list of high / medium risk products and services is given in Annexure F. Indicative list of high/medium
risk geographies is given in Annexure G. FIU-IND website www.fiuindia.gov.in, should be referred to
for detailed guidance regarding registration and filing of reports. Detailed FAQs are also available in the
website along with other relevant user guides.
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
Annexure - A
Alert Indicators (Red Flag Alerts) for centralised AML cell :
S. No.
1
Alert Indicator
WL2.1
Match
with
other
criminal list
Interpol, EU, OFAC, Commercial lists (WorldCheck, Factiva, LexisNexis, Dun & Bradstreet etc.)
and other sources
TM1.1
High
value
cash
deposits in a day
TM1.2
High
value
cash
withdrawals in a day
deposits in a day
withdrawals in a day
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
S. No.
Alert Indicator
TM2.1
High
value
cash
deposits in a month
10
TM2.2
High
value
cash
withdrawals in a month
11
12
13
14
15
16
number of transactions in a
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
S. No.
Alert Indicator
17
account
18
19
20
TM6.1
High
transactions
value
inconsistent
cash
with
profile
21
TM6.2
High
cash
activity
22
of
cash
below
INR
TY1.1
deposits
Splitting
just
in a month
23
TY1.2
times in a month
Splitting
of
cash
24
TY1.4
Routing
of
funds
25
11
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
S. No.
Alert Indicator
26
27
28
recipient
29
TY3.1
TY3.2
Customer
providing
Multiple
customers
working together
Date of
31
location
32
in different location
followed
by immediate
ATM
withdrawals
33
remittance
from
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
S. No.
Alert Indicator
34
remittance
unrelated
parties
from
used
for
specified activities
35
[Z]
37
TY5.3
Large
value
card
TY5.4
Large
value
cash
card
39
withdrawals
against
international card
40
41
42
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
S. No.
Alert Indicator
43
44
TY7.4
Frequent
locker
operations
45
46
RM1.2
High
RM1.3
High
transactions
value
cash
transactions in NPO
47
value
related
to
cash
real
estate
48
RM1.4
High
transactions
by
value
cash
in
dealer
50
RM2.4
new account
51
Inward
remittance
52
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
S. No.
Alert Indicator
laundering
or
drug
trafficking
perspective.
53
54
Sources of alert
WL Watch List
TM - Transaction Monitoring
TY Typology
RM Risk Management System.
15
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
Annexure - B
Alert Indicators for Branches
S. No.
1
Alert Indicator
CV1.1 - Customer left without Customer did not open account after being
opening account
or
documents
that
appears
to
be
are
not
be non existent
presented
existent
5
documents
CV4.1
Difficult
to
beneficial owner
LQ1.1
Customer
is
LQ2.1
Customer
is
criminal
activities
of
customer
10
criminal offences
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
S. No.
Alert Indicator
customer
11
EI1.1 - Customer did not complete Customer did not complete transaction after
transaction
12
13
Customer
over
cautious
in
explaining
EI2.3
Customer
inconsistent information
15
EI3.1 - Customer acting on behalf Customer has vague knowledge about amount
of a third party
is
accompanied
by
unrelated
individuals.
16
EI3.2 - Multiple customers working Multiple customers arrive together but pretend
as a group
17
18
conduct transactions
on
different
occasions
19
20
EI4.4 - Customer could not explain Customer could not explain source of funds
satisfactorily
17
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
S. No.
Alert Indicator
source of funds
21
EI5.1
Transaction
unnecessarily complex
22
EI5.2
Transaction
stated purpose.
has
economic rationale
23
24
EI6.1
Unapproved
remittance in NPO
25
not
approved by FCRA
PC1.1 - Complaint received from Complaint received from public for abuse of
public
26
27
Sources of alert
CV Customer Verification
LQ - Law Enforcement Agency Query.
MR Media Reports
EI Employee initiated
PC Public Complaint
BA Business Associates.
18
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
Annexure - C
Description
Length
Mandatory
Yes
100
No
Yes
Source Of Alert
CV Customer Verification
WL - Watch List
TY - Typology
TM - Transaction Monitoring
RM - Risk Management System
MR - Media Reports
LQ - Law Enforcement Agency Query
EI - Employee Initiated
PC- Public Complaint
BA Business Associates
ZZ - Others
XX - Not Categorised
Red Flag indicator which had generated alert resulting in STR.
Alert Indicator
The reporting entity may use a standard language of the red flag
indicator. The reporting entity may use the language used in the
instructions of the regulator or communication of FIU-IND.
One STR can have more than one Alert Indicator. In the XML format
more than one indicator can be mentioned for a report. In the fixed
text format, the number of indicators for a report is limited to three.
Y- Yes
N- No
X Not categorised
One STR may be related to more than one clause.
19
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
Element
Description
Length
Mandatory
Yes
Yes
Yes
Yes
Y- Yes
N- No
X Not categorised
One STR may be related to more than one clause.
Whether the suspicion is on account of clause (c) of Rule 2(1)
(g) relating to no economic rationale or bonafide purpose.
