Sanctions Screening Flashcards

1
Q

Why is it necessary for a financial institution to review its whitelists regularly?

A

A staffer may intentionally add a sanctioned individual or institution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three types of SWIFT messages?

A

”* MT103 - Goes to the beneficiary bank, giving instructions to the receiver of the transferred funds.
* MT202 - Does not have fields to include the originator and beneficiary information (sequence B), leaving intermediary banks blind to the details behind the transaction.
* MT202COV - Required since 2009. it contains a sequence B field. Sequence B information must be identical to the same fields of 59 and 59a of the underlying MT103 to allow for the identification and screening of the underlying parties.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which types of SWIFT messages do banks usually send together?

A

MT103 and MT202COV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which occurs as a part of name screening?

A

A firm’s entire customer database is screened by automatic screening tools on a periodic basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Automated screening tools need to be configured correctly and then updated regularly to reflect:

A

new types of sanctions and revised regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following represents a cost of automated screening when compared with manual screening?

A

Model validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The techniques of fuzzy logic and partial mapping are used to overcome the problem of:

A

flawed records and databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following statements describes threshold calibration in the context of AST software used for sanctions compliance?

A

Threshold calibration fine-tunes the percentage threshold for determining which alerts to generate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Scenarios are used in sanctions screening to:

A

use known typologies to enhance an AST’s ability to detect possible sanctions violations specific to an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

There are many sanctions lists, so it is important for a financial institution to:

A

identify which lists relate to its customers and the jurisdiction/geography of its business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following would constitute a screening software or filtering deficiency that weakens a firm’s compliance program?

A

The organization fails to include pertinent identifiers in the SSI list for designated, blocked, or sanctioned financial institutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is a common identifier of a legal entity?

A

Registered or any known operating address of a target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is an acceptable strategy used by financial institutions to manage the volume of hits and alerts generated by their ASTs?

A

Use whitelists and create more specific scenarios and rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In sanctions payment screening, the Society for the Worldwide Interbank Financial Telecommunications (SWIFT) code is:

A

a reliable provider of financial messaging services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How are SWIFT payment messages predefined?

A

By format for type of commercial activity and numbered, set fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following describes a strategy to help overcome the challenges posed by naming conventions, transliteration, and romanization?

A

Screening analysts should receive name matching training on the cultural naming conventions of global names.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is an identifier on the Denied Persons List of individuals and entities whose export privileges have been denied by the BIS?

A

Types of goods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

One of the challenges of trade-related screening related to documentation is:

A

it can be provided in formats that require manual review.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You are onboarding a customer from a low-risk jurisdiction whom you have been told does extensive business in the former Soviet Union. You screen the customer against the sanctions lists and do not find the customer to be listed by OFAC or any other sanctions regimes. Which of the following would be the most appropriate action to take?

A

Ask the customer to provide the names of those entities that it expects to transact with, and screen those entities for sanctions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which scenario commonly triggers a sanctions investigation?

A

Your screening tool discovers a possible name match between the customer and a sanctions target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following may preclude further investigation?

A

Simple checks to discount the match

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following is a key identifier for an individual?

A

Date of birth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following is a key identifier for a legal entity?

A

The legal entity’s registered or corporate name and registration number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In assessing the appropriate response to sanctions alerts, investigators commonly use which of the following tools?

A

Five-step decision tree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which action is part of an appropriate response to sanctions alerts?

A

Determining the types of sanctions that are applicable to the activity

26
Q

When is it important to record and document the findings of an investigation?

A

Always; every step of every investigation must be recorded and documented.

27
Q

Which statement is true of sanctions lists?

A

More than one sanctions list might pertain to one individual or legal entity.

28
Q

In general, what is the role of screening in an effective sanctions compliance program?

A

Screening involves checking information obtained about a person, entity, goods, or services against sanctions lists that prohibit making funds or financial services available and/ or restrict or prohibit trade in certain goods or services.

29
Q

What are alerts within Know Your Customer procedures?

