Anti-money laundering (AML) compliance programs must fulfill requirements dictated by regulations such as the Bank Secrecy Act (BSA), Sarbanes Oxley (SOX) and Foreign Account Tax Compliance (FATCA). However, maintaining compliance does not have to be a time-consuming, expensive or burdensome job.
The Solution – CaseWare AML Compliance
CaseWare AML Compliance is a solution with Know Your Customer (KYC), transaction monitoring, sanctions list screening and regulatory reporting capabilities in a single platform. Organizations that adopt this solution enable their compliance teams to identify high-risk individuals and entities, detect suspicious transactions, manage investigations and comply with regulations through advanced analytics, automated alerts and workflows and electronic filing of reports with regulatory bodies.
|Know Your Customer (KYC)||
|Sanctions List Screening||
How CaseWare AML Compliance Works
CaseWare AML Compliance actively monitors 100% of financial transactions and customer information. When a non-compliant activity is detected, it triggers an alert that is sent to the appropriate stakeholder. Using configurable workflows, the solution assigns responsibility to investigate the alert and logs all activities to create an accurate and comprehensive audit trail of all actions taken.
Attachments, comments and indicators can be added to alerts to assist in root cause analysis or to create cases for investigations. When a regulatory report needs to be filed, the solution can quickly pre-populate the report with information from core systems and the solution’s data analytics platform. Reports can then be reviewed and validated by the compliance team, and sent electronically to regulators.
- Identify transactions by customer(s) exceeding a defined number of withdrawals or deposits over a specified period or across locations
- Identify all accounts closed with balances and any subsequent activity on those accounts
- Identify multiple ATM cards issued to the same customer
- Identify all cash withdrawals or deposits made at the ATM exceeding a defined tolerance
- Identify multiple cash deposit transactions that aggregate over the internal threshold
Know Your Customer Requirements
- Identify all customers without address data or with P.O. box addresses only
- Identify potentially duplicated customers or customers with multiple, invalid or expired identification records
- Identify all customers with change of name and/or address
- Identify all accounts for which signing instructions have been amended
- Identify inactive accounts made active without the customer being made KYC compliant
- Identify inconsistencies in customer information across entities, et.
- Identify related customers
- Identify suspicious activity on accounts previously in a non-transaction state (such as Dormant/Inactive/Frozen)
- Identify High Risk Customers on new or joint accounts
- Identify significant informal relationships between customers
- Identify corporate customers with cash transactions outside the normal course of business
- Identify sudden loan payments
- Identify ATM cards created and authorized by the same user
- Identify products that do not satisfy policy requirements (for example, interest rate, principal, term etc.)
- Identify customers on Office of Foreign Assets Control (OFAC), Politically Exposed Persons (PEP) or Internal/Custom Lists
- Identify remittances to and from blacklisted countries
- Identify instances of remittances to/from multiple recipients and/or senders exceeding a defined threshold
- Identify recipients consistently receiving money just below the threshold
- Identify suspicious transactions such as smurfing, flipping, etc.
- Identify customers sending or receiving wires to multiple persons that exceed or are just below the internal threshold
- Daily report on all incoming and outgoing wire transfers
- Transfers from specific sources (reference established lists)
- Provide details of the source of funds information provided by customers
- Identify transfer of funds from one staff account to another
- Identify all staff deposits, withdrawals, encashment of checks or fund transfers just within a predefined threshold
- Identify terminated employees still flagged as staff
- Identify users with access in violation of SoD