commonalities, money laundering, compliance, ethics 10 6-14
DESCRIPTION
Slides from the first part of the CFCS Prep Course presented Oct. 6 and covering financial crime commonalities, money laundering, and compliance.TRANSCRIPT
Part 1:
IntroductionFinancial Crime Commonalities
Money LaunderingCompliance
Ethics
CFCS Examination Preparation SeriesOctober 6, 2014
Presented ByBrian Kindle
Brian KindleExecutive Director
Association of Certified Financial Crime SpecialistsMiami, FL
Certification | News Guidance | Training | Networking
Global Private and Public Sector Community
The Mark of Knowledge and Skill The Designation the Times Demand
CFCS Certification
• Provide overview of material on CFCS exam
• Highlight key areas, subjects that appear on exam and suggestions of what to focus
• Offer exposure to practice questions that show structure of exam
Goals of CFCS Prep
About the Exam• 145 scenario based, four choice, multiple
choice questions
• Four hour exam session with no breaks, at one of over 750 testing centers or online proctored
• Passing rate is about 70%
• Results given immediately
Preparation Suggestions• Recommended three weeks of study, if you commit 6
– 8 hours a week
• Review manual in detail, including referenced materials in appendix
• Prepare based on your own strengths and weaknesses, but cover every section
Test-Taking Suggestions• Exam based on best practices, not necessarily your
best practices – step out of day to day job
• In many questions, remember to look for the best response, not any one that might be plausible
• Understand who you are in any given scenario, your abilities and limitations
Financial Crime Commonalities
CFCS Examination Preparation SeriesOctober 6, 2014
Defining Financial Crime and its Permutations
• Crimes that have money or economic advantage as goal
• Non-violent action resulting in unlawful taking, moving or disguising of money or other value by artifice, corruption or deception for benefit of perpetrator or another
• ACFCS does not include profit-motivated crimes, like drug and human trafficking at their source
• But, nearly all criminals become ‘financial criminal’ when they possess or control the criminal proceeds
The Financial Crime Spectrum• Money laundering• Fraud• Corruption • Tax evasion • Terrorist financing• International standards• Data security • Asset recovery • Sanctions • Compliance programs• Ethics• Money and commodities flows• Investigations
Globalization of Financial Crime
• FCPA, UK Bribery Act, GAC crackdown
• FATCA, IGAs, multinational tax enforcement
• OECD automatic financial account data exchange
• Global push against secrecy havens
• G20 call for greater financial transparency, cooperation
• FATF’s changing standards pointing to convergence
Technology and Financial Crime
• Cybercrime is increasing exponentially
• Interplay between cybercrime and other financial crimes – data breaches and fraud schemes, money laundering through virtual currencies, etc.
• Compliance and enforcement technology-driven
• Data analytics in transaction monitoring, investigations, customer due diligence
• Data security grows in importance for public, private sectors
Commonalities of All Financial Crimes• Require money laundering• Require a financial institution• Result in tax evasion • Have interface with a government agency• Create necessity to recover assets• Often involve multiple countries• Often involve public or private corruption
15
Benefits of Convergence
Regulatory expectations, emerging best practice Government agencies doing it Leveraging data, systems, tools to access and study data Common case management system Helps manage stakeholder interests, expectations Can produce better SARs All financial crime cases have AML component Many cases involve complicit employees; security, HR Broader career choices for staffs of converged units
16
Practical Considerations on Convergence
A single financial crime job family Sharing best practices Merge organizations or just work together? History and culture clash Skills – some units have skills others lack Managing internal stakeholders’ expectations Managing external stakeholders’ expectations
Money Laundering
CFCS Examination Preparation SeriesOctober 6, 2014
18
Overview and Definition
• Actions or conduct designed to conceal source, movement, control or ownership of money illegally derived
• Movement of money derived through legitimate means, but which is intended or destined to further a crime
• Common element of all financial crimes
19
Stages of Money Laundering• Placement• First step in the process• Infusion of criminal proceeds into traditional or non-
traditional financial institutions• Typically most vulnerable to detection at this point• Moving assets away from their source• Structured deposits• Changing currency into other financial instruments• Using non-bank institutions, like casinos• Complicity of banks, brokers or other institutions
20
Stages of Money Laundering• Layering• Separates criminal proceeds from source through layers of
transactions• Often involves multiple participants and entities, like shell
corporations, cross-border transactions• More layers, more difficult it is to trace funds to perpetrator• Wire transfers• Asset movement among entities perpetrator controls• Purchasing multiple financial instruments
21
Stages of Money Laundering• Integration• Puts laundered proceeds into legitimate economy to appear
