SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Cognizant White Paper




Tackling Financial Crime – The BPM Perspective

              Channeling financial crime proceeds for illegal activities                              Regulatory Framework for Tackling Financial
              may not be a new phenomenon, but it has recently                                        Crime
              soared to alarming proportions. The spread of such
              unlawful acts is wide enough to include a whole range of                                In wake of the stern measures advocated by regulatory
              criminal activities involving human trafficking, drug                                   authorities in the U.S., EU and UK to combat financial crime,
              trafficking, illegal dealing with sanctioned companies or                               the key compliance challenge for banks and financial
              individual and terrorist financing. This sudden spate of                                organizations has been the lack of a standardized and
              crime has forced governments and regulatory                                             consistent guideline arising from various regulatory regimes
              organizations worldwide to confront this menace with an                                 or suggested by different bodies overseeing multiple aspects
              iron fist in a coordinated manner.                                                      of financial crime, with a mix of risk-based and zero tolerance
                                                                                                      approaches. To assist law enforcement agencies, the U.S.
              While it is immensely difficult to determine the true
                                                                                                      Patriot Act was transformed into law in October 2001. One
              impact of financial crime in monetary terms, businesses
                                                                                                      provision, entitled Title III, legalized the freezing of U.S.-based
              and tax payers are estimated to be hit by billions of
                                                                                                      assets of any suspected organization or individual involved in
              dollars annually. The International Monetary Fund has
                                                                                                      money-laundering, with the sole agenda of “starving”
              estimated the scale of global money laundering to be
                                                                                                      terrorist networks. In the UK, the Parliament passed the
              equivalent to 2% to 5% of worldwide Gross Domestic
                                                                                                      Terrorism Act 2000, and following the events of 9/11, the
              Product (GDP). The UK customs authorities, in particular,
                                                                                                      Proceeds of Crime Act 2002 (POCA) was passed. The Serious
              estimate the annual proceeds from crime in the UK to be
                                                                                                      Organized Crime Agency (SOCA) was created in April 2006,
              anywhere between £19 billion and £48 billion. An early
                                                                                                      whose aim is to reduce the impact of serious and organized
              2009 Gartner report commented that about 7.5% of U.S.
                                                                                                      crime, and subsequently the EU's Third Money Laundering
              adults lost money as a result of financial fraud last year,
                                                                                                      Directive was implemented in December 2007 across the
              mostly due to data breaches. 1                                                          European Economic Area.
    Estimated annual cost of some type of organized crime
                                                                                                      These acts mandate financial institutions to alert law
ID T he f t                     2                                                                     enforcement officials on banking activity that is deemed
                                                                                                      suspicious.
C o unt e rf e it ing
                             1.4
                                                                                                      In addition, the U.S. Congress granted the Treasury
H um a n                                     4.1
                                                                                                      Department with regulatory powers to penalize any U.S.
T ra f f ic k ing
                                                                                                      financial institution that might participate in these
F ra ud                                                             7.8
                                                                                                      schemes, whether knowingly or not.

                                                                                                      These financial sanctions, regulations and compliance
D rugs                                                                                         17.6
T ra de                                                                                               activities tend towards a “zero tolerance” regime.
                        So urce: UK Ho me Dept '09 repo rt o n o rganized crime   £ billions

                                                              Exhibit 1




                                                                                                                white paper
Regulatory Impact

LTSB Bank paid $350 million for breaches of compliance reporting relating to
monetary transactions to sanctioned countries Sudan, Iran, etc. between 1995
and 2007.                                         - CNN News, January 10, 2009

Riggs Bank agreed to pay $25 million in civil penalties for what federal regulators
called a 'willful, systemic' violation of the Patriot Act's anti-money-laundering law.
                                                   - The New York Times, July 20, 2004

       New Challenge: The Economic Downturn and                  payment processing infrastructure –- has opened up new
       Beyond                                                    opportunities for financial criminals and has enabled
                                                                 their modus operandi to become more sophisticated.
       While financial crime has always been a threat to the     Financial institutions may have put in place state-of-the-
       economy, the ongoing downturn set off a “tipping point”   art infrastructures to counter the spate of money
       syndrome. Financial institutions seeking new revenue      laundering and financial fraud activities, but there is still
       streams have taken refuge in technologically advanced     a lot of ground to be covered. Unfortunately, most of the
       services to stay ahead of the competition. But the        IT-enabled solutions leveraged by these organizations
       introduction of innovative financial instruments like     adopt a piece-meal approach addressing the needs of a
       stored value cards, remotely created checks (RCC) and     specific business unit or performing only a part of the
       Mail Order / Telephone Order (MOTO) by financial          desired chain of counter-fraud activities, thus leaving a
       institutions – along with the increasing use of plastic   lot to be desired in terms of risk reduction, loss
       money, e-commerce, online banking and high-tech           minimization or productivity improvement.

                                                                 Failure to meet stringent anti-money laundering
                Suspicious Activity Reports (by year)
                   - FinCEN, US Dept. of Treasury                regulations or allowing suspicious transactions to go
                                                                 undetected can have a severe impact on any financial
                                                                 entity, including damage to its reputation, market
                                                                 capitalization, as well as its customer perception and
                                                                 loyalty.

                                                                 Can BPM Show the Way in Solving Financial
                                                                 Crime Problems?

                                                                 Leading financial institutions today leverage IT systems
                                                                 to combat the financial crime threat and meet
                                                                 regulatory compliance obligations. However, a quick look
                                                                 at the current technology landscape is good enough to
                                                                 unravel the “siloed” approach and the underlying
                                                                 disjointed architecture – direct fallout of which is
                                                                 additional investigation effort and prolonged
                                                                 turnaround time, leading to customer defection and loss
                                                                 of business.

                                                                 A typical financial crime check solution (see Exhibit 3,
                                                                 below) comprises multiple fraud and money laundering
                                 Exhibit 2