Suspicion Due
To Non
Economic
Rationale
Y- Yes
N- No
X Not categorized
One STR may be related to more than one clause.
Y- Yes
N- No
X Not categorised
20
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
Element
Description
Length
Mandatory
4000
Yes
4000
No
Yes
Grounds Of
Suspicion
Summary of suspicion
R - Information received
S - Information sent
N - No correspondence sent or received
X - Not categorised.
Refer section 11.1.7.2 for further details on enumerations.
21
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
Element
LEA Details
Description
Contact details of person in the law enforcement agency which is
conducting the investigation.
The details of the investigation should be furnished under Details Of
Investigation above.
Length
Mandatory
250
No
Yes
Yes
Yes
C - Complete
P - Partial
X - Not categorised
Refer section 11.1.7.4 for further details on enumerations.
N - No
X - Not categorised
The reporting entity cant upload additional documents with the
report. They will be sent a separate request for providing
additional information.
22
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
Remarks
CV
Customer Verification
WL
Watch List
TY
Typology
TM
Transaction Monitoring
RM
MR
Media Reports
EI
Employee Initiated
PC
Public Complaint
BA
Business Associates
ZZ
Others
XX
Not Categorised
LQ
23
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
Enumeration for LEA Informed
Code Description
Remarks
Information received
Information sent
Not Categorised
Description
Remarks
P1
P2
High Priority
P3
Normal Priority
Reasonable time
XX
Not Categorised
Remarks
Complete
Partial
Not Categorised
24
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
Annexure - D
ii)
In the circumstances when a branch believes that it would no longer be satisfied that it
knows the true identity of the account holder, the branch should also file an STR.
iii)
Branches should pay special attention to all complex, unusually large transactions and all
unusual patterns, which have no apparent economic or visible lawful purpose.
Transactions that involve large amounts of cash inconsistent with the normal and expected
activity of the customer should particularly attract the attention of the branch. Very high
account turnover inconsistent with the size of the balance maintained may indicate that
funds are being 'washed' through the account. High-risk accounts have to be subjected to
intensified monitoring.
iv)
Branch should exercise ongoing due diligence with respect to the business relationship
with every client & closely examine the transactions in order to ensure that they are
consistent with their knowledge of the client, his business and risk profile and where
necessary, the source of funds.
v)
If a branch has reason to believe that a customer is intentionally structuring wire transfer to
below Rs.50000/- (Rupees fifty thousand) to several beneficiaries in order to avoid
reporting or monitoring, the branch must insist on complete Customer Identification before
effecting the transfer. In case of non-cooperation from the customer, efforts should be
made to establish his identity and STR should be made.
vi)
Wire transfers lacking complete originator information shall be identified and this must be
considered as a factor in assessing whether a wire transfer or related transactions are
suspicious. If they are found to be of suspicious nature then STR to be created.
vii)
Money Mules can be used to launder the proceeds of fraud schemes (e.g. phishing and
identity theft) by criminals who gain illegal access to deposit accounts by recruiting third
parties to act as Money Mules. The operations of mule accounts can be minimized if
25
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
branches follow the guidelines contained in the RBI Circulars on KYC. Branches are,
therefore, advised to strictly adhere to the guidelines on KYC issued and to those relating
to periodical updation of Customer Identification data after the account is opened.
Branches are also required to monitor transactions in order to protect themselves and their
customers from misuse by such fraudsters.
viii) Branches are required to apply enhanced due diligence measures on high and medium
risk customers. Accordingly, branches are also required to subject these high and medium
risk accounts to intensified transaction monitoring. Higher risk associated with such
accounts should be taken into account by the branches to identify suspicious transactions
for filing STRs.
ix)
x)
The transactions that give rise to a reasonable ground of suspicion that these may involve
financing of the activities relating to terrorism should also be reported.
xi)
xii)
xiii)
It is imperative that the bank has a system in place, which will ensure that the account of
the person of any dubious back ground is not opened or any suspicious transaction if
routed through the branch will be identified. The CIP module of the AML package throws
the alerts, if the name of the accountholder is similar to the name of the persons
enumerated in the various lists uploaded in the system (UN sanctioned Terrorist list,
Mumbai Police List, RBI cautioned list of exporters). If the branches are unable to
establish if the true identity of the account holder is different from the name appearing in
the list, then the same need to be reported as STR.
26
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
Transaction pattern are not consistent with normal business, personal, remittance or
tourist spending activity. For eg: High value transactions in the account of a maid servant,
tailor etc.;
ii)
The amounts or frequency or the stated reason of the transaction does not make proper
business sense or not commensurate with the profile of the customer, say student, etc.;
iii)
Large number of transfers received at once or over a certain period of time which is much
greater than what would be expected for such a receiver;
iv)
v)
vi)
vii) Personal funds sent at a time not associated with salary payments;
viii) Several accounts with same authorized signatories/introducer;
ix)
Cash deposited and transferred to own account with other bank or veceversa;
x)
xi)
Walk in customer especially saying that he does not have any bank account till date;
It should be ensured that the business transactions are not routed through other than the
business accounts. eg: Business transactions routed through savings account should be treated
as suspicious
27
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
Annexure E
Indicative List of High / Medium risk customers
The following lists are indicative and can be expanded. The banks have the option to upgrade
the risk categorisation (i.e. medium to high) for any specific industry / segment.