legitimately derived, allowing funds to return to financial criminal
• Makes it difficult to distinguish legitimate, illegitimate funds• Detecting integration often requires informant, undercover
agent, forensic accounting. Examples:• Real estate investments• Trade-based money laundering• Loans, business arrangements among complicit entities
22
AML Compliance Programs
• Obviously better to prevent illicit funds from entering financial system than chasing them after the fact
• Key is robust anti-money laundering programs: • Customer due diligence measures, including ongoing due
diligence• Customer profiling and risk assessment• Automated transaction monitoring systems• Customer screening• Investigation of suspicious or atypical customer transactions
and behavior• Enhanced due diligence procedures for higher-risk customers
• Will be described in more detail in later section
23
Characteristics and Indicators of Money Laundering
• Key concept for CFCS exam - Many red flags are situation-specific, depend on type of organization, customer and scenario
• Key is to understand customer’s behavior, source of funds to establish “normal” behavior
• Create customer profile, compare activity, transactions against expectations and peer group
• Good KYC and customer due diligence programs, monitoring essential for detecting laundering
24
Characteristics and Indicators of Money Laundering
Potential red flags
• Account activity inconsistent with customer profile• Account operated by third party• Funds transfers from/to tax
haven• Funds transfers to offshore
jurisdictions with no rationale• Large cash transactions over
short period• Multiple deposits to account by
different people
• Multiple transactions on same day from different geographic locations• Many large deposits by ATM• Same home address for funds
transfers by different people• Structuring of transactions• Variations in spelling of names,
addresses• Withdrawing all or most funds in
short period
25
Money Laundering Methods and Vehicles
Financial Institutions, Intermediaries and Other Entities
• Correspondent Accounts• Private Banking• Securities Brokers• Insurance• Real Estate Agents• Precious Metal Dealers• Casinos• Gatekeepers: Lawyers, Accountants, Auditors, Notaries,
Others
26
Money Laundering Methods and Vehicles
Financial Vehicles and Value Transfer Systems
• International Trade Price Manipulation• Prepaid Cards• Mobile Money• Credit Facilities and Lending• Black Market Peso Exchange• Hawala
27
Money Laundering Methods and Vehicles
Structures to Conceal Beneficial Ownership
• Key concept for CFCS exam
• Goal of financial criminal is to control and use assets without being attached to them in identifiable way
• Understand a range of structures and how they can be used
Structures to Conceal Beneficial Ownership
Create layers
between assets and
owner
TrustsThird party holds
assets on behalf of beneficiary Shell
CompanyNo physical
presence, no operations
Shelf Company
“Aged” version of shelf company,
provides legitimacy
Private Investment Corporation or ”Offshore Company”
Nonprofits, charities and foundations
Fronts and Nominees
Bearer Bonds and Securities
29
Money Laundering Methods and Vehicles
Other structures relevant for exam
• Special Purpose Vehicles/Entities (SPVs/SPEs)• Mechanism to contain financial risk, but can also be used
to conceal debt – i.e. Enron
• Holding companies
• Have basic understanding of wide range of financial institutions, as you’ll be asked to step into their shoes – broker-dealers, MSBs, asset managers
30
Money Laundering and Beneficial Ownership
• Determining “ultimate beneficial ownership” is persistent issue in AML field
• Corporate registries are one key source
• Business data providers, open source intelligence can also be useful
• Increasing regulatory scrutiny, attention being focused on the issue
31
AML Compliance
• Exam questions focus on core compliance principles applicable to diverse fields• Customer identification programs• Risk assessment• Transaction monitoring• Ongoing KYC and periodic review• Exiting/terminating customer relationships
• Expect questions related to:• Filing SARs/STRs• Geographic risks of a customers• Proper steps for customer due diligence
• Don’t tip off the customer• Talk to the relationship manager• Understand source, origin and control
32
Money Laundering Trends and Technologies
• Money laundering risks in new technologies• Mobile payments• Digital currencies • Virtual worlds• Online banking and securities trading
• Money laundering schemes becoming more complex
• Facilitated by many institutions and intermediaries, including “gatekeepers”
33
Key Lessons
• Understand when money laundering takes place in a series of transactions
• Unraveling complex corporate structures, determining beneficial ownership is key to due diligence, investigations
• AML compliance relies heavily on customer profile, risk assessment, expected transactions and activity
• “Three stages” are useful way to frame, analyze suspicious activity
34
Practice Question
A compliance officer at a major insurance company has recently noticed a pattern of potentially suspicious transactions from a long-time customer. The customer is employed in a consulting position that requires her to travel internationally on an unpredictable schedule and she often resides overseas for extended periods.
