HOUSE_OVERSIGHT_024131.jpg

2.32 MB

Extraction Summary

0
People
3
Organizations
0
Locations
0
Events
0
Relationships
2
Quotes

Document Information

Type: Compliance manual / consultant report / government investigation exhibit
File Size: 2.32 MB
Summary

This document appears to be page 25 of a compliance manual or guide produced by the consulting firm Protiviti. It outlines the key components of an Anti-Money Laundering (AML) program, including risk assessments, customer acceptance (KYC), suspicious activity monitoring (SARs), and sanctions programs (OFAC). It also details how technology can support these AML functions, such as calculating risk ratings and searching against high-risk lists (PEPs). The document bears a 'HOUSE_OVERSIGHT' Bates stamp, indicating it was produced as evidence in a congressional investigation, likely related to financial institutions involved with Jeffrey Epstein, though Epstein is not named on this specific page.

Organizations (3)

Name Type Context
Protiviti
Logo appears in footer; likely the author of the compliance guidelines.
House Oversight Committee
Bates stamp 'HOUSE_OVERSIGHT_024131' indicates this document was produced for a House Oversight investigation.
Office of Foreign Assets Control
Referenced in relation to Sanctions Programs and searching special lists.

Key Quotes (2)

"35. How can technology be used to support a financial institution's AML program?"
Source
HOUSE_OVERSIGHT_024131.jpg
Quote #1
"It is important to note that not all types of financial institutions are required to have each of the key components listed above."
Source
HOUSE_OVERSIGHT_024131.jpg
Quote #2

Full Extracted Text

Complete text extracted from the document (3,957 characters)

• Designated Compliance Officer – For further guidance, please refer to the Designation of AML Compliance Officer and the AML Compliance Organization section.
• Risk Assessments – For further guidance, please refer to the Enterprise-wide Risk Assessment, Business Line Risk Assessment, Customer Risk Assessment and OFAC Risk Assessment sections.
• Customer Acceptance and Maintenance Program – For further guidance, please refer to the Know Your Customer, Due Diligence and Enhanced Due Diligence, Section 326 – Verification of Identification, Section 312 – Special Due Diligence for Correspondent Accounts and Private Banking Accounts and High Risk Customers sections.
• Large Currency Monitoring and Currency Transaction Report Filing Program – For further guidance, please refer to the Currency Transaction Reports section.
• Monitoring, Investigating and Suspicious Activity Report Filing Program – For further guidance, please refer to the Transaction Monitoring, Investigations and Red Flags and Suspicious Activity Reports sections.
• Sanctions Program – For further guidance, please refer to the Office of Foreign Assets Control section.
• Information Sharing – For further guidance, please refer to Section 314(a) – Cooperation among Financial Institutions, Regulatory Authorities and Law Enforcement Authorities, Section 314(b) Requirements – Cooperation among Financial Institutions and National Security Letters sections.
• Recordkeeping and Retention Program – For further guidance, please refer to the Funds Transfer Recordkeeping Requirement and the Travel Rule, Recordkeeping Requirements for the Purchase and Sale of Monetary Instruments, Form 8300 and Report of Foreign Bank and Financial Accounts sections.
• Independent Testing – For further guidance, please refer to the Independent Testing section.
• Training – For further guidance, please refer to the AML Training section.
• Management and Board Reporting – For further guidance, please refer to the Designation of AML Compliance Officer and the AML Compliance Organization section.
It is important to note that not all types of financial institutions are required to have each of the key components listed above. For additional guidance on the AML requirements of nonbank financial institutions, please refer to the Nonbank Financial Institutions and Nonfinancial Businesses section.
35. How can technology be used to support a financial institution's AML program?
Technology can be used, for example, to support:
• Monitoring for Suspicious Transactions and Facilitating Suspicious Activity Report Filing – For further guidance, please see the Suspicious Transaction Monitoring and Suspicious Activity Report Filing Software section.
• Monitoring for Large Currency Transactions and Facilitating Currency Transaction Report Filing – For further guidance, please see the Large Currency Transaction Monitoring and Currency Transaction Report Filing Software section.
• Verification of Customer Information (e.g., CIP) – For further guidance, please see the Customer Verification Software section.
• Storage of Customer Information (e.g., CIP, EDD) – For further guidance, please see the Customer Information Database and Customer Risk Assessment Software section.
• Calculation of Customer Risk Ratings – For further guidance, please see the Customer Information Database and Customer Risk Assessment Software section.
• Searching Against Special Lists of Prohibited and/or High-Risk Individuals/Entities (e.g., Office of Foreign Assets Control [OFAC], 314(a), Subpoenas, Media Searches, Internal "Deny" Lists, Politically Exposed Persons [PEPs]) for Customers and Transactions – For further guidance, please see the Interdiction Software and List Providers sections.
• AML Training – For further guidance, please see the Training Software section.
• Case Management – For further guidance, please see the Case Management Software section.
protiviti | 25
HOUSE_OVERSIGHT_024131

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document