                                                            2       white paper
detection systems feeding into a human interface              Why a Holistic Approach to Financial Crime
          application for subsequent manual investigation. This         Prevention is Important
          also requires pulling data from other legacy systems
          such as customer datawarehouse, transactional data            The primary priority of financial institutions should be to
          store, third- party credit bureaus etc., to facilitate the    truly understand and assess customers, shifting the
          research process and take action on the flagged entity        focus from merely identifying the customer to undertake
          (customer / transaction).                                     customer due diligence (CDD) to ”Know Your Customers”
                                                                        (KYC) from an anti-money laundering (AML) and
          Additionally, filter applications exist for matching entity
                                                                        sanctions, as well as enabling perspective. Accordingly, a
          (customer and transactions) with sanctions and politically
                                                                        robust and thorough KYC process is imperative for
          exposed persons (PEP) watch lists, resulting in “potential
                                                                        fulfilling the objectives of both AML and sanctions
          hits” referenced in the downstream case management
                                                                        financial institutions to (a) determine if the AML risk of the
          application, as well. As most of the early financial crime
                                                                        customer is within an acceptable threshold and (b)
          detection solutions are based on rigid pattern matching
                                                                        perform in-depth screening on prospective clients to
          rules (e.g., flagging any transaction over £5,000 and
                                                                        ensure they are not sanctioned individuals or companies.
          involving a suspect), only transactions breaching those
                                                                        To implement effective KYC procedures, financial
          rules were previously identified and reported.
                                                                        institutions need to rapidly acquire better in-depth
                                                                        knowledge of their customer base (i.e., where does their
       With the introduction of new, innovative financial
                                                                        customer's money come from, and what do they do with
       instruments, these solutions are unable to uncover the
                                                                        it?). This effort should be coordinated with other
                                          stratagem, allowing
With the introduction of new,                                           customer-focused initiatives in the organization to ensure
                                          perpetrators to exploit
                                                                        any investment yields the greatest impact. For instance,
          innovative financial            these systems.
                                                                        enhanced KYC may overlap with efforts to obtain a single
instruments, these solutions              Additionally, the manual
                                                                        view of the customer, and ongoing CDD could complement
                                          case investigation
   are unable to uncover the              procedure is extremely
                                                                        the requirement to monitor the customer relationship.
          stratagem, allowing                                           (Please refer to Exhibit 3 on the following page).
                                          time consuming and non-
perpetrators to exploit these             standardized, leading to
                                                                        The next section of this white paper explores the use of
                          systems.        inordinate delays and
                                                                        BPM-enabled matured solutions as part of a holistic
                                          incorrect decisions. In
                                                                        approach for preventing losses and mitigating risks
       absence of a structured layer enabling smooth
                                                                        pertaining to financial crime.
       orchestration of atomic tasks, the entire case investigation
       process is left at the mercy of the knowledge level and skills
                                                                        Applying Customer Due Diligence
       possessed by the individual investigators. The manual mode
       of data interchange with external systems often poses a          CDD encompasses processes and practices which ensure
       bottleneck in terms of getting the correct information at the    a “single” view of the customer across the board, along
       right time. Furthermore, the lack of a holistic view of the      with periodic sanity checks on customer data primarily
       entity leads to redundant effort or leaves fatal gaps in the     from two aspects:
       investigation process with severe monetary implications. All
       these factors contribute to the overall process inefficiency     n screening of customers
                                                                        Named
       and render the investigation process virtually ineffective.      Screening of PEPs
                                                                        n
       This is precisely the reason why organizations should
       pursue a holistic approach, through the adoption of              Typically, customer attributes (Name, Country, Address,
       business process management (BPM) methodologies, to              etc.) are screened against list records (provided by
       ensure a well-rounded solution that provides better ROI.         OFAC, PEP, Bank of England, HMT, etc.) using industry-
                                                                        leading filter applications such as Fircosoft or Fiserv.
          BPM (business process management) is a methodology            “Potential Hits” produced as a result of such screening
          which ensures smooth end-to-end modeling,                     are passed to the downstream BPM application for
          orchestration, visibility and optimization of complex         detailed investigation with additional capture of
          business processes spanning multiple functional areas         customer data through automated SLA-driven multiple
          across organizational silos. BPM tools offer a proper mix     KYC requests. This is where BPM plays a significant role
          of business rules and workflow orchestration to ensure        by reducing the turn around time and elimination of
          best-in-class management of business processes using          redundant paper work.
          off the shelf features such as intelligent task routing,
          rule-based decision making, event-driven systemic             Advanced BPM tools ensure comprehensive information
          correspondence, SLA-triggered responses, and                  capture through intelligent features such as “phonetic”
          automated report generation capabilities.                     search capabilities along with visual depiction of linked




                                                        white paper        3
Financial Crime Prevention Solution Schematic Diagram




                                                          Exhibit 3
The above diagram provides a holistic view of the financial crime check workflow spanning customer screening, transaction
monitoring & AML “flag” detection scenarios leading to detailed investigative case management, including automated generation of
compliance reports.



relationships (account types, transactional history,              that predominantly which adheres to payment scheme
related party, connected party, etc.). Additionally, to           guidelines and service level agreements, apart from
reduce the number of “false positives” it is desirable that       facilitating the interfacing with accounting and charging
the filter application has built-in adaptive intelligence.        systems. BPM tools possessing strong integration features
This is where a business rules engine (BRE), an integral          and decision-centric capabilities (e.g., event-driven triggering
part of a BPM tool, fits fills bill. A standard BRE can be        of decisions based on complex business-rule intensive logic
used to configure complex rules to eliminate false hits           such as automatically rejecting a SEPA-DD Core Scheme Initial
based on a risk-based algorithm, thus reducing workload           Collection five days ahead of the settlement date if associated
on the BPM application, leading to enhanced                       case is not resolved within the delivery day) support an
productivity. Furthermore, well-known BPM applications            organization's payment system by providing an efficient and
are usually service oriented architecture (SOA)-                  effective investigation process.
compliant, and hence exposing such rules as “services”
will ensure cost effectiveness as well.                           Once the customer record or the individual transaction is
                                                                  screened and a “Potential Hit” is recorded, the entire set
Sanctions Check                                                   of information is passed on to the case management
                                                                  application for thorough investigation. The case
This involves real-time scanning of automated payment             undergoes detailed scrutiny at multiple levels involving
messages based on their origin as well as destination             interaction with third-party data sources (e.g., World
customer accounts and places (countries). Payment                 Check, Factiva, etc.) as needs dictate.
messages are internally managed using a payment engine