The customer has several properties insured with the company for large amounts. In the past three years, she has overpaid her premiums numerous times and then requested a refund be issued.
Concerned that the customer may be laundering funds through the overpayment of premiums, the officer is investigating the transactions.
Which fact would BEST indicate money laundering may be taking place?
35
Practice Question
A. The customer often requests that refunds be made by wire transfer to banks outside of the country.
B. The customer makes the overpayments at different times of the year and in varying amounts.
C. The customer has recently taken out a sizeable new insurance policy on a commercial property with your company.
D. The customer has requested that refunds on excess premiums be made to an offshore corporation
36
Review Question
You are an AML officer at a local bank, which holds accounts for a variety of businesses in your region. Most businesses are tied to the tourism and hospitality industry, as the region is a major vacation destination during the summer months. Many accountholders are small businesses that deal primarily in cash.
You are investigating an alert produced by your transaction monitoring system on an account held by a local, family-owned restaurant located near one of the largest tourist resorts in the area. After reviewing KYC information on the account, you determine the family lives in a neighboring country.
Upon reviewing the account’s activity, you learn the following information. Which fact best supports the possibility that the restaurant account may be used for money laundering?
37
Practice Question
A. The restaurant makes large cash deposits into its account biweekly from June until early September.
B. The account shows a pattern of funds transfers each month to an account held at a bank in a neighboring country.
C. The restaurant’s account shows consistent deposit activity throughout the calendar year.
D. The restaurant’s cash deposits were made through a combination of counter and ATM deposits.
38
Review Question
You are investigating a Vietnamese clothing manufacturer that is allegedly laundering money for a human trafficking organization. Deposits to the manufacturer’s bank account totaled $4.5 million (USD) for the year 2012. All deposits originated from a single source, a shipping corporation in Panama that makes payments through a bank account in Riga, Latvia. Payments are received through wire transfers. They are always in varying amounts of dollars and cents and the SWIFT messaging always states that the payments are for a line of men’s suits. Which is LEAST likely to be a red flag for money laundering?
39
Review Question
A. The shipping company is located in Panama, but payments originate from a Latvian bank in Riga.
B. The payments are in varying amounts and their purpose is always the same in the SWIFT messaging.
C. Payments to the manufacturer are only received from a single customer in another industry.
D. The owner of the business who is the sole signatory of the bank account resides in another country.
Compliance Programs
CFCS Examination Preparation SeriesOctober 6, 2014
• Processes and controls to comply with laws, regulations, other requirements
• Regulatory structure becoming more complex, global
• Convergence moving toward unified “financial crimes risk management”
Overview of Compliance
Programs Within Compliance
• Governance– Analytics– Investigations– Intelligence– Customer Due Diligence– Compliance Audit/Quality Control
Governance
• Enterprise Risk Assessment• Gap Analyses• Creating/Reviewing/Delivering Training• Liaison to Regulators/Examiners and Internal
Audit• Liaison to External Consultants and Auditors
Investigations & Intelligence
• Investigations– Investigate unusual activity– Report on unusual activity• Investigate possible terrorist financing
• Intelligence– Analyze country risk– Analyze enterprise-wide financial crimes risk• Support foreign correspondent banking business
Analytics
• Tools for transaction monitoring• Analytics for enterprise-wide risk assessment• Analytics for customer risk rating• Tools for sanctions monitoring
Customer Onboarding/KYC
• Customer Due Diligence - “Know Your Customer”
• Customer Identification Program• Customer Monitoring/Periodic Review• Enhanced Due Diligence (High Risk)
• Size, structure, complexity and risks of organization are basis of compliance program
• Compliance program should include policies, procedures and controls
• Controls can be broadly divided into “preventive” and “detective”
Organizational Overview of Financial Crime Program
• Preventive controls include: • CIP and CDD programs• Appropriate training• Risk assessments, gap analysis• Providing line of business reporting, issue remediation• Senior management and board reporting• Liaison with audit, coordination of examinations
Organizational Overview of Financial Crime Program
• Detective controls include:
• Identifying suspicious activity through employee referrals or automated transaction monitoring, customer surveillance• Investigating identified unusual activities • Activity monitoring, predictive analytics• Monitoring employees, third parties• Screening, blocking, rejecting transactions and customers• Reporting • Exiting customer relationships • Compliance testing
Organizational overview of financial crime controls
