5/5/2016

Bank Secrecy Act

GBA Compliance School Athens, GA

Thomas Williams, CRCM, CCBIA SVP, Senior Compliance Manager United Bank May 5, 2016

Definition of Risk

“Risk comes from not knowing what you are doing.”

-Warren Buffet

2

Background

What is Money Laundering?

3

1 5/5/2016

Background

October 1970

• Congress enacted the Currency and Foreign Transactions Reporting Act , which is now what we know as the Bank Secrecy Act. • Granted the Secretary of the Treasury authority to impose regulations on insured banks. • Required U.S. financial institutions to assist U.S. government agencies to detect and prevent money laundering.

4

Background

Money Laundering Control Act (1986)

o Established money laundering as a federal crime o Prohibited structuring transactions to evade CTR filings o Introduced civil and criminal forfeiture for BSA violations o Directed banks to establish and maintain procedures to ensure and monitor compliance with the reporting and recordkeeping requirements of the BSA

5

Background

Anti-Drug Abuse Act of 1988

o Expanded the definition of financial institution to include businesses such as car dealers and real estate closing personnel and required them to file reports on large currency transactions o Required the verification of identity of purchasers of monetary instruments over $3,000

6

2 5/5/2016

Background

Annunzio-Wylie Anti-Money Laundering Act (1992)

o Strengthened the sanctions for BSA violations o Required Suspicious Activity Reports and eliminated previously used Criminal Referral Forms o Required verification and recordkeeping for wire transfers

7

Background

Money Laundering Suppression Act (1994)

o Required banking agencies to review and enhance training, and develop anti-money laundering examination procedures o Required banking agencies to review and enhance procedures for referring cases to appropriate law enforcement agencies o Streamlined CTR exemption process o Required each Money Services Business (MSB) to be registered by an owner or controlling person of the MSB o Required every MSB to maintain a list of businesses authorized to act as agents in connection with the financial services offered by the MSB o Made operating an unregistered MSB a federal crime o Recommended that states adopt uniform laws applicable to MSBs

8

Background

Money Laundering and Financial Crimes Strategy Act (1998)

o Required banking agencies to develop anti-money laundering training for examiners o Required the Department of the Treasury and other agencies to develop a National Money Laundering Strategy o Created the High Intensity Money Laundering and Related Financial Crime Area (HIFCA) Task Forces to concentrate law enforcement efforts at the federal, state and local levels in zones where money laundering is prevalent. HIFCAs may be defined geographically or they can also be created to address money laundering in an industry sector, a financial institution, or group of financial institutions.

9

3 5/5/2016

Background

Other Major AML Laws:

• USA Patriot Act (2001) • Intelligence Reform and Terrorism Prevention Act of 2004 o Required certain financial institutions to report cross-border electronic transmittals of funds • USA Freedom Act 2015

10

Background

OFAC

• Beginnings can be traced by to early 1800s. • Officially renamed Office of Foreign Assets Control in 1962. • Administers and enforces targeted country- and regime-based sanctions programs against hostile countries such as Iran, Syria, etc. • Maintains a watchlist of well over 5,000 individuals and entities to which no U.S. person or entity can do business.

11

Background

FinCEN

• Established in 1990 as a bureau of the US Treasury. • Initial goal was to analyze data and track financial criminals. • Played a key role in establishing the joint examination manual first released by the FFIEC in 2005 • Today works closely with federal and state law enforcement authorities as BSA Administrator.

12

4 5/5/2016

Background

Purpose

• Assist in criminal , tax, and regulatory investigations. • Established requirements for recordkeeping and reporting by private individuals, banks, and other financial institutions. • Designed to help identify the source, volume, and movement of currency and other monetary instruments transported or transmitted into or out of the US.

13

Impact to Financial Institutions

FI’s must put systems in place to assist with:

• Prevention

• Detection

• Prosecution

14

Money Laundering Defined

Money Laundering

• At the time mafias in the U.S. used laundromats as fronts in order to facilitate and disguise their illegal activity. • Due to the cash intensive nature of the business, these criminals were able to easily avoid taxation as well as mix illicit earnings with legitimate ones from the laundry business.

15

5 5/5/2016

Money Laundering Defined

Three primary means:

• Placement

• Layering

• Integration

16

Money Laundering Defined

How to Launder Money

17

Money Laundering Defined

18

6 5/5/2016

USA PATRIOT ACT

Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act

19

USA PATRIOT ACT

• The single most significant AML law that Congress has enacted since BSA itself.

• Signed into law by President George W. Bush October 26, 2001.

• Reaction to the September 11, 2001 attack, (filed 45 days after the attack on the World Trade Center).

20

USA PATRIOT ACT

Significance

• Allowed law enforcement and financial institutions the ability to more freely share information.

• Allows law enforcement agencies greater freedom in the searching of communications; specifically telephone and email communications.

21

7 5/5/2016

The Facts

• Cost and estimated $400,000 to $500,000 to plan and execute the 9/11 attacks.

• $300,000 of these funds passed through the hijackers bank accounts in the US.

• Money used in the attacks went towards travel, flight training, and living expenses.

• The 9/11 hijackers returned $26,000 to a facilitator in the UAE days prior to the attacks. 22

The Facts

• None of the 9/11 attackers received any domestic financial support.

• The financial transactions were not complex in nature.

23

Funding

3 Primary Methods:

• Wire transfers,

• Physical transport of cash and travelers checks into the US, and

• Debit cards.

24

8 5/5/2016

USA FREEDOM ACT

Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet- collection and Online Monitoring Act

25

USA FREEDOM ACT

• Signed into law by President Obama June 2, 2015 and extends Patriot Act through 2019.

• Reauthorizes parts of the USA Patriot Act but dissolves its notorious bulk data collection of Americans’ phone records and Internet metadata.

• Increases the maximum penalty for material support to terrorism from 15 years to 20 years.

26

USA FREEDOM ACT

27

9 5/5/2016

Bank Secrecy Act

Applicability

• Banks; • Money Services Businesses (including check cashers and money transmitters); • Casinos; • Insurance companies; • Precious metals dealers; and • Loan or finance companies and pawnbrokers.

28

Bank Secrecy Act

1 2 3 4 5 System of Internal Controls Internal of System Audit Independent Appropriate for Training Personnel Identification Customer Program Board Appointed BSA Officer

29

Bank Secrecy Act

System of Internal Controls

• Policies, procedures, and processes to manage, monitor, and control risks; • Ensures compliance with BSA regulations; • Establishes controls commensurate with BSA risk profile; and • Includes recordkeeping and reporting requirements.

30

10 5/5/2016

Bank Secrecy Act

Bank Secrecy Act Officer

• Must be approved annually by the Board of Directors; • Must be qualified; • Must have significant authority, knowledge, and resources; and • Responsible for ensuring overall BSA compliance.

31

Bank Secrecy Act

Independent Audit

• Must be completed by a qualified party; • Must be independent (in-house or external); • Conducted every 12 to 18 months (based on risk profile); and • Can be a risk based process.

32

Bank Secrecy Act

Training for Appropriate Personnel

• Should be documented; • Be tailored to specific job duties; • Address regulatory requirements; • Reference bank policies, procedures, and processes; • Be on-going; • Reiterate employee responsibilities.

33

11 5/5/2016

Bank Secrecy Act

Customer Identification Program

• Must form a reasonable belief of customer identity; • Must include account opening procedure and verification methods; • Must ensure collection of minimum data elements; and • May use risk-based procedures for additional documentation and verification of customer identity.

34

Bank Secrecy Act

ABA Money Laundering Enforcement Conference, November 16, 2015 “A bank will want to know about an MSB’s geographic and demographic focus, the nature of its products and services, and its anticipated volume of activity, among other things. But this does not mean that a bank is responsible for knowing its customers’ customers. Understand a customers’ customer base is one thing, but knowing a customers’ customer is another, and we have repeatedly confirmed that the latter is not an obligation under the BSA.” - Jennifer Shasky Calvery, FinCEN Director

35

Bank Secrecy Act

Importance

• Enables law enforcement and regulatory agencies to pursue investigations of criminal, tax and regulatory violations.

• Provides evidence useful in prosecuting money laundering and other financial crimes.

36

12 5/5/2016

Regulatory Requirements

• Record

• Report

• Identify

37

Regulatory Requirements

Recordkeeping and Reporting:

• Currency Transaction Reports (CTRs) • Designation of Exempt Persons; and • Suspicious Activity Reports (SARs)

38

Regulatory Requirements

Retention of Records:

• Transaction Data – 5 years from transaction; and • Customer ID information – 5 years from account closure.

39

13 5/5/2016

Currency Transaction Reports

Filing Requirements:

• Currency transactions that exceed $10,000 conducted by, or on behalf of, one person. • Must be filed for multiple currency transactions that in aggregate exceed $10,000 in a single business day. • Obtain personal identifying information for the person conducting the transaction (i.e., SSN, drivers license, government issued ID).

40

Designation of Exempt Person

Filing Requirements:

• Phase I o Bank (Domestic Operations) o Federal, state, local government agency or department o Entity (other than a bank) listed on the NYSE, ASE, NASDAQ • Phase II o Non-listed businesses i. Maintained a transaction account for at least two months or prior to the passing of two months; ii. Frequently engages in transactions in currency with the bank in excess of $10,000; and iii. Is incorporated or organized under the laws of the US or a state, or is eligible to do business in the US.

41

Designation of Exempt Person

Ineligible Businesses (engaged primarily in):

• Serving as a financial institution or as agents of a financial institution. • Purchasing or selling motor vehicles of any kind. • Practicing law, accounting, or medicine. • Auctioning of goods. • Chartering or operation of ships, buses, or aircrafts. • Pawn brokerages.

42

14 5/5/2016

Designation of Exempt Person

Ineligible Businesses (engaged primarily in):

• Engaging in gaming of any kind. • Engaging in investment advisory services or investment banking services. • Operating a real estate brokerage. • Operating in title insurance activities and real estate closings. • Engaging in trade union activities. • Engaging in any other activity that may, from time to time, be specified by FinCEN, such as a marijuana-related business.

43

Suspicious Activity Reports

Filing Requirements:

• Transactions involving insider abuse in any amount; • Transactions aggregating $5,000 or more when a suspect can be identified; • Transactions aggregating $25,000 or more regardless of a potential suspect.

44

Suspicious Activity Reports

Filing Requirements:

• Transactions conducted or attempted by, at, or through the bank (or affiliate) aggregating $5,000 or more, if the bank knows, suspects, or has reason to suspect:

o Money laundering or other illegal activity, o Transaction is designed to evade BSA, o No business or apparent lawful purpose, or o Not the type of activity a customer would normally conduct.

45

15 5/5/2016

Management of Risk

An effective BSA program also includes:

• BSA/AML/OFAC Risk Assessment • Customer Due Diligence • Enhanced Due Diligence

46

Management of Risk

Assess

Risk Measure Evaluate Management

Manage

47

Management of Risk

Risk assessments are:

• The foundation of a solid BSA/AML Program.

• Identify the bank’s risk profile and allow for the appropriate controls to be put in place to mitigate the risks.

48

16 5/5/2016

Management of Risk

Identifying the Risk:

• Specific risk categories. o Customers o Products o Services o Geographies

• Quantify the specific risk categories.

49

Management of Risk

Sample CIP Risk Assessment

Sample BSA Risk Assessment

50

FDIC Enforcement by the Numbers

Bryan Cave Consumer Banking Blog – 11/3/2015

• As of November 2, 2015, the FDIC has publicly announced 39 bank enforcement actions for the year.

• Most frequent basis for Consent Orders in 2015 has been for BSA violations or program weaknesses, account for 13 of the 39 enforcement actions.

51

17 5/5/2016

FDIC Enforcement by the Numbers

Bryan Cave Consumer Banking Blog – 11/3/2015

• “I expect this trend to continue unless we experience a significant economic downturn or other disaster that redirects the FDIC’s resources.” - John Reveal

52

Enforcement Actions

First National Community Bank, Dunmore, PA. - $1.5 Million (2/27/2015)

Asset size: $970 Million

Regulatory Authority Amount

FinCEN $1 Million

OCC $500,000

53

Enforcement Actions

First National Community Bank, Dunmore, PA. - $1.5 Million (2/27/2015)

• The bank willfully violated the Bank Secrecy Act by failing to detect or adequately report suspicious transactions involving millions of dollars in illicit proceeds from a judicial corruption scheme perpetrated by a former Pennsylvania state judge, among other violations.

• The bank failed to file SARs on a timely basis in connection with certain suspicious transactions.

54

18 5/5/2016

Enforcement Actions

Lone Star National Bank, Pharr, TX - $1 Million (4/1/2015)

Asset Size: $2.2 Million

Regulatory Authority Amount

OCC $1 Million

55

Enforcement Actions

Lone Star National Bank, Pharr, TX - $1 Million (4/1/2015)

• Critical deficiencies with suspicious activity identification, monitoring, and reporting.

• Two of the four minimum elements for the BSA program were not satisfied.

• The bank’s customer due diligence (CDD) and (EDD) for high-risk accounts was unsatisfactory.

56

Enforcement Actions

Lone Star National Bank, Pharr, TX - $1 Million (4/1/2015)

• There were a number of deficiencies with the Bank’s foreign correspondent relationship.

57

19 5/5/2016

Enforcement Actions

Bank of Mingo, Williamson, WV - $8 Million (6/15/2015)

Asset size: $94 Million

Regulatory Authority Amount

FinCEN $4.5 Million

FDIC $3.5 Million

58

Enforcement Actions

Bank of Mingo, Williamson, WV - $8 Million (6/15/2015)

• The bank serviced high-risk customers without effectively monitoring their accounts for suspicious activity.

• Significant deficiencies in all aspects of its AML program, including internal controls, independent testing, training of personnel, and designation of a BSA Officer with sufficient resources to adequately oversee its BSA compliance program.

59

Enforcement Actions

Bank of Mingo, Williamson, WV - $8 Million (6/15/2015)

• Failed to properly assess the money laundering risk associated with its customers.

• Failed to properly designate many customers and their accounts as high risk.

• Failed to adequately monitor and detect the unusual currency transactions or suspicious activities in which these customers engaged.

60

20 5/5/2016

Enforcement Actions

Bank of Mingo, Williamson, WV - $8 Million (6/15/2015)

• Bank failed to implement an effective BSA/AML Compliance Program over an extended period of time.

• Failed to file multiple currency transaction reports and suspicious activity reports associated with this risk.

61

Enforcement Actions

Banamex USA, Century City, CA - $140 Million (7/22/2015)

Asset size: $1.1 Billion

Regulatory Authority Amount

FDIC $140 Million

62

Enforcement Actions

Banamex USA, Century City, CA - $140 Million (7/22/2015)

• Failed to implement an effective BSA/AML compliance program over an extended period of time.

• Failed to retain a qualified and knowledgeable BSA officer and sufficient staff.

• Failed to maintain adequate internal controls reasonably designed to detect and report illicit financial transactions and other suspicious activities.

63

21 5/5/2016

Enforcement Actions

Banamex USA, Century City, CA - $140 Million (7/22/2015)

• Failed to provide sufficient BSA training.

• Failed to conduct effective independent testing.

64

Enforcement Actions

Gibraltar Bank & Trust Co, Coral Gables, FL - $6.5 Million (2/25/2016)

Asset size: $1.529 Billion

Regulatory Authority Amount

FinCEN $4 Million

OCC $2.5 Million

65

Enforcement Actions

Gibralter Bank & Trust Co, Coral Gables, FL - $6.5 Million (2/25/2016)

• Failed to implement and maintain an adequate AML program.

• Failed to develop and implement an adequate customer identification program.

• Failed to detect and adequate report suspicious transactions.

66

22 5/5/2016

Enforcement Actions

Gibralter Bank & Trust Co, Coral Gables, FL - $6.5 Million (2/25/2016)

• Program deficiencies led to the bank’s failure to monitor and detect suspicious activity despite red flags.

• Deficiencies resulted in the bank failing to timely file at least 120 suspicious activity reports.

• Previous deficiencies resulted in an Order in 2010, in which the bank had failed to achieve compliance with the requirements during examinations of the bank in 2011, 2012, and 2013.

67

Real World Scenarios

1) Structured Cash Transactions

2) Multiple Monetary Instruments to Same Payee

3) Elder Abuse via Wire

4) Elder Abuse via Checks Written to Cash

5) Domestic Cash Deposits and ATM Withdrawals in Countries of Concern

68

Monitoring of BSA Activity

• OFAC

• FinCEN 314a lists

• Suspicious Activity

• Wire Activity

• ACH Activity

69

23 5/5/2016

The Obvious Challenge

70

Additional Challenges

Marijuana Related Businesses

o Legalized for medical use in some states

o Legalized for recreational in a few states

o Controlled Substances Act

71

Additional Challenges

Bitcoin

o Enables the user to remain essentially anonymous. o Simple for the user to navigate. o May have low fees associated with the transactions. o Worldwide accessibility with Internet connection. o Can store value, as well as make international transfer of value.

72

24 5/5/2016

Questions

73

Contact Information

Thomas Williams, CRCM, CCBIA SVP, Senior Compliance Manager United Bank [email protected] (770) 412-4909 Office (678) 972-2095 Cell

74

25 TRICOMPLYFinancial Compliance Journal

The BSA Issue

Cost is $495 for TriComply Members and $595 for non-members. Register by June 30, 2012 to qualify for discount pricing! Breaking Register online at: Agenda trinovus.com/conference2012 Wednesday, August 22, 2012 Down 7:00 pm to 9:00 pm Welcome Reception – Gathering Area WaterColor Inn Thursday, August 23, 2012 BSA 7:15 am to 8:00 am Breakfast – Spartina Rooms 2 & 3 8:00 am to 8:30 am Dodd Frank Update Speaker: Blair Rugh 8:30 am to 10:00 am The New Loan Estimate & Settlement Disclosures Speaker: Leah Hamilton 10:15 am to 11:00 pm SARs: The New Form & The Impact On How You Categorize Let’s Explore Suspicious Activity Speaker: Alison Hawkins l 11:00 am to 12:00 pm How To Perform A Compliance Risk Assessment SAR: When Is An Activity Suspicious? Speaker: Cindy LeBlanc lWho Are You Required to Identify? 12:00 pm Adjourn for Lunch & Leisure or Golf at Shark’s Tooth Golf Course lWhen Are Two Customers One? 1:00 pm-3:00 pm Optional 2 hr Reg Z and RESPA Forms Workshop 6:30 pm Cocktails, Fish Out of Water Restaurant lAre You Ready For New e-Filing Requirements? 7:00 pm Dinner, Fish Out of Water Restaurant lThe New SAR Form Friday, August 24, 2012 lRMLOS No Longer Exempt From BSA lTo Report or Not To Report? 7:15 am to 8:00 am Breakfast – Spartina Rooms 2 & 3 8:00 am to 8:30 am Overdraft: What Is Its Current State? Speaker: Leah Hamilton 8:30 am to 9:30 am UDAAP: Let’s Talk About Confusing, Misleading & Abusive Speaker: Katherine Timon 9:45 am to 10:45 am A Periodic Statement For Mortgage Loans Speaker: Andrea Gullion April/May 2012 | BSA Issue $5.95 COMPLIANCE 10:45 am to 11:15 am Key Examiner Trends Speaker: Leah Hamilton 11:15 am to 11:30 am Closing Compliance Comments Speaker: Blair Rugh 11:30 am to 12:00 pm What’s In Store For Banking & Compliance Technology Speaker: David Brasfield Q& A om TriNovus Our successful past Your Trusted in EFT can only TriComply Compliance Experts be eclipsed by our promising future. TriComply Knowledgebase TriComply Compliance Manual Policy Creation & Review Compliance Newsletter After more than 40 years of creating Advertisement Review profitable EFT programs, we’ve gained Online Training Library a level of experience, reliability and Compliance Calendar availability that positions us, and you, for even greater success down the road. With the strength and stability of U.S. Bank Kristin Harville, Southern States Bank behind us and unparalleled service from the on changes in the compliance industry: most seasoned professionals in the business, Changes in consumer real estate transactions, consumer awareness, more consistent to regulatory adherence, stronger regulatory presence no one offers your financial institution a better, based on the current consumer expectations...most of these changes proven approach. EFT is all we do – and have resulted to help the consumer while putting regulatory hardship on the bank, from learning new ways to adhere to new guidelines, to frankly, we do it better than anyone else. implementing new technology to help with the processes. TriComply To set up your informational meeting, has equipped me to face these daily challenges! Kay Basnight, CBC National Bank, contact us at 1.800.343.7064 or on the benefits of TriComply [email protected]. TriComply has been invaluable to me because I took a few years off from banking. It has allowed me to get answers on things I might be rusty on until I catch up with the changes that It’s your turn to have taken place in the last few years. But that doesn’t mean I’ll stop using TriComply because I’ll never, ever get ahead as Join the inner fast as the changing regulations are coming out. It’s also really Circle good to have a sounding board so when you have new ideas for new products you have someone to talk to in order to be sure you’re heading in the right direction. It’s a great group and pretty quick response time. ey’re very knowledgeable and some of the top compliance professionals in the industry. Katie Garlington, Central State Bank on her biggest compliance challenge I would say juggling the time it takes to keep up with a con- stant stream of regulatory changes and the amount of work that goes with updating policies and procedures, implementing regulatory changes, training, etc. while trying to maintain the Our People. Your Success. appropriate amount of monitoring reviews. TriComply has ATM & Debit Programs been a great resource for me at a really reasonable price. ATM Managed Services Management Contact Darryl Brasfield : 904.264.1050 |[email protected] MoneyPass® surcharge-free ATM .com & PIN POS Network ©2012 Elan Financial Services www.elanfinancialservices.com COMPLIANCE Every issue features actual questions Table of asked by real compliance officers just TRICOMPLYFinancial Compliance Journal like you from across the nation. CONTENTS (C)Q Additional verification A for certain customers. The bank’s products, services, customers, entities, and CIP must address& situations where, based on the bank’s geographic locations, and the potential money laun- risk assessment of a new account opened by a custom- dering and terrorist financing risks associated with What Is The TriComply Financial er that is not an individual, the bank will obtain infor- those activities. The appointment of a BSA compli- mation about individuals with authority or control over ance officer is not sufficient to meet the regulatory re- Compliance Journal? such account, including signatories, in order to verify quirement if that person does not have the expertise, We’re excited about the third issue of our TriComply Financial Compliance the customer’s identity. This verification method ap- authority, or time to satisfactorily complete the job. Journal for financial institution compliance professionals. The journal is plies only when the bank cannot verify the customer’s written and edited by TriComply Compliance Services, a part of TriNovus, true identity using the verification methods described The line of communication should allow the BSA compli- LLC. TriComply provides expert compliance advice to financial institutions in paragraphs (b)(2)(ii)(A) and (B) of this section. ance officer to regularly apprise the board of directors around the country. We decided to compile some of our expertise on (iii) Lack of verification. The CIP must include pro- and senior management of ongoing compliance with timely compliance topics, and the result is the TriComply Financial cedures for responding to circumstances in the BSA. Pertinent BSA-related information, including the Compliance Journal. For more information on TriNovus and TriComply, call which the bank cannot form a reasonable be- reporting of SARs filed with FinCEN, should be reported to 205.991.5636 or visit www.trinovus.com. You can also subscribe to our free lief that it knows the true identity of a customer. the board of directors or an appropriate board commit- weekly compliance newsletter on our website. tee so that these individuals can make informed deci- What are the requirements that are necessary to sions about overall BSA/AML compliance. The BSA com- Q. become a BSA officer? pliance officer is responsible for carrying out the direction of the board and ensuring that employees adhere to the There are no hard and fast rules for becom- bank’s BSA/AML policies, procedures, and processes. A.ing a BSA officer, and there is no required cre- dential to become a BSA officer. I have included Every day the TriComply staff answers hundreds of ques- Let’s Explore... an excerpt detailing the responsibilities and duties tions just like these from people just like you! If you are of the BSA officer from the online BSA Manual locat- interested in subscribing to TriComply, visit When Are Two Customers One?... pg 5 ed at the FFIEC.gov website. It will give you a good www.trinovus.com/tricomply, email [email protected] idea of what is required to become a BSA officer. or call 205.9915636. When Is An Activity Suspicious... pg 6

BSA Compliance Officer Who Are You Required To Identify... pg 8 The bank’s board of directors must designate a quali- fied individual to serve as the BSA compliance of- On The Job With Katie Garlington.. pg 11 ficer. The BSA compliance officer is responsible for coordinating and monitoring day-to-day BSA/AML The New Suspicious Activity Reporting Form... pg 12 compliance. The BSA compliance officer is also charged with managing all aspects of the BSA/AML The Four Pillars of BSA.. pg 15 compliance program and with managing the bank’s Meet TriComply RMLOs No Longer Exempt From BSA.. pg 16 adherence to the BSA and its implementing regula- Cindy LeBlanc is a Senior Com- tions; however, the board of directors is ultimately pliance Advisor with TriNovus’ To Report or Not to Report.. pg 17 responsible for the bank’s BSA/AML compliance. TriComply Services team. Her 29-year career has focused on Are You Ready For The New e-Filing Requirements?.. pg 15 While the title of the individual responsible for overall Compliance and Risk Manage- BSA/AML compliance is not important, his or her level of ment, Audit, Training and Con- authority and responsibility within the bank is critical. The sulting. Cindy has successfully COMPLIANCE BSA compliance officer may delegate BSA/AML duties managed compliance programs to other employees, but the officer should be responsible and exams for institutions super- for overall BSA/AML compliance. The board of directors is vised by the OCC, FDIC, State of responsible for ensuring that the BSA compliance officer Missouri and NCUA. She is a CRCM (Certified Regulatory Com- has sufficient authority and resources (monetary, physi- pliance Manager), a CUCE (Credit Union Compliance Expert) cal, and personnel) to administer an effective BSA/AML and a former OCC Compliance Examiner. Cindy has provided com- pg compliance program based on the bank’s risk profile. pliance services to community banks across Louisiana, Mississippi, 20 Missouri and Alabama and credit unions in Louisiana. She has Q A The BSA compliance officer should be fully knowl- & provided training for bank and credit union Boards of Directors, edgeable of the BSA and all related regulations. The various community outreach programs, and high school financial BSA compliance officer should also understand the education seminars. 22 You do not have to police your system for this as many held only in the husband’s name. Is there a requirement systems do not provide for a means to matching of the under BSA to maintain a record (specifically a manual names and account numbers before accepting the paper record) of said transfer, since ownership of funds From the transaction. However, if you notice this type of activity, was lost by the joint account? then, you should monitor the account(s) to watch for TRICOMPLY suspicious activity. Typically, your tellers are going to no- How about if the transfer involves a transfers of funds Financial Compliance Journal EDITOR tice this when the funds are withdrawn. The institutions from one business account to another business account that have mentioned this activity seem to be noticing 4 at the Bank, with the owner of both accounts being the different postings coming into the same account and same person? are unable to link the tax payer to the account holder STAFF in any way. If you see or your teller reports this activity, These would both meet the description for the I recommend adding the account(s) to your high risk A. exception under 31 CFR 103.33(e)(6). ear Reader: monitoring list, and if necessary complete, a SAR. Funds transfers where both the originator and the WelcomeD to the third If a new customer opens an loan account and this beneficiary are the same person and the originator’s edition of the Q. customer is a corporation, we CIP the corporation. bank and the beneficiary’s bank are the same bank TRICOMPLY EDITORIAL & PRODUCTION Correct? What if there is also a personal guarantee by are not subject to the record keeping requirements for FINANCIAL Karly Field the owners of the corporation to secure a loan. For ex- funds transfers. COMPLIANCE ample, John and Sam Doe are the principals for Doe & JOURNAL. In this Doe Enterprises, Inc. If John and Sam both personally There is also an exception for the record keeping issue, we have endorse the loan as well, we would need to CIP those requirements for the funds transfer when the originating focused on the Bank individuals, correct? bank is also the beneficiary bank. Secrecy Act and its TRICOMPLY STAFF related requirements. Miller Gunn Correct, your “customer” is the corporation. It seems like every A. Your bank should have written CIP procedures How would we document a customer identity on regulation hits a Andrea Gullion to address situations where the “customer” is not Q. our CIP form if our borrower (VA on active duty in zenith. Then, it fades Cindy LeBlanc an individual and through your documentary and Afghanistan now) is not here? His wife has POA doc- into its place with all non-documentary verification methods you cannot umentation and will be signing documentation on his of the other Leah M. Hamilton reasonably verify the identity of the “customer.” In those behalf and we will do an “Alive and Well” statement at regulations. The Bank Alison M. Hawkins cases, your procedures should reference obtaining closing. Secrecy Act is information on those individuals with authority or control somewhat the same. Blair Rugh over the account, including signatories. Many institutions This will actually go back to your institution’s Katherine E. Timon complete the CIP process on all signers of closely held A. specific procedures, so check your BSA policy. I can remember several years ago when it was the corporations, such as the one you mentioned. In these As you know, the customer is actually the owner of hottest topic in banking. It seemed like every compliance Kenny Vickers cases, institutions may find verifying the true identity of the account. Therefore, you may have to do some of consulting group was holding a seminar every day on the corporation difficult and, in turn, verify those with this long distance (via phone or email) You will likely BSA. Now its importance has somewhat faded --- unless authority or control over the account. have to use non-documentary methods. BSA says: your institution was just tagged with a BSA violation. If that happens, you will quickly find out how important In cases where the account is a loan with a personal (B) Verification through non-documentary meth- BSA compliance is. We hope that the articles in this guarantee, the guarantors are not considered your ods. For a bank relying on non-documentary meth- issue will assist you in strengthening and implementing “customer” for purposes of CIP, they do not have an ods, the CIP must contain procedures that describe your BSA program. You can also use this edition of the The information contained in this “account” with you as you are not offering them a the non-documentary methods the bank will use. journal as part of your annual BSA training program. TriComply Financial Compliance product or service. However, you may have a tough ( 1 ) These methods may include contacting a cus- Journal is not intended to time during your safety and soundness exam explaining tomer; independently verifying the customer’s iden- We are very grateful for all of the financial institutions constitute,and should not be received why you didn’t verify your guarantor. In many cases tity through the comparison of information provided that have subscribed to our TriComply service, and we as, legal advice. Please consult with where the loan must be supported by a personal by the customer with information obtained from a appreciate that they have placed their confidence in your counsel for more detailed guarantee, it is typical that the bank’s CIP procedures consumer reporting agency, public database, or us. Our commitment is to provide a service that exceeds information applicable to your required it as well due to the difficulty in identifying the other source; checking references with other finan- the expectations of our customers. Our growth has institution. “corporation” as mentioned above. cial institutions; and obtaining a financial statement. been much more rapid than we anticipated and that ( 2 ) The bank’s non-documentary procedures must has caused us to have a few hiccups. We realize that The TriComply Financial Compliance Under the wire transfer regulations related to BSA/ address situations where an individual is unable and have taken the steps necessary to assure that our Journal is published by TriNovus, LLC, Q. AML, is there a requirement to keep a paper re- to present an unexpired government-issued identifi- service is the best in the industry. We continue to add PO BOX 380305, Birmingham, AL 35238. cord or any record for that matter of any in-house trans- cation document that bears a photograph or similar to our staff the best compliance professionals that we All content herein is the sole property fer (inside the institution-i.e. from account to account at safeguard; the bank is not familiar with the documents can find to support your growing needs. If your institution of TriNovus. Please submit all the same bank) of $3,000 or more where ownership of presented; the account is opened without obtaining does not presently subscribe to TriComply, we hope you correspondence to the address above the funds is lost or transferred to another individual or documents; the customer opens the account with- will give us a try. or via email at [email protected]. entity (business)? out appearing in person at the bank; and where the Sincerely, bank is otherwise presented with circumstances that Advertising inquiries may be made by For example, if a husband and wife own a joint ac- increase the risk that the bank will be unable to veri- calling 205.991.5636 or emailing count and funds are transferred on-line to an account fy the true identity of a customer through documents. [email protected]. Blair Rugh TriNovus For more information on TriNovus visit TriComply Financial Compliance Journal | Pg www.trinovus.com. 21 COMPLIANCE Every issue features actual questions Let’s Explore asked by real compliance officers just BSA: When Are Two Customers One? Q A like you from across the nation. Aggregating Transactions for CTRs by Blair Rugh Can you& provide some guidance as to exactly related to MSBs. (specifically page 43591 footnote 46) Q. what topics need to be discussed in a BSA AML OFAC risk assessment? I have one but I am having FDIC We have a convenience store customer that has a examiners and want to be sure it’s correct/complete. Q. tax id number for his corporation and another tax id number for his dba. When completing a SAR which A basic model can be found in the 2010 FFIEC tax id number should I use? This is a repetitive SAR (ev- A.BSA Exam Manual for BSA and OFAC (Appen- ery 90 days) and I just realized the dba had it’s own TIN. dix J and M). You will want to address your institution’s The past 3 SAR’s I have used the corporation TIN. Can I high risk areas with respect to those areas and any put the dba’s TIN in the narrative? high risk customer types and/or products and services You may need to complete two different Part II Is our bank responsible for the OFAC screening A. forms. You would need one for the Q. for the originator of an domestic ACH or does that corporation and another for the dba. fall to the originating institution? We have a member who has provided their ac- sometimes under separately incorporated businesses Corporation A owns a hamburger With respect to domestic ACH transactions, the count number to individuals that are not signers Q. the BSA rules, an with separate taxpayer identification stand, Corporation B owns an ODFI is responsible for verifying that the Origina- on the account for them to be able to e-file and have A. institution must numbers. The aggregation question automobile dealership and tor is not a blocked party and making a good faith ef- their tax return funds come into our member’s account. aggregate the cash depends on whether the businesses Corporation C owns a dairy farm. fort to ascertain that the Originator is not transmitting Since they are not signers, we do not have any infor- transactions of two are run independently of one Each business is run totally blocked funds. The RDFI similarly is responsible for veri- mation on these individuals. Can our member give their separately another or whether in fact they are independent of the others. Each has fying that the Receiver is not a blocked party. In this account number out and does the IRS allow them to incorporated operated as a single business. There its own employees and payroll. way, the ODFI and the RDFI are relying on each other place the funds in an account for which they are not a S customers for the purpose of CTR is a presumption that separately There is no transfer of funds between for compliance with OFAC regulations. signer? Doesn’t the originator have some liability there? reporting if the separate customers incorporated entities are the three corporations. Even though have common ownership and a independent persons, but that the three corporations are all owned If we have an MSB that is a loan customer only, No, the IRS does not allow this type of activity. level of joint operations. In 2001, presumption is rebuttable. by Mr. Jones, they operate are we still required to adhere to the same due This also poses great risk on your institution with re- Q. A. FinCEN issued FinCEN Ruling 2001-2 independently and their transactions diligence requirements that apply to MSBs that have a spect to fraud and BSA requirements. You should check describing one circumstance when For example, assume that your should not be aggregated. deposit relationship with us? the name against the OFAC list, inform your member transactions of separate customers customer Mr. Jones owns three Unfortunately, most cases are not as that your institution does not allow this type of activ- should be aggregated. Recently, separate corporations, corporations clear cut as these two. Yes, you should follow your MSB requirements for ity nor does the IRS. You should also review the activity FinCEN issued a guidance A, B and C, and each corporation all account types. The guidance available for in- and consider a SAR. A similar scenario was included in A. expanding upon its prior direction owns a hamburger stand in your There is no single issue that is stitutions servicing MSBs refers to “accounts”. This would an IRS FAQ document. http://www.irs.gov/individuals/ (FIN-2012-G001). community. Corporation A orders determinative of whether two or include both loan and deposit relationships. Also con- article/0,,id=164570,00.html all of the supplies for all three more separate businesses are being sider the fact that the loan account could be used for FinCEN’s regulations implementing corporations and pays the payroll operated in a manner that makes operational funding and keep a check on what items Regarding direct deposit of someone’s tax refund the Bank Secrecy Act (“BSA”) require for all three corporations. Employees them something other than separate are being provided in their monthly payments. If your into an account that does not bear their name, we Q. financial institutions to aggregate of one of the corporations often and independent. The following are MSB isn’t registered and in compliance with the BSA re- don’t really know there is a name/acct# discrepancy multiple currency transactions “if work at the hamburger stand owned factors that should be considered in quirements, your credit could be at risk with respect to unless the account number is incorrect and unposts or the financial institution has by one of the other corporations. making a determination: repayment. rejects. Are we still responsible for the funds coming knowledge that [the multiple Frequently, funds are transferred •Do the corporations have joint into a valid account number and posting? Do we have transactions] are by or on behalf of between the accounts of the three employees? If our deposit customer is a property management to police every deposit coming in to ensure the name any person and result in either cash corporations and the account of •Do the corporations have separate company and they routinely accept rental pay- and account number match? Q. in or cash out totaling more than each acts as overdraft protection payroll accounts? ments in the form of traveler’s checks or money orders $10,000 during any one business for the other two. They jointly •Are the two corporations in the (sometimes in excess of $1,000 from one tenant in one The taxpayer should follow the IRS rules regarding day.” The issue, therefore, is when advertise the three hamburger same business? day), is the company considered to be a Money Ser- the direct deposit of their refund check. How- transactions are conducted through stands. Clearly, in this case, the three •Are there fund transfers between vice Business, as far as BSA is concerned? A. ever, many of them don’t know the rules or don’t care. the accounts of separate corporations are being operated as the accounts of the two Therefore, the bank should implement prudent proce- corporations by or on behalf of one one business and the BSA rules corporations? No, they would not be considered an MSB if dures to discourage or prohibit this activity. As stated in person. Frequently, an institution require that their transactions be •Do the corporations operate out of they are only accepting the items as rental pay- A. the previous Q&A, implement your suspicious activity may have an individual or a group aggregated for CTR filing purposes. the same premises? ments. This was mentioned in the section analysis of the monitoring process for these types of situations. of individuals that are the owners of On the other hand, assume that Final Rule issued on 7/21/2011 clarifying the definitions continued on page 19

20 TriComply Financial Compliance Journal | Pg 5 by Blair Rugh When Two Are One SAR: When Is An Activity Suspicious? continued from page 5 It seems like every regulatory requirement has its season: would normally be expected to Industries (FinCEN Form 101) •Does one corporation supply goods or services to the 20 years ago, it was CRA: 10 years ago, it the Bank engage in, and the bank knows of •SAR by MSBs (FinCEN Form 109) other? Secrecy Act; today, it is Dodd Frank or one of its offspring. no reasonable explanation for the •SAR by Casinos and Card Clubs (FinCEN Form 102) •Does one corporation make payments to third parties BSA compliance is no less important today than it was transaction after examining the •CTR by Casinos (FinCEN Form 103) on behalf of the other? 10 years ago, but because it is no longer a front burner available facts, including the •Registration of MSBs (FinCEN Form 107) item, some financial institutions are not as diligent in background and possible purpose Again, no single factor is determinative. The fact that detecting suspicious activity as they once were. of the transaction. both corporations are in the same business does not, in and of itself, mean that they are not being operated Under the Bank Secrecy Act, financial institutions are One of the most frequent violations separately and independently. It is the intensity of the required to report: is the customer who is aware of the mutual relationships that is the determining factor; CTR reporting requirements but not Meet TriComply unfortunately, that is a subjective decision. Because of Andrea Gullion is a Senior Com- *Criminal violations involving insider abuse in any SAR reporting. To avoid having a that, we recommend that institutions be somewhat pliance Advisor at TriComply amount; CTR filed, the customer makes one aggressive in aggregation determinations. In this Services. With more than 12 *Criminal violations aggregating $25,000 or more when or frequent cash deposits under the circumstance, you will not be criticized for filing a CTR years of experience in banking, a suspect can be identified; $10,000 CTR reporting level. Most when it was not required, but you will be criticized if the Andrea is a former Compliance *Criminal violations aggregating $25,000 or more banking automation systems will examiner thinks that the transactions should have been and CRA Officer for a large com- regardless of a potential suspect; and detect that pattern. The more aggregated and you did not file. *Transactions conducted or attempted by, at, or difficult situation is a transaction or a munity bank. She has advised on fair lending matters referred to the through the institution and aggregating $5000 or more, series of transactions that are not of The new guidance reiterated the requirement to DOJ and assisted in compliance if the institution or affiliate knows suspects, or has reason the type that the customer would aggregate transactions when they are done by the remediation efforts. Andrea is to suspect that the transaction: normally be expected to engage in same person. Thus, if an employee of Company A also a licensed attorney in the state of Alabama, where she has prac- **May involve potential money laundering or and for which the bank is not aware makes a deposit for Company A and a deposit for ticed real estate law at a large firm in Huntsville, Alabama. She has other illegal activity; of any business purpose. For Company B, they must be aggregated to determine extensive compliance experience as well as vast legal knowledge of **Is designed to evade the BSA or its implementing example, if I were to deposit a whether or not a CTR should be filed. Also, if a customer the compliance industry. Andrea received both her Juris Doctor of regulations; or significant amount of cash into my owns several businesses that are not incorporated, Law and Bachelor of Science in Commerce and Business Adminis- ***Has no business or apparent lawful purpose or is not account at my bank, it would then, their accounts are the accounts of the customer, tration from the University of Alabama, Tuscaloosa. the type of transaction that the particular customer certainly be out of the ordinary and and their transactions must be aggregated.

One final interesting issue that the new guidance raises is when a corporation owned by a customer pays a significant number of personal expenses of the A Formal CDD Rule on customer. For example, the corporation may own the home the owner lives in, the car that the owner drives Its Way? and may pay some of the owner’s personal expenses. In those circumstances, the owner of the corporation Despite the obligation of customer due diligence and the corporation may not be operating separately (CDD) implicit in BSA requirements, FinCEN and independently and the owner’s cash transactions should be aggregated with that of the corporation. believes that issuing an express CDD rule that re- quires financial institutions to perform CDD, in- cluding an obligation to categorically obtain ben- Meet TriComply eficial ownership information, may be necessary Alison Hawkins is Vice Presi- dent of TriComply Services. to protect the US financial system from criminal During her 16 plus years in bank- abuse and to guard against terrorist financing, ing, Alison has served as a Com- money laundering and other financial crimes. The pliance Officer, BSA Officer, and initial rules would cover banks, brokers or dealers a Certified Bank Auditor for large in securities, mutual funds, futures commission financial institutions as well as community banks, including a merchants, and introducing brokers in commodi- de novo where she developed and ties. Consideration will be given for extending such implemented the compliance pro- a rule to other financial institutions in the future. gram. As a compliance consultant, she has served as the lead consul- Accordingly, FinCEN issued an Advance Notice tant for a $9 billion bank fair lending review and has successfully of Proposed Rule Making (ANPRM), with a assisted institutions with BSA remediation efforts resulting in re- leases from regulatory agency orders. Alison received her Bachelor comment closing period of May 5, 2012. of Science in Commerce and Business Administration at the Uni- versity of Alabama, Tuscaloosa.

TriComply Financial Compliance Journal | Pg 19 Are You Ready For The New e-Filing by Andrea Guillon one that I would not normally be The first problem with filing SARs under suspicious Requirements? expected to engage in. I have had circumstances is that what is suspicious is very subjective. FinCEN has taken a leap into the them at this time. So, where does response. Unfortunately, if your insti- my account for probably 40 years, What one person thinks is suspicious another may not. 21st Century by requiring e-filing on that leave your institution? Alas, tution hasn’t done so by now, it is and I don’t believe that I have ever The second problem is that the examiners can look at it most of its prevalent forms. In the in- don’t fret, there is some saving too late; so, get cracking! made a cash deposit. The first time I in perfect hindsight. An institution determined that the terest of saving all involved time grace (or should we say “was”) for do it, it probably does not rise to the activity was not suspicious and did not file a SAR. The and money, the two most common some institutions. If your institution is not currently regis- level of something that should be customer was subsequently arrested for money forms—the Suspicious Activity Re- tered for e-filing through FinCEN, it reported. If I continue to do it, then laundering. Also, just because law enforcement is aware ports (SARs) and the Currency Trans- FinCEN issued notification of three can do so by applying for a user ID either the bank would have to ask of the criminal activity is no reason for not filing a SAR. action Reports (CTRs)—are required categories for possible exemption and password on the BSA E-Filing me where the money was coming There was a case in Alabama where a person was to be submitted by e-filing, rather from these requirements on Febru- System website: http://bsaefiling.fin- from and determine a legitimate embezzling money from the company for which he than paper, starting July 1, 2012. ary 24, 2012; institutions had 30 days cen.treas.gov/main.html. After re- purpose for it or file a suspicious worked. He was arrested and committed suicide. The from that date to apply for an ex- ceipt of these items, the system can activity report. bank where he was depositing the embezzled funds felt Institutions are also encouraged to emption. The categories for hard- be securely accessed and e-filing that because law enforcement was already involved file other forms, such as the Reports ship exemptions given were Money can begin—please contain your ex- I don’t know how many times a and the person was dead there was no reason to file a of Foreign Bank and Financial Ac- Services Businesses (MSBs) and/or citement. Detailed instructions for e- banker has called me, described an SAR. Bad decision. counts (FBARs) electronically as small credit unions that lack internet filing are available through the FAQs activity or a pattern of activity on soon as possible; however, this form access and file a limited number of at http://bsaefiling.fincen.treas.gov/ the part of a customer, and asked The BSA requires employee training. Part of that should may still be submitted by paper until reports, and financial institutions FAQs.html. whether or not I thought it was be for front line personnel regarding the types of June 30, 2013. Additionally, special who utilize batch software requiring suspicious. My response normally is transactions that might be suspicious. There should be a exceptions have been made for the a major system conversion or other In addition to the forms listed above, that I don’t know the customer or person or a committee of people in each institution who Currency and Money Instrument Re- extraordinary circumstances. the following forms are currently eli- the situation, but if the activity was determine whether a SAR should be reported. All ports (CMIRs) and Form 8300 (Re- gible for electronic filing: sufficient for the banker to call me to employees should be trained to report to that person or ports of Cash Payment Over $10,000 If extra time is needed by these insti- get my opinion, then, obviously the committee all transactions or conduct that have any Received in a Trade or Business.) tutions to prepare for the change, •Designation of Exempt Person (Fin- banker was suspicious, which means potential of being suspicious. Then, the person or the Due to the nature of those reports, they were required to affirmatively CEN Form 110) a SAR probably should be filed. committee can investigate and make the correct e-filing will not be mandated for request an extension and await a •SAR by the Securities and Futures decision regarding filing.

om TriNovus BankRISK By routinely stress testing your loan portfolio with BankRISK, you can project future strengths and weaknesses based on hypothetical conditions that are imposed upon your institution’s loan, collateral Concentration is and appraisal data. Stress testing quantiies the effect of the chang- ing economic conditions on your bank’s overall losses, earnings, and King capital, thereby identifying potential problem areas in advance. BankRISK’s Key Benefits • Predict the effect of adverse economic conditions • Apprise you of your inherent risk exposure • Effectively evaluate your capital • Determine your appropriate level of risk tolerance • Prepare you to compete for lending business more prootably • Satisfy regulatory requirements

It’s your turn to Join the inner .com 205.991.5636 | [email protected] Who Are You Required To Identify? To Report or Not to Report? That is the Question by Alison Hawkins We have all been there, you have completed your What you thought was just a little indigestion after lunch, investigation from the teller’s report of suspicious may actually be the missing piece in an FBI investigation. activity; yet, you are still completely puzzled as to what in the world this customer could be doing. No one wants to file a SAR on someone that is completely The activity looks suspicious at a quick glance, but innocent, but how far must you go to prove your case. you have at least three ideas for situations that Sometimes we misinterpret our responsibility to would justify the activity. You have spoken with investigate when determining whether or not to file a the relationship officer and received the standard, SAR. Keep in mind, the SAR is merely a report of “Oh, no way, he is a good customer.” Or “I have suspicious activity. As much as I think I would enjoy banked him for 25 years. He is a good business being a criminal investigator, that isn’t our job. We man and we go to church together.” are not the police, and we do not have And my personal favorite, “He to solve the case in order to brings donuts in every Friday determine the activity is morning for everyone.“ So reportable. now what? Do I file or not? In performing your Unfortunately, investigation, keep in providing an endless mind to watch for supply of donuts the little things. does not make Search the internet someone a good for the names of customer. Donuts companies to tend to make which checks or hungry wires are sent. employees look Ask the question the other way. that no one wants Most of us have to hear the answer seen stable, to: when was the even highly last time you profitable, long checked out the term customer collateral? Verify relationships take a signatures when lending turn for the worst in documents are allowed this economy. to be signed outside of the Business owners you bank. (Come on. . .we all would not have worried know it happens, you don’t have about in a million years are to allow it, but put a control in place to by Blair Rugh considering the unthinkable protect your institution just in case.) to keep their business alive Have someone investigate the store front; ection 326 of the USA PATRIOT Act duration in time, such as a deposit account, a credit another quarter. It happens on are they functioning as an unlicensed MSB? mandates that the federal bank regulatory arrangement, a safe deposit box lease or the provision both sides of the fence, the deposit side and the Are they kiting or structuring? Are there signs of identity agencies establish regulations requiring all of cash management, custodian or trust services. Single lending side alike. A few donuts to hide some theft or fraud? U.S. financial institutions subject to their isolated transactions such as cashing a check, the sale kiting or to stop the loan officer from asking “how’s control have formal programs for verifying of a money order or cashier’s check, a wire transfer or business” could be well worth it for a customer in In some cases, you may want to flag the account and the identity of their customers. The rules the use of an ATM, do not create a customer relationship, trouble. continue to watch it closely for another week or two. becameS mandatory on October 1, 2003. The customer although their use by a person may be frequent. An But, in most cases, if you have that little feeling in the pit identification program (CIP) must be a component of institution’s CIP should be completed on a customer So, what do you do when you are faced with a of your stomach that something just doesn’t feel right - the institution’s overall Bank Secrecy Act program and before an account relationship is opened; however, it situation where you are unsure of whether or not to file the SAR. You can certainly amend it later to add must be approved by the institution’s Board of Directors. may be completed after the account is opened report? When in doubt, fill it out. That is my motto additional facts that appeared after submission. And, The CIP is intended to enable the institution to form a provided that all transactions in the account are for suspicious or unusual activity. (Of course, with sometimes it helps to talk it out. It always seems there is reasonable belief that it knows the true identity of each restricted until the identification process is completed. the mandatory e-filing deadline of July 1st for BSA more to the story when you start discussing it, strictly customer. forms fast approaching, I will have to change that confidential, of course. For our members, our team of You are not required to identify the owners of accounts to type it out.) We tend to think of a parade of red experts is here to help you with those quirky situations. For the purpose of CIP, a customer is a person who is that you acquire by either merger or acquisition as your flags with alarms going off when we think of SARs. the owner of an account with the institution. An account relationship was not initiated by the customer. If, The trouble we have is when the activity is only Oh, and the donut guy took the institution for a half a is a formal relationship that is anticipated to have a however, you open an additional account for a sounding that alarm in the pit of our stomach. million in a sticky lending scam.

