Legal Instruments and Structures to disguise beneficial ownership

Legal Instruments and Structures to disguise beneficial ownership

Legal Instruments and Structures that Disguise Beneficial Ownership

Legal Instruments and Structures that Disguise Beneficial Ownership

A beneficial owner is a natural person who effectively owns or controls a legal person or legal arrangement or on whose behalf transactions are conducted. Criminals deploy a range of methods to conceal their ownership over their illegally derived assets and funds.

Scrutinising the ownership structure is a part of AML/CFT obligations for Financial Institutions (FIs), Designated Non-Financial Businesses and Professions (DNFBPs) and Virtual Asset Service Providers (VASPs). Some of the commonly used techniques to disguise beneficial ownership have been listed below:

Bearer Securities

Bearer securities are instruments that grant ownership to individuals who physically hold the certificate. Bearer securities have recently gained prominence due to their anonymity feature, as they are not registered and can be transferred easily, as there are requirements to record the transfer of bearer securities.

However, the lack of transparency in determining the owner of shares makes it easy for criminals to conceal the identity of beneficial owners that control the bearer instruments. That being said, UAE has implemented Federal Decree Law No. (32) of 2021 for commercial companies and Cabinet Decision No. (109) of 2023 On Regulating the Beneficial Owner Procedures for legal persons in the state (including commercial free zones) that restricts them from issuing bearer shares and bearer share warrants.

Fronts and Nominees

Front companies are completely functional companies that have the same attributes as a legitimate business entity but are used for disguising illegal financial activities While front companies can be used to simplify transactions or for other lawful purposes, they can also be misused for fraudulent schemes, such as false invoicing and phoenix activity.

Offenders can additionally use nominee shareholders or directors to further obscure the identity of beneficial owners. A nominee shareholder holds shares in a company for the benefit of another person. A nominee director is appointed to the board of a company to represent the interests of the appointer.

Nominees can be exploited to circumvent restrictions on foreign business ownership or foreign trade or by individuals who are prohibited from acting as directors of a company owing to their past conduct.

UAE’s regulatory regime requires nominee board members to disclose to the legal person that they are acting as a nominee within fifteen days of becoming a nominee board member. The nominee member is also obligated to inform the legal person if he or she ceases to be a nominee board member.

The Register of Partners or Shareholders kept by the legal person must also include data of any of the partners or shareholders serving as a nominee board member. This includes:

  • Number of shares held along with the category of the shares and associated voting rights
  • The date on which the partner or shareholder acquired that position in the legal person
  • Particulars of the partner or shareholder, depending on whether they are a natural or legal person

The nominee member must inform the legal person if there are any updates in any of the above-mentioned information within 15 days of such change.

Non-Profits, Charities and Foundations

Non-Profit Organisations (NPOs), charities and foundations are natural or legal persons or legal arrangements that work to raise funds for purposes such as charitable, religious, cultural, educational, social, and other noble causes. However, the goodwill associated with non-profits is abused by illicit actors to funnel the proceeds of their crimes by way of donations, as charities have access to considerable sources of funds.

The regulatory regime in UAE also requires DNFBPs dealing with NPOs to adopt a risk-based approach.

Offshore Companies

Offshore companies are entities whose place of incorporation and principal place of operation fall under different jurisdictions. When creating complex structures, criminals often resort to setting up offshore companies in tax haven countries or countries with flexible business regulations and stringent privacy laws.

Shell and Shelf Companies

Shell companies are companies which have no significant independent business operations or related assets or employees, whereas shelf companies are companies that have been dormant for a long duration with inactive shareholders, directors, and secretaries. Shell companies offer a variety of functions during corporate mergers or to protect the company’s brand name and identity against third-party violation.

Shell companies are also used for illicit purposes, such as the distribution of assets across multiple countries and pass-through transactions to hide the origin of funds. On the other hand, shelf companies can be used by new owners to secure business relationships based on the company’s history or access markets based on pre-established relationships with financial institutions, making it difficult to identify the real owners of the company.

Trusts

A trust is a fiduciary relationship where a settlor gives the trustee the right to hold title for the beneficiary’s assets. Trusts such as express trusts are commonly misused by criminals to maintain anonymity, creating an additional layer of complexity by separating the legal title and control of an asset from its beneficial ownership.

Private Investment Vehicles

Private Investment Vehicles or Companies (PIVs/PICs) are investment companies that have a few investors without any intention of public offering. Generally, PIVs or PICs are used by high-net-worth individuals to hold their assets.

Criminals can misuse PIVs/PICs and appoint nominee shareholders, directors and secretaries to create an additional layer of confidentiality that can obscure beneficial ownership and create complex structures.

Related Posts

Join the Fight against Financial Crimes!

Protect your business with reliable and effective
AML strategies with AML UAE.

How to Identify UBO within Complex Ownership Structures

How to Identify UBO within Complex Ownership Structures

How to Identify UBO within Complex Ownership Structures

How to Identify UBO within Complex Ownership Structures

Regulated Entities in the UAE are required to identify and verify the ultimate beneficial owner (UBO) to decode the corporate structure. Complex ownership structures are those legal entities whose actual ownership is difficult to identify.

This infographic attempts to showcase how a regulated entity can identify the UBO of a legal entity customer who has a complex ownership structure through the use of various measures discussed.

The UBO Regulations in UAE define a beneficial owner as a natural person who has:

  • Ultimate ownership, or
  • On whose behalf transactions are carried out, or
  • Ultimate effective control over the legal entity in terms of decision-making authority.

Various methods to identify UBOs within Complex Ownership Structure are as follows:

Seek Ownership Information until Natural Persons with Significant Share found

A regulated entity must strive to peel layers of corporate ownership within corporate ownership until the ownership or control can be found with a natural person.

For instance, the if one legal entity is found to be owned by another legal entity or legal arrangement, which is further owned by another legal arrangement, then the regulated entity should make efforts to identify the UBO, who is the natural person or person operating behind the complex web of corporate ownership structures.

Ownership information can be sought through the ‘Know Your Customer’ (KYC) component of the Customer Due Diligence (CDD) process carried out to meet anti-money laundering/ counter financing of terrorism (AML/CFT) obligations of a regulated entity.

The KYC process helps in the collection of necessary documents required to ascertain the UBO of a complex ownership structure.

Beneficial Ownership Verification

It is one thing to identify the UBO, but it is equally important to verify the identity of such a UBO against reliable government-issued identity documents and records.

This helps rule out the possibility of such UBO being falsely identified due to identity theft or forgery.

Scrutinise Ownership Structure of Offshore Businesses

Regulated entities need to be extra vigilant during the identification process of any offshore entity client, as there is always a possibility that criminals use offshore tax or regulatory havens to form legal entities with complex ownership structures to disguise the true identity of a UBO who might be sanctioned individual, or politically exposed person, or an individual having their name in an international criminal watchlist.

