SlideShare ist ein Scribd-Unternehmen logo
1 von 76
Anti-Money Laundering Compliance software implementation
2001: Enactment of Patriot Act & impact on  Money Laundering Compliance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source:  http://www.nchelp.org/elibrary/Presentations/2003/2003WinterLegalAffairsMeeting/Consumer%20Privacy%20Issues.ppt
Objectives ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Training and Awareness Program Cost of Compliance Anti-Money Laundering Strategy Anti - money laundering standards and procedures Management Commitment Security & technology usage Administrative and end - user  policies and procedures KYC  - Data  Access/Mining Transaction Monitoring/  Tracking Processes  Business and organisation Processes & Initiatives Tactical short term  solutions Compliance Requirements International, Regulatory, Industry, Third Party, Internal AML Reporting Risk assessment Investment suitability Tax etc.  Investment suitability Tax etc.  Know your customer (KYC)  - Account Opening From Reactive to Proactive approach Integrated Approach
Data Pipeline DDA CIS SWIFT Money Market transaction hub Load to IEF Load to IEF Load to IEF Data Hub Wires Reference data Posted & Deposit Detail Transactions TDA Extract Normalize & Transform Load Fortent Monitor Systems of Record FedWire transactions wire  transactions customers accounts rel man Concept: Fortent software training material I E F Excel sheet,  graphs Excel sheet,  graphs Excel sheet,  graphs Zurich office London office New York office Money Laundering Data warehouse
Major Opportunities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Opportunities: Easy Trends analysis Money Laundering Analysis using  Tools  Users Wealth Management Investment  Banking Calculation Engine Actuate Actuate Zurich office Stamford Office Actuate Cognos SAS New York office Actuate London Office Excel sheet,  graphs Excel sheet,  graphs Excel sheet,  graphs Excel sheet,  graphs
Opportunity: Easy access of information globally Zurich office  –  Report on Clients  transactions unexplained  for amount  above $10,000 . Stamford office List of clients in US said  to be under suspicion radar Berlin office  List of clients in Germany said  to be under suspicion radar New York office  – US government – List of all  Clients under suspicion  by bank’s investigators Paris office –   How to perform better  Than Credit Suisse –  search Trends Excel, Word London office  demands Suspicious  Activity Reports
Opportunities:  Actual number & not mere suspicion about Client & their transaction 10 47 30 12 Wealth Management Investment banking Fixed Income Institutional securities US Europe Asia 3/1 3/2 3/3 3/4 Date Month Region Product
External Problems Globalisation of clients & data Sophisticated money launderers Inefficient compliance systems Reporting to number of agencies & regulation change Accountability of transactions from Corresponding banks, investigate volumes of data. [1]  Professor S. Seshadari, IIT Professor slides on Datawarehousing.  Only the diagram structure taken by Professor’s slide. The concept & content based  on my understanding of Delta case. Privacy concern’ Of clients
Internal Problems  Hire Paralegal & IT team well versed with Patriot Act AML software which is best processes and budget? Where to hire best IT, Technology consultants Each division working on different data system [1]  Professor S. Seshadari, IIT Professor slides on Datawarehousing.  Only the diagram structure taken by Professor’s slide. The concept & content based  on my understanding of Delta case. Massive volumes  Of data &  Data integration  Permissions Within  The bank Day – to- day operations Vs Trends & Strategy issues
Operational Problem: Quick access to financial information in manage transactions What product promotions have the biggest  impact on revenue? What is the most  effective distribution  channel? Who are my customers  and what products  are they buying? Which are our lowest/highest margin  customers ? What impact will  new products/services  have on revenue  and margins? Which customers are most likely to go  to the competition ?
Data Integration Problem  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Goals ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Know Your Customer Guidelines Customer Acceptance  - Ensure that you accept only legitimate and bona fide customers. Customer Identification-  Ensure that you properly identify your customers to understand the risks they may pose. Transactions Monitoring-  Monitor customers accounts and transactions to prevent or detect illegal activities. Risk Management-  Implement processes to effectively manage the risks posed by customers trying to misuse facilities. Money Laundering Searches required by the Compliance Officer Source: Presentation by Sanjeev Singh
KYC: If Client Involved in  Money Laundering Activities Drug Trafficking Bribery / Corruption Prostitution Gambling Tax Evasion Extortion Robbery  and Fraud White Collar  Crimes ( including Insider Trading and Securities offences ) Smuggling  (arms, people, goods) Counterfeiting and Forgery  Kidnapping Serious Crime or All Crimes? Organised  Crime Source: www.fintraca.gov.af/assets/ ppt /AML
Goal: Integration of Company’s data to enable Money Laundering Analysis Across Bank’s various Divisions for Analysis to happen Investment  Banking –  Europe division Global Wealth Management Fixed Income  US division Trading and Settlement Switzerland Division Drill down By city, country Drill down by Financial product Trend analysis By region Granular Details by region City, state, country
Fortent Monitor Data Manager Profiling Engine Operational Data Store Detection Engine Investigation  System Source: Fortent software training material
Data Pipeline DDA CIS SWIFT Money Market transaction hub Load to IEF Load to IEF Load to IEF Data Hub Wires Reference data Posted & Deposit Detail Transactions TDA Extract Normalize & Transform Load Fortent Monitor Systems of Record FedWire transactions wire  transactions customers accounts rel man Concept: Fortent software training material I E F Excel sheet,  graphs Excel sheet,  graphs Excel sheet,  graphs Zurich office London office New York office Money Laundering Data warehouse
Compliance Officer CCH Wall Street 3 rd  Party Data WSP Email Regs Compliance EYE OFAC Other Mutual Fund  Data Clearing Firms Inefficient  Use of Time OMS Other firm data a/c info Suitability criteria Manual Processes Increasing  Workload Inconsistent Audit Terms Reactive, Not Proactive ,[object Object],Money Laundering Searches required by the Compliance Officer
Goal:  Process change Exchang e Electronic Communications Network Market Maker Firm Internalizes Order Internet order Phone order [1]   http://www.ibtimes.com/articles/20061006/add-nyse-electronic-trading.htm
The Simple SWOT from MIS750 S TRENGTHS W EAKNESSES O PPORTUNITIES T HREATS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Simple SWOT from MIS750 S TRENGTHS W EAKNESSES O PPORTUNITIES T HREATS 4. Existing Human Resource, Divisions, high cost Brick structure within bank, how to utiilize their services compared to Click structure of small Online companies & consequently their low operating cost. 6. Buying / Tie up with Online Financial services Company and learn from their low cost Click culture, Online handling of Processes like Fox TV who successfully launched My Space on Internet though traditional TV Media company. 5. Lack of methods to know and verify Customer details from what they say and what they actually do. 6. Huge amount of daily data to be checked right from Client’s details, to Transactions, to email correspondence between the Client and the Bank. 7. Cataloging data from around the world, from all their Clients & from all the Client’s transactions and then storing all these details at Bank’s location. 8. Cataloging all the above details and yet comply with the Swiss Privacy Laws of Non Disclosure of Client’s details and maintaining Client’s Privacy.
Weakness:  Data Integration & Size of Bank Problems: Data Disintegration Across Sources Brokerage Credit card Wealth Management Investment Banking Same data  different name Different data  Same name Data found here  nowhere else Different keys same data
Threats: Multiple Compliances, Regulators and changing Laws & Compliances pose new Risks for Banks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Fraud USA PATRIOT Act Money Laundering Bank Secrecy Act OFAC Terrorism ,[object Object],[object Object]
Threats: Newspaper reports ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source: h ttp://www.amlcft.com/cases.htm#Recent_Major_Fines_and_Penalties
Strengths Weaknesses 1. Use Huge pockets to deploy latest Money Laundering Technology. 2. Use Brand name to enter Online Money Laundering Banking Operations. 1. Provide staff IT training in Money Laundering software to make them equipped to handle Money Laundering software operations. 1. Fines from the regulators. New changing regulations around the world and fines for Bank in event of non compliance to these new laws. Loss of Image in case Bank found guilty of Money Laundering.  Tie up Start up firms to join the Online Products & services.  Tie-up and Co-Brand services with existing Online player to compete with new born Online firm.  Lower cost of operations and transaction to attract customers from competition. Tie-up with IBM, Infosys to provide regular supply of well experienced IT workers. Start transformation of Enterprise into IT governed enterprise parallelly in multiple divisions of bank. Opportunities S O   STRATEGIES W O   STRATEGIES S T   STRATEGIES W T   STRATEGIES Threats Super SWOT Company UBS Money Laundering Division 1. Brand Name 2. Cash Flow 3. Well distributed office locales  4. Products and services  5. Trained Financial workforce. 6. Part of Bank Transactions Online.  1. Huge Online market untapped. 2. Commanding presence in US, European  3. Greater reach to clients than competitors 4. Offer more variety services  1. Lack of in house Money Laundering & IT workforce 2. Huge size, slower adoption of technology than by competitors  3. High cost of Brick structure against the Click structure and high operating cost. 4. Late mover in Online market.
Strengths Weaknesses 3. Use big distribution to get more clients than competition.  4. Use huge infrastructure to provide Add on services. 1. Use Huge pockets to deploy latest Money Laundering software & trained IT workforce from say IBM. 2. Use brand name to offer Online services and market these.  2. Slow adoption of IT 3. In house trained workforce  Tie up Start up firms to join the Online Products & services.  Tie-up and Co-Brand services with existing Online player to compete with new born Online firm.  Lower cost of operations and transaction to attract customers from competition. Tie-up with IBM, Infosys to provide regular supply of well experienced IT workers. Start transformation of Enterprise into IT governed enterprise parallelly in multiple divisions of bank. Opportunities S O   STRATEGIES W O   STRATEGIES S T   STRATEGIES W T   STRATEGIES Threats Super SWOT Company UBS Money Laundering Division
