Risk-based approach Briefing to AML Seminar 10 May 2011 Paul de Weerd Financial Supervision Commission.

Slides:



Advertisements
Similar presentations
The Microsoft IT Academy Quality Process. v3.0 June 2004 The key components of the Quality Programme A Quality relationship Self assessment Site visits.
Advertisements

MONITORING OF SUBGRANTEES
Management 5-Point Action Plan Summary Timeline Completion by June 2010 Problem Identified I. Improve efficiency, effectiveness and controls for IL 1.Match.
Anti Money Laundering (AML) An Overview for Staff Prepared by MSM Compliance Services Pty Ltd.
©2010 Prentice Hall Business Publishing, Auditing 13/e, Arens/Elder/Beasley The CPA Profession Chapter 2.
The Audit Standards’ Setting Process
Audit Committee in Albania Legal framework Law 9226 /2006 “On banks in Republic of Albania” Law 9901/2008 “On entrepreneurs and commercial companies” Corporate.
Fraud Auditing Chapter 11.
Building A Financial Intelligence Unit In a Bank Secrecy Environment Lebanon’s Experience Presented by A. Mansour Secretary Special Investigation Commission.
1 Supplement to the Guideline on Prevention of Money Laundering Hong Kong Monetary Authority 8 June 2004.
Improving regulation for people with challenging behaviour 4 October 2011 Dame Jo Williams Chair, CQC.
ENVIRONMENTAL MANAGEMENT PLAN
Geneva, Switzerland, 4 December 2014 AML/CFT & Financial Inclusion Timothy Goodrick, Policy Analyst, Financial Action Task Force (FATF)
By Saurabh Sardesai October 2014.
Code of Conduct for Mobile Money Providers 6 November 2014 All material © GSMA The policy advocacy and regulatory work of the GSMA Mobile Money team.
Training.
The CPA Profession Chapter 2.
Compliance Policy & Procedures An Overview for Staff Prepared by MSM Compliance Services Pty Ltd.
Legal & Administrative Oversight of NGOs Establishing and Monitoring Performance Standards.
2 Management Governance The New Frontier 3 Shareholders & Stakeholders Board Management (through CEO) Delegation Reporting.
1 Jersey Funds Association Educational training session – 22 June 2010.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
Source: Section 2 General Code of Conduct A n t i m o n e y l a u n d e r i n g ( A M L ) i s a t e r m m a i n l y u s e d i n t h e f i n a n c i a.
IA Clinic. การเตรียมการตรวจสอบ แผนการ ตรวจสอบ แผนการ ปฏิบัติงาน ตรวจสอบ หารือ หน่วยรับตรวจ รายงานผล การตรวจสอบ ติดตามผล การตรวจสอบ ผลการประเมินความเสี่ยง.
International International Standards on Regulating DNFBPs & The way forward Mr Ping-Yiu MA Assistant Secretary for Security 4 March 2010 Narcotics Division,
Pre-Exam Process  Scope visitation  Prepare request letter  Review prior examination report and workpapers  Access BSA-reporting databases and other.
Improving Corporate Governance in Malaysian Capital Markets – The Role of the Audit Committee Role of the Audit Committee in Assessing Audit Quality.
Arbuthnot Latham & Co., Limited Building mutually profitable relationships through a meeting of minds Preparing for FSA Visits and what to do in between.
The CPA Profession Chapter 2 By Arens et. al. Learning Objective 1 Describe the nature of CPA firms, what they do, and their structure.
CORPORATE COMPLIANCE Tim Timmons Vice President Compliance and Regulatory Services Health Future, LLC.
Implications of the Markets in Financial Instruments Directive (“MIFID”) Richard Thompson.
Barrister Igbodekwe Emmanuel TH September, 2013 Special Control Unit Against Money Laundering (SCUML) Regulating The Accountants for AML/CFT Challenges.
International International Standards on Regulating DNFBPs & The way forward Mr Peter KWOK Assistant Secretary for Security 19 February 2009 Narcotics.
EQARF Applying EQARF Framework and Guidelines to the Development and Testing of Eduplan.
James Aiello PricewaterhouseCoopers Africa Utility Week 06 International Good Practice in Procurement.
Managing Third Party Risk In a world fraught w/Risk Trust In the Cloud How are you Protecting Customer Data? February 26, 2014 Case Study Vincent Campitelli.
Portfolio Committee Presentation Government printing Works Audit and Compliance 07 May 2013 Presented by: Chief Executive Officer.
Financial Crimes Enforcement Network (FinCEN) Institute of International Bankers Annual Seminar on Regulatory Examination, Risk Management and Compliance.
Ethiopian SACCO Supervision & Regulation
The views expressed in this presentation do not necessarily reflect those of the Federal Reserve Bank of New York or the Federal Reserve System Association.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Consolidation and Review of Financial Services Legislation (“ CAROL ”) Jane D N Bates Head of Policy and Legal Unit Financial Supervision Commission 21.
4. Solvency II update Catherine Beech 9 October
Organization and Implementation of a National Regulatory Program for the Control of Radiation Sources Inspection Part III.
An Overview of Hong Kong’s Anti-Money Laundering & Counter- Terrorist Financing Regime (AML & CTF Regime) Michael YIP Assistant Secretary Financial Services.
AQuR SYSTEM Researchers: Zuraidah Mohd Sanusi, Aida Hazlin Ismail, Yusarina Mat Isa, Roszana Tapsir, Syazliana Kasim, Kamaruzzaman Muhammad, Nor’Azam Mastuki.
The New Manx Vehicle 24 October INTRODUCTION Jane D N Bates Head of Authorisations and Companies Financial Supervision Commission.
World Bank International Standards and their Measures for Financial Institutions and Non-Financial Businesses and Professions to Prevent Money Laundering.
Acquisition and Assistance Management Review Entrance Briefing Name of office reviewed Date of Review.
International International Standards on Regulating DNFBPs & The way forward Mr Peter KWOK Assistant Secretary for Security 27 February 2009 Narcotics.
Professional Ethics. Identifying Threats Identify where there might be a threat to a fundamental principle Evaluate how serious the threat is If it’s.
Welcome. Registration complete? CQC Inspection visit Routine Responsive Themed.
Professional Ethics Assessment Instruction words ‘State’ – something you need to answer with a FACT ‘Explain’ – state the relevant fact(s) AND give reasons.
MODULE 7: CONDUCT OF GOVERNANCE AUDIT GOVERNANCE AUDITOR ACCREDITATION COURSE.
1 Vereniging van Compliance Officers The Compliance Function in Banks Amsterdam, 10 June 2004 Marc Pickeur CBFA CBFA.
Improving Compliance with ISAs Presenters: Al Johnson & Pat Hayle.
ICAEW visits and compliance with Money Laundering Regulations John O’Donnell Senior Reviewer QAD.
Copyright © 2014 Pearson Education Chapter 2 The Audit Standards’ Setting Process.
The CPA Profession Chapter 2.
Compliance Matters September 2013 Webinar – Just do it!
An Overview on Risk Management
Anti Money Laundering (AML)
What is the fuss all about?
Institute of Municipal Finance Officers & Related Professions
What Constitutes a “Triggering Event?”
The Audit Standards’ Setting Process
AML- Risk assessment & RBA
Proof of concept 29 September 2010
About EverydayComply A Solution designed to:
Presentation transcript:

