for dnfbps - amlcft.bnm.gov.myamlcft.bnm.gov.my/publication/amlcft awareness (bilingual).pdf ·...

41
FOR DNFBPs

Upload: doantuong

Post on 15-Mar-2019

215 views

Category:

Documents


0 download

TRANSCRIPT

FOR DNFBPs

2

1

4

5

3

2

Let’s start with ‘Why’ : Money Laundering Typologies Kita mulakan dengan ‘Kenapa’: Tipologi Pengubahan Wang Haram

Presentation Outline

ML/TF Issues and SolutionsPengubahan Wang Haram/Pembiayaan Keganasan – Isu dan Penyelesaiannya

Protect Yourself | Lindungi Diri Anda

Why Comply? | Mengapa Perlu Patuh?

Compliance Assessment Observations | Pemerhatian Kepatuhan Penting

3

Let’s start with ‘Why’ Mari kita mulakan dengan ‘Kenapa’

4

Red Flag Indicators:• Use of multiple

companies for no clear reason

• Multiple purchase of properties

• Customer requiring CoSecto become nominee shareholder/ director

Case 1: Using shell companies as a front to hide ultimate beneficial owner

X, a launderer

Forms

Brief Facts of Case:1. Shell companies created at different dates by Cosec but remains inactive until bought by client

2. X buys multiple shell companies to buy real estate through an REA firm

3. X appoints the Cosec as nominee director and/or shareholder to the companies

4. X’s ill-gotten money is pumped through the companies and into the REA firm as “loans”

5. It seems that the properties are owned by the shell companies

6. In actual fact, the UBO is X

Cosec

REA Firm

Adapted from: the White Whale case, ML using TCSPs (FATF), 2010

Purchases

Discussion:• What could the CoSec /

REA do to prevent his services from being misused?

• Monitor transactions of his clients?

• Find out who is the ultimate beneficiary of the transactions?

Shell companies

Extends “loans” to finance purchaseReal estate properties

Seemingly owned by shell companies

Actual UBO

Case Study | Using Legal Persons and Cosec as Nominee Shareholders

5

Red Flag Indicators:• Large cash deposits

• Cross border movement of asset (money & property)

• Use of shell company

• Lawyer’s clients accounts used to move funds from abroad without concrete reasons

Case 2: Misusing professionals and their trust account to lend credibility to transactions

Transfers

Brief Facts of Case:1. 2 individuals, X & Y, were involved in illegal importation of drugs

2. X & Y informed Lawyer 1 that they possess $400k cash which is owned by their Gibraltar-registered shell company; and that this money was ‘lent’ to the them to buy property in Auckland

3. The cash was given to the lawyer who banked it into his firm’s trust account w/o due diligence

4. Bank A, submitted STR to authorities when the lawyer deposited $100k on 4 occasions

5. Another professional, Lawyer 2, was engaged to facilitate the purchase of property

6. The funds for the purchase looked legitimate (a loan from a company)

Lawyer 1

Source: Yearly Typologies Report (APG), 2015

Engages

Discussion:• What could the Lawyers

do to prevent theirservices from being misused?

• Conduct due diligence on customer?

• Report STR?

Alleged company in

Gibraltar

Hands over $400k cash

Auckland property

Purchase

Drug moneyLawyer 2

X & Y

Law Firm’s Trust A/Cat Bank A

Submit STR

Bank A

Case Study | Misuse of Lawyer’s Trust Account

6

Brief Facts of Case:1. A drug trafficker instruct a man to borrow from a licensed moneylender on his behalf in order to

launder his proceeds of crime.

2. Borrower obtained loan from a licensed moneylender

3. Loan is repaid to moneylender by drug trafficker using proceeds of crime/ dirty money

Case 3: Loans are made for or are paid on behalf of, a third party with no reasonable explanation.

Case Study | Real-life cases of ML involving Moneylender

Adapted from: Moneylenders Sector Specific AML/CFT Guidance Notes, Isle of Man FSA, 2015

Red Flag Indicators:• Loan is taken on behalf

and repaid by an unknown third party .

• Customer is not concerned withinterest rates or other charges.

Discussion:• What could the

moneylenders do to prevent his services from being misused?

• Find out who is the third party involved.

• Find out the purpose of transaction.

