ANTI-MONEY LAUNDERING COMPLIANCE PROGRAM FCM TRAINING

Slides:



Advertisements
Similar presentations
Prevention of Money Laundering Training session. Overview What is Money laundering? Requirements under the Act Arcadias policy Relevance to your routine.
Advertisements

Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Red Flag Rules: What they are? & What you need to do
At Hyderabad December 29, 2010 Kunnel Prem. ICP 27 on Insurance Frauds and ICP 28 on AML/CFT.
Anti Money Laundering (AML) An Overview for Staff Prepared by MSM Compliance Services Pty Ltd.
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
Anti-Money Laundering and OFAC Compliance for Transfer Agents SSA Annual Conference July 25, 2008.
07-08Available from BankersOnline.com Bank Secrecy Act (BSA) For New Hires.
Charles E. Constantin Director, Senior Bank Regulatory Compliance Officer Royal Bank of Canada, RBC Capital Markets Institute of International Bankers.
The NFA Examination Process Patricia Cushing, Director, Compliance Michael Braden, Manager, Compliance James Forst, Manager, Compliance.
Anti-Money Laundering (AML)
1 Supplement to the Guideline on Prevention of Money Laundering Hong Kong Monetary Authority 8 June 2004.
Supervision Issues for FCMs and IBs Notice-Registered as Broker-Dealers.
The NFA Examination Process November 6, 2014 Regina Thoele, Senior Vice President Patricia Cushing, Director, Compliance J.P. Bruynes, Partner, Akin Gump.
1 CSI COMPLIANCE AWARENESS TRAINING ANTI MONEY LAUNDERING July 2004 This is confidential proprietary and trade secret information of American Express Travel.
This tool can be found in the Banker Tools section of BankersOnline.com. 1 Bank Secrecy, Anti-Money Laundering & OFAC Director Education.
Code of Conduct for Mobile Money Providers 6 November 2014 All material © GSMA The policy advocacy and regulatory work of the GSMA Mobile Money team.
Money Laundering 23 September Contents 1 What is money laundering? 2. The ‘primary’ money laundering offences 3. Failure to report and tipping off.
1 Presented by: L.K.Barathi. Advisor – American Express Bank Ltd Mumbai.
E XAMINATION AND E NFORCEMENT I SSUES : B EYOND T HE P ILLARS The AMLA Third Annual Full Day BSA/AML Conference October 4, 2013 Presented by: John M. Geiringer.
Polar Investment Counsel Inc. Member: FINRA-NFA-MSRB-SIPC Polar Investment Counsel Inc 2010 Compliance Meeting Participation of all firm associates is.
Last update: 2010 Bringing Smart Policies to Life The basics: AML/CFT for financial inclusion.
International International Standards on Regulating DNFBPs & The way forward Mr Ping-Yiu MA Assistant Secretary for Security 4 March 2010 Narcotics Division,
Bank Secrecy Act Staying One Step Ahead of Your BSA Examiner September 2009 AMLA Chicago Chapter Event.
An Educational Computer Based Training Program CBTCBT.
2015 ANNUAL TRAINING By: Denise Goff
Bank Secrecy Act (BSA) Office of Foreign Assets Control (OFAC)
ANTI-MONEY LAUNDERING TRAINING FOR LENDERS Bill Heyman Offit Kurman
Becoming A Customer SICOR Securities, Inc.. How? In order to establish the client (customer) relationship between yourself, as a registered representative.
Combating Terrorism Financing 1 National Accountants Conference 2004, Kuala Lumpur “Combating Terrorism Financing” 13 October 2004 by Koid Swee Lian Financial.
International International Standards on Regulating DNFBPs & The way forward Mr Peter KWOK Assistant Secretary for Security 19 February 2009 Narcotics.
Best Practices for Banking MSBs
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Legal Framework and Regulatory Regime Required for an effective AML/CFT System Richard Pratt 29 March 2005.
Certificate for Introduction to Securities & Investment (Cert.ISI)
The NFA Examination Process
BSA PROGRAM REQUIREMENTS.  Written, approved by the board of directors, and noted in the board minutes.  Based on the risk assessment  Fully implemented.
1 A Presentation for Members of the Bank Compliance Association of Connecticut (BCAC) June 12, 2008 Rebecca Williams FDIC Case Manager (Special Activities)
Bank Secrecy Act. Many Laws Make Up “BSA” Bank Secrecy Act Money Laundering Control Act Currency and Foreign Transactions Reporting USA PATRIOT Act.
Challenges and Opportunities in the Caribbean Financial Services Sector Rudolph F. Zepeda, Jr. Federal Reserve Bank of Atlanta Miami Branch.
Monitoring visits and compliance with money laundering regulations.
Agenda  Background and Purpose  Money Laundering and Terrorist Financing  BSA Program Requirements  Risk Based Program Management  Suspicious Activity.
Presented by: Hany Faidy Senior Vice President, Head of Compliance Division March 2009 Procedures followed by FI’s when reporting Suspicious Transaction.
AML Compliance Findings & Observations Wyn Clark U.S. Treasury.
An Overview of Hong Kong’s Anti-Money Laundering & Counter- Terrorist Financing Regime (AML & CTF Regime) Michael YIP Assistant Secretary Financial Services.
South Region Compliance Seminar December 2-3, 2015 | New Orleans, LA Variable Annuities Procedures Practices and Findings.
1 Banking and Reconciliation. 2 To Certify As A Cash Handler  Visit the training website  Review the Payment Card Industry (PCI)
World Bank International Standards and their Measures for Financial Institutions and Non-Financial Businesses and Professions to Prevent Money Laundering.
ComplianceAid Caribbean Basin AML Conference 2016 “How to End a Relationship Under AML” Randy Graham, CEO March 10, 2016.
John Robinson Identity Management: Do You Know Who You Are Doing Business With?
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Bank Secrecy Act Training For Volunteers
ANTI - MONEY LAUNDERING
IMPLEMENTATION STRUCTURE & EXPECTED OUTCOMES FOR RECOMMENDATION 16, 17, 18, 19 & 20 Oladele Adeoye.
Bank Secrecy Act SCEFCU June 21, 2005.
Anti Money Laundering (AML)
IMA Member Meeting Legal update - MLD4 and MLD5 Siobhan Moore
ANTI - MONEY LAUNDERING
USA PATRIOT ACT WHAT DOES IT STAND FOR?.
ANTI - MONEY LAUNDERING
Red Flags Rule An Introduction County College of Morris
Leaders Credit Union Board Presentation
Identity Theft Prevention Program Training
PART II.. PART II. AGENDA- PART II (chapter 5) Identification and client due diligence procedures Reliance on third parties Identification of individuals.
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

