KYC AML & Compliance
KYC AML & Compliance
Anti-money laundering (AML) initiatives have been at the core of the fight against organized crime around the world.
Domain knowledge is central to the global fight against money laundering and financing of terrorism. It must be
realised that the challenge of ML/ TF and related crimes is posed by a somewhat organised sector which is just as well
informed or sometimes even better informed than the industry players. The money laundering industry thrives on its
ability to think a step ahead of the financial industry and the perpetrators generally walk away by the time the damage
is discovered. Anti-money laundering (AML) initiatives have been at the core of the fight against organized crime
around the world. Domain knowledge is central to the global fight against money laundering and financing of terrorism.
It must be realised that the challenge of ML/ TF and related crimes is posed by a somewhat organised sector which is
just as well informed or sometimes even better informed than the industry players. The money laundering industry
thrives on its ability to think a step ahead of the financial industry and the perpetrators generally walk away by the time
the damage is discovered.
Financing of Terrorism?
It involves the solicitation, collection or provision of funds both from legal and illicit sources, with the intention of
supporting terrorist acts or organizations that support terrorism. It is important to note that in the case of money
Sunil SKA
2
laundering, the funds are always of illicit origin, whereas in the case of terrorist financing funds can originate from both
legal and illicit sources. The primary goal of individuals or entities involved in the financing of terrorism is, therefore, not
necessarily, to conceal the sources of the money but to conceal both the financing and the nature of the financed
activity.
The threat of money laundering, terror financing and other financial crimes, as well as the fight against the financial
crimes is global.
Some of the major global institutions apart from the United Nations, that have contributed significantly to the
development of legal and operational frameworks across the world for fighting money laundering and financing of
terrorism are as under:
* The FATF
* FATF Styled Regional Bodies (FSRBs)
* The Wolfsburg Group
* The Egmont Group
The objectives of the FATF are to set standards and promote effective implementation of legal, regulatory and
operational measures for combating money laundering, terrorist financing and other related threats to the integrity of
the international financial system. The FATF is therefore a “policy-making body” which works to generate the
necessary political will to bring about national legislative and regulatory reforms in these areas.
FATF Recommendations
The FATF has developed a series of 40 recommendations that are recognized as the International Standard for
Combating of Money Laundering and the Financing of Terrorism and Proliferation of Weapons of Mass Destruction.
These recommendations form the basis for a coordinated response to these threats to the integrity of the financial
system and help ensure a level playing field. First issued in 1990, the FATF Recommendations are also revised from
time to time to ensure that they remain up to date and relevant and universal in application.
The FATF Recommendations which are 40 in number, set out a comprehensive and consistent framework of
measures which countries should implement in order to combat money laundering and terrorist financing, as well as
the financing of proliferation of weapons of mass destruction. Countries have diverse legal, administrative, and
operational frameworks and different financial systems, and so cannot all take identical measures to counter these
threats. The FATF Recommendations, therefore, set an international standard, which countries should implement
through measures adapted to their particular circumstances. The FATF Standards comprise of the Recommendations
themselves and their Interpretive Notes.
The FATF monitors the progress of its members in implementing necessary measures, reviews money laundering and
terrorist financing techniques and countermeasures and promotes the adoption and implementation of appropriate
measures globally. In collaboration with other international stakeholders, the FATF works to identify national-level
Sunil SKA
3
vulnerabilities with the aim of protecting the international financial system from misuse. The FATF's decision making
body, the FATF Plenary, meets three times a year.
In addition to its blacklist, the FATF also issues a grey list, officially referred to as Jurisdictions Under Increased
Monitoring. While grey-list classification is not as negative as the blacklist, countries on the list may still face economic
sanctions from institutions like the IMF and the World Bank and experience adverse effects on trade. The current
FATF grey list, last updated on 21 February 2020, includes 18 countries namely Albania, the Bahamas, Barbados,
Botswana, Cambodia, Ghana, Iceland, Jamaica, Mauritius, Mongolia, Myanmar, Nicaragua, Pakistan, Panama, Syria,
Uganda, Yemen and Zimbabwe.
Accordingly, FIs must screen customers against the FATF blacklist and grey list during onboarding and throughout
their business relationship and monitor their transactions on an ongoing basis.
Nine FSRBs have been established for the purpose of disseminating international standards of FATF throughout the
world. The main task of the regional bodies is to devise systems for combating money laundering and terrorist
financing in their respective regions.
The FSRBs conduct evaluations of the AML/ CFT systems of the member states and make recommendations for their
improvement.
The regional bodies are also involved in the study of typologies-the most common schemes used by criminals for
money laundering and terrorist financing. Based on the results of the typological research, the best practices are
disseminated to the private sector, oversight and regulatory bodies, law enforcement and the scientific community.
India is a member of APG (Asia Pacific Group) on Money Laundering and EAG (The Eurasian Group on Combating
Money Laundering and Financing of Terrorism).
Sunil SKA
4
The Group came together in 2000, at the Château Wolfsburg in north-eastern Switzerland, to work on drafting anti-
money laundering guidelines for Private Banking.
The Wolfsburg Anti-Money Laundering (AML) Principles for Private Banking were subsequently published in October
2000, revised in May 2002 and again most recently in June 2012. Since the first set of AML Principles was released,
the Group has published a significant number of documents, whether in the form of Principles, Guidance, Frequently
Asked Questions (FAQs) or Statements.
This is especially relevant as FIUs are uniquely positioned to cooperate and support national and international efforts
to counter terrorist financing and are the trusted gateway for sharing financial information domestically and
internationally in accordance with global Anti Money Laundering and Counter Financing of Terrorism (AML/ CFT)
standards.
The Prevention of Money-laundering Act, 2002 (PMLA-2002), is the principal legislation for creating an Anti-Money
Laundering framework in India.
The UAPA-1967, is an Act to provide for the more effective prevention of certain unlawful activities of individuals and
associations, and for dealing with terrorist activities, and for matters connected therewith. The UAPA criminalizes
terrorist acts and raising of funds for terrorist acts.
In addition, the guidelines issued by RBI for the banking sector, IRDA for the Insurance Sector and SEBI for the
Capital Markets also help the REs to fulfil the obligations under PMLA.
The Prevention of Money-laundering Act, 2002 & PML (Maintenance of Records) Rules-2005
The Prevention of Money Laundering Act, 2002 (PMLA) is an Act of Parliament to prevent money laundering and to
provide for confiscation of property derived from or involved in money laundering and for matters connected therewith
or incidental thereto. PMLA and the Rules notified there under came into force with effect from July 1 2005.
The Prevention of Money Laundering Act, 2002 (PMLA) brought into force with effect from 1st July 2005, is applicable
to all the Reporting Entities (RE). Reporting Entity means a Banking company, a Financial institution, an Intermediary
and a person carrying on, a designated business or profession.
The Act and Rules notified there under impose certain obligations on all Reporting Entities (REs) to verify identity of
clients, maintain records and furnish information in prescribed form to Financial Intelligence Unit - India (FIU-IND).
Sunil SKA
5
2. Furnish to Director within such time as may be prescribed, information relating to such transactions, whether
attempted or executed, the nature and value as may be prescribed.
3. Verify the identity of its clients in such manner and subject to such conditions as maybe prescribed.
4. Identify the beneficial owner, if any, of such of its clients, as may be prescribed.
5. Maintain record of documents evidencing identity of its clients and beneficial owners as well as account files
and business correspondence relating to its clients.
Similarly, the PML (Maintenance of Records) Rules 2005, herein after called as PML Rules, delineate the rules for
maintenance of records of the nature and value of transactions, the procedure and manner of maintaining and time for
furnishing information and verification of records of the identity of the clients of the banking companies, financial
institutions and intermediaries. For instance,
Rule 3 of the PML Rules specifies the transactions, the records of which are to be maintained.
Rule 7 of the PML Rules prescribes the procedure and manner of furnishing information, including an obligation to
evolve an internal mechanism for detecting the prescribed transactions.
Rule 8 of the PML Rules prescribes the time of furnishing such information and
Rule 9 of the said Rules prescribes the procedure and manner of verification of records of identity of client.
Maintenance of Records
Under the PMLA, and as per RBI Master Direction- Know Your Customer (KYC) Direction, 2016, REs interalia, shall –
1. maintain all necessary records of transactions between the RE and the customer, both domestic and international,
for at least five years from the date of transaction.
2. preserve the records pertaining to the identification of the customers and their addresses obtained while opening the
account and during the course of business relationship, for at least five years after the business relationship is ended.
3. make available the identification records and transaction data to the competent authorities upon request.
4. introduce a system of maintaining proper record of transactions prescribed under Rule 3 of Prevention of Money
Laundering (Maintenance of Records) Rules, 2005 (PML Rules, 2005);
5. maintain all necessary information in respect of transactions prescribed under PML Rule 3 so as to permit
reconstruction of individual transaction, including the following:
(a). the nature of the transactions.
(b). the amount of the transaction and the currency in which it was denominated.
(c). the date on which the transaction was conducted; and
(d) the parties to the transaction.
6. evolve a system for proper maintenance and preservation of account information in a manner that allows data to be
retrieved easily and quickly whenever required or when requested by the competent authorities;
7. maintain records of the identity and address of their customer, and records in respect of transactions in hard or soft
format.
The UAPA criminalizes terrorist acts and raising of funds for terrorist acts. It also provides for attachment of and
seizure of properties connected with terrorist activities or organisations. Sections 35 to 40 under Chapter VI of UAPA
deal with Terrorist Organisations enumerating the Offence relating to membership of a terrorist organisation, Offence
relating to support given to a terrorist organisation and Offence of raising fund for a terrorist organisation.
Sunil SKA
6
The Unlawful Activities (Prevention) Act, 1967 (UAPA) was amended and notified on 31.12.2008, which, inter-alia,
inserted Section 51A to the Act. Section 51A reads as under: "51A. For the prevention of, and for coping with terrorist
activities, the Central Government shall have power to –
1. freeze, seize or attach funds and other financial assets or economic resources held by, on behalf of or at the
direction of the individuals or entities Listed in the Schedule to the Order, or any other person engaged in or suspected
to be engaged in terrorism;
2. prohibit any individual or entity from making any funds, financial assets or economic resources or related
services available for the benefit of the individuals or entities Listed in the Schedule to the Order or any other person
engaged in or suspected to be engaged in terrorism;
3. prevent the entry into or the transit through India of individuals Listed in the Schedule to the Order or any
other person engaged in or suspected to be engaged in terrorism". The Act has been amended from time to time, to
make it more effective in preventing unlawful activities and meet the FATF standards.
Foreign Exchange Management Act, 1999 (FEMA)- A Civil Law, with officers empowered to conduct investigations
into suspected contraventions of the Foreign Exchange Laws and regulations, adjudicate contraventions and impose
penalties on those adjudged to have contravened the law.
PMLA, 2002- A criminal law, with the officers empowered to conduct investigations to trace assets derived out of the
proceeds of crime, to provisionally attach/ confiscate the same and to arrest and prosecute the offenders found to be
involved in Money Laundering. The DOE with its headquarters at New Delhi is headed by the Director Enforcement.
FIU-IND
The Financial Intelligence Unit-India was set up by the Government of India in 2004 as the central national agency
responsible for receiving, processing, analysing and disseminating information relating to suspect financial
transactions.
The FIU-IND is also responsible for coordinating and strengthening efforts of national and international intelligence,
investigation and enforcement agencies in pursuing the global efforts against money laundering and related crimes.
It may be noted that FIU-IND is not a regulatory authority. Its prime responsibility is to gather and share financial
intelligence in close cooperation with the regulatory authorities including RBI, SEBI and IRDA.
The FIU-IND reports to the Economic Intelligence Council (EIC) headed by the finance minister.
Functions of FIU-IND
* Collection of Information- Act as the central reception point for receiving Cash Transaction reports (CTRs), Cross
Border Wire Transfer Reports (CBWTRs), Reports on Purchase or sale of Immovable Property (IPRs) and Suspicious
Transaction Reports (STRs) from various REs.
* Analysis of Information- Analyse received information in order to uncover patterns of transactions suggesting
suspicion of money laundering and related crimes.
* Sharing of Information- Share information with national intelligence/ law enforcement agencies, national regulatory
authorities and foreign financial Intelligence Units.
* Act as Central Repository- Establish and maintain national data base on cash transactions and suspicious
transactions on the basis of reports received from reporting entities.
Sunil SKA
7
* Coordination- coordinate and strengthen collection and sharing financial intelligence through an effective national,
regional and global network to combat money laundering and related crimes.
* Research and Analysis - Monitor and identity strategic key areas on money laundering trends, typologies and
developments.
Every financial entity should have a strong AML-CFT framework to prevent the entity from being used, intentionally or
unintentionally, for money laundering and terror financing purposes.
The objective of an effective AML-CFT Framework must be to protect the institution itself as well as the financial
systems of the country and the world-wide broader economy from the threats of money laundering and financing of
terrorism, thereby strengthening financial sector integrity and contributing to safety and security of the financial system.
It must be realised that the challenges of ML/ TF and related crimes are posed by a somewhat organised sector which
is just as well informed or sometimes even better informed than the industry players.
Our bank’s KYC/ AML/ CFT policy is operationalized through a well-established AML/ CFT organizational structure
created in accordance with the size, types of businesses, the volume & nature of transactions handled by the bank.
