Anti Money Laundering (AML) & Combating Financing Terrorism ...

109
ANNEXURE of AGENDA- 1850(13) Anti Money Laundering (AML) & Combating Financing Terrorism (CFT) Policy Revised - 2015 (For Internal Use Only) National Credit and Commerce Bank Limited. Head Office NCC Bank Bhaban,13/1- 3/2 Toyenbee Circular Road, Motijheel Commercial Area, Dhaka-1000. Bangladesh.

Transcript of Anti Money Laundering (AML) & Combating Financing Terrorism ...

Page 1: Anti Money Laundering (AML) & Combating Financing Terrorism ...

ANNEXURE of AGENDA- 1850(13)

Anti Money Laundering (AML)

&

Combating Financing Terrorism (CFT) Policy

Revised - 2015

(For Internal Use Only)

National Credit and Commerce Bank Limited.

Head Office NCC Bank Bhaban,13/1- 3/2 Toyenbee Circular Road,

Motijheel Commercial Area, Dhaka-1000.

Bangladesh.

Page 2: Anti Money Laundering (AML) & Combating Financing Terrorism ...

Subj€rt: Approval for proposed Anti Money Laundering and Combating Finatrcing TerrorismPolicy Guid€lines Revised-2015 of the Bank nrenered hw (-enfrqt c6-"-rr"--^ ,,-,* ,^,.,n, ,

Bangladesh Bank through BFIU circular Numbet 04/2012 dated l6 seprember 2012 issued guiderines forthe financial institutions including banks to formurate poricies and procedure to mrnimize the risk ofMoneyLaundering and Terror Financing. The essences of the directives were to bring about much neededdiscipline and in the process establish risk management culture in the banking sector.

Inspection Teams of Bangradesh Bank conducted inspection of the Head office and submitted separatereports including the one on Anti Money Laundering rneasures with the advice to expedite compriance byinitially preparing draft AML and CFT policy for implementation in due course.

In order to comply with the dircctives and recognizing the facts that bank may be partrcurarly wtnerable tobeing used by the money launderer and tefor financing, it has become indispensable to view moneylaundering prevention and combat terror financing very seriously. With the passage of the MoneyLaundering Prevention Act,2012 and Anti Terrorism Act'2009 (amendment_20ll), it is mandatory for thebank to abide by the law of the land and should be guided by a policy to combat such crimes. In thisbackdrop the Central Compliance Unit (AML) ofthe bank has prepared and compiled Banks Anti MoneyLaundering and Combating Financing Terrorism policy in pursuant of BFIU Master crrcular No.l0/2014ofBangladesh Bank is conformity with the exclusive guidelines ofthe Bangladesh Bank.

The proposed AML and CFT Policy includes following essential features:

l- NCCBL AML and CFT Policy Guidelines.2- Senior Management Oversigh, Review3- Organization Structuro.4- Customer Due Diligence & ldentification procedures

5- AML & CFT Process.

6- Recognition & Reporting of CTR and STR7- Record Keeping.

8- Training and Awareness

9- Examplcs of Potential Suspicious Transactionsl0-Sanction Screening (tIl.{SCR, US-OFAC and BD list)

The proposed AML and CFT policy had been placed to the MANCOM for kind consideration. TheMANCOM in its 206th meeting held on 26.08.2015 went through the contents of the same and beingsatisfied recommended for submission to the Board ofDirectors ofthe Bank for approval.

Manaqement Recommendation: The proposed revised AML & CFT policy-2015 has been perused andreconmended by the Management for necessary approval ofthe Board ofDirectors ofthe Bank.

Accordingly the Policy guideline is how placed for kind consideration and approval of Board.

(9 Nccaonu

National credit and corr"r.l's"nk Li..nit"d. out*oo -tftOU,

Memo No. NCCB/HO/CCU-AML/ pOLICy/2o1 5 Dated: 27 August 2015

Jaead6{f Ch'orldra Debn athSr. Vice Pre-sident and DCAMLCO Deputy Managing Director and CAMLCO

Golam

I

j;::11.j-rJ:.,':I"'*".*"XA11s,i,l't"o,#"",o,*.uo: :lo".l"?_c:g_8: !E,prov"d rh" pd;;;i#;#

,sproposcd jnlhc nemo.

Page 3: Anti Money Laundering (AML) & Combating Financing Terrorism ...

Aclrnowledgment

Dear Colleagues

It is encouraging to state that Central Compliance Unit, AML of the Bank has prepared Bank's

Anti Money Laundering and Combating Financing Terrorism Policy Guidelines in pursuant ofBFIU Master Circular No.lO/2014 of Bangladesh Bank under exclusive guidelines of theBangladesh Bank. NCC Bank is vigilant against Money Laundering and Terrorist Financing in itsall shape and terms. It is our corporate stance to stand against any activities that make possiblemoney laundering or funding to terrorist for criminal activities. The Branch Managers are advisedto take the opportunity to create a line of defense against such heinous crimes and extendcooperation keenly & involve themselves in the AML and CFT Compliance process. This policywould help them in discharging responsibility ensuring that the Bank is not vulnerable to moneylaundering and terrorist financing. If the methods enumerated in this policy are followedmeticulously with proper understanding and perspective, then it would act as deterrent for them inbracing the unscrupulous elements out for using banking channel to serve their ends.

The Board of Directors and Management of the Bank expect that all Branches of NCC BankLimited, Division/ DepartmentlUnit of Head Office, Chittagong Area Office must comply with

AML and CFT Policy Guidelines Keeping in mind that any deviation, lapses & non-compliance ofAML and CFT related instructions will be viewed seriously by the authority.

Taking this opportunity I, on behalf of the Management place for record our sincere thanks to Mr.Jagadish Chandra Debnath, Principal, Training Institute who is also DCAMLCO of the Bank for hisrelentless effort in preparing a policy on such important topic. While preparing of the same, Bank's

CAMLCO and DMD Mr. Akhtar Hamid Khan has extended his valuable guidance to make it awholesome one and his contribution also deserves appreciation from the management. I would alsolike to appreciate supports of all concerned towards on early completion of that policy.

I sincerely hope and believe that with the launching of the Policy the Bank would endurance

further.

With all best wishes

Sincerely Your's

Golam afiz AhmedManaging Director and CEO

=

Page 4: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 1

List of Acronyms

ACC Anti Corruption Commission

AML Anti-Money Laundering

AMLD Anti-Money Laundering Department of Bangladesh Bank

APG Asia Pacific Group on Money Laundering

ATA Anti Terrorism Act

ATO Anti Terrorism Ordinance

AAMLCO Area Anti Money Laundering Compliance Officer

BB Bangladesh Bank

BAMCO Branch Anti Money Laundering Compliance Officer

BDT Bangladesh Taka

BFIU Bangladesh Financial Indigence Unit

CCU Central Compliance Unit

CAMLCO Chief Anti-Money Laundering Compliance Officer

CDD Customer Due Diligence

CAP Customer Acceptance Policy

CFT Combating the Financing of Terrorism

CTC Counter Terrorism Committee

CTR Cash Transaction Report

DEA Drug Enforcement Agency

DDR Due Diligence Repository

EDD Enhanced Due Diligence

FATF Financial Actions Task Force

FATCA Foreign Accounts Tax Compliance Act

FCBs Foreign Commercial Banks

FIU Financial Intelligence Unit

FSRB FATF Style Regional Body

GoB Government of Bangladesh

ICRG International Cooperation and Review Group

IOSCO International Organization of Securities Commissioners

KYC Know Your Customer

MER Mutual Evaluation Report

ML Money Laundering

MLPA Money Laundering Prevention Act

MLPO Money Laundering Prevention Ordinance

NCC National Coordination Committee on AML/CFT

NCCT Non-cooperating Countries and Territories

OFAC Organization of Foreign Asset Control

PEPs Politically Exposed Persons

STR Suspicious Transaction Report

SAR Suspicious Activity Report

TF Terrorist Financing

TP Transaction Profile

UNSCR United Nations Security Council Resolution

Page 5: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 2

TABLE OF CONTENT

CHAPTER- I

AML & CFT POLICY FUIDELINE

Chapters Topic Page Number

1.0 Introduction: 4 - 4

1.1 Meaning of Money laundering: 5 - 5

1.2 Offence of Money Laundering and Punishment: 5 - 5

1.3 Why Money Laundering is done: 6 - 6

1.4 How the Money Laundering is done: 6 - 7

1.5 Predicate Offences: 7 - 7

1.6 Powers and responsibilities of BFIU of Bangladesh Bank: 8 - 9

1.7 Responsibilities of the reporting organizations in prevention of ML: 9 - 10

1.8 Why NCC Bank Limited must combat Money Laundering & Terrorist Financing: 10 - 11

CHAPTER- II

ORGANIZATIONAL STRUCTURE & POLICY STATEMENTS

2.1 Senior Management Commitment & Policy Statement: 12 - 12

2.2 Organization Structure: 12 - 12

2.3 Organogram of NCCBL for Implementation of AML CFT Program: 13 - 13

2.4 Formation of Central Compliance Unit (CCU) & Appointment of Chairman: 14 - 14

2.5 Qualifications of Chairman/CAMLCO:

14 - 14

2.6 The Chairman shall possess: 14 - 14

2.7 Functions & Responsibilities: 15 - 15

2.8 The Chief Anti Money Laundering Officer ( CAMLCO): 15 - 15

2.9 Roles and Responsibilities DCAMLCO: 16 - 16

2.10 Roles and Responsibilities BAMLCO: 17 - 17

2.11 Records and Maintenance of File (Branch level): 18 - 18

2.12 Manager AMLCO (Branch): 19 - 19

2.13 Account Officer/ Relationship Manager/ Staff Responsible for account opening:

19 - 19

CHAPTER- III

AML AND CFT PROCESS

CUSTOMER DUE DILIGENCE (CDD) & IDENTIFICATION PROCEDURES

3.1 Know Your Customer (KYC) Policies and Procedures:

20 - 24

3.2 Customer Acceptance Policy: 24 - 25

3.3 Customer Identification: 25 - 26

3.4 Internet or Online Banking: 26 - 28

3.5 Requirements in respect of Pre 2002 Accounts: 28 - 28

3.6 Provision of Safe Custody, Lockers and Safety Deposit Boxes: 28 - 28

CHAPTER- IV

MONEY LAUNDERING RISK MANAGEMENT PROCESSES

4.1 Know Your Customer (KYC) Procedures:

29 - 30

4.2 Transaction Monitoring & SAR.

31 - 31

4.3 Self Assessment of Money Laundering Prevention Activities

31 - 31

4.4 System of Independent Procedures Testing

32 - 32

CHAPTER- V

RECORD KEEPING

5.1 Statutory Requirements 33 - 34

CHAPTER- VI

RECOGNITION AND REPORTING OF CTR & STR:

6.1 Recognition of Cash Transactions: 35 - 35

6.2 Online CTR Submission 36 - 36

6.3 Recognition of Suspicious Transactions: 36 - 38

6.4 Reporting of Suspicious Transactions 38 - 39

CHAPTER- VII

SANCTION SCREENING OF UNSCR & OTHERS

7.1 Sanction Screening of UNSCR & Others 40 - 40

CHAPTER- VIII

TRAINING /AWARENESS & SENIOR MANAGEMENT REVIEWS

8.1 Training/Awareness & Senior Management Reviews 41 - 43

ANNEXURE

Annexure A BFIU BB Master Circular No. 10/2014 44 – (Enclosed 57 Page)

Annexure B Examples of Potentially Suspicious Transactions as per BB Guidance notes: 45 - 48

Annexure C Concise form of KYC For Walk- in and Online Banking Customer (depositor / withdrawer) 49 - 49

Page 6: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 3

Forewords,

Money Laundering (ML) and Terrorist financing (TF) can potentially damage and pose serious

threats to the integrity and stability of a financial system. To protect the Banking industry from

these threats, the Bank Authority has been working in partnership with financial institutions and

BFIU, government departments and other key stakeholders to put in place an effective regime

to fight against these crimes.

In response to the growing concern about money laundering and terrorist activities, the

international community has acted on many fronts Central Bank in an agreement over the issue

with the rest of the world, have been prompt to identify it as one of the Core Risks in our

Banking Sector. Consequently, In line with the international initiatives and standards,

Bangladesh has also enacted Money Laundering Prevention Act (MLPA), 2012 (repealing the

MLPA, 2009) and Anti Terrorism Act (ATA), 2009 (as amended in 2012). The new acts address

all the deficiencies identified in the 2nd Mutual Evaluation of Bangladesh conducted by APG in

2008 to determine the extent of its compliance, with the global standards. Both the Acts have

empowered Bangladesh Bank (BB) to perform the anchor role in combating ML&TF through

issuing guidance and directives for reporting agencies including NCC Bank (FIs), as defined in

section 2(g) of MLPA, 2012.

National Credit and Commerce Bank Ltd being an active member of the main stream banking

industry of the country, obviously remains obliged to comply with the directives of the Central

Bank towards a cause which has not been identified in isolation but collectively by various

International agencies including UN General Assembly. In this regard, over the past few years

the Basle Committee on Banking Supervision issued numerous statements of principles and

developed a set of Core Principles for Effective Banking Supervision as important guidelines to

eliminate the risks related to Money Laundering in the NCC Bank. Therefore, the subject policy

has been prepared in compliance with the spirit considered as standard principles aimed at

elimination of the menace and as conveyed under the BFIU Master Circular No.10/2014, dated

28.12.2014 to join in the forces against a common enemy of our Banking Sector.

The prevention of money laundering and terrorist financing requires collective effort from all

relevant government and private organizations. An effective AML/CFT regime can only be

implemented if all the major participants of the financial system comply with the country‗s

AML/CFT laws, rules and regulations.

NCC Bank Limited devises this ‗Revised‘ Policy Guideline in the line of Government ―The

Money Laundering Prevention Rules 2013‖ & ―The Anti Terrorism Rules 2013‖ Gazette

Notification Vide SRO. No357-Law/ 2013 (Ministry of Finance) & Vide SRO. No. 325-Law/ 2013

(Ministry of Home)

This Policy Guideline on ―Money Laundering Prevention‘‘ to be used in National Credit and

Commerce Bank Limited is prepared and DRAFT copy placed for kind approval of Board of

Directors

Central Compliance Unit (AML)

Head Office.

Dated: 25 August 2015

Page 7: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 4

CHAPTER- I

AML & CFT POLICY GUIDELINE

1. Introduction.

Money laundering is a financial crime & punishable offense. As per Money Laundering

Prevention Act 2012. the definition of money laundering is massive interpretive. It includes

earning/acquiring property through illegal way. This definition is so wide that offences like theft,

robbery, dacoity, cheating, forgery etc. Well defined in the Penal Code, also quality to be an act

of money laundering. Further, it includes illegal transfer, change of nature, and concealment of

property, acquired or earned through legal or illegal way. This part was added to stop transfer of

money by unauthorized channel namely ―Hundi‖. The problems of the second part of the

definition are that it imposes serious allegation of money laundering on innocent persons, in

particular wage earners. They transfer their hard-earned legal money to their family living in

Bangladesh by using some informal channels because the authorized channels are not found

reliable. This ‗wrong‘ may not be a crime at all as there is no intention to change black money

into white.

Meaning of money laundering is concealing or disguising the illicit money, source, location,

ownership or control of the proceeds of predicate offenses. It includes illegal transfer, change

of nature, and camouflage of property, acquired or earned through legal or illegal way or

assisting any person involved in the commission of the predicate offence to evade the legal

consequences of such offences or acquiring, possessing or using any property, knowing that

such property is the proceeds of predicate offences In order to ensure and monitor compliance

with the Money Laundering Act latest version Act No-02. Dated 20.02.2012 including record

keeping and reporting as per Circulars issued by Bangladesh Bank BFIU, National Credit &

Commerce Bank shall develop and administer a written Anti Money Laundering Policy

Guideline which shall have approval from the Board Of Directors of the bank. Such written

Policy shall send clear signals about the alertness of the institution and shall deter criminals

from using their facilities for money laundering purposes.

The policy shall include standards and procedures to comply with applicable laws and

regulations to reduce the scope of criminal abuse. Procedures shall address Know Your

Customer policy (KYC), Transaction Profile (TP) and identification procedures before opening

new accounts, monitoring existing accounts for unusual or suspicious activities, information

flows, Suspicious Transactions Reporting (STR), Cash Transaction Reporting (CTR) hiring and

training employees and a separate audit or internal control function to regularly test the

program's effectiveness. It shall include a description of the roles the Anti-Money Laundering

Compliance Officers(s)/Unit and other appropriate personnel will play in monitoring compliance

with and effectiveness of money laundering policies and procedures.

In addition, the policy shall emphasize the responsibility of every employee to protect the

institution from exploitation by money launderers, and shall set forth the consequence of non-

compliance with the applicable laws and the institution's policy, including the criminal, civil and

disciplinary penalties and harm to reputation that could ensue from any association with money

laundering activity.

Page 8: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 5

1.1 Meaning of Money Laundering

(a) ―money laundering‖ means –

i. knowingly moving, converting, or transferring proceeds of crime or property

involved in an offence for the following purposes:-

ii. concealing or disguising the illicit nature, source, location, ownership or control of

the proceeds of crime; or

iii. assisting any person involved in the commission of the predicate offence to evade

the legal consequences of such offence;

iv. smuggling money or property earned through legal or illegal means to a foreign

country;

v. knowingly transferring or remitting the proceeds of crime to a foreign country or

remitting or bringing them into Bangladesh from a foreign country with the intention

of hiding or disguising its illegal source; or

vi. concluding or attempting to conclude financial transactions in such a manner so as

to reporting requirement under this Act may be avoided;

vii. converting or moving or transferring property with the intention to instigate or assist

for committing a predicate offence;

viii. acquiring, possessing or using any property, knowing that such property is the

proceeds of a predicate offence;

ix. performing such activities so as to the illegal source of the proceeds of crime may

be concealed or disguised;

x. participating in, associating with, conspiring, attempting, abetting, instigate or

counsel to commit any offences mentioned above;

1.2 Offence of money laundering and punishment.–

(1) For the purposes of this Act, money laundering shall be deemed to be an offence.

(2) Any person who commits or abets or conspires to commit the offence of money laundering,

shall be punished with imprisonment for a term of at least 4(four) years but not exceeding

12(twelve) years and, in addition to that, a fine equivalent to the twice of the value of the

property involved in the offence or taka 10(ten) lacks, whichever is greater.

(3) In addition to any fine or punishment, the court may pass an order to forfeit the property of

the convicted person in favors of the State which directly or indirectly involved in or related with

money laundering or any predicate offence.

(4) Any entity which commits an offence under this section shall be punished with a fine of not

less than twice of the value of the property or taka 20(twenty) lacks, whichever is greater and in

addition to this the registration of the said entity shall be liable to be cancelled.

(5) It shall not be a prerequisite to charge or punish for money laundering to be convicted or

sentenced for any predicate offence.

Page 9: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 6

1.3. Why Money Laundering is done:

First- money represents the lifeblood of the organization/person that engages in criminal

conduct for financial gain because it covers operating expenses and pays for an extravagant

lifestyle. To spend money in these ways, criminals must make the money they derived illegally

appear legitimate.

Second- a trail of money from an offense to criminals can become incriminating evidence.

Criminals must obscure or hide the source of their wealth or alternatively disguise ownership or

control to ensure that illicit proceeds are not used to prosecute them

Third-the proceeds from crime often become the target of investigation and seizure. To shield

ill-gotten gains from suspicion and protect them from seizure, criminals must conceal their

existence or, alternatively, make them look legitimate

1.4. How the Money Laundering is done:

There is no single method of laundering money. Methods can range from the purchase and

resale of a luxury item (e.g. a house, car or jewelry) to passing money through a complex

international web of legitimate businesses and ‗shell‘ companies (i.e. those companies that

primarily exist only as named legal entities without any trading or business activities).There are

a number of crimes where the initial proceeds usually take the form of cash that needs to enter

the financial system by some means. Bribery, extortion, robbery and street level purchases of

drugs are almost always made with cash. These proceeds of crime have to enter the financial

system by some means so that it can be converted into a form which can be more easily

transformed, concealed or transported. The methods of achieving this are limited only by the

ingenuity of the launderer and these methods have become increasingly sophisticated. Despite

the variety of methods employed, money laundering is not a single act but a process

accomplished in 3 basic stages which are as follows:

Placement–

Physically depositing ―cash‖ into Banks and Non-Bank financial institutions such as currency

exchanges; converting ―cash‖ into other financial instruments such as by purchasing monetary

instruments (travelers‘ checks, payment orders); or using ―cash‖ to purchase expensive items

that can be resold. Launderers often seek to deposit cash into Banks and then transfer these

funds to Banks in regulated environments as ―clean‖. Smurfing– a form of Placement where

the launderer makes many small cash deposits instead of a large one to evade local regulatory

reporting requirements applicable to cash transactions. Launderers intend to avoid the

threshold of Cash Transaction for dodging the reporting to Regulatory or competent authority.

Layering–

Separating the proceeds of criminal activity from their source through the use of layers of

financial transactions (multiple transfers of funds among financial institutions, early surrender of

an annuity Manual on Prevention of Money Laundering and Combating Financing on Terrorism

without regard to penalties, cash collateralized loans, L/Cs with false invoices/bills of lading,

etc.) to disguise the origin of the funds, disrupt any audit trail, and provide anonymity.

Launderers want to move funds around, changing both the form of the funds and their location

in order to make it harder for law enforcement authorities to identify ―dirty‖ money.

Page 10: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 7

Integration–

Placing the laundered proceeds back into the economy in such a way that they re-enter the

financial system as apparently legitimate funds. The three basic steps may occur as separate

and distinct phases. They may also occur simultaneously or, more commonly, may overlap.

How the basic steps are used depends on the available laundering mechanisms and the

requirements of the criminal organizations

1.5. Predicate offences:

―predicate offence‖ means the offences mentioned below, by committing which within or

outside the country, the money or property derived from is laundered or attempt to be

laundered, namely:-

(1) corruption and bribery;

(2) counterfeiting currency;

(3) counterfeiting deeds and documents;

(4) extortion;

(5) fraud;

(6) forgery;

(7) illegal trade of firearms;

(8) illegal trade in narcotic drugs, psychotropic substances and substances

causing intoxication;

(9) illegal trade in stolen and other goods;

(10) Kidnapping, illegal restrain and hostage taking;

(11) murder, grievous physical injury;

(12) trafficking of women and children;

(13) black marketing;

(14) smuggling of domestic and foreign currency;

(15) theft or robbery or dacoity or piracy or hijacking of aircraft;

(16) human trafficking;

(17) dowry;

(18) smuggling and offences related to customs and excise duties;

(19) tax related offences;

(20) infringement of intellectual property rights;

(21) terrorism or financing in terrorist activities;

(22) adulteration or the manufacture of goods through infringement of title;

(23) offences relating to the environment;

(24) sexual exploitation;

(25) insider trading and market manipulation using price sensitive information

relating to the capital market in share transactions before it is published for

general information to take advantage of the market and attempting to

manipulate the market for personal or institutional gain;

(26) organized crime, and participation in organized criminal groups;

(27) racketeering; and

(28) Any other offence declared as predicate offence by Bangladesh Bank, with

the approval of the Government, by notification in the official Gazette, for the

purpose of this Act.

Page 11: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 8

1.6 Powers and responsibilities of BFIU Bangladesh Bank

In restraining and preventing the offence of money laundering.–

(1) For the purposes of this Act, Bangladesh Bank shall have the following powers and

responsibilities, namely:-

(a) to analyze or review information related to cash transactions and suspicious

transactions received from any reporting organization and to collect additional

information relating thereto for the purpose of analyzing or reviewing from the

reporting organizations and maintain data on the same and, as the case may

be, provide with the said information to the relevant law enforcement agencies

for taking necessary actions;

(b) ask for any information or obtain a report from reporting organizations with

regard to any transaction in which there are reasonable grounds to believe that

the transaction involves in money laundering or a predicate offence;

(c) issue an order to any reporting organization to suspend or freeze transactions of

any account for a period not exceeding 30 (thirty) days if there are reasonable

grounds to suspect that any money or property has been deposited into the

account by committing any offence: Provided that such order may be extended

for additional period of a maximum of 6 (six) months by 30 (thirty) days, if it

appears necessary to find out correct information relating to transactions of the

account;

(d) issue, from time to time, any directions necessary for the prevention of money

laundering to the reporting organizations;

(e) monitor whether the reporting organizations have properly submitted information

and reports requested by Bangladesh Bank and whether they have duly

complied with the directions issued by it, and where necessary, carry out on-site

inspections of the reporting organizations to ascertain the same;

(f) arrange meetings and seminars including training for the officers and staff of any

organization or institution, including the reporting organizations, considered

necessary for the purpose of ensuring proper implementation of this Act by

Bangladesh Bank;

(g) Carry out any other functions necessary for the purposes of this Act.

(2) If any investigation agency makes a request to provide it with any information in any

investigation relating to money laundering or suspicious transaction, then Bangladesh Bank

shall provide with such information where there is no obligation for it under any existing law or

for any other reason.

(3) If any reporting organization fails to provide with the requested information timely under

this section, Bangladesh Bank may impose a fine on such organization which may extend to a

maximum of taka 5 (five) lacs at the rate of taka 10 (ten) thousand per day and if any

organization is fined more than 3(three) times in 1(one) financial year, Bangladesh Bank may

suspend the registration or licence of the organization or any of its branches, service centers,

booths or agents for the purpose of closing its operation within Bangladesh or, as the case

may be, shall inform the registration or licensing authority about the fact so as to the relevant

authority may take appropriate measures against the organization.

Page 12: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 9

(4) If any reporting organization provides with false information or statement requested

under this section, Bangladesh Bank may impose a fine on such organization not less than taka

20 (twenty) thousand but not exceeding taka 5 (five) lacs and if any organization is fined more

than 3(three) times in 1(one) financial year, Bangladesh Bank may suspend the registration or

license of the organization or any of its branches, service centers, booths or agents for the

purpose of closing its operation within Bangladesh or, as the case may be, shall inform the

registration or licensing authority about the fact so as to the relevant authority may take

appropriate measures against the said organization.

(5) If any reporting organization fails to comply with any instruction given by Bangladesh

Bank under this Act, Bangladesh Bank may impose a fine on such organization which may

extend to a maximum of taka 5 (five) lacs at the rate of taka 10 (ten) thousand per day for each

of such non compliance and if any organization is fined more than 3(three) times in 1(one)

financial year, Bangladesh Bank may suspend the registration or license of the organization or

any of its branches, service centers, booths or agents for the purpose of closing its operation

within Bangladesh or, as the case may be, shall inform the registration or licensing authority

about the fact so as to the relevant authority may take appropriate measures against the said

organization.

(6) If any reporting organization fails to comply with any order for freezing or suspension of

transaction issued by Bangladesh Bank under clause (c) of sub-section (1), Bangladesh Bank

may impose a fine on such organization not less than the balance held on that account but not

more than twice of the balance held at the time of issuing the order.

(7) If any person or entity or reporting organization fails to pay any fine imposed by

Bangladesh Bank under sections 23 and 25 of this Act, Bangladesh Bank may recover the fine

from accounts maintained in the name of the relevant person, entity or reporting organization in

any bank or financial institution or Bangladesh Bank, and in this regard if any amount of the fine

remains unrealized, Bangladesh Bank may, if necessary, make an application before the court

for recovery and the court may pass such order as it deems fit.

(8) If any reporting organization is imposed fine under sub-sections (3), (4), (5) and (6),

Bangladesh Bank may also impose a fine not less than taka 10 (ten) thousand but not

exceeding taka 5 (five) lacs on the responsible owner, directors, officers and staff or persons

employed on contractual basis of that reporting organization and, where necessary, may direct

the relevant organization to take necessary administrative actions.

1.7. Responsibilities of the reporting organizations in prevention of money laundering:

(1) The reporting organizations shall have the following responsibilities in the prevention of

money laundering, (Section 25/1-4) namely:-

(a) to maintain complete and correct information with regard to the identity of its

customers during the operation of their accounts;

(b) if any account of a customer is closed, to preserve previous records of

transactions of such account for at least 5(five) years from the date of such

closure;

Page 13: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 10

(c) to provide with the information maintained under clauses (a) and (b) to

Bangladesh Bank from time to time, on its demand;

(d) if any doubtful transaction or attempt of such transaction as defined under

clause (n) of section 2 is observed, to report the matter as ‗suspicious

transaction report‘ to the Bangladesh Bank immediately on its own accord.

(2) If any reporting organization violates the provisions of sub-section (1), Bangladesh Bank

may-

(a) Impose a fine of at least taka 50 (fifty) thousand but not exceeding taka 25

(twenty-five) lacs on the reporting organization; and

(b) in addition to the fine mentioned in clause (a), cancel the license or the

authorization for carrying out commercial activities of the said organization or any

of its branches, service centers, booths or agents, or as the case may be, shall

inform the registration or licensing authority about the fact so as to the relevant

authority may take appropriate measures against the organization.

(3) Bangladesh Bank shall collect the sum of fine imposed under sub-section (2) in such

manner as it may determine and the sum collected shall be deposited into treasury of the State.

1.8 Why NCC Bank Limited must combat Money Laundering & Terror Financing:

Money laundering Terror Financing has potentially devastating economic, security, and social

consequences. Money laundering is a process vital to making crime worthwhile. It provides the

fuel for drug dealers, smugglers, terrorists, illegal arms dealers, corrupt public officials, and

others to operate and expand their criminal enterprises. This drives up the cost of government

due to the need for increased law enforcement and health care expenditures (for example, for

treatment of drug addicts) to combat the serious consequences that result. Crime has become

increasingly international in scope, and the financial aspects of crime have become more

complex due to rapid

a) Money laundering diminishes government tax revenue and therefore indirectly harms

honest taxpayers. It also makes government tax collection more difficult. This loss of

revenue generally means higher tax rates than would normally be the case if the untaxed

proceeds of crime were legitimate. We also pay more taxes for public works expenditures

inflated by corruption. And those of us who pay taxes pay more because of those who

evade taxes. So we all experience higher costs of living than we would if financial

crime—including money laundering—were prevented.

b) Terror Financing creates loss of wealth & lives; chaotic situation in the society and

results‘ devastating law & order lessens which ultimate affects in country economic as

well as social stillness. Terror Financing jeopardize democratic situation of the country.

c) Money laundering distorts asset and commodity prices and leads to misallocation of

resources. For financial institutions it can lead to an unstable liability base and to

unsound asset structures thereby creating risks of monetary instability and even systemic

crises. The loss of credibility and investor confidence that such crises can bring has the

potential of destabilizing financial systems, particularly in smaller economies.

Page 14: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 11

d) One of the most serious microeconomic effects of money laundering is felt in the private

sector. Money launderers often use front companies, which co-mingle the proceeds of

illicit activity with legitimate funds, to hide the ill-gotten gains. These front companies

have access to substantial illicit funds, allowing them to subsidize front company

products and services at levels well below market rates. This makes it difficult, if not

impossible, for legitimate business to compete against front companies with subsidized

funding, a situation that can result in the crowding out of private sector business by

criminal organizations.

e) No one knows exactly how much "dirty" money flows through the world's financial system

every year, but the amounts involved are undoubtedly huge. The International Money

Fund has estimated that the magnitude of money laundering is between 2 and 5 percent

of world gross domestic product, or at least USD 800 billion to USD1.5 trillion. In some

countries, these illicit proceeds dwarf government budgets, resulting in a loss of control of

economic policy by governments. Indeed, in some cases, the sheer magnitude of the

accumulated asset base of laundered proceeds can be used to corner markets -- or even

small economies.

f) Among its other negative socioeconomic effects, money laundering transfers economic

power from the market, government, and citizens to criminals. Furthermore, the sheer

magnitude of the economic power that accrues to criminals from money laundering has a

corrupting effect on all elements of society.

g) The social and political costs of laundered money are also serious as laundered money

may be used to corrupt national institutions. Bribing of officials and governments

undermines the moral fabric in society, and, by weakening collective ethical standards,

corrupts our democratic institutions. When money laundering goes unchecked, it

encourages the underlying criminal activity from which such money is generated.

h) Nations cannot afford to have their reputations and financial institutions tarnished by an

association with money laundering, especially in today's global economy. Money

laundering erodes confidence in financial institutions and the underlying criminal activity -

- fraud, counterfeiting, narcotics trafficking, and corruption -- weaken the reputation and

standing of any financial institution. Actions by banks to prevent money laundering are

not only a regulatory requirement, but also an act of self-interest. A bank tainted by

money laundering accusations from regulators, law enforcement agencies, or the press

risk likely prosecution, the loss of their good market reputation, and damaging the

reputation of the country. It is very difficult and requires significant resources to rectify a

problem that could be prevented with proper anti-money-laundering controls.

i) It is generally recognized that effective efforts to combat money laundering cannot be

carried out without the co-operation of financial institutions, their supervisory authorities

and the law enforcement agencies. Accordingly, NCC Bank Limited formulated this Policy

Guideline in the line of Government ― The Money Laundering Prevention Rules 2013‖ & ―

The Anti Terrorism Rules 2013‖

Page 15: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 12

CHAPTER- II

ORGANIZATIONAL STRUCTURE & POLICY STATEMENTS

2.1 Senior Management Commitment & Policy Statement:

Senior Management being the entity that runs the day-to-day affairs of the bank under the

policy guidelines of the Board of Directors shall collectively remain responsible for successful

implementation of the AML policy. Senior Management shall send the signal that the corporate

culture is as concerned about its reputation as it is about profits, marketing, and customer

service.

As part of its anti- money laundering policy, MD & CEO of NCCBL shall communicate through a

Statement to all employees that clearly sets forth its policy against money laundering and any

activity which facilitates money laundering, This will spell an strong commitment on the part of

senior management to comply with all laws and regulations designed to combat money

laundering. Other important issues of the statement shall include - All concerned are advised to

go through newly enforced ―Money Laundering Prevention Act -2012‖ & ―Anti Terrorist

(amendment) Act -2013‖ meticulously by the Executives & Branch incumbents. Please

disseminate the key points of above two laws to the subordinates for better compliance. - For

strengthening AML & CFT regime of the country, Bangladesh Bank‘s power to control &

imposition of penalties is significantly enhanced. In the newly enacted above two laws,

punishment against crime in relation to ML & TF is notably increased. Bangladesh Financial

Intelligence Unit (BFIU) in Bangladesh Bank is reformed & renamed. Internationally FATF

Recommendations 40+09 is reviewed & restructured in new 40 recommendations in the last

February 2012.

2.2 Organization Structure:

While forming CCU and appointing its Chairman, who will perform the functions of CAMLCO,

the unit shall be provided with additional members from different departments of Head Office

including a Member Secretary to facilitate coordination and smooth functioning in compliance

with the guidelines in this regard. To further support the Unit, respective branch managers shall

perform the duties as Branch Anti Money Laundering Compliance Officer (BAMLCO) and shall

report directly to Chairman, CCU at Head Office.

Whilst complying with rules and regulations is the responsibility of each individual of NCCBL in

the normal course of their assignments, the following individuals of Head Office and Branches

shall play the role as noted there against in the effectiveness of the AML program

Page 16: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 13

2.3 Organogram of NCCBL for Implementation of AML CFT Program:

Note:

MD: Managing Director. CEO: Chief Executive Officer.

CCU: Central Compliance Unit. CAMLCO: Chief Anti Money Laundering Compliance Officer.

AAMLCO: Area Anti Money Laundering Compliance Officer.

BAMLCO: Branch Anti Money Laundering Compliance Officer.

ICCD: Internal Control and Compliance Division.

MBD: Marketing and Branches Division. ITD: Information Technology Division.

Board of Director

MD & CEO

CAMLCO - DMD

Central Compliance Unit (AML & CFT)

Area AMLCO

Member

Secretary

Deputy CAMLCO Chairman CCU/ CAMLCO

Member ICC Division

Member CBD

Member IT Division

Member

MBD

Member

LM&RD

BAMLCO (All Branches)

Page 17: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 14

2.4 Formation of Central Compliance Unit (CCU) & Appointment of Chairman:

NCCBL shall set up a Unit at the Head Office in the name of Central Compliance Unit (CCU) in

order to develop, administer and maintain an anti-money laundering monitoring & compliance

policies. The Unit shall be headed by one with the Position Title of Chairman, CCU in the role

and function of Chief Anti Money Laundering Compliance Officer (CAMLCO) of the NCC Bank

Ltd. An ideal person/ executive for the purpose shall be a sufficiently senior person having the

authority to implement and enforce Anti-Money Laundering policies, procedures and measures

and will report directly to Senior Management/CEO and the Board of Directors. Appointment of

a competent & suitable candidate /executive which is an essential pre condition for combating

AML effectively according to the directives of regulatory bodies shall also serve as an indicator

of Senior Management's commitment and the importance it attaches in this regard.

2.5 Qualifications of Chairman/CAMLCO:

As per BFIU Circular letter No-02, Dated- 24 April‘2012 one Deputy Managing Director

will hold the post of CAMLCO and his main job is to address AML & CFT Compliance of

this bank. The Chairman or CAMLCO shall have basic academic qualification and a

working knowledge of the diverse banking products offered by the NCCBL. The person

shall be preferably having obtained relevant banking and compliance experience as an

internal or external auditor or regulatory examiner with exposure to different banking

products and businesses. He will have a minimum often years of experience, with a

minimum of three years at a Managerial /administrative level.

2.6 The Chairman shall possess:

Proven leadership and organizational skills and ability to exert managerial control;

Excellent communication skills, with an ability to clearly and diplomatically articulate

issues, solutions and rationale; an effective trainer to raise the level of awareness of

the control and compliance culture;

Solid understanding of AML regulatory issues and product knowledge associated

with a broad range of relevant financial services, banking activities;

High degree of judgment, good problem solving skills and be results oriented to

ensure sound implementation of control and compliance processes and

procedures;

Should have high personal standard of ethics, integrity and commitment to fulfilling

the objectives and protecting the interest of the Bank.

Must be familiar with the ways in which any of their respective business's products

and services may be abused by money launderers;

Must be able to assist their respective Institutions develop effective AML policies,

including programs to provide AML training to all personnel;

Must be able to assist their respective business assess the ways in which products

under development may be abused by money launderers in order to establish

appropriate AML controls before product is rolled out into the market.

Page 18: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 15

2.7 Functions & Responsibilities:

Managing Director & Chief Executive Officer (CEO) : Overall responsibility to ensure that

the Business has an AML program in place and that it is working effectively issuing ―

Memorandum on AML & CFT Compliances for all executives and Officers of the Bank.

