- •ABBREVIATIONS AND ACRONYMS
- •INTRODUCTION
- •1. The evolution of money laundering and AML/CFT measures
- •1.1. A brief history of money laundering
- •1.2. The first stage of ML evolution: Al Capone tax evasion charges
- •1.3. The subsequent stages of ML evolution: better hiding techniques
- •1.4. The appearance of “money laundering” expression in the legal context
- •1.5. Further development of the international AML/CFT standards
- •2. An overview of money laundering and AML regime goals
- •2.1. Basic concept of money laundering
- •2.2. Predicate offences: the scope and methods of AML/CFT description
- •2.3. Definition of money laundering in the narrow sense
- •2.4. Definition of money laundering in the broad sense
- •2.5. Anti-money laundering measures of combating organized crime
- •2.6. The process of money laundering and modeling of its phases
- •3. Applying a risk-based approach to a model AML/CFT regime
- •3.1. Key institutions of a national AML/CFT regime
- •3.2. Methodology bases of a risk-based approach and national AML/CFT coordination
- •3.3. Financial institutions: definition for AML/CFT purposes through activities and operations related to managing clients’ assets
- •3.4. Definition of financial institutions for AML/CFT purposes through activities and operations other then managing clients’ assets
- •3.5. AML/CFT definition of designated non-financial businesses and professions
- •3.6. AML/CFT risk-assessment obligations and decisions for countries
- •4. Legal requirements for a national AML/CFT regime
- •4.1. An extension of liability for money laundering to the predicate offence perpetrator: the adverse implications for the economy
- •4.2. Dual criminality for money laundering offences committed internationally
- •4.3. “State of mind” connected with a money laundering offence
- •4.4. Confiscation and provisional measures related to AML/CFT
- •4.5. Non-conviction based confiscation and corporate liability for money laundering
- •5. Explanations of terrorism and the financing of terrorism
- •5.1. Social and economic origins of terrorism
- •5.2. Basic concept of terrorist financing
- •5.3. Legal definition of terrorism and terrorist financing
- •5.4. Characteristics of the terrorist financing offence and legal capacity to prosecute persons that finance terrorism
- •5.5. Targeted financial sanctions related to terrorism, terrorist financing and proliferation
- •6. Institutional bases of the international AML/CFT framework
- •6.1. The United Nations bodies of the international AML/CFT framework
- •6.2. The United Nations organizations of the international AML/CFT framework
- •6.3. Main functions of the Financial Action Taskforce
- •6.4. The Financial Action Task Force associate members and observers
- •6.5. The Egmont Group of financial intelligence units and international AML/CFT standard setters in banking, securities and insurance sectors
- •6.6. The Wolfsberg Group of banks and its AML/CFT documents
- •7. Customer due diligence measures undertaken by financial institutions
- •7.1. General requirements for AML/CFT programs of financial institutions and groups of financial institutions
- •7.2. Methodology approach to customer due diligence
- •7.3. Additional features of customer due diligence
- •7.4. Customer due diligence measures for legal persons and their arrangements
- •7.5. Actions of financial institutions in case of inability to comply with customer due diligence requirements
- •7.6. AML/CFT-related record-keeping requirements for financial institutions
- •8. Risk-based approach pursued by financial institutions in customer due diligence
- •8.1. Reliance on customer due diligence information received from third parties
- •8.2. Potentially higher-risk situations for enhanced customer due diligence measures
- •8.3. Lower-risk situations for simplified customer due diligence measures
- •8.4. Enhanced customer due diligence measures
- •8.5. Simplified customer due diligence measures
- •9. Additional AML/CFT measures for specific activities of financial institutions
- •9.1. AML/CFT requirements for cross-border correspondent banking relationships
- •9.2. Definition of wire transfers and activities of involved parties
- •9.3. The scope of applying AML/CFT measures to wire transfers
- •9.4. AML/CFT measures of information gathering related to wire transfers
- •9.6. AML/CFT obligations for persons that provide money or value transfer services
- •10. Additional AML/CFT measures for specific customers, entities and professions
- •10.1. Definition of politically exposed persons and the scope of applying AML/CFT measures
- •10.2. Additional AML/CFT measures for politically exposed persons
- •10.3. AML/CFT requirements for financial institutions with foreign operations
- •10.4. Customer due diligence and record-keeping requirements for designated non-financial businesses and professions