Method 1: Customer Relationship Management CRM used for Monitoring/Reporting Customer ID documentation Enhanced due diligence Monitoring Reporting FIU analysis Investigation Application from customer Within the institution Outside the institution When should KYC research need to be carried out? Source:  www.baft.org  presentation by Andrew Clark
Method 1: Customer Relationship Management Contd… Anti Money Laundering Profiles generation 1 ,[object Object],Transaction Account Txn Type Day Daily Summary Account Txn Type Day Monthly Summary Account Txn Type Month Account Profile Account Txn Type Peer Profile Peer Group Txn Type ,[object Object]
Method 1 Contd… CRM : 2 Tracking Suspicious Behavior  by customer, by transaction Comparison of current  month to account profile Comparison of current  month to peer profile Event Thresholds Sum  of scores SB Thresholds Alerts Account Value Account Volume Insufficient Account   Insufficient Peer Peer Volume Peer Value Events Group by customer Customer Security Blanket Infraction Account Security  Blanket Infraction BLU Infraction Infractions (reason for alert) Account Profile Peer Profile Monthly  Summary Daily  Summary Daily  Summary Daily  Summary Source: Fortent software training material
Fortent Monitor Data Manager Profiling Engine Operational Data Store Detection Engine Investigation  System Source: Fortent software training material Method 2: Information Organization
Data Pipeline DDA CIS SWIFT Money Market transaction hub Load to IEF Load to IEF Load to IEF Data Hub Wires Reference data Posted & Deposit Detail Transactions TDA Extract Normalize & Transform Load Fortent Monitor Systems of Record FedWire transactions wire  transactions customers accounts rel man Concept: Fortent software training material I E F Excel sheet,  graphs Excel sheet,  graphs Excel sheet,  graphs Zurich office London office New York office Method 2: Information Organization  Money Laundering Data warehouse
Method 2: Information Organization The Fortent End to End Solution Overview ,[object Object],[object Object],KYC Information & Training Case Management Workflow Transaction Monitoring Investigation  & Reporting Source: Fortent software training material
Method 2: Information Organization What do we look at ?  Role Country Bank Account Island Bank Peoples Bank Lion Bank Transaction Type Originator SWIFT Intermediary 1 SWIFT Intermediary 2 SWIFT $ Wachovia Beneficiary SWIFT $ Message/Product Type SWIFT MT103 WIRE Source: Fortent software training material
Method 2: Information Organization Search Customer and transaction details by … ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source: Fortent software training material
Business Strategy Competitors Banks like Barclays, Credit Swisse, Citi Group are also deploying Technology, but Business Intelligence might be UBS edge. Local banks, online financial instutions with low distribution network will loose customers badly and may even cease to exist. Competitors Banks like Barclays, Credit Swisse, Citi Group as well Online firms like E-Trade, Charles Schwab are giving UBS tough competition. Customers/Clients Educated, high net worth individual well versed with Online services, specially younger generation will jump on, might loose those who not Online. Client prefer Telephone or web meetings, one-to-one meeting only in special cases. Customers/Clients For Clients coming to bank for one-to-one meet is a norm loaded with paper and going back with bag full of financial documents. Products and Services Single UBS Executive, Client’s point of contact for all kinds of accounts, Asset, Wealth Management or Brokerage to get overall picture. Online services. Products and Services Asset Management, Wealth management, Brokerage – to an extent still manual and same client has to call different divisions for different accounts Business Scope To-Be As-Is
Products & Services / Clients & Customers – As is
Products & Services / Clients & Customers – To Be
Business Strategy Online Asset management, Brokerage, Taxes filing, Pension policy advise and related Online services become norm. Services over the phone, Call center services for minor administrative services like logging on bank’s Web page, opening bank account become a norm.  Note Changes Big distribution network. Brand Name Deep pockets to implement any new technology within a short time. Distinctive Competencies Internal Decisions , Regulatory, Etc. Patriot Act details of client submission to government – implementation done Online only using Excel, Business Objects, graphs. Internal Decisions , Regulatory, Etc. Patriot Act implementation done both partly manual, partly Online Business Governance To-Be As-Is
As – Is : Business Strategy Governance Paper based Approach to Money Laundering Bank teller puts in  Customer account Office Boy Faxes Account details Details received at Bank’s Head office Office Boy Suspicious Transaction Accounts Desk Search for Right Client  Account & Right FAX   Investigator from  FBI, Bank, Head Bank Try to trace client’s  details   Investigator Search Account past trends Money deposit  by Client Bank manager Compiles transaction Volume of paper work  In Investigation and  Administrative loop holes Leads to loss of  Investigation. Is this Client records Processing fine in 2008?
As – Is : Business Strategy
Training and Awareness Program Cost of Compliance Anti-Money Laundering Strategy Anti - money laundering standards and procedures Management Commitment Security & technology usage Administrative and end - user  policies and procedures KYC  - Data  Access/Mining Transaction Monitoring/  Tracking Processes  Business and organisation Processes & Initiatives Tactical short term  solutions Compliance Requirements International, Regulatory, Industry, Third Party, Internal AML Reporting Risk assessment Investment suitability Tax etc.  Investment suitability Tax etc.  Know your customer (KYC)  - Account Opening Business Strategy Governance: To Be From Reactive to Proactive approach Integrated Approach
To-Be: Business Strategy
Business Infrastructure Fast typing skills mandatory along with use of all MS Office products from Word, to Excel to Power point, Outlook, Web browsing along with specilised software like Database programmes like SQL, Business Objects, Charles River for few. Paper based work, typing skills, telephonic skills, PC skills limited to MS Word and limited level of MS Excel. HR/Skills Separate head for Money Laundering was brought in. Person was of level of Director reporting directly to Executive Committee and working in parallel with CIO. Division was headed by Business Analyst, Project Manager who was much low in Management ranking. Administrative Process have been designed to be all Online, data transfer, sharing, all online with click of a button. Bank’s declining position, bank responsibility to comply with new new compliances and unhappy customers with slower transaction speed as compared to competitors. Few process were manual, few based on Excel sheets, few other online but there was no integration, so one division could not exchange information with other without use of paper. Key Processes To-Be As-Is
As – Is : Administrative Approach to Money Laundering REACTIVE APPROACH Bank teller puts in  Customer account Office Boy Faxes Account details Details received at Bank’s Head office Office Boy Suspicious Transaction Accounts Desk Search for Right Client  Account & Right FAX   Investigator from  FBI, Bank, Head Bank Try to trace client’s  details   Investigator Search Account past trends Money deposit  by Client Bank manager Compiles transaction Volume of paper work  In Investigation and  Administrative loop holes Leads to loss of  Investigation. Is this Client records Processing fine in 2008?
Current Key Processes – As Is  Brokerage Asset Management Private Banking Investment Banking Institutional investors **  Above Pictures taken from Google Images
Future Key Processes – To Be Brokerage Asset Management Private Banking Investment Banking Institutional investors **  Above Pictures taken from Google Images
Organisational changes As Is To Be Hierarchy based org Structure Services, Product line based org Structure
Human Resources As is To Be
IT Strategy Internal Decisions , Regulatory, Etc. Include all areas that are relevant after the project implementation. Note Changes Internal Decisions , Regulatory, Etc. Include all areas that are relevant before the project implementation Governance Key Applications After project implementation Key Technologies After project implementation Key Applications Prior to project implementation Key Technologies Prior to project implementation Technology Scope Those areas in which the company has a distinct or competitive advantage over their competition after the implementation of the project. Note Changes Those areas in which the company has a distinct or competitive advantage over their competition. System Competency To-Be As-Is
As – Is : IT Strategy Paper based Approach to Money Laundering Bank teller puts in  Customer account Office Boy Faxes Account details Details received at Bank’s Head office Office Boy Suspicious Transaction Accounts Desk Search for Right Client  Account & Right FAX   Investigator from  FBI, Bank, Head Bank Try to trace client’s  details   Investigator Search Account past trends Money deposit  by Client Bank manager Compiles transaction Volume of paper work  In Investigation and  Administrative loop holes Leads to loss of  Investigation. Is this Client records Processing fine in 2008?
IT Strategy - As Is
IT Strategy – To Be
Infrastructural Re Design & Deployment Money Laundering Data warehouse
IT Strategy: To Be As a result of Process change implementation Exchang e Electronic Communications Network Market Maker Firm Internalizes Order Internet order Phone order
IT Infrastructure As-Is To-Be Architecture The IT Architecture prior to the project The IT Architecture after the project implementation. Key Processes The Key Processes prior to the project.  The Key Processes after the project implementation. H/R/SKILLS HR duties and functions prior to the project.  HR duties and functions after the project.
Pre requisites for Integrated approach to trade processing: centralisation of information collection process …  to Centralised information source on correspondent banks From … Numerous bilateral information exchanges within financial institutions Source: www.swift.com/index.cfm?item_id=3878
As – Is Architecture US Wealth Management Europe Wealth Management Investment Banking US Wealth Management  Board meet Europe Wealth Management  Board meet Brokerage Management  Board meet
To- Be Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],UBS Investment banking Europe Fixed Income  US Exchange trading US Wealth Management Oracle Sybase SAP Oracle U B S Da t a S t a g i n g Extract SAS Oracle SAP Wealth management Europe Institutional investment
 
