SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
THOMSON REUTERS ACCELUS™
Financial Crime and Reputation Risk
THOMSON REUTERS ACCELUS™
Our solutions dynamically connect business transactions, strategy, and
operations to the ever-changing regulatory environment, providing highly
regulated firms with informed outcomes. Our client groups include compliance,
audit, legal and risk functions within the organisation. We partner with firms to
manage their risk exposure and accelerate their business at every step.
Thomson Reuters Accelus 3
Financial Crime and Reputation Risk
In 2010
Thomson
Reuters
tracked more
than 10,000
financial
services
regulatory
changes
across the
globe.
INTRODUCING THE FIRST TRULY COMPREHENSIVE FINANCIAL CRIME
PREVENTION SOLUTION
Thomson Reuters AccelusTM
provides effective financial crime solutions that combine advanced
software with World-Check’s comprehensive and highly structured intelligence on Politically
Exposed People (PEPs) and heightened risk individuals and entities. Thousands of organisations
around the world use our screening solutions to meet their Anti Money Laundering (AML), Know
Your Customer (KYC), Countering the Financing of Terrorism (CFT) and PEP obligations, to find
hidden risk in their relationships and to safeguard their reputation.
Organisations that partner with Thomson Reuters Accelus can rely on our legacy of successful
implementation and service. We work with firms and their advisors to:
• Effectively manage regulatory, reputational and financial risk
• Offer auditable proof of due diligence
• Comply with global legislation including AML, KYC, CFT and PEP monitoring
• Ensure people are who they say they are
• Track market developments and regional enforcement action
• Process clients faster and more efficiently than the competition
• Provide targeted and effective due diligence on supply chains and third party agents
• Train employees and suppliers on their AML and due diligence obligations
• Perform ongoing transaction monitoring of clients for AML and fraud prevention
• Integrate our data into existing systems and technology infrastructure
4 GOVERNANCE, RISK AND COMPLIANCE
Financial Crime and Reputation Risk
“The biggest
problem is
false positives
– this creates
most of the
work. Much of
my time is spent
doing due
diligence on
an alert and
noting why
it should be
cleared.”
CCO, Global Bank
MANAGING RISK IN THE GLOBAL
BUSINESS ENVIRONMENT
Regulatory reform and increased enforcement activity may ultimately protect the international
business community and be of benefit to the greater environment, but they also increase the
pressure on businesses through increased workload and cost.
Regulatory change is now a constant feature, creating a compliance challenge particularly for
regulated companies. There is heightened awareness of the risk that may be hiding in business
relationships – individuals involved in organised crime such as money laundering and terrorist
financing have become increasingly sophisticated. Association with a high risk entity or individual,
whether or not intentional, will expose your organisation to the risk of regulatory censure. This
in turn leads to irreparable reputation and brand damage that is often more devastating than
breaching compliance legislation.
As organisations endeavour to keep up with the pace of reform, compliance programmes tend to
become disjointed and burdensome, adding significantly to the cost of compliance in both time
and money. The ability to move fast is essential for your organisation to succeed.
Thomson Reuters Accelus offers a cost-effective, comprehensive and flexible financial crime and
reputation risk suite that helps to manage regulatory obligations, improve business efficiency and
safeguard reputation.
Thomson Reuters Accelus 5
Financial Crime and Reputation Risk
“World-Check
has provided
comprehensive,
consolidated
information
that helps our
organisation
to address
regulatory,
compliance,
reputation
and business
requirements.
It has
provided much
information
on high risk
individuals and
entities, KYC
and customers
due diligence
solutions.”
Senior Assistant Manager,
Central Bank of the Bahamas
A COHESIVE APPROACH TO FINANCIAL CRIME PREVENTION
Our financial crime and reputational risk suite combines World-Check highly structured
intelligence data with sophisticated matching technology and advanced software to create a
powerful, comprehensive approach to screening.
World-Check Intelligence
Effective risk screening relies on the best available intelligence. It is our global infrastructure
coupled to the skill of our research analysis that is key to the value of our intelligence.
Raw data is gathered by research analysts supported by specialised software and is processed
through rigorous quality control. Intelligence is carefully collated and checked for duplication.
It is the use of reasearch analysts that enables us to make further connections between subjects
and other business or family relationships, uncover suspected terror networks and highlight
the relevance of the intelligence offered. Software alone cannot offer this level of research
sophistication because people can identify relationships that software overlooks.
The structure of our intelligence when combined with our powerful software, increases accuracy,