Designated Director of the Bank The MD (R,C & SARG) has been appointed by the Board as the Designated
Director of the bank to ensure overall compliance with the obligations imposed under Chapter IV of the PMLA and to
keep the Board informed of the AML/ CFT issues.
Principal Officer of the Bank The General Manager (AML/ CFT) is the Principal Officer of the bank for AML/ CFT
matters for the purpose of Section 12 of PMLA, 2002. The Principal Officer may delegate the function of filing STRs/
Sunil SKA
8
CTRs/ CCRs/ NTRs/ CBWTRs to FIU-IND to one or more Alternate Principal Officers who shall not be below the grade
of Deputy General Manager.
Money Laundering Reporting Officers (MLROs) While the Principal Officer has the overall responsibility for
maintaining oversight and coordinating with various functionaries in the implementation of KYC/ AML/ CFT policy, the
primary responsibility of ensuring implementation of KYC/ AML/ CFT Policy and related guidelines are vested with the
respective Business Groups/ Circles/ SBUs.
For this purpose, each Business Group/ Circle/ SBU will designate an official as Money Laundering Reporting Officer
(MLRO) who would ensure proper implementation and reporting, as per provisions of this Policy, to the Principal
Officer.
The primary role of MLRO is to be aware of any suspicious activity in the operating unit that might be linked to money
laundering or terrorist financing, and to report it to the Principal Officer of the Bank. These officials will also meet the
reporting requirement to the Principal Officer of the Bank, wherever such occasion/ demand arises.
MLRO Structure in the Circles/ Business Verticals The MLROs/ Dy. MLROs/ Assistant MLROs in the bank act as
an extended arm of the Principal Officer for effectively implementing the obligations of the bank under PMLA, 2002 in
letter & spirit.
Money Laundering Reporting Officers (MLRO) are nominated at Circles/ verticals are as under:
DGM & CFO/ CCFO has been assigned the role of MLRO in Circles for branches in R&DB.
Official not below the rank of DGM nominated as MLRO by the respective Head of the Department for SAMG/
CCG/ Other departments at CC.
To facilitate proper monitoring of transactions by MLROs, reporting structure has been put in place for Circles as
under:
The DGM & CFO of the Circle has been assigned the role of MLRO for the Circle and the Dy. General Manager
(Business & Operations) for AOs & direct branches has been assigned the role of Dy. MLRO. AGM (RBOs)/ Branch
Head / Head of CPCs shall assume the responsibility of Assistant MLROs.
The AGM (S&I) is the crucial link in the reporting channel of Bank related to ML/ TF on account of working closely with
the CFO who is the designated MLRO for the Circle. The AGM (S&I) will be lending support to the respective MLRO
for proper discharge of duties related to AML/ CFT and will be responsible for compliance of KYC/ AML/ CFT
measures at Circle level.
CM (Compliance & Risk). The Bank has posted CM (Compliance & Risk) in every region of respective LHOs. Apart
from accomplishing the defined role as CM (Compliance & Risk) the official will support the AGM (S&I) and the MLRO
in fulfilling their respective roles and provide the required data/ inputs/ supports to them. Being associated more closely
with the branches, the CM (Compliance & Risk) can play a significant role in operationalising the AML/ CFT policies
and guidelines at the grass root level.
Analysis of monthly reports i.e., CTR, CCR, NTR & CBWTR & Suggested action for the Circle, Module, Region
& Branch.
1. The Branch on monthly basis will ensure scrutiny of CTR/ NTR/ CBWTR provided at AML/ CFT website for taking
suitable action wherever required. The Branch Manager will report any anomaly observed to Chief Manager
(Compliance & Risk) and AGM (S&I) (designated Dy. MLROs for non NBG/ RBG Branch) for subsequent reporting to
AML/ CFT Cell Jaipur at [email protected].
2. The Chief Manager Compliance & Risk at RBO Level will ensure that each Branch under his/ her region is carrying
out the monthly scrutiny of above referred reports and will compile the report received from Branch to send it to
designated Dy. MLRO (DGM of Module).
Sunil SKA
9
3. The Dy. MLRO, i.e., Dy. General Manager Module will ensure that each Branch of his/ her module including directly
controlled Branches carry out monthly scrutiny of these reports and will submit a monthly consolidated report to MLRO
of the Circle (CFO).
4. The MLRO will take effective action to plug in any gap thus reported by the Branch and shall arrange to send any
anomaly thus reported to AML/ CFT Cell Jaipur, via mail at [email protected]
Concurrent/ Internal Auditors specifically check and verify the application of KYC/ AML procedures at the branches
and comment on the lapses observed in this regard.
Sunil SKA
10
4. Monitoring of Cash Transactions of more than Rs. 10 lac (including those which are integrally connected) and
generating reports thereon along with BGL accounts also.
5. Monitoring of Cross Border Wire Transfers of the value of more than Rupees 5 lac or its equivalent in foreign
currency and generating reports thereon.
6. Monitoring of Cash Transactions involving receipts by Non-Profit Organizations of value more than rupees ten lac or
its equivalent in foreign currency and generating reports thereon.
7. Name scanning against various watch lists of e. g. RBI OFAC and UN SCR Consolidate List and generating alerts/
report in case of positive match at the time of on-boarding of the customer.
8. Enquiries from FIU India /RBI/ other investigating agencies received under PML Act are replied / disposed of by
obtaining necessary information from Branches/Circle/Verticals.
9. Half yearly review of customers Risk Categorisation as on 31st March and 30th September.
Some of the principal functions of the operational units which make it a first line of defence from the AML/ CFT
perspective are as under:
1. To conduct due diligence at the time of Customer on-boarding as prescribed in the bank’s policy including:
a. Following the Customer Due Diligence procedure impeccably.
b. Ensuring that the identity of the customer does not match with any person or entity, whose name appears in the
sanctions’ lists circulated by the regulators.
c. Understanding the customer’s source of funds, the line of activity, projected transactions in the account and creating
an accurate customer profile.
d. Identifying beneficial ownership in the applicable cases and conducting due diligence on the beneficial owners as
required.
2. Assign an appropriate risk category to the customer based on the approved parameters.
3. Verify the reasonability of transactions against the customer profile / business activity of company.
4. Ascertain reasons for sudden high value credits (by cash/ by transfer) followed by immediate transfer, without
arousing customer suspicion.
5. Examining Balance Sheets for major variances with the turnovers in accounts.
6. Identify the symptoms of a Shell Company in an account and conduct due diligence to confirm whether the account
belongs to a shell company.
7. Identify suspicious customer behaviour, track adverse media reports report and file Subjective STR with AML/ CFT
department as prescribed.
Sunil SKA
11
through an assessment of effectiveness of governance, risk management, and internal controls, including the way the
first and second lines of defence achieve risk management and control objectives.
Reporting to FIU-IND
Financial Intelligence Unit – India was set by the Government of India in November 2004 as the central national
agency responsible for receiving, processing, analysing and disseminating information relating to suspect financial
transactions. FIU-IND is an independent body reporting directly to the Economic Intelligence Council (EIC) headed by
the Finance Minister.
Bank as a Reporting Entity (RE), is required to submit the following reports to the FIU-IND-
S. Name of the report Nature of transaction Periodicity Due Periodicity Due date
No date Due date
1 Cash Transactions 1.All cash transactions of the value Monthly 15th day of the succeeding
Reports (CTRs) more than ten lakhs or its equivalent month
foreign currency.
2. All series of cash transactions
integrally connected to each other
where such series of transactions have
taken place within a month. For
determining “integrally connected
transactions” all accounts of the same
customer should be considered.
2 Counterfeit Currency All cash transaction where forged or Monthly 15th day of the succeeding
Reports (CCRs) counterfeit currency notes have taken month
place facilitating the transactions
3 Non-Profit All transactions involving receipts by Monthly 15th day of the succeeding
Organizations NPOs of value more than ten lakhs or month
Transactions Reports its equivalent in foreign currency.
(NTRs)
4 Cross Border Wire All cross-border wire transfers of the Monthly 15th day of the succeeding
Transfer Report value of more than five lakh rupees or month
(CBWTRs) its equivalent in foreign currency
5 Suspicious Any suspicious transactions whether or As and when Within 7 working days on
Transactions Reports not made in cash. detected being satisfied that the
(STRs) transaction is suspicious.
Sunil SKA
12
REs shall not put any restriction on operations in the accounts where an STR has been filed. REs shall keep the fact of
furnishing of STR strictly confidential. It shall be ensured that there is no tipping off to the customer at any level.
Robust software, throwing alerts when the transactions are inconsistent with risk categorization and updated profile of
the customers shall be put in to use as a part of effective identification and reporting of suspicious transactions.
All reports to FIU-IND should, therefore, be filed as per the prescribed periodicity. As per provisions of PML Act, any
deficiency in filing the mandatory reports by reporting entities will attract minimum penalty of Rs. 10,000/- which may
go to Rs.1,00,000/- per instance per day.
The bank’s obligations under PMLA, 2002 and the PML Rules there under requires the bank to put in place an
effective mechanism to enable it to monitor all the transactions occurring across its various channels.
1. Pre-Transaction Stage: The usual enquiries with the customers/ noncustomers, or the application of standard
Check Lists/ DOs and DON’Ts by the front-line staff before the transaction takes place, is called the PreTransaction
Stage of Transaction Monitoring.
2. Post-Transaction Stage: The scrutiny of a transaction which may include verification of the amount, the transaction
channel, the customer profile, previous transactions and patterns if any, and the economic rationale behind the
transaction, constitutes Post-Transaction monitoring. The transaction monitoring at AML/ CFT Cell Jaipur, is done at
PostTransaction Stage on T+1 basis, through an IT Platform (AMLOCK).
The Scope of Transaction Monitoring: The monitoring of all the transactions taking place across all the domestic
branches in the country in Indian Rupees, i.e. Transactions taking place at the branches in 17 Circles and the
branches in Commercial Clients Group (CCG-I & II), Corporate Accounts Group(CAG) and Stressed Asset Resolution
Group (SARG).
Alert Generation
Alert generation is a process by which the preliminary details of suspicious/ unusual transactions are generated to
enable the Principal Officer to analyse and review the details and arrive at a conclusion whether a transaction is
suspicious.
For this purpose, bank follows the FATF recommended risk-based approach for transaction monitoring such that the
measures to prevent or mitigate money laundering and terrorist financing are commensurate to the risks identified.
Suspicious transaction
Suspicious transaction means a transaction whether or not made in cash which, to a person acting in good faith
1. gives rise to a reasonable ground of suspicion that it may involve the proceeds of crime or
2. appears to be made in circumstances of unusual or unjustified complexity; or
3. appears to have no economic rationale or bonafide purpose; or
Sunil SKA
13
4. gives rise to a reasonable ground of suspicion that it may involve financing of the activities relating to terrorism.
Explanation: Transaction involving financing of the activities relating to terrorism includes transaction involving funds
suspected to be linked or related to, or to be used for terrorism, terrorist acts or by a terrorist, terrorist organization or
those who finance or are attempting to finance terrorism.
Types of STRs STRs can be classified into two broad categories based on the source of alert which resulted in
escalating such STRs namely System Generated STRs and Subjective STRs.
Transactions undertaken at all the domestic branches / offices and alternate Channels through CBS are transferred to
a standalone AMLOCK Software for screening of suspicious transaction.
On the basis of Red flags, based on various business logics, alerts in respects of suspicious transaction are generated
for analysis / scrutiny / pattern building at AML/ CFT Department.
The suspicious transactions found eligible for reporting after scrutiny are submitted to FIU-IND through STR.
In addition to it, reporting of CCR, CTR, NTR & CBWTR, is a part of mandatory account-based reporting by AML-CFT
Department.
The identification of suspicious transactions using alert generation software is more likely to be related to
following sources:
Watch List (WL): The customer details matched with watch lists (e.g., UN list, Interpol list etc.)
Typology (TY): Common typologies of money laundering, financing of terrorism or other crimes (e.g., structuring of
cash deposits etc.)
Transaction Monitoring (TM): Transaction monitoring alert (e.g., unusually large transaction, increase in transaction
volumes etc.)
Risk Management System (RM): Risk Management system-based alert (e.g., high-risk customer, country, location,
source of funds, transaction type etc.)
The first two characters in the alert indicator code denote the source of alert as mentioned above.
Bank is empowered to select appropriate number and value thresholds before implementing the alert indicators using
alert generation software. Bank is also encouraged to apply additional alert indicators to address specific risks faced
by it.
The Suspicious Transaction Report (STR) should be furnished within 7 days of arriving at a conclusion that any
transaction, is of suspicious nature.
Sunil SKA
14
Report of the IBA Working Group on Parameters for Risk based Transaction Monitoring circulated by the Indian Banks’
Association has brought out certain types of transactions which can be identified at the branch/ operations
departments themselves.
The identification of suspicious transaction at Branches/ Departments is more likely to be related with the following
sources:
Customer Verification (CV): Detected during customer acceptance, identification or verification (excluding reasons
mentioned on other codes e.g.use of forged ID, wrong address etc.).
Law Enforcement Agency Query (LQ): Query or letter received from Law Enforcement Agency (LEA) or Intelligence
Agency (blocking order received, transaction details sought etc.).