Data Pipeline DDA CIS SWIFT Money Market transaction hub Load to IEF Load to IEF Load to IEF Data Hub Wires Reference data Posted & Deposit Detail Transactions TDA Extract Normalize & Transform Load Fortent Monitor Systems of Record FedWire transactions wire  transactions customers accounts rel man Concept: Fortent software training material I E F Excel sheet,  graphs Excel sheet,  graphs Excel sheet,  graphs Zurich office London office New York office Money Laundering Data warehouse
Alternatives Key Process  change Implementation Of IT in handing Transactions Setting up Separate Money Laundering Division Brick to Click Organization for Internal reporting & HR changes Merger, Tie up with upcoming Online Financial companies & Websites [1]  Professor S. Seshadari, IIT Professor slides on Datawarehousing.  Only the diagram structure taken by Professor’s slide. The concept & content based  on my understanding of Delta case. Centralization  and Integration of Various Divisions
Merger, Partner with other Online Financial companies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Western Union Or Charles Schaub which are in Online Financial services business **  Above Pictures taken from Google Images
Go International, grow international  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],**  Above Pictures taken from Google Images
Transform workforce, move from  Brick to Click Organization only for Internal reporting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],**  Above Pictures taken from Google Images
Organisational changes As Is To Be Hierarchy based org Structure Services, Product line based org Structure
Future Key Processes – To Be Brokerage Asset Management Private Banking Investment Banking Institutional investors **  Above Pictures taken from Google Images
Recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Training and Awareness Program Cost of Compliance Anti-Money Laundering Strategy Anti - money laundering standards and procedures Management Commitment Security & technology usage Administrative and end - user  policies and procedures KYC  - Data  Access/Mining Transaction Monitoring/  Tracking Processes  Business and organisation Processes & Initiatives Tactical short term  solutions Compliance Requirements International, Regulatory, Industry, Third Party, Internal AML Reporting Risk assessment Investment suitability Tax etc.  Investment suitability Tax etc.  Know your customer (KYC)  - Account Opening From Reactive to Proactive approach Integrated Approach
Pre requisites for Integrated approach to ML Bank: centralisation of information collection process …  to Centralised information source on correspondent banks From … Numerous bilateral information exchanges  Source: www.swift.com/index.cfm?item_id=3878
Organisational changes As Is To Be Hierarchy based org Structure Services, Product line based org Structure
References MIS 760 Team Case 1. www.cfdg.org.uk/.../events_h_050518_E3%20-%20 Money %20 Laundering %20and%20Fraud%20-%20Don%20Bawtree. ppt   Presentation from Don Rawtree, Don Bawtree, Partner, BDO Stoy Hayward LLP, Emerald House, East Street, Epsom, Surrey, KT17 1HS 2.  Presentation on  Briefing on ‘KYC’ Norms and ‘AML’ Measures for IBA Member Banks   by  Sanjeev Singh, Additional Director, FIU-IND, Financial Intelligence Unit-India  3. www.fintraca.gov.af/assets/ppt/AML  4.http://www.nchelp.org/elibrary/Presentations/2003/2003WinterLegalAffairsMeeting/Consumer%20Privacy%20Issues.ppt  5. www.cityinformation.org.uk/Events/presentations/2007-May-MicheleBate.ppt  6.  http://www.amlcft.com/cases.htm#Recent_Major_Fines_and_Penalties 7.  Presentation on  Briefing on ‘KYC’ Norms and ‘AML’ Measures for IBA Member Banks
References ,[object Object],[object Object],[object Object],[object Object]
References & Bibliography  ,[object Object],[object Object]
Ethical Statement “ Cheating during in-class tests or take-home examinations or homework is, of course, illegal and immoral. A Graduate Academic Evaluation Board exists to investigate academic improprieties, conduct hearings, and determine any necessary actions. The term ‘academic impropriety’ is meant to include, but is not limited to, cheating on homework, during in-class or take home examinations and plagiarism.” Consequences of academic impropriety are severe, ranging from receiving an “F” in a course, to warning from the Dean of the Graduate School, which becomes a part of the permanent student record, to expulsion. Consistent with the above statements, all homework exercises, tests and exams that are designated as individual assignments must contain the following signed statement before they can be accepted for grading. I, Kartik Mehta, pledge on my honor that I have not given or received any unauthorized assistance on this assignment/examination. I ,Kartik Mehta, further pledge that I have not copied any material from a book, article, the Internet or any other source except where I have expressly cited the source.  MIS 760 Team Case

