AML/CFT Risk Management at RE level
According to the paper 'Customer Due Diligence' published by Basel Committee on Banking Supervision in 2001, the inadequacy
or absence of KYC standards can subject banks to serious customer and
counterparty risks, especially reputational, operational, legal and concentration
risks. It is worth noting that all these risks are interrelated. However, any
one of them can result in significant financial cost to banks (e.g. through the
withdrawal of funds by depositors, the termination of inter-bank facilities,
claims against the bank, investigation costs, asset seizures and freezes, and
loan losses), as well as the need to divert considerable management time and
energy to resolving problems that arise.
Reputational
risk poses a major threat to banks, since the nature of their business requires
maintaining the confidence of depositors, creditors and the general
marketplace. Reputational risk is defined as the potential that adverse
publicity regarding a bank’s business practices and associations, whether
accurate or not, will cause a loss of confidence in the integrity of the
institution. Banks are especially vulnerable to reputational risk because they
can so easily become a vehicle for or a victim of illegal activities
perpetrated by their customers. They need to protect themselves by means of
continuous vigilance through an effective KYC programme. Assets under
management, or held on a fiduciary basis, can pose particular reputational
dangers.
Operational
risk can be defined as the risk of direct or indirect loss resulting from
inadequate or failed internal processes, people and systems or from external
events. Most operational risk in the KYC context relates to weaknesses in the
implementation of banks’ programmes, ineffective control procedures and failure
to practise due diligence. A public perception that a bank is not able to
manage its operational risk effectively can disrupt or adversely affect the
business of the bank.
Legal risk
is the possibility that lawsuits, adverse judgements or contracts that turn out
to be unenforceable can disrupt or adversely affect the operations or condition
of a bank. Banks may become subject to lawsuits resulting from the failure to
observe mandatory KYC standards or from the failure to practise due diligence.
Consequently, banks can, for example, suffer fines, criminal liabilities and
special penalties imposed by supervisors. Indeed, a court case involving a bank
may have far greater cost implications for its business than just the legal
costs. Banks will be unable to protect themselves effectively from such legal
risks if they do not engage in due diligence in identifying their customers and
understanding their business.
Supervisory
concern about concentration risk mostly applies on the assets side of the
balance sheet. As a common practice, supervisors not only require banks to have
information systems to identify credit concentrations but most also set
prudential limits to restrict banks’ exposures to single borrowers or groups of
related borrowers. Without knowing precisely who the customers are, and their
relationship with other customers, it will not be possible for a bank to
measure its concentration risk. This is particularly relevant in the context of
related counterparties and connected lending.
On the liabilities
side, concentration risk is closely associated with funding risk, particularly
the risk of early and sudden withdrawal of funds by large depositors, with
potentially damaging consequences for the bank’s liquidity. Funding risk is
more likely to be higher in the case of small banks and those that are less
active in the wholesale markets than large banks. Analysing deposit
concentrations requires banks to understand the characteristics of their
depositors, including not only their identities but also the extent to which
their actions may be linked with those of other depositors. It is essential
that liabilities managers in small banks not only know but maintain a close
relationship with large depositors, or they will run the risk of losing their
funds at critical times.
Customers
frequently have multiple accounts with the same bank, but in offices located in
different countries. To effectively manage the reputational, compliance and
legal risk arising from such accounts, banks should be able to aggregate and
monitor significant balances and activity in these accounts on a fully
consolidated worldwide basis, regardless of whether the accounts are held on
balance sheet, off balance sheet, as assets under management, or on a fiduciary
basis.
Both the
Basel Committee and the Offshore Group of Banking Supervisors are fully
convinced that effective KYC practices should be part of the risk management
and internal control systems in all banks worldwide. National supervisors are
responsible for ensuring that banks have minimum standards and internal
controls that allow them to adequately know their customers. Voluntary codes of
conduct4 issued by industry organisations or associations can be of
considerable value in underpinning regulatory guidance, by giving practical
advice to banks on operational matters. However, such codes cannot be regarded
as a substitute for formal regulatory guidance.