Characteristics of High Risk Customers
1. Individuals and entities in various United Nations' Security Council Resolutions
(UNSCRs) such as UN 1267 etc.;
2. Individuals or entities listed in the schedule to the order under section 51A of the
Unlawful Activities (Prevention) Act, 1967 relating to the purposes of prevention of, and
for coping with terrorist activities;
3. Individuals and entities in watch lists issued by Interpol and other similar international
organizations;
4. Customers with dubious reputation as per public information available or commercially
available watch lists;
5. Individuals and entities specifically identified by regulators, FIU and other competent
authorities as high-risk;
6. Customers conducting
their
business relationship
or
transactions
in
unusual
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
15. Companies having close family shareholding or beneficial ownership ;
16. Complex business ownership structures, which can make it easier to conceal underlying
beneficiaries, where there is no legitimate commercial rationale;
17. Shell companies which have no physical presence in the country in which it is
incorporated. The existence simply of a local agent or low level staff does not constitute
physical presence;
18. Investment
Management
Money
Management
Company/Personal
Investment
Company;
19. Accounts for "gatekeepers" such as accountants, lawyers, or other professionals for their
clients where the identity of the underlying client is not disclosed to the financial
institution;
20. Client Accounts managed by professional service providers such as law firms,
accountants, agents, brokers, fund managers, trustees, custodians, etc;
21. Trusts, charities, NGOs/NPOs (especially those operating on a cross-border basis)
unregulated clubs and organizations receiving donations (excluding NPOs/NGOs
promoted by United Nations or its agencies);
22. Money Service Business: including seller of: Money Orders / Travelers Checks / Money
Transmission / Check Cashing / Currency Dealing or Exchange;
23. Business accepting third party checks (except supermarkets or retail stores that accept
payroll checks/cash payroll checks);
24. Gambling/gaming including Junket Operators arranging gambling tours;
25. Dealers in high value or precious goods (e.g. jewel, gem and precious metals dealers,
art and antique dealers and auction houses, estate agents and real estate brokers);
26. Customers engaged in a business which is associated with higher levels of corruption
(e.g., arms manufacturers, dealers and intermediaries;
27. Customers engaged in industries that might relate to nuclear proliferation activities or
explosives;
28. Customers that may appear to be Multi level marketing companies etc.
29
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
Characteristics of Medium Risk Customers
1. Non-Bank Financial Institution;
2. Stock brokerage;
3. Import / Export;
4. Gas Station;
5. Car / Boat / Plane Dealership;
6. Electronics (wholesale);
7. Travel agency;
8. Used car sales;
9. Telemarketers;
10. Providers of telecommunications service, internet caf, IDD call service, phone cards,
phone center;
11. Dot-com company or internet business;
12. Pawnshops;
13. Auctioneers;
14. Cash-Intensive Businesses such as restaurants, retail shops, parking garages, fast food
stores, movie theaters, etc.;
15. Sole Practitioners or Law Firms (small, little known);
16. Notaries (small, little known);
17. Secretarial Firms (small, little known);
18. Accountants (small, little known firms);
19. Venture capital companies.
30
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
Annexure F
Indicative List of High / Medium risk Products & Services
1. Electronic funds payment services such as Electronic cash (e.g., stored value and
payroll cards), funds transfers (domestic and international), etc
2. Electronic banking
3. Private banking (domestic and international)
4. Trust and asset management services
5. Monetary instruments such as Travelers Cheque
6. Foreign correspondent accounts
7. Trade finance (such as letters of credit)
8. Special use or concentration accounts
9. Lending activities, particularly loans secured by cash collateral and marketable securities
10. Non-deposit account services such as Non-deposit investment products and Insurance
11. Transactions undertaken for non-account holders (occasional customers)
12. Provision of safe custody and safety deposit boxes
13. Currency exchange transactions
14. Project financing of sensitive industries in high-risk jurisdictions
15. Trade finance services and transactions involving high-risk jurisdictions
16. Services offering anonymity or involving third parties
17. Services involving banknote and precious metal trading and delivery
18. Services offering cash, monetary or bearer instruments; cross-border transactions, etc.
31
Guidelines on detecting suspicious transactions under Rule 7(3) of the PML Rules, 2005 (2016)
Confidential
Annexure - G
Locations
1. Locations within the country known as high risk for terrorist incidents or terrorist
financing activities (e.g. sensitive locations/cities and affected districts)
2. Locations identified by credible sources as having significant levels of criminal,
terrorist, terrorist financing activity.
3. Locations identified by the bank as high-risk because of its prior experiences,
transaction history, or other factors}.
32