Introductory BSA/AML Examiner School, Providence, RI

Suspicious Activity Monitoring

1. Identification of Unusual Activity Procedure: Surveillance (Automated) Monitoring • What types of customers, products and services are included within the monitoring system? Is this appropriate? • Identify the system’s methodology for establishing and applying expected activity or profile filtering criteria and for generating monitoring reports. Determine if the systems filtering criteria are reasonable. • Is the system independently verified for accuracy? • Are controls in place that limit access to the monitoring system and sufficient oversight of assumption changes?

Suspicious Activity Monitoring 2. Managing Alerts Procedures:

• Determine whether management has policies, procedures, and processes to ensure the timely generation of, review of, and response to reports used to identify unusual activities. • Determine whether management’s policies, procedures, and processes require appropriate research when monitoring reports identify unusual activity. • Evaluate management’s policies, procedures, and processes for referring unusual activity from all business lines to the personnel or department responsible for evaluating unusual activity. The process should ensure that all applicable information is effectively evaluated. (Subpoenas, 314(a), NSLs)

Made with FlippingBook - professional solution for displaying marketing and sales documents online