From a risk
management perspective, before about 2005, AML/CFT compliance shortcomings
generally did not trigger substantive civil and criminal enforcement actions
against banks. Over the last 10 years there has been an increasing emphasis on
AML/CFT compliance, civil enforcement actions, civil penalties, and criminal
prosecutions (deferred and not deferred). This change in emphasis and approach
to enforcement of relevant regulations was a result of governments viewing AML/
CFT compliance as part of the jurisdiction’s national security infrastructure
versus the earlier view of AML/CFT compliance as more of a bank internal
matter. This shift of prominence and approach to risk management expectations has
had substantial effects within jurisdictions as well as across the globe’s
financial activities. For example, increasing compliance costs, new risk/reward
calculation for financial relationships, and the resultant phenomena of
de-risking. This shift has affected several global banks, which have been
subject to varying types of civil and criminal sanctions (financial penalties
and remedial regulatory actions) and required to substantially enhance of their
AML/CFT programs. In addition, FATF’s new mutual evaluation standards,
implemented in 2014, which include an effectiveness assessment, have increased
pressure on emerging market jurisdictions to reassess and enhance portions of
their own AML/CFT infrastructure and internal requirements.
As a result,
governments and financial sector supervisors worldwide have increasingly
emphasized the importance of having a strong culture of AML/CFT compliance
within their financial sector and its leadership, including the Board of Directors,
senior management, middle management, and owners of banks regardless of size,
complexity, or region. This increasing emphasis and attention on compliance and
financial and criminal penalties (including potential individual liability
against AML officers and others) has impacted the cost of AML/CFT compliance
and banks’ risk appetites. It also had a direct follow-on affect in the
provision of correspondent banking services (for example, de-risking).
Source: IFC
Risk Management is one of the components of KYC Policy along with a) Customer Acceptance Policy; b) Customer identification Procedures; and c) Monitoring of Transactions for the purpose of AML/CFT compliance.
Some terms to remember
Risk Factors – Means variables that,
either on their own or in combination, may increase or decrease the ML/TF/PF
risk posed by an individual business relationship or occasional transaction.
Risk Management – The process that
includes the recognition of ML/TF/PF risks, the assessment of these risks, and
the development of methods to manage and mitigate the risks that have been
identified.
Inherent Risk – The intrinsic risk of
an event or circumstance that exists before the application of controls or mitigation
measures.
Residual Risk – The level of risk that
remains after the implementation of mitigation measures and controls.
Likelihood – The chance of the risk
being present.
Customer
Identification & Profiling and its periodic updation dealt with earlier
posts form part and parcel of Risk Management. The RE starts with relevant NRA
report and the analysis of Threat, Vulnerability (Ability to Combat), Risk Impact as
applicable to the business segment in which it operates.
Further, banks
should have appropriate ongoing risk management systems for identifying and
applying enhanced CDD to PEPs, customers who are close relatives of PEPs, and
accounts of which a PEP is the ultimate beneficial owner
The five essential steps
of a Risk Management Process are
- Identify
the Risk
- Analyze
the Risk
- Evaluate
or Rank the Risk
- Treat
the Risk
- Monitor
and Review the Risk
These
aspects are discussed in the same order below:
1. AML/CFT
Risk Identification
KYC risk rating system is a vital tool
used by financial institutions to evaluate the level of money laundering risk
associated with a particular customer. By assessing the factors mentioned
above, companies can detect high-risk customers and take appropriate measures
to prevent fraudulent activities
A RBA to AML/CFT means that countries, competent authorities and financial institutions8, are expected to identify, assess and understand the ML/TF risks to which they are exposed and take AML/CFT measures commensurate to those risks in order to mitigate them effectively. When assessing ML/TF risk, countries, competent authorities, and financial institutions should analyse and seek to understand how the ML/TF risks they identify affect them; the risk assessment therefore provides the basis for the risk-sensitive application of AML/CFT measures.
The RBA is not a “zero failure” approach; there may be occasions where an institution has taken all reasonable measures to identify and mitigate AML/CFT risks, but it is still used for ML or TF purposes.
A RBA does not
exempt countries, competent authorities and financial institutions from
mitigating ML/TF risks where these risks are assessed as low.
DEVELOPING
A COMMON UNDERSTANDING OF THE RBA
The
effectiveness of a RBA depends on a common understanding by competent
authorities and banks of what the RBA entails, how it should be applied and how
ML/TF risks should be addressed. In addition to a legal and regulatory
framework that spells out the degree of discretion, banks have to deal with the
risks they identify, and it is important that competent authorities and
supervisors in particular issue guidance to banks on how they expect them to
meet their legal and regulatory AML/CFT obligations in a risk-sensitive way.