minimises errors and false positives, ensuring a screening solution that is a cost-effective choice
for fast and reliable results.
There are greater risks than PEPs – 48% of our intelligence is made up of non-PEP information,
supporting an effective risk-based approach that goes beyond PEP screening.
Terrorism and insurgency research – Less than 3% of our terrorism coverage is derived from
official watchlists, showing the strength of our methodology. Clients benefit from tens of thou-
sands of records that reveal suspected human terror networks.
6 GOVERNANCE, RISK AND COMPLIANCE
49 of the
world’s top
50 banks and
55 of Fortune
100 companies
rely on
World-Check
intelligence.
Advanced Software
Our sophisticated matching engine analyses the structure of a name and performs an intelligent
comparison using advanced linguistic algorithms. By performing these “intelligent” comparisons,
the engine helps overcome common name-matching issues which increases accuracy and drives
down false positives. The engine is particularly powerful in common scenarios such as:
• Same name written in multiple languages
• Phonetic spelling differences
• Nicknames
• Inclusion of initials
• Missing name components
• Out-of-order name components
The matching engine also features non-Latin character support in Arabic, Chinese (Simplified
or Traditional), Japanese, Korean, Pashto, Persian (Farsi/Dari), Russian, and Urdu. This powerful
functionality allows the software to translate names accurately to and from English.
This advanced technology has led to a 10%+ increase in match result processing and a 20%+
reduction in false positives*.
*Results based on internal test of 2,000 entities (1,000 individuals and 1,000 organisations)
Improved efficiency and automation
Our software helps to improve efficiency while supporting internal processes.
• Automated ongoing screening – users can enter a name to be screened and save it for ongo-
ing monitoring. The name will then automatically be screened overnight, every night, with an
email alert keeping users informed of any new matches that require attention.
• Multi-user workflow – enables a structured approach with specific teams, individuals and
escalation paths to share the task of handling exceptions generated by the system.
• Management reporting – provides quick and effective summaries of the overall screening
process.
• Case management – rapidly creates and compiles cases on suspicious transactions for disclo-
sure in Suspicious Activity Reports (SARs).
“…an invalu-
able tool
in the fight
against money
laundering
and crime in
general.”
HSBC
Financial Crime and Reputation Risk
SAMPLE
PHOTO
Thomson Reuters Accelus 7
Financial Crime and Reputation Risk
THE THOMSON REUTERS DIFFERENCE
Historically, organisations have resorted to
using multiple technologies, data vendors
and training providers, together with in-
house solutions to ensure compliance with
AML, KYC, CFT and PEP regulations. This
approach results in duplicated effort and
serves to reinforce divisional structures that
do not share or cross-reference vital customer
information. With the Thomson Reuters
Accelus suite of solutions, a firm can take a
truly comprehensive approach to regulatory
compliance and reputation management,
improving the efficiency of business operations
significantly.
Additional services in the solution suite include:
Regulatory Training
Regulatory bodies across the globe require
firms to conduct regular AML training that
must be reviewed on a regular and frequent
basis. Developed by our in-house compliance
and training experts, our range of financial
crime e-learning courses covers core
compliance topics that help organisations
in highly regulated industries manage their
reputational and regulatory risk.
Our learning management system (LMS)
allows firms to:
• Assign courses
• Track progress
• Capture results
• Demonstrate compliance
Transaction Monitoring
TransWatch offers powerful detection,
inspection and resolution tools for transaction
monitoring. It takes a scenario-driven, risk-
based approach to the challenges presented
by money laundering, fraud and market abuse.
In addition, it is an effective tool in market
surveillance where hundreds of thousands of
transactions must be processed every day.
The extensive, yet flexible data model is
designed to minimise integration costs, whilst
maintaining adaptability. More than 100 pre-
built, parameter-driven detection scenarios
are provided as standard. This ensures that
the solution can be implemented quickly,
while remaining flexible to current and future
legislative requirements.
“…a valuable
addition to my
daily work as
a Compliance
Officer, in a
world where
requirements
are getting
more stringent
by the day and
risks are high-
er every day.”
Manager Compliance,
RBTT Bank NV
For more information,
contact your representative
or visit us online.
Visit accelus.thomsonreuters.com
© 2011 Thomson Reuters  L-369534/10-11
Thomson Reuters Accelus solutions provide powerful tools and information
that enable actionable insight, dynamic connections, and informed choices
to drive business performance. Thomson Reuters Accelus products combine
market-leading solutions from names you already know and trust, including
Complinet, Paisley®, Oden®, Westlaw® Business, West’s Capitol Watch®,
Westlaw Compliance Advisor®, and World-Check.