Analyse Documents of Legal Entity

Regulated entities must carefully seek and examine the corporate documents of a legal entity customer to identify the trail of ownership and control.

The type of documents that a regulated entity can seek from corporate entity clients can be referred from Know Your Business (KYB) – Key element of AML compliance.

Ongoing Monitoring of Business Relationships

Regulated entities must exercise caution as there is always a possibility that after onboarding a legal entity client, its ownership rights might be transferred from one UBO to another, which is riskier due to being sanctioned or PEP.

To rule out such an event from materialising, the regulated entity must conduct ongoing monitoring of business relationships to ensure that customer details collected during the KYC process, such as ownership structure, share capital, net worth, and the purpose of business remain consistent with the customer profile throughout the business lifecycle.

Scrutinise Reliable Publicly Available Information

Regulated entities, in an attempt to identify and verify the UBO prior to onboarding and after establishing business relationships, need to scrutinise and comb through publicly available reliable information for the following purposes:

  • To rule out the possibility of any adverse media in the name of the UBO.
  • To verify or validate UBO information from the government, ministry, or regulator, run websites to conclude the CDD exercise.

Related Posts

Join the Fight against Financial Crimes!

Protect your business with reliable and effective
AML strategies with AML UAE.

Configuring Sanctions Screening Software: Must-Have Features for Compliance

Configuring Sanctions Screening Software: Must-Have Features for Compliance

Configuring Sanctions Screening Software: Must-Have Features for Compliance

Regulated entities subscribe to sanctions screening software to automate the screening and ongoing monitoring requirements. However, if the software is not properly configured, it won’t provide the desired outcomes, resulting in non-compliance and fines. Configuring sanctions screening software requires careful consideration of various aspects. Explore the same in our latest infographic. 

Designated Non-Financial Businesses and Professions (DNFBPs) and Virtual Assets Service Providers (VASPs) in UAE are bound by the Anti-Money Laundering (AML), Counter Financing of Terrorism (CFT), Counter Proliferation Financing (CPF) laws and regulations, requiring them to conduct sanctions screening. The sanctions screening software must have configuration functionalities such as the following: 

Watchlist Customization

A sanctions screening software must have customisability for selecting relevant and applicable lists or watchlists to match with a DNFBP’s or VASP’s individual requirements based on the geographies it operates and most of its customers or suppliers are based out of.  

Screening Type Configurability

The option to select whether to screen a single customer or a batch of a large number of customers must be as each DNFBP’s or VASP’s requirements differ from one another. 

Further, the screening software must also provide functionality to screen a natural person customer as well as a legal entity customer. 

Notification Management

A sanctions screening software must have the function of setting the notification parameters according to the requirement of the DNFBP or VASP using it. 

Such functionality must be provided for setting the duration, frequency, recipients, reminder frequency, etc., so that the DNFBPs and VASPs can achieve the most out of their screening software. 

Match Type Customization

Match type customisation refers to setting the match percentage or sameness parameters prior to the generation of screening results. 

Generally, match-type parameters are classified as close match or exact match, which helps the DNFBPs or VASPs to determine if it wants to cast a wide net for searching a customer name using close match settings or narrow down the search outcomes using exact match settings. 

Script Name Acceptability

Due to variations in the name spelling, pronunciation, and writing conventions, the manner in which names are spelt, written and pronounced in different cultures and countries differs largely from one another. 

For instance, the names in certain cultures are written in such a manner that differentiating first name, middle name, and last name is complex, therefore sanctions screening software must have the acceptability to enter customer name in the script it is found. This increases the chances of finding relevant matches for sanctions compliance purposes. 

The feature of fuzzy matching helps manage script name and phonetic variations while generating screening results.  

Customer Relationship Activity/Dormancy Status

The screening software should have a feature where the user, such as DNFBPs or VASPs, can set the customer dormancy and activity status,  basis on which further due diligence measures, such as ongoing screening and determining the periodicity of Know Your Customer refresh, can be determined and consistently applied. 

Enabling Ongoing Monitoring

Ongoing Monitoring is the essential legal obligation of DNFBPs and VASPs according to UAE regulations. A screening software with a feature to switch on an ongoing monitoring feature in the background that automates the ongoing monitoring across the relevant sanctions list for finding customer names in screening lists is highly preferable. 

Case Management

A sanctions screening software must have the functionality to generate cases if it finds matching results. These cases would be then further escalated to the screening analyst for his review and disambiguation.

Integration with Regulatory Reporting Tools

The screening software should be customisable according to the regulatory reporting requirements of the relevant jurisdiction. 

For instance, for a DNFBPs or VASPs operating in UAE, the sanctions screening software must be customisable and configurable to be integrated with regulatory reporting software to meet UAE regulatory reporting requirements in terms of reports to be filed such as Confirmed Name Match Report (CNMR) and Partial Name Match Report (PNMR) Reporting on goAML portal

Case Auto-Approval Threshold Configuration

To reduce the workload that comes as a result of disambiguation of matches or decoding the sanctions screening results, a screening software must have the functionality to set the “auto-approve” parameters for cases or screening results that generate no or nil results, this feature is helpful for improving customer onboarding process 

Conclusion

To conclude, regulated entities need to configure their screening software in a way that would not only help reduce their workload but also comply with legal requirements. If proper attention is not paid to the proper configuration of the software, it can result in screening software providing too many match results or ignoring true positives. The entities must take a risk-based approach (RBA) while fulfilling its sanctions screening requirement, which shall help the business to mitigate terrorism financing and proliferation financing risks effectively. 

Related Posts

Join the Fight against Financial Crimes!

Protect your business with reliable and effective
AML strategies with AML UAE.

Integrating External Information for a Holistic EWRA Approach

Integrating External Information for a Holistic EWRA Approach

Integrating External Information for a Holistic EWRA Approach

Integrating External Information for a Holistic EWRA Approach

Integrating external information on anti-money laundering / combating the financing of terrorism (AML/CFT) measures from authoritative external sources is essential to developing a holistic AML/CFT Enterprise-Wide Risk Assessment (EWRA). This ensures effective management of money laundering (ML), terrorism financing (TF) and proliferation financing (PF) risks. In this infographic, the list of external sources and information to be referred to while conducting the EWRA process is discussed. This list is discussed as under: 

1. ML/TF/PF National Risk Assessment (NRA)

NRA is an assessment of ML, TF or PF risks done at the national level by the government authorities. In the UAE, NRA is released by the National Anti-Money Laundering and Combatting Financing of Terrorism and Financing of Illegal Organizations Committee (NAMLCFTC). The NRA of UAE helps in gaining a thorough and comprehensive understanding of the ML and TF risks faced by the UAE. While conducting their EWRA, entities should take the NRA into account and incorporate its findings, suggestions and best practices 

2. Sectoral Risk Assessments

Entities should take into account the specific risks related to ML, TF or PF that are relevant and unique to the sector in which they operate. These risks are often assessed by the sector’s AML/CFT regulator. For example, the Central Bank of the UAE releases its Sectoral Report on ML and TF Risk Assessment for the financial sector. Financial institutions must refer to it while conducting their EWRA exercise.  