Weitere ähnliche Inhalte

Was ist angesagt?

Trade based money laundering dr. arefin , dg (prevention ) acc) on 23 may 2017
Trade based money laundering dr. arefin , dg (prevention ) acc) on 23 may 2017Trade based money laundering dr. arefin , dg (prevention ) acc) on 23 may 2017
Trade based money laundering dr. arefin , dg (prevention ) acc) on 23 may 2017
Shamsul Arefin
 
Assessing AML Geographic Risk: a Methodology (November 2020)
Assessing AML Geographic Risk: a Methodology (November 2020)Assessing AML Geographic Risk: a Methodology (November 2020)
Assessing AML Geographic Risk: a Methodology (November 2020)
Alessa
 
Anti-Money Laundering and Counter Financing of Terrorism
Anti-Money Laundering and Counter Financing of TerrorismAnti-Money Laundering and Counter Financing of Terrorism
Anti-Money Laundering and Counter Financing of Terrorism
Puni Hariaratnam
 
Anti Money Laundering - CDD & KYC
Anti Money Laundering - CDD & KYCAnti Money Laundering - CDD & KYC
Anti Money Laundering - CDD & KYC
Besart Qerimi
 
Anti Money Laundering
Anti Money Laundering Anti Money Laundering
Anti Money Laundering
Besart Qerimi
 
How to Improve Anti-Money Laundering Investigation using Neo4j
How to Improve Anti-Money Laundering Investigation using Neo4jHow to Improve Anti-Money Laundering Investigation using Neo4j
How to Improve Anti-Money Laundering Investigation using Neo4j
Neo4j
 

Was ist angesagt? (20)

Trade based money laundering dr. arefin , dg (prevention ) acc) on 23 may 2017
Trade based money laundering dr. arefin , dg (prevention ) acc) on 23 may 2017Trade based money laundering dr. arefin , dg (prevention ) acc) on 23 may 2017
Trade based money laundering dr. arefin , dg (prevention ) acc) on 23 may 2017
 
The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK
The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK
The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK
 
Anti Money Laundering Presentation
Anti Money Laundering PresentationAnti Money Laundering Presentation
Anti Money Laundering Presentation
 
Assessing AML Geographic Risk: a Methodology (November 2020)
Assessing AML Geographic Risk: a Methodology (November 2020)Assessing AML Geographic Risk: a Methodology (November 2020)
Assessing AML Geographic Risk: a Methodology (November 2020)
 
AML Presentation 2.pptx
AML Presentation 2.pptxAML Presentation 2.pptx
AML Presentation 2.pptx
 
Preventing Bank's Fraud and Forgery
Preventing Bank's Fraud and ForgeryPreventing Bank's Fraud and Forgery
Preventing Bank's Fraud and Forgery
 
Automated anti money laundering using artificial intelligence and machine lea...
Automated anti money laundering using artificial intelligence and machine lea...Automated anti money laundering using artificial intelligence and machine lea...
Automated anti money laundering using artificial intelligence and machine lea...
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 
Anti-money Laundering
Anti-money LaunderingAnti-money Laundering
Anti-money Laundering
 
Anti-Money Laundering and Counter Financing of Terrorism
Anti-Money Laundering and Counter Financing of TerrorismAnti-Money Laundering and Counter Financing of Terrorism
Anti-Money Laundering and Counter Financing of Terrorism
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in banks
 
Fraud Risk Assessment
Fraud Risk AssessmentFraud Risk Assessment
Fraud Risk Assessment
 
Money laundering
Money laundering Money laundering
Money laundering
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and Control
 
Anti Money Laundering - CDD & KYC
Anti Money Laundering - CDD & KYCAnti Money Laundering - CDD & KYC
Anti Money Laundering - CDD & KYC
 
Aml cft training programme
Aml cft training programmeAml cft training programme
Aml cft training programme
 
Suspicious Activity Reporting
Suspicious Activity ReportingSuspicious Activity Reporting
Suspicious Activity Reporting
 
Anti Money Laundering
Anti Money Laundering Anti Money Laundering
Anti Money Laundering
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud Training
 
How to Improve Anti-Money Laundering Investigation using Neo4j
How to Improve Anti-Money Laundering Investigation using Neo4jHow to Improve Anti-Money Laundering Investigation using Neo4j
How to Improve Anti-Money Laundering Investigation using Neo4j
 

Andere mochten auch

Money laundering
Money launderingMoney laundering
Money laundering
saadiakh
 
Crowe AML Model Risk Management Whitepaper
Crowe AML Model Risk Management WhitepaperCrowe AML Model Risk Management Whitepaper
Crowe AML Model Risk Management Whitepaper
Brett Rosynek
 
Machine Learning, Data Mining, Genetic Algorithms, Neural ...
Machine Learning, Data Mining, Genetic Algorithms, Neural ...Machine Learning, Data Mining, Genetic Algorithms, Neural ...
Machine Learning, Data Mining, Genetic Algorithms, Neural ...
butest
 
10-15 511 genetic algorithms and machine learning (alan nochenson)
10-15 511 genetic algorithms and machine learning (alan nochenson)10-15 511 genetic algorithms and machine learning (alan nochenson)
10-15 511 genetic algorithms and machine learning (alan nochenson)
Alan Nochenson
 

Andere mochten auch (20)

Anti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment ProcessAnti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment Process
 
Money laundering
Money launderingMoney laundering
Money laundering
 
Anti money laundering
Anti money launderingAnti money laundering
Anti money laundering
 
Presentation: Stop illicit trade of tobacco
Presentation: Stop illicit trade of tobaccoPresentation: Stop illicit trade of tobacco
Presentation: Stop illicit trade of tobacco
 
Case sas 2
Case sas 2Case sas 2
Case sas 2
 
Delivering agile customer experience in the nexus Era
Delivering agile customer experience in the nexus EraDelivering agile customer experience in the nexus Era
Delivering agile customer experience in the nexus Era
 
Sas anti money laundering training
Sas anti money laundering training Sas anti money laundering training
Sas anti money laundering training
 