7

Case 4: Misuse of real estate agents to gain introduction to a financial institution

1 2

Brief Facts of Case:1. Trustee of an offshore trust approached a REA to buy a property in Country A

2. REA assists to approach bank to enquire on loan application

3. Bank refused the application given unidentifiable identity of beneficiary owner of trust

4. The bank submitted suspicious transaction report

5. Analysis revealed that one of the members of the board of the trust was related to a bank with suspected links to terrorist organization

Red Flag Indicators:• Use of trust accounts

• Use of multiple trust arrangements in different jurisdictions

• Use of multiple trust arrangements with the same trustee

• Complex transactions involving multiple trusts and companies

• Unexplained geographic distance between agent, customer and the property

Case Study | Real-life cases of ML involving Real Estate Agents

Source: FATF Paper on Money Laundering & Terrorist Financing Through the Real Estate Sector, June 2007

BankREATrustee of

Offshore Trust

8

PawnbrokerDonate Jewellery

Pawn Jewelry

Collected

Brief Facts of Case:1. Agent from terrorist group collect donation in the form small jewelry from public or within secret

group

2. The agent then pawn the jewelry collected and send the money to his terrorist group to support terrorist operation.

Red Flag Indicators:• Pawn of multiple items in

short period

• Multiple unredeemed pledges from single customer

• Customers redeeming multiple tickets of high value items on behalf of another party

• Customer making pledges in close succession for substantial value (multiple tickets)

Case 5: Terrorism Financing Through Pawnbrokers

Case Study | Real-life cases of TF involving Pawnbroker

1 2

3

Terrorist Agent

9

Your institution could be used as a conduit to ML/TF

Institusi anda mungkin disalahgunakansebagai perantara bagi pengubahan

wang haram

10

Where do you stand? | Dimanakah kedudukan anda?

RI may / may not have red flags established. RI knowingly allow criminals to transact or turn a blind eye despite the suspicions.RI mungkin mempunyai senarai isyarat transaksi mencurigakanatau tidak namun memilih untuk mengabaikan tanda-tandatersebut atau sengaja bersekongkol dengan penjenayah.

Berwaspada & Proaktif

Bersubahat

Penglibatantanpa sedar

RI has established red flags to help detect suspicious transactions but unwittingly involved.RI mengetahui dan mempunyai senarai isyarat transaksimencurigakan namun telah terlibat tanpa disedari.

RI has established red flags and is able to detect suspicious transactions. RI knows what to do in the event of suspicion. RI may continue executing transactions, for fear of tipping off.RI mengetahui dan mempunyai senaraiisyarat transaksi mencurigakan. RI juga tahudan mengambil langkah yang wajar denganmalaporkan STR dan meneruskan transaksikerana khuatir laporan yang telah dibuatakan dizahirkan sekiranya transaksi atauhubungan dengan pelanggan diberhentikan.

Source: FATF Report – Money Laundering and Terrorist Financing Vulnerabilities of Legal Professionals (FATF), June 2013

11

Money laundering and financing terrorism ISSUESand Possible SOLUTIONS

ISU-ISU pengubahan wang haram dan pembiayaan keganasan danPENYELESAIAN

12

What is Money Laundering (ML)?

Process of making illegally gained proceeds (i.e. “dirty money”) appear legal(i.e. “clean”)

Proses penukaran perolehan yang dijana daripada kegiatan haram (wang haram)bertujuan untuk memberi satu ‘penampilan yang sah’ disisi undang-undang

Know what

is ML?

Issue: Money Laundering | Pengubahan Wang Haram

What is the impact of Money Laundering (ML)?

More crimes happen since crime paysPercambahan jenayah

Illegal businesses compete with legitimate onesPersaingan antara perniagaansah dan perniagaan haram

Integrity of financial system is affectedIntegriti sistemkewangan terjejas

13

Create | Menghasilkancreate a legitimate explanation

for the source of assets.

Conceal | Sembunyiconceal the illegal

ownership or origin of the criminal earnings.

Convert | Tukarconvert proceeds of crime to

a less suspicious form

The broad aims of money laundering are threefold:

1. One of the most tried, tested and successful methods of investigating crime is to follow the money. Criminals want to move the money further and faster than investigators can follow or track it

2. To reinvest the profits in future criminal activity or in legitimate businesses3. To enjoy the benefits of the illicit proceeds without bringing undue attention to

themselves

Issue: Why launder?

14

Issue: How to launder?