Supporting ongoing and effective communication between competent authorities
and banks is an essential prerequisite for the successful implementation of a
RBA.
FATF’s
RBA for banking business revolves around risk factors arising from parameters
linked to Customer, Transaction, Products & Services, Channels,
Jurisdictions
2. Analyse
the Risk
The
inadequacy or absence of KYC standards can subject the Bank to serious customer
and counter party risks especially reputational, operational, legal and
concentration risks.
Reputational Risk is defined as
“the potential that adverse publicity regarding the Bank’s business practices
and associations, whether accurate or not, will cause a loss of confidence in
the integrity of the institution”.
Operational Risk can be defined as
“the risk of direct or indirect loss resulting from inadequate or failed
internal processes, people and systems or from external events”.
Legal Risk is “the
possibility that lawsuits, adverse judgments or contracts that turn out to be
unenforceable can disrupt or adversely affect the operations or condition of
the Bank”.
Concentration Risk although mostly
applicable on the assets side of the balance sheet, may affect the liabilities
side as it is also closely associated with funding risk, particularly the risk
of early and sudden withdrawal of funds by large depositors, with potentially
damaging consequences for the Bank’s liquidity.
According to FATF Methodology, Risk is a function of threat, vulnerability and consequences assessed by risk based approach. So Banks and financial institutions need to guard themselves being not used by illegal elements in any manner. From licensing new institutions the regulators need to carefully guard against misuse of the financial system and laws of the country. The context of risk management at the firm level is set by the National Risk Assessment and the risk score applicable from the national point of view.
Risk Management
at entity level has to be examined in the light of National Risk Assessment of
the country in which it is domiciled. So MNCs will have to consider the NRA of
countries where they have presence. RBI has insisted on Group-wide policies and
cooperation to foster a culture of AML/CFT compliance without tipping off.
Sector-Specific Risk Factors in KYC Risk Rating
In the financial industry, KYC Risk Rating
requires sector-specific considerations. Customizing KYC Risk Rating to address
these factors ensures effective risk assessment, compliance, and security
within the financial sector, promoting a robust risk-based approach. Different
sectors have unique risk factors that demand specialized attention in the
customer identification process:
- Customer Risk Rating in Banking:
- High Transaction Volume
- Correspondent Banking
- Politically Exposed Persons (PEPs)
- Customer Risk Rating in the Insurance Sector:
- Complex Ownership Structures
- Policy Lapse Risk
- High-Value Claims
- Customer Risk Rating in Investment Funds:
- Lack of Control over Fund Activities
- Offshore Funds
- Complex Investment Strategies
- Customer Risk Rating in the Cryptocurrency Sector:
- Anonymity and Pseudonymity
- Rapid International Transactions
- Lack of Regulatory Clarity
Each sectoral regulator bring up relevant guidelines for REs under it.
Sector Assessment
Supervisors can adopt the following methodology when assessing the overall sectoral risk. First, the supervisor will have to assess the likelihood (threats and vulnerabilities) that ML or TF can occur in a (sub)sector. Per sector the supervisor can rate several (inherent) risk factors: cash intensity of the sector, unknown/unclear sources of funds, manner of client contact, entities with operations in high risk countries, client base (e.g., non-resident, high net worth clients, or corporate clients with complex structures), and amount of international business. Additionally, also more objective factors can be used, such as size of the sector, turnover, number of entities. This rating does not take into account the control measures that individual entities have in place. The supervisors can rate the factors in the following way:
A risk assessment of several (sub)sectors that are obliged under the AML/CFT Law could result in a matrix as below. The matrix below is an example for several sectors. Such a matrix can be developed by all AML/CFT supervisors in a country, but a supervisor should at least make such a matrix for those sectors under its remit. Once such a matrix is developed, a supervisor can determine at a tactical level which sectors need more intense or frequent attention, which supervisory methods can be used to mitigate the risks and which resources need to be allocated.
Besides supervisory methods as onsite and offsite supervision, supervisors can also use communication as a tool to influence behavior of entities. By using the matrix, the supervisor can tailor its communication efforts, for instance by having a seminars for lower risk sectors, but direct or roundtable discussions for higher risk sectors. Also, by means of newsletters, communiqués or cooperation with the sector associations supervisory efforts can be tailored.
