Finance & Accounts

FA 8 Financial Compliance

Financial Compliance

Systematic and holistic financial crime compliance

Accredited by: LONDON INSTITUTE OF SKILLS DEVELOPMENT SIGNATURE PROGRAMME

Who should attend?

  • Delegates responsible for the prevention and control of financial crime, anti-money-laundering (AML), anti-fraud, anti-corruption investigators, compliance officers, and data protection officers, or professionals seeking to enhance their financial crime compliance skills
  • Junior Managers, Fresh Graduates & Final Semester Students to acquire a promising career in a reputable organization.
Course Code:F/A.8
Subject:Finance
Course Fee:£495
Duration:3 Days
Venue:University of Oxford, UK

Learning Objectives

By the end of the training delegates will be able to: 

  • Apply best practice in their sector
  • Set out “what” should be looked out for when dealing with clients
  • Identify suspicious circumstances and how to deliver effective customer profiling
  • Apply best practice and legal data protection

Course Content

Advanced AML Loadicator

  • What is “not” money laundering
  • What “is” money laundering
  • Offence 1: Concealment
  • Offence 2 Arrangements
  • Offence 3: Acquisition, use and possession
  • SAR Narrative Review – internal reporting
  • SAR lodging – external reporting

Advanced ABC Loadicator

  • Tracing capital flight from developing countries
  • Sustainable development goals in practice
  • Illicit financial flows
  • UNCAC and beneficial ownership transparency
  • Beneficial ownership registries
  • Scanning and profiling legal entities and complex legal arrangements

AML Tools

  • Tool 1: KYA (Know Your Assets)
  • Tool 2: KYB (Know Your Business)
  • Tool 3: KYC (Know Your Customer)
  • Tool 4: CDD (Customer Due Diligence)
  • Tool 5: EDD (Enhanced Due Diligence)
  • Tool 6: SDD (Simplified Due Diligence)

Business Unit and Customer Profiling

  • Linking clients with transactions
  • How to regularly assess ML and TF risks: sources
  • Risk assessment and vulnerability of transactions
  • Fitting your FCC programme in the “holistic” risk-based approach – whose?
  • Evidenced-based decision making and targeting ML and TF risks faced by the host State and regional organisations
  • Transparency: internal standards and controls
  • SYSC: Single vs Several Operations – your suspicion matrix
  • Data Protection for businesses and the rise of the Data Protection Officer

FCC Re-tooling

  • Risk assessments – why? which? and where from?
  • FATF, Basel AML Index and ESMA reloaded
  • Risk-based approach
  • Putting it all together in the SYSC context
  • Trade-based ML – misinvoicing and third-party risk management
  • Financial sanctions: EU, International, and U.S.
  • Proliferation financing