0122 02SAS
0122 02SAS0122 02SAS
0122 02SAS
 
Know More About KYC and Money Laundering Procedure by DHFL
Know More About KYC and Money Laundering Procedure by DHFLKnow More About KYC and Money Laundering Procedure by DHFL
Know More About KYC and Money Laundering Procedure by DHFL
 
Crowe AML Model Risk Management Whitepaper
Crowe AML Model Risk Management WhitepaperCrowe AML Model Risk Management Whitepaper
Crowe AML Model Risk Management Whitepaper
 
Illicit Cigarette Trade: A Global Pandemic
Illicit Cigarette Trade: A Global PandemicIllicit Cigarette Trade: A Global Pandemic
Illicit Cigarette Trade: A Global Pandemic
 
Risk based approach
Risk based approachRisk based approach
Risk based approach
 
Machine Learning, Data Mining, Genetic Algorithms, Neural ...
Machine Learning, Data Mining, Genetic Algorithms, Neural ...Machine Learning, Data Mining, Genetic Algorithms, Neural ...
Machine Learning, Data Mining, Genetic Algorithms, Neural ...
 
10-15 511 genetic algorithms and machine learning (alan nochenson)
10-15 511 genetic algorithms and machine learning (alan nochenson)10-15 511 genetic algorithms and machine learning (alan nochenson)
10-15 511 genetic algorithms and machine learning (alan nochenson)
 
Github in a Graph
Github in a GraphGithub in a Graph
Github in a Graph
 
Finding the insights hidden in your graph data
Finding the insights hidden in your graph dataFinding the insights hidden in your graph data
Finding the insights hidden in your graph data
 
Fouille de données issues d’un grand graphe par carte de Kohonen à noyau
Fouille de données issues d’un grand graphe par carte de Kohonen à noyauFouille de données issues d’un grand graphe par carte de Kohonen à noyau
Fouille de données issues d’un grand graphe par carte de Kohonen à noyau
 
Visualizing an anti-money laundering investigation
Visualizing an anti-money laundering investigationVisualizing an anti-money laundering investigation
Visualizing an anti-money laundering investigation
 
20141015 how graphs revolutionize access management
20141015 how graphs revolutionize access management20141015 how graphs revolutionize access management
20141015 how graphs revolutionize access management
 
Graph Database Prototyping made easy with Graphgen
Graph Database Prototyping made easy with GraphgenGraph Database Prototyping made easy with Graphgen
Graph Database Prototyping made easy with Graphgen
 

Ähnlich wie Business Intelligence For Anti-Money Laundering

Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
Kartik Mehta
 
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
DataWorks Summit
 
AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2
Eric Young
 
Regulatory & Compliance Account Opening
Regulatory & Compliance Account OpeningRegulatory & Compliance Account Opening
Regulatory & Compliance Account Opening
Axis Technology, LLC
 
Fiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochureFiserv FCRM Platform Brochure
Fiserv FCRM Platform Brochure
Paul Stabile
 
Timothy_Dunham_Resume_080116
Timothy_Dunham_Resume_080116Timothy_Dunham_Resume_080116
Timothy_Dunham_Resume_080116
Timothy Dunham
 

Ähnlich wie Business Intelligence For Anti-Money Laundering (20)

Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
 
Falcon 012009
Falcon 012009Falcon 012009
Falcon 012009
 
Citigroup Dact Final Tv
Citigroup Dact Final TvCitigroup Dact Final Tv
Citigroup Dact Final Tv
 
abhishek singh cv
abhishek singh cvabhishek singh cv
abhishek singh cv
 
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2
 
Money Laundering Risk Technological Perspective Fina Lv1
Money Laundering Risk Technological Perspective Fina Lv1Money Laundering Risk Technological Perspective Fina Lv1
Money Laundering Risk Technological Perspective Fina Lv1
 
Regulatory & Compliance Account Opening
Regulatory & Compliance Account OpeningRegulatory & Compliance Account Opening
Regulatory & Compliance Account Opening
 
Fiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochureFiserv FCRM Platform Brochure
Fiserv FCRM Platform Brochure
 
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
opustechglobal-com-key-risks-to-consider-when-implementing-real-time-payments...
 
Custody Banking and Emerging KYC Needs
Custody Banking and Emerging KYC NeedsCustody Banking and Emerging KYC Needs
Custody Banking and Emerging KYC Needs
 
Timothy_Dunham_Resume_080116
Timothy_Dunham_Resume_080116Timothy_Dunham_Resume_080116
Timothy_Dunham_Resume_080116
 
Webinar Deck: Efficient Methods for Managing Global Cash in Today's Regulator...
Webinar Deck: Efficient Methods for Managing Global Cash in Today's Regulator...Webinar Deck: Efficient Methods for Managing Global Cash in Today's Regulator...
Webinar Deck: Efficient Methods for Managing Global Cash in Today's Regulator...
 
Resume - Snehal Thakur
Resume - Snehal ThakurResume - Snehal Thakur
Resume - Snehal Thakur
 
EAI Checklist
EAI ChecklistEAI Checklist
EAI Checklist
 
5 Applications of Data Science in FinTech: The Tech Behind the Booming FinTec...
5 Applications of Data Science in FinTech: The Tech Behind the Booming FinTec...5 Applications of Data Science in FinTech: The Tech Behind the Booming FinTec...
5 Applications of Data Science in FinTech: The Tech Behind the Booming FinTec...
 
How Are Data Analytics Used In The Banking And Finance Industries.pdf
How Are Data Analytics Used In The Banking And Finance Industries.pdfHow Are Data Analytics Used In The Banking And Finance Industries.pdf
How Are Data Analytics Used In The Banking And Finance Industries.pdf
 
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
 
Ibm financial crime management solution 3
Ibm financial crime management solution 3Ibm financial crime management solution 3
Ibm financial crime management solution 3
 

Mehr von Kartik Mehta

Paper - Growth of mobile services, its global reach and its impact on GDPs of...
Paper - Growth of mobile services, its global reach and its impact on GDPs of...Paper - Growth of mobile services, its global reach and its impact on GDPs of...
Paper - Growth of mobile services, its global reach and its impact on GDPs of...
Kartik Mehta
 
Business Intelligence Role Decision Making
Business Intelligence Role Decision MakingBusiness Intelligence Role Decision Making
Business Intelligence Role Decision Making
Kartik Mehta
 

Mehr von Kartik Mehta (9)

Mobile commerce km
Mobile commerce kmMobile commerce km
Mobile commerce km
 
Wimax and changing wireless eco system
Wimax and changing wireless eco systemWimax and changing wireless eco system
Wimax and changing wireless eco system
 
Paper - Growth of mobile services, its global reach and its impact on GDPs of...
Paper - Growth of mobile services, its global reach and its impact on GDPs of...Paper - Growth of mobile services, its global reach and its impact on GDPs of...
Paper - Growth of mobile services, its global reach and its impact on GDPs of...
 