Placement | Penempatan

Moving the funds away from its source

Layering | Pelapisan

Disguising the trail or “layering” the illegal

nature

Integration | Integrasi

Making the funds available for enjoyment

Stages of MLPeringkat-

peringkat ML

Banks, money changers, casino, lawyers,

accountants, company secretaries

Money changers, lawyers, company

secretaries, accountants, money

lenders

Real estate agents, DPMS, lawyers

Who may be vulnerable?

Siapa yang mungkin

terdedah?

15

Process of financing terrorist activity either through legitimate or illegitimate sourcesProses membiayai aktiviti-aktiviti keganasanmenggunakan dana dari sumber yang sah atautidak sah

What is Terrorism Financing (TF)?

A person or a group who uses unlawful violence

and intimidation in pursuit of political aims e.g. ISIL, Boko HaramIndividu atau kumpulan yang menggunakan kekerasanyang menyalahi undang-undang dalam memastikanmatlamat /ideologi tercapai

Who is a terrorist?

Techniques of TF

• Other ways: Kidnapping for ransom Movement of funds/ money through the financial system in small amounts to avoid detection Movement of value through jewellery/ precious stones/ gold bullion across borders Borrowing through money lenders

• Raising funds through legitimate sources e.g. legitimate business, pawning of jewellery or other valuables | Mengumpul dana melaluisumber yang sah

• Raising funds from criminal proceeds e.g. drug trafficking, credit card fraudMengumpul dana melalui aktiviti jenayah

• Self funding e.g. families and friends | Dana persendirian

Issue: Terrorism Financing | Pembiayaan Keganasan

16

What is Financing of Proliferation of Weapons of Mass Destruction (PF)?

The act of providing funds or financial services which are used, in whole or in part, for themanufacture, possession, transport, or use of weapons of mass destruction (WMD).

Pebuatan menyalurkan dana atau memberikan perkhidmatan kewangan, sama ada sepenuhnya atausebahagiannya, untuk tujuan pembuatan, penyimpanan, pemindahan atau apa-apa kegunaan yangberkaitan dengan senjata pemusnah besar-besaran.

Issue: Proliferation Financing | Pembiayaan Percambahan Senjata Besar-besaran

Nuclear weaponsSenjata nuklear

Chemical weaponsSenjata kimia

Biological weaponsSenjata biologi

What are Weapons of Mass Destruction (WMDs)?

Dual use goods (used for illegitimate

purposes)Barangan dwi-kegunaan yang

disalahgunakan

Adapted from: Combating Proliferation Financing – A Status Report on Policy Development and Consultation (FATF), February 2010

17

Legal Framework

• BNM the competent authority for

AMLA and appropriate

supervisory/ enforcement powers

• Provision of law in relation to both

preventive and combative

measures

• Criminalisation of more than 400

offences from more than 45

legislations

• Inclusion of reporting institutions

• Adequate investigation & enforcement

powers (incl. freezing, seizure and

forfeiture of assets)

• Fully-functional FIU in BNM

• AML/CFT Units set-up in key law

enforcement agencies (LEAs)

• Structured training programs for

financial investigators

FATF

STANDARDS

Preventive Measures: Reporting Institutions

• More than 43,000 RIs

• Identifications of institutional risks

• Implementation effective AML/CFT

compliance programme to detect and

deter ML/TF

• Submit STRs and CTRs to

FIED,BNM

Domestic & International Cooperation

Combative measures: FIU & LEAs

• National Coordination Committee for integrated

approach across 16 Ministries & Agencies

• DNFBP Working Groups for collaboration among

licensing bodies, self regulated bodies, industry

associations and RIs

• Identify & respond to emerging risks through

National Risk Assessment process

• MOUs and strategic partnership with foreign FIUs

and counterparts

• Strong network with international/regional bodies

FATF, APG, Egmont Group of FIUs

Solution: Comprehensive AML/CFT framework for prevention of ML/TF activities since AMLA 2001

18

Banks

Insurance companies

Securities / Fund managers

Money changers

E-money operators

Money lenders/ pawn brokers

Leasing / Factoring

Gatekeepers – Lawyers, accountants, company secretaries and trust companies

Dealers in precious metals and stones (jewellers, goldsmith, kedai emas etc.)

Real estate agents

Casino

Gaming Houses (4D, horserace etc.)