Media Reports (MR): Adverse Media Reports about customer (e.g. newspaper reports).
Employee Initiated (EI): Employee raised alert (e.g., behavioural indicators such as customer had no information
about transaction, attempted transaction etc.).
Public Complaint (PC): Complaint received from public (e.g., abuse of account for committing fraud etc.).
Business Associates (BA): Information received from other institutions, subsidiaries or business associates (e.g.,
cross-border referral, alert raised by agent etc.).
Further, in case of transactions carried out by a non-account-based customer, that is a walk-in-customer, where the
amount of transaction is equal to or exceeds rupees fifty thousand, whether conducted as a single transaction or
several transactions that appear to be connected, the customer’s identity and address should be verified.
If there is sufficient reason to believe that a customer is intentionally structuring a transaction into a series of
transactions below the threshold of Rs. 50,000/-, the branch should verify identity and address of the customer and
consider filing a suspicious transaction report in this regard.
The transaction monitoring for identification of Suspicious Transactions, is done by analysing the alerts generated on
the basis of Red Flag Indicators (RFIs)prescribed by FIU-IND/RBI/IBA etc.
Now FIU-IND has revisited all these RFIs and issued a single list of 80 RFIs in the nature of ‘Offline Scenarios’ which
are proposed to be implemented by way of Customer Due Diligence, Transaction Due Diligence, Document Check
Lists etc. at operating level.
The RFIs to be implemented by Branches/ Departments are more likely to be related with the following sources:
Customer Verification (CV): Detected during customer acceptance, identification or verification (excluding reasons
mentioned on other codes e.g. use of forged ID, wrong address etc.).
Law Enforcement Agency Query (LQ): Query or letter received from Law Enforcement Agency (LEA) or Intelligence
Agency (blocking order received, transaction details sought etc.).
Media Reports (MR): Adverse Media Reports about customer (e.g. newspaper reports).
Sunil SKA
15
Employee Initiated (EI): Employee raised alert (e.g., behavioural indicators such as customer had no information
about transaction, attempted transaction etc.).
Public Complaint (PC): Complaint received from public (e.g., abuse of account for committing fraud etc.).
Business Associates (BA): Information received from other institutions, subsidiaries or business associates (e.g.,
cross-border referral, alert raised by agent etc.).
For timely reporting of suspicious transactions, a portal has been created which can be accessed through CBS. The
path is bancslink/Apps/SI/Check in (Below Service Integration)/Suspicious Transaction Report. The Branch
head with capability level of 9 is required to report all suspicious transactions through the above-mentioned link for
branch customer and non SBI customer. The operating unit can report such suspicious transaction pertain to non-
home branch customer through simplified one pager format attached as annexure to [email protected].
1.2. Check your Branch e-mail on a regular basis for detecting any e-mail communication from AGM (SI) of your Circle
about information sought by AML-CFT Department.
2.2 Revert the mail with reply / desired information / attachments by referring to the trailing mail to reconcile the
responses promptly (scanned copy of only verified photocopy of documents / papers should be attached).
2.3 Always write “Private & confidential” on top of each communication with AML-CFT Department.
2.4 Update the CBS fields simultaneously to update customer profile, wherever necessary.
2.5 Always furnish specific “Occupation” of customer instead of using generic word viz. Others /Traders etc.
Sunil SKA
16
2.7 Wherever necessary, customer may be contacted in pretext of business mobilization, KYC updating etc. to collect
information sought through e-mail without “Tipping off”.
2.8 Scanned copy of communication from LEAs in respect of account under information must be attached with reply
mail.
2.9 Always use Registered post or Bank’s approved courier services for sending physical copies of, whenever required
specifically, A/C opening forms/ OVDs to AML-CFT Department.
(B) DO’S FOR COMMUNICATION RECEIVED FROM LEAS / CYBER-POLICE /LOCAL POLICE ETC REQUIRING
INFORMATION ON CUSTOMER /TRANSACTIONS IN ANY ACCOUNT OR DIRECTING TO FREEZE THE
ACCOUNTPARTIALLY OR FULLY
(B).1. MAINTAINING RECORDS
1.1 Ensure to maintain record of such communications (received through e-mail or in physical letter) from Police / Law
Enforcing Agencies (LEAs) etc as theses communications are of legal importance and may be required to be produced
before Court of Law, if such STOP/ HOLD is protested by any customer.
1.2 The communication received from Police / Law Enforcing Agencies (LEAs) etc. for removal of STOP/HOLD should
also be filed along with the original communication received.
2.2 Peruse carefully the logo used on the face of / seal affixed on the letter to detect any suspicious clues regarding
genuineness & authority of communicator.
2.3 Multiple errors in syntax / grammar / spellings used in letter / communication might be sensed to be preliminary
alarm and verification of genuineness of communication needs to be intensified.
2.4 In case of communication received through e-mail, it has to be checked that it has been initiated using
“Government domain” viz. .... gov.in, ….nic.in etc.
2.5 A communication (through e-mail / letter) should be sent to sending authorities / their Controlling offices attaching
scanned copy of communications so received to have positive confirmation regarding genuineness of the
communications and its authority.
2.6 Such action may be initiated prior to or subsequent to your compliance action depending upon the intensity of
matter for safeguarding the Bank’s interest incase communication is originated from miscreants.
2.7 Beware of fake e-mails / letter received from unauthorized senders / private agencies who use their name, logo &
letter head resembling with that of Government agencies to mislead the addressees.
3.2 While filing online one pager STR format on the basis of LEA query about the account, the details of LEA reference
e.g. letter no, date & issuing authority /office must be mentioned in the space made available in online STR page.
Sunil SKA
17
3.3 Simultaneously, a mail attached with brief detail about online one pager STR format filed along with copy of LEAs
communications / FIR etc to be sent [email protected] (communication received from LEAs do not include orders
from Court related with money suits etc or attachment orders issued by Income Tax / EPFO etc authorities not
involving predicate offences).
3.4 Always select only correct option from drop down in CBS, while freezing the account under direction from LEAs.
3.5 Reporting must contain exact information about occupation / annual income/ turnover etc of customer.
(C) DO’s IN CASE OF COMMUNICATION RECEIVED FROM CUSTOMERS OROTHER RELIABLE SOURCES FOR
FREEZING ANY ACCOUNTS ALLEGED TO HAVE BEEN MISUSED IN MONEY LAUNDERING / COLLECTING
PROCEEDS OFCRIME
1.2 Interrogate tactfully with complainant to ensure that complaint is not being done with malicious intention.
1.3 Insist complainant to lodge the FIR with Local Police / Cyber Crime Police /Complaint made to Police and furnish
copy.
1.4 Maintain record of such communications as these are of legal importance and may be required to be produced
before Court of Law, if such STOP / HOLD is protested by any customer.
(C).2. SELECTING CORRECT OPTION FOR STOP/HOLD IN A/C OFMISCREANTS FOR ALLEGED MISUSE IN
CYBER CRIME ETC
2.1 Ensure to select correct option representing reason for STOP/HOLD from dropdown in CBS so that only accounts
put under STOP / HOLD due to suspicious /ML / TF/ Cyber Crime reasons are escalated to Corporate Centre through
automatic e-mail generated by GITC Belapur.
3.1 Ensure “Online reporting” of suspicious incidents / transactions under complaint through functionality available in
CBS and can be accessed through navigation path >>Bancslink>> Apps >>SI (SHCIL) >> SERVICE
INTEGRATION>> CHECK IN >> SUSPICIOUS TRANSACTION REPORTING >> SBI CUSTOMERREPORTING or
NONSBI CUSTOMER REPORTING as the case may be. (e-Cir No. AML-CFT/AML-CFT Measures/4/2019-20 dated
04.10.2019).
3.2 Subsequent to this, scanned copy of communication from customer along-with FIR, if any, enclosing one pager
STR format (filed online) / detailing brief particulars of suspicious transactions reported online must be sent
[email protected] immediately.
3.3 Reporting must contain exact information about occupation / annual income /turnover etc of customer.
(D) DO’s IN CASE OF TEMPORARY STOP / HOLD IN A/C OF CUSTOMERS ONTHEIR REQUEST TO PREVENT
MISUSE OF THEIR A/C BY CYBER CRIMINALSETC.
Sunil SKA
18
1.1 Wherever, you decide to act in such cases, please ensure to obtain request from customer with reasons of such
request in writing (duly signed), copy of FIR lodged or complaint made to Police etc, wherever applicable.
1.2 Maintain record of such communications as these are of legal importance and may be required to be produced
before Court of Law in case of need.
1.3 Ensure to select correct option from drop down in CBS in A/C of complainant carefully as complainant is likely to
be victim of Cyber Crime / online cheating etc but not a culpritand you have decided to freeze his A/C on his request
temporarily for reasons other than for involvement in Cyber Crime / Cheating etc.
1. No Tipping off
1.1 While collecting desired information “No tipping off to the related customers or his representatives” regarding such
communications from AML-CFT or AGM SI, has to be ensured.
2.1 Don’t delay in replying to communications from AML-CFT Department /AGM (SI) regarding AML-CFT issues.
3.1 Scanned copy of only verified photocopy of documents / papers shouldbe attached while replying to
communication from AML-CFT Department.
(B) DON’TS FOR COMMUNICATION RECEIVED FROM LEAS / CYBER-POLICE /LOCAL POLICE ETC
REQUIRING INFORMATION ON CUSTOMER /TRANSACTIONS IN ANY ACCOUNT OR DIRECTING TO FREEZE
THE ACCOUNTPARTIALLY OR FULLY
1.1 “Never forget to attach scanned copy of such communication with brief particulars of suspicious case reported
online while sending e-mail at [email protected]”
1.2 Do not furnish generic information regarding customer’s occupation viz. others / traders etc.
(C) DON’Ts IN CASE OF COMMUNICATION RECEIVED FROM CUSTOMERSOR OTHER RELIABLE SOURCES
FOR FREEZING ANY ACCOUNTS ALLEGED TOHAVE BEEN MISUSED IN MONEY LAUNDERING /
COLLECTING PROCEEDSOF CRIME
1. WORKING PRUDENTLY
(D) DON’Ts IN CASE OF TEMPORARY STOP / HOLD IN A/C OF CUSTOMERSON THEIR REQUEST TO
PREVENT MISUSE OF THEIR A/C BY CYBERCRIMINALS ETC.
Sunil SKA
19
1.1 While accepting request from customers for temporary STOP/HOLD inA/C of his own, ensure that Bank’s extant
instructions in this regard are not violated.
OTMS Alerts
Branches are advised to report Suspicious Transaction Report on eligible OTMS alerts. Auto functionality for the same
has been developed in OTMS application for the purpose. Functionality also includes that once the branch submits the
STR in OTMS, the auto generated STR along with an auto generated email is sent to AML/ CFT at email id
[email protected].
No Tipping Off
The act of letting the money launderers know that they are under suspicion is generally referred to as tipping off. Once
an internal or external suspicion report has been made, it is a criminal offence for anyone to release information which
is likely to prejudice an investigation.
Reporting Entitles should not put any restriction on operations in the accounts where an STR has been filed. It is very
important that the customers are neither told nor given any room for doubts in their mind that while seeking additional
information, bank is looking at their transactions/ activity with suspicion. Such disclosure/ indication is against the
provisions of relevant Act/guidelines. In effect, “Tipping off” must be avoided.
Fictitious Offer of Funds (FOF) – Reporting and Review from AML/KYC Perspective
“Fictitious Offer of Funds” (FOF) cases are defined as those illegal activities whereby one individual / group / entity
deceives or misleads another individual or entity by making false promises to give some benefits against payment of
money in specified accounts of the fraudsters. The money subsequently gets withdrawn from these accounts by the
fraudster.
Instances of cheating through fictitious offer of funds has been increasing in recent past and RBI from time to time has
issued advisory, for the Banks as well as for the public not to fall prey to such offers. RBI has been expressing serious
Sunil SKA
20
concern over the issue and has instructed the Bank for putting in place suitable measures to control such illegal
activities. As SBI holds the biggest share of the accounts, it’s quite natural that in some cases, flow of such funds is
routed through SBI and miscreants engaged in such activities have collected such proceeds through the accounts
maintained with us. Bank’s instructions in this regard have been circulated along with detailed SOP vide Cir No. AML-
CFT/AML-CFTMEASURES/4/2020 – 21 dated 21st of July, 2020.
Money laundering may be conducted through virtually every type of entity, vehicle or institution, including offshore
entities, trusts, Hawala operators, securities dealers, car dealers, correspondent accounts, or wherever the criminal
proceeds find the point of least resistance.
However, financial institutions are particularly important vehicles for criminals for the disposal and movement of
criminal proceeds. Some common money laundering methods are –
Money laundering through TBML;
Money laundering through Shell Companies;
Money laundering through Money Mules;
Money laundering through early repayment of long-term Loans;
Money laundering through accounts of NGOs/NPOs;
Trade Based Money Laundering: TBML is one of the main methods by which criminal organizations and terrorist
financiers move money for disguising its origins and integrating it back in to the formal economy.
According to Financial Action Task Force (FATF) “TBML is the process of disguising the proceeds of crime and moving
value using trade transactions to legitimize their illicit origins.” Moreover, TBML is one of the main methods by which
criminal organizations and terrorist financiers move money for disguising its origins and integrating it back in to the
formal economy.