Needless to say that the sectors in the upper right quadrant will need more intense and frequent supervisory efforts, such as onsite visits, awareness raising and cooperation with associations. The sectors in the lower right quadrant where the likelihood is higher but the impact low, can for instance be supervised with less intensity or in a lower frequency. The sectors in the upper left quadrant where the likelihood is low but the impact high should ML/TF occur, can be supervised through offsite methods and awareness can be raised through seminars. The sectors in the lower left quadrant can be supervised in a very light touch -offsite- manner. An assessment of the ML/TF risks per (sub)sector should be reviewed and where necessary revised periodically.
The Interpretive Note to FATF Recommendation 26 states that supervisors should have access to all relevant information on the specific domestic and international risks associated with customers, products and services of the supervised entities. The frequency and intensity of AML/CFT supervision of financial institutions should be based on the ML/TF risks, and the policies, internal controls and procedures associated with the institution, as identified by the supervisor’s assessment of the institution’s risk profile, and on the ML/TF risks present in the country. Interpretive Note to Recommendation 28 similarly requires supervisors to take into account the ML/TF risk profile of DNFBPs when assessing AML/CFT compliance of DNFBPs. Supervisors should understand the risk present in a supervised entity. Based on this, supervisors should establish a risk profile of the entities under their supervision based on a risk rating methodology. For larger entities, a supervisor should make an individual risk profile. For smaller entities that are similar, supervisors can make a risk profile that applies to a group of similar entities.
The
NRA comes out with risk spectrum of all major segments susceptible to ML/FT
threats .This along with sectoral risk assessment forms the base for the RE level risk assessment
AML risk scoring model depends heavily on the industry in which the company operates, the customer base it serves and the company’s appetite for risk:
- Industry
Banks need to tailor the AML risk
scoring model. They need to do this to reflect the risks relevant to
account-based relationships. This is because other industries, such as
insurance, cannot use the identical model.
- Customer portfolio
The AML risk scoring methodology
used for scoring retail customers cannot apply to corporate customers/Legal
Entities
- Risk Appetite
Imagine that the bank has been
present in the country for many decades. It is likely to have a large
proportion of low-risk customers. Therefore it makes sense for it to have a
lower risk appetite. However, smaller institutions tend to have a higher risk
appetite, so they can expand and survive in such an environment
Risk appetite is the
amount of risk an organization is willing to take on to achieve its goals, while risk tolerance is the maximum risk an
organization is willing to take on for each type of risk.
Here are some things to consider about risk appetite and
risk tolerance:
· Risk appetite
This is a broad statement about the level of risk an organization is willing to accept. It's influenced by factors such as company culture, industry, and the organization's financial strength. Risk appetite can change over time, and it's important to periodically assess risks against risk criteria.
· Risk tolerance
This is the maximum risk an organization is willing to take on for each type of risk. Risk tolerance levels can be classified as risk-averse, conservative, or aggressive.
· Alignment
Risk appetite and tolerance should be aligned with an organization's goals and objectives.
· Setting risk appetite
In some organizations, the board of directors sets the risk appetite. The appropriate level depends on the nature of the work and the objectives being pursued.
· Risk appetite statement
A risk appetite statement should consider the perspectives of all stakeholders and address the implications of current practices and strategies. It should also define the acceptable level of uncertainty or volatility.
Risk Spectrum development
Risk – The likelihood of an event and its consequences. In the context of money laundering/terrorist financing (ML/TF), risk means:
• At the national level: threats and vulnerabilities presented by ML/TF that put at risk the integrity of India’s financial system and the safety and security of the country.
• At the reporting entity level: threats and vulnerabilities that put the reporting entity at risk of being used to facilitate ML/TF.
Threat – Person or group of people, an object, or an activity with the potential to cause harm. In the ML/TF context, a threat could be criminals, facilitators, their funds or even terrorist groups.
Vulnerability – Elements of a business that may be exploited by the threat or that may support or facilitate its activities. In the ML/TF context, vulnerabilities could be weak controls within a reporting entity, offering high risk products or services, etc.
Consequence – The impact or harm that ML/TF/PF may cause, such as the impact on reputation and imposition of regulatory sanctions. Impact: this refers to the seriousness of the damage that would occur if the ML/TF risk materialises (i.e., threats and vulnerabilities).