Presenting Memo & issues to the Board related with ML & TF

2.8 The Chief Anti Money Laundering Officer (CAMLCO):

a. The Chairman of CCU/ CAMLCO will report direct to the CEO/ Board. And as his

responsibility, coordinate and monitor day to day compliance with applicable

money laundering laws, rules and regulations, AML Policy of the bank, the

practices, procedures and the controls required to be implemented in this regard.

b. Provide guidelines in conformity with bank's AML policy about account opening,

KYC procedures and ongoing account/transaction monitoring for detecting

suspicious transactions/account activity, and a written AML training plan.

c. Ensure that Bank's AML Policy is complete and up-to-date; maintain ongoing

awareness of new and changing business activities and products and identify

potential compliance issues that should be considered by the Bank.

d. Develop and maintain ongoing relationships with regulatory authorities, external

and internal auditors, Regional/ Branch/Unit Heads and Compliance resources to

assist in early identification of compliance issues;

e. Reported to the Chief Executive Officer, and the Board of Directors of the

institution when the suspicious activity is judged to represent significant risk to

the institution, including reputation risk;

f. Manage the process for reporting suspicious activity to Bangladesh Bank

authorities after appropriate internal consultation;

Page 19: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 16

2.8 Roles and Responsibilities DCAMLCO:

a. The DCAMLCO will report direct to the CAMLCO. & Board and as his responsibility to coordinate and monitor day to day compliance with applicable money laundering laws, rules and regulations, AML Policy of the bank, the practices, procedures and the controls required to be implemented in this regard;

b. Provide guidelines in conformity with bank's AML policy about account opening, KYC procedures and ongoing account/transaction monitoring for detecting suspicious transactions/account activity, and a written AML training plan;

c. To monitor changes of laws/regulations and directives of Bangladesh Bank that may require revisions to the Policy, and making these revisions;

d. Respond to compliance questions and concerns of the staff and advise regions/branches/units and assist in providing solutions to potential issues involving compliance and money laundering risk;

e. Ensure that Bank's AML Policy is complete and up-to-date; maintain ongoing awareness of new and changing business activities and products and identify potential compliance issues that should be considered by the Bank;

f. Actively develop the compliance knowledge of all staff, especially the compliance personnel. Develop and conduct training courses in the Bank to raise the level of awareness of compliance;

g. Develop and maintain ongoing relationships with regulatory authorities, external and internal auditors, Regional/ Branch/Unit Heads and Compliance resources to assist in early identification of compliance issues;

h. Assist in review of control procedures in the Bank to ensure legal and regulatory compliance and in the development of adequate and sufficient testing procedures to prevent and detect compliance lapses;

i. To manage the Suspicious Activity Reporting Process;

j. Reviewing transactions referred by divisional/ regional/ branch or unit compliance officers as suspicious;

k. Reviewing the Transaction Monitoring reports (directly or together with account management personnel);

l. Ensuring that internal Suspicious Activity Reports as per Bangladesh Financial Intelligence Unit of Bangladesh Bank Master Circular No. 10 dated 28 December‘ 2014. o are prepared when appropriate; reflect the uniform standard for "suspicious activity involving possible money laundering" established in the Policy; are accompanied by documentation of the branch's decision to retain or terminate the account as required under the Policy are advised to other branches of the institution who are known to have a relationship with the customer;

m. Reported to the CAMLCO, and the CEO of the institution when the suspicious activity is judged to represent significant risk to the institution, including reputation risk;

n. Ensuring that a documented plan of corrective action, appropriate for the seriousness of the suspicious activity, be prepared and approved by the Branch Manager;

o. Maintaining a review and follow up process to ensure that planned corrective action, including possible termination of an account, be taken in a timely manner;

p. Manage the process for reporting suspicious activity to Bangladesh Bank authorities after appropriate internal consultation;

Page 20: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 17

2.10 Roles and Responsibilities BAMLCO:

a. Ensure the account opening officer/ staff responsible for A/C opening performs Customer Due Diligence (CDD) prior opening an account;

b. Ensure that A/C opening officer has obtain all required document (KYC,TP, Source of Fund & National ID etc.) and completed the documentation satisfactorily. Also Ensure that all the A/C Risk Assessment is done;

c. Ensure that KYC Profile & Transaction Profile (TP) is completed for old, new customer & KYC for Walk-in Customers;

d. Monitoring / Ensure the documentary evidence is taken for large cash transactions;

e. Report any suspicious activity to branch Manager & if necessary to the CCU, AML Head Office;

f. Ensure that CTR (goAML & FIU) and STR submitted in time to CCU, HO;

g. Ensure that Branch submits all the returns to CCU, HO in time;

h. Communicate the any changes or development of AML/CFT to all Staff;

i. Ensure AML & CFT related Quarterly Meeting (Attached by KYC, TP, STR, and Record Keeping & Training);

j. Must ensure that Master Circular-10 from BFIU & circulars from CCU-AML is distributed among the concerned employees for meticulous compliance;

k. Ensure AML/CFT Training program to all the Branch Staff and communicate with the TI.

Page 21: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 18

2.11 Records and Maintenance of File (Branch level)

a. ML Core Risk Guideline of Bangladesh Bank;

b. AML & CFT Policy Guideline of NCC Bank Ltd;

c. Money Laundering Prevention Guidance Notes of Bangladesh Bank;

d. Copy of Anti Money Laundering Act. 2012 & Anti Terrorism Act-2009 (amendment -

2013) file;

e. Managing Director & CEO Memorandum on AML & CFT file;

f. Bangladesh Bank (AML Circular 10 & 22) & (BFIU Circular 02, 07 & 10) BFIU Circular Letter-01) file;

g. AML & CFT related all circulars of NCC Bank from CCU-AML. HO;

h. CTR File (FIU & goAML);

i. STR File & STR Indicator file (supplied to all staff);

j. Self Assessment Report file (cwiwkó- O, weGdAvBBD gv÷vi mvKz©jvi 10);

k. Independent Testing Procedure by ICC Inspection file (cwiwkó- P, weGdAvBBD gv÷vi mvKz©jvi 10);

l. High Risk Customer file & Review File;

m. KYC & TP review/ Monitoring File;

n. Account Information & Freezing Information by Bangladesh Bank File through CCU-

AML, HO;

o. AML Training File by NCC Bank/Other Bank and individual Training record File;

p. Monthly Meeting Resolution files in relation to Awareness development on AML & CFT;

q. Trade Based Money Laundering (Import/Export) Monitoring File & AML & CFT

Correspondence File;

r. Bangladesh Bank Inspection File and Compliance File (if any) (system check file);

s. Guard File of Account Opening Form (SB, CD, SND and FDR);

t. PEPs Account & Influential Person (local PEPs) Account File (if any);

u. Walk-in Customer & On line Customer–KYCC file;

v. UNSCR & OFAC Sanction Screening file.

Page 22: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 19

2.12 Manager AMLCO (Branch):

I. Manages the transaction monitoring process

II. Reports any suspicious activity to Branch Manager, and if

III. necessary the CAMLCO

IV. Provide AML training to Branch staff

V. Update policy with local AML regulations and communicate to all staff

VI. Submit Branch returns to CAMLCO through MAMLCO Ensures that the AML program is

effective within the branch/unit

VII. Final point of contact for any AML issues at the branch.

2.13 Account Officer/ Relationship Manager/ Staff Responsible for account

opening:

i. Perform due diligence on prospective clients prior opening an account

ii. Be diligent regarding the identification (s) of account holder and the transactions relating

to the account

iii. Ensure all required documentation is completed satisfactorily

iv. Complete the KYC Profile for the new customer

v. Ongoing monitoring of customer's KYC profile and transaction activity

vi. Obtain documentary evidence of large cash deposits.

vii. Escalate any suspicion to the Supervisor, Branch Manager and AMLCO

Page 23: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 20

CHAPTER- III

AML AND CFT PROCESS

CUSTOMER DUE DILIGENCE (CDD) & IDENTIFICATION PROCEDURES

Since bank deals in deposit and credit therefore, the curiosity obviously surface that are

depositor and to whom shall it make it available as investment/credit. NCCBL shall consider this

as the fundamental issue to be satisfactorily met first before proceeding into a business

relationship. Know Your Customer (KYC) policies and procedures which go a long way in

countering the threat of money laundering effectively, shall form the foundation upon which

NCCBL shall concentrate essentially to counter the menace.

Bank will use the Uniform Account Opening Form (AOF) - Individual, Joint or Organization,

Personal information, KYC, TP etc. Relationship officer must ensure the completeness of AOF

with proper documents as per MLP Circular No. 2, with satisfactory Introduction of Account

holder.

Assurance of protection of bank from customer and counterparty risks in terms of reputation,

operational and legal is to be completed. Any lapse can result in significant financial cost to

banks (e.g. through the withdrawal of funds by depositors, the termination of inter-bank

facilities, claims against the bank, investigation costs, asset seizures and freezes, and loan

losses etc.), as well as the need to divert considerable management time and energy to

resolving the problems arising out of it. Therefore, elaborate KYC Policies & Procedures shall

be enforced by NCCBL in joining forces to eliminate global menace identified as one of the

Core Risks In Banking sector.

3.1. Know Your Customer (KYC) Policies and Procedures:

Know Your Customer (KYC) compliance regulation has proved to be one of the biggest

operational challenges banks, accountants, lawyers and similar financial service providers

worldwide have had to overcome.

World-Check, the industry standard KYC compliance solution, provides an overview of KYC

compliance and its origins, and outlines the compliance mandate as applicable to banks,

accounting firms, lawyers and other regulated financial service providers – not just in the UK,

Europe and the USA, but all around the world. Relied upon by more than 3 800 institutions

worldwide, this KYC database solution provides effective legal and reputational risk reduction.

Why 'Know Your Customer?'

The 9/11 terrorist attacks on the World Trade Centre revealed that there were sinister forces at

work around the world, and that terrorists activities were being funded with laundered money,

the proceeds of illicit activities such as narcotics and human trafficking, fraud and organised

crime. Overnight, the combating of terrorist financing became a priority on the international

agenda.

Section 02 & 03 of the Master Circular 10, dated- 28 December 2014 requires all institutions to

seek satisfactory evidence of the identity of those with whom they deal. Unless satisfactory

evidence of the identity of potential customers is obtained in good time, the business

relationship at NCCBL shall not proceed.

Page 24: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 21

Again, when a business relationship is being established, the nature of the business that the

customer expects to conduct with the NCCBL shall be ascertained at the outset to establish

what might be expected later as normal activity. This information should be updated as

appropriate, and as opportunities arise. In order to be able to judge whether a transaction is or

is not suspicious, NCCBL needs to have a clear understanding of the business carried on by

their customers.

The bank/branches shall endeavor to satisfy itself that it is dealing with a real person (natural,

corporate or legal), and shall verify the identity of persons who are authorized to operate any

bank or investment account, or transact business for the customer. Whenever possible, the

prospective customer shall be interviewed personally.

The verification procedures needed to establish the identity of a prospective customer shall

basically be the same whatever type of account or service is required. The best identification

documents possible shall be to obtain from the prospective customer i.e. those that are the

most difficult to obtain illicitly. No single piece of identification can be fully guaranteed as

genuine, or as being sufficient to establish identity so verification at the POS( Point Of Service)

will generally be a cumulative process.

Section 12 of the BFIU master Circular- 10, Dated: 28 December 2014 requires that records of

the verification of identity must be retained for five (05) years after an account is closed or the

business relationship ended, NCCBL, shall, therefore, abide by it completely

KYC controls typically include below details:

Collection and analysis of basic identity information (CIP)

Name matching against lists of known parties (such as politically exposed person)

Determination of the customer's risk in terms of propensity to commit money laundering

or identity theft

Creation of an expectation of a customer's transactional behavior

Monitoring of a customer's transactions against their expected behavior and recorded

profile as well as that of the customer's peers.

In order to meet KYC compliance requirements, NCC Bank must:

Verify that customers are not or have not been involved in illegal activities such as fraud, money laundering or organized crime;

Verify a prospective client‘s identity;

Maintain proof of the steps taken to identify their identity [

Establish whether a prospective customer is listed on any sanctions lists in connection with suspected terrorist activities, money laundering, fraud or other crimes

Customer Due Diligence for PEPs & Influential Persons

FATF's in February 2012, the latest definition of politically exposed persons (PEP), revised from

2003, is as follows:

Politically Exposed Persons (PEP's) : individuals who are or have been entrusted with

prominent public functions by a foreign country, for example Heads of state or Heads of

Page 25: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 22

government, senior politicians, senior government, judicial or military officials, senior

executives of state owned corporations, important political party officials.

A person who is or has been entrusted with a prominent function by an international

organization refers to members of senior management, i.e. directors, deputy directors and

members of the board or equivalent functions.

A foreign person who has held any time in the preceding year a prominent public function

outside the United Kingdom, in a state or international institution

Members of courts of auditors or of the boards of central banks

Ambassadors, charges d‘affaires and high-ranking officers in the armed forces

Members of the administrative, management or supervisory bodies of state-owned

enterprises

Heads of state, heads of government, ministers and deputy or assistant ministers

Members of parliaments

Members of supreme courts, constitutional courts or of other high-level judicial bodies

The definition explicitly excludes middle-ranking or more junior officials.

Influencial Persons (IPS): individuals who are or have been entrusted domestically with

prominent public functions, for example Heads of State or of government, senior

politicians, senior government, judicial or military officials, senior executives of state

owned corporations, important political party officials.

Requirements for PEP apply to family members or close associates, any individual publicly

known, or known by the financial institution to be a close personal or professional associate.

FATF definition is not intended to include middle-ranking or more junior individuals.

AS PER Master Circular Branch incumbents will follow the Rules of Opening & operation of

PEPs account with HO, CCU-AML approval & Local Influential Persons account will be also

treated like as PEPs account.

Customer Due Diligence Framework.

Customer Acceptance Policy;

Customer Identification Procedures;

Monitoring of Transactions; and

Customer due diligence and record-keeping & Risk management

Bank should not keep anonymous accounts or accounts in obviously fictitious names. Bank

should undertake customer due diligence measures, including identifying and verifying the

identity of their customers, when:

KYC controls typically include below details:

AOF Information/ Individual or Beneficial Owner ( proprietor / Partner / Director) Full

particulars

Supporting Documents required for open Account – Copy attested.

Page 26: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 23

Collection and analysis of basic identity information (ID)

Satisfactory Introduction – Verification process of Introducer

KYC Preparation - Verification Reports of given information by the customer Address /

Business house / Showroom /Corporate Office.

Name matching against lists of known parties- PEPs / Sanction Individual /Entity.

Determination of the customer's risk in terms of propensity to commit money laundering

or identity theft – Risk Based Approached ( RBA) High risk Customer / Low Risk

Customer – Monitoring High Risk Customer

Sources of Fund / amount to be transacted in the Account - TP Transaction Profile

Creation of an expectation of a customer's transactional behavior

Monitoring of a customer's transactions against their expected behavior and recorded

profile as well as that of the customer's peers.

The systems create "alerts" which are then subject to manual due diligence or

Enhanced Due Diligence (EDD) investigative processes.

The customers due diligence (CDD) measures to be taken are as follows:

a) Identifying the customer and verifying that customer‘s identity using reliable, independent

source documents, data or information.

b) Identifying the beneficial owner (BO), and taking reasonable measures to verify the identity of

the beneficial owner such that the financial institution is satisfied that it knows who the beneficial

owner is. For legal persons and arrangements this should include NCC Bank taking reasonable

measures to understand the ownership and control structure of the customer.

c) Obtaining information on the purpose and intended nature of the business relationship.

d) Conducting ongoing due diligence on the business relationship and scrutiny of transactions

undertaken throughout the course of that relationship to ensure that the transactions being

conducted are consistent with the institution‘s knowledge of the customer, their business and

risk profile, including, where necessary, the source of funds.

e) NCC Bank should apply each of the CDD measures under (a) to (d) above, but may

determine the extent of such measures on a risk sensitive basis depending on the type of

customer, business relationship or transaction. The measures that are taken should be

consistent with any guidelines issued by competent authorities. For higher risk categories, NCC

Bank should perform enhanced due diligence. In certain circumstances, where there are low

risks, countries may decide that NCC Bank can apply reduced or simplified measures.

f) NCC Bank should verify the identity of the customer and beneficial owner before or during the

course of establishing a business relationship or conducting transactions for occasional

customers. Countries may permit NCC Bank to complete the verification as soon as

reasonably practicable following the establishment of the relationship, where the money

laundering risks are effectively managed and where this is essential not to interrupt the normal

conduct of business.

Page 27: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 24

g)Where the financial institution is unable to comply with paragraphs (a) to (c) above, it should

not open the account, commence business relations or perform the transaction; or should

terminate the business relationship; and should consider making suspicious transactions report

in relation to the customer. These requirements should apply to all new customers, though

NCC Bank should also apply this Recommendation to existing customers on the basis of

materiality and risk, and should conduct due diligence on such existing relationships at

appropriate times.

Customer Due diligence (CDD) for Correspondent Banking Relationship &

Foreign Remittance:

As per present Policy Guideline CDD to be done for each and every Correspondent Agents

both for accounting and correspondent relationship. Counter parties are to be assessed by

taking BFIU prescribed KYC format enclosed in the annexure of this guideline. Financial

Institution Division will procure & prepare KYC for each counterparty & assess their risk

exposures at least yearly basis & reviewed the relationship on the basis of their risk exposures

against ML/ TF. Sanction Screening for UNSCR/ OFAC or any least supplied by BFIU

Bangladesh Bank to be screened time to time & reviewed the relationship. In the same way

Foreign Remittance Department (FRPP) must take KYC/ KYE from the counter parties‘ entities

and also assess their risk exposures against ML/FT yearly basis. Both FID & FRPP will submit

a summery repot on Customer Due Diligence to CCU-AML half yearly basis.

3.2. Customer Acceptance Policy:

a) In accordance with the Bangladesh Bank Guidance Notes on Money Laundering Risk

Management all Bank have to prepare their own ‗Customer Acceptance Policy‘.

Customer is the main aspect for Bank Business. Bank customer is reasonably differing

from any other trade customer. Banker customer relationship is contractual and mode of

status depends on of nature of transactions. Increasing competition is forcing banks to

pay much more attention to satisfy its customer‘s needs. Our motto is to extend best

possible services to our customers. We are also aware that sometimes customers pose

the risk of Money Laundering and Financing of Terrorism to the Bank & NCC Bank .

b) A good bank needs a good customer‘s base for its development and growth on the other

hand a single unscrupulous customer can ruin the bank images. So there is a great deal

of importance Policy / Guideline under which a customer will be accepted to the bank.

If there any inadequacy or absence of KYC standards can result in serious customer

and counterparty risks, especially reputation, operational, legal and compliance risks.

Collecting sufficient information about our customers is the most effective defense

against being used as the medium to launder the proceeds of crimes and to finance the

terrorism through bank accounts.

c) As per Sec. 25 of Money Laundering Prevention Act, 2012 each bank requires to keep

satisfactory evidence of the identity of those it deals with and also requires making

necessary arrangement to prevent any transaction related to crimes as described in Anti

Terrorism Act. 2013(amendments). It is also the responsibility of each bank to identify

suspicious transactions of their customers with due care and diligence. Pursuant to

above legal bindings, Sec. 5.3 of Guidance Notes on Prevention of Money Laundering

issued by Bangladesh Bank and in connection with international standard the NCC Bank

Limited has developed its Customer Acceptance Policy as under.

Page 28: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 25

d) NCCBL shall follow clear customer acceptance policies and procedures, including a

description of the types of customers those are likely to pose a higher than average risk

to bank. Factors such as customers' background, country of origin, public or high profile

position, linked accounts, business activities or other risk indicators shall be seriously

considered at the approach to establish a relationship.

e) NCCBL shall adopt a graduated customer acceptance policies and procedures that

require more extensive due diligence for higher risk customers. However, it shall be

borne in mind that general public, especially those who are financially or socially

disadvantaged are not denied access on the simple pretext of pursuing a AML Policy.

On the other hand, quite extensive due diligence will be essential for an individual with a

high net worth whose source of funds is unclear. Decisions to enter into business

relationships with higher risk customers, such as public figures or politically exposed

persons shall be taken exclusively at senior management / manager level at the POS .

f) All employees should keep in mind that the customer identification process does not end

at the point of application. Once account relationship has been established, reasonable

steps should be taken by the branch from time to time to ensure that descriptive

information is kept updated. Bank Official must have continuous endeavor to update all

information of customer in ―Customer Database‖.

3.3. Customer Identification:

The customer identification process shall apply naturally at the point of service of all NCCBL

branches at the outset of the relationship. To ensure that records remain up-to-date and

relevant, officials at the POS shall undertake regular reviews of the existing records. At any

such review, if it is observed that bank/branch lacks sufficient information about the customer, it

shall take immediate steps to ensure that all relevant information is obtained as quickly as

possible.

While undertaking identification procedures following two elements shall be the purpose for such effort:

The physical identity. &

The activity undertaken.

Identification procedure for Individual Customers:

Where verification of identity is required, the following information shall be obtained from all individual applicants for opening accounts or other relationships, and shall be independently verified by the concerned Officials/ department/ branch.

National ID Card (Voter ID Card)

Passport Copy

Driving License

TIN Certificate

Birth Certificate

True name and/or names used;

Parent's names;

Present and permanent address;

Details of occupation/employment and sources of fund or income

For verification of the identity & address, one or more documents in original from the

followings to be physically checked:

Page 29: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 26

A recently issued original Utility Bill, Tax Assessment or Bank statement or Voter ID

Card/ Lists, Telephone

Directory, Current valid Passport, Valid Driving License, Certificate from Union Council

Chairman, Ward Commissioner or finally visiting home/office.

Identification documents which do not bear photographs or signatures shall not

normally be appropriate as sole evidence of identity. However, particular care shall be

taken in accepting documents which are easily forged or which can be easily obtained

using false identities.

In respect of joint accounts where the surname and/or address of the account holders

differ, the name and address of all account holders, not only the first named, shall

normally be verified in accordance with the procedures set out above. Any subsequent

change to the customer's name, address, or employment details of which the financial

institution becomes aware shall be recorded as part of the KYC (Know Your Customer)

process. This will be undertaken as part of good business practice and due diligence

under money laundering prevention procedures.

An introduction from a respected customer personally known to the management, or

from a trusted member of staff, may assist the verification procedure but does not

replace the need for verification of address as set out above. Details of the introducer

shall be recorded on the customer's file. Personal introductions without full verification

shall not be allowed and any influence from third persons including directors/senior

managers shall be considered breach of account opening procedures.

CDD for Wire Transfer Transactions:

Major money laundering cases have shown that criminals make extensive use of

telegraphic transfers (TT) and electronic payment and message systems. The rapid

movement of funds between accounts in different jurisdictions increases the complexity of

investigations. In addition, investigations become even more difficult to pursue if the identity

of the original ordering customer or the ultimate beneficiary is not clearly shown in a TT and

electronic payment message instruction.

Therefore, to dig out the trail in the event of such mischief concerned officials of AML

program and in general include accurate and meaningful originator (name, account number,

and where possible address) and beneficiary information (account name and/or account

number) on all outgoing funds transfers and related messages that are sent, and this

information shall remain with the transfer or related message throughout the payment chain.

Bank/Branch shall conduct enhanced scrutiny and monitor for suspicious incoming funds

transfers which do not contain meaningful originator information & banks for Wire Transfer

that is Cross-border wire transfer & domestic wire transfer.

The records of electronic payments and messages shall be treated in the same way as any

other records in support of entries in the account and kept for a minimum of five years.

3.4 Internet or Online Banking:

With the emergence of wide use of technology & "E" Services in banking and investment a new

dimension has been added in the activities of NCC Bank but at the same time has pushed the

institutions into a kind of vulnerability in respect of prevention of AML activities. NCCBL shall,

therefore, in respect of such banking activities apply utmost caution using Common Sense and

the guidance/ directives of Bangladesh Bank.

Page 30: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 27

Persons without Standard Identification Documentation:

With the passage of time it has been becoming a practice to conduct financial

transactions under a relationship with some financial institution as a matter of

transparency. Circumstances such as that may put socially or financially disadvantaged

like the elderly, the disabled, students and minors from obtaining financial services just

because they do not possess evidence of identity or address where they cannot

reasonably be expected to do so. In such situations, a common sense approach and

some flexibility without compromising sufficiently rigorous anti money laundering

procedures shall be adopted.

Identifications documents in such cases may be accepted on production of certified copy

of originals preferably having photographs on it from socially and professionally

accepted persons clearly indicating his position or capacity on it together with a contact

address and phone number.

For students or other young people, the normal identification procedures set out above

shall be followed as far as possible. Where such procedures would not be relevant, or

do not provide satisfactory evidence of identity, verification may be obtained in the form

of the home address of parent(s), or by making enquiries of the applicant's educational

institution.

For Minors, introduction by the family members or guardian who has an existing

relationship with the institution concerned will be acceptable.

Identification procedures for Corporate Bodies and other Entities:

Corporate entities and trusts are the most likely vehicles to be used for money laundering,

particularly when a legitimate trading company is involved. Particular care to be exercised to

verify the legal existence of the applicant and to ensure that any person purporting to act on

behalf of the applicant is authorized to do so. The principal requirement shall be to look behind

a corporate entity to identify those who have ultimate control over the business and the

company's assets, with particular attention being paid to any shareholders or others who

exercise a significant influence over the affairs of the company. Enquiries should be made to

confirm that the company exists for a legitimate trading or economic purpose, and that it is not

merely a "brass plate company" where the controlling principals cannot be identified.

Particular care shall be exercised when establishing business relationships with companies

incorporated or registered abroad, or companies with no direct business link to Bangladesh.

Such companies may be attempting to use geographic or legal complication to interpose a layer

of opacity between the source of funds and their final destination. In such circumstances,

bank/branch shall carry out effective checks on the source of funds and the nature of the activity

to be undertaken during the proposed business relationship. This is particularly important if the

corporate body is registered or has known links to countries without anti-money laundering

legislation and procedures equivalent to Bangladesh's. In the case of a trading company, a visit

to the place of business may also be made to confirm the true nature of the business.

In Case of Identification & Introduction of Beneficial Owner(s ) BO of companies / entities

Directors or Office Bearer or Account operators a satisfactory individual introduction must be

obtained from the valued customer of the bank.

Page 31: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 28

All the papers required as per prevailing directives to open accounts for companies shall

hold good with particular emphasis to:

i. Satisfactory evidence of the identity of each of the principal beneficial owners being any

person holding 10% interest or more or with principal control over the company's assets

and any person (or persons) on whose instructions the signatories on the account are to

act or may act where such persons are not full time employees, officers or directors of

the company;

ii. Satisfactory evidence of the identity of the account signatories, details of their

relationship with the company and if they are not employees an explanation of the

relationship.

iii. Where the business relationship is being opened in a different name from that of the

applicant, the bank/branch shall also satisfy itself that the reason for using the second

name makes sense.

iv. In the absence of passport or other photo identification documents of the shareholders

of the company, directors and authorized signatories where the bank/branch already

knows their identities, a letter head of the company duly signed by the authorized

signatory stating introduction and identity shall be accepted.

Identification documents for Partnerships and Unincorporated Businesses:

In the case of partnerships and other unincorporated businesses whose partners/directors are

not known to the bank/branch, the identity of all the partners or equivalent shall be verified in

line with the requirements for personal customers. Where a formal partnership agreement

exists, a mandate from the partnership authorizing the opening of an account and conferring

authority on those who will operate it shall be obtained.

3.5 Requirements in respect of Pre 2002 Accounts:

Anti-money laundering legislation and requirements in respect of KYC procedures for business

relationships did not apply prior to 30th April 2002. It is therefore reasonable to assume that

business relationships commenced before that date may not satisfy the requirements under

prevailing AML laws. In some circumstances, the lack of up to date documentary evidence to

support existing business relationships may pose operational and other risks to the Bank.

Consequently, all such accounts referred as "pre 2002 accounts" maintaining normal business

relationship with the bank/branches shall be brought at par with the current KYC requirements

within 31st January 2010. NCCBL remains committed to be guided by Bangladesh Bank's

directives in this regard about attaining regularity within the deadline. As per AMLD Circular No-

23 all Un-rectified legacy Account prior to 30th April-2002 to place under Dormant & Account

after complying all formalities of customer account to be function to operative account.

3.6. Provision of Safe Custody, Lockers and Safety Deposit Boxes:

Where facilities to hold boxes, parcels and sealed envelopes in safe custody are available, the

concerned branches will follow the identification procedures set out in the bank's Policy. In

addition such facilities shall only be made available to account holders, In case of providing any

agent service, Safe custody or lockers services CDD to be done meticulously. Only Bank

Customers will be allowed the aforesaid services, in no cases any walk-in customer will get

above services.

Page 32: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 29

CHAPTER- IV

MONEY LAUNDERING RISK MANAGEMENT PROCESSES.

4.1 Know Your Customer (KYC) Procedures:

While considering opening any nature of account, concerned officials of NCCBL shall invariably

ensure completing a standard KYC including risk grading & TP form to be made available at the

initiative of Head Office CCU through circulars besides other regular papers related to the

nature of the account. Relationship after must verifying Information & Address of every new

customer.

Based on the information obtained through KYC profile, concerned official shall calculate the

Risk Category as per matrix available for documentation.

In order to meet KYC compliance requirements, NCC Bank must:

Verify that customers are not or have not been involved in illegal activities such as fraud,

money laundering or organized crime

Verify a prospective client‘s identity

Maintain proof of the steps taken to identify their identity

Establish whether a prospective customer is listed on any sanctions lists in connection

with suspected terrorist activities, money laundering, fraud or other crimes

Risk Based Approach: Customer Risk Rating:

KYC Profiles and Transaction Profiles shall be updated and re-approved at least annually

for "High Risk" accounts. There is no requirement for periodic updating, of profiles for "Low

Risk" transactional accounts. These shall of course be updated if and when an account is

reclassified to "High Risk", or as needed in the event of investigations of suspicious

transactions or other concern. Branch will maintain High Risk Customer Profile file &

Monitor Frequently. Branch will follow approved ―Customer Acceptance Policy‖.

Risk-based compliance approach:

Broadly speaking, the risk-based approach entails the identification of risks that exceed your

business‘ stated risk appetite (including the need for regulatory compliance), and then matching

individuals and entities against these heightened risks during the preliminary stages of due

diligence. Should a person fall into one or more of the specified heightened risk categories,

additional due diligence ('Enhanced Due Diligence'/'EDD') is then required. Many operational

PEP definitions are based on the FATF PEP definition, yet the recent trend has seen also

certain national and regional definitions becoming broader in their interpretation of what is a

Politically Exposed Person.

RISK-BASED APPROACH (RBA)

A risk-based approach takes a number or all of the following steps in assessing the most cost

effective and proportionate way to manage and mitigate the money laundering and terrorist

financing risks faced by the Companies:

Identify and assess the money laundering and terrorist financing risks that are Relevant

to the Company;

Design and implement controls to manage and mitigate the assessed risks;

Monitor and improve the effective operation of these controls.

Page 33: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 30

Risk management generally shall be regarded as a continuous process, carried out on a

dynamic basis. Companies therefore ensure that their risk management processes for

managing money laundering and terrorist financing risks are kept under regular review. It is

recommended that the Companies revisit their assessments at least annually.

The general principle of a Risk Based Approached (RBA) is that, to find out where there are

higher risks associated with Customers and Transaction considering probability &

consequences

Companies should take enhanced measures to manage and mitigate those risks; and that;

correspondingly, where the risks are lower, simplified measures may be permitted (pursuant to

Applicable Legislation). In particular, they should increase the degree and nature of monitoring

of the business relationship, in order to determine whether those transactions or activities

appear unusual or suspicious.

Country Risk

Country risk, in conjunction with other risk factors, provides useful information as to potential

money laundering and terrorist financing risks. Country risk is not solely related to the country of

origin of a customer. It should also take into account that a customer may have business

interests in or relevant links to a country that may signify that the customer should be placed in

a higher risk category. Factors that may result in a determination that customers from, in or

connected with a particular country pose a higher risk includes, for example-

Countries subject to sanctions, embargoes or similar measures issued by, for example,

the United Nations (―UN‖) or European Union

Countries identified by credible sources (e.g. FATF, FATF-style national authorities or

other recognized evaluation bodies and EU Commission) as lacking adequate money

laundering laws and regulations;

Countries identified by credible sources as providing funding or support for terrorist

activities; or

Countries identified by credible sources as having significant levels of corruption, or

other criminal activity.

Customer Risk

Determining the potential money laundering and terrorist financing risks posed by a customer,

or category of customers, is critical to the development of an overall risk framework. Based on

its own criteria , a Company determines whether particular customers poses a higher risk of

money laundering and terrorist financing and whether, in some cases, mitigating factors are

sufficient to conclude safely that customers engaged in such activities do not, in reality, pose a

higher risk of money laundering or terrorist financing. Application of risk variables may increase

or decrease the perceived risk in each case.

Product Risk

Certain products and services offered by Companies may pose a higher risk of money

laundering or terrorist financing depending on the nature of the specific product or service

offered. Such products and services may facilitate a higher degree of anonymity, or involve the

handling of high volumes of currency or currency equivalents.

Page 34: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 31

4.2 Transaction Monitoring & SAR.

Basic principle of Transaction Monitoring is to find outing Suspicious Transaction /Activity.

As per MLPA 2012 ―Suspicious Transaction‖ means such transactions

(i) Which is different from usual transactions?

(ii) Which invokes presumption that -

(a) It is the proceeds of an offence, (b) It finances to terrorist activities, a terrorist group or an individual terrorist;

(iii) Which is any other transaction or an attempt for transactions delineated in the instructions issued by the Bangladesh Bank from time to time for the purposes of this Act;

Monitoring of transactions shall be an ongoing process in the normal course of the business relationship. The purpose is to be vigilant for any significant changes or inconsistencies in the pattern of transactions as against declared one.

Concerned officials of the branch shall arrange periodic reviews of accounts by monitoring activity reports. Any account not appearing in conformity with the declared transaction shall be isolated for further scrutiny and if still not convincing with any reasonable explanation from the concerned customer, the account shall be documented under internal Suspicious Activity Reports (SARs) with action plans for approval by the relevant Manager AMLCO at the branch and review with the Branch AMLCO.

BAMLCO will review the SARs and responses from the Account Officers /Relationship Managers or other concerned staff. If the explanation for the exception does not appear reasonable then the Branch/Unit Head shall review the transactions prior to considering submitting them to the regional AMLCO (where applicable) or/ CCU/CAMLCO.

Branch will closely monitor Cash Transaction find out the possibility of structuring

If the BAMLCO believes the transaction should be reported then the Manager AMLCO will supply the relevant details to the CCU/ CAMLCO.

The CCU/CAMLCO will investigate any reported accounts and will send a status report about the accounts reported. No further action shall be taken on the account until notification has been received.

If, after confirming with the client, the transaction trend is to continue the Account Officer is responsible for documenting the reasons why the transaction profile has changed and should amend the KYC profile accordingly.

4.3 Self Assessment of Money Laundering Prevention Activities

NCC Bank should establish half yearly self-assessment process that will assess how effectively the Bank's anti-money laundering procedures enable management to identify areas of risk or to assess the need for additional control mechanisms. The self-assessment should conclude with a report documenting the work performed, who performed it, how it was controlled and supervised and the resulting findings, conclusions and recommendations. The self-assessment should advise management whether the internal procedures and statutory obligations of the financial institution have been properly discharged. The report should provide conclusions to three key questions:

Is anti-money laundering procedures in place?

Is anti-money laundering procedures being adhered to?

Do anti-money laundering procedures comply with all policies, controls and statutory requirements?

Page 35: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 32

4.4 System of Independent Procedures Testing

Testing is to be conducted at least annually by the financial institution's internal audit personnel, compliance department, and by an outside party such as the institution's external auditors. The tests include:

interviews with employees handling transactions and interviews with their supervisors to determine their knowledge and compliance with the financial institution's anti-money laundering procedures;

a sampling of large transactions followed by a review of transaction record retention forms and suspicious transaction referral forms;

a test of the validity and reasonableness of any exemptions granted by the financial institution; and

a test of the record keeping system according to the provisions of the Act.

Any deficiencies should be identified and reported to senior management together with a request for a response indicating corrective action to be taken.

In earlier ICC Division Audit Unit would conduct Independent Testing as per Core Risk

Guideline for ML Risk Management chapter 6.6, and submitted report to CCU (AML) with

Individual Score sheet along with summary Report.

ICC Audit Wing & CCU-AML Function

CCU-AML with submit the summary note & score sheet to Managing Director & CEO with

comments of CAMLCO for kind Perusal & Instruction. After getting perusal & comments of MD

& CEO then CCU-AML advised the branches. CCU-AML team after complying these

performance & self Assessment then making summary sheet and submit half yearly report to

BFIU of Bangladesh Bank.

Testing shall be conducted at least annually by the Internal Audit personnel, compliance

department, and by an outside party such as External Auditors. The tests will include:

interviews with employees handling transactions and interviews with their

supervisors to determine their knowledge and compliance with the bank's anti-

money laundering procedures;

a test of the validity and reasonableness of any exemptions granted by the bank,

and

a test of the record keeping system according to the provisions of the Act.

Any deficiencies shall be identified and reported to senior management together with a request

for a response indicating corrective action taken or to be taken within a deadline.

ICC Audit wing will submit branch wise independent testing result half yearly basis, in the form

of ―summery Report‖ as per Annexure of Master circular 10. to the Head of CCU AML showing

the branch ―Scores‖ and grade. On getting the half yearly Summery Report from the ICC

Division Central Compliance Unit will present the report to MD & CEO for kind perusal &

further instructions. CCU then issue clarification letter to the branches those scores are

marginal or unsatisfactory. CCU-AML will submit half Yearly Summary Report to BFIU with the

comments of Senior Management or Board.

Page 36: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 33

CHAPTER- V

RECORD KEEPING

5.1. Statutory Requirements

As per Section 25/1, Ka of the AML Act, correct and full records of customers' identification and

transactions shall be retained for at least five years after termination of relationships with the

customers for future investigations and audit trail. All records are kept for at least 5 years and

contain records obtained through CDD Measures; account files and business correspondence;

the results of any analysis undertaken; documents relating to business relations and executed

transactions; Correspondence with the clients and other persons with which companies keeps a

business relation. The five year period is calculated following the carrying out of the

transactions or the end of the business relationship

The records shall be so maintained by the concerns that:

requirements of legislation and Bangladesh Bank directives are fully met;

competent third parties will be able to assess and observe bank's Anti money laundering

policies and procedures;

any transactions effected through accounts can be reconstructed;

Customer can be properly identified and located;

all suspicious reports received internally and those made to Bangladesh Bank can be

identified and the Bank can satisfy within a reasonable time any enquiries or court

orders from the appropriate authorities as to disclosure of information.

Where there has been a report of a suspicious activity or the bank's awareness about

continuing investigation into money laundering relating to a client or a transaction, records

relating to the transaction or the client shall be retained until confirmation is received that the

matter has been closed.

Records and Maintenance of File (Branch level)

ML Core Risk Guideline of Bangladesh Bank.

AML & CFT Policy Guideline of NCC Bank Ltd.

Money Laundering Prevention Guidance Notes of Bangladesh Bank.

Copy of Anti Money Laundering Act. 2012 & Anti Terrorism Act-2009 (amendment -

2013) file.

Managing Director & CEO Memorandum on AML & CFT file.

Bangladesh Bank (AML Circular 10 & 22) & (BFIU Circular 02, 07 & 10) BFIU Circular

Letter-01) file.

AML & CFT related all circulars of NCC Bank from CCU-AML. HO.

CTR File (FIU & goAML).

STR File & STR Indicator file (supplied to all staff).

Self Assessment Report file (cwiwkó- O, weGdAvBBD gv÷vi mvKz©jvi 10).

Independent Testing Procedure by ICC Inspection file (cwiwkó- P, weGdAvBBD gv÷vi mvKz©jvi 10.)

High Risk Customer file & Review File.

Page 37: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 34

KYC & TP review/ Monitoring File.

Account Information & Freezing Information by Bangladesh Bank File through CCU-

AML, HO.

AML Training File by NCC Bank/Other Bank and individual Training record File.

Monthly Meeting Resolution files in relation to Awareness development on AML & CFT.

Trade Based Money Laundering (Import/Export) Monitoring File & AML & CFT

Correspondence File.

Bangladesh Bank Inspection File and Compliance File (if any) (system check file).

Guard File of Account Opening Form (SB, CD, SND and FDR).

PEPs Account & Influential Person (local PEPs) Account File (if any).

Walking Customer & On line Customer–KYCC file.

UNSCR & OFAC Sanction Screening file.

Page 38: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 35

CHAPTER- VI

RECOGNITION AND REPORTING OF CTR & STR:

6.1 Recognition of Cash Transactions:

Branches will submit monthly Cash Transaction Reporting (CTR) to CCU-AML of Head Office

by FIU software. One accounts and one day‘s cash transaction must be 10 lack and over only

for deposit & withdrawal transaction separately reporting to CCU-AML of Head Office. CCU-

AML has compiled report to BFIU of Bangladesh Bank within 21st days of reporting month after

branch wise checking & investigating.

As per Bangladesh Bank directives branch will submit Cash Transaction Report (CTR) for

deposit & withdrawal of Cash amounting to Tk. 10.00 lac & above in customers‘ accounts in a

particular day to the Central Compliance Unit (AML) , Head Office within 10th of the following

month. Deposit Tk. 10.00 Lac & above in a Government Account Cash Transaction Report

(CTR) not to be submitted but withdrawal of 10.00 Lac & above to be reported.

Branch generates monthly Cash Transaction Report (CTR) for threshold amount Tk. 10 lacs &

above both for FIU Software & goAML Software filing up the mandatory fields within given

deadline. Central Compliance Unit on verification & compilation sends XmL Cash Transaction

Report (CTR) directly to BFIU of Bangladesh Bank using goAML web software and CD as per

article 6 of BFIU master circular 10 & Bangladesh Banks Instruction.

Bank is very much aware to report Cash Transaction Report (CTR) to Bangladesh Financial

Intelligence Unit (BFIU) on monthly basis. NCC Bank has taken necessary steps to train entire

manpower on regular basis at Bank's training Institute and other institute and issued number of

circulars to get acquainted its officials with the money laundering prevention acts, methods and

also the way to counter the Money-Laundering and Terrorist Financing.