1 Financial Institutions (FIs)Designated Non-Financial Businesses and Professions (DNFBPs)

Legal Framework

• Anti-Money Laundering, Anti-Terrorism Financing and Proceeds of Unlawful Activities Act 2001 (Act 613) – AMLA

• AML/CFT – Designated Non-Financial Businesses and Professions (DNFBPs) & Other Non-Financial Sectors (Sector 5) (Sectorial Guidelines 1-10 (2006-2008) were superseded by Sector 5 on 1 Nov 2013)

2

Solution: Reporting Institutions (RIs) under AMLA – a snapshot and instruments

Kerangka Undang-undang

19

CriminalsLaw Enforcement

AgenciesBank Negara MalaysiaReporting Institutions

• Financial Intelligence Unit (FIU) in BNM analyses CTRs and STRsUnit Perisikan Kewangan di BNM menganalisa data CTR dan STR

• Tries to place illegal proceeds via RIs Percubaan untukmenempatkan wangharam di institusi pelapor

• Know your customerKenali pelanggan anda

• Submit STRs to BNM when the transactions are suspicious or out of ordinaryHantar Laporan TransaksiMencurigakan kepada BNM

• Submit CTRs, when requiredHantar Laporan AmbangTunai apabila perlu

• Conduct investigation based on the analysisMenjalankansiasatanberdasarkananalisis yang disalurkan

BNM receives More than

200 STRs per day

• Provide analysis of multi-STRs reported by various RIs to LEAsMenyalurkan analisis STR yang dilaporkan oleh pelbagai institusipelapor kepada Agensi-agensiPenguatkuasaan Undang-Undang

Preventive measures Langkah pencegahan

Combative measures Langkah kombatif

Solution: Reporting Institutions (RIs) are the First Line of Defence

20

You are part of the solution,How do you protect yourself from being abused?

Anda adalah sebahagian daripada penyelesaian, Bagaimana anda boleh melindungi diri anda dari disalahgunakan?

21

CDD information is a tool to confirm the identity of your customer and enable assessment of ML/TF riskMaklumat CDD ialah rujukan untukmengesahkan identiti pelanggan anda danmembolehkan penilaian risiko pengubahanwang haram/ pembiayaan keganasan (ML/TF)

At the point of establishment of business relationshipSewaktu memulakanhubungan perniagaan

When there is suspicion of ML/TF and/ or doubt on the information previously obtainedApabila ada transaksi mencurigakan dan/atau andacuriga dengan maklumat yang diperolehi

Customers

Person

Conducting

Transactions

Beneficial

Owners

WHY?

WHEN?

New customer Pelanggan baharu

1 Existing customer Pelanggan sedia ada

2

First thing first, know your client – Customer Due Diligence (CDD)

| Kenali Pelanggan Anda

22

WHAT ARE ACCEPTABLE DOCUMENTS FOR INDIVIDUAL CUSTOMERS AND BENEFICIAL OWNER?

• NRIC/ Passport

If there is doubt – ask the customer to show other supporting official identification documents with his / her photograph

Jika anda berasa curiga – minta pelanggan untuk menunjukkan dokumen rasmi sokongan yang lain yang mengandungi gambar pelanggan

• Any other official documents bearing the photograph of the customer, provided that the RI is satisfied with the authenticity of the document | Dokumen-dokumenrasmi yang mempunyai gambarpelanggan dan diyakini ketulenannyaoleh insitusi pelapor

• If biometric ID is used, verification requirement deemed to have been fulfilled. No photocopy of ID is necessary | Jika ID biometrikdigunakan, obligasi pengesahandianggap sempurna. Salinan ID tidakdiperlukan lagi

CDD: Verification of individual customers | Pengesahan pelanggan individu

23

Identify and take reasonable measures to verify beneficial owner (BO)

(a) Identity of the natural person who ultimately has a controlling ownership interest in a legal personi. Identification of directors/shareholders with equity interest of more than 25%;ii. Proper authorisation for persons authorised to represent the company (letter of authority/

directors’ resolution); andiii. NRIC / Passport to identify the authorised person(s)

(b) If there is a doubt on the controlling interest - the identity of the natural person exercising control through other means

(c) Where there is no natural person identified- the identity of the natural person who holds the senior management position

Identification & verification of the BOs up to the level of natural persons who have control

(a) Name, legal form and proof of existence(b) Powers that regulate and bind customers(c) Address of registered office

Identify and verify customer

CDD: Verification of companies/ businesses (legal persons)

24

Penyaringan WHY?Terrorists, terrorist organizations and the development of weapons of mass destruction require financial support in order to achieve their aims. They use techniques like those of money launderers to evade authorities' attention and to protect the identity of their sponsors and of the ultimate beneficiaries of the funds.

