Responsibilities and solutions for integrity and security (2024)

#c4541c

1

AML/CFT Requirements

In principle, provision of same services should be subject to same know-your-customer and other AML/CFT requirements to ensure a level playing field. Policymakers, regulators and the private sector should take collective responsibility for the interpretation of low and high risks.

Overview

Risk

Compared to cash, use of e-money increases certain money laundering (ML) and terrorist financing (TF) risks while reducing others.

Four key money laundering risks

  • Anonymity: Customer’s identity is unknown.
  • Elusiveness: Ability to disguise amount, origin, and destination.
  • Rapidity: Speed at which funds are transferred.
  • Oversight: Extent and quality of oversight.

Compared to cash, e-money poses greater risks with respect to rapidity but lower risks with respect to anonymity, elusiveness, and oversight.

Source:

World Bank (2008)

E-MONEY VS. CASH

Anonymity: Customer's identity is unknown

Mobile Money

Medium

Vulnerabilities

  • If identification processes are weak or absent, criminals may operate with a degree of anonymity and open/ operate multiple accounts.
  • If identification processes exist but verification processes are weak (e.g. lack of reliable national identification), criminals may commit identity fraud.

Compensating factors

  • Transactions are linked to a unique mobile number.
  • The SIM card and customer are identified and located through the MSISDN and IMSI.
  • Transactions recorded (sender’s mobile number, amount, receiver’s mobile number, date).
  • Transactions traced.
  • SIM card registration records make critical information available to identify the customer.
  • If law enforcement officials wish to identify a particular unidentified client, the provider can supply a rich source of identifying details, like voice recordings and communication and transaction patterns.

Cash

Higher

Vulnerabilities

  • Transactions are largely anonymous.
  • There is neither a unique identifier for the user nor a way to trace the payment.

Compensating factors

  • None.

Elusiveness: Ability to disguise amount, origin, and destination

Mobile Money

Medium

Vulnerabilities

  • Sharing a single handset, SIM, and/or mobile money account makes it harder to ensure the person conducting a transaction is the registered user.
  • Smurfing allows criminals to use a number of small transactions to hide larger sums being transferred.
  • Ubiquity of mobile phones eliminates requirement for sender and recipient to be in the same place at the same time.

Compensating factors

  • Mobile money transactions are clearly traceable in a mobile operator’s system as part of standard business practice.
  • Telephone number (sending and receiving), time, and the amount of the transaction are known to the mobile operator.

Cash

Higher

Vulnerabilities

  • Amount, origin, and destination can all be disguised.

Compensating factors

  • Sender and recipient (or an intermediary) must at some point be in the same place at the same time.

Rapidity

Mobile Money

Higher

Vulnerabilities

  • Mobile money transactions typically occur in real time,allowing for rapid transaction layering (transferring fundsamong multiple accounts to obscure their origin).

Compensating factors

  • Mobile money transactions are clearly traceable in amobile operator’s system as part of standard businesspractice.
  • Telephone number (sending and receiving), time, and the amount of the transaction are known to the mobile operator.

Cash

Lower

Vulnerabilities

  • Limited, since cash moves relatively slowly.

Compensating factors

  • Transaction layering is more difficult and may require regular face-to-face interaction with bank personnel.

Lack of oversight or poor oversight

Mobile Money

Medium

Vulnerabilities

  • In some countries, mobile money service providers (and/or their agents) may not be unambiguously includeas “covered institutions” under the AML/CFT law and regulations.
  • In some countries, financial regulators directly regulate and supervise a banking partner rather than the entity providing services on the ground, and may have the best understanding of the ML and TF risks.
  • The quality of oversight can vary between jurisdictions.

Compensating factors

  • Mobile money providers are regulated and supervised, but the extent and quality of supervision may vary between jurisdictions.

Cash

Higher

Vulnerabilities

  • Pure cash transactions are not subject to oversight.

Compensating factors

  • None.

MONEY LAUNDERING / TERRORIST FINANCING RISK

Risk

E-money raises specific ML/TF typologies that need to be properly mitigated.

Key e-money actors that may be involved in ML/TF

  • Customers.
  • Agents & Merchants.
  • Employees.

KEY E-MONEY ML/TF TYPOLOGIES AND MITIGANTS

Customers

TypologyMitigation Measures
Fraudulent registrationSystem controls, development of national ID
Multiple registrationsCentral ID verification database, development of national ID, limit of number of accounts per person, SIM registration
Transfer of service after registrationID requirement for certain transactions, geographic monitoring, PIN authentication.
Loading with PoCRisk-based transaction and balance limits, transaction monitoring systems, PIN authentication, ability to locate mobile device via MSISDN and IMSI.
Transfer of PoC to co-conspiratorsRisk-based transaction and balance limits, transaction monitoring systems to detect anomalous activity.
Use of PoC to purchase from sellers
Pooling PoC in single account
Withdrawal of PoC
Transfer to/from terroristsUse of international and domestic watchlists.

