+更多
专家名录
唐朱昌
唐朱昌
教授,博士生导师。复旦大学中国反洗钱研究中心首任主任,复旦大学俄...
严立新
严立新
复旦大学国际金融学院教授,中国反洗钱研究中心执行主任,陆家嘴金...
陈浩然
陈浩然
复旦大学法学院教授、博士生导师;复旦大学国际刑法研究中心主任。...
何 萍
何 萍
华东政法大学刑法学教授,复旦大学中国反洗钱研究中心特聘研究员,荷...
李小杰
李小杰
安永金融服务风险管理、咨询总监,曾任蚂蚁金服反洗钱总监,复旦大学...
周锦贤
周锦贤
周锦贤先生,香港人,广州暨南大学法律学士,复旦大学中国反洗钱研究中...
童文俊
童文俊
高级经济师,复旦大学金融学博士,复旦大学经济学博士后。现供职于中...
汤 俊
汤 俊
武汉中南财经政法大学信息安全学院教授。长期专注于反洗钱/反恐...
李 刚
李 刚
生辰:1977.7.26 籍贯:辽宁抚顺 民族:汉 党派:九三学社 职称:教授 研究...
祝亚雄
祝亚雄
祝亚雄,1974年生,浙江衢州人。浙江师范大学经济与管理学院副教授,博...
顾卿华
顾卿华
复旦大学中国反洗钱研究中心特聘研究员;现任安永管理咨询服务合伙...
张平
张平
工作履历:曾在国家审计署从事审计工作,是国家第一批政府审计师;曾在...
转发
上传时间: 2019-03-25      浏览次数:1284次
AML transaction monitoring: Three best practices for business


https://www.timesofmalta.com/articles/view/20190324/technology/aml-transaction-monitoring-three-best-practices-for-business.705450

 

In order to counter the risks of money laundering and terrorist financing, companies must have in place a proper system for transaction monitoring. It should give you the confidence that you are in control to make the right AML risk decisions. The responsibility of reporting suspicious transactions was emphasized after the first AML directive was introduced in 1991, and as the years go by, this obligation becomes even more critical. Here are three best practices to incorporate into your AML transaction monitoring process.

 

First: proper risk analysis at client level. The better your KYC procedures are, the easier it is to identify discrepancies between a customer’s risk profile and a given transaction. Fully integrated KYC and transaction monitoring tools mean that the information collected at client on-boarding can be used to update the parameters of the transaction profile. This saves time, increases efficiency and prevents the potential loss of important information – compared to operating two separate systems.

 

Second: comprehensive and current transaction profiles. Profiles should be kept up-to-date with all account details and beneficiaries noted, payment amounts and their frequency established. The information should be clear and easy to understand, with relevant supporting documents provided and the profile saved as part of the client acceptance file. The identification and monitoring of these transactions can be automated by establishing key parameters such as regularity, amount, and frequency of payments.

 

Third: reassessment of previous and related transactions. Should an unusual transaction be flagged up, you should go back and review previous and related transactions. This process can provide insight to any possible patterns of unusual activity, followed by a review of the client’s transaction profile. The Fourth AML Directive even recommends that the effectiveness of a company’s transaction monitoring process be reviewed on a regular basis to allow a trend analysis to be carried out. Therefore, full access to past data is crucial.

 

AXON AML Transaction Monitoring enables organizations to detect suspicious behavior quickly and effectively. It optimizes transaction monitoring by automating processes in order to minimize unnecessary alerts, while also offering real-time notifications and reporting. With AXON, compliance teams become more accurate and efficient in their monitoring of potentially fraudulent transactions.