8 TriComply Financial Compliance Journal | Pg 17 RMLOs No Longer Exempt from customer whose relationship you acquired and have community member, but neither has been a customer by Leah M. Hamilton not previously identified, then, you must identify the of your institution. You must still apply your CIP to these Mandatory BSA Requirements customer at that time. There is an exemption from individuals when they become your customer. for individuals financing the sale of identification for financial institutions regulated by their own real estate. For example, federal or state agencies and for publicly traded Once you have put a customer through your Customer individuals employed by a loan or companies listed on the New York or American stock Identification Program and have identified the finance company that would be exchanges, or in the NASDAQ National Market System customer, if the customer opens additional accounts, not be subject to the rule include (except for small-capitalization segment). there is no requirement that you identify the customer administrative assistants and office again as long as you have a reasonable belief that you clerks who gather documents, re- Often the question arises, “Who is your customer?” Your know the true identity of your customer. view land records and complete customer is the account owner. If there are multiple forms on behalf of a lender or origi- owners of an account, then, all of the owners are your CIP should not be confused with obtaining identification nator. customer, and all must be identified. If the person who for other BSA purposes such as wires, monetary applies to open an account with you is an individual, instruments, CTRs, SARs, and other required transaction RMLOs will be required to have a the determination is easy. The individual is or will reporting. In those transactions, you must obtain, verify senior management approved, become your customer. On the other hand, if your or maintain the necessary identification of the AML Program in place, which must customer is a juridical entity, that is an organization conductor, beneficiary, originator, etc. as applicable include, at a minimum, the four pil- created by law, sometimes the determination of who is to the account or transaction. lars: (1) the development of internal your customer is more difficult. policies, procedures, and controls; (2) the designation of a compliance If the account owner is a corporation, the corporation officer; (3) an ongoing employee is your customer. You are required to identify the Meet TriComply training program; and (4) an inde- corporation, but you are not required to identify persons Blair Rugh is one of the preemi- pendent audit function to test pro- that are associated with the corporation such as the nent experts on United States grams. Each loan or finance com- stockholders, directors, officers or the signers on the banking laws and regulations. He pany is required to develop and account. Some institutions require the identification of has authored compliance manu- implement an anti-money launder- the stockholders or other persons affiliated in some way als recognized by the banking in- ing program reasonably designed with closely held corporations that are their customers. dustry as the definitive treatise to prevent the loan or finance com- That is certainly permissible, but it is not required. on banking law and regulation. The 10-year reprieve from manda- residential mortgage loan. In addi- pany from being used to facilitate Similarly, if the owner of your account is a limited liability He has extensive experience as a tory Anti-money Laundering (AML) tion, the rule will apply to residential money laundering or the financing company or a limited partnership, the limited liability speaker to bankers’ associations Programs and suspicious activity re- mortgage originators, regardless of of terrorist activities. company or limited partnership is your customer and is and has written numerous articles published in banking journals. porting (SAR) is soon to end for cer- whether they receive compensation the only entity or person that must be identified. With more than 20 years experience in commercial and investment tain loan and finance companies. or gain for acting in that capacity. The new SAR form has been designed banking, Mr. Rugh’s background includes a Bachelor of Science de- Generally, the final rule is intended FinCEN deliberately expanded the with loan and finance companies in If your customer is a partnership, it is the entity that must gree in chemical engineering from the University of Kansas as well to cover initial purchase money definition with just a few simple word mind. Although most have volun- be identified. Frequently, two or more persons may form as a juris doctor degree from Southern Methodist University Law loans and traditional refinancing changes in order to cast a wide net, tarily filed SARs in the past, RMLOs a partnership where there is no written partnership School. transactions facilitated by residen- with few exceptions. will now be subject to mandatory agreement; therefore, no way to identify the partnership. tial mortgage lenders (RMLOs). Non- reporting requirements. In that event, you identify the individual partners. Meet TriComply bank RMLOs, which are generally Exempt from the definition of RMLO Leah M. Hamilton is the Direc- known as “mortgage companies” is any government sponsored enter- With an effective date of April, 16, If your account owner is a trust, you identify the trust. tor of TriComply Services with and “mortgage brokers” in the resi- prise (GSE) regulated by the Fed- 2012, and a mandatory compliance The settlor of the trust, the trustees and the beneficiaries TriNovus. She has more than 17 dential mortgage business sector, eral Housing Finance Agency. GSEs date of August 13, 2012, RMLOs will are not your customers, and there is no requirement years of experience in the finan- are a significant subset of the “loan have an established procedure for surely be in a scurry to ensure its op- that you identify them. In my opinion, there is an cial services industry. Leah is one or finance company” category, in reporting suspicious activity to the erational policies, procedures and exception to that when your customer is a revocable of the nation’s sought after com- terms of the number of businesses FHFA, which then reports the suspi- processes will pass muster under the trust. In that case, there is such a close relationship pliance instructors and consul- and the aggregate volume and cious activity to FinCEN. Addition- new regulatory requirements for an between the settlors of the trust and the trust because tants. She brings her passion for value of transactions they facilitate. ally, as long as a mortgage servicer AML Program and SAR reporting. the settlors may revoke the trust at any time and compliance and real world stories does not extend residential mort- A loan or finance company will be become the account owners. I believe that the better to engage the audience and offer A closer look at the definition of a gage loans or offer or negotiate required to make a copy of its AML policy is to also identify the settlors of the trust. If the levity to very tough topics. As a compliance expert, Leah has served residential mortgage originator is the terms of a residential mortgage Program available to FinCEN or its owner of your account is an unincorporated association as the lead compliance consultant and advisor on several consent essential as it changed significantly loan application, it will not fall under designee upon request. Compli- such as the Thursday Night Guy’s Bowling, Beer and order remediation engagements, focusing on Consumer Compliance from the proposed definition which of the definition of residential mort- ance will be examined by FinCEN Belch club, then, you identify the person opening the and BSA/AML. A licensed attorney for more than 10 years, Leah initially corresponded with the SAFE gage loan originator. The final rule or its delegates in accordance with account. received her Juris Doctorate from Northern Illinois University Col- Act. A residential mortgage origina- does not contemplate coverage of the BSA. lege of Law, and her Bachelor of Arts in General Studies degree tor is a person who accepts a resi- an individual employed by a loan Lastly, there is the scenario where you have known an from the University of Texas at Dallas where she majored in law dential mortgage loan application or finance company or financial in- individual forever, such as a relative or long standing and minored in business management. or offers or negotiates terms of a stitution and provides an exception

16 TriComply Financial Compliance Journal | Pg 9 om TriNovus BankerVMS Managing Vendors Can Be So E a s y ...You Get The Idea! by Leah M. Hamilton Manage Documents sssssssssssssssssssssssssssssssssssssssssssssssssssssss ssssssssssssssssssssssssssssssssssssssssssssssssssssss ssssssssssssssssssssssssssssssss The Four Pillars of BSA

Contracts o ensure compliance with the Bank Secrecy Act necessary competency and have no conflict of interests. �sssssssssssssssssssssssssssssssssssssssssssssssssssss (BSA) and its implementing regulations, a financial Training is the fourth pillar of an effective BSA Program. ssssssssssssss�ssssssssssssssssssssssssssssssssss�sssss institution must have a BSA Program that consists Training need not be formal conference training, but it sssss�ssssssssss�sssssssssssssssssssssssssssssssssssssss of: must be comprehensive to adequately train staff at T• Internal controls; employment and annually thereafter. Ongoing training sssssssssssssssssssssssssssssssssssssss�ssssssssssssss • Independent testing should also be provided, which may occur during staff sssssssssssssssssssssssss�ssss�sssssssssss�ssss • A specifically designated BSA officer; and meetings, webinars, brown bag lunches, or one-on-one • Ongoing training for appropriate staff. situations. The key is to use appropriate training as may be necessary and conducive to your audience to keep Risk for Vendors These are often referred to as the four pillars. To support staff informed of ongoing regulatory changes and any sssssssssssssssssssssssssssssssssssssssssssssss�sssssss these pillars, a foundation is also required - a customer issued bulletins. Federal record-keeping of BSA training ssssssssssssssssssssssssssssssss�ssssssssssssssss�sssssss identification program (CIP). must be maintained, including attendance records and sssssssssss�sssssssssssssssssssssssssssssssssssssss�ss copies of materials. Internal controls are those policies, procedures and �sssssssssssssssssssssssssssss processes that an institution implements to control and The Customer Identification Program (CIP), often referred mitigate its risk and to achieve compliance with the BSA. to as the fifth pillar, is the foundation for any effective Costs Internal controls should be commensurate with the size, BSA Program as a customer or member may pose a structure, risks, and complexity of the institution. great risk for BSA violations. All financial institutions are �sssssssssssssssssssssssssssssssssssssssssssssssssss required to have a board approved, written CIP to sssssssssssssssssssssssssssssssssssssssssss�s Independent testing does not mean you have to hire a enable staff to form a reasonable belief that the �sssss��sssssssssssssssssssssssss�sssssssssssssssss third-party to audit your BSA/AML program areas. What institution knows the true identity of its customer or sssssssssss�ssssssssssssssssssssssssssssssssssssssssss it does mean is that it must be performed by a person (or member. None more so than today with the increase of sssssssssssssss�sssssssssssssssssssssssssssss persons) who are not involved with the institution’s BSA/ identity theft is it so essential that an institution know its It’s your turn to AML compliance staff. Additionally, independent refers customer or member. At a minimum, generally, the to whether or not such persons report directly to the institution must obtain from each customer or member Join the innerCircle Reports Board of Directors or its designated committee that before opening the account, the name, date of birth �sssssssssssssssssssssssssssssssss�ssssssss�ssss consists primarily of outside directors, if at all. Most (for individual), address, and an identification number. community institutions do not have a separate audit The CIP must include risk-based procedures for verifying sssssssssssssssssssssssssssssssssssssssssssssssssssss staff, and thus, farm out the work to third parties. The the identity, although it need not establish the accuracy ssssssssssssssssss�sssssssssssssssssssssssssss�sssss audit should be comprehensive, accurate, adequate of every element of the identification information, it must sssssssssssssssssssssssssssssssssssssssss and timely. Best practice is an annual independent be verified with enough information to form a reasonable audit, but in no event should the review cycle exceed belief that you know the true identity of your customer or 18 months. If you are under any type of a BSA order, a member. Please Your Regulators With A more frequent review may be appropriate. This is a very high level of the key components of the BSA The BSA Officer must be appointed by the Board of Program. To ensure compliance with the regulations and Vendor Management System Directors and is responsible for the overall BSA/AML examiner expectations, each institution should perform program. That does not mean such person does all of its own thorough BSA Program review. the work, but like any other manager, is responsible to ensure all of it gets done. The BSA officer must be A BSA Program Review template based on the 2010 FFIEC empowered with the necessary authority and resources BSA Examination Manual is available to TriComply 205.991.5636 | [email protected] to effectively execute all applicable duties. When Members at no additional cost. For non-members, it is .com designating the BSA Officer and staff, the Board of available for $99. Please call 205.991.5636 or email Directors is responsible for ensuring that they have the [email protected] for details.

TriComply Financial Compliance Journal | Pg 15 The New SAR Form On the Job by Ryan Loftis burden on financial institutions or to change existing activity, such information should be entered into the Member FDIC requirements or expectations. The additional data is to applicable fields, instead of written in the Narrative Since graduating from Auburn University with a degree enable law enforcement to more quickly analyze the section. in finance in December of 2003, Katie Garlington has tens of thousands of filings received and to make filings dedicated her career to regulatory compliance in for institutions easier, less time consuming and less costly. Spreadsheet attachments Alabama banking. Her experience includes 4 years as As always, institutions are expected to complete what As previously mentioned, the new SAR form will accept an auditor with Regions Financial Corporation in they know (or later learn) and not to try to solve the a single, comma-separated value (CSV) spreadsheet- Birmingham and a stint as vice president and senior compliance officer at West Alabama Bank & Trust in case. like attachment as part of the report. Such attachments Katie Garlington Reform. In February of 2011, she joined Central State will be considered part of the narrative and reference Compliance Officer Bank in Calera as a compliance officer for the second Critical fields to the attachment should be made in the Narrative. Calera, AL | Est 1916 time. Among her certifications are one from the ABA In a paper filing, if you didn’t know the information, you But, in no event will the attachment serve as a substitute www.centralstatebank.com could leave the space on the form blank. Not so with for the Narrative. No other document may be attached National Compliance School in 2006 and one from the data captured in an electronic filing; if something is to the suspicious activity report form. All other supporting ABA Graduate School of Compliance Risk Management agency websites (Federal Reserve, FDIC, OCC, FFIEC, unknown, you must check the box marked unknown. documentation must be retained at the financial in 2008. CFPB), Federal Reserve Consumer Compliance Hand- Similarly, where you could write out information on a institution in the supporting documentation file. book, interagency guidelines, Consumer Compliance paper form, electronic data capture now requires you In a recent conversation with Garlington, she discussed Outlook (FRB), Bankers Online, American Bankers Asso- to check off the appropriate information or complete important facts about banking compliance, the skills ciation (ABA). I am registered for free email notifica- the required field. So, if it has an *, be prepared to and qualities necessary for a successful compliance tions from most of these sites as well. TriComply is a complete the information. officer and how stricter regulations have changed the great resource for a really reasonable price. way banks operate. SAR Narrative Q: How would you describe the greatest resource a The SAR narrative will remain a critical component of compliance officer provides? the SAR filing. However, with the new suspicious activity Q: Why did you start working in banking compliance? reporting categories and the ability to attach a relevant A: Providing management with the knowledge of spreadsheet, fewer characters were deemed necessary A: I guess you could say that I lucked into banking what the risks are and helping to maintain the level of in the narrative section. compliance. I think most people that are in the risk that management has set for the bank. A lot of it is compliance field would probably say the same. In my damage control and being able to effectively “Gender” Field case, my entire career has been in banking compliance. implement regulatory requirements with the least Item 4 in Part I of Subject Information of the new SAR When I graduated Auburn University, my first job was at amount of operational impact. asks for the gender of the suspect. Law enforcement Regions Financial Corporation in their Internal Audit feedback said gender information of the subject could Department. Regions is so large that the audit Q: What changes have you seen in the industry since be an important characteristic when inquiries are department is divided into specialized audit groups. I you started? made. Due to potential conflicts with other regulations, was placed in the compliance audit group. FinCEN offered guidance. The use of the gender field is A: The biggest change that I have seen in the industry not mandatory; it is recommended if you know the Q: What skills and qualities do you feel are necessary with respect to banking compliance would be the level gender of the suspect(s). In no event is the use of the for a successful compliance officer? of importance the compliance officer role has become gender field meant to impose a new requirement on over time due to the amount of increased banking reg- financial institutions to manually or electronically collect A: A successful compliance officer most importantly ulations. For a long time compliance was just a cost Meet TriComply has to have and maintain a working knowledge of the gender information. FinCEN reminds financial institutions Katherine E. Timon is a Senior center for the larger banks and another “hat” at com- regulations. In addition, they should have an that the collection of gender information should not Compliance Advisor with the munity banks, but now there are not enough of us out understanding of the products and services offered conflict with the financial institution’s obligations under TriComply team. In these times there to fill the demand. and the regulatory impact. I think it is also being able to any other applicable law. of UDAAP scrutiny, Katherine identify the risks and implement controls to mitigate the brings to the team her expertise Q: If you were in charge of the regulatory agencies, risk to the level management has set. NAICS Code in prosecuting cases under Flori- what changes would you make? FinCEN reemphasized that financial institutions are only da’s Unfair and Deceptive Trade Q: What is your overall biggest challenge? expected to provide that information for which they Practices Act while serving as an A: I would hire more bankers or ex-bankers to work have direct knowledge and that an institution should Assistant Attorney General. She within the agencies. These people know how a bank A: I would say juggling the time it takes to keep up with not search or otherwise investigate for additional has 40 trial victories to her credit runs and how regulatory changes impact banking. You a constant stream of regulatory changes and the information when the occupation or business type is where she successfully defended clients, including the New York can know the regulations backwards and forwards, but amount of work that goes with updating policies and unknown, just because there is a NAICS code field. State Banking Department, the Department of Labor and the De- if you have never worked in a bank, it is impossible to procedures, implementing regulatory changes, training, partment of Housing and Community Renewal, among others, in know the true impact of regulatory changes on a bank etc. while also trying to maintain the appropriate Fields Related to Internet Presence matters in state and federal court. For the past few years, Katherine operational level. amount of monitoring reviews. Certain new data elements related to the Internet has advised over 1,000 financial institutions on compliance related presence of subjects and suspicious activity have been matters. Admitted to practice law in New York and Florida as well Q: What tools do you use to help you accomplish your added. In particular, the e-mail, websites and/or URL as before the US Supreme Court, Katherine received her Juris Doc- job? address fields under Subject Information and IP address torate degree from Brooklyn Law School and her Bachelor of Arts under suspicious activity are new. If you know the from Stony Brook University, NY. Internet presence of the subject or the suspicious A: There are a lot of tools out there. The regulatory

14 TriComply Financial Compliance Journal | Pg 11 facilitate auto populating certain other data, but they System code (NAICS code), long used by businesses did not re-order the numbering for either the questions and government to standardize the classification of or the Part sections. For example, you still start with businesses, industries and entities. The new electronic question #1, but then immediately jump to Part IV, SAR form will provide for a drop down menu to assist in question #82. Once you enter the Filing Institution completing this section. Contact Information, additional data throughout the form will also auto populate. The new organizational The critical information for address, city, state and zip order of the form is: code are required. This information will generate data for law enforcement’s use by generating a GEO code •Part IV - Filing Institution Contact Information (formerly based on the address and identifying the address as Reporting Business); being in a HIFCA or HIDTA location. •Part III - Information About Financial Institution Where Activity Occurred (formerly Transaction Location); Under Suspicious Activity Information, like the old form, •Part I - Subject information; the new form asks for the amount of money involved in •Part II - Suspicious Activity Information; and this report and date or range of dates of the suspicious •Part V - The Narrative. activity. A list of products and instrument types and a listing of categories of various suspicious activities is The SAR data fields are sometimes referred to as provided, and you are asked to check all that apply. “questions.” Certain questions are considered critical fields which must be answered and are identified by an Part V is still allocated for the narrative description of asterisk (*). The first entry on the new SAR form, Type of the suspicious activity. This is a critical section of the SAR Filing, will identify the kind of report that is being filed, form and deserves the institution’s appropriate whether it is an initial report or one to correct or amend attention. Space is limited to 17,000 characters or a prior report, or is a continuing activity report. This is a approximately (5) single-spaced pages. FinCEN expects critical information field. this space to be used by financial institutions to give an analytical explanation of the reasons for its suspicions, Part IV is the section for the Filing Institution’s Contact not just a recitation of facts. Information. Information requested includes the institution’s primary regulator, the institution’s TIN, the FinCEN found that institutions often attach tabular data type of institution, address, city, state and zip code, to the SAR narrative to assist in explaining the basis for designated contact office information and law their conclusion of suspicious activity. These attachments enforcement contact information. are not captured on the old electronic SAR form in a manner that can be easily accessed. Accordingly, on Part III of the new SAR form is for information concerning the new electronic SAR form, FinCEN will enable a the financial Institution where the suspicious activity reporting institution to attach one such tabular format occurred. If the activity occurred at multiple branches document (Excel-type spreadsheets limited to 1 MB) to or institutions, you must complete a Part III section for the narrative section of the new form. Attachments of each branch or institution. Information requested this type are purely voluntary and for the purpose of includes the type of financial institution, the institution’s assisting filers in their analytical presentation of the primary regulator, identification number, legal name, reasons for their suspicions. This ability to attach a any alternate names, TINs, address, city, state and spreadsheet type file is not intended to permit filers to by Katherine E.Timon country. This data will automatically generate GEO add “supporting documentation,” as defined by the codes, High Intensity Financial Crimes Area (“HIFCA”) regulation, to the narrative. Indeed, FinCEN’s position codes, and High Intensity Drug Trafficking Area (“HIDTA”) on SARs is that the SAR is a lead-generating document codes for law enforcement use. only and is not intended to be direct evidence of the underlying events described in the SAR. The New Suspicious Activity Reporting Form Part II Subject Information, like the old form, requires critical identifying information such as the Last and First New Guidance The long anticipated new suspicious activity form (SAR) activity reporting form. FinCEN provided a break on the names, the Middle names and any Suffixes, such as Sr. On March 29, 2012, FinCEN issued guidance with has finally arrived! The new SAR was initially expected to narrative by reducing the number of available or Jr. for the subject of the suspicious activity report. respect to the new SAR and CTR forms in response to go-live July 1, 2012 along with the new mandatory characters from 39,000 to 17,000 characters. In other However, new fields have been added. For example, if several industry inquiries. Additionally, it recognized that e-filing. However, it wasn’t ready, and a reprieve to use words, do not regurgitate all of the information you just gender and alternate names are known, such it may need to develop further guidance as well as the new form was granted. Although not required until checked off in the prior 98 data fields; tell FinCEN clearly information should be provided in the question section educational webinars. TriComply’s Compliance March 31, 2013, institutions are encouraged to use the and concisely why you think the activity is suspicious. instead of the Narrative. Multiple entries for alternate Calendar will also incorporate such information as it new form effective immediately. Until that date, either And, there is more hope. The new SAR form is designed names like a/k/a or a D/B/A information are allowed becomes available. form may be used for e-filing only. The form warns that to accommodate multiple types of industries. So, once where the person or entity has more than one alternate you may not use the new form for paper filing. you pick your industry, non-applicable sections will name. Characterizations of Suspicious Activity. automatically grey-out. To facilitate a more effective use of the information Although FinCEN did not hit the “Ask 100 questions,” it The new SAR form also asks for occupation or type of collected in SARS, additional data elements were came close with 98 questions on the new suspicious What is new? First, you have not unlearned how to business using the North American Industry Classification added to the form. The intent is not to increase the count. FinCEN reorganized the new e-filing SAR form to

12 TriComply Financial Compliance Journal | Pg 13 facilitate auto populating certain other data, but they System code (NAICS code), long used by businesses did not re-order the numbering for either the questions and government to standardize the classification of or the Part sections. For example, you still start with businesses, industries and entities. The new electronic question #1, but then immediately jump to Part IV, SAR form will provide for a drop down menu to assist in question #82. Once you enter the Filing Institution completing this section. Contact Information, additional data throughout the form will also auto populate. The new organizational The critical information for address, city, state and zip order of the form is: code are required. This information will generate data for law enforcement’s use by generating a GEO code •Part IV - Filing Institution Contact Information (formerly based on the address and identifying the address as Reporting Business); being in a HIFCA or HIDTA location. •Part III - Information About Financial Institution Where Activity Occurred (formerly Transaction Location); Under Suspicious Activity Information, like the old form, •Part I - Subject information; the new form asks for the amount of money involved in •Part II - Suspicious Activity Information; and this report and date or range of dates of the suspicious •Part V - The Narrative. activity. A list of products and instrument types and a listing of categories of various suspicious activities is The SAR data fields are sometimes referred to as provided, and you are asked to check all that apply. “questions.” Certain questions are considered critical fields which must be answered and are identified by an Part V is still allocated for the narrative description of asterisk (*). The first entry on the new SAR form, Type of the suspicious activity. This is a critical section of the SAR Filing, will identify the kind of report that is being filed, form and deserves the institution’s appropriate whether it is an initial report or one to correct or amend attention. Space is limited to 17,000 characters or a prior report, or is a continuing activity report. This is a approximately (5) single-spaced pages. FinCEN expects critical information field. this space to be used by financial institutions to give an analytical explanation of the reasons for its suspicions, Part IV is the section for the Filing Institution’s Contact not just a recitation of facts. Information. Information requested includes the institution’s primary regulator, the institution’s TIN, the FinCEN found that institutions often attach tabular data type of institution, address, city, state and zip code, to the SAR narrative to assist in explaining the basis for designated contact office information and law their conclusion of suspicious activity. These attachments enforcement contact information. are not captured on the old electronic SAR form in a manner that can be easily accessed. Accordingly, on Part III of the new SAR form is for information concerning the new electronic SAR form, FinCEN will enable a the financial Institution where the suspicious activity reporting institution to attach one such tabular format occurred. If the activity occurred at multiple branches document (Excel-type spreadsheets limited to 1 MB) to or institutions, you must complete a Part III section for the narrative section of the new form. Attachments of each branch or institution. Information requested this type are purely voluntary and for the purpose of includes the type of financial institution, the institution’s assisting filers in their analytical presentation of the primary regulator, identification number, legal name, reasons for their suspicions. This ability to attach a any alternate names, TINs, address, city, state and spreadsheet type file is not intended to permit filers to by Katherine E.Timon country. This data will automatically generate GEO add “supporting documentation,” as defined by the codes, High Intensity Financial Crimes Area (“HIFCA”) regulation, to the narrative. Indeed, FinCEN’s position codes, and High Intensity Drug Trafficking Area (“HIDTA”) on SARs is that the SAR is a lead-generating document codes for law enforcement use. only and is not intended to be direct evidence of the underlying events described in the SAR. The New Suspicious Activity Reporting Form Part II Subject Information, like the old form, requires critical identifying information such as the Last and First New Guidance The long anticipated new suspicious activity form (SAR) activity reporting form. FinCEN provided a break on the names, the Middle names and any Suffixes, such as Sr. On March 29, 2012, FinCEN issued guidance with has finally arrived! The new SAR was initially expected to narrative by reducing the number of available or Jr. for the subject of the suspicious activity report. respect to the new SAR and CTR forms in response to go-live July 1, 2012 along with the new mandatory characters from 39,000 to 17,000 characters. In other However, new fields have been added. For example, if several industry inquiries. Additionally, it recognized that e-filing. However, it wasn’t ready, and a reprieve to use words, do not regurgitate all of the information you just gender and alternate names are known, such it may need to develop further guidance as well as the new form was granted. Although not required until checked off in the prior 98 data fields; tell FinCEN clearly information should be provided in the question section educational webinars. TriComply’s Compliance March 31, 2013, institutions are encouraged to use the and concisely why you think the activity is suspicious. instead of the Narrative. Multiple entries for alternate Calendar will also incorporate such information as it new form effective immediately. Until that date, either And, there is more hope. The new SAR form is designed names like a/k/a or a D/B/A information are allowed becomes available. form may be used for e-filing only. The form warns that to accommodate multiple types of industries. So, once where the person or entity has more than one alternate you may not use the new form for paper filing. you pick your industry, non-applicable sections will name. Characterizations of Suspicious Activity. automatically grey-out. To facilitate a more effective use of the information Although FinCEN did not hit the “Ask 100 questions,” it The new SAR form also asks for occupation or type of collected in SARS, additional data elements were came close with 98 questions on the new suspicious What is new? First, you have not unlearned how to business using the North American Industry Classification added to the form. The intent is not to increase the count. FinCEN reorganized the new e-filing SAR form to

12 TriComply Financial Compliance Journal | Pg 13 The New SAR Form On the Job by Ryan Loftis burden on financial institutions or to change existing activity, such information should be entered into the Member FDIC requirements or expectations. The additional data is to applicable fields, instead of written in the Narrative Since graduating from Auburn University with a degree enable law enforcement to more quickly analyze the section. in finance in December of 2003, Katie Garlington has tens of thousands of filings received and to make filings dedicated her career to regulatory compliance in for institutions easier, less time consuming and less costly. Spreadsheet attachments Alabama banking. Her experience includes 4 years as As always, institutions are expected to complete what As previously mentioned, the new SAR form will accept an auditor with Regions Financial Corporation in they know (or later learn) and not to try to solve the a single, comma-separated value (CSV) spreadsheet- Birmingham and a stint as vice president and senior compliance officer at West Alabama Bank & Trust in case. like attachment as part of the report. Such attachments Katie Garlington Reform. In February of 2011, she joined Central State will be considered part of the narrative and reference Compliance Officer Bank in Calera as a compliance officer for the second Critical fields to the attachment should be made in the Narrative. Calera, AL | Est 1916 time. Among her certifications are one from the ABA In a paper filing, if you didn’t know the information, you But, in no event will the attachment serve as a substitute www.centralstatebank.com could leave the space on the form blank. Not so with for the Narrative. No other document may be attached National Compliance School in 2006 and one from the data captured in an electronic filing; if something is to the suspicious activity report form. All other supporting ABA Graduate School of Compliance Risk Management agency websites (Federal Reserve, FDIC, OCC, FFIEC, unknown, you must check the box marked unknown. documentation must be retained at the financial in 2008. CFPB), Federal Reserve Consumer Compliance Hand- Similarly, where you could write out information on a institution in the supporting documentation file. book, interagency guidelines, Consumer Compliance paper form, electronic data capture now requires you In a recent conversation with Garlington, she discussed Outlook (FRB), Bankers Online, American Bankers Asso- to check off the appropriate information or complete important facts about banking compliance, the skills ciation (ABA). I am registered for free email notifica- the required field. So, if it has an *, be prepared to and qualities necessary for a successful compliance tions from most of these sites as well. TriComply is a complete the information. officer and how stricter regulations have changed the great resource for a really reasonable price. way banks operate. SAR Narrative Q: How would you describe the greatest resource a The SAR narrative will remain a critical component of compliance officer provides? the SAR filing. However, with the new suspicious activity Q: Why did you start working in banking compliance? reporting categories and the ability to attach a relevant A: Providing management with the knowledge of spreadsheet, fewer characters were deemed necessary A: I guess you could say that I lucked into banking what the risks are and helping to maintain the level of in the narrative section. compliance. I think most people that are in the risk that management has set for the bank. A lot of it is compliance field would probably say the same. In my damage control and being able to effectively “Gender” Field case, my entire career has been in banking compliance. implement regulatory requirements with the least Item 4 in Part I of Subject Information of the new SAR When I graduated Auburn University, my first job was at amount of operational impact. asks for the gender of the suspect. Law enforcement Regions Financial Corporation in their Internal Audit feedback said gender information of the subject could Department. Regions is so large that the audit Q: What changes have you seen in the industry since be an important characteristic when inquiries are department is divided into specialized audit groups. I you started? made. Due to potential conflicts with other regulations, was placed in the compliance audit group. FinCEN offered guidance. The use of the gender field is A: The biggest change that I have seen in the industry not mandatory; it is recommended if you know the Q: What skills and qualities do you feel are necessary with respect to banking compliance would be the level gender of the suspect(s). In no event is the use of the for a successful compliance officer? of importance the compliance officer role has become gender field meant to impose a new requirement on over time due to the amount of increased banking reg- financial institutions to manually or electronically collect A: A successful compliance officer most importantly ulations. For a long time compliance was just a cost Meet TriComply has to have and maintain a working knowledge of the gender information. FinCEN reminds financial institutions Katherine E. Timon is a Senior center for the larger banks and another “hat” at com- regulations. In addition, they should have an that the collection of gender information should not Compliance Advisor with the munity banks, but now there are not enough of us out understanding of the products and services offered conflict with the financial institution’s obligations under TriComply team. In these times there to fill the demand. and the regulatory impact. I think it is also being able to any other applicable law. of UDAAP scrutiny, Katherine identify the risks and implement controls to mitigate the brings to the team her expertise Q: If you were in charge of the regulatory agencies, risk to the level management has set. NAICS Code in prosecuting cases under Flori- what changes would you make? FinCEN reemphasized that financial institutions are only da’s Unfair and Deceptive Trade Q: What is your overall biggest challenge? expected to provide that information for which they Practices Act while serving as an A: I would hire more bankers or ex-bankers to work have direct knowledge and that an institution should Assistant Attorney General. She within the agencies. These people know how a bank A: I would say juggling the time it takes to keep up with not search or otherwise investigate for additional has 40 trial victories to her credit runs and how regulatory changes impact banking. You a constant stream of regulatory changes and the information when the occupation or business type is where she successfully defended clients, including the New York can know the regulations backwards and forwards, but amount of work that goes with updating policies and unknown, just because there is a NAICS code field. State Banking Department, the Department of Labor and the De- if you have never worked in a bank, it is impossible to procedures, implementing regulatory changes, training, partment of Housing and Community Renewal, among others, in know the true impact of regulatory changes on a bank etc. while also trying to maintain the appropriate Fields Related to Internet Presence matters in state and federal court. For the past few years, Katherine operational level. amount of monitoring reviews. Certain new data elements related to the Internet has advised over 1,000 financial institutions on compliance related presence of subjects and suspicious activity have been matters. Admitted to practice law in New York and Florida as well Q: What tools do you use to help you accomplish your added. In particular, the e-mail, websites and/or URL as before the US Supreme Court, Katherine received her Juris Doc- job? address fields under Subject Information and IP address torate degree from Brooklyn Law School and her Bachelor of Arts under suspicious activity are new. If you know the from Stony Brook University, NY. Internet presence of the subject or the suspicious A: There are a lot of tools out there. The regulatory

14 TriComply Financial Compliance Journal | Pg 11 om TriNovus BankerVMS Managing Vendors Can Be So E a s y ...You Get The Idea! by Leah M. Hamilton Manage Documents sssssssssssssssssssssssssssssssssssssssssssssssssssssss ssssssssssssssssssssssssssssssssssssssssssssssssssssss ssssssssssssssssssssssssssssssss The Four Pillars of BSA

Contracts o ensure compliance with the Bank Secrecy Act necessary competency and have no conflict of interests. �sssssssssssssssssssssssssssssssssssssssssssssssssssss (BSA) and its implementing regulations, a financial Training is the fourth pillar of an effective BSA Program. ssssssssssssss�ssssssssssssssssssssssssssssssssss�sssss institution must have a BSA Program that consists Training need not be formal conference training, but it sssss�ssssssssss�sssssssssssssssssssssssssssssssssssssss of: must be comprehensive to adequately train staff at T• Internal controls; employment and annually thereafter. Ongoing training sssssssssssssssssssssssssssssssssssssss�ssssssssssssss • Independent testing should also be provided, which may occur during staff sssssssssssssssssssssssss�ssss�sssssssssss�ssss • A specifically designated BSA officer; and meetings, webinars, brown bag lunches, or one-on-one • Ongoing training for appropriate staff. situations. The key is to use appropriate training as may be necessary and conducive to your audience to keep Risk for Vendors These are often referred to as the four pillars. To support staff informed of ongoing regulatory changes and any sssssssssssssssssssssssssssssssssssssssssssssss�sssssss these pillars, a foundation is also required - a customer issued bulletins. Federal record-keeping of BSA training ssssssssssssssssssssssssssssssss�ssssssssssssssss�sssssss identification program (CIP). must be maintained, including attendance records and sssssssssss�sssssssssssssssssssssssssssssssssssssss�ss copies of materials. Internal controls are those policies, procedures and �sssssssssssssssssssssssssssss processes that an institution implements to control and The Customer Identification Program (CIP), often referred mitigate its risk and to achieve compliance with the BSA. to as the fifth pillar, is the foundation for any effective Costs Internal controls should be commensurate with the size, BSA Program as a customer or member may pose a structure, risks, and complexity of the institution. great risk for BSA violations. All financial institutions are �sssssssssssssssssssssssssssssssssssssssssssssssssss required to have a board approved, written CIP to sssssssssssssssssssssssssssssssssssssssssss�s Independent testing does not mean you have to hire a enable staff to form a reasonable belief that the �sssss��sssssssssssssssssssssssss�sssssssssssssssss third-party to audit your BSA/AML program areas. What institution knows the true identity of its customer or sssssssssss�ssssssssssssssssssssssssssssssssssssssssss it does mean is that it must be performed by a person (or member. None more so than today with the increase of sssssssssssssss�sssssssssssssssssssssssssssss persons) who are not involved with the institution’s BSA/ identity theft is it so essential that an institution know its It’s your turn to AML compliance staff. Additionally, independent refers customer or member. At a minimum, generally, the to whether or not such persons report directly to the institution must obtain from each customer or member Join the innerCircle Reports Board of Directors or its designated committee that before opening the account, the name, date of birth �sssssssssssssssssssssssssssssssss�ssssssss�ssss consists primarily of outside directors, if at all. Most (for individual), address, and an identification number. community institutions do not have a separate audit The CIP must include risk-based procedures for verifying sssssssssssssssssssssssssssssssssssssssssssssssssssss staff, and thus, farm out the work to third parties. The the identity, although it need not establish the accuracy ssssssssssssssssss�sssssssssssssssssssssssssss�sssss audit should be comprehensive, accurate, adequate of every element of the identification information, it must sssssssssssssssssssssssssssssssssssssssss and timely. Best practice is an annual independent be verified with enough information to form a reasonable audit, but in no event should the review cycle exceed belief that you know the true identity of your customer or 18 months. If you are under any type of a BSA order, a member. Please Your Regulators With A more frequent review may be appropriate. This is a very high level of the key components of the BSA The BSA Officer must be appointed by the Board of Program. To ensure compliance with the regulations and Vendor Management System Directors and is responsible for the overall BSA/AML examiner expectations, each institution should perform program. That does not mean such person does all of its own thorough BSA Program review. the work, but like any other manager, is responsible to ensure all of it gets done. The BSA officer must be A BSA Program Review template based on the 2010 FFIEC empowered with the necessary authority and resources BSA Examination Manual is available to TriComply 205.991.5636 | [email protected] to effectively execute all applicable duties. When Members at no additional cost. For non-members, it is .com designating the BSA Officer and staff, the Board of available for $99. Please call 205.991.5636 or email Directors is responsible for ensuring that they have the [email protected] for details.

TriComply Financial Compliance Journal | Pg 15 RMLOs No Longer Exempt from customer whose relationship you acquired and have community member, but neither has been a customer by Leah M. Hamilton not previously identified, then, you must identify the of your institution. You must still apply your CIP to these Mandatory BSA Requirements customer at that time. There is an exemption from individuals when they become your customer. for individuals financing the sale of identification for financial institutions regulated by their own real estate. For example, federal or state agencies and for publicly traded Once you have put a customer through your Customer individuals employed by a loan or companies listed on the New York or American stock Identification Program and have identified the finance company that would be exchanges, or in the NASDAQ National Market System customer, if the customer opens additional accounts, not be subject to the rule include (except for small-capitalization segment). there is no requirement that you identify the customer administrative assistants and office again as long as you have a reasonable belief that you clerks who gather documents, re- Often the question arises, “Who is your customer?” Your know the true identity of your customer. view land records and complete customer is the account owner. If there are multiple forms on behalf of a lender or origi- owners of an account, then, all of the owners are your CIP should not be confused with obtaining identification nator. customer, and all must be identified. If the person who for other BSA purposes such as wires, monetary applies to open an account with you is an individual, instruments, CTRs, SARs, and other required transaction RMLOs will be required to have a the determination is easy. The individual is or will reporting. In those transactions, you must obtain, verify senior management approved, become your customer. On the other hand, if your or maintain the necessary identification of the AML Program in place, which must customer is a juridical entity, that is an organization conductor, beneficiary, originator, etc. as applicable include, at a minimum, the four pil- created by law, sometimes the determination of who is to the account or transaction. lars: (1) the development of internal your customer is more difficult. policies, procedures, and controls; (2) the designation of a compliance If the account owner is a corporation, the corporation officer; (3) an ongoing employee is your customer. You are required to identify the Meet TriComply training program; and (4) an inde- corporation, but you are not required to identify persons Blair Rugh is one of the preemi- pendent audit function to test pro- that are associated with the corporation such as the nent experts on United States grams. Each loan or finance com- stockholders, directors, officers or the signers on the banking laws and regulations. He pany is required to develop and account. Some institutions require the identification of has authored compliance manu- implement an anti-money launder- the stockholders or other persons affiliated in some way als recognized by the banking in- ing program reasonably designed with closely held corporations that are their customers. dustry as the definitive treatise to prevent the loan or finance com- That is certainly permissible, but it is not required. on banking law and regulation. The 10-year reprieve from manda- residential mortgage loan. In addi- pany from being used to facilitate Similarly, if the owner of your account is a limited liability He has extensive experience as a tory Anti-money Laundering (AML) tion, the rule will apply to residential money laundering or the financing company or a limited partnership, the limited liability speaker to bankers’ associations Programs and suspicious activity re- mortgage originators, regardless of of terrorist activities. company or limited partnership is your customer and is and has written numerous articles published in banking journals. porting (SAR) is soon to end for cer- whether they receive compensation the only entity or person that must be identified. With more than 20 years experience in commercial and investment tain loan and finance companies. or gain for acting in that capacity. The new SAR form has been designed banking, Mr. Rugh’s background includes a Bachelor of Science de- Generally, the final rule is intended FinCEN deliberately expanded the with loan and finance companies in If your customer is a partnership, it is the entity that must gree in chemical engineering from the University of Kansas as well to cover initial purchase money definition with just a few simple word mind. Although most have volun- be identified. Frequently, two or more persons may form as a juris doctor degree from Southern Methodist University Law loans and traditional refinancing changes in order to cast a wide net, tarily filed SARs in the past, RMLOs a partnership where there is no written partnership School. transactions facilitated by residen- with few exceptions. will now be subject to mandatory agreement; therefore, no way to identify the partnership. tial mortgage lenders (RMLOs). Non- reporting requirements. In that event, you identify the individual partners. Meet TriComply bank RMLOs, which are generally Exempt from the definition of RMLO Leah M. Hamilton is the Direc- known as “mortgage companies” is any government sponsored enter- With an effective date of April, 16, If your account owner is a trust, you identify the trust. tor of TriComply Services with and “mortgage brokers” in the resi- prise (GSE) regulated by the Fed- 2012, and a mandatory compliance The settlor of the trust, the trustees and the beneficiaries TriNovus. She has more than 17 dential mortgage business sector, eral Housing Finance Agency. GSEs date of August 13, 2012, RMLOs will are not your customers, and there is no requirement years of experience in the finan- are a significant subset of the “loan have an established procedure for surely be in a scurry to ensure its op- that you identify them. In my opinion, there is an cial services industry. Leah is one or finance company” category, in reporting suspicious activity to the erational policies, procedures and exception to that when your customer is a revocable of the nation’s sought after com- terms of the number of businesses FHFA, which then reports the suspi- processes will pass muster under the trust. In that case, there is such a close relationship pliance instructors and consul- and the aggregate volume and cious activity to FinCEN. Addition- new regulatory requirements for an between the settlors of the trust and the trust because tants. She brings her passion for value of transactions they facilitate. ally, as long as a mortgage servicer AML Program and SAR reporting. the settlors may revoke the trust at any time and compliance and real world stories does not extend residential mort- A loan or finance company will be become the account owners. I believe that the better to engage the audience and offer A closer look at the definition of a gage loans or offer or negotiate required to make a copy of its AML policy is to also identify the settlors of the trust. If the levity to very tough topics. As a compliance expert, Leah has served residential mortgage originator is the terms of a residential mortgage Program available to FinCEN or its owner of your account is an unincorporated association as the lead compliance consultant and advisor on several consent essential as it changed significantly loan application, it will not fall under designee upon request. Compli- such as the Thursday Night Guy’s Bowling, Beer and order remediation engagements, focusing on Consumer Compliance from the proposed definition which of the definition of residential mort- ance will be examined by FinCEN Belch club, then, you identify the person opening the and BSA/AML. A licensed attorney for more than 10 years, Leah initially corresponded with the SAFE gage loan originator. The final rule or its delegates in accordance with account. received her Juris Doctorate from Northern Illinois University Col- Act. A residential mortgage origina- does not contemplate coverage of the BSA. lege of Law, and her Bachelor of Arts in General Studies degree tor is a person who accepts a resi- an individual employed by a loan Lastly, there is the scenario where you have known an from the University of Texas at Dallas where she majored in law dential mortgage loan application or finance company or financial in- individual forever, such as a relative or long standing and minored in business management. or offers or negotiates terms of a stitution and provides an exception

16 TriComply Financial Compliance Journal | Pg 9 Who Are You Required To Identify? To Report or Not to Report? That is the Question by Alison Hawkins We have all been there, you have completed your What you thought was just a little indigestion after lunch, investigation from the teller’s report of suspicious may actually be the missing piece in an FBI investigation. activity; yet, you are still completely puzzled as to what in the world this customer could be doing. No one wants to file a SAR on someone that is completely The activity looks suspicious at a quick glance, but innocent, but how far must you go to prove your case. you have at least three ideas for situations that Sometimes we misinterpret our responsibility to would justify the activity. You have spoken with investigate when determining whether or not to file a the relationship officer and received the standard, SAR. Keep in mind, the SAR is merely a report of “Oh, no way, he is a good customer.” Or “I have suspicious activity. As much as I think I would enjoy banked him for 25 years. He is a good business being a criminal investigator, that isn’t our job. We man and we go to church together.” are not the police, and we do not have And my personal favorite, “He to solve the case in order to brings donuts in every Friday determine the activity is morning for everyone.“ So reportable. now what? Do I file or not? In performing your Unfortunately, investigation, keep in providing an endless mind to watch for supply of donuts the little things. does not make Search the internet someone a good for the names of customer. Donuts companies to tend to make which checks or hungry wires are sent. employees look Ask the question the other way. that no one wants Most of us have to hear the answer seen stable, to: when was the even highly last time you profitable, long checked out the term customer collateral? Verify relationships take a signatures when lending turn for the worst in documents are allowed this economy. to be signed outside of the Business owners you bank. (Come on. . .we all would not have worried know it happens, you don’t have about in a million years are to allow it, but put a control in place to by Blair Rugh considering the unthinkable protect your institution just in case.) to keep their business alive Have someone investigate the store front; ection 326 of the USA PATRIOT Act duration in time, such as a deposit account, a credit another quarter. It happens on are they functioning as an unlicensed MSB? mandates that the federal bank regulatory arrangement, a safe deposit box lease or the provision both sides of the fence, the deposit side and the Are they kiting or structuring? Are there signs of identity agencies establish regulations requiring all of cash management, custodian or trust services. Single lending side alike. A few donuts to hide some theft or fraud? U.S. financial institutions subject to their isolated transactions such as cashing a check, the sale kiting or to stop the loan officer from asking “how’s control have formal programs for verifying of a money order or cashier’s check, a wire transfer or business” could be well worth it for a customer in In some cases, you may want to flag the account and the identity of their customers. The rules the use of an ATM, do not create a customer relationship, trouble. continue to watch it closely for another week or two. becameS mandatory on October 1, 2003. The customer although their use by a person may be frequent. An But, in most cases, if you have that little feeling in the pit identification program (CIP) must be a component of institution’s CIP should be completed on a customer So, what do you do when you are faced with a of your stomach that something just doesn’t feel right - the institution’s overall Bank Secrecy Act program and before an account relationship is opened; however, it situation where you are unsure of whether or not to file the SAR. You can certainly amend it later to add must be approved by the institution’s Board of Directors. may be completed after the account is opened report? When in doubt, fill it out. That is my motto additional facts that appeared after submission. And, The CIP is intended to enable the institution to form a provided that all transactions in the account are for suspicious or unusual activity. (Of course, with sometimes it helps to talk it out. It always seems there is reasonable belief that it knows the true identity of each restricted until the identification process is completed. the mandatory e-filing deadline of July 1st for BSA more to the story when you start discussing it, strictly customer. forms fast approaching, I will have to change that confidential, of course. For our members, our team of You are not required to identify the owners of accounts to type it out.) We tend to think of a parade of red experts is here to help you with those quirky situations. For the purpose of CIP, a customer is a person who is that you acquire by either merger or acquisition as your flags with alarms going off when we think of SARs. the owner of an account with the institution. An account relationship was not initiated by the customer. If, The trouble we have is when the activity is only Oh, and the donut guy took the institution for a half a is a formal relationship that is anticipated to have a however, you open an additional account for a sounding that alarm in the pit of our stomach. million in a sticky lending scam.