Risk-based approach Briefing to AML Seminar 10 May 2011 Paul de Weerd Financial Supervision Commission

Session Objectives Briefing on: Feedback from CSP/TSP visits Approaches to implementing the risk- based approach

Overview Four themes: Preparation Risks specific to the business Client risks Monitoring and review

AML/CFT risk v. other risks The AML risk rating under the Code is distinct from financial, legal, regulatory etc. risks under rule 8.6 The two can draw different conclusions, e.g. on unmanaged business

Part 1 - preparation: review typologies Available online through FATF

Risk rating Ratings and how to apply them should be understood by staff Ideally, simple, consistent and easy to apply Targeted and relevant

Part 2: Identify the specific risks for your own business Typologies provide examples not answers Consider: Types of business undertaken Sources of business

Identify the risks in business acceptance Core part of addressing risk First line of defence Reliance on others? Structured approach

Identify control risks Lack of control over client entities and reliance on third parties Registered office or registered agent only and “Split” boards Powers of attorney

Record your actions What the risk is Mitigation or controls to be applied Action plan

Part 3: Risk assessment of clients Identify client-specific risks Apply additional safeguards to PEPS and other higher-risk clients

Develop a recording mechanism Develop and apply a suitable mechanism for recording your view of client risks Allow for different grades of risk Record additional steps taken Understood and used by staff

Part 4: Monitoring and review To make the process work in practice Monitoring of client relationships Review cycle

Monitoring Effective monitoring is essential Review cycle(s) Update ratings for new information Sign and date Track action points

Effective review procedures Part of corporate governance and effective oversight: Learn from experience Update both licenceholder risks and client risks