Risk Based Approach – An approach whereby competent authorities and firms identify, assess, and understand the ML/TF/PF risks to which they are exposed to and take AML/CFT/CFP measures commensurate to the identified risks to mitigate them effectively. Risk Factors – Means variables that, either on their own or in combination, may increase or decrease the ML/TF/PF risk posed by an individual business relationship or occasional transaction.
Categorise and Prioritise Risks
The second stage is apportionment of identified risks into risk factor categories, usually five – namely, business nature/size[Customer, Transaction], product/service, geographical locations, distribution channels/business practice, and customer base profile then rating them accordingly using a well calibrated risk matrix (likelihood vis a-vis potential impact). Some of the factors may be apportioned with vulnerabilities only or threats only – or both where reasonably so. For example, geographic location and customer profile may reasonably be about threats since they are external factors, whereas product/service and business practice/delivery channels may be suited for vulnerabilities only since it is an internal factor. Assess each category individually, considering the specific vulnerabilities and threats associated with them.
Detailed Analysis of The Risks
(a) Once a reporting entity has identified the risk, the next step of the risk assessment process entails a more detailed analysis of the data obtained during the identification stage to accurately assess ML/TF risk.
(b) This step involves evaluating data pertaining to the reporting entity’s activities (e.g., number of domestic and international transactions, types of customers, geographic locations of the reporting entity’s business area and customer transactions).
(c) This detailed analysis is ultimately important because within any type of product/service or category of customer there will be clients who pose varying levels of risk. This gives management a better understanding of the reporting entity’s risk profile in order to develop the appropriate policies, procedures, and processes to mitigate the overall risk.
(d) Additionally, institutions should undertake an impact analysis and develop a likelihood versus impact matrix to help determine the level of effort or monitoring required for the identified inherent risks.
(e) Institutions can also use a risk matrix as a method of assessing risk in order to identify the risk categories that are in the low-risk zone, those that carry somewhat higher, but still acceptable risk, and those that carry a high or unacceptable risk of money laundering and terrorism financing. In classifying the risk, an entity, considering its specificities, may also define additional levels of ML and TF risk. A risk matrix is not static; it changes as the circumstances of the entity change.
Once identifying the risk factors in all five categories, it’s time to create the risk spectrum for available scenarios and determine their risk level
3. Evaluate the Risk
AML risk scoring is a model used by financial and other
institutions to assess the level of money laundering risk associated with a
particular customer. By assessing the different
factors, companies can identify high-risk customers and take appropriate
measures to prevent fraudulent activities.
There
is no single anti money laundering (AML) risk scoring model or methodology that
fits for all organizations because the business context across all
organizations is different- No ‘one-size fit all’ approach works.
Assessing
Products and Services Risk
(a)
Entities should consider the potential ML/TF & PF associated with each of
their specific products or service. An organisation will seek to identify their
portfolio of product types and assign an inherent score to each, based on its
general inherent characteristics and the degree of ML/TF & PF risks
present.
(b) In undertaking this assessment, all products and services should be included in identification of their inherent risks, rationale, mitigation controls, scores, weights, and the residual risk. It is, therefore, important that specified parties can demonstrate how they bring different indicators to bear on a given scenario to reach an appropriate risk classification. Below are some of the factors to consider when doing product risk analysis.
• Does the product enable third parties who are not known to the institution to make use of it?
• Does the product allow for third party payments?
• To what extent does the product provide anonymity to customers?
• To what extent is the usage of the product subject to parameters set by the entity e.g., value limits, duration limits, transaction limits, etc. or to what extent is the usage of the product subject to penalties when certain conditions are not adhered to?
• Does the usage of the product entail structured transactions such as periodic payments at fixed intervals, or does it facilitate an unstructured flow of funds?
• Does the firm understand the risks associated with its new or innovative product or service, in particular, where this involves the use of new technologies or payment methods.
• The reporting entity should determine to what extent are products or services cash intensive e.g., in the case of microlenders.
Product
Risk Example
Assess
Delivery (Distribution) Channels Risk
(a)
Examine the distribution channels, such as online platforms, branches, and
third-party agents.
(b)
Identify vulnerabilities related to data security, fraud prevention and
compliance within each distribution channel.