* Under-invoicing (Over-shipping) – Misrepresentation of the price of the good or service by lowering it below the
'fair market' price through which exporter is able to transfer additional value to the importer and also gains significant
tax benefit.
* Multiple invoicing / financing – Sending multiple payments to multiple bank accounts using the same
documentation.
Sunil SKA
21
* Phantom or Ghost Shipment – Creating document for nonexistent shipment i.e. where goods were never exported
or imported.
* Variable Pricing/Transfer Pricing – By adjusting pricing in documentation than change physical volume/weight.
* Mis-declaration of goods – Misrepresenting the quality or type of thegood, vague or technical description of goods.
* Carousel Fraud – A circular transaction or round tripping by Importing goods from non-VAT country, selling it in
importing country by adding VAT and not paying VAT to the government.
* Capital Flight – Entities with liquid assets or “proceeds of corruption and crime” move asset value to offshore
locations.
* Fake Trade Finance Instruments – LC utilization to move illicit or restricted goods and commodities, shipment to
high risk countries/of high-risk goods, circulation of fake LC.
* Transfer Pricing through Trade – Resorted to with aim to reduce tax liabilities by businesses through structured
trade transactions. Businesses transfer surplus revenue to overseas subsidiary, many a times in tax heaven countries
by constant movement of components and inputs between related party businesses.
* Fraudulent alteration of the Bill of Lading – to get payment for non-existent cargo.
Under Customer Identification Program (CIP) branches should comply with recordkeeping, identification, reporting
suspicious transaction and risk analysis requirements.
AML-CFT has now reviewed all the guidelines issued in the recent times by FIU-IND/ RBI/ IBA and compiled a list of
RFIs implemented/ proposed to be implemented by way of Customer Due Diligence (CDD), Transactional Due
Diligence (TDD) and Document Check List at the operating level.
The operating units are instructed to meticulously follow the instructions for conducting manual due diligence on the
customers to prevent / detect and report Trade Based Money Laundering and also to report suspicious transactions, if
any observed under these RFIs, to AML-CFT department in the form of subjective STR.
Sunil SKA
22
Shell companies normally have no physical presence, have hidden owners, and sometimes project the image of being
a real, normal business entity dealing in funds that are legitimate. Mostly these companies exist only on paper. Shell
companies usually conduct no business themselves.
Shell companies are used as popular vehicles to access the international financial system. It is also common for
criminals to operate through layers of various shell companies, which makes it more difficult to trace the funds or
assets back to the real owner/ beneficial owner. Shell companies, for these reasons, have become anon-separable
part of various financial crimes. It can be said that a sophisticated money laundering, fraud or corruption operation
invariably involves at least one shell company at some point of the process. Unfortunately, there are certain nations
and jurisdictions, known as “secrecy havens”, that do not follow ‘Financial Action Task Force’ guidelines on money
laundering/ terror financing and are hence popular among unscrupulous persons and are extensively used to form
shell companies as well as Shelf-companies.
Normally shell companies are floated worldwide by persons broadly for undernoted activities / objectives:
1. Rotation, misappropriation and siphoning off funds.
2. Creation of equity in their name.
3. Holding real estate properties / trading in Capital Market / market manipulation
4. Converting unaccounted money through placement, layering and round tripping
5. Tax evasion
Generally, there would be multiple companies located at a single address, sharing a common registered address.
Such a company is incorporated for serving as a conduit for fictitious business transactions, leaving no trace about the
actual beneficiary. Further, shell companies have certain common features and attributes:
The operating staff must take due care to identify the shell companies in the bank’s books based on the above
attributes.
“Money Mules” can be used to launder the proceeds of fraud schemes (e.g., phishing and identity theft) by criminals
who gain illegal access to deposit accounts by recruiting third parties to act as “money mules.”
In some cases, these third parties may be innocent while in others they may behaving complicity with the criminals.
In a money mule transaction, an individual with a bank account is recruited to receive cheque deposits or wire
transfers and then transfer these funds to accounts held on behalf of another person or to other individuals, minus a
Sunil SKA
23
certain commission payment. Money mules may be recruited by a variety of methods, including spam e-mails,
advertisements on genuine recruitment web sites, social networking sites, instant messaging and advertisements in
newspapers.
When caught, these money mules often have their bank accounts suspended, causing inconvenience and potential
financial loss, apart from facing likely legal action for being part of a fraud. Many a times the address and contact
details of such mules are found to be fake or not up to date, making it difficult for enforcement agencies to locate the
account holder.
The operations of such mule accounts can be minimised by following the guidelines on opening of accounts and
monitoring of transactions. It is, therefore, advised to strictly adhere to the guidelines on KYC/ AML/ CFT issued from
time to time and to those relating to periodical updating of customer identification data after the account is opened and
also to monitoring of transactions in order to protect the bank and the bank’s customers from misuse by such
fraudsters.
Accounts of NGOs/ NPOs are considered more vulnerable and prone to money laundering and terror financing in
comparison to accounts of other entities/individuals. It is due to the receipt of funds in the form of subscription,
donation or gifts by these entities from various open sources/ persons. The possibility of intermingling of genuine funds
with proceeds of crime are not very remote in such NPOs/NGOs. Accounts of NPOs and NGOs (other than promoted
by UN or it’s agencies) are classified in high-risk category by Regulated Entities. In case of remittances favouring
NGOs/ NPOs the extant FCRA provisions, bank's instructions and SOPs must be adhered to, before affording credits.
All transactions involving receipts by NPOs of value more than ten lakhs or its equivalent in foreign currency are
mandatorily reported by REs to FIU-IND as NTR(Non-profit Organizations’ transaction report).
A soft copy of the NTRs is placed on the AML/ CFT website in SBITIMES. Circles/controlling offices/ Branches may
download their respective NTR reports for further analysis & taking necessary action, if any required.
NPO customers operating/ transacting majorly in high-risk areas/locations may require further Transaction Due
Diligence (TDD) to check whether transactions in the account are in tune with the declared activity/ business of the
customer.
If any suspicious transactions patterns from AML/ CFT angle are observed, the branch should advise the controllers
and the AML/ CFT cell Jaipur through one-page subjective STR.
Sunil SKA
24
Wire transfer is an instantaneous and most preferred route for transfer of funds across the globe and hence, there is a
need for preventing terrorists and other criminals from having unfettered access to wire transfers for moving their funds
and for detecting any misuse when it occurs.
This can be achieved if basic information on the originator of wire transfers is immediately available to appropriate law
enforcement and/or prosecutorial authorities in order to assist them in detecting, investigating, prosecuting terrorists or
other criminals and tracing their assets. The information can be used by Financial Intelligence Unit- India (FIU-IND) for
analysing suspicious or unusual activity and disseminating it as necessary.
The originator information can also be put to use by the beneficiary bank to facilitate identification and reporting of
suspicious transactions to FIU-IND. Owing to the potential terrorist financing threat posed by small wire transfers, the
objective is to be in a position to trace all wire transfers with minimum threshold limits.
Accordingly, branches must ensure that all wire transfers are accompanied by the following information:
Exemptions: Inter-bank transfers and settlements, where both the originator and beneficiary are banks or financial
institutions, would be exempted from the above requirements.
To conclude the module, it can be said that a well-designed KYC Policy may complement the AML/CFT systems
deployed in a bank in three fundamental ways:
Hence a robust Know Your Customer Policy and framework, is the backbone of an effective and responsive AML/CFT
system.
Sunil SKA
25
Module 1 - Assessment
Which of the following is NOT a category of source of system generated STR (Suspicious Transaction Report) ? C
a. Risk Management System (RM) related: Risk management system-based alert - high risk customer, country,
location, source of funds etc.
b. Watch List (WL) related: Matching the customer details by system, with the specifi ed negative lists such as UN
list, OFAC etc.
c. Business Associates (BA)- Information received from other institutions, subsidiaries or business associates
d. Transaction Monitoring (TM) related: Transaction monitoring system- generated alerts such as unusually large
number of cash deposits, many to one transaction etc.
A Branch received queries from state police regarding Mr X, who is a customer of the branch. It was evident from A
the query that the customer was under investigation in regards to various criminal offences. Should the branch file
a Suspicious Transaction Report (STR)/ Suspicious Activity Report (SAR) in this case ?
a. Branch need not report such matters of routine, further merely receiving queries from a legal enforcement
agency does not mean that the customer is a declared culprit.
b. Yes branch should report it as a Suspicious Transaction Report (STR)/ Suspicious Activity Report (SAR) but the
reporting to FIU-IND will be through the Principal officer i.e. GM (AML-CFT) only.
c. Yes branch should report it as a Suspicious Transaction Report (STR)/ Suspicious Activity Report (SAR) directly
to FIU-IND.
d. Yes branch should report it as a Suspicious Transaction Report (STR)/ Suspicious Activity Report (SAR) to its
controller, who will file it with FIUIND on consolidated basis for the entire region.
Mr S is a student studying in AMU and having an account with your branch. One fine day you received a letter B
from nearby branch of another nationalised bank, regarding unusual pattern of transactions noticed in the account
of Mr S, held with them. Some of the transactions had originated through your branch. When you verified the
transactions in the account with your branch, you also found transactions, which were inconsistent with the profile
of the account holder. You immediately decided to report these transactions as Suspicious Transactions through a
Suspicious Transaction Report. What is the category of source of such an STR?
a. Watch List (WL) related-Frequent locker operations
b. Customer Verification (CV)-Detected during customer acceptance, identification or verification
c. Employee Initiated (EI)-Employee raised alert- Frequent locker operations
d. Business Associates (BA)- Information received from other institutions, subsidiaries or business associates
A Branch received queries from state police regarding Mr X, who is a customer of the branch. It was evident from B
the query that the customer was under investigation related to money laundering offence. The branch decided to
report this incident through a Suspicious Transaction Report (STR)/ Suspicious Activity Report (SAR). What is the
category of source of such an offline Red Flag Indicator (RFI)/ alert ?
a. Employee Initiated (EI)-Employee raised alert
b. Law Enforcement Agency Query (LQ)- Query or letter received from Law Enforcement Agency (LEA)
c. Business Associates (BA)- Information received from other institutions, subsidiaries or business associates
d. Customer Verification (CV)-Detected during customer acceptance, identification or verification
On one fine day a customer approached the frontline staff of a bank branch and asked if he could deposit Rs 25 B
lac in cash in his account on five different dates within a month and whether the branch will report these
transactions in Cash Transaction Report. When replied in affirmation he tried to convince the staff to avoid
reporting as each transaction is below the threshold level. He deposited Rs 5 lac in cash and asked the way outs,
to avoid reporting further cash transactions in his account. One of the associates reported this suspicious
behaviour of the customer to the branch head. The branch head decided to report it as a Suspicious Transaction
/Suspicious Activity through a Suspicious Transaction Report/Suspicious Activity Report. What is the category of
source of such an offline Red Flag Indicator (RFI)/ alert?
a. Media Reports (MR)-Adverse Media Reports about customer, being investigated for criminal offences
b. Employee Initiated (EI)-Employee raised alert- Customer wants to avoid reporting
c. Customer Verification (CV)-Detected during customer acceptance, identification or verification
d. Business Associates (BA)- Information received from other institutions, subsidiaries or business associates
As per Prevention of Money Laundering (Maintenance of Records) Rules-2005 what does a “Suspicious D
Transaction” mean ?
a. A transaction which gives rise to a reasonable ground of suspicion that it may involve the proceeds of crime
b. A transaction which appears to be made in circumstances of unusual or unjustified complexity
Sunil SKA
26
c. A transaction which gives rise to a reasonable ground of suspicion that it may involve financing of the activities
relating to terrorism.
d. All of the Above
At what stages Transaction monitoring is conducted? A
a. The transaction monitoring may be conducted at Pre-Transaction Stage & Post-Transaction Stage
b. The transaction monitoring may be conducted at Maker level & At Checker Level
c. The Transaction monitoring is a continuous process without any stage.
d. The transaction monitoring may be conducted at the pre-sanction level and post sanction level
Is there any Penalty for any deficiency in filing the mandatory reports by reporting entities to FIU-IND? B
a. Any deficiency in filing the mandatory reports by reporting entities will attract maximum penalty of Rs. 10,000/-
per instance per day.
b. Any deficiency in filing the mandatory reports by reporting entities will attract minimum penalty of Rs. 10,000/-
which may go to Rs.1,00,000/- per instance per day.
c. The FIU_IND can not impose penalty on Reporting Entities.
d. Any deficiency in filing the mandatory reports by reporting entities will attract minimum penalty of Rs. 1,00,000/-
per instance per day with cap of Rs 10,00,000/-.
AGM Regions/Branch Heads / Heads of the CPCs- are responsible for reporting of suspicious transactions B
passing through their units. What is the designated role of AGM Regions/Branch Heads / Heads of the CPCs as
per the 'AML/CFT STRUCTURE in our BANK'?
a. Dy. MLROs
b. Assistant MLROs
c. Designated Directors for their respective offices.
d. MLROs) Money Laundry Reporting Officers)
Why account of a shell company should not be opened/maintained by a Bank? A
a. Shell Companies may be used by criminals for laundering ill-gotten money, evading taxes and perpetuating
fraud.
b. Shell companies do not apply for loans and advances, hence are not viable option for interest and other income
for Banks.
c. Shell companies do not have any director on their board, hence it is risky proposition to open an account of a
shell company.
d. Banks do not get substantial business from Shell companies.
