NTISthis.com

Evidence Guide: FNSAML803 - Design and monitor a reporting system for suspicious transactions

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

FNSAML803 - Design and monitor a reporting system for suspicious transactions

What evidence can you provide to prove your understanding of each of the following citeria?

Identify and analyse global risks and vulnerabilities

  1. Identify a range of ML/TF risks and vulnerabilities potentially impacting on the organisation including cross border transactions
  2. Research, analyse and assess types of unusual activity relevant to the industry and/or organisation
  3. Explore a range of investigative techniques and analytical tools to detect suspicious matters relating to ML/TF
  4. Assess risk profile of different organisational portfolios and determine allocation of resources to monitor transactions
  5. Evaluate approaches for monitoring transactions appropriate for identified risks and vulnerabilities
Identify a range of ML/TF risks and vulnerabilities potentially impacting on the organisation including cross border transactions

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Research, analyse and assess types of unusual activity relevant to the industry and/or organisation

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Explore a range of investigative techniques and analytical tools to detect suspicious matters relating to ML/TF

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assess risk profile of different organisational portfolios and determine allocation of resources to monitor transactions

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Evaluate approaches for monitoring transactions appropriate for identified risks and vulnerabilities

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Review analytical tools and reporting systems

  1. Analyse the capabilities of the organisation’s manual and automatic systems and assess the appropriateness for different risk scenarios
  2. Evaluate the effectiveness of the organisation’s automated transaction monitoring software in detecting unusual transaction activity
  3. Review training programs to encourage staff to use intuition in further investigating unusual matters
  4. Review and evaluate organisational processes for triggering and monitoring alerts and creating suspicious matter reports
  5. Analyse the process and organisational procedures for evidence based investigations
  6. Evaluate the processes and procedures for performing periodic effectiveness monitoring
Analyse the capabilities of the organisation’s manual and automatic systems and assess the appropriateness for different risk scenarios

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Evaluate the effectiveness of the organisation’s automated transaction monitoring software in detecting unusual transaction activity

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Review training programs to encourage staff to use intuition in further investigating unusual matters

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Review and evaluate organisational processes for triggering and monitoring alerts and creating suspicious matter reports

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse the process and organisational procedures for evidence based investigations

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Evaluate the processes and procedures for performing periodic effectiveness monitoring

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Monitor the performance of analytical tools and reporting systems

  1. Monitor and review alerts based on specific detection rules
  2. Test and evaluate the reporting solution relevant to the detection rules
  3. Manage the provision of information and training to staff about the transaction monitoring program
Monitor and review alerts based on specific detection rules

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Test and evaluate the reporting solution relevant to the detection rules

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Manage the provision of information and training to staff about the transaction monitoring program

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Manage the investigation of alerts and generation of suspicious matter reports

  1. Investigate alerts that have been triggered based on detection rules and prioritise those with the highest risk score
  2. Analyse alerts to determine if activity requires further investigation
  3. Ensure organisational procedures are followed for initiating an investigative activity or case
  4. Analyse and review processes related to investigated cases where no action was taken and cases escalated to a suspicious matter report level to determine whether the actions taken were appropriate
  5. Implement effective feedback loops to ensure continuous improvement and training of staff
Investigate alerts that have been triggered based on detection rules and prioritise those with the highest risk score

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse alerts to determine if activity requires further investigation

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Ensure organisational procedures are followed for initiating an investigative activity or case

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse and review processes related to investigated cases where no action was taken and cases escalated to a suspicious matter report level to determine whether the actions taken were appropriate

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement effective feedback loops to ensure continuous improvement and training of staff

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse and report suspicious transactions