Weitere ähnliche Inhalte

Was ist angesagt?

HSN Risk Assessment Report
HSN Risk Assessment ReportHSN Risk Assessment Report
HSN Risk Assessment ReportBelinda Edwards
 
How a Top Health Insurer Manages Hundreds of Incidents Every Quarter
How a Top Health Insurer Manages Hundreds of Incidents Every QuarterHow a Top Health Insurer Manages Hundreds of Incidents Every Quarter
How a Top Health Insurer Manages Hundreds of Incidents Every QuarterElizabeth Dimit
 
PracticeLeague Risk Management Platform
PracticeLeague Risk Management PlatformPracticeLeague Risk Management Platform
PracticeLeague Risk Management PlatformParimal Chanchani
 
Tackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-managementTackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-managementCharles Steve
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainSanjay Chadha, CPA, CA
 
INITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTES
INITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTESINITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTES
INITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTESMay Martinsen
 
ERM v GRC: An Introduction
ERM v GRC: An IntroductionERM v GRC: An Introduction
ERM v GRC: An Introductions0P5a41b
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyNICSA
 
Third Party Due Diligence - Case Study Discussion
Third Party Due Diligence - Case Study DiscussionThird Party Due Diligence - Case Study Discussion
Third Party Due Diligence - Case Study DiscussionSam Gibbins 紀俊森
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Kim Jensen
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyScalar Decisions
 
Fiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochureFiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochurePaul Stabile
 
Forrester GRC Q1 2016 Report
Forrester GRC Q1 2016 ReportForrester GRC Q1 2016 Report
Forrester GRC Q1 2016 ReportDaryl Resnick
 
Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.Universidad Cenfotec
 
Presentation: Compliance & Third Party Due Diligence
Presentation: Compliance & Third Party Due DiligencePresentation: Compliance & Third Party Due Diligence
Presentation: Compliance & Third Party Due DiligenceethiXbase
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performanceAbhishek Sood
 

Was ist angesagt? (20)

HSN Risk Assessment Report
HSN Risk Assessment ReportHSN Risk Assessment Report
HSN Risk Assessment Report
 
Websense
WebsenseWebsense
Websense
 
What is WebSense?
What is WebSense?What is WebSense?
What is WebSense?
 
How a Top Health Insurer Manages Hundreds of Incidents Every Quarter
How a Top Health Insurer Manages Hundreds of Incidents Every QuarterHow a Top Health Insurer Manages Hundreds of Incidents Every Quarter
How a Top Health Insurer Manages Hundreds of Incidents Every Quarter
 
PracticeLeague Risk Management Platform
PracticeLeague Risk Management PlatformPracticeLeague Risk Management Platform
PracticeLeague Risk Management Platform
 
Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016
 
Tackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-managementTackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-management
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
 
INITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTES
INITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTESINITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTES
INITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTES
 
ERM v GRC: An Introduction
ERM v GRC: An IntroductionERM v GRC: An Introduction
ERM v GRC: An Introduction
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a Strategy
 
Third Party Due Diligence - Case Study Discussion
Third Party Due Diligence - Case Study DiscussionThird Party Due Diligence - Case Study Discussion
Third Party Due Diligence - Case Study Discussion
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
Fiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochureFiserv FCRM Platform Brochure
Fiserv FCRM Platform Brochure
 
Intro to IT Auditing
Intro to IT AuditingIntro to IT Auditing
Intro to IT Auditing
 
Forrester GRC Q1 2016 Report
Forrester GRC Q1 2016 ReportForrester GRC Q1 2016 Report
Forrester GRC Q1 2016 Report
 
Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.
 
