Вы находитесь на странице: 1из 4

R E G U LATORY I N ITIATIVE S

BASEL COMMITTEE GUIDANCE ON


HOW TO MANAGE ML AND TF RISK:

PART I

Essential Elements
I n January 2014, the Basel Committee on Banking
Supervision (BCBS), the international standard
setter for banking supervisors, issued Sound
Management of Risks Related to Money Laundering
and Financing of Terrorism, guidance1 to banks on
replaces previously issued Customer Due Diligence
for Banks (October 2001) and Consolidated KYC Risk
Management (October 2004). It also incorporates the
revised 40 Recommendations of the Financial Action
Task Force (FATF) by reference, recognizing that the
how to manage the risks of money laundering (ML) FATFs Recommendations go into more detail. The
and the financing of terrorism (FT). The BCBS has BCBS also points out a number of other documents
long recognized that sound management of ML risks it has issued that factor into the overall management
protects banks and the national banking system, as of ML/FT risks, such as those dealing with the internal
well as preserving the integrity of the international audit function, management of operational risk and
financial system. The guidance combines, updates and enhancing corporate governance.

This is the first of two articles to address the bank, as well as external sources. The the bank. The board also should have a
the BCBS guidance, focusing on the policies and procedures for customer due clear understanding of the ML/FT risks,
essential elements of sound ML/FT risk diligence (CDD), customer acceptance, including timely, complete and accurate
management. The next will address how customer identification and monitoring information related to the risk assessment
to manage ML/FT risk in a group-wide and business relationships and operations to make informed decisions. Along with
cross-border organization as well as the (including products and services offered) senior management, the board should
guidance for supervisors. should be appropriately risk based, with appoint a qualified chief anti-money laun-
any resulting residual risk managed in dering (AML) officer with overall respon-
Risk analysis and governance sibility for the AML function and provide
line with the banks risk profile estab-
The first step in managing ML/FT risks is lished through its risk assessment. The this senior-level officer with sufficient
to identify and analyze the risks, which assessment of risk should be documented authority that issues raised get the appro-
will lead to the design and effective and made available to authorities, such priate attention from the board, senior
implementation of appropriate controls. as supervisors. This assessment is also management and the business lines. This
The analysis should include appropriate useful in scheduling discussions with AML officer becomes the boards proxy
inherent and residual risks at the country, for driving the day-to-day success of the
other parties in the bank to help them see
sectoral, bank and business relationship banks AML efforts, and as such, the board
the risks and the appropriate controls to
level, among others. As a result of this should provide the AML officer with suffi-
mitigate them.
analysis, the bank should develop a thor- cient resources to execute his/her respon-
ough understanding of the inherent risks Another key aspect is proper governance sibilities to oversee compliance with the
in its customer base, products, delivery arrangements, which create a culture of banks AML program.
channels and services offered (including compliance with a strong tone from the
top. The board of directors has a critical Three lines of defense
proposed new services) and the jurisdic-
tions within which it or its customers do oversight role, as they should approve and The BCBS describes three lines of defense
business; this understanding should be oversee policies for risk, risk manage- in the banks AML efforts; first, the line of
based on operational, transaction and ment and compliance, particularly since business, second, compliance and internal
other internal information collected by this is the senior-most management of control functions, and third, internal audit.

1
http://www.bis.org/publ/bcbs275.pdf

80 ACAMS TODAY | SEPTEMBERNOVEMBER 2014|ACAMS.ORG|ACAMSTODAY.ORG


R E G U LATORY I N ITIATIVE S

The first line of defensethe line of The second line of defense broadly AML program, the AML officer must have
businessis responsible for creating, consists of the AML compliance function, sufficient independence from the business
implementing and maintaining policies as well as the larger compliance function, lines, to prevent conflicts of interest and
and procedures, as well as communica- human resources and technology. In all unbiased advice and counsel; the officer
tion of these to all personnel. They must cases, the AML officer is responsible for should not be entrusted with the respon-
also establish processes for screening ongoing monitoring for AML compliance, sibilities of data protection or internal
employees to ensure high ethical and including sample testing and a review of
audit. Depending on the size of the bank,
professional standards and deliver appro- exception reports, to enable the escala-
the AML officer may perform the function
priate training on the AML policies and tion of identified non-compliance or other
of the chief risk or compliance officer;
procedures, based on roles and functions issues to senior management and, where
performed, to help with this process and appropriate, the board. The AML officer but should have a direct reporting line to
keep employees aware of their respon- should be the contact point for all AML senior management and/or the board. Of
sibilities. To facilitate this, employees issues for internal and external author- course, the AML officer must be knowl-
should be trained as soon as possible ities and should have the responsibility edgeable of the legal and regulatory obli-
after being hired, with refresher training for reporting suspicious transactions. To gations, the banks AML regime and the
as appropriate. enable the successful oversight of the ML/FT risks at the bank.

