First Line of Defense
Reports directly to Senior Management
-Client Relationship mgmt
-Daily Operations
-Quality Control
-Quality Assurance
-Maintenance Control of Framework
-Implements AFC policies set by second line
-Reports to senior management
Second Line of Defense
Reports Directly to Senior Management
-AFC compliance and oversight
-managing and testing compliance controls
-independent from business units
Third Line of Defense
-Reports Directly to the Board of Directors or Audit Committee
-Internal Audit
-Independent audit of the first two lines
-Safeguards financial institution at the macro level
Senior Management Responsibilities:
Executes AML Program
Senior management is ultimately responsible for implementing and overseeing the AML program. They execute the program, ensure policies and procedures are integrated into operational areas, and communicate all compliance expectations to staff.
Senior Management Responsibilities:
Promotes Governance
A robust governance structure provides clarity of roles and responsibilities, enhanced accountability, effective oversight and monitoring, promoting a culture of compliance and adaptability to regulatory changes.
Senior Management Responsibilities:
Addresses Deficiencies
Senior management takes responsibility for any failures in the AML program, addressing compliance deficiencies, implementing corrective actions, and reporting progress to the board.
Senior Management Responsibilities:
Approves Compliance Reports
It reviews and approves compliance reports, including SARs and compliance assessments, ensuring accuracy and transparency.
Senior Management Responsibilities:
Monitors Compliance
Senior management monitors compliance with AML policies and regulations, ensuring regular reports on the program’s status, including risk assessments and any significant incidents, are submitted to the board and relevant committees.
Enterprise-wide Risk Assessment (EWRA)
Helps organizations evaluate risk exposure to financial crime, including:
-Money laundering
-Terrorist financing
-Proliferation financing
-Sanctions evasion
-Tax evasion
-Bribery and corruption
-Some organizations include fraud operational risks
EWRA Residual Risk Equation
Inherent Risk-Control Effectiveness=Residual risk
Questions to ask when considering one’s role relative to the EWRA
-How does my organization establish its risk infrastructure?
-What risks am I facing in my role and how are these managed?
-What controls are in place to mitigate these risks?
Risk-based approach:
Introduction
Introduced by FATF in 2007 to help organizations align with their risk appetite:
-Identifying, assessing, understanding risks
-Applying appropriate measures to mitigate them
Risk-based approach:
Recognize and Assess all types of risk
Accurately judging a customer’s potential involvement in financial crime is an important prerequisite for the risk-based approach. Organizations should conduct due diligence on business operations, industries, customer characteristics, and geographic exposure, to obtain adequate, complete, and truthful customer information for analysis.
Risk-based approach:
Obtain Adequate, complete consumer information
Financial crime risk is just one element of risk organizations face. Others include operational risk, credit risk, and market risk. By combining these risk management processes, risk managers can assess financial crime risks and allocate resources to mitigate the highest risks.
Risk-based approach:
Obtain commitment from senior management and employees
A risk-based approach focuses effort with the greatest need and impact. It requires the full commitment and support of senior management, and the active cooperation of all employees.
Risk-based approach:
Implement measures to mitigate and monitor risks
Adopting a risk-based approach requires implementing a risk-management process to handle financial crime. This process encompasses recognizing the risks, assessing them, and developing control strategies to mitigate and monitor them.
Risk-based approach:
Allocate Resources Based on Risk Exposures
Using a risk-based approach allows the organization to allocate resources effectively. These decisions determine the level and frequency of customer profile research and updates.
Examples of Risk-based Approaches
-Ensure Matrix management across all risk disciplines
-Recognize, assess, develop controls, to mitigate and monitor risks
-Implement risk management process
-Obtain commitment from senior management and employees
-Focus effort and resources on greatest need
-Obtain adequate, complete customer information
Customer Risk Assessment (CRA) vs EWRA
CRA is a risk assessment at the individual customer level, while EWRA is organization-wide
A CRA
assesses individual customer and business relationship risk exposure, uses KYC information to assess risk, and determines simplified, standard, or enhanced due diligence.
An EWRA
assesses organizational risk exposure, helps allocate resources, determines residual risk to guide AML/CFT framework design, identifies inherent risks, and assesses controls.
Initial CRA
-At onboarding
-Establish customer profile
-Build the foundation for future monitoring
Ongoing CRA
Triggered by material changes in risk factors, such as:
-Business activity
-Ownership
-Jurisdiction
Periodic CRA
Scheduled reviews based on:
-Risk level
-High-risk customers assessed more frequently