Presentation: Compliance & Third Party Due Diligence
Presentation: Compliance & Third Party Due DiligencePresentation: Compliance & Third Party Due Diligence
Presentation: Compliance & Third Party Due Diligence
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performance
 

Andere mochten auch

Upworthy: 10 Ways To Win The Internets
Upworthy: 10 Ways To Win The InternetsUpworthy: 10 Ways To Win The Internets
Upworthy: 10 Ways To Win The InternetsUpworthy
 
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)Board of Innovation
 
Five Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same SlideFive Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same SlideCrispy Presentations
 
The Seven Deadly Social Media Sins
The Seven Deadly Social Media SinsThe Seven Deadly Social Media Sins
The Seven Deadly Social Media SinsXPLAIN
 
How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)Steven Hoober
 
What 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From FailureWhat 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From FailureReferralCandy
 
The History of SEO
The History of SEOThe History of SEO
The History of SEOHubSpot
 
How To (Really) Get Into Marketing
How To (Really) Get Into MarketingHow To (Really) Get Into Marketing
How To (Really) Get Into MarketingEd Fry
 
The What If Technique presented by Motivate Design
The What If Technique presented by Motivate DesignThe What If Technique presented by Motivate Design
The What If Technique presented by Motivate DesignMotivate Design
 
Why Content Marketing Fails
Why Content Marketing FailsWhy Content Marketing Fails
Why Content Marketing FailsRand Fishkin
 
10 Powerful Body Language Tips for your next Presentation
10 Powerful Body Language Tips for your next Presentation10 Powerful Body Language Tips for your next Presentation
10 Powerful Body Language Tips for your next PresentationSOAP Presentations
 
What Would Steve Do? 10 Lessons from the World's Most Captivating Presenters
What Would Steve Do? 10 Lessons from the World's Most Captivating PresentersWhat Would Steve Do? 10 Lessons from the World's Most Captivating Presenters
What Would Steve Do? 10 Lessons from the World's Most Captivating PresentersHubSpot
 
Digital Strategy 101
Digital Strategy 101Digital Strategy 101
Digital Strategy 101Bud Caddell
 
Crap. The Content Marketing Deluge.
Crap. The Content Marketing Deluge.Crap. The Content Marketing Deluge.
Crap. The Content Marketing Deluge.Velocity Partners
 
The Search for Meaning in B2B Marketing
The Search for Meaning in B2B MarketingThe Search for Meaning in B2B Marketing
The Search for Meaning in B2B MarketingVelocity Partners
 

Andere mochten auch (19)

The Minimum Loveable Product
The Minimum Loveable ProductThe Minimum Loveable Product
The Minimum Loveable Product
 
Upworthy: 10 Ways To Win The Internets
Upworthy: 10 Ways To Win The InternetsUpworthy: 10 Ways To Win The Internets
Upworthy: 10 Ways To Win The Internets
 
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
 
Five Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same SlideFive Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same Slide
 
Displaying Data
Displaying DataDisplaying Data
Displaying Data
 
The Seven Deadly Social Media Sins
The Seven Deadly Social Media SinsThe Seven Deadly Social Media Sins
The Seven Deadly Social Media Sins
 
How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)
 
What 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From FailureWhat 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From Failure
 
The History of SEO
The History of SEOThe History of SEO
The History of SEO
 
How To (Really) Get Into Marketing
How To (Really) Get Into MarketingHow To (Really) Get Into Marketing
How To (Really) Get Into Marketing
 
The What If Technique presented by Motivate Design
The What If Technique presented by Motivate DesignThe What If Technique presented by Motivate Design
The What If Technique presented by Motivate Design
 