The BB may impose fine of a minimum amount of Tk 0.02 million, a maximum of Tk 0.5 million,

under the clause 23 (4) of Anti-Money Laundering Act 2012, if any bank avoid or fails to submit

actual information or data on the CTR. The BB may also cancel the banking licence of the

respective banks if they fail to submit actual CTR for three consecutive times. Under the same

rules, if any bank fails to submit its CTR within the stipulated time, it will have to pay penalty of a

minimum amount of Tk 0.05 million and a maximum of Tk 0.5 million for each day. Or if any

bank faces penalty for more than three times in a fiscal year, BB can take necessary action or

cancel its licence, according to the Money Anti-Laundering Act. In a recent circular, BB directed

the Chief Executive Officers (CEOs) of banks to submit their CTR statements in time, in

accordance with the provisions of the Act. The negligence of some banks in submitting CTR is

unacceptable, the BB sources said. BB has raised the ceiling of the amount for the commercial

banks' CTR, the monthly submission of which to the central bank is mandatory. Now the ceiling

stands at Tk 1.0 million, instead of earlier Tk 0.7 million. The new ceiling was made effective

from this month (August). Under the directive, all commercial banks have to report to the BB if

an amount of Tk 1.0 million and above is deposited or withdrawn from a particular account. The

ceiling has been increased on demand raised by the businessmen and bankers as well.

Following such a rise in the ceiling, bank officials' work-load will be reduced to almost half.

Page 39: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 36

6.2 Online CTR Submission

Recently, BFIU of Bangladesh Bank has launch new software ―goAML‖ for CTR & STR for

online reporting which was instructed and imported by United Nations Office on Drugs & Crime

(UNODC). BFIU of Bangladesh Bank have instructed to all schedule banks of Bangladesh for

develop XML data Software for CTR & STR and submit these reporting date to BFIU of

Bangladesh Bank by goAML. We shall continue the BFIU of Bangladesh Bank instruction and

uploading the all filed of required account information to implemented goAML software.

6.3 Recognition of Suspicious Transactions:

Where a SAR has been submitted to Bangladesh Bank or where it known that a client or

transaction is under investigation, relevant documents/records maintained with the concerned

offices shall not be destroyed or removed without the agreement of the Bangladesh Bank even

though the five-year limit may have been expired. In this regard a register or tabular records of

all investigations made to it by the Bangladesh Bank and all disclosures to the Bangladesh

Bank shall be maintained by the related branch.

A suspicious transaction will often be one that is inconsistent with a customer's known,

legitimate business or personal activities or with the normal business for that type of customer.

Therefore, the first key to recognition knows enough about the customer's business to

recognize that a transaction or series of transactions are unusual.

Concerned officials of NCCBL shall consider the following few basic questions in pursuit of

determining element of unusualness in the conduct of transactions which could lead to doubts:

Probable Indicator of Suspicious Transaction

Attempt to conceal, ignore, disguise or avoid the different matter regarding this issue.

Reluctant to provide the necessary information, or making fraudulent or dishonest mean

in the time of opening the account.

Providing the wrong address or providing the address in such away where it is not

feasible to determine whether it true or false, on the contrary not feasible to examine.

If it is not clear, why a person come to a branch of bank which is far away from both of

his residential and business address even though he has a branch of bank apparently

near from his address.

Reluctant to say anything about his any account at any other bank.

The authorized ceiling of transaction mentioned is not relevant with his business sphere.

If it is not satisfactory while visiting client business address.

If any unusual large amount deposited to the account even though normal transaction

executed through cheque or other instrument according to the nature of the business.

Without any relevant reason, if cash deposit has been raised suddenly on a business

account and transfer (either by check or cash) incurred between a particular business

and a businessman which is relatively unconnected with the mentioned business.

If any amount deposited exceed the expected or normal ceiling of any account even

though the amount is deposited in cash with a tiny alienated amount.

Page 40: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 37

Requesting for payment in cash for large amount by transferring the fund directly from

other Bank account or from other location.

Willingness for cash transaction without following the usual nature of the account.

If the client has different accounts in different name and different institution and if the

total amount transacted all these accounts as a whole exceeds the expected level of

transaction.

To conduct many bank accounts without prior knowledge of the bank, but informed by

the bank in the time of accumulating the fund or spreading the fund in the different

account.

Large digit deposited through other person cheque without any valid reason.

To receive one or more locker suddenly, frequent use and put and draw the sealed

packet in a number of occasions.

Showing reluctance about the different facilities, interest and charges deducted by the

bank.

Without any known reason money has been deposited by so many person.

Repayment of a long classified loan without any valid reason.

To make a proposal of giving the loan against the third party asset without any valid

reason.

Large digit remittance sends or received without business purpose. Sources of

remittance ignored in case of sender and suspicion about the capability of receiver in

case of receiver.

Over estimation in the cases of import and under estimation in the cases of export.

Deposit fake/counterfeit instrument in the receivers account.

Execution of sale/purchase deed in over or under priced.

Manipulate the price of the Goods and avoiding the tariff through providing the

declaration of imported goods.

To send the money of letter of credit to abroad without entering any goods by using the

counterfeit deed.

Selling or purchasing foreign currency illegally without having a license of Authorized

Dealer or Money Changer or transacting money illegally even having the license.

Directly or indirectly involve with smuggling.

To use nonresident illegitimately.

Submitting the fake Bill of Entry.

To repayment the loan so quickly just after taking the loan without any valid reason.

Remit the money frequently to the border area.

Huge transaction but insignificant balance.

Executing banking transaction by using other without the presence of client.

Page 41: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 38

Conduct abundant transaction to make the purpose of the transaction complex or

mysterious.

To remit the money to the different people who are not involved with the remitter.

Large purchase and sales of securities which is irrelevant with the prior legitimate

income of the client.

Remittance comes from drug producing, transit or terrorist country.

Changes of transaction pattern.

To craft structuring for concealing the Cash Transaction Reporting.

Irrelevancy among the various information provided by the client.

Rejection of export value repatriation by showing the counterfeit excuse in case of

export.

Is the transaction consistent with the declared activities of the customer?

Is the transaction rational in the context of the customer's business or personal

activities?

Has the pattern of transactions conducted by the customer changed?

Where the transaction is international in nature does the customer have any obvious

reason for conducting business with the countries involved?

If the answers against above appear not satisfying then shall necessitate further investigation

and unless an otherwise conclusion is drawn will subject to reporting under Suspicious

Account/Transaction.

6.4 Reporting of Suspicious Transactions

There is a statutory obligation on all officials of NCCBL to report suspicions of money

laundering under Section 25 Ga of the AML Act. Therefore, internal procedure as laid down

below shall be followed meticulously before reporting to Bangladesh Bank.

Suspicious Transaction Reporting Procedure:

It shall be as short as possible, with the minimum number of people between the person with

the suspicion and the CAMLCO. This will ensure speed, confidentiality and accessibility to the

CAMLCO. Therefore, any unusual or suspicious transactions shall be drawn initially to the

attention of supervisory management i.e. Manager AMLCO, Branch Manager to ensure that

there are no known facts that will negate the suspicion before further reporting to the CCU.

All suspicions reported to the Manager AMLCO & BAMLCO shall be documented (in urgent cases this may follow an initial discussion by telephone). The report shall include the full details of the customer and as full statements as possible of the information giving rise to the suspicion.

The Manager AMLCO/BAMLCO shall acknowledge receipt of the report and at the same time

provide a reminder of the obligation to do nothing that might prejudice enquiries, i.e. "tipping off.

All internal enquiries made in relation to the report, and the reason behind whether or not to

submit the report to the authorities, shall be documented. This information may be required to

supplement the initial report or as evidence of good practice and best endeavors if, at some

future date, there is an investigation and the suspicions are confirmed.

Page 42: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 39

On-going communication between the BAMLCO and the reporting person/department is

important. CCU may wish to consider advising the reporting person, department or branch of

the AMLCO's decision, particularly if the report is believed to be invalid. Likewise, at the end of

an investigation, consideration shall be given to advising all members of staff concerned of the

outcome. It is particularly important that the AMLCO is informed of all communication between

the investigating officer and the branch/unit concerned at all stages of the investigation.

Records of suspicions, which were raised internally with the CCU but not disclosed to

Bangladesh Bank, shall be retained for five years from the date of the transaction. Records of

suspicions which the Bangladesh Bank has advised are of no interest shall be retained for a

similar period. Records of suspicions that assist with investigations shall be retained until the

Bank is informed by the Bangladesh Bank that they are no longer needed.

CCU/CAMLCO on receiving Internal SAR shall conduct its independent investigation and if

confirmed about the genuineness of the matter, shall pass instruction for refraining from

carrying out transactions. Where it is impossible in the circumstances to refrain from executing

a suspicious transaction before reporting to the Bangladesh Bank or where on reporting it is

likely to frustrate efforts to pursue the beneficiaries of a suspected money laundering operation,

bank shall apprise the Bangladesh Bank immediately afterwards. While it is impossible to spell

out in advance how to deal with every possible contingency, in most cases common sense will

be utilized about the most appropriate course of actions. Where there is doubt, the advice of the

Anti Money Laundering Compliance Officers shall be sought.

Chief Anti Money Laundering Compliance Officer (CAMLCO) or the Chairman CCU will be responsible for communicating reports of suspicious transactions to the Bangladesh Financial Intelligence Unit of Bangladesh Bank and shall function as the liaison between the bank and the Bangladesh Bank.

In all circumstances The Chairman CCU/CAMLCO will be expected to act honestly and

reasonably and to make his determinations in good faith. Care shall be taken to guard against a

report being submitted as a matter of routine to Bangladesh Bank without undertaking

reasonable internal enquiries to determine that all available information has been taken into

account.

The use of a standard format in the reporting of suspicious activities is important and bank shall

require using the unusual/suspicious transactions reporting form as per Annexure – Master

Circular 10. Following the submission of a suspicious activity report, bank shall not preclude

from subsequently terminating its relationship with a customer, provided it does so for normal

commercial reasons. It must not alert the customer to the fact of the disclosure as to do so

would constitute a "tipping-off offence

Page 43: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 40

CHAPTER- VII

SANCTION SCREENING OF UNSCR & OTHERS

Strengthening compliance and mitigating AML/CFT Risk of the Bank BFIU of Bangladesh Bank

has issued Master Circular No. 10, Date 28.12.2014. In that Circular there was an instruction

(Para 2.3) for Screening of ―UNSCR Sanction List‖ at the time of opening an account and

subsequent operation of the same. To implement this instruction BFIU arranged a meeting with

all banks CAMLCO & DCAMLCO as on 18th January 2015. In that meeting a decision was

taken that all schedule banks must implement automatic sanction screening mechanism of

UNSCR‘s resolution within 30th June 2015. After that in the 307th meeting of Board of Directors

a decision was taken to procure of sanction Screening Solution Software through Agenda

No.1758 (06). Accordingly our IT Division developed a Sanction Screening Software (Nfold) for

all Branches & Head Office for screening UN & OFAC sanction list. Honorable Managing

Director and CEO launched this software (Nfold) on 30th June 2015.

Branch authority will search and screen Individual Name or Entity before ―Opening New

Account, Inward Foreign Remittance Payments and Opening an L/C‖, the weight percentage

(%) to be 80(eighty) then search. If any name or entity matches with UNSCR, OFAC and

Bangladeshi Sanction list weighted percentage 80 and above, then account of such person

and/or entity will not to be opened and in case of existing account operation will be stopped

and referred this account to the CCU-AML, Head Office.

Responsibilities of Branch Manager & BAMLCO in areas of Sanction Screening

I. All BAMLCOs will fill up Access Request Form – (In-House Software) then send to Head office IT Division for getting User ID.

II. Search Individual Name or Entity before opening new account, inward foreign remittance payments and opening an L/C.

III. If any Individual Name or Entity matches with the UNSCR, OFAC and Bangladeshi Sanction list, instantly inform to Head Office, CAMLCO (CCU-AML).

IV. Hence forth no account will be opened & operated without Sanction Screening.

V. Maintain a separate file for ‗Sanction Screening Records‘.

VI. All branch Managers are strictly advised to monitor and ensure that sanction screening is done for each case of opening new account, inward foreign remittance payments and opening and L/C.

Now all Branch Managers and BAMLCOs are strictly instructed to screen timely and comply

with regulating requirement on AML/CFT risk.

Page 44: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 41

CHAPTER- VIII

TRAINING /AWARENESS & SENIOR MANAGEMENT REVIEWS.

NCC Bank as part of statutory obligation under MLP Act shall undertake all necessary

measures to prepare its officials to effectively join the forces to fight the menace of Money

Laundering. NCCBL, therefore, at the initiative of HRD shall undertake regular training

programs to instill awareness and enable discharge required responsibilities in this regard. The

need for staff awareness NCC Bank Limited is always aware of AML/CFT issues to combat

Money Laundering. In this regard, AML related training is being organized by our Training Cell

on regular basis. Most of the employees of the Bank adhere to existing rules and regulations of

Anti-Money Laundering and amendments thereof. Besides, new employees get orientation to

AML Policies and procedure during their Foundation Training. All the staff will be aware of their

own personal statutory obligations and that they can be personally liable for failure to report

information in accordance with internal procedures.

All staff will be trained to co-operate fully and to provide a prompt report of any Suspicious

transactions. It is, therefore, important that the bank introduce comprehensive measures to

ensure that all staff and contractually appointed agents are fully aware of their responsibilities.

The management will ensure that the staffs are adequately trained in relation to identification,

reporting and record retention to ensure that they are adequately tr ained to discharge their

responsibilities. So the Bank will take appropriate measures to make employees aware of

policies and procedures to prevent money laundering and for identification, record keeping and

internal reporting; the legal requirements; and to provide relevant employees with training in the

recognition and handling of suspicious transactions.

All relevant staff will be educated in the process of the ―know your customer requirements for

money laundering prevention purposes. The training in this respect will cover not only the

need to know the true identity of the customer but also, where a business relationship is being

established, the need to know enough about the type of business activities expected in relation

to that customer at the outset to know what might constitute suspicious activity at a future date.

Relevant staff will be alert to any change in the pattern of a customer‗s transactions or

circumstances that might constitute criminal activity. Although Senior Managers may not be

involved in the day-to-day procedures, it is important that they understand the statutory duties

placed on them, their staff and the institution itself. Some form of high-level general awareness

raising training will therefore needed.

Training to New Employees

A general appreciation of the background to money laundering, and the subsequent need for

reporting any suspicious transactions to the Anti Money Laundering Compliance Officer

(AMLCO) will be provided to all new employees who are likely to be dealing with customers or

their transactions, irrespective of the level of seniority. They will be made aware of the

importance placed on the reporting of suspicions by the organization, that there is a legal

requirement to report, and that there is a personal statutory obligation to do so.

Page 45: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 42

Training of Customer Service/Tellers/Foreign Exchange Dealers

Members of staff who are dealing directly with the public are the first point of contact with

potential money launderers and their efforts are vital to the organization's strategy in the fight

against money laundering. They will be made aware of their legal responsibilities and will be

made aware of the organization's reporting system for such transactions. Training will be

provided on factors that may give rise to suspicions and on the procedures to be adopted when

a transaction is deemed to be suspicious. It is vital that 'front-line' staffs are made aware of the

organization's policy for dealing with non-regular (walk in) customers particularly where large

transactions are involved, and the need for extra vigilance in these cases.

Training Processing (Back Office) Staff

Those members of staff who receive completed Account Opening, Payment Order/DD/TT /FDR

application forms and cheques for deposit into customer‗s account or other investments will

receive appropriate training in the processing and verification procedures. Those members of

staff, who are in a position to deal with account opening, or to accept new customers, must

receive the training given to cashiers and other front office staff above. In addition, the need to

verify the identity of the customer must be understood, and training will be given in the Bank's

account opening and customer/client verification procedures. Such staff will be made aware that

the offer of suspicious funds or the request to undertake a suspicious transaction may need to

be reported to the Anti Money Laundering Compliance Officer whether or not the funds are

accepted or the transactions proceeded with and must know what procedures to follow in these

circumstances.

Training of Senior Management

For the effectiveness on any policy and to observe its consistency with the prevailing situations,

Senior Management oversight as a routine matter is essential. A periodical review about the

effective functioning of the system is always considered beneficial for the institution. Concerned

senior officials related to AML Unit shall, therefore, arrange periodical reviews of the entire AML

functioning and shall report to CEO/Board including proposals to bring about any amendments

in the policy and system to counter the ML menace effectively which also happens to be an

statutory requirements A higher level of instruction covering all aspects of money laundering

procedures will be provided to those with the responsibility for supervising or managing staff.

This will include the offences and penalties arising from the Act for non-reporting and for

assisting money launderers; internal reporting procedures and the requirements for verification

of identity and the retention of records.

Training of Anti Money Laundering Compliance Officer

In depth training on all aspects of the Money Laundering Legislation, Bangladesh Bank

directives and internal policies will be required for the Anti Money Laundering Compliance

Officer. In addition, the AMLCO will require extensive instructions on the validation and

reporting of suspicious transactions and on the feedback arrangements, and on new trends and

patterns of criminal activity.

Page 46: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 43

Refresher Training

In addition to the above relatively standard requirements, training may have to be tailored to the

needs of specialized areas of the Bank‗s business. It will also be necessary to keep the content

of training programs under review and to make arrangements for refresher training at regular

intervals i.e. at least annually to ensure that staff does not forget their responsibilities Bank shall

pursue a defined training policy on the issue to educate and motivate its man- power about the

method and procedure to "know your customer (KYC)" an essential tool to prevent money

laundering. The training in this respect shall cover not only the need to know the true identity of

the customer but also, where a business relationship is being established, the need to know

enough about the type of business activities expected in relation to that customer and what

might constitute suspicious activity at a future date. Officials shall be alerted to any changes in

the pattern of a customer's transactions or circumstances that might constitute criminal activity.

CCU –AML will prepare Training Plan on for the year with target group. & centrally maintain the

Training Record on AML & CFT. CCU-AML will furnish Training records for reporting periods in

the half yearly reports to BFIU.

Page 47: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015 Page 44

Annexure A

BFIU of Bangladesh Bank Master Circular No. 10/2014

Page 48: Anti Money Laundering (AML) & Combating Financing Terrorism ...

1

evsjv‡`k dvBb¨vwÝqvj B‡›Uwj‡RÝ BDwbU evsjv‡`k e¨vsK cÖavb Kvh©vjq

XvKv www.bangladeshbank.org.bd

weGdAvBBD mvK©yjvi bs-10 ZvwiL :

e¨e ’vcbv cwiPvjK/cÖavb wbe©vnx Kg©KZ©v evsjv‡`‡k Kvh©iZ mKj Zdwmjx e¨vsK

gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iv‡a Zdwmjx e¨vsK KZ©…K AbymiYxq weavbmg~n m¤úwK©Z gv÷vi mvKz©jvi|

gvwbjÛvwis cÖwZ‡iva AvBb, 2012 I mš¿vm we‡ivax AvBb, 2009 (2012 I 2013 mv‡ji ms‡kvabxmn) Gi D‡Ïk¨ c~iYK‡í Ges D³ AvBb I D³ AvB‡bi AvIZvq RvixK…Z wewagvjvi mswkøó weavbvejx cwicvj‡b evsjv‡`‡ki mKj Zdwmjx e¨vs‡Ki Rb¨ AbymiYxq wbgœewY©Z wb‡` ©kbvmg~n gvwbjÛvwis cÖwZ‡iva AvBb, 2012 Gi 23(1)(N) Ges mš¿vm we‡ivax AvBb, 2009 Gi 15(1)(R) avivq cÖ`Ë ÿgZv e‡j Rvix Kiv n‡jv t

1| cwicvjb KvVv‡gvt

1.1 gvwbjÛvwis Ges mš¿vmx Kv‡h© A_©vqb cÖwZ‡iva bxwZgvjv t

gvwbjÛvwis Ges mš¿vmx Kv‡h© A_©vqb cÖwZ‡iv‡a AvšÍR©vwZK gvb`Û, †`‡k we`¨gvb AvBb, wewagvjv I evsjv‡`k dvBb¨vwÝqvj B‡›Uwj‡RÝ BDwbU (weGdAvBBD)-Gi wb‡`©kbvejxi mgš^‡q cÖwZwU e¨vs‡Ki wbR¯^ bxwZgvjv _vK‡e hv Zv‡`i cwiPvjbv cl© ev cÖ‡hvR¨ †ÿ‡Î e¨vs‡Ki m‡ev©”P e¨e¯’vcbv KwgwU KZ©„K Aby‡gvw`Z n‡e| D³ bxwZgvjv mswkøó mK‡ji AeMwZ‡Z Avb‡Z n‡e| e¨vsK mgq mgq bxwZgvjvwU ch©v‡jvPbv Ki‡e Ges cÖ‡qvRbxq †ÿ‡Î ms‡kvab/cwigvR ©b Ki‡e|

1.2 gvwbjÛvwis Ges mš¿vmx Kv‡h© A_©vqb cÖwZ‡iv‡a A½xKvi †NvlYv t

e¨vs‡Ki cÖavb wbe©vnx evrmwiK wfwˇZ e¨vs‡Ki mKj wefv‡Mi Kg©KZ©v/Kg©Pvix‡`i D‡Ï‡k¨ gvwbjÛvwis Ges mš¿vmx Kv‡h© A_©vqb cÖwZ‡iv‡a my¯úó I Kvh©Ki A½xKvi †NvlYv Ki‡eb Ges A½xKvi ev¯Íevq‡b h_vh_ wb‡`©kbv cÖ vb Ki‡eb|

1.3 ‡K›`ªxq cwicvjb BDwbU (Central Compliance Unit) t

(1) e¨vswKs LvZ‡K gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iva welqK SzuwK n‡Z gy³ ivLvi Rb¨ Ges gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iva wel‡q we`¨gvb AvBb, wewagvjv Ges weGdAvBBD KZ©„K mgq mgq RvixK…Z wb‡ ©kbvejx h_vh_fv‡e cwicvjbv‡_©-

14 ‡cŠl, 1421 28 wW‡m¤^i, 2014

Page 49: Anti Money Laundering (AML) & Combating Financing Terrorism ...

2

(K) cÖwZwU e¨vsK GKRb EaŸ©Zb Kg©KZ©vi †bZ…‡Z¡ cÖavb Kvh©vj‡q GKwU Ô‡K›`ªxq cwicvjb BDwbUÕ (Central Compliance Unit) cªwZôv Ki‡e hv mivmwi e¨vs‡Ki e¨e¯’vcbv cwiPvjK ev cÖavb wbe©vnx Kg©KZ©v KZ©„K ZË¡veavb Ki‡Z n‡e| DwjøwLZ ÔEaŸ©Zb Kg©KZ©vÕ cÖavb gvwbjÛvwis cÖwZ‡iva cwicvjb Kg©KZ©v (Chief Anti Money Laundering Compliance Officer-CAMLCO) bv‡g AwfwnZ n‡eb| G‡ÿ‡Î ÔEaŸ©Zb Kg©KZ©vÕ ej‡Z e¨vs‡Ki e¨e ’vcbv cwiPvjK/cÖavb wbe©vnx Kg©KZ©vi bx‡Pi 2(`yB) avc ch©šÍ c`gh©v`vi Kg©KZ©vMY we‡ewPZ n‡eb| Z‡e we‡`kx e¨vs‡Ki †ÿ‡Î D³ EaŸ©Zb Kg©KZ©v‡K Aek¨B m‡ev©”P e¨e¯’vcbv KwgwUi (Management Committee) m`m¨ n‡Z n‡e| cÖavb gvwbjÛvwis cÖwZ‡iva cwicvjb Kg©KZ©v cwiewZ©Z n‡j Awej‡¤^ wjwLZfv‡e weGdAvBBD-‡K AewnZ Ki‡Z n‡e| cÖavb gvwbjÛvwis cÖwZ‡iva cwicvjb Kg©KZ©v‡K e¨vs‡Ki Ab¨ †Kvb `vwqZ¡ Ac©‡bi c~‡e© e¨e¯’vcbv KZ©„cÿ‡K wbwðZ n‡Z n‡e †h Gi d‡j e¨vsKwUi gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iva welqK Kvh©μg wewNœZ n‡e bv|

(L) ‡K›`ªxq cwicvjb BDwbU G Dc-cÖavb gvwbjÛvwis cÖwZ‡iva cwicvjb Kg©KZ©v wn‡m‡e b~¨bZg ÔmnKvix gnve¨e¯’vcKÕ A_ev ÔfvBm †cÖwm‡W›UÕ A_ev mgc`gh©v`vi GK ev GKvwaK Kg©KZ©v‡K g‡bvbqb cÖ vb Kiv hv‡e|

(M) cÖavb gvwbjÛvwis cÖwZ‡iva cwicvjb Kg©KZ©v I Dc-cÖavb gvwbjÛvwis cÖwZ‡iva cwicvjb Kg©KZ©vi gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iva wel‡q we`¨gvb AvBb, wewagvjv, weGdAvBBD KZ©„K mgq mgq RvixK…Z wb‡`©kbvejx I GZ`&wel‡q AvšÍR©vwZK gvb`Ûmg~‡ni Dci mg¨K aviYv _vK‡Z n‡e|

(2) ‡K›`ªxq cwicvjb BDwbU b~¨bZg 5(cuvP) m`m¨ wewkó n‡Z n‡e hv cÖavb gvwbjÛvwis cÖwZ‡iva cwicvjb Kg©KZ©v I Dc-c Öavb gvwbjÛvwis cÖwZ‡iva cwicvjb Kg©KZ©vmn e¨vs‡Ki EaŸ©Zb ch©v‡qi Kg©KZ©vM‡Yi mgš^‡q MwVZ n‡e| Zb¥‡a¨, 2(`yB) Rb m`m¨ e¨vs‡Ki ‡Rbv‡ij e¨vswKs I Bbdi‡gkb †UK‡bvjwR wefvM n‡Z g‡bvbxZ Ki‡Z n‡e| Z‡e Af¨šÍixY wbixÿv wefv‡M Kg©iZ †Kvb Kg©KZ©v ‡K›`ªxq cwicvjb BDwbU Gi m`m¨ n‡eb bv| ‡K›`ªxq cwicvjb BDwbU I Af¨šÍixY wbixÿv wefvM m¤ú~Y© c„_K `yBwU BDwbU ev wefvM wn‡m‡e gvwbjÛvwis Ges mš¿vmx Kv‡h© A_©vqb cÖwZ‡iva welqK Kvh©μg m¤úv`b Ki‡e|

(3) gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iv‡a e¨vsK cÖvwZôvwbK †KŠkj I Kg©m~Px wba©viY Ki‡e Ges mgq mgq Zv ch©v‡jvPbv Ki‡e| ‡K›`ªxq cwicvjb BDwbU gvwbjÛvwis Ges mš¿vmx Kv‡h© A_©vqb cÖwZ‡iva Kg©m~Pxi ev¯Íevqb wbwðZ Ki‡e|

(4) †K›`ªxq cwicvjb BDwbU gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iva wel‡q e¨vs‡Ki M„nxZ c`‡ÿc, Gwel‡q ev¯Íevqb AMÖMwZ I mycvwik m¤wjZ cÖwZ‡e`b lvb¥vwmK wfwˇZ (Rvbyqvwi-Ryb, RyjvB-wW‡m¤^i) e¨vs‡Ki cÖavb wbe©vnxi AeMwZ I wb‡`©kbvi Rb¨ `vwLj Ki‡e| D³ cÖwZ‡e`‡b G mvKz©jv‡ii 8.3(1) G ewY©Z welqmg~nmn gvwbjÛvwis Ges mš¿vmx Kv‡h© A_©vqb cÖwZ‡iva wel‡q weGdAvBBD KZ…©K †Kvb e¨e ’v M„nxZ n‡q _vK‡j Zv AšÍfz©³ Ki‡Z n‡e| cÖavb wbe©vnxi wb‡ ©kbv I gZvgZmn cÖwZ‡e`bwU e¨vsKwUi cwiPvjbv cl©` ev m‡e©v”P e¨e ’vcbv KwgwUi mfvq Dc¯’vcb Ki‡Z n‡e Ges cÖwZ‡e`bwUi GKwU Kwc mswkøó lvb¥vwmK †kl nIqvi 2(`yB) gv‡mi g‡a¨ weGdAvBBD eive‡i †cÖiY Ki‡Z n‡e|

(5) ‡K›`ªxq cwicvjb BDwbU wb‡¤œ DwjøwLZ 1.4 Aby‡”Q‡`i wb‡`©kbv †gvZv‡eK kvLv ch©v‡q cwicvjb Kg©KZ©v g‡bvbq‡bi gva¨‡g Af¨šÍixY cwiexÿY I wbqš¿Y e¨e¯’v cªwZôv Ki‡e| G‡ÿ‡Î wbw`©ó Kg©KZ©v‡K g‡bvbqbc~e ©K g‡bvbxZ Kg©KZ©v‡K Zuvi `vwqZ¡mg~n wjwLZfv‡e AewnZ Ki‡e|

Page 50: Anti Money Laundering (AML) & Combating Financing Terrorism ...

3

(6) †K›`ªxq cwicvjb BDwbU kvLvmg~‡ni Rb¨ AbymiYxq wb‡`©kbvejx Rvix Ki‡e †hLv‡b gvwbjÛvwis I mš¿v‡m A_©vqb cÖwZ‡iv‡a †jb‡`b cwiexÿY e¨e ’v, Af¨šÍixY wbqš¿Y e¨e ’v, bxwZ I c×wZmg~n AšÍfz©³ _vK‡e|

1.4 kvLv gvwbjÛvwis cÖwZ‡iva cwicvjb Kg©KZ©v t (1) gvwbjÛvwis I mš¿vmx Kv‡h © A_©vqb cÖwZ‡iv‡a we`¨gvb AvBb, wewagvjv, weGdAvBBD Gi wb‡ ©kbvejx Ges e¨vs‡Ki wbR¯^ bxwZgvjv ev¯Íevq‡bi Rb¨ e¨vsK cÖwZwU kvLvq GKRb AwfÁ kvLv gvwbjÛvwis cÖwZ‡iva cwicvjb Kg©KZv© (Branch Anti Money Laundering Compliance Officer-BAMLCO) g‡bvbxZ Ki‡e|

(2) kvLv e¨e¯’vcK, kvLvi wØZxq Kg©KZ©v A_ev ‡Rbv‡ij e¨vswKs G AwfÁ EaŸ©Zb Kg©KZ©v‡K kvLv gvwbjÛvwis cÖwZ‡iva cwicvjb Kg©KZv© wn‡m‡e g‡bvbxZ Ki‡Z n‡e| kvLv gvwbjÛvwis cÖwZ‡iva cwicvjb Kg©KZ©vi gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iva wel‡q we`¨gvb AvBb, wewagvjv, weGdAvBBD Gi mKj wb‡ ©kbv Ges e¨vs‡Ki wbR¯^ bxwZgvjvi wel‡q mg¨K aviYv _vK‡Z n‡e| kvLv gvwbjÛvwis cÖwZ‡iva cwicvjb Kg©KZv©i g‡bvbqbc‡Î Zvi Kg©©cwiwa Ges `vq `vwqZ¡ mywbw`©ófv‡e D‡jøL _vK‡Z n‡e|

(3) kvLv gvwbjÛvwis cÖwZ‡iva cwicvjb Kg©KZv© kvLvi Ab¨vb¨ mswkøó ¸iæZ¡c~Y© Kg©KZ©v‡`i wb‡q ˆÎgvwmK wfwˇZ gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iva welqK mfv Ki‡eb Ges D³ mfvq wb‡¤œv³ welqmg~nmn gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iv‡a we`¨gvb AvBb, wewagvjv Ges weGdAvBBD Gi Ab¨vb¨ wb‡`©kbvi cwicvjb ch©v‡jvPbvc~e©K h_vh_ e¨e¯’v MÖnY Ki‡eb t

MÖvnK cwiwPwZ (KYC) ‡jb‡`b gwbUwis m‡›`nRbK †jb‡`b ev Kvh©μg wPwýZKiY I wi‡cvwU©s ‡iKW© msiÿY cÖwkÿY

1.5 †gvevBj dvBb¨vwÝqvj mvwf©m ev G‡R›U e¨vswKs Kvh©μ‡g wb‡qvwRZ e¨vsKmg~‡ni Rb¨ KiYxq t

†h mKj e¨vsK †gvevBj dvBb¨vwÝqvj mvwf©m ev G‡R›U e¨vswKs Kvh©μ‡g wb‡qvwRZ †m mKj e¨vsK D³ Kvh©μg cwiPvjbvi †ÿ‡Î gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb SuywK wbimbK‡í GKwU Kvh©Ki wbqš¿Y e¨e¯’v cÖwZôv Ki‡e| Z‡e, e¨vs‡Ki †Kvb mvewmwWqvixi gva¨‡g †gvevBj dvBb¨vwÝqvj mvwf©m ev G‡R›U e¨vswKs Kvh©μg cwiPvwjZ n‡j Ges D³ mvewmwWqvix gvwbjÛvwis cÖwZ‡iva AvBb, 2012 ev mš¿vm we‡ivax AvBb, 2009 Gi AvIZvq wi‡cvU© cÖ`vbKvix ms¯’v wn‡m‡e AšÍf©y³ n‡e Ges mswkøó mvewmwWqvix gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb SuywK wbimbK‡í ¯Zš¿ cwicvjb KvVv‡gv I wbqš¿Y e¨e¯’v cÖwZôv Ki‡e| G‡ÿ‡Î e¨vsK mvewmwWqvixi cwicvjb KvVv‡gv I wbqš¿Y e¨e ’v wbwðZ Ki‡e|

‡gvevBj dvBb¨vwÝqvj mvwf©m I G‡R›U e¨vswKs Kvh©μ‡g wb‡qvwRZ e¨vsKmg~n KZ©„K G‡R›U ev K¨vk c‡q›U wb‡qv‡Mi †ÿ‡Î h_vh_ hvPvB/evQvB cÖwμqv (Screening Mechanism) AbymiY Ki‡Z n‡e| G‡ÿ‡Î K¨vk c‡q›U/G‡R›U KZ…©K gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb welqK Kvh©μ‡gi Rb¨ mswkøó †mev`vbKvix e¨vsKmg~‡ni Dci mgfv‡e `vqfvi eZ©v‡e|

2| MÖvnK wbe©vPb bxwZgvjv t

MÖvnK wbe©vP‡bi †ÿ‡Î cÖwZwU e¨vs‡Ki GKwU mywbw`©ó bxwZgvjv _vK‡Z n‡e| D³ bxwZgvjvq Ab¨vb¨ wel‡qi mv‡_ Avewk¨Kfv‡e wb‡gœv³ welqmg~n AšÍfz©³ _vK‡e t

Page 51: Anti Money Laundering (AML) & Combating Financing Terrorism ...

4

(1) ‡ebv‡g ev QÙbv‡g ev ïaygvÎ b¤^ihy³ ‡Kvb MÖvn‡Ki wnmve †Lvjv hv‡e bv |

(2) Shell Bank Gi mv‡_ †Kvb ai‡Yi e¨vswKs m¤úK© ¯’vcb Kiv hv‡e bv| G‡ÿ‡Î Shell Bank ej‡Z Hme e¨vsK‡K e ySv‡e hviv †h‡`‡k wbewÜZ †m‡`‡k Zv‡`i †Kvb kvLv ev Kvh©μg ‡bB Ges †Kvb wbqwš¿Z Avw_©K MÖæc (Regulated Financial Group) Gi Awafy³ bq |

(3) RvwZms‡Ni wbivcËv cwil‡`i wewfbœ †iRyjyk‡bi AvIZvq mš¿vm I mš¿vmxKv‡h© A_©vq‡b RwoZ m‡›`‡n ZvwjKvfy³ †Kvb e¨w³ ev mËv Ges evsjv‡`k miKvi KZ©„K ZvwjKvfy³ ‡Kvb e¨w³ ev wbwl× †NvwlZ mËvi ‡Kvb wnmve †Lvjv hv‡e bv ev cwiPvjbv Kiv hv‡e bv| RvwZms‡Ni wbivcËv cwil‡`i wewfbœ †iRyjyk‡bi AvIZvq ZvwjKvfy³ e¨w³ ev mËv ej‡Z mš¿vm we‡ivax wewagvjv, 2013 Gi 2 (Q) bs wewa‡Z msÁvwqZ †iRyjyk‡bi AvIZvq ZvwjKvfz³ e¨w³ ev mËv‡K eySv‡e| GB ZvwjKvmg~n http://www.un.org/sc/committees/index.shtml ev http://www.bb.org.bd/aboutus/ dept /bfiu/sanction_list.php I‡qewjsK n‡Z msMÖn Kiv hv‡e| evsjv‡`k miKvi KZ©„K ZvwjKvfy³ ‡Kvb e¨w³ ev wbwl× †NvwlZ mËv ej‡Z mš¿vm we‡ivax AvBb, 2009 Gi 18 b¤^i avivq cÖ`Ë ÿgZve‡j evsjv‡`k miKvi KZ©„K mg‡q mg‡q miKvwi †M‡RU cªÁvcb Øviv Zdwmjfz³ ‡Kvb e¨w³ ev mËv‡K eySv‡e|

(4) Awbevmx evsjv‡`kx‡`i wnmve †Lvjvi †ÿ‡Î Foreign Exchange Regulation Act, 1947 Gi weavbvejx I Gi AvIZvq evsjv‡`k e¨vsK KZ…©K RvixK…Z wb‡`©kbvmg~n AbymiYxq n‡e|

3| MÖvnK cwiwPwZ t

gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iv‡a Ges e¨vswKs LvZ‡K G welqK SzuwK n‡Z gy³ ivLvi Rb¨ MÖvnK cwiwPwZi mwVK I c~Y ©v½ Z_¨ msMÖn Ki‡Z n‡e| e¨vswKs e¨e¯’v hv‡Z gvwbjÛvwis ev mš¿vmx Kv‡h© A_©vq‡bi SzuwKi m¤§yLxb bv nq Zv wbwðZ Kivi Rb¨ cÖwZwU e¨vsK‡K MÖvn‡Ki h_vh_ cwiwPwZ MÖnY Ges hvPvB cÖwμqv(Know Your Customer-KYC) m¤úv`b Ki‡Z n‡e|

3.1 MÖvn‡Ki msÁv t

gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb SzuwK e¨e¯’vcbvq MÖvnK cwiwPwZ I hvPvB cÖwμqvi ‡ÿ‡Î MÖvnK ej‡Z wb‡gœv³ e¨w³ ev mËv‡K eySv‡e t

(1) e¨vs‡Ki mv‡_ †Kvbiƒc wnmve msiÿY K‡i ev e¨vsK Gi mv‡_ †Kvbiƒc e¨emvwqK m¤úK© i‡q‡Q Ggb †h †Kvb e¨w³ ev mËv;

(2) wnmve ev e¨emvwqK m¤ú‡K©i cÖK…Z myweav‡fvMx (Beneficial Owner) Z…Zxq †Kvb e¨w³ ev mËv hvi c‡ÿ wnmve cwiPvwjZ nq;

(3) we`¨gvb AvBbx KvVv‡gvi AvIZvq wnmve cwiPvjbvKvix †Kvb †ckv`vi ga¨¯’ZvKvix KZ©„K cwiPvwjZ wnmve ev †jb‡`‡bi cÖK…Z myweav‡fvMx; Ges

(4) †Kvb e¨w³ ev cÖwZôvb KZ©„K GKK †jb‡`‡b msNwUZ AwaK g~‡j¨i wWgvÛ WÖvdU, †c-AW©vi, †UwjMÖvwdK UªvÝdvi ev cÖwZôv‡bi mybvg Ges Ab¨ ‡Kvb SzuwK m„wó Ki‡Z cv‡i Ggb Avw_©K †jb‡`‡bi †ÿ‡Î mswkøó e¨w³ ev mËv| G‡ÿ‡Î mswkøó e¨w³ ev cÖwZôv‡bi ^vfvweK †jb‡`b Gi Zzjbvq †Kvb †jb‡`b A¯^vfvweK cÖZxqgvb n‡j Zv ÔAwaK g~‡j¨iÕ e‡j we‡ewPZ n‡e|

Page 52: Anti Money Laundering (AML) & Combating Financing Terrorism ...