3. NRA of other jurisdictions in which the Regulated Entity operates or the customers are based

If the entities operate in multiple countries or have customers from different nations, the NRAs of these countries should be taken into account while conducting their EWRA process. Understanding the ML, TF, and PF risk assessments and regulatory frameworks of these countries helps identify cross-border risks and take a risk-based approach.  

For example, if an entity operating in the UAE has clients from Singapore, it should consider the NRA of Singapore to ensure that EWRA is comprehensive.  

4. Guidelines issued by the relevant Supervisory Authorities

Supervisory Authorities release AML/CFT guidelines to help the entities supervised by them effectively comply with their AML/CFT obligations. For example,  

For more information on the various guidelines issued by AML/CFT authorities in the UAE, visit our downloads section here 

5. Information from Industry Bodies or Representatives 

Industry bodies and representatives provide insights into emerging typologies, risks, and best practices regarding AML/CFT measures and compliance.  

Incorporating this information enables more accurate risk assessments while conducting the EWRA.  

For example, the London Bullion Market Association (LBMA) published best practices and code of business conduct for dealers in precious metals.  

6. Information from international standard-setting bodies and international organisations

International AML/CFT trend-setting bodies often release guidance, reports and recommendations to address the ML, TF and PF threats faced by the global financial system. For example,  

  • The Financial Action Task Force (FATF), a global money laundering and terrorism financing watchdog, evaluates the AML/CFT measures at country levels and releases publications on emerging ML, TF and PF risks, such as Guidance on Beneficial Ownership and Transparency of Legal Arrangements, Risk-based Approach Guidance for the Real Estate Sector, etc.  
  • The Egmont Group connects financial intelligence units (FIUs) all around the world. FIUs are responsible for AML/CFT measures in the countries in which they are established. Egmont group enables them to share information and intelligence regarding ML, TF and PF risks.  
  • The Wolfsberg Group is a group of twelve international banks with the aim to develop frameworks and guidance to mitigate financial crimes.  
  • The Basel AML Index is an independent ranking of MT and TF risks globally. It is conducted by the Basel Institute on Governance. 
  • Organisation for Economic Co-operation and Development (OECD) works towards building policies for global standards setting, including those related to AML/CFT measures.  

7. Mutual Evaluation Reports of other jurisdictions and Typologies Reports

Mutual Evaluation Reports are conducted by the FATF to assess how effectively jurisdictions implement AML/CFT measures, such as for UAE, India, Singapore, etc. Reviewing these reports from other countries can offer insights into potential risks and effective mitigation strategies to be integrated into the EWRA.  

EWRA should also be integrated with information from ML, TF, or PF methods and typologies reports to ensure that the emerging threats of these crimes are combated. 

For example, the Financial Intelligence Unit-UAE issued a strategic analysis report on real estate money laundering typologies and patterns. 

8. Information published by reputable non-governmental organisations

Reputable non-governmental organisations and other institutions often publish research and reports on ML, TF and PF risks and measures. Integrating their findings into the EWRA will result in gaining a more comprehensive understanding of the risks and challenges related to ML, TF and PF.  

For example, Transparency International conducts research and investigative work on anti-money laundering measures all over the world. International Consortium of Investigative Journalists works towards exposing financial crimes all around the world. 

To know more about organisations working to fight money laundering, check out our article here. 

9. Any other credible and reliable sources 

Other credible and reliable sources include peer-reviewed academic research, AML/CFT expert opinions, books on AML/CFT measures, etc. Reference guides, Frequently Asked Questions (FAQs), notices, etc, available on the websites of AML/CFT supervisors should also be referred. For example, FIU-UAE has released FAQs on its goAML portal, and ADGM has released quick guides on AML/CFT governance framework for DNFBPs, Customer Risk Assessments, etc. 

Conclusion

By systematically integrating external information from the above-discussed sources, an entity’s EWRA will be holistic, robust and aligned with both national and international standards, enhancing its effectiveness. 

Related Posts

Key Elements of an Effective EWRA Framework

Key Elements of an Effective EWRA Framework

Key Elements of an Effective EWRA Framework

Conducting an Enterprise-Wide Risk Assessment (EWRA) is a necessary step towards fulfilling an entity’s obligations under UAE’s anti-money laundering / countering the financing of terrorism (AML/CFT) laws, including the Federal Decree by Law No. (10) of 2025 and Cabinet Resolution No. (134) of 2025.

An EWRA framework is aimed at ensuring the mitigation of money laundering (ML), terrorism financing (TF) and proliferation financing (PF) risks that the entity may face. This infographic highlights the key elements that must be incorporated in the EWRA to make it effective and robust. The key elements of an effective EWRA framework are elaborated upon below. 

1. Tailored to the nature and size of the business

EWRA must be tailored to the specific characteristics of the business, such as its nature and size. This is so that the unique risks associated with the business are recognised and addressed. Customising AML/CFT measures to these specific risks ensures that they are effectively prevented and mitigated. For example, a dealer in precious metals and stones would face different ML, TF and PF risks than a banking company 

2. Comprehensive ML/TF/PF risk Consideration

EWRA must take into Consideration ML/TF/PF risks posed by the following:

Customers:

While conducting the EWRA, entities must take into account the risks posed by their potential customers. For example, if an entity often provides services to politically exposed persons (PEPs) or persons from high-risk jurisdictions, the entity needs to manage the risks associated with such high-risk customers. 

Products and Services:

The products and services offered by a business must be considered while conducting the EWRA. Certain financial products or services are exposed to a higher risk of ML, TF, and PF due to their nature, complexity, or how they are used. For example, products that allow for high-value transactions, anonymous transactions, or cash-based transactions are more exposed to the risks of ML, TF, or PF. These businesses need to adopt risk mitigation measures accordingly.