8 TriComply Financial Compliance Journal | Pg 17 Are You Ready For The New e-Filing by Andrea Guillon one that I would not normally be The first problem with filing SARs under suspicious Requirements? expected to engage in. I have had circumstances is that what is suspicious is very subjective. FinCEN has taken a leap into the them at this time. So, where does response. Unfortunately, if your insti- my account for probably 40 years, What one person thinks is suspicious another may not. 21st Century by requiring e-filing on that leave your institution? Alas, tution hasn’t done so by now, it is and I don’t believe that I have ever The second problem is that the examiners can look at it most of its prevalent forms. In the in- don’t fret, there is some saving too late; so, get cracking! made a cash deposit. The first time I in perfect hindsight. An institution determined that the terest of saving all involved time grace (or should we say “was”) for do it, it probably does not rise to the activity was not suspicious and did not file a SAR. The and money, the two most common some institutions. If your institution is not currently regis- level of something that should be customer was subsequently arrested for money forms—the Suspicious Activity Re- tered for e-filing through FinCEN, it reported. If I continue to do it, then laundering. Also, just because law enforcement is aware ports (SARs) and the Currency Trans- FinCEN issued notification of three can do so by applying for a user ID either the bank would have to ask of the criminal activity is no reason for not filing a SAR. action Reports (CTRs)—are required categories for possible exemption and password on the BSA E-Filing me where the money was coming There was a case in Alabama where a person was to be submitted by e-filing, rather from these requirements on Febru- System website: http://bsaefiling.fin- from and determine a legitimate embezzling money from the company for which he than paper, starting July 1, 2012. ary 24, 2012; institutions had 30 days cen.treas.gov/main.html. After re- purpose for it or file a suspicious worked. He was arrested and committed suicide. The from that date to apply for an ex- ceipt of these items, the system can activity report. bank where he was depositing the embezzled funds felt Institutions are also encouraged to emption. The categories for hard- be securely accessed and e-filing that because law enforcement was already involved file other forms, such as the Reports ship exemptions given were Money can begin—please contain your ex- I don’t know how many times a and the person was dead there was no reason to file a of Foreign Bank and Financial Ac- Services Businesses (MSBs) and/or citement. Detailed instructions for e- banker has called me, described an SAR. Bad decision. counts (FBARs) electronically as small credit unions that lack internet filing are available through the FAQs activity or a pattern of activity on soon as possible; however, this form access and file a limited number of at http://bsaefiling.fincen.treas.gov/ the part of a customer, and asked The BSA requires employee training. Part of that should may still be submitted by paper until reports, and financial institutions FAQs.html. whether or not I thought it was be for front line personnel regarding the types of June 30, 2013. Additionally, special who utilize batch software requiring suspicious. My response normally is transactions that might be suspicious. There should be a exceptions have been made for the a major system conversion or other In addition to the forms listed above, that I don’t know the customer or person or a committee of people in each institution who Currency and Money Instrument Re- extraordinary circumstances. the following forms are currently eli- the situation, but if the activity was determine whether a SAR should be reported. All ports (CMIRs) and Form 8300 (Re- gible for electronic filing: sufficient for the banker to call me to employees should be trained to report to that person or ports of Cash Payment Over $10,000 If extra time is needed by these insti- get my opinion, then, obviously the committee all transactions or conduct that have any Received in a Trade or Business.) tutions to prepare for the change, •Designation of Exempt Person (Fin- banker was suspicious, which means potential of being suspicious. Then, the person or the Due to the nature of those reports, they were required to affirmatively CEN Form 110) a SAR probably should be filed. committee can investigate and make the correct e-filing will not be mandated for request an extension and await a •SAR by the Securities and Futures decision regarding filing.

om TriNovus BankRISK By routinely stress testing your loan portfolio with BankRISK, you can project future strengths and weaknesses based on hypothetical conditions that are imposed upon your institution’s loan, collateral Concentration is and appraisal data. Stress testing quantiies the effect of the chang- ing economic conditions on your bank’s overall losses, earnings, and King capital, thereby identifying potential problem areas in advance. BankRISK’s Key Benefits • Predict the effect of adverse economic conditions • Apprise you of your inherent risk exposure • Effectively evaluate your capital • Determine your appropriate level of risk tolerance • Prepare you to compete for lending business more prootably • Satisfy regulatory requirements

It’s your turn to Join the inner .com 205.991.5636 | [email protected] by Blair Rugh When Two Are One SAR: When Is An Activity Suspicious? continued from page 5 It seems like every regulatory requirement has its season: would normally be expected to Industries (FinCEN Form 101) •Does one corporation supply goods or services to the 20 years ago, it was CRA: 10 years ago, it the Bank engage in, and the bank knows of •SAR by MSBs (FinCEN Form 109) other? Secrecy Act; today, it is Dodd Frank or one of its offspring. no reasonable explanation for the •SAR by Casinos and Card Clubs (FinCEN Form 102) •Does one corporation make payments to third parties BSA compliance is no less important today than it was transaction after examining the •CTR by Casinos (FinCEN Form 103) on behalf of the other? 10 years ago, but because it is no longer a front burner available facts, including the •Registration of MSBs (FinCEN Form 107) item, some financial institutions are not as diligent in background and possible purpose Again, no single factor is determinative. The fact that detecting suspicious activity as they once were. of the transaction. both corporations are in the same business does not, in and of itself, mean that they are not being operated Under the Bank Secrecy Act, financial institutions are One of the most frequent violations separately and independently. It is the intensity of the required to report: is the customer who is aware of the mutual relationships that is the determining factor; CTR reporting requirements but not Meet TriComply unfortunately, that is a subjective decision. Because of Andrea Gullion is a Senior Com- *Criminal violations involving insider abuse in any SAR reporting. To avoid having a that, we recommend that institutions be somewhat pliance Advisor at TriComply amount; CTR filed, the customer makes one aggressive in aggregation determinations. In this Services. With more than 12 *Criminal violations aggregating $25,000 or more when or frequent cash deposits under the circumstance, you will not be criticized for filing a CTR years of experience in banking, a suspect can be identified; $10,000 CTR reporting level. Most when it was not required, but you will be criticized if the Andrea is a former Compliance *Criminal violations aggregating $25,000 or more banking automation systems will examiner thinks that the transactions should have been and CRA Officer for a large com- regardless of a potential suspect; and detect that pattern. The more aggregated and you did not file. *Transactions conducted or attempted by, at, or difficult situation is a transaction or a munity bank. She has advised on fair lending matters referred to the through the institution and aggregating $5000 or more, series of transactions that are not of The new guidance reiterated the requirement to DOJ and assisted in compliance if the institution or affiliate knows suspects, or has reason the type that the customer would aggregate transactions when they are done by the remediation efforts. Andrea is to suspect that the transaction: normally be expected to engage in same person. Thus, if an employee of Company A also a licensed attorney in the state of Alabama, where she has prac- **May involve potential money laundering or and for which the bank is not aware makes a deposit for Company A and a deposit for ticed real estate law at a large firm in Huntsville, Alabama. She has other illegal activity; of any business purpose. For Company B, they must be aggregated to determine extensive compliance experience as well as vast legal knowledge of **Is designed to evade the BSA or its implementing example, if I were to deposit a whether or not a CTR should be filed. Also, if a customer the compliance industry. Andrea received both her Juris Doctor of regulations; or significant amount of cash into my owns several businesses that are not incorporated, Law and Bachelor of Science in Commerce and Business Adminis- ***Has no business or apparent lawful purpose or is not account at my bank, it would then, their accounts are the accounts of the customer, tration from the University of Alabama, Tuscaloosa. the type of transaction that the particular customer certainly be out of the ordinary and and their transactions must be aggregated.

One final interesting issue that the new guidance raises is when a corporation owned by a customer pays a significant number of personal expenses of the A Formal CDD Rule on customer. For example, the corporation may own the home the owner lives in, the car that the owner drives Its Way? and may pay some of the owner’s personal expenses. In those circumstances, the owner of the corporation Despite the obligation of customer due diligence and the corporation may not be operating separately (CDD) implicit in BSA requirements, FinCEN and independently and the owner’s cash transactions should be aggregated with that of the corporation. believes that issuing an express CDD rule that re- quires financial institutions to perform CDD, in- cluding an obligation to categorically obtain ben- Meet TriComply eficial ownership information, may be necessary Alison Hawkins is Vice Presi- dent of TriComply Services. to protect the US financial system from criminal During her 16 plus years in bank- abuse and to guard against terrorist financing, ing, Alison has served as a Com- money laundering and other financial crimes. The pliance Officer, BSA Officer, and initial rules would cover banks, brokers or dealers a Certified Bank Auditor for large in securities, mutual funds, futures commission financial institutions as well as community banks, including a merchants, and introducing brokers in commodi- de novo where she developed and ties. Consideration will be given for extending such implemented the compliance pro- a rule to other financial institutions in the future. gram. As a compliance consultant, she has served as the lead consul- Accordingly, FinCEN issued an Advance Notice tant for a $9 billion bank fair lending review and has successfully of Proposed Rule Making (ANPRM), with a assisted institutions with BSA remediation efforts resulting in re- leases from regulatory agency orders. Alison received her Bachelor comment closing period of May 5, 2012. of Science in Commerce and Business Administration at the Uni- versity of Alabama, Tuscaloosa.

TriComply Financial Compliance Journal | Pg 19 COMPLIANCE Every issue features actual questions Let’s Explore asked by real compliance officers just BSA: When Are Two Customers One? Q A like you from across the nation. Aggregating Transactions for CTRs by Blair Rugh Can you& provide some guidance as to exactly related to MSBs. (specifically page 43591 footnote 46) Q. what topics need to be discussed in a BSA AML OFAC risk assessment? I have one but I am having FDIC We have a convenience store customer that has a examiners and want to be sure it’s correct/complete. Q. tax id number for his corporation and another tax id number for his dba. When completing a SAR which A basic model can be found in the 2010 FFIEC tax id number should I use? This is a repetitive SAR (ev- A.BSA Exam Manual for BSA and OFAC (Appen- ery 90 days) and I just realized the dba had it’s own TIN. dix J and M). You will want to address your institution’s The past 3 SAR’s I have used the corporation TIN. Can I high risk areas with respect to those areas and any put the dba’s TIN in the narrative? high risk customer types and/or products and services You may need to complete two different Part II Is our bank responsible for the OFAC screening A. forms. You would need one for the Q. for the originator of an domestic ACH or does that corporation and another for the dba. fall to the originating institution? We have a member who has provided their ac- sometimes under separately incorporated businesses Corporation A owns a hamburger With respect to domestic ACH transactions, the count number to individuals that are not signers Q. the BSA rules, an with separate taxpayer identification stand, Corporation B owns an ODFI is responsible for verifying that the Origina- on the account for them to be able to e-file and have A. institution must numbers. The aggregation question automobile dealership and tor is not a blocked party and making a good faith ef- their tax return funds come into our member’s account. aggregate the cash depends on whether the businesses Corporation C owns a dairy farm. fort to ascertain that the Originator is not transmitting Since they are not signers, we do not have any infor- transactions of two are run independently of one Each business is run totally blocked funds. The RDFI similarly is responsible for veri- mation on these individuals. Can our member give their separately another or whether in fact they are independent of the others. Each has fying that the Receiver is not a blocked party. In this account number out and does the IRS allow them to incorporated operated as a single business. There its own employees and payroll. way, the ODFI and the RDFI are relying on each other place the funds in an account for which they are not a S customers for the purpose of CTR is a presumption that separately There is no transfer of funds between for compliance with OFAC regulations. signer? Doesn’t the originator have some liability there? reporting if the separate customers incorporated entities are the three corporations. Even though have common ownership and a independent persons, but that the three corporations are all owned If we have an MSB that is a loan customer only, No, the IRS does not allow this type of activity. level of joint operations. In 2001, presumption is rebuttable. by Mr. Jones, they operate are we still required to adhere to the same due This also poses great risk on your institution with re- Q. A. FinCEN issued FinCEN Ruling 2001-2 independently and their transactions diligence requirements that apply to MSBs that have a spect to fraud and BSA requirements. You should check describing one circumstance when For example, assume that your should not be aggregated. deposit relationship with us? the name against the OFAC list, inform your member transactions of separate customers customer Mr. Jones owns three Unfortunately, most cases are not as that your institution does not allow this type of activ- should be aggregated. Recently, separate corporations, corporations clear cut as these two. Yes, you should follow your MSB requirements for ity nor does the IRS. You should also review the activity FinCEN issued a guidance A, B and C, and each corporation all account types. The guidance available for in- and consider a SAR. A similar scenario was included in A. expanding upon its prior direction owns a hamburger stand in your There is no single issue that is stitutions servicing MSBs refers to “accounts”. This would an IRS FAQ document. http://www.irs.gov/individuals/ (FIN-2012-G001). community. Corporation A orders determinative of whether two or include both loan and deposit relationships. Also con- article/0,,id=164570,00.html all of the supplies for all three more separate businesses are being sider the fact that the loan account could be used for FinCEN’s regulations implementing corporations and pays the payroll operated in a manner that makes operational funding and keep a check on what items Regarding direct deposit of someone’s tax refund the Bank Secrecy Act (“BSA”) require for all three corporations. Employees them something other than separate are being provided in their monthly payments. If your into an account that does not bear their name, we Q. financial institutions to aggregate of one of the corporations often and independent. The following are MSB isn’t registered and in compliance with the BSA re- don’t really know there is a name/acct# discrepancy multiple currency transactions “if work at the hamburger stand owned factors that should be considered in quirements, your credit could be at risk with respect to unless the account number is incorrect and unposts or the financial institution has by one of the other corporations. making a determination: repayment. rejects. Are we still responsible for the funds coming knowledge that [the multiple Frequently, funds are transferred •Do the corporations have joint into a valid account number and posting? Do we have transactions] are by or on behalf of between the accounts of the three employees? If our deposit customer is a property management to police every deposit coming in to ensure the name any person and result in either cash corporations and the account of •Do the corporations have separate company and they routinely accept rental pay- and account number match? Q. in or cash out totaling more than each acts as overdraft protection payroll accounts? ments in the form of traveler’s checks or money orders $10,000 during any one business for the other two. They jointly •Are the two corporations in the (sometimes in excess of $1,000 from one tenant in one The taxpayer should follow the IRS rules regarding day.” The issue, therefore, is when advertise the three hamburger same business? day), is the company considered to be a Money Ser- the direct deposit of their refund check. How- transactions are conducted through stands. Clearly, in this case, the three •Are there fund transfers between vice Business, as far as BSA is concerned? A. ever, many of them don’t know the rules or don’t care. the accounts of separate corporations are being operated as the accounts of the two Therefore, the bank should implement prudent proce- corporations by or on behalf of one one business and the BSA rules corporations? No, they would not be considered an MSB if dures to discourage or prohibit this activity. As stated in person. Frequently, an institution require that their transactions be •Do the corporations operate out of they are only accepting the items as rental pay- A. the previous Q&A, implement your suspicious activity may have an individual or a group aggregated for CTR filing purposes. the same premises? ments. This was mentioned in the section analysis of the monitoring process for these types of situations. of individuals that are the owners of On the other hand, assume that Final Rule issued on 7/21/2011 clarifying the definitions continued on page 19

20 TriComply Financial Compliance Journal | Pg 5 You do not have to police your system for this as many held only in the husband’s name. Is there a requirement systems do not provide for a means to matching of the under BSA to maintain a record (specifically a manual names and account numbers before accepting the paper record) of said transfer, since ownership of funds From the transaction. However, if you notice this type of activity, was lost by the joint account? then, you should monitor the account(s) to watch for TRICOMPLY suspicious activity. Typically, your tellers are going to no- How about if the transfer involves a transfers of funds Financial Compliance Journal EDITOR tice this when the funds are withdrawn. The institutions from one business account to another business account that have mentioned this activity seem to be noticing 4 at the Bank, with the owner of both accounts being the different postings coming into the same account and same person? are unable to link the tax payer to the account holder STAFF in any way. If you see or your teller reports this activity, These would both meet the description for the I recommend adding the account(s) to your high risk A. exception under 31 CFR 103.33(e)(6). ear Reader: monitoring list, and if necessary complete, a SAR. Funds transfers where both the originator and the WelcomeD to the third If a new customer opens an loan account and this beneficiary are the same person and the originator’s edition of the Q. customer is a corporation, we CIP the corporation. bank and the beneficiary’s bank are the same bank TRICOMPLY EDITORIAL & PRODUCTION Correct? What if there is also a personal guarantee by are not subject to the record keeping requirements for FINANCIAL Karly Field the owners of the corporation to secure a loan. For ex- funds transfers. COMPLIANCE ample, John and Sam Doe are the principals for Doe & JOURNAL. In this Doe Enterprises, Inc. If John and Sam both personally There is also an exception for the record keeping issue, we have endorse the loan as well, we would need to CIP those requirements for the funds transfer when the originating focused on the Bank individuals, correct? bank is also the beneficiary bank. Secrecy Act and its TRICOMPLY STAFF related requirements. Miller Gunn Correct, your “customer” is the corporation. It seems like every A. Your bank should have written CIP procedures How would we document a customer identity on regulation hits a Andrea Gullion to address situations where the “customer” is not Q. our CIP form if our borrower (VA on active duty in zenith. Then, it fades Cindy LeBlanc an individual and through your documentary and Afghanistan now) is not here? His wife has POA doc- into its place with all non-documentary verification methods you cannot umentation and will be signing documentation on his of the other Leah M. Hamilton reasonably verify the identity of the “customer.” In those behalf and we will do an “Alive and Well” statement at regulations. The Bank Alison M. Hawkins cases, your procedures should reference obtaining closing. Secrecy Act is information on those individuals with authority or control somewhat the same. Blair Rugh over the account, including signatories. Many institutions This will actually go back to your institution’s Katherine E. Timon complete the CIP process on all signers of closely held A. specific procedures, so check your BSA policy. I can remember several years ago when it was the corporations, such as the one you mentioned. In these As you know, the customer is actually the owner of hottest topic in banking. It seemed like every compliance Kenny Vickers cases, institutions may find verifying the true identity of the account. Therefore, you may have to do some of consulting group was holding a seminar every day on the corporation difficult and, in turn, verify those with this long distance (via phone or email) You will likely BSA. Now its importance has somewhat faded --- unless authority or control over the account. have to use non-documentary methods. BSA says: your institution was just tagged with a BSA violation. If that happens, you will quickly find out how important In cases where the account is a loan with a personal (B) Verification through non-documentary meth- BSA compliance is. We hope that the articles in this guarantee, the guarantors are not considered your ods. For a bank relying on non-documentary meth- issue will assist you in strengthening and implementing “customer” for purposes of CIP, they do not have an ods, the CIP must contain procedures that describe your BSA program. You can also use this edition of the The information contained in this “account” with you as you are not offering them a the non-documentary methods the bank will use. journal as part of your annual BSA training program. TriComply Financial Compliance product or service. However, you may have a tough ( 1 ) These methods may include contacting a cus- Journal is not intended to time during your safety and soundness exam explaining tomer; independently verifying the customer’s iden- We are very grateful for all of the financial institutions constitute,and should not be received why you didn’t verify your guarantor. In many cases tity through the comparison of information provided that have subscribed to our TriComply service, and we as, legal advice. Please consult with where the loan must be supported by a personal by the customer with information obtained from a appreciate that they have placed their confidence in your counsel for more detailed guarantee, it is typical that the bank’s CIP procedures consumer reporting agency, public database, or us. Our commitment is to provide a service that exceeds information applicable to your required it as well due to the difficulty in identifying the other source; checking references with other finan- the expectations of our customers. Our growth has institution. “corporation” as mentioned above. cial institutions; and obtaining a financial statement. been much more rapid than we anticipated and that ( 2 ) The bank’s non-documentary procedures must has caused us to have a few hiccups. We realize that The TriComply Financial Compliance Under the wire transfer regulations related to BSA/ address situations where an individual is unable and have taken the steps necessary to assure that our Journal is published by TriNovus, LLC, Q. AML, is there a requirement to keep a paper re- to present an unexpired government-issued identifi- service is the best in the industry. We continue to add PO BOX 380305, Birmingham, AL 35238. cord or any record for that matter of any in-house trans- cation document that bears a photograph or similar to our staff the best compliance professionals that we All content herein is the sole property fer (inside the institution-i.e. from account to account at safeguard; the bank is not familiar with the documents can find to support your growing needs. If your institution of TriNovus. Please submit all the same bank) of $3,000 or more where ownership of presented; the account is opened without obtaining does not presently subscribe to TriComply, we hope you correspondence to the address above the funds is lost or transferred to another individual or documents; the customer opens the account with- will give us a try. or via email at [email protected]. entity (business)? out appearing in person at the bank; and where the Sincerely, bank is otherwise presented with circumstances that Advertising inquiries may be made by For example, if a husband and wife own a joint ac- increase the risk that the bank will be unable to veri- calling 205.991.5636 or emailing count and funds are transferred on-line to an account fy the true identity of a customer through documents. [email protected]. Blair Rugh TriNovus For more information on TriNovus visit TriComply Financial Compliance Journal | Pg www.trinovus.com. 21 COMPLIANCE Every issue features actual questions Table of asked by real compliance officers just TRICOMPLYFinancial Compliance Journal like you from across the nation. CONTENTS (C)Q Additional verification A for certain customers. The bank’s products, services, customers, entities, and CIP must address& situations where, based on the bank’s geographic locations, and the potential money laun- risk assessment of a new account opened by a custom- dering and terrorist financing risks associated with What Is The TriComply Financial er that is not an individual, the bank will obtain infor- those activities. The appointment of a BSA compli- mation about individuals with authority or control over ance officer is not sufficient to meet the regulatory re- Compliance Journal? such account, including signatories, in order to verify quirement if that person does not have the expertise, We’re excited about the third issue of our TriComply Financial Compliance the customer’s identity. This verification method ap- authority, or time to satisfactorily complete the job. Journal for financial institution compliance professionals. The journal is plies only when the bank cannot verify the customer’s written and edited by TriComply Compliance Services, a part of TriNovus, true identity using the verification methods described The line of communication should allow the BSA compli- LLC. TriComply provides expert compliance advice to financial institutions in paragraphs (b)(2)(ii)(A) and (B) of this section. ance officer to regularly apprise the board of directors around the country. We decided to compile some of our expertise on (iii) Lack of verification. The CIP must include pro- and senior management of ongoing compliance with timely compliance topics, and the result is the TriComply Financial cedures for responding to circumstances in the BSA. Pertinent BSA-related information, including the Compliance Journal. For more information on TriNovus and TriComply, call which the bank cannot form a reasonable be- reporting of SARs filed with FinCEN, should be reported to 205.991.5636 or visit www.trinovus.com. You can also subscribe to our free lief that it knows the true identity of a customer. the board of directors or an appropriate board commit- weekly compliance newsletter on our website. tee so that these individuals can make informed deci- What are the requirements that are necessary to sions about overall BSA/AML compliance. The BSA com- Q. become a BSA officer? pliance officer is responsible for carrying out the direction of the board and ensuring that employees adhere to the There are no hard and fast rules for becom- bank’s BSA/AML policies, procedures, and processes. A.ing a BSA officer, and there is no required cre- dential to become a BSA officer. I have included Every day the TriComply staff answers hundreds of ques- Let’s Explore... an excerpt detailing the responsibilities and duties tions just like these from people just like you! If you are of the BSA officer from the online BSA Manual locat- interested in subscribing to TriComply, visit When Are Two Customers One?... pg 5 ed at the FFIEC.gov website. It will give you a good www.trinovus.com/tricomply, email [email protected] idea of what is required to become a BSA officer. or call 205.9915636. When Is An Activity Suspicious... pg 6

BSA Compliance Officer Who Are You Required To Identify... pg 8 The bank’s board of directors must designate a quali- fied individual to serve as the BSA compliance of- On The Job With Katie Garlington.. pg 11 ficer. The BSA compliance officer is responsible for coordinating and monitoring day-to-day BSA/AML The New Suspicious Activity Reporting Form... pg 12 compliance. The BSA compliance officer is also charged with managing all aspects of the BSA/AML The Four Pillars of BSA.. pg 15 compliance program and with managing the bank’s Meet TriComply RMLOs No Longer Exempt From BSA.. pg 16 adherence to the BSA and its implementing regula- Cindy LeBlanc is a Senior Com- tions; however, the board of directors is ultimately pliance Advisor with TriNovus’ To Report or Not to Report.. pg 17 responsible for the bank’s BSA/AML compliance. TriComply Services team. Her 29-year career has focused on Are You Ready For The New e-Filing Requirements?.. pg 15 While the title of the individual responsible for overall Compliance and Risk Manage- BSA/AML compliance is not important, his or her level of ment, Audit, Training and Con- authority and responsibility within the bank is critical. The sulting. Cindy has successfully COMPLIANCE BSA compliance officer may delegate BSA/AML duties managed compliance programs to other employees, but the officer should be responsible and exams for institutions super- for overall BSA/AML compliance. The board of directors is vised by the OCC, FDIC, State of responsible for ensuring that the BSA compliance officer Missouri and NCUA. She is a CRCM (Certified Regulatory Com- has sufficient authority and resources (monetary, physi- pliance Manager), a CUCE (Credit Union Compliance Expert) cal, and personnel) to administer an effective BSA/AML and a former OCC Compliance Examiner. Cindy has provided com- pg compliance program based on the bank’s risk profile. pliance services to community banks across Louisiana, Mississippi, 20 Missouri and Alabama and credit unions in Louisiana. She has Q A The BSA compliance officer should be fully knowl- & provided training for bank and credit union Boards of Directors, edgeable of the BSA and all related regulations. The various community outreach programs, and high school financial BSA compliance officer should also understand the education seminars. 22 om TriNovus Our successful past Your Trusted in EFT can only TriComply Compliance Experts be eclipsed by our promising future. TriComply Knowledgebase TriComply Compliance Manual Policy Creation & Review Compliance Newsletter After more than 40 years of creating Advertisement Review profitable EFT programs, we’ve gained Online Training Library a level of experience, reliability and Compliance Calendar availability that positions us, and you, for even greater success down the road. With the strength and stability of U.S. Bank Kristin Harville, Southern States Bank behind us and unparalleled service from the on changes in the compliance industry: most seasoned professionals in the business, Changes in consumer real estate transactions, consumer awareness, more consistent to regulatory adherence, stronger regulatory presence no one offers your financial institution a better, based on the current consumer expectations...most of these changes proven approach. EFT is all we do – and have resulted to help the consumer while putting regulatory hardship on the bank, from learning new ways to adhere to new guidelines, to frankly, we do it better than anyone else. implementing new technology to help with the processes. TriComply To set up your informational meeting, has equipped me to face these daily challenges! Kay Basnight, CBC National Bank, contact us at 1.800.343.7064 or on the benefits of TriComply [email protected]. TriComply has been invaluable to me because I took a few years off from banking. It has allowed me to get answers on things I might be rusty on until I catch up with the changes that It’s your turn to have taken place in the last few years. But that doesn’t mean I’ll stop using TriComply because I’ll never, ever get ahead as Join the inner fast as the changing regulations are coming out. It’s also really Circle good to have a sounding board so when you have new ideas for new products you have someone to talk to in order to be sure you’re heading in the right direction. It’s a great group and pretty quick response time. ey’re very knowledgeable and some of the top compliance professionals in the industry. Katie Garlington, Central State Bank on her biggest compliance challenge I would say juggling the time it takes to keep up with a con- stant stream of regulatory changes and the amount of work that goes with updating policies and procedures, implementing regulatory changes, training, etc. while trying to maintain the Our People. Your Success. appropriate amount of monitoring reviews. TriComply has ATM & Debit Programs been a great resource for me at a really reasonable price. ATM Managed Services Fraud Management Contact Darryl Brasfield : 904.264.1050 |[email protected] MoneyPass® surcharge-free ATM .com & PIN POS Network ©2012 Elan Financial Services www.elanfinancialservices.com TRICOMPLYFinancial Compliance Journal

The BSA Issue

Cost is $495 for TriComply Members and $595 for non-members. Register by June 30, 2012 to qualify for discount pricing! Breaking Register online at: Agenda trinovus.com/conference2012 Wednesday, August 22, 2012 Down 7:00 pm to 9:00 pm Welcome Reception – Gathering Area WaterColor Inn Thursday, August 23, 2012 BSA 7:15 am to 8:00 am Breakfast – Spartina Rooms 2 & 3 8:00 am to 8:30 am Dodd Frank Update Speaker: Blair Rugh 8:30 am to 10:00 am The New Loan Estimate & Settlement Disclosures Speaker: Leah Hamilton 10:15 am to 11:00 pm SARs: The New Form & The Impact On How You Categorize Let’s Explore Suspicious Activity Speaker: Alison Hawkins l 11:00 am to 12:00 pm How To Perform A Compliance Risk Assessment SAR: When Is An Activity Suspicious? Speaker: Cindy LeBlanc lWho Are You Required to Identify? 12:00 pm Adjourn for Lunch & Leisure or Golf at Shark’s Tooth Golf Course lWhen Are Two Customers One? 1:00 pm-3:00 pm Optional 2 hr Reg Z and RESPA Forms Workshop 6:30 pm Cocktails, Fish Out of Water Restaurant lAre You Ready For New e-Filing Requirements? 7:00 pm Dinner, Fish Out of Water Restaurant lThe New SAR Form Friday, August 24, 2012 lRMLOS No Longer Exempt From BSA lTo Report or Not To Report? 7:15 am to 8:00 am Breakfast – Spartina Rooms 2 & 3 8:00 am to 8:30 am Overdraft: What Is Its Current State? Speaker: Leah Hamilton 8:30 am to 9:30 am UDAAP: Let’s Talk About Confusing, Misleading & Abusive Speaker: Katherine Timon 9:45 am to 10:45 am A Periodic Statement For Mortgage Loans Speaker: Andrea Gullion April/May 2012 | BSA Issue $5.95 COMPLIANCE 10:45 am to 11:15 am Key Examiner Trends Speaker: Leah Hamilton 11:15 am to 11:30 am Closing Compliance Comments Speaker: Blair Rugh 11:30 am to 12:00 pm What’s In Store For Banking & Compliance Technology Speaker: David Brasfield Q& A

Department of Financial Services Superintendent’s Regulations

Part 504 BANKING DIVISION TRANSACTION MONITORING AND FILTERING PROGRAM REQUIREMENTS AND CERTIFICATIONS (Statutory authority: Banking Law §§37(3)(4) & 672; Financial Services Law §302)

Sec.

§ 504.1 Background § 504.2 Definitions § 504.3 Transaction Monitoring and Filtering Program Requirements § 504.4 Annual Certifications § 504.5 Penalties/Enforcement Actions § 504.6 Effective Date

§ 504.1 Background.

The Department of Financial Services (the “Department”) has recently been involved in a number of investigations into compliance by Regulated Institutions, as defined below, with applicable Bank Secrecy Act/Anti‐Money Laundering laws and regulations1 (“BSA/AML”) and Office of Foreign Assets Control (“OFAC”)2 requirements implementing federal economic and trade sanctions.3

As a result of these investigations, the Department has become aware of the shortcomings in the transaction monitoring and filtering programs of these institutions and that a lack of robust governance, oversight, and accountability at senior levels of these institutions has contributed to these shortcomings. The Department believes that other financial institutions may also have shortcomings in their transaction monitoring programs for monitoring transactions for suspicious activities, and watch list filtering programs, for “real‐time” interdiction or stopping of transactions on the basis of watch lists, including OFAC or other sanctions lists, politically exposed persons lists, and internal watch lists.

1 With respect to federal laws and regulations, see 31 U.S.C. 5311, et seq and 31 CFR Chapter X. For New York State regulations, see Part 115 (3 NYCRR 115), Part 116 (3 NYCRR 116), Part 416 (3 NYCRR 416) and Part 417 (3 NYCRR 417). 2 31 CFR part 501 et seq. 3 For information regarding the Unites States Code, the Code of Federal Regulations and the Federal Register, see Supervisory Policy G‐1.

To address these deficiencies, the Department has determined to clarify the required attributes of a Transaction Monitoring and Filtering Program and to require a Certifying Senior Officer, as defined below, of Regulated Institutions, to file Annual Certifications, in the form set forth herein, regarding compliance by their institutions with the standards described in this Part.

This regulation implements these requirements.

§ 504.2 Definitions.

The following definitions apply in this Part:

(a) “Annual Certification” means a certification in the form set forth in Attachment A.

(b) “Bank Regulated Institutions” means all banks, trust companies, private bankers, savings banks, and savings and loan associations chartered pursuant to the New York Banking Law (the “Banking Law”) and all branches and agencies of foreign banking corporations licensed pursuant to the Banking Law to conduct banking operations in New York.

(c) “Certifying Senior Officer” means the institution’s chief compliance officer or their functional equivalent.

(d) “Nonbank Regulated Institutions” shall mean all check cashers and money transmitters licensed pursuant to the Banking Law.

(e) “Regulated Institutions” means all Bank Regulated Institutions and all Nonbank Regulated Institutions.

(f) “Risk Assessment” means an on‐going comprehensive risk assessment, including an enterprise wide BSA/AML risk assessment, that takes into account the institution’s size, businesses, services, products, operations, customers/ counterparties/ other relations and their locations, as well as the geographies and locations of its operations and business relations;

(g) “Suspicious Activity Reporting” means a report required pursuant to 31 U.S.C. § 5311 et seq that identifies suspicious or potentially suspicious or illegal activities.

(h) “Transaction Monitoring Program” means a program that includes the attributes specified in Subdivisions (a), (c) and (d) of Section 504.3.

(i) “Watch List Filtering Program” means a program that includes the attributes specified in Subdivisions (b), (c) and (d) of Section 504.3.

(k) “Transaction Monitoring and Filtering Program” means a Transaction Monitoring Program, and a Watch List Filtering Program, collectively.

2

§ 504.3 Transaction Monitoring and Filtering Program Requirements.

(a) Each Regulated Institution shall maintain a Transaction Monitoring Program for the purpose of monitoring transactions after their execution for potential BSA/AML violations and Suspicious Activity Reporting, which system may be manual or automated, and which shall, at a minimum include the following attributes:

1. be based on the Risk Assessment of the institution;

2. reflect all current BSA/AML laws, regulations and alerts, as well as any relevant information available from the institution’s related programs and initiatives, such as "know your customer due diligence", "enhanced customer due diligence" or other relevant areas, such as security, investigations and fraud prevention;

3. map BSA/AML risks to the institution’s businesses, products, services, and customers/counterparties;

4. utilize BSA/AML detection scenarios that are based on the institution’s Risk Assessment with threshold values and amounts set to detect potential money laundering or other suspicious activities;

5. include an end‐to‐end, pre‐and post‐implementation testing of the Transaction Monitoring Program, including governance, data mapping, transaction coding, detection scenario logic, model validation, data input and Program output, as well as periodic testing;

6. include easily understandable documentation that articulates the institution’s current detection scenarios and the underlying assumptions, parameters, and thresholds;

7. include investigative protocols detailing how alerts generated by the Transaction Monitoring Program will be investigated, the process for deciding which alerts will result in a filing or other action, who is responsible for making such a decision, and how investigative and decision‐making process will be documented; and

8. be subject to an on‐going analysis to assess the continued relevancy of the detection scenarios, the underlying rules, threshold values, parameters, and assumptions.

(b) Each Regulated Institution shall maintain a Watch List Filtering Program for the purpose of interdicting transactions, before their execution, that are prohibited by applicable sanctions, including OFAC and other sanctions lists, and internal watch lists, which system may be manual or automated, and which shall, at a minimum, include the following attributes:

3

1. be based on the Risk Assessment of the institution;

2. be based on technology or tools for matching names and accounts4, in each case based on the institution’s particular risks, transaction and product profiles;

3. include an end‐to‐end, pre‐ and post‐implementation testing of the Watch List Filtering Program, including data mapping, an evaluation of whether the watch lists and threshold settings map to the risks of the institution, the logic of matching technology or tools, model validation, and data input and Watch List Filtering Program output;

4. utilizes watch lists that reflect current legal or regulatory requirements;

5. be subject to on‐going analysis to assess the logic and performance of the technology or tools for matching names and accounts, as well as the watch lists and the threshold settings to see if they continue to map to the risks of the institution; and

6. include easily understandable documentation that articulates the intent and the design of the Program tools or technology.

(c) Each Transaction Monitoring and Filtering Program shall, at a minimum, require the following:

1. identification of all data sources that contain relevant data;

2. validation of the integrity, accuracy and quality of data to ensure that accurate and complete data flows through the Transaction Monitoring and Filtering Program;

3. data extraction and loading processes to ensure a complete and accurate transfer of data from its source to automated monitoring and filtering systems, if automated systems are used;

4. governance and management oversight, including policies and procedures governing changes to the Transaction Monitoring and Filtering Program to ensure that changes are defined, managed, controlled, reported, and audited;

5. vendor selection process if a third party vendor is used to acquire, install, implement, or test the Transaction Monitoring and Filtering Program or any aspect of it;

6. funding to design, implement and maintain a Transaction Monitoring and Filtering Program that complies with the requirements of this Part;

4 The technology used in this area by some firms is based on automated tools that develop matching algorithms, such as those that use various forms of so‐called “fuzzy logic” and culture‐based name conventions to match names. This regulation does not mandate the use of any particular technology, only that the system or technology used must be adequate to capture prohibited transactions.

4

7. qualified personnel or outside consultant responsible for the design, planning, implementation, operation, testing, validation, and on‐going analysis, of the Transaction Monitoring and Filtering Program, including automated systems if applicable, as well as case management, review and decision making with respect to generated alerts and potential filings; and

8. periodic training of all stakeholders with respect to the Transaction Monitoring and Filtering Program.

(d) No Regulated Institution may make changes or alterations to the Transaction Monitoring and Filtering Program to avoid or minimize filing suspicious activity reports, or because the institution does not have the resources to review the number of alerts generated by a Program established pursuant to the requirements of this Part, or to otherwise avoid complying with regulatory requirements.

§ 504.4 Annual Certification.

To ensure compliance with the requirements of this Part, each Regulated Institution shall submit to the Department by April 15th of each year Certifications duly executed by its Certifying Senior Officer in the form set forth in Attachment A.

§ 504.5 Penalties/Enforcement Actions.

All Regulated Institutions shall be subject to all applicable penalties provided for by the Banking Law and the Financial Services Law for failure to maintain a Transaction Monitoring Program, or a Watch List Filtering Program complying with the requirements of this Part and for failure to file the Certifications required under Section 504.4 hereof. A Certifying Senior Officer who files an incorrect or false Annual Certification also may be subject to criminal penalties for such filing.

§ 504.6 Effective Date.

This Part shall be effective immediately. It shall apply to all State fiscal years beginning with the Fiscal Year starting on April 1, 2017.

5

ATTACHMENT A

______(Regulated Institution Name)

APRIL 15, 20____

Annual Certification For Bank Secrecy Act/Anti‐Money Laundering and Office of Foreign Asset Control Transaction Monitoring and Filtering Programs

to

New York State Department of Financial Services

In compliance with the requirements of the New York State Department of Financial Services (the “Department”) that each Regulated Institution maintain a Transaction Monitoring and Filtering Program satisfying all the requirements of Section 504.3 and that a Certifying Senior Officer of a Regulated Institution sign an annual certification attesting to the compliance by such institution with the requirements of Section 504.3, each of the undersigned hereby certifies that they have reviewed, or caused to be reviewed, the Transaction Monitoring Program and the Watch List Filtering Program (the “Programs”) of (name of Regulated Institution) as of ______(date of the Certification) for the year ended______(year for which certification is provided) and hereby certifies that the Transaction Monitoring and Filtering Program complies with all the requirements of Section 504.3.

By signing below, the undersigned hereby certifies that, to the best of their knowledge, the above statements are accurate and complete.

Signed:

Name: ______Date: ______Chief Compliance Officer or equivalent

6 Rob Nichols President and CEO 202-663-5111 [email protected]

March 31, 2016

By electronic delivery to: [email protected]

Mr. Gene C. Brooks First Assistant Counsel New York State Department of Financial Services One State Street New York, NY 10004-1511

Re: Proposed Addition of Part 504 to Title 3 of the Superintendent's Regulations, Banking Division Transaction Monitoring and Filtering Program Requirements and Certifications (I.D. No. DFS-50-15-00004-P)

Dear Mr. Brooks:

The American Bankers Association (ABA)1 appreciates the opportunity to comment on the transaction monitoring, filtering and certification regulations proposed by the New York Department of Financial Services (DFS).2 The proposal was announced on December 1, 2015, by Governor Andrew Cuomo, as “[A] new anti-terrorism and anti-money laundering regulation that includes – among other important provisions – a requirement modeled on Sarbanes-Oxley that senior financial executive[s] certify that their institutions have sufficient systems in place to detect, weed out, and prevent illicit transactions.”3 The proposal was prompted, in part, by recent enforcement actions targeting transaction monitoring and screening processes deemed inadequate in a few cases.

The proposal purports not to alter existing federal Bank Secrecy Act (BSA)4 and anti-money laundering (AML) requirements, but rather provide “more granular guidance.” However, it would substantively change current requirements and conflict with existing federal regulations. For example, the proposal would establish a number of highly prescriptive transaction monitoring and watch list filtering program requirements for DFS-regulated institutions—requirements that are

1 The American Bankers Association is the voice of the nation’s $16 trillion banking industry, which is composed of small, regional and large banks that together employ more than 2 million people, safeguard $12 trillion in deposits and extend more than $8 trillion in loans. 2 See 2015 N.Y. Reg. 25854 (Dec. 1, 2015) available at: http://www.dfs.ny.gov/legal/regulations/proposed/banking/prop_banking_archive.htm. 3 NEW YORK DEPARTMENT OF FINANCIAL SERVICES PRESS RELEASE, GOVERNOR CUOMO ANNOUNCES ANTI-TERRORISM REGULATION REQUIRING SENIOR FINANCIAL EXECUTIVES TO CERTIFY EFFECTIVENESS OF ANTI-MONEY LAUNDERING SYSTEMS, (2015), available at http://dfs.my.gov/about/press/pr1512011.htm. 4 Formally, the Currency and Foreign Transactions Reporting Act of 1970. (31 U.S.C. 5311 et seq.), the Bank Secrecy Act was originally adopted as part of the war on drugs but has been amended numerous times, most significantly by the USA PATRIOT Act of 2001, which added expectations for monitoring for terrorist activity.

Gene C. Brooks New York State Department of Financial Services March 31, 2016 Page 2

unnecessary and likely to cause confusion and that are inconsistent with existing federal BSA/AML and Office of Foreign Asset Control (OFAC)5 rules. In addition, the proposed rule would require annual certification by an institution’s chief compliance officer that the institution’s transaction monitoring and filtering program “complies with all the requirements of the rule.” And, the certification requirement would impose significant liability, since an “incorrect or false” certification could lead to criminal prosecution.

ABA and the banking industry are long-standing partners with federal and state law enforcement agencies in the battle against money laundering and terrorist financing. Recognizing that commitment, federal officials have remarked on the important support and commendable efforts of the financial sector to maintain BSA/AML compliance programs, systems, and controls.6 Very recently, the Comptroller of the Currency, Thomas Curry, stated that, “…suffice it to say that the vast majority of the institutions we supervise have solid programs in place to manage and control BSA/AML risk.”7 Therefore, while the lapses of a few parties may have drawn Governor Cuomo’s attention, the vast majority of financial institutions have strong and effective transaction monitoring and filtering programs in place.

Combating money laundering and terrorist financing is critical, especially considering the current threat posed by the Islamic State of Iraq and the Levant (ISIL) and other terrorist groups. We appreciate New York’s desire to take steps that further that goal. However, ABA believes that the proposal would undermine, not enhance, the country’s efforts to combat money laundering and the financing of terrorism.

First, the proposal would add new compliance requirements for financial institutions in an area that is already extensively governed by a federal framework that has been developed and refined over many decades. Congress entrusted the federal government with the responsibility to implement the BSA to combat financial crime and protect the financial sector. Overlapping state regulations threaten to introduce confusion as well as disparate and contradictory requirements.

Second, international authorities and the federal government have long advocated a flexible, risk- based approach to AML, which enables banks to adapt to ever-changing threats.8 In contrast, the proposal would implement a highly prescriptive and static set of rules that could not be amended quickly, hindering the ability of institutions to design and calibrate their monitoring and filtering

5 OFAC is a division of the US Department of the Treasury that administers and enforces U.S. economic and trade sanctions. https://www.treasury.gov/about/organizational-structure/offices/Pages/Office-of-Foreign-Assets-Control.aspx. 6 Jennifer Shasky Calvery, Director, Financial Crimes Enforcement Network (FinCEN), American Bankers Association/American Bar Association Money Laundering Enforcement Conference (Nov. 16, 2015), available at: https://www.fincen.gov/news_room/speech/html/20151116.html. 7 Thomas J. Curry, Comptroller of the Currency, Office of the Comptroller of the Currency, Remarks before the Institute of International Bankers (March 7, 2016) (Comptroller Curry’s Remarks) available at: http://www.occ.treas.gov/news- issuances/speeches/2016/pub-speech-2016-25.pdf. 8 See Financial Action Task Force. Guidance on the Risk-Based Approach to Combating Money Laundering and Terrorist Financing – High Level Principles and Procedures (2007), available at: http://www.fatf- gafi.org/documents/documents/fatfguidanceontherisk-basedapproachtocombatingmoneylaunderingandterroristfinancing- highlevelprinciplesandprocedures.html; see also Bank Secrecy Act/Anti-Money Laundering Examination Manual (BSA Manual)(2014), p. 18, available at: https://www.ffiec.gov/bsa_aml_infobase/pages_manual/manual_online.htm.

Gene C. Brooks New York State Department of Financial Services March 31, 2016 Page 3

systems in a flexible, risk-sensitive manner designed to react to the dynamic nature of criminal and terrorist threats.

Third, the proposal would introduce a certification process that requires a chief compliance officer to accept liability for actions outside of his or her control. Moreover, as drafted, the proposed certification would require the compliance officer to certify to an imprecise and subjective definition of “actual compliance” with transaction monitoring and watch list filtering programs, not merely that the company has implemented and tested risk-based programs reasonably designed to detect money laundering and sanctioned transactions. Imprecise and subjective standards in the proposed monitoring and watch list requirements will render certification of complete compliance all but impossible.

Beyond the challenge of attesting to compliance, the proposed rule does not require an “intent” standard for the imposition of criminal penalties. If the underlying objective for the certification requirement is to encourage financial institutions to develop and implement effective programs to detect and prevent money laundering and terrorist financing, ABA strongly believes the proposal will not achieve its objective. Rather, as proposed, the severe legal liability for poorly defined standards will deter experienced and qualified individuals from accepting chief compliance officer positions, which in turn will undermine the BSA/AML programs of regulated institutions.

Overall, the proposal would set the bar so high that it would greatly diminish the risk appetite of financial institutions, leading them to close or not open marginal accounts. This would aggravate the so-called “de-risking” that is already a significant concern of federal and state officials.9 With any new regulatory mandate, financial institutions must factor a number of elements into the risk equation, such as costs for compliance, challenges with updating systems, re-calibrating audit programs, and re-training staff. Against these factors, the company also must weigh the volume of business that will be impacted and income from these accounts. Unfortunately, all too frequently in marginal business lines or accounts, the calculation produces a negative result. If the regulatory costs and risks exceed the income and benefits from any relationship, the most efficient and effective step for a financial institution, particularly in the context of safety-and-soundness, is to terminate or not enter into affected account relationships.

While ABA agrees that transaction monitoring and filtering programs are critical to bank compliance, the proposal goes well beyond what is necessary and will result in serious unintended and counterproductive consequences. We therefore urge DFS to withdraw the proposal, and instead reinforce participation in the existing and long-standing federal regime, that unites government authorities, law enforcement, and bank and nonbank financial institutions in the effort to fight crime and terrorist financing.

9 See for example, Adam Szubin, Acting Under Secretary. U.S. Department of the Treasury, Remarks at The ABA/ABA Money Laundering Enforcement Conference (Nov. 16, 2015), available at: https://www.treasury.gov/press-center/press- RELEASES/Pages/jl0275.aspx; see also Comptroller Curry’s Remarks, supra, note 6

Gene C. Brooks New York State Department of Financial Services March 31, 2016 Page 4

1. ABA and the banking industry actively support robust AML/CFT Programs.

ABA shares New York’s goal to ensure that financial institutions implement and maintain robust and effective AML and countering of terrorism (CFT) programs. However, we are concerned that creation of a separate, parallel state system could divert resources from efforts to prevent money laundering and terrorist financing and frustrate the efforts to have a coordinated national approach— and even international approach.

For the last few years, the Financial Crimes Enforcement Network (FinCEN) has been working diligently to ensure that the gap, or “delta,” between regulatory mandates and illicit financing risk is narrowed.10 The fundamental goal for the special task force that FinCEN created to address this concern, the Delta Team, is to ensure that regulatory mandates are designed to provide the necessary information and support for law enforcement but avoid rules that do not meet that goal. Creation of a separate state system that overlaps the federal system is only likely to expand the delta, not diminish it.

It is important to realize that any new regulation is not adopted in a vacuum; rather, it is part of a long-standing federal framework that has been updated and refined over nearly 50 years as risks have changed and law enforcement programs have evolved. FinCEN and the federal banking agencies, working with national law enforcement and intelligence agencies, have the expertise and access to information necessary to design comprehensive national standards for effectively combatting financial crimes and terrorist financing. That recognition informed the close cooperation of the federal banking agencies when they created uniform examination procedures, the FFIEC Bank Secrecy Act/Anti-Money Laundering Manual (BSA Manual).11 When the manual, last updated in November 2014, was introduced, it was hailed as a model of cooperation between regulatory agencies and as a step that would further the fight against money laundering.

International cooperation is also critical to combating money laundering and terrorist financing. That is why the Financial Action Task Force was created in 198912 and why a number of countries banded together as the Egmont Group to ensure mutual cooperation to combat money laundering and terrorist financing.13 Fundamentally, coordination with other countries must be at the federal level. To that end, it is logical to have a federal AML/CFT compliance regime. Independent state regulations, by introducing inconsistencies in interpretations, application, and enforcement, will undermine the efficacy of the federal framework.