HOW TO SCREEN CUSTOMERS?

Update and Maintain Lists Kemaskini dan Simpan Senarai

• United Nations Security Council Resolutions (UNSCR) list

• Ministry of Home Affairs (MOHA) list (for TF only)

1ReportLapor

• To FIED (including attempted transactions)

• Inform relevant supervisory authority

4Check on names Menyaring Nama

• On new customers, beneficial owners and beneficiary

• Existing customers

• Potential customers

• Take measures to ascertain identity – not ‘false positive’

2Freeze / Reject

Beku/Tolak

• Freeze/ block fund for existing customers

• Reject transactions for new/ potential customers

3

Combating the Financing of Terrorism (CFT) and Proliferation Financing (CPF)

25

Pemprofilan Risiko

• RIs are required to formulate its own risk scoring mechanism for the purpose of risk profiling its customers e.g. high, medium or low

• Risk profiling is crucial for the purpose of applying effective control measures/ monitoring i.e. enhanced due diligence on higher risk customers, monitoring of transactions

WHY?

HOW?

Know your customers’ risk via Customer Risk Profiling (CRP)

The same risk factors are used for conducting Institutional risk assessment

• Resident or non-resident

• Company structure

• Politically exposed persons (PEPs)

• High net worth individuals

• Customer from high risk countries

2

• Non face-to-faceTidak bersemuka

4

• Value of product/ service

• Cash-based

• Simple / complex transactions

1

• Business locationLokasi perniagaan

• Country of originNegara asal

• Country on sanctions list |Negara dalamsenarai sekatan

3Product / service Produk /

perkhidmatan

Delivery channels Saluran

penyampaian

Geographical locationLokasi

Customer Pelanggan

26

Examples:• Cash based• Products of high value• Product/service

offered that is non face-to-face

iii. Risk associated with Transaction / Delivery Channel

No. Name of customer

Nationality Occupation/ nature of business

Foreign PEP(YES/NO)

Sanctioned person

(YES/NO)

Geographical location of business

Transaction value (RM)

Mode of payment

ML/TF Risk Rating e.g. Low, Medium, High

1. Dmitry Russian Senior Officer YES NO Bangsar, KL 450,000 Cheque High

2. Ahmad Malaysian Director NO NO Georgetown, Penang

1,500,000 Cheque Medium

3. Tan Malaysian Assistant VP NO NO Kelana Jaya 30,000 Bank transfer

Low

4. xxxx

Customer Risk Profiling (CRP): Example*

Examples:• Customers from

sanctioned/high risk countries• Customers who used complex

legal structure• Customers whose origins of

wealth cannot be verified

Example:• Customers on boarded at

high risk branches (to be determined by RIs)

ii. Geographical risk

i. Customer risk

Examples

* Please refer to Appendix I of Sector 5 Policy Document

Automatically a high risk customer if YES

If YES, do not deal with them. Block/ reject transaction or freeze

account (where relevant).

27

WHY?

WHEN?

• The higher the risk, the better your controls must be put in place | Semakin tinggi risiko, lebih ketat kawalan anda

• To satisfy yourself that the client is legitimate and not trying to abuse your services | Berpuas hati pelanggan tulen

• Approval is to protect your firm from taking risk beyond your normal risk appetite | Kelulusan sebagai perlindunganuntuk syarikat• Dealing with foreign PEPs | Apabila

berurusan dengan PEP dari negara asing

• You assessed a client to be higher risk (including domestic PEPs) | Anda menilaipelanggan sebagai berisiko tinggi

HOW?

Have a chat to find out from your clients

Dapatkan maklumatmelalui perbualan

Ensure your senior management agrees to

accept the client | Pastikanpihak pengurusan bersetujuuntuk menerima pelanggan

tersebut

Remember! You don’t need to do EDD for

all your clients | Anda tidakperlu lakukan EDD untuk semua

pelanggan

• Ask clients to declare in KYC / Customer Application Forms | Minta pelangganisytihar di dalam borang

• Ask for more info / verification documents |Minta maklumat lanjut / dokumen pengesahan

You know the risk, now manage it through Enhanced Due Diligence (EDD)

Menambah Baik Usaha Wajar Pelanggan

28

CDD EDD On-going Due Diligence (ODD)

HOW?