Agents & Merchants

TypologyMitigation Measures
Agent allows PoC to be cashed in or out from accountProper criteria for agent selection, ongoing agent due diligence (automated transaction monitoring, in-person mystery shopping), sharing of agent blacklists.
Agent fails to fulfill due diligence obligations
Agent allows customers to exceed cash-in or cash-out limitsProper automated system controls that may not be overridden by agents.
Complicit merchant received PoCSound criteria for merchant onboarding, proper ongoing due diligence (automated transaction monitoring, in-person mystery shopping).
Fraudulent merchant misappropriates funds

Employees

TypologyMitigation Measures
Fraudulent registration of false accounts to facilitate ML/TF
  • Proper initial and ongoing staff due diligence.
  • Cross-referencing staff / customer / agent / merchant account details to ID possible.
  • Segregation of duties.
  • Access controls.
  • Audit trails.
  • Transaction monitoring.
  • Effective staff discipline policy.
  • Verification of customer account information.
  • Regular reconciliation of outstanding e-money liabilities and funds kept for repayment.
Theft of funds using internal access through, e.g., false transactions, creation of unbacked e-money, theft from dormant accounts
Allowing PoC to be cashed in or out from account
  • Proper initial and ongoing staff due diligence.
  • Effective transaction monitoring systems that can ID suspicious activity (e.g., smurfing, inconsistent behavior, transfer to/from high-risk areas, transfer to/from previously dormant accounts, staff activity on customer/merchant/agent accounts).
Allowing customers to exceed cash-in/out limits
  • Proper initial and ongoing staff due diligence.
  • Audit trails that record all internal approvals to override limits or assign customers to higher-tier account.

Source:

GSMA (2015).PoC = Proceeds of Crime.

ACCOUNT TIERS AND MONETARY LIMITS FOR ELECTRONIC MONEY & SIMILAR DFS IN SELECT COUNTRIES

Tiered KYC

Introducing monetary amount-based risk tiers and simplifying the KYC requirements for lower- risk tiers is a practical and widely used way of risk-based KYC.

Responsibilities and solutions for integrity and security (1)

Ghana

Read More

Responsibilities and solutions for integrity and security (2)

Ghana

Account TypeSingle Transaction LimitCumulative Daily Transaction LimitCumulative Monthly Transaction LimitMaximum Account Balance
All accounts

GH¢S500
(US$102)

(OTC only, with
acceptable ID)

Level 1: Minimum KYC accountGH¢300
(US$61)
GHS¢3,000
(US$612)
GH¢1,000
(US$204)
Level 2: MediumKYC accountGH¢ 2,000
(US$408)
GH¢20,000
(US$4,077)
GH¢ 10,000
(US$2,039)
Level 3: Enhanced KYC accountGH¢5,000
(US$1,019)
GH¢ 50,000
(US$10,193)
GH¢ 20,000
(US$4,077)

Source:

Close

Responsibilities and solutions for integrity and security (3)

Liberia

Read More

Responsibilities and solutions for integrity and security (4)

Liberia

Account TypeSingle Transaction LimitCumulative Daily Transaction LimitCumulative Monthly Transaction LimitMaximum Account Balance
All accountsUS$100 (OTC only)
Level 1: Entry level accountsUS$250US$2,000US$1,000
Level 2: Accounts with full KYCUS$1,000US$8,000US$4,000
Level 3: Accounts with enhanced KYCUS$2,000US$20,000US$10,000

Source:

Close

Responsibilities and solutions for integrity and security (5)

Nigeria

Read More

Responsibilities and solutions for integrity and security (6)

Nigeria

Account TypeCumulative Daily Transaction LimitMaximum Account BalanceOther Restrictions
Level 1: Low-value accounts

N50,000

(US$137)

N300,000

(US$822)

International funds transfer prohibited
Level 2: Medium-value accounts

N200,000

(US$548)

N500,000

(US$1370)

International funds transfer prohibited
Level 3: High-value accounts

N5,000,000

(US$13700)

Unlimited

Source:

Close

SIMPLIFIED DUE DILIGENCE REQUIREMENTS FOR LOW-VALUE DFS ACCOUNTS

Country and accountSimplified due diligence requirements for low-value DFS accountsFull customer due diligence requirements for regular accounts
Colombia (e-deposits)Full name, national ID number and issuance date (verified through access to biometric ID database).Full name, ID number, address, telephone, occupation, employer information.
Honduras (e-wallets)Full name (as shown on ID card), address, phone number(s) (verified within 30 days through National Register of Persons).21 requirements, including full name, place/date of birth, type of ID, nationality, sex, address, phone number, occupation, income, assets, marital statusand more.