10 Jennifer Shasky Calvery, Director, Financial Crimes Enforcement Network, Remarks at the American Bankers Association/American Bar Association Money Laundering Enforcement Conference (November 2012), available at: https://www.fincen.gov/news_room/speech/html/20121113.html. 11 Comptroller Curry’s Remarks, supra note 6. 12 Currently, there are 35 countries, including the United States, serving as members of the Financial Action Task Force (FATF). See http://www.fatf-gafi.org/home/. FATF is an inter-governmental body established in 1989 by the Ministers of its Member jurisdictions. The objectives of the FATF are to set standards and promote effective implementation of legal, regulatory, and operational measures for combating money laundering, terrorist financing, and other related threats to the integrity of the international financial system. 13 The Egmont Group provides a mechanism at the federal level to combat illicit finance. FinCEN is the United States representative to the Egmont Group. See http://www.egmontgroup.org/

Gene C. Brooks New York State Department of Financial Services March 31, 2016 Page 5

2. The proposed rule creates a series of explicit and implicit requirements that are inconsistent with the risk-based approach to BSA/AML/OFAC monitoring and filtering programs.

The proposal would impose a prescriptive set of transaction monitoring and watch list filtering program requirements that would apply to all DFS-regulated institutions but that is at odds with the federal risk-based approach. Under the existing federal regime, each bank identifies the risks it faces and then, within the context of federal standards, designs its own AML/CFT program to manage those risks. As stated in the BSA Manual, “There are many effective methods and formats used in completing a BSA/AML risk assessment; therefore, examiners should not advocate a particular method or format.”14 The goal, as set forth in the BSA Manual, is to have each bank assess the risks it faces, based on the products and services it offers, the customers it serves, the geographies where it is located, and its own unique capacities. Then each bank must be able to create policies, procedures, and controls to mitigate the risk. Imposition of a one-size-fits-all transaction monitoring and filtering program frustrates that.

The emphasis on flexible standards is not limited to the United States. International efforts to combat money laundering and terrorist financing also emphasize the need to develop flexible standards that let individual financial institutions identify risks and adopt controls to manage those risks.15 This ensures the most effective use of resources to combat money laundering and terrorist financing. Prescriptive mandates do not.

Another danger inherent in a prescriptive requirement is that it encourages banks to manage to the regulation and not the risk. Where examiners and auditors have specific requirements against which to check compliance, they look to see if each individual element of the statutory mandate is satisfied without evaluating the overall process or its effectiveness. When examiners and auditors check the box, the most efficient way for a bank to demonstrate compliance is to show that each element of the rule has been met without regard to whether it has addressed risk. Compliance then becomes a mechanical, and all too often less effective, exercise. Since criminals are constantly seeking to find new ways to access the payment system without detection, law enforcement and financial institutions must be equally adept in order to identify and control AML/CFT risks, but that dynamic is lost when compliance becomes a mechanical exercise.

a. Proposed section 504.3(b)’s requirement for maintaining a watch list filtering program is imprecise and inconsistent with federal requirements.

Section 504.3(b) would require institutions to maintain a watch list filtering program “for the purposes of interdicting transactions, before their execution, that are prohibited by applicable sanctions, including OFAC and other sanction lists, and internal watch lists.” Note 4 to the proposal also states, in relevant part, “This regulation does not mandate the use of any particular technology,

14 BSA manual, supra note 7, at 18. 15 See Financial Action Task Force, The FATF Recommendations – International Standards on Combating Money Laundering and the Financing of Terrorism & Proliferation (2012), available at:http://www.fatf- gafi.org/media/fatf/documents/recommendations/pdfs/FATF_Recommendations.pdf; see also, Financial Action Task Force’s series of publications on the application of the risk-based approach, available at: http://www.fatf- gafi.org/documents/riskbasedapproach/?hf=10&b=0&s=desc(fatf_releasedate)

Gene C. Brooks New York State Department of Financial Services March 31, 2016 Page 6

only that the system or technology used must be adequate to capture prohibited transactions” (emphasis added).

This language appears to suggest a zero tolerance for OFAC screening, which is inconsistent with the current expectations that appropriately recognize that no filtering system can guarantee that it will capture all prohibited transactions.

Moreover, section 504.3(b) appears to require OFAC monitoring systems that screen all transactions against the lists, which is overbroad and inconsistent with current expectations that banks implement risk-based transaction monitoring.16 Indeed, the federal approach accords individual institutions flexibility in setting thresholds for OFAC filtering, recognizing that there is always a trade-off between a system’s ability to identify all transactions potentially covered and the need to avoid a significant number of false positives that demand time and syphon off resources to resolve.

At the same time, it is important to recognize that screening every party in every transaction, as the proposal seems to mandate, would be a severe impediment to the normal course of business for the vast body of legitimate transactions by law-abiding parties. For example, there currently is no automated system that can screen the payee on every check or card transaction. Constructing such a system would be prohibitively expensive and impractical. And, it fails to recognize that screening is conducted by different parties at different points in the system, as appropriate; as a result, not every processor needs to monitor every party at every step in the process.

In addition, neither “other sanction lists” nor “internal watch lists” is defined, leaving it open to interpretation—interpretation that could be criticized later by an examiner. Indeed, the number of sanctions lists that could be included is extensive. Not only are there multiple OFAC lists, there are lists published by the Department of Commerce Bureau of Industry and Security, the Departments of State and Homeland Security, and there are a series of Executive Orders issued by the White House. Similarly, the term “internal watch list” is vague; the proposal offers no parameters for which internal lists should be included or guidance as to whether and how internal watch lists should be developed.17

In other words, the proposal would impose rules that are vague, overbroad, and inconsistent with current expectations for risk-based transaction monitoring. We urge DFS to withdraw the proposal and defer to the existing federal screening regime.

16 BSA Manual, supra note 7, at 142 to 151 17 Although DFS removed the reference to “politically exposed persons (PEPs) lists” from the proposed rule text published in the New York State Register on December 16, 2015, the preamble to the proposal states, “The Department believes that other financial institutions may also have shortcomings in their transaction monitoring programs for monitoring transactions for suspicious activities, and watch list filtering programs, for ‘real-time’ interdiction or stopping of transactions on the basis of watch lists, including OFAC or other sanctions lists, politically exposed persons lists, and internal watch lists.” ABA supports the decision to remove reference to PEP lists but urges DFS to remove any reference to PEPs from the preamble. We note that there is no federal requirement to interdict payments to PEPs, and a requirement to screen transactions involving PEPs would have significant, negative consequences for the payment system. Federal regulations focus on PEPs at the account relationship level, not at the transaction level, as the most effective way to address potential risks with PEPs.

Gene C. Brooks New York State Department of Financial Services March 31, 2016 Page 7

b. Proposed section 504.3(a)’s requirement on the transaction monitoring program also is imprecise and inconsistent with federal requirements.

Section 504.3(a) would require a transaction monitoring program to “reflect all current BSA/AML laws, regulations and alerts, as well as any relevant information from the institution’s related programs and initiatives such as ‘know your customer due diligence,’ ‘enhanced customer due diligence,’ or other relevant areas such as security, investigations, and fraud prevention.” This requirement is exceedingly broad and would impose monitoring requirements far beyond those of the federal risk-based framework. FinCEN and the federal banking agencies recognize that not all BSA/AML laws, regulations, or alerts are necessary or appropriate for incorporation into a transaction monitoring program, and individual banks should exercise discretion as to those elements that are appropriately incorporated based on that bank’s risk assessment.

The federal risk-based framework recognizes that BSA officers are best positioned to make judgments about the information used to sustain and improve the efficacy of their transaction monitoring programs. A requirement for monitoring “all BSA/AML laws, regulations, and alerts” is extremely broad and disregards an individual institution’s specific risks. In addition, such an expansive approach will produce more transactions that are unnecessarily categorized as “suspicious” and that will therefore need to be investigated, stretching and distracting investigative resources, resulting in less effective information for law enforcement purposes.

The proposed rule’s requirement for an “ongoing comprehensive risk assessment” also appears to require that an institution continuously revise its BSA/AML risk assessment. This contradicts the federal requirements outlined in the BSA Manual, which state, “[I]t is a sound practice for banks to periodically reassess their BAS/AML risks at least every 12 to 18 months,” unless there are changes to an institution’s risk profile such as a merger or the introduction of new products or services.18

Overall, the proposal lays forth a prescriptive mandate for transaction monitoring. As with the elements of sanctions screening, the preferable approach, consistent with federal and international guidance, is to set forth guidelines for financial institutions and then allow each institution, within those guidelines, to develop its own compliance program tailored to its unique circumstances and the nature of the risks faced.

c. Proposed section 504.3(d) is overly broad and appears to conflict with federal guidelines.

As proposed, section 504.3(d) would forbid banks from making changes to their transaction monitoring and filtering programs “to avoid or minimize filing suspicious activity reports, or because the institution does not have the resources to review the number of alerts generated by a Program established under the proposal, or to otherwise avoid complying with regulatory requirements.” While ABA agrees that banks should not set program thresholds for alerts simply to reduce the number of alerts that need to be addressed, we believe that the proposed language

18 BSA Manual, supra note 7 at 24.

Gene C. Brooks New York State Department of Financial Services March 31, 2016 Page 8

conflicts with federal guidelines and will result in a significant increase in BSA filings that are not helpful or useful to law enforcement.

One critical element of the federal transaction monitoring expectations is that the alert system be risk-based and that, “Parameters and filters should be reasonable and tailored to the activity that the bank is trying to identify or control.”19 The federal guidelines go on to state that, “System filtering criteria, including specific profiles and rules, should be based on what is reasonable and expected for each type of account.” In calibrating their systems, banks are expected to take steps to reduce alerts that would result in unhelpful filings.

Accordingly, bank BSA personnel make risk-based decisions about transaction monitoring and filtering system settings that determine the volume of alerts generated. It is an iterative process that seeks to minimize the number of false alerts and maximize the number of “true” alerts that generate SAR filings. In fact, FinCEN and federal law enforcement agencies encourage these ongoing efforts to optimize filters, so that they are not overwhelmed by unnecessary suspicious activity report (SAR) filings.20 This process ensures that bank and law enforcement resources are maximized in the fight against money laundering and terrorist financing.

Therefore, while a financial institution should not adjust its transaction monitoring system to eliminate alerts simply because there are insufficient resources to handle that level of alerts, a financial institution must have the flexibility to adjust the alert system to eliminate false positives and to calibrate the program to produce the most effective level of alerts possible.

d. Proposed section 504.3(a)(5)’s mandates for system validation are unworkable.

Proposed section 504.3(a)(5) would require an “end-to-end, pre- and post-implementation testing of the Transaction Monitoring Program.” ABA agrees that it is important for financial institutions to adopt procedures to ensure that the systems they use work properly and in accordance with regulatory expectations. In fact, the basic elements of the proposal reflect two of the four pillars of a bank BSA compliance program that have been in place since 1986—the implementation of internal controls and an audit program.

However, the proposal appears to mandate an evaluation that departs from standard audit practice and good risk management. It would be extremely expensive, costing in the tens of thousands of dollars for even a small institution, and could draw resources into a perennial audit better used for fighting crime and providing customer service. The prohibitive costs associated with this alone would cause many community banks to exit lines of business, leading to financial exclusion instead of financial inclusion, as discussed more fully below. Here, as with other elements of the proposed rule, the language departs from an approach focused on risk, an approach that makes the best use of

19 BSA Manual, supra note 7 at 66. 20 Recently, the Director of FinCEN, commenting on the utility of suspicious activity filings, noted that law enforcement used approximately 62% of the reports filed, meaning that 38% were not used. Under the proposed rule, it is likely that the percentage of SARs that are not used would increase. See Jennifer Shasky Calvery, Director, Financial Crimes Enforcement Network, Remarks at the 2014 Mid-Atlantic AML Conference, (August 2014), available at https://www.fincen.gov/news_room/speech/html/20140812.html.

Gene C. Brooks New York State Department of Financial Services March 31, 2016 Page 9

resources for testing and evaluating systems as a means to validate that the programs are appropriate and working as intended.

Perhaps more significant, although the proposal suggests that a bank could use an automated or a manual system, the elements of the proposal are so detailed that they seem to undermine the ability for even a small community bank to use anything other than an automated system to comply.

ABA believes that the proposed rule would fail to achieve its intended purpose. Instead, the prescriptive nature of the transaction monitoring and watch list filtering program requirements threaten to undermine the effectiveness and flexibility of the federal approach to AML/CFT compliance, while hampering the unity of approach needed for an effective national and international effort. ABA urges DFS to withdraw the proposal.

3. The certification requirement will undermine financial institutions’ AML/CFT compliance programs.

Proposed section 504.4 would require each regulated institution to submit an annual certification that is duly executed by its “Senior Certifying Officer” (SCO), defined as the institution’s chief compliance officer or functional equivalent, attesting that the institution’s transaction monitoring and watch list filtering programs comply with all of the requirements set forth in the proposed rule. However, at the outset it is not entirely clear who would be the appropriate signatory. As compliance responsibilities have ballooned, especially after the adoption of the Dodd–Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank), compliance responsibilities have been diffused among different individuals within an organization. At the same time, existing federal regulations require financial institutions to appoint a designated individual as the BSA Officer, and it is that individual who is most likely to be familiar with the expectations set forth in the proposal, but the BSA Officer may be a different person than the chief compliance officer. In short, the proposal need greater clarity to determine where the expected responsibility lies and who should execute the certification.

Even so, ABA opposes this certification requirement. Although the proposal purports to model the certification required by the Sarbanes-Oxley Act of 2002 (Sarbanes-Oxley),21 there is a significant distinction. The certification required under Sarbanes-Oxley is not an absolute attestation. Rather, Sarbanes-Oxley allows the certifying officer to attest to the information based on his or her knowledge and belief as well as incorporating a reasonableness standard. Under Sarbanes-Oxley, the certifying officer certifies that the company has in place a system of controls reasonably designed to achieve compliance. Here, in contrast, the SCO must certify to actual compliance with all of the requirements of the proposed rule, an impossible standard. And an attestation made in good faith that is later found to be “incorrect or false” can result in criminal prosecution. These certifications, in the terms proposed, are statistically prone to be found inaccurate in some respect

21 Sarbanes–Oxley Act of 2002, Pub. L. No. 107–204, 116 Stat 745 (2002), 2002 Enacted H.R. 3763, 107 Enacted H.R. 3763

Gene C. Brooks New York State Department of Financial Services March 31, 2016 Page 10

that has little bearing on the genuine effectiveness of the AML program but that is bound to hang liability around the neck of the SCO.

No one individual should, or can, be expected to assume responsibility for the activities of his or her colleagues or associates. A corporation, by its very nature, acts through the efforts of many individuals. Each one contributes to the overall action of the company, and the sum of their collective actions is what constitutes the actions of the corporation. At the same time, while a SCO can direct, supervise, correct, guide, monitor, and conduct the many other elements of his or her duties with great skill, competence, and integrity, he or she does not have sufficient authority to control the actual conduct of others in the company, no more than a police officer can assure that there will be no traffic violations on the highways he or she patrols.

Nor does the SCO have ultimate control over the resources allocated to the institution’s BSA/AML program. He or she can recommend a budget, but senior management and the board will make the final decision about the allocation of finite resources across many programs to meet the many legal obligations of the firm and provide expected services to its customers. Yet the proposed rule’s requirement that an institution adequately fund its BSA/AML/OFAC monitoring systems, would pull this decision into the certification, requiring budgeting discussions and decisions to be thoroughly documented in light of the possibility of civil or criminal prosecution.

Successful BSA/AML compliance is a company-wide endeavor, dependent on the actions of employees throughout the organization, including frontline personnel responsible for customer identification program compliance, business line employees that feed data into the transaction monitoring and filtering programs, technology experts that build and manage the monitoring and screening systems, and BSA/AML compliance employees who investigate suspicious activity, file required reports, and oversee the entire BSA/AML program. With so many individuals contributing to compliance it would be fundamentally unfair to hold one individual responsible for all of those efforts. Moreover, doing so would undermine the goal of creating a culture of compliance throughout the firm that is essential to a program’s success.

In addition, and as discussed previously, the proposed rule contains a number of unclear standards that would make certification of compliance very difficult, if not impossible. As also explained above, the requirement to certify that an institution’s transaction monitoring and filtering programs comply with all the requirements of the proposed rule establishes an unrealistic standard that is at odds with the federal risk-based framework for BSA compliance.

ABA believes that the certification requirement will not encourage the development and implementation of effective programs designed to detect and prevent money laundering and terrorist financing. Instead, it will deter experienced and qualified individuals from accepting chief compliance officer positions, which will undermine the BSA/AML programs of regulated institutions.

For many years, federal regulators have had the authority to charge individuals with malfeasance when appropriate. The bar for charging an individual is set high, recognizing that the company acts through a series of steps by individuals. However, it is an authority that is and can be used when

Gene C. Brooks New York State Department of Financial Services March 31, 2016 Page 11

appropriate. That authority exists without a certification requirement. ABA urges DFS to remove the certification requirement.

4. The Proposal is likely to inhibit efforts to increase financial inclusion.

As has been noted, one of the key elements for a bank AML/CFT compliance program is the risk- assessment process. When there are prescriptive mandates to follow or where a compliance officer must accept an elevated level of responsibility for managing risks associated with customers, it not only raises the bar for compliance, it simultaneously lowers the tolerance for risk. The fundamental goal of a risk management program is to identify and define the risks, determine steps that can manage or minimize those risks, and monitor and audit to be sure that the risks do not change and that the risk mitigation is working properly.

When there is a risk that cannot be controlled or cannot be defined, the logical solution is to minimize or even avoid the risk. In this context, that means that a bank will close or not open a particular account or process a difficult transaction at the margin. Such actions, to be consistent with regulatory expectations, are also likely to leave customers without ready access to some banking services. That does not eliminate customer needs; customers may then turn to alternate providers, perhaps including “informal” providers in the underground economy. The more that legitimate customers go that route to meet their financial needs, the more fertile environment there is for bad actors to conduct transactions. And, when transactions are moved outside the mainstream, they are less transparent to law enforcement and regulatory authorities. That is a cost that bankers, law enforcement, and policymakers should seek to avoid.22

5. Conclusion

ABA firmly believes that the efforts to combat money laundering and terrorist financing require a partnership between the banking industry and law enforcement. For nearly 50 years, the federal government has instituted, refined and, where appropriate, expanded the compliance expectations needed to carry out those efforts. Since combating money laundering and especially terrorist activity is an international effort requiring global cooperation, the most effective process is one that is managed at the federal level where it can be applied consistently nationwide and can best integrated into an essential international effort.

22 E.g., “Government cooperation in setting and enforcing international standards for anti-money laundering and transparency in the financial system is essential if banks’ efforts to detect and report potential money laundering are to be effective.” U.S.DEP’T OF THE TREAS., NATIONAL MONEY LAUNDERING RISK ASSESSMENT (2015) p. 52, available at: https://www.treasury.gov/resource-center/terrorist-illicit- finance/Documents/National%20Money%20Laundering%20Risk%20Assessment%20%E2%80%93%2006-12-2015.pdf, and, “This framework aids financial institutions in identifying and managing risk, provides valuable information to law enforcement, and creates the foundation of financial transparency required to apply targeted financial measures against the various national security threats that seek to operate within the U.S. financial system.” U.S. DEP’T OF THE TREAS., NATIONAL TERRORIST FINANCING RISK ASSESSMENT (2015), p. 48, available at: https://www.treasury.gov/resource-center/terrorist-illicit- finance/Documents/National%20Terrorist%20Financing%20Risk%20Assessment%20%E2%80%93%2006-12-2015.pdf.

Gene C. Brooks New York State Department of Financial Services March 31, 2016 Page 12

ABA appreciates the opportunity to comment on the proposal. Clearly, we share the same goals of an effective program to protect that nation’s financial sector from criminals and terrorists. We believe that this can best be achieved by working together within the federal program, and we therefore urge withdrawal of the proposal.

Sincerely,

Rob Nichols President and CEO

Personal Liability Issues 6 | ABA BANK COMPLIANCE | MARCH–APRIL 2016

SHUTTERSTOCK BY RALPH E. SHARPE, ESQUIRE

N DECEMBER 1, 2015, the New York Department of Financial Services (“DFS”) proposed “…a new anti-terrorism and anti-money laundering regulation that includes— among other important provisions—a requirement modeled on Sarbanes-Oxley that senior financial executive[s] certify that their institutions has sufficient systems in place to Odetect, weed out, and prevent illicit transactions.”1 The proposed regulation, if adopted, would require that DFS-supervised institutions maintain a transaction monitoring program designed to identify potential BSA/ AML violations and ensure timely Suspicious Activity Reporting, as well as a watch list filtering program for the purpose of interdicting transactions before their execution that are prohibited by applicable sanctions, including OFAC and other sanctions lists, politically exposed persons lists, and internal watch lists.2 Under the proposed regulation, on or before April 15 of each year, each covered institution would also be required to submit to the DFS a certification of compliance with the above requirement duly executed by its chief compliance officer or functional equivalent.3 Section 504.5 of the proposed regulation provides that: All Regulated Institutions shall be subject to all applicable penalties provided for by the Banking Law and the Financial Services Law for failure to maintain a Transaction Monitoring Program, or a Watch List Filtering Program complying with the requirements of this Part and for failure to file the Certifications required under Section 504.4 hereof. A Certifying Senior Officer who files an incorrect or false Annual Certification also may be subject to criminal penalties for such filing.4 This pronouncement follows a long series of recent policy pronouncement and enforcement actions initiated by the DFS and other financial services regulators where the focus has included not only corporate but individual responsibility, with a particular focus on compliance professionals. The purpose of this article it to discuss the implications of this shift in focus for compliance professionals, to offer suggestions on how such professionals can better protect themselves from potential liability, and to raise a cautionary note that in their effort to ensure that financial services firms maintain a high level of regulatory compliance with all AML-related laws and regula- tions, the financial service regulators do not make it increasingly difficult for firms to find and retain those best qualified to lead this effort, i.e., well-qualified compliance professionals. Personal Liability Issues for Compliance Professionals [T]he BSA allows FinCEN to impose civil penalties not How we got here— only against domestic financial institutions and non- Governmental Policies and Statements financial trades or businesses that willfully violate the BSA, As history instructs, the 2007-2008 financial downturn mostly but also against partners, directors, officers and employees took banks and regulators by surprise—and both have been run- of such entities who themselves actively participate in mis- ning hard since to “catch up.” Regulators reacted in a number of conduct. Although FinCEN has employed these tools only ways. They ratcheted up their rhetoric regarding their supervi- occasionally in the past, in the future FinCEN will look for sory expectations; issued policy statements signaling increased more opportunities to impose these types of remedies in supervisory scrutiny and took a series of high-profile enforcement appropriate cases (https://www.treasury.gov/press-center/ actions intended to reinforce a “no more Mr. nice guy” message. press-releases/Pages/jl1871.aspx). Most of these were directed at the financial institutions themselves, but as legislators, commentators and the public began to clamor In March of 2014, Comptroller of the Currency Thomas Curry for actions against individuals, the regulators began to turn their offered the following remarks before the Association of Certified focus more in that direction. In March of 2013, David S. Cohen, Anti-Money Laundering Specialists: “The question I would pose Under Secretary for Terrorism and Financial Intelligence, testi- from a risk management and corporate governance standpoint fying before the Senate Committee on Banking, Housing, and is whether it’s time to require large complex banks to establish Urban Affairs on Patterns of Abuse: Assessing Bank Secrecy Act clear lines of accountability that make it possible to hold senior

SHUTTERSTOCK SHUTTERSTOCK Compliance and Enforcement stated: executives responsible for serious compliance breakdowns that

MARCH–APRIL 2016 | ABA BANK COMPLIANCE | 7 from the very beginning of an investigation, we maximize lead to BSA program violations.” (See http://www.sec.gov/news/ the chances that the final resolution of an investigation statement/supporting-role-of-chief-compliance-officers.html.) uncovering the misconduct will include civil or criminal In June of this year, SEC Commissioner Luis A. Aguilar offered charges against not just the corporation but against cul- a defense of two SEC enforcement actions taken to discipline Chief pable individuals as well. (See http://www.justice.gov/dag/ Compliance Officers (“CCOs”), stating in part, that: file/769036/download at 4.) “In my experience, the Commission has approached CCO Finally, as noted in the introduction to this article, the DFS has cases very carefully, making sure that it strikes the right bal- now weighed in with an unprecedented proposal that, if adopted, ance between encouraging CCOs to do their jobs compe- would require annual certifications by compliance officers that tently, diligently, and in good faith, and bringing actions to their DFS-regulated institutions were maintaining an effective punish and deter those that engage in egregious misconduct. transaction monitoring program to detect potential BSA viola- In making this determination, the Commission cautiously tions, maintaining watch list filtering programs to identify and evaluates the facts and circumstances of each case, and con- interdict prohibited transactions and filing SARs when suspicious siders many important factors such as fairness and equity.” activities are identified. Commissioner Aquilar’s view that the SEC’s actions against Collectively, these statements evince a growing, and increasingly compliance officers has been a balanced one is not shared by uniform articulation of governmental policies reflecting a willing- all of his fellow commissioners, however. Commissioner Daniel ness and determination to visit personal liability on individuals Gallagher, commenting on the same two cases referred to by as well as corporate entities. As discussed in the next section, this Commissioner Aguilar, offered a more cautionary view: willingness and determination has manifested itself in a number of recent enforcement actions taken by financial services regula- “Both settlements illustrate a Commission trend toward tors against individuals. strict liability for CCOs under Rule 206(4)-7. Actions like these are undoubtedly sending a troubling message that Recent Enforcement Actions— CCOs should not take ownership of their firm’s compli- Policy Becomes Reality ance policies and procedures, lest they be held accountable The most well-known enforcement action aimed at a compliance for conduct that, under Rule 206(4)-7, is the responsibility professional is, of course, the action being taken by FinCEN against of the adviser itself. Or worse, that CCOs should opt for Thomas Haider, former Chief Compliance Officer of MoneyGram less comprehensive policies and procedures with fewer International Inc.5 In a complaint filed on FinCEN’s behalf by the specified compliance duties and responsibilities to avoid United States Attorney for the Southern District of New York on liability when the government plays Monday morning December 18, 2014, the government seeks an order enforcing a quarterback.” (See http://www.sec.gov/news/statement/sec- $1,000,000 civil money penalty (“CMP”) against Mr. Haider for cco-settlements-iaa-rule-206-4-7.html.) failing to ensure that MoneyGram “(1) implemented and main- In September of 2015, the U.S. Department of Justice also tained an effective AML program and (2) fulfilled its obligation weighed in on the issue of individual accountability by noting that to file timely SARs.6 This Complaint also seeks an injunction “[o]ne of the most effective ways to combat corporate misconduct barring Mr. Haider from participating directly or indirectly in is by seeking accountability from the individuals who perpetrated the conduct of the affairs of any financial institution located in the wrongdoing.“ DOJ’s memo on Individual Accountability for or conducting business in the United States for a term of years Corporate Wrongdoing (otherwise known as the “Yates” memo) to be defined at trial.7 More specifically, FinCEN alleged that Mr. articulates the rationale for this statement thusly: Haider failed to ensure that MoneyGram: ■■ Implemented a policy for disciplining agents and outlets that Both criminal and civil attorneys should focus on indi- MoneyGram personnel knew or suspected were involved in vidual wrongdoing from the very beginning of any inves- fraud and/or money laundering; tigation of corporate misconduct. By focusing on building ■■ Terminated agents and outlets that MoneyGram personnel cases against individual wrongdoers from the inception understood were involved in fraud and/or money laundering, of an investigation, we accomplish multiple goals. First, including outlets that Haider himself was on notice posed an we maximize our ability to ferret out the full extent of unreasonable risk of fraud and/or money laundering; corporate misconduct. Because a corporation only acts ■■ Fulfilled its obligation to file timely SARs, because Haider main- through individuals, investigating the conduct of individu- tained MoneyGram’s AML program so that the individuals als is the most efficient and effective way to determine the responsible for filing SARs were not provided with information facts and extent of any corporate misconduct. Second, by possessed by MoneyGram’s Fraud Department that should focusing our investigation on individuals, we can increase have resulted in the filing of SARs on specific agents or outlets; the likelihood that individuals with knowledge of the cor- ■■ Conducted effective audits of agents and outlets, including porate misconduct will cooperate with the investigation outlets that MoneyGram personnel knew or suspected were and provide information against individuals higher up involved in fraud and/or money laundering; and the corporate hierarchy. Third, by focusing on individuals ■■ Conducted adequate due diligence on prospective agents, or

8 | ABA BANK COMPLIANCE | MARCH–APRIL 2016 existing agents seeking to open additional outlets, which resulted What this all means for in, among other things, MoneyGram (1) granting outlets to Compliance Professionals agents who had previously been terminated by other money Collectively, the above cases paint a sobering picture for compli- transmission companies and (2) granting additional outlets to ance officers, particularly those in larger, more complex, financial agents who MoneyGram personnel knew or suspected were institutions. Clearly, on an increasing basis, regulators are look- involved in fraud and/or money laundering.8 ing for ways to underscore the importance of AML compliance by sending a very strong message to compliance professionals In 2014, the New York Department of Financial Services (“DFS”) that not only may the institution they serve be at risk, they may took a pair of actions against financial institutions that while also be found personally liable. This raises a number of serious not directly seeking to penalize individuals, nevertheless resulted questions, including how do compliance professionals protect in adverse actions being taken against individuals currently or themselves from this kind of risk, and what are the implications formerly working for the institutions involved. In June of 2014, of the current approach for the institutions they serve? DFS entered into a Consent Order with BNP Paribas, S.A., New York Branch directing BNP to pay an $8.9 billion civil money penalty, restrict its U.S. dollar clearing operations going forward “…but one thing is certain, compliance and terminate certain senior executive officers.9 As to the latter, professionals subject to DFS jurisdiction DFS directed the termination of twelve officers and officials of the Bank involved in the illegal clearing operations, including (and those who may become subject to the former Group Head of Compliance and directed that the Bank shall not in the future, directly or indirectly retain any of some variation of the proposal should the named officials as an “officer, employee, agent, consultant or other financial service regulators follow contractor of the Bank or any of its affiliates.”10 The Consent Order alleges that these officials either ignored or overrode numerous suit) may understandably see this compliance-related warnings raised by more junior compliance personnel and not only deferred to business managers who pressed measure as one more means of targeting to maintain a profitable line of business, but actively worked to compliance professionals at a time when support serious illegal conduct by the Bank and conceal it from their regulators and other authorities.11 their services are needed most” In December of 2014, In the Matter of Bank Leumi, USA, Bank Leumi Le-Israel, B.M., DFS entered into a Consent Order that included provisions requiring the Bank to terminate and/ There are also a number of fundamental questions that all or ban certain specific employees from further involvement in compliance professionals should be asking themselves in the cur- compliance-related activities, including the former Chief Compli- rent environment, and if they are not able to answer these ques- ance Officer, who the DFS alleged was complicit in perpetuating tions in a satisfactory manner, they should consider themselves violations of law for conducting an illegal cross-border scheme as being exposed to elevated risks of personal liability if/when to assist U.S. clients in evading federal and state taxes (http:// something goes wrong. www.dfs.ny.gov/about/press/pr1412222.htm). Under the Consent ■■ Are you working in a healthy compliance environment? Is there Order, the Compliance Officer was effectively banned from be- a strong compliance culture that emanates from the top of the ing involved “in any duties, responsibilities, or activities while organization? If not, you may be personally at risk. employed at the Bank that involved compliance in any way.” The ■■ Is compliance receiving adequate staffing, resources and systems Bank also agreed to payment of $130 million civil money penalty commensurate with the risks faced by the organization? If not, and appointment of an independent monitor to review the Bank’s are you making those needs known to senior management and compliance programs, policies and procedures. the Board and doing all you can to see that they are being met? Also in 2014, FINRA not only took action against the firm If not, you may be personally at risk. of Brown Harriman by fining the firm $8 million for numerous ■■ Does the organization have adequate controls in place that AML compliance failures. It also took action against the firm’s serve to identify risks, including those presented by third-party former AML compliance officer, Harold Crawford, by fining him relationships, before they rise to unmanageable levels and ensure $25,000 and suspending him for one month for his role in those that risks are properly addressed once recognized? If not, you failings, which FINRA alleged included failure to have an ad- may be personally at risk. equate anti-money laundering program in place to monitor and ■■ When problems need to be elevated, does the organization have detect suspicious penny stock transactions, failure to sufficiently a good system in place for alerting senior management and investigate potentially suspicious penny stock activity brought to the Board and getting their support for any corrective actions the firm’s attention, and failure to meet SAR filing requirements. that need to be taken? If not, you may be personally at risk.

MARCH–APRIL 2016 | ABA BANK COMPLIANCE | 9 ■■ Is the Compliance function keeping meticulous records that scales should arguably tip in favor of the latter objective. There is a Become a CRCM. enable it to fully document issues and corrective measures finite number of well-qualified compliance professionals available taken? If not, you may be personally at risk. to financial service organizations, particular in the AML arena. While the cases discussed in this article are relatively few in However, as the above cases illustrate, in today’s environment, Prepare with Con dence. number, the current environment suggests that we will see more assuming a position as a compliance professional carries with it to come. No one questions the need for strong remedial measures increasing risk of ever closer regulatory scrutiny and the potential being taken against a compliance officer who knowingly fails to for personal liability when things go wrong. discharge his or her responsibilities or who looks the other way in This article opened with a brief discussion of the DFS’ recent the face of strong push-back from business lines in the organiza- regulatory proposal to require that compliance officers certify to tion focused exclusively on revenues and agnostic with respect their organization’s compliance with requirements to maintain to whether or not the organization is satisfying its compliance transaction monitoring and filtering program designed to detect Let ABA help you reach your goal faster with responsibilities. That said, there is certainly room for discussion as potential violations of the Bank Secrecy Act and other AML laws to when a compliance officer’s failures should rise to that level. As and to identify and report suspicious activity. As noted above, under these prep options to t your learning style in all things, it’s a question of balance and when that balance tips the proposal, failure to so certify, or the filing of an incorrect or and schedule. too far one way or the other, the result can work a disservice to false certification could expose the officer making the certification sound public policy. A recent SEC action illustrates the dilemma. (i.e., the compliance officer) to criminal and other penalties. It In August of 2015, the SEC issued a decision In the Matter of remains to be seen whether the DFS’s regulation will be adopted ABA CRCM Review Course Judy K. Wolf, a compliance professional working with Wells Fargo as proposed, but one thing is certain, compliance professionals (https://www.sec.gov/alj/aljdec/2015/id851ce.pdf). The SEC found subject to DFS jurisdiction (and those who may become subject Mar. 14, 2016 - May 22, 2016 clear violations on the part of Ms. Wolf, but ultimately declined to to some variation of the proposal should other financial service aba.com/CRCMOnline-DBC sanction her, citing, among other considerations, the following: regulators follow suit) may understandably see this measure as one more means of targeting compliance professionals at a time There is one additional consideration: the fact that Wolf when their services are needed most. ■ ABA CRCM Boot Camp worked in compliance. Obviously, compliance profession- als are subject to the securities laws like everyone else. But May 2-6, 2016 ABOUT THE AUTHOR Wolf is correct to complain that in compliance, “the risk RALPH SHARPE, Counsel at Venable LLP, is head of Venable’s aba.com/CRCMBootCamp-DBC is much too high for the compensation.” Tr. 439. In my Financial Services Group Risk Management and Compliance Team. experience, firms tend to compensate compliance person- Mr. Sharpe draws upon his 26 years of experience in key positions nel relatively poorly, especially compared to other associ- with the Office of the Comptroller of the Currency (OCC), including ated persons possessing the supervisory securities licenses Director of Enforcement and Compliance, Deputy Comptroller compliance personnel typically have, likely because their for Bank Technology, and Deputy Comptroller for Community work does not generate profits directly. But because of their and Consumer Compliance. In addition, Mr. Sharpe served as the responsibilities, compliance personnel receive a great deal Deputy Comptroller for Multinational Banking at the OCC, where of attention in investigations, and every time a violation is he was responsible for the supervision of the ten largest national banks. His full bio can be found at: https://www.venable.com/ detected there is, quite naturally, a tendency for investiga- ralph-e-sharpe/. He can be reached at [email protected]. tors to inquire into the reasons that compliance did not detect the violation first, or prevent it from happening at all. ENDNOTES The temptation to look to compliance for the “low hang- 1 See http://www.dfs.ny.gov/about/press/pr1512011.htm ing fruit,” however, should be resisted. There is a real risk 2 Id. that excessive focus on violations by compliance personnel 3 Id. will discourage competent persons from going into compli- 4 For more information Id. ance, and thereby undermine the purpose of compliance 5 FinCEN’s action against Mr. Haider follows on the heels of a Deferred about the CRCM, including programs in general. That is, “we should strive to avoid the Prosecution Agreement (“DPA”) entered into by MoneyGram on perverse incentives that will naturally flow from targeting November 9, 2012 with the U.S. Attorney’s Office for the Middle District eligibility requirements, visit: of Pennsylvania on various charges, including a charge of willfully failing compliance personnel who are willing to run into the fires to implement an effective AML program. MoneyGram agreed to forfeit aba.com/CRCM that so often occur at regulated entities.” Commisioner $100 million as part of the DPA and to retain an independent compliance Daniel M. Gallagher, Statement on Recent SEC Settlements monitor approved by the DOJ. 6 Charging Chief Compliance Officers With Violations of A copy of FinCEN’s Press Release and the Complaint filed by the USA’s Office can be found at https://www.fincen.gov/news_room/ea/files/ Investment Advisers Act Rule 206(4)-7 (June 18, 2015), Haider_Assessment.pdf and https://www.fincen.gov/news_room/ea/files/ available at http://www.sec.gov/news/statement/sec-cco- USAO_SDNY_Complaint.pdf respectively. settlements-iaa-rule-206-4-7.html. 7 By Order dated March 17, 2015, the case was transferred to the U.S. District Court for the District of Minnesota. As of the submission of this article, no The SEC’s statement suggests that the public policy objectives dispositive actions have been taken in the matter. of ensuring that organizations maintain high levels of compliance 8 Supra, fn 5, Complaint at 3-4. while also attracting and retaining highly-qualified and dedicated 9 See http://www.dfs.ny.gov/about/press/pr1406301.htm compliance professionals need not be at odds. The statement also 10 Id. suggests that when a balance is struck between the two, that the 11 Id., See Paragraph 47 of the Order

MARCH–APRIL 2016 | ABA BANK COMPLIANCE | 11

April 2015 Follow @Paul_Hastings

Key Trends in BSA/AML Compliance: Heightened Regulatory Expectations as Industry Growth Presents New Challenges

BY THE GLOBAL BANKING AND PAYMENT SYSTEMS PRACTICE

As the Federal Banking Agencies (“FBAs”)1 continue to sharpen and focus supervisory attention on enforcement of the Bank Secrecy Act (“BSA”) and U.S. anti-money laundering (“AML”) laws, banks are facing new and difficult regulatory, supervisory, and compliance challenges. Importantly, these developments have been accompanied by a marked uptick in BSA/AML enforcement activity by the FBAs and the Financial Crimes Enforcement Network (“FinCEN”). Highlighting this renewed emphasis, in August 2014, FinCEN issued an advisory emphasizing its expectations for financial institutions’ BSA/AML compliance programs, including: engagement and accountability of financial institution management and directors; allocation of sufficient compliance staffing and related resources; sharing of relevant compliance related information across business units; competent and independent testing of an institution’s BSA/AML compliance program, as well as periodic updates to address emerging issues and trends; and an enterprise-wide understanding of the critical role of BSA/AML reporting requirements.2

Perhaps more significantly, since 2012, the FBAs and FinCEN have brought a number of high profile supervisory and enforcement actions involving BSA/AML compliance issues against financial institutions, including banks and nonbanks.3 A closer review of the enforcement activity since the beginning of 2014 reveals that the FBAs have not only increased their attention on and heightened their expectations for BSA/AML compliance for banks and thrifts, but have also expanded their focus to impose enforcement actions against a broader range of institutions, as well as individual officers of financial institutions. There is no reason to think that this activity will stop at the boardroom; in fact, the regulators have made clear their expectations for director accountability of the bank’s critical compliance programs.

The emphasis on BSA/AML compliance is continuing into 2015, with a notable focus on certain hot- button issues including cryptocurrency, cybersecurity, and innovative payment technologies, such as mobile payments. The regulatory focus on these areas raises new issues for banks, including how to balance increased BSA/AML compliance obligations with monetary costs to the bank, as well as for nonbank institutions—specifically, with respect to the increasingly important role nonbank BSA/AML service providers play in the rapidly expanding footprint of the banking and financial services industry both domestically and internationally.

1

Recent BSA/AML Enforcement Activity In 2014, the FBAs continued to emphasize their expectation that financial institutions establish and implement robust BSA/AML compliance programs.4 The FBAs’ heightened focus on identifying and addressing deficiencies in BSA/AML compliance programs has resulted in significant enforcement actions, including the imposition of substantial civil money penalties (“CMPs”) by the FBAs and FinCEN. Among the more notable enforcement actions highlighting the FBAs’ interest in and attention to BSA/AML issues, the FBAs pursued the following actions against national banks:

. In June 2014, the Office of the Comptroller of the Currency (“OCC”) entered a consent order for a $500,000 CMP with a national bank based on deficiencies identified in its BSA/AML compliance program.5 According to the OCC, during the period from 2010 to 2012 the bank, among other things, failed to (1) conduct adequate risk assessments and customer due diligence; (2) establish and implement an adequate suspicious activity monitoring system; (3) conduct adequate independent testing of its BSA/AML compliance program; and (4) provide the necessary resources and training to its BSA staff. In particular, the OCC alleged that the bank had failed to identify compliance program deficiencies and properly identify high-risk customers, resulting in the failure to timely file approximately 670 suspicious activity reports (“SARs”).

. In a January 2014 agreement with FinCEN, the U.S. Attorney’s Office for the Southern District of New York, and the OCC, a large national bank paid $2.05 billion to settle civil liability claims based on alleged willful violations of the BSA and the failure to report suspicious transactions arising out of a long-standing multi-billion dollar fraudulent investment scheme.6 Under the terms of the settlement, for a number of years, bank employees had identified suspicious repeated round-dollar transactions between two prominent clients but did not file any SARs with law enforcement, even after another bank involved in the transactions filed a SAR and closed down an account owned by one of the clients. Exacerbating the situation, between 2006 and 2008, the bank conducted due diligence reviews on an investment fund and several feeder funds and identified several red flags for fraud, including: (1) investment performances that appeared too good to be true, (2) lack of transparency in investment and trading activity, (3) use of a small, unknown auditor, and (4) repeated refusal by the investment fund to fully comply with due diligence review requests. Despite the red flags, the bank failed to report its concerns to its AML personnel or to notify FinCEN, as required by law, and despite the filing of suspicious activity reports by employees at a foreign branch filed with their host country’s regulator, which was known by the bank’s U.S.-based AML compliance officers. FinCEN criticized the bank’s failure to report these suspicious activities in light of the bank’s redemption of its own investments in the suspicious funds.

. In a similar settlement with the OCC in January 2014, another bank agreed to pay a $500,000 CMP to the OCC as a result of BSA/AML compliance program deficiencies.7 The OCC alleged that the bank’s compliance department lacked resources and expertise, failed to provide for independent testing for BSA compliance, conducted inadequate risk assessments, and failed to implement an adequate suspicious activity monitoring system. The OCC also criticized the bank’s internal audit review for its failure to identify the compliance program’s deficiencies, which, after conducting a look back, resulted in the filing of 110 new SARs and 172 supplemental SARs.

2

The level of interest and enforcement activity has not abated in 2015, with the following action already noted:

. In February 2015, the OCC and FinCEN entered a consent order for a $1.5 million CMP with a community bank based on BSA violations as a result of failure to detect and adequately report suspicious transactions—the transactions involved millions of dollars in illicit proceeds from a judicial corruption scheme.8 According to FinCEN, the bank failed to identify significant red flags, including: (1) a 2007 law enforcement subpoena submitted against individuals and entities involved in the transactions, (2) repeated round-dollar transactions, often occurring on a single day, and (3) abnormal activity volume compared to account balances. FinCEN specifically criticized the bank’s failure to review for risk the accounts and documents of the individuals and entities identified in the subpoena. Another critical factor was that the bank waited two years—after the leaders of the fraud had pled guilty to criminal offenses—before filing SARs regarding the suspicious activity that totaled approximately $6.3 million.

In addition to these more typical actions involving banks, the FBAs also imposed CMPs for BSA/AML violations against a number of nonbank financial institutions, as well as individual officers. These include:

. In March 2015, the OCC and FinCEN entered a consent order for a $75,000 CMP against a money service business (“MSB”) and its owner and AML compliance officer based, among other things, on willful violations of the BSA’s compliance program and reporting requirements.9 The MSB conducted check cashing services, but failed to implement an adequate AML program. The agencies alleged that the MSB lacked adequate internal controls, failed to conduct independent compliance reviews, and failed to adequately train appropriate personnel. Specifically, the company’s AML compliance program lacked procedures for employees to follow when customers presented checks to be cashed for greater than $10,000 as well as procedures for verifying the accuracy of currency transaction reports (“CTRs”). Moreover, the MSB’s employee training failed to address procedures related to check cashing and was conducted infrequently, with new employees not receiving training for many years. Additionally, the company and its AML officer filed CTRs late, and not at all for a period of more than two years.

. In January 2015, FinCEN and the U.S. Securities and Exchange Commission (“SEC”) assessed a $20 million CMP against a securities broker-dealer for BSA violations.10 The agencies alleged that, during the period from 2008 through May 2014, the securities broker-dealer failed to establish and implement an adequate AML program, conduct adequate due diligence on customers, and comply with requirements under Section 311 of the USA PATRIOT Act. In particular, FinCEN identified 16 customers who had engaged in suspicious patterns of trading involving penny stocks, which the security broker-dealer failed to report. The security broker-dealer also failed to conduct adequate due diligence and monitor a foreign financial institution customer that it had deemed “high risk.”

. In December 2014, FinCEN assessed a $1 million CMP against the former Chief Compliance Officer (“CCO”) of an MSB for his failure to ensure the MSB complied with the AML provisions of the BSA.11 Additionally, the U.S. Attorney’s Office for the Southern District of New York, acting as FinCEN’s representative, filed a complaint seeking to enforce the CMP and to ban the CCO from employment in the financial industry. According to FinCEN, the CCO willfully

3

violated the BSA requirements to implement an effective AML compliance program and to report suspicious activity. While serving as CCO, the individual oversaw the MSB’s fraud department, which received thousands of complaints from consumers who had been defrauded by agents of the MSB. FinCEN specifically alleged that the CCO failed to: (1) establish a policy for disciplining agents suspected of involvement in fraud or money laundering, (2) terminate agents known by the MSB to be engaged in fraud or money laundering, (3) ensure timely filing of SARs, (4) ensure effective audits of suspected agents were conducted, and (5) ensure the MSB performed adequate due diligence. According to FinCEN, the CCO violated his obligations as CCO, which allowed criminals to defraud thousands of innocent customers—many of whom were elderly—and launder the proceeds of such funds.

. A month earlier, in November 2014, FinCEN assessed a $300,000 CMP against a small credit union based on alleged BSA violations.12 Notably, the credit union had only five employees and $4 million in assets. However, the credit union contracted with a third party vendor and MSB to provide services and subaccounts to 56 MSBs during the period 2009 to 2014. The 56 MSBs were not members of the credit union, were located in high-risk jurisdictions, and produced over $1 billion in transaction volume through outgoing wire transfers. During the period, the credit union failed to implement an adequate BSA compliance program and, instead, relied on the third-party vendor to conduct its required due diligence on MSBs. FinCEN cited the credit union’s deficient BSA compliance program—inadequate internal controls, lack of independent testing, insufficient training, failure to designate an appropriate BSA compliance officer, and systemic reporting failures—as exposing the U.S. financial system to significant risks of money laundering and terrorist financing.

. In another settlement several months earlier, a MSB and its president/owner agreed to pay a $10,000 CMP to FinCEN for alleged violations of the BSA.13 The president/owner served as the MSB’s compliance officer, despite her lack of knowledge and experience with respect to the BSA. As a result, the MSB failed to develop an effective compliance program. Of particular concern, FinCEN noted that the MSB’s inadequate policies, procedures, and internal controls failed to confirm the identities of consumers, monitor for suspicious transactions, identify currency transactions exceeding certain monetary values, provide sufficient training, or create adequate records. Additionally, the president/owner never conducted a BSA/AML risk assessment of the MSB and failed to conduct independent testing of the MSB’s compliance program for a period of over six years.