Why Content Marketing Fails
Why Content Marketing FailsWhy Content Marketing Fails
Why Content Marketing Fails
 
Design Your Career 2018
Design Your Career 2018Design Your Career 2018
Design Your Career 2018
 
10 Powerful Body Language Tips for your next Presentation
10 Powerful Body Language Tips for your next Presentation10 Powerful Body Language Tips for your next Presentation
10 Powerful Body Language Tips for your next Presentation
 
What Would Steve Do? 10 Lessons from the World's Most Captivating Presenters
What Would Steve Do? 10 Lessons from the World's Most Captivating PresentersWhat Would Steve Do? 10 Lessons from the World's Most Captivating Presenters
What Would Steve Do? 10 Lessons from the World's Most Captivating Presenters
 
Digital Strategy 101
Digital Strategy 101Digital Strategy 101
Digital Strategy 101
 
Crap. The Content Marketing Deluge.
Crap. The Content Marketing Deluge.Crap. The Content Marketing Deluge.
Crap. The Content Marketing Deluge.
 
The Search for Meaning in B2B Marketing
The Search for Meaning in B2B MarketingThe Search for Meaning in B2B Marketing
The Search for Meaning in B2B Marketing
 
How Google Works
How Google WorksHow Google Works
How Google Works
 

Ähnlich wie Screening Online powered by World-Check

LEXForensica (003)
LEXForensica (003)LEXForensica (003)
LEXForensica (003)Johan Nel
 
Compliance & data security – the way we work
Compliance & data security – the way we workCompliance & data security – the way we work
Compliance & data security – the way we workPuneet Chopra
 
Waystone Compliance - Global Product Suite 2023.pdf
Waystone Compliance - Global Product Suite 2023.pdfWaystone Compliance - Global Product Suite 2023.pdf
Waystone Compliance - Global Product Suite 2023.pdfJonathan White
 
Fraud, bribery and corruption: Protecting reputation and value
Fraud, bribery and corruption: Protecting reputation and valueFraud, bribery and corruption: Protecting reputation and value
Fraud, bribery and corruption: Protecting reputation and valueDavid Graham
 
White Paper: A summary of the FSA thematic review
White Paper: A summary of the FSA thematic reviewWhite Paper: A summary of the FSA thematic review
White Paper: A summary of the FSA thematic reviewLexisNexis Benelux
 
NQA - Information security best practice guide
NQA - Information security best practice guideNQA - Information security best practice guide
NQA - Information security best practice guideNA Putra
 
Top 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptxTop 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptxinfosec train
 
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment QuestionnairesThird-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment QuestionnairesCorporater
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisionsAlireza Ghahrood
 
Vetting Solutions Brochure
Vetting Solutions BrochureVetting Solutions Brochure
Vetting Solutions BrochureRyan Jones-Ralph
 
Vetting Solutions Brochure (1)
Vetting Solutions Brochure (1)Vetting Solutions Brochure (1)
Vetting Solutions Brochure (1)Matt Mealey
 
Fraud Risk Management | Fraud Risk Assessment - EY India
Fraud Risk Management | Fraud Risk Assessment - EY IndiaFraud Risk Management | Fraud Risk Assessment - EY India
Fraud Risk Management | Fraud Risk Assessment - EY IndiaNishantSisodiya
 
Fraud Risk Management - Are Your Doing Enough - EY India
Fraud Risk Management - Are Your Doing Enough - EY IndiaFraud Risk Management - Are Your Doing Enough - EY India
Fraud Risk Management - Are Your Doing Enough - EY Indiasathish kriishnan
 
Fraud Risk Management - Are Your Doing Enough - EY India
Fraud Risk Management - Are Your Doing Enough - EY IndiaFraud Risk Management - Are Your Doing Enough - EY India
Fraud Risk Management - Are Your Doing Enough - EY IndiaSadanandGahivare
 
Fraud Risk Management | Fraud Risk Assessment - EY India
Fraud Risk Management | Fraud Risk Assessment - EY IndiaFraud Risk Management | Fraud Risk Assessment - EY India
Fraud Risk Management | Fraud Risk Assessment - EY IndiaErnst & Young
 