Tools

Designing appropriate SDD measures (PDF167.75 KB)

Determining value limits for DFS subject to SDD (PDF70.45 KB)

ELECTRONIC KYC (E-KYC) & SIM KYC FOR DFS ACCOUNTS

CountryHow e-KYC works
IndiaCustomer provides fingerprint and Aadhaar (unique ID) number and authorization to conduct e-KYC. Provider sends information to Unique Identification Authority of India’s server; if it matches, account can be opened instantly.
ColombiaBanks have access to Registrar of Banks’ biometric ID database and can use this database to conduct e-KYC.
PakistanAll SIMs are biometrically verified and linked to customer identity in National Database and Registration Authority (NADRA). Biometrically verified SIMs can then be used to remotely open entry-level branchless banking accounts in a few seconds.
KenyaBanks are able to leverage KYC details obtained during SIM and e-money account registration to open entry-level mobile banking accounts remotely. Information obtained from the MNO/EMI is verified against information in the national ID database.
GhanaE-money issuers that have collected and retained customer ID information previously, e.g., during registration of SIM cards or bank accounts, are allowed to use this information for CDD. The data needs to be validated against the database of the National Communications Authority within 2 days.

Main AML/CFT Obligations of E-money institutions

  • Assessing the institutional ML/TF risks and applying a risk-based approach,
  • Customer Due Diligence (simplified, standard, or enhanced, based on risk),
  • Internal controls, compliance officer and organization,
  • Screening for Politically Exposed Persons and terrorist entities (as-per UN TF Resolutions),
  • Monitoring of unusual transactions,
  • Suspicious transaction reporting,
  • Due diligence and training of staff and agents,
  • Record keeping.
  • AML/CFT obligations and regulatory expectations should also be risk based. Especially in the low-risk tiers, the AML/CFT controls can be simplified. In proven low-risk situations exemptions from some AML/CFT obligations can be considered (by the regulators).

  • Two AML/CFT obligations are particularly important in e-money context:

    • IT capacity to monitor, detect, and analyze unusual transactions,

    • Due diligence and training of the agents.

Proliferation Financing (PF) Risks

  • In October 2020, the FATF revised its Standards to require countries and financial institutions (including e-money service providers) to identify, assess, understand and mitigate their proliferation financing risks. FATF has also issued a guidance on PF risk assessment and mitigation (FATF 2021). This guidance states that:
    • There is no one-size-fits-all approach when assessing or mitigating proliferation financing risks. Countries and private sector entities should implement measures …. in a manner that is proportionate to the risks faced by relevant entities, and be consistent with other complementary objectives such as financial inclusion.
    • The FATF Standards provide flexibility to countries to exempt a particular type of financial institution, DNFBP or VASP from the requirements to identify, assess, monitor, manage and mitigate proliferation financing risks, provided there is a proven low risk of proliferation financing relating to such private sector entities.
  • With this revision, financial institutions have become directly subject to PF related obligations. However, the scope of this obligation is more focused than ML and TF and do not have cascading impact on broader set of AML/CFT obligations (such as STRs).
  • Country’s PF risk assessment at national level (NRA) is of key importance and should inform the risk PF assessments of institutions.
  • All references to AML/CFT in other parts of this document implicitly covers also Counter Proliferation Financing (CPF).
  • This PF NRA, should also determine the regulatory expectations and guidance about institutional PF risk assessment and mitigation. Certain products or entities can be exempted from this obligation when there is proven-low risk.
  • Countries and financial institutions can and should leverage their existing AML/CFT mechanisms to mitigate PF non-compliance risks.

In the context of Recommendation 1, “proliferation financing risk” refers strictly and only to the potential breach, non-implementation or evasion of the targeted financial obligations referred to in Recommendation 7. These R.7 obligations apply to two country-specific regimes for the Democratic People’s Republic of Korea (DPRK) and Iran, require countries to freeze without delay the funds or other assets of, and to ensure that no funds and other assets are made available, directly or indirectly to or for the benefit of

  1. Any person or entity designated by the United Nations (UN).
  2. Persons and entities acting on their behalf or at their direction.
  3. Those owned or controlled by them. (FATF 2021).