A customer entered the main branch of a bank in Agra city. The behaviour of the customer made the service
manager suspicious when the customer due diligence. Customer had vague knowledge about amount of money
involved in the transaction. Customer wa transactions and answering queries of branch officials. His behavioural
pattern put the branch officials on alert, and it was/Suspicious Activity through a Suspicious Transaction
Report/Suspicious Activity Report. What is the category of source of such an offline Red Fla
a. Media Reports (MR)-Adverse Media Reports about customer, being investigated for criminal offences
b. Law Enforcement Agency Query (LQ)- Query or letter received from Law Enforcement Agency (LEA)
c. Business Associates (BA)- Information received from other institutions, subsidiaries or business associates
Which of the following is NOT a category of source of Subjective STR (Suspicious Transaction Report)/ SAR B
(Suspicious Activity Report)?
a. Customer Verification (CV)-Detected during customer acceptance, identification or verification
b. Typology (TY) system detected alerts- Routing of funds through multiple accounts -transactions greater than
INR 10 lacs between more than 3 accounts aggregating to more than INR 30 lacs on the same day.
c. Law Enforcement Agency Query (LQ)- Query or letter received from Law Enforcement Agency (LEA)
d. Employee Initiated (EI)-Employee raised alert- transaction has no economic rationale
A customer, owning a small tea shop near your branch, entered the branch to deposit a cheque of large amount in b
his account. The cheque had been purportedly drawn by Coal India Ltd. Customer is not able to provide sufficient
clarification to the queries of the front-line staff. The lady associate refers the case to service manager. The
customer frequently changes his statements, when more detailed information is requested by the service manager.
It is evident to the branch officials that the information that the customer has been providing is minimal and
possibly false or inconsistent. The branch head has decided to report it as a Suspicious Transaction /Suspicious
Activity through a Suspicious Transaction Report/Suspicious Activity Report. What is the category of source of
such an offline Red Flag Indicator (RFI)/ alert?
Sunil SKA
27
a. Law Enforcement Agency Query (LQ)- Query or letter received from Law Enforcement Agency (LEA)
b. Employee Initiated (EI)-Employee raised alert- Customer provides inconsistent information
c. Business Associates (BA)- Information received from other institutions, subsidiaries or business associates
d. Media Reports (MR)-Adverse Media Reports about customer, being investigated for criminal offences
Who is designated as PRINCIPAL OFFICER as per the 'AML/CFT STRUCTURE in our BANK' for the purpose of D
Section 12 of PMLA, 2002?
a. G.M. Network
b. C.G.M
c. M.D.(SARC)
d. G.M. (AML-CFT)
Through which set up Suspicious Transaction Reports are sent to Financial Intelligence Unit-India (FIU- IND)? A
a. STRs are to be reported through Principal Officer, AML-CFT cell, to FIU-IND.
b. Subjective STR can be sent immediately by Branch directly to FIU-IND under information to the controller of
branch.
c. STRs can be sent by RBO on consolidated basis for the respective region, to FIU-IND.
d. STRs can be sent by LHO on consolidated basis for the circle, to FIU-IND.
How many types of STRs are there? C
a. Fresh STRs and Stale STRs
b. Genuine STRs & False STRs
c. System Generated STRs and Subjective STRs
d. Confirmed STRs and Un-confirmed STRs
Mr X opened an account but the letter of thanks as well as customised cheque book got returned with the remark B
"Customer not staying at the provided address'. The branch officials also confirmed the fact by visiting in person
and decided to report this through a Suspicious Transaction Report (STR)/ Suspicious Activity Report (SAR). What
is the category of source of such an offline Red Flag Indicator (RFI)/ alert ?
a. Employee Initiated (EI)-Employee raised alert
b. Customer Verification (CV)-Detected during customer acceptance, identification or verification
c. Media Reports (MR)-Adverse Media Reports about customer
d. Public Complaint (PC)-Complaint received from public
A customer of a branch in Hyderabad, was not able to answer the queries made by the service manager, B
regarding the drawer of the cheque, which had been drawn for a large amount. Customer was nervous and over
cautious in explaining genuineness of the transaction and frequently changing his statements. This made the
official as well as the branch head suspicious and they decided to report the incidence as a Suspicious Activity
through Suspicious Activity Report/ STR. Under which category the source of the offline Red Flag Indicator (RFI)/
alert will fall?
a. Business Associates (BA)- Information received from other institutions, subsidiaries or business associates
b. Employee Initiated (EI)-Employee raised alert- customer is nervous or over cautious
c. Media Reports (MR)-Adverse Media Reports about customer, being investigated for TF offences
d. Customer Verification (CV)-Detected during customer acceptance, identification or verification
Mr S did not open account after being informed about KYC requirements, the dealing officer has sufficient reasons B
to believe that this activity should be reported as a suspected transaction and a Suspicious Transaction Report
(STR)/ Suspicious Activity Report (SAR) must be raised. The source of such an offline Red Flag Indicator/ alert
falls under______category?
a. Media Reports (MR)-Adverse Media Reports about customer
b. Customer Verification (CV)-Detected during customer acceptance, identification or verification
c. Public Complaint (PC)-Complaint received from public
d. Employee Initiated (EI)-Employee raised alert
One customer approached a bank branch to open an account and deposit a cheque of large amount in the newly C
opened account. The customer seemed to be in hurry and was not able to explain why he had travelled
unexplained distances from his own place to open an account and conduct transactions in a far off situated
branch. This made the branch officials suspicious and the branch decided to report this incident through a
Suspicious Transaction Report (STR)/ Suspicious Activity Report (SAR) as a CDD measure. What is the category
of source of such an offline Red Flag Indicator (RFI)/ alert?
a. Media Reports (MR)-Adverse Media Reports about customer,
Sunil SKA
28
b. Law Enforcement Agency Query (LQ)- Query or letter received from Law Enforcement Agency (LEA)
c. Employee Initiated (EI)-Employee raised alert -Customer avoiding nearer branches
d. Business Associates (BA)- Information received from other institutions, subsidiaries or business associates
Which of the following is NOT a category of source of Subjective STR (Suspicious Transaction Report)/ SAR D
(Suspicious Activity Report)?
a. Employee Initiated (EI)-Employee raised alert- Customer could not explain source of funds
b. Customer Verification (CV)-Detected during customer acceptance, identification or verification
c. Media Reports (MR)-Adverse Media Reports about customer, being investigated for criminal offences
d. Watch List (WL) related: Matching the customer details by system, with the specified negative lists such as UN
list, OFAC etc.
What is the periodicity of undertaking exercise of Customer Risk categorization (CRC) by AML-CFT Department? A
a. CRC by AML-CFT Department is done at half yearly intervals typically as on 31st March and 30th September
every year or in between if the need arises.
b. CRC by AML-CFT Department is done at quarterly intervals or in between if the need arises.
c. CRC by AML-CFT Department is done annually typically as on 31st March every year or in between if the need
arises.
d. CRC by AML-CFT Department is done at monthly intervals typically on the last working day of the month or in
between if the need arises.
Each Business Group/Circle/SBU designates an official to ensures proper implementation of KYC/AML/CFT Policy B
in the Group/Circle/SBU and to report to the Principal Officer (AML-CFT). What is the designation of such
designated official?
a. Money Laundering Officer (MLO)
b. Money Laundering Reporting Officer (MLRO)
c. Dy. Money Laundering Officer (DyMLO)
d. Officer for Money Laundering (OML)
Suspicious Transactions Reports (STRs) can be classified into two following broad categories that B
is_______________, based on the source of the alert which resulted in escalating such STRs
a. Internal STRs & External STRs
b. System Generated STRs & Subjective STRs
c. Employee Initiated STRs & Customer initiated STRs
d. Customer related STRs & Non-customer related STRs
Mr X provided false identification/address documents that appeared to be counterfeited, altered, and inaccurate at D
the time of onboarding, the dealing officer and branch head decided to raise a Suspicious Transaction Report
(STR)/ Suspicious Activity Report (SAR). The source of such an offline Red Flag Indicator (RFI) / alert falls
under______category?
a. Employee Initiated (EI)-Employee raised alert
b. Public Complaint (PC)-Complaint received from public
c. Media Reports (MR)-Adverse Media Reports about customer
d. Customer Verification (CV)-Detected during customer acceptance, identification or verification
The service manager of a branch has brought to the notice of the branch head that Sh Blacky has been visiting A
branch quite often with frequent requests to access his locker. He has already operated the locker for 18 times
during past 30 days. When contacted he could not provide satisfactory reply and rather abused the staff for not
cooperating. As a branch head, you decided to report this incident as Suspicious Transactions / Suspicious Activity
through a Suspicious Transaction Report/Suspicious Activity Report. What is the category of source of such an
STR/SAR?
a. Watch List (WL) related-Frequent locker operations
b. Customer Verification (CV)-Detected during customer acceptance, identification or verification
c. Employee Initiated (EI)-Employee raised alert- Frequent locker operations
d. Risk Management System (RM)
What is True about 'System generated STRs'? D
a. System Generated Alerts along with STRs are generated by Core Banking System during End of Day activities.
b. Subjective STRs are escalated based on alerts or information received from Branches/staff/media reports etc.
c. System Generated Alerts are generated by staff through Core Banking System.
d. System Generated STRs are escalated based on alerts triggered by AML software system.
Sunil SKA
29
You being the Beneficiary Bank, have received a wire-transfer from Ordering Bank in favour of Al Faraz & Co. The C
detailed information on the fund remitter is missing with the message. Despite repeated requests the ordering bank
has failed to furnish information on the remitter, Being a beneficiary Bank what will be your action and view
regarding the ordering Bank?
a. The Beneficiary Bank should appreciate the problem of ordering bank and credit the account of beneficiary
under information to ordering bank.
b. The Beneficiary Bank should credit the account of beneficiary on the risk and responsibility of the ordering bank
c. The Beneficiary Bank should hold the credit on the risk and responsibility of the ordering bank
d. The Beneficiary Bank should consider restricting or even terminating its business relationship with the ordering
bank.
What is meant by 'Layering' process in Money Laundering Process? B
a. Layering of different criminal activities for Money Laundering
b. Separation of illicit proceeds from their original sources and beyond the grasp of local law enforcement agencies
by layering of financial transactions with the intention to conceal the origin of the proceeds.
c. Integrated efforts and activities of Money Launderers for depositing of proceeds of crime into financial system.
d. Creating layers of Cash for easily counting the money by Money Launderers.
What is Trade Based Money Laundering or TBML? B
a. TBML is the legitimate process/ business of money laundering.
b. TBML is the process of disguising the proceeds of crime and moving value using trade transactions to legitimize
their illicit origins.
c. TBML is the process of soliciting, collecting or providing the funds for activities related to terrorism.
d. TBML is the process of money laundering through Identity theft.
Sunil SKA
30
There is a Relationship between KYC Procedures and AML/ CFT Measures. A well-designed KYC Policy
complements the AML/ CFT systems deployed in a bank in three fundamental ways:
1. It prevents on-boarding of persons who carry a dubious background and who may be a potential threat to
the institution from the perspective of money laundering and financing of terrorism.
2. It helps in better understanding of customers and analysing the risk that they pose to the banks and society
at large.
3. It provides the AML/ CFT cell with an accurate profile of the customers enabling a meaningful monitoring of
transaction patterns and better decision-making regarding reporting of a suspicious transaction.
The objective of KYC/AML/CFT guidelines is to prevent banks/FIs from being used, intentionally or unintentionally, by
criminal elements for money laundering or terrorist financing activities. RBI has mandated the banks for having a
board-approved KYC policy.
The bank has a board approved comprehensive Policy & Procedural Guidelines on KYC/ AML/ CFT issued by KYC
Department incorporating Bank’s approach to KYC, AML and CFT issues. As per the policy, bank shall take steps to
implement provisions of Prevention of Money-Laundering Act, 2002 and the Prevention of Money-Laundering
(Maintenance of Records) Rules, 2005, as amended from time to time.
Some of the key features of the KYC/ AML/ CFT Policy and certain customer segments which need closer monitoring
from the AML/ CFT risk perspective are also outlined in this chapter.
The Customer Acceptance Policy section of the Bank’s Policy & Procedure Guidelines on KYC/ AML/ CFT Measures
lays down the criteria for acceptance of a person as customer of the bank and, inter-alia states as under:
* No account is opened where the Branch/ Business unit is unable to apply appropriate CDD measures, either
due to non-cooperation of the customer or non-reliability of the documents/information furnished by the
customer. It should be ensured that identity of customer does not match with any person or entity whose name
appears in the sanction’s lists circulated by Reserve Bank of India.
Sunil SKA
31
* Mandatory information to be sought for KYC purpose while opening an account and during the periodic updation, as
specified by RBI to be obtained.
* Optional/ additional information is obtained with the explicit consent of the customer after the account is opened.
* Branches/ Offices shall apply the CDD procedure at the CIF level. Thus, if an existing KYC compliant customer of our
Bank desires to open another account with another Branch, there shall be no need for a fresh CDD exercise.
* CDD Procedure is followed for all the joint account holders, while opening a joint account and also for
Guarantors in case of loan accounts.