StratexSystems_270115
StratexSystems_270115StratexSystems_270115
StratexSystems_270115Andrew Smart
 
ICFE Fraud Risk Management Programme Infosheet
ICFE Fraud Risk Management Programme InfosheetICFE Fraud Risk Management Programme Infosheet
ICFE Fraud Risk Management Programme InfosheetICFE Group of Companies
 

Ähnlich wie Screening Online powered by World-Check (20)

LEXForensica (003)
LEXForensica (003)LEXForensica (003)
LEXForensica (003)
 
Compliance & data security – the way we work
Compliance & data security – the way we workCompliance & data security – the way we work
Compliance & data security – the way we work
 
Waystone Compliance - Global Product Suite 2023.pdf
Waystone Compliance - Global Product Suite 2023.pdfWaystone Compliance - Global Product Suite 2023.pdf
Waystone Compliance - Global Product Suite 2023.pdf
 
Fraud, bribery and corruption: Protecting reputation and value
Fraud, bribery and corruption: Protecting reputation and valueFraud, bribery and corruption: Protecting reputation and value
Fraud, bribery and corruption: Protecting reputation and value
 
White Paper: A summary of the FSA thematic review
White Paper: A summary of the FSA thematic reviewWhite Paper: A summary of the FSA thematic review
White Paper: A summary of the FSA thematic review
 
NQA - Information security best practice guide
NQA - Information security best practice guideNQA - Information security best practice guide
NQA - Information security best practice guide
 
Top 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptxTop 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptx
 
Compliance risk management planning 2017-02-mattoon
Compliance risk management planning 2017-02-mattoonCompliance risk management planning 2017-02-mattoon
Compliance risk management planning 2017-02-mattoon
 
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment QuestionnairesThird-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
 
Risk_Technology
Risk_TechnologyRisk_Technology
Risk_Technology
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisions
 
Vetting Solutions Brochure
Vetting Solutions BrochureVetting Solutions Brochure
Vetting Solutions Brochure
 
Vetting Solutions Brochure (1)
Vetting Solutions Brochure (1)Vetting Solutions Brochure (1)
Vetting Solutions Brochure (1)
 
Fraud Risk Management | Fraud Risk Assessment - EY India
Fraud Risk Management | Fraud Risk Assessment - EY IndiaFraud Risk Management | Fraud Risk Assessment - EY India
Fraud Risk Management | Fraud Risk Assessment - EY India
 
Fraud Risk Management - Are Your Doing Enough - EY India
Fraud Risk Management - Are Your Doing Enough - EY IndiaFraud Risk Management - Are Your Doing Enough - EY India
Fraud Risk Management - Are Your Doing Enough - EY India
 
Fraud Risk Management - Are Your Doing Enough - EY India
Fraud Risk Management - Are Your Doing Enough - EY IndiaFraud Risk Management - Are Your Doing Enough - EY India
Fraud Risk Management - Are Your Doing Enough - EY India
 
Fraud Risk Management | Fraud Risk Assessment - EY India
Fraud Risk Management | Fraud Risk Assessment - EY IndiaFraud Risk Management | Fraud Risk Assessment - EY India
Fraud Risk Management | Fraud Risk Assessment - EY India
 
ESS Overview
ESS OverviewESS Overview
ESS Overview
 
StratexSystems_270115
StratexSystems_270115StratexSystems_270115
StratexSystems_270115
 
ICFE Fraud Risk Management Programme Infosheet
ICFE Fraud Risk Management Programme InfosheetICFE Fraud Risk Management Programme Infosheet
ICFE Fraud Risk Management Programme Infosheet
 