Transactions:

Businesses need to analyse the nature and volume of transactions they usually undertake, as well as the ML, TF, or ML risks posed by such transactions. For example, high-value transactions or cash-intensive transactions pose higher risks, and effective AML/CFT measures need to be adopted accordingly. Having an effective transaction monitoring mechanism in place helps detect any abnormalities that arise in the course of a business relationship and report such risks to regulatory authorities in a timely manner 

Delivery Channels:

Delivery channel risks are those that are associated with the medium through which client interaction occurs, and the products and services are provided. Firms need to consider the channel of interaction with the client, whether the client’s instructions were channelled through a third party, whether the interaction with the customer is face-to-face or non-face-to-face, etc. Further, online or remote delivery channels may pose increased exposure to risks due to anonymity or false identity. Therefore, these channels require increased risk mitigation and customer due diligence mechanisms.  

Geography:

Entities need to consider the geographies on which their customers are based. For example, customers from geographies that are on the FATF blacklist can be classified as high-risk. The entities must put proper controls to mitigate such risks.

Technologies:

EWRA should assess the risks associated with the products and services delivered through the new and upcoming technologies. These technologies should be assessed to ensure that the systems are secure and up to date and can handle the evolving risks of ML, TF, and PF. 

Other Relevant Risk Factors:

Other risks that the EWRA should take into consideration are third-party risks, such as those associated with the agents or intermediaries engaged by the entity, risks of not keeping with the dynamic AML/CFT laws and regulations, risks of inadequate ongoing monitoring mechanisms for customer relationships, transactions, etc.

3. Alignment with the National Risk Assessment (NRA)

National Risk Assessment (NRA) of the UAE is published by the National Anti-Money Laundering and Combatting Financing of Terrorism and Financing of Illegal Organizations Committee (NAMLCFTC) to provide a broad overview of the ML, TF or PF risks faced by UAE at the national level. NRA offers valuable insights into the country’s ML, TF, or PF vulnerabilities. While conducting their EWRA, entities should take the NRA of the UAE into account and incorporate its findings and suggestions.  

4. Incorporation of the Sectoral Risk Assessment

Entities should consider the specific ML, TF or PF risks faced by the sector in which the entity operates. These specific risks are often assessed by the sector’s AML/CFT regulator. For example, the Central Bank of UAE releases its Sectoral Report on Money Laundering and Terrorism Financing Risk Assessment for entities operating in the financial sector of the UAE. Entities must incorporate the findings and suggestions of sector-specific risk assessments into their EWRA.  

5. Regular Review and Updates

EWRAs must be regularly reviewed and updated through regular audits and health checks. ML, TF, and PF are constantly evolving, and so are the AML/CFT laws and regulations that deal with emerging threats. Regular reviews ensure that EWRAs are up to date with their AML/CFT compliance and have the ability to handle the emerging threats of ML, TF and PF. Regular reviews also ensure that any gaps in the AML/CFT program of the entity are identified and remediated.  

6. Senior Management Approval

Senior management must be involved in the conducting of the EWRA and approve it after its completion. The participation of senior management ensures that the EWRA is conducted efficiently and in a timely manner. After the EWRA is conducted, the senior management should review and sign off on the same to formalise the EWRA and endorse its contents as an integral part of the entity’s internal AML/CFT program. The approval reinforces the importance of the EWRA.  

Conclusion

An effective AML/CTF EWRA requires careful consideration of various factors that have been discussed in this infographic. Ensuring that these factors are incorporated into the EWRA sets the foundation for a comprehensive AML/CFT program. Therefore, these elements must be considered while conducting the EWRA process.

Related Posts

Relevance of EWRA in day-to-day AML Compliance

Relevance of EWRA in day-to-day AML Compliance

Relevance of EWRA in day-to-day AML Compliance

The Anti-Money Laundering and Combating the Financing of Terrorism (AML/CFT) regulatory framework in UAE requires Designated Non-Financial Businesses and Professionals (DNFBPs) and Virtual Asset Service Providers (VASPs) to adopt a risk-based approach (RBA) to combat money laundering (ML) and financing of terrorism (TF), and proliferation financing (PF) risks.  

As the regulatory frameworks for DNFBPs and VASPs in UAE require them to adopt RBA, conducting a Business Risk Assessment (BRA) or the Enterprise-wide Risk Assessment is necessary to identify, assess and determine the degree of risk posed to a regulated entity from the perpetrators of M/FT and PF. 

Refer to our blog Checklist for Effective EWRA Documentation to understand the requisites for EWRA. 

Here’s the list of uses of EWRA that regulated entities, such as DNFBPs and VASPs, can  

1. Defining "Risk-centred" AML/CFT and CPF Policies and Procedures

Having conducted EWRA accurately helps regulated entities such as DNFBPs and VASPs to formulate AML/CFT and CPF policies and procedures that are tailored according to the risk findings. 

Tailoring AML/CFT and CPF policies and procedures according to EWRA facilitates developing the compliance processes considering the risk weightage applied to various risk factors such as customers, geography, delivery channels and products or services. 

Illustration: No two regulated entities operating in the same sector require the same set of AML/CFT and CPF policy and procedures. For example, two DNFBPs operating as jewellers can have distinct levels of risk posed by customers and geography due to factors such as: 

  • Region from where they source their raw materials, i.e., the gold bullion could differ. One may source it from the high-risk jurisdictions as defined by FATF, and the other may source it from a well-regulated and reputable jurisdiction with strong anti-financial crime regulations. Then, the degree of risk posed by the delivery channels used or the nature of the customer base differs, requiring respective jewellers to implement relevant AML/CFT and CPF measures.  
  • The resultant AML/CFT and CPF policy needs to be developed by keeping the core risk areas at the centre while developing procedures that help mitigate such risk effectively. 

Drafting adequate and appropriate AML/CFT and CPF program requires the outcome of EWRA to determine the degree and extent of procedures to be taken to customise, supplement, and fortify AML/CFT and CPF efforts. 

2. Foundation for developing Customer Risk Assessment methodology

Regulated entities need to conduct a business risk assessment to identify the proportion of various risk factors that contribute to the overall risk profile. This is then translated into a mechanism to derive the risk each customer poses to the business. A vicious circle – customer risk to business risk and overall business risk to risk from each customer. 

A sound and effective CRA process for a regulated entity such as a DNFBP or VASP is integrated, aligned, and developed with the parameters used for the EWRA process. 

Having access to EWRA findings facilitates regulated entities to formulate and develop CRA parameters, risk scoring methodology and overall program to customer risk assessment. CRA is the function of risk-weightage derived for each risk factors considered during the EWRA exercise. 

Illustration: The outcome of the CRA exercise and subsequent customer risk profiling and scoring would differ for the same customer from one DNFBP to another. For example, the CRA outcome of one real estate agent to another real estate agent shall differ due to variations in degree, extent, and risk weightage assigned to various risk factors in the course of assessing the business risk.  