* Circumstances in which, a customer is permitted to act on behalf of another person/ entity, is clearly spelt out.
* Accounts of persons having relationships with banned entities such as individual terrorists or terrorist organizations
etc. are not to be opened. While information relating to them will be shared from time to time, branches will also have
to be guided by the information available in public domain for the purpose.
* Virtual Currencies (VC): As per RBI Guidelines, Bank shall not deal in Virtual Currencies (VC) or provide services for
facilitating any person or entity in dealing with or settling VCs.
It is important to bear in mind that the adoption of Customer Acceptance Policy and its implementation should not
become too restrictive and must not result in denial of banking services to general public, especially to those who are
financially or socially disadvantaged.
Risk Management
For Risk Management, bank shall have a risk-based approach which includes the following:
For Risk Management, REs shall have a risk-based approach which includes the following:
(a) Customers shall be categorised as low, medium and high-risk category, based on the assessment and risk
perception of the RE.
(b) Risk categorisation shall be undertaken based on parameters such as customer’s identity, social/financial
status, nature of business activity, and information about the clients’ business and their location etc.
Sunil SKA
32
While considering customer’s identity, the ability to confirm identity documents through online or other services offered
by issuing authorities may also be factored in.
Provided that various other information collected from different categories of customers relating to the perceived risk, is
non-intrusive and the same is specified in the KYC policy.
Explanation: FATF Public Statement, the reports and guidance notes on KYC/AML issued by the Indian Banks
Association (IBA), guidance note circulated to all cooperative banks by the RBI etc., may also be used in risk
assessment
Risk categorisation shall be undertaken based on parameters such as customer’s identity, social/financial status,
nature of business activity, and information about the clients’ business and their location etc. While considering
customer’s identity, the ability to confirm identity documents through online or other services offered by issuing
authorities may also be factored in.
Manual or Automated
The risk associated with all factors/parameters which are suggested by RBI cannot be assessed and captured
exclusively by an automated system of risk calculation and assignment. Hence Risk categorization of customers in the
Bank is done by combining both manual and automated classification methods to fulfil the transaction monitoring
requirements as per the RBI guidelines.
Further, review of risk categorization once in six months, as mandated by RBI, may be possible through an automated
process only considering the large customer base of the bank.
The bank needs to have a multi-dimensional and dynamic CRC model which considers both static and dynamic factors
to arrive at the customer’s risk classification.
RBI Master Direction on KYC/ AML/ CFT stipulates that Banks/ FIs should put in place a system of periodical review of
risk categorization of accounts and the need for applying enhanced due diligence measures. Such review of risk
categorization of customers should be carried out at a periodicity of not less than once in six months.
The customer risk may be integrated with transaction monitoring by adequately adopting differential rules/ thresholds
for different risk profiles.
Based on the above broad guidelines the bank has devised a comprehensive process for classifying its customers into
Low, Medium, and High-Risk categories for a risk-based transaction monitoring from the perspective of anti-money
laundering and combating financing of terrorism.
The Customer Profile is created as accurately as possible, as it determines the risk category of the customer. The
customer should be advised that correct profiling is in the customer’s interest to be compliant with various directives
from the bank, RBI and the relevant laws/ enactments issued from time to time by the Government.
Sunil SKA
33
However, Risk Categorisation must not be discussed with the customer as it is an internal process of the bank, to be
performed as per the regulatory guidelines.
Periodicity of CRC
As per the RBI guidelines, review of risk categorization of customers should be carried out at a periodicity of not less
than once in six months. The CRC by AML/CFT Department is done at two levels:
1. Daily for the incremental accounts/customers, and
2. At half yearly intervals typically as on 31st March and 30th September every year or in between if the need arises.
General Principle:
Customer identification means undertaking client due diligence measures while commencing an account-based
relationship including identifying and verifying the customer and the beneficial owner.
Customer identification requires identifying the customer and verifying his/ her identity by using reliable, independent
source documents, data, or information. The first requirement of Customer Identification Procedures (CIP) to be
satisfied is that a prospective customer is who he/ she claims to be.
Mandatory’ information required for KYC purposes, which the customer is obliged to give, shall be obtained at the time
of opening an account or during periodic updation. The information {both ‘mandatory’ (obtained before opening the
account) and ‘optional’ (after opening the account with the explicit consent of the customer)} collected from the
customer is to be treated as confidential and details thereof are not to be divulged for cross-selling or any other
purpose, without the express permission of the customer.
Extra care should be taken while opening accounts of various firms and companies belonging to the same group
especially in the light of beneficial owners/ real beneficiaries of such group accounts and under no circumstances,
accounts of shell companies/ firms should be opened in Bank’s books. While considering a customer’s identity, the
ability to confirm identity documents through online or other services offered by issuing authorities needs to be factored
in.
* Carrying out any international money transfer operations for a person who is not an account holder.
* When the Branch/ Office has a doubt about the authenticity or adequacy of the customer identification data it has
obtained.
* Selling of third-party products as agents, selling our own products, payment of dues of credit cards/ sale and
reloading of prepaid/ travel cards and any other product for more than Rs. 50,000/-.
* Carrying out transactions for a non-account-based customer, that is a walk-in customer, where the amount involved
is equal to or exceeds rupees fifty thousand, whether conducted as a single transaction or several transactions that
appear to be connected.
* When the Bank has reason to believe that a customer (account based or walk-in) is intentionally structuring a
transaction into a series of transactions below the threshold of rupees fifty thousand.
Customer Profile
To monitor individual transactions in accounts, “Customer Profile” of individual account holders should be compiled in
the account opening forms, covering information like Occupation/ activity, Source of Funds, Monthly Income, Annual
Sunil SKA
34
turnover (in the case of a business), Date of Birth, Educational qualification, Details of existing credit facilities, if any,
Assets (approximate value), etc.
Customer profiles are to be prepared for all accounts. Customer profiles must be reviewed whenever the branch has
doubt about the authenticity/ veracity or the adequacy of the previously obtained customer identification data.
Customer due diligence and various customer identification procedures in respect of different type of customers will be
discussed in this chapter at appropriate places.
Transaction Monitoring:
Transaction Monitoring is fourth important element of KYC policy. The bank’s obligations under PMLA, 2002 and the
PML Rules there under requires the bank to put in place an effective mechanism to enable it to monitor all the
transactions occurring across its various channels.
Analysing the transactions conducted by a customer/ non-customer, with a view to ensuring that the value, nature, and
pattern of transaction is consistent with the customer profile and/ or to determine whether the transaction under
consideration has an economic rationale, may be termed as transaction monitoring.
1. It is the responsibility of each vertical head/ head of the Business Unit to ensure KYC compliance under
their area of operations.
3. The compliance functions of bank’s policies and procedures, including legal and regulatory requirements must be
independently evaluated.
4. Concurrent/internal audit system to verify the compliance with KYC/AML policies and procedures.
* Bank shall ensure that decision making functions of determining compliance with KYC norms are not outsourced.
* All Officers/Employees of the Bank shall abide by the KYC Policy/Instructions issued there under and implement
them in letter &spirit.
* Non-compliance with KYC/AML/CFT standards can lead to misuse of the different channels of the Bank for
Money Laundering/ financing terrorism.
Sunil SKA
35
* It is responsibility of each vertical head/head of the Business Unit to ensure KYC compliance under their area of
operation.
* The officer-in-charge vested with the authority to open the account, should ensure compliance with the KYC
guidelines. The officer, who has interviewed the customer should subscribe his signature, in the space provided in the
account opening form, for having interviewed the prospective customer and should ensure that all aspects of KYC
guidelines are complied with.
* Business Correspondents (BCs) & Business Facilitators (BFs) will facilitate filling up of account opening forms,
procurement of KYC documents, photograph etc. and put up to the home Branch where the account will reside.
* While functionaries of BC channels will facilitate completion of KYC formalities in respect of accounts opened through
them, primary responsibility of ensuring KYC compliance in respect of all accounts maintained with it including review
of KYC, risk categorization, monitoring of transactions etc. will rest with the home branch.
2. It is not necessary to create CIF for all walk-in/occasional customers such as buyers of drafts / pre-paid
instruments/purchasers of third party products, provided the Bank shall ensure that there is adequate mechanism to
identify such walk-in customers who have frequent transactions and ensure that they are allotted CIF.
1. Accounts opened with Deemed OVD but updated OVD is not provided within 3 months.
2. Small accounts where OVD is not provided within a period of 24months, subject to relaxations provided by RBI/
Govt. of India.
5. Accounts where customer does not co-operate to provide CDD or additional information, including Beneficial
Ownership information.
* Bank shall take steps to make such accounts KYC Compliant first. However, if the customer is not forthcoming to
provide the necessary documents and/or information, Bank will take the steps towards phased imposition of partial /
full freeze and eventual closure of the account. Partial Freeze means restricting debits in the account through all
channels, but allowing credits.
* Bank may choose to close the account where full freeze has been imposed, after issuing due notice to the customer
explaining the reasons for taking such a decision. Such decisions, however, shall be taken at a reasonably senior
level. The competent authority to permit closure of such accounts shall be the Branch Head, not below the rank of
Sunil SKA
36
Chief Manager in Senior Management Grade. In all other cases, any Chief Manager of the R.B.O shall be the
competent authority to permit closure of such accounts.
Any changes brought about by GOI/RBI Directives or other regulators will be disseminated by way of e-circulars, under
the signature of CGM (R&DB Operations). Such changes would be suitably incorporated at the time of review.
Financial institutions are required to undertake customer due diligence (CDD) measures when:
* Establishing business relationship.
* Carrying out occasional transactions above the applicable designated threshold for the account.
* The transaction is carried out in a single operation or in several operations that appear to be linked.
* Carrying out occasional transactions that are wire transfers on any other mode like RTGS, NEFT, SWIFT etc.
* There is a suspicion of money laundering or financing of terrorism, regardless of any exemptions or thresholds that
are referred to elsewhere.
* The branch has doubts about the veracity or adequacy of previously obtained customer identification data.
As per Rule 9 (1) of PML Rules-2005, for CDD, Every reporting entity shall-
(a) at the time of commencement of an account-based relationship-
1. identify its clients, verify their identity, obtain information on the purpose and intended nature of the business
relationship; and
2. determine whether a client is acting on behalf of a beneficial owner, and identify the beneficial owner and take all
steps to verify the identity of the beneficial owner.
1. transaction of an amount equal to or exceeding rupees fifty thousand, whether conducted as a single transaction or
several transactions that appear to be connected, or
Sunil SKA
37
* Politically Exposed Persons (PEPs), their family members and close relatives. Client accounts opened by
Professional Intermediaries.
* EDD FOR ACCOUNTS OF NON-FACE-TO-FACE CUSTOMERS (OTHERTHAN AADHAAR OTP BASED ON-
BOARDING):
Branch/Business Units shall ensure that the first payment is to be effected through the customer's KYC-complied
account with another Bank Branch, for enhanced due diligence of non-face-to-face customers. Explanation: Accounts
opened on the basis of V-CIP of Video KYC are to be treated as face to face and above restriction does not apply.
* Branches should verify the identity of the person and seek sufficient information about the sources of funds,
accounts of family members and close relatives, before accepting the PEP as a customer.
* Branches should open such accounts with the approval of controllers in respect of branches / BPR outfits
headed by officials of Junior Management/Middle Management. In respect of branches / BPR outfits headed by
officers of Senior Management and above, such approval should be accorded by the branch/operating unit
head in person.
* In the event of an existing customer or the beneficial owner of an existing account, subsequently becoming a PEP,
Branches should obtain necessary approval to continue the business relationship and subject the account to the
Enhanced Customer Due Diligence (EDD) measures as applicable to the customers of PEP category including
enhanced monitoring on an ongoing basis.
* These instructions are also applicable to accounts where a PEP is the ultimate beneficial owner.
* Some of the Customer categories may carry more than ordinary risk of money laundering and terrorist financing and
therefore warrant a better understanding and closer scrutiny by the operating staff at all levels. Indicative but not
exhaustive examples are given below:
* Beneficial Owner.
* Walk-in Customers.
* Politically Exposed Persons (PEPs).
* Multi-Level Marketing (‘MLM’) Companies.
* Accounts of Non- Face-To-Face Customers.
Sunil SKA
38
Branches/Business Units shall obtain the following from an individual while establishing an account-based relationship
or while dealing with the individual who is a beneficial owner, authorised signatory or the power of attorney holder
related to any legal entity:
1. The Permanent Account Number (PAN) or the equivalent e-document there of or Form No. 60 as defined in
Income-tax Rules, 1962 and
* he decides to submit his Aadhaar number voluntarily for identification purposes and consents to undergo
authentication OR proof of possession of Aadhaar number or any Officially Valid Document (OVD) or the
equivalent e-document there of containing the details of his identity and address
Explanation – In these two cases, Bank/RE shall carry out authentication of the customer’s Aadhaar number using e-
KYC online authentication facility provided by the Unique Identification Authority of India. Biometric based e-KYC
authentication can be done by bank official/business correspondents/business facilitators.
Further, in such a case, if customer wants to provide a current address, different from the address as per the identity
information available in the Central Identities Data Repository, he may give a self-declaration to that effect to the RE.
4. any such other documents including in respect of the nature of business and financial status of the customer,
or the equivalent e-documents thereof as may be required the branches/Business Units, to create customer profile for
the purpose of risk categorization and transaction monitoring.