Mobile services and its impact on GPDs and Return on Investment
Mobile services and its impact on GPDs and Return on InvestmentMobile services and its impact on GPDs and Return on Investment
Mobile services and its impact on GPDs and Return on Investment
 
Business Intelligence Role Decision Making
Business Intelligence Role Decision MakingBusiness Intelligence Role Decision Making
Business Intelligence Role Decision Making
 
Chase Decentralised System
Chase Decentralised SystemChase Decentralised System
Chase Decentralised System
 
Business Intelligence In Financial Industry
Business Intelligence In Financial IndustryBusiness Intelligence In Financial Industry
Business Intelligence In Financial Industry
 
From Brick Mortar To Online Click Organisation
From Brick Mortar To Online Click OrganisationFrom Brick Mortar To Online Click Organisation
From Brick Mortar To Online Click Organisation
 
Trade And Settlement Process
Trade And Settlement ProcessTrade And Settlement Process
Trade And Settlement Process
 

Kürzlich hochgeladen

unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
dlhescort
 

Kürzlich hochgeladen (20)

Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLJAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 

Business Intelligence For Anti-Money Laundering

  • 1. Anti-Money Laundering Compliance software implementation
  • 2.
  • 3.
  • 4. Training and Awareness Program Cost of Compliance Anti-Money Laundering Strategy Anti - money laundering standards and procedures Management Commitment Security & technology usage Administrative and end - user policies and procedures KYC - Data Access/Mining Transaction Monitoring/ Tracking Processes Business and organisation Processes & Initiatives Tactical short term solutions Compliance Requirements International, Regulatory, Industry, Third Party, Internal AML Reporting Risk assessment Investment suitability Tax etc. Investment suitability Tax etc. Know your customer (KYC) - Account Opening From Reactive to Proactive approach Integrated Approach
  • 5. Data Pipeline DDA CIS SWIFT Money Market transaction hub Load to IEF Load to IEF Load to IEF Data Hub Wires Reference data Posted & Deposit Detail Transactions TDA Extract Normalize & Transform Load Fortent Monitor Systems of Record FedWire transactions wire transactions customers accounts rel man Concept: Fortent software training material I E F Excel sheet, graphs Excel sheet, graphs Excel sheet, graphs Zurich office London office New York office Money Laundering Data warehouse
  • 6.
  • 7. Opportunities: Easy Trends analysis Money Laundering Analysis using Tools Users Wealth Management Investment Banking Calculation Engine Actuate Actuate Zurich office Stamford Office Actuate Cognos SAS New York office Actuate London Office Excel sheet, graphs Excel sheet, graphs Excel sheet, graphs Excel sheet, graphs
  • 8. Opportunity: Easy access of information globally Zurich office – Report on Clients transactions unexplained for amount above $10,000 . Stamford office List of clients in US said to be under suspicion radar Berlin office List of clients in Germany said to be under suspicion radar New York office – US government – List of all Clients under suspicion by bank’s investigators Paris office – How to perform better Than Credit Suisse – search Trends Excel, Word London office demands Suspicious Activity Reports
  • 9. Opportunities: Actual number & not mere suspicion about Client & their transaction 10 47 30 12 Wealth Management Investment banking Fixed Income Institutional securities US Europe Asia 3/1 3/2 3/3 3/4 Date Month Region Product
  • 10. External Problems Globalisation of clients & data Sophisticated money launderers Inefficient compliance systems Reporting to number of agencies & regulation change Accountability of transactions from Corresponding banks, investigate volumes of data. [1] Professor S. Seshadari, IIT Professor slides on Datawarehousing. Only the diagram structure taken by Professor’s slide. The concept & content based on my understanding of Delta case. Privacy concern’ Of clients
  • 11. Internal Problems Hire Paralegal & IT team well versed with Patriot Act AML software which is best processes and budget? Where to hire best IT, Technology consultants Each division working on different data system [1] Professor S. Seshadari, IIT Professor slides on Datawarehousing. Only the diagram structure taken by Professor’s slide. The concept & content based on my understanding of Delta case. Massive volumes Of data & Data integration Permissions Within The bank Day – to- day operations Vs Trends & Strategy issues
  • 12. Operational Problem: Quick access to financial information in manage transactions What product promotions have the biggest impact on revenue? What is the most effective distribution channel? Who are my customers and what products are they buying? Which are our lowest/highest margin customers ? What impact will new products/services have on revenue and margins? Which customers are most likely to go to the competition ?
  • 13.
  • 14.
  • 15. Know Your Customer Guidelines Customer Acceptance - Ensure that you accept only legitimate and bona fide customers. Customer Identification- Ensure that you properly identify your customers to understand the risks they may pose. Transactions Monitoring- Monitor customers accounts and transactions to prevent or detect illegal activities. Risk Management- Implement processes to effectively manage the risks posed by customers trying to misuse facilities. Money Laundering Searches required by the Compliance Officer Source: Presentation by Sanjeev Singh
  • 16. KYC: If Client Involved in Money Laundering Activities Drug Trafficking Bribery / Corruption Prostitution Gambling Tax Evasion Extortion Robbery and Fraud White Collar Crimes ( including Insider Trading and Securities offences ) Smuggling (arms, people, goods) Counterfeiting and Forgery Kidnapping Serious Crime or All Crimes? Organised Crime Source: www.fintraca.gov.af/assets/ ppt /AML
  • 17. Goal: Integration of Company’s data to enable Money Laundering Analysis Across Bank’s various Divisions for Analysis to happen Investment Banking – Europe division Global Wealth Management Fixed Income US division Trading and Settlement Switzerland Division Drill down By city, country Drill down by Financial product Trend analysis By region Granular Details by region City, state, country
  • 18. Fortent Monitor Data Manager Profiling Engine Operational Data Store Detection Engine Investigation System Source: Fortent software training material
  • 19. Data Pipeline DDA CIS SWIFT Money Market transaction hub Load to IEF Load to IEF Load to IEF Data Hub Wires Reference data Posted & Deposit Detail Transactions TDA Extract Normalize & Transform Load Fortent Monitor Systems of Record FedWire transactions wire transactions customers accounts rel man Concept: Fortent software training material I E F Excel sheet, graphs Excel sheet, graphs Excel sheet, graphs Zurich office London office New York office Money Laundering Data warehouse
  • 20.
  • 21. Goal: Process change Exchang e Electronic Communications Network Market Maker Firm Internalizes Order Internet order Phone order [1] http://www.ibtimes.com/articles/20061006/add-nyse-electronic-trading.htm
  • 22.
  • 23. The Simple SWOT from MIS750 S TRENGTHS W EAKNESSES O PPORTUNITIES T HREATS 4. Existing Human Resource, Divisions, high cost Brick structure within bank, how to utiilize their services compared to Click structure of small Online companies & consequently their low operating cost. 6. Buying / Tie up with Online Financial services Company and learn from their low cost Click culture, Online handling of Processes like Fox TV who successfully launched My Space on Internet though traditional TV Media company. 5. Lack of methods to know and verify Customer details from what they say and what they actually do. 6. Huge amount of daily data to be checked right from Client’s details, to Transactions, to email correspondence between the Client and the Bank. 7. Cataloging data from around the world, from all their Clients & from all the Client’s transactions and then storing all these details at Bank’s location. 8. Cataloging all the above details and yet comply with the Swiss Privacy Laws of Non Disclosure of Client’s details and maintaining Client’s Privacy.
  • 24. Weakness: Data Integration & Size of Bank Problems: Data Disintegration Across Sources Brokerage Credit card Wealth Management Investment Banking Same data different name Different data Same name Data found here nowhere else Different keys same data