Throughout your business relationship, do you find

the client suspicious?

Identification Mengenalpasti

Verification Pengesahan

ODDUsaha WajarBerterusan

i ii iii

• Make a copy of ID documentBuat salinan dokumenpengenalan

• Review and update client profile | Semak dankemaskini profil pelanggan

• Transaction monitoring for consistency with known profile of clientAwasi transaksi agar sepadan dengan profilpelanggan

Paragraph 13.6

• Identify| Kenalpasti

• Sight ID documentLihat dokumen pengenalan

29

STRs are documents that reporting institutions are required to submit when having suspicion that a customer is involved in money laundering or terrorism financing | STR ialah dokumen yang perlu dihantar oleh institusipelapor apabila mengesyaki pelanggan terlibat dalampengubahan wang haram atau pembiayaan keganasan

WHAT IS AN STR?

STRs provide LEAs valuable information/ intelligence of potential criminal activities | STR merupakan maklumat berharga buat agensi-agensipenguatkuasaan undang-undang mengenai aktiviti jenayah

✓ Submit STRs promptly | Hantar STR dengan kadar segera

✓ Complete the STR form as much as possibleLengkapkan borang STR sebanyak mungkin

✓ Disclose the submission to anyone elseMendedahkan penghantaran kepada sesiapa

✓ Tip-off the person(s) being reported – do treat them as normal clients | Memberi sebarang petunjuk kepada pelanggan bahawasebarang laporan telah dihantar

You may continue doing business with the client even after the submission of an STR, when reasonably belief that it would tip off the client if the transaction/ CDD is stopped

WHY?HOW TO

All you need to know about Suspicious Transaction Reports (STR)

STR form can be found at amlcft.bnm.gov.my |Borang Laporan Transaksi Mencurigakan boleh didapati di amlcft.bnm.gov.my

Hantar STR

30

RI is required to submit STR (regardless of the amount of transaction) when the transaction:

Unusual | Luar biasa

No clear economic purpose | Tiada tujuan

ekonomi yang jelas

Appear illegal, proceeds from illegal actiivites

Nampak salah di sisi undang-undang, hasil

daripada aktiviti haram

Indication that customer may involve ML/TFTerdapat tanda-tanda

pelanggan terlibat denganpengubahan wang haram/

pembiayaan keganasan

What is suspicious? | Apakah contoh perkara mencurigakan?

Institusi pelapor dikehendaki menghantar STR (tidak tertakluk kepada nilai transaksi) apabila sesuatutransaksi itu :

Reporting institutions are to develop its own red flags (and be guided by Sector 5 examples) to help identify suspicious transactions

31

Some steps that may be undertaken:

Screen

Evaluate

Ask Find

Screen the account for suspicious

indicators: red flags may be built by RIs

Step 1 : Screen | Saring

Ask customer appropriate

questions. e.g. for furtherance of promoting the

services or satisfying customer needs.

Step 2: Ask | Tanya

Find out the customer's records i.e. review of information already known e.g. customer occupation, whether it commensurate with transactions.

Step 3: Find | Selidik

Evaluate all information gathered and consider to promptly submit STR

Step 4: Evaluate | Nilai

How do I recognise a suspicious transaction? | Bagaimana untuk mengenalpasti transaksi mencurigakan?

32

WHY?• Record-keeping is an essential part of the audit trail for the

detection, investigation and confiscation of criminal or terrorist property or funds.

• Record-keeping helps the investigating authorities to establish a financial profile of a suspect, trace the criminal or terrorist property or funds and assists the Court to examine all relevant past transactions to assess whether the property or funds are the proceeds of or relate to criminal or terrorist offences.

HOW?• In the form that is admissible in court

Dalam bentuk yang diterima di dalam mahkamah

Management Information System (MIS)Sistem Pengurusan Maklumat

REMEMBER!Keep records for 6 years from the date of

the transaction completed or terminated

Simpan rekod selama 6 tahun daripada tarikh

transaksi selesai atau ditamatkan

• Not necessarily automated. Can be manual• To commensurate with nature, scale and complexity of operations• Important: MIS to provide timely information on a regular basis for

reporting institutions to detect irregularity/ suspicious transactions

Keep, Retain and Centralise Records

Penyimpanan Rekod

33

• By specifying in writing to : Pengarah, Financial Intelligence and Enforcement DepartmentBank Negara MalaysiaJalan Dato’ Onn50480 Kuala LumpurEmail: [email protected]: +603-2693 3625

WHY?