Key Trends Emerging in BSA/AML Enforcement and Compliance These recent enforcement actions highlight the ongoing expectation of the FBAs, FinCEN, and state regulators that financial institutions implement and maintain robust BSA/AML compliance programs that are appropriately tailored to the institution’s risk profile. This high level of regulatory scrutiny is likely to continue for the foreseeable future, with key developments emerging to reflect the growth of—and significant changes to—the financial services industry in areas such as mobile and other emerging payment systems, continued reliance and dependence on service providers, and rapidly increasing cybersecurity risks. Based on last year’s actions, financial institutions should understand and remain current on the following enforcement trends:

4

Increased Focus on MSBs, Including Cryptocurrency Companies Although the FBAs have always had the authority, for purposes of the BSA and FinCEN’s implementing regulations, to regulate and bring enforcement actions against a broad range of financial institutions, historical enforcement actions typically focused on banks and, occasionally, their third party service providers. Notably, 2014 marked an expansion in the regulators’ increasing focus on nonbank financial institutions, such as MSBs and securities broker-dealers. Although the enforcement actions taken against MSBs in 2014 generally involved system due diligence, risk monitoring, and reporting failures, the actions also highlight the increased risks and heightened regulatory scrutiny surrounding MSBs.

Since the enactment of the USA PATRIOT Act in 2001, regulatory supervision and enforcement actions have increasingly scrutinized potential money laundering activities, and MSBs have been perceived as higher-risk customers in the wake of these developments. Due to concerns with regulatory scrutiny, uncertainty of regulatory expectations, the risks presented by various types of MSB accounts, and the costs and burdens associated with maintaining MSB accounts,14 many banks have limited MSBs’ access to banking products and services. In response to this “de-risking” of bank MSB operations, the FBAs have recently taken steps to clarify that banks should not be discouraged from working with and serving MSBs, but should have appropriate risk mitigation measures in place to do so.15

A similar approach may be taking shape with respect to the cryptocurrency industry. With the continued expansion of the industry, cryptocurrency companies and financial institutions providing products and services to those in the industry are likely to face increased regulatory scrutiny. For example, in July 2014, the New York State Department of Financial Services (“NYDFS”) proposed to develop a regulatory licensing framework for virtual currency businesses.16 Under the proposed framework, licenses would be required for businesses engaged in: (1) receiving or transmitting virtual currency on behalf of consumers; (2) securing, storing, or maintaining custody or control of such virtual currency on the behalf of customers; (3) performing retail conversion services; (4) buying and selling virtual currency as a customer business; or (5) controlling, administering, or issuing a virtual currency.17 Such licenses would be required, among other things, to maintain robust AML compliance programs that, at a minimum, provide internal controls to ensure ongoing compliance with applicable BSA/AML laws and regulations, provide for independent testing, designate a qualified individual for coordinating and monitoring day-to-day compliance, and provide ongoing training to appropriate personnel.18 To date, four other states—Hawaii, Idaho, Vermont, and Washington—actively license, regulate, and oversee the transmission of virtual currency. Two additional states—California and North Carolina—are in the process of or considering doing so.

As the cryptocurrency industry grows, state and federal banking regulators will be certain to increase their scrutiny of bank practices related to cryptocurrency customers, and/or follow New York’s efforts to impose licensure and industry-specific BSA/AML requirements on the cryptocurrency industry.

Innovative Payment Technologies May Present a Challenge to the FBAs As the payment systems industry continues its rapid growth, innovative and emerging payment technologies and new market participants will present new regulatory challenges and issues for the FBAs, FinCEN, state regulators, and law enforcement.

In particular, as nonbank companies such as telecommunications providers begin to offer new payment systems to their consumers, the FBAs and other regulators will not only need to understand these technologies, but also grapple with their role as regulators to the financial services industry. In most cases, the FBAs have supervisory and examination authority over industry participants

5

pursuant to the Bank Service Company Act; however, in some cases the FBAs’ regulatory jurisdiction may be unclear. Innovations in payment technologies, like the development of mobile wallets and other mobile payment systems, have resulted in an overlap of financial and telecommunication regulatory schemes. Mobile payment services, in particular, are currently subject to oversight by the FCC with respect to mobile carrier standards and competition, the FTC with respect to consumer protection and identity fraud, and the FBAs with respect to consumer protection and banking regulations, including BSA/AML compliance.19 Although it is generally understood that the FBAs’ regulations and laws applicable to payment methods (credit, debit, prepaid, and ACH) govern these mobile payments, uncertainty remains with respect to coverage and liability responsibilities.20 Unlike traditional banking products that allow financial institutions to control much of a transaction, “mobile payments require the coordinated and secure exchange of payment information over several unrelated entities,”21 many of which have not previously been subject to the FBA’s oversight and supervision.

In addition to the challenge of converging telecommunication and financial regulatory schemes, mobile payments present increased risks of money laundering and financing of terrorism activities. For example, criminals have increased access to a consumer’s banking account by stealing a mobile phone with inadequate security or hacking a wireless network that transfers the financial data for such account. The continued growth of the mobile payments industry is requiring the FBAs to determine which technologies to supervise, how to supervise such technologies, and which technologies are more appropriately and effectively regulated by other agencies (i.e., the FCC or FTC).

Implications for Community Banks As highlighted by FinCEN’s imposition of a CMP on a small credit union in April 2014, every financial institution is expected to establish a BSA/AML compliance program commensurate with the institution’s risk level, regardless of the institution’s size or staffing. Financial institutions must carefully consider the risks associated with their customers and lines of business to determine what resources are required to adequately monitor BSA/AML risks. Importantly, smaller financial institutions must walk a fine line between heightened regulatory expectations requiring robust compliance programs, and managing the typically higher costs of such compliance programs. And this is not only a financial resources issue; some banks have faced regulatory criticism due to skyrocketing compliance costs. Typically, it is not uncommon for a small community bank’s earnings to suffer as a result of such costs. The enhanced scrutiny on BSA/AML compliance for small financial institutions and increased regulatory expectations present the very real risk that small financial institutions may effectively be supervised out of the market. This is an issue with which the FBAs and other regulators are aware and continuously trying to address, but for which there are no ready solutions.

Oversight of Third Party Vendors The FBAs have made clear that reliance on third party service providers for due diligence will not be sufficient to satisfy regulatory expectations. While financial institutions may appropriately outsource aspects of their BSA/AML compliance programs to third party compliance vendors, financial institutions and their officers will ultimately be held responsible for the institution’s BSA/AML compliance program. It is critical that institutions using third party vendors take appropriate measures to oversee vendors’ ongoing activities and operations on behalf of the bank, as well as to implement additional checks and controls within the institution to oversee and ensure compliance on a real-time basis.

6

Cybersecurity FBAs are increasingly considering a financial institution’s cybersecurity measures as part of the institution’s BSA/AML compliance obligations. In a March 2, 2015 speech by OCC Comptroller Curry before the Institute of International Bankers, Comptroller Curry noted “the goals of BSA/AML and cybersecurity are increasingly converging. Terrorists, drug cartels, and cybercriminals all have a need to generate cash and move money, and it would seem that many of them would share some of the same goals. There are lessons to be learned from our decades-long experience in BSA enforcement that can be applied to the cybersecurity area, and vice versa.”22 Clearly, this is a time in which financial institutions of all sizes should be expecting increased FBA supervision of their cybersecurity measures, including as an ongoing part of both their supervisory safety and soundness and regulatory compliance examinations.

Focus on Individual Accountability23 Financial institutions and their staff must also be aware of and vigilant with respect to understanding the scope and nature of enforcement actions that could be brought directly against individual officers and directors for institutional BSA/AML compliance failures. As highlighted in several of the enforcement actions discussed above, the FBAs may hold individual officers accountable for compliance program deficiencies, regardless of whether the officers serve at national banks with significant experience and compliance resources, at small insured institutions, or at relatively new MSBs or other nonbank entities.

In addition to these enforcement actions, the Comptroller raised the issue of senior management “oversight accountability” for BSA/AML compliance, suggesting that financial institutions should be required to establish “clear lines of accountability that make it possible to hold senior executives responsible for serious compliance breakdowns that lead to BSA program violations.”24 State regulators appear to be adopting a similar approach. For example, NYDFS Superintendent Benjamin Lawsky has stated that “fines—while often necessary—are not sufficient to deter misconduct on Wall Street … We must also work to impose individual accountability, where appropriate, and clearly proven, on specific bank employees that engaged in wrongdoing.”25 NYDFS put its theory into action last year, requiring a bank, as part of a settlement agreement for violating U.S. sanctions and anti- money laundering rules, to terminate 13 officers and discipline 45 employees found responsible for or complicit with the bank’s alleged misconduct.26

Action Plan for Financial Institutions Given the increasingly complex BSA/AML compliance landscape, it is critical for banks and nonbank financial firms to develop and implement an action plan to address the heightened regulatory scrutiny and program risks presented with BSA/AML compliance. This requires an enterprise-wide review and assessment of BSA/AML risk, regardless of the size and complexity (or lack thereof) of a financial institution’s operations. At a minimum, an action plan should include the following:

. Ensure a Strong Top-Down Compliance Culture. Involvement by bank senior officers and directors in understanding and overseeing a financial institution’s BSA/AML compliance program is a key element of an effective program. Directors must be active participants in reviewing and overseeing an institution’s compliance function and activities. Boards of directors should consider building BSA/AML compliance measures into the performance criteria for senior bank and business unit managers, ensuring that responsibility for oversight is assumed at the highest levels of the organization. This should include implementing clearly

7

defined channels for reporting compliance deficiencies, and conducting thorough board reviews of BSA/AML compliance lapses to assess program weaknesses and determine whether additional board action may be warranted to address compliance program deficiencies. Implementing a strong compliance culture at all levels of the organization will help to ensure that employees recognize that compliance is a top priority.

. Committing Sufficient Personnel and Technological Resources, While Avoiding Excessive Overhead Costs. As discussed above, there has been increased tension between financial institutions’ BSA/AML compliance obligations and the need to keep overhead costs appropriate for the size of the institution. A financial institution must be able to demonstrate to regulators that it has committed the necessary resources—and is willing and able to invest additional resources, as appropriate—to establish and maintain a robust BSA/AML compliance program, including investments in technology, staff, training, and monitoring capabilities. The cost of committing adequate resources up-front will produce benefits in terms of reduced risk exposure and potential remedial costs and fines for failing to take the necessary actions to achieve and maintain BSA/AML compliance.

. Focus on Cybersecurity. In addition to maintaining updated information technology (“IT”) software and programs, management and boards should ensure adequately trained staffing to monitor and supervise these processes and programs. Examiners will typically probe IT systems and back-end analytical departments to ensure that case management processes for unique or unusual transactions are supported by reasonable financial intelligence.

. Risk Management. Regulators will continue to examine financial institutions with a focus on ensuring that senior management and boards of directors have taken the time to identify the particular risks posed by a financial institution’s business model and designed a BSA/AML compliance program that addresses such risks. Institutions should consider reviewing and updating their internal controls as necessary to address new and increased risks associated with particular industries and customers.

. Effective Detection and Reporting. Effective transaction monitoring and detection systems should be deployed and sufficiently staffed by trained personnel. While the particulars of a financial institution’s detection and reporting system will be based on its size and BSA/AML risk profile, senior management should ensure that a financial institution’s BSA and SARs policies are clear, precise and leave limited discretion to lower-level employees, which will promote consistent and timely filing. In addition to general BSA/AML training provided to all employees, financial institutions should consider additional training targeted at certain business units that pose higher risks and should make sure that such units are appropriately designed and equipped to detect and report suspicious activities related to heightened BSA/AML risks.

. Smaller Financial Institution Risks. Smaller financial institutions should identify particular lines of business or geographic regions that pose higher risks, and ensure such risks are specifically reflected and addressed in their BSA/AML compliance program, policies, and procedures. For example, an institution may not have a significant foreign presence, but may engage in issuing prepaid cards, supporting cash intensive businesses, have significant mobile banking platforms, and/or may serve particular groups of high-risk customers, all of which increase the institution’s overall BSA/AML risk profile.

8

  

If you have any questions concerning these developing issues, please do not hesitate to contact any of the following Paul Hastings lawyers:

Atlanta Miah Ramanathan Lawrence D. Kaplan Todd W. Beauchamp +44 020 3023 5178 1.202.551.1829 1.404.815.2154 [email protected] [email protected] [email protected] Palo Alto Gerald S. Sachs Chris Daniel Cathy S. Bedya 1.202.551.1975 1.404.815.2217 1.650.320.1824 [email protected] [email protected] [email protected] Alexandra L. Anderson Erica Berg Brennan San Francisco 1 202 551 1969 1.404.815.2294 Thomas P. Brown [email protected] [email protected] 1.415.856.7248 [email protected] Laura E. Bain Heena A. Ali 1.202.551.1828 1.404.815.2393 Stan Koppel [email protected] [email protected] 1.415.856.7284 [email protected] Ryan A. Chiachiere Kevin P. Erwin 1.202.551.1767 1.404.815.2312 Ryan M. Decker [email protected] [email protected] 1.415.856.7237 [email protected] Katie A. Croghan Meagan E. Griffin 1.202.551.1849 1.404.815.2240 Molly E. Swartz [email protected] [email protected] 1.415.856.7238 [email protected] Lauren Kelly D. Greenbacker Diane Holden 1.202.551.1985 1.404.815.2326 Paul M. Schwartz laurenkellygreenbacker@paulhasting [email protected] 1.415.856.7090 s.com [email protected] London Amanda Kowalski Ben Regnard-Weinrabe Washington, D.C. 1.202.551.1976 [email protected] +44 020 3023 5185 V. Gerard Comizio [email protected] 1.202.551.1272

[email protected] Nikki Johnstone +44 020 3023 5112 Behnam Dayanim [email protected] 1.202.551.1737 [email protected]

1 The FBAs are the Office of the Comptroller of the Currency (“OCC”), the Federal Deposit Insurance Corporation (“FDIC”), and the Board of Governors of the Federal Reserve System (“FRB”). 2 See Financial Crimes Enforcement Network, FIN-2014-A007, Advisory to U.S. Financial Institutions on Promoting a Culture of Corporate Compliance (August 11, 2014) (“Advisory”), available at http://fincen.gov/statutes_regs/guidance/pdf/FIN-2014-A007.pdf. 3 For purposes of the BSA and FinCEN implementing regulations, a “financial institution” includes: banks, trust companies, U.S. agencies or branches of foreign banks, credit unions, and thrifts; brokers or dealers in securities or commodities

Paul Hastings LLP StayCurrent is published solely for the interests of friends and clients of Paul Hastings LLP and should in no way be relied upon or construed as legal advice. The views expressed in this publication reflect those of the authors and not necessarily the views of Paul Hastings. For specific information on recent developments or particular factual situations, the opinion of legal counsel should be sought. These materials may be considered ATTORNEY ADVERTISING in some jurisdictions. Paul Hastings is a limited liability partnership. Copyright © 2015 Paul Hastings LLP. 9

and investment companies; currency exchangers, issuers, redeemers, or cashiers of travelers checks, checks, money orders, or similar instruments; insurance companies; dealers in precious metals, stones, or jewels; pawnbrokers and loan or finance companies; money transmitters; and certain casinos or gaming establishments. See 31 U.S.C. § 5312(a)(2); 31 C.F.R. § 1010.100(t). 4 Paul Hastings previously detailed the rise in BSA/AML and OFAC enforcement activity targeted at depository institutions in the Paul Hastings Client Alert titled AML/BSA and OFAC Compliance—Higher Stakes and Greater Consequences for Banks (March 2013), available at http://www.paulhastings.com/docs/default-source/PDFs/stay-current---bsaaml-and- ofac-compliance-higher-stakes-and-greater-consequences-for-banksdf36df6923346428811cff00004cbded.pdf. 5 See OCC EA 2014-094, AA-EC-2014-60 (June 26, 2014), available at http://www.occ.gov/static/enforcement-actions/ea2014-094.pdf. 6 See FinCEN Matter No. 2014-1 (January 7, 2014), available at http://www.fincen.gov/news_room/ea/files/JPMorgan_ASSESSMENT_01072014.pdf. 7 See OCC EA 2014-006, AA-EC-2013-11 (January 14, 2014), available at http://www.occ.gov/static/enforcement- actions/ea2014-006.pdf. 8 See FinCEN number 2015-03 (February 27, 2015), available at http://www.fincen.gov/news_room/ea/files/FNCB_Assessment.pdf. 9 See FinCEN number 2015-03 (February 27, 2015), available at http://www.fincen.gov/news_room/ea/files/FNCB_Assessment.pdf. 10 See Press Release, FinCEN (January 27, 2015), available at http://www.fincen.gov/news_room/nr/html/20150127.html. 11 See Press Release, FinCEN (December 18, 2014), available at http://www.fincen.gov/news_room/nr/pdf/20141218.pdf. 12 See Press Release, FinCEN (November 25, 2014), available at http://www.fincen.gov/news_room/nr/html/20141125.html. 13 See FinCEN Matter No. 2014-03 (April 23, 2014), available at http://www.fincen.gov/news_room/ea/files/NMCE%20Assessment.pdf. 14 See OCC Acting Comptroller Julie L. Williams, Testimony before Committee on Banking, Housing, and Urban Affairs of the U.S. Senate at 12 (April 26, 2005). 15 See Cohen Speech; see also FinCEN Statement. 16 See Press Release, NYDFS (July 17, 2014), available at http://www.dfs.ny.gov/about/press2014/pr1407171.html. 17 See Press Release, NYDFS (July 17, 2014), available at http://www.dfs.ny.gov/about/press2014/pr1407171.html. 18 See Section 200.15 of proposed BitLicense Regulatory Framework (February 25, 2014), available at http://www.dfs.ny.gov/legal/regulations/revised_vc_regulation.pdf; see also Press Release, NYDFS (July 17, 2014), available at http://www.dfs.ny.gov/about/press2014/pr1407171.html. 19 See Federal Reserve Bank of Atlanta, The U.S. Regulatory Landscape for Mobile Payments (July 25, 2012). 20 See Federal Reserve Bank of Atlanta, The U.S. Regulatory Landscape for Mobile Payments (July 25, 2012). 21 See FDIC, Supervisory Insights—Winter 2012—Mobile Payments: An Evolving Landscape (January 3, 2013), available at https://www.fdic.gov/regulations/examinations/supervisory/insights/siwin12/mobile.html. 22 Remarks by Thomas J. Curry, Comptroller of the Currency, Before the Institute of International Bankers (Mar. 2, 2015), available at http://www.occ.gov/news-issuances/speeches/2015/pub-speech-2015-32.pdf. 23 For additional detail on the growing threat of enforcement actions targeted at individual financial institution officers and directors for institutional violations of law, please see the recently issued Paul Hastings Client Alert titled Getting Personal—Financial Regulators Warn of New Era of Individual Responsibility (April 2014), available at http://www.paulhastings.com/docs/default-source/PDFs/getting-personal-financial-regulators-warn-of-new-era-of- individual-responsibility.pdf. 24 Thomas J. Curry, Remarks Before the Association of Certified Anti-Money Laundering Specialists (March 17, 2014), available at http://www.occ.gov/news-issuances/speeches/2014/pub-speech-2014-39.pdf. 25 Press Release, New York Department of Financial Services (November 18, 2014), available at http://www.dfs.ny.gov/about/press2014/pr1411181.htm. 26 Press Release, New York Department of Financial Services (June 30, 2014), available at http://www.dfs.ny.gov/about/press2014/pr1406301.htm.

10

November/December 2015 - Print Pages Page 1 of 5

http://magazines.aba.com/bcmag/november_december_2015/Print_submit.action?articleTit ... 4/ 20/ 2016 November/December 2015 - Print Pages Page 2 of 5

http://magazines.aba.com/bcmag/november_december_2015/Print_submit.action?articleTit ... 4/ 20/ 2016 November/December 2015 - Print Pages Page 3 of 5

http://magazines.aba.com/bcmag/november_december_2015/Print_submit.action?articleTit ... 4/ 20/ 2016 November/December 2015 - Print Pages Page 4 of 5

http://magazines.aba.com/bcmag/november_december_2015/Print_submit.action?articleTit ... 4/ 20/ 2016 November/December 2015 - Print Pages Page 5 of 5

http://magazines.aba.com/bcmag/november_december_2015/Print_submit.action?articleTit ... 4/ 20/ 2016 March/April 2016 - Print Pages Page 1 of 4

http://magazines.aba.com/bcmag/march_april_2016/Print_submit.action?articleTitle=&arti ... 4/ 20/ 2016 March/April 2016 - Print Pages Page 2 of 4

http://magazines.aba.com/bcmag/march_april_2016/Print_submit.action?articleTitle=&arti ... 4/ 20/ 2016 March/April 2016 - Print Pages Page 3 of 4

http://magazines.aba.com/bcmag/march_april_2016/Print_submit.action?articleTitle=&arti ... 4/ 20/ 2016 March/April 2016 - Print Pages Page 4 of 4

http://magazines.aba.com/bcmag/march_april_2016/Print_submit.action?articleTitle=&arti ... 4/ 20/ 2016 REGULATORY FRAUD REPORTING LOST IN A SEA OF CHANGE?

BY BRIDGET BERG

SUMMARY >VÌÀiµÕˆÀiÃw˜>˜Vˆ>ˆ˜Ã̈ÌṎœ˜Ã̜Žii« ˜Óä£Ó]Ì i >˜Ž-iVÀiVÞƂVÌiÝ - records of cash purchases of negotiable panded its requirements for reporting of ˆ˜ÃÌÀՓi˜ÌÃ]wiÀi«œÀÌÃœvV>à ÌÀ>˜Ã>V - “œÀÌ}>}iœ>˜vÀ>Õ`̜ˆ˜VÕ`i˜œ˜L>˜Ž ̈œ˜ÃiÝVii`ˆ˜}f£ä]äää­`>ˆÞ>}}Ài}>Ìi residential mortgage loan originating amount), and to report suspicious activ- companies. This expansion was expected, ity that might signify money laundering, over time, to help the ability of regula- tax evasion, or other criminal activities. It tors and the mortgage industry to have was passed by the Congress of the United Bridget Berg greater transparency in and awareness of States in 1970. The BSA is sometimes mortgage fraud trends. However, more referred to as an anti-money laundering than three years after the effective date >Ü­Ƃ ®œÀœˆ˜ÌÞ>à -ƂÉƂ °-iÛiÀ> of the regulation, reporting levels are a AML acts, including provisions in Title III of fraction of estimates. Has this regulatory More than three Ì i1-Ƃ*Ƃ/,"/ƂVÌœvÓää£] >ÛiLii˜ change been lost in the shadow of other years after enacted up to the present to amend the V >˜}iÃ]ÃÕV >Ã/, ¶ the enactment -Ƃ°­-iiΣ1- xΣ£‡xÎÎä>˜`Σ , of the Bank This article provides insight into the >«ÌiÀ8QvœÀ“iÀÞΣ ,*>ÀÌ£äÎR®° Secrecy Act, ˆÃ̜ÀÞœv-ÕëˆVˆœÕÃƂV̈ۈÌÞ,i«œÀ̈˜} Beginning in 2002, mortgage loan fraud reporting levels and Anti-Money Laundering requirements >ÃLii˜V>i`œÕÌ>Ã>ëiVˆwV>Ài>œv are a fraction of >˜`ˆ`i˜ÌˆwiëœÌi˜Ìˆ>`ˆÃVÀi«>˜VˆiÃ>˜` estimates. Has complexities in deciding how to approach ˆ˜ÌiÀiÃÌvœÀÌ i >˜Ž-iVÀiVÞƂVÌ-ÕëˆVˆœÕà this regulatory reporting as potential fraudulent trends ƂV̈ۈÌÞ,i«œÀ̈˜}° change been From 2002 to 2012, Suspicious Activ- lost in the continue to evolve. ˆÌÞ,i«œÀÌí-Ƃ,îvœÀ“œÀÌ}>}iœ>˜vÀ>Õ` shadow of other changes, BACKGROUND AND TIMELINE ÜiÀiwi`«Àˆ“>ÀˆÞLÞ`i«œÃˆÌœÀÞˆ˜Ã̈ÌÕ - such as TRID? The Currency and Foreign Transac- tions, and reporting volumes increased ̈œ˜Ã,i«œÀ̈˜}ƂVÌœv£™Çä­Ü ˆV i}ˆÃ - È}˜ˆwV>˜ÌÞvÀœ“ÓääÓ̜Ó䣣° iV>ÕÃi >̈ÛivÀ>“iܜÀŽˆÃVœ““œ˜ÞÀiviÀÀi`̜ much of the reported activity was found >ÃÌ i >˜Ž-iVÀiVÞƂVÌœÀ -Ƃ®ÀiµÕˆÀià during review of defaulted loans years after 1°-°w˜>˜Vˆ>ˆ˜Ã̈ÌṎœ˜Ã̜>ÃÈÃÌ1°-° the actual suspicious activity, the reporting government agencies to detect and pre- «i>Ž­ˆ}ÕÀi£\Ài`ˆ˜i®à œÜÃ>wÛi‡̜ Ûi˜Ì“œ˜iޏ>՘`iÀˆ˜}°-«iVˆwV>Þ]Ì i six-year delay versus the start of suspi- 6

10 March 2016 VˆœÕÃ>V̈ۈÌÞ«i>Ž­ˆ}ÕÀi£\LÕiˆ˜i®°,i}>À`iÃà / iÀivœÀi]Ì iÓä£{>˜`Óä£xwˆ˜}iÛiÃvÀœ“Ì i œvº`i>Þi``ˆÃVœÛiÀˆiÃ]»Ì iˆ˜VÀi>Ãiˆ˜Ì iۜÕ“i ˆ˜ -Ƃ,-Ì>ÌÃÈÌiÜiÀiÕÃi`vœÀÌ ˆÃ>À̈Vi° œv>VÌÕ>Ài«œÀÌÃÜ>Ã`iw˜ˆÌiÞÈ}˜>ˆ˜}>ÛiÀޏ>À}i rise in mortgage loan fraud in the years before the MARKET SHARE INCREASE w˜>˜Vˆ>VÀˆÃˆÃ° FOR NONBANK LENDERS Originations in the industry moved away from ˜œ˜L>˜ŽÃ>vÌiÀÌ iw˜>˜Vˆ>VÀˆÃˆÃ]LÕ̘œ˜L>˜ŽÃ>Ài ˜œÜ“>Žˆ˜}>ÃÌÀœ˜}Vœ“iL>VŽ°˜Ì ivœÕÀÌ µÕ>ÀÌiÀ œvÓä£x]˜œ˜L>˜Ži˜`iÀÃ>VVœÕ˜Ìi`vœÀ{n°Ç«iÀVi˜Ì œv- ‡ÃiVÕÀˆÌˆâi`Ș}i‡v>“ˆÞ“œÀÌ}>}iÃ]Õ«vÀœ“ £Ó«iÀVi˜Ìˆ˜Óä£ä>˜`Σ«iÀVi˜Ìˆ˜Óä£Î°ˆÛi˜Ì i ÌÀi˜`]ˆÌˆÃˆŽiÞÌ >ÌÓä£ÈœÀˆ}ˆ˜>̈œ˜Ã܈LiiÛi˜Þ 돈ÌLiÌÜii˜L>˜ŽÃ>˜`˜œ˜L>˜ŽÃ°Àœ“>-Ƃ, perspective, half of the suspicious mortgage origi- ˜>̈œ˜>V̈ۈÌވψŽiÞœVVÕÀÀˆ˜}ˆ˜˜œ˜L>˜ŽÃpÌ i ˜i܏Þˆ˜VÕ`i`ˆ˜Ã̈ÌṎœ˜Ãˆ˜Ì iÓä£Ó-Ƃ,Ài«œÀ̈˜} expansion. Figure 1: FinCEN 2012 SAR Data RELATIVELY LOW FILINGS ̈Ãiۈ`i˜ÌÌ >̘œ˜L>˜Ž-Ƃ,Ài«œÀ̈˜}ˆÃ՘`iÀ - i}ˆ˜˜ˆ˜}ˆ˜Óä£Ó]˜œ˜L>˜Ži˜`iÀÃÜiÀiˆ˜VÕ` - ed in the responsibility to maintain anti-money laun- ÃÌ>Ìi`}ˆÛi˜˜œ˜L>˜Ž«iÀVi˜Ì>}iœvœÛiÀ>“œÀÌ - `iÀˆ˜}«Àœ}À>“Ã>˜`wi-ÕëˆVˆœÕÃƂV̈ۈÌÞ,i«œÀÌð gage originations: *ÀˆœÀ̜Ì ˆÃ]Ì iÞ`ˆ`˜œÌwi-Ƃ,ð U œÀÌ}>}iœ>˜vÀ>Õ`-Ƃ,wˆ˜}ÃvœÀ`i«œÃˆÌœÀÞˆ˜ - stitutions averaged 2,731 per month in 2014 and KEY DATES: 2,134 per month in 2015. February 14, 2012 qˆ˜>,Տi«ÕLˆÃ i`ÀiµÕˆÀˆ˜} U /œiÃ̈“>Ìiwˆ˜}vœÀ˜œ˜L>˜ŽÃ]ˆ˜Ã̈ÌṎœ˜V>Ì - ˜œ˜L>˜ŽÃ̜Vœ“«ÞÜˆÌ Ƃ >˜`-Ƃ,ÀiµÕˆÀi - i}œÀˆiÃœvºœÌ iÀ»>˜`ºœ>˜Éˆ˜>˜Vi œ“«> - ments. ˜ˆiûÜiÀiVœ“Lˆ˜i`°/ iVœ“Lˆ˜i`iÃ̈“>Ìià º/ i-Ƃ,Ài}Տ>̈œ˜ÀiµÕˆÀiÃÀi«œÀ̈˜}œvÃÕëˆ - averaged 294 per month in 2014 and 390 per cious activity, including but not limited to fraudulent month in 2015. attempts to obtain a mortgage or launder money U / iiÃ̈“>Ìiˆ˜Ì iÓä£Óˆ˜>,ՏivœÀ«ÕÀ«œÃià by use of the proceeds of other crimes to purchase œvV>VՏ>̈˜}Ì i-Ƃ,Ài«œÀ̈˜}LÕÀ`i˜vœÀ˜œ˜ - ÀiÈ`i˜Ìˆ>Ài>iÃÌ>Ìi°»­i`iÀ>,i}ˆÃÌiÀ6œÇÇiL L>˜ŽÃÜ>ÃΣ]äää>˜˜Õ>ÞœÀÓ]xnÎ-Ƃ,Ài«œÀÌà 14, 2012) per month. August 13, 2012 – Effective date for compliance œ“«>Àˆ˜}˜œ˜L>˜Žwˆ˜}iÛiÃ̜`i«œÃˆÌœÀÞ ÜˆÌ Ì iˆ˜>,Տi° ˆ˜Ã̈ÌṎœ˜wˆ˜}iÛiÃ>˜`̜Ì iiÃ̈“>ÌiȘÓä£Ó] April, 2013 q iVÌÀœ˜ˆVwˆ˜}ÃÌ>˜`>À`LiV>“iiv - ÃÕ}}iÃÌÃÌ >ÌÌ i˜œ˜L>˜Ž-Ƃ,wˆ˜}À>ÌiÃ>Ài“ÕV  viV̈ÛiÆÌ iÀivœÀi]-ÕëˆVˆœÕÃƂV̈ۈÌÞ,i«œÀÌÃÜiÀi lower than expected. The impact of delayed discov- ÀiµÕˆÀi`̜Liwi`iiVÌÀœ˜ˆV>Þ° eries may account for a portion of the difference, LÕ̏>VŽœv>Ü>Ài˜iÃÃœvÀiµÕˆÀi“i˜ÌÃ>˜`ˆ““>ÌÕÀi August, 2014 qƂÃi«>À>Ìi`iÈ}˜>̈œ˜œvw˜>˜Vˆ> «Àœ}À>“Ș˜œ˜L>˜ŽÃ>ÀiˆŽiÞ>À}iÀv>V̜À𠈘Ã̈ÌṎœ˜ÃvœÀºœ>˜œÀˆ˜>˜Vi œ“«>˜Þ»Ü>ÃivviV - tive within the FinCEN electronic reporting system. COMPLEXITIES IN REPORTING – SHOULD Today, Ì iˆ˜>˜Vˆ> Àˆ“ià ˜vœÀVi“i˜Ì iÌܜÀŽ YOU OR SHOULD YOU NOT? ­ˆ˜ ®“>ŽiÃÃՓ“>ÀÞ`>Ì>«ÕLˆVÞ>Û>ˆ>LivœÀ œ˜L>˜ŽÃÀ>˜}iˆ˜ÈâivÀœ“ÛiÀÞÓ>܏i -Ƃ,wˆ˜}Ãwi`Ì ÀœÕ} Ì iiiVÌÀœ˜ˆVÃÞÃÌi“°˜ proprietorships to large corporations. Although most Óä£Ó>˜`Óä£Î]-Ƃ,ÃՓ“>ÀÞ`>Ì>Vœ“«ˆ>̈œ˜>˜` ˜œ˜L>˜ŽÃ“>Þ >Ûii“«œÞiiÃÜˆÌ «ÀˆœÀiÝ«iÀˆi˜Vi availability had multiple changes and inconsistencies. ˆ˜`i«œÃˆÌœÀÞˆ˜Ã̈ÌṎœ˜Ã]“œÃÌ>Ài՘ˆŽiÞ̜ >Ûi 6

12 March 2016 iÝ«iÀˆi˜Viˆ˜-Ƃ,Ài«œÀ̈˜}° / iw˜>˜Vˆ>Ài}Տ>̜ÀÃÓä£{ >˜Ž-iVÀiVÞƂVÌÉ Ûi˜`i«œÃˆÌœÀÞˆ˜Ã̈ÌṎœ˜ÃÜˆÌ “>ÌÕÀi-Ƃ,«œ - Anti-Money Laundering Examination Manual ac- ˆVˆiÃ>˜`Þi>ÀÃœvvii`L>VŽvÀœ“ -ƂiÝ>“ˆ˜>̈œ˜Ã Ž˜œÜi`}iÃ\º/ i`iVˆÃˆœ˜̜wi>-Ƃ,ˆÃ>˜ˆ˜ iÀ - may struggle when determining whether a situation i˜ÌÞÃÕLiV̈ÛiÕ`}“i˜Ì°»ÌÌ i˜i“« >ÈâiÃÌ i of mortgage fraud or suspected mortgage fraud ˆ˜Ã̈ÌṎœ˜½Ã«ÀœViÃÃ̜iÃV>>Ìi>˜`iÛ>Õ>ÌiÈÌÕ> - should be reported. Misrepresentation and fraud tions rather than individual decisions. can occur over the life of the loan, from origination Ì ÀœÕ} ÃiÀۈVˆ˜}]œÃӈ̈}>̈œ˜]>˜`, "`ˆÃ«œÃˆ- BEST PRACTICES tions, and the schemes and trends can change over ˆÛi˜Ì i>“Lˆ}ՈÌÞˆ˜ÛœÛi`ˆ˜“>Žˆ˜}Ì i`iVˆ - time. The mortgage industry does not have a single sion to report or not, the following guidelines are >ÕÌ œÀˆÌ>̈Ûi`iw˜ˆÌˆœ˜œvÜ >ÌVœ˜Ã̈ÌÕÌiÃ>VÌÕ>œÀ suggested: attempted misrepresentation or fraud. U 7œÀŽÜˆÌ ޜÕÀi}>œÀVœ“«ˆ>˜ViiÝ«iÀÌÃvœÀ Most origination-type misrepresentations are }Ո`>˜Viœ˜Ƃ >˜`-Ƃ,Vœ“«ˆ>˜Vi° based on false statements or omissions regarding the • Create and execute on a policy regarding em- LœÀÀœÜiÀ½Ã>LˆˆÌÞ̜µÕ>ˆvÞvœÀÌ iœ>˜œÀ“ˆÃÀi« - «œÞiiÌÀ>ˆ˜ˆ˜}vœÀˆ`i˜ÌˆwV>̈œ˜>˜`iÃV>>̈œ˜ resentation of the terms of the transaction or settle- of suspicious situations to promote consistency in ment details. Often, the intent behind misrepresenta- wˆ˜}° tion appears clear, such as the case of a fabricated or • Include auditable fraud prevention and detection >ÌiÀi`«>ÞÃÌÕLœÀL>˜ŽÃÌ>Ìi“i˜Ì° ÕÌܓï“iÃˆÌ processes in your transaction and quality control is uncertain whether discrepancies are due to misun- ܜÀŽyœÜð derstanding, incomplete documentation, or a true U iÌiÀ“ˆ˜iˆv>vœÀ“>`iVˆÃˆœ˜«ÀœViÃÃvœÀwˆ˜} intent to defraud. An example of a less clear situation is where a is prudent for your organization. If you have a LœÀÀœÜiÀÀiw˜>˜ViÃ> œ“iÌ iÞVÕÀÀi˜ÌÞœVVÕ«ÞvœÀ process, adhere to it consistently. cash out prior to purchasing another home. On the CONCLUSION standard loan application, the occupancy question is œÀÌ}>}iœ>˜vÀ>Õ`-ÕëˆVˆœÕÃƂV̈ۈÌÞ,i«œÀÌȘ phrased: “Do you intend to occupy the property as Ì iÞi>ÀÃLivœÀiÌ iw˜>˜Vˆ>VÀˆÃˆÃˆ˜`ˆV>Ìi`>à >À« ޜÕÀ«Àˆ“>ÀÞÀiÈ`i˜Vi¶»/ i>««ˆV>̈œ˜µÕiÃ̈œ˜ trend of increased problematic activities. The expan- does not specify for how long the applicant intends Ȝ˜œv-ÕëˆVˆœÕÃƂV̈ۈÌÞ,i«œÀ̈˜}>˜`>˜Ìˆ‡“œ˜iÞ to occupy. However, at closing, the mortgage docu- >՘`iÀˆ˜}ÀiµÕˆÀi“i˜ÌÃ̜˜œ˜L>˜ŽÃÜ>Ã>«œÃˆ - ment includes a covenant that the borrower intends tive step in closing gaps that could be exploited by to occupy the property within 60 days and for a VÀˆ“ˆ˜>Ã]>˜`“>ŽiÏi˜`ˆ˜}i“«œÞiiȘ>i˜`ˆ˜} period of 12 months. institutions accountable for controlling and report- vÌ iLœÀÀœÜiÀÕÃiÃÌ iV>à œÕÌvÀœ“Ì iwÀÃÌ property to purchase a new primary residence and ing fraud. Successful execution of the expansion will moves to the new property, is this a case of inten- provide FinCEN, regulators, law enforcement, and tional fraud, incomplete documentation, or a misun- most importantly, the mortgage industry with a more `iÀÃÌ>˜`ˆ˜}¶ complete and possibly timelier view of fraud activity. 7>ÃÌ iÀi>Ș}i“œÀÌ}>}iœ>˜œvwViÀœ˜LœÌ  As we enter an era of increased credit availability, the ÌÀ>˜Ã>V̈œ˜Ã¶7 >ÌÜ>ÃÌ ï“ˆ˜}LiÌÜii˜Ì iÌÀ>˜Ã- “œÀiÀœLÕÃÌ-Ƃ,ÀiµÕˆÀi“i˜ÌÃ>˜`ÀiÃՏ̈˜}wˆ˜} >V̈œ˜Ã¶ ˆ`Ì iLœÀÀœÜiÀ >Ûi>«ÀˆœÀ>««ˆV>̈œ˜œ˜ levels may be an even better warning if these changes Ì iÀiw˜>˜ViÌ >ÌÜ>ÃVœÕ˜ÌiÀ‡œvviÀi`>Ã>˜ˆ˜ÛiÃÌ - >Ài>VVœ“«>˜ˆi`LÞ՘>VVi«Ì>LivÀ>Õ`ÀˆÃŽ° MC M “i˜Ì«Àœ«iÀÌÞ>˜`ÜˆÌ `À>ܘ¶ vÌ iÃiœÌ iÀv>V̜ÀȘyÕi˜ViÌ i-Ƃ,wˆ˜}`i - VˆÃˆœ˜]ˆÌˆÃˆŽiÞÌ >ÌÈÌÕ>̈œ˜ÃÜ ˆV >««i>Àȓˆ>À Bridget Berg is Senior Director, Fraud Solutions Strat- initially may result in different decisions. Therefore, it egy, for CoreLogic, where she leads the delivery of ˆÃ«ÀÕ`i˜Ì̜ >Ûi«œˆVˆiÃ]}Ո`>˜Vi]>˜`ɜÀ`œVÕ - fraud risk management solutions to the mortgage in - mentation to support each decision. dustry. She can be reached at [email protected].

14 March 2016 March Enforcement Actions

Agency/Bureau Violation Type of Bank Bank Asset Date Restitution CMP Fine Link to Summary of enforcement action Penalty for Size ($K) Fine enforcement action Violation

CFPB CMP UDAAP Student Aid Institute N/A 3/30/2016 N/A $50,000 Consent Order 2016-CFPB-0008 - Student Aid Institute Inc. charged illegal advance fees; deceived borrowers about the benefits and terms of its services; failed to provide required privacy notices; falsely represented an affiliation with the Department of Education.

FRB CMP BSA/AML National Bank of Pakistan N/A 3/24/2016 N/A N/A Written Agreement 15-037-WA/RB-FB; 15-037-WA/RB-FBR -The and Federal Reserve Bank bank had deficiencies of New York relating to the Branch’s risk management and compliance with applicable federal and state laws, rules, and regulations relating to anti-money laundering (“AML”) compliance.

FRB CMP BSA/AML Hazard Bancorp; Peoples $281,405 3/3/2016 N/A N/A Written Agreement 16-003-WA/RB-HC; 16-003-WA/RB-SM - Bank and Trust Company BSA violations. and the Federal Reserve Bank of Cleveland FRB CMP BSA/AML Industrial Bank of Korea N/A 3/1/2016 N/A N/A Written Agreement 16-002-WA/RB-FB; 16-002-WA/RB-FBR - and Federal Reserve Bank The bank had deficiencies of New York; relating to the Branch’s risk management New York, New York and compliance with applicable federal and state laws, rules, and regulations relating to anti-money laundering (“AML”) compliance.

1120 Connecticut Ave NW, Washington, DC 20036 1-800-BANKERS | aba.com BSA-AML

Agency/Bureau Violation Type of Penalty Bank Bank Asset Size Date Restitution Fine CMP Fine Link to enforcement Summary of enforcement action for Violation ($K) action FRB CMP BSA/AML National Bank of N/A 3/24/2016 N/A N/A Written Agreement 15-037-WA/RB-FB; 15-037-WA/RB-FBR -The bank had deficiencies Pakistan and relating to the Branch’s risk management and compliance with Federal Reserve applicable federal and state laws, rules, and regulations relating to Bank of New York anti-money laundering (“AML”) compliance.

FRB CMP BSA/AML Hazard Bancorp; $281,405 3/3/2016 N/A N/A Written Agreement 16-003-WA/RB-HC; 16-003-WA/RB-SM - BSA violations Peoples Bank and Trust Company and the Federal Reserve Bank of Cleveland

FRB CMP BSA/AML Industrial Bank of N/A 3/1/2016 N/A N/A Written Agreement 16-002-WA/RB-FB; 16-002-WA/RB-FBR - The bank had Korea and Federal deficiencies relating to the Branch’s risk management and Reserve Bank of compliance with applicable federal and state laws, rules, and New York; regulations relating to anti-money laundering (“AML”) compliance New York, New York

FinCEN BSA/AML CMP Gibraltar Private $1,529,412 2/25/2016 None $4,000,000 of https://www.fincen.gov/news_ro Number 2016-01 - The bank failed to (a) implement and Bank and Trust which $2.5 million om/nr/pdf/Gibraltar_%20Assessm maintain an adequate anti-money laundering program, (b) ent.pdf Company; will be concurrent develop and implement an adequate customer identification Coral Gables, Fl with the penalty program, and (c) detect and adequately report suspicious imposed by the transactions. Gibraltar’s substantial program deficiencies led OCC to its failure to monitor and detect suspicious activity despite red flags. These deficiencies ultimately caused Gibraltar to fail to timely file at least 120 suspicious activity reports (“SARs”). OCC BSA/AML CMP Gibraltar Private $1,529,412 2/25/2016 None $2,500,000 http://www.occ.gov/static/enforc AA-EC-2015-104 - During the 2011, 2012 and 2013 Bank and Trust ement-actions/ea2016-018.pdf examinations of the Bank, examiners assessed the Bank’s Company; progress in obtaining compliance with the 2010 Order and Coral Gables, Fl determined that the Bank failed to achieve compliance with its requirements. During the 2013 examination, examiners also determined that the Bank had a repeat violation of 12 C.F.R. § 163.180 for failure to ensure timely SAR filings. FDIC BSA/AML CMP Banamex USA; $1,082,200 7/22/2015 None $140,000,000 https://www5.fdic.gov/ FDIC-14-0259k - The bank committed violations of law including but Century City, CA EDOBlob/Mediator.aspx?U not limited to violations of the Bank Secrecy Act. niqueID=8448b456-ccfe- 4626-8df4-a7501107a493 FinCen BSA/AML CMP Bank of Mingo; $93,879 6/15/2015 None $4,500,000 http://www.fincen.gov Number 2015-08 - The bank serviced high-risk customers without Williamson, WV /news_room/ea/files/Min effectively monitoring their accounts for suspicious activity, had go_Assessment.pdf significant deficiencies in all aspects of its AML program, including its internal controls, independent testing, training of personnel, and designation of a BSA officer with sufficient resources to adequately oversee its BSA compliance program, failed to properly assess the money laundering risk associated with its customers, failed to properly designate many customers and their accounts as high risk, and failed to adequately monitor and detect the unusual currency transactions or suspicious activities in which these customers engaged.

FDIC BSA/AML CMP Bank of Mingo; $93,879 6/15/2015 None $3,500,000 https://www.fdic.gov/ne FDIC-14-0071k - The bank failed to implement an effective Williamson, WV ws/news/press/2015/PR- BSA/AML Compliance Program over an extended period of time 49-2015a.pdf and failed to file multiple currency transaction reports and suspicious activity reports associated with this risk.

1120 Connecticut Ave NW, Washington, DC 20036 1-800-BANKERS | aba.com BSA-AML

Agency/Bureau Violation Type of Penalty Bank Bank Asset Size Date Restitution Fine CMP Fine Link to enforcement Summary of enforcement action for Violation ($K) action OCC BSA/AML CMP Lone Star, National $2,155,074 4/1/2015 None $1,000,000 http://www.occ.gov/ AA-EC-2015-20 - The bank had critical deficiencies with suspicious Bank; static/enforcement- activity identification, monitoring, and reporting; two of the four Pharr, TX actions/ea2015-028.pdf minimum elements for the BSA program were not satisfied; the bank’s customer due diligence (“CDD”) and enhanced due diligence (“EDD”) for high-risk accounts was unsatisfactory; and there were a number of deficiencies with the Bank’s foreign correspondent relationship. FRB BSA/AML CMP Commerzbank AG; N/A 3/12/2015 None $200,000,000 http://www.federalreserve 15-001-B-FB & 15-001-CMP-FB - The bank lacked adequate risk Frankfurt am Main, .gov/ management and legal review policies; failed to provide effective Germany newsevents/press/enforce oversight to ensure the New York Branch’s compliance with ment/ BSA/AML requirements; and failed to provide timely and accurate enf20150312a1.pdf information about transactions of Commerzbank’s foreign-based customers conducted through the New York Branch.

FinCen BSA/AML CMP First National $969,655 2/27/2015 None $1,500,000 http://www.fincen.go Number 2015-03 - The bank willfully violated the Bank Secrecy Act Community $500,000 will be v/news_room/ea/files/FN by failing to detect or adequately report suspicious transactions Bank; concurrent with the CB_Assessment.pdf involving millions of dollars in illicit proceeds from a judicial Dunmore, PA penalty imposed by corruption scheme perpetrated by a former Pennsylvania state the OCC judge, among other violations.

OCC BSA/AML CMP First National $969,655 2/27/2015 None $500,000 http://www.occ.gov/static AA-EC-2015-16 - The bank failed to file SARs on a timely basis in Community Bank; /enforcement- connection with certain suspicious transactions. Dunmore, PA actions/ea2015-016.pdf FinCen BSA/AML CMP North Dade N/A 11/25/2014 None $300,000 http://www.fincen.gov Number 2014-07 - The bank failed to implement an adequate anti- Community /news_room/ea/files/ money laundering program, failed to develop and implement an Development NorthDade_Assessment.p adequate customer identification program, failed to detect and Federal df adequately report suspicious transactions, and failed to access or Credit Union; review FinCEN’s 314(a) lists. Miami Gardens, Fl OCC BSA/AML CMP Associated Bank; $26,653,631 6/26/2014 None $500,000 http://www.occ.gov/static AA-EC-2014-60 - The bank failed to conduct adequate risk Greenbay, WI /enforcement- assessments, conduct sufficient customer due diligence, properly actions/ea2014-094.pdf identify high-risk customers, and implement an adequate suspicious activity monitoring system; the Bank’s independent testing of the Bank’s BSA/AML compliance program was inadequate; the Bank’s BSA officer and staff lacked the necessary resources and expertise, including knowledge of regulatory requirements; the Bank’s BSA training efforts for staff were inadequate; and after conducting a lookback, the Bank filed 670 new Suspicious Activity Reports (“SARs”).

OCC BSA/AML CMP Old National Bank; $11,501,951 1/14/2014 None $500,000 http://apps.occ.gov/Enforc AA-EC-2013-112 - The bank failed to conduct adequate risk Evansville IN ementActions/Enforcemen assessments, obtain more than the minimum information required tActions.aspx for customer identification program purposes, implement an adequate suspicious activity monitoring system, and properly identify high-risk customers; the bank’s internal audit review failed to identify the deficiencies in the Bank’s BSA/AML compliance program; the Bank’s BSA officer and staff lacked the necessary resources and expertise, including knowledge of regulatory requirements; and after conducting a lookback, the Bank filed 110 new Suspicious Activity Reports (“SARs”) and 172 supplemental SARs.