                                                            4         white paper
Fraud and AML Detection & Management                            side their strong “off the shelf” rule-driven automated
                                                                           report generation capabilities reduce manual effort,
        An effective combination of different technologies helps           eliminating redundant paperwork and ensuring timely
        in proactive detection and prevention of fraudulent and            adherence to stringent regulatory norms. For example,
        anti-money laundering transactions. Industry-leading               BPM applications facilitate the generation of pre-filled
        behavioral detection products like Fortent and SAS, etc.           SARs (Suspicious Activity Reports) through seamless
        uncover potentially suspicious activities pertaining to            integration with incident data and customer data along
        the entity as a whole or an atomic transaction. Such an            with providing appropriate validations to prevent
        intricate level of filtering is based on scenario and              unnecessary delay in SAR filing (e.g., transactions worth
        threshold match involving complex statistical analysis             more than £5000 and involving a “suspect” would
        on behavioral patterns and transaction trends using                necessitate a SAR filing to FinCEN).
        peer group analysis, variance analysis, etc. Potentially
        suspicious events are “red flagged” and the generated              This kind of a well-rounded           integrated solution
        alerts are passed to downstream BPM systems for                    comprising CDD, sanctions, fraud and AML systems
        detailed investigation. BPM systems possess built-in               coupled with BPM-enabled investigation case
        intelligence to dig out related incidents (if any) from the        management and regulatory reporting systems keeps
        fraud reporting application and automatically trigger              financial institutions and the economy as a whole ahead
        necessary actions (e.g., a “Negative ID” flag on an                of the global threat of financial crime.
        investigative case is sent to the front-end Teller System
        to avoid any activity against the victimized customer's            Organizational Adoption: The Softer Aspect
                                          accounts; identity thefts
                                          are reported to Identity         As always, the people factor is among the most
      Potentially suspicious                                               important elements in determining the extent of success
                                          Theft Assistance Center,
   events are “red flagged”,              etc.). This kind of rule-        or failure of an organization-wide initiative – it's a well
and the generated alerts are              driven, timely, automated        known fact that a solution is only as good as the way it is
                                          correspondence                   used.
 passed to downstream BPM
                                          ensures an operationally
        systems for detailed                                               Though leveraging financial crime prevention
                                          e ff i c i e n t a n d co s t-
                  investigation.                                           technology comprising effective and appropriate AML
                                          effective solution.
                                                                           and sanction systems is crucial, breaches often happen
                                                                           due to staff failing to execute procedures correctly. So
           Case Management & Regulatory Compliance
                                                                           staff training is another preventive control measure that
           Reporting                                                       firms should adopt to ensure a more effective approach
                                                                           to financial crime. Since AML and sanctions regulation
           Timely and accurate intimation of fraud incidents to
                                                                           and legislation are extremely complicated, frontline staff
           various regulatory agencies such as Financial Crimes
                                                                           cannot be expected to know its intricacies. Accordingly,
           Enforcement Network (FinCEN), SOCA, etc. has been the
                                                                           they should be supported by such preventive systems
           utmost priority of financial organizations, and failure to
                                                                           through proper training to educate them on key
           do so leads to severe penalties. Accordingly, automated
                                                                           principles along with a 24x7 hotline to address
           and seamless report generation is one of the most
                                                                           unresolved queries.
           important “must-have” features of any financial crime
           check solution.
                                                                           The Road Ahead
           BPM systems facilitate processing of investigation cases
                                                                           Industry experience suggests that the number of flagged
           and the reporting of possible violations to the right
                                                                           entities (customer / transaction) post fraud detection is on
           regulatory authorities at the right time with the right
                                                                           a steady uptake with a decent growth rate (possibly due to
           information. On one side the built-in case management
                                                                           sophisticated detection logic leading to enhanced
           features of a BPM system enable unprecedented agility
                                                                           coverage). Additionally, the sizes of industry standard lists
           in responding to market events. (These features include
                                                                           such as OFAC and PEP are also growing on a regular basis
           automated case creation; rule-intensive, role-based
                                                                           due to inclusion of new entities (customer, country, and
           access; case prioritization involving parameters such as
                                                                           vessel). Accordingly, a huge jump is expected in the
           scheme cut-off, payment type, settlement date &
                                                                           volume of requests requiring manual investigation. This
           settlement amount; investigative research through
                                                                           would definitely necessitate the use of “best of breed”
           seamless integration with third party data sources;
                                                                           BPM tools possessing excellent routing features,
           duplicate case check; related case link-up; external
                                                                           business-rule enabled automated decision making
           correspondence and automated rule-driven accounting
                                                                           capabilities and seamless external integration support.
           adjustments such as write-off/charge-off. On the other




                                                           white paper        5
BPM vendors are likely to offer packaged frameworks                                                       processes to check financial crime and meet regulatory
           specifically targeted towards servicing the AML and fraud                                                 compliance in those markets. The engagements
           management domain. There is also a possibility of the                                                     undertaken included building robust filtering processes
           enablement of backward integration from solutions                                                         for handling sanctions list screened transactions,
           provided by some of the market leaders (e.g., offering BRE                                                customer screening, fraud detection and prevention,
           features).                                                                                                servicing upstream AML application and downstream
                                                                                                                     compliance reporting needs.
           In fact, even BRE pure play vendors might attempt to gain
           a toehold in this area. Finally, advanced attributes such as                                              Key Acronyms and Terms Used
           graphical depiction of network relationships and Google
           map integration are also likely to be featured as a part of                                               n Anti Money Laundering
                                                                                                                     AML –
           BPM offerings to facilitate and expedite case disposition,                                                KYC/CDD – Know Your Customer/Customer Due
                                                                                                                     n
           thus resulting in an optimized investigation process.                                                        Diligence
                                                                                                                     nPolitically Exposed Persons
                                                                                                                     PEP –
           Cognizant possesses varied exposure to the financial                                                      n - Proceeds of Crime Act
                                                                                                                     POCA
           crime check domain with substantial expertise in                                                          n - Serious Organized Crime Agency
                                                                                                                     SOCA
                                                                                                                     n – Financial Crimes Enforcement Network
                                                                                                                     FinCEN
           envisioning, conceptualizing and delivering solutions
                                                                                                                     n - Office of Foreign Assets Control
                                                                                                                     OFAC
           across functionalities ranging from investigative case
                                                                                                                     n Her Majesty's Treasury
                                                                                                                     HMT –
           management, anti-money laundering, fraud prevention
                                                                                                                     nFinancial Services Authority
                                                                                                                     FSA –
           and customer due diligence. Cognizant has helped                                                          n Suspicious Activity Report
                                                                                                                     SAR –
           financial institutions in U.S. and UK markets to build
           1
               http://news.cnet.com/8301-1009_3-10186176-83.html


           About the Authors

           Rakesh Banerjee is a Lead Consultant with Cognizant Technology Solutions engaged in Business Process and
           Strategy consulting in the Banking, Capital Markets and Insurance industry verticals. Rakesh has more than 12 years of
           experience in Financial Services Industry. His area of expertise has been Business Process Management, Business
           Rules and Analytics.

           He was involved in providing consultancy to the largest UK bank in setting up their Financial Crime prevention unit's
           Sanctions, AML, KYC processes and satisfying FSA's compliance needs. In addition to being an Economics Graduate,
           he holds a Master's in Business Management specializing in Finance.

           Anirban Mukherjee is a Senior BPM Consultant with Cognizant Technology Solutions and possesses close to 6 years of
           experience in the BPM landscape across topics such as Business Process Analysis, Vendor Evaluation & Business Case
           Preparation.

           He has worked in the capacity of a BPM consultant in multiple engagements pertaining to AML & Fraud Prevention for
           major banking organizations across geographies in the UK and U.S. Anirban holds a Master's in Business Management
           with specialization in Finance.

           About Cognizant

           Cognizant (NASDAQ: CTSH) is a leading provider of information technology, consulting, and business process
           outsourcing services. Cognizant's single-minded passion is to dedicate our global technology and innovation know-
           how, our industry expertise and worldwide resources to working together with clients to make their businesses
           stronger. With over 50 global delivery centers and more than 68,000 employees as of September 30, 2009, we
           combine a unique onsite/offshore delivery model infused by a distinct culture of customer satisfaction. A member of
           the NASDAQ-100 Index and S&P 500 Index, Cognizant is a Forbes Global 2000 company and a member of the Fortune
           1000 and is ranked among the top information technology companies in BusinessWeek's Hot Growth and Top 50
           Performers listings. Visit us online at www.cognizant.com.

           Notes:
           For more information on how to drive your business results with Cognizant, contact us at inquiry@cognizant.com or
           visit our website at: www.cognizant.com.