(c)
Since REs have various modes of transaction and distribution of their products
and services, it is equally important to assess whether and to what extent do
methods of delivery, such as non-face to face or the involvement of third
parties, including intermediaries/agents could increase the inherent risk of
ML/TF & PF.
(d)
In conducting an institutional risk assessment, REs are required to list all
the delivery channels, identify inherent risks, rationale, mitigation/controls,
scores, weights used and the residual risk. Some factors to consider include:
• Is the product
offered to prospective clients directly or through intermediaries?
• Any agents and
or intermediaries the specified party might use and the nature of their
relationship with the entity.
• Are prospective
clients onboarded through direct interaction or through intermediaries/agents?
• Do clients
transact by engaging with the institution directly or through
intermediaries/agents?
• Where clients
interact through intermediaries/agents, are the intermediaries/agents subject to
licensing and/or other regulatory requirements?
• Whether the
customer physically present for identification purposes. If they are not,
whether the firm,
❖ Considered if
there is a risk that the customer may have sought to avoid face-to-face contact
deliberately for reasons other than convenience or incapacity.
❖
Used a reliable form of non-face-to-face CDD; and
❖
Taken steps to prevent impersonation or identity fraud.
Channel RiskExample
Assess
Geographical Location Risk
(a).
Entities should identify domestic and international geographic locations that
may pose financial crime risks in their operations. Geographic location risks
may also be assessed with respect to the location of customers, business
division, line or branch, and may also include its subsidiaries, affiliates,
and offices, both domestically and internationally. It is important to consider
United Nations Security Council (UNSC) sanctions lists, political conditions,
and national and international crime statistics from reputable organisations.
(b)
Each case should be evaluated individually when assessing the risks associated
with doing business, such as:
• Is the client
domiciled in Botswana or in another country or does the client operate/do
business in another country?
• Countries that
are subject to international sanctions, embargoes or similar measures issued by
credible organisations such as the UNSC and the Financial Action Task Force
(FATF).
• Countries
identified by credible organisations as lacking appropriate AML/CFT laws,
regulations, and other measures.
• Any country
identified by the FATF as having strategic AML/CFT deficiencies.
• Countries
identified by credible sources as providing funding or support for terrorist
activities or that have designated terrorist organizations operating within
them.
• Countries
identified by credible sources as having significant levels of corruption,
source of narcotics, human trafficking and other criminal activities.
(c)
A rural area where customers are known to the community could present a lesser
risk compared to a large urban area where there are different classes of
customers with various risks. However, this is not to imply rural areas are
inherently low risk, remote areas with proximity to international borders may
be prone to other risks such as drug trafficking and influx of foreign
currencies. Criminal elements may also choose to stay under the radar in a
smaller or less economically active area.
(d)
When undertaking this assessment, the institution is required to identify risks
and explain the risk scoring allocated to each geographical area highlighted.
The assessment should also indicate: Mitigation/ Controls, Scores (Risk Level),
Weights used and the Residual Risk.
Jurisdictional Risk Example
1 |
FATF |
Call
for Action(Black List) |
Increased
Monitoring(Grey List) |
Compliant |
||||||
2 |
Transparency
International Corruption Index |
|
|
|
|
|
|
|
|
|
Each dimension of risk is attributed weights and scores with consideration of both quantitative and qualitative factors
Other
Qualitative Risk Factors
(a) Entities should also assess additional
risk factors that can have an impact on operational risks and contribute to an
increasing or decreasing likelihood of breakdowns in key AML/CFT controls.
(b) Qualitative risk factors that directly or
indirectly affect inherent risk factors may include:
• Significant
strategy and operational changes.
• Structure of ownership/
business e.g., presence of subsidiaries.
• National Risk
Assessments.
If a
reporting entity identifies situations that represent a high risk for ML/TF/PF
activities, it should control these risks by implementing mitigation measures.
Weights
and Scoring
(a)
Due to the nature of each institution’s unique business activities, products
and services (including transactions), client base and geographic footprint, a
risk-based approach is used to calculate inherent risks. Each risk factor is
usually assigned a score which reflects the associated level of risk. Each risk
area may then be assigned a weight which reflects the level of importance in
the overall risk calculation relative to other risk areas.
(b)
The weight assigned to each of these risk categories (individually or in
combination) in assessing the overall risk of potential money laundering may
vary from one institution to another, depending on their respective
circumstances. Consequently, an institution will have to make its own determination
as to the risk weights and scores to assign to the different risk
Pl also refer to Risk-based Approach toCustomer Due Diligence where the five components are analysed for differing levels of risk.