1120 Connecticut Ave NW, Washington, DC 20036 1-800-BANKERS | aba.com BSA-AML

Agency/Bureau Violation Type of Penalty Bank Bank Asset Size Date Restitution Fine CMP Fine Link to enforcement Summary of enforcement action for Violation ($K) action OCC BSA/AML CMP Chase Bank USA, $130,662,639 1/7/2014 None $350,000,000 http://www.occ.gov/static AA-EC-13-109 - The bank had deficiencies in its BSA/AML N.A.; Wilmington, /enforcement- compliance program, failed to adopt and implement a compliance DE actions/ea2014-001.pdf program that adequately covers the required BSA/AML program elements due to an inadequate system of internal controls and ineffective independent testing, failed to correct previously identified systemic weaknesses in the adequacy of customer due diligence and the effectiveness of monitoring in light of the customers’ cash activity and business type, and failed to identify significant volumes of suspicious activity and file the required SARs concerning suspicious customer activities among several other things. OCC BSA/AML CMP JPMorgan Bank and $1,547,717,929 1/7/2014 None $350,000,000 http://www.occ.gov/static AA-EC-13-109 - The bank had deficiencies in its BSA/AML Trust Company, /enforcement- compliance program, failed to adopt and implement a compliance N.A.; actions/ea2014-001.pdf program that adequately covers the required BSA/AML program San Francisco, CA elements due to an inadequate system of internal controls and ineffective independent testing, failed to correct previously identified systemic weaknesses in the adequacy of customer due diligence and the effectiveness of monitoring in light of the customers’ cash activity and business type, and failed to identify significant volumes of suspicious activity and file the required SARs concerning suspicious customer activities among several other things. OCC BSA/AML CMP JPMorgan Chase $1,410,851,000 1/7/2014 None $350,000,000 http://www.occ.gov/static AA-EC-13-109 - The bank had deficiencies in its BSA/AML Bank N.A.; /enforcement- compliance program, failed to adopt and implement a compliance Columbus, OH actions/ea2014-001.pdf program that adequately covers the required BSA/AML program elements due to an inadequate system of internal controls and ineffective independent testing, failed to correct previously identified systemic weaknesses in the adequacy of customer due diligence and the effectiveness of monitoring in light of the customers’ cash activity and business type, and failed to identify significant volumes of suspicious activity and file the required SARs concerning suspicious customer activities among several other things. FinCen BSA/AML CMP JPMorgan Chase $1,410,851,000 1/7/2014 None 461,000,000 http://www.fincen.gov Number 2014-1 - The bank failed to file any SARs and failed to Bank N.A.; /news_room/ea/files/JPM report its concerns regarding their client's potential fraud to the Columbus, OH organ_ASSESSMENT_0107 Financial Crimes Enforcement Network. 2014.pdf FinCen BSA/AML CMP Saddle River Valley N/A 9/24/2013 None $4,100,000 http://www.fincen.gov Number 2013-02 - The bank failed to conduct adequate due Bank; /financial_institutions/nr.h diligence on foreign correspondent accounts, failed to detect and Montclair, NJ tml?short=1 adequately report in a timely manner suspicious activities in the accounts of foreign money exchange houses, and executed $1.5 billion worth of inadequately monitored transactions on behalf of Mexican and Dominican casas de cambio despite publicly available information that provided ample notice of the heightened risks of dealing with these institutions.

OCC BSA/AML CMP Saddle River Valley N/A 9/23/2013 None $4,100,000 http://www.occ.gov/st AA-EC-13-70 - The bank failed to adequately monitor over $1.5 Bank; atic/enforcement- billion of activity in CDC accounts, including wire transfer and Montclair, NJ actions/ea2013-143.pdf remote deposit capture (“RDC”) activity; failed to conduct adequate monitoring of high volumes of wires flowing through CDC accounts; failed to comply with statutory requirements regarding customer due diligence (“CDD”) and enhanced due diligence (“EDD”) for its former foreign correspondent customers, the CDCs; and had inadequate processes for reviewing and reporting suspicious activity occurring in CDC accounts and failed to file Suspicious Activity Reports (“SARs”) on a timely basis with respect to its CDC customers, among other things.

1120 Connecticut Ave NW, Washington, DC 20036 1-800-BANKERS | aba.com BSA-AML

Agency/Bureau Violation Type of Penalty Bank Bank Asset Size Date Restitution Fine CMP Fine Link to enforcement Summary of enforcement action for Violation ($K) action FinCen BSA/AML CMP TD Bank, N.A.; $230,280,000 9/23/2013 None $37,500,000 http://www.fincen.gov Number 2013-1- The bank failed to detect and adequately report Wilmington, DE /pdf/TD_ASSESSMENT_09 suspicious activities in a timely manner. 222013.pdf OCC BSA/AML CMP TD Bank, N.A.; $230,280,000 9/20/2013 None $37,500,000 http://www.occ.gov/st AA-EC-2013-67 - The bank's violations were related to failures to Wilmington, DE atic/enforcement- file suspicious activity reports. actions/ea2013-142.pdf OCC BSA/AML CMP TCF National Bank; $19,379,587 1/25/2013 None $10,000,000 http://www.occ.gov/st AA-EC-2012-155 - SAR and BSA compliance program Sioux Falls, SD atic/enforcement- violations. actions/ea2013-003.pdf OCC BSA/AML CMP HSBC Bank USA, $190,499,714 12/11/2012 None $500,000,000 http://www.occ.gov/st AA-EC-2012-112 - The bank failed to adopt and implement a N.A.; atic/enforcement- compliance program that adequately covers the required BSA/AML McLean, VA actions/ea2012-262.pdf program elements, including, in particular, internal controls for customer due diligence, procedures for monitoring suspicious activity, and independent testing; did not perform BSA/AML monitoring for banknote (or “bulk cash”) transactions with Group Entities; did not collect or maintain customer due diligence (“CDD”) or enhanced due diligence (“EDD”) information for Group Entities; and the bank failed to disposition its alerts appropriately or to comply fully with its obligation to report suspicious activity on time, among other things.

FRB BSA/AML CMP HSBC Holdings PLC $174,706, 058 12/11/2012 None $165,000,000 http://www.federalre Docket Nos. 12-062-CMP-FB & 12-062-CMP-HC - The bank lacked (London) serve.gov/newsevents/pre adequate risk management and legal review policies and and HSBC North ss/enforcement/enf20121 procedures to ensure compliance and failed to maintain internal America 211a1.pdf controls, staffing and resources sufficient to adequately identify Holdings, Inc.; and mitigate the risks associated with high risk transactions New York, NY conducted through the bank’s foreign correspondent accounts, especially those relating to the bank’s Mexican affiliate.

FRB BSA/AML CMP Standard Chartered N/A 12/10/2012 None $100,000,000 http://www.federalre Docket No. 12-069-CMP-FB - The bank provided inadequate and PLC (London); serve.gov/newsevents/pre incomplete responses to examiner inquiries relating to the Standard Chartered ss/enforcement/enf20122 transmission of funds to and from parties subject to OFAC Bank (London); 012a2.pdf Regulations and by providing incomplete and misleading Standard Chartered information to examiners regarding the scale of and practices for Bank; processing Standard Chartered's and the Branch's U.S. dollar New York, NY clearing transactions, particularly with regard to Iranian customers and developed polices and procedures that deleted information from payment messages that was necessary for the Branch to determine whether these transactions were carried out in a manner consistent with U.S. law and to properly conduct the transaction review required under the 2004 Written Agreement.

FinCen & FDIC BSA/AML CMP First Bank of $177,986,000 11/19/2012 None $15,000,000 http://www.fincen.gov Numbr 2012-1 - The bank failed to adequately oversee third-party Delaware; /news_room/nr/pdf/First_ payment processor relationships and related products and services Wilmington, DE Bank_of_Delaware_11-15- in a manner commensurate with associated risks. 2012_Assessment.pdf

1120 Connecticut Ave NW, Washington, DC 20036 1-800-BANKERS | aba.com NEW ACCOUNT INFORMATION WORKSHEET FOR BSA

Name: Date: Account Number: Type of Business (if applicable): Trade Area: Where do you conduct the majority of your business? Skagit Cty WA State National International

Is your business a legal entity that is publicly traded within the US? Yes No What is your estimated annual business revenue? $0-$50,000 $50,000-$100,000 $100,001-$500,000 $500,001-$1M Over $1M Does your business routinely conduct trans w/ foreign companies or countries? Y/N : How often will you be making deposits of cash or checks into this account? No cash or check deposits Daily Weekly Monthly or Less Often Estimated amount of Deposits (based on frequency selected above) Under $3000 $3000-$10,000 Over $10,000 How often will you be making withdrawals of cash or checks from this account? No cash or Check Withdrawals Daily Weekly Monthly or Less Often Estimated amount of withdrawals (based on frequency selected above) Under $3000 $3000-$10,000 Over $10,000

How often do you plan on accepting electronic deposits (i.e. Direct Depost, ACH) in this account?

Not expecting electronic deposits Daily Weekly Monthly or Less Often How often do you plan to initiate automatic withdrawals from this account?

Not expecting electronic withdrawals Daily Weekly Monthly or Less Often How often do you plan to conduct wire transfers from this account?

Not expecting to conduct wire transfers Daily Weekly Monthly or Less Often

If sending wire transfers, wire transfers are Domestic Foreign Both Will you be using an issued debit card? Yes No Will you be using Online Banking? Yes No Will you be using Online Bill Payment? Yes No

Please check all appropriate boxes that apply to your business:

Performs or will perform wire/money transfer services in amounts greater than $1000 for any person or any day in one transaction Cashed checks for YOUR customer in amounts greater $1000 for any person on any day on one or more transactions

Issues or will issue Travelers Checks, Money Orders, or Stored Value Cards for your customers in amounts greater than $1000 for any person on any day in one or more transactions

Redeems/Will Redeem Travelers Checks, Money Orders, or Stored Value Cards for your customers in amounts greater than $1000 for any person on any day in one or more transactions Acts or will act as a coin/currency exchange dealer for your customer in amounts greater than $1000 for any person on any day in one or more transactions.

Is your business related to the marijuana industry? Is your business related to online gambling? New Market Bank Customer Risk Rating

Customer Name: TIN/EIN:

Account Title (if different than above) Account # Description 1 3 5 Description 1 3 5 Customer Type: Funds Transfer: (Money Wire Transfers) 0 - If no wires ever 1 - Current Customer - stable &known customer 1 - Low volume of funds transfers-< 1 per month 2 - Current Customer - unknown but current activity 3 - Moderate amount of funds transfers, including transfers to low risk countries-2-5/mo 3 - New customer, but business or owner known by bank officer or staff member 0 0 4 - Current Customer - unknown & inactive or dormant accounts 5 - High volume of funds transfers (internal and external), numerous transfers from personal to 5 - New customer, not known by any bank officer or staff member business account or visa versa, numerous transfers to foreign countries->5/mo Type of Account: International Connections: 1 - Certificates of Deposit, Savings Account, IRA N/A - No International Connections 3 - Checking Account, Loans: Consumer, Real Estate & Agriculture, Safe Deposit Box0 3 - Moderate amount of international connections (2 times per month or less) 0 5 - Commercial Loan 5 - High volume of international connections (more than 2 per month) Geographic Location: High Risk Business: 1 - Located within the State of Minnesota 1 - Business customer but not identified as a High Risk Business 3 - Moderate Risk Business - includes check cashers, convenience stores, high check volume 3 - Located outside the State of Minnesota but within United States 0 restaurants 0 5 - Located outside of United States or in HIDTA (High Intensity Drug Targeting Areas) or HIFCA 5 - High Risk Business - Money Service Business (check cashing only), foreign business, (High Intensity Financial Crimes Areas) nonresident alien or foreign individual owners

Internet Banking: 0 if no Internet Banking Total of columns: (document will automatically calculate if done online) If total # for column equals: 01-15 - Risk Rate (CIF Field #) is Low then risk rate on System 1 - Low (Normal) Use (inquiry, internal account transfers, E-Statements) should be Low 0 3 - Moderate Use - uses Bill Pay for normal monthly bills (utility, telephone, cable, etc.) 0 16-25 - Risk Rate is Moderate then rate on System should be Medium(**see below) 5 - Excessive Use (has OBM, remote capture and/or uses Bill Pay for many bills (more than 10 per 26-40 Risk Rate is High then Risk Rate on System s/b High (** see below) CIRCLE / month) HIGHLIGHT CORRECT RISK RATING LMH Currency Transactions: 1 - Low volume of currency activity 3 - Moderate volume (obtains cash 5-10 times/mo, CTR's filed 2-5 times in the last yr) 0 **System Input: Input system instructions on how to code customer. 5 - High volume (obtained more than 10/mo, more than 5 CTR's filed in the last yr, any Suspicious CIP Completed? YN Activity Form filed) Documents Waiting for: Comments/Exceptions to Policy:

Risk Rating Completed By: Date of Review:

Officer: ** (Officer Signature Required if Rating is higher than 25) New Market Bank Customer Risk Rating

Customer Name: TIN/EIN:

Account Title (if different than above): Account #: Description 1 3 5 Description 1 3 5 Customer Type: Funds Transfer: (Money Wire Transfers) 0 - If no wires ever 1 - Current Customer - stable & known customer 1 - Low volume of funds transfers-< 1 per month 2 - Current Customer - unknown but current activity 3 - Moderate amount of funds transfers, including transfers to low risk countries-2-5/mo 3 - New customer, but known by bank officer or staff member 0 0 4 - Current Customer - unknown & inactive or dormant accounts 5 - High volume of funds transfers (internal and external), numerous transfers from personal to business account or visa versa, numerous transfers to foreign countries->5/mo 5 - New customer, not known by any bank officer or staff member

Type of Account: International Connections: 1 - Certificates of Deposit, Savings Account, IRA 0 - No International Connections 3 - Checking Account, Loans: Consumer, Real Estate & Agriculture, Safe Deposit Box0 3 - Moderate amount of international connections (2 times per month or less) 0 5 - Commercial Loan 5 - High volume of international connections (more than 2 per month) Geographic Location: High Risk Consumer: 1 - Located within the State of Minnesota 1 - US Person with no CIP problems 3 - Nonresident alien or foreign individual (foreign exchange students) with no CIP problems 3 - Located outside the State of Minnesota but within United States 0 0

5 - Located outside of United States or in HIDTA (High Intensity Drug Targeting Areas) or HIFCA 5 - US Person, nonresident alien or foreign individual with CIP verification problems or Politically (High Intensity Financial Crimes Areas) Exposed Person Internet Banking: 0 if no Internet Banking Consumer Credit Report: 1 - Low (Normal) Use (inquiry, internal account transfers, E-Statements) 1 - FICO Score Above 660 3 - Moderate Use - uses Bill Pay for normal monthly bills (utility, telephone, cable, etc.) 0 3 - FICO Scores between 601 and 659 0 5 - Excessive Use (has OBM, remote capture and/or uses Bill Pay for many bills (more than 10 per month) 5 - FICO Score below 600 Type of Deposits: Total of columns: (document will automatically calculate if done online) 1 - On us transfers or checks, payroll checks, government checks Total = 1-17.99 - Risk Rate Low on System** 0 Total = 18-30.99 - Risk Rate Moderate on System** 3 - Cash, cashier's checks from other banks, wire transfers 0

Total = > 31 - Risk Rate High on System** CIRCLE / HIGHLIGHT 5 - Foreign Funds CORRECT RISK RATING TO THE RIGHT L MH

**System Input: Insert instructions on how to code customer on Core System

CIP Completed? Y N Documents Waiting for: Comments/Exceptions to Policy:

Risk Rating Completed & Inputted By: Date of Review & System Verification: Officer: ** (Officer Signature Required if Rating is higher than 25) BSA/AML Risk Assessment 2015 Anywhere Bank (Prepared January 2015) Information as of December 31, 2014

Overall Bank Risk Assessment High Moderate Low Bank Comments from 3 2 1 Score Federal Safety and Risk Factor Soundness Exams and/or Annual Independent Exam Number of Branches (>4= H, 2-3= M, 1= L)

Number of foreign correspondent account in high risk geographies or offering high risk services such as pouch services and payable through accounts . (Many = H, Few accounts of this type= M, No services of this type= L) Commercial customers with international businesses, including foreign wires (Large number of international accounts with unexplained currency activity= H, Moderate level of international accounts with unexplained currency activity= M, Very low or no international accounts or very low volumes of currency activity in the accounts= L) Commercial customers with high cash activity (Many business customers with high cash activity= H, Limited number but some business customers with high cash activity= M, Very Few or No business customers with high cash activity= L) Customers identified as High Risk Money Service Businesses (Many= H, Limited number but some= M, Very Few or None= L) Nonlisted entities exempt from cash reporting (>10= H, 5-9= M, <5= L) Customer Base (Fast growing customer base in a wide and diverse geographic area= H, Recent Merger or increasing customer base due to acquisition or branching= M, Stable customer base over several years or known customer base= L) Stability of Employee Base (Frequent and High turnover especially in key positions= H, Low turnover of key personnel but frontline personnel in branches has changed= M, Low turnover in key positions and frontline personnel= L) Domestic retail banking customers/accounts: savings, checking, time deposits Domestic retail consumer loans/Domestic commercial loans

Commercial and consumer deposits, loans, and funds transfers for international customers including PEP’s (politically exposed persons)and non-resident aliens (Frequent funds transfers from personal or business accounts to or from personal or business accounts in high risk areas= H, Moderate number of funds transfers with a few international transfers from personal or business accounts in low risk areas= M, Limited number of funds transfers for customers/noncustomers, limited third party transactions and no foreign fund transfers= L)

1

High Moderate Low Bank Comments from 3 2 1 Score Federal Safety and Risk Factor Soundness Exams and/or Annual Independent Exam Private Banking Accounts or Trust and assessment management accounts with payable through accounts and pouch activity (The bank offers significant domestic and international private bank or trust and asset management products or services, which are growing= H, The bank offers limited domestic private banking services or trust and asset management products or services over which the bank has investment discretion= M, The bank offers limited or no private banking services or trust and asset management products or services= L) Volume of transactions with high risk geographic locations (Significant volume of transactions with high risk geographic locations compared to overall transactions= H, Minimal transactions with high risk geographic locations= M, No transactions with high risk geographic locations= L) Internet /e-banking (Wide array of e-banking products and services including account transfers, bill payment, ACH origination with high customer activity= H, Limited e-banking products and services with moderate customer activity=M, No electronic banking or the bank’s web-site is non-transactional= L) Predominant method of delivery system for opening new account (Accounts opened via Internet without prior relationship=H, Some mail and telephone opening of new accounts in addition to in- person account opening=M, In-person account opening= L) Bank/Branch Locations ( Bank/branches located in money center or on U.S. border= H, Highly diverse metropolitan area= M, Rural homogenous community bank= L) Bank/Branch Geographic Locations: HIDTA/HIFCA (The Bank is located in an HIDTA and an HIFCA. A large number of fund transfers or account relationships involve HIDTAs or HIFCAs= H, The bank is located in an HIDTA or an HIFCA. The bank has some fund transfers or account relationships that involve HIDTAs or HIFCAs= M, The bank is not located in a HIDTA or HIFCA. No fund transfers or account relationships involve HIDTAs or HIFCAs= L) Risk Rating High risk Business Customers (The bank identified a large number of high risk business customers= H, The bank identified a moderate number of high risk business customers= M, The bank identified very few high risk business customers=L) Cash Reporting Systems (No aggregate cash reporting system or AML monitoring software=H, Automated aggregate cash reporting system but no AML monitoring software=M, Aggregated cash reporting system and AML monitoring software=L) SAR Reporting Systems (No centralized SAR reporting or monitoring system=H, Centralized SAR reporting/monitoring system with informal internal referral system= M, Centralized SAR monitoring/reporting with formalized internal referral system=L) Number of SAR’s per year (>20 suspicious activity reports (SAR’s) filed per year=H, 10 to 19 SAR’s filed per year= M, <10 SAR’s filed per year= L) 2

High Moderate Low Bank Comments from 3 2 1 Score Federal Safety and Risk Factor Soundness Exams and/or Annual Independent Exam OFAC (Large number of accounts have been blocked or rejected due to OFAC matching= H, Limited number of accounts have been blocked or rejected due to OFAC matching=M, No accounts have been blocked or rejected due to OFAC matching=L) 314(a) Requests (Large amount of positive matches from 314(a) search =H, Limited number of positive matches from 314(a) search=M, No positive matches from 314(a) searches=L) Large Currency or Structured Transactions (Significant volume of large currency or structured transactions=H, Moderate volume of large currency or structured transactions=M, Few or no large currency or structured transactions=L) BSA/AML Training (Inadequate BSA/AML training program on less than an annual basis=H, Adequate BSA/AML training program on at least an annual basis=M, extensive BSA/AML training program with regular updates throughout the year=L) Policies/Procedures (Policies/procedures are not effective to appropriately manage the bank’s BSA program=H, Policies/procedures are adequate to manage the bank’s BSA program but should be reviewed and/or updated on a more regular basis=M, Policies/procedures are effective in managing the bank’s BSA program and, policies are adhered to as well as reviewed and updated regularly=L) Independent Testing (Independent Testing is not completed on an annual basis=H, Independent Testing is completed and reported to the Board of Directors on an annual basis=L) TOTAL SCORE 00

3

Level of Risk Risk Score When determining the risk factor score High Risk =3, Moderate Risk= 2 and Low Risk =1. High 64-81 The highest possible score is 81 with the lowest possible score being 27. To determine total level of risk score ranges, the highest possible score of 81 was divided into thirds. This Moderate 46-63 methodology provides the overall level of risk score for Anywhere Bank’s BSA program. Low 27-45

TREND LINE

SAR’s filed CTR’s Filed Applications to Purchase filed

50 500 100 45 450 90 40 400 80 35 350 70 30 300 60 25 250 50 20 200 40 15 150 30 10 100 20 5 50 10 0 0 0 Year/ 2012 2013 2014 Year/ 2012 2013 2014 Year/ 2012 2013 2014 Total (00 ) (00) (00) Total (00) (00) (00) Total (00) (00) (00) # # #

OFAC Matches FinCEN 314(a) Matches Exempt Customers

50 50 50 45 45 45 40 40 40 35 35 35 30 30 30 25 25 25 20 20 20 15 15 15 10 10 10 5 5 5 0 0 0 Year/ 2012 2013 2014 Year/ 2012 2013 2014 Year/ 2012 2013 2014 Total Total Total (00) (00) (00) (00) (00) (00) (00) (00) (00) # # #

4

Attachment A

Risk Assessment as of 12/31/12

PRODUCTS AND SERVICES OFFERED INHERENT MITIGATING CONTROLS RESIDUAL YES NO RISK RISK Correspondent Banking Domestic  International  U.S. Dollar Drafts  Payable Through Accounts  Pouch Activities  Foreign Branches/Offices of U.S. Banks  Parallel Banking  Electronic Banking  High BSA Policy- Procedures: CIP, New Account, Internet Medium Internet Banking Banking, Merchant Remote Deposit Capture. Consumer: Account inquiry Offer wide Anti-Money Laundering Manager module in use Account transfers variety of e- Bill Pay banking Commercial Accts: Commercial: products & Risk Assessment prior to opening Account inquiry services Quarterly risk assessment of accounts that originate Account transfers pre-approved ACH debits Bill Pay Daily monitoring ACH/Tax Limits Merchant Remote Deposit Capture Daily monitoring Wires (Funds Transfers) Wires ACH ¹ Customer Base stable and long term Online account opening NOT offered Significant controls exist to open and/or monitor ebanking use. Higher level controls exist for wires & ACH origination. Less than 10% of the customer base are commercial customers using wire & ACH services.

PRODUCTS AND SERVICES OFFERED INHERENT MITIGATING CONTROLS RESIDUAL YES NO RISK RISK Electronic Funds Payment Services Automated Teller Machines (ATMs)  Medium Visa Check Card Procedure-Anti-Money Laundering Low Manager module in use Offer moderate # of XX ATMs ATM/Debit XXXX Debit Cardholders Card services YTD Average $ per Card $30.00 with low cash available per account ¹ Customer Base stable and long term. The maximum amount of cash that can be obtained from an ATM is $500 and POS limit is $1,500

Automated Clearing House (ACH)  Medium BSA Policy-CIP Procedures-New Account Procedures- Low Anti-Money Laundering Manager module in use- Offer FRB/RDFI Daily Batch Alerts moderate # of Receiving DFI % Return ATM/Debit Debits - $XXXXXXXX .24% Card services Credits - $ XXXXXXX .03% with low cash available per Originating DFI account Debits Originated $ XXXXXXXX .753% Credits Originated $XXXXXXXX .016% ¹Customer Base stable and long term ACH return rates for both receiving and originating files is less than industry standard. Significant controls exist for originating ACH files and monitoring originating and receiving files. Funds Transfers Domestic  Medium BSA Policy-CIP Procedures-New Account Procedures- Low Funds Transfers Procedures-Anti-Money Laundering Moderate # of Manager module in use funds transfers Wires $3,000. or more: for customers Incoming Wires XX for XXX Customers $XXXXXXX Outgoing Wires XX for XXX Customers $XXXXXXX ¹ Customer Base stable and long term Significant controls exist to monitor outgoing and incoming wires.

PRODUCTS AND SERVICES OFFERED INHERENT MITIGATING CONTROLS RESIDUAL

YES NO RISK RISK Pay Upon Proper Identification (PUPID)  Electronic Cash (Stored Value and Payroll cards)  Third-Party Payment Processors  Monetary Instruments  Low BSA Policy-Monetary Instruments Procedures-Anti- Low Cashier’s Checks Money Laundering Manager module in use Cashier’s Monitoring of Cash Sales checks only sold to XXX Checks Sold with Cash Involvement customers Average $XXXXXXXX

¹ Customer Base stable and long term

Deposit Account Type Services Domestic Retail  Low BSA Policy-CIP Procedures-New Account Procedures- Low Anti-Money Laundering Manager module in use Few, if any, non-resident XXXXXX Accounts or foreign individuals ¹ Customer Base stable and long term Significant controls exist for opening new accounts. The majority of customers (over 50%) have a long term relationship with the bank of 10 years or more. Domestic Commercial  Medium BSA Policy-CIP Procedures-New Account Procedures- Low Anti-Money Laundering Manager module in use Moderate number of XXXXX Accounts high-risk business ¹ Customer Base stable and long term accounts Significant controls exist for opening new accounts. The majority of customers (over 50%) have had a long term relationship with the bank of 10 years or more. Domestic Payable Through Account  Brokered Deposits

PRODUCTS AND SERVICES OFFERED INHERENT MITIGATING CONTROLS RESIDUAL

YES NO RISK RISK

Domestic  Low Funds Management Policy-Board approval of Broker Low No open required - Due diligence performed-Anti-Money brokered Laundering Certification received deposits No deposits in 2012 International  Privately-Owned Automated Teller Machines  Non-deposit Account Services Non-deposit Investment Products  Medium Policy – CIP Procedure – Due diligence performed Low annually Offer Dual employee arrangement-clients do not manage own minimum portfolios-Investment products limited number of XXX customers/ XXX accounts investment ¹ Customer Base stable and long term. services Small number of customers.

Insurance  Safe Deposit Boxes  Low BSA Policy-CIP Procedures-New Account Procedures- Low Safe Deposit Procedures Rent only to Total boxes available – XXXXX customers Total boxes rented - XXX ¹Customer Base stable and long term Less than 40% of available boxes are currently in use. Special Use or Concentration or Accounts  Lending Activities General  Low BSA Policy-CIP Procedures-Loan Policy-New Loan Low Traditional Procedures lending Strong knowledge of customer base activities XXXXX Loans $XXXXXXXXXXXXX secured by Monitoring procedures in place and low loan volume non-cash collateral Secured by cash collateral  Medium BSA Policy-CIP Procedures-Loan Policy-New Loan Low Traditional Procedures lending Limited Activity-strong knowledge of borrowers activities XXX Loans including Minimum number of loans secured by cash collateral secured by cash PRODUCTS AND SERVICES OFFERED INHERENT MITIGATING CONTROLS RESIDUAL YES NO RISK RISK Secured by marketable securities  Medium BSA Policy-CIP Procedures-Loan Policy-New Loan Low Traditional Procedures lending Limited Activity-strong knowledge of borrowers activities XX Loans including Minor number of loans secured by securities secured by cash/securities Credit Card lending  Trade Finance Activities Domestic – Standby Letters of Credit  Low BSA Policy-CIP Procedures-Loan Policy-New Loan Low Traditional Procedures lending Limited Activity-strong knowledge of borrowers activities XX Loans secured by Significant controls exist for a minor number of loans. non-cash collateral International – Import/Export Letters of Credit  Private Banking (Domestic and International)  Trust and Asset Management Services 

PERSONS AND ENTITIES

Domestic – Individual or business  Low BSA Policy-CIP Procedures-New Account Procedures- Low Well known- Anti-Money Laundering Manager module in use stable customer XXXXX Domestic Retail Accounts base XXXXXX Domestic Commercial Accounts

¹ Customer Base stable and long term Significant controls exist for opening and monitoring accounts. The majority of accounts (over 50%) have a long term relationship. Nonresident Aliens and Foreign Individuals  Low BSA Policy-CIP Procedures-New Account Procedures- Low Few non- Anti-Money Laundering Manager module in use resident or Very limited activity foreign individuals XX Domestic Retail Accounts with ITIN numbers XX Domestic Retail Accounts with Foreign identification numbers Minor number of open accounts. PERSONS AND ENTITIES OFFERED INHERENT MITIGATING CONTROLS RESIDUAL YES NO RISK RISK Politically Exposed Persons  Embassy and Foreign Consulate Accounts  Non-Bank Financial Institutions NBFI) Money Service Businesses (MSB)  Medium BSA Policy-CIP Procedures-New Account Procedures- Low Moderate MSB Procedures-Anti-Money Laundering Manager number of CTR module in use activity XXX Customers-an average number, per month, of CTR activity = XX Casinos and card clubs  Low BSA Policy-CIP Procedures-New Account Procedures- Low No CTR activity Anti-Money Laundering Manager module in use 1 Account – Bingo - Account Inactive for over 1 year Insurance Companies  Brokers/dealers in securities  Dealers in precious metals, stones or jewels  Professional Services Providers  Medium BSA Policy-CIP Procedures-New Account Procedures- Low Moderate Anti-Money Laundering Manager module in use number of XXX Accounts accounts Customer base is stable and long term Only 3% of open accounts are professional services providers Non-Government Organizations and Charities  Medium BSA Policy-CIP Procedures-New Account Procedures- Low Moderate Anti-Money Laundering Manager module in use number of XXX Accounts accounts Customer base is stable and long term Only 4% of open accounts are professional services providers Corporate Entities (Domestic and Foreign) Domestic – Shell corporations  International – Trusts, IBCs, PICs, OFCs  Cash-Intensive Businesses  Medium BSA Policy-CIP Procedures-New Account Procedures- Low Moderate CTR Anti-Money Laundering Manager module in use & SAR activities XXX Accounts Customer base stable and long term Only1% of open accounts are cash-intensive businesses PERSONS AND ENTITIES OFFERED INHERENT MITIGATING CONTROLS RESIDUAL YES NO RISK RISK Unlawful Internet Gambling Businesses  Unlawful Internet Gambling Enforcement Act (Regulation GG) Policy - New Business Account Profile Worksheet

Office of Foreign Assets Control Persons &  Office of Foreign Assets Control Policy/Procedure- Entities OFAC Reporting Module (ORM)

GEOGRAPHIC LOCATIONS YES NO INHERNET RISK Domestic (San Joaquin, Stanislaus & Contra Costa Counties) ¹ Customer Base as of 12/31/12 High Intensity Drug Trafficking Areas (HIDTA)  *Medium Number Total Portfolios – XXXX High Intensity Financial Crime Areas (HIFCA)  *Medium Portfolios open less than 1 year—XXX International Portfolios open 1 to 5 years—XXXX Countries subject to OFAC sanctions Portfolios open 5 to 10 years—XXXX Countries supporting international terrorism  Portfolios open 10 years or longer—XXX Jurisdictions “of primary money laundering  concern” by FinCEN Jurisdictions/countries identified as non-  cooperative by (FATF) Major money laundering countries and  jurisdictions identified by International Narcotics Control Strategy Report (INCSR) Offshore financial centers (OFCs)  Other countries identified by the bank as high-risk  *Bank has branches located in HIDTA or HIFCA but has no account relationships and few, if any, transactions with higher-risk geographic locations

The Following is the Summary Conclusion BSA Risk Rating.

Description of Category Residual Discussion of Rating Rating Rating Score Assigned

Electronic Banking Medium The Bank offers consumers the ability to use ebanking for account transfers & bill payments. 2 Commercial customers have access to account transfers, bill payments, funds transfers (wire), and ACH origination. Significant controls exist to open and/or monitor ebanking usage. Higher level controls exist for wires and ACH origination. Less than 10% of the customer base is commercial customers using wire and ACH services.

Electronic Funds Payment Low The bank has only XX owned ATMs and the average Debit Card transaction is $30. The ACH 1 Services return rates for both receiving and originating ACH files is less than the industry average. Significant controls exist for originating ACH files and monitoring originating and receiving files.

Funds Transfers Low The Bank offers wire transfer service with significant controls in place to monitor outgoing and 1 incoming wires.

Monetary Instruments Low Cashier checks are only sold to bank customers. Less than XXX were sold with cash involvement 1 during the year and the average amount of each check was less than $1,800

Deposit Account Type Low Significant controls exist for opening new accounts and monitoring customer transactions. The 1 Services majority of customers (over 50%) have had a long term relationship with the bank of 10 years or more.

Non-Deposit Services Low A dual employee arrangement exists, clients do not manage their own investments and investment 1 products are limited for non-insured products. Only a small number of accounts exist. Safe Deposit Boxes are only rented to customers and less than 40% of available boxes are currently in use.

Lending Activities Low Significant controls exist for all lending activities and only a minor number of loans are secured 1 by cash collateral or marketable securities.

Trade Finance Activities Low Significant controls exist for the XX outstanding Standby Letters of Credit and no Import/Export 1 Letters of Credit are offered. Persons and Entities Low Significant controls exist for opening new accounts and monitoring customer transactions. The 1 majority of accounts are domestic consumer or business with the majority (over 50%) having a long term relationship with the bank of 10 years or more.

Non-Bank Financial Low Significant controls exist over MSB accounts with only XX open accounts. Only 1 account is 1 Institutions classified as Casino or Card Club.

Description of Category Residual Discussion of Rating Rating Rating Score Assigned

Professional Service Low Significant controls exist for opening new accounts and monitoring customer transactions. Only 1 Providers 3% of the total open accounts are professional service providers.

Non-Government Low Significant controls exist for opening new accounts and monitoring customer transactions. Only 1 Organizations & Charities 4% of the total open accounts are in this category.

Cash-Intensive Businesses Low Significant controls exist for opening new accounts and monitoring customer transactions. Only 1 .7% of the total open accounts are in this category

Geographic Locations Medium BAC has branches located in HIDTA or HIFCA but has no account relationships and few, if any, 2 transactions with higher-risk geographic locations.

Total Score= 16

Rating Scoring=1 LOW Overall Rating Score=LOW (14-22) LOW

Rating Scoring=2 MEDIUM Overall Rating Score=MEDIUM (23-34)

Rating Scoring=3 HIGH Overall Rating Score=HIGH (35-42)

4/21/2016

Financial Crimes Involving At-Risk Adults

GBA Compliance School Athens, GA

Thomas Williams, CRCM, CCBIA SVP, Senior Compliance Manager United Bank May 5, 2016

2

What is an “At-Risk Adult?”

• Disabled Adult – Person 18 years of age or older who is mentally or physically incapacitated, has Alzheimer’s Disease, or dementia.

• Elder Person – Person 65 years of age or older.

• Resident – Any person receiving treatment care in any long-term care facility.

O.C.G.A. 16-5-100 Definitions

3

1 4/21/2016

What is Financial Exploitation?

“Illegally or improperly using a disabled adult or elder person or that person's resources through undue influence, coercion, harassment, duress, deception, false representation, false pretense, or other similar means for one's own or another person's profit or advantage. ”

4

Financial Exploitation: The Facts

• Number one crime against individuals aged 65 or older.

• Only 1 in 25 cases of financial exploitation cases reported.

• May be at least 5 million financial abuse victims each year.

5

Financial Exploitation: The Facts

• 2050 – anticipated that Americans aged 65 or older will number nearly 89 million people, or more than double the number of older adults in the United States in 2010.

• Estimated that 75% of all elder abuse perpetrators are family members; most often the victim’s adult child.

• Transactional behavior of seniors has not changed; careful analysis can lead to identification.

6

2 4/21/2016

Financial Exploitation: The Facts

Two general categories:

1. Financial exploitation committed by strangers (sometimes called fraud).

o Generally involves deliberately deceiving the victim with the promise of goods, services or other benefits that are non-existent, unnecessary, never intended to be provided or misrepresented.

2. Financial exploitation committed by relatives, friends and caregivers.

7

Financial Exploitation: The Facts

8

Financial Exploitation: The Facts

9

3 4/21/2016

Financial Exploitation: The Facts

10

Fighting Elder Abuse

11

Why At-Risk Adults are Targeted

• Wealth

• Social Security Check

• Easy to Find

12

4 4/21/2016

Vulnerabilities

• Physical/Mental

• Trust

• Faith

13

Types of Schemes

• Gypsies & Crooked Contractors

• Sweetheart/Lonely Heart Swindle

• Investment Fraud –

• Lottery

• Telemarketing

14

Types of Schemes

• Internet

• Charitable Contributions o www.charitywatch.org o (773) 529-2300 o Better Business Bureau (BBB)

• Health, Funeral and Life Insurance

• IRS Payments

15

5 4/21/2016

It’s Their Money

16

Financial Exploitation Red Flags

• Unusual Banking Activity o Incoming Wires/Outgoing Wires o Debit Card/Credit Card Activity o ATM Withdrawals (Maximum Daily Limit) o Newly established online account access o Always escorted to bank by a second party • No Control or Unaware of Finances o Sudden NSF Activity o Customer is unaware/does not understand financial arrangements • Large Checks/Cash withdrawals o Checks made out to “cash” or “gift” o Frequent gifts from elder to caregiver

17

Financial Exploitation Red Flags

• Abrupt Changes to Documents o Changes to Will o New names on signature card(s) o Moving money from CDs into the name of a new acquaintance • Power of Attorney Abuse o Frequent or random changes to POA documents • Escalated Customer Calls on Account o Requesting balance o Requesting miscellaneous information o Changing passcodes/Other information

18

6 4/21/2016

Prevention

19

Undue Influence • Isolation IDEAL • Dependence on the perpetrator Dr. Bennett Blum

• Emotional exploitation/exploitation of vulnerability

• Acquiescence

• Loss

20

The Law

O.C.G.A 16-5-102

a) Any person who knowingly and willfully exploits a disabled adult, elder person, or resident, willfully inflicts physical pain, physical injury, sexual abuse, mental anguish, or unreasonable confinement upon a disabled adult, elder person, or resident, or willfully deprives of essential services a disabled adult, elder person, or resident shall be guilty of a felony and, upon conviction, shall be punished by imprisonment for not less than one nor more than 20 years, a fine of not more than $50,000.00, or both .

21

7 4/21/2016

The Law

O.C.G.A. 16-5-100

• Exploit – Illegally or improperly using a disabled adult or elder person or that person’s resources through undue influence, coercion, harassment, duress, deception, false representation, false pretense, or other similar means for another’s profit or advantage.

22

The Law

o O.C.G.A. 30-5-4 – Mandated Reporters Child welfare agency personnel o Child-counseling personnel o Physicians licensed to practice medicine, interns, or residents o Law enforcement personnel o Hospital or medical personnel o Reproductive healthcare facility or pregnancy resource center personnel o Dentists and volunteers o Licensed psychologists and persons participating in internships to obtain o Physical therapists/Occupational therapists licensing o Daycare personnel o Podiatrists o Coroners/Medical Examiners o Registered professional nurses or licensed practical nurses or nurse’s aides o EMS personnel/EMT/Paramedics, Cardiac Techs or First Responder o Professional counselors, social workers, or marriage and family therapists o Employees of a public/private agency in professional health related o School teachers service o School guidance counselors, visiting teachers, school social workers, or o Clergy members school psychologists

23

The Law

O.C.G.A. 30-5-4 – Mandated Reporters ANY EMPLOYEE OF A FINANCIAL INSTITUTION

24

8 4/21/2016

The Law

O.C.G.A. 30-5-4 – Mandated Reporters • B) Any employee of a financial institution , as defined in Code Section 7-1-4, having reasonable cause to believe that a disabled adult or elder person has been exploited shall report or cause reports to be made in accordance with the provisions of this Code section; provided, however, that this obligation shall not apply to any employee of a financial institution while that employee is acting as a fiduciary, as defined in Code Section 7-1-4, but only for such assets that the employee is holding or managing in a fiduciary capacity.

25

Immunity In Reporting

O.C.G.A 30-5-4 – Immunity

• (c)Anyone who makes a report, testifies, provides protective services, participates in a required investigation shall be immune from any civil or criminal liability unless such person acted in bad faith, with malicious purpose, or was a party to such crime or fraud.

26

Failure to Report

O.C.G.A 30-5-8 – Criminal Offenses and Penalties

• (b) (1) It shall be unlawful for any person or official required by paragraph (1) of subsection (a) of Code Section 30-5-4 to report a case of disabled adult or elder person abuse to fail knowingly and willfully to make such report.

• (2) Any person violating the provisions of this Code section shall be guilty of a misdemeanor .

• (b) Any violation of this Code section shall constitute a separate offense.

27

9 4/21/2016

Reporting the Event

• Adult Protective Services (APS) o 1-866-552-4464 o http://aging.dhs.georgia.gov/adult-protective-services

• Healthcare Facility Regulation (HFR) o http://dch.georgia.gov/find-facilityfile-complaint • Contact Law Enforcement

• File Appropriate Suspicious Activity Report

28

Reporting the Event

Victim

• May feel shame/fear of losing caretaker services.

• May not want suspect punished (family).

29

Mental Capacity

Ability to perform mental tasks:

• Remembering

• Reasoning

• Understanding repercussions of actions

• When impaired, that person becomes extremely vulnerable to financial crimes

30

10 4/21/2016

Mental Capacity

31

Mental Capacity

• Assessing consent

• Must have knowledge of the true nature of transaction

• Act freely & voluntarily, not under influence of threats, force, or duress

• Merely going along and not objecting does not amount to a valid consent

32

Wrapping Up

Follow the Money Trail • Very important, if possible, to follow the money trail

• Leaving victim’s possession going to suspect’s

• Difficult or impossible if cash is used

33

11 4/21/2016

Wrapping Up

GBI Financial Investigation Unit

• GBI Financial Crimes Unit (FIU)

• Forensic auditors

• Provide financial analysis

• Certified Fraud Examiners

34

Wrapping Up

Prosecutor’s Office

• District Attorney/Solicitor General

• Assist with investigation/obtaining arrest & search warrants/court orders/subpoenas

• Grand Jury

35

The Impact of Financial Exploitation

36

12 4/21/2016

ACT CERTIFICATION

Department of Aging Services - ACT Certification

37

Questions

38

Contact Information

Thomas Williams, CRCM, CCBIA SVP, Senior Compliance Manager United Bank [email protected] (770) 412-4909 Office (678) 972-2095 Cell

39

13

Board of Governors of the Federal Reserve System Commodity Futures Trading Commission Consumer Financial Protection Bureau Federal Deposit Insurance Corporation Federal Trade Commission National Credit Union Administration Office of the Comptroller of the Currency Securities and Exchange Commission

Interagency Guidance on Privacy Laws and Reporting Financial Abuse of Older Adults

PURPOSE

The Board of Governors of the Federal Reserve System (Federal Reserve), Commodity Futures Trading Commission (CFTC),1 Consumer Financial Protection Bureau (CFPB), Federal Deposit Insurance Corporation (FDIC), Federal Trade Commission (FTC), National Credit Union Administration (NCUA), Office of the Comptroller of the Currency (OCC), and Securities and Exchange Commission (SEC) are issuing this guidance to financial institutions to clarify the applicability of privacy provisions of the Gramm-Leach-Bliley Act (GLBA) to reporting suspected financial exploitation of older adults.

Employees of depository institutions and other financial service providers that constitute “financial institutions” for purposes of the GLBA may observe signs of possible financial exploitation of an older adult. Various federal and state authorities either require or encourage reporting of this type of information to the appropriate agency. This guidance clarifies that reporting suspected financial abuse of older adults to appropriate local, state, or federal agencies does not, in general, violate the privacy provisions of the GLBA or its implementing regulations.2 In fact, specific privacy provisions of the GLBA and its implementing regulations permit the sharing of this type of information under appropriate circumstances without complying with notice and opt-out requirements.3

1 The CFTC is issuing this document as staff guidance. 2 While this guidance discusses when reporting is allowed under the GLBA, it does not address any other federal or state laws that may regulate such reporting. Also, the guidance does not specifically address risk management expectations for financial institutions related to the reporting of elder abuse. 3 This guidance’s analysis of the GLBA’s privacy provisions builds on joint guidance issued by several federal agencies in 2002 that specifically addressed disclosures to the Michigan Family Independence Agency. See Letter to Hon. Debbie Stabenow, July 3, 2002, available at http://www.americanbar.org/content/dam/aba/administrative/law_aging/2011/2011_aging_ea_bank_rptg_op_ltr.auth checkdam.pdf. 2

BACKGROUND

Elder abuse includes the illegal or improper use of an older adult’s funds, property, or assets.4 Recent studies suggest that financial exploitation is the most common form of elder abuse and that only a small fraction of incidents are reported.5 Older adults can become targets of financial exploitation by family members, caregivers, scam artists, financial advisers, home repair contractors, fiduciaries (such as agents under power of attorney and guardians), and others. Older adults are attractive targets because they may have significant assets or equity in their homes. They may be especially vulnerable due to isolation, cognitive decline, physical disability, health problems, and/or the recent loss of a partner, family member, or friend. Financial institutions can play a key role in preventing and detecting elder financial exploitation. A financial institution’s familiarity with older adults it encounters may enable it to spot irregular transactions, account activity, or behavior.6 Prompt reporting of suspected financial exploitation to adult protective services, law enforcement,7 and/or long-term care ombudsmen8 can trigger appropriate intervention, prevention of financial losses, and other remedies.

4 See the National Center on Elder Abuse definitions available at http://www.ncea.aoa.gov/FAQ/Type_Abuse/index.aspx. The Older Americans Act, as amended by the Elder Justice Act of 2009, defines exploitation as “the fraudulent or otherwise illegal, unauthorized, or improper act or process of an individual, including a caregiver or fiduciary, that uses the resources of an elder for monetary or personal benefit, profit, or gain, or that results in depriving an elder of rightful access to, or use of, benefits, resources, belongings, or assets.” 42 U.S.C. 1397j(8). 5 Acierno, R., M. A. Hernandez, A. B. Amstadter, H. S. Resnick, K. Steve, W. Muzzy, and D. G. Kilpatrick, “Prevalence and Correlates of Emotional, Physical, Sexual and Financial Abuse and Potential Neglect in the United States: The National Elder Mistreatment Study,” American Journal of Public Health 100(2): 292–97; Lifespan of Greater Rochester, Inc., et al., Under the Radar: New York State Elder Abuse Prevention Study, (Rochester, NY: Lifespan of Greater Rochester, Inc., May 2011). 6 Treasury Department rules require recipients of federal nontax payments to receive payment by electronic funds transfer, with an allowance for certain waivers from the requirement. The rule applies to recipients of Social Security, Veterans Affairs, Supplemental Security Income, Railroad Retirement Board, Department of Labor, and Office of Personnel Management benefit payments. Benefit recipients may have payments directly deposited to an account at a financial institution or to a Direct Express debit card account. See 75 Fed. Reg. 80315 (Dec. 22, 2010). Financial institutions should be mindful that this change may result in additional electronic funds transfer activity involving the accounts of older adults. 7 Financial institutions file “Suspicious Activity Reports” with the Financial Crimes Enforcement Network (FinCEN), a Bureau of the U.S. Department of the Treasury, involving money laundering and terrorist financing as well as activities related to elder abuse and other consumer fraud. The reports assist law enforcement in identifying individuals and organizations involved in financial crime. See FinCEN, Advisory to Financial Institutions on Filing Suspicious Activity Reports Regarding Elder Financial Exploitation, FIN-2011-A003 (Feb. 22, 2011), available at http://www.fincen.gov/statutes_regs/guidance/pdf/fin-2011-a003.pdf. 8 Long-Term Care Ombudsmen are advocates for residents of nursing homes, board and care homes, assisted living facilities and similar adult care facilities. Under the federal Older Americans Act, each state has an Office of the State Long-Term Care Ombudsman that addresses complaints and advocates for improvements in the long-term care system. Local ombudsman staff and volunteers work to resolve problems of individual residents. For more information, see http://www.aoa.gov/AoARoot/AoA_Programs/Elder_Rights/Ombudsman/index.aspx. To find your local ombudsman program, search by location at www.eldercare.gov. 3

DISCUSSION OF PRIVACY PROTECTIONS

The GLBA establishes a general rule that a financial institution may not disclose any nonpublic personal information about a consumer to any nonaffiliated third party unless the financial institution first provides the consumer with a notice that describes the disclosure (as well as other aspects of its privacy policies and practices) and a reasonable opportunity to opt out of the disclosure, and the consumer does not opt out. However, section 502(e) of the GLBA provides a variety of exceptions to this general rule that permit a financial institution to disclose information to nonaffiliated third parties without first complying with notice and opt-out requirements. Generally, disclosure of nonpublic personal information about consumers to local, state, or federal agencies for the purpose of reporting suspected financial abuse of older adults will fall within one or more of the exceptions.9 These disclosures of information may be made either at the agency’s request or on the financial institution’s initiative.