                                                                                                      World Headquarters                             European Headquarters                          India Operations Headquarters

                                                                                                      500 Frank W. Burr Blvd.                        Haymarket House                                #5/535, Old Mahabalipuram Road
                                                                                                      Teaneck, NJ 07666 USA                          28-29 Haymarket                                Okkiyam Pettai, Thoraipakkam
                                                                                                      Phone: +1 201 801 0233                         London SW1Y 4SP UK                             Chennai, 600 096 India
                                                                                                      Fax: +1 201 801 0243                           Phone: +44 (0) 20 7321 4888                    Phone: +91 (0) 44 4209 6000
                                                                                                      Toll Free: +1 888 937 3277                     Fax: +44 (0) 20 7321 4890                      Fax: +91 (0) 44 4209 6060
                                                                                                      Email: inquiry@cognizant.com                   Email: infouk@cognizant.com                    Email: inquiryindia@cognizant.com

© Copyright 2010, Cognizant. All rights reserved. No part of this document may be reproduced, stored in a retrieval system, transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or

       White paper
otherwise, without the express written permission from Cognizant. The information contained herein is subject to change without notice. All other trademarks mentioned herein are the property of their respective owners.

Weitere ähnliche Inhalte

Was ist angesagt?

Transnational anti-corruption law March 2014_NYU Colloquium (2)
Transnational anti-corruption law March 2014_NYU Colloquium (2)Transnational anti-corruption law March 2014_NYU Colloquium (2)
Transnational anti-corruption law March 2014_NYU Colloquium (2)
Bruno Paschoal
 
Brandon, paul, and monica's template (federalism)
Brandon, paul, and monica's template (federalism)Brandon, paul, and monica's template (federalism)
Brandon, paul, and monica's template (federalism)
bklew707
 
President Estrada’s BW Resources Scandal
President Estrada’s BW Resources ScandalPresident Estrada’s BW Resources Scandal
President Estrada’s BW Resources Scandal
Lawrence Bautista
 
1996-2-8 p.27 Federal Affairs Eduardo Laureano
1996-2-8 p.27 Federal Affairs Eduardo Laureano1996-2-8 p.27 Federal Affairs Eduardo Laureano
1996-2-8 p.27 Federal Affairs Eduardo Laureano
Eduardo Laureano Angel
 
Citizens United Is Unconstitutional - Restore Democracy to The People
Citizens United Is Unconstitutional - Restore Democracy to The PeopleCitizens United Is Unconstitutional - Restore Democracy to The People
Citizens United Is Unconstitutional - Restore Democracy to The People
Linda Sturgeon
 

Was ist angesagt? (17)

Fiscal Dictatorship
Fiscal DictatorshipFiscal Dictatorship
Fiscal Dictatorship
 
Transnational anti-corruption law March 2014_NYU Colloquium (2)
Transnational anti-corruption law March 2014_NYU Colloquium (2)Transnational anti-corruption law March 2014_NYU Colloquium (2)
Transnational anti-corruption law March 2014_NYU Colloquium (2)
 
Law final report Michelangelo Matteoda
Law final report  Michelangelo MatteodaLaw final report  Michelangelo Matteoda
Law final report Michelangelo Matteoda
 
AML-CFT Notes to Insurance Sector of Afghanistan_NY
AML-CFT Notes to Insurance Sector of Afghanistan_NYAML-CFT Notes to Insurance Sector of Afghanistan_NY
AML-CFT Notes to Insurance Sector of Afghanistan_NY
 
Chapter 4: CAT Final
Chapter 4: CAT FinalChapter 4: CAT Final
Chapter 4: CAT Final
 
Brandon, paul, and monica's template (federalism)
Brandon, paul, and monica's template (federalism)Brandon, paul, and monica's template (federalism)
Brandon, paul, and monica's template (federalism)
 
President Estrada’s BW Resources Scandal
President Estrada’s BW Resources ScandalPresident Estrada’s BW Resources Scandal
President Estrada’s BW Resources Scandal
 
MONEY FOR POLITICAL PARTIES
MONEY FOR POLITICAL PARTIESMONEY FOR POLITICAL PARTIES
MONEY FOR POLITICAL PARTIES
 
J Robert Hunter Antitrust Senate Mc Carran Repeal Health Insurance Testimo...
J  Robert Hunter   Antitrust Senate Mc Carran Repeal Health Insurance Testimo...J  Robert Hunter   Antitrust Senate Mc Carran Repeal Health Insurance Testimo...
J Robert Hunter Antitrust Senate Mc Carran Repeal Health Insurance Testimo...
 
1996-2-8 p.27 Federal Affairs Eduardo Laureano
1996-2-8 p.27 Federal Affairs Eduardo Laureano1996-2-8 p.27 Federal Affairs Eduardo Laureano
1996-2-8 p.27 Federal Affairs Eduardo Laureano
 
Patterson ch02
Patterson ch02Patterson ch02
Patterson ch02
 
AML-CFT Legal & Regulatory Framework in Afghanistan_NY
AML-CFT Legal & Regulatory Framework in Afghanistan_NYAML-CFT Legal & Regulatory Framework in Afghanistan_NY
AML-CFT Legal & Regulatory Framework in Afghanistan_NY
 
Civic freedom monitor
Civic freedom monitorCivic freedom monitor
Civic freedom monitor
 
Corruption in telecommunications at Wits University - March 2012
Corruption in telecommunications at Wits University - March 2012Corruption in telecommunications at Wits University - March 2012
Corruption in telecommunications at Wits University - March 2012
 
S7C - AML and CFT Operational Compliance Training Course (2018)
S7C - AML and CFT Operational Compliance Training Course (2018)S7C - AML and CFT Operational Compliance Training Course (2018)
S7C - AML and CFT Operational Compliance Training Course (2018)
 
Submission to the parliamentary joint committee inquiry on the future impact ...
Submission to the parliamentary joint committee inquiry on the future impact ...Submission to the parliamentary joint committee inquiry on the future impact ...
Submission to the parliamentary joint committee inquiry on the future impact ...
 
Citizens United Is Unconstitutional - Restore Democracy to The People
Citizens United Is Unconstitutional - Restore Democracy to The PeopleCitizens United Is Unconstitutional - Restore Democracy to The People
Citizens United Is Unconstitutional - Restore Democracy to The People
 

Andere mochten auch

L Scope
L ScopeL Scope
L Scope
CTIN
 
Business Crime Research Assignment FC
Business Crime Research Assignment FCBusiness Crime Research Assignment FC
Business Crime Research Assignment FC
Melissa Gibson
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
Charmaine Servado
 

Andere mochten auch (12)

The International Comparative Legal Guide to: Business Crime 2017
The International Comparative Legal Guide to: Business Crime 2017The International Comparative Legal Guide to: Business Crime 2017
The International Comparative Legal Guide to: Business Crime 2017
 
Legal500
Legal500Legal500
Legal500
 
Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?
 