4. Treat
the Risk
It is worth noting that all these risks are interrelated. Any one of them can result in significant financial cost to the Bank as well as the need to divert considerable management time and energy to resolve problems that arise. Customers frequently have multiple accounts with the Bank, but in offices located at different places. To effectively manage the reputational, operational and legal risk arising from such accounts, Bank shall aggregate and monitor significant balances and activity in these accounts on a fully consolidated basis, whether the accounts are held as on balance sheet, off balance sheet or as assets under management or on a fiduciary basis. Branches should exercise ongoing due diligence with respect to the business relationship with every customer and closely examine the transactions in order to ensure their transactions are consistent with their knowledge about the customers, customers’ business and risk profile, the source of funds / wealth. The Board of Directors of the Bank shall ensure that an effective KYC/AML/CFT programme is put in place by establishing appropriate procedures and ensuring their effective implementation. It shall cover proper management oversight, systems and controls, segregation of duties, training of staff and other related matters.
1. The front office , the customer facing activity of the Business Unit working under Policies and Procedures approved by the bank’s Board
2. Principal officer responsible for Compliance, Training and
3. Independent audit
Risk Mitigation
(a)
The reporting entity must develop and implement policies and procedures to
mitigate the ML/TF/PF risks they have identified through their institutional
risk assessments. The mitigation measure should include;
• Internal
policies, procedures and controls to fulfil obligations under the FI Act.
• Adequate
screening procedures to ensure high standards when hiring employees.
• Ongoing training
for officers and employees to make them aware of the laws relating to money
laundering, the financing of terrorism or proliferation.
• Policies and
procedures to prevent the misuse of technological developments including those
related to electronic means of storing and transferring funds or value;
• Mechanisms for preventing money laundering,
financing of terrorism or proliferation, or any other serious offence.
• Independent
audit arrangements to review and verify compliance with and effectiveness of
the measures taken in accordance with the FI Act.
• Risk based
approach to managing ML/TF/PF risks identified.
• Customer
identification procedures.
• Record keeping
and retention.
• Reporting
procedures.
• Confidentiality
requirements and procedures.
• Transaction
monitoring systems; and
• Adequate
screening procedures for customers against relevant sanctions lists.
• Enhanced identification,
verification and ongoing due diligence procedures with respect to customers who
have been identified as high risk customers.
Residual
Risk
(a)
Once both the inherent risk and the effectiveness of the internal control
environment have been considered, the residual risk should be determined.
(b)
Residual risk is the risk that remains after controls are applied to the
inherent risk. It is determined by balancing the level of inherent risk with
the overall
strength
of the risk management activities/controls. The residual risk rating is used to
indicate whether the ML/TF risks within the institution are being adequately
managed. (c) It is possible to apply a 3-tier rating scale, to evaluate the
residual risk on a scale of High, Moderate and Low. Alternatively, another
rating scale could also be used, for example a 5-point scale of Low, Low to
Moderate, Moderate, Moderate to High, and High.
Assessing
and Measuring Risks
(a)
Once the risks have been identified , each risk needs to be assessed and measured
in terms of the chance (likelihood) it will occur and the severity or amount of
loss or damage (impact) which may result if it does occur.
(b)
The risk level associated with each event is a combination of the likelihood
that the event will occur and the impact it could have.
Likelihood
x Impact = Risk Level
Likelihood
(i)
Likelihood refers to the potential of a particular risk occurring in the
business.
(ii)
Three levels of likelihood are provided as examples, but there may be more than
three for the business.
•
Very likely: Almost certain – it will probably occur several times a year
•
Likely: High probability it will happen once a year
•
Unlikely: Unlikely but not impossible.
(iii)
The likelihood levels above may not cover every scenario and are not
prescriptive. They may be extended depending on risk management methodology
adopted by an entity.
Probability |
1 |
2 |
3 |
4 |
5 |
Description |
Rare |
Unlikely |
Probable |
Almost |
Certain |
Impact
i.
Impact
refers to the seriousness of the damage which could occur if the risk happens.
ii.
The
reporting entity knows its business and is in the best position to know how it
would be affected by any impacts. What impacts may affect it and how those
impacts would affect it. Some examples of impacts to think about could include:
• How the business
would be affected by a financial loss from a crime.