5

3.2 Customer Due Diligence t

(1) Customer Due Diligence (CDD) ej‡Z wbf©i‡hvM¨ I ¯^vaxb Drm n‡Z cÖvß Z_¨, DcvË I `wjjvw`i wfwˇZ MÖvn‡Ki cwiwPwZ hvPvBKiY I mbv³KiYmn wnmv‡ei †jb‡`b gwbUwis Kiv‡K eySv‡e| D‡jøL¨ †h, MÖvn‡Ki h_vh_ cwiwPwZ MÖnY Ges hvPvBKiY (KYC), CDD cÖwμqvi GKwU Ask|

(2) MÖvn‡Ki SzuwK we‡ePbvq wb¤œewY©Z wewfbœ ch©v‡q CDD m¤úv`b Ki‡Z n‡e-

(K) MÖvn‡Ki mv‡_ m¤úK© ’vc‡bi mgq;

(L) we`¨gvb MÖvn‡Ki mv‡_ Avw_©K †jb‡`b msNU‡bi mgq ;

(M) hLb m‡›`n Kivi h‡_ó KviY _vK‡e †h B‡Zvc~‡e© MÖvn‡Ki cwiwPwZi mc‡ÿ †h Z_¨ ev `wjjvw` msMÖn Kiv n‡q‡Q Zv ch©vß bq ev mwVK bq; Ges

(N) ‡Kvb †jb‡`b gvwbjÛvwis ev mš¿vmx Kv‡h© A_©vq‡bi mv‡_ RwoZ Giƒc m‡›`n n‡j|

(3) MÖvn‡Ki cwiwPwZ Ges e¨vs‡Ki mv‡_ m¤úK© ’vc‡bi AšÍwb©wnZ D‡Ïk¨ m¤ú‡K© wbwðZ nIqvi Rb¨ cÖ‡Z¨K e¨vsK Zv‡`i mš‘wó mv‡c‡ÿ ch©vß Z_¨ msMÖn Ki‡e| Òe¨vs‡Ki mš‘wó mv‡c‡ÿÓ ej‡Z we`¨gvb wb‡`©kbvi Av‡jv‡K MÖvn‡Ki SuzwK we‡ePbvq wb‡q cÖ‡qvRbxq Z_¨, DcvË I `wjjvw` msMÖnc~e©K CDD m¤úbœ Kiv n‡q‡Q g‡g© h_vh_ KZ©„cÿ‡K mš‘ó Kiv‡K eySv‡e|

(4) hw` MÖvn‡Ki c‡ÿ Ab¨ †Kvb e¨w³ wnmve cwiPvjbv K‡i †m‡ÿ‡Î D³ e¨w³ h_vh_fv‡e ÿgZvcÖvß wKbv Zv wbwðZ n‡q Zvi cwiwPwZi mwVK I c~Y©v½ Z_¨ msMÖn Ki‡Z n‡e |

(5) Uªvw÷ I †ckv`vi ga¨ ’ZvKvix KZ©„K MÖvn‡Ki c‡ÿ cwiPvwjZ wnmv‡ei †ÿ‡Î Zv‡`i AvBbMZ Ae ’vb ch©v‡jvPbv I Zvi h_v_©Zv wbiƒcYc~e©K mswkøó mK‡ji cwiwPwZi mwVK I c~Y©v½ Z_¨ msMÖn Ki‡Z n‡e |

(6) †hme †`k gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iv‡ai AvšÍR©vwZK gvb c~iY K‡iwb ev Zvrch©c~Y© NvUwZ i‡q‡Q (‡hgb t dvBb¨vwÝqvj A¨vKkb Uv¯‹‡dv‡m©i cvewjK WKz‡g‡›U High Risk and Non-Cooperative Jurisdictions wn‡m‡e ZvwjKvfy³ †`k) †mme †`‡ki †Kvb e¨w³ ev mËvi (AvBbMZ cÖwZwbwa, Avw_©K cÖwZôvbmn †h †Kvb cÖwZôvb) mv‡_ e¨emvwqK m¤úK© ¯’vcb I eRvq ivLv Ges †jb‡`b m¤úv`‡bi ‡ÿ‡Î AwaKZi mZK©Zvg~jK Enhanced Due Diligence m¤úbœ Ki‡Z n‡e|

(7) wnmv‡ei cÖK„Z myweav‡fvMx (Beneficial Owner) mbv³KiYc~e©K e¨vs‡Ki mš‘wó mv‡c‡ÿ wbf©i‡hvM¨ m~Î n‡Z msM„nxZ Z‡_¨i wfwˇZ wb‡¤œv³ †ÿ‡Î cwiwPwZ wbwðZ Ki‡Z n‡e t

(K) hw` ‡Kvb MÖvnK Ab¨ ‡Kvb e¨w³i c‡ÿ wnmve cwiPvjbv K‡i, ‡m †ÿ‡Î MÖvnK QvovI D³ e¨w³i cwiwPwZi mwVK I c~Y©v½ Z_¨ msMÖn I msiÿY Ki‡Z n‡e;

(L) hw` †Kvb e¨w³ †Kvb MÖvnK‡K wbqš¿Y K‡i †m †ÿ‡Î D³ e¨w³i cwiwPwZi mwVK I c~Y©v½ Z_¨ msMÖn I msiÿY Ki‡Z n‡e; Ges

(M) ‡Kv¤úvbxi †ÿ‡Î wbqš¿YKvix †kqvi †nvìvi A_ev 20% ev Z ~aŸ© GKK †kqvi †nvìvi‡K wnmv‡ei cÖK„Z myweav‡fvMx we‡ePbvq Zvi/Zv‡`i cwiwPwZi mwVK I c~Y©v½ Z_¨ msMÖn I msiÿY Ki‡Z n‡e|

Page 53: Anti Money Laundering (AML) & Combating Financing Terrorism ...

6

3.3 Customer Due Diligence m¤úv`b Kiv m¤¢e bv n‡j e¨vs‡Ki KiYxq t

MÖvn‡Ki Amn‡hvwMZvc~Y© AvPi‡Yi Kvi‡Y A_ev MÖvn‡Ki wel‡q msM„nxZ Z_¨/DcvË wbf©i‡hvM¨ bv n‡j A_©vr MÖvnK cwiwPwZi m‡šÍvlRbK Z_¨ cÖvwß Ges Zv hvPvB mv‡c‡ÿ CDD m¤úv`b Kiv m¤¢e bv n‡j e¨vsK wb¤œiƒc e¨e ’v MÖnY Ki‡et

(1) e¨vsK D³iƒc MÖvn‡Ki wnmve Lyj‡e bv A_ev cÖ‡qvR‡b we`¨gvb wnmve eÜ K‡i w`‡e|

(2) we`¨gvb Giƒc wnmve eÜ Kivi ‡ÿ‡Î EaŸ©Zb KZ©„c‡ÿi Aby‡gv`b MÖnY Ki‡Z n‡e Ges wnmve eÜ Kivi c~‡e© wnmve eÜKi‡Yi KviY e¨vL¨vc~e©K MÖvnK‡K †bvwUk cÖ`vb Ki‡Z n‡e |

(3) †ÿÎgZ Giƒc MÖvn‡Ki wel‡q m‡›`nRbK †jb‡`b wi‡cvU© `vwLj Ki‡Z n‡e|

3.4 MÖvn‡Ki wnmve cwiPvjbv msμvšÍ wbqgvejx t

(1) cÖwZwU e¨vsK MÖvn‡Ki wnmve †Lvjvi †ÿ‡Î cwiwkó ÔKÕ G mshy³ wnmve †Lvjvi di‡gi Av‡jv‡K cÖYxZ wbR¯^ dig e¨envi Ki‡e| MÖvnK cwiwPwZ Ges Customer Due diligence (CDD) h_vh_fv‡e m¤úv`b Kivi Rb¨ D³ wnmve †Lvjvi dig e¨envic~e©K cÖ‡Z¨K e¨vsK Zvi MÖvn‡Ki cwiwPwZi mwVK I c~Y©v½ Z_¨ msMÖn Ki‡e Ges MÖvn‡Ki SuywK we‡ePbvq 3.2 Aby‡”Q‡` DwjøwLZ CDD m¤úbœ Kivi wbw`©ó mg‡qi g‡a¨ msM„nxZ Z‡_¨i mwVKZv hvPvBmn CDD m¤úv`bc~e©K Z_¨ I `wjjvw` msiÿY Ki‡e| G‡ÿ‡Î e¨vsK †Kvbμ‡gB cwiwkó ÔKÕ G mshy³ wnmve †Lvjvi di‡g DwjøwLZ Z‡_¨i Kg Z_¨ msMÖn Ki‡e bv| Z‡e cÖ‡Z¨K e¨vsK h_vh_fv‡e MÖvn‡Ki cwiwPwZ I CDD m¤úv`b Kivi D‡Ï‡k¨ e¨vs‡Ki mš‘wó mv‡c‡ÿ D³ di‡g ewY©Z Z‡_¨i AwZwi³ Z_¨ msMÖn Ki‡Z cvi‡e| Ôe¨vs‡Ki mš‘wó mv‡c‡ÿÕ Gi e¨vL¨v 3.2 (3) Aby‡”Q‡` cÖ vb Kiv n‡q‡Q|

(2) GKB e¨vs‡K GKB MÖvn‡Ki GKvwaK wnmve cwiPvwjZ n‡j MÖvnK cwiwPwZi cybive„wË cwinvi I †jb‡`b gwbUwis Gi myweav‡_© e¨vsK D³ MÖvn‡Ki Rb¨ GKwU Unique Customer Identification Code (UCIC) eivÏ Ki‡e| D³ UCIC MÖvnK‡K wPwýZ Ki‡Z mvnvh¨ Ki‡e, wbw`©ó MÖvnK†K e¨vsK KZ©„K Kx Kx †mev cÖ`vb Kiv n‡”Q Zv wPwýZ (track) Ki‡Z mvnvh¨ Ki‡e Ges c~Y©v½fv‡e Avw_©K †jb‡`b gwbUwis-Gi †ÿ‡Î mnvqZv Ki‡e|

(3) Walk-in Customer A_©vr wnmveavix MÖvnK e¨ZxZ Ab¨ Kv‡iv Aby‡iv‡a wUwU, GgwUi gva¨‡g A_© †cÖi‡Yi †ÿ‡Î A_© †cÖiYKvix Ges cÖvc‡Ki c~Y©v½ I mwVK Z_¨, A_© †cÖi‡Yi D‡Ïk¨ Ges A‡_©i Dr‡mi Z_¨ msiÿY Ki‡Z n‡e| Walk-in Customer Gi Aby‡iv‡a wWwW ev †c-AW©vi Bm¨yi †ÿ‡ÎI Av‡e`bKvix I †ewbwdwmqvixi c~Y©v½ I mwVK Z_¨, A_© †cÖi‡Yi D‡Ïk¨ Ges A‡_©i Dr‡mi Z_¨ msiÿY Ki‡Z n‡e|

Òc~Y©v½ (complete)Ó ej‡Z †cÖiYKvix/Av‡e`bKvix Ges cÖvcK/‡ewbwdwmqvixi cwiwPwZ hvPvBK‡í cÖ‡qvRbxq mKj Z‡_¨i mwbœ‡ek‡K eySv‡e| D`vniY¯^iƒct †cÖiYKvix/Av‡e`bKvix Ges cÖvcK/‡ewbwdwmqvixi bvg I we¯ÍvwiZ wVKvbv, e¨vsK wnmve b¤^i (hw` _v‡K), cvm‡cvU©/RvZxq cwiPqcÎ/Rb¥ wbeÜb mb`/MÖnY‡hvM¨ cwiwPwZg~jK Qwehy³ AvBwW KvW©, ‡dvb/‡gvevBj b¤^i BZ¨vw`| ÒmwVK (Accurate)Ó ej‡Z c~Y©v½ Giƒc Z_¨‡K eySv‡e hvi mwVKZv hvPvB Kiv n‡q‡Q|

Walk-in Customer Gi †ÿ‡Î $ 5,000/-(cuvP nvRvi) ev Gi bx‡Pi As‡Ki †jb‡`‡bi †ÿ‡Î †cÖiYKvix/Av‡e`bKvix I cÖvcK/‡ewbwdwmqvixi bvg I wVKvbv Ges †cÖiYKvix/Av‡e`bKvixi †Uwj‡dvb b¤^i msMÖn Ki‡Z n‡e|

Page 54: Anti Money Laundering (AML) & Combating Financing Terrorism ...

7

(4) wnmveavix Mªvn‡Ki Aby‡iv‡a WªvdU/†c AW©vi Bmy¨i †ÿ‡ÎI cÖvc‡Ki c~Y©v½ I mwVK Z_¨ (3 b¤^i Aby‡”Q‡` ewY©Z msÁv Abyhvqx), A_© †cÖi‡Yi D‡Ïk¨ Ges A‡_©i Dr‡mi Z_¨ msiÿY Ki‡Z n‡e|

(5) AbjvBb Rgv ev D‡Ëvj‡bi †ÿ‡Î MÖvnK e¨ZxZ Ab¨ RgvKvix ev D‡ËvjbKvixi mwVK I c~Y©vsM Z_¨ (3 b¤i Aby‡”Q‡` ewY©Z msÁv Abyhvqx) msiÿY Ki‡Z n‡e| GQvov AbjvBb Rgvi †ÿ‡Î A‡_©i Dr‡mi Z_¨ msiÿY Ki‡Z n‡e|

(6) mKj K‡c©v‡iU/ †cÖvcÖvBUikxc cÖwZôv‡bi GK jÿ I Z ~aŸ© g~j¨gv‡bi Ges e¨w³ wnmv‡ei cuvP jÿ I Z`~aŸ© g~j¨gv‡bi †PK cwi‡kv‡ai †ÿ‡Î evsjv‡`k e¨vs‡Ki wb‡`©kbv Abyhvqx ÒMÖvnK m¤§wZcÎÓ (Positive Pay Instruction) Avewk¨Kfv‡e MÖnY Ges G msμvšÍ †iKW© msiÿY Ki‡Z n‡e|

(7) e¨vsK Mªvn‡Ki wnmv‡ei †jb‡`‡bi AbywgZ gvÎv (Transaction Profile) m¤ú‡K© MÖvn‡Ki †NvlYv wba©vwiZ di‡g msMÖn Ki‡e| MÖvn‡Ki cÖK…wZ, wnmv‡ei A‡_©i Drm I †jb‡`‡bi aiY ch©v‡jvPbvc~e©K e¨emvwqK m¤úK© ’vc‡bi 6(Qq) gv‡mi g‡a¨ MªvnK KZ©„K m¤úvw`Z †jb‡`b ch©v‡jvPbvc~e©K ‡hŠw³K we‡ePbvq Zvi h_v_©Zv wbiƒcYKiZt cÖ‡qvRbxq ms‡kvabx mv‡c‡ÿ †jb‡`‡bi AbywgZ gvÎv MÖvn‡Ki wbKU n‡Z cybivq MÖnYc~e©K msiÿY Ki‡e|

(8) cÖwZwU e¨vsK wbw`©ó mgq AšÍi AšÍi MÖvn‡Ki cwiwPwZg~jK Z_¨ (KYC) nvjbvMv`Ki‡Yi †ÿ‡Î cÖ‡qvRbxq e¨e¯’v MÖnY Ki‡e| wb¤œ SuywK m¤úbœ MÖvn‡Ki †ÿ‡Î Giƒc cÖwμqv cÖwZ yB eQi AšÍi AšÍi m¤úbœ Ki‡Z n‡e| GQvov, D”P SuywK m¤úbœ MÖvn‡Ki †ÿ‡Î Giƒc cÖwμqv GK eQi ci ci m¤úbœ Ki‡Z n‡e| Z‡e MÖvn‡Ki cwiwPwZg~jK Z‡_¨i †h †Kvb cwieZ©b AeMZ nIqvi mv‡_ mv‡_B Zv nvjbvMv` Ki‡Z n‡e| GQvov wbw`©ó †Kvb cÖ‡qvRb Abyf~Z n‡j †h †Kvb mg‡qB MÖvn‡Ki cwiwPwZg~jK Z_¨ nvjbvMv` Ki‡Z n‡e| nvjbvMv`K…Z Z‡_¨i wfwˇZ cybivq Awej‡¤^ Gme wnmv‡ei SuywK wbY©q Ki‡Z n‡e|

(9) GwcÖj 30, 2002 Zvwi‡Li c~‡e© †Lvjv †h mKj wnmv‡ei KYC cÖwμqv m¤úbœ Kiv m¤¢e nqwb †m mKj wnmve ÔmyßÕ (Dormant) wn‡m‡e wPwýZ n‡e| myß wn‡m‡e wPwýZ G mKj wnmv‡e ïaygvÎ A_© Rgv Kiv hv‡e wKš‘ D‡Ëvjb Kiv hv‡e bv| Z‡e MªvnK KZ©„K kvLv e¨e¯’vc‡Ki wbKU wjwLZ Av‡e`‡bi †cÖwÿ‡Z e¨vsK D³ Mªvn‡Ki KYC cÖwμqv m¤úbœ Ki‡j MÖvnK wnmvewU‡Z ¯vfvweK †jb‡`b m¤úv`b Ki‡Z cvi‡eb| †K›`ªxq cwicvjb BDwbU Giƒc myß wnmv‡ei Z_¨ msiÿY Ki‡e|

3.5 mkix‡i Abycw¯’Z ev `~ieZ©x M ªvn‡Ki ( Non face to face customer) †ÿ‡Î KiYxq t e¨vsK Zv‡`i mkix‡i Abycw¯’Z ev ~ieZ©x MÖvnK‡K †mev cÖ`v‡bi †ÿ‡Î gvwbjÛvwis I mš¿vmx Kv‡h© A_©vq‡bi SzuwK wbiƒcY Ges SzuwK wbim‡bi bxwZ I c×wZ cÖYqb Ki‡e Ges mgq mgq Zv ch©v‡jvPbv Ki‡e|

mkix‡i Abycw¯’Z ev ~ieZ©x MÖvnK ej‡Z H mKj MÖvnK‡K eySv‡e hviv e¨vsK kvLvq mkix‡i Dcw¯’Z bv n‡q e¨vs‡Ki G‡R‡›Ui gva¨‡g ev wb‡Ri ‡ckv`vi cÖwZwbwai (AvBbRxex, GKvD›U¨v›U BZ¨vw`) gva¨‡g wnmve Ly‡j _v‡K Ges cwiPvjbv K‡i _v‡K|

3.6 bZzb ‡mev ev cÖhyw³ MÖn‡Yi †ÿ‡Î KiYxq t

e¨vsK KZ©„K cÖhyw³ wbf©i bZzb †Kvb ‡mev ev c×wZ (†hgb, B›Uvi‡bU e¨vswKs, B‡jKUªwbK KvW© BZ¨vw`) cÖPjb ev cÖPwjZ †mev ev c×wZi Dbœq‡bi †ÿ‡Î mswkøó e¨vsK D³ ‡mev ev c×wZi gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb SzuwK wPwýZ Ki‡e, Zvi gvÎv wbiƒcY Ki‡e Ges Giƒc ‡mev ev c×wZ n‡Z m„ó SuywK †gvKv‡ejvi Rb¨ h_vh_ e¨e¯’v MªnY Ki‡e|

Page 55: Anti Money Laundering (AML) & Combating Financing Terrorism ...

8

3.7 Politically Exposed Persons (PEPs) Gi †ÿ‡Î KiYxq t

Politically Exposed Persons (PEPs) Gi wnmve ‡Lvjv I wnmve cwiPvjbvi †ÿ‡Î G mvK©yjv‡ii 3.2 b¤^i Aby‡”Q‡` ewY©Z wb‡` ©kbv Abymi‡Yi cvkvcvwk wb‡gœi wb‡ ©kbvmg~n AbymiY Ki‡Z n‡e t

K) e¨vsK‡K Zv‡`i MÖvnK ev wnmv‡ei cÖK…Z myweav‡fvMx PEPs wKbv Zv wbav©iY Kivi Rb¨ SuywK e¨e¯’vcbv c×wZ MÖnY Ki‡Z n‡e;

L) e¨vs‡Ki Dchy³ EaŸ©Zb KZ©„c‡ÿi Aby‡gv`b mv‡c‡ÿ Zv‡`i mv‡_ e¨emvwqK m¤úK© ¯’vcb Ki‡Z n‡e;

M) ‡Kvb PEP Gi wnmv‡ei A_© ev m¤ú‡`i Drm Rvbvi Rb¨ h‡_vchy³ e¨e ’v MÖnY Ki‡Z n‡e;

N) Zv‡`i wnmv‡ei †jb‡`b wbqwgZfv‡e gwbUi Ki‡Z n‡e; Ges

O) Foreign Exchange Regulation Act, 1947 I Gi AvIZvq evsjv‡`k e¨vsK KZ©„K RvixK…Z Awbevmx‡`i wnmve †Lvjv msμvšÍ hveZxq wewaweavb h_vixwZ cwicvjb Ki‡Z n‡e|

Politically Exposed Persons (PEPs) ej‡Z Òindividuals who are or have been entrusted with prominent public functions by a foreign country, for example Heads of State or of government, senior politicians, senior government, judicial or military officials, senior executives of state owned corporations, important political party officialsÓ ‡K eySv‡e|

PEPs Gi cwiev‡ii m`m¨ I Zv‡`i mv‡_ wbweofv‡e m¤úwK©Z e¨w³i (close associates) ‡ÿ‡ÎI Dc‡iv³ wb‡`©kbvmg~n cÖ‡hvR¨ n‡e|

G Aby‡”Q‡` DwjøwLZ ÔPEPsÕ wn‡m‡e †Kvb ga¨g ev Aa Íb (Middle ranking or more junior individuals) ch©v‡qi e¨w³ we‡ewPZ n‡eb bv|

3.8 cÖfvekvjx e¨w³i †ÿ‡Î KiYxq t

e¨vsK‡K Zv‡`i MÖvnK ev wnmv‡ei cÖK…Z myweav‡fvMx cÖfvekvjx †Kvb e¨w³ wKbv Zv wba©viY Ki‡Z n‡e| G ai‡Yi MÖvn‡Ki mv‡_ e¨vswKs m¤úK© SuywKc~Y© cÖZxqgvb n‡j Aby‡”Q` 3.7 Gi L n‡Z N μwg‡K ewY©Z wb‡`©kbv cwicvjb Ki‡Z n‡e|

cÖfvekvjx e¨w³ ej‡Z Òindividuals who are or have been entrusted domestically with prominent public functions, for example Head of State or of government, senior politicians, senior government, judicial or military officials, senior executives of state owned corporations, important political party officialsÓ ‡K eySv‡e|

cÖfvekvjx †Kvb e¨w³i †ÿ‡Î cÖ‡hvR¨ wb‡`©kbv Zv‡`i cwiev‡ii m`m¨ I Zv‡`i mv‡_ wbweofv‡e m¤úwK©Z e¨w³i (close associates) ‡ÿ‡ÎI cÖ‡hvR¨ n‡e|

G Aby‡”Q‡` DwjøwLZ ÔcÖfvekvjx e¨w³Õ wn‡m‡e †Kvb ga¨g ev Aa Íb (Middle ranking or more junior individuals) ch©v‡qi e¨w³ we‡ewPZ n‡eb bv|

3.9 AvšÍR©vwZK ms¯’vi cÖavb ev D”P ch©v‡qi Kg©KZ©vi †ÿ‡Î KiYxq t

e¨vsK‡K Zv‡`i MÖvnK ev wnmv‡ei cÖK…Z myweav‡fvMx †Kvb AvšÍR©vwZK ms¯’vi cÖavb ev D”P ch©v‡qi Kg©KZ©v wKbv Zv wba©viY Ki‡Z n‡e| Gai‡Yi MÖvn‡Ki mv‡_ e¨vswKs m¤úK© SuywKc~Y© cÖZxqgvb n‡j Aby‡”Q` 3.7 Gi L n‡Z N Ges cÖ‡hvR¨ †ÿ‡Î O μwg‡K ewY©Z wb‡`©kbv cwicvjb Ki‡Z n‡e|

Page 56: Anti Money Laundering (AML) & Combating Financing Terrorism ...

9

AvšÍR©vwZK ms¯’vi cÖavb ev D”P ch©v‡qi Kg©KZ©v ej‡Z Òpersons who are or have been entrusted with a prominent function by an international organization refers to members of senior management, i.e. directors, deputy directors and members of the board or equivalent functionsÓ ‡K eySv‡e|

AvšÍR©vwZK ms ’vi cÖavb ev D”P ch©v‡qi Kg©KZ©vi †ÿ‡Î cÖ‡hvR¨ wb‡`©kbv Zv‡`i cwiev‡ii m`m¨ I Zv‡`i mv‡_ wbweofv‡e m¤úwK©Z e¨w³i (close associates) ‡ÿ‡ÎI cÖ‡hvR¨ n‡e|

G Aby‡”Q‡` DwjøwLZ ÔAvšÍR©vwZK ms ’vi cÖavbÕ ev ÔD”P ch©v‡qi Kg©KZ©vÕ wn‡m‡e †Kvb ga¨g ev Aa Íb (Middle ranking or more junior individuals) ch©v‡qi e¨w³ we‡ewPZ n‡eb bv|

3.10 K‡imc‡Û›U e¨vswKs (Correspondent Banking) Gi †ÿ‡Î KiYxq t

e¨vswKs e¨e¯’v hv‡Z gvwbjÛvwis ev mš¿vmx Kv‡h© A_©vq‡b e¨eüZ n‡Z bv cv‡i †mRb¨ AvšÍt‡`kxq K‡imc‡Û›U e¨vswKs (Cross Border Correspondent Banking) m¤úK© ¯’vcb Ges Zv Ae¨vnZ ivLvi †ÿ‡Î wb‡gœi wb‡`©kbvmg~n Avewk¨Kfv‡e cwicvjbxq n‡e t

(1) K‡imc‡Û›U e¨vswKs ‡mev cÖ`v‡bi c~‡e© cwiwkó ÔLÕ †gvZv‡eK Z_¨vw` msMÖnc~e©K K‡imc‡Û›U ev †imc‡Û›U e¨vs‡Ki e¨emv†qi cÖK…wZ m¤ú‡K© wbwðZ n‡q EaŸ©Zb e¨e ’vcbv KZ©„c‡ÿi Aby‡gv`b MÖnY Ki‡Z n‡e|

(2) K‡imc‡Û›U ev †imc‡Û›U e¨vsKwU mswkøó wbqš¿YKvix KZ©„cÿ KZ ©„K Kvh©Kifv‡e Z`viK Kiv nq, G e¨vcv‡i mš‘wó mv‡c‡ÿB †KejgvÎ †Kvb we‡`kx e¨vs‡Ki mv‡_ K‡imc‡Û›U e¨vswKs m¤úK© ’vcb Kiv hv‡e ev eRvq ivLv hv‡e|

(3) †Kvb Shell Bank Gi mv‡_ K‡imc‡Û›U e¨vswKs m¤úK© ’vcb Kiv hv‡e bv ev eRvq ivLv hv‡e bv |

(4) †h me K‡imc‡Û›U ev †imc‡Û›U e¨vsK Shell Bank Gi mv‡_ K‡imc‡Û›U e¨vswKs m¤úK© ¯’vcb K‡i ev wnmve msiÿY K‡i ev †mev cÖ`vb K‡i Zv‡`i mv‡_ K‡imc‡Û›U e¨vswKs m¤úK© ’vcb Kiv hv‡e bv ev eRvq ivLv hv‡e bv| Shell Bank ej‡Z G mvK©yjv‡ii 2(2) Aby‡”Q‡` msÁvwqZ e¨vsK‡K eySv‡e|

(5) †hme †`k gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iv‡ai AvšÍR©vwZK gvb c~iY K‡iwb ev Zvrch©c~Y© NvUwZ i‡q‡Q (‡hgb t dvBb¨vwÝqvj A¨vKkb Uv¯‹‡dv‡m©i cvewjK WKz‡g‡›U High Risk and Non-Cooperative Jurisdictions wn‡m‡e ZvwjKvfy³ †`k) †mme †`‡ki e¨vs‡Ki mv‡_ K‡imc‡Û›U e¨vswKs m¤úK© ’vcb ev eRvq ivLvi e¨vcv‡i we‡kl mZK©Zv ev Enhanced Due Diligence Aej¤^b Ki‡Z n‡e| Gme e¨vs‡Ki Beneficial Ownership Ges gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iv‡a Zv‡`i bxwZ I c×wZ m¤ú‡K© we¯ÍvwiZ Z_¨ msMÖn Ki‡Z n‡e |

(6) †h mKj †imc‡Û›U e¨vsK Zv‡`i MÖvnK‡`i‡K e¨emv msμvšÍ †jb‡`b mivmwi m¤úv`b Kivi my‡hvM cÖ`vb K‡i _v‡K (A_©vr Payable through accounts) Zv‡`i ‡ÿ‡Î wb‡¤œv³ e¨e¯’v MÖnY Ki‡Z n‡e t

(K) †imc‡Û›U e¨vsK KZ©„K h_vh_fv‡e MÖvn‡Ki CDD m¤úv`b Ki‡Z n‡e;

(L) K‡imc‡ÛU e¨vs‡Ki Aby‡iv‡ai †cÖwÿ‡Z †imc‡Û›U e¨vsK KZ©„K mswkøó MÖvn‡Ki CDD welqK Z_¨vw` mieivn Kiv m¤¢e n‡e G welqwU wbwðZ n‡Z n‡e|

GLv‡b ÒPayable through accountsÓ ej‡Z ÒCorrespondent accounts that are used directly by third parties to transact business on their own behalfÓ eySv‡e|

Page 57: Anti Money Laundering (AML) & Combating Financing Terrorism ...

10

(7) G mvKz©jv‡i ewY©Z wb‡`©kbvejx we`¨gvb mKj K‡imc‡Û›U e¨vswKs m¤ú‡K©i †ÿ‡ÎI cÖ‡hvR¨ n‡e Ges GB wb‡`©kbvi Av‡jv‡K we`¨gvb K‡imc‡Û›U e¨vswKs m¤úK©mg~n cybtg~j¨vqb Ki‡Z n‡e|

AvšÍt‡`kxq K‡imc‡Û›U e¨vswKs ej‡Z ‡h †Kvb GK e¨vsK (K‡imc‡Û›U) KZ©„K Ab¨ e¨vsK‡K (†imc‡Û›U) e¨vswKs †mev cÖ`vb‡K eySv‡e| Giƒc e¨vswKs †mev ej‡Z †μwWU, wW‡cvwRU, Kv‡jKkb, wK¬qvwis, †c‡g›U, K¨vk g¨v‡bR‡g›U, AvšÍR©vwZK Aq¨vi UªvÝdvi, wWgvÛ WªvdU& Gi Rb¨ Wªwqs A¨v‡ićg›U ev Abyiƒc Ab¨ †Kvb †mev cÖ`vb‡K eySv‡e|

4| we‡`‡k Aew¯’Z e¨vsK kvLv I mvewmwWqvix cÖwZôvb Gi †ÿ‡Î KiYxq t

(1) cÖwZwU e¨vsK we‡`‡k Aew¯’Z Zv‡`i kvLv Ges mvewmwWqvix cÖwZôv‡bi †ÿ‡Î gvwbjÛvwis cÖwZ‡iva AvBb, 2012, mš¿vm we‡ivax AvBb, 2009 I D³ AvB‡bi AvIZvq RvixK…Z wewagvjvq ewY©Z weavbvejx Ges weGdAvBBD KZ©„K mgq mgq RvixK…Z wb‡ ©kbvejxi h_vh_ cwicvjb wbwðZ Ki‡e|

(2) we‡`‡k Aew¯’Z kvLv ev mvewmwWqvix cÖwZôvb hw` †Kvb Kvi‡Y gvwbjÛvwis cÖwZ‡iva AvBb, 2012, mš¿vm we‡ivax AvBb, 2009 I D³ AvB‡bi AvIZvq RvixK…Z wewagvjvq ewY©Z weavbvejx Ges weGdAvBBD KZ©„K mgq mgq RvixK…Z wb‡`©kbvejx h_vh_fv‡e cwicvj‡b Amg_© nq Z‡e Zvi KviY Awej†¤^ weGdAvBBD‡K AewnZ Ki‡Z n‡e|

5| ‡jb‡`b gwbUwis t

(1) cÖwZwU e¨vsK Mªvn‡Ki †jb‡`b wbqwgZ gwbUi Ki‡e|

(2) mKj RwUj, ¯^vfvwe‡Ki Zzjbvq AmvgÄm¨c~Y© Ges AvcvZ „wó‡Z †h mKj †jb‡`‡bi ‡Kvb Avw_©K ev `„wóMÖvn¨ ˆea D‡Ïk¨ †bB Giƒc †jb‡`b AwaKZi ¸iæZ¡ mnKv‡i gwbUi Ki‡Z n‡e |

(3) wbw ©ó mgq AšÍi AšÍi wnmv‡ei SzuwK ch©v‡jvPbv Kivi Rb¨ GKwU Kvh©Ki e¨e¯’v MªnY Ki‡Z n‡e Ges †m Abyhvqx D”P SuywKm¤úbœ wn‡m‡e †kÖYxK…Z wnmv‡ei †ÿ‡Î we‡kl mZK©Zv ev Enhanced Due Diligence (EDD) Aej¤^b Ki‡Z n‡e|

6| bM` †jb‡`b wi‡cvU© (Cash Transaction Report-CTR) t

(1) cÖwZwU e¨vsK kvLvmg~‡ni c~e©eZ©x gv‡mi ˆ`bw›`b †jb‡`b cixÿv K‡i †Kvb GKwU wnmv‡e †Kvb GKwU wbw`©ó w`‡b GK ev GKvwaK †jb‡`‡bi gva¨‡g Rgv ev D‡Ëvj‡bi (AbjvBb, GwUGgmn ‡h †Kvb ai‡Yi bM` Rgv ev D‡Ëvjb) cwigvY hw` 10(`k) jÿ UvKv ev Z ~aŸ© A‡_©i ev mgg~‡j¨i ˆe‡`wkK gy`ªvq nq Z‡e Zv ^ ^ †K›`ªxq cwicvjb BDwbU Gi gva¨‡g gvwmK wfwˇZ weGdAvBBD eive‡i bM` †jb‡`b wi‡cvU© wn‡m‡e `vwLj Ki‡e|

(2) e¨vs‡Ki †Kvb kvLvq Giƒc †Kvb †jb‡`b msNwUZ bv n‡j kvLv n‡Z ÒbM` †jb‡`b wi‡cvU© †hvM¨ †Kvb †jb‡`b †bBÓ g‡g© ‡K›`ªxq cwicvjb BDwbU‡K AewnZ Ki‡Z n‡e| †K›`ªxq cwicvjb BDwbU GmKj kvLvi GKwU ZvwjKv weGdAvBBD G ÒbM` †jb‡`b wi‡cvU©Ó `vwL‡ji mgq Zvi mv‡_ mshy³ Ki‡e|

(3) kvLv n‡Z bM` †jb‡`b wi‡cvU© `vwLj Kivi c~‡e© ‡jb‡`bmg~n ch©v‡jvPbv K‡i †Kvb m‡›`nRbK †jb‡`b msNwUZ n‡q‡Q wKbv Zv wPwýZ Ki‡Z n‡e I m‡›`nRbK †jb‡`b cwijwÿZ n‡j c„_Kfv‡e Òm‡›`nRbK †jb‡`b wi‡cvU©Ó wn‡m‡e †K›`ªxq cwicvjb BDwbU G `vwLj Ki‡Z n‡e| m‡›`nRbK †jb‡`b cwijwÿZ bv n‡j bM` †jb‡`b wi‡cv‡U©i mv‡_ Òm‡›`nRbK †jb‡`b cvIqv hvqwbÓ g‡g© ‡K›`ªxq cwicvjb BDwbU‡K AewnZ Ki‡Z n‡e|

(4) cÖ‡Z¨K e¨vsK kvLvi bM` †jb‡`b wi‡cvU© gvwmK wfwˇZ mswkøó kvLvq msiÿY Ki‡Z n‡e|

Page 58: Anti Money Laundering (AML) & Combating Financing Terrorism ...

11

(5) ‡K›`ªxq cwicvjb BDwbU e¨vs‡Ki bM` †jb‡`b wi‡cvU©‡hvM¨ mKj ‡jb‡`b ch©v‡jvPbv K‡i †Kvb m‡›`nRbK †jb‡`b msNwUZ n‡q‡Q wKbv Zv wPwýZ Ki‡e I m‡›`nRbK †jb‡`b cwijwÿZ n‡j c„_Kfv‡e Òm‡›`nRbK †jb‡`b wi‡cvU©Ó wn‡m‡e weGdAvBBD eivei `vwLj Ki‡e| m‡›`nRbK †jb‡`b cwijwÿZ bv n‡j Òm‡›`nRbK †jb‡`b cvIqv hvqwbÓ g‡g© cÖavb gvwbjÛvwis cÖwZ‡iva cwicvjb Kg©KZ©v n‡Z cÖZ¨qb cÎ MÖnYKiZt gvwmK bM` †jb‡`b wi‡cv‡U©i mv‡_ mshy³ Ki‡Z n‡e|

(6) cÖwZ gv‡mi bM` †jb‡`b wi‡cvU © cieZx© gv‡mi 21 Zvwi‡Li g‡a¨ goAML web e¨envi K‡i goAML Manual Gi wb‡`©kbv ‡gvZv‡eK `vwLj Kivi cvkvcvwk MZ 16 †deªæqvwi, 2006 Zvwi‡L RvwiK…Z GGgGj mvKz©jvi bs -10 Gi gva¨‡g mieivnK…Z dig †gvZv‡eK mdU Kwc (CD/DVD) weGdAvBBD eivei `vwLj Ki‡Z n‡e|

(7) http://www.bb.org.bd/eservices.php I‡qewjsK n‡Z goAML mswkøó cÖ‡qvRbxq Document WvDb‡jvW Kiv hv‡e |

(8) goAML web e¨envi K‡i bM` †jb‡`b wi‡cvU © `vwL‡ji †¶‡Î kvLvIqvix †jb‡`b msL¨vi GKwU ZvwjKv wi‡cvU© Gi mv‡_ mshyw³ AvKv‡i `vwLj Ki‡Z n‡e|

(9) miKvix wnmve (wewfbœ gš¿Yvjq, wefvMmn), miKvix gvwjKvbvaxb cÖwZôvb, Avav miKvix ev ¯^vqËkvwmZ cÖwZôv†bi wnmv‡e bM` Rgvi †ÿ‡Î bM` †jb‡`b wi‡cvU© `vwLj Kivi cÖ‡qvRb n‡e bv, Z‡e bM` D‡Ëvj‡bi †ÿ‡Î h_vwbq‡g bM` †jb‡`b wi‡cvU© `vwLj Ki‡Z n‡e|

(10) AvšÍte¨vsK Ges AvšÍtkvLv bM` †jb‡`‡bi †ÿ‡Î ÔbM` †jb‡`b wi‡cvU© Õ `vwLj Kivi cÖ‡qvRb n‡e bv|

(11) mswkøó gv‡m wi‡cvU©‡hvM¨ bM` †jb‡`b msNwUZ bv n‡j ÒbM` †jb‡`b wi‡cvU© cvIqv hvqwbÓ g‡g© cÖZ¨qbcÎ goAML Web Gi Message Board Gi gva¨‡g weGdAvBBD‡K AewnZ Ki‡Z n‡e|

(12) e¨vsKmg~n bM` †jb‡`b wi‡cvU© Gi Z_¨vw` weGdAvBBD G `vwL‡ji gvm n‡Z Kgc‡ÿ 5(cuvP) eQi msiÿY Ki‡e|

7| m‡›`nRbK †jb‡`b wi‡cvU© (Suspicious Transaction Report-STR) t

(1) gvwbjÛvwis cÖwZ‡iva AvBb, 2012 Gi 25(1)(N) aviv Ges mš¿vm we‡ivax AvBb, 2009 Gi 16(1) avivq ewY©Z wb‡`©k ev¯Íevq‡bi wbwg‡Ë cÖwZwU e¨vs‡Ki mKj Kg©KZ©v ˆ`bw›`b †jb‡`b ev Kvh©μ‡g m‡›`nRbK †jb‡`b mbv³Ki‡Y m‡PZb I mZK© _vK‡eb|

(2) m‡›`nRbK †jb‡`b mbv³Ki‡Y e¨vsK Kg©KZ©vMY gvwbjÛvwis cÖwZ‡iva AvBb, 2012 Gi 2(h) aviv Ges mš¿vm we‡ivax AvBb, 2009 Gi 2(16) avivq ewY©Z msÁv we‡ePbv Ki‡eb|

(3) e¨vsK kvLvi †Kvb Kg©KZ©v KZ…©K m‡›`nRbK †jb‡`b ev Kvh©μg wPwýZ nIqvi mv‡_ mv‡_ Zv kvLv gvwbjÛvwis cÖwZ‡iva cwicvjb Kg©KZ©v‡K wjwLZfv‡e AewnZ Ki‡Z n‡e| kvLv gvwbjÛvwis cÖwZ‡iva cwicvjb Kg©KZ©v wi‡cvU©K…Z †jb‡`b ev Kvh©μg Awej‡¤^ h_vh_fv‡e we‡kølY Ki‡eb Ges ch©‡eÿYmg~n wek`fv‡e wjwce× K‡i msiÿY Ki‡eb| ewY©Z †jb‡`b ev Kvh©μgwU m‡›`nRbK wn‡m‡e we‡ewPZ n‡j Zv Awej‡¤^ cÖ‡qvRbxq `wjjvw`mn ‡K›`ªxq cwicvjb BDwb‡U †cÖiY Ki‡Z n‡e|

(4) ‡K›`ªxq cwicvjb BDwbU kvLv n‡Z cÖvß m‡›`nRbK †jb‡`b ev Kvh©μgwU h_vh_fv‡e I cÖ‡qvRbxq Z_¨-DcvË ev `wjjvw` mwbœ‡ewkZ K‡i wi‡cvU© Kiv n‡q‡Q wKbv Zv ch©v‡jvPbv K‡i Awej‡¤^ goAML web e¨envi K‡i Ges goAML Manual Gi wb‡`©kbv Abymv‡i weGdAvBBD eivei m‡›`nRbK †jb‡`b wi‡cvU©

Page 59: Anti Money Laundering (AML) & Combating Financing Terrorism ...