- •10.5. Other AML/CFT requirements for designated non-financial businesses and professions
- •11. Competent authorities of a national AML/CFT system
- •11.1. General requirements for government agencies with an AML/CFT function
- •11.2. Approaches to AML/CFT-related regulation and supervision
- •11.3. Financial intelligence unit and its core functions
- •11.4. AML/CFT responsibilities of law enforcement and investigative authorities
- •11.5. Detecting and countering activities of cash couriers for the AML/CFT purposes
- •12. Additional requirements for a national AML/CFT regime and issues of international cooperation
- •12.1. Transparency and beneficial ownership of legal persons and their arrangements
- •12.2. Prevention of using non-profit organizations for the purpose of terrorist financing
- •12.3. General principles of AML/CFT mutual legal assistance
- •12.4. Mutual legal assistance: freezing and confiscation of assets related to money laundering and terrorist financing
- •12.5. Extradition in relation to money laundering and terrorist financing
- •12.6. International exchange of information between government agencies with an AML/CFT function
7. Customer due diligence measures undertaken by financial institutions
|
|
|
|
KEY WORDS |
|
• |
adequacy |
|
• |
purpose |
• threshold for occa- |
• |
beneficial owner |
• |
reasonable |
sional transactions |
|
• |
customer |
|
|
measures |
• to verify one’s iden- |
• |
enhanced |
customer |
• |
scrutiny |
tify |
|
due |
diligence |
• |
simplified customer |
• veracity |
|
(ECDD) |
|
|
due diligence |
|
• |
intended nature |
• |
source of funds |
|
|
KEY QUESTIONS
•Define the AML/CFT program of a financial institution.
•What should be included in the AML/CFT program of a financial institution?
•Which statements, regarding employees, should be included in the AML/CFT program of a financial institution?
•On what levels of firm hierarchy should AML/ CFT compliance officers be appointed?
•Under which four circumstances must a financial organization undertake CDD?
•Which Recommendation defines CDD measures for financial institutions? List these measures.
•A customer carries out an occasional transaction, and its value exceeds the threshold (as stated in the Recommendation 10). Why is the financial institution required to perform customer due diligence?
•What is the threshold, that occasional transactions exceed, necessary for performing CDD on the customer who is carrying out the transactions?
•Define the term “veracity of previously obtained customer identification data”.
•What is the difference between identifying a customer and verifying his identify?
•List two general qualities of sources of information used for verification of customer identify.
•Give a general qualification of financial institution’s activities in the course of verifying the identity of the beneficial owner.
55
•The beneficial owner of an arrangement of legal persons is being identified and his identity is being verified. What should the financial institution learn about the structure of this arrangement of legal persons?
•List two aspects of a business relationship with a client upon which a financial institution needs to obtain information. Why does the financial institution need to understand these aspects?
•Define the term “ongoing customer due diligence”.
•In the course of ongoing CDD, it is necessary to assure that transactions conducted are consistent with certain profiles. List two groups of such profiles.
•Under what circumstances is it necessary to assure, during ongoing CDD, that transactions being conducted are consistent with the source of funds?
•In what case can it be permitted to complete the verification of identification data as soon as practically possible?
•Give examples when application of the full set of CDD measures can interrupt the normal conduct of business.
•List the risk variables that determine the extent of applying CDD measures.
•A bank is performing CDD of a customer that is a legal person. Which three facts about such customer are required to be understood by the bank staff?
•What information needs to be obtained in the course of identifying a customer that is a legal person?
•What is unique about identifying owners of a company listed on a stock exchange and subject to disclosure requirements?
•A company wants to open an account. The bank is identifying the beneficial owners of the company. List the steps of this procedure.
•What should a financial institution do when it is not possible to complete the CDD?
•What should a financial institution refrain from doing when it is not possible to complete the CDD?
•How can CDD process result in tipping-off?
•Can employees of financial institutions be made liable for reporting to the FIU? Why?
•Give the general definition of AML/CFT-related record-keeping requirements.