  1. Analyse trends in data related to alerts, activities investigated and suspicious matters reported to determine the effectiveness of reporting systems
  2. Oversee the provision of feedback to relevant staff on decisions regarding reports into suspicious transactions and activities
  3. Prepare internal reports on suspicious transactions and activities according to organisational procedures
  4. Prepare reports on suspicious transactions and activities for regulators, including cross border regulators, following required reporting formats
  5. Manage sensitivities and protocols relating to privacy and confidentiality of information when working with multiple regulators or reporting bodies
Analyse trends in data related to alerts, activities investigated and suspicious matters reported to determine the effectiveness of reporting systems

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Oversee the provision of feedback to relevant staff on decisions regarding reports into suspicious transactions and activities

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Prepare internal reports on suspicious transactions and activities according to organisational procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Prepare reports on suspicious transactions and activities for regulators, including cross border regulators, following required reporting formats

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Manage sensitivities and protocols relating to privacy and confidentiality of information when working with multiple regulators or reporting bodies

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Identify and analyse global risks and vulnerabilities

1.1 Identify a range of ML/TF risks and vulnerabilities potentially impacting on the organisation including cross border transactions

1.2 Research, analyse and assess types of unusual activity relevant to the industry and/or organisation

1.3 Explore a range of investigative techniques and analytical tools to detect suspicious matters relating to ML/TF

1.4 Assess risk profile of different organisational portfolios and determine allocation of resources to monitor transactions

1.5 Evaluate approaches for monitoring transactions appropriate for identified risks and vulnerabilities

2. Review analytical tools and reporting systems

2.1 Analyse the capabilities of the organisation’s manual and automatic systems and assess the appropriateness for different risk scenarios

2.2 Evaluate the effectiveness of the organisation’s automated transaction monitoring software in detecting unusual transaction activity

2.3 Review training programs to encourage staff to use intuition in further investigating unusual matters

2.4 Review and evaluate organisational processes for triggering and monitoring alerts and creating suspicious matter reports

2.5 Analyse the process and organisational procedures for evidence based investigations

2.6 Evaluate the processes and procedures for performing periodic effectiveness monitoring

3. Monitor the performance of analytical tools and reporting systems

3.1 Monitor and review alerts based on specific detection rules

3.2 Test and evaluate the reporting solution relevant to the detection rules

3.3 Manage the provision of information and training to staff about the transaction monitoring program

4. Manage the investigation of alerts and generation of suspicious matter reports

4.1 Investigate alerts that have been triggered based on detection rules and prioritise those with the highest risk score

4.2 Analyse alerts to determine if activity requires further investigation

4.3 Ensure organisational procedures are followed for initiating an investigative activity or case

4.4 Analyse and review processes related to investigated cases where no action was taken and cases escalated to a suspicious matter report level to determine whether the actions taken were appropriate

4.5 Implement effective feedback loops to ensure continuous improvement and training of staff

5. Analyse and report suspicious transactions

5.1 Analyse trends in data related to alerts, activities investigated and suspicious matters reported to determine the effectiveness of reporting systems

5.2 Oversee the provision of feedback to relevant staff on decisions regarding reports into suspicious transactions and activities

5.3 Prepare internal reports on suspicious transactions and activities according to organisational procedures

5.4 Prepare reports on suspicious transactions and activities for regulators, including cross border regulators, following required reporting formats

5.5 Manage sensitivities and protocols relating to privacy and confidentiality of information when working with multiple regulators or reporting bodies

Required Skills and Knowledge

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Identify and analyse global risks and vulnerabilities

1.1 Identify a range of ML/TF risks and vulnerabilities potentially impacting on the organisation including cross border transactions

1.2 Research, analyse and assess types of unusual activity relevant to the industry and/or organisation

1.3 Explore a range of investigative techniques and analytical tools to detect suspicious matters relating to ML/TF

1.4 Assess risk profile of different organisational portfolios and determine allocation of resources to monitor transactions

1.5 Evaluate approaches for monitoring transactions appropriate for identified risks and vulnerabilities

2. Review analytical tools and reporting systems

2.1 Analyse the capabilities of the organisation’s manual and automatic systems and assess the appropriateness for different risk scenarios