  • A customer, say, for example, Mr ABC for a real estate agent – Company A, may pose ‘low’ risk as identified post CRA as the majority of Company A’s customer base consists of high net-worth individuals and Mr ABC is also a high net worth individual, becoming homogenous with Company A’s existing and usual customer base. 
  • Contrastingly, the same customer, Mr ABC, for a real estate agent – Company B, may pose a ‘high’ ML/FT and PF risk,  due to Company B’s customer base mostly consisting of lower and middle-income group clients, making Mr ABC as a customer with unusual profile. 
  • In both the above situations, the customer, Mr ABC, and the business sector for which he is a customer remained the same. However, distinguishing factors resulting in different risk scoring as ‘low’ or ‘high’ is the EWRA outcome (the overall business portfolio affects the regulated entity’s risk acceptance level). EWRA outcomes for both real estate agents, Company A and Company B differed because of the general business profile they have. 

The above illustration emphasises how the use of EWRA outcome acts as a foundation on the basis of which, the CRA methodology is developed. 

3. Fosters Optimal Resource Allocation with Risk-Based Approach

A Risk-Based Approach calls for implementing risk mitigation measures commensurate with the level and extent of risk faced. 

The findings of EWRA facilitate a regulated entity such as a DNFBP or VASP to take a risk-based approach (RBA) while making resource allocation decisions, taking into account the following: 

  • Whether all the business activities of the regulated entity are covered by AML regulatory compliance or whether some of their activities are prone to risk requiring AML measures and the rest of the activities are not subject to AML compliance. 
  • The distributing the AML compliance tasks between human resources and advanced technological tools. 
  • Applying EDD measures only to high risk customers and not bothering low-risk customers. 
  • Whether the existing workforce is capable of absorbing the AML compliance workload, or whether new employees such as KYC Analysts, Screening Analysts need to be onboarded or whether the AML compliance obligation needs to be met through the assistance of AML experts or AML consultants. 

Collection of the abovementioned information helps DNFBPs and VASPs to assess how resource-intensive the AML compliance for their organisation would be and take a risk-based decision while allocating funding and resources to mitigate ML/FT and PF risks effectively. 

Illustration/ Use Case: Check out the EWRA and its alignment with the AML/CFT Policy for a TCSP.

4. Customising AML/CFT and CPF Training aligned with assessed risks

Upon conducting EWRA, a regulated entity can assess the level of control measures it needs to exercise for effective mitigation of ML/FT and PF risks. 

Such mitigation measures require active involvement of the employees or personnel of the regulated entity. 

Employees can be effective in mitigating ML/FT and PF risks only when they are adequately and appropriately trained in accordance with the typologies of ML/FT and PF risk specific to their employer’s assessed risks. 

Depending on the EWRA findings and assessed risks, the regulated entity can identify in which specific area its personnel require training. 

Illustration: One DNFBP, having high customer risk weightage in EWRA, would need to have its AML training planned with a special focus on customer onboarding measures such as customer due diligence (CDD), aligning with global sanctions lists, decoding sanctions screening results, how to deal with unaddressed matches during sanctions screening, customer onboarding and offboarding policy and practices, etc.  

Whereas, another DNFBP, having low customer risk due to a homogenous customer mix and low number of customer turnover and repeat customers, needs to have AML training focused around the area like ongoing CDD and transaction monitoring. 

Note: Role-Specific AML/CFT/CPF Compliance Training is necessary throughout the regulated entity to meet regulatory requirements of designing, conducting, and imparting AML/CFT and CPF training to employees. The EWRA findings facilitate tailoring and customising AML/CFT and CPF training on the basis of areas of business that are more vulnerable to ML/FT and PF than others. 

5. Deploying ML/FT and PF Controls, sufficient to mitigate assessed risks

Utilizing EWRA findings helps in determining the baseline AML controls, such as whether there is a need to set up an in-house AML compliance department or whether managed KYC services can be used to mitigate assessed risks. 

Determining the degree of and ways to apply CDD measures and exceptions to CDD, e.g., whether delayed verification of identity can be permitted and, if yes, under what circumstances. 

Determining the process for obtaining user and beneficiary information for implementation of the FATF travel rule when dealing with virtual assets (VAs). 

The findings of EWRA help regulated entities such as DNFBPs and VASPs to determine the type of AML solution required for fulfilling its AML compliance requirements.  

6. Contributes to overall AML governance (Frequency of AML Audit or internal AML reporting

The AML governance framework can be drafted only upon having EWRA findings in hand, giving the regulated entity a clear idea as to how the escalation workflows and allocation of responsibilities shall take place. 

Allocating and determining the roles and responsibilities of AML compliance officer or Money Laundering Reporting Officer. 

Defining the role of senior management in AML compliance process. 

Determining the periodicity of getting an independent AML audit done (more frequent audits for a DNFBP whose EWRA outcome suggests high or medium net risk exposure, as compared to a DNFBP with low net risk exposure). 

Illustration: Mastering STR Filing to Deter Financial Crimes for a DNFBP. 

Illustration II: Assessing AML Control Effectiveness for an Audit Firm

Conclusion

The exercise of conducting EWRA has multifold benefits. The process of EWRA is the starting point for determining what AML measures a DNFBP or VASP needs to take and what are the best-suited options for the fulfilment of AML compliance needs. 

Related Posts

Why Ongoing Monitoring is Key to Money Laundering Risk Mitigation

Why Ongoing Monitoring is Key to Money Laundering Risk Mitigation

Why Ongoing Monitoring is Key to Money Laundering Risk Mitigation

The process of Ongoing Monitoring entails supervision of business relationships that are established with customers.  The supervision of business relationships includes keeping a close eye on customer activities and monitoring transactions executed throughout the life cycle of the business relationship to ensure that these are consistent with the customer profile created by the regulated entity using the Know Your Customer (KYC) exercise of the Customer Due Diligence (CDD) process. The factors given below showcase why ongoing monitoring is essential for money laundering risk mitigation.  

1. Managing ML/TF Risks

Ongoing Monitoring helps identify, at the earliest, the potential  ML/TF risks associated with customers as any deviation or variation in customer profile, customer behaviour, or transaction pattern is captured during the ongoing monitoring process, enabling the business to manage ML/TF risks by deploying necessary ML/TF risk mitigation measures effectively. 

2. Reputation Management

Having a grasp over identifying suspicious transactions and activities  helps businesses to evade potential reputational loss that comes along due to association with individuals and entities engaged in ML/TF. 

3. Maintaining Transparency

Ongoing monitoring helps maintain transparency in business dealings as it helps with timely identification and disclosure of changes or fluctuations in customer profiles, necessitating seeking the latest information from customers. This gives no room for kickbacks or corruption by employees of the organisation to facilitate criminals in misusing an organisation to further their illicit motives and promotes two-way transparency that includes business and customers equally. 