A

Within Know Your Customer procedures, alerts are potential discrepancies that are flagged, either manually or through an automated system, based on defined red flags and underlying typologies.

30
Q

What is the significance of a hit within the sanctions screening process?

A

Hits (potential matches or names that indicate possible sanctioned persons) may be consolidated into alerts.

31
Q

Who and what are the targets of sanctions screening?

A

The types of different business activities/parties that should be screened include, but are not limited to, brokers, agents, vendors and other intermediaries, trade finance and export-related activities, purchasing, order processing, distribution, and payment management and beneficial owners.

32
Q

What is a target match?

A

A target match, or true match, occurs when the name/identification of a party is the same as that of one named on a sanctions list.

33
Q

Describe the process of name screening.

A

The process of name screening occurs in real-time during the onboarding of new customers and prior to accepting a new customer relationship. Internal records (i.e., customer, counterparty, or related account party) are matched against a sanctioned list record, either manually or through an automated screening tool.

34
Q

How is payment screening different from name screening?

A

Payment screening is different than name screening (screening internal records against sanctioned list records) in that payment screening takes place with current customers and is performed before a payment or message is processed.

35
Q

What is an inequalities list?

A

An inequalities list is a list of words or names that automated screening tools often mistake as matches (such as Andrew and Andrea), thereby creating potential matches to targets named on sanctions lists.

36
Q

What is fuzzy logic?

A

Fuzzy logic is a matching technique that employs algorithms to increase the effectiveness of screening by overcoming problems such as similar, misspelled, or incomplete names and flawed records and databases.

37
Q

What is a partial match?

A

A partial match is a result generated by an automated screening tool, indicating the entity being screened is similar enough to the sanctioned entity based on fuzzy logic and potentially other identifying factors, such as date of birth.

38
Q

What are the two causes of a false negative screening result?

A

False negatives can be: 1. A hit that is identified during the screening process as a possible alert, but is dismissed, when in fact there is a match to a target named on a sanctions list. 2. Screened activity that would have generated a hit if the screening process had been calibrated to catch such activity, such as a target match that is unidentified because thresholds are too high.

39
Q

What causes a false positive screening result?

A

False positive screening results often result when the threshold percentage of the automated screening tool is set too low.

40
Q

What is threshold calibration?

A

Threshold calibration is a method of adjusting the thresholds within the algorithms in an automated screening tool to match a financial institution’s greatest areas of sanctions risk.

41
Q

How do scenarios help a firm detect sanctions violations?

A

Scenarios enhance an automatic screening tool’s ability to detect possible sanctions violations specific to an organization and detect red flags.

42
Q

Why is it important for a firm’s automated screening tool (AST) to be correctly and appropriately “mapped” to the firm?

A

ASTs may require mapping from the message to the AST to ensure it uses the proper screening methods. Conversely, if a field from SWIFT was incorrectly mapped, the result could be severe under-screening of the message.

43
Q

What should sanctions compliance team members know about a firm’s data, data flows, and data validation?

A

Compliance teams should work with IT to properly understand how data works within the firm, where data is stored, what data is available and the quality of the data. It is also important for team members to understand how data is being extracted (i.e., taken from one system, transformed or modified, and loaded or ingested between systems) to avoid a compliance breach due to lost or modified data.

44
Q

Give at least 4 examples of common identifiers for sanctions targets for individuals.

A

For individuals, the most common identifier is the name or names of a sanctions target. Other identifiers include date of birth, passports and national identification numbers, nationality, place of birth, country of residence, names of any entities or individuals with whom a target has been associated or linked, and other sanctions or penalties previously imposed against a target.

45
Q

List at least five mandatory sanctions lists that must be screened against.

A

Mandatory sanctions lists include: * Targets designated by the United Nations Security Council Resolutions (UNSCR). * Local sanctions regimes (depending on the country). * EU lists (if the firm is in Europe). * US lists, host country’s lists, lists of the financial institution’s parent company’s country (if the firm is a branch or subsidiary of an organization outside of the host country) * Lists of major jurisdictions with which the organization trades. * Lists of other neighboring countries, especially if the financial institution uses their currency.