  • 25.
  • 26.
  • 27. Strengths Weaknesses 1. Use Huge pockets to deploy latest Money Laundering Technology. 2. Use Brand name to enter Online Money Laundering Banking Operations. 1. Provide staff IT training in Money Laundering software to make them equipped to handle Money Laundering software operations. 1. Fines from the regulators. New changing regulations around the world and fines for Bank in event of non compliance to these new laws. Loss of Image in case Bank found guilty of Money Laundering. Tie up Start up firms to join the Online Products & services. Tie-up and Co-Brand services with existing Online player to compete with new born Online firm. Lower cost of operations and transaction to attract customers from competition. Tie-up with IBM, Infosys to provide regular supply of well experienced IT workers. Start transformation of Enterprise into IT governed enterprise parallelly in multiple divisions of bank. Opportunities S O STRATEGIES W O STRATEGIES S T STRATEGIES W T STRATEGIES Threats Super SWOT Company UBS Money Laundering Division 1. Brand Name 2. Cash Flow 3. Well distributed office locales 4. Products and services 5. Trained Financial workforce. 6. Part of Bank Transactions Online. 1. Huge Online market untapped. 2. Commanding presence in US, European 3. Greater reach to clients than competitors 4. Offer more variety services 1. Lack of in house Money Laundering & IT workforce 2. Huge size, slower adoption of technology than by competitors 3. High cost of Brick structure against the Click structure and high operating cost. 4. Late mover in Online market.
  • 28. Strengths Weaknesses 3. Use big distribution to get more clients than competition. 4. Use huge infrastructure to provide Add on services. 1. Use Huge pockets to deploy latest Money Laundering software & trained IT workforce from say IBM. 2. Use brand name to offer Online services and market these. 2. Slow adoption of IT 3. In house trained workforce Tie up Start up firms to join the Online Products & services. Tie-up and Co-Brand services with existing Online player to compete with new born Online firm. Lower cost of operations and transaction to attract customers from competition. Tie-up with IBM, Infosys to provide regular supply of well experienced IT workers. Start transformation of Enterprise into IT governed enterprise parallelly in multiple divisions of bank. Opportunities S O STRATEGIES W O STRATEGIES S T STRATEGIES W T STRATEGIES Threats Super SWOT Company UBS Money Laundering Division
  • 29. Method 1: Customer Relationship Management CRM used for Monitoring/Reporting Customer ID documentation Enhanced due diligence Monitoring Reporting FIU analysis Investigation Application from customer Within the institution Outside the institution When should KYC research need to be carried out? Source: www.baft.org presentation by Andrew Clark
  • 30.
  • 31. Method 1 Contd… CRM : 2 Tracking Suspicious Behavior by customer, by transaction Comparison of current month to account profile Comparison of current month to peer profile Event Thresholds Sum of scores SB Thresholds Alerts Account Value Account Volume Insufficient Account Insufficient Peer Peer Volume Peer Value Events Group by customer Customer Security Blanket Infraction Account Security Blanket Infraction BLU Infraction Infractions (reason for alert) Account Profile Peer Profile Monthly Summary Daily Summary Daily Summary Daily Summary Source: Fortent software training material
  • 32. Fortent Monitor Data Manager Profiling Engine Operational Data Store Detection Engine Investigation System Source: Fortent software training material Method 2: Information Organization
  • 33. Data Pipeline DDA CIS SWIFT Money Market transaction hub Load to IEF Load to IEF Load to IEF Data Hub Wires Reference data Posted & Deposit Detail Transactions TDA Extract Normalize & Transform Load Fortent Monitor Systems of Record FedWire transactions wire transactions customers accounts rel man Concept: Fortent software training material I E F Excel sheet, graphs Excel sheet, graphs Excel sheet, graphs Zurich office London office New York office Method 2: Information Organization Money Laundering Data warehouse
  • 34.
  • 35. Method 2: Information Organization What do we look at ? Role Country Bank Account Island Bank Peoples Bank Lion Bank Transaction Type Originator SWIFT Intermediary 1 SWIFT Intermediary 2 SWIFT $ Wachovia Beneficiary SWIFT $ Message/Product Type SWIFT MT103 WIRE Source: Fortent software training material
  • 36.
  • 37. Business Strategy Competitors Banks like Barclays, Credit Swisse, Citi Group are also deploying Technology, but Business Intelligence might be UBS edge. Local banks, online financial instutions with low distribution network will loose customers badly and may even cease to exist. Competitors Banks like Barclays, Credit Swisse, Citi Group as well Online firms like E-Trade, Charles Schwab are giving UBS tough competition. Customers/Clients Educated, high net worth individual well versed with Online services, specially younger generation will jump on, might loose those who not Online. Client prefer Telephone or web meetings, one-to-one meeting only in special cases. Customers/Clients For Clients coming to bank for one-to-one meet is a norm loaded with paper and going back with bag full of financial documents. Products and Services Single UBS Executive, Client’s point of contact for all kinds of accounts, Asset, Wealth Management or Brokerage to get overall picture. Online services. Products and Services Asset Management, Wealth management, Brokerage – to an extent still manual and same client has to call different divisions for different accounts Business Scope To-Be As-Is
  • 38. Products & Services / Clients & Customers – As is
  • 39. Products & Services / Clients & Customers – To Be
  • 40. Business Strategy Online Asset management, Brokerage, Taxes filing, Pension policy advise and related Online services become norm. Services over the phone, Call center services for minor administrative services like logging on bank’s Web page, opening bank account become a norm. Note Changes Big distribution network. Brand Name Deep pockets to implement any new technology within a short time. Distinctive Competencies Internal Decisions , Regulatory, Etc. Patriot Act details of client submission to government – implementation done Online only using Excel, Business Objects, graphs. Internal Decisions , Regulatory, Etc. Patriot Act implementation done both partly manual, partly Online Business Governance To-Be As-Is
  • 41. As – Is : Business Strategy Governance Paper based Approach to Money Laundering Bank teller puts in Customer account Office Boy Faxes Account details Details received at Bank’s Head office Office Boy Suspicious Transaction Accounts Desk Search for Right Client Account & Right FAX Investigator from FBI, Bank, Head Bank Try to trace client’s details Investigator Search Account past trends Money deposit by Client Bank manager Compiles transaction Volume of paper work In Investigation and Administrative loop holes Leads to loss of Investigation. Is this Client records Processing fine in 2008?
  • 42. As – Is : Business Strategy
  • 43. Training and Awareness Program Cost of Compliance Anti-Money Laundering Strategy Anti - money laundering standards and procedures Management Commitment Security & technology usage Administrative and end - user policies and procedures KYC - Data Access/Mining Transaction Monitoring/ Tracking Processes Business and organisation Processes & Initiatives Tactical short term solutions Compliance Requirements International, Regulatory, Industry, Third Party, Internal AML Reporting Risk assessment Investment suitability Tax etc. Investment suitability Tax etc. Know your customer (KYC) - Account Opening Business Strategy Governance: To Be From Reactive to Proactive approach Integrated Approach