•Which three groups of records need to be kept for AML/CFT purposes?
•An insurance company complies with the AML/CFT-related record-keeping requirements. Which two qualities should these records possess?
56
7.1. General requirements for AML/CFT programs of financial institutions and groups of financial institutions
AML/CFT program of a financial institution (R. 18, IN)
The risk of ML and TF should be considered when developing the program
The size of business should be taken in account
Should include |
|
|
|
|
|
|
|||
|
|
Policies |
|
|
Including ap- |
||||
|
|
|
|
|
|
|
|
|
propriate com- |
|
|
|
|
|
|
|
|||
|
|
|
|
|
|
Procedures |
|
|
pliance man- |
|
|
|
(a) The development |
||||||
|
|
|
|
|
|
|
agement ar- |
||
|
|
|
of internal |
|
|
|
|
||
|
|
|
|
Controls |
|
|
rangements |
||
|
|
|
|
|
|
|
|
||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Adequate screening pro-
cedures of prospective employees
(b) An ongoing employee training program
Appointment of a compliance officer at the managerial level
To ensure high standards of employees
(c) An independent audit function |
|
|
To test the system |
|
|
||
|
|
|
|
There has to be an effective implementation of the program
|
|
|
|
|
|
The AML/CFT program should be applicable to |
||
|
|
|
For a financial group |
|
all branches and majority-owned subsidiaries |
|||
|
|
|
|
|||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
There should be adequate safe- |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
guards on the confidentiality and |
|||
Intra-group sharing of information (on |
|
|||||||
|
customers, accounts and transactions) |
|
use of information exchanged |
|||||
|
is required for the purposes of CDD |
|
|
|||||
|
|
|||||||
|
|
|
and ML/TF risk management |
|
|
|||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
57 |
|
||
7.2. Methodology approach to customer due diligence
Establishment of |
Above the threshold of |
|
Of previously obtained cus- |
||
business rela- |
|
USD/EUR 15,000 |
|
tomer identification data |
|
tions |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Information accompanying wire |
Veracity |
|
|
transfers (R. 16, IN) |
|
|
Suspicion of money |
Adequacy |
Carrying out occasional |
laundering or terror- |
|
transactions |
ist financing |
Doubts about |
When CDD is being undertaken: original numbering is (i), (ii), (iii) and (iv)
Customer due diligence (CDD), R. 10
What CDD includes: original numbering is (a), (b), (c) and (d)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Using reliable |
|
||||||||||
|
|
|
|
|
|
|
Identifying the customer |
|
|
|
|
|
|
|
|
|
||||||||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
and independent |
|
||||||||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||||||||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||
|
|
|
|
|
|
|
Verifying the cus- |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||||||||||
|
|
|
|
|
|
|
tomer’s identity |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Source |
|
|
|
|||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Identifying the beneficial owner |
|
|
|
|
|
|
|
|
|
|
|
|
|||||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||
|
|
|
|
|
|
|
Taking reasonable |
|
|
|
|
|
|
|
|
|
|
To verify the identity |
||||||||||||||||||||||||
|
|
|
|
|
|
|
|
measures |
|
|
|
|
|
|
|
|
|
|
|
|
|
of the beneficial owner |
||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Understanding |
|
|
|
|
|
|
|
|
|
|
|
|
Purpose |
|
|
|
|
|
|
|
Of business |
||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
relationship |
||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||
|
|
|
|
|
|
Obtain information |
|
|
|
|
Intended nature |
|
|
|
|
|
|
|
|
|||||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Transactions |
|
||||||||||
|
|
|
|
|
|
Conducting |
|
|
|
|
|
Business |
|
|
|
|
|
|
|
|||||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
being con- |
|
|
||||||||||||||||||||
|
|
|
|
|
|
ongoing CDD |
|
|
|
|
|
relation |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
ducted are |
|
|
|||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
consistent |
|
|||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
with |
|
||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||||||
|
|
|
Scrutiny of transactions |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
58 |
|
|
|
|
|
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||
Documents
Data
Information
For legal persons and arrangements
To understand ownership and control structure
Business profile
Risk profile
The source of funds (where necessary)