The following are specific exceptions to the GLBA’s notice and opt-out requirement that, to the extent applicable, would permit sharing of nonpublic personal information about consumers with local, state, or federal agencies for the purpose of reporting suspected financial abuse of older adults without the consumer’s authorization and without violating the GLBA:

• A financial institution may disclose nonpublic personal information to comply with federal, state, or local laws, rules and other applicable legal requirements, such as state laws that require reporting by financial institutions of suspected abuse. (15 U.S.C. 6802(e)(8) and implementing regulations at ___.15(a)(7)(i)). 10

• A financial institution may disclose nonpublic personal information to respond to a properly authorized civil, criminal, or regulatory investigation, or subpoena or summons by federal, state, or local authorities or to respond to judicial process or government regulatory authorities having jurisdiction for examination, compliance, or other purposes as authorized by law. (15 U.S.C. 6802(e)(8) and implementing regulations at ___.15(a)(7)(ii)-(iii)).

• A financial institution may disclose nonpublic personal information to protect against or prevent actual or potential fraud, unauthorized transactions, claims, or other liability. (15 U.S.C. 6802(e)(3)(B) and implementing regulations at ___.15(a)(2)(ii)). For example, this exception generally would allow a financial institution to disclose to appropriate authorities nonpublic personal information in order to:

o report incidents that result in taking an older adult’s funds without actual consent, or o report incidents of obtaining an older adult’s consent to sign over assets through misrepresentation of the intent of the transaction.

9 See Section 502(e) of the GLBA (15 U.S.C. 6802(e)). 10 The CFPB’s, FTC’s, CFTC’s, and SEC’s implementing regulations are contained in 12 CFR part 1016, 16 CFR part 313, 17 CFR part 160, and 17 CFR part 248, respectively. For ease of reference, this discussion uses the shared numerical suffix of each of these agencies’ regulations. 4

• To the extent specifically permitted or required under other provisions of law and in accordance with the Right to Financial Privacy Act of 1978 (12 U.S.C. 3401 et seq.), a financial institution may disclose nonpublic personal information to law enforcement agencies (including the CFPB, the federal functional regulators, and the FTC), self- regulatory organizations, or for an investigation on a matter related to public safety. (15 U.S.C. 6802(e)(5) and implementing regulations at ___.15(a)(4)).

In addition, a financial institution may disclose nonpublic personal information with the consumer’s consent or consent of the consumer’s legal representative. (15 U.S.C. 6802(e)(2) and implementing regulations at ___.15(a)(1)).

POSSIBLE SIGNS OF FINANCIAL ABUSE OF OLDER ADULTS

The Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN) published an advisory in February 2011 that describes potential signs of elder financial exploitation that might trigger the filing of a Suspicious Activity Report (SAR).11 As described in the advisory, among the possible signs of abuse are:

• Erratic or unusual banking transactions, or changes in banking patterns: o Frequent large withdrawals, including daily maximum currency withdrawals from an ATM; o Sudden non-sufficient fund activity; o Uncharacteristic nonpayment for services, which may indicate a loss of funds or access to funds; o Debit transactions that are inconsistent for the older adult; o Uncharacteristic attempts to wire large sums of money; or o Closing of CDs or accounts without regard to penalties.

12 • Interactions with older adults or caregivers: o A caregiver or other individual shows excessive interest in the older adult's finances or assets, does not allow the older adult to speak for himself, or is reluctant to leave the older adult's side during conversations; o The older adult shows an unusual degree of fear or submissiveness toward a caregiver, or expresses a fear of eviction or nursing home placement if money is not given to a caretaker; o The financial institution is unable to speak directly with the older adult, despite repeated attempts to contact him or her; o A new caretaker, relative, or friend suddenly begins conducting financial transactions on behalf of the older adult without proper documentation;

11 See footnote 6 above. 12 References to “caregiver” or “caretaker” also may apply to other individuals who may be involved in transactions of the type described in the FinCEN advisory. 5

o The older adult moves away from existing relationships and toward new associations with other “friends” or strangers; o The older adult's financial management changes suddenly, such as through a change of power of attorney to a different family member or a new individual; or o The older adult lacks knowledge about his or her financial status, or shows a sudden reluctance to discuss financial matters.

Further information about the use of Suspicious Activity Reports to report suspected elder financial exploitation is available in FinCEN’s “The SAR Activity Review” published in May 2013.13 In addition, if financial institutions or other organizations are interested in raising public awareness among older adults and their caregivers about preventing, identifying, and responding to elder financial exploitation, Money Smart for Older Adults, a financial resource tool, serves as a helpful source of training and information.14

13 See “The SAR Activity Review: Trends Tips & Issues,” Issue 23, May 2013, available at http://www.fincen.gov/news_room/rp/files/sar_tti_23.pdf. 14 Money Smart for Older Adults (June 2013), available at www.fdic.gov or www.consumerfinance.gov. March 2016

Advisory for financial institutions on preventing and responding to elder financial exploitation

Introduction

The Consumer Financial Protection Bureau (CFPB or the Bureau) provides broad recommendations in this advisory for banks and credit unions to help them prevent and respond quickly to elder financial exploitation.1 The CFPB has identified the benchmarks provided in this advisory to help financial institutions assess and strengthen their current practices for preventing, detecting, and responding to the financial exploitation of older people.2

Elder financial exploitation has been called the crime of the 21st century. Deploying effective interventions has never been more important. Recent studies suggest that financial exploitation—the illegal or improper use of an older person’s funds, property or assets— is the most common form of elder abuse and yet only a small fraction of incidents are reported. Older people are attractive targets because they often have assets and a regular source of income. These consumers may be especially vulnerable due to isolation, cognitive decline, physical disability, health problems, and/or bereavement. Elder financial exploitation robs victims of their resources, dignity and quality of life—and they may never recover from it.

Financial institutions play a vital role in preventing and responding to this type of elder abuse. Banks and credit unions are uniquely positioned to detect that an elder account holder has been targeted or victimized, and to take action.

1 The advisory is not an interpretation of federal consumer financial law or any other statute or rule. It is not designed to implement or prescribe any law or Bureau policy. It is not binding on the Bureau or on financial institutions.

2 Accompanying this advisory, the CFPB is releasing Recommendations and Report to Financial Institutions on Preventing and Responding to Elder Financial Exploitation (hereinafter Recommendations and Report), which provides, among other things, additional background and greater detail on the recommendations contained in this advisory.

1 CONSUMER FINANCIAL PROTECTION BUREAU Recommendations

The CFPB makes the following recommendations to banks and credit unions:

1. Develop, implement and maintain internal protocols and procedures for protecting account holders from elder financial exploitation. The protocols for management and staff should include training requirements, procedures for making reports, compliance with the Electronic Fund Transfer Act (EFTA) as implemented by Regulation E, means of consent for information-sharing with trusted third parties, and procedures for collaborating with key stakeholders. Protocols likely will vary depending on the institution’s size and risks.

2. Train management and staff to prevent, detect, and respond to elder financial exploitation.

Financial institutions should train employees regularly and frequently, and should tailor training to specific staff roles. Key topics for training include:

§ Clear and nuanced definition of elder financial exploitation

§ Warning signs that may signal financial exploitation, including behavioral and transactional indicators of risk, and

§ Action steps to prevent exploitation and respond to suspicious events, including actionable tips for interacting with account holders, steps for reporting to authorities, and communication with trusted third parties.

3. Detect elder financial exploitation by harnessing technology.

The CFPB encourages financial institutions to ensure that their fraud detection systems include analyses of the types of products and account activity that may be associated with elder financial exploitation risk. Some indicators of elder fraud risk may not match conventionally accepted patterns of suspicious activity, but nevertheless may be unusual in light of a particular account holder’s regular pattern of behavior. The CFPB encourages financial institutions using predictive

2 CONSUMER FINANCIAL PROTECTION BUREAU analytics to review their filtering criteria against individual account holders’ patterns and explore additional risk factors that may be associated with elder financial exploitation.3

4. Report all cases of suspected exploitation to relevant federal, state and local authorities.

§ Be aware of state reporting mandates. Financial institutions should be aware of state reporting mandates including to whom and when they must report. Reasonable suspicion rather than certainty or proof can trigger the duty to report to state Adult Protective Services, law enforcement, or both.

§ File Suspicious Activity Reports (SARs). The Financial Crimes Enforcement Network (FinCEN) issued an Advisory in 2011 noting that SARs are a valuable reporting avenue for elder financial exploitation cases. FinCEN now provides a designated category of suspicious activity, “elder financial exploitation,” on the electronic SAR form. Although the electronic SAR form includes a checkbox for elder financial exploitation, the narrative remains critical and FinCEN instructs filers to provide clear, complete, and concise description of the suspicious activity.

§ Understand that the Gramm-Leach-Bliley Act (GLBA) is not a barrier to reporting suspected elder financial exploitation. Financial institutions should be aware of the 2013 Interagency Guidance (the Guidance) from eight federal financial regulators that clarifies that reporting financial abuse of older adults to appropriate local, state and federal authorities does not, in general, violate the privacy provisions of GLBA. The Guidance details the relevant exceptions to the GLBA notice and opt out requirements. Several state regulators issued similar guidance.

3 The CFPB’s Recommendations and Report provides a sample of these types of account activity.

3 CONSUMER FINANCIAL PROTECTION BUREAU § Understand the roles of first responders. Financial institutions should understand how Adult Protective Services (APS), law enforcement and the long-term care ombudsmen work, and the actions that they will and will not take.

§ Include core components in reports to state and local authorities. A list of basic components of a complete report can help financial institutions support the allegation and assist responders.4

§ Expedite documentation requests. When APS, law enforcement and other government entities investigate reports of financial exploitation and request documentation, providing records in a timely manner is essential. FinCEN Guidance clarifies that financial institutions must provide documentation that supports a SAR to certain law enforcement or supervisory agencies when requested, and that service of legal process on the financial institution is not required in such cases. Financial institutions should provide documents to investigatory agencies at no charge.

5. Protect older account holders.

§ Comply with EFTA and Regulation E. Many older consumers experience financial exploitation involving unauthorized electronic fund transfers (EFTs). EFTA and Regulation E offer important protections to these consumers. Under EFTA and Regulation E, financial institutions are obligated to:

¨ Follow rules for extending time limits for consumers for extenuating circumstances such as extended travel or hospitalization.

¨ Follow rules for accepting notices of unauthorized EFTs. These rules specify consumer rights regarding the method of providing notice, who provides notice, and the specificity of the notice.

4 A sample list of reporting elements is in the CFPB’s Recommendations and Report.

4 CONSUMER FINANCIAL PROTECTION BUREAU ¨ Confirm that all relevant conditions are met before imposing any liability on a consumer for an unauthorized EFT. For example, older consumers with cognitive challenges may write PINs on or near debit cards. Under Regulation E, such behavior may not be used as a basis for imposing greater liability on a consumer.

§ Offer account holders the opportunity to consent to disclosure of account information to trusted third parties when the financial institution suspects financial exploitation. The CFPB recommends that financial institutions establish procedures for enabling consumers to provide advance consent to sharing account information with a designated trusted third party when the financial institution reasonably believes that elder financial exploitation is occurring, has occurred, has been attempted or will be attempted. GLBA permits disclosure of nonpublic personal information with the consent of the consumer. The CFPB recommends developing a plain language consent form as well as procedures for offering consumers the opportunity to consent at account opening and periodically thereafter.

§ Offer age-friendly services that can enhance protections against financial exploitation. There are certain services that institutions can offer to their general client base that may be particularly useful to older customers. The CFPB recommends that financial institutions:

¨ Provide information about planning for incapacity. Advance planning for the possibility of diminished capacity and illness—by, e.g., naming a trusted person to serve as an agent under a power of attorney or other fiduciary—increases the odds that the person managing finances will act in the best interests of the account holder.

¨ Honor powers of attorney. A financial institution’s refusal to honor a valid power of attorney can create hardships for account holders who need designated surrogates to act on their behalf. Financial institutions should establish procedures to ensure that the institution makes prompt decisions on whether to accept the power of attorney, that qualified staff make decisions based only on state law and other appropriate considerations and that frontline staff recognize red flags for power of attorney abuse.

¨ Offer protective opt-in account features. Examples of opt-in features that could reduce the risk of elder financial exploitation include cash withdrawal limits, alerts for specified account activity and read-only access to accounts for authorized third parties. A third-party monitoring feature can enable a designated family member or

5 CONSUMER FINANCIAL PROTECTION BUREAU friend to monitor an account for irregularities without having access to funds or transactions.

¨ Offer convenience accounts as an alternative to traditional joint accounts. Traditional joint accounts, often used to enable a helper to pay bills, pose several risks. To avoid risks such as the joint owner withdrawing money for his or her own use, exposing account funds to creditors of the joint owner, and subverting an intended estate plan, financial institutions should provide information to consumers about these risks. When implemented properly, convenience accounts can mitigate these risks. The CFPB recommends routinely offering such convenience accounts as an alternative.

6. Collaborate with other stakeholders.

The CFPB recommends that financial institutions collaborate with the array of organizations on the local, regional and state level that play a critical role in preventing, detecting, and responding to elder financial exploitation.

§ Work with law enforcement and APS. Financial institutions should work with law enforcement and APS to: share policies and procedures for detecting, assessing and reporting cases; develop relationships with specific personnel to facilitate timely response to reports and have a point of contact when questions arise; and provide expert consultation and document review to assist law enforcement and APS with case investigations.

§ Participate in and support coordinated efforts to educate older account holders, caregivers and the public. Financial institutions should work with an array of agencies and service organizations to offer educational programs and distribute materials.

§ Participate in and support local or regional multidisciplinary network initiatives. Financial institution personnel can be valuable members of or contributors to local multidisciplinary networks focusing on elder financial exploitation, some of which engage in case review to assist APS and law enforcement. They can assist investigators with identifying and analyzing financial documents and can educate responders on the nuances of banking policy and procedures. Multidisciplinary team members can educate one another and can send representatives to train staff of the other stakeholder organizations.

6 CONSUMER FINANCIAL PROTECTION BUREAU Conclusion

Financial institutions have a tremendous opportunity to serve older consumers by vigorously protecting them from financial exploitation. The CFPB looks forward to continuing to work with financial institutions and seeing a broad spectrum of financial institutions implement its recommendations so that a greater number of older Americans can have later life economic security.

7 CONSUMER FINANCIAL PROTECTION BUREAU

At-Risk Adults Mandated Reporter’s Resource Guide

Georgia Law Georgia law requires the reporting of abuse, neglect and exploitation (A/N/E) of at- risk adults (elder persons and adults with disabilities) by mandated reporters. The legal definitions of A/N/E can be found in O.C.G.A. § 16-5-100. Requirements for mandatory reporters can be found in O.C.G.A. § 30-5-4(for individuals living in the community) and O.C.G.A. § 31-8-82 (for individuals living in a long-term care facility).

You can access the Official Code of Georgia Annotated at: http://www.lexisnexis.com/hottopics/gacode/ Mandated Reporters

Mandatory reporters play a key role in protecting elder persons and adults with disabilities. The list of mandatory reporters is as follows:

• Physicians licensed to practice medicine, interns, or residents • Hospital or Medical Personnel • Dentists • Licensed Psychologists and Persons Participating in Internships to Obtain Licensing • Podiatrists • Registered Professional Nurses or Licensed Practical Nurses or Nurse's Aides • Professional Counselors, Social Workers, or Marriage and Family Therapists • School Teachers • School Administrators • School Guidance Counselors, Visiting Teachers, School Social Workers, or School Psychologists • Child Welfare Agency Personnel • Child-Counseling Personnel • Child Service Organization Personnel • Law Enforcement Personnel • Reproductive Health Care Facility or Pregnancy Resource Center Personnel and Volunteers • Physical Therapists/Occupational Therapists • Day-Care personnel • Coroners/ Medical Examiners • EMS Personnel/EMT/Paramedics, Cardiac Techs or First Responder • Employees of a Public or Private Agency Engaged in Professional Health Related Services (to this population) • Clergy Members • Any Employee of a Financial Institution

2 Responsibility of Mandatory Reporters

Mandated reporters are required to report abuse, neglect, and exploitation when they have a reasonable cause to believe.

Reasonable cause to believe means you have knowledge of facts that do not have to amount to direct knowledge but would cause a reasonable person, knowing the same facts, to reasonably conclude the same thing. A report of suspected abuse, neglect and exploitation of an at-risk adult is a request for an investigation and not an accusation. The person reporting does not have to be absolutely certain that abuse, neglect or exploitation has occurred. Reporting Obligations

When the potential victim lives in the community:

 Mandated reporters are required to report to Adult Protective Services (APS) AND an appropriate law enforcement agency or prosecuting attorney.  The report can be made by oral or written communication.  The report shall include the name, address, and age of the at-risk adult, the name and address of their caretaker, the nature and extent of the injury or condition resulting from abuse, exploitation, or neglect, and other pertinent information. If you do not have all of this information, you should still report with what you have.

When the potential victim lives in a long-term care facility:

 Mandated reporters are required to report to Healthcare Facility Regulation (HFR) AND an appropriate law enforcement agency or prosecuting attorney.  The report can be made by telephone or in person. A written report should be provided to HFR within 24 hours of making the initial report.  The report should include the name and address of the person making the report, the name and address of the resident or former resident, the name and address of the long-term care facility, the nature and extent of any injuries or the condition resulting from the suspected abuse or exploitation, the suspected cause of the abuse or exploitation and any other information which the reporter believes might be helpful in determining the cause of the resident’s injuries or condition and in determining the identity of the person

3 or persons responsible. If you do not have all of this information, you should still report with what you have.

Contact Information

Adult Protective Services (APS)

 Call: 1-866-552-4464; Follow Prompts  Online: www.aging.ga.gov o Go to: “Report Elder Abuse”  Fax: 770-408-3001

Healthcare Facility Regulation (HFR)

 Call: 1-800-878-6442  Online: www.dch.georgia.gov o Go to: “Healthcare Facility Regulation” o Go to: “File A Complaint”

Immunity

Mandated reporters are immune from any civil or criminal liability on account of their report or testimony or participation unless that person acted in bad faith, with a malicious purpose or was a party to such crime or fraud.

What If I Don’t Report

It is unlawful for any person or official required to report abuse, neglect, and exploitation to fail knowingly and willfully to make such a report. Any person violating the provisions of this code section shall be guilty of a misdemeanor.

Notice: Even though every effort has been made to ensure the information presented in this document is correct and current, the material should be used only for general guidance. This is not a legal document, nor is it intended to fully explain all of the provisions or exclusions of relevant laws.

4 Definitions The definitions provided below are those found in the Official Code of Georgia Annotated (O.C.G.A.).

Abuse: The willful infliction of physical pain, physical injury, sexual abuse, mental anguish, unreasonable confinement, or willful deprivation of essential services.

Alzheimer’s Disease: means a progressive, degenerative disease or condition that attacks the brain and results in impaired memory, thinking, and behavior.

Caretaker: A person who has the responsibility for the care of a disabled adult or elder person as a result of family relationship, contract, voluntary assumption of responsibility or by operation of law.

Dementia: (A) An irreversible global loss of cognitive function causing evident intellectual impairment which always includes memory loss, without alteration of state of consciousness, as diagnosed by a physician, and is severe enough to interfere with work or social activities, or both, and to require at least intermittent care or supervision; or (B) The comatose state of an adult resulting from any head injury.

Disabled Adult: A person 18 years of age or older who is mentally or physically incapacitated or has Alzheimer's disease or dementia. The law uses the term disabled adult but adults with disabilities is used in this publication to encourage the use of person-first language.

Elder Person: A person 65 years of age or older.

Essential Services: Social, medical, psychiatric, or legal services necessary to safeguard a disabled adult's, elder person's, or resident's rights and resources and to maintain the physical and mental well-being of such person. Such services may include, but not be limited to, the provision of medical care for physical and mental health needs, assistance in personal hygiene, food, clothing, adequately heated and ventilated shelter, and protection from health and safety hazards.

Exploit: Illegally or improperly using a disabled adult or elder person or that person's resources through undue influence, coercion, harassment, duress, deception, false representation, false pretense, or other similar means for one's own or another person's profit or advantage.

Long-Term Care Facility: Any skilled nursing facility, intermediate care home, assisted living community, community living arrangement, or personal care home subject to regulation and licensure by the Department of Community Health.

Neglect: Willful deprivation of a disabled adult, elder person, or resident of health care, shelter, or necessary sustenance to the extent that the health or well-being of such person is jeopardized.

Resident: Any person who is receiving treatment or care in any long-term care facility.

5 Sexual Abuse: The coercion for the purpose of self-gratification by a guardian or other person supervising the welfare or having immediate charge, control, or custody of a disabled adult, elder person, or resident to engage in any of the following conduct: (A) Lewd exhibition of the genitals or pubic area of any person; (B) Flagellation or torture by or upon a person who is unclothed or partially unclothed; (C) Condition of being fettered, bound, or otherwise physically restrained on the part of a person who is unclothed or partially clothed unless physical restraint is medically indicated; (D) Physical contact in an act of sexual stimulation or gratification with any person's unclothed genitals, pubic area, or buttocks or with a female's nude breasts; (E) Defecation or urination for the purpose of sexual stimulation of the viewer; or (F) Penetration of the vagina or rectum by any object except when done as part of a recognized medical or nursing procedure.

6 Indicators of Possible A/N/E

Type Signs/Symptoms Abuse  Bruises, black eyes, welts, lacerations, and rope marks  Bone fractures, broken bones, and skull fractures  Open wounds, cuts, punctures, untreated injuries in various stages of healing  Sprains, dislocations, and internal injuries/bleeding  Broken eyeglasses/frames, physical signs of being subjected to punishment, and signs of being restrained  Laboratory findings of medication overdose or underutilization of prescribed drugs  An at-risk adult’s report  An at-risk adult’s sudden change in behavior  The caregiver's refusal to allow visitors to see an at-risk adult alone Sexual  Bruises around the breasts or genital area Abuse  Unexplained venereal disease or genital infections  Unexplained vaginal or anal bleeding  Torn, stained, or bloody underclothing and  An at-risk adult’s report Neglect  Dehydration, malnutrition, untreated bed sores, and poor personal hygiene  Unattended or untreated health problems  Hazardous or unsafe living condition/arrangements (e.g., improper wiring, no heat, or no running water)  Unsanitary and unclean living conditions (e.g. dirt, fleas, lice on person, soiled bedding, fecal/urine smell, inadequate clothing)  An at-risk adult’s report Exploitation  Sudden changes in bank account or banking practice  The inclusion of additional names on an at-risk adult’s bank signature card  Unauthorized withdrawal of the at-risk adult’s funds using the at-risk adult’s ATM card  Abrupt changes in a will or other financial documents  Unexplained disappearance of funds or valuable possessions  Substandard care being provided or bills unpaid despite the availability of adequate financial resources  Discovery of an at-risk adult’s signature being forged for financial transactions or for the titles of his/her possessions  Sudden appearance of previously uninvolved relatives claiming their rights to an at-risk adult’s affairs and possessions  Unexplained sudden transfer of assets to a family member or someone outside the family  The provision of services that are not necessary and  An at-risk adult’s report

7 What Happens after a Report is made to APS

Reports are made to APS Central Intake.

APS Central Intake makes the determination as to whether the report meets criteria.

If a report does not meet criteria, APS may provide limited telephone intervention services and/or referrals to other services.

If criteria are met and accepted for investigation, APS requires initial face-to- face contact with the client within 10 business days and investigation completed within 30 business days.

The APS Investigator investigates whether A/N/E occurred and concurrently conducts a comprehensive assessment to determine risk and further endangerment.

APS may brief offer limited case management for clients who remain at risk, with their consent.

8 VULNERABLE ADULTS/ELDER ABUSE LAWS IN GEORGIA* PROHIBITS (MAKES TITLE 30 TITLE 31 TITLE 16 TITLE 16 COMMENTS UNLAWFUL) A/N/E AND DAEPPA LTCFRARA CRIMINAL CODE CRIMINAL CODE PROVIDES FELONY (APS STATUTE) (REPORTING CRUELTY TO A BREACH OF PENALTIES? STATUTE ONLY) PERSON 65+ FIDUCIARYPERSON 65+ Mentally Incapacitated Yes No* 65 and over if deprived of 65 and over, if fiduciary in healthcare, shelter and breach of fiduciary obligation - § 30-5-1, et seq. § 31-8-80, et seq. sustenance, w/exceptions; Exploitation (E) § 16-9-6. no (A/E) § 16-5-100 Physically Incapacitated Yes No** 65 and over. . . 65 and over…(E) Diagnosed Cognitively Yes No** 65 and over. . . 65 and over…(E) Incapacitated Undiagnosed Cognitively Yes No** 65 and over. . . 65 and over… (E) Incapacitated Long-term care Facility Yes*(Criminal penalty No** 65 and over. . . 65 and over…(E) Residents applies to disabled adults in LTCFs) Non-residents of Long- Yes No 65 and over. . . 65 and over (E) term Care Facilities Exemptions against who No (no exemptions for No No No Exemption from criminal liability can be prosecuted for abusers); issue of owner, administrator, officer, other than good faith concerning “specific board member of LTCF for intent” for violation of actions of a person convicted LTCF resident) under DAEPPA. All victims covered equally Yes No Yes (A/N) – (There is no Yes (E) – There is no A/N protected against A/N/E provision for financial exploitation)

Available Penalty Felony 1-5 years for Misdemeanor for Felony 1-20 years Felony 1-15 years and/or a fine A/N/E of disabled failure to report not to exceed the amount adults and elder A/E; “broader provided by Code Section 17- persons in the definition of 10-8, or both community or LTCFs. neglect” is not part Misdemeanor for of LTCFRARA***. failure to report A/N/E

*Chart does not include O.C.G.A. § 10-1-850, the Unfair or Deceptive Practices Toward the Elderly Act, as it includes civil penalties for violations (disabled or elderly) **LTCFRARA covers this population, but does not make A/N/E against population unlawful, except to not report. ***LTCFRARA includes “failure of care and treatment” within the definition of “abuse” The True Link Report on Elder Financial Abuse 2015

January 2015 About True Link Financial

True Link Financial is a San Francisco, California-based financial services firm that helps seniors and their families protect themselves from fraud, exploitation, and financial abuse. The company offers tools to detect suspicious activity and block unwanted transactions, preserving seniors’ independence and keeping their money safe. True Link’s data science team is dedicated to building world-class tools that prevent elder financial abuse and sharing its research to aid others also working toward that vision.

The survey research underlying this report was produced as a collaboration between the True Link data science team and Laurie Orlov. Orlov spent nine years as a leading industry analyst at Forrester Research before founding an independent research and analysis firm focused on aging. She has produced numerous research studies related to aging on behalf of clients such as Philips and AARP.

For more information about True Link Financial, please visit: www.truelinkfinancial.com.

© 2015 True Link Financial Table of Contents

Executive Summary...... 1

Research Goals...... 4

Reconcile discrepancies among previous studies...... 4

Align research with accepted definitions of elder financial abuse...... 5

Gain a deeper understanding of sources of vulnerability...... 6

Methodology...... 7

Findings...... 11

Magnitude of elder financial abuse...... 11

Criminal Fraud...... 11

Caregiver Abuse...... 13

Financial Exploitation...... 15

The financial exploitation progression...... 17

Non-financial effects of financial abuse...... 18

Risk factors...... 19

Reporting and underreporting...... 23

Conclusion...... 25

Appendix A: Common Examples...... 26

Appendix B: Significant Risk Factors...... 35

Endnotes...... 36 Executive Summary

Prior to this report, the most frequently cited estimate of the amount of money lost to elder financial abuse was $2.9 billion. In the fraud esearchr community, we have long suspected that this was an underestimate. In fact, it is a dramatic underestimate: our research reveals that seniors lose $36.48 billion each year to elder financial abuse. This is more than twelve times what was previously reported. Approximately 36.9% of seniors are affected by financial abuse in any five-year period.

Breakdown of the problem

• Financial exploitation: $16.99 billion is lost annually to financial exploitation, defined as when misleading or confusing language is used—often combined with social pressure and tactics that take advantage of cognitive decline and memory loss—to obtain a senior’s consent to take his or her money.

• Criminal fraud: $12.76 billion is lost annually to explicitly illegal activity, such as the grandparent scam, the Nigerian prince scam, or identity theft.

• Caregiver abuse: $6.67 billion is lost annually to deceit or theft enabled by a trusting relationship—typically a family member but sometimes a paid helper, friend, lawyer, accountant, or financial manager.

Sources of risk

• People often assume that those perceived as most vulnerable— widows, the very old, people with severe memory loss—are at greatest risk. In fact, risk equals vulnerability plus exposure. Seniors who are young, urban, and college-educated lose more money than those who are not.

• Some sources of exposure were surprising. Seniors described as extremely friendly lose four times as much to elder financial abuse,

1 perhaps because they are approachable and may give strangers the benefit of the doubt. Financially sophisticated seniors lose more to fraud, likely because they are comfortable moving larger amounts of money around. Thrifty seniors lose five times as much to fraud, perhaps because they are enticed by bargains.

The exploitation progression

• Small losses are evidence of an underlying vulnerability. What seems like an isolated incident is often the first step in a financial exploitation progression. A senior who lost as little as $20 in a year to exploitation could be expected to lose $2,000 a year to other types of fraud.

• A person who receives just one telemarketing phone call per day is likely to experience three times as much financial loss as someone who receives no or only occasional telemarketing calls.

Non-financial effects

• Financial abuse frequently results in reduced emotional and physical health for seniors. We estimate that 954,000 seniors are currently skipping meals as a result of financial abuse.

Research methodology

The primary source of data analyzed in this report is the 2015 True Link Senior Vulnerability Survey, a survey of family caregivers for older Americans that includes 2,335 cumulative years of data on incidents of financial abuse. The design of this survey was guided by the recommendations of an expert panel of fraud researchers convened by the Financial Fraud Research Center at the Stanford Center on Longevity.

2 Summary findings

Annual cost Avg. five Category Defining feature Examples to seniors year loss

Exploitation $16.99 billion $2,617 Operating openly • Hidden shipping and handling or subscriptions claiming consent of • Work-from-home schemes the victim • Quack weight loss or dietary products • Excessive gifts • Misleading financial advice1

Criminal fraud $12.76 billion $13,107 Anonymous illegal activity

Con $9.85 billion $13,225 Attempt to get you • Grandparent scam artists to give them money • Nigerian prince emails • Fake lottery winnings or government grants • Sweetheart scam

Identity $2.91 billion $7,633 Opening or using • Opening new credit cards, bank accounts, theft accounts without or payday loans authorization • Car title or home equity loans on your property • Using card data gained by , in data breach, or from the mail

Caregiver abuse $6.67 billion $26,879 Abuse of • Theft by family members or caregivers trusting relationship • Rewritten wills or powers of attorney • Borrowing money hoping senior will forget • Sometimes combined with physical abuse or neglect

Total losses $36.48 billion2 $11,583 Research Goals

Elder financial abuse3 is no longer the “silent epidemic” it used to be. This once-ignored issue is beginning to get the attention it deserves, everywhere from the Senate Floor to the Nightly News. Yet we still know so little about it. How many people are affected? How much money is lost? Who is most likely to be a victim? To be a perpetrator? Why?

Although the answers to those questions are the subject of spirited debate in the elder abuse prevention community, we can all agree that to begin to solve this problem we need to understand it better. This report and the data herein represent our contribution to that endeavor. We hope that our report aids all of us in protecting ourselves and our families, and that it informs and inspires all of those working to protect our society’s most vulnerable, whether through policy, the press, or practice.

Reconcile discrepancies among previous studies

Our first goal in publishing this study is to reconcile discrepancies in a set of known facts about elder financial abuse. On the one hand, across studies by the Federal Trade Commission and others, it is reported that approximately fifteen percent of Americans fall victim to fraud every year.4 Older adults have been shown to be more vulnerable than the general population to almost every type of financial abuse.5 It is also known that changes in the brain that occur during the aging process create extra sources of vulnerability.6

On the other hand, the most frequently cited estimate of the cost of elder financial abuse is surprisingly low—$2.9 billion, from a 2011 study by the MetLife Institute.7 To develop that estimate, the MetLife study added up the financial losses reported in three months of published news stories, despite research consistently finding that more than 90% of financial exploitation of seniors goes unreported.8 While the MetLife study was based on an estimate of approximately two thousand instances of fraud every year, other research indicates that closer to six million seniors fall victim to fraud every year.9 Clearly, we have not been getting the complete picture.

4 Furthermore, when you look closely at any specific category of fraud, the numbers start to balloon. In the 1990s, a Congressional panel found that alone cost as much as $15 billion a year, primarily targeting seniors.10 Likewise, the Investor Protection Trust found that one in five seniors had been affected by a financial swindle.11 Individual states alone estimate that their residents face a considerable share of the abuse that MetLife reports at a national level.12 Our own experience at True Link with our customers and their families made it clear to us that the numbers must be much greater than previously reported.

Align research with accepted definitions of elder financial abuse

Second, we wanted to capture mass-market financial exploitation. So often, the ways older adults are defrauded appear to be legal because of a disclaimer or . Maybe the salesperson didn’t actuallylie , but just said something confusing that led to an unexpected, unwanted, or unnecessary charge. It is clear that deceptive practices like these should be included in any definition of elder financial abuse.

The law varies from jurisdiction to jurisdiction, but across the board it is illegal to deceptively profit from the infirmity of an elderly person13—and the relationship between aging and vulnerability is now an established medical fact. We also know that the public agrees with this broad legal definition. In the 2014 True Link Financial Abuse Perceptions Survey, we surveyed over seven thousand American adults about their perspectives on what constitutes elder financial abuse. Our results conclusively showed that, whether you technically lied or not, if a senior misunderstood something and gave you money as a result, it is exploitation and abuse in the public’s view.

In summary, the law and the public both define deceptive marketing and sales The law and the public both tactics as abuse, yet these are so rarely reported in the press or pursued by law define deceptive marketing enforcement that no one is looking into and sales tactics as abuse. this as a systematic problem. Adding

5 deceptive marketing to our understanding of elder financial abuse is critically important to ensuring that the public is prepared to fight back against the “crime of the 21st century.”14

Consistent with both public opinion and the law, for the purposes of this study, we defined elder financial abuse as any time someone took financial advantage of an older adult in a way that would not have been possible when the senior was younger. Previous research has demonstrated that many individuals who report losing money in specific incidents of fraud do not label their experience as “fraud.”15 Instead of asking people if they were impacted by financial abuse, we asked multiple questions about whether a very specific set of occurrences had happened to them.

Gain a deeper understanding of sources of vulnerability

Third, we sought to identify specific factors that affect vulnerability. Previous studies have often failed to point to such factors.16 Key studies even disagree about whether older adults are more vulnerable to financial abuse than middle-aged and young adults.17 This appears to be because factors—often countervailing ones—point in different directions. For example, the AARP found that lottery fraud victims were more likely to be women over 70 living alone, with lower education, lower income, and less financial literacy, while victims of investment fraud were more likely to be men between the ages of 55 and 62 who were married, with higher incomes and greater financial literacy.18 We sought to identify specific factors that may indicate increased risk, which is something we’ve heard is critical time and time again from those working to prevent elder financial abuse.

6 Methodology

In the course of operating its core fraud protection business for seniors, True Link employs a data science and research team that maintains a database of known types of fraud, including how they operate, how prevalent they are, what the warning signs are, and who is likely to be at risk.

The primary source of data presented in this report is the 2015 True Link Senior Vulnerability Survey. This was a survey of Americans aged 50–70 that used the SurveyMonkey Audience panel in October 2014. Among other things, SurveyMonkey is a survey research and polling partner of NBC News. We contacted 2,096 respondents and asked them to describe the financial issues they experienced in caring for an older adult over the last five years. Filtering to the 467 respondents who identified themselves as having “any responsibility for an older adult,” we collected 2,335 cumulative years of data.19

The survey asked experiential questions—questions like, “Has the person you care for been asked to send money or provide personal information to help someone posing as a relative or other acquaintance?” and “Has this person been asked to spend money on ‘free’ trials that weren’t free or were hard to cancel?” For “yes” answers, data was collected on how many times the fraud was attempted, whether money was lost, and how much was lost over the five-year survey period.

This methodology was influenced most heavily by two sources: the guidance of an expert panel convened by the Financial Fraud Research Center at the Stanford Center on Longevity, and prior research and internal data about the specific nature of this problem from the True Link data science team and True Link’s customers.

Among the conclusions drawn from their panel of experts, Martha Deevy and Michaela Beals of the Financial Fraud Research Center recommended using survey estimates instead of complaint data, and classifying fraud based on experiential questions (“Did X happen to you?”) rather than questions based on self-identification (“Were you the victim of fraud?”).

7 They also recommended experimenting with proxy respondents for vulnerable By adopting these key expert populations with diminished capacity. recommendations, we were We believe that by adopting these key able to develop a much expert recommendations, we were more accurate estimate than able to develop a much more accurate estimate than previous studies, like previous studies. those conducted by MetLife (2011) or Allianz (2014). For an excellent and thorough discussion of the pros and cons of various survey designs, see Martha Deevy and Michaela Beals, “The Scope of the Problem: An Overview of Fraud Prevalence Measurement” (2013) and “The True Impact of Fraud: A Roundtable of Experts” (2014), both from the Financial Fraud Research Center at Stanford University.20

The True Link data science team has conducted four other research activities that informed the methodological approach of this analysis. Critically, each of these data sources provided or clarified specific examples of criminal fraud, exploitation, and caregiver abuse in a way that enabled the development of experiential questions. This research is referenced throughout the report, and more detail will be provided in future reports.

• The 2014 True Link Financial Abuse Perceptions Survey. We surveyed 7,422 Americans about their perceptions of financial fraud and exploitation targeting seniors. We used a representative sample of American adults drawn from Google Surveys. We presented participants with various scenarios involving an interaction between a senior and an individual or organization engaging in deceptive or predatory practices. The survey asked respondents to characterize the interaction with questions like, “Was this an example of fraud?”; “Was this an example of financial vulnerability?”; “Was this an example of exploitation?”

• An anonymized sample of 9,008 Visa card transactions from seniors over 65, provided by True Link’s internal processing.21 Of these transactions, 3,541 represented spending by older adults whose family members were closely monitoring their finances.

8 • A set of surreptitious interactions with merchants we believed were engaged in abusive, fraudulent, and exploitive behavior. We spoke with sales representatives from 208 telemarketers, mail-order and TV merchants, and organizations posing as charities in solicitation activities. Typically, we went through an entire sales process, classifying which tactics they used, which products they cross-sold, how many times they charged card numbers they were given, and which additional organizations they permitted to charge the cards.

• A set of interviews with 67 True Link customers. We conducted interviews with both older adults and family members about the types of fraud or financial exploitation they have experienced in the past and are currently facing. We found that for these customers, using True Link protects them from an average of $2,340 per year of unwanted transactions.

To estimate the total amount of elder financial abuse affecting the U.S. population each year, we calculated the mean annual financial loss per person over 65 implied by our sample and multiplied it by the U.S. population over 65.22 Because the demographically representative panel we used to calculate national average losses was selected for having a family member or other adult with some level of responsibility, we looked carefully for robustness against extrapolation bias. In particular, we looked at possible bias introduced by age and gender deviations against national averages. We found that demographic corrections for age and gender did not substantially affect the results. These were within 15% of the raw figures, with the corrected numbers slightly higher than raw, uncorrected figures. Out of conservatism, we reported the lower, uncorrected number rather than the higher, corrected number.

Second, we looked at bias resulting from adverse selection on family member involvement—the plausible hypothesis being that greater family member involvement might be correlated with the unobserved hidden variable of underlying vulnerability. We found that within our panel, level of family member involvement was unrelated to financial losses. For example, people who have a family member who reviews their finances at least once a month suffered greater financial losses than people whose family members only rarely or never review their finances. It is likely that

9 we introduced underreporting effects by including family members who reported never reviewing seniors’ finances, as especially with small- dollar exploitation, they might not be aware of the abuse taking place. However, we could not devise a better way to limit underreporting without introducing bias.

We used linear regression to model the relationship between financial losses and the independent variables (e.g., age, education level, friendliness throughout the course of one’s life) and logistic regression to model the likelihood of losses.

10 Findings

Magnitude of elder financial abuse

We estimate that financial abuse costs American seniors a total of $36.48 billion per year. We also found that approximately 36.9% of seniors are affected by financial abuse in a given five year period.

Annual Cost of

Billions Elder Financial Abuse $20

$15

$10

$5

$0 Financial Criminal Caregiver Exploitation Fraud Abuse

Criminal fraud

We divided our assessment of abuse into several categories. Criminal fraud is defined as any money-taking activity perpetrated by a criminal who is concealing his or her identity to avoid getting caught.23

The key signal we used to classify an event as fraud was that the perpetrator had clearly embraced the fact that the activity was illegal. Such perpetrators operate anonymously; they make statements in writing that are overt lies; they are often from foreign jurisdictions with low levels of law enforcement. These are not people who assume that if they ended up in a courtroom, they could get off the hook. They are people who are diligently avoiding the courtroom altogether.

11 We further broke down criminal fraud into two subcategories. The first subcategory is traditional Scams, in which a stranger uses deception to trick someone out of his or her money. It might be the “grandparent scam,” where an older adult receives a late-night phone call from a caller who says, “Grandma? It’s me, your favorite grandson. I need your help. I’m traveling, and I was arrested. I need you to wire money to help me post bail. Please don’t tell mom or dad—they would be really upset!” Typically these requests are for a few thousand dollars, but we’ve seen people lose as much as $70,000 over a series of increasingly high-pressure calls. It might be the “Nigerian prince” emails, or another con that requires an individual to make a payment to collect a lottery winning, insurance claim, government benefit, or grant. One “Australian lottery” victim lost three- quarters of his life savings before mentioning the windfall he expected to receive to his daughter, who helped him realize he’d been conned. Or perhaps an offer to buy a senior’s car comes in the form of a cashier’s check that is $2,000 over the agreed upon price. “No problem,” says the buyer. “Just send me back a check for the difference.”

We estimate that these scams cost American seniors $9.85 billion per year. 43.9% of our sample indicated that an example of this type of fraud had been attempted over the last five years,24 and 8.4% lost money to it. The mean five-year financial loss for someone who lost money to con artistry was $13,225, with half of all victims losing $2,500 or more.

The second subcategory of criminal fraud is Identity theft, which includes when someone takes out a credit card or other financial instrument in someone else’s name, using misappropriated information about his or her identity, or uses an existing financial product, such as a stolen credit card number or checkbook, without authorization.

Only 4.3% of our respondents lost money to identity theft, losing an average of $7,633 over the five-year study period. We estimate that identity theft costs seniors $2.91 billion per year, of which approximately $773 million is lost to card fraud and check forgery. The remaining $2.14 billion is lost to people opening new accounts or taking out new loans using stolen personal information.

12 Criminal Fraud Examples

Con Artists • Grandparent scam • Nigerian prince emails • Fake lottery winnings or government grants • Sweetheart scam Identity Theft • Opening new credit cards, bank accounts, or payday loans • Car title or home equity loans on your property • Using card data gained by phishing, in data breach, or from the mail

Caregiver abuse

We included Caregiver abuse as a second category separate from fraud. Both kinds of abuse are illegal, but while fraud is enabled by anonymity, caregiver abuse is enabled by a trusting relationship with the victim.

The perpetrator is often a family member but can also be a paid caregiver, longtime friend, lawyer, accountant, financial manager, or someone else with an obligation of good faith to the victim. This cast of characters could range from the “helpful” son who visits every morning and asks to borrow $100, knowing that by the next morning his mother with memory loss will have forgotten, to a paid caregiver who removes family heirlooms from the home for months before anyone notices, to the “friend” who just needs a “small loan” to get back on his feet.25 Sometimes it occurs as hybrid financial abuse, a recently named category defined as financial abuse coupled with physical abuse or neglect that creates a fear or power dynamic that enables the abuse.26

Other studies have reported that the majority of fraud is perpetrated by family members or paid caregivers.27 At $6.67 billion dollars, the amount of money our study identifies as lost each year to caregiver abuse is even larger than the amount identified by prior research. Importantly, the amount lost due to family member or trusted party theft is on average

13 larger than losses incurred through other types of abuse. The amount Our public policy needs to stolen by an errant nephew taking out acknowledge, honor, and an unauthorized mortgage is necessarily empower the family caregiver. larger than the amount added as a shipping-and-handling charge for a TV purchase.

However, incidents involving family or other trusted parties occur in a much smaller percentage of respondents than incidents involving strangers or businesses. Focusing exclusively on caregiver abuse can obscure issues related to parties not in a position of trust.

It’s important to recognize this because when attempting to resolve a situation of financial vulnerability, the solution is almost always either to “empower the caregiver” or to “disempower the caregiver.” In other words, if a person is engaging in activity that is causing financial self-harm, he or she may need support to address the problem; the appropriate response is to find a trusted party and ask for his or her help. By contrast, if a caregiver is causing financial harm, the solution is to get him or her out of the picture.

Our public policy in situations of elder financial abuse often results in removing sources of support, rather than adding them. We believe that this can be damaging—that our public policy needs to acknowledge, honor, and empower the family caregiver. We estimate, for example, that merely by reviewing their parents’ finances every few months, caregivers prevent 24,500 instances a year of financial fraud and exploitation that would have resulted in $465 million of financial losses.28

Caregiver Abuse Examples

• Theft by family members or caregivers • Rewritten wills or powers of attorney • Borrowing money hoping senior will forget • Sometimes combined with physical abuse or neglect

14 Financial exploitation

In contrast to criminal fraud and caregiver abuse, our third category, Exploitation, is defined as someone engaging in abusive action openly, expecting to avoid law enforcement actions on technicalities. This is behavior that relies on misrepresentations that are just within the bounds of the law and takes advantage of a person’s vulnerability or confusion.29 Such exploitation might be perpetrated by a U.S. corporation with a listed address and identifiable brand. Rather than operating under the radar, these organizations advertise on TV, bank at mainstream financial institutions, raise capital from legitimate financial markets, hire sales performance consultants to maximize their revenue, and so on.30

Exploitation is frequently connected to products sold on TV, by phone, or in the mail. Typical examples might be a product that has an unexpected shipping-and-handling charge, includes a free trial that is hard to cancel, or is unexpectedly bundled with a subscription service.31 Another category includes services that are misrepresented in their marketing with small- font disclaimers, such as creams that purport to help you lose weight, credit score improvement services, or work-from-home kits that require an upfront payment of several thousand dollars to help you set up your own “online store” to sell secondhand jewelry on eBay.

We believe it is critical to highlight this predatory activity, particularly when law enforcement is hesitant to bring ambiguous cases to court and journalists fall silent about crime that occurs in these gray areas. If a person reports a Nigerian phishing email in the press, the fraudster is not going to demand a correction or sue for libel. Nevertheless, we found that many people shied away from reporting the illegal practices of established, U.S.- based businesses. Put simply, they are getting away with it.

We estimate that financial exploitation costs seniors a startling $16.99 billion a year. Victims in our study lost an average of $2,716 over the course of five years to exploitative practices, with over half losing $500 or more. 11% reported losing over Put simply, they are $5,000, and 4% reported losing over getting away with it. $10,000. One survey respondent

15 reported, “Mom exhausted her savings. Now there is nothing to steal.” Often, Based on our investigation of this was the result of a piling-up of the industry, what’s going on small things—“death by a thousand within these organizations is cuts,” as another respondent put it. an open secret. These cases involved varying degrees of entrapment. Although the victim acted “voluntarily”—giving out a credit card number or sending a check—he or she was being deliberately set up to make a spending mistake. Typically, the closer we looked, the more obvious it became that the set-up was deliberate. For example, a company that sells a subscription service might use scoring techniques when buying lists of prospective customers from another subscription service vendor. While this kind of company might claim ignorance that the list it purchased primarily includes people with memory loss who forgot to cancel previous subscriptions, our interviews with call center representatives and reviews of sales scripts and training materials debunk such claims of ignorance. Based on our investigation of the industry, what’s going on within these organizations is an open secret, and it is clear they are systematically engaging in fraud.

Imagine this: A third-party marketing firm sends a senior with memory loss three free issues of a popular national magazine. The firm calls the senior and says, “You’ve been receiving [this magazine], and you have not yet paid for your subscription. According to the terms of your offer, today is the final deadline to make a required payment, so please give me your credit card number now.” The key phrase is “according to the terms of your offer”—the senior believes he has agreed to these terms, perhaps due to trust, confusion, pressure, or memory loss, and so believes he owes money when in fact he does not. Typically these subscriptions will be for terms as long as three to five years and will be at prices that are far above market rates for the magazine in question.

Here’s another common example: When a senior donates $10 to a new charity, it may seem innocuous—hardly deserving of the term “fraud.” But imagine a company operating a massive call center that has bought a “” of people who are known to always donate—perhaps because

16 of memory loss or cognitive impairment. This company calls the same senior multiple times a day, substituting in one rent-a-charity after another, taking a 90% cut and giving 10% to the charitable cause. Suddenly, a charitable solicitation begins to look more clearly like exploitation. As one survey respondent put it, “If non-profits are allowed to harass seniors, they should at least pay full postage.”