81
R E G U LATORY I N ITIATIVE S

The third line of defense is the audit CDD and acceptance allows for numbered accounts (there may
function. Audit should report to the be special cases where customers should
Banks should develop a Customer
audit committee of the board of direc- not be broadly available throughout the
Acceptance Policy (CAP) to identify the
tors (or similar oversight body) and bank, such as for merger and acquisition
customers that are likely to pose a higher
independently evaluate the risk manage- activity, where unauthorized disclosure
ML/FT risk (e.g., politically exposed
ment and controls of the bank through could result in civil and criminal viola-
persons (PEPs)) as well as those rela-
periodic assessments, including: the tions or for accounts that law enforce-
tionships that the bank will not accept
ment has specifically requested secrecy,
adequacy of the banks controls to miti- (e.g., shell banks or those prohibited
such as for a sting operation), these
gate the identified risks, the effective- under economic sanctions, such as those
should not be allowed to serve as anon-
ness of the banks staffs execution of the imposed by the Office of Foreign Assets
ymous accounts; sufficient personnel
controls, the effectiveness of the compli- Control (OFAC)). Banks should apply
should have full access to the information
ance oversight and quality controls, basic due diligence to all customers
to ensure appropriate CDD on and over-
and the effectiveness of the training. and increase the due diligence as the
sight over these accounts.
The audit function must have sufficient risks increase; some customers may
knowledgeable employees with suffi- be eligible for simplified due diligence Banks should have processes in place to
where the ML/FT risk is low, in accor- enable front office, customer facing
cient audit expertise. Audits should be
dance with applicable law. activities to identify designated enti-
conducted on a risk-based frequency;
ties or individuals in accordance with
periodically, a bank-wide audit should Banks CDD policies should address national legislation (e.g., OFAC-designated
be conducted. Audits should be properly customer and beneficial owner identi- persons), although generally, this will be
scoped to evaluate the effectiveness of fication, verification and risk profiling. done by a back-office function, to avoid
the program, including where external As part of this, banks should identify potential conflicts with a person who
auditors are used. This indicates that customers and verify their identity, as may be a designated terrorist or narcotics
audits may be conducted both at a well as that of beneficial owners. Banks trafficker (instead of a false positive) in a
deeper level on higher risk areas of the should not establish a relationship or bank office.
bank, but also that there must be some carry out transactions until the custom-
ers identity has been verified, unless Recognizing the importance of introduced
overarching audit of the bank as a whole
doing so would interrupt the normal business and reliance on other institutions,
that will enable a broader view, encom- the BCBS guidance indicates that while
conduct of business (in which case the
passing the results of the targeted audits, the transfer of funds from an account in
bank should develop appropriate controls
to develop a bank-wide assessment of while verification and CDD is performed). the customers name from another insti-
the overall AML compliance. Auditors Verification of identity should be through tution may provide some comfort, the
should proactively follow up on their reliable means; for beneficial ownership, bank should still conduct CDD, as it is
findings and recommendations. banks may use a written declaration possible that the other institution closed
from the customer, but should not rely the customers account for cause.
solely on such declarations. However,
in cases where countries do not publish Transaction monitoring systems
information about ownership, banks may
and ongoing monitoring
be limited in what they can do to verify Since the transactional monitoring system

Audits should ownership of a legal entity.


As part of the general CDD for all
is key to mitigating ML/FT risk within the
bank, the BCBS recognizes that AML
risks require more than just appropriate
be properly customers, banks should have poli-
cies that set forth the information to be
collected to enable it to develop a risk
policies and procedures; banks must have
adequate and appropriate monitoring

scoped to profile for the customer or a category


of customers that will enable it to iden-
systems. For most banks, this will involve
an information technology (IT) moni-
toring system; if the bank does not believe
evaluate the
tify activity that deviates from what it
it needs an IT monitoring system, it should
would consider normal and that could be
document the rationale for why it does not
deemed unusual.
need one. The monitoring system should
effectiveness Where CDD cannot be performed, or
customer identify verified, the bank
cover all accounts and transactions of
the banks customers and enable a trend

of the program should not open an account (or should


close one if it has opened one) and should
consider reporting such activity as suspi-
analysis of activity and identify unusual
business relationships and transactions,
particularly with regard to changes in the
cious to appropriate authorities. This transactional profile of customers. The
applies to anonymous accounts as well; IT system should allow the bank to gain
these should not be opened. If a bank a centralized knowledge of information,