Risk Assessment• Assessing risks allows understanding of vulnerability,
better resource allocation
• Company-wide assessment should consider
• Types of distribution channels used by business unit• Complexity of unit’s business model• Degree of change in business• Size and type of growth in the business
Risk Assessment
Key elements include• Methodology to quantify level of risk
• Methodology to quantify adequacy of controls
• Assessment of risk of each line of business
• Enterprise-wide assessment to identify systemic risk not apparent in a line of business
Sanctions Compliance• Laws or regulations of certain nations prohibit
conducting transactions or trade with certain national governments, entities and persons
• Sanctions are imposed by variety of enforcement agencies, international bodies• US Office of Foreign Assets Control• UN Security Council – “Consolidated List”• European Union• Other international bodies
Sanctions Compliance• Some sanctions compliance best practices include:
• Policies, procedures and processes to ensure full compliance with all sanctions prohibitions
• Awareness of different sanctions lists or orders organization is subject to
• Sanctions compliance risk assessment
Sanctions Compliance
• Leveraging screening, transaction monitoring to detect and prevent payments in violation of sanctions
• Training programs to all affected employees
• Testing and ongoing updating of lists, policies and procedures – sanctions regimes change constantly
Sanctions Compliance• Sanctions regimes related to accounts and financial
transactions vary based on jurisdiction, but most include provisions requiring institution to:• Freeze accounts and assets for individuals or entities
that match entry on sanctions list• Block transactions to/from sanctioned persons• Submit reports to authority responsible for
supervising sanctions regime• Do not notify sanctioned person
56
AML CycleOrganizational Risk
Assessment Identify and rate risks across the organization and within
lines of business
Customer Identification Program
Collect and verify information on a customer to confirm their
identity and nature of relationship
Customer Profile and Risk Assessment
Establish expected activity and transactions; create an initial
customer risk rating
Automated Transaction Monitoring
Establish alert thresholds, rules and scenarios based on customer profile and risk assessment
Customer ScreeningScreen customer against sanctions and watch lists; establish criteria
for ongoing screening of transactions
Investigation of Alerts and Incidents
Review any alerts generated on customer, file SARs or modify
customer relationship if necessary
Update and AuditCollect sampling on alert and
transaction data, reassess customer risk, renew KYC
information
High-Risk Customers
• Risk depends on product, geographic region. Examples:• Politically Exposed Persons (PEPs) and their associates• Casinos, securities brokers, dealers in precious metals, stones• Domestic, offshore shell companies• Casas de cambio, currency exchanges, money transmitters• Private investment companies (PIC) • International companies• Deposit brokers• Cash-intensive businesses• Foreign, domestic NGOS, charities• Gatekeepers - attorneys, accountants, etc.
High-Risk Products
• Examples:• Prepaid, payroll cards• “Payable upon proper identification” (PUPID)
transactions• Money remittances• Online banking• Private banking• Trust and asset management services• Monetary instruments
High-Risk Products• Other examples :• Foreign correspondent accounts: bulk currency shipments,
pouch activity, and payable through accounts (PTA) • Trade finance • Services to third party payment processors or senders• Foreign exchange• Special use or concentration accounts • Loans secured by cash collateral and marketable securities • Non-deposit account services, such as non-deposit
investment products and insurance
High-Risk Jurisdictions, Geographic Areas
• Understanding specific money laundering, terrorist financing, corruption, fraud risks of jurisdictions is essential for compliance
• Organization should establish methodology that may include
• Sanctions, terrorist financing lists – OFAC, EU, UN• Jurisdiction's overall reputation – Corruption Perceptions
Index, reports by state departments• Jurisdiction’s adoption of FATF, other international
standards• Regional risk inside a particular jurisdiction
Customer Onboarding and Monitoring
Account opening procedures
Best practices include: • Gathering, verifying, authenticating customer ID materials
through paper documents, electronic verification• Clarifying services customer requests• Screening against sanctions lists, watch lists, PEP lists• Documenting normal, expected activity, including occupation
and business • Documenting relationship with institution or organization,
including all lines of business, subsidiaries
Customer Identification Program (CIP)
• Usually required by jurisdiction’s laws, regulators
• ID information must be collected at account opening, verified within reasonable time after opening
• Verify identity prior to large currency transactions, purchasing certain financial instruments, or ordering wire transfers
• May require identification of beneficial owners in some jurisdictions, particularly legal entities
Enhanced Due Diligence
• For high-risk services, customers, jurisdictions
• Examples include: • Identifying and verifying beneficial owners • Additional investigation of source of funds• Verification of customer, business information through