Explanation- Proof of Possession of Aadhaar (without sharing Aadhaar number/ core biometrics)- (In such
cases two options are there)
(aa) RE shall carry out offline verification of Aadhaar - if offline verification can be carried out, OR
(ab) if offline verification cannot be carried out in such case RE shall carryout DIGITAL KYC
(Provided that for a period not beyond such date as may be notified by the Government for a class of REs, instead of
carrying out digital KYC, the RE pertaining to such class may obtain a certified copy of the proof of possession of
Aadhaar number or the OVD and a recent photograph where an equivalent e-document is not submitted.)
EXCEPTION HANDLING
In such a case, where e-KYC authentication cannot be performed for an individual desirous of receiving any benefit or
subsidy under any scheme notified under section 7 of the Aadhaar (Targeted Delivery of Financial and Other
subsidies, Benefits and Services) Act, 2016 owing to injury, illness or infirmity on account of old age or otherwise, and
similar causes, REs shall –
Sunil SKA
39
2. REs shall ensure to duly record the cases of exception handling in a centralised exception database.
3. The database shall contain the details of grounds of granting exception, customer details, name of the designated
official authorising the exception and additional details, if any.
4. The database shall be subjected to periodic internal audit/inspection bythe RE and shall be available for supervisory
review.
2. the aggregate balance of all the deposit accounts of the customer shall not exceed rupees one lakh. In case, the
balance exceeds the threshold, the account shall cease to be operational, till CDD as mentioned at (v) below is
complete.
3. the aggregate of all credits in a financial year, in all the deposit accounts taken together, shall not exceed rupees
two lakh.
4. As regards borrowal accounts, only term loans shall be sanctioned. The aggregate amount of term loans sanctioned
shall not exceed rupees sixty thousand in a year.
5. Accounts, both deposit and borrowal, opened using OTP based e-KYC shall not be allowed for more than one
year, unless prescribed CDD is undertaken for the customer. RBI has also allowed to use Video based Customer
Identification Procedure (V-CIP) for such accounts opened using OTP based e-KYC to complete the CDD.
6. If the CDD procedure as mentioned above is not completed within a year, in respect of deposit accounts, the same
shall be closed immediately. In respect of borrowal accounts no further debits shall be allowed.
7. A declaration shall be obtained from the customer to the effect that no other account has been opened nor will be
opened using OTP based KYC in non face-to-face mode with any other RE. Further, while uploading KYC information
to CKYCR, REs shall clearly indicate that such accounts are opened using OTP based e-KYC and other REs shall not
open accounts based on the KYC information of accounts opened with OTP based e-KYC procedure in non-face-to-
face mode.
8. REs shall have strict monitoring procedures including systems to generate alerts in case of any non-
compliance/violation, to ensure compliance with the above-mentioned conditions.
Sunil SKA
40
5. Job card issued by NREGA duly signed by an officer of the State Government and
6. Letter issued by the National Population Register containing details ofname and address.
No other document shall be accepted for establishing identity/ address of an individual customer.
Deemed OVDs in case OVD furnished by the customer does not have updated address
Where the OVD furnished by the customer does not have updated address, the following documents or the equivalent
e-documents thereof shall be deemed to be OVDs for the limited purpose of proof of address: -
1. Utility bill which is not more than two months old of any service provider (electricity, telephone, post-paid mobile
phone, piped gas, water bill).
3. Pension or family pension payment orders (PPOs) issued to retired employees by Government Departments or
Public Sector Undertakings, if they contain the address.
4. Letter of allotment of accommodation from employer issued by State Government or Central Government
Departments, statutory or regulatory bodies, public sector undertakings, scheduled commercial banks, financial
institutions and listed companies and leave and licence agreements with such employers allotting official
accommodation.
The customer shall submit OVD amended with current address within aperiod of three months of submitting
the Deemed OVDs.
2. Registration certificate
3. Certificate/ licence issued by the municipal authorities under Shop and Establishment Act.
7. IEC (Importer Exporter Code) issued to the proprietary concern by the office of DGFT or Licence/certificate of
practice issued in the name of the proprietary concern by any professional body incorporated under a statute.
8. Complete Income Tax Return (not just the acknowledgement) in the name of the sole proprietor where the firm's
income is reflected, duly authenticated/acknowledged by the Income Tax authorities.
In cases where the branches are satisfied that it is not possible to furnish two such documents , they may, at their
discretion, accept only one of those documents as proof of business/activity
Sunil SKA
41
Branches will undertake 'contact point verification' and collect such other information and clarification
as would be required to establish the existence of such firm and shall confirm and satisfy itself that the business
activity has been verified from the address of the proprietary concern.
Certified copies of each of the following documents or the equivalent e-documents thereof shall be obtained
* Certificate of incorporation
* Memorandum and Articles of Association
* Permanent Account Number of the company
* A resolution from the Board of Directors and power of attorney granted to its managers, officers, or employees to
transact on its behalf
* Documents relating to beneficial owner, the managers, officers or employees, as the case may be, holding an
attorney to transact on the company’s behalf.
Explanation: Unregistered trusts/partnership firms shall be included under the term ‘unincorporated association’.
Explanation: Term ‘body of individuals’ includes societies.
Sunil SKA
42
(c) Such documents as may be required by the RE to establish the legal existence of such an entity/juridical person.
2. A declaration should be obtained about the local address within a period of 30 days of opening the account
and the said local address shall be verified.
3. Pending verification of address, during the 30 days period, the account may be operated with a condition of
allowing foreign remittances not exceeding USD 1,000 or equivalent into the account and cap of Rupees fifty thousand
on aggregate in the same.
4. The account would be treated as a normal NRO account and will be operated in terms of instructions contained
in RBI’s instructions on Non-Resident Ordinary Rupee (NRO) Account and the provisions of FEMA,1999.
5. Students with Pakistani nationality will need prior approval of Reserve Bank of India for opening the account.
NRI customers who want to open accounts without visiting the branch willbe treated as “non-Face-to-Face”
customers and necessary due diligence, as applicable to “Non-Face-to-Face” customers, needs to bedone.
ACCOUNTS OF MINORS
* Minors, who can adhere to uniform signature and are not less than ten years old, can open accounts in their
single name. In such cases, KYC procedure for identification /address verification as in case of any other individual
would apply.
* For minors below the age of 10 years or whose accounts are operated by Parents/Guardian, proof of Date of Birth
of Minor, Photograph of guardian and KYC of guardian shall be obtained.
* Wherever PAN of minor is not available, Form 60 is to be obtained, which shall be signed by Parent/Guardian only.
* Minors on attaining majority shall submit their Fresh Photographs, Copy of PAN card or Form 60 along with the
appropriate KYC documents.
Small Accounts
Small Account means a savings account which is opened in terms of sub-rule (5) of the PML Rules, 2005. Small
Accounts entails following limitations:
1. the aggregate of all credits in a financial year does not exceed Rupees one lakh;
2. the aggregate of all withdrawals and transfers in a month does not exceed Rupees ten thousand; and
Sunil SKA
43
3. the balance at any point of time does not exceed Rupees fifty thousand. [Provided, that this limit on balance shall
not be considered while making deposits through Government grants, welfare benefits and payment against
procurements.
In case an individual customer who does not have any OVD and PAN
and desires to open a bank account, a “Small Account” may be opened subject to following conditions:
1. Branches/Business Units while opening ‘Small’ accounts will obtain a self-attested photograph from the customer.
2. The authorised officer under his signature will certify that the person opening the account has affixed his signature
or thumb impression in his presence. Provided that where the individual is a prisoner in a jail, the signature or thumb
print shall be affixed in presence of the officer in-charge of the jail and the said officer shall certify the same under his
signature and the account shall remain operational on annual submission of certificate of proof of address issued by
the officer in-charge of the jail.
3. The stipulated monthly and annual limits on aggregate of transactions and balance requirements in such accounts
are not breached before a transaction is allowed to take place.
4. The account shall remain operational initially for a period of twelve months which can be extended for a further
period of twelve months, provided the account holder applies and furnishes evidence of having applied for any of
the OVDs during the first twelve months of the opening of the said account.
6. Notwithstanding anything contained in clauses (5) and (6)above, the small account shall remain operational
between such periods as may be notified by the Central Government. In the recent past, such relaxation was provided
during the period of 01.04.2020 to 30.09.2020 due to widespread pandemic and lockdown conditions.
7. The account shall be monitored and when there is suspicion of money laundering or financing of terrorism activities
or other high-risk scenarios, the identity of the customer shall be established as per CDD applicable for an individual.
8. Foreign remittance shall not be allowed to be credited into the account unless the identity of the customer is fully
established as per as per CDD applicable for an individual.
a. The “ISIL (Da’esh) &Al-Qaida Sanctions List”, which includes names of individuals and entities associated with the
Al-Qaida. The updated ISIL &Al-Qaida Sanctions List is available at
https://scsanctions.un.org/fop/fop?xml=htdocs/resources/xml/en/consolidated.xml&xslt=htdocs/resources/xsl/en/al-
qaida-r.xsl
b. The “1988 Sanctions List”, consisting of individuals (Section A of the consolidated list) and entities (Section B)
associated with the Taliban which is available at
https://scsanctions.un.org/fop/fop?xml=htdocs/resources/xml/en/consolidated.xml&xslt=htdocs/resources/xsl/en/taliban
-r.xsl
In addition to the above, other UNSCRs circulated by the Reserve Bank in respect of any other jurisdictions/ entities
from time to time shall also be taken note of
Sunil SKA
44
Section 52 of aforesaid Master Directions further states that details of accounts resembling any of the
individuals/entities in the lists shall be reported to FIU-IND apart from advising Ministry of Home Affairs as required
under UAPA notification dated February 2, 2021.
As per Rule 7(3) of the Prevention of Money Laundering (Maintenance of Records) Rules, 2005 for Banks, it is
imperative that the bank has a system in place, which will ensure that the account of the person of any dubious
background is not opened or any suspicious transaction if routed through the branch will be identified.
Name Screening:
Name Screening is an essential part of Customer Acceptance Policy of a Financial Institution. Name-Screening is a
process by which a given Name of a person or entity is screened against various lists circulated by National and
International Organizations, Regulators, Agencies, and the Institution itself. The necessity of creating a process of
Name Screening at the time of customer on-boarding and at periodic intervals, arises from regulations/ guidelines by
RBI and FIU-IND and bank’ own KYC/AML/ CFT policy
Through Name Screening, a Financial Institution reduces the risk of misuse of its channels and facilities by
unscrupulous elements for Money Laundering and/ or Terrorist Financing, by filtering out persons of criminal and
dubious background at the on-boarding stage itself.
It is important to note that whenever a business vertical creates a new channel of customer on boarding or modifies an
existing channel, it must ensure that a process for Name Screening has been put in place. All queries in this regard
maybe addressed to [email protected].
When a name match alert is displayed in CBS at the time of creating a new CIF or renewal of an existing CIF, the
name and ID details of the applicant / customer is matched with those of the corresponding name against which the
match has occurred in a negative list(s).
(The links to the negative lists is available in the e-circulars issued by the AML/CFT Department for this purpose and
also on the AML/CFT website on SBITIMES. The path is SBITIMES/ Departments1/ AML/CFT/ Downloads/ Banned
Entities.)
Scenario A:
The name and ID details (ID type and number) of the applicant/customer match with those of the person in the
negative list: This is considered a Positive match. Other available details such as Father’s Name, Date of Birth,
address etc. may also be verified before arriving at a conclusion. If it is established beyond doubt that the person
under consideration is the same as the person in the negative list, Step 2 is followed.
Sunil SKA
45
Scenario B:
The ID of the applicant/customer is different from the ID of the corresponding person in the negative lists (for e.g. the
customer has produced PAN card, but the available Id of the corresponding person in the negative list is Passport). In
this case, the name and other identifiers of the applicant/customer(date of birth, father's name, address, mobile no.)
are matched with those of the corresponding person given in the negative lists.
In case the name and at least two other identifiers match, it is considered a positive match. (For e.g. if the name and
date of birth match but father's name/address do not match, it cannot be taken as positive match).
Apart from the above steps, since the branch is face to face with the applicant/customer it may elicit other meaningful
information to confirm whether the person’s identity matches with the person in negative list. If it is established beyond
doubt that the applicant is the same as the person in the negative list, Step 2 is followed.
Scenario C:
The name, ID details and other identifiers of the applicant/customer do not match with those of the person in the
negative list. This is a negative match and the branch may proceed with opening of account/amending the CIF by an
Officer not below the rank of MMGS-III / Branch head (in case of lower incumbency branches).
* No customer whose details match beyond doubt with entities in the above two lists, shall be allowed to open
any account, under advice to the controllers and AML/CFT Department.
* In case, the particulars of any of their customers match beyond doubt with the particulars of designated
individuals/entities, the branch through its controllers, under advice to AML-CFT Department, shall
immediately, not later than 24 hours from the time of finding out such customer, inform full particulars of the
funds, financial assets or economic resources or related services held in the forms of bank accounts, held by
such customer on their books to the Joint Secretary(CTCR), Ministry of Home Affairs, at Fax No.011 –
23092569 and also convey over telephone on 011 – 23092736. The particulars apart from being sent by post
should necessarily be conveyed on e-mail id: [email protected].