• The risk that a
particular transaction may result in a terrorist act and loss of life.
• The risk that a
particular transaction may result in funds being used for any of the following:
corruption, bribery, tax evasion, drug trafficking, human trafficking, illegal
arms trading, terrorism, theft, or fraud.
Note
that these do not cover every scenario and are not prescriptive. Three levels
of impact are shown here, but the reporting entity can have as many as
necessary for its business:
• Major: Severe damage
• Moderate: Moderate level of damage
• Minor: Minimal damage.
(iii)
Once an entity assesses the likelihood and impact of each risk, it can then
determine the inherent risk level based on these two factors. The following is
an example of how a reporting entity can use a risk matrix to determine the
inherent risk level posed by customers.
(iv)
Similar to likelihood, impact levels may also vary depending on other
considerations by an entity.
The
5 level Impact Assessment is as follows:
Catastrophic |
5 |
Major |
4 |
Moderate |
3 |
Minor |
2 |
Insignificant |
1 |
Risk
Matrix
(a)
The risk matrix can be used to combine the likelihood and impact to obtain a
risk score (inherent risk level). The inherent risk level may be used to aid
decision making and help in deciding what action to take.
(b)
How the inherent risk score is derived can be seen from the risk matrix shown
below. Three levels of risks are shown (Low, Medium and High), but there can be
more than three, if necessary.
Apply
Controls to Manage Risks
The response/control to the risk will depend
on the level of risk as shown in the table below.
This
step is about determining how to manage the risks identified and assessed.
Managing ML/TF/PF risks involves applying systems and controls. Examples of
risk reduction or controls could be;
(a)
Setting transaction limits for high-risk products (for example limiting the
amounts or frequency of transactions).
(b)
Having a management approval process for higher-risk products or customers.
(c)
A process to place customers in different risk categories and apply different
identification and verification methods.
(d)
Rejecting customers who wish to transact with a high-risk country. The
following table provides an example of how the information recorded could be.
(i)It
is important to keep in mind that if a customer, transaction or country is
identified as high risk it does not necessarily mean that criminal activity is
occurring or will occur.
(ii) The opposite is also true. Just because a customer or transaction is seen as low risk, this does not mean the customer or transaction is not involved in criminal activity. Knowledge of the business and common sense should be applied to the risk management process.
5.Monitor
& Review the Risk
(a)
Once documented, the reporting entity should develop a method to regularly
evaluate whether its AML/CFT/P programme is working correctly and effectively.
If not, it needs to work out what needs to be improved and put changes in
place. This will help keep the programme effective and meet the requirements of
the PML Act 2002.
(b)
Keeping records and regularly doing an evaluation of a reporting entity’s risk
and AML/CFT/P programme is essential. Risks change over time, for example,
changes to the reporting entity’s customer base, its products and services, its
business practices and the regulatory requirements.
Continual
Improvement
Implement
a process for continual improvement by regularly reviewing and updating the
risk assessment to adapt to changing threats and vulnerabilities.
Training
and Awareness
Train
employees and stakeholders on the importance of risk management and ensure
awareness of the institutions risk assessment findings and strategies.
External
Feedback
Seek
external feedback from regulators, auditors, and industry peers to gain
insights and best practices to enhance your risk assessment process.
REPORTING
OF MONEY LAUNDERING/ TERRORIST FINANCING/ PROLIFERATION FINANCING RISK
ASSESSMENT RESULTS
(a)
The
results of the ML/TF/PF risk assessment should be presented to senior
management and the board and communicated by the Compliance Officer to all
business units and the control functions of the institution. The report should
clearly indicate proposed action points to be adopted by the institution.
(b)
The
Institutional ML/TF/PF Risk Assessments that will be developed by the REs
should be approved and signed off by the board of directors or senior
management and be reviewed at such intervals as required by the board or by
changes in the regulatory environment. REs shall provide to the supervisory
authority a report on the latest results of its MT/TF/PF risk assessment as and
when required.
Happy Reading,
Those who read this also read:
1. National Risk Assessment (NRA) Framework
2. Risk-based Approach in Customer Due Diligence-FATF
3. Introduction & Overview: Customer Risk Profile
4. IBA WGR on AML/CFT 2010: Alert Generation
Comments
Post a Comment