4. Early Detection of Suspicious Activities

The best part about ongoing monitoring software or tools is that it immediately notifies or generates an alert upon observing any inconsistencies in customer behaviour or transactions. This helps businesses detect potentially suspicious activities indicating ML/TF early. 

5. Compliance with Regulatory Requirements

Conducting ongoing monitoring assists businesses in fulfilling mandatory regulatory requirements of the supervision of business relationships with customers, which forms part of the Customer Due Diligence (CDD) process contained in the AML regulations of the UAE. 

6. Adaptation to Evolving Threats

An ongoing monitoring practice or tool, over a period of time, helps businesses to develop an understanding of evolving ML/TF typologies and helps adapt to evolving ML/TF threats due to continuous observation of behaviour and transaction trends of customers. 

7. Timely Reporting

Conducting ongoing monitoring assists businesses in fulfilling regulatory reporting requirements such as timely filing of Suspicious Activity/Transaction Report (SAR/STR) to the UAE Financial Intelligence Unit (FIU) through the goAML portal, thus reducing incidences of fines and penalties. 

8. Strategic Decision-Making

By having in place an ongoing monitoring mechanism, businesses can make strategic decisions as to client onboarding and client offboarding, along with setting measures for seeking additional information to satisfy queries raised due to findings observed during the ongoing monitoring process, such as those requiring Enhanced Due Diligence measures (EDD) by seeking Sources of Funds (SoF) and Sources of Wealth (SoW).

Conclusion

With the above pointers, businesses in the UAE can effectively utilise ongoing monitoring processes to mitigate ML/TF risks posed by customers. 

Related Posts

Confused with how to mitigate ML, FT, and PF risks within your Regulated Entity?

Critical Risk Assessment Criteria for PEPs

Critical Risk Assessment Criteria for PEPs

Critical Risk Assessment Criteria for PEPs

Critical Risk Assessment Criteria for PEPs

The UAE’s Anti-Money Laundering and Combating the Financing of Terrorism (AML/CFT) regulatory framework requires businesses to scrutinise and assess the Money Laundering (ML), Financing of Terrorism (FT), or Proliferation Financing (PF) risks posed by existing and potential customers who are classified as Politically Exposed Persons (PEPs). The PEP risk assessment forms part of Customer Due Diligence (CDD) measures.  

To ensure compliance and effectively manage these ML/FT/PF, bribery, and corruption risks, businesses must establish clear criteria for assessing the customers identified as PEPs.  

However, not all PEPs pose the same degree and extent of ML/FT/PF, corruption and bribery risk. Thus, businesses cannot deploy a blanket approach and need to adopt a risk-based approach, requiring to analyse each PEP customer on a case-to-case basis.  

Businesses must implement risk assessment criteria to evaluate the ML/FT/PF risks associated with each PEP. This approach ensures businesses can tailor their risk management strategies effectively, addressing the varying degrees of risk posed by different PEPs and maintaining effective controls against financial crimes, including ML/FT/PF. 

Here’s a criterion that businesses should consider while assessing ML/FT/PF risks related to PEPs:  

1. Role and Position

As part of the risk assessment criteria for customers, businesses need to evaluate whether their existing or potential customer identified as PEP holds any highly influential position within the government or political system. Higher-ranking positions typically present higher risks due to greater influence and access to resources, such as a Prime Minister or Foreign Minister or Minister of Defense, or is the PEP merely a member of parliament or an important cabinet that advises higher-ranking PEPs. Assessing the ML/FT and PF risk posed by PEPs on the basis of their role and position in influencing public policy, government programs, and business transactions is an important component of risk assessment criteria for PEPs. Among the other factors, the regulated entities must consider: 

  • The nature of decisions controlled by PEP and the degree of autonomy PEP has in decision-making 
  • Whether the PEP has control over disbursements of funds 
  • The PEP’s rank within the government or international organisation 

2. Public Profile

As part of the PEP’s risk assessment, businesses should evaluate the PEP’s public profile by examining its reputation and image in the public domain. PEPs, who are often in the media and under public scrutiny, may pose different and potentially higher risks compared to those with low profiles.  

However, while high visibility can increase scrutiny, it does not necessarily correlate with higher ML/FT and PF risk.  

Thus, to accurately analyse the potential risk associated with a PEP, businesses need to consider both public opinion and media coverage, depending on the context of information available about the PEP.  

3. Jurisdictional Risk

The jurisdiction risk involves considering the political and economic stability and the rating of the AML framework of the country where the PEP belongs.  

Foreign PEPs pose a higher amount of risks than local PEPs. 

Countries with a high level of corruption, weak governance structure, or unstable political environments pose greater risks, and PEPs residing in these countries may pose significantly higher ML/FT/PF, corruption, and bribery risks.  

Apart from this, as part of assessing jurisdictional risk, businesses should also evaluate whether the PEP operates in jurisdictions that conflict with the country where the businesses operate, as this can further impact the risk assessment criteria for PEPs.  

4. Relatives and Close Associates

Knowing PEPs is essential, but businesses should also investigate the relationships and connections of the PEP, including relatives, close associates, and friends. These relationships can significantly impact the risk profile, as they may be involved in or benefit from illicit activities facilitated by the PEP’s position.  

At the same time, potential and existing customers onboarded must be monitored on an ongoing basis to assess whether they are relatives, close associates, and friends of any PEP as it is highly possible that PEP, to avoid disclosing their identity, operate by proxy of their relatives, close associates, and friends. 

Assessing the background and activities of these connected individuals is essential for understanding the broader network associated with the PEP. 

5. Origin of Funds and Wealth

Businesses should also investigate the source of the PEP’s funds and accumulated wealth to assess the legitimacy of their transactions. When assessing the origins of funds and wealth, it is necessary for businesses to know if wealth and funds are aligned with their official income or business profits of such a PEP.  

Unexplained wealth and funds inconsistent with the PEP’s known income or profit may indicate involvement in financial crimes, including ML/FT/PF, bribery, and corruption.  

6. Transaction Patterns

Another critical risk assessment criterion is to analyse transaction patterns involving the PEP.  Businesses should monitor the nature and frequency of transactions involving the PEP on an ongoing basis.  

Unusual and suspicious transaction patterns, such as those involving unusually large numbers of transactions or involving high-risk jurisdictions, can signal involvement in potential illicit activities.  

Thus, as part of the risk assessment of the PEP, businesses should ensure that transactions are consistent with the PEP’s known wealth, business, and financial activities. 

7. Duration of Public Position

The length of time the PEP has held its position of power also impacts the risk assessment. Long-standing PEPs may have developed extensive networks and influence, impacting their risk profile.  

Even after leaving office, former PEPs may still pose risks due to the established network and influence.  