L Scope
L ScopeL Scope
L Scope
 
Business Crime Research Assignment FC
Business Crime Research Assignment FCBusiness Crime Research Assignment FC
Business Crime Research Assignment FC
 
Crime Unit
Crime UnitCrime Unit
Crime Unit
 
Global Economic Crime Survey
Global Economic Crime SurveyGlobal Economic Crime Survey
Global Economic Crime Survey
 
Crime in the Business World
Crime in the Business WorldCrime in the Business World
Crime in the Business World
 
Chapter 2 Criminology
Chapter 2 CriminologyChapter 2 Criminology
Chapter 2 Criminology
 
The International Comparative Legal Guide to Business Crime 2016
The International Comparative Legal Guide to Business Crime 2016The International Comparative Legal Guide to Business Crime 2016
The International Comparative Legal Guide to Business Crime 2016
 
Bribery and Corruption
Bribery and CorruptionBribery and Corruption
Bribery and Corruption
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 

Ähnlich wie Tackling Financial Crime through Business Process Management

The 3rd Directive in the UK
The 3rd Directive in the UKThe 3rd Directive in the UK
The 3rd Directive in the UK
ALI RAZA
 
The new british invasion may jon mar-feature_030512-415-1
The new british invasion may jon mar-feature_030512-415-1The new british invasion may jon mar-feature_030512-415-1
The new british invasion may jon mar-feature_030512-415-1
jonamay
 
A new european tax on financial transactions is set to go global
A new european tax on financial transactions is set to go globalA new european tax on financial transactions is set to go global
A new european tax on financial transactions is set to go global
ManfredNolte
 
Cassandra Ferraro518pmAug 17 at 518pmManage Discussion Entry
Cassandra Ferraro518pmAug 17 at 518pmManage Discussion EntryCassandra Ferraro518pmAug 17 at 518pmManage Discussion Entry
Cassandra Ferraro518pmAug 17 at 518pmManage Discussion Entry
MaximaSheffield592
 
45046503 money-laundering
45046503 money-laundering45046503 money-laundering
45046503 money-laundering
saleh iskandar
 
Extradition within the CEMAC Sub Region Prospects and Perspectives
Extradition within the CEMAC Sub Region Prospects and PerspectivesExtradition within the CEMAC Sub Region Prospects and Perspectives
Extradition within the CEMAC Sub Region Prospects and Perspectives
ijtsrd
 

Ähnlich wie Tackling Financial Crime through Business Process Management (20)

An appraisal of legal and administrative framework for combating terrorist fi...
An appraisal of legal and administrative framework for combating terrorist fi...An appraisal of legal and administrative framework for combating terrorist fi...
An appraisal of legal and administrative framework for combating terrorist fi...
 
The 3rd Directive in the UK
The 3rd Directive in the UKThe 3rd Directive in the UK
The 3rd Directive in the UK
 
Anti
AntiAnti
Anti
 
The Offshore Financial Centres - Conceiling the beneficial owner
The Offshore Financial Centres - Conceiling the beneficial ownerThe Offshore Financial Centres - Conceiling the beneficial owner
The Offshore Financial Centres - Conceiling the beneficial owner
 
Adequate Procedures CLEAN
Adequate Procedures CLEANAdequate Procedures CLEAN
Adequate Procedures CLEAN
 
Session 1. Intro to IFFs Waridah Makena 2022.pptx
Session 1. Intro to IFFs Waridah Makena 2022.pptxSession 1. Intro to IFFs Waridah Makena 2022.pptx
Session 1. Intro to IFFs Waridah Makena 2022.pptx
 
Taylor Amarel Upload - Liberty Global Asia Report
Taylor Amarel Upload - Liberty Global Asia ReportTaylor Amarel Upload - Liberty Global Asia Report
Taylor Amarel Upload - Liberty Global Asia Report
 
The new british invasion may jon mar-feature_030512-415-1
The new british invasion may jon mar-feature_030512-415-1The new british invasion may jon mar-feature_030512-415-1
The new british invasion may jon mar-feature_030512-415-1
 
The new british invasion may jon mar-feature_030512-415-1
The new british invasion may jon mar-feature_030512-415-1The new british invasion may jon mar-feature_030512-415-1
The new british invasion may jon mar-feature_030512-415-1
 
Money laundering and gaming v1
Money laundering and gaming   v1Money laundering and gaming   v1
Money laundering and gaming v1
 
A new european tax on financial transactions is set to go global
A new european tax on financial transactions is set to go globalA new european tax on financial transactions is set to go global
A new european tax on financial transactions is set to go global
 
Cassandra Ferraro518pmAug 17 at 518pmManage Discussion Entry
Cassandra Ferraro518pmAug 17 at 518pmManage Discussion EntryCassandra Ferraro518pmAug 17 at 518pmManage Discussion Entry
Cassandra Ferraro518pmAug 17 at 518pmManage Discussion Entry
 
45046503 money-laundering
45046503 money-laundering45046503 money-laundering
45046503 money-laundering
 
India 2025
India 2025India 2025
India 2025
 
Money laundering
Money launderingMoney laundering
Money laundering
 
Financial crime after the crisis in the UK/Crimen financiado tras la crisis e...
Financial crime after the crisis in the UK/Crimen financiado tras la crisis e...Financial crime after the crisis in the UK/Crimen financiado tras la crisis e...
Financial crime after the crisis in the UK/Crimen financiado tras la crisis e...
 
Preventing Money Laundering and Combating the Financing of Terrorism (2006)
Preventing Money Laundering and Combating the Financing of Terrorism (2006)Preventing Money Laundering and Combating the Financing of Terrorism (2006)
Preventing Money Laundering and Combating the Financing of Terrorism (2006)
 
Extradition within the CEMAC Sub Region Prospects and Perspectives
Extradition within the CEMAC Sub Region Prospects and PerspectivesExtradition within the CEMAC Sub Region Prospects and Perspectives
Extradition within the CEMAC Sub Region Prospects and Perspectives
 
Moving "Value" Not Necessarily Money
Moving "Value" Not Necessarily MoneyMoving "Value" Not Necessarily Money
Moving "Value" Not Necessarily Money
 
Money Laundering Through Real Estate
Money Laundering Through Real EstateMoney Laundering Through Real Estate
Money Laundering Through Real Estate
 

Mehr von Cognizant

Mehr von Cognizant (20)

Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
 
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-makingData Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
 
It Takes an Ecosystem: How Technology Companies Deliver Exceptional Experiences
It Takes an Ecosystem: How Technology Companies Deliver Exceptional ExperiencesIt Takes an Ecosystem: How Technology Companies Deliver Exceptional Experiences
It Takes an Ecosystem: How Technology Companies Deliver Exceptional Experiences
 
Intuition Engineered
Intuition EngineeredIntuition Engineered
Intuition Engineered
 
The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...
The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...
The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...
 
Enhancing Desirability: Five Considerations for Winning Digital Initiatives
Enhancing Desirability: Five Considerations for Winning Digital InitiativesEnhancing Desirability: Five Considerations for Winning Digital Initiatives
Enhancing Desirability: Five Considerations for Winning Digital Initiatives
 
The Work Ahead in Manufacturing: Fulfilling the Agility Mandate
The Work Ahead in Manufacturing: Fulfilling the Agility MandateThe Work Ahead in Manufacturing: Fulfilling the Agility Mandate
The Work Ahead in Manufacturing: Fulfilling the Agility Mandate
 
The Work Ahead in Higher Education: Repaving the Road for the Employees of To...
The Work Ahead in Higher Education: Repaving the Road for the Employees of To...The Work Ahead in Higher Education: Repaving the Road for the Employees of To...
The Work Ahead in Higher Education: Repaving the Road for the Employees of To...
 