12

`vwL‡ji cvkvcvwk cwiwkó- ÔMÕ †Z mshy³ dig e¨envi K‡i cÖ‡qvRbxq Z_¨-DcvË ev `wjjvw`mn weGdAvBBD eivei m‡›`nRbK †jb‡`b wi‡cvU© `vwLj Ki‡e|

(5) Aq¨vi UªvÝdv‡ii †ÿ‡Î ‡K›`ªxq cwicvjb BDwbU kvLv n‡Z cÖvß m‡›`nRbK †jb‡`b h_vh_fv‡e cÖ‡qvRbxq Z_¨-DcvË ev `wjjvw` mwbœ‡ewkZ K‡i wi‡cvU© Kiv n‡q‡Q wKbv Zv ch©v‡jvPbv K‡i Awej‡¤^ goAML web e¨envi K‡i Ges goAML Manual Gi wb‡ ©kbv Abymv‡i weGdAvBBD eivei m‡›`nRbK †jb‡`b wi‡cvU© `vwL‡ji cvkvcvwk cwiwkó-ÔNÕ †Z mshy³ dig e¨envi K‡i cÖ‡qvRbxq Z_¨-DcvË ev `wjjvw` mwbœ‡ek K‡i weGdAvBBD eivei m‡›`nRbK †jb‡`b wi‡cvU © `vwLj Ki‡e|

(6) ‡gvevBj dvBb¨vwÝqvj mvwf©m ev G‡R›U e¨vswKs Kvh©μ‡g wb‡qvwRZ e¨vsK Zvi K¨vk c‡q›U ev G‡R›U‡`i g‡a¨ m‡›`nRbK †jb‡`b ev Kvh©μ‡gi wel‡q Af¨šÍixY wi‡cvwU©s e¨e¯’v Pvjy Ki‡e| K¨vk c‡q›U ev G‡R›U‡`i wbKU †Kvb m‡›`nRbK †jb‡`b ev Kvh©μg wPwýZ n‡j mswkøó K¨vk c‡q›U ev G‡R›U KZ©„K GZ`&mshy³ Q‡K (cwiwkó ÔNÕ) e¨vs‡Ki †K›`ªxq cwicvjb BDwbU eive‡i m‡›`nRbK †jb‡`b wi‡cvU© `vwLj Ki‡Z n‡e| ‡K›`ªxq cwicvjb BDwbU cÖvß m‡›`nRbK †jb‡`b wi‡cvU© h_vh_fv‡e cÖ‡qvRbxq Z_¨-DcvË ev `wjjvw` mwbœ‡ewkZ K‡i `vwLj Kiv n‡q‡Q wKbv Zv ch©v‡jvPbv K‡i Awej‡¤^ goAML web e¨envi K‡i Ges goAML Manual Gi wb‡`©kbv Abymv‡i weGdAvBBD eivei m‡›`nRbK †jb‡`b wi‡cvU© `vwL‡ji cvkvcvwk cwiwkó-ÔNÕ †Z mshy³ dig e¨envi K‡i cÖ‡qvRbxq Z_¨-DcvË ev `wjjvw` mwbœ‡ek K‡i weGdAvBBD eivei m‡›`nRbK †jb‡`b wi‡cvU © `vwLj Ki‡e|

e¨vs‡Ki †Kvb mvewmwWqvixi gva¨‡g †gvevBj dvBb¨vwÝqvj mvwf©m ev G‡R›U e¨vswKs Kvh©μg cwiPvwjZ n‡j Ges D³ mvewmwWqvix gvwbjÛvwis cÖwZ‡iva AvBb, 2012 ev mš¿vm we‡ivax AvBb, 2009 Gi AvIZvq wi‡cvU© cÖ`vbKvix ms¯’v wn‡m‡e AšÍf©y³ n‡j mswkøó mvewmwWqvix KZ©„K mivmwi m‡›`nRbK †jb‡`b wi‡cvU© weGdAvBBD eivei `vwLj Ki‡Z n‡e|

(7) m‡›`nRbK †jb‡`b ev Kvh©μg mbv³KiY ev wi‡cvU© Kivi mv‡_ mswkøó Kg©KZ©vMY welqwUi †MvcbxqZv wbwðZ Ki‡eb|

(8) kvLv ch©v‡q †Kvb †jb‡`b ev Kvh©μg m‡›`nRbK wn‡m‡e wPwýZ bv n‡jI ‡K›`ªxq cwicvjb BDwbU KZ…©K †Kvb †jb‡`b ev Kvh©μg m‡›`nRbK cÖZxqgvb n‡j Aby‡”Q` 7(4) †gvZv‡eK m‡›`nRbK †jb‡`b wi‡cvU © weGdAvBBD eivei `vwLj Ki‡Z n‡e|

(9) e¨vsKmg~n m‡›`nRbK †jb‡`b wi‡cvU© Gi Z_¨vw` weGdAvBBD KZ©„K cieZ©x wb‡`©kbv bv †`qv ch©šÍ msiÿY Ki‡e|

8| Self Assessment Ges Independent Testing Procedures t

gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iv‡a GKwU Kvh©Kix e¨e¯’v cÖwZôvi j‡ÿ¨ e¨vs‡Ki Af¨šÍixY wbixÿv wefv‡Mi gva¨‡g kvLvmg~n n‡Z cÖvß Self Assessment Report ch©v‡jvPbv Ges Independent Testing Procedures h_vh_fv‡e m¤úbœ Kivi Rb¨ D³ wefvMwU‡Z ch©vß ‡jvKej wbwðZ Ki‡Z n‡e hv‡`i gvwbjÛvwis I mš¿v‡m A_©vqb cÖwZ‡iv‡a we`¨gvb AvBb, wewagvjv, weGdAvBBD Gi wb‡`©kbv Ges G welqK e¨vs‡Ki wbR¯^ bxwZgvjv m¤ú‡K© mg¨K Ávb i‡q‡Q|

8.1 kvLvmg~‡ni KiYxq t

(1) cÖwZwU kvLv KZ©„K Self Assessment Gi Rb¨ wba©vwiZ †PKwjó (cwiwkó ÔOÕ) Gi Dci wfwË K‡i lvb¥vwmK wfwˇZ wb‡R‡`i kvLvi g~j¨vqb Ki‡Z n‡e;

Page 60: Anti Money Laundering (AML) & Combating Financing Terrorism ...

13

(2) Av‡jvP¨ g~j¨vqb cÖwZ‡e`b P~ovšÍ Kivi c~‡e© kvLv e¨e ’vc‡Ki mfvcwZ‡Z¡ kvLvi mswkøó Kg©KZ©v‡`i wb‡q mfv Ki‡Z n‡e| D³ mfvq Lmov kvLv g~j¨vqb cÖwZ‡e`‡bi Dci Av‡jvPbv Ki‡Z n‡e, wPwýZ mgm¨v kvLv ch©v‡q mgvavb Kiv m¤¢eci n‡j kvLv KZ©„K Awej‡¤^ e¨e¯’v MÖnYc~e©K P~ovšÍ Ki‡Z n‡e Ges P~ovšÍ cÖwZ‡e`‡b mycvwik wjwce× Ki‡Z n‡e| cieZ©x gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iva welqK ‰ÎgvwmK mfv¸‡jv‡Z GZ`mswkøó wel‡qi AMÖMwZ wb‡q Av‡jvPbv Ki‡Z n‡e; Ges

(3) cÖwZwU lvb¥vwmKKvj mgvß nIqvi cieZx© gv‡mi 15 Zvwi‡Li g‡a¨ kvLv g~j¨vqb cÖwZ‡e`b, G wel‡q kvLv KZ©„K M„nxZ/M„nxZe¨ Kvh©μg I mycvwikmn cÖavb Kvh©vj‡qi Af¨šÍixY wbixÿv wefvM I †K› ªxq cwicvjb BDwb‡U †cÖiY Ki‡Z n‡e |

8.2 Af¨šÍixY wbixÿv wefv‡Mi KiYxq t

(1) Af¨šÍixY wbixÿv wefvM KZ©„K kvLvmg~n n‡Z cÖvß kvLv g~j¨vqb cÖwZ‡e`b hvPvB K‡i †Kvb kvLvq †Kvb SuywKc~Y© welq cwijwÿZ n‡j ZvrÿwYKfv‡e kvLvwU cwi`k©‡bi e¨e¯’v Ki‡Z n‡e Ges welqwU †K› ªxq cwicvjb BDwbU‡K AewnZ Ki‡Z n‡e|

(2) Af¨šÍixY wbixÿv wefvM Zv‡`i wbR¯ Ges wbqwgZ evwl©K cwi`k©b/wbixÿv Kg©m~Px Abymv‡i wewfbœ kvLvi cwi`k©b/ wbixÿv Kvh©μg m¤úv`bKv‡j Independent Testing Procedures Gi wba©vwiZ †PKwjó (cwiwkó ÒPÓ) Gi wfwˇZ mswkøó kvLvi gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iva Kvh©μg mswkøó welqvw` cixÿv Ki‡e I kvLvi ‡iwUs wbY©qKiZt mswkøó kvLvi cÖwZ‡e`b cÖYqb Ki‡e| GQvov, wbqwgZ evwl©K cwi`k©b/wbixÿv Kg©m~Pxi AwZwi³ Kgc‡ÿ 10% kvLvq c„_K cwi`k©b Kg©m~Pxi AvIZvq Independent Testing Procedures Gi wba©vwiZ †PKwjó (cwiwkó ÒQÓ) Gi wfwˇZ mswkøó kvLvi gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iva Kvh©μg msμvš Í welqvw` cixÿv Ki‡e I kvLvi ‡iwUs wbY©qKiZt cÖwZ‡e`b cÖYqb Ki‡e|

(3) Af¨šÍixY wbixÿv wefvM cwi`wk©Z/wbixwÿZ kvLvmg~‡ni †iwUs m¤^wjZ cÖwZ‡e`‡bi Kwc e¨vs‡Ki †K› ªxq cwicvjb BDwbU eive‡i †cÖiY Ki‡e|

(4) †gvevBj dvBb¨vwÝqvj mvwf©m I G‡R›U e¨vswKs Kvh©μ‡g wb‡qvwRZ e¨vsKmg~‡ni †ÿ‡Î Af¨šÍixY wbixÿv wefvM Zv‡`i K¨vk c‡q›U/G‡R›U‡`i gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iva Kvh©μg mswkøó welqvw`i cwicvjb Ae¯’v hvPvB‡qi wbwg‡Ë evwl©K wfwˇZ b~¨bZg 10% K¨vk c‡q›U/G‡R‡›Ui Dci cwi`k©b/wbixÿv Kvh©μg cwiPvjbv Ki‡e Ges cÖwZ‡e`b ‡K›`ªxq cwicvjb BDwb‡U †cÖiY Ki‡e|

8.3| †K›`ªxq cwicvjb BDwb‡Ui KiYxq t

(1) †K›`ªxq cwicvjb BDwbU kvLvmg~n n‡Z cÖvß kvLv g~j¨vqb cÖwZ‡e`b Ges e¨vs‡Ki Af¨šÍixY wbixÿv wefvM KZ©„K `vwLjK…Z cwi`k©b/wbixÿv cÖwZ‡e`‡bi Dci wfwË K‡i we‡eP¨ lvb¥vwm‡K cwi`wk©Z kvLvmg~‡ni †PKwj÷ wfwËK g~j¨vqb cÖwZ‡e`b cÖ¯‘Z Ki‡e| D³ cÖwZ‡e`‡b Ab¨vb¨ wel‡qi mv‡_ Avewk¨Kfv‡e wb‡gœi welqmg~n AšÍf©y³ _vK‡e t

(K) ‡gvU kvLvi msL¨v Ges kvLv n‡Z cÖvß †gvU †mjd A¨v‡mm‡g›U wi‡cv‡U©i msL¨v;

(L) wi‡cvU©Kv‡j Af¨šÍixY wbixÿv wefvM KZ©„K cwi`wk©Z/wbixwÿZ kvLvi msL¨v Ges kvLvmg~‡ni Ae ’v (kvLvIqvix cÖvß b¤^i);

(M) cÖvß †mjd A¨v‡mm‡g›U wi‡cv‡U© AwaK msL¨K kvLvq GKB ai‡Yi †h mKj Awbq‡gi welq D‡jøL i‡q‡Q Zv D‡jøLc~e©K H mKj Awbqg †iv‡a †K›`ªxq cwicvjb BDwbU KZ©„K M…nxZ e¨e¯’v;

Page 61: Anti Money Laundering (AML) & Combating Financing Terrorism ...

14

(N) Af¨šÍixY wbixÿv wefvM KZ©„K `vwLjK…Z cÖwZ‡e`‡b DwjøwLZ mvaviY I we‡kl Awbqgmg~n Ges H mKj Awbqg †iv‡a †K› ªxq cwicvjb BDwbU KZ©„K M…nxZ e¨e ’v; Ges

(O) cÖvß wi‡cv‡U© ÒAm‡šÍvlRbKÓ I ÒcÖvwšÍKÓ wn‡m‡e g~j¨vwqZ kvLvmg~‡ni cwicvjb wbwðZ KiZt †iwUs DbœqbK‡í M„nxZ e¨e¯’v|

Av‡jvP¨ cÖwZ‡e`bwU 1.3(4) G DwjøwLZ cÖwZ‡e`‡b AšÍfz©³ n‡e|

(2) kvLvmg~n n‡Z cÖvß kvLv g~j¨vqb cÖwZ‡e`b hvPvB K‡i †Kvb kvLvq †Kvb SuywKc~Y© welq cwijwÿZ n‡j ZvrÿwYKfv‡e kvLvwU Af¨šÍixY wbixÿv wefv‡Mi gva¨‡g cwi`k©‡bi e¨e¯’v Ki‡Z n‡e Ges welqwU Dchy³ KZ©„c‡ÿi bR‡i Avb‡Z n‡e|

(3) †gvevBj dvBb¨vwÝqvj mvwf©m Ges G‡R›U e¨vswKs Kvh©μ‡g wb‡qvwRZ e¨vsKmg~‡ni †ÿ‡Î ‡K›`ªxq cwicvjb BDwbU Af¨šÍixY wbixÿv wefvM n‡Z cÖvß cÖwZ‡e`bmg~n ch©v‡jvPbvc~e©K Zv‡`i ch©‡eÿY I mycvwikmn cÖwZ eQ‡ii Rvbyqvwi gv‡m c~e©eZx© eQ‡ii wbixÿvq cÖvß Awbq‡gi weeiY m¤^wjZ GKwU mvi-ms‡ÿc e¨vs‡Ki cÖavb wbe©vnx eivei `vwLj Ki‡e| cÖavb wbe©vnxi gZvgZmn Zv e¨vs‡Ki cwiPvjbv cl©` ev m‡e©v”P e¨e¯’vcbv KwgwUi mfvq Dc¯’vcb Ki‡Z n‡e| cÖavb wbe©vnx I cwiPvjbv cl©` ev m‡e©v”P e¨e¯’vcbv KwgwUi gZvgZ I M„nxZ e¨e¯’v m¤^wjZ GKwU evwl©K cÖwZ‡e`b †deªæqvwi gv‡mi g‡a¨ weGdAvBBD eive‡i `vwLj Ki‡Z n‡e|

9| Aq¨vi UªvÝdvi (Wire transfer) t

ÒAq¨vi UªvÝdvi (Wire transfer)Ó ej‡Z Ggb Avw_©K †jb‡`b‡K eySv‡e hv‡Z †Kvb Av‡e`bKvix e¨w³ ev cÖwZôv‡bi Aby‡iv‡a †Kvb e¨vsK B‡j±ªwbK gva¨g e¨envi K‡i Aci †Kvb e¨vsK kvLvi mnvqZvq †ewbwdwkqvix e¨w³ ev cÖwZôvb‡K A_© cÖ`vb K‡i|

9.1 Aq¨vi UªvÝdvi m¤úwK©Z Ab¨vb¨ msÁv

(1) ÒAvšÍt‡`kxq Aq¨vi UªvÝdvi (Cross-border wire transfer)Ó ej‡Z Giƒc Avw_©K †jb‡`b‡K eySv‡e †h ‡ÿ‡Î Av‡e`bKvix Ges †ewbwdwkqvix wfbœ wfbœ †`‡k Ae¯’vb K‡i| ZvQvov ci¯úi m¤úK©hy³ GKvwaK UªvÝdv‡ii ‡ÿ‡Î b~¨bc‡ÿ GKwU †jb‡`b †`‡ki evB‡i m¤úvw`Z n‡j ZvI AvšÍt‡`kxq Aq¨vi UªvÝdvi g‡g© MY¨ n‡e|

(2) ÒAf¨šÍixY Aq¨vi UªvÝdvi (Domestic wire transfer)Ó ej‡Z Giƒc †jb‡`b‡K eySv‡e †h‡ÿ‡Î Av‡e`bKvix I ‡ewbwdwkqvix GKB †`‡k Ae¯’vb K‡i| G‡ÿ‡Î ci¯úi m¤úK©hy³ GKvwaK UªvÝdv‡i e¨eüZ cÖwμqv Ab¨ †Kvb †`‡k m¤úbœ n‡jI Zv Af¨šÍixY Aq¨vi UªvÝdvi g‡g© MY¨ n‡e|

(3) ÒAv‡e`bKvix (Applicant/originator)Ó ej‡Z Ggb †Kvb e¨w³ ev cÖwZôvb‡K (wnmveavix wKsev wnmveavix bb) eySv‡e hvi Aby‡iv‡ai m~‡Î mswkøó e¨vsK ewY©Z Aq¨vi UªvÝdvi Kvh© m¤úv`b K‡i|

(4) Ò‡ewbwdwkqvix (Beneficiary)Ó ej‡Z Ggb †Kvb e¨w³ ev cÖwZôvb‡K (wnmveavix wKsev wnmveavix bb) eySv‡e hvi AbyK‚‡j A_© †cÖiY Kiv nq|

(5) Òc~Y©v½ (Complete)Ó ej‡Z Av‡e`bKvix ev †ewbwdwkqvixi cwiwPwZ hvPvBK‡í cÖ‡qvRbxq mKj Z‡_¨i mwbœ‡ek‡K eySv‡e| D`vniY ^iƒct Av‡e`bKvix/†ewbwdwkqvixi bvg I we¯ÍvwiZ wVKvbv, e¨vsK wnmve b¤^i (hw` _v‡K) RvZxq cwiPqcÎ/wbeÜb cÎ/MÖnY‡hvM¨ cwiwPwZg~jK Qwehy³ AvBwW KvW©, ‡dvb/‡gvevBj b¤^i BZ¨vw`|

Page 62: Anti Money Laundering (AML) & Combating Financing Terrorism ...

15

(6) ÒmwVK (Accurate)Ó ej‡Z Dc‡ii (5) `dvq ewY©Z Giƒc Z_¨‡K eySv‡e hvi mwVKZv hvPvB Kiv n‡q‡Q|

(7) ÒA_©en (Meaningful)Ó ej‡Z Dc‡ii (5) `dvq ewY©Z Giƒc Z_¨‡K eySv‡e hv evn¨Z ev AvcvZt we‡ePbvq h_vh_ g‡g© cÖZxqgvb nIqvi hyw³m½Z KviY i‡q‡Q|

9.2 mKj ai‡Yi Aq¨vi UªvÝdv‡ii †ÿ‡Î wb‡¤œv³ Z_¨vejx MÖnY wbwðZ Ki‡Z n‡e t

(1) AvšÍt‡`kxq Aq¨vi UªvÝdvi t

(K) mvaviY ev we‡kl AbygwZi AvIZvq Ab~¨b 1,000(GK nvRvi) ev Z ~aŸ© cwigvY gvwK©b Wjvi ev mgZzj¨ cwigvY ˆe‡`wkK gy`ªvq AvšÍt‡`kxq Aq¨vi UªvÝdv‡ii †ÿ‡Î Av‡e`bKvixi c~Y©v½ I mwVK Z_¨ msMÖn, msiÿY Ges B›UviwgwWqvix/‡ewbwdwkqvix e¨vs‡K †cÖiY Ki‡Z n‡e| GQvovI ewY©Z mxgvi bx‡Pi †jb‡`bmg~‡ni †ÿ‡Î Av‡e`bKvixi c~Y©v½ I A_©en Z_¨ msiÿY Ki‡Z n‡e|

(L) AvšÍt‡`kxq Aq¨vi UªvÝdv‡ii A_© †ewbwdwkqvix‡K cÖ`v‡bi †ÿ‡Î †ewbwdwkqvix m¤úwK©Z c~Y©v½ I A_©en Z_¨ msiÿY Ki‡Z n‡e|

(M) †h mKj †ÿ‡Î GKK Av‡e`bKvix KZ©„K GKvwaK AvšÍt‡`kxq Aq¨vi UªvÝdv‡ii gva¨‡g GKvwaK †ewbwdwmqvixi AbyK‚‡j e¨vP dvB‡j ¸”QvKv‡i (Bundled in a batch file) †cÖiY Kiv nq ‡m mKj †ÿ‡Î e¨vP dvB‡j Av‡e`bKvix I †ewbwdwmqvixi mwVK I c~Y©v½ Z_¨ AšÍf©y³ Ki‡Z n‡e| GQvov, Av‡e`bKvixi wnmve b¤^iI G‡ÿ‡Î e¨vsK AšÍf©y³ Ki‡e|

(2) Af¨šÍixY Iq¨vi UªvÝdvi t

(K) Ab~¨b 25,000/- (cuwPk nvRvi ) UvKv Af¨šÍixY Aq¨vi UªvÝdv‡ii †ÿ‡Î Av‡e`bKvixi c~Y©v½ I mwVK Z_¨ msMÖn, msiÿY Ges B›UviwgwWqvix/‡ewbwdwkqvix e¨vsK/cÖwZôv‡b †cÖiY Ki‡Z n‡e Ges ewY©Z mxgvi bx‡Pi †jb‡`bmg~‡ni †ÿ‡Î Av‡e`bKvixi c~Y©v½ I A_©en Z_¨ msiÿY Ki‡Z n‡e| GQvovI Af¨šÍixY Aq¨vi UªvÝdv‡ii A_© †ewbwdwkqvix‡K cÖ`v‡bi †ÿ‡Î †ewbwdwkqvix m¤úwK©Z c~Y©v½ I A_©en Z_¨ msiÿY Ki‡Z n‡e|

(L) †gvevBj dvBb¨vwÝqvj mvwf©m cÖ`vbKvix e¨vsK Dc‡iv³ wb‡`©kbvi AwZwi³ †c‡g›U wm‡÷gm wWcvU©‡g›U, evsjv‡`k e¨vsK KZ©„K mg‡q mg‡q mieivnK…Z KYC Format e¨envi Ki‡e|

(M) †WweU ev †μwWU KvW© e¨envi K‡i Aq¨vi UªvÝdv‡ii †ÿ‡Î (cY¨ I †mev μq e¨ZxZ) cwi‡kva msμvšÍ BÝUªvKkb/evZ©vq Dc‡ii 2(K) Gi Abyiƒc Z_¨ msiÿY Ki‡Z n‡e|

(N) miKvix/AvavmiKvix/ ^vqËkvwmZ cÖwZôv‡bi AbyK‚‡j Aq¨vi UªvÝdv‡ii ‡ÿ‡Î Dchy©³ wb‡ ©kbvmg~‡ni cwicvjb eva¨Zvg~jK bq| GQvovI AvšÍte¨vsK †jb‡`b (A_©vr †hLv‡b Av‡e`bKvix I †ewbwdwkqvix Dfq cÿB †Kvb e¨vsK ev Avw_©K cÖwZôvb) Kvh©μ‡gi †ÿ‡Î Dc‡ii 2(K) `dvq ewY©Z wb‡`©kbv cwicvjb Ae¨vnwZ‡hvM¨ we‡ewPZ n‡e|

9.3 AW©vwis, B›UviwgwWqvix I ‡ewbwdwkqvix e¨vsK-Gi KiYxq t

(1) AW©vwis e¨vsK t AW©vwis e¨vsK‡K Aq¨vi UªvÝdvi msμvšÍ †jb‡`‡bi †ÿ‡Î Av‡e`bKvixi mwVK Ges c~Y©v½ Z_¨ wbwðZ Ki‡Z n‡e| GQvov AW©vwis e¨vsK‡K †ewbwdwkqvixi A_©en Z_¨ msMÖn Ki‡Z n‡e| Gme Z_¨ b~¨bZg 05 (cvuP) eQi msiÿY Ki‡Z n‡e|

Page 63: Anti Money Laundering (AML) & Combating Financing Terrorism ...

16

(2) B›UviwgwWqvix e¨vsK t

(K) AvšÍt‡`kxq Ges Af¨šÍixY Dfq ai‡Yi Aq¨vi UªvÝdv‡ii †ÿ‡Î AW©vwis e¨vsK I †ewbwdwkqvwi e¨vs‡Ki gv‡S †Kvb e¨vsK †h †Kvb ai‡Yi B›UviwgwWqvix wn‡m‡e Kvh© m¤úv`bKv‡j D³ e¨vsK KZ©„K Av‡e`bKvix Ges †ewbwdwkqvix m¤úwK©Z Z_¨vw` msiÿY wbwðZ Ki‡Z n‡e| AW©vwis e¨vsK (cÖ‡hvR¨ †ÿ‡Î Ab¨ †Kvb B›UviwgwWqvix e¨vsK) n‡Z cÖvß Z_¨ B›UviwgwWqvix e¨vsK/ cÖwZôvb KZ©„K b~¨bZg 05 (cvuP) eQi msiÿY Ki‡Z n‡e|

(L) cÖwZwU B›UviwgwWqvix e¨vsK KZ©„K Aq¨vi UªvÝdvi m¤úv`‡bi †ÿ‡Î Av‡e`bKvix ev †ewbwdwkqvixi Z‡_¨i Afv‡e D³ UªvÝdvi m¤úv`b ev ¯’wMZKiY ev iwnZKiY Ges cÖ‡qvRbxq d‡jvAvc Kvh©μ‡gi Rb¨ mswkøó e¨vs‡K GKwU SuywKwfwËK bxwZgvjv I c×wZ _vK‡Z n‡e|

(3) ‡ewbwdwkqvix e¨vsK t

(K) Aq¨vi UªvÝdvi msμvšÍ †jb‡`b Kvh©μ‡g RwoZ ‡ewbwdwkqvix e¨vsK‡K Av‡e`bKvixi c~Y©v½ Z‡_¨i †Kvb NvUwZ Av‡Q wK bv Zv hvPvB Kivi Rb¨ GKwU SzuwKwfwËK c×wZi cÖeZ©Y Ki‡Z n‡e| Av‡e`bKvixi c~Y©v½ Z‡_¨i †Kvb NvUwZ cwijwÿZ n‡j cÖ‡qvRb‡ev‡a mswkøó cÿmg~n cvi¯úwiK †hvMv‡hv‡Mi gva¨‡g ev Ab¨vb¨ m~Î e¨envi K‡i Z_¨ msMÖn Ki‡e| cÖvcK/ †ewbwdwkqvix‡K A_© cwi‡kv‡ai mgq ‡ewbwdwkqvix e¨vsK‡K cÖvcK/ †ewbwdwkqvixi c~Y©v½ I mwVK Z_¨ msMÖn I mswkøó Z_¨ b~¨bZg 05 (cvuP) eQi msiÿY Ki‡Z n‡e|

(L) cÖwZwU †ewbwdwkqvix e¨vsK Aq¨vi UªvÝdvi m¤úv`‡bi †ÿ‡Î Av‡e`bKvix ev †ewbwdwkqvixi Z‡_¨i Afv‡e D³ UªvÝdvi m¤úv`b ev ¯’wMZKiY ev iwnZKiY Ges cÖ‡qvRbxq d‡jvAvc Kvh©μ‡gi Rb¨ mswkøó e¨vs‡K GKwU SuywKwfwËK bxwZgvjv I c×wZ _vK‡Z n‡e|

9.4 Aq¨vi UªvÝdvi msμvšÍ Ab¨vb¨ wb‡ ©kbv t

(1) †gvevBj dvBb¨vwÝqvj mvwf©m Kvh©μ‡g wb‡qvwRZ e¨vsKmg~n Zv‡`i G‡R›U‡`i nvjbvMv` ZvwjKv I‡qemvB‡U cÖKvk Ki‡e|

(2) †gvevBj dvBb¨vwÝqvj mvwf©m Kvh©μ‡g wb‡qvwRZ e¨vsKmg~n ‡gvevBj e¨vswKs †mev MÖnYKvixi m¤ú~Y© †iwR‡÷ªkb cÖwμqv m¤úv`b I Aby‡gv`‡bi c‡iB †KejgvÎ †jb‡`b m¤úv`b Ki‡Z cvi‡e| Z‡e †iwR‡÷ªkb cÖwμqv m¤úv`‡bi ci cash in Kiv hv‡e Z‡e Aby‡gv`‡bi c‡iB †KejgvÎ Cash out Kiv hv‡e |

(3) $ 1,000/-(GK nvRvi) ev Gi bx‡Pi As‡Ki †jb‡`‡bi †ÿ‡Î Av‡e`bKvix I ‡ewbwdwkqvixi bvg I wVKvbv Ges Av‡e`bKvixi †Uwj‡dvb b¤i msMÖn Ki‡Z n‡e|

(4) GZ`&mswkøó Kvh©μg cwiPvjbvKv‡j mswkøó me cÿ‡K Avewk¨Kfv‡e ˆe‡`wkK gy ªv †jb‡`b msμvšÍ weavbvejx, ‡c‡g›U wm‡÷gm wWcvU©‡g›U KZ©„K Bmy¨K…Z wb‡`©kbv, G BDwbU KZ©„K mg‡q mg‡q RvixK…Z wb‡`©kbv Ges G m¤úwK©Z me AvBb ev wewaweavb h_vixwZ AbymiY Ki‡Z n‡e|

10| mš¿vmx Kv‡h© A_©vqb I e¨vcK aŸsmvZ¥K A‡ ¿i we¯Ív‡i A_©vqb cÖwZ‡iva (Prevention of Financing of Terrorism and Financing of Proliferation of Weapons of Mass Destruction) t

(1) cÖ‡Z¨K e¨vsK cwiPvjbv cl©‡`i Aby‡gv`bμ‡g mš¿vmx Kv‡h© A_©vqb I e¨vcK aŸsmvZ¥K A¯¿ we¯Ív‡i A_©vqb msμvšÍ †jb‡`b cÖwZ‡iva I mbv³ Kivi j‡ÿ¨ GKwU c×wZ cÖwZôv Ki‡e, e¨vs‡Ki Kg©KZ©v‡`i `vq`vwqZ¡ m¤úwK©Z wb‡`©kbv Rvix Ki‡e, mgq mgq Zv ch©v‡jvPbv Ki‡e Ges weGdAvBBD KZ…©K RvixK…Z wb‡`©kbv h_vh_fv‡e cÖwicvjb Kiv n‡”Q wKbv Zv wbwðZ Ki‡e|

Page 64: Anti Money Laundering (AML) & Combating Financing Terrorism ...

17

(2) mš¿vmx Kv‡h© A_©vqb I e¨vcK aŸsmvZ¥K A¯¿ we¯Ív‡i A_v©qb m¤úwK©Z msev` MYgva¨‡g cÖKvk nevi mv‡_ mv‡_ D³ Kg©Kv‡Ûi mv‡_ RwoZ ‡Kvb e¨w³ ev mËvi †Kvb e¨vsK wnmve cwiPvwjZ n‡q _vK‡j G welqK we¯ÍvwiZ Z_¨ mswkøó e¨vsK KZ©„K Awej‡¤^ weGdAvBBD eive‡i ‡cÖiY Ki‡Z n‡e|

(3) cÖwZwU e¨vsK RvwZms‡Ni wbivcËv cwil‡`i wewfbœ †iRyjyk‡bi AvIZvq mš¿vm, mš¿vmx Kv‡h© A_©vqb I e¨vcK aŸsmvZ¥K A¯¿ we¯Ív‡i A_©vq‡b RwoZ m‡›`‡n ZvwjKvfy³ †Kvb e¨w³ ev mËv Ges evsjv‡`k miKvi KZ©„K ZvwjKvfy³ ‡Kvb e¨w³ ev wbwl× †NvwlZ mËvi nvjbvMv` Z_¨ B‡j±ªwbK c×wZ‡Z msiÿY Ki‡e| RvwZms‡Ni wbivcËv cwil‡`i wewfbœ †iRyjyk‡bi AvIZvq ZvwjKvfy³ e¨w³ ev mËv Ges evsjv‡`k miKvi KZ©„K ZvwjKvfy³ ‡Kvb e¨w³ ev wbwl× †NvwlZ mËvi msÁv G mvKz©jv‡ii 2(3) Aby‡”Q‡` cÖ`vb Kiv n‡q‡Q|

(4) cÖwZwU e¨vsK RvwZms‡Ni wbivcËv cwil‡`i †Kvb †iRyjyk‡bi AvIZvq ev evsjv‡`k miKvi KZ©„K ZvwjKvfz³ ev wbwl× †NvwlZ †Kvb e¨w³ ev mËvi bv‡g A_ev cÖZ¨ÿ ev c‡ivÿfv‡e Zv‡`i wbqš¿Yvaxb/¯v_©mswkøó †Kvb e¨w³ ev mËvi bv‡g e¨vsK wnmve i‡q‡Q wKbv ev †Kvb †jb‡`b msNwUZ n‡q‡Q wKbv Zv wPwýZ Kivi Rb¨ wbqwgZ ‡jb‡`b gwbUi Ki‡e Ges cÖ‡qvR‡b †jb‡`b ch©v‡jvPbv Ki‡e| ZvwjKvfz³ ev wbwl× †NvwlZ †Kvb e¨w³ ev mËv A_ev cÖZ¨ÿ ev c‡ivÿfv‡e Zv‡`i wbqš¿Yvaxb/ ^v_©mswkøó †Kvb e¨w³ ev mËvi †Kvb e¨vsK wnmve ev †jb‡`b wPwýZ nIqvi mv‡_ mv‡_ mswkøó e¨vsK D³ wnmv‡ei ‡jb‡`b ev †jb‡`bwU ¯’wMZ K‡i cieZx© Kg© w`e‡mi g‡a¨ G welqK we¯ÍvwiZ Z_¨ weGdAvBBD‡K AewnZ Ki‡e|

(5) hw` Aq¨vi UªvÝdvi msμvšÍ †jb‡`‡bi Av‡e`bKvix wKsev †ewbwdwkqvix RvwZms‡Ni wbivcËv cwil‡`i †Kvb †iRyjyk‡bi AvIZvq ev evsjv‡`k miKvi KZ©„K ZvwjKvfz³ ev wbwl× †NvwlZ †Kvb e¨w³ ev mËv nq Z‡e Zv wPwýZ nIqvi mv‡_ mv‡_ mswkøó e¨vsK D³ †jb‡`bwU ¯’wMZ K‡i cieZx© Kg© w`e‡mi g‡a¨ G welqK we¯ÍvwiZ Z_¨ weGdAvBBD‡K AewnZ Ki‡e|

(6) RvwZms‡Ni wbivcËv cwil` KZ…©K M„nxZ †iRyjykb 1373 (2001) Gi AvIZvq we‡`kx miKvi ev we‡`kx GdAvBBD Gi Aby‡iv‡a weGdAvBBD n‡Z ‡cÖwiZ ev D³ †iRyjyk‡bi AvIZvq evsjv‡`k miKvi KZ©„K ZvwjKvfy³ ev wbwl× †NvwlZ †Kvb e¨w³ ev mËvi mv‡_ e¨vsK wnmve ev Ab¨ †Kvb m¤úK© i‡q‡Q wKbv Zv wPwýZ Kivi Rb¨ e¨vsK wbqwgZ ‡jb‡`b gwbUi Ki‡e Ges cÖ‡qvR‡b †jb‡`b ch©v‡jvPbv Ki‡e| ZvwjKvfz³ ev wbwl× †NvwlZ †Kvb e¨w³ ev mËvi †Kvb e¨vsK wnmve wPwýZ nIqvi mv‡_ mv‡_ mswkøó e¨vsK D³ wnmv‡ei ‡jb‡`b ’wMZ K‡i cieZx© Kg© w`e‡mi g‡a¨ we ÍvwiZ Z_¨ weGdAvBBD‡K AewnZ Ki‡e|

(7) AvšÍR©vwZK evwYwR¨K †jb‡`‡bi †ÿ‡Î cÖ‡Z¨KwU e¨vsK D³ †jb‡`b m¤úv`‡bi c~‡e© ‡jb‡`‡bi mv‡_ m¤úwK©Z cÿmg~n RvwZms‡Ni wbivcËv cwil‡`i †Kvb †iRyjyk‡bi AvIZvq ev evsjv‡`k miKvi KZ©„K ZvwjKvfz³ ev wbwl× †NvwlZ †Kvb e¨w³ ev mËv wKbv Zv wPwýZ Kivi Rb¨ †jb‡`bwU ch©v‡jvPbv Ki‡e| ZvwjKvfz³ ev wbwl× †NvwlZ †Kvb e¨w³ ev mËvi mswkøóZv wPwýZ nIqvi mv‡_ mv‡_ mswkøó e¨vsK D³ †jb‡`bwU ¯’wMZ K‡i cieZx© Kg© w`e‡mi g‡a¨ we¯ÍvwiZ Z_¨ weGdAvBBD‡K AewnZ Ki‡e|

11| wb‡qvM I cÖwkÿY t

11.1 wb‡qvM t

gvwbjÛvwis, mš¿vmx Kv‡h© A_©vqb I e¨vcK aŸsmvZ¥K A‡¯¿i we¯Ív‡i A_©vq‡bi SuywK wbim‡bi j‡ÿ¨ e¨vsK Zv‡`i wewfbœ wb‡qvM cÖwμqvq h_vh_ hvPvB cÖwμqv (Screening Mechanism) AbymiY Ki‡e hv‡Z †Kvb ¯Í‡ii Kg©KZ©vi gva¨‡g e¨vsK G ai‡Yi SuzwKi m¤§yLxb bv nq |

Page 65: Anti Money Laundering (AML) & Combating Financing Terrorism ...