* The branch through its controllers, under advice to AML-CFT Department, shall also send by post a copy of
the communication mentioned above to the UAPA nodal officer of RBI, as well as through email at
[email protected].
* The branch through its controllers, under advice to AML-CFT Department, shall also send a copy of the
communication mentioned above to the UAPA nodal officer of the state/UT where the account is held, as
well as to FIU-India.
* In case, the match of any of the customers with the particulars of designated individuals/entities is beyond
doubt, the branch, under advice to the controllers, would prevent designated persons from conducting
financial transactions, under intimation to Joint Secretary (CTCR), Ministry of Home Affairs through email,
phone and post in the same manner as stated above.
* The branch shall advise the full details of the person to the AML-CFT Department which in turn shall file a
Suspicious Transaction Report(STR) with FIU-IND covering all transactions in the accounts carried through or
attempted for in the prescribed format.
Sunil SKA
46
In case, the match of any of the customers with the particulars of individuals/entities is beyond doubt, the Branch
Manager, under intimation to the controllers, would prevent designated persons from opening account and conducting
financial transactions.
The list of persons/entities whose accounts were opened or not opened after due diligence, in case of 100% matching
of name only, with the sanction lists, shall be reported by the branches to the RBO on monthly basis.
The designated officer(s) in-charge of Compliance function shall peruse and cross-examine the list and any corrections
shall be advised to branches.
CDD Procedure and sharing KYC information with Central KYC Records Registry (CKYCR):
1. Bank shall upload the KYC data pertaining to accounts of individuals opened prior to January 01, 2017, at the
time of periodic updation, or earlier when the updated KYC information is obtained/ received from the customer in
certain cases. It shall be ensured that during periodic updation, the customers’ KYC details are migrated to
current CDD standard.
2. Bank shall upload the KYC data pertaining to accounts of Legal Entities (LEs) opened on or after April 1, 2021,
on to CKYCR in terms of Rule 9 (1A) of the PML Rules. It shall also be ensured that incase of accounts of LEs
opened prior to April 1, 2021, the KYC records are uploaded on to CKYCR during the process of periodic updation,
or earlier when the updated KYC information is obtained/received from the customer in certain cases.
3. Bank shall ensure that during periodic updation, the customers’ KYCdetails are migrated to current Customer Due
Diligence (CDD)standards.
Change in address:
In case of a change only in the address details of the customer, a self-declaration of the new address shall be obtained
from the customer through customer’s email-id registered with the Bank, customer’s mobile number registered with the
Bank, ATMs, digital channels (such as online banking / internet banking, mobile application of Bank), letter etc., and
the declared address shall be verified through positive confirmation within two months, by means such as address
verification letter, contact point verification, deliverables etc.
Further, Bank, at their option, may obtain a copy of OVD or deemed OVD or the equivalent e-documents thereof, for
the purpose of proof of address, declared by the customer at the time of periodic updation. Such requirement,
however, shall be clearly specified by the Bank in their internal KYC policy duly approved by the Board of Directors of
Bank or any committee of the Board to which power has been delegated.
Accounts of customers, who were minor at the time of opening account, on their becoming major:
In case of customers for whom account was opened when they were minor,
Fresh photographs shall be obtained on their becoming a major and at that time it shall be ensured that CDD
documents as per the current CDD standards are available with the Bank.
Sunil SKA
47
Wherever required, Bank may carry out fresh KYC of such customers i.e. customers for whom account was opened
when they were minor, on their becoming a major.
No change in KYC information: In case of no change in the KYC information of the Legal Entity (LE) customer, a
self-declaration in this regard shall be obtained from the LE customer through its email id registered with the Bank,
ATMs, digital channels (such as online banking /internet banking, mobile application of Bank), letter from an official
authorized by the Bank in this regard, board resolution etc.
Further, Bank shall ensure during this process that Beneficial Ownership (BO)information available with them is
accurate and shall update the same, if required, to keep it as up to date as possible.
Change in KYC information: In case of change in KYC information, Bank shall undertake the KYC process
equivalent to that applicable for onboarding a new LE customer.
Further, in case the validity of the CDD documents available with the Bank has expired at the time of periodic
updation of KYC, Bank shall undertake the KYC process equivalent to that applicable for on boarding a new
customer.
Customer’s PAN details, if available with the Bank, is verified from the database of the issuing authority at the time of
periodic updation of KYC.
Acknowledgment is to be provided to the customer mentioning the date of receipt of the relevant document(s),
including self-declaration from the customer, for carrying out periodic updation. Further, it shall be ensured that the
information / documents obtained from the customers at the time of periodic updation of KYC are promptly updated in
the records/ database of the Bank and an intimation, mentioning the date of updation of KYC details, is provided to the
customer.
Bank shall ensure that their internal KYC policy and processes on updation / periodic updation of KYC are
transparent and adverse actions against the customers should be avoided, unless warranted by specific regulatory
requirements.
2. The procedure laid down in the UAPA Order dated 02.02.2021 (Annex II of Master Direction on KYC updated as on
23.03.2021) or as updated from time to time shall be strictly followed and meticulous compliance with the Order issued
by the Government shall be ensured.
3. In case, the particulars of any of their customers match with the particulars of designated individuals/entities, the
bank, shall immediately inform full particulars of the funds, financial assets or economic resources or related services
held in the form of bank accounts, stocks or Insurance policies etc., held by such customer on their books to the
Central[designated] Nodal Officer for the UAPA
4. The list of Nodal Officers for UAPA is available on the website of Ministry of Home Affairs.
Sunil SKA
48
2.3 New Initiatives- Offline Paperless KYC, Digital KYC & Video KYC
UIDAI has launched Aadhaar Paperless Offline e-KYC Verification to allow Aadhaar number holders to voluntarily use
it for establishing their identity in various applications in paperless and electronic fashion, while still maintaining
privacy, security and inclusion.
When, the mechanism to verify identity of an Aadhaar number holder through an online e- KYC service is already
available which definitely provides an authenticated instant verification of identity, then why OFFLINE e-KYC has been
introduced?
The reason being that, this method of online e-KYC may not be available to all agencies, for the reason that-
2. The Bank/agency needs to have technical infrastructure to call online e-KYC service by deploying necessary
devices
On the other hand, it may also not be found suitable by some Aadhar number holders, due to salient reasons like-
1. The resident has to provide biometrics and he may not be able or interested to provide the same,
2. UIDAI maintains a record of all the online-KYC requests for its audit purposes and few holders of Aadhaar number
may find it as an encroachment on their privacy.
Aadhaar Paperless Offline e-KYC is the alternative available with its various advantages to resolve these issues.
Aadhaar paperless offline KYC/ Offline verification of Aadhaar is to be carried out in the following cases-
1. In case an individual customer decides not to reveal Aadhar number and opts to submit ‘Proof of possession of
Aadhaar number’ as an OVD.
2. In such a case, where e-KYC authentication cannot be performed for an individual desirous of receiving any benefit
or subsidy under any scheme notified under section 7 of the Aadhaar (Targeted Delivery of Financial and Other
subsidies, Benefits and Services) Act, 2016 owing to injury, illness or infirmity on account of old age or otherwise, and
similar causes.
Sunil SKA
49
* Go to URL → https://resident.uidai.gov..in/offlineaadhar
* Enter ‘Aadhaar Number’ or ‘VID’ and mentioned ‘Security Code’
* Enter the OTP received and click on ‘Submit’ button
* In next step, after successful validation, create the desired ‘Share Code’ for the ZIP file in the provided field and enter
the ‘Security Code’ and press ‘Download’ button to download the zip file.
* The Zip file containing the digitally signed XML will be downloaded to the device, which can be extracted using the
password and saved at desired location.
* This file containing ‘Aadhaar Paperless Offline e-KYC data’ will have to be provided to the Bank/ other verifying
agency by the Aadhaar number holder in digital or physical (printed QR) format along with share code for verification.
* Regd. mobile number and e-mail address will also be shared with the agency.
* Offline Paperless KYC reference ID- (This is a composition of last 4 digits of Aadhaar number followed by time stamp
in ‘YYYYMMDDHHMMSSmmm’ format.
* Name (Present as plain text)
* Gender (Present as plain text denoting ‘M’ or ‘F’ or ‘T’)
* Date of Birth/ Year of Birth (Present as plain text in DDMMYYYY or YYYY format)
* Address (Present as plain text in various tags e.g. Country/State/District/Street etc.)
* Photograph (present in encoded format)
* Mobile Number (Represented as a hash with hash logic)
* Email Address (represented as a hash with hash logic)
* UIDAI Signature: – (a 344 character long digital signature)
Step 2: All the demographic details are mentioned in the XML file such as Name, DOB, Gender, and Address. The
photograph will also be available in the base 64encoded format which can be rendered directly using any utility or plain
HTML page. However, the email address and the registered mobile number are one way hashed. Entire XML is
digitally signed and Service Provider validates the XML file using the signature and ‘public key’ available on the UIDAI
website.
Step 3: Once all the details are verified, the service provider needs to collect thee mail address and mobile number
from the Aadhaar Cardholders and validate the hash by using the given hash logic.
This way the service provider can verify and certify the authenticity of the provided data and rely upon the data for
official use.
How this Aadhaar Offline Paperless eKYC document is different from the other identification documents
produced offline by residents?
Identity verification can simply be accomplished by providing an identity document like PAN card, Passport etc to the
service provider. However, all these documents, may or may not be verified in offline mode instantaneously, and
hence later on may prove to be forged and fake.
The service providers may not have technological means to instantaneously verify the authenticity of these documents
or the information that they contain, and are left with no other option, than merely to trust the document provider.
Whereas, the XML file generated by the Aadhaar number holder, using ‘Offline Aadhaar Data Verification Service’ is
an authentic, digitally signed document carrying UIDAI digital signatures.
Sunil SKA
50
Thus, the service provider can verify the demographic contents of the file successfully, and certify it to be authentic
through carrying out offline verification of file.
Service providers can not publish or display either Share Code or XML file or its contents with anyone else.
Any non-compliance of these actions shall invite actions under Sections 17 and25 of The Aadhaar (Authentication)
Regulation, 2016; Sections 4 and 6 of The Aadhaar (Sharing of Information) Regulation, 2016 and Sections 29(2), 29
(3) and37 of The Aadhaar Act, 2016.
Digital KYC
“Digital KYC” means the capturing live photo of the customer and officially valid document or the proof of possession of
Aadhaar, where offline verification cannot be carried out, along with the latitude and longitude of the location
where such live photo is being taken by an authorised officer of the RE.
Digital KYC is to be carried out by REs, where offline verification of Aadhar number/ proof of possession of Aadhar
cannot be carried out.
However, for a period not beyond such date as may be notified by the Government for a class of REs, instead of
carrying out digital KYC, the Res pertaining to such class may obtain a certified copy of the proof of possession of
Aadhaar number or the OVD and a recent photograph where an equivalent e-document is not submitted.
2. The access of the Application shall be controlled by the REs and it should be ensured that the same is not used by
unauthorized persons. The Application shall be accessed only through login-id and password or Live OTP or Time
OTP controlled mechanism given by REs to its authorized officials.
3. The customer, for the purpose of KYC, shall visit the location of the authorized official of the RE or vice-versa. The
original OVD shall be in possession of the customer.
4. The RE must ensure that the Live photograph of the customer is taken by the authorized officer and the same
photograph is embedded in the Customer Application Form (CAF). Further, the system Application of the RE shall put
a watermark in readable form having CAF number, GPS coordinates, authorized official’s name, unique employee
Code(assigned by REs) and Date (DD:MM:YYYY) and time stamp(HH:MM:SS) on the captured live photograph of the
customer.
5. The Application of the RE shall have the feature that only live photograph of the customer is captured and no printed
or video-graphed photograph of the customer is captured. The background behind the customer while capturing live
photograph should be of white color and no other person shall come into the frame while capturing the live photograph
of the customer.
6. Similarly, the live photograph of the original OVD or proof of possession of Aadhaar where offline verification cannot
be carried out(placed horizontally), shall be captured vertically from above and water-marking in readable form as
mentioned above shall be done. No skew or tilt in the mobile device shall be there while capturing the live photograph
of the original documents.
7. The live photograph of the customer and his original documents shall be captured in proper light so that they are
clearly readable and identifiable.
Sunil SKA
51
8. There after, all the entries in the CAF shall be filled as per the documents and information furnished by the
customer. In those documents where Quick Response (QR) code is available, such details can be auto-populated by
scanning the QR code instead of manual filing the details. For example, in case of physical Aadhaar/e-Aadhaar
downloaded from UIDAI where QR code is available, the details like name, gender, date of birth and address can be
auto-populated by scanning the QR available on Aadhaar/e-Aadhaar.
9. Once the above-mentioned process is completed, a One Time Password (OTP) message containing the text that
‘Please verify the details filled in form before sharing OTP’ shall be sent to customer’s own mobile number. Upon
successful validation of the OTP, it will be treated as customer signature on CAF. However, if the customer does not
have his/her own mobile number, then mobile number of his/her family/relatives/known persons may be used for this
purpose and be clearly mentioned in CAF. In any case, the mobile number of the authorized officer registered with the
RE shall not be used for customer signature. The RE must check that the mobile number used in customer signature
shall not be the mobile number of