82 ACAMS TODAY | SEPTEMBERNOVEMBER 2014|ACAMS.ORG|ACAMSTODAY.ORG


R E G U LATORY I N ITIATIVE S

to an internal review function, elimi-


Banks should be able to risk rate customers and manage nate false positives and report suspi-
cious activity in a timely and confidential

alerts with all the relevant information at their disposal manner. This process should be clearly
spelled out in policies and procedures
and communicated to appropriate staff.
Where suspicious activity has been
reported, the bank should take appro-
for example, having the information orga- account documentation, significant priate action regarding the customer,
nized in different ways, such as organized changes in customer behavior or business including raising the risk rating of the
by customer, by legal entity within a larger profile and unusual transactions (being customer and/or deciding whether to
group and/or by business unit. While the mindful of prohibitions on disclosing retain the relationship (either the account
guidance indicates a bank must have a reports of suspicious activity or tipping or the entire relationship). In some
system, it should be understood that this off customers about such reports). Banks cases, it may make sense to close out
does not mean that there can only be one should also consider the use of their IT one account and not the whole relation-
IT tool that will do all of this; rather, the solutions to periodically screen accounts ship, such as when a customer has both
tools must be able to work together to against sanctions lists (e.g., OFAC) and to a checking account and an outstanding
enable the bank to gain an enterprise level identify foreign PEPs and other high-risk loan. Banks should screen new customers
view of ML/FT risk across the bank. customer types. against applicable sanctions lists and the
existing portfolio against changes to the
Banks should be able to risk rate Management of information sanctions list to identify relationships
customers and manage alerts with all the that may need to be frozen; banks should
relevant information at their disposal. Since one of the primary purposes of
AML rules is to create records that enable have a means of properly freezing any
This indicates a feedback loop should assets identified as part of this process.
exist between the customer risk-rating law enforcement to trace financial trans-
systems and the transaction-monitoring actions back to the people who conduct Conclusion
system, so that as unusual or suspicious them, banks should retain records. Banks
should both record the documents it is While many of the concepts contained in
activity is identified, it increases the the BCBS guidance are not new to the
provided when verifying customer/bene-
risk of the customer. This increased risk industry, it is important to note that this
ficial owner identitywhether a photo-
may also result in higher risk customers guidance is being provided to banking
copy of the document or by recording
being subject to enhanced forms of supervisors to help them develop a
information from the document or non-
monitoring, as well as enhanced CDD common international understanding of
documentary sourceand enter all CDD
and more frequent refresh of CDD infor- what is expected of financial institutions
information into its IT system. The CDD
mation. IT system parameters should be to mitigate ML/FT risk. Harmonized
information should be kept up-to-date
properly tuned for the banks risks, so legislation in the various jurisdictions
and accurate, which will mean periodi-
that it enables identification of alerts that removes many of the incentives for
cally assessing the information, generally
may indicate ML and be reviewed by the money launderers to seek out weaker
on a risk-based frequency.
AML officer. The AML officer should have jurisdictions and promotes a stronger
access to the IT system, even if it is oper- Banks should also document decisions and safer financial system that can better
ated and/or owned by a business line. related to investigations of unusual identify criminal misuse of the system
activity, whether a decision is made to and facilitate the detection, prevention
A critical way to mitigate ML/FT risk is by
file a report of suspicious activity or not. and, eventually, prosecution of financial
using the transaction monitoring system to
Banks should maintain all of these records crimes. While banks continue to get bad
conduct ongoing monitoring of customer
as required by law, for at least five years press for their role in the financial crisis,
activity, building on the information from after closure of the account; if an ongoing
the risk assessments and customer profiles. it is comforting to know that AML efforts
investigation is occurring, relevant CDD undertaken following the guidance
This enables banks to satisfy its obligation records should not be destroyed merely provided by the BCBSand replicated
to identify and report suspicious activity. because the record retention period has internationally throughout the financial
Monitoring systems should be adapted to expired. All documentation, including industrymake our communities a bit
the risks present in the bank, such as if policies and procedures, should be made safer with every report of suspicious
the bank identifies a particular ML scheme available to appropriate supervisors, to activity that results in another criminal
occurring within its jurisdiction. enable an assessment of compliance. taken off the streets.
A bank should have appropriately inte-
grated management information systems
Reporting of suspicious
transactions and asset freezing
to provide both first and second line of Kevin M. Anderson, CAMS, director,
defense staff with timely information to Ongoing monitoring of accounts and Bank of America Corporation, Falls
monitor and analyze customer accounts, transactions will enable banks to identify Church, VA, USA, kevin.m.anderson@
including transaction history, missing unusual activity, refer unusual activity bankofamerica.com

ACAMS TODAY|SEPTEMBERNOVEMBER 2014|ACAMS.ORG|ACAMSTODAY.ORG 83

Вам также может понравиться