18

11.2 cÖwkÿY- e¨vsK Kg©KZ©v t

(1) gvwbjÛvwis, mš¿vmx Kv‡h© A_©vqb I e¨vcK aŸsmvZ¥K A‡¯¿i we¯Ív‡i A_©vqb cÖwZ‡iva Kvh©μ‡gi h_vh_ cwicvjb wbwðZ Kivi j‡ÿ¨ cÖ‡Z¨K e¨vsK Zv‡`i mKj Kg©KZ©v‡`i gvwbjÛvwis, mš¿vmx Kv‡h© A_©vqb I e¨vcK aŸsmvZ¥K A‡¯¿i we Ív‡i A_©vqb cÖwZ‡iva mswkøó wel‡q Dchy³ cÖwkÿY cÖ`v‡bi e¨e ’v Ki‡e ; (2) †gvevBj dvBb¨vwÝqvj mvwf©m I G‡R›U e¨vswKs Kvh©μ‡g wb‡qvwRZ e¨vsKmg~n Zv‡`i K¨vk c‡q›U/G‡R›U‡`i (A_ev Ab¨ †h †Kvb bv‡gB AwfwnZ ‡nvK bv †Kb) Rb¨ wbqwgZ gvwbjÛvwis, mš¿vmx Kv‡h© A_©vqb I e¨vcK aŸsmvZ¥K A‡¯¿i we¯Ív‡i A_©vqb cÖwZ‡iva mswkøó wel‡q Dchy³ cÖwkÿY cÖ v‡bi e¨e ’v Ki‡e;

(3) e¨vsK cÖwkÿY msμvšÍ Z_¨ I `wjjvw` msiÿY Ki‡e|

11.3 wkÿY- e¨vsK MÖvnK t

(1) e¨vsK Zv‡`i MÖvnK‡`i wnmve †Lvjvi cÖv°v‡j hvwPZ wewfbœ Z_¨ mwbœ‡ek I `wjjvw` `vwL‡ji †hŠw³KZvi wel‡q MÖvnK‡K AewnZ Ki‡e Ges gvwbjÛvwis, mš¿vmx Kv‡h© A_©vqb I e¨vcK aŸsmvZ¥K A‡¯¿i we¯Ív‡i A_©vqb cÖwZ‡iva wel‡q MÖvnK‡`i m‡PZbZv e„w×i j‡ÿ¨ mgq mgq wjd‡jU weZiY Ges cÖwZwU e¨vsK kvLvi „k¨gvb ’v‡b G welqK †cv÷vi ’vc‡bi e¨e ’v Ki‡e|

(2) †gvevBj dvBb¨vwÝqvj mvwf©m I G‡R›U e¨vswKs Kvh©μ‡g wb‡qvwRZ e¨vsKmg~n gvwbjÛvwis, mš¿vmx Kv‡h© A_©vqb I e¨vcK aŸsmvZ¥K A‡¯¿i we¯Ív‡i A_©vqb cÖwZ‡iva wel‡q MÖvnK‡`i m‡PZbZv e„w×i j‡ÿ¨ mgq mgq wjd‡jU weZiY Ges cÖwZwU K¨vk c‡q›U/G‡R›U Awd‡mi `„k¨gvb ’v‡b †cv÷vi ’vc‡bi e¨e ’v Ki‡e|

(3) GQvov Corporate Social Responsibility (CSR) Gi AvIZvq gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iv‡a wewfbœ MYgva¨gmn Ab¨vb¨ gva¨‡g G welqK m‡PZbZvg~jK weÁvcb, Z_¨wPÎ BZ¨vw` cÖPv‡ii e¨e ’v Ki‡e|

12| ‡iKW© Ges cÖ‡qvRbxq Z_¨/`wjjvw` msiÿY t (1) MÖvn‡Ki Af¨šÍixY I ˆe‡`wkK †jb‡`b msμvšÍ mKj cÖ‡qvRbxq Z_¨ ev `wjjvw` wnmve eÜ nIqvi ZvwiL n‡Z Ab~¨b 5(cuvP) ermi ch©šÍ msiÿY Ki‡Z n‡e;

(2) MÖvn‡Ki KYC mn CDD cÖwμqv m¤úv`bKv‡j msM„nxZ mKj Z_¨ I `wjjvw`, wnmve msμvšÍ `wjjvw`, e¨emvwqK cÎ †hvMv‡hvM Ges †Kvb MÖvn‡Ki wel‡q †Kvb cÖwZ‡e`b cÖYxZ n‡j G mKj Z_¨vw`/`wjjvw` MÖvn‡Ki wnmve eÜ nIqvi ZvwiL n‡Z Ab~¨b 5 (cuvP) ermi ch©šÍ msiÿY Ki‡Z n‡e|

(3) Walk-in Customer KZ…©K ‡jb‡`b msNwUZ nIqvi ZvwiL n‡Z Ab~¨b 5 (cuvP) ermi ch©šÍ †jb‡`b msμvšÍ mKj cÖ‡qvRbxq Z_¨ ev `wjjvw` msiÿY Ki‡Z n‡e|

(4) msiwÿZ Z_¨vw` Aciva Kvh©μ‡gi wePvwiK cÖwμqvq `vwjwjK cÖgvY wn‡m‡e Dc ’vcb Kivi ‡ÿ‡Î h‡_ó n‡Z n‡e|

(5) e¨vsK MÖvn‡Ki KYC mn CDD cÖwμqv m¤úv`bKv‡j M„nxZ mKj Z_¨ I `wjjvw` Ges †jb‡`b msμvšÍ Z_¨ I `wjjvw` weGdAvBBD Gi Pvwn`v ev wb‡`©kbv †gvZv‡eK mieivn Ki†e|

Page 66: Anti Money Laundering (AML) & Combating Financing Terrorism ...

19

13| Zdwmjx e¨vsKmg~‡ni Rb¨ B‡Zvc~‡e© RvixK…Z wb‡¤œv³ mvKz©jvi/mvKz©jvi ‡jUvimg~‡ni wb‡`©kbv ejer _vK‡e| mvKz©jvi/ mvK©yjvi †jUvi bs Rvixi ZvwiL welq

GGgGj mvKz©jvi bs- 10 Gi ïaygvÎ Cash Transaction Report Form

16 †deªæqvwi, 2006 bM` †jb‡`b wi‡cvU© `vwLjKiY cÖm‡½|

GGgGj mvKz©jvi bs-22 21 GwcÖj, 2009 mš¿vm we‡ivax AvBb, 2009 Rvix cÖm‡½|

weGdAvBBD mvKz©jvi bs-02 15 gvP©, 2012 gvwbjÛvwis cÖwZ‡iva AvBb, 2012 I mš¿vm we‡ivax (ms‡kvab) AvBb, 2012 Rvix cÖm‡½|

weGdAvBBD mvKz©jvi bs-07 14 RyjvB, 2013 mš¿vm we‡ivax (ms‡kvab)AvBb, 2013 Rvix cÖm‡½|

weGdAvBBD mvKy©jvi †jUvi-01 30 Rvbyqvwi, 2012 weGdAvBBD bvgKiY cÖm‡½|

14| Aby‡”Q` 13 G DwjøwLZ mvKz©jvi I mvKz©jvi †jUvi e¨ZxZ G gv÷vi mvK©yjvi Rvixi c~‡e© Zdwmjx e¨vsKmg~‡ni Rb¨ gvwbjÛvwis cÖwZ‡iva wefvM ev weGdAvBBD KZ©„K RvixK…Z Ab¨ mKj mvKz©jvi I mvKz©jvi †jUv‡ii wb‡`©kbv G gv÷vi mvKz©jv‡ii wb‡`©kbv Øviv cÖwZ ’vwcZ g‡g© we‡ewPZ n‡e|

G mvKz©jv‡ii wb‡`©kbvmg~n Awej‡¤^ Kvh©Ki n‡e| Avcbv‡`i wek¦ Í,

ms‡hvRbx t †gvU 38 c„ôv|

(†gvt bvwmiæ¾vgvb) gnve¨e¯’vcK

‡dvbt 9530118 cÖwZwjwc bs-weGdAvBBD(cwjwm)-3/2014- 762 ZvwiL t DwjøwLZ AeMwZ I cÖ‡qvRbxq e¨e¯’v MÖn‡Yi Rb¨ cÖwZwjwc †cÖiY Kiv n‡jv t 1. mKj wefvMxq cÖavb, evsjv‡`k e¨vsK, cÖavb Kvh©vjq, XvKv| 2. gnve¨e¯’vcK, evsjv‡`k e¨vsK, gwZwSj, XvKv/PÆMÖvg/ivRkvnx/Lyjbv/e¸ov/wm‡jU/m`iNvU,XvKv/ewikvj/iscyi/gqgbwmsn| 3. wbe©vnx cwiPvjK, Mfb©i g‡nv`‡qi mwPevjq, evsjv‡`k e¨vsK, cÖavb Kvh©vjq, XvKv| 4. Mfb ©i g‡nv`‡qi e¨w³MZ Kg©KZ©v, evsjv‡`k e¨vsK, cÖavb Kvh©vjq, XvKv| 5. †WcywU Mfb©i g‡nv`qM‡Yi mv‡_ mshy³ Dc-cwiPvjK/mnKvix cwiPvjK, evsjv‡`k e¨vsK, cÖavb Kvh©vjq, XvKv| 6. A_©‰bwZK Dc‡`óv/wbe©vnx cwiPvjK g‡nv`qM‡Yi e¨w³MZ mnKvix, evsjv‡`k e¨vsK, cÖavb Kvh©vjq, XvKv| 7. gnvcwiPvjK, evsjv‡`k BbwówUDU Ae e¨vsK g¨v‡bR‡g›U, wgicyi, XvKv| 8. gnvmwPe, w` BbwówUDU Ae e¨vsKvm© evsjv‡`k, weGmAviGm feb, 10g Zjv, 12, KvIivb evRvi, †ZRMuvI, XvKv| 9. †Pqvig¨vb, evsjv‡`k G‡mvwm‡qkb Ae e¨vsKm, 42, Kvgvj AvZvZzK© GwfwbD, ebvbx, XvKv| 10. †Pqvig¨vb, G‡mvwm‡qkb Ae e¨vsKvm©, evsjv‡`k, B÷vb© Kgvwk©qvj Kg‡cø·, 73, KvKivBj, XvKv|

(Bqvmwgb ingvb eyjv)

hyM¥ cwiPvjK ‡dvbt 9530010-75/2465

Page 67: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-K

1

......................... e¨vsK/e¨vsK wjt ....................kvLv

wnmve †Lvjvi Av‡e`b dig

e¨w³K wnmve ZvwiLt............................... wnmve b¤^it ............................

BDwbK MÖvnK AvBwW †KvWt ............................. e¨e ’vcK e¨vs‡Ki bvgt ---------------- kvLvi bvgt ---------------- wcÖq g‡nv`q

Avwg/Avgiv Avcbvi kvLvq GKwU wnmve †Lvjvi Rb¨ Av‡e`b KiwQ| Avgvi/Avgv‡`i wnmve msμvšÍ I e¨w³MZ we¯ÍvwiZ Z_¨ wb‡gœ cÖ`vb KiwQ t 1| wnmv‡ei bvg t .......................................................................................................................

2| wnmv‡ei cÖK…wZ (wUK w`b)t mÂqx PjwZ GmGbwW ’vqx FC RFCD NFCD

Ab¨vb¨ ........................................................................................

3| gy`ªv (wUK w`b)t UvKv Wjvi BD‡iv cvDÛ Ab¨vb¨......

4| wnmve cwiPvjbv msμvšÍ †NvlYv (wUK w`b)t GKKfv‡e †hŠ_fv‡e ‡h †Kvb GKRb RxweZRb

Ab¨vb¨ ........................................................................................................................

5| Ab¨ †Kvb e¨vs‡K cwiPvwjZ wnmve Av‡Q wK (wUK w`b)? n¨vu bv

DËi n¨vu n‡j--

e¨vsK I kvLvi bvg wnmv‡ei cÖK…wZ (wUK wPý w`b)

(K) ........................ Rgv wnmve FY wnmve Ab¨vb¨ (L) ........................ Rgv wnmve FY wnmve Ab¨vb¨ (M) ......................... Rgv wnmve FY wnmve Ab¨vb¨ (N) ........................... Rgv wnmve FY wnmve Ab¨vb¨

6| cwiPq`vbKvixi Z_¨t

(K) bvg t................................................................. (L) wnmve bs t..................................................................

(M) kvLvi bvg t.................................................................. (N) MÖvn‡Ki mv‡_ m¤úK © t..................................................................

(O) ¯^vÿi (ZvwiLmn) t.................................................................. cwiPq`vbKvixi Z_¨ cÖZ¨vqbKvix mswkøó e¨vsK kvLvi Kg©KZ©vi bvg I ¯^vÿi t........................................

Page 68: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-K

2

7| cÖv_wgK Rgvi cwigvY t .......................... 8| GdwWAvi msμvšÍ Z_¨t cwigvYt................................................... gy`ªv t ..................................

†gqv`Kvj t eQi gvm w`b | ‡gqv`c~wZ©i ZvwiL t ..........................................

bevq‡bi †ÿ‡Î t Avmj Ges my` bevqb Kiæb ïaygvÎ Avmj bevqb Kiæb, my` ...............................b¤^i wnmv‡e Rgv Kiæb

cÖ‡hvR¨ b‡n| 9| we‡kl ¯‹xg msμvšÍ Z_¨t ¯‹x‡gi bvgt............................................................................................................................. ¯‹x‡gi †gqv`t................... GKKvjxb Rgv/ wKw¯Íi cwigvYt ................... wKw¯Íi msL¨v (evwl©K) t............ †gqv`v‡šÍ cÖ‡`qt.................................................... gvwmK c Ö‡`qt...............................................

10| GK ev GKvwaK wnmveavix bvevjK n‡j t

Avwg wbgœewY©Z wnmveavixi ˆea AwffveK wn‡m‡e GB g‡g© †NvlYv KiwQ †h, wnmveavix bvevjK| Zvi cÖ‡qvRbxq Z_¨ mshy³ di‡g cÖ`vb Kiv n‡jv| wnmveavix mvevjK bv nIqv ch©šÍ wKsev Avgvi cieZx© †NvlYv bv †`qv ch©šÍ ˆea AwffveK wnmv‡e wnmvewU Avgvi ^vÿ‡i cwiPvwjZ n‡e|

(K) wnmveavix (bvevjK) Gi bvg t............................................................................................... (L) Awffve‡Ki bvg t............................................................bvevj‡Ki mv‡_ m¤úK© t ..................

(bvevjK Ges AwffveK - Df‡qi Rb¨B Òe¨w³ msμvšÍ Z_¨vejxÓ dig c~iY Ki‡Z n‡e Ges Dfq di‡gB AwffveK KZ©„K ¯^vÿi Ki‡Z n‡e|)

11| bwgbx msμvšÍ Z_¨vejx t GB di‡gi mv‡_ mshy³ bwgbx msμvšÍ Z_¨vejx dig h_vh_fv‡e c~iYc~e©K wnmve †Lvjvi Av‡e`b di‡gi mv‡_ msiÿY Ki‡Z n‡e|

12| A‡_©i Drm/Drmmg~n (mywbw`©ó I we¯ÍvwiZ D‡jøL Ki‡Z n‡e)t .......................................................... ................................................................................................................................................................................................................................................................................................

13| †Nvlbv I ^vÿi t Avwg/Avgiv GB g‡g© wbðqZv cÖ`vb KiwQ †h, Avwg/Avgiv wnmve msμvšÍ hveZxq wbqgvejx/kZv©ejx c‡owQ Ges D³ wbqgvejx/kZv©ejx †g‡b Pj‡Z eva¨ _vKe| Avwg/Avgiv mÁv‡b †NvlYv KiwQ †h, DwjøwLZ Z_¨vw` mZ¨| Avwg/Avgiv cÖ`Ë Z‡_¨i AwZwi³ mswkøó †h †Kvb cÖ‡qvRbxq Z_¨/`wjjvw` Avcbvi Pvwn`v †gvZv‡eK mieivn Kie|

Av‡e`bKvixi bvg, ^vÿi I ZvwiL Av‡e`bKvixi bvg, ^vÿi I ZvwiL

e¨vs‡Ki e¨env‡ii Rb¨

gšÍe¨ t..................................................................................................................................... ......................... .........................

wnmve †Lvjvi mv‡_ mswkøó Kg©KZ©vi bvghy³ mxjmn ¯^vÿi I ZvwiL

.........................

......................... Aby‡gv`bKvix Kg©KZ©vi

bvghy³ mxjmn ¯^vÿi I ZvwiL

Page 69: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-K

3

......................... e¨vsK / e¨vsK wjt ....................kvLv

wnmve †Lvjvi dig t bwgbx msμvšÍ Z_¨vejx (ïaygvÎ e¨w³K wnmv‡ei ‡ÿ‡Î cÖ‡hvR¨ n‡e Ges G‡Ki AwaK bwgbx n‡j

GKvwaK bwgbx dig c~iY Ki‡Z n‡e|)

Avwg/Avgiv G wnmv‡ei A_© Avgvi/Avgv‡`i g„Z yi ci wb‡gœv³fv‡e wb‡gœv³ e¨w³/e¨w³MY‡K cÖ`v‡bi Rb¨ g‡bvbxZ Kijvg| Avwg/Avgiv DwjøwLZ g‡bvbqb †h †Kvb mgq evwZj ev cwieZ©‡bi AwaKvi msiÿY Kwi| Avwg/Avgiv GB g‡g© Av‡iv m¤§wZ Ávcb KiwQ †h, Avgvi/Avgv‡`i wb‡ ©kbv †gvZv‡eK †jb‡`‡b e¨vsK †Kv‡bvfv‡e `vqe× n‡ebv|

wnmv‡ei bvg t .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .... .. .. .. .. .. .. .. wnmve b¤^i t.. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .... .. .. .. .. .. .. .... bwgbxi bvg t .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .... .. .. .. .. .. .. ... wcZvi bvg t .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. gvZvi bvg t .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. ¯^vgx/¯¿xi bvg t.. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .... .. .. .. .. .. .. .. .. Rb¥ ZvwiL t .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. ’vqx wVKvbv t .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. ..

†ckv t .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. cvm‡cvU© b¤^i t ................................................................................................ RvZxq cwiPq cÎ b¤^i t .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. Rb¥ wbeÜb mb`cÎ b¤it .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. wnmveavixi mv‡_ m¤úK© t .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. kZKiv nvi t .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. ..

‡Kvb Awbevmx‡K bwgbx Kiv n‡j Ges H Awbevmx mswkøó wnmv‡ei A_© cÖvß n‡j cÖvß A_© we‡`‡k †cÖi‡Yi †ÿ‡Î we`¨gvb ‰e‡`wkK gy ªv wbqš¿b AvB‡bi wewa weavb cÖ‡hvR¨ n‡e|

bwgbxi cwiwPwZi †ÿ‡Î cvm‡cvU©, RvZxq cwiPqcÎ I Rb¥ wbeÜb mb`c‡Îi g‡a¨ Avewk¨Kfv‡e †h †Kvb GKwU `wjj cÖ vb

Ki‡Z n‡e| Z‡e Rb¥ wbeÜb mb`cÎ cÖ`v‡bi †ÿ‡Î Rb¥ wbeÜb mb`c‡Îi AwZwi³ bwgbxi Av‡jvKwPÎmn †h †Kvb

cwiwPwZ cÎ cÖ vb Ki‡Z n‡e| Av‡jvKwPÎmn cwiwPwZ cÎ bv _vK‡j †m wel‡q e¨vs‡Ki mš‘wó mv‡c‡ÿ Zv‡`i wbKU

MÖnY‡hvM¨ mgv‡Ri MY¨gvb¨ e¨w³1 KZ…©K cÖ`Ë cwiP‡qi cÖZ¨qb cÎ cÖ vb Ki‡Z n‡e| D³ cwiwPwZ cÎ ev cÖZ¨qb cÎ

bwgbxi Av‡jvKwPÎmn n‡Z n‡e|

....................................................................... ...................................................................... Mªvn‡Ki bvg, ¯^vÿi I ZvwiL Mªvn‡Ki bvg, ^vÿi I ZvwiL

1 MY¨gvb¨ e¨w³ ej‡Z msm` m`m¨, wmwU K‡c©v‡ik‡bi †gqi, †WcywU †gqi I KvDwÝjiMY, cÖ_g †k ªYxi †M‡R‡UW Kg©KZ©v, cvewjK wek¦we`¨vj‡qi wkÿK, Dc‡Rjv cwil‡`i †Pqvig¨vb I fvBm †Pqvig¨vb, BDwbqb cwil‡`i †Pqvig¨vb, †cŠimfvi †gqi I †cŠi KvDwÝjiMY, †emiKvix K‡j‡Ri Aa¨ÿ, miKvix/†emiKvix D”P we`¨vjq I miKvix cÖv_wgK we`¨vj‡qi cÖavb wkÿK, RvZxq ˆ`wbK cwÎKvi m¤úv`K, †bvUvix cvewjK Ges AvavmiKvix, ¯vqËkvwmZ I ivóªvqZ¡ ms ’v I miKvix gvwjKvbvaxb e¨vs‡Ki 1g †kÖYxi Kg©KZ©vMY‡K eySv‡e|

bwgbxi Av‡jvKwPÎ (MÖvnK KZ©„K mZ¨vwqZ)

Page 70: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-K

4

......................... e¨vsK / e¨vsK wjt ...............................kvLv

wnmve †Lvjvi Av‡e`b dig

Ae¨w³K wnmve ZvwiLt............................... wnmve b¤^it ............................

BDwbK MÖvnK AvBwW †KvWt .............................. e¨e ’vcK e¨vs‡Ki bvgt ---------------- kvLvi bvgt ---------------- wcÖq g‡nv`q

Avwg/Avgiv Avcbvi kvLvq wbgœiƒc GKwU wnmve †Lvjvi Rb¨ Av‡e`b KiwQ| Avgvi/Avgv‡`i, cÖwZôv‡bi Ges wnmv‡ei we¯ÍvwiZ Z_¨ wb‡gœ cÖ`vb KiwQt 1| wnmv‡ei bvg t

...........................................................................................................................

2| cÖwZôv‡bi aiY (wUK w`b)t cÖvB‡fU wjwg‡UW †Kv¤úvbx cvewjK wjwg‡UW †Kv¤úvbx Askx`vix

†hŠ_ D‡`¨vM GKK gvwjKvbv miKvix Avav miKvix/¯^vqZ¡kvwmZ GbwRI/GbwcI

K¬ve/†mvmvBwU Ab¨vb¨ (wbw ©ófv‡e).......................................................................

3| wnmv‡ei cÖK„wZ (wUK w`b)t mÂqx PjwZ GmGbwW ’vqx ˆe‡`wkK gy`ªv Ab¨vb¨.....

4| gy`ªv (wUK w`b)t UvKv Wjvi BD‡iv cvDÛ Ab¨vb¨......

5| cÖwZôv‡bi wVKvbv t

(K) †iwRóvW© wVKvbv t.............................................................................................. (L) e¨emv¯’j/Awd‡mi wVKvbv t.............................................................................................. (M) KviLvbv/wkí cÖwZôv‡bi wVKvbv t............................................................................................. 6| †UªW jvB‡mÝ b¤^i t .................................................... ZvwiL t ..................................... Bmy¨Kvix KZ©„cÿ t....................................................................................................... 7| wbeÜb KZ©…cÿ I †`k t...................................................................................................... (†`kx /we‡`kx Dfq ai‡Yi Rb¨) 8| wbeÜb b¤^i t...................................................... ZvwiL t ..................................

9| U¨v· AvBwW b¤^i (TIN) t...................................................................................................

10| f¨vU †iwRt b¤^i (hw` _v‡K) t...................................................................................................

11| e¨emv‡qi cÖK…wZ (we¯ÍvwiZ) t ................................................................................................. ..................................................................................................

Page 71: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-K

5

12| MÖvn‡Ki Ab¨ †Kvb e¨vsK wnmve Av‡Q wK? n¨vu bv

DËi n¨vu n‡j--

e¨vsK I kvLvi bvg cwiPvjbvK…Z wnmv‡ei cÖK…wZ (wUK wPý w`b)

(K) ......................................................... Rgv wnmve FY wnmve Ab¨vb¨ (L) ......................................................... Rgv wnmve FY wnmve Ab¨vb¨ (M) ......................................................... Rgv wnmve FY wnmve Ab¨vb¨ (N) .............................................................. Rgv wnmve FY wnmve Ab¨vb¨ (O) .............................................................. Rgv wnmve FY wnmve Ab¨vb¨

13| cwiPq`vbKvixi Z_¨ t

(K) bvg t............................................................................................................

(L) wnmve bs t................................................................. .......................................... (M) kvLvi bvg t............................................................... .............................................

(N) ¯^vÿi (ZvwiLmn) t ............................................................................................................

(O) MÖvnK/ wnmve cwiPvjbvKvix (MY) Gi mv‡_ cwiwPwZi m~Î/m¤úK© ..................................................... cwiPq`vbKvixi Z_¨ cÖZ¨vqbKvix mswkøó e¨vsK kvLvi Kg©KZ©vi bvg I ¯^vÿi t........................................

14| cÖv_wgK Rgvi cwigvY t..................................................................................................

15| GdwWAvi msμvšÍ Z_¨t cwigvYt.............................................. gy`ªv t .....................................

†gqv`Kvj t eQi gvm w`b | ‡gqv`c~wZ©i ZvwiLt...........................

bevq‡bi †ÿ‡Î t Avmj Ges my` bevqb Kiæb

ïaygvÎ Avmj bevqb Kiæb, my` ...............................b¤^i wnmv‡e Rgv Kiæb

cÖ‡hvR¨ b‡n|

16| we‡kl ¯‹xg msμvšÍ Z_¨t ¯‹x‡gi bvgt.......................................................................................................................... ¯‹x‡gi †gqv`t.................. GKKvjxb Rgv/ wKw¯Íi cwigvYt ................ wKw¯Íi msL¨v (evwl©K) t............. †gqv`v‡šÍ cÖ‡`qt.................................................... gvwmK cÖ‡`qt.............................................

17| A‡_©i Drm/Drmmg~n t (wbw`©ó I we¯ÍvwiZ D‡jøL Ki‡Z n‡e)............................................................

...........................................................................................................................................................

Page 72: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-K

6

18| wnmve cwiPvjbvKvix msμvšÍ †NvlYv I ¯vÿit

Avwg/Avgiv GB g‡g© wbðqZv cÖ`vb KiwQ †h, Avwg/Avgiv wnmve msμvšÍ hveZxq wbqgvejx/kZv©ejx c‡owQ Ges D³ wbqgvejx/kZv©ejx †g‡b Pj‡Z eva¨ _vKe| Avwg/Avgiv mÁv‡b †NvlYv KiwQ †h, DwjøwLZ Z_¨vw` mZ¨| Avwg/Avgiv cÖ`Ë Z‡_¨i AwZwi³ mswkøó †h †Kvb cÖ‡qvRbxq Z_¨/`wjjvw` Avcbvi Pvwn`v †gvZv‡eK mieivn Kie|

Av‡e`bKvixi ¯^vÿi, bvg, c`ex, I ZvwiL

................................................. ................................................ ..................................... ................................................. ................................................ ..................................... ................................................. ................................................ ..................................... ÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑ

e¨vs‡Ki e¨env‡ii Rb¨ gšÍe¨ t ...................................................................................................................................

......................... .........................

wnmve †Lvjvi mv‡_ mswkøó Kg©KZ©vi bvghy³ mxjmn ¯^vÿi I ZvwiL

.........................

......................... Aby‡gv`bKvix Kg©KZ©vi

bvghy³ mxjmn ¯^vÿi I ZvwiL

Page 73: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-K

7

GB digwU cyiYc~e©K e¨w³ I Ae¨w³K wnmv‡ei g~j As‡ki mv‡_ mshy³ Ki‡Z n‡e|

ZvwiLt............................... wnmve b¤^it .................................. BDwbK MÖvnK AvBwW †KvWt ..........................

1. wnmv‡ei bvg t ................................................................................................................

2. MÖvn‡Ki bvg/ wnmve cwiPvjbvKvixi bvg t ..............................................................................

2.wnmv‡ei mv‡_ m¤úK© (bx‡P cÖ‡hvR¨ †ÿ‡Î wUK w`b) t

1g Av‡e`bKvix 2q Av‡e`bKvix 3q Av‡e`bKvix cwiPvjK Askx`vi GKK mË¡vwaKvix

wnmveavix bvevjK AwffveK GUbx© †nvìvi wmM‡bUwiR cÖK…Z myweav‡fvMx Ab¨vb¨

3. wcZvi bvg t..............................................................................................

4. gvZvi bvg t..............................................................................................

5. ¯^vgx/¯¿xi bvg t.............................................................................................

6. RvZxqZv t..............................................................................................

7. Rb¥ ZvwiL t.............................................................................................

8. Rb¥ ’vb t.............................................................................................

9. wj½ (wUK w`b) t cyiæl gwnjv 10. †ckv (we¯ÍvwiZ D‡jøLc~e©K cÖ‡hvR¨ †ÿ‡Î e¨vs‡Ki Pvwn`v †gZv‡eK `wjjvw` cÖ`vb Ki‡Z n‡e) t ...............................................................................................................................................

11. cvm‡cvU© b¤^i t .............................................................................................. 12. RvZxq cwiPqcÎ b¤^i t .............................................................................................

13. Rb¥ wbeÜb mb`cÎ b¤^i t .............................................................................................

[11 n‡Z 13 b¤^i μwg‡K ewY©Z `wjjvw` n‡Z Avewk¨Kfv‡e †h †Kvb GKwU `wjj cÖ vb Ki‡Z n‡e| Z‡e Rb¥ wbeÜb mb` cÖ`vbc~e©K wnmve †Lvjvi †ÿ‡Î Rb¥ wbeÜb mb`c‡Îi AwZwi³ MÖvnK/wnmve cwiPvjbvKvixi Av‡jvKwPÎmn †h †Kvb cwiwPwZ cÎ cÖ vb Ki‡Z n‡e| Av‡jvKwPÎmn cwiwPwZ cÎ bv _vK‡j †m wel‡q e¨vs‡Ki mš‘wó mv‡c‡ÿ Zv‡`i wbKU MÖnY‡hvM¨ mgv‡Ri MY¨gvb¨ e¨w³2 KZ…©K cÖ`Ë cwiP‡qi cÖZ¨qb cÎ cÖ`vb Ki‡Z n‡e| D³ cwiwPwZ cÎ ev cÖZ¨qb cÎ MÖvnK/wnmve cwiPvjbvKvixi Av‡jvKwPÎmn n‡Z n‡e| GQvov, wb‡¤œi 14 n‡Z 16 b¤^i μwg‡K ewY©Z `wjjvw`mn AwZwi³ Av‡iv ‡Kvb `wjjvw` Ges GB di‡g DwjøwLZ Z_¨vw`i AwZwi³ Z_¨ MÖvn‡Ki cwiwPwZ wbwðZ nIqvi j‡ÿ¨ e¨vs‡Ki mš‘wói Rb¨ e¨vs‡Ki Pvwn`v †gvZv‡eK cÖ vb Ki‡Z n‡e|]

2 MY¨gvb¨ e¨w³ ej‡Z msm` m`m¨, wmwU K‡c©v‡ik‡bi †gqi, †WcywU †gqi I KvDwÝjiMY, cÖ_g †k ªYxi †M‡R‡UW Kg©KZ©v, cvewjK wek¦we`¨vj‡qi wkÿK, Dc‡Rjv cwil‡`i †Pqvig¨vb I fvBm †Pqvig¨vb, BDwbqb cwil‡`i †Pqvig¨vb, †cŠimfvi †gqi I †cŠi KvDwÝjiMY, †emiKvix K‡j‡Ri Aa¨ÿ, miKvix I †emiKvix D”P we`¨vjq I miKvix cÖv_wgK we`¨vj‡qi cÖavb wkÿK, RvZxq ˆ`wbK cwÎKvi m¤úv`K, †bvUvix cvewjK Ges AvavmiKvix,¯^vqËkvwmZ I ivóªvqZ¡ ms¯’v I ivóvqZ¡ e¨vs‡Ki 1g †kÖYxi Kg©KZ©vMY‡K eySv‡e|

......................... e¨vsK / e¨vsK wjt ....................kvLv

wnmve †Lvjvi dig t e¨w³ msμvšÍ Z_¨vejx

e¨w³i Av‡jvKwPÎ

Page 74: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-K

8

14. U¨v· AvBwW b¤^i (hw` _v‡K) t ...........................................................................................

15. f¨vU †iwR‡óªkb b¤i (hw` _v‡K) t .............................................................................................

16. WªvBwfs jvB‡mÝ b¤i (hw` _v‡K) t ............................................................................................

17. Ab¨vb¨ (wbw`©ófv‡e D‡jøL Ki‡Z n‡e) t ----------------------------------------------------

18. eZ©gvb wVKvbv (Avevm ’j) t............................................................................

19. ¯’vqx wVKvbv t.................................................................................

20. †ckvMZ wVKvbv t.................................................................................

21. †hvMv‡hvM t

(K) wVKvbv

(L) †Uwj‡dvb b¤^i t (1) evmv ......................................... (2) Awdm .......................................

(M) †gvevBj b¤^i t (1) ................................... (2) .............................................

(N) B-†gBj t......................................... (O) d¨v· b¤^i t ...............................

22. †μwWU KvW© msμvšÍ Z_¨ (hw` _v‡K) t

Bm¨yKvix cÖwZôvb I KvW© b¤^i t (K) ’vbxq (Local) ......................................................................

(L) AvšÍR©vwZK (International) .................................................................

23. †iwm‡W›U ÷¨vUvm (wUK w`b) t †iwm‡W›U bb-†iwm‡W›U

(cÖ‡qvRbxq †ÿ‡Î e¨vsK MvBWjvBÝ di d‡ib G·‡PÄ Uªvb‡RKkbm& Gi wb‡ ©kbv AbymiY K‡i Z_¨ msMÖn Ki‡e)

¯^vÿi (ZvwiLmn)

......................... ............................

......................... ............................ wnmve †Lvjvi mswkøó Kg©KZ©vi Aby‡gv`bKvix Kg©KZ©vi bvghy³ mxjmn ¯^vÿi bvghy³ mxjmn ^vÿi

MÖvnK/ wnmve cwiPvjbvKvixi Proof of address Gi mc‡ÿ WKz‡g›Um msMÖn Ki‡Z n‡e

Page 75: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-K

9

......................... e¨vsK / e¨vsK wjt ....................kvLv

wnmve †Lvjvi Av‡e`b dig

†jb‡`‡bi AbywgZ gvÎv (Transaction Profile) (e¨w³K I Ae¨w³K Dfq cÖK…wZi wnmv‡ei Rb¨ cÖ‡hvR¨)

wnmv‡ei bvg t wnmve b¤^i t

Rgv m¤¢ve¨ gvwmK Rgvi msL¨v

gv‡m m¤¢ve¨ m‡ev©”P GKK Rgvi cwigvY

m¤¢ve¨ gvwmK ‡gvU Rgvi cwigvY

bM` Rgv (‡h †Kvb kvLv I GwUGg Rgvmn)

UªvÝdvi/ BÝUªy‡g›U Gi gva¨‡g Rgv

d‡ib †iwgU¨vÝ Rgv

ißvbx n‡Z Avq

Ab¨vb¨ (wbw`©ófv‡e)..........................

†gvU m¤¢ve¨ gvwmK Rgvi cwigvY

D‡Ëvjb

m¤¢ve¨ gvwmK D‡Ëvj‡bi msL¨v

gv‡m m¤¢ve¨ m‡ev©”P GKK D‡Ëvj‡bi cwigvY

m¤¢ve¨ gvwmK ‡gvU D‡Ëvj‡bi cwigvY

bM` D‡Ëvjb (†h †Kvb kvLv I GwUGg D‡Ëvjbmn)

UªvÝdvi/BÝUªy‡g›U Gi gva¨‡g cwi‡kva

d‡ib †iwgU¨vÝ D‡Ëvjb

Avg`vbx eve` e¨q

Ab¨vb¨ (wbw`©ófv‡e)...........................

†gvU m¤¢ve¨ gvwmK D‡Ëvj‡bi cwigvY

Avwg/Avgiv wbgœ ^vÿiKvix(MY) G g‡g© wbðqZv cÖ vb KiwQ †h, †jb‡`‡bi AbywgZ gvÎv Avgvi/cÖwZôv‡bi ^vfvweK m¤¢ve¨ †jb‡`b| Avwg/Avgiv Av‡iv wbðqZv cÖ vb KiwQ †h, cÖ‡qvRb‡ev‡a Avwg/Avgiv †jb‡`‡bi AbywgZ gvÎv ms‡kvab/nvjbvMv` Kie|

1| MÖvnK/wnmve cwiPvjbvKvix 2| MÖvnK/wnmve cwiPvjbvKvix ¯^vÿi t ¯^vÿi t

bvg t c`ex t ZvwiL t

bvg t c`ex t ZvwiL t

m¤¢ve¨ †jb‡`‡bi AbywgZ gvÎv MÖnYKvix e¨vsK Kg©KZ©vi bvgt

c`ext ¯^vÿit

Page 76: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-K

10

MÖvnK cwiwPwZ m¤úwK©Z dig (KYC Profile Form) t (we‡kl ¯‹xg/ ’vqx Avgvb‡Zi †¶‡Î cÖ‡hvR¨)

1. wnmv‡ei bvg t

2. wnmv‡ei cÖK…wZ t

3. wnmve b¤i t

4. BDwbK MÖvnK AvBwW †KvW t

5. MÖvn‡Ki †ckv (we¯ÍvwiZ) t

6. MÖvn‡Ki gvwmK m¤¢ve¨ Avq t

7. A‡_©i Drm/Drmmg~n (we¯ÍvwiZ) t

8. A‡_©i Drm wbwðZ Kiv Kivi †¶‡Î msM„nxZ `wjjvw` t

9. wnmveavixi wVKvbv(mg~n) wKfv‡e hvPvB Kiv n‡q‡Q (we¯ÍvwiZ)? ....................................................

10. wnmv‡ei cÖK…Z myweav‡fvMx (Beneficial Owner) m¤úwK©Z Z_¨vw` t (‡Kv¤úvbxi †ÿ‡Î wbqš¿YKvix †kqvi †nvìvi A_ev 20% ev Z`yaŸ© GKK †kqvi †nvìvi‡K wnmv‡ei cÖK„Z myweav‡fvMx we‡ePbvq Zvi/Zv‡`i cwiwPwZi mwVK I c~Y©v½ Z_¨ msMÖn I msiÿY Ki‡Z n‡e e¨w³K wnmv‡ei †ÿ‡ÎI cÖK…Z myweav‡fvMx wPwýZKiZt †KIqvBwm m¤úv`b Ki‡Z n‡e)

11. cvm‡cvU© b¤^i t ........................................ d‡UvKwc M„nxZ wKbv? t n uv / bv (cÖ‡hvR¨ †¶‡Î) 12. RvZxq cwiPqcÎ b¤^i t .............................. d‡UvKwc M„nxZ wKbv? t n uv / bv (cÖ‡hvR¨ †¶‡Î) 13. Rb¥ wbeÜb mb`cÎ b¤^i t ............................ d‡UvKwc M„nxZ wKbv? t n uv / bv (cÖ‡hvR¨ †¶‡Î) 14. U¨v· AvBwW b¤^i t .................................... d‡UvKwc M„nxZ wKbv? t n uv / bv (cÖ‡hvR¨ †¶‡Î) 15. f¨vU †iwRt b¤^i t ...................................... d‡UvKwc M„nxZ wKbv? t n uv / bv (cÖ‡hvR¨ †¶‡Î) 16. WªvBwfs jvB‡mÝ b¤^i t ................................. d‡UvKwc M„nxZ wKbv? t n uv / bv (cÖ‡hvR¨ †¶‡Î) 17. Ab¨vb¨ t ...............................................................................................................

18. Awbevmx (Non-resident) Ges we‡`kx‡`i wnmve †Lvjvi D‡Ïk¨t (cÖ‡hvR¨

†ÿ‡Î)................................................

(K) wfmvi cÖK…wZ..................................................................................