2.2 Evaluate the effectiveness of the organisation’s automated transaction monitoring software in detecting unusual transaction activity

2.3 Review training programs to encourage staff to use intuition in further investigating unusual matters

2.4 Review and evaluate organisational processes for triggering and monitoring alerts and creating suspicious matter reports

2.5 Analyse the process and organisational procedures for evidence based investigations

2.6 Evaluate the processes and procedures for performing periodic effectiveness monitoring

3. Monitor the performance of analytical tools and reporting systems

3.1 Monitor and review alerts based on specific detection rules

3.2 Test and evaluate the reporting solution relevant to the detection rules

3.3 Manage the provision of information and training to staff about the transaction monitoring program

4. Manage the investigation of alerts and generation of suspicious matter reports

4.1 Investigate alerts that have been triggered based on detection rules and prioritise those with the highest risk score

4.2 Analyse alerts to determine if activity requires further investigation

4.3 Ensure organisational procedures are followed for initiating an investigative activity or case

4.4 Analyse and review processes related to investigated cases where no action was taken and cases escalated to a suspicious matter report level to determine whether the actions taken were appropriate

4.5 Implement effective feedback loops to ensure continuous improvement and training of staff

5. Analyse and report suspicious transactions

5.1 Analyse trends in data related to alerts, activities investigated and suspicious matters reported to determine the effectiveness of reporting systems

5.2 Oversee the provision of feedback to relevant staff on decisions regarding reports into suspicious transactions and activities

5.3 Prepare internal reports on suspicious transactions and activities according to organisational procedures

5.4 Prepare reports on suspicious transactions and activities for regulators, including cross border regulators, following required reporting formats

5.5 Manage sensitivities and protocols relating to privacy and confidentiality of information when working with multiple regulators or reporting bodies

Evidence of the ability to:

document outcomes of a review of organisational anti-money laundering and counter terrorism financing (AML/CTF) reporting system

monitor AML/CTF reporting system for suspicious transactions

oversee investigations and reporting of suspicious matters.

Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.

To complete the unit requirements safely and effectively, the individual must:

describe a range of money laundering and terrorism financing (ML/TF) risks and vulnerabilities, identifying areas of high priority for monitoring and reporting

compare and contrast a range of investigative techniques and analytical tools to detect suspicious matters relating to ML/TF

identify and describe reporting requirements of key regulators for the organisation

outline the circumstances appropriate for:

manual transaction monitoring

automated transaction monitoring

analyse and explain typical behaviours for what constitutes unusual industry or organisation activity including:

buying and selling in large volumes and/or value

purchase or sale of a product not previously utilised, particularly if associated with ML/TF

change in customer profile

payments to sanctioned or suspicious individuals and organisations

compare and contrast key features of automated transaction monitoring systems including:

detection rules

rule selection criteria

tuning and fine tuning of detection rules

deployment

periodic review and reassessment of effectiveness

processes to document decisions

analyse organisational processes and procedures for performing periodic effectiveness monitoring including:

purpose of detection rules and alerts

analysis of data collected for detection rules including volume of rules triggered and ratio between cases and eventual suspicious matter reports

explain organisational processes and procedures for reviewing alerts including:

examination of detection rules including electronic payment monitoring, cash and cash equivalent monitoring, trading rules and loan rules

creating and investigating cases resulting from alert monitoring

determining reasonable grounds on which the basis of a suspicion is formed

process for creating a suspicious matter report

timeliness and compliance obligations

outline key features of staff information and training programs including how to:

review alerts

investigate cases

escalate unusual activities

determine whether a suspicious matter report should be filed

outline organisational procedures for investigating suspicious activities including:

collecting and analysis of evidence

security and confidentiality including not tipping off clients or others about activity subject to investigation or reporting

explain grounds used to investigate a suspicious activity or case including:

money laundering

terrorism financing

tax evasion

analyse and explain legislative and industry requirements for reporting suspicious activities