Evaluating the duration and impact of the PEP’s tenure helps in assessing potential risks associated with their involvement.  

Conclusion

Assessing the risks associated with PEPs on a case-to-case basis is critical for businesses to ensure compliance with the UAE AML/CFT regulations. By carefully evaluating these criteria, businesses can make informed decisions and implement appropriate measures to manage and mitigate ML/FT/PF risks related to PEPs. 

Related Posts

Aligning Your Business with Global Sanctions Lists – Don’t Get Caught Short

Aligning Your Business with Global Sanctions Lists

Aligning Your Business with Global Sanctions Lists - Don't Get Caught Short

Aligning Your Business with Global Sanctions Lists - Don't Get Caught Short

With global financial markets being interconnected, businesses in UAE engage with a diverse range of customers and partners from around the world. The Anti-Money Laundering (AML) and Targeted Financial Sanctions (TFS) regulations in UAE mandate businesses to implement effective sanctions-screening processes.

This involves designing, aligning, and implementing sanctions compliance programs with sanctions screening processes that cover national as well as global sanctions lists.

However, many businesses tend to fall short with the interlinking of these global sanctions lists within their AML/TFS compliance framework, which poses significant risks to businesses.

Here’s a list of factors that businesses need to be aware of to evade falling short of, while aligning global sanctions lists with their AML/TFS program:

Reputation Risk

Businesses must be mindful of not falling short in implementing global sanctions lists, as this can negatively impact their reputation. Associating with sanctioned individuals or entities, whether knowingly or unknowingly, can expose businesses to probable ML/FT and PF risks, which upon materialising can lead to negative publicity, loss of trust in the eyes of customers as well as regulatory authorities and damage the overall brand image.

Regulatory Risk

Regulated entities with their exposure to international clients must not ignore implementing global sanctions lists, as it would expose businesses to regulatory noncompliance consequences such as potential license cancellation, liquidation, or asset seizure. These risks arise from violations of regulatory requirements enforced by the regulatory authorities in the UAE. Further, it also leads to the imposition of administrative consequences and regulatory penalties such as fines, which significantly increase financial burdens and disrupt operations.

Criminal Charges

The inability to screen customers and partners against UNSC sanction lists and other relevant and applicable global sanctions can lead to criminal charges upon the business itself and its employees, such as the imposition of fines and penalties and the probability of imprisonment on the directors, senior management or compliance officers of the business. Both intentional and unintentional conduct resulting in the lack of adequate application of measures under TFS regulations may also trigger criminal liability for businesses.

Increased Supervision

TFS non-compliance results in increased regulatory scrutiny and supervision.  Regulated entities must take into consideration the relevant sanctions lists in accordance with the legal requirements and the risk-based approach adopted by them.

Missed Red Flags

An entity having a global business must adhere to the legal obligations of the jurisdictions it does business with. Failure to take into consideration the relevant sanctions lists may lead leads to the onboarding of sanctioned individuals and entities likely to engage in illicit activities, including money laundering and financing terrorism.

Overlooking screening individuals and entities against global sanction lists would enable perpetrators to slip through weak sanctions screening programs, as no alert would be generated to stop them in their tracks. This would increase the likelihood of businesses missing out on red flags indicating involvement in illicit activities.

Financial Crime Risk

Any business’s failure to align with the relevant and applicable global lists opens the business to the chance of unknowingly facilitating financial crimes. Regulated entities dealing with foreign customers and suppliers must consider the sanctions lists of the respective countries to comply with TFS requirements.

Supply Chain Risk

Not identifying sanctioned individuals and entities in a timely manner across relevant and applicable global lists leads to supply chain vulnerabilities. Businesses face the risk of engaging with sanctioned suppliers, exposing themselves to regulatory penalties. This oversight compromises supply chain integrity by affecting production and distribution due to the potential involvement of criminals in misusing the supply chain of the business for their illicit purposes.

Export Control Violations

Entities engaged in import and export business must screen their customers, suppliers, and third-parties against the relevant sanctions lists. A failure to do so may result in selling or purchasing restricted products or dual-use goods to sanctioned entities or individuals, which can result in export control violations. Further, entities must have relevant license to deal in dual-use items.

Funding Risks

When a business is unable to meet sanctions compliance adequately, it may affect access to funding and financial services. Once a business gets penalised or flagged for non-compliance with AML/CFT and TFS laws, it becomes difficult for them to obtain funding from banks and financial institutions as they are viewed as high risk by these banks and financial institutions. This may lead to higher interest rates or difficulty in acquiring funding, disrupting cash flow and growth opportunities, and hindering smooth operations.

Business Continuity Risk

Businesses must adhere to TFS requirements as non-compliance consequences such as criminal charges and penalties would lead to uncertainty and instability in business operations. It increases legal challenges and regulatory scrutiny and damages reputation, which undermines long-term growth, making it difficult to manage business operations and safeguard the business to continue its operations smoothly.

Global Expansion Risk

Businesses must strive to evade global expansion risk by having in place an adequate global sanctions compliance program as authorities, prior to granting permission to operate in their country, perform due diligence on businesses, and any finding of noncompliance with global sanctions flags businesses and restricts their expansion plans as countries do want to let businesses with weak compliance operate within their jurisdictions.

Conclusion

For effective compliance with AML/TFS laws, businesses must align both domestic and international sanctions lists to ensure that they screen their customers, partners, and suppliers against the relevant sanction lists. Sanctions screening software can help automate this process and streamline compliance operations.

Related Posts

Role-Specific AML/CFT/CPF Compliance Training

Role-Specific AML/CFT/CPF Compliance Training

Role-Specific AML/CFT/CPF Compliance Training

Role-Specific AML/CFT/CPF Compliance Training

The Federal Decree Law and Cabinet Decision on AML/CFT and TFS compliance requires businesses operating in the UAE to impart AML/CFT compliance training to their employees. The anti-money laundering, combating the financing of terrorism, and counter-proliferation financing (AML/CFT/CPF) compliance training allows staff to detect possible unusual or suspicious transactions, activities, and behaviour. In addition, these AML/CFT/CPF training programs ensure that the staff are well-qualified, well-trained, well-equipped, and well-aware of their responsibility to prevent and combat ML/FT threats.

Role-specific AML/CFT/CPF training programs aim to equip employees with the necessary knowledge and skills required to fulfil their roles and duties effectively within their organisation’s internal AML framework. This not only enhances the capabilities of the business in preventing and detecting risks but also helps the business from being exploited by criminals, maintains its reputation, and builds customer trust in the business.

The Role-Specific AML/CFT/CPF Compliance Training Program can be categorised as follows:

General Training to New Staff (Irrespective of their role/title)

Onboarding employees is a continuous process for any business or company. Thus, businesses need to ensure that new staff hired are given general AML training, irrespective of their role or responsibilities within the organisation.