(L) Kg©vbygwZ (Work Permit) cÖv߇`i wnmve †Lvjvi †ÿ‡Î Kg©vbygwZ (Work Permit) cÎ I e¨vsK wnmve †Lvjvi Rb¨ h_vh_ KZ©„c‡ÿi Aby‡gv`b i‡q‡Q wKbv? t n¨uv / bv (cÖ‡hvR¨†ÿ‡Î)

.................................................................................................................................. 19. cwjwUK¨vwj G·‡cvmW& cvimbm& (PEPs)/cÖfvekvjx e¨w³/ AvšÍR©vwZK ms¯’vi cÖavb Ges Zv‡`i

close assosiates Gi †ÿ‡Î (G mvK©yjv‡i ewY©Z msÁv Abymv‡i) t (cÖ‡hvR¨ †ÿ‡Î)

K. wmwbqi g¨v‡bR‡g›U n‡Z Aby‡gv`b †bqv n‡q‡Q wK bv? n¨uv / bv L. MÖvn‡Ki ms‡M gy‡LvgywL mvÿvrKvi †bqv n‡q‡Q t n¨uv / bv

20. mswkøó AvBb, wewagvjv I mvKz©jv‡ii Av‡jv‡K MÖvn‡Ki bvg RvwZms‡Ni wbivcËv cwil‡`i wewfbœ †iRyjyk‡bi AvIZvq mš¿vm, mš¿vmx Kvh© I e¨vcK aŸsmvZ¥K A¯¿ we¯Ív‡i A_©vq‡b RwoZ m‡›`‡n

Page 77: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-K

11

ZvwjKvfy³ †Kvb e¨w³ ev mËv Ges evsjv‡`k miKvi KZ©„K ZvwjKvfy³ ‡Kvb e¨w³ ev wbwl× †NvwlZ mËvi bv‡gi ZvwjKvi mv‡_ hvPvB evQvBc~e©K†Kvbiƒc wgj cvIqv wM‡q‡Q wKbv ? t n¨uv / bv

21. DËi nu¨v n‡j G welqK M„nxZ e¨e¯’vi weeiY t

22. wi¯‹ †MÖwWs t

D”P wb¤œ

(e¨vsK MÖvn‡Ki e¨emv‡qi ev †ckvi cÖK…wZ, e¨emv‡qi GjvKv, e¨emv‡qi AvKvi, wnmv‡ei cÖK…Z myweav‡fvMx cÖf…wZ welqmg~n we‡ePbvq wb‡q MÖvn‡Ki SuywK wba©viY Ki‡e Ges Zvi mc‡ÿ gšÍe¨ cÖ`vb Ki‡e)

cÖ¯‘ZKvix t

(wnmve †Lvjvi mswkøó Kg©KZ©v e¨wZ‡i‡K Ab¨ †Kvb Kg©KZ©v/ kvLv gvwbjÛvwis cÖwZ‡iva

cwicvjb Kg©KZ©v)

¯^vÿi (mxjmn) t bvg t ZvwiL t

Aby‡gv`bKvix Kg©KZ©v t (kvLv e¨e ’vcK)

¯^vÿi (mxjmn) t bvg t ZvwiL t

23. wnmve I MÖvnK msμvšÍ Z_¨vw` me©‡kl ch©v‡jvPbv Ges nvjbvMv` (Review & Update ) Kivi ZvwiLt ................................................................................................................................

ch©v‡jvPbv Ges nvjbvMv`Kvix Kg©KZ©vi

bvg (mxjmn) ^v¶i I ZvwiL

Page 78: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-K

12

MÖvnK cwiwPwZ m¤úwK©Z dig (KYC Profile Form) t (we‡kl ¯‹xg/¯’vqx AvgvbZ e¨ZxZ e¨w³ I cÖwZôv‡bi Ab¨vb¨ wnmve †Lvjvi †ÿ‡Î cÖ‡hvR¨)

1. wnmv‡ei bvg t 2. wnmv‡ei cÖK…wZ t 3. wnmve b¤^i t 4. BDwbK MÖvnK AvBwW †KvW t 5. MÖvn‡Ki †ckv (we ÍvwiZ) t 6. MÖvn‡Ki gvwmK m¤¢ve¨ Avq t 7. A‡_©i Drm/Drmmg~n (we¯ÍvwiZ) t 8. A‡_©i Drm wbwðZ Kiv Kivi †¶‡Î msM„nxZ `wjjvw` t

9. wnmveavixi wVKvbv (mg~n) wKfv‡e hvPvB Kiv n‡q‡Q (we¯ÍvwiZ)? .............................................

...............................................................................................................................

10. wnmv‡ei cÖK…Z myweav‡fvMx (Beneficial Owner) m¤úwK©Z Z_¨vw` (‡Kv¤úvbxi †ÿ‡Î 20% ev Gi AwaK GKK †kqvi †nvìvi Gi we ÍvwiZ Z_¨vw` msMÖnc~e©K †KIqvBwm m¤úv`b Ki‡Z n‡e | GQvovI †Kv¤úvbxi wbqš¿bKvix †kqvi †nvìvi Gi we ÍvwiZ Z_¨vw` msMÖnc~e©K †KIqvBwm m¤úv`b Ki‡Z n‡e| e¨w³K wnmv‡ei †ÿ‡ÎI cÖK…Z myweav‡fvMx wPwýZKiZt †KIqvBwm m¤úv`b Ki‡Z n‡e) |

11. cvm‡cvU© b¤^i t ........................................ d‡UvKwc M„nxZ wKbv? t n uv / bv (cÖ‡hvR¨ †¶‡Î)

12. RvZxq cwiPqcÎ b¤^i t .............................. d‡UvKwc M„nxZ wKbv? t n uv / bv (cÖ‡hvR¨ †¶‡Î)

13. Rb¥ wbeÜb mb`cÎ b¤^i t ............................ d‡UvKwc M„nxZ wKbv? t n uv / bv (cÖ‡hvR¨ †¶‡Î)

14. U¨v· AvBwW b¤^i t .................................... d‡UvKwc M„nxZ wKbv? t n uv / bv (cÖ‡hvR¨ †¶‡Î)

15. f¨vU †iwRt b¤^i t ...................................... d‡UvKwc M„nxZ wKbv? t n uv / bv (cÖ‡hvR¨ †¶‡Î)

16. WªvBwfs jvB‡mÝ b¤^i t ................................. d‡UvKwc M„nxZ wKbv? t n uv / bv (cÖ‡hvR¨ †¶‡Î)

17. Ab¨vb¨ t -------------------------------------------------------------------------------------

18. Awbevmx (Non-resident) Ges we‡`kx‡`i wnmve †Lvjvi D‡Ïk¨t (cÖ‡hvR¨ †ÿ‡Î)

...............................................................................................................................

(K) wfmvi cÖK…wZ..................................................................................

(L) Kg©vbygwZ (Work Permit) cÖv߇`i wnmve †Lvjvi †ÿ‡Î Kg©vbygwZ (Work Permit) cÎ I e¨vsK wnmve †Lvjvi Rb¨ h_vh_ KZ©„c‡ÿi Aby‡gv`b i‡q‡Q wKbv? t n¨uv / bv (cÖ‡hvR¨†ÿ‡Î)

19. cwjwUK¨vwj G·‡cvmW& cvimbm& (PEPs)/cÖfvekvjx e¨w³/ AvšÍR©vwZK ms¯’vi cÖavb Ges Zv‡`i close assosiates Gi †ÿ‡Î (G mvK©yjv‡i ewY©Z msÁv Abymv‡i) t (cÖ‡hvR¨ †ÿ‡Î)

K. wmwbqi g¨v‡bR‡g›U n‡Z Aby‡gv`b †bqv n‡q‡Q wK bv? n¨uv / bv L. MÖvn‡Ki ms‡M gy‡LvgywL mvÿvrKvi †bqv n‡q‡Q t n¨uv / bv

Page 79: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-K

13

20. mswkøó AvBb, wewagvjv I mvKz©jv‡ii Av‡jv‡K MÖvn‡Ki bvg RvwZms‡Ni wbivcËv cwil‡`i wewfbœ †iRyjyk‡bi AvIZvq mš¿vm, mš¿vmx Kvh© I e¨vcK aŸsmvZ¥K A¯¿ we¯Ív‡i A_©vq‡b RwoZ m‡›`‡n ZvwjKvfy³ †Kvb e¨w³ ev mËv Ges evsjv‡`k miKvi KZ©„K ZvwjKvfy³ ‡Kvb e¨w³ ev wbwl× †NvwlZ mËvi bv‡gi ZvwjKvi mv‡_ hvPvB evQvBc~e©K†Kvbiƒc wgj cvIqv wM‡q‡Q wKbv ? t n¨uv / bv

21. DËi nu¨v n‡j G welqK M„nxZ e¨e¯’vi weeiY t 22. MÖvnK wK K‡ib/cÖwZôvbwU wK ai‡Yi e¨emv‡q wb‡qvwRZ i‡q‡Q?

μwgK bs cÖK…wZ wi¯‹ †j‡fj ‡¯‹vi 01 Ry‡qjvix e¨emv/¯^‡Y©i e¨emv /g~j¨evb avZzi e¨emv D”P 5 02 gvwb †PÄvi /Kzwiqvi mvwf©m/‡gvevBj e¨vswKs

G‡R›U/G‡R›U e¨vswKs D”P 5

03 wi‡qj G‡÷U †Wfjcvi/ G‡R›U D”P 5 04 wbg©vY cÖK‡íi wVKv`vi D”P 5 05 Ad‡mvi K‡c©v‡ikb D”P 5 06 wPÎKjv/A¨vw›U‡Ki wWjvi D”P 5 07 ‡iu‡ Íviv/evi/bvBU K¬ve/AvevwmK †nv‡Uj/cvj©vi e¨emv D”P 5 08 Avg`vbx/ißvbx I Avg`vbx/ißvbx G‡R›U D”P 5 09 Mv‡g©›Um e¨emv D”P 5 10 ‡kqvi/÷K wWjvi, †eªvKvi, †cvU©‡dvwjI g¨v‡bRvi,

gv‡P©›U e¨vsKvi D”P 5

11 ‡kqvi/÷K e¨emvq wewb‡qvMKvix D”P 5 12 GbwRI/GbwcI D”P 5 13 Rbkw³ ißvbx e¨emv D”P 5 14 Pjw”PÎ cÖ‡hvRbv/cwi‡ekbv ms¯’v D”P 5 15 A‡¯¿i e¨emv D”P 5 16 †gvevBj †dvb Acv‡iUi D”P 5 17 ivR‰bwZK `j D”P 5 18 K¬ve D”P 5 19 †mvmvBwU D”P 5 20 Uªv÷ D”P 5 21 P¨vwiwU D”P 5 22 Uªv‡fj G‡R›U D”P 5 23 cwienb e¨emvqx D”P 5 24 A‡UvwWjvi (wiKwÛkÛ Mvox) D”P 5 25 Kw¤úDUvi/†gvevBj †dv‡bi wWjvi D”P 5 26 ‡d«BU/wkwcs/Kv‡Mv© G‡R›U D”P 5 27 wjwRs/dvBb¨vÝ †Kv¤úvbx ga¨g 3 28 BÝy¨‡iÝ/†eªvKv‡iR G‡RÝx ga¨g 3 29 agx©q cÖwZôvb/ms ’v ga¨g 3 30 we‡bv`bKvix cÖwZôvb/cvK© ga¨g 3 31 ‡gvUi cvU©m Gi e¨emv ga¨g 3

Page 80: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-K

14

32 ZvgvK I wmMv‡i‡Ui e¨emv ga¨g 3 33 Drcv`bKvix cÖwZôvb ga¨g 3 34 PvKzix (†eZb wnmve e¨ZxZ Ab¨ wnmve) ga¨g 3 35 QvÎ ga¨g 3 36 M„wnbx ga¨g 3 37 A‡Uv cÖvBgvix (bZzb Mvox) ga¨g 3 38 ‡`vKv‡bi gvwjK (LyPiv) wbgœ 2 39 e¨emv-G‡R›U wbgœ 2 40 ¶z`ª e¨emvqx (evwl©K Uvb©Ifvi 50 jÿ UvKvi bx‡P) wbgœ 2 41 evox wbgv©Y mvgMÖxi e¨emv wbgœ 2 42 mdU&Iq¨vi e¨emv wbgœ 2 43 PvKzix (ïaygvÎ †eZb wnmve) wbgœ 1 44 PvKzix n‡Z Aemi MÖnYKvix wbgœ 1 45 K…wlRxex wbgœ 1 46 Ab¨vb¨

(e¨vsK MÖvn‡Ki e¨emv‡qi ev †ckvi cÖK…wZ, e¨emv‡qi GjvKv, e¨emv‡qi AvKvi, wnmv‡ei cÖK…Z myweav‡fvMx cÖf…wZ welqmg~n we‡ePbvq wb‡q MÖvnK †f‡` 27-46 μwg‡K DwjøwLZ †ckvi †ÿ‡Î ewY©Z †¯‹vi A‡cÿv D”PZi †¯‹vi cÖ`vb Ki‡e|)

23. MÖvn‡Ki bxU m¤ú‡`i (Net Worth) cwigvY t

cwigvY (UvKvq) wi¯‹ †j‡fj wi¯‹ †iwUs 1-50 j¶ wbgœ 0 >50 j¶- 2 †KvwU ga¨g 1 >2†KvwU D”P 3

24. wnmve †Lvjvi aiY t

aiY wi¯‹ †j‡fj wi¯‹ †iwUs wi‡jkbkxc g¨v‡bRvi/kvLv KZ©„K wbgœ 0 WvB‡i± †mjm& G‡R›U KZ©„K ga¨g 2 B›Uvi‡bU D”P 3 AhvwPZ/ ¯^cÖ‡Yvw`Zfv‡e D”P 3

25.MÖvn‡Ki AbywgZ gvwmK †jb‡`‡bi cwigvY t

PjwZ wnmv‡e †jb‡`‡bi cwigvY (j¶ UvKvq)

mÂqx wnmv‡e †jb‡`‡bi cwigvY (j¶ UvKvq)

wi¯‹ †j‡fj wi¯‹ †iwUs

0-10 0-5 wbgœ 0 >10-50 >5-20 ga¨g 1 >50 >20 D”P 3

Page 81: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-K

15

26. MÖvn‡Ki AbywgZ gvwmK †jb‡`‡bi msL¨v t

PjwZ wnmv‡e †jb‡`‡bi msL¨v mÂqx wnmv‡e †jb‡`‡bi msL¨v wi¯‹ †j‡fj wi¯‹ †iwUs 0-100 0-20 wbgœ 0 >100-250 >20-50 ga¨g 1 >250 >50 D”P 3

27. MÖvn‡Ki AbywgZ gvwmK bM` †jb‡`‡bi cwigvY t

PjwZ wnmv‡e †jb‡`‡bi cwigvY (jÿ UvKvq)

mÂqx wnmv‡e †jb‡`‡bi cwigvY (jÿ UvKvq)

wi¯‹ †j‡fj wi¯‹ †iwUs

0-10 0-2 wbgœ 0 10-25 2-7 ga¨g 1 >25 >7 D”P 3

28. MÖvn‡Ki AbywgZ gvwmK †jb‡`‡bi msL¨v t PjwZ wnmv‡e †jb‡`‡bi

msL¨v mÂqx wnmv‡e †jb‡`‡bi

msL¨v wi¯‹ †j‡fj wi¯‹ †iwUs

0-15 0-5 wbgœ 0 15-30 5-10 ga¨g 1 >30 >10 D”P 3

29. mvwe©K SzuwK wbiƒcY (Dc‡ii 22 n‡Z 28 b¤i μwgK ch©šÍ wi¯‹ †iwUs Gi †hvMdj) t

wi¯‹ †iwUs SuywKi cÖK…wZ >=14 D”P <14 wbgœ

gšÍe¨ t (* wi¯‹ †iwUs 14 Gi Kg n‡jI KviY D‡jøLc~e©K Subjective we‡ePbvq MÖvnK‡K D”P SuywK m¤úbœ wn‡m‡e wbiƒcY Kiv †h‡Z cv‡i)

cÖ¯‘ZKvix t (wnmve †Lvjvi mswkøó Kg©KZ©v e¨wZ‡i‡K

Ab¨ †Kvb Kg©KZ©v/ kvLv gvwbjÛvwis cÖwZ‡iva cwicvjb Kg©KZ©v)

¯^vÿi (mxjmn) t bvg t ZvwiL t

Aby‡gv`bKvix Kg©KZ©v t (kvLv e¨e ’vcK)

¯^vÿi (mxjmn) t bvg t ZvwiL t

30. wnmve I MÖvnK msμvšÍ Z_¨vw` me©‡kl ch©v‡jvPbv Ges nvjbvMv` (Review & Update ) Kivi ZvwiLt ch©v‡jvPbv Ges nvjbvMv`Kvix Kg©KZ©v t

¯^v¶i (mxjmn) t bvg t ZvwiL t

Page 82: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-K

16

Ae¨w³K wnmv‡ei Rb¨ cÖ‡qvRbxq Z_¨vw`i wb‡`©kK (Indicative) ZvwjKv|\

( cÖ‡Z¨K e¨vsK h_vh_fv‡e MÖvn‡Ki cwiwPwZ I Customer Due diligence m¤úv`b Kivi D‡Ï‡k¨ e¨vs‡Ki mš‘wó mv‡c‡ÿ G ZvwjKvq ewY©Z Z‡_¨i AwZwi³ Z_¨ I `wjjvw` msMÖn Ki‡Z cvi‡e| Ôe¨vs‡Ki mš‘wó mv‡c‡ÿÕ Gi e¨vL¨v g~j mvKz©jv‡ii 3.2 (3) Aby‡”Q‡` cÖ`vb Kiv n‡q‡Q)|

(K) K‡c©v‡iU ev e¨emvwqK cÖwZôv‡bi wnmve t (1) e¨w³ gvwjKvaxb cÖwZôvb t †UªW jvB‡mÝmn wnmve cwiPvjbvKvixi (cÖwZôv‡bi ¯^ËvwaKvixi) wel‡q Òe¨w³

msμvšÍ Z_¨vejxÓ dig h_vh_fv‡e c~iY Ki‡Z n‡e|

(2) cvU©bvikxc t cvU©bvikxc wWW, †UªW jvB‡mÝmn Askx`viM‡Yi cwiwPwZi wel‡q Òe¨w³ msμvšÍ Z_¨vejxÓ dig h_vh_fv‡e c~iYmn †ewbwdwkqvj Ibvi Gi msÁv Abyhvqx cÖ‡Z¨K cvU©bvi/‡kqvi‡nvìv‡ii dig c~iY Ki‡Z n‡e|

(3) wjwg‡UW †Kv¤úvbx t mvwU©wd‡KU Ae BbK‡c©v‡ikb, AvwU©‡Kjm Ae G‡mvwm‡qkb, †g‡gv‡iÛvg Ae G‡mvwm‡qkb, †ev‡W©i mfvq M„nxZ AvbyôvwbK wm×všÍ (resolution), cwiPvjK m¤úwK©Z †NvlYv Ges wnmve cwiPvjbvKvixi wel‡q Òe¨w³ msμvšÍ Z_¨vejxÓ dig h_vh_fv‡e c~iYmn †ewbwdwkqvj Ibvi Gi msÁv Abyhvqx cÖ‡Z¨K cwiPvj‡Ki/‡kqvi‡nvìv‡ii Òe¨w³ msμvšÍ Z_¨vejxÓ dig c~iY Ki‡Z n‡e| (†Kv¤úvbx ev Zuvi cwiPvjKM‡Yi wel‡q cÖ‡qvR‡b Z_¨vw`i mwVKZv hvPvB‡qi j‡ÿ¨ †iwR÷ªvi Ae R‡q›U ÷K †Kv¤úvbxR GÛ dvg©m& Gi mvnvh¨ MÖnY Kiv †h‡Z cv‡i| evsjv‡`‡ki evB‡i wbewÜZ †Kv¤úvbxi †ÿ‡Î wbeÜb `wjjvw` †h ’vb n‡Z Bmy¨K…Z n‡q‡Q, cÖ‡qvR‡b ‡mLv‡b †hvMv‡hvM K‡i `wjjvw`i h_v_©Zv m¤ú‡K© wbwðZ nIqv ‡h‡Z

cv‡i)|

(L) miKvix wnmve (wewfbœ gš¿Yvjq, wefvMmn), miKvix gvwjKvbvaxb cÖwZôvb, Avav miKvix ev ¯^vqËkvwmZ cÖwZôv†bi wnmve, wewfbœ gš¿Yvj‡qi Aax‡b cwiPvwjZ cÖK‡íi wnmve t wnmve †Lvjv I cwiPvjbvi Rb¨ mswkøó Dchy³ KZ©„cÿ KZ©„K cÖ`Ë AbygwZ cÎmn wnmve cwiPvjbvKvixi Òe¨w³ msμvšÍ Z_¨vejxÓ dig h_vh_fv‡e c~iY Ki‡Z n‡e|

(M) Ab¨vb¨ msMV‡bi wnmve t

(1) K¬ve/†mvmvBwU t Awdm Kg©KZ©vM‡Yi weeiY (office bearers), evB-jR ev msweavb, †iwR÷vW© n‡j miKvix Aby‡gv`bcÎ BZ¨vw`mn mswkøó Òe¨w³ msμvšÍ Z_¨vejxÓ dig h_vh_fv‡e c~iY Ki‡Z n‡e|

(2) mgevq mwgwZ/wjwg‡UW †mvmvBwU t †Kv-Acv‡iwUf Kg©KZ©v KZ©„K mZ¨vwqZ evB-jR, Awdm Kg©KZ©v‡`i (office bearers) weeiY, wnmve ‡Lvjvi wel‡q wm×všÍ (resolution), mvwU©wd‡KU Ae †iwR‡÷ªkb BZ¨vw`mn mswkøó Òe¨w³ msμvšÍ Z_¨vejxÓ dig h_vh_fv‡e c~iY Ki‡Z n‡e|

(3) ‡emiKvix ¯‹zj, K‡jR, gv`ªvmv t Mfwb©s ewW ev g¨v‡bwRs KwgwUi m`m¨M‡Yi c~Y© cwiwPwZ, wnmve ‡Lvjvi wel‡q wm×všÍ (resolution) BZ¨vw`mn mswkøó Òe¨w³ msμvšÍ Z_¨vejxÓ dig h_vh_fv‡e c~iY Ki‡Z n‡e|

(4) Uªvw÷ t wWW Ae Uªv÷ Gi mvwU©dvBW Kwc, Uªvwó †evW© Gi m`m¨M‡Yi c~Y© cwiwPwZ, wnmve ‡Lvjvi wel‡q wm×všÍ (resolution) BZ¨vw`mn mswkøó Òe¨w³ msμvšÍ Z_¨vejxÓ dig h_vh_fv‡e c~iY Ki‡Z n‡e|

Page 83: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-L

1

ANTI-MONEY LAUNDERING & COMBATING FINANCING of TERRORISM QUESTIONNAIRE FOR CORESPONDENT RELATIONSHIP

A. BASIC INFORMATION 1. Name of Institution: ____________________________________________ 2. Registered Address: ____________________________________________

____________________________________________ 3. Website Address: ____________________________________________ 4. Principal Business Activities: ______________________________________

5. Regulatory Authority: ____________________________________________ 6. Operational Status:

• Does your Bank maintain a physical presence in the licensing country? Yes / No B. OWNERSHIP / MANAGEMENT

7. Is your institution listed on any stock exchange? If so, which stock exchange? ___________________________________________________

Yes / No

8. If ‘’No’’ to Q7, please provide a list of the major shareholders holding more than 10% shares in your institution. ___________________________________________________ ___________________________________________________

C. ANTI-MONEY LAUNDERING AND TERRORIST FINANCING CONTROLS

If you answer “no” to any question, additional information can be supplied at the end of the questionnaire.

I. General AML&CFT Policies, Practices and Procedures: 9. Does your institution have in place policies and procedures approved

by your institution’s board or senior management to prevent Money Laundering and Combat Financing of Terrorism?

Yes / No

10. Does your institution have a legal and regulatory compliance program that includes a designated officer that is responsible for coordinating and overseeing the AML/CFT framework?

Yes / No

11. Has your institution developed written policies documenting the processes that they have in place to prevent, detect and report suspicious transactions?

Yes / No

12. Does your institution have a policy prohibiting accounts/relationships with shell banks? (A shell bank is defined as a bank incorporated in a jurisdiction in which it has no physical presence and which is unaffiliated with a regulated financial group.)

Yes / No

13. Does your institution permit the opening of anonymous or numbered accounts by customers?

Yes / No

14. Does your institution have policies to reasonably ensure that they will not conduct transactions with or on behalf of shell banks through any of its accounts or products?

Yes / No

Page 84: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-L

2

15. Does your institution have policies covering relationships with Politically Exposed Persons (PEP’s), their family and close associates?

Yes / No

16. Does your institution have policies and procedures that require keeping all the records related to customer identification and their transactions? If ‘’Yes’’, for how long?____________________________________

Yes / No

II. Risk Assessment

17. Does your institution have a risk-based assessment of its customer base and their transactions?

Yes / No

18. Does your institution determine the appropriate level of enhanced due diligence necessary for those categories of customers and transactions that the FI has reason to believe pose a heightened risk of illicit activities at or through the FI?

Yes / No

III. Know Your Customer, Due Diligence and Enhanced Due Diligence

19.

Has your institution implemented processes for the identification of those customers on whose behalf it maintains or operates accounts or conducts transactions?

Yes / No

20. Does your institution have a requirement to collect information regarding its customers’ business activities?

Yes / No

21. Does your institution have a process to review and, where appropriate, update customer information relating to high risk client information?

Yes / No

22. Does your institution have procedures to establish a record for each new customer noting their respective identification documents and ‘Know Your Customer’ information?

Yes / No

23. Does your institution complete a risk-based assessment to understand the normal and expected transactions of its customers?

Yes / No

IV. Reportable Transactions for Prevention and Detection of ML/TF 24. Does your institution have policies or practices for the identification

and reporting of transactions that are required to be reported to the authorities?

Yes / No

25. Where cash transaction reporting is mandatory, does your institution have procedures to identify transactions structured to avoid such obligations?

Yes / No

26. Does your institution screen customers and transactions against lists of persons, entities or countries issued by government/competent authorities or under the UN security Council Resolution?

Yes / No

Page 85: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-L

3

27. Does your institution have policies to reasonably ensure that it only operates with correspondent banks that possess licenses to operate in their countries of origin?

Yes / No

IV. Transaction Monitoring

28. Does your institution have a monitoring program for unusual and potentially suspicious activity that covers funds transfers and monetary instruments such as travelers checks, money orders, etc?

Yes / No

V. AML Training

29. Does your institution provide AML& CFT training to relevant employees of your organisation?

Yes / No

30. Does your institution communicate new AML related laws or changes to existing AML related policies or practices to relevant employees?

Yes / No

31. Does your institution provide AML training to relevant third parties if they are employed to carry out some of the functions of your organisation?

Yes / No

Space for additional information: (Please indicate which question the information is referring to.) .............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................. D. GENERAL

32. Does the responses provided in this Declaration applies to the following entities:

Head Office and all domestic branches Overseas branches Domestic subsidiaries Overseas subsidiaries

Yes / No

If the response to any of the above is ‘’No’’, please provide a list of the branches and /or subsidiaries that are excluded, including the name of the institution, location and contact details. I, the undersigned, confirm to the best of my knowledge that the information provided in this questionnaire is current, accurate and representative of the anti-money laundering and anti-terrorist financing policies and procedures that are established in my institution. I also confirm that I am authorized to complete this questionnaire on behalf of my institution.

Signature: ____________________________________ Name: ____________________________________ Designation: ____________________________________ Date: ____________________________________ Contact No: ____________________________________ Email: ____________________________________

Page 86: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó M

1

SUSPICIOUS TRANSACTION REPORT (STR) FORM A. Reporting Institution : 1. Name of the Bank:

2. Name of the Branch: B. Details of Report: 1. Date of sending report:

2. Is this the addition of an earlier report? Yes No

3.If yes, mention the date of previous report C. Suspect Account Details : 1. Account Number:

2. Name of the account:

3. Nature of the account: (Current/savings/FDR/loan/other, pls. specify) 4. Nature of ownership: (Individual/proprietorship/partnership/company/other, pls. specify) 5.Date of opening/Transaction:

6. Address: D. Account holder details : 1. 1. Name of the account holder:

2. Address:

3. Profession:

4. Nationality:

5. Other account(s) number (if any):

6. Other business:

7. Father’s name:

8. Mother’s Name:

9. Date of birth:

10.Place of birth:

11.Passport No.

12.National Identification No.

13. Birth Regoistration No.

14. TIN: 2. 1. Name of the account holder:

2. Relation with the account holder mention in sl. no. D1

3. Address:

4. Profession:

5. Nationality:

Page 87: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó M

2

6. Other account(s) number(if any):

7. Other business:

8. Father’s name:

9. Mother’s Name:

10. Date of birth:

11. Place of birth:

12.Passport No.

13.National Identification No.

14. Birth Regoistration No.

15. TIN: E. Introducer Details : 1. Name of introducer:

2. Account number:

3.Relation with account holder:

4. Address:

5. Date of opening:

6. Whether introducer is maintaining good relation with bank

F. Reasons for considering the transaction(s) as suspicious?

(Mention summery of suspicion and consequence of events) [To be filled by the BAMLCIO] a. Identity of clients

b. Activity in account

c. Background of client

d. Multiple accounts

e. Nature of transaction

f. Value of transaction

g. Other reason (Pls. Specify)

G. Suspicious Activity Information Summary characterization of suspicious activity:

a. Corruption and bribery

k. murder, grievous physical injury

u. terrorism or financing in terrorist activities

b.

counterfeiting currency

l. trafficking of women and children

v. adulteration or the manufacture of goods through infringement of title

c. Counter feiting m black marketing w. offences relating to the environment

Page 88: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó M

3

deeds and documents

.

d. extortion n. smuggling of domestic and foreign currency

x. sexual exploitation

e. fraud o. Theft or robbery or

dacoity or piracy or hijacking of aircraft

y. insider trading and market manipulation

f. forgery p. human trafficking z. organized crime, and participation in

organized criminal groups g. illegal trade of

firearms q. dowry aa. racketeering

h. illegal trade in

narcotic drugs, psychotropic substances and substances causing intoxication

r smuggling and offences related to customs and excise duties

bb.

Other(Please specify)

i. illegal trade in stolen and other goods

s. tax related offences

j. kidnapping, illegal

restrain and hostage taking

t. infringement of intellectual property rights

H. Transaction/Attempted Transaction Details: Sl. no. Date Amount Type*

*Cash/Transfer/Clearing/TT/etc. Add paper if necessary

I. Counter Part’s Details (Where Applicable) Sl. no. Date Bank Branch Account no. Amount

J. Has the suspicious transaction/activity had a material impact on or otherwise affected the financial soundness of the bank?

Yes No K. Has the bank taken any action in this context? If yes, give details.

Page 89: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó M

4

L. Documents to be enclosed 1. Account opening form along with submitted documents 2. KYC Profile, Transaction Profile 3. Account statement for last one year 4. Supporting Voucher/correspondence mention in sl. no. H 5. Others

Signature : (CAMLCO or authorized officer of CCU) Name : Designation : Phone : Date :

Page 90: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-N

SUSPICIOUS TRANSACTION REPORT (STR) FORM (WIRE TRANSFER/MOBILE FINANCIAL SERVICE)

A. Reporting Institution: 1. Name of the Institution: 2. Name of the Branch/Agent: 3. Service Place of the Branch/Agent: 4. Agent Identification / ID:(If applicable)

B. Details of Report: 1. Date of sending report: 2. Is this the addition of an earlier report? Yes No 3. If yes, mention the date of previous report

C. Suspect Details: 1. Name: 2. Address: 3. Profession/Business: 4. Nationality/Ownership status: 5. Father’s name/ Proprietor’s name: 6. Mother’s Name (where necessary): 7. Date of birth (where necessary): 8. Place of birth: 9. Passport No. 10. National Identification No. 11. Birth Regoistration No. 12. Contact Details:

Mobile No- Email-

13. Any other important Information: D. Suspicious Transaction/Attempted Transaction Details :

Sl. no. Date Amount Type

E. Reasons for considering the transaction(s) as unusual/suspicious?

(Mention summary of suspicion and consequence of events) (Use separate sheet, if needed)

F. List of Documents attached with the report Signature:

(CAMLCO or authorized officer of CCU)

Name: Designation: Phone No: Date:

Page 91: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-O

1

----- e¨vsK wjt

ÑÑÑÑ kvLv|

kvLv KZ©„K Self Assessment c×wZi gva¨‡g wbR ^ Ae ’vb wbY©q

cÖwZwU e¨vsK kvLv gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iva wel‡q we`¨gvb AvBb, wewagvjv, weGdAvBBD KZ©„K mgq mgq RvixK…Z wb‡ ©kbv I e¨vs‡Ki wbR ^ gvwb jÛvwis cÖwZ‡iva I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iva bxwZgvjvi Av‡jv‡K wbgœewY©Z cÖkœgvjvi we¯ÍvwiZ DËi cÖ`v‡bi gva¨‡g Self Assessment c×wZ‡Z wb‡R‡`i Ae¯’vb wbY©q Ki‡e t

cÖkœgvjv hvPvB‡qi gvb`Û kvLvi eZ©gvb Ae ’v M„nxZe¨ Kvh©μg/mycvwik

1. kvLvq †gvU Kg©KZ©vi msL¨v KZ (c`vbyhvqx)? KZRb Kg©KZ©v gvwbjÛvwis cÖwZ‡iva I mš¿v‡m A_©vqb cÖwZ‡iva welqK AvbyôvwbK cÖwkÿY MÖnY K‡i‡Qb ? (kZKiv nvi)

cÖwkÿY msμvšÍ †iKW©

hvPvB Ki‡Z n‡e|

2.K) kvLvi gvwbjÛvwis cÖwZ‡iva cwicvjb Kg©KZ©v (BAMLCO) ‡Rô¨ I AwfÁ wKbv? weMZ yB eQ‡i wZwb gvwbjÛvwis cÖwZ‡iva I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iva welqK †Kvb cÖwkÿY †c‡q‡Qb wK bv?

L) kvLvq gvwb jÛvwis cÖwZ‡iva Kvh©μg h_vwbq‡g cwicvwjZ n‡”Q G welqwU wbwðZ nIqvi j‡ÿ¨ BAMLCO wbw ©ó I MÖnY‡hvM¨ mgq ci ci Ges Kvh©Ki cÖwμqvq gwbUwis I ch©v‡jvPbv K‡i _v‡Kb wKbv?

BAMLCO KZ©„K – KYC Kvh©μ‡gi h_v_©Zv gwbUwis Kiv nq wKbv? h_vh_fv‡e Transaction gwbUwis Ges m‡›`nRbK †jb‡`b wi‡cvU© (B›Uvibvj wi‡cvU©©mn) Kiv nq wKbv? h_vh_fv‡e †iKW© msiÿY Kiv nq wKbv? CTR hvPvB Ges STR mbv³Ki‡Y e¨e ’v †bqv nq wKbv? ‰e‡`wkK gy ªvi BbIqvW© I AvDUIqvW©†jb‡`b gwbUwis Kiv n‡”Q wKbv?

Page 92: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-O

2

cÖkœgvjv hvPvB‡qi gvb`Û kvLvi eZ©gvb Ae ’v M„nxZe¨ Kvh©μg/mycvwik

3. BAMLCO mn kvLvi Kg©KZ©vMY gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iva wel‡q we`¨gvb AvBb, wewagvjv, weGdAvBBD KZ©„K mgq mgq RvixK…Z wb‡ ©kbv I e¨vs‡Ki wbR ^ gvwb jÛvwis cÖwZ‡iva I mš¿v‡m A_©vqb cÖwZ‡iva bxwZgvjv m¤ú‡K© AewnZ Av‡Qb wK?

welqwU hvPvB‡qi

c×wZ Kx?

4. kvLv ch©v‡q ‰ÎgvwmK wfwˇZ gvwb jÛvwis I mš¿v‡m A_©vqb cÖwZ‡iva welqK mfv AbywôZ nq wKbv?

mfvi Av‡jvP¨m~wP mK‡ji AeMwZi Rb¨ eÈb Kiv nq wKbv? mfvq Kx Kx ¸iæZ¡c~Y© wm×všÍ M„nxZ n‡q‡Q? mfvq M„nxZ wm×všÍ wKfv‡e ev ÍevwqZ nq?

5. mKj cÖKvi wnmve †Lvjv I †jb‡`b cwiPvjbvi †ÿ‡Î gvwb jÛvwis cÖwZ‡iva AvBb, mš¿vm we‡ivax AvBb Ges mg‡q mg‡q weGdAvBBD KZ©„K RvixK„Z wb‡ ©kbv Abymv‡i MÖvnK cwiwPwZ m‡šÍvlRbKfv‡e MÖnY Kiv nq wKbv ?

MÖvnK cwiwPwZi h_v_©Zv wKfv‡e hvPvB Kiv nq? wKfv‡e Zv kvLvq msiÿY Kiv n‡”Q? KYC m¤úv`bKv‡j MÖvn‡Ki Znwe‡ji Drm hvPvB Kiv nq wKbv? wnmv‡ei cÖK…Z myweav‡fvMx (Beneficial Owner) mbv³ Kiv nq wKbv Ges Zv hvPvB Gi cÖwμqv m‡šÍvlRbK wKbv? D”P SzuwKwewkó MÖvnK‡`i †ÿ‡Î SuywKi wbix‡L AwZwi³ Z_¨ (EDD) msMÖn Kiv nq wKbv?

6. K) SzuwKi wfwˇZ kvLv Zv‡`i MÖvnK‡`i †kªYxweb¨vm/†kªYxKiY K‡i wKbv?

L) D”P SzuwKm¤úbœ wnmv‡ei †jb‡`b gwbUwis Kiv nq wKbv?

K‡i _vK‡j G ch©šÍ KZwU D”P SzuwK m¤úbœ wnmve kvLvq †Lvjv n‡q‡Q? G ai‡bi wnmve

Page 93: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-O

3

cÖkœgvjv hvPvB‡qi gvb`Û kvLvi eZ©gvb Ae ’v M„nxZe¨ Kvh©μg/mycvwik

†Lvjv I cwiPvjbvi †ÿ‡Î kvLv Kx c`‡ÿc MÖnY K‡i‡Q? Kx c×wZ‡Z D”P SzuwKm¤úbœ wnmv‡ei †jb‡`b gwbUwis Kiv nq?

7. weGdAvBBD KZ©„K RvixK…Z wb‡ ©kbv Ges e¨vs‡Ki wbR ^ bxwZgvjv Abyhvqx gvwbjÛvwis I mš¿v‡m A_©vqb msμvšÍ SzuwK cÖwZ‡iv‡a h_vh_ e¨e¯’v MÖnY Kiv n‡q‡Q Kx bv?

G welqK wbR¯^ bxwZgvjv cÖYqb Kiv n‡q‡Q wKbv? n‡j D³ bxwZgvjv kvLvq wKfv‡e ev¯ÍevwqZ n‡”Q?

8. kvLv MÖvn‡Ki KYC Profile Gi Z_¨ weGdAvBBD KZ©„K RvixK…Z wb‡`©kbv ‡gvZv‡eK wbw`©ó mgq ci ci cybtg~j¨vqbc~e©K nvjbvMv` K‡i wKbv?

Kx c×wZ‡Z Giƒc g~j¨vqb m¤úvw`Z n‡q _v‡K?

9. kvLv Walk-in-Customer-‡`i †ÿ‡Î KYC cÖwμqv AbymiY K‡i wK?

wKfv‡e Av‡jvP¨ cÖwμqvwU m¤úbœ K‡i _v‡K?

10. Online e¨vswKs Gi †ÿ‡Î wnmveavix e¨ZxZ Ab¨ †Kvb e¨w³ A_© Rgv Ki‡j ‡m‡ÿ‡Î †Kvb ai‡bi KYC cÖwμqv AbymiY Kiv nq wK?

n‡q _vK‡j Kx cÖwμqvq Zv m¤úvw`Z n‡”Q?

11. kvLv Kx c×wZ‡Z MÖvn‡Ki †jb‡`b gwbUwis K‡i _v‡K?

e¨vsK kvLv KZ©„K wbav©wiZ mxgvi Dc‡ii †jb‡`‡bi (Threshhold ) wfwˇZ A_ev MÖvnK KZ©„K †NvwlZ †jb‡`‡bi AbywgZ gvÎv (TP) Gi wfwˇZ; A_ev Ab¨ †Kvb c×wZ‡Z ; M„wnZ †jb‡`‡bi AbywgZ gvÎv (TP) MÖvn‡Ki †ckv I Av‡qi mv‡_ msMwZc~Y© wKbv Zv hvPvB Kiv nq wKbv? †NvwlZ AbywgZ gvÎvi mv‡_ cieZx©‡Z

Page 94: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-O

4

cÖkœgvjv hvPvB‡qi gvb`Û kvLvi eZ©gvb Ae ’v M„nxZe¨ Kvh©μg/mycvwik

MÖvnK KZ©„K m¤úvw`Z cÖK…Z †jb‡`b hvPvB Kiv nq wKbv ? kvLv KZ©„K GKwU wba©vwiZ Thershhold Gi wfwˇZ cÖwZw`‡bi †jb‡`b gwbUi Kiv nq wKbv? kvLvq GKwU wbw`©ó mgq ci ci bgybv wfwˇZ MÖvn‡Ki KYC Profile G cÖ`Ë Z‡_¨i mv‡_ †jb‡`‡bi mvgÄm¨Zv hvPvB Kiv nq wKbv?