Considerations

Considerations for Regulators

  • Multistakeholder approach: Regulations should be a product of close coordination among financial supervisors, telecom authority, Financial Intelligence Unit, national ID agency, and financial inclusion policy makers.
  • Pro-active Regulatory Guidance: Regulators should provide clear guidance to e-money service providers about their risk-based AML/CFT obligations. Regulator should take initiative in interpretation of low and high risks (i.e. as in tiered KYC), rather than delegating the full responsibility to private sector.
  • Level playing field: In principle, provision of same services should be subject to same KYC and other AML/CFT requirements to ensure a level playing field. Proportionality that is based on the risk-profile of institutions does not contradict with this principle and is in line with the spirit of risk-based approach.
  • Risk-based account tiers and AML/CFT controls: Establishing different DFS account tiers with proportionate, risk-based Know Your Customer (KYC) requirements and transaction/ balance limits can promote both supply and demand of e-money services. This also relates to the allowed functions in each tier. i.e. if the demand is mostly for domestic transactions, limiting the international transactions for some tiers can reduce the risk significantly. G2P and P2G payments may also pose minimal ML/TF risks and can be the basis for further simplifications.
  • Digital ID and e-KYC: Supporting the development of digital ID systems that enable remote customer verification (e-KYC) can help facilitate financial inclusion while effectively mitigating ML/TF risk. This can also promote service provision, by improving efficiency and reducing the operational costs. This may also reduce the fees for the end users.
  • Transaction monitoring: ML/TF risk can be reduced by requiring EMIs to use transaction monitoring software with behavior profiling, geographic validation, and other features aimed at identifying suspicious behavior and transaction patterns. As feasible, using central databases and shared monitoring software for monitoring can have efficiencies.

Considerations for Supervisors

  • Implementation of KYC and other AML/CFT controlsand their effectiveness should be subject to ongoing supervision. Supervisory authorities should employ both off-site and on-site supervisions tools on a risk sensitive basis.
  • Steps to strengthen AML/CFT supervision include
    1. Conducting national, sectoral, or product-based AML/CFT risk assessments.
    2. Building supervisory capacity.
    3. Adopting RegTech tools to improve data collection, processingand analysis in the AML/CFT supervisory context.
  • Supervisory capacity building should also cover the skills and tools to examine the capabilities of monitoring /screening software of the e-money institutions. Where necessary, supervisory authorities should also authority to hire/benefit from external expertise.
  • For additional information, refer to FATF’s Guidance on Risk-based Supervision

Responsibilities and solutions for integrity and security (2024)

FAQs

How do you ensure integrity as a security professional? ›

Guidelines for data integrity
  1. Back up data. Backup copies of data are essential in the event that data is lost or corrupted. ...
  2. Manage data access. By limiting who can access data and what permissions apply to their access, you can help preserve the integrity of that data. ...
  3. Enable logging. ...
  4. Verify and validate data.

What is an example of integrity in security? ›

Integrity involves making sure your data is trustworthy and free from tampering. The integrity of your data is maintained only if the data is authentic, accurate, and reliable. For example, if your company provides information about senior managers on your website, this information needs to have integrity.

What two tasks should be done regularly to preserve the security and integrity of data? ›

What two tasks should be done regularly to preserve the security and integrity of data and applications on mobile devices. -Back up user data on a regular basis. -Ensure that the operating system software and applications contain the latest updates.

What are the goals of integrity in security? ›

There are three goals of integrity, which the models address in various ways: Preventing unauthorized users from making modifications to data or programs. Preventing authorized users from making improper or unauthorized modifications. Maintaining internal and external consistency of data and programs.

How do you ensure integrity in the workplace? ›

These include:
  1. Respecting the privacy of colleagues in private conversations.
  2. Communicating honestly.
  3. Taking responsibility for your actions.
  4. Making promises you keep.
  5. Supporting your organisation's values with or without recognition.
  6. Acknowledging your colleagues when they perform high quality work.
  7. Being trustworthy.

How do you ensure professional integrity? ›

Here are some tips you can use to maintain your own professional integrity and encourage an entire culture of ethical behavior in the workplace.
  1. Treat everyone the same.
  2. Reward honesty.
  3. Admit your mistakes.
  4. Encourage teams to speak freely.
  5. Conduct self-assessments.
  6. Keep your commitments.
  7. Put in maximum effort.
Jun 24, 2022

How do you ensure data integrity and security? ›

What are the best practices for data integrity? #
  1. Data validation and verification.
  2. Access control.
  3. Data encryption.
  4. Regular backups and recovery plans.
  5. Data versioning and timestamps.
  6. Audit trails and logs.
  7. Error handling mechanisms.

What is the best possible solution for data integrity? ›

Other data integrity best practices include input validation to preclude the entering of invalid data, error detection/data validation to identify errors in data transmission, and security measures such as data loss prevention, access control, data encryption, and more.