  • Introduction of money laundering, financing of terrorism, and proliferation financing (ML/FT/PF) concepts and the AML/CFT/CPF legal framework. This would help staff members understand AML topologies, key AML international and national regulations and the impact of ML/FT/PF activities.
  • Explain the need to identify ML/FT/PF risks in order to safeguard the business against criminal activities.
  • Describe the obligation to report any identified suspicious activities and transactions to the MLRO so that the MLRO can take further action as required by law.
  • Explain the offence of tipping off to make them understand the importance of confidentiality and discretion in reporting suspicious activities (“tipping off”).

Frontline staff:

Frontline staff play a crucial role in the business’s AML/CFT strategy due to their role as the first point of contact with customers.

  • Explain the importance of the frontline staff in the regulated entity’s AML/CFT strategy and maintaining regulatory compliance. By helping them outline their responsibilities, they can understand AML measures and implement them effectively.
  • As frontline staff interact directly with customers, they must know internal policies and procedures in relation to KYC, CDD, and record-keeping, which helps them verify customer identities, assess risks, maintain accurate records, and keep compliance efforts.
  • Discuss and establish red flags and common ML/TF typologies. This will enable front-line staff to take a proactive approach to identify illicit activities and equip employees to be aware of transactions that deviate from normal behaviour.
  • Describe policies and procedures for reporting suspicious activities and transactions, as well as steps involved in filing the internal SAR/STR. Explain the tipping-off provisions so that they don’t end up informing their decision to file SAR/STR to suspicious customers and others.
  • Explain the concept of targeted financial sanctions and their purpose, the implications of non-compliance, and screening procedures. This will help employees better understand TFS obligations and prevent transactions with sanctioned individuals or entities.
  • Discuss strategies and guidelines for maintaining client relationships after filing a SAR/STR. This will help businesses in managing client relationships post-filing of a SAR/STR, which requires sensitivity.

Compliance Team:

Compliance Team plays a key role in supporting and facilitating communication across the entire office.

  • Explain the meaning of Ultimate Beneficial Owners (UBOs), their significance in due diligence, and the procedure to identify and verify UBO information. With such a program, AML/CFT compliance staff would be able to assess the risk associated with UBOs and ensure compliance with AML/CFT regulations.
  • Outline and discuss the procedure of Customer Due Diligence, Enhanced Due Diligence, and Customer Risk Assessment. As compliance staff is responsible for conducting these procedures, employees can effectively employ a risk-based approach to mitigating customer-related risks by understanding them.
  • Explain the purpose and scope of Targeted Financial Sanctions, identify sanctions lists, describe screening procedures, and the consequences of non-compliance. Understanding TFS is critical due to the role of compliance staff in preventing transactions with sanctioned individuals or entities.
  • Discuss the importance of ongoing monitoring of a business relationship and outline techniques and tools for the same. Compliance staff ensure ongoing monitoring; thus, with this training, they can promptly identify and evaluate potential risks and take action that may require further investigation.
  • Describe the organisation’s transaction monitoring procedures and explain automated and manual review procedures. Understanding transaction monitoring procedures enables staff to detect suspicious activities and patterns, allowing timely intervention and reporting.
  • Explain the regulatory reporting procedures around SAR, STR, HRC, HRCA, DPMSR, REAR, CNMR, PNMR, AIF, AIFT, RFI, and RFIT.
  • Explain the mandatory record-keeping requirements and types of records to be maintained, their storage and security-related aspects.

Managers:

Managers oversee the business environment and assign and assess what each employee is doing. Their role is crucial within AML compliance as they know the individual roles and responsibilities of employees.

  • Explain key AML/CFT laws and regulations, regulatory obligations specific to the organisation’s business operations, and the consequences of non-compliance. Such training is necessary due to the managers’ role in ensuring organisational compliance and creating a compliance culture.
  • Customise and provide specific training around AML/CFT compliance requirements, considering the nature of the business and the regulatory environment governing it. Such tailored training ensures that managers understand AML/CFT compliance requirements of the regulatory environment in which it operates.
  • Explain the purpose and benefits of the Enterprise-Wide Risk Assessment. A better understanding of conducting EWRA enables managers to identify, assess, and mitigate AML/CFT risks across all facets of the organisation’s operations.
  • Explain the purpose and scope of Targeted Financial Sanctions, identify sanctions lists, describe screening procedures, and the consequences of non-compliance.
  • Training around supervision of the overall compliance function and helping them understand the role of monitoring and AML measures in strengthening the AML/CFT compliance framework. This training is important as managers oversee the organisation’s compliance function, ensuring that AML/CFT policies and procedures are effectively implemented and adhered to.
  • Explain and describe the objectives for conducting health checks and internal audits. Managers would be better able to understand the importance of health checks and ensure that the required data is made available for the same. They would also be able to implement recommendations and corrective actions to address identified deficiencies.
  • Explain regulatory reporting requirements and discuss the implications of inaccurate or delayed regulatory reporting. This is important for timely and accurate reporting of AML/CFT activities to regulatory authorities, demonstrating transparency and compliance with regulatory obligations.
  • Insights into the AML software available in the market for compliance automation.

Compliance Officer/Money Laundering Reporting Officer (MLRO):

Compliance Officers (CO)/MLROs have the most important role as they work to combat financial crime in their businesses. Thus, for efficient implementation of AML frameworks within their organisation, businesses must conduct training for MLRO, which:

  • Elements of the latest National Risk Assessment (NRA) addressing the risks associated with the business sector, emerging typologies and guidance provided by the authorities.
  • Training on procedures for assessing and analysing internal Suspicious Activity Reports (SARs), Suspicious Transaction Reports (STRs), and other regulatory reports. This enables the MLRO to detect trends, patterns, and emerging risks.
  • Training focused on the guidelines for submission of regulatory reports on the UAE FIU’s goAML portal and tipping-off provisions so that MLRO understands any compliance gaps.
  • Training to keep abreast of AML/CFT regulatory changes and global best practices. With such training, MLRO would be able to enhance the overall capabilities of the business’s AML framework.
  • Compliance Officer’s duties towards the government and the employer.

Furthermore, businesses may conduct these programs online, in classroom training, or in hybrid mode. Each of these modes of training has its own speciality and advantages. Therefore, businesses must figure out which mode is suitable for which role for better performance.

About AML UAE

AML UAE can help your business empower your team against financial crime with role-specific AML/CFT/CPF compliance training. With our tailored approach, your business can equip your employees with the knowledge and skills to identify and mitigate risks effectively. Strengthen your business’s defences and uphold regulatory compliance with AML UAE training programs.

Related Posts