The heading of this piece may sound like it was ripped from the pages of the latest James Bond adventure. But with recent data breaches, shell companies, pending new regulations on data privacy and new regulations which impact financial institutions globally and the companies who serve them, there is a lot coming down the pipe in 2018.
Financial services and the vendors which support them work in a global economy. Data aggregators seemingly have non-public personal information (NPPI) data on citizens of most nations. The push to pay fintech, housing data, credit cards, securities and even luxury real estate sales all trigger a number of red flag risk concerns.
More recently, there has been huge strides to embracing blockchain technology in the movement of money. The goal to be able to move money as quickly as you can save a word document on your laptop with no middle processor in the way certainly offers some relief for those needing cash in a hurry. Therefore, with the movement of money, there will be the data components which are the digital footprints that are left behind in the tracks. The security of these footprints is of utmost concern since cybersecurity is reported as one of the key risks facing the financial services industry today.
Much has been said in the last few years around Knowing Your Customer (KYC). A financial institution must have a robust Customer Information Program (CIP) in place as part of their overall compliance management system. The approach is to help combat the transfer of funds into monetary vehicles to launder money made by illegal gains.
This year, as recently as January 12th, Treasury Secretary, Steven Mnuchin, stated that he was extremely concerned with the cyber and money laundering risk presented by the use of Bitcoin and emphasized that digital wallets had the same requirement to KYC in the use of Bitcoin transactions as a bank would conduct KYC Customer Due Diligence (CDD) on account opening activities.
KYC has been at the core of sound risk management principles for a long time. Obtaining and validating information by way of fraud reports, online sources, financial statements and state-issued identification has been a common best practice in account opening for mortgage transactions since I was in short pants.
Ask yourself these questions to prove why it’s important to know your vendor.
The Department of Treasury updated its Final Rules relating to the Bank Secrecy Act. The rules were updated to bolster CDD requirements in May 2016. The new beneficial ownership rule becomes effective on May 11th, 2018 so while this may be mainly focused on the term “Customer” this could bleed over into vendor customers or business customers of a specific service. You can read more regarding the latest update at the Fincen website.
Make sure you understand these terms/components related to this updated rule:
The Panama Papers event highlighted the fact that shell companies are used to hide cash, and often the identity of the true owner. The leaked documents identified more than 214,000 offshore entities and identified heads of state, known and suspected terror organizations and even famous musicians and movie stars who were involved. While some of these individuals may be looking for tax loopholes there is also a darker side to this when it applies to money laundering. While a link hasn’t been made to the beneficial ownership rule and the events leading up to the reported leak of the panama papers, it does highlight the need to look deeper in your due diligence efforts. Being associated with Panama Papers could only be perceived in a negative light.
This also highlights the importance of data security. The law firm identified for holding this data claimed that they had been hacked but the person “John Doe”, who is known to have leaked the information, claims to have been a disgruntled employee.
It’s no surprise that as risk increases new rules and best practices will emerge to help strengthen and clarify the changing regulatory compliance landscape. While the BSA/AML (Bank Secrecy Act/Anti-Money Laundering) policies are managed within the general compliance framework it’s apparent that the liaison between third party risk management and compliance can make great strides in improving the 4 pillars of AML compliance and further strengthen the CDD program.
Next, learn how, when and why to use an information security questionnaire. Download our infographic.