The IBA WGR on AML/CFT 2010 : Alert Generation
Summary Chapter 6: Generation of Alerts
Alert generation involves application of scenarios and risk factors to detect potentially suspicious activity. Effective alert generation is very critical to the quantity and quality of the STRs generated by the bank. Indicators are circumstances that indicate suspicious nature of transactions. Suspicious transactions may be detected from one indicator or a set of indicators
In
the new reporting format specifications, the banks are required to provide
information about the source of alert and the alert indicator(s) for detection
of suspicious transactions. The explanation of the suspicion related details is
provided in Appendix-D of the IBA Working Group report 2009.
Bank
should have adequate process and systems for detection of transactions and
reporting of suspicion identified by the employees at Branches /Departments and
using Alert Generation Software.
Identification of Suspicious Transactions by Branches
/Depts
There
are certain types of transactions which can be identified at the branches/Dept
and is more likely to be related with following sources:
Customer verification (CV): Detected during
customer acceptance, identification or verification (excluding reasons
mentioned in other codes)(e.g, use of forged ID wrong address etc..)
Law Enforcement Agency Query (LQ): Query or letter
received from law enforcement agency LEA) or intelligence (e.g., blocking order
received, transaction details sought etc..)
Media Reports (MR): Adverse media
reports about customer (e.g. newspaper reports)
Employee Initiated (EI): Employee raised
alert (e.g. beg
behavioural
indicators such as customer had no information about transaction , attempted
transaction etc..)
Public Complaint (PC): Complaint
received from public(abuse of account for committing fraud)
Business Associates (BA): Information
received from other institutions, subsidiaries or business associates (e.g.
cross-border referral , alert raised by agent etc..).
The
list of commonly used alert indicators for detection of suspicious transactions
at Branches / Dept is given in appendix-E. The first two characters in the
alert indicator code denote the source vof alerts as mentioned above. Banks are
also encouraged to apply additional alert indicators to address specific risk
faced by them
The
bank in order to fulfill its obligations under the PMLA has to report these
suspicious transactions. To enable seamless reporting and at the same time not
to burden the staff with additional requirement of investigating the case and
establishing suspicion, a designated
email ID or portal may be made available to the staff at the branches to log in
the details of the suspicion identified/attempted transactions.
The AML Cell should access the e-mail /portal.
Once the e-mail is received/details logged in a portal, the centralised AML Cell should consider creating manual
alerts in the AML software. Where required review of the KYC Document obtained
at the time of opening the accounts, transactions in the account etc.,,should
be carried out by the AML Cell and additional information if required from the
branches to be obtained to arrive at any decision. Creation of manual alert
would help in allotting an alert id for each case in the AML Software, which
would in turn help in ‘case Management’
The
review /investigation process to be followed would be the same as applicable in
case of alerts generated through the AML software which is detailed in the
section below
Identification
of Suspicious Transactions at Centralized AML Cell
All
banks are required to implement a sophisticated ‘AML Software’ application to
throw alerts for transaction monitoring which can be centrally analysed by the
Central AML Cell. It is an important requirement for robust transaction
monitoring system, especially in view of the high number of transactions that
the banks handle everyday, which is making it increasingly difficult to monitor
this through manual methods.
RBI
circular requires every bank to put in place an appropriate software
application to generate alerts when the transactions are inconsistent with risk
categorization and updated profile of customers. It is needless to add that a
robust software throwing alerts is essential for effective identification and
reporting of suspicious transaction (para 2.19(iv)d) of circular dated July 01,
2010)
The identification of suspicious transactions at centralized AML cell using alert generation software is more likely to be related to following sources:
Watch List (WL): The customer
details matched with watch lists(e.g., UN List, Interpol List etc..)
Typology (TY) : Common
typologies of money laundering, financing of terrorism or other crimes(e.g.,structuring
of cash deposits etc..)
Transaction
Monitoring ( T M): Transaction monitoring alert (e.g..,
unusually large transaction , increase in transaction volume etc..)
Risk Management
System (RM):
Risk management system based alert (e. g. high risk customer, country,
location, source of funds, transaction type etc..)
The
list of commonly used alert indicators for detection of suspicious transactions
at centralized AML Cell using alert generation software is given in Appendix F.
the first two characters in the alert indicator code denote the source of alert
as mentioned above
Banks
will have to select appropriate number and value thresholds before implementing
the alert indicators using alert generation software. Banks are also encouraged
to apply additional alert indicators to address specific risks faced by them
Implementation Approach
Banks
should assess their existing capability of alert generation and take steps to
implement relevant indicators in a time bound manner. The alert indicators are
broadly segregated into two phases to assist banks in planning a phase wise implementation.
Phase |
Implementation
of Alerts |
Short
term (within 12 months) |
All
relevant alerts under Customer Verification(CV) |
All
relevant alerts under Customer Verification(CV) |
|
All
relevant alerts under Law enforcement Agency Querry(LQ) |
|
All
relevant alerts under Media Reports(MR) |
|
All
relevant alerts under Employee Initiated(EI) |
|
All
relevant alerts under Public Complaint(PC) |
|
All
relevant alerts under Business Associates(BA) |
|
Alert
Indiactors WL1.1 and WL1.2 under Watch List (WL) |
|
Selected
alerts under Transaction Monitoring( T
M ) |
|
Selected
alerts under Typology(TY) |
|
Selected
alerts under Risk Management System (RM) |
|
Medium
Term (Within 36 months) |
All
remaining alerts under Watch List (WL) |
All
remaining alerts under Transaction
Monitoring (T M) |
|
All
remaining alerts under Typology(TY) |
|
All
remaining alerts under Risk Management
System(RM) |
Happy Reading,
Those who read this, also read:
1. The IBA Working Group Report on AML/CFT 2010 : Alert Management
2. The IBA Working Group Report on AML/CFT 2010 : Appendices A, B and C
3. The IBA Working Group Report on AML/CFT 2010 : Appendices D & E
4. The IBA Working Group Report on AML/CFT 2010 : Leagal Franework and Risk Assessment
5. The IBA Working Group Report on AML/CFT 2010 : Preparation & Submissionof STRs
Comments
Post a Comment