third-party sources • Augmented transaction monitoring• Thresholds on transactions• Senior management approval of customer relationships,
certain transactions
Employee Onboarding and Monitoring
Best practices for effective “know your employee,” onboarding:
• Assessment begins during interview process• Background screening, especially for criminal history• References and employment history
• Gathering and verifying employee identification materials • Screening employee against sanctions, watch, PEP lists
Employee Onboarding and Monitoring
Best practices for effective “know your employee,” onboarding:
• Providing new employees with organization's written ethics policy, code of conduct
• Appropriate training for position, including regulations and web-based or classroom training with appropriate scenarios
• “Hotline“ for anonymous reporting, direct reporting to compliance that does not go through business lines
Employee Onboarding and Monitoring
Best practices for ongoing employee monitoring:
• Regularly scheduled background screening• Automated exception reports, review of log files• Regular reviews and updates on the company’s ethics
policies and ethical compliance culture• Regular communication reinforcing standards• Ongoing employee training • Selective review of email, electronic communications
for high-risk employees
Transaction Monitoring
• Automated system, either proprietary application or vendor-provided, for ongoing transaction, customer and entity data
• Detection typically accomplished through implementation of financial crime scenarios in two broad categories:
• Rules-based scenarios - identify patterns of behavior related to known financial crime typologies or red flags• Statistical profiling scenarios - identify unusual activity by
modeling typical or expected activity profiles for a specific customer or type of customer and identifying outliers
Transaction Monitoring
• More advanced systems incorporate hybrid of rules-based, statistical approaches
• Transaction monitoring can also incorporate third-party data sources
• As transaction and data volumes grow, analytics becoming increasingly important
• Automatic monitoring no substitute for experienced human supervision, direction
Transaction Monitoring
• False positive – Transaction or behavior that is not suspicious incorrectly flagged as suspicious by monitoring system
• False negative – Transaction or behavior that is actually suspicious or indicative of financial crime that is NOT flagged by transaction monitoring system
• Goal of auditing or “tuning” monitoring system should be to reduce both, but false negatives are priority
Key Lessons
• Customer due diligence, profiling and risk assessment are vital to effective compliance programs
• Essential to establish expected customer behavior, transactions to detect suspicious activity
• Transaction monitoring systems are key compliance control – understand basics of how they work
• Understand factors that should be included in risk assessments, key parts of the methodology
• Compliance programs are cyclical and ongoing – each step feeds into the next
Practice Question
• A small regional bank recently started using a new transaction monitoring tool that utilizes custom scenarios to identify activity defined by the Financial Crimes Compliance team. There are five scenarios that are live in production. The Analytics team in Financial Crime Compliance Unit researched scenarios and is ready to recommend possible changes to the scenarios to management. Which scenario(s) should the Analytics team recommend making changes to first?
Practice Question
A. Scenario A that generated 100 alerts in the past 3 months and 50% of those were deemed suspicious and suspicious transaction reports were filed.
B. Scenario B that generated 180 alerts with a 95% false positive rate.
C. Scenario C that generated no alerts and there appears to be a problem with the data mapping.
D. Scenarios D and E that were put into production in the last 30 days to address a matter requiring attention from a regulator.
Practice Question
Answer A is incorrect and appears to be a well performing scenario. It is generating alerts and the percentage deemed suspicious is reasonable.
Answer B is incorrect because while false positive rate is far too high, it is generating alerts and some are deemed suspicious. The false positive rate is an issue that must be addressed, but this scenario is not the one that needs to be addressed first. There will often be scenarios on the live exam that require picking the best answer. In this case, this is not the best answer.
Practice Question
Answer C is correct as it is clearly a broken scenario since no alert was generated. That there appears to be a problem with the data mapping reinforces the conclusion that this scenario must be addressed first.
Answer D is incorrect as there is no evidence the scenarios are not performing as expected.
Practice Question
A financial services company in the European Union (EU) discovers that one of its customers is a confirmed match to a name on a designated entity list from a European Commission sanctions regime. Which step should the financial services company take?
Practice Question
A. Place a block on account transactions and notify the customer to satisfy the EU's Personal Privacy Protection Regulations.