46
Q

What is string matching?

A

String matching, or pattern matching, is an algorithm for efficient searching that involves finding occurrence(s) of a pattern string within another string or body of text.

47
Q

What is the difference between static and unstructured data in relation to a firm’s use of automated screening tools (ASTs)?

A

When using ASTs with static customer data, dual controls ensure that one person enters the name correctly and the other person checks it for accuracy. Thresholds may be higher when screening static data. When using ASTs with unstructured data, the messages can contain names and places with typographical errors and other mistakes because they were entered and sent from an outside institution.

48
Q

What is event-triggered monitoring?

A

Event-triggered monitoring is an internal control used to mitigate sanctions risks.

49
Q

What are the possible outcomes of assessing a hit?

A

An analyst’s review of a hit will result in one of the following outcomes: a target match, escalate to a case investigation or a false positive or a false negative.

50
Q

What is transliteration?

A

Transliteration is the conversion of text from one script into another—for example, a document written in Arabic characters that is converted into Cyrillic script.

51
Q

Define the process of romanization.

A

Romanization is the process of taking a different writing system (i.e., one that often does not use the Latin A–Z alphabet) and converting it into Latin script—that is, converting writing into the script that languages, such as English, are written in today.

52
Q

What does the Bank Secrecy Act’s (BSA’s) Travel specify regarding data transfer?

A

The Travel Rule requires the transmitting institution to include specific information in a transmittal order (e.g., name of transmitter, identity of recipient’s financial institution, etc.).

53
Q

What is the Denied Persons List (DPL)?

A

The DPL is a list, published by the Bureau of Industry and Security (BIS), of individuals, entities, and companies that have been denied export privileges, most commonly because they have violated the Export Administration Act.

54
Q

With regard to trade activities, what are the regulatory expectations regarding the parties screened?

A

With regard to trade activities, regulators require sanctions screening to be comprehensive and performed on all the parties involved in a trade transaction. Importantly, screening should not be limited to individuals or legal entities.

55
Q

Define dual-use goods.

A

Dual-use goods are the products or technology that can be used for both military and civilian purposes (e.g., missile technology, which can be used for both scientific research and military action).

56
Q

What are alerts within sanctions screening?

A

Within sanctions screening, an alert is a hit, or multiple hits, of an internal record checked against sanctions screening lists.

57
Q

What are some common fuzzy logic algorithms?

A

Fuzzy logic uses several common algorithms, including: * Phonetic: Reducing names to a key or code based on their pronunciation, so that similar-sounding names share the same key. * Edit Distance or Levenshtein: Examining how many character changes it takes to get from one name to another. * Equivalence and Non-Equivalence: Teaching the system through human feedback which similarities are equivalent and non-equivalent.

58
Q

How does threshold calibration relate to false negative and false positive results?

A

If threshold calibration (typically described as a percentage) is set too high, only a few names will match, and the potential occurrence of false negatives increases. If the threshold percentage is too low, the tool will produce an excess of results, many of which will be false positives.

59
Q

Give at least 4 examples of common identifiers for sanctions targets for legal entities.

A

For legal entities, common identifiers include registered or corporation name, registration number, registered or legal address or any known operating address, jurisdiction associated with the entity and/or its activities, names of associated entities or individuals, and website, email, telephone, and fax details.

60
Q

When does event-triggered monitoring occur?

A

Event-triggered monitoring occurs whenever relevant information about an existing customer (e.g., its jurisdiction of operation) changes, therefore requiring an interim review of information prior to a scheduled review.

61
Q

What does Financial Action Task Force (FATF) Recommendation 16 specify regarding data transfer?

A

FATF Recommendation 16 specifies the need for financial institutions to provide information about the originator of a payment, as well as the beneficiary. Under this recommendation, banks have a more explicit obligation to monitor the quality of data in the transactions they receive.