Engineering the Next-Gen Digital Claims Organisation for Australian General I...
Engineering the Next-Gen Digital Claims Organisation for Australian General I...Engineering the Next-Gen Digital Claims Organisation for Australian General I...
Engineering the Next-Gen Digital Claims Organisation for Australian General I...
 
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...
 
Green Rush: The Economic Imperative for Sustainability
Green Rush: The Economic Imperative for SustainabilityGreen Rush: The Economic Imperative for Sustainability
Green Rush: The Economic Imperative for Sustainability
 
Policy Administration Modernization: Four Paths for Insurers
Policy Administration Modernization: Four Paths for InsurersPolicy Administration Modernization: Four Paths for Insurers
Policy Administration Modernization: Four Paths for Insurers
 
The Work Ahead in Utilities: Powering a Sustainable Future with Digital
The Work Ahead in Utilities: Powering a Sustainable Future with DigitalThe Work Ahead in Utilities: Powering a Sustainable Future with Digital
The Work Ahead in Utilities: Powering a Sustainable Future with Digital
 
AI in Media & Entertainment: Starting the Journey to Value
AI in Media & Entertainment: Starting the Journey to ValueAI in Media & Entertainment: Starting the Journey to Value
AI in Media & Entertainment: Starting the Journey to Value
 
Operations Workforce Management: A Data-Informed, Digital-First Approach
Operations Workforce Management: A Data-Informed, Digital-First ApproachOperations Workforce Management: A Data-Informed, Digital-First Approach
Operations Workforce Management: A Data-Informed, Digital-First Approach
 
Five Priorities for Quality Engineering When Taking Banking to the Cloud
Five Priorities for Quality Engineering When Taking Banking to the CloudFive Priorities for Quality Engineering When Taking Banking to the Cloud
Five Priorities for Quality Engineering When Taking Banking to the Cloud
 
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining Focused
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining FocusedGetting Ahead With AI: How APAC Companies Replicate Success by Remaining Focused
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining Focused
 
Crafting the Utility of the Future
Crafting the Utility of the FutureCrafting the Utility of the Future
Crafting the Utility of the Future
 
Utilities Can Ramp Up CX with a Customer Data Platform
Utilities Can Ramp Up CX with a Customer Data PlatformUtilities Can Ramp Up CX with a Customer Data Platform
Utilities Can Ramp Up CX with a Customer Data Platform
 
The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...
The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...
The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Tackling Financial Crime through Business Process Management