Screening Online powered by World-Check

  • 1. THOMSON REUTERS ACCELUS™ Financial Crime and Reputation Risk
  • 2. THOMSON REUTERS ACCELUS™ Our solutions dynamically connect business transactions, strategy, and operations to the ever-changing regulatory environment, providing highly regulated firms with informed outcomes. Our client groups include compliance, audit, legal and risk functions within the organisation. We partner with firms to manage their risk exposure and accelerate their business at every step.
  • 3. Thomson Reuters Accelus 3 Financial Crime and Reputation Risk In 2010 Thomson Reuters tracked more than 10,000 financial services regulatory changes across the globe. INTRODUCING THE FIRST TRULY COMPREHENSIVE FINANCIAL CRIME PREVENTION SOLUTION Thomson Reuters AccelusTM provides effective financial crime solutions that combine advanced software with World-Check’s comprehensive and highly structured intelligence on Politically Exposed People (PEPs) and heightened risk individuals and entities. Thousands of organisations around the world use our screening solutions to meet their Anti Money Laundering (AML), Know Your Customer (KYC), Countering the Financing of Terrorism (CFT) and PEP obligations, to find hidden risk in their relationships and to safeguard their reputation. Organisations that partner with Thomson Reuters Accelus can rely on our legacy of successful implementation and service. We work with firms and their advisors to: • Effectively manage regulatory, reputational and financial risk • Offer auditable proof of due diligence • Comply with global legislation including AML, KYC, CFT and PEP monitoring • Ensure people are who they say they are • Track market developments and regional enforcement action • Process clients faster and more efficiently than the competition • Provide targeted and effective due diligence on supply chains and third party agents • Train employees and suppliers on their AML and due diligence obligations • Perform ongoing transaction monitoring of clients for AML and fraud prevention • Integrate our data into existing systems and technology infrastructure
  • 4. 4 GOVERNANCE, RISK AND COMPLIANCE Financial Crime and Reputation Risk “The biggest problem is false positives – this creates most of the work. Much of my time is spent doing due diligence on an alert and noting why it should be cleared.” CCO, Global Bank MANAGING RISK IN THE GLOBAL BUSINESS ENVIRONMENT Regulatory reform and increased enforcement activity may ultimately protect the international business community and be of benefit to the greater environment, but they also increase the pressure on businesses through increased workload and cost. Regulatory change is now a constant feature, creating a compliance challenge particularly for regulated companies. There is heightened awareness of the risk that may be hiding in business relationships – individuals involved in organised crime such as money laundering and terrorist financing have become increasingly sophisticated. Association with a high risk entity or individual, whether or not intentional, will expose your organisation to the risk of regulatory censure. This in turn leads to irreparable reputation and brand damage that is often more devastating than breaching compliance legislation. As organisations endeavour to keep up with the pace of reform, compliance programmes tend to become disjointed and burdensome, adding significantly to the cost of compliance in both time and money. The ability to move fast is essential for your organisation to succeed. Thomson Reuters Accelus offers a cost-effective, comprehensive and flexible financial crime and reputation risk suite that helps to manage regulatory obligations, improve business efficiency and safeguard reputation.
  • 5. Thomson Reuters Accelus 5 Financial Crime and Reputation Risk “World-Check has provided comprehensive, consolidated information that helps our organisation to address regulatory, compliance, reputation and business requirements. It has provided much information on high risk individuals and entities, KYC and customers due diligence solutions.” Senior Assistant Manager, Central Bank of the Bahamas A COHESIVE APPROACH TO FINANCIAL CRIME PREVENTION Our financial crime and reputational risk suite combines World-Check highly structured intelligence data with sophisticated matching technology and advanced software to create a powerful, comprehensive approach to screening. World-Check Intelligence Effective risk screening relies on the best available intelligence. It is our global infrastructure coupled to the skill of our research analysis that is key to the value of our intelligence. Raw data is gathered by research analysts supported by specialised software and is processed through rigorous quality control. Intelligence is carefully collated and checked for duplication. It is the use of reasearch analysts that enables us to make further connections between subjects and other business or family relationships, uncover suspected terror networks and highlight the relevance of the intelligence offered. Software alone cannot offer this level of research sophistication because people can identify relationships that software overlooks. The structure of our intelligence when combined with our powerful software, increases accuracy, minimises errors and false positives, ensuring a screening solution that is a cost-effective choice for fast and reliable results. There are greater risks than PEPs – 48% of our intelligence is made up of non-PEP information, supporting an effective risk-based approach that goes beyond PEP screening. Terrorism and insurgency research – Less than 3% of our terrorism coverage is derived from official watchlists, showing the strength of our methodology. Clients benefit from tens of thou- sands of records that reveal suspected human terror networks.