Financial Exploitation Examples

• Hidden shipping and handling or subscriptions • Work-from-home schemes • Quack weight loss or dietary products • Excessive gifts • Misleading financial advice

The financial exploitation progression

We also found that financial exploitation is rarely an isolated incident. Although the losses were small relative to other types of abuse—on average $2,617 over a five-year period—we found that a senior who loses as little as $100 over five years to petty exploitation is expected to lose $9,660 to other types of fraud over the same five-year period. In other words, the loss of around $20 a year can be seen as an indicator of an expected loss of around $2,000 a year.33

The takeaway is that any financial loss A senior who loses as little at all should be taken as a sign of an as $100 over five years underlying vulnerability. An important to petty exploitation is message in media, nonprofit, and expected to lose $9,660 government awareness campaigns must to other types of fraud. be that no loss is small enough that it’s safe to ignore.

17 Summary: Categories of Abuse Who they How they hope to Category are What they do get away with it

Criminal Criminals Trick seniors into Try not to get fraud sending money or caught by operating providing personal anonymously information

Exploitation Businesses, Use pressure tactics Because they charities, or or misleading technically did not individuals language to lead lie or steal, they seniors into financial claim the senior mistakes acted voluntarily

Caregiver Family, Take advantage of Conceal the activity, abuse friends, the trust relationship or use intimidation or paid to get money from or neglect to keep helpers the senior the senior silent

Non-financial effects of financial abuse

While the financial effects of elder abuse grab headlines, the non-financial effects are important as well.34 Of the seniors who experienced fraud, 1.8% lost their home or other major assets as a result. 6.7% skipped medical care, and 4.2% reduced their nutritional intake for budgetary reasons. We estimate that 954,000 seniors are currently skipping meals as a result of financial abuse. Many suffered depression, anxiety, or loss of independence. Overall, 41.2% reported that financial abuse had non- financial costs as well.

For the caregivers, the costs were also significant. Of all caregivers whose family We estimate that 954,000 member or care recipient experienced seniors are currently loss due to financial abuse, 27.9% skipping meals as a result reported depression, stress, or anxiety of financial abuse. stemming from dealing with the financial loss; 18.2% reported increased conflict

18 with family and friends; and 13.9% reported a sense of hopelessness. Additionally, 7.3% experienced loss of career advancement or decreased hours at work, and 9.1% experienced damage to their marriage or romantic partnership.

Given that 44 million Americans care for older adults,35 these figures imply that 1.4 million marriages were damaged by the effects of dealing with fraud targeting parents or other loved ones over the study period, and 1.1 million caregivers’ careers were set back because of hours away from work.36

Risk factors

Our analysis revealed relationships between vulnerability and certain personal, medical, and socio-economic factors. Cognitive conditions that one would expect increase vulnerability do just that, while other factors that increase vulnerability are quite surprising. Perhaps most surprising are the factors that don’t enhance vulnerability, especially where popular perception has previously suggested that they do.

Unsurprisingly, memory loss is significantly associated with financial loss37— both in likelihood of occurrence and in the amount lost. People with a below-average memory38 are 78% more likely to suffer financial abuse and lost over twice as much.39 Likewise, 5-Year Financial Loss by cognitive conditions Cognitive Conditions such as dementia and $8,000 Alzheimer’s disease increase vulnerability.40 $6,000 People with one

$4,000 cognitive condition experience more $2,000 financial loss from financial abuse than $0 those with two or more No One Two Three conditions condition conditions conditions conditions, presumably due to the fact that

19 those with multiple conditions experience reduced independence. Stroke victims experience the greatest amount of financial loss, perhaps because the change is sudden and so there is less time to prepare for altered cognitive capabilities than in cases of dementia or Alzheimer’s.

More unexpectedly, we found a significant relationship between how friendly a person was over the course of his or her life, and the amount of money lost. We call it “friendly grandma syndrome.” You tell mom to hang up on telemarketers, but she is just too polite to hang up on anyone, and before you know it, she’s ready to bake them cookies. In fact, someone described as “extremely friendly” over the course of his or her life is likely to experience four times the financial losses as someone with a more typical level of friendliness. One explanation for why friendliness leads to this kind of financial loss is that it increases exposure to more actors with abusive intentions. This theory is consistent with research that shows that age-related changes in cognition may increase vulnerability to fraud in a range of ways. Compared with younger adults, older adults don’t perceive cues of untrustworthiness as clearly;41 are more likely to be persuaded by information in advertisements;42 and 5-Year Financial Loss by experience subtle Education Level declines in judgment.43 $12,000 The research suggests that as you grow older $9,000 your natural alarm bells $6,000 aren’t set off as easily, and because friendly $3,000 people are more

$0 outgoing, they may Less than High School Some or all Some or all be exposed to more High School Diploma College Graduate situations where alarm bells are needed.

Our study found education to be positively correlated with incidence of financial abuse. People with more education are more likely to be defrauded and tend to lose more money than others when this occurs. Financial sophistication had a more complex relationship to incidence of

20 financial abuse. People 5-Year Financial Loss by who are very financially Telemarketing Calls Received sophisticated are likely $8,000 to avoid certain types of financial loss, but $6,000 the losses are bigger when they do fall victim, $4,000 perhaps because they are more confident in $2,000 their decision-making or more comfortable $0 moving large amounts No or One or more calls 44 occasional calls per day of money. Ironically, these factors—being financially sophisticated and well educated—might give seniors a sense of complacency that actually increases their vulnerability. Previous research has shown that overconfidence in your own ability to manage money was as dangerous as memory loss in enabling fraud, and that even something as simple as whether or not you believe that seniors are often targeted by con artists is a predictor of whether you yourself will be targeted.45 Additionally, people who live in urban areas experience more fraud and lose more money than people who reported living in rural areas.

People who receive calls from telemarketers are substantially more likely to experience fraud. A person who receives one phone call or more per day from a telemarketer is likely to experience three times as much financial loss as someone who receives no or only occasional telemarketing calls.46

We did not find a relationship between gender and vulnerability. 36% of the A person who receives women in our study and 35% of the one phone call or more a day men in our study lost money to elder from a telemarketer is likely financial abuse, with men losing slightly to experience three times as more in total.47 Likewise, we did not find much financial loss. that people who are widowed are more vulnerable than people who are married

21 or living with a partner. In fact, widowed people experienced about 8% less fraud. We did not find any support for the common stereotype that women are more vulnerable to making bad financial decisions. We also did not find that people who live farther away from their loved ones are exposed to greater risk of elder financial abuse.48

We did not find a relationship between current household income or peak (i.e., pre-retirement) household income and probability of financial loss; however, the lowest-income people lose more on average due to slightly higher losses per incident.49

We found that scam victimization followed a bimodal distribution with respect to age, with incidence peaking first around 60–65 and then again around 85 years old. This result is consistent with other studies, which find that among the types of fraud that affect older adults, the younger people within that category are most vulnerable to some types and the older people are most vulnerable to others.50 For example, people under 70 lose over five times what the rest of the population lose to exploitation that revolves around the “fine print,” such as unexpected recurring billing or unwanted magazine subscriptions. People aged 85–90 lose almost five times as much as the rest of the population to problems stemming from too much generosity, such as unaffordable charitable contributions or gifts to family members or caretakers. We did find a positive but not significant relationship between having no children and experiencing financial abuse, and similarly between watching large amounts of television and experiencing financial abuse.

A history of thrift helps, but only within limits. People who disregarded budgeting—“not thrifty at all”—are more likely to lose money than those who don’t. But in some categories, extremely thrifty people see greater financial losses, perhaps because bargain-hunting is a behavior that scammers prey upon. An ideal disposition seems to be “spend what you can afford”—that is, being neither a shopaholic nor an extreme bargain-hunter.

These factors together tell a complex story about what makes an older adult susceptible. We can start by throwing out the stereotypes. Rich or poor, male or female, widowed or married, we are all vulnerable.51 So

22 what does cause vulnerability? On the one hand, people with memory loss Risk equals vulnerability or other “signs of aging” are more plus exposure. susceptible based on our findings. On the other hand, people who are younger, better educated, and more financially sophisticated are also vulnerable.

We conclude that increased risk arises at the intersection of the two sets of factors: risk equals vulnerability plus exposure. Older adults with independent, active lifestyles have more to be concerned about because they inadvertently provide perpetrators with more ways to target them.

Factors that increase risk

Examples • Cognitive conditions including dementia and Alzheimer’s disease • College or graduate-level education • Financial sophistication • Friendliness • Urban dwelling • Poor memory • Calls from telemarketers

Reporting and underreporting

The 2010 National Public Survey on White Collar Crime found that half of fraud victims reported the fraud, but only one in five reported it to law enforcement. The other four out of five cases were typically reported to banks and credit card companies to try to recoup the loss, or to the Better Business Bureau.52 Likewise, a Financial Fraud Research Center study estimated that only one in thirty incidents of scams end up in a government database.53

Typically, victims do not know to whom they should report the fraud, feel that reporting is likely to be useless, or are ashamed about having been

23 duped.54 Other victims may not report incidents because they hold onto hope that they’ll get their money back (or what they were promised), or they fear retaliation.55 Other research has shown that older adults are less likely both to acknowledge and to report that they’ve been taken advantage of.56 The exceptions are illustrative: card fraud, check fraud, and identity theft are reported 80% of the time, because in such cases it’s clear exactly whom to call, and that if you successfully make your case you’ll get your money back. Other types of abuse are typically reported only 30% of the time.57

Among our respondents, 29% of people who lost money to financial abuse stated that they had reported it to banks, police, or another government authority, while 71% stated that they had not made a report. The likelihood of reporting increased with the amount in question: 33% of people who lost over $1,000 and 58% of people who lost over $10,000 reported the losses.

24 Conclusion

The data about elder financial abuse speaks loudly. Criminal fraud, financial exploitation, and caregiver abuse cost older Americans more than $36 billion a year, and that doesn’t account for the profound emotional and physical costs to seniors and their families that we’re just beginning to quantify.

This once-silent issue is beginning to get the attention it deserves. We hope these findings are a resource for the practitioners, policymakers, and press working to prevent elder financial abuse. We also hope this research can help us all to see the problem more clearly, in all its complexity. This is another step on the path to debunking the notion that the victims or the perpetrators of elder financial abuse fall into neat definitions that allow for simplistic solutions.

Whether by showing that those with more education are more likely to fall victim, or that mainstream corporations are as guilty of exploitation as illegal actors, or that the sheer size of the problem dwarfs previous estimates, what the data proves is that this is an issue we can’t afford to ignore.

25 Appendix A: Common Examples

The Australian Lottery

A senior receives a phone call or email telling him that he’s won the Australian lottery. In order to collect the winnings, he needs to pay import duties to clear customs, pay to insure the envelope containing the winnings, or pay a travel agent to arrange transportation so that he can collect the winnings in person. The senior is instructed to wire money or send Green Dot cards to the scammers.

The Blessing Scam

The Blessing Scam, also called the Ghost Scam or the Jewelry Scam, is a typically perpetrated against elderly women in Chinatowns and overseas Chinese communities. The object of the scam is to persuade the victim to put valuables into a bag so that they can be blessed. Once this is done, the perpetrator secretly swaps the bag for a look-alike, thereby stealing the valuables. This scam takes advantage of Chinese and Chinese-American cultural traditions.

The Buyer’s Club

A senior is offered an extremely low-priced cruise, but told she must enroll in a free trial of a buyer’s club to qualify for the cruise and other offers. She believes that the free trial will end automatically, but in fact, her credit card number has been shared with the buyer’s club, which begins billing her almost immediately. The senior is then charged a monthly membership fee, regardless of whether she uses any of the offers.

The Deathbed Scam

A terminally ill patient with life insurance is persuaded to sell the benefit of his policy for pennies on the dollar. Technically, this “viatical settlement” can be a legitimate transaction, as when a person uses the funds to pay

26 for medical expenses he wouldn’t otherwise be able to afford. However, individuals peddling this type of settlement often take advantage of seniors who may feel like they have no other options or are led to believe they are getting a good deal. The payout amount is often far below the true value of the policy, and once the individual passes away, relatives and loved ones are unable to collect benefits and are left without recourse.

The Cemetery Scam

A senior preemptively pays for a cemetery plot in order to lift this responsibility from her family. When the senior passes away, it turns out that the plot doesn’t actually exist or is worth much less than the senior paid. Alternatively, the family isn’t made aware of the prior arrangement and buys an additional cemetery plot.

Counterfeit Prescription Drugs

Prescription drugs are often expensive. To find a better deal for medications, seniors may shop online, or via phone or mail. In the Counterfeit Prescription Drug Scam, the drugs sold are old or expired, or simply not what they are said to be. Fake botox and sexual aids are especially common, given some seniors’ reluctance to request these items from their doctors.

The Disaster Scam

Immediately after disaster strikes, scammers set up fake websites or send out charity mailings to collect donations. For example, salvationarmyonline.org is not the real site of the Salvation Army, but in the days after Hurricane Katrina, it collected almost $50,000 in donations before it was shut down. In the Disaster Scam, scammers not only take advantage of the generosity of seniors, but they also deprive those who are needy from receiving assistance.

27 The Fake Insurance Policy

An insurance broker collects monthly premiums for a fake policy and provides forged documents to the purchaser. When a problem arises and the insured individual attempts to collect benefits, the policy—and the broker—evaporate, leaving the victim financially unprotected. Insurance policies are complex and difficult to verify, making this scam all the more tricky.

The “Four For the Price of One” Scam

A senior citizen sees a TV commercial for a new kind of vacuum cleaner and calls the 1-800 number provided. The salesperson offers her four for the price of one, and fails to remind her of the fine print—the $30 shipping-and-handling fee per item. The senior ends up being charged $120 in shipping-and-handling alone, which is much more than she expected to pay for the $40 vacuum cleaner. This scam operates under the assumption that the person buying the product will see the “four for the price of one” tagline and miss the fine print, including shipping-and- handling costs that are rarely refundable.

“Skimming” Scams

An employee at a retail store asks a senior for her credit card, and then “skims” the card to receive payment. What the senior doesn’t realize is that the employee has used a device to illegally copy the card’s information. This information can then be used to make unauthorized purchases. Skimming can occur at insecure ATM machines, gas pumps, and cash registers.

The Gift Basket Scam

The doorbell rings and a senior is presented with a lovely gift basket including a bottle of wine. Because the package contains alcohol, the senior needs to show a photo ID and pay $2.50 to confirm receipt of the package. The delivery person then requires payment by credit or debit card, thereby collecting personal account information. Within a few hours, the scammers have racked up thousands of dollars of charges online.

28 Grandparent Scam

A scammer calls pretending to be a grandchild in need of immediate funds. He states that he has “been arrested” while traveling. The caller asks for the money to be sent via wire and begs the grandparent not to tell his parents. The Grandparent Scam often happens late at night when a senior is groggy and easily confused. Increasingly, scammers are following actual grandchildren on social media so that they can provide real names and details to unknowing victims.

Hearing Aid Scam

A hearing aid vendor sets up at a mall or distributes a mailer offering a free hearing evaluation. Because everyone has technically suffered at least some level of hearing loss—nobody’s hearing is perfect—the salesperson, who appears to be a doctor or nurse, can truthfully say that a given senior has limited hearing ability. The vendor then says that a specific type of expensive hearing aid—often costing five to ten thousand dollars—is necessary to improve the condition. If the hearing aid is custom made, a no-returns policy will apply.

Helpful Nephew Scam

A senior’s family member or paid caregiver visits every morning to help with basic needs. Each day, he asks to borrow $100, knowing that by the next morning the senior will have forgotten. A senior with memory loss will trust this individual, given that he is familiar and appears to be acting in good faith.

Home Improvement Scam

A scam home repair or improvement contractor contacts a senior and says he is ready to come and install a new air conditioner. He just needs credit card information to run the payment and then the installation can be scheduled. Not remembering whether she ordered an air conditioner or not, the senior goes ahead and pays for it. In other cases, a senior may have a genuine repair need, and an unscrupulous vendor will either over-

29 charge, charge multiple times for the same work, or charge for work that isn’t actually completed. In other variations of this scam, a person might go door-to-door offering to re-pave driveways for a low price, and then spend a half-hour dumping a bucket of concrete on the driveway or disappear without ever doing the work.

Immigration Scam

An “immigration lawyer” contacts a senior offering to adjust his immigration status and requests a fee that is required by a government agency in order to complete the documentation. The “lawyer” tells the senior that he will be in violation of the new status rules without this payment. While details may vary, all versions of the Immigration Scam involve a short or rushed deadline. Additionally, scammers follow major news stories about changes in immigration rules, in order to add legitimacy to their claims.

The Investment Scam

An ad or a salesman convinces a senior that some unusual asset— commemorative gold coins, a horse rescue farm, penny stocks—are a great investment vehicle, and then transfers substantial savings to the vendor or advisor to complete the purchase. Often, the investments are peddled door-to-door or through seminars in which co-conspirators are planted in the audience to talk about “how amazing” the deal has been for them.

Magazine Subscription Renewal Scam

A company sends three free issues of a magazine to a senior and then calls to say that according to the terms of the offer, today is the final deadline to pay for the subscription. What the caller says is true—it is the final deadline to extend the subscription—but the senior incorrectly believes he is required to pay or that he already owes money.

30 Medicare Card Scam

A caller tells a senior that he needs to renew his Medicare card, and asks the senior to provide the number on the front of his card. The caller then uses this information, which is the senior’s Social Security number, to steal the senior’s identity and open a credit card under his name. Government services—and especially those that primarily serve seniors—often have impostor callers requesting either information or money from unknowing victims.

Medicare Billing Scam

A senior is persuaded to undergo unnecessary medical treatment, and then Medicare is billed for the expense. Inappropriate Medicare billing costs the government billions in tax dollars, but more important, victims of this scam endure unwarranted medical treatments that may have other risks or cause health problems.

Missing Children Scam

A caller tells a senior that if she donates money to an organization supporting families of missing children, every dollar will go directly to the families in need. The scam here is in the word “directly;” if the senior donates over the phone, the funds will go through a paid telemarketing firm that takes as much as a 90% cut.

The Obituary Scam

Scammers troll the obituary sections of small-town newspapers looking for recent deaths that leave behind surviving partners. They will then call a widow and claim that her deceased husband actually owes thousands of dollars in unpaid debt. They will threaten financial ruin, eviction, and public shaming unless the debt is quickly paid. Often, a steeply discounted “settlement offer” is proposed if the debt is paid within a narrow time period.

31 Online Dating Con

Scammers contact a recently widowed senior online and quickly become a new “friend.” The scammer will generally play along for a while before he starts asking for money. Maybe he wants to come visit but cannot afford the flight; maybe he needs to clear a debt; or maybe he wants to help out a dear relative. The money is often requested in un-traceable ways, like a money order or a single-use prepaid card.

Pump and Dump Scams

A scammer buys inexpensive stock in a company (called “penny stocks”) and then artificially “pumps” up the value of the company by distributing false or misleading information—often via online banner ads promising investing tips. An internet campaign spreads false information across multiple sites making it difficult to verify the underlying details. At the peak stock price, the scammer then “dumps” the shares, selling them and leaving everyone else owning now worthless junk shares.

Religious Organization Scams

A suspect religious organization or scammer pretending to be a reputable place of worship will convince a senior to donate money to its cause. Later, the organization will quietly pressure the senior to rewrite his will. The rewritten will is often left undiscovered until after the senior’s death.

Sweepstakes Scam

A senior is told he has won a sweepstakes and needs to pay a small shipping-and-handling fee to collect his winnings. While the prize is visually represented as a new car or a cruise, the fine print indicates that prizes may vary. After paying a hefty fee, it turns out the senior has won a worthless trinket. The scam uses high-pressure language that preys on a senior’s desire to help his family. “How will you feel,” the solicitation asks, “when you have to explain to your family that you could have won $50,000 but you passed up your chance?”

32 Sweetheart Scam

A younger man or woman befriends an older adult and creates a very close relationship with the senior. The goal of this scheme is to be written into the senior’s will, or to be given money directly. This scam targets lonely seniors who have become isolated due to health issues or the loss of their friends and loved ones.

Telemarketing Scams

Predatory telemarketers contact vulnerable seniors to access their personal or financial information. They may use emotional appeals like guilt, friendliness, or scapegoating to encourage the senior to provide information. The scripts used by these telemarketers are data-driven and designed to be extremely persuasive. The companies then sell the information to other telemarketers using the same tactics, leading to an unstoppable onslaught of telemarketing calls.

The Veterans Scam

A senior citizen gets a call asking for money to help families of military veterans. The senior is told that she has supported this cause in the past. While this may be true in a more general sense, the caller leads the senior to believe that she has supported that specific organization. The senior then feels more comfortable donating “again.”

Weight Loss Magnets

It sounds too strange to be true, but magnets that allegedly lead to weight loss is one of the top scams reported by the FTC. All sorts of anti-aging, beauty, or weight-loss treatments are hawked on TV, often as subscriptions or “free” trials. There is no evidence that any of these treatments— including magnets—help with weight loss.

33 Work-From-Home Scams

A senior purchases a kit to start a small business, such as an online store to sell vintage jewelry or health supplements. After an expensive set-up fee, hosting fee, and initial stock of jewelry, few buyers visit the online store. The senior is then told she isn’t promoting the store hard enough and is encouraged to pay money for “business coaching.” Even worse, Work- From-Home Scams are often pyramid schemes, where victims get paid to recruit others into the scheme.

34 Appendix B: Significant Risk Factors

Vulnerability factors and results Factor Value Impact Comparison values Condition that could limit • At least 1 • 59% more likely • Less than 1 decision-making capacity

Education • College study or degree • Lose 3 to 5 times as much • Less than high school • Graduate study or degree • High school

Financial sophistication • Very sophisticated • Lose twice as much • Moderately sophisticated • Extremely sophisticated • Slightly sophisticated • Not sophisticated

Friendliness • Extremely friendly • Lose 4 times as much • Very friendly • Moderately friendly • Slightly friendly • Not friendly at all

Gender • Female • <2% more likely • Male Location type • Urban • 47% more likely • Rural • Lose 4 times as much

Marital status • Widowed • <8% more likely • Divorced • Never married • Married or living with a partner

Memory • Poor or fair • 78% more likely • Good • Lose 2 times as much • Very good • Excellent

Receives calls • One or more telemarketing • Lose 4 times as much • No calls from telemarketers calls per day • Only occasional

Stroke • Had a stroke • Lose 5 times as much • Have not had a stroke

Thrift • Extremely thrifty • Lose 5 times as much • Very thrifty • Moderately thrifty • Slightly thrifty • Not thrifty at all

Thrift • Not thrifty at all • 70% more likely • Extremely thrifty • Slightly thrifty • Very thrifty • Moderately thrifty Endnotes

1. We did not consider inappropriate financial products within the scope of this study, although they pose another increasingly prevalent problem. Commission-based sales reps might recommend, for example, a high-fees investment vehicle or a high-interest personal loan or home equity line of credit. We did not include these products because they were difficult to measure: one would need a detailed picture of an individual’s financial situation in order to determine which financial products are, in fact, appropriate, and even then in many cases this would remain a judgment call.

2. This total includes $60 million of reported financial losses for which we could not determine the appropriate subcategory.

3. This report uses the terms “senior” and “older adult” interchangeably to refer to people over 65 years of age. “Elder financial abuse” and “senior financial abuse” ear also used interchangeably to refer to any time someone took financial advantage of an older adult in a that would not have been possible when the person was younger.

4. See the U.S. Federal Trade Commission report by Deborah Platt Majoras et al., The FTC in 2007: A Champion for Consumers and Competition (Washington, DC: FTC, 2007), http://www.ftc. gov/sites/default/files/documents/reports_annual/annual-report-2007/chairmansreport2007_0. pdf; and Richard M. Titus et al., “Victimization of Persons by Fraud,” Crime & Delinquency 41.1 (1995): 54–72; John Kane et al. The 2005 National Public Survey on White Collar Crime (National White Collar Crime Center 2006), http://fraudresearchcenter.org/wp-content/uploads/2012/02/ NWCCC-2005-national-public-household-survey.pdf, and Rodney Huff et al., The 2010 National Public Survey on White Collar Crime (National White Collar Crime Center 2006), http://www. nw3c.org/docs/publications/2010-national-public-survey-on-white-collar-crime.pdf?sfvrsn=8; Jan van Dijk et al., Criminal Victimisation in International Perspective (The Hague: United Nations International Crime Victims Survey 2007), http://www.unicri.it/services/library_documentation/ publications/icvs/publications/ICVS2004_05report.pdf. For a review of this research, see Martha Deevy, et al., “Scams, Schemes & Swindles: A Review of Consumer Financial Fraud Research” (Financial Fraud Research Center, 2012), http://fraudresearchcenter.org/wp-content/ uploads/2012/11/Scams-Schemes-Swindles-FINAL.pdf, and Kristy Holtfreter, et al., “Financial Exploitation of the Elderly in a Consumer Context” (2014), https://www.ncjrs.gov/pdffiles1/nij/ grants/245388.pdf, a report submitted to the US Department of Justice.

5. Two AARP studies found that adults over 50 accounted for 57% of all fraud victims and that the 50–64-year-old age cohort was the most likely group to report having been victimized

36 by a major fraud. See AARP Telemarketing Fraud Victimization of Older Americans: An AARP Survey (Washington, DC: Princeton Survey Research Associates, 1996) and Consumer Behavior, Experiences and Attitudes: A Comparison by Age Groups (Washington, DC: Princeton Survey Research Associates, 1999). Older adults are less likely to be internet users, and the FTC found that just over half of incidents of fraud occur online. For almost every type of fraud that occurs offline, though, seniors are more likely to be victimized. See Keith B. Anderson,Consumer Fraud in the United States, 2011: The Third FTC Survey (Washington, DC: Federal Trade Commission, 2013).

6. Shelley Taylor et al., “Neural and Behavioral Bases of Age Differences in Perceptions of Trust,” Proceedings of the National Academy of Sciences 109.51 (2012) 20848-20852. See also Larry Jacoby, “Aging, Subjective Experience and Cognitive Control: Dramatic False Remembering by Older Adults,” Journal of Experimental Psychology 134.2 (2005): 131–148, summarized in Beth Azar, “Memory Loss May Be Behind Older People’s Susceptibility to Scams,” Monitor on Psychology 32.11 (2001): 30. See also, Zachary Urbina, “Neuroscience Team Explains Why Old People Get Scammed,” United Academics (December 4, 2012), http://www. united-academics.org/magazine/mind-brain/neuroscience-team-explains-why-old-people- get-scammed/, and Richard C. Lewis, “Why Are Elderly Duped? Area in Brain Where Doubt Arises Changes With Age,” ScienceDaily (August 16, 2012), http://www.sciencedaily.com/ releases/2012/08/120816121836.htm.

7. See especially The MetLife Study of Elder Financial Abuse: Crimes of Occasion, Desperation, and Predation Against America’s Elders (New York: Mature MetLife Market Institute, 2011), https://www.metlife.com/assets/cao/mmi/publications/studies/2011/mmi-elder-financial-abuse. pdf, but also Broken Trust: Elders, Family, and Finances (New York: MetLife Market Institute, 2009), https://www.metlife.com/assets/cao/mmi/publications/studies/mmi-study-broken-trust- elders-family-finances.pdf.

8. According to Lifespan of Greater Rochester, Inc. et al., Under the Radar: New York State Elder Abuse Prevalence Study (2011), http://www.ocfs.state.ny.us/main/reports/Under%20the%20 Radar%2005%2012%2011%20final%20report.pdf, elder financial abuse in New York State occurs at a rate nearly 44 times greater than is reported.

9. Please see note 4 above for the relevant research.

10. House Committee on Government Operations, The Nature and Extent of Telemarketing Fraud and Federal and State Law Enforcement Efforts to Combat It: Hearings Before the Commerce, Consumer and Monetary Affairs Subcommittee of the House Committee on Government Operations, 101st Cong., 2d sess. July 11 and 12, 1990. See also the testimony of Charles L. Owens, then Chief of the FBI’s Financial Crimes Section, and others in the Senate Special

37 Committee on Aging, Telescams Exposed: How Telemarketers Target the Elderly: Hearing Before the Special Committee on Aging, 104th Cong., 2d sess., March 6, 1996. In the hearing, the consensus was that telemarketing fraud was a $40-billion problem. See Ultrascan’s finding (2008) that $4.3 billion were lost to advance fee fraud in 2006, reported in Stuart Ross and Russell G. Smith, “Risk Factors for Advance Fee Fraud Victimisation,” Trends & Issues in Crime and Criminal Justice 420 (2011), http://www.aic.gov.au/media_library/publications/tandi_pdf/ tandi420.pdf.

11. Also, according to the 2010 Investor Protection Trust (IPT) Elder Fraud Survey, “more than seven million older Americans—one out of every five citizens over the age of 65—already have been victimized by a financial swindle.” See http://www.investorprotection.org/protect- yourself/?fa=protect-seniors.

12. Rebecca Fetters, The Financial Exploitation Data Book: A Retrospective Look At Community Based Financial Exploitation in Oregon in 2013 (OOAPI and Oregon Department of Human Services, 2014), http://www.oregon.gov/dhs/spwpd/adult-abuse/Documents/Financial- Exploitation-Oregon.pdf, 27, estimates that financial exploitation could cost older Oregonians $439,257,487 per year.

13. Richard J. Bonnie and Robert B. Wallace, Elder Mistreatment: Abuse, Neglect, and Exploitation in an Aging America (Washington, DC: National Academies Press, 2003). The relevant appendix (“Analysis of Elder Abuse and Neglect Definitions Under State Law”) is available at the NIH website at http://www.ncbi.nlm.nih.gov/books/NBK98799/.

14. This is an increasingly common description of elder financial abuse. One notable source of this characterization is the testimony of Sandra Timmermann, then Executive Director of the MetLife Mature Market Institute, before the Senate Special Committee on Aging, Protecting Our Seniors: Supporting Efforts to End Elder Abuse: Field Hearing Before the Special Committee on Aging, 112th Cong., 1st sess., August 23, 2011, http://www.gpo.gov/fdsys/pkg/CHRG-112shrg70551/ html/CHRG-112shrg70551.htm.

15. Applied Research & Consulting LLC for FINRA, Financial Fraud and Fraud Susceptibility in the United States: Research Report from a 2012 National Survey (New York: FINRA Investor Education Foundation, 2013), http://www.finrafoundation.org/web/groups/sai/@sai/ documents/sai_original_content/p337731.pdf?utm_source=MM&utm_medium=email&utm_ campaign=Foundation_News_091213_FINAL. See also Michaela Beals, “The Impact of Survey Context on Self-Reported Rates of Fraud Victimization” (Fraud Research Center, 2014), http:// fraudresearchcenter.org/wp-content/uploads/2014/10/Fraud-Issue-Brief-FINAL-10.14.14.pdf, for a discussion of how study context (e.g., “crime” or “fraud”) impacts self-reporting of fraud victimization.

38 16. See Peter A. Lichtenberg et al., “Is Psychological Vulnerability Related to the Experience of Fraud in Older Adults?” Clinical Gerontologist 36.2 (2013): 132–146, for a helpful counterexample.

17. See Michael Ross et al., “Contrary to Psychological and Popular Opinion, There Is No Compelling Evidence That Older Adults Are Disproportionately Victimized by Consumer Fraud,” Perspectives on Psychological Science 9.4 (2014): 427–442.

18. See “Off the Hook: Reducing Participation in Telemarketing Fraud (Washington, DC: 2003), http://assets.aarp.org/rgcenter/consume/d17812_fraud.pdf. Research that focuses on overwhelmingly finds that younger people are more vulnerable than elderly people, while research that focuses on abuse by family members and caregivers—unsurprisingly—finds that vulnerability increases steadily with age.

19. The respondents were 44% male and 56% female. Of the seniors whose finances they described, 31% had peak household income under $50,000; 46% had peak household income between $50,000 and $100,000; and 23% had peak household income over $100,000. 91% were high school graduates, and 30% had completed college.

20. See Martha Deevy and Michaela Beals, “The Scope of the Problem: An Overview of Fraud Prevalence Measurement” (2013), http://fraudresearchcenter.org/wp-content/uploads/2013/11/ Scope-of-the-Problem-FINAL_corrected2.pdf and “The True Impact of Fraud: A Roundtable of Experts” (2014), http://fraudresearchcenter.org/wp-content/uploads/2014/06/The-True-Impact- of-Fraud-Proceedings-Final.pdf.

21. We did not regard these transactions as representative of the general public, and so did not include this data in our statistical analysis. Likewise, we did not extrapolate from the experiences of the customers we interviewed to draw conclusions about the general public.

22. We used 44,574,166 as the number of people over 65 in the United States based on the Census QuickFacts July 1 2013 estimated total population and percent over 65. The American FactFinder estimate is 44,704,074, with the QuickFacts percentage likely calculated from this estimate and then rounded.

A more detailed discussion is beyond the scope of this study, but it would be natural to assume that fraud—like the costs of natural disasters—follows a Pareto or truncated Pareto distribution. This means that estimates of the size of the problem drawn from samples—even with samples of tens of thousands of individuals—will typically underestimate the population statistic. Within our data, exploration of “peaks over threshold” analysis and bootstrapped subsamples provided initial confirmation of this hypothesis.

39 For a more thorough treatment of this topic, see David Giles et al., “Bias-Corrected Maximum Likelihood Estimation of the Parameters of the Generalized Pareto Distribution,” (University of Victoria Department of Economics, Econometrics Working Paper EWP0902), http://web.uvic. ca/~dgiles/downloads/working_papers/ewp0902_revised.pdf. A fitting of our data put the alpha shape parameter less than one. In other words, the population total fraud loss is bounded in practice by the finite wealth of Americans (a finite sample of an unbounded-mean distribution), rather than by a property of the shape distribution. Our data are not extensive enough to justify exploration of the domain of support for fitting a Pareto distribution. Such data would be nearly impossible to gather.

23. Under the leadership of Senators Bill Nelson and Susan M. Collins, the United State’s Senate Special Committee on Aging has focused on addressing what they refer to as an “epidemic of fraud perpetrated against seniors.” In particular, in November 2013 they launched a fraud hotline that collected 1,900 complaints in its first year. See Fighting Fraud: Lessons Learned from the Senate Aging Committee’s Consumer Hotline (2014), http://www.aging.senate.gov/ imo/media/doc/Fraud%20Hotline%20Report%20Final%20Version.pdf, for information about the most common kinds of fraud, including computer repair scams, the grandparent scam, health scams, lottery scams, social security fraud, timeshare scams, and guardianship abuse.

24. We asked each respondent to provide data about five years of financial impact. Please see the methodology section for further details.

25. There is some room for interpretation here. A gift to a friend or family member could be labeled as predatory exploitation or it might be labeled as caregiver abuse depending on the circumstance.

26. Shelly L. Jackson and Thomas L. Hafemesiter, Financial Abuse of Elderly People vs. Other Forms of Elder Abuse: Assessing Their Dynamics, Risk Factors, and Society’s Response, (2010), https://www.ncjrs.gov/pdffiles1/nij/grants/233613.pdf, a report to the National Institute of Justice, summarized in “Financial Exploitation of the Elderly,” on the National Institute of Justice website, http://www.nij.gov/topics/crime/elder-abuse/pages/financial-exploitation.aspx.

27. The most recent study is “New Allianz Life Study Confirms Elder Financial Abuse Under-reported and Misunderstood Problem Likely to Grow” (October 15, 2014), https://www.allianzlife.com/ about/news-and-events/news-releases/Press-Release-October-15-2014. We were unable to find a copy of the 2014 Safeguarding Our Seniors Study that the Allianz Life Study’s authors reference. The finding that most fraud is perpetrated by family and paid caregivers is typical of many other studies.

40 28. I.e., fraud resulting in a loss of $25,000 or more. We looked only at major fraud here because caregivers who reported having never reviewed their parent’s financial statements typically also did not report having noticed small unwanted charges, for obvious reasons.

29. In the survey data, there were some cases where the inappropriate spending was in the form of gifts. It was often difficult to classify whether this constituted caregiver abuse or exploitative sales. We distinguished between a voluntary action driven by confusion or vulnerability—a poor decision to make the gift—on the one hand, versus a power relationship, coercion, or deception used to extract the gift, on the other.

30. The New York Times has provided seminal coverage of the way mainstream financial institutions and publicly traded companies enable financial exploitation of the elderly. See Charles Duhigg, “Bilking the Elderly, with a Corporate Assist,” The New York Times (May 20, 2007), http://www. nytimes.com/2007/05/20/business/20tele.html, and Jessica Silver-Greenberg, “Banks Seen as Aid in Fraud Against Older Consumers,” The New York Times (June 10, 2013), http://www. nytimes.com/2013/06/11/business/fraud-against-seniors-often-is-routed-through-banks.html.

31. See Ron Shevlin, “The Economic Impact of Grey Charges on Debit and Credit Cardholders and Issuers: 2013 Industry Report on Grey Charges” (New York: BillGuard, 2013), https:// s3.amazonaws.com/static.billguard.com/report/BillGuard_-_2013_Grey_Charge_Report.pdf, for an estimate of $14.3 billion in grey charges. The sample population comprises users of the BillGuard mobile app, which may overestimate the extent of grey charges in that the audience has self-selected for concern about grey charges. On the other hand, this population may underestimate grey charges in that selecting for users of a mobile app may eliminate parts of the population with the highest levels of vulnerability.

32. See Duhigg, “Bilking the Elderly,” for description of “sucker lists”: “InfoUSA advertised lists of ‘Elderly Opportunity Seekers,’ 3.3 million older people ‘looking for ways to make money,’ and ‘Suffering Seniors,’ 4.7 million people with cancer or Alzheimer’s disease. ‘Oldies but Goodies’ contained 500,000 gamblers over 55 years old, for 8.5 cents apiece. One list said: ‘These people are gullible. They want to believe that their luck can change.’” As one of the nation’s leading experts on fraud, Doug Shadel of the AARP put it on Dan Rather Reports, “Never get started with it. When you get a piece of mail, for example, that says you might have won something, it isn’t a benign act to respond to that. Because what you’re doing when you respond to it, even if it’s sending $5 in, is you’re telling the bad guy, I’m someone who does this. And you’re separating yourself out from someone who does this, from someone who doesn’t do this. That gets a big, red X on your back. And now, you’re being targeted by the really bad guys.” “Just Hang Up the Phone,” Dan Rather Reports, Season 8 Episode 9, (March 12, 2013). In Marguerite DeLiema et al., “Tricks of the Trade: Motivating Sales Agents to Con Older Adults,”

41 The Gerontologist (2014,): 1–11, researchers show how common mass market sales tactics were tweaked and amplified to target and deceive vulnerable older adults via door-to-door sales by the Alliance for Mature Americans, which sold $200 million in living trusts and annuities to Californians in the 1990s before being shut down for deceptive sales practices.

33. Keith Jacks Gamble et al. in “The Causes and Consequences of Financial Fraud Among Older Americans,” Center for Retirement Research at Boston College Working Papers (November 2014), http://crr.bc.edu/working-papers/the-causes-and-consequences-of-financial-fraud-among- older-americans/, infer a causal relationship here using propensity-matched multi-year panel data. In particular, people who experience fraud become more risk-accepting than they were previously. This is an effect commonly seen in gambling or investing where after taking losses the decision maker shows increased willingness to take on risk in an effort to break even.

34. We are especially grateful to Martha Deevy and her coauthors for urging further study of this topic.

35. National Alliance for Caregiving and AARP, Caregiving in the U.S. (New York: MetLife Foundation, 2009), http://www.caregiving.org/data/Caregiving_in_the_US_2009_full_report.pdf. See also the summaries on the Family Caregiver Alliance homepage, e.g. https://www.caregiver. org/selected-caregiver-statistics.

36. Also notable, though outside the scope of the research covered in this report, are the financial and non-financial costs to society. When older adults lose their nest eggs or all their assets, they rely more heavily on public services. As Shawna Reeves, Director of Elder Abuse Prevention at the Institute on Aging, puts it, “taxpayers often have to foot the bill when a senior’s life falls apart due to elder financial abuse.” See Norma Paz García et al., Examining Faulty Foundations in Today’s Reverse Mortgages (Consumers Union, CANHR, and Council on Aging Silicon Valley, 2010), http://consumersunion.org/wp-content/uploads/2013/02/reverse-mortgage- report-2010.pdf, for an example of this collateral cost to taxpayers resulting from the Reverse Mortgage industry.

37. We use “significant” in this section to indicate 95% confidence. Most of the data here was categorical rather than numeric. We used three statistical measures where appropriate: linear regression for ordinal variables, regression with indicator variables for categorical variables lacking an ordinal interpretation, and difference-of-means t tests where the category values could logically be grouped. In drawing a conclusion, we generally looked both at the magnitude of losses and the probability of losses, and looked for monotonic effects, robustness across multiple formulations of the model, similar effects on variables that were substantively related, and extra sources of inference based on the types of fraud that occurred.

42 38. More precisely the 43% of the sample whose memory was rated “Fair” or “Poor” rather than “Good,” “Very Good,” or “Excellent”

39. We looked at change in memory function, but did not find that this had a stronger predictive relationship than the state of memory function. One might guess that the most vulnerability occurs when memory issues are creeping up on an older adult, but we did not find evidence that this was the case. A declining memory was significantly related to incidence of fraud, but this washed out when current memory was included in the regression

40. Kristen Triebel and Daniel Marson have also shown that declines in financial decision-making are an early sign of cognitive impairment. K. L. Triebel and D. C. Marson, “The Warning Signs of Diminished Financial Capacity in Older Adults,” Generations 36.2 (2012): 39–45, http:// generations.metapress.com/content/4174t21up3804772.

41. Shelley Taylor, “Neural and Behavioral Bases of Age Differences in Perceptions of Trust.”

42. Diane M. Phillips, and John L. Stanton, “Age-Related Differences in Advertising: Recall and persuasion,” Journal of Targeting, Measurement and Analysis for Marketing 13 (2004): 7–20, http://www.palgrave-journals.com/jt/journal/v13/n1/abs/5740128a.html.

43. P.A. Boyle, et al., “Poor Decision-Making Is a Consequence of Cognitive Decline Among Older Persons without Alzheimer’s Disease or Mild Cognitive Impairment,” PLoS ONE 7.8 (2012): e43647, http://www.ncbi.nlm.nih.gov/pubmed/22916287; Natalie L. Denburg et al., “The Orbitofrontal Cortex, Real-World Decision Making, and Normal Aging“, Annals of the New York Academy of Sciences 1121 (2007): 480–498, http://www.ncbi.nlm.nih.gov/pmc/articles/ PMC2246008/

44. This finding is consistent with the FINRA Investor Education Foundation’s finding that willingness to take risk with investments is positively correlated with education, household income and susceptibility to fraud, See FINRA, Financial Fraud and Fraud Susceptibility in the United States, and with Gamble et al., “The Causes and Consequences of Financial Fraud Among Older Americans,” which we believe has not yet gotten the attention it deserves. The latter study looks carefully at these questions and concludes: “We find that overconfidence is a significant risk factor for becoming a victim of financial fraud. A one standard deviation increase in overconfidence increases the odds of falling victim to fraud by 26 percent. Financial knowledge, not just general knowledge, protects against fraud: years of education is not a significant predictor of the likelihood of being victimized by fraud.”

45. Keith Jacks Gamble et al., “The Causes and Consequences of Financial Fraud Among Older Americans.”

43 46. Holtfreter, Reisig, and Pratt have shown that “remote-purchasing activities” (making a purchase from a telemarketer, tv infomercial, mailing or from someone with whom they have not previously done business) increase the likelihood of fraud victimization, given that these activities indicate greater “exposure to potential motivated offenders.” See Kristy Holtfreter et al., “Low Self-Control, Routine Activities, and Fraud Victimization,” Criminology 46.1 (2008): 189–220, . http://www.academia.edu/738038/Low_self-control_routine_activities_and_fraud_victimization. Likewise, according to Holtfreter, Reisig, Mears and Wolfe, on self-report survey data, “Making a telemarketing purchase substantially increased targeting. Respondents who purchased something in response to a telemarketing call from a company with whom they had not previously done business during the previous year increased their risk of becoming a fraud target by over 200% compared to those who had not made such purchases.” See Kristy Holtfreter et al., “Financial Exploitation of the Elderly in a Consumer Context” (2014), 12, https://www.ncjrs. gov/pdffiles1/nij/grants/245388.pdf..

47. This is not to ignore the gender dimension. Any issue relating to aging is a gender equality issue because of the predominance of women among the older population—and this population’s caregivers.

48. In fact, seniors who lived more than an hour away from their caregivers experienced significantly less fraud than those who lived close by. It’s unclear how to draw a cause and effect relationship here. It may be that when parents start to falter they move closer to their children, or their children move closer to them.

49. The FTC’s Consumer Fraud in the United States reports similar findings about income, gender, and marital status.

50. Keith B. Anderson, Consumer Fraud in the United States, 2011: The Third FTC Survey.

51. AARP Foundation’s Off the Hook: Reducing Participation in Telemarketing Fraud, and Karla Pak and Doug Shadel, National Fraud Victim Study (Washington, DC: AARP, 2011), http://assets. aarp.org/rgcenter/general/fraud-victims-11.pdf, showed that the victims of different kinds of scams had dramatically different profiles. For example, investment fraud victims were more likely to be male, younger, and with relatively higher income, while victims were more likely to be female (in 2003 study, not 2011), older, and relatively lower income

52. Rodney Huff et al., The 2010 National Public Survey On White Collar Crime.

53. They note that fraud is under-reported to authorities by a factor of thirty. This means there are one million complaints for almost forty million incidents. See Deevy et al., “Scams, Schemes, & Swindles,” comparing two FTC studies. The article offers a number of useful ways to respond to underreporting.

44 54. FINRA, Financial Fraud and Fraud Susceptibility in the United States.

55. Debbie L. Deem, “Notes from the Field: Observations in Working with the Forgotten Victims of Personal Financial Crimes,” Journal of Elder Abuse & Neglect,12.2 (2000). Experts often encourage an altruistic appeal when trying to encourage a senior to report fraud. See Sid Kirchheimer, “Protect Your Parents From Scams: Here’s How to Talk to Mom and Dad About Steering Clear of Fraudsters,” AARP (August 20, 2013), http://www.aarp.org/money/scams- fraud/info-08-2013/protect-your-parents-from-scams.html.

56. Karla Pak and Doug Shadel, National Fraud Victim Study.

57. Rodney Huff et al., The 2010 National Public Survey On White Collar Crime.

45 True Link Financial www.truelinkfinancial.com

© 2015 True Link Financial September/October 2015- Print Pages Page 1 of 2

http://magazines.aba.com/bcmag/september_october_2015/Print_submit.action?articleTitle=&articlePrintMode... 9/21/2015 September/October 2015- Print Pages Page 2 of 2

http://magazines.aba.com/bcmag/september_october_2015/Print_submit.action?articleTitle=&articlePrintMode... 9/21/2015 FINANCIAL EXPLOITATION OF AT-RISK ADULTS RED FLAGS

• Frequent large withdrawals, including daily maximum currency ATM withdrawals. • Sudden non-sufficient funds activity. • Sudden uncharacteristic changes in banking practices (Ex. Large Wire Request). • Large credit card/check withdrawals. • Checks made out to “cash” or “gift.” • Checks and withdrawals that cannot be explained. • Abrupt changes in will and other legal documents • Elder is always being escorted to the bank by a second party. • Unauthorized withdrawals especially with large penalties. • New name(s) on signature card(s). • Suspicious/Forged signatures. • Client is unaware/does not understand financial arrangements. • A recent acquaintance interested in the victim’s finances/ingratiating themselves to the victim. • Redirected Social Security benefit payments. • Frequent unsolicited phone calls. • Difficulty covering basic expenses such as food, utilities, etc. • A relative or caregiver with no mean of supports takes an interest. • Isolation. • Mail directed to a different address. • Stacks of unsolicited mail. • Older or disabled adult no longer receives checking account and credit card statements. • Escalated customer calls on account requesting balances, information, online account access, or requesting to change account information, etc. Financial Exploitation of At-Risk Adults Questions to Consider

• Is the elder conducting a transaction that is unusual for the account? • What factors influenced the elder’s decision to make this unusual transaction? • Is the elder making more frequent withdrawals than previously? • Is the elder beginning to use alternative forms of transactions? • Does the elder live alone? • Are there any concerns that the elder is of diminished mental and physical capacity? • Does the elder appear nervous, afraid, or confused? • Did the elder recently meet a stranger who is requesting a favor from him/her for which he/she will be paid a fee? (Ex. Cashing or depositing a check for a stranger) • Did the elder just meet a stranger who claims to have found some money that he or she is willing to share, but first the elder must put up some “good faith” money? • Is there a second person claiming to be a relative or close friend of the elder who appears to have more than a casual interest in the transaction? • Is there a stranger lingering in the lobby that leaves when the elderly client leaves the financial institution?

Elder Abuse Reporting Procedures

• When an elder abuse referral is made by a Bank employee, Compliance researches the customer’s account and if warranted, completes an elder abuse report • After completion of the elder abuse report, Compliance transmits the elder abuse report to DHS in the county in which the customer lives and sends a copy to Legal • Legal reviews the report and transmits a copy to the District Attorney in the county in which the customer lives • Legal maintains an internal bank file on all elder abuse reports which contains the initial report, a copy of the transmittal to the District Attorney, and any subsequent communications, including but not limited to a request for production of documents • Legal responds to the request for production of documents and may seek assistance from Compliance if needed

October 2013