ANTI-MONEY LAUNDERING COMPLIANCE PROGRAM FCM TRAINING

Stages of Money Laundering Placement Layering Integration

Anti-Money Laundering Program Rule 2-9(c) Policies, Procedures and Internal Controls Designated Compliance Officer Ongoing Training Independent Audit Function

Policy Statement Committed to following all laws and regulations Committed to not being used as part of money laundering scheme

Identification and Verification Verify the identity of the customer Learn the nature of customer’s business Learn intended purpose of customer’s transactions

Required Minimum Information Name and Address (or business location) U.S Persons: SSN or TIN Non-U.S. Persons: Passport number

Verifying Documents Driver’s license State I.D. Card Utility bills Business incorporation records Business license Partnership agreements

OFAC’s Lists Sanctioned Countries: Need to check if you can do business Specially Designated Nationals and Blocked Persons May not do business and must report immediately

FCM/IB Allocation Allocation must be in writing Identify who is doing what Must have reasonable basis to believe other entity is fulfilling its function

Omnibus/Pool Accounts If there is no relationship with underlying customer, FCM must conduct risk-based due diligence on the intermediary FCM generally not required to do due diligence on underlying customer/ participant

Regulated Foreign Intermediaries Is the intermediary located in a FATF member country? What is your past experience with the intermediary? What is the intermediary’s business reputation?

Verification Requirements Effective October 26, 2002 Verify identity to extent reasonable and practicable Maintain records used to verify identity Consult lists of known or suspected terrorists or terrorist organizations

Definition: Suspicious Transaction A transaction that has no business or apparent lawful purpose, is unusual for the customer, or lacks any reasonable explanation.

Red Flags Structuring Evasiveness about identity Trading with little or no risk Wire transfers to or from high risk countries

Reporting DSRO FinCEN

Qualified Staff Must be trained May want to do background checks Make sure logical division of duties

Recordkeeping Types of records Location or records Period of retention

Designated Compliance Officer Can be a specific person or a department Can also be responsible for other compliance functions No need to be a principal or Associate Member Must be independent of areas overseen

Compliance Officer Responsibilities Ensure firm has adequate customer identification and verification procedures Ensure firm has adequate guidelines for monitoring and reporting suspicious activities Receive reports of suspicious activities

Compliance Officer Responsibilities Gather relevant information to analyze and investigate Determine whether there is any further reporting obligation Ensure recordkeeping procedures are adequate

Training Formalized program is not required Goal is to provide appropriate personnel with information to carry out AML program Must be provided to appropriate personnel at least annually

Content Of Training Highlight red flags Monitoring for red flags How to handle suspicious activity Review of any firm experiences Recordkeeping policies

Training Methods Firm Manual Video Presentation Seminar with hypothetical situations Periodic written updates

Independent Audit Function Can be done by internal employees or outside party Internal employees should be independent of the functional areas Outside party should have experience

Independent Audit Function Must be conducted at least annually Results must be documented and reported

Hypotheticals

Suspicious Activity Reports Not currently required of FCMs, but Treasury is expected to require from FCMs Implementing regulations will probably require that these reports be filed under certain circumstances

Suspicious Activity Reports Currently, FCMs can file these reports voluntarily FCM is protected from liability for disclosures reported on SAR

Information Sharing with Law Enforcement Agencies Sharing with law enforcement agencies includes FCMs Practically, FCMs will probably not be effected by this until they are required to file SARs Provides immunity for liability under the FRPA

Information Sharing Among Financial Institutions Currently does not include FCMs in the definition FCMs would not be covered by the safe harbor

NFA’s Focus on Members’ Anti-Money Laundering Program Proper procedures Adequate internal controls Adhering to procedures

Anti-Money Laundry Procedures and Policy Statement Written procedures and policy statement Procedures Detecting Handling Reporting Policy Statement Consequences

Separation of Duties New accounts Customer funds Review and approve anti-money laundering procedures Compliance with anti-money laundering procedures

Separation of Duties Annual audit of anti-money laundering program Receives audit report Monitor customer accounts Investigating suspicious activity Senior management

Customer Account Documentation SSN or taxpayer ID Passport or other valid ID Principal place of business Nature of business Intended purpose of trading Documents used to verify

High Risk Accounts How are accounts identified What lists are used to identify

Suspicious Activity Review Investigate Reporting Firm management DSRO or FinCen

Training Material Outline Videos Written

Supervision of IBs Written agreement Allocation of responsibilities Due diligence by FCM

Questions?