  • 1. Cognizant White Paper Tackling Financial Crime – The BPM Perspective Channeling financial crime proceeds for illegal activities Regulatory Framework for Tackling Financial may not be a new phenomenon, but it has recently Crime soared to alarming proportions. The spread of such unlawful acts is wide enough to include a whole range of In wake of the stern measures advocated by regulatory criminal activities involving human trafficking, drug authorities in the U.S., EU and UK to combat financial crime, trafficking, illegal dealing with sanctioned companies or the key compliance challenge for banks and financial individual and terrorist financing. This sudden spate of organizations has been the lack of a standardized and crime has forced governments and regulatory consistent guideline arising from various regulatory regimes organizations worldwide to confront this menace with an or suggested by different bodies overseeing multiple aspects iron fist in a coordinated manner. of financial crime, with a mix of risk-based and zero tolerance approaches. To assist law enforcement agencies, the U.S. While it is immensely difficult to determine the true Patriot Act was transformed into law in October 2001. One impact of financial crime in monetary terms, businesses provision, entitled Title III, legalized the freezing of U.S.-based and tax payers are estimated to be hit by billions of assets of any suspected organization or individual involved in dollars annually. The International Monetary Fund has money-laundering, with the sole agenda of “starving” estimated the scale of global money laundering to be terrorist networks. In the UK, the Parliament passed the equivalent to 2% to 5% of worldwide Gross Domestic Terrorism Act 2000, and following the events of 9/11, the Product (GDP). The UK customs authorities, in particular, Proceeds of Crime Act 2002 (POCA) was passed. The Serious estimate the annual proceeds from crime in the UK to be Organized Crime Agency (SOCA) was created in April 2006, anywhere between £19 billion and £48 billion. An early whose aim is to reduce the impact of serious and organized 2009 Gartner report commented that about 7.5% of U.S. crime, and subsequently the EU's Third Money Laundering adults lost money as a result of financial fraud last year, Directive was implemented in December 2007 across the mostly due to data breaches. 1 European Economic Area. Estimated annual cost of some type of organized crime These acts mandate financial institutions to alert law ID T he f t 2 enforcement officials on banking activity that is deemed suspicious. C o unt e rf e it ing 1.4 In addition, the U.S. Congress granted the Treasury H um a n 4.1 Department with regulatory powers to penalize any U.S. T ra f f ic k ing financial institution that might participate in these F ra ud 7.8 schemes, whether knowingly or not. These financial sanctions, regulations and compliance D rugs 17.6 T ra de activities tend towards a “zero tolerance” regime. So urce: UK Ho me Dept '09 repo rt o n o rganized crime £ billions Exhibit 1 white paper
  • 2. Regulatory Impact LTSB Bank paid $350 million for breaches of compliance reporting relating to monetary transactions to sanctioned countries Sudan, Iran, etc. between 1995 and 2007. - CNN News, January 10, 2009 Riggs Bank agreed to pay $25 million in civil penalties for what federal regulators called a 'willful, systemic' violation of the Patriot Act's anti-money-laundering law. - The New York Times, July 20, 2004 New Challenge: The Economic Downturn and payment processing infrastructure –- has opened up new Beyond opportunities for financial criminals and has enabled their modus operandi to become more sophisticated. While financial crime has always been a threat to the Financial institutions may have put in place state-of-the- economy, the ongoing downturn set off a “tipping point” art infrastructures to counter the spate of money syndrome. Financial institutions seeking new revenue laundering and financial fraud activities, but there is still streams have taken refuge in technologically advanced a lot of ground to be covered. Unfortunately, most of the services to stay ahead of the competition. But the IT-enabled solutions leveraged by these organizations introduction of innovative financial instruments like adopt a piece-meal approach addressing the needs of a stored value cards, remotely created checks (RCC) and specific business unit or performing only a part of the Mail Order / Telephone Order (MOTO) by financial desired chain of counter-fraud activities, thus leaving a institutions – along with the increasing use of plastic lot to be desired in terms of risk reduction, loss money, e-commerce, online banking and high-tech minimization or productivity improvement. Failure to meet stringent anti-money laundering Suspicious Activity Reports (by year) - FinCEN, US Dept. of Treasury regulations or allowing suspicious transactions to go undetected can have a severe impact on any financial entity, including damage to its reputation, market capitalization, as well as its customer perception and loyalty. Can BPM Show the Way in Solving Financial Crime Problems? Leading financial institutions today leverage IT systems to combat the financial crime threat and meet regulatory compliance obligations. However, a quick look at the current technology landscape is good enough to unravel the “siloed” approach and the underlying disjointed architecture – direct fallout of which is additional investigation effort and prolonged turnaround time, leading to customer defection and loss of business. A typical financial crime check solution (see Exhibit 3, below) comprises multiple fraud and money laundering Exhibit 2 2 white paper
  • 3. detection systems feeding into a human interface Why a Holistic Approach to Financial Crime application for subsequent manual investigation. This Prevention is Important also requires pulling data from other legacy systems such as customer datawarehouse, transactional data The primary priority of financial institutions should be to store, third- party credit bureaus etc., to facilitate the truly understand and assess customers, shifting the research process and take action on the flagged entity focus from merely identifying the customer to undertake (customer / transaction). customer due diligence (CDD) to ”Know Your Customers” (KYC) from an anti-money laundering (AML) and Additionally, filter applications exist for matching entity sanctions, as well as enabling perspective. Accordingly, a (customer and transactions) with sanctions and politically robust and thorough KYC process is imperative for exposed persons (PEP) watch lists, resulting in “potential fulfilling the objectives of both AML and sanctions hits” referenced in the downstream case management financial institutions to (a) determine if the AML risk of the application, as well. As most of the early financial crime customer is within an acceptable threshold and (b) detection solutions are based on rigid pattern matching perform in-depth screening on prospective clients to rules (e.g., flagging any transaction over £5,000 and ensure they are not sanctioned individuals or companies. involving a suspect), only transactions breaching those To implement effective KYC procedures, financial rules were previously identified and reported. institutions need to rapidly acquire better in-depth knowledge of their customer base (i.e., where does their With the introduction of new, innovative financial customer's money come from, and what do they do with instruments, these solutions are unable to uncover the it?). This effort should be coordinated with other stratagem, allowing With the introduction of new, customer-focused initiatives in the organization to ensure perpetrators to exploit any investment yields the greatest impact. For instance, innovative financial these systems. enhanced KYC may overlap with efforts to obtain a single instruments, these solutions Additionally, the manual view of the customer, and ongoing CDD could complement case investigation are unable to uncover the procedure is extremely the requirement to monitor the customer relationship. stratagem, allowing (Please refer to Exhibit 3 on the following page). time consuming and non- perpetrators to exploit these standardized, leading to The next section of this white paper explores the use of systems. inordinate delays and BPM-enabled matured solutions as part of a holistic incorrect decisions. In approach for preventing losses and mitigating risks absence of a structured layer enabling smooth pertaining to financial crime. orchestration of atomic tasks, the entire case investigation process is left at the mercy of the knowledge level and skills Applying Customer Due Diligence possessed by the individual investigators. The manual mode of data interchange with external systems often poses a CDD encompasses processes and practices which ensure bottleneck in terms of getting the correct information at the a “single” view of the customer across the board, along right time. Furthermore, the lack of a holistic view of the with periodic sanity checks on customer data primarily entity leads to redundant effort or leaves fatal gaps in the from two aspects: investigation process with severe monetary implications. All these factors contribute to the overall process inefficiency n screening of customers Named and render the investigation process virtually ineffective. Screening of PEPs n This is precisely the reason why organizations should pursue a holistic approach, through the adoption of Typically, customer attributes (Name, Country, Address, business process management (BPM) methodologies, to etc.) are screened against list records (provided by ensure a well-rounded solution that provides better ROI. OFAC, PEP, Bank of England, HMT, etc.) using industry- leading filter applications such as Fircosoft or Fiserv. BPM (business process management) is a methodology “Potential Hits” produced as a result of such screening which ensures smooth end-to-end modeling, are passed to the downstream BPM application for orchestration, visibility and optimization of complex detailed investigation with additional capture of business processes spanning multiple functional areas customer data through automated SLA-driven multiple across organizational silos. BPM tools offer a proper mix KYC requests. This is where BPM plays a significant role of business rules and workflow orchestration to ensure by reducing the turn around time and elimination of best-in-class management of business processes using redundant paper work. off the shelf features such as intelligent task routing, rule-based decision making, event-driven systemic Advanced BPM tools ensure comprehensive information correspondence, SLA-triggered responses, and capture through intelligent features such as “phonetic” automated report generation capabilities. search capabilities along with visual depiction of linked white paper 3