WHAT ARE THE RESPONSIBILITIES?• To ensure proper implementation of the

AML/CFT policies | Memastikan pelaksanaan dasarAML/CFT dalaman

• To ensure all employees are aware of the firm’s AML/CFT measures | Memastikan semuakakitangan mengetahui langkah-langkah AML/CFT

• To evaluate internally generated STRs before submission | Menilai laporan transaksi mencurigakandalaman sebelum dihantar kepada BNM

HOW?

• The CO acts as the key person for the oversight of all activities relating to the prevention and detection of ML/TF (including setting up an effective Compliance Programme) | Pegawai Pematuhan ialah individu yang bertanggungjawab untuk memantau aktiviti-aktivitiberkaitan pencegahan dan pengenalpastian ML/TF

Appointment of AML/CFT Compliance Officer (CO)

34

Policies & Procedures

• Commensurate with the firm’s ML/TF risks and size of businessSelaras dengan risiko ML/TF dan saizperniagaan

Board of Directors & Senior Management

• Spearhead the AML/CFT efforts and compliance | Menerajui usahaAML/CFT dan pematuhan

Employee Screening

• Checks on employee’s personal information including employment and financial historyPeriksa maklumat peribadi pekerja termasukrekod pekerjaan dan rekod kewangan

• Upon hiring and throughout the course of employmentSemasa pengupahan dan sepanjangtempoh pekerjaan

AML/CFT Training

• Tailored to staff level & nature of works | Sesuai mengikutpangkat & jenis pekerjaan

• Frequency – correlate with level of risk | Kekerapan –selaras dengan tahap risiko

Other requirements: AML/CFT Compliance Programme

Please refer to Sector 5 Policy Document for more information

35

Comply to ProtectPatuh untuk Melindungi

36

1. To protect your business from being abused by money launderers/ terroristfinanciers | Untuk melindungi perniagaan anda daripada disalahgunakan oleh pengubah

wang haram/pembiaya keganasan

2. To avoid non-compliance costs (for failure to comply or for rectificationmeasures) under the AMLA | Untuk mengelakkan penalti akibat kegagalan mematuhi

obligasi-obligasi di bawah AMLA

Why do you need to comply? | Kenapa anda perlu patuh?

37

Source from: The Guardian, United Kingdom, 14 September 2018.

Possible consequences:• Non-submission of STRs is punishable by

up to 5 years prison sentence in the UK.• In addition, members of professional

bodies may be referred to disciplinary tribunals for failing in their obligations.

Case in the UK: Failure to report an STR

Stark difference across different sectors with regard to STR submission levels.

• The overall number of reports increased by 9.6% but reports from lawyers fell by 10%.

Lawyers often have better understanding of transactions than other professionals.

• But these do not translate into STR submission, even when other sectors choose to report on the same transactions.

• Scandals like the Panama & Paradise Papers reveal involvement of accountants, company secretaries, and lawyers.

Regulators are stepping-up on enforcement on RIs which fail their obligation to submit STRs.

• In the UK, there are currently seven investigations by the NCA into professional enablers.

• There are also 19 intelligence on professional enablers, 11 of which involve lawyers.

38

Action taken:• Lawyer was fined S$10,000 for failure to

submit an STR

Brief Facts of Case:1. Kang, a lawyer in Singapore, was engaged by

Zhang, a Chinese national who wanted to purchase a property in Singapore amounting to more than S$ 5 million.

2. During the whole process, Kang has never met Zhang in person. Correspondence was through email.

3. Upon discovering that Zhang was being investigated in China for fraud-related activities, Kang failed to report an STR on the property transaction.

Source from: Lawyer fined S$10,000 for failing to flag suspicious Sentosa Cove property transaction, Channel News Asia, 2018.

Case in Singapore: Failure to report an STR |Kegagalan melapor STR

Real estate propertiesIllegal proceeds

Zhang, a launderer

Kang, a lawyer

39

AML/CFT Microsite: http://amlcft.bnm.gov.my/

FATF Publication: http://www.fatf-gafi.org/publications/

[email protected]

LINK: 1-300-88-5465 (1-300-88-LINK)

References & Contact Details

40

Thank You and Questions?Terima Kasih dan Soalan?