Suspicious Activity Reporting Reporting with Safety Kevin Whelan US Department of Treasury

Slides:



Advertisements
Similar presentations
IMPS Information Management and Policy Services Information Services Directorate A briefing for all University staff November 2004 New Information Legislation.
Advertisements

Insert the name of your organization here The Public Servants Disclosure Protection Act at.
Association of Corporate Counsel Houston Chapter Meeting of June 8, 2010 What to Do When the Feds Come Knocking In-House Responsibilities for Criminal.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Are you ready for HIPPO??? Welcome to HIPAA
Audit Committee in Albania Legal framework Law 9226 /2006 “On banks in Republic of Albania” Law 9901/2008 “On entrepreneurs and commercial companies” Corporate.
FRAUD DETERRENCE Core Orientation/Core Annual Refresher The following presentation is intended for SCS employees. This presentation will provide a broader.
Anti-Money Laundering and OFAC Compliance for Transfer Agents SSA Annual Conference July 25, 2008.
Sarbanes-Oxley Act. 2 What Is It? Act passed by Congress in response to the recent and continuing corporate scandals. Signed into law July 30, Established.
Building A Financial Intelligence Unit In a Bank Secrecy Environment Lebanon’s Experience Presented by A. Mansour Secretary Special Investigation Commission.
Unlawful Internet Gambling Enforcement Act Final Rule Joseph Baressi June 3, 2009.
Code of Federal Regulations Title 42, Chapter 1, Subchapter A Part 2 – CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENTS BRYANT D. MILLER CAC II, MAC,
Data Protection and Records Management
EPOC: Empowering Judicial Cooperation through Eurojust Matthias Ruckdäschel, ICT Project Officer, Eurojust (ICT4Justice, Thessaloniki, 24 October 2008)
Europol’s tailor-made data protection framework
1. 2 CVM’s OBJECTIVES u to stimulate the creation of savings and their investment in securities; u to promote the expansion and regular and efficient.
Regulating and Prosecuting Global Money Laundering
Code of Conduct for Mobile Money Providers 6 November 2014 All material © GSMA The policy advocacy and regulatory work of the GSMA Mobile Money team.
ITIC PERSPECTIVE ON THE EFFECTIVE IMPLEMENTATION OF THE FCTC PROTOCOL ELIZABETH ALLEN ITIC – JULY 2014.
Towards a Freedom of Information Law in Qatar Fahad bin Mohammed Al Attiya Executive Chairman, Qatar National Food Security Programme.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Source: Section 2 General Code of Conduct A n t i m o n e y l a u n d e r i n g ( A M L ) i s a t e r m m a i n l y u s e d i n t h e f i n a n c i a.
AUDIT TO DETECT FRAUD AND CORRUPTION: EVALUATION OF THE FIGHT AGAINST CORRUPTION AND MONEY LAUNDERING The 10th ASOSAI Research Project Atty. ALEXANDER.
1 OVERVIEW PRESENTATION FREEDOM OF INFORMATION (SCOTLAND) ACT 2002.
Exemptions and the Public Interest Test Louise Townsend - Masons.
Pennsylvania Child Protective Services Law: Module 4: Reporting and the Role of the Child Welfare Professional Transfer of Learning The Pennsylvania Child.
Internal Auditing and Outsourcing
COMPLYING WITH HIPAA BUSINESS ASSOCIATE REQUIREMENTS Quick, Cost Effective Solutions for HIPAA Compliance: Business Associate Agreements.
Legislation, Regulation, Guidelines
Compliance and Regulation for Mobile Solutions Amanda J. Smith Messick & Lauer, P.C. May 16, 2013.
An Educational Computer Based Training Program CBTCBT.
Corporate Governance in a Hospital Environment Presentation to Dublin Hospital CEO’s Kevin Prendergast Corporate Compliance Manager, ODCE.
HIPAA PRIVACY AND SECURITY AWARENESS.
Risk Management Reconstructed Implementing fraud risk intelligence practices July 2011 KPMG FORENSIC SM.
ANTI-MONEY LAUNDERING TRAINING FOR LENDERS Bill Heyman Offit Kurman
1 Freedom of Information (Scotland) Act 2002 A strategic view.
Supervision and Oversight in Procurement as a Tool of Efficient Project Implementation.
Implementing and Auditing Ethics Programs
Best Practices: Financial Resource Management February 2011.
Tax Information Exchange Agreements Formal Ratification 2011.
Student Data and Confidentiality Parents Rights Schools’ Responsibilities.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 16 Regulation of Securities, Corporate Governance, and.
Session 5 Anti-Money Laundering & Financial Crime Conducting or Supporting the Investigation Process Presented by ERM Institute Monday, 24 February 2014.
Financial Exploitation Legal. § 108A ‑ 102. Duty to report; content of report; immunity. Legal Section (a) Any person having reasonable cause to believe.
ANTI-MONEY LAUNDERING COMPLIANCE PROGRAM FCM TRAINING
“Foreign Official” under the FCPA means “any officer or employee of a foreign government or any department, agency, or instrumentality thereof, or of.
Page 1 Committee presentation An overview of the external audit process and types of audits 12 May 2010.
State Information Technology Agency Amendment Bill State Information Technology Agency Amendment Bill [B 24B -2002] September 2002.
Role of the Financial Intelligence Unit in Implementing an Effective Anti-Money Laundering (AML) Framework Jafar Sadat, Da Afghanistan Bank General Director,
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
AML O FFICER STR working Committee. S UBJECTS Technical aspects Aspects of day-to-day compliance AML Officer duties & responsibility Challenging facing.
The World Bank 1 World Bank Reforming to Meet New Challenges: Access to Information Effective July 1, 2010 The World Bank.
Responsibilities of Financial Institutions in the AML Architecture – AML Regulations in Afghanistan Mr. Jafar Sadat, Da Afghanistan Bank.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Workshop on Privacy of Public Figures and Freedom of Information - Skopje, 9-10 October 2012.
Corruption Prevention and Combating Bureau Ms Sintija Helviga Policy Planning Division.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Health Insurance Portability and Accountability Act of 1996
The activities of the state tax authorities
Tomball Independent School District Annual Confidentiality Training
Draft Law of Ukraine “On Amendment of the Law of Ukraine “On Accounting and Financial Statements in Ukraine” (Improvement of Some Provisions)”
MINISTRY OF FINANCE OF THE REPUBLIC OF MOLDOVA
Legislation, Regulation, Guidelines
Confidentiality of Information Acknowledgment and Agreement 2018
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Financial Intelligence Unit of Aruba MOT
State of florida tax information sharing Paula Barfield August 5, 2015
Presentation transcript:

Suspicious Activity Reporting Reporting with Safety Kevin Whelan US Department of Treasury

What is Meant by ‘Safety’  Safety means that customers of reporting entities will never know that they are or were the subject of a suspicious transaction report submitted by the reporting entity. Reporting entity and FIU staff are free from external pressure or intimidation  Safety means that reporting entity and FIU employees will be free from all liability when a report has been submitted in good faith

Why is Safety Important?  Because STRs will not be submitted when reporting entities do not feel safe  Because the AML system can not work without these reports  Because without an effective AML system Afghanistan will eventually find itself isolated from the international finance system  Because Article 48 of the AML Law criminalizes failure to report suspicious transactions

Legal Guarantees of Safety  Legal Guarantees in AML Law Article 48 criminalizes illegal disclosure of information Articles 42 and 43 exempt reporting entity and financial intelligence unit staff, respectively, from liability for good faith actions Article 38 prohibits the FIU from disclosing to the prosecutor (or anyone else) identifying information about the reporting party Article 38 also prohibits the FIU from sharing the STR with the prosecutor

Process Guarantees  The law is, by itself, not enough to guarantee safety.  Safety must be guaranteed through implementation of processes at all levels and through all interfaces  Safety processes at Reporting Entities Staff should have direct access to the compliance officer. Compliance officer should have direct access to top reporting entity executives Staff should never inform their customers that they have been or will be the subject of an STR  To do so is illegal and may result in criminal prosecution  To do so may endanger the well-being of others in the reporting entity and the FIU

Safety in transmission of reports  The FIU has developed an electronic communications agreement and mechanism that guarantees safety in the transmission of electronic reports  The FIU has developed a security code for all received reports that allows detection of tampering by either party after receipt of a report. Security code is printed on receipts

Safety within the FIU  The FIU is not a Law Enforcement Body Deliberately placed in Da Afghanistan Bank in order to create a trusted buffer between reporting entities and law enforcement  Policies and procedures exist (and will be continuously developed) for protection of information whether electronic or paper-based  Information is, to the greatest extent possible, held in electronic form The computers holding the information are physically and electronically protected The computers exist on an internal network that is physically isolated from other DAB networks and from the internet  Only employees with a direct ‘need-to-know’ will have access to information  All information access is logged and available for subsequent auditing.

Safety in Law Enforcement  A memorandum of understanding (MOU) must exist between the FIU and Law Enforcement before any information is shared All information released to law enforcement must be approved by the FIU Director General MOU requires law enforcement to agree to information protection provisions Information may be released only under certain conditions (for example the request must related to a specific case) Information will not be shared with Law Enforcement bodies that do not honor in practice the terms of the MOU  Law enforcement subject to same non-disclosure laws as everyone else (i.e. article 48)  Law enforcement will not receive the STR  Law enforcement will receive an analysis  Information and analysis supplied by the FIU may not be used as evidence in a criminal proceeding  Law enforcement must create evidence through their own investigation and powers of subpoena

Safety in International Information Exchange  FINTRACA is in the process of joining the Egmont Group of Financial Intelligence Units Provides secure mechanism for information exchange Requires members to adhere to core principles for information protection  FINTRACA is in the process of developing MOU for information exchange with ‘competent authorities’ of key countries MOUs contain provisions for the protection of information

Conclusion  Safety is the most important feature of an effective AML system Legal provisions exist to guarantee safety The FIU is developing and using policies, procedures, and technologies to implement legal requirements related to safety Reporting entities also have a role in safety  Without safety the AML system will not work. We each need to make it our highest priority.