  • 45. Business Infrastructure Fast typing skills mandatory along with use of all MS Office products from Word, to Excel to Power point, Outlook, Web browsing along with specilised software like Database programmes like SQL, Business Objects, Charles River for few. Paper based work, typing skills, telephonic skills, PC skills limited to MS Word and limited level of MS Excel. HR/Skills Separate head for Money Laundering was brought in. Person was of level of Director reporting directly to Executive Committee and working in parallel with CIO. Division was headed by Business Analyst, Project Manager who was much low in Management ranking. Administrative Process have been designed to be all Online, data transfer, sharing, all online with click of a button. Bank’s declining position, bank responsibility to comply with new new compliances and unhappy customers with slower transaction speed as compared to competitors. Few process were manual, few based on Excel sheets, few other online but there was no integration, so one division could not exchange information with other without use of paper. Key Processes To-Be As-Is
  • 46. As – Is : Administrative Approach to Money Laundering REACTIVE APPROACH Bank teller puts in Customer account Office Boy Faxes Account details Details received at Bank’s Head office Office Boy Suspicious Transaction Accounts Desk Search for Right Client Account & Right FAX Investigator from FBI, Bank, Head Bank Try to trace client’s details Investigator Search Account past trends Money deposit by Client Bank manager Compiles transaction Volume of paper work In Investigation and Administrative loop holes Leads to loss of Investigation. Is this Client records Processing fine in 2008?
  • 47. Current Key Processes – As Is Brokerage Asset Management Private Banking Investment Banking Institutional investors ** Above Pictures taken from Google Images
  • 48. Future Key Processes – To Be Brokerage Asset Management Private Banking Investment Banking Institutional investors ** Above Pictures taken from Google Images
  • 49. Organisational changes As Is To Be Hierarchy based org Structure Services, Product line based org Structure
  • 50. Human Resources As is To Be
  • 51. IT Strategy Internal Decisions , Regulatory, Etc. Include all areas that are relevant after the project implementation. Note Changes Internal Decisions , Regulatory, Etc. Include all areas that are relevant before the project implementation Governance Key Applications After project implementation Key Technologies After project implementation Key Applications Prior to project implementation Key Technologies Prior to project implementation Technology Scope Those areas in which the company has a distinct or competitive advantage over their competition after the implementation of the project. Note Changes Those areas in which the company has a distinct or competitive advantage over their competition. System Competency To-Be As-Is
  • 52. As – Is : IT Strategy Paper based Approach to Money Laundering Bank teller puts in Customer account Office Boy Faxes Account details Details received at Bank’s Head office Office Boy Suspicious Transaction Accounts Desk Search for Right Client Account & Right FAX Investigator from FBI, Bank, Head Bank Try to trace client’s details Investigator Search Account past trends Money deposit by Client Bank manager Compiles transaction Volume of paper work In Investigation and Administrative loop holes Leads to loss of Investigation. Is this Client records Processing fine in 2008?
  • 53. IT Strategy - As Is
  • 55. Infrastructural Re Design & Deployment Money Laundering Data warehouse
  • 56. IT Strategy: To Be As a result of Process change implementation Exchang e Electronic Communications Network Market Maker Firm Internalizes Order Internet order Phone order
  • 57. IT Infrastructure As-Is To-Be Architecture The IT Architecture prior to the project The IT Architecture after the project implementation. Key Processes The Key Processes prior to the project. The Key Processes after the project implementation. H/R/SKILLS HR duties and functions prior to the project. HR duties and functions after the project.
  • 58. Pre requisites for Integrated approach to trade processing: centralisation of information collection process … to Centralised information source on correspondent banks From … Numerous bilateral information exchanges within financial institutions Source: www.swift.com/index.cfm?item_id=3878
  • 59. As – Is Architecture US Wealth Management Europe Wealth Management Investment Banking US Wealth Management Board meet Europe Wealth Management Board meet Brokerage Management Board meet
  • 60.
  • 61.  
  • 62. Data Pipeline DDA CIS SWIFT Money Market transaction hub Load to IEF Load to IEF Load to IEF Data Hub Wires Reference data Posted & Deposit Detail Transactions TDA Extract Normalize & Transform Load Fortent Monitor Systems of Record FedWire transactions wire transactions customers accounts rel man Concept: Fortent software training material I E F Excel sheet, graphs Excel sheet, graphs Excel sheet, graphs Zurich office London office New York office Money Laundering Data warehouse
  • 63. Alternatives Key Process change Implementation Of IT in handing Transactions Setting up Separate Money Laundering Division Brick to Click Organization for Internal reporting & HR changes Merger, Tie up with upcoming Online Financial companies & Websites [1] Professor S. Seshadari, IIT Professor slides on Datawarehousing. Only the diagram structure taken by Professor’s slide. The concept & content based on my understanding of Delta case. Centralization and Integration of Various Divisions
  • 64.
  • 65.
  • 66.
  • 67. Organisational changes As Is To Be Hierarchy based org Structure Services, Product line based org Structure
  • 68. Future Key Processes – To Be Brokerage Asset Management Private Banking Investment Banking Institutional investors ** Above Pictures taken from Google Images
  • 69.
  • 70. Training and Awareness Program Cost of Compliance Anti-Money Laundering Strategy Anti - money laundering standards and procedures Management Commitment Security & technology usage Administrative and end - user policies and procedures KYC - Data Access/Mining Transaction Monitoring/ Tracking Processes Business and organisation Processes & Initiatives Tactical short term solutions Compliance Requirements International, Regulatory, Industry, Third Party, Internal AML Reporting Risk assessment Investment suitability Tax etc. Investment suitability Tax etc. Know your customer (KYC) - Account Opening From Reactive to Proactive approach Integrated Approach
  • 71. Pre requisites for Integrated approach to ML Bank: centralisation of information collection process … to Centralised information source on correspondent banks From … Numerous bilateral information exchanges Source: www.swift.com/index.cfm?item_id=3878
  • 72. Organisational changes As Is To Be Hierarchy based org Structure Services, Product line based org Structure
  • 73. References MIS 760 Team Case 1. www.cfdg.org.uk/.../events_h_050518_E3%20-%20 Money %20 Laundering %20and%20Fraud%20-%20Don%20Bawtree. ppt Presentation from Don Rawtree, Don Bawtree, Partner, BDO Stoy Hayward LLP, Emerald House, East Street, Epsom, Surrey, KT17 1HS 2. Presentation on Briefing on ‘KYC’ Norms and ‘AML’ Measures for IBA Member Banks by Sanjeev Singh, Additional Director, FIU-IND, Financial Intelligence Unit-India 3. www.fintraca.gov.af/assets/ppt/AML 4.http://www.nchelp.org/elibrary/Presentations/2003/2003WinterLegalAffairsMeeting/Consumer%20Privacy%20Issues.ppt 5. www.cityinformation.org.uk/Events/presentations/2007-May-MicheleBate.ppt 6. http://www.amlcft.com/cases.htm#Recent_Major_Fines_and_Penalties 7. Presentation on Briefing on ‘KYC’ Norms and ‘AML’ Measures for IBA Member Banks
  • 74.
  • 75.
  • 76. Ethical Statement “ Cheating during in-class tests or take-home examinations or homework is, of course, illegal and immoral. A Graduate Academic Evaluation Board exists to investigate academic improprieties, conduct hearings, and determine any necessary actions. The term ‘academic impropriety’ is meant to include, but is not limited to, cheating on homework, during in-class or take home examinations and plagiarism.” Consequences of academic impropriety are severe, ranging from receiving an “F” in a course, to warning from the Dean of the Graduate School, which becomes a part of the permanent student record, to expulsion. Consistent with the above statements, all homework exercises, tests and exams that are designated as individual assignments must contain the following signed statement before they can be accepted for grading. I, Kartik Mehta, pledge on my honor that I have not given or received any unauthorized assistance on this assignment/examination. I ,Kartik Mehta, further pledge that I have not copied any material from a book, article, the Internet or any other source except where I have expressly cited the source. MIS 760 Team Case