12. mš¿vm we‡ivax AvBb, 2009 Gi Aaxb mš¿vmx Kv‡h© A_©vqb cÖwZ‡iv‡ai j‡ÿ¨ kvLv Kx ai‡bi c`‡ÿc MÖnY K‡i‡Q?

RvwZms‡Ni wbivcËv cwil‡`i wewfbœ †iRyjyk‡bi AvIZvq mš¿vm, mš¿vmx Kvh© I e¨vcK aŸsmvZ¥K A¯¿ we Ív‡i A_©vq‡b RwoZ m‡›`‡n ZvwjKvfy³ †Kvb e¨w³ ev mËv Ges evsjv‡`k miKvi KZ©„K ZvwjKvfy³ ‡Kvb e¨w³ ev wbwl× †NvwlZ mËvi bv‡gi ZvwjKv kvLvq msiÿY I Z`vbymv‡i wnmve I †jb‡`b Kvh©μg hvPvB Kiv nq wKbv? kvLv G welqK wbR¯^ †Kvb Mechanism AbymiY K‡i wK bv? Giƒc †Kvb e w³ ev mËvi bv‡g kvLvq cwiPvwjZ wnmv‡ei (hw _v‡K) wel‡q weGdAvBBD †K AewnZ Kiv nq wKbv?

Page 95: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-O

5

cÖkœgvjv hvPvB‡qi gvb`Û kvLvi eZ©gvb Ae ’v M„nxZe¨ Kvh©μg/mycvwik

13. G hver kvLv KZ©„K KZ¸‡jv m‡›`nRbK †jb‡`b (STR) kbv³ Kiv n‡q‡Q?

kvLvq m‡› nRbK †jb‡ b wPwýZ Kivi †Kvb c×wZ AbymiY Kiv nq wKbv? kvLvq m‡› nRbK †jb‡`b Reporting Gi Rb Internal Reporting Mechanism Pvjy i‡q‡Q wKbv? kvLv ch©v‡q wb¯úwËK…Z Internal Report msiÿY Kiv nq wKbv?

14. MÖvnK KZ©„K cybt cybt bM` †jb‡`b wi‡cvwU©s (CTR) mxgvi bx‡P †jb‡`b (Structuring) kbv³ Kivi †Kvb c×wZ kvLv KZ©„K cÖewZ©Z n‡q‡Q wKbv?

cÖwZw`‡bi †jb‡`‡b Structuring kbv³ Kivi Rb¨ ‡Kvb wi‡cvU© generate Kiv n‡”Q wKbv ev †Kvb c×wZ i‡q‡Q wKbv?

15. kvLv KZ©„K wbqwgZ I mwVKfv‡e CTR †K›`ªxq cwicvjb BDwb‡U †cÖiY Kiv n‡”Q wKbv?

n‡q _vK‡j †cÖwiZ Z‡_¨i mwVKZv wKfv‡e hvPvB Kiv n‡”Q? †K›`ªxqfv‡e CTR wi‡cvU© Kivi †ÿ‡Î kvLv wbR ^ CTR wi‡cvU© msMÖnc~e©K gwbUwis Kvh©μg Ae¨vnZ iv‡L wKbv ?

16. gvwb jÛvwis cÖwZ‡iva AvBb, mš¿vm we‡ivax AvBb, mvK©yjvi, cÖwkÿY †iKW©, weeiYx I Ab¨vb¨ GGgGj/wmGdwU msμvšÍ welqvejxi Avjv`v bw_ kvLv KZ©„K msiÿY Kiv nq wKbv? AvBb, mvKz©jvi BZ¨vw`i Kwc kvLvi mKj Kg©KZ©v/Kg©Pvix‡`i mieivn Kiv nq wKbv?

n‡q _vK‡j n¨vu A_ev

bv n†q _vK‡j bv,

AvswkK n‡j Kx Kx

msiwÿZ Av‡Q Zv

wjLyb|

Page 96: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó-O

6

cÖkœgvjv hvPvB‡qi gvb`Û kvLvi eZ©gvb Ae ’v M„nxZe¨ Kvh©μg/mycvwik

17. weGdAvBBD gv÷vi mvKy©jvi Abymv‡i kvLvq PEPs, cÖfvekvjx e¨w³, AvšÍR©vwZK ms ’vi cÖavb ev D”P ch©v‡qi Kg©KZ©vi †Kvb wnmve msiÿY Kiv n‡”Q wKbv?

DËi n¨vu n‡j GB wnmve ‡Lvjv I cwiPvjbvi †ÿ‡Î Kx Kx ai‡Yi mZK©Zv Aej¤^b Kiv n‡”Q?

18. kvLvq ‡gvevBj dvBb¨vwÝqvj mvwf©m ev Aq¨vi UªvÝdvi msμvšÍ †jb‡`‡bi †ÿ‡Î weGdAvBBD Gi wb‡ ©kbv h_vh_fv‡e AbymiY Kiv n‡”Q wKbv?

19. cÖavb Kvh©vjq I evsjv‡`k e¨vsK, evsjv‡`k dvBb¨wÝqvj B‡›Uwj‡RÝ BDwbU-Gi cwi`k©b cÖwZ‡e`‡b D‡jøwLZ gvwb jÛvwis cÖwZ‡iva I mš¿v‡m A_©vqb cÖwZ‡iva cwicvjb welqK `ye©jZv/Awbqgmg~n wbqwgZ Kiv n‡q‡Q wKbv?

bv n‡q _vK‡j cÖwZeÜKZvmg~n Kx Kx?

20. kvLv KZ©„K ˆe‡`wkK †iwg‡UÝmn Ab¨vb¨ BbIqvW© I AvDUIqvW© ‰e‡`wkK gy`ªvi †jb‡`b gwbUwis Kiv nq wKbv?

n‡q _vK‡j wKfv‡e? BbIqvW© †iwgU¨vÝ msμvšÍ †jb‡`‡b, cÖ‡hvR¨ †ÿ‡Î, weGdAvBBD KZ©„K mg‡q mg‡q mieivnK…Z mš¿vmx msMVb/ e¨w³i ZvwjKv hvPvB Kiv n‡”Q wKbv?

kvLv gvwb jÛvwis cÖwZ‡iva cwicvjb

Kg©KZv©i bvghy³ mxjmn ¯^vÿi I ZvwiL kvLv e¨e ’vc‡Ki

bvghy³ mxjmn ¯^vÿi I ZvwiL

Page 97: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó - P

1

Af¨šÍixY wbixÿv wefvM -------- e¨vsK wjt

cÖavb Kvh©vjq

Independent Testing Procedurest kvLv cwi`k©‡bi †PKwj÷

e¨vs‡Ki Af¨šÍixY wbixÿv wefvM gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iva wel‡q we`¨gvb AvBb, wewagvjv,

weGdAvBBD KZ©„K mgq mgq RvixK…Z wb‡ ©kbv I e¨vs‡Ki wbR ^ gvwb jÛvwis cÖwZ‡iva I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iva bxwZgvjvi Av‡jv‡K wbgœwjwLZ cªkœgvjvi h_vh_ DËi (WKz‡g›U wfwËK) Abymv‡i ‡¯‹vi cÖ`vbc~e©K kvLvi gvwb jÛvwis cÖwZ‡iva I mš ¿vmx Kv‡h© A_©vqb cÖwZ‡iva Kvh©μg‡K g~j¨vqb Ki‡e| Af¨šÍixY wbixÿv wefvM KZ©„K kvLvi Dci cÖYxZ

evwl©K wbixÿv cÖwZ‡e`‡b (cÖ‡hvR¨ †ÿ‡Î c„_K cwi`k©b Kg©m~Pxi AvIZvq ïaygvÎ Independent Testing Procedures wfwËK cÖwZ‡e`b cÖwYZ n‡e) gvwb jÛvwis cÖwZ‡iva I mš¿v‡m A_©vqb cÖwZ‡iva Kvh©μg g~j¨vqb msμvšÍ Avjv`v Aa¨v‡q mgy`q welqvw` mycvwikmn mwbœ‡ek Ki‡e |

(hvPvB‡qi gvb`Û Abymv‡i m¤ú~Y©iƒ‡c cwicvwjZ n‡j m¤c~Y© †¯‹vi, AvswkK cwicvj‡b AvswkK †¯‹vi Ges DËi †bwZevPK n‡j k~b¨ †¯‹vi cÖ`vb Ki‡Z n‡e|)

μwgK bs

AÂj/Gwiqv cÖkœgvjv hvPvB‡qi gvb`Û ‡¯‹vi

cÖvß †¯‹vi

gšÍe¨

1. kvLv cwicvjb BDwbU

1. kvLvq GKRb AwfÁ I †R¨ô cwicvjb Kg©KZ©v (BAMLCO) i‡q‡Qb wK?

Awdm AWv©i †`Lyb| kvLvi e¨e ’vcK/wØZxq Kg©KZ©v A_ev b~¨bZg 3 eQi ‡nW Ae †Rbv‡ij e¨vswKs wn‡m‡e Kg©iZ Kg©KZ©v‡K BAMLCO g‡bvbxZ Kiv mgxPxb n‡e|

1

2. weMZ `yB eQ‡i wZwb gvwb jÛvwis cÖwZ‡iva I mš¿v‡m A_©vqb cÖwZ‡iva welqK †Kvb cÖwkÿ‡Y AskMÖnY K‡i‡Qb wK? gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iva wel‡q we`¨gvb AvBb, wewagvjv, weGdAvBBD KZ©„K mgq mgq RvixK…Z wb‡`©kbv I MvB‡WÝ †bvUm Ges e¨vs‡Ki wbR ^ gvwb jÛvwis cÖwZ‡iva I mš¿v‡m A_©vqb cÖwZ‡iva bxwZgvjv m¤ú‡K© wZwb h‡_ó AewnZ wK?

mvÿvrKvi I bw_c‡Îi wfwˇZ hvPvB Kiæb|

2

Page 98: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó - P

2

μwgK bs

AÂj/Gwiqv cÖkœgvjv hvPvB‡qi gvb`Û ‡¯‹vi

cÖvß †¯‹vi

gšÍe¨

3. gvwb jÛvwis cÖwZ‡iva AvBb, mš¿vm we‡ivax AvBb Ges Gi AvIZvq RvixK…Z cwjwm Ges/A_ev wb‡`©kbv h_vwbq‡g cwicvwjZ n‡”Q- G welqwU wbwðZ nIqvi j‡ÿ¨ BAMLCO wbw ©ó I MÖnY‡hvM¨ mgq ci ci Ges Kvh©Ki cÖwμqvq gwbUwis I ch©v‡jvPbv K‡i _v‡Kb wK?

BAMLCO KZ©„K gwbUwis I ch©v‡jvPbvi cÖwμqv hvPvB I Gi h_v_©Zv cixÿvc~e©K g~j¨vqb Kiæb|

3

4. weGdAvBBD KZ©„K RvixK…Z wb‡ ©kbv Ges e¨vs‡Ki wbR¯^ bxwZgvjv Abyhvqx gvwbjÛvwis I mš¿v‡m A_©vqb msμvšÍ SzuwK cÖwZ‡iv‡a h_vh_ e¨e¯’v MÖnY Kiv n‡q‡Q wKbv?

BAMLCO KZ©„K kvLvq cwiPvwjZ D”P SzuywKhy³ wnmvemn mKj wnmv‡ei †jb‡`b gwbUwis ch©vß wK?

gvwbjÛvwis I mš¿v‡m A_©vqb msμvšÍ SzuwK cÖwZ‡iv‡a kvLvi M„nxZ c`‡ÿc g~j¨vqb Kiæb| BAMLCO KZ©„K D”P SzuywKhy³ wnmvemn mKj wnmv‡ei †jb‡`b gwbUwis c×wZ hvPvB I Gi h_v_©Zv cixÿvc~e©K g~j¨vqb Kiæb|

4

5. weGdAvBBD gv÷vi mvKz©jvi Abymv‡i kvLvq PEPs cÖfvekvjx e¨w³, AvšÍR©vwZK ms¯’vi cÖavb ev D”P ch©v‡qi Kg©KZ©vi †Kvb wnmve msiÿY Kiv n‡”Q wKbv?

G ai‡bi wnmve ‡Lvjv I cwiPvjbvi †ÿ‡Î weGdAvBBD gv÷vi mvKz©jvi Abymv‡i mZK©Zv Aej¤^b Kiv n‡”Q wKbv Zv hvPvB Kiæb| Z‡e PEPs cÖfvekvjx e¨w³, AvšÍR©vwZK ms¯’vi cÖavb ev D”P ch©v‡qi Kg©KZ©vi †Kvb wnmve bv _vK‡jI hw` weGdAvBBD gv÷vi mvKz©jvi G cÖ`Ë wb‡ ©kbv ev Íevq‡bi cÖwμqv we`¨gvb _v‡K Zvn‡j kvLv c~Y© b¤^i cÖvß n‡e|

1

6. weGdAvBBD cÖ`Ë †mjd& A¨v‡mm‡g›U kvLv KZ©„K KZUzKz mwVK I Kvh©Kifv‡e m¤úv`b n‡”Q?

kvLvi †mjd& A¨v‡m‡g›U wi‡cvU© ch©v‡jvPbv Kiæb| mwVK I Kvh©Kifv‡e †mjd& A¨v‡m‡g›U wi‡cvU© cÖYqb I ev Íevq‡bi wfwˇZ b¤i cÖ`vb Kiæb|

6

Page 99: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó - P

3

μwgK bs

AÂj/Gwiqv cÖkœgvjv hvPvB‡qi gvb`Û ‡¯‹vi

cÖvß †¯‹vi

gšÍe¨

2. gvwb jÛvwis cÖwZ‡iva I

mš¿v‡m A_©vqb cÖwZ‡iva wel‡q

Kg©KZ©v‡`i Ávb I

m‡PZbZv e„w× Ges SzuwK cÖwZ‡iv‡a

M„wnZ e¨e ’v|

1. kvLvq KZRb Kg©KZ©v gvwb jÛvwis cÖwZ‡iva I mš¿v‡m A_©vqb cÖwZ‡iva welqK AvbyôvwbK cÖwkÿY MÖnY K‡i‡Qb?

100% Kg©KZ©vi cÖwkÿY m¤úbœ n‡j Zv m‡šÍvlRbK e‡j we‡ewPZ n‡e| cÖwkÿ‡Yi nvi Abymv‡i b¤^i cÖvß n‡e|

2

2. kvLvi Kg©KZ©vMY gvwbjÛvwis I mš¿vmx Kv‡h© A_©vqb cÖwZ‡iva wel‡q we`¨gvb AvBb, wewagvjv, weGdAvBBD KZ©„K mgq mgq RvixK…Z wb‡`©kbv I MvB‡WÝ †bvUm Ges e¨vs‡Ki wbR ^ gvwb jÛvwis cÖwZ‡iva I mš¿v‡m A_©vqb cÖwZ‡iva bxwZgvjv m¤ú‡K© AewnZ Av‡Qb wK?

kvLvi mswkøó Kg©KZ©v‡`i mvÿvrKv‡ii wfwˇZ g~j¨vqb Kiæb|

3

3. gvwb jÛvwis I mš¿v‡m A_©vqb cÖwZ‡iva Kvh©μg g~j¨vq‡bi Rb¨ GKwU ˆÎgvwmK wfwˇZ kvLv e¨e ’vc‡Ki †bZ…‡Z¡ Kg©KZ©vM‡Yi mfv Av‡qvRb Kiv nq wKbv?

mfvi Av‡jvP¨m~Px msMÖn I Gi Kvh©KvwiZv cixÿv Kiæb|

3

4. weGdAvBBD KZ©„K RvixK…Z wb‡ ©kbv Ges e¨vs‡Ki wbR¯^ bxwZgvjv Abyhvqx gvwbjÛvwis I mš¿v‡m A_©vqb msμvšÍ SzuwK cÖwZ‡iv‡a h_vh_ e¨e¯’v MÖnY Kiv n‡q‡Q wKbv?

2

Page 100: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó - P

4

μwgK bs

AÂj/Gwiqv cÖkœgvjv hvPvB‡qi gvb`Û ‡¯‹vi

cÖvß †¯‹vi

gšÍe¨

3. MÖvnK cwiwPwZ (KYC) c×wZ

1. mKj cÖKvi wnmve †Lvjv I †jb‡`b cwiPvjbvi †ÿ‡Î gvwb jÛvwis cÖwZ‡iva AvBb, mš¿vm we‡ivax AvBb Ges weGdAvBBD KZ©„K RvixK„Z gv÷vi mvKz©jv‡ii wb‡`©kbv Abymv‡i MÖvnK cwiwPwZ m‡šÍvlRbKfv‡e MÖnY Kiv nq wKbv ?

cÖ‡Z¨K ai‡bi 4/5 wU wnmv‡ei bgybv cixÿv Kiæb| wb‡gœv³ wel‡q mš‘wómv‡c‡ÿ b¤^i cÖ vb Kiæb- MÖvnK cwiwPwZi h_v_©Zv wKfv‡e hvPvB Kiv nq? wKfv‡e Zv kvLvq msiÿY Kiv n‡”Q? KYC m¤úv`bKv‡j MÖvn‡Ki Znwe‡ji Drm hvPvB Kiv n‡q‡Q wKbv? wnmv‡ei cÖK…Z myweav‡fvMx (Beneficial Owner) mbv³ Kiv n‡q‡Q wKbv Ges Zv hvPvB Gi cÖwμqv m‡šÍvlRbK wKbv? D”P SzuwKwewkó MÖvnK‡`i †ÿ‡Î SuywKi wbwi‡L AwZwi³ Z_¨ (EDD) msMÖn Kiv nq wK bv?

5

2. weGdAvBBD KZ©„K RvixK„Z gv÷vi mvKz©jv‡ii wb‡`©kbv Abymv‡i kvLv h_vh_fv‡e SzuwKi wfwˇZ Zv‡`i MÖvnK‡`i †kªYxweb¨vm/ †kªYxKiY K‡i wK?

weGdAvBBD KZ©„K RvixK„Z gv÷vi mvKz©jv‡ii wb‡`©kbv cwicvwjZ nq wKbv hvPvB Kiæb|

3

3. D”P SzuwKwewkó MÖvnK‡`i †ÿ‡Î cÖ‡qvRbxq AwZwi³ Z_¨ msMÖn Kiv nq wK?

wK ai‡bi Z_¨ msMÖn Kiv nq Ges Zv h‡_ó wKbv cixÿv Kiæb|

3

4. kvLv wK MÖvn‡Ki KYC Profile wbw`©ó mgq ci ci cybtg~j¨vqbc~e©K nvjbvMv` K‡i _v‡K?

KYC Profile cybtg~j¨vqb I nvjbvMv` c×wZ g~j¨vqb Kiæb|

3

5. kvLv Walk-in-Customer-‡`i (fvmgvb/PjšÍ MÖvnK‡`i) (wWwW, wUwU, AbjvBb Rgv BZ¨vw`) †ÿ‡Î KYC cÖwμqv AbymiY K‡i wK?

Abym„Z cªwμqv weGdAvBBD KZ©„K RvixK„Z gv÷vi mvKz©jv‡ii mv‡_ msMwZc~Y© wKbv Zv we‡ePbvc~e©K g~j¨vqb Kiæb|

4

Page 101: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó - P

5

μwgK bs

AÂj/Gwiqv cÖkœgvjv hvPvB‡qi gvb`Û ‡¯‹vi

cÖvß †¯‹vi

gšÍe¨

4. mš¿vm we‡ivax AvBb, 2009 Gi cwicvjb

mš¿vm we‡ivax AvBb, 2009 Gi Aaxb mš¿v‡m A_©vqb cÖwZ‡iv‡ai j‡ÿ¨ kvLv Kx ai‡bi Kvh©Ki c`‡ÿc MÖnY K‡i‡Q?

wb‡gœv³ wel‡q mš‘wómv‡c‡ÿ b¤^i cÖ vb Kiæb- RvwZms‡Ni wbivcËv cwil‡`i wewfbœ †iRyjyk‡bi AvIZvq mš¿vm, mš¿vmx Kvh© I e¨vcK aŸsmvZ¥K A ¿ we Ív‡i A_©vq‡b RwoZ m‡›`‡n ZvwjKvfy³ †Kvb e¨w³ ev mËv Ges evsjv‡`k miKvi KZ©„K ZvwjKvfy³ ‡Kvb e¨w³ ev wbwl× †NvwlZ mËvi bv‡gi ZvwjKv kvLvq msiÿY I Z`vbymv‡i wnmve I †jb‡`b Kvh©μg hvPvB Kiv nq wKbv? kvLv G welqK wbR ^ †Kvb Mechanism AbymiY K‡i wKbv? Giƒc e¨w³ ev mËvi bv‡g kvLvq cwiPvwjZ wnmv‡ei (hw` _v‡K) wel‡q weGdAvBBD †K AewnZ Kiv nq wKbv ?

5

5. ‡jb‡`‡bi AbywgZ gvÎv (TP) MÖnY I

gwbUwis

1. kvLv wK MÖvnK‡`i cÖK…Z †jb‡`b Zv‡`i †NvwlZ TP Gi mv‡_ mvgÄm¨c~Y© wKbv Zv gwbUwis K‡i _v‡K?

b~¨bZg 10wU wnmv‡ei gwbUwis c×wZi bgybv cixÿv Kiæb Ges Gi Kvh©KvwiZv hvPvB Kiæb| wb‡gœv³ wel‡q mš‘wó mv‡c‡ÿ b¤^i cÖ vb Kiæb- MÖvn‡Ki †ckv I Av‡qi mv‡_ msMwZc~Y©fv‡e †jb‡`‡bi AbywgZ gvÎv (TP) MÖnY Kiv nq wKbv? †NvwlZ AbywgZ gvÎvi mv‡_ cÖK…Z †jb‡`b hvPvB Kiv nq wKbv ? GKwU wba©vwiZ Threshold Gi wfwˇZ cÖwZw`b †jb‡`b gwbUi Kiv nq wKbv? kvLvq GKwU wbw`©ó mgq ci ci bgybv wfwˇZ MÖvn‡Ki KYC Profile G cÖ`Ë Z‡_¨i mv‡_ †jb‡`‡bi mvgÄm¨Zv hvPvB Kiv nq wKbv?

5

Page 102: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó - P

6

μwgK bs

AÂj/Gwiqv cÖkœgvjv hvPvB‡qi gvb`Û ‡¯‹vi

cÖvß †¯‹vi

gšÍe¨

2. kvLv wK ˆe‡`wkK †iwg‡UÝmn Ab¨vb¨ BbIqvW© I AvDUIqvW© †iwg‡UÝ gwbUwis K‡i _v‡K?

G ai‡Yi wKQz D`vniY I AwaK †jb‡`bK…Z wKQz RFCD, NFCD A/C cixÿv Kiæb| BbIqvW© †iwgU¨vÝ msμvšÍ †jb‡`‡b, cÖ‡hvR¨ †ÿ‡Î, weGdAvBBD KZ©„K mg‡q mg‡q mieivnK…Z mš¿vmx msMVb/ e¨w³i ZvwjKv hvPvB Kiv n‡”Q wKbv Zv †`Lyb| GQvovI ‰e‡`wkK gy`ªvi †jb‡`b BAMLCO KZ©„„K wK c×wZ‡Z gwbUwis Kiv n‡”Q Zvi Kvh©KvwiZv hvPvB Kiæb|

4

3. kvLv wK wbw`©ó mgq ci ci TP ch©v‡jvPbv I nvjbvMv` (cÖ‡qvR‡b) K‡i _v‡K?

TP ch©v‡jvPbv I nvjbvMv` Kiv n‡q‡Q Ggb 10wU bgybv cixÿv I Gi Kvh©KvwiZv hvPvB Kiæb|

4

6. m‡›`nRbK †jb‡`b wi‡cvU© (STR) I bM` †jb‡`b

wi‡cvU©(CTR)

1. kvLvi Kg©KZ©vMY m‡›`nRbK †jb‡`b wi‡cvU© (STR) m¤ú‡K© AewnZ Av‡Qb wK?

kvLvq m‡›`nRbK †jb‡`b Reporting Gi Rb¨ Internal Reporting Mechanism Pvjy Av‡Q wKbv? Zv mKj Kg©K©Zv Rv‡bb wKbv?

5

2. kvLvq gvwb jÛvwis I mš¿v‡m A_©vqb msμvšÍ m‡›`nRbK †jb‡`b wPwýZKi‡Yi Kvh©Ki c×wZ Pvjy Av‡Q wK? G hver KZ¸‡jv m‡›`nRbK †jb‡`b (STR) BAMLCO KZ…©K CCU Gi wbKU wi‡cvU© Kiv n‡q‡Q?

kvLvq m‡›`nRbK †jb‡`b msNwUZ nIqv m‡Ë¡I hw` BAMLCO KZ…©K CCU Gi wbKU †Kvb STR bv Kiv n‡q _v‡K Zvn‡j Zv Am‡šÍvlRbK we‡ewPZ n‡e| bw_ I wm‡÷g cixÿv K‡i kvLvq STR mbv³Ki‡Yi Rb¨ †Kvb c×wZi cÖeZ©b Kiv n‡q‡Q wKbv Zv hvPvB Kiæb| wb‡gœv³ wel‡q mš‘wó mv‡c‡ÿ b¤^i cÖ vb Kiæb- kvLvq m‡›`nRbK †jb‡`b wPwýZ Kivi †Kvb c×wZ AbymiY Kiv nq wKbv? kvLv ch©v‡q wb¯úwËK…Z Internal Report h_vh_fv‡e msiÿY Kiv nq wKbv?

5

Page 103: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó - P

7

μwgK bs

AÂj/Gwiqv cÖkœgvjv hvPvB‡qi gvb`Û ‡¯‹vi

cÖvß †¯‹vi

gšÍe¨

3. kvLv KZ©„K h_vh_ I mwVKiƒ‡c bM` †jb‡`b wi‡cvU© (CTR) Kiv nq wKbv?

GZ`&msμvšÍ bw_ cixÿv Kiæb|(Kgc‡ÿ GK gv‡mi bM` †jb‡`b)K¨vk †iwRóvi/weeiYx n‡Z cixÿv Kiæb Ges Gi wfwˇZ H gv‡m `vwLjK…Z CTR wi‡cvU© cixÿvc~e©K CTR wi‡cvU© Gi mwVKZvi wel‡q g~j¨vqb Kiæb|

GQvovI †K›`ªxqfv‡e CTR wi‡cvU© Kivi †ÿ‡Î kvLvi wbR¯^ CTR wi‡cvU© msMÖnc~e©K wbR ^ gwbUwis Kvh©μg Ae¨vnZ i‡q‡Q wKbv Zv hvPvB Kiæb|

4

4. MÖvnK KZ©„K cybt cybt wi‡cvwU©s mxgvi bx‡P †jb‡`b (Structuring) kbv³ Kivi †Kvb c×wZ kvLv KZ©„K cÖewZ©Z n‡q‡Q wKbv?

GZ`&msμvšÍ kvLvi c`‡ÿc cixÿvc~e©K g~j¨vqb Kiæb| cÖwZw`‡bi †jb‡`‡b Structuring kbv³ Kivi Rb¨ Kx ai‡bi wi‡cvU© generate Kiv n‡”Q?

4

7. CCU eivei weeiYx `vwLj

1. kvLv KZ©„K KZwU weeiYx (CCU eivei `vwLj Kiv nq? kvLv wK h_vmg‡q weeiYx `vwLj K‡i?

GZ`&msμvšÍ bw_ cixÿv Kiæb| wej‡¤ A_ev weeiYx `vwLj bv Ki‡j Zv Am‡šÍvlRbK we‡ewPZ n‡e|

3

2. kvLv KZ©„K wbqwgZfv‡e †mî A¨v‡mm‡g›U Kiv nq wKbv? cÖ¯‘ZK…Z weeiYx h_vh_ wKbv?

GZ`&msμvšÍ weeiYx cixÿv Kiæb| Z_¨vw` mwVK I cwic~Y© bv n‡j Zv Am‡šÍvlRbK we‡ewPZ n‡e|

2

8. ‡iKW© msiÿY 1. MÖvnK cwiwPwZ (KYC) Ges †jb‡`b m¤úwK©Z †iKW© h_vh_fv‡e msiÿ‡Yi weavb Av‡Q wK?

5wU eÜ wnmve cixÿv Kiæb| G‡ÿ‡Î gvwb jÛvwis cÖwZ‡iva AvBb Gi weavb h_vh_fv‡e AbymiY Kiv n‡q‡Q wKbv hvPvB Kiæb|

2

2. wbqš¿YKvix KZ©„cÿ ev CCU Gi Pvwn`v †gvZv‡eK †iKW©mg~n mieivn Kiv nq wK?

GZ`&msμvšÍ bw_ cixÿv Kiæb| h_vmg‡q I h_vh_ Z_¨ mieivn bv Ki‡j Zv Am‡šÍvlRbK we‡ewPZ n‡e|

2

9. AML/CFT m¤úwK©Z kvLvi mvwe©K Kvh©μg

1. kvLv e¨e¯’vcK (BAMLCO bv n‡j) gvwb jÛvwis I mš¿v‡m A_©vqb cÖwZ‡iva welqK Kg©m~Px ev Íevq‡b h_vh_ f~wgKv cvjb K‡i wK?

kvLvq Av‡qvwRZ mfvi Av‡jvP¨m~wP I kvLv e¨e ’vc‡Ki mv‡_ mvÿvrKvi Ges G wel‡q kvLvi cwicvjb Ae¯’vi wfwˇZ g~j¨vqb Kiæb|

2

Page 104: Anti Money Laundering (AML) & Combating Financing Terrorism ...

cwiwkó - P

8

μwgK bs

AÂj/Gwiqv cÖkœgvjv hvPvB‡qi gvb`Û ‡¯‹vi

cÖvß †¯‹vi

gšÍe¨

2. c~e©eZ©x Af¨šÍixY I ewnt wbixÿv cÖwZ‡e`b cixÿvKv‡j AML/CFT welqK †Kvb Awbqg I `ye©jZvi D‡jøL Av‡Q wKbv Ges kvLv †Kvb ms‡kvabg~jK e¨e ’v MÖnY K‡i‡Q wKbv?

me©‡kl wbixÿv msμvšÍ wi‡cvU© cixÿv Kiæb Ges wK ai‡bi ms‡kvabg~jK e¨e ’v †bIqv n‡q‡Q hvPvB Kiæb|

3

3. kvLvi mvwe©K Kvh©μg m‡šÍvlRbK wK?

kvLvi gvwb jÛvwis I mš¿v‡m A_©vqb cÖwZ‡iva msμvšÍ mvwe©K Kvh©μg Ges kvLv e¨e¯’vc‡Ki cvidig¨v‡Ýi wfwˇZ g~j¨vqb Kiæb|

5

†gvU 100 kvLvi mvwe©K g~j¨vqb t

‡¯‹vi †iwUs

90+-100 kw³kvjx (Strong)

70+-90 m‡šÍvlRbK (Satisfactory)

55+-70 ‡gvUvgywU fvj (Fair)

40+-55 cÖvwšÍK (Marginal)

40 I Gi bx‡P Am‡šÍvlRbK (Unsatisfactory)

Page 105: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015

Annexure B:

Examples of Potentially Suspicious Transactions as per BB Guidance notes:

Few instance and nature of transactions are furnished below to enable concerned officials

of AML to justify in respect of Suspicious Transaction:

Cash transactions:

1. Unusually large cash deposits made by an individual or company whose ostensible

business activities would normally be generated by cheques and other instruments.

2. Substantial increases in cash deposits of any individual or business without apparent

cause, especially if such deposits are subsequently transferred within a short period out

of the account and/or to a destination not normally associated with the customer.

3. Customers who deposit cash by means of numerous credit slips so that the total of each

deposit is unremarkable, but the total of all the credits is significant.

4. Company accounts whose transactions, both deposits and withdrawals, are

denominated by cash rather than the forms of debit and credit normally associated with

commercial operations (e.g. cheques, Letters of Credit, Bills of Exchange, etc.).

5. Customers who constantly pay in or deposit cash to cover requests for payment order,

bankers drafts, money transfers or other negotiable and readily marketable money

instruments.

6. Customers who seek to exchange large quantities of low denomination notes for those

of higher denomination.

7. Branches that have a great deal more cash transactions than usual. (Head Office

statistics detect aberrations in cash transactions.)

8. Customers whose deposits contain counterfeit notes or forged instruments.

9. Customers transferring large sums of money to or from other locations with instructions

for payment in cash.

10. Large cash deposits using ATM facilities, thereby avoiding direct contact with bank or

building society staff.

Accounts

11. Customers who wish to maintain a number of trustee or client accounts which do not

appear consistent with the type of business, including transactions which involve

nominee names.

12. Customers who have numerous accounts and pay in amounts of cash to each of them in

circumstances in which the total of credits would be a large amount.

13. Any individual or company whose account shows virtually no normal persona banking or

business related activities, but is used to receive or disburse large sums which have no

obvious purpose or relationship to the account holder and/or his business (e.g. a

substantial increase in turnover on an account).

14. Reluctance to provide normal information when opening an account, providing minimal

or fictitious

45

Page 106: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015

a. Information or, when applying to open an account, providing information that is

difficult or expensive for the financial institution to verify.

b. Customer's reluctance or refusal to disclose other banking relationships.

c. Home address or business location is far removed from the Branch where the

account is being opened and the purpose of maintaining an account at your

Branch cannot be adequately explained.

d. Reluctance or refusal to provide business financial statements.

15. Information provided by the customer in the Transaction Profile does not make sense for

the customer's business.

16. A visit to the place of business does not result in a comfortable feeling that the business

is in the business they claim to be in.

17. Customers who appear to have accounts with several NCC Bank within the same

locality,

a. Especially when the bank is aware of a regular consolidation process from such

accounts prior to a request for onward transmission of the funds.

b. Matching of payments out with credits paid in by cash on the same or previous

day.

c. Paying in large third party cheques endorsed in favor of the customer.

18. Large cash withdrawals from a previously dormant/inactive account, or from an account

which has just received an unexpected large credit from abroad.

19. Customers who together, and simultaneously, use separate tellers to conduct large cash

transactions or foreign exchange transactions.

20. Greater use of safe deposit facilities. Increased activity by individuals. The use of sealed

packets deposited and withdrawn.

21. Companies' representatives avoiding contact with the branch.

22. Substantial increases in deposits of cash or negotiable instruments by a professional

firm or

a. company, using client accounts or in-house company or trust accounts,

especially if the deposits are

b. Promptly transferred between other client company and trust accounts.

23. Customers who show an apparent disregard for accounts offering more favorable terms

24. Customers who decline to provide information that in normal circumstances would make

the customer eligible for credit or for other banking services that would be regarded as

valuable

25. Insufficient use of normal banking facilities, e.g. avoidance of high interest rate facilities

for large balances

26. Large number of individuals making payments into the same account without an

adequate explanation

International banking/trade finance:

27. Customer introduced by an overseas branch, affiliate or other bank based in countries

where production of drugs or drug trafficking may be prevalent.

28. Use of Letters of Credit and other methods of trade finance to move money between

countries where such trade is not consistent with the customer's usual business.

29. Customers who make regular and large payments, including wire transactions, that

cannot be clearly 46

Page 107: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015

a. identified as bona fide transactions to, or receive regular and large payments

from: countries which

b. are commonly associated with the production, processing or marketing of drugs;

proscribed terrorist

c. Organizations; [tax haven countries].

30. Building up of large balances, not consistent with the known turnover of the customer's

business, and subsequent transfer to account(s) held in other locations.

31. Unexplained electronic fund transfers by customers on an in and out basis or without

passing through an account.

32. Frequent requests for TCs, foreign currency drafts or other negotiable instruments to be

issued.

33. Frequent paying in of TCs or foreign currency drafts, particularly if originating from

overseas.

34. Customers who show apparent disregard for arrangements offering more favorable

terms.

Institution employees and agents:

35. Changes in employee characteristics, e.g. lavish life styles or avoiding taking holidays.

36. Changes in employee or agent performance, e.g. the salesman selling products for cash

have ;

a. Remarkable or unexpected increase in performance.

b. Any dealing with an agent where the identity of the ultimate beneficiary or

counterpart is undisclosed,

c. Contrary to normal procedure for the type of business concerned

Secured and insecure lending:

37. Customers who repay problem loans unexpectedly.

38. Request to borrow against assets held by the financial institution or a third party, where

the origin of the assets is not known or the assets are inconsistent with the customer's

standing.

39. Request by a customer for a financial institution to provide or arrange finance where the

source of the customer's financial contribution to a deal is unclear, particularly where

property is involved.

40. Customers who unexpectedly repay in part or full a mortgage or other loan in a way

inconsistent with their earnings capacity or asset base.

Merchant Banking Business:

41. A personal client for whom verification of identity proves unusually difficult and who is

reluctant to provide details.

42. A corporate/trust client where there are difficulties and delays in obtaining copies of the

accounts or other documents of incorporation.

43. A client with no discernible reason for using the firm's service, e.g. clients whose

requirements are not in the normal pattern of the institution's business and could be

more easily serviced elsewhere.

47

Page 108: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015

44. An investor introduced by an overseas bank, affiliate or other investor, when both

investor and introducer are based in countries where production of drugs or drug

trafficking may be prevalent.

45. Any transaction in which the counterparty to the transaction is unknown.

Dealing patterns and abnormal transactions:

46. A large number of security transactions across a number of jurisdictions.

47. Transactions not in keeping with the investor's normal activity, the financial markets in

which the investor is active and the business which the investor operates.

48. Buying and selling of a security with no discernible purpose or in circumstances which

appear unusual, e.g. churning at the client's request.

49. Low grade securities purchases and sales, with the proceeds used to purchase high

grade securities.

50. Bearer securities held outside a recognized custodial system

51. A number of transactions by the same counterparty in small amounts of the same

security, each purchased for cash and then sold in one transaction, the proceeds being

credited to an account different from the original account.

52. Any transaction in which the nature, size or frequency appears unusual, e.g. early

termination of packaged products at a loss due to front end loading, or early

cancellation, especially where cash had been tendered and/or the refund cheque is to a

third party.

53. Transactions not in keeping with normal practice in the market to which they relate, e.g.

with reference to market size and frequency, or at off-market prices.

54. Other transactions linked to the transaction in question which could be designed to

disguise money and divert it into other forms or to other destinations or beneficiaries.

Settlements:

55. A number of transactions by the same counterparty in small amounts of the same

security, each purchased for cash and then sold in one transaction.

56. Large transaction settlement by cash.

57. Payment by way of third party cheque or money transfer where there is a variation

between the account holder, the signatory and the prospective investor, must give rise

to additional enquiries.

58. Settlement to be made by way of bearer securities from outside a recognized clearing

system.

59. Allotment letters for new issues in the name of persons other than the client

Disposition:

60. Payment to a third party without any apparent connection with the investor.

61. Settlement either by registration or delivery of securities to be made to an unverified

third party.

62. Abnormal settlement instructions including payment to apparently unconnected parties.

48

Page 109: Anti Money Laundering (AML) & Combating Financing Terrorism ...

NCCBL AML and CFT Policy Guideline- Revised 2015

Annexure C

National Credit and Commerce Bank Ltd.

Concise form of KYC (mswÿß)

For

Walk- in and Online Banking Customer (depositor / withdrawer)

1) Name :

2) Father’s Name :

3) Mother’s Name :

4) Date of Birth/Age :

5) Nationality :

6) Address- A. Present Address

B. Permanent Address

7) Voter ID/Driving License /National

ID/Passport/Birth Certificate (photocopy) etc.:

8) Occupation: 9) Source of Fund:

10) Contacted Number (phone/mobile/e-mail :

----------------------

Signature / Date

(Depositor / Withdrawer/Remitter)

49