Full AML-CFT-Handbook-Clean September 2019
Total Page:16
File Type:pdf, Size:1020Kb
ANTI-MONEY LAUNDERING AND COUNTERING THE FINANCING OF TERRORISM HANDBOOK October November 2019 Whilst this publication has been prepared by the Financial Services Authority, it is not a legal document and should not be relied upon in respect of points of law. Reference for that purpose should be made to the appropriate statutory provisions. Please note this Handbook has not yet been updated to reflect the introduction of the AML/CFT Code 2019. Please see any relevant stand- alone guidance for the interim period while this update takes place. Contact: AML Unit, Enforcement Division Financial Services Authority PO Box 58, Finch Hill House, Bucks Road, Douglas Isle of Man IM99 1DT Tel: 01624 646000 Fax: 01624 646001 Website: www.iomfsa.im Email: [email protected] AML/CFT Handbook Part 1 Introductory Part 1 – Introductory 9 1.1 Foreword ........................................................................................................ 9 1.2 Status of Guidance ........................................................................................ 10 1.3 Purpose of the Handbook .............................................................................. 11 1.4 Failure to Comply with the AML/CFT Code ................................................... 11 1.5 FATF Recommendations .............................................................................. 12 1.6 Compliance Culture ....................................................................................... 12 1.7 Risk Based Approach .................................................................................... 15 1.7.1 What is risk? ........................................................................................ 15 1.7.2 What is mitigation? .............................................................................. 16 1.8 Assessing Compliance with a Risk Based Approach ..................................... 16 Part 2 – General Requirements 17 2.1 General Requirements ................................................................................... 17 Part 3 – Risk Assessment and Ongoing Monitoring 19 3.1 Business Risk Assessment ............................................................................ 19 3.1.1 The nature, scale and complexity of its activities ................................ 20 3.1.2 Its customers, products and services .................................................. 21 3.1.3 The manner in which it provides these products and services to its customers ..................................................................... 21 3.1.4 The reliance which is placed on any third parties for elements of the CDD collected ............................................................ 22 3.2 Technological Developments Risk Assessment ............................................ 22 3.2.1 Operational risks ................................................................................. 23 3.2.2 Reputational risks ................................................................................ 23 3.2.3 Legal risks ........................................................................................... 23 3.3 Customer Risk Assessment .......................................................................... 24 3.3A Introduced Business ...................................................................................... 27 3.3A.1 Broadened Customer Risk Assessment requirements ........................ 27 3.3.1 Lower risk ............................................................................................ 34 3.3.2 The business risk assessment ............................................................ 35 3.3.3 The nature, scale, complexity and location of the customer’s activities .............................................................................................. 35 3.3.4 The type of customers, products and services .................................... 35 3.3.5 The reliance which is placed on any third parties for elements of the CDD collected ............................................................ 37 3.3.6 Whether the relevant person and the customer have met ................... 37 3.4 Ongoing Monitoring ...................................................................................... 37 3.4.1 Transaction monitoring ........................................................................ 38 3.4.2 Due diligence monitoring ..................................................................... 39 3.4.3 Customer screening ............................................................................ 40 3.4.4 Frequency of ongoing monitoring ........................................................ 41 3.4.5 Considering unreasonable customer instructions ................................ 42 3.4.6 Handling cash transactions ................................................................. 42 2 AML/CFT Handbook Part 1 Introductory 3.5 Jurisdiction Lists ........................................................................................... 43 Part 4 – Customer Due Diligence 45 4.1 Introduction ................................................................................................... 46 4.1.1 Definitions ........................................................................................... 46 4.1.2 Background to CDD ............................................................................ 47 4.2 Key Principles of CDD ................................................................................... 48 4.3 Code Requirements ....................................................................................... 49 4.3.1 Minimum standards table .................................................................... 50 4.3.2 New business relationships and occasional transactions .............................. 52 4.3.3 Continuing business relationships ................................................................. 52 4.3.4 Beneficial ownership and control ................................................................... 53 4.3.5 Enhanced due diligence ................................................................................ 58 4.4 Timing of ID&V and Failure to Complete ID&V .............................................. 59 4.4.1 Timing in relation to continuing business relationships .................................. 60 4.5 How to “Identify” ............................................................................................. 61 4.5.1 Natural persons ................................................................................... 61 4.5.2 Legal persons ...................................................................................... 62 4.5.3 Legal arrangements ............................................................................ 62 4.6 What to “Verify” .............................................................................................. 62 4.6.1 Natural persons ................................................................................... 63 4.6.2 Legal persons ...................................................................................... 63 4.6.3 Legal arrangements ............................................................................ 63 4.6.4 ID&V requirements for multiple signatories/directors .......................... 64 4.6.5 ID&V requirements for multiple 3rd parties ........................................... 65 4.6.6 ID&V requirements for clubs and associations .................................... 65 4.7 Methods to Verify: Natural Persons ............................................................... 66 4.7.1 Acceptable methods to verify identity .................................................. 67 4.7.2 Acceptable methods to verify address ................................................ 68 4.7.2.1 Change of address ................................................................ 68 4.8 Methods to Verify: Legal Persons .................................................................. 71 4.9 Methods to Verify: Legal Arrangements ......................................................... 73 4.10 Certification of Hard Copy Documents ........................................................... 74 4.11 Use of Electronic Documents......................................................................... 75 4.12 Independent Electronic Data Sources ........................................................... 76 4.13 Purpose and Intended Nature of Business Relationship ................................ 76 4.14 Source of Funds & Source of Wealth ............................................................ 77 4.15 Bearer Shares................................................................................................ 78 4.16 Politically Exposed Persons (PEPs) .............................................................. 78 4.16.1 PEP risk .............................................................................................. 78 4.16.2 PEP definitions .................................................................................... 79 4.16.3 PEP requirements …………………………………………………………81 4.16.4 Identifying PEPs ……………………………………………………………82 4.16.5 Identifying PEP risk ………………………………………………………..83 4.16.6 ‘Once a PEP, always a PEP’? ........................................................... .84 3 AML/CFT Handbook Part 1 Introductory Part 5 – Specified Non-profit Organisations 87 5.1 What is a Specified Non-Profit Organisation? ................................................ 87 5.2 Code Requirements ......................................................................................