Strengths & Weaknesses noted in recent examinations September 16, 2016.
-
Upload
christian-hensley -
Category
Documents
-
view
214 -
download
1
Transcript of Strengths & Weaknesses noted in recent examinations September 16, 2016.
![Page 1: Strengths & Weaknesses noted in recent examinations September 16, 2016.](https://reader036.fdocuments.in/reader036/viewer/2022082818/56649ecf5503460f94bdd5b0/html5/thumbnails/1.jpg)
BSA/AML Compliance Program
Strengths & Weaknesses noted in recent examinations
September 16, 2016
![Page 2: Strengths & Weaknesses noted in recent examinations September 16, 2016.](https://reader036.fdocuments.in/reader036/viewer/2022082818/56649ecf5503460f94bdd5b0/html5/thumbnails/2.jpg)
Three main elements◦ Products and services◦ Customers and entities◦ Geographic locations
Drivers:◦ Nature and extent of internal controls◦ Scope of independent testing◦ BSA Officer skills required◦ Training
Risk Assessment and Risk Assessment Process
![Page 3: Strengths & Weaknesses noted in recent examinations September 16, 2016.](https://reader036.fdocuments.in/reader036/viewer/2022082818/56649ecf5503460f94bdd5b0/html5/thumbnails/3.jpg)
Positives:◦ Annual review◦ Addressing the three main elements, OFAC (either separate or
joint), supplementary risk assessments
Room for improvement:◦ Not restricted to only an annual update
Updates for significant events Dynamic approach
◦ Staffing- turnover, expertise/experience, vacancies, growth◦ Analyzing the updated transaction volume numbers
Trend analysis◦ Consideration of geographic location of transactions (e.g.
frequent wire locations)◦ Coordination and collaboration with other departments
Risk Assessment and Risk Assessment Process
![Page 4: Strengths & Weaknesses noted in recent examinations September 16, 2016.](https://reader036.fdocuments.in/reader036/viewer/2022082818/56649ecf5503460f94bdd5b0/html5/thumbnails/4.jpg)
Training
Positives:◦ Training based on roles & responsibilities◦ Internal referral systems / forms in place◦ Multiple individuals involved
Room for Improvement:◦ Documentation◦ Complete narratives◦ Too heavy reliance on automated systems
Suspicious Activity Identification, Documentation and Monitoring
![Page 5: Strengths & Weaknesses noted in recent examinations September 16, 2016.](https://reader036.fdocuments.in/reader036/viewer/2022082818/56649ecf5503460f94bdd5b0/html5/thumbnails/5.jpg)
Documentation◦ When and why activity was initially flagged◦ Items reviewed as part of the investigation◦ Date decision rendered◦ Hard copy or electronic
Narratives (not filed)◦ All factors reviewed and considered◦ How activity is explained, or determined not
suspicious◦ Plans for ongoing monitoring
Suspicious Activity Identification, Documentation and Monitoring
![Page 6: Strengths & Weaknesses noted in recent examinations September 16, 2016.](https://reader036.fdocuments.in/reader036/viewer/2022082818/56649ecf5503460f94bdd5b0/html5/thumbnails/6.jpg)
Narratives (filed)◦ What◦ When◦ Where◦ Why
Ongoing monitoring◦ Documented timeline◦ Continuous SARs prior to maximum deadline
Suspicious Activity Identification, Documentation and Monitoring
![Page 7: Strengths & Weaknesses noted in recent examinations September 16, 2016.](https://reader036.fdocuments.in/reader036/viewer/2022082818/56649ecf5503460f94bdd5b0/html5/thumbnails/7.jpg)
Too heavy reliance on systems◦ Does not replace CDD and EDD efforts
Federal Reserve SR 11-7 and OCC Bulletin 2012-12: Guidance on Model Risk Management
Key elements of guidance◦ IV. Model development◦ V. Model Validation◦ VI. Governance, Policies, and Controls
Suspicious Activity Monitoring Systems
![Page 8: Strengths & Weaknesses noted in recent examinations September 16, 2016.](https://reader036.fdocuments.in/reader036/viewer/2022082818/56649ecf5503460f94bdd5b0/html5/thumbnails/8.jpg)
Model Validation◦ Ongoing process ◦ Independent◦ Commensurate with: overall use, complexity and
materiality of model, and size and complexity of institution
◦ Initial validation of all models◦ Ongoing monitoring◦ Determination if most current validation remains
sufficient (at least annually)
Suspicious Activity Monitoring Systems
![Page 9: Strengths & Weaknesses noted in recent examinations September 16, 2016.](https://reader036.fdocuments.in/reader036/viewer/2022082818/56649ecf5503460f94bdd5b0/html5/thumbnails/9.jpg)
Vendor models◦ Vendor management program◦ Recommend obtaining documentation from
vendor◦ Customization should be documented and
validation◦ Use of default settings should be supported
Internal Audit ◦ Evaluating framework
Suspicious Activity Monitoring Systems
![Page 10: Strengths & Weaknesses noted in recent examinations September 16, 2016.](https://reader036.fdocuments.in/reader036/viewer/2022082818/56649ecf5503460f94bdd5b0/html5/thumbnails/10.jpg)
Positives:◦ BSA Officer; policies, procedures, internal
controls; training
Areas for improvement:◦ Review of engagement letter◦ Review of audit workprograms and workpapers
Internal Audit
![Page 11: Strengths & Weaknesses noted in recent examinations September 16, 2016.](https://reader036.fdocuments.in/reader036/viewer/2022082818/56649ecf5503460f94bdd5b0/html5/thumbnails/11.jpg)
Contact information:◦ Gabriela Webber◦ Federal Reserve Bank of Boston◦ 600 Atlantic Ave, Boston, MA 02210◦ (617) 973-3377◦ [email protected]
Questions?