What common method is used to ensure the security and integrity? ›

One commonly used security mechanism is encryption, which can help to ensure both the confidentiality and the integrity of data.

What are the key points of integrity? ›

People who conduct themselves with a great deal of honesty and abstain from deception are said to have integrity. The characteristics of integrity include honesty, responsibility, grace, respect, accountability, hard work, patience, and any other action that describes being honest.

What security controls ensure integrity? ›

To ensure data integrity, organizations need to implement measures that protect data from unauthorized access, tampering, or loss. These measures include encryption, digital signatures, checksums and hash functions, data backup, secure storage, and access control.

What are the three main security goals? ›

The CIA Triad—Confidentiality, Integrity, and Availability—is a guiding model in information security.

What is integrity in security services? ›

The term 'integrity' means guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.

How do you ensure system integrity? ›

The following eight recommendations give an overview of how to maintain data integrity for computerized systems.
  1. Perform Risk-Based Validation. ...
  2. Select Appropriate System and Service Providers. ...
  3. Audit your Audit Trails. ...
  4. Change Control. ...
  5. Qualify IT & Validate Systems. ...
  6. Plan for Business Continuity. ...
  7. Be Accurate. ...
  8. Archive Regularly.

Top Articles
Risks of Trading Low-Volume Stocks — Yochaa
Trading Volume (Average 10 day)
Golden Abyss - Chapter 5 - Lunar_Angel
Busted Newspaper Zapata Tx
Identifont Upload
Wizard Build Season 28
Explore Tarot: Your Ultimate Tarot Cheat Sheet for Beginners
Recent Obituaries Patriot Ledger
Unlocking the Enigmatic Tonicamille: A Journey from Small Town to Social Media Stardom
Fototour verlassener Fliegerhorst Schönwald [Lost Place Brandenburg]
Amateur Lesbian Spanking
The Wicked Lady | Rotten Tomatoes
Remnant Graveyard Elf
Garrick Joker'' Hastings Sentenced
fltimes.com | Finger Lakes Times
Dallas Cowboys On Sirius Xm Radio
Pricelinerewardsvisa Com Activate
Trac Cbna
Urban Airship Expands its Mobile Platform to Transform Customer Communications
Forum Phun Extra
Huntersville Town Billboards
Evil Dead Rise - Everything You Need To Know
Why Does Lawrence Jones Have Ptsd
Scream Queens Parents Guide
A Person That Creates Movie Basis Figgerits
Reviews over Supersaver - Opiness - Spreekt uit ervaring
Target Minute Clinic Hours
Chime Ssi Payment 2023
Everything To Know About N Scale Model Trains - My Hobby Models
Marquette Gas Prices
Wku Lpn To Rn
Medline Industries, LP hiring Warehouse Operator - Salt Lake City in Salt Lake City, UT | LinkedIn
Infinite Campus Asd20
Jazz Total Detox Reviews 2022
Lcsc Skyward
Taylored Services Hardeeville Sc
Tu Housing Portal
Myra's Floral Princeton Wv
Att U Verse Outage Map
Puretalkusa.com/Amac
Poster & 1600 Autocollants créatifs | Activité facile et ludique | Poppik Stickers
1400 Kg To Lb
Personalised Handmade 50th, 60th, 70th, 80th Birthday Card, Sister, Mum, Friend | eBay
Mandy Rose - WWE News, Rumors, & Updates
Sam's Club Gas Prices Deptford Nj
Beaufort SC Mugshots
3 bis 4 Saison-Schlafsack - hier online kaufen bei Outwell
Dobratz Hantge Funeral Chapel Obituaries
Mlb Hitting Streak Record Holder Crossword Clue
Tìm x , y , z :a, \(\frac{x+z+1}{x}=\frac{z+x+2}{y}=\frac{x+y-3}{z}=\)\(\frac{1}{x+y+z}\)b, 10x = 6y và \(2x^2\)\(-\) \(...
Otter Bustr
Latest Posts
Article information

Author: Trent Wehner

Last Updated:

Views: 6238

Rating: 4.6 / 5 (76 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Trent Wehner

Birthday: 1993-03-14

Address: 872 Kevin Squares, New Codyville, AK 01785-0416

Phone: +18698800304764

Job: Senior Farming Developer

Hobby: Paintball, Calligraphy, Hunting, Flying disc, Lapidary, Rafting, Inline skating

Introduction: My name is Trent Wehner, I am a talented, brainy, zealous, light, funny, gleaming, attractive person who loves writing and wants to share my knowledge and understanding with you.