  • 6. 6 GOVERNANCE, RISK AND COMPLIANCE 49 of the world’s top 50 banks and 55 of Fortune 100 companies rely on World-Check intelligence. Advanced Software Our sophisticated matching engine analyses the structure of a name and performs an intelligent comparison using advanced linguistic algorithms. By performing these “intelligent” comparisons, the engine helps overcome common name-matching issues which increases accuracy and drives down false positives. The engine is particularly powerful in common scenarios such as: • Same name written in multiple languages • Phonetic spelling differences • Nicknames • Inclusion of initials • Missing name components • Out-of-order name components The matching engine also features non-Latin character support in Arabic, Chinese (Simplified or Traditional), Japanese, Korean, Pashto, Persian (Farsi/Dari), Russian, and Urdu. This powerful functionality allows the software to translate names accurately to and from English. This advanced technology has led to a 10%+ increase in match result processing and a 20%+ reduction in false positives*. *Results based on internal test of 2,000 entities (1,000 individuals and 1,000 organisations) Improved efficiency and automation Our software helps to improve efficiency while supporting internal processes. • Automated ongoing screening – users can enter a name to be screened and save it for ongo- ing monitoring. The name will then automatically be screened overnight, every night, with an email alert keeping users informed of any new matches that require attention. • Multi-user workflow – enables a structured approach with specific teams, individuals and escalation paths to share the task of handling exceptions generated by the system. • Management reporting – provides quick and effective summaries of the overall screening process. • Case management – rapidly creates and compiles cases on suspicious transactions for disclo- sure in Suspicious Activity Reports (SARs). “…an invalu- able tool in the fight against money laundering and crime in general.” HSBC Financial Crime and Reputation Risk SAMPLE PHOTO
  • 7. Thomson Reuters Accelus 7 Financial Crime and Reputation Risk THE THOMSON REUTERS DIFFERENCE Historically, organisations have resorted to using multiple technologies, data vendors and training providers, together with in- house solutions to ensure compliance with AML, KYC, CFT and PEP regulations. This approach results in duplicated effort and serves to reinforce divisional structures that do not share or cross-reference vital customer information. With the Thomson Reuters Accelus suite of solutions, a firm can take a truly comprehensive approach to regulatory compliance and reputation management, improving the efficiency of business operations significantly. Additional services in the solution suite include: Regulatory Training Regulatory bodies across the globe require firms to conduct regular AML training that must be reviewed on a regular and frequent basis. Developed by our in-house compliance and training experts, our range of financial crime e-learning courses covers core compliance topics that help organisations in highly regulated industries manage their reputational and regulatory risk. Our learning management system (LMS) allows firms to: • Assign courses • Track progress • Capture results • Demonstrate compliance Transaction Monitoring TransWatch offers powerful detection, inspection and resolution tools for transaction monitoring. It takes a scenario-driven, risk- based approach to the challenges presented by money laundering, fraud and market abuse. In addition, it is an effective tool in market surveillance where hundreds of thousands of transactions must be processed every day. The extensive, yet flexible data model is designed to minimise integration costs, whilst maintaining adaptability. More than 100 pre- built, parameter-driven detection scenarios are provided as standard. This ensures that the solution can be implemented quickly, while remaining flexible to current and future legislative requirements. “…a valuable addition to my daily work as a Compliance Officer, in a world where requirements are getting more stringent by the day and risks are high- er every day.” Manager Compliance, RBTT Bank NV
  • 8. For more information, contact your representative or visit us online. Visit accelus.thomsonreuters.com © 2011 Thomson Reuters  L-369534/10-11 Thomson Reuters Accelus solutions provide powerful tools and information that enable actionable insight, dynamic connections, and informed choices to drive business performance. Thomson Reuters Accelus products combine market-leading solutions from names you already know and trust, including Complinet, Paisley®, Oden®, Westlaw® Business, West’s Capitol Watch®, Westlaw Compliance Advisor®, and World-Check.