10.07.2015 Views

guideline on anti-money laundering and the combating of terrorist ...

guideline on anti-money laundering and the combating of terrorist ...

guideline on anti-money laundering and the combating of terrorist ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Guideline <strong>on</strong> Anti-M<strong>on</strong>ey Laundering <strong>and</strong> <strong>the</strong> Combating <strong>of</strong> Terrorist Financingtransacti<strong>on</strong>s, which have no apparent ec<strong>on</strong>omic or visible lawful purpose 46 . The background <strong>and</strong> purpose <strong>of</strong>such transacti<strong>on</strong>s should as far as possible be examined <strong>and</strong> documented by <strong>the</strong> financial instituti<strong>on</strong>.Findings regarding enquiries about complex, unusual large transacti<strong>on</strong>s, <strong>and</strong> unusual patterns <strong>of</strong>transacti<strong>on</strong>s should be kept by <strong>the</strong> financial instituti<strong>on</strong>, <strong>and</strong> be available to help supervisory authorities <strong>and</strong>auditors for at least six years.20.3 Suspicious transacti<strong>on</strong>s are financial transacti<strong>on</strong>s that give rise to reas<strong>on</strong>able grounds to suspect that <strong>the</strong>yare related to <strong>the</strong> commissi<strong>on</strong> <strong>of</strong> a m<strong>on</strong>ey <strong>laundering</strong> or terrorism <strong>of</strong>fence. These transacti<strong>on</strong>s may becomplex, unusual or large or may represent an unusual pattern. This includes significant transacti<strong>on</strong>srelative to <strong>the</strong> relati<strong>on</strong>ship, transacti<strong>on</strong>s that exceed prescribed limits or a very high account turnover that isinc<strong>on</strong>sistent with <strong>the</strong> expected pattern <strong>of</strong> transacti<strong>on</strong>s. In some instances, <strong>the</strong> origin <strong>of</strong> <strong>the</strong> transacti<strong>on</strong> maygive rise to suspici<strong>on</strong>. A pre-requisite to identifying unusual <strong>and</strong> suspicious activity is <strong>the</strong> pr<strong>of</strong>iling <strong>of</strong>customers <strong>and</strong> determinati<strong>on</strong> <strong>of</strong> c<strong>on</strong>sistent transacti<strong>on</strong> limits.A suspicious activity will <strong>of</strong>ten be <strong>on</strong>e that is inc<strong>on</strong>sistent with a customer’s known, legitimate activities orwith <strong>the</strong> normal business for that type <strong>of</strong> account. The key is to know enough about <strong>the</strong> customer (KYC)<strong>and</strong> <strong>the</strong> customer’s normal expected activities to recognize when a transacti<strong>on</strong>, or series <strong>of</strong> transacti<strong>on</strong>s, isunusual. Although <strong>the</strong>re is a tendency to focus <strong>on</strong> new business relati<strong>on</strong>ships <strong>and</strong> transacti<strong>on</strong>s, instituti<strong>on</strong>sshould be alert to <strong>the</strong> implicati<strong>on</strong>s <strong>of</strong> <strong>the</strong> financial flows <strong>and</strong> transacti<strong>on</strong> patterns <strong>of</strong> existing customers,particularly where <strong>the</strong>re is a significant, unexpected <strong>and</strong> unexplained change in <strong>the</strong> behaviour <strong>of</strong> an account.20.4 Financial instituti<strong>on</strong>s should develop procedures to assist in <strong>the</strong> identificati<strong>on</strong> <strong>of</strong> unusual or suspiciousactivity in all types <strong>of</strong> business transacti<strong>on</strong>s, products <strong>and</strong> services <strong>of</strong>fered, but particularly for transacti<strong>on</strong>swith high risk customers <strong>and</strong> using high risk services (for example wire transfers, credit/debit cards <strong>and</strong> ATMtransacti<strong>on</strong>s, lending, trust services <strong>and</strong> private banking). For example, to facilitate <strong>the</strong> detecti<strong>on</strong> <strong>of</strong>suspicious transacti<strong>on</strong>s, a financial instituti<strong>on</strong> should:-a) require customers to indicate/reveal <strong>the</strong> source <strong>and</strong>/or purpose <strong>of</strong> funds for business transacti<strong>on</strong>s inexcess <strong>of</strong> threshold limits, or such lower amount (i.e. wire transfers) as <strong>the</strong> financial instituti<strong>on</strong>determines, to ascertain <strong>the</strong> legitimacy <strong>of</strong> <strong>the</strong> funds.b) develop written policies, procedures <strong>and</strong> processes to provide guidance <strong>on</strong> <strong>the</strong> reporting chain <strong>and</strong> <strong>the</strong>procedures to follow when identifying <strong>and</strong> researching unusual transacti<strong>on</strong>s <strong>and</strong> reporting suspiciousactivities;c) require its staff to document in writing <strong>the</strong>ir suspici<strong>on</strong> about a transacti<strong>on</strong>; <strong>and</strong>d) require documentati<strong>on</strong> <strong>of</strong> internal enquiries.20.5 The following factors should be c<strong>on</strong>sidered by <strong>the</strong> financial instituti<strong>on</strong> when seeking to identify a suspicioustransacti<strong>on</strong>:46 Refer to <strong>the</strong> POCA 55 (2)(a)(ii)Page 42 <strong>of</strong> 75

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!