B. Immediately freeze all accounts of the matching customer.
C. Freeze the accounts of the matching customer and any of their associates.
D. Immediately block any outgoing transfers from the matching customer accounts and notify the EU Committee on Sanctions
Practice Question
Answer A is incorrect, as under the EU and other sanctions regimes, sanctioned customers should not be notified in the event of a frozen account or blocked transaction.
Answer B is correct, as this is a required step to take for an account that match sanctions list entries under the EU sanctions regime
Answer C is incorrect. Only accounts that match individuals or entities on the sanctions list should be frozen. The institution should not extend the freeze to any affiliates unless they match entries on the sanctions list.
Answer D is incorrect as it is an incomplete response by the financial institution. The institution should freeze the account, not just block outgoing transactions. Also, the EU Committee on Sanctions does not exist.
78
Practice Question
The anti-money laundering officer at a bank has determined that there are three business accounts at the bank that are conducting related high velocity transactions that do not match the profile for the stated business activities of the account. Further investigation determines that the signatories of the three accounts were joint defendants in a civil fraud lawsuit ten years earlier.
Which action would be most appropriate for the anti-money laundering officer at the bank to take?
79
Practice Question
A. Contact a law enforcement agency and report his suspicion that the accounts may be part of a fraud scheme.
B. Arrange individual meetings with the account holders and inquire about the transactions.
C. Prepare a Suspicious Activity or Transaction Report (i.e., SAR or STR) and file it with the Financial Intelligence Unit (FIU) in the bank’s jurisdiction.
D. Freeze the accounts until further investigation can be made.
Ethics
CFCS Examination Preparation SeriesOctober 6, 2014
81
Overview
• There is no one accepted international standard
• Ethical standards for different professions and organizations – compliance, regulation, enforcement, law, investigation, etc.
• Financial crime professionals confront numerous ethical risks
• “If you have to ask about it, it’s probably wrong.”
82
Duties to Client
• Financial crime specialist owes highest duty of honesty, transparency and professionalism to constituents, client, organization, colleagues
• Identifying who is your client in broad terms, acting in their best interests is key to ethical behavior
• Does not permit unethical or illegal behavior to further “best interests” of client
83
Conflicts of Interest
• Take variety of forms – personal interests, current and past clients, multiple clients
• Maintaining ethical standards relies on finding fair and equitable resolution to conflicts
• In most cases, one client’s interests should not be privileged over another
84
Conflicts of Interest
• Organizations should screen for conflicts of interest at the start of relationships:
• Assess services, activities, types of employees to identify areas where conflicts of interest may arise
• Implement written disclosure policies• Designate conflict of interest officer or committee• Create “conflicts of interest database”• Training programs for employees on conflicts of
interest and their ethical resolution
85
Conflicts of Interest • Conflicts should be recognized early in relationship
• If not, timely response is required, which can include:
• Promptly disclosing to past or present colleagues, clients or organizations the nature of a potential conflict of interest
• Asking these persons and organizations to waive conflicts of interest that may exist, if it is appropriate
• Creating an information wall or other safeguards to assure that persons who were involved with a prior matter will not see or have access to files from the new matter, and will not participate in the new matter
• Declining to accept the prospective matter or case
86
Data and Privacy Concerns
• Financial sector professionals often have access to sensitive financial, personal information
• Organizations need policies and procedures to ensure information of customers, clients, and other parties is managed ethically
• “Information barriers” to separate sensitive data and reduce potential for conflicts of interest
• Multi-tiered access systems to limit information to essential staff• Processes to end relationships and purge or delete information
87
Ethics Policies and Procedures
• Code of ethics
• Employee training, ethics policies
• Confidential reporting, escalation policies
• Commitment, communication from top leadership
88
Key Lessons
• Acting in client’s best interests guides ethical behavior
• Information barriers are essential safeguard at financial institutions, other organizations
• Conflicts of interest are common ethical dilemma; understand how they can arise and how to resolve them
89
Review QuestionYou are part of a committee helping to review your organization’s ethics policies and procedures. As part of the review, you have been asked to make recommendations.
What is one recommended policy you should include?
A. Senior management approval for all new customer relationshipsB. Suspension or dismissal of any employees with conflicts of
interest C. Reporting of ethical violations that is escalated through business
linesD. Monthly messages on ethical policies and issues from senior
management
Your Questions
Thank you for attending
Next Session is Friday, October 10, 12:30 PM ET