  • 4. Financial Crime Prevention Solution Schematic Diagram Exhibit 3 The above diagram provides a holistic view of the financial crime check workflow spanning customer screening, transaction monitoring & AML “flag” detection scenarios leading to detailed investigative case management, including automated generation of compliance reports. relationships (account types, transactional history, that predominantly which adheres to payment scheme related party, connected party, etc.). Additionally, to guidelines and service level agreements, apart from reduce the number of “false positives” it is desirable that facilitating the interfacing with accounting and charging the filter application has built-in adaptive intelligence. systems. BPM tools possessing strong integration features This is where a business rules engine (BRE), an integral and decision-centric capabilities (e.g., event-driven triggering part of a BPM tool, fits fills bill. A standard BRE can be of decisions based on complex business-rule intensive logic used to configure complex rules to eliminate false hits such as automatically rejecting a SEPA-DD Core Scheme Initial based on a risk-based algorithm, thus reducing workload Collection five days ahead of the settlement date if associated on the BPM application, leading to enhanced case is not resolved within the delivery day) support an productivity. Furthermore, well-known BPM applications organization's payment system by providing an efficient and are usually service oriented architecture (SOA)- effective investigation process. compliant, and hence exposing such rules as “services” will ensure cost effectiveness as well. Once the customer record or the individual transaction is screened and a “Potential Hit” is recorded, the entire set Sanctions Check of information is passed on to the case management application for thorough investigation. The case This involves real-time scanning of automated payment undergoes detailed scrutiny at multiple levels involving messages based on their origin as well as destination interaction with third-party data sources (e.g., World customer accounts and places (countries). Payment Check, Factiva, etc.) as needs dictate. messages are internally managed using a payment engine 4 white paper
  • 5. Fraud and AML Detection & Management side their strong “off the shelf” rule-driven automated report generation capabilities reduce manual effort, An effective combination of different technologies helps eliminating redundant paperwork and ensuring timely in proactive detection and prevention of fraudulent and adherence to stringent regulatory norms. For example, anti-money laundering transactions. Industry-leading BPM applications facilitate the generation of pre-filled behavioral detection products like Fortent and SAS, etc. SARs (Suspicious Activity Reports) through seamless uncover potentially suspicious activities pertaining to integration with incident data and customer data along the entity as a whole or an atomic transaction. Such an with providing appropriate validations to prevent intricate level of filtering is based on scenario and unnecessary delay in SAR filing (e.g., transactions worth threshold match involving complex statistical analysis more than £5000 and involving a “suspect” would on behavioral patterns and transaction trends using necessitate a SAR filing to FinCEN). peer group analysis, variance analysis, etc. Potentially suspicious events are “red flagged” and the generated This kind of a well-rounded integrated solution alerts are passed to downstream BPM systems for comprising CDD, sanctions, fraud and AML systems detailed investigation. BPM systems possess built-in coupled with BPM-enabled investigation case intelligence to dig out related incidents (if any) from the management and regulatory reporting systems keeps fraud reporting application and automatically trigger financial institutions and the economy as a whole ahead necessary actions (e.g., a “Negative ID” flag on an of the global threat of financial crime. investigative case is sent to the front-end Teller System to avoid any activity against the victimized customer's Organizational Adoption: The Softer Aspect accounts; identity thefts are reported to Identity As always, the people factor is among the most Potentially suspicious important elements in determining the extent of success Theft Assistance Center, events are “red flagged”, etc.). This kind of rule- or failure of an organization-wide initiative – it's a well and the generated alerts are driven, timely, automated known fact that a solution is only as good as the way it is correspondence used. passed to downstream BPM ensures an operationally systems for detailed Though leveraging financial crime prevention e ff i c i e n t a n d co s t- investigation. technology comprising effective and appropriate AML effective solution. and sanction systems is crucial, breaches often happen due to staff failing to execute procedures correctly. So Case Management & Regulatory Compliance staff training is another preventive control measure that Reporting firms should adopt to ensure a more effective approach to financial crime. Since AML and sanctions regulation Timely and accurate intimation of fraud incidents to and legislation are extremely complicated, frontline staff various regulatory agencies such as Financial Crimes cannot be expected to know its intricacies. Accordingly, Enforcement Network (FinCEN), SOCA, etc. has been the they should be supported by such preventive systems utmost priority of financial organizations, and failure to through proper training to educate them on key do so leads to severe penalties. Accordingly, automated principles along with a 24x7 hotline to address and seamless report generation is one of the most unresolved queries. important “must-have” features of any financial crime check solution. The Road Ahead BPM systems facilitate processing of investigation cases Industry experience suggests that the number of flagged and the reporting of possible violations to the right entities (customer / transaction) post fraud detection is on regulatory authorities at the right time with the right a steady uptake with a decent growth rate (possibly due to information. On one side the built-in case management sophisticated detection logic leading to enhanced features of a BPM system enable unprecedented agility coverage). Additionally, the sizes of industry standard lists in responding to market events. (These features include such as OFAC and PEP are also growing on a regular basis automated case creation; rule-intensive, role-based due to inclusion of new entities (customer, country, and access; case prioritization involving parameters such as vessel). Accordingly, a huge jump is expected in the scheme cut-off, payment type, settlement date & volume of requests requiring manual investigation. This settlement amount; investigative research through would definitely necessitate the use of “best of breed” seamless integration with third party data sources; BPM tools possessing excellent routing features, duplicate case check; related case link-up; external business-rule enabled automated decision making correspondence and automated rule-driven accounting capabilities and seamless external integration support. adjustments such as write-off/charge-off. On the other white paper 5
  • 6. BPM vendors are likely to offer packaged frameworks processes to check financial crime and meet regulatory specifically targeted towards servicing the AML and fraud compliance in those markets. The engagements management domain. There is also a possibility of the undertaken included building robust filtering processes enablement of backward integration from solutions for handling sanctions list screened transactions, provided by some of the market leaders (e.g., offering BRE customer screening, fraud detection and prevention, features). servicing upstream AML application and downstream compliance reporting needs. In fact, even BRE pure play vendors might attempt to gain a toehold in this area. Finally, advanced attributes such as Key Acronyms and Terms Used graphical depiction of network relationships and Google map integration are also likely to be featured as a part of n Anti Money Laundering AML – BPM offerings to facilitate and expedite case disposition, KYC/CDD – Know Your Customer/Customer Due n thus resulting in an optimized investigation process. Diligence nPolitically Exposed Persons PEP – Cognizant possesses varied exposure to the financial n - Proceeds of Crime Act POCA crime check domain with substantial expertise in n - Serious Organized Crime Agency SOCA n – Financial Crimes Enforcement Network FinCEN envisioning, conceptualizing and delivering solutions n - Office of Foreign Assets Control OFAC across functionalities ranging from investigative case n Her Majesty's Treasury HMT – management, anti-money laundering, fraud prevention nFinancial Services Authority FSA – and customer due diligence. Cognizant has helped n Suspicious Activity Report SAR – financial institutions in U.S. and UK markets to build 1 http://news.cnet.com/8301-1009_3-10186176-83.html About the Authors Rakesh Banerjee is a Lead Consultant with Cognizant Technology Solutions engaged in Business Process and Strategy consulting in the Banking, Capital Markets and Insurance industry verticals. Rakesh has more than 12 years of experience in Financial Services Industry. His area of expertise has been Business Process Management, Business Rules and Analytics. He was involved in providing consultancy to the largest UK bank in setting up their Financial Crime prevention unit's Sanctions, AML, KYC processes and satisfying FSA's compliance needs. In addition to being an Economics Graduate, he holds a Master's in Business Management specializing in Finance. Anirban Mukherjee is a Senior BPM Consultant with Cognizant Technology Solutions and possesses close to 6 years of experience in the BPM landscape across topics such as Business Process Analysis, Vendor Evaluation & Business Case Preparation. He has worked in the capacity of a BPM consultant in multiple engagements pertaining to AML & Fraud Prevention for major banking organizations across geographies in the UK and U.S. Anirban holds a Master's in Business Management with specialization in Finance. About Cognizant Cognizant (NASDAQ: CTSH) is a leading provider of information technology, consulting, and business process outsourcing services. Cognizant's single-minded passion is to dedicate our global technology and innovation know- how, our industry expertise and worldwide resources to working together with clients to make their businesses stronger. With over 50 global delivery centers and more than 68,000 employees as of September 30, 2009, we combine a unique onsite/offshore delivery model infused by a distinct culture of customer satisfaction. A member of the NASDAQ-100 Index and S&P 500 Index, Cognizant is a Forbes Global 2000 company and a member of the Fortune 1000 and is ranked among the top information technology companies in BusinessWeek's Hot Growth and Top 50 Performers listings. Visit us online at www.cognizant.com. Notes: For more information on how to drive your business results with Cognizant, contact us at inquiry@cognizant.com or visit our website at: www.cognizant.com. World Headquarters European Headquarters India Operations Headquarters 500 Frank W. Burr Blvd. Haymarket House #5/535, Old Mahabalipuram Road Teaneck, NJ 07666 USA 28-29 Haymarket Okkiyam Pettai, Thoraipakkam Phone: +1 201 801 0233 London SW1Y 4SP UK Chennai, 600 096 India Fax: +1 201 801 0243 Phone: +44 (0) 20 7321 4888 Phone: +91 (0) 44 4209 6000 Toll Free: +1 888 937 3277 Fax: +44 (0) 20 7321 4890 Fax: +91 (0) 44 4209 6060 Email: inquiry@cognizant.com Email: infouk@cognizant.com Email: inquiryindia@cognizant.com © Copyright 2010, Cognizant. All rights reserved. No part of this document may be reproduced, stored in a retrieval system, transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or White paper otherwise, without the express written permission from Cognizant. The information contained herein is subject to change without notice. All other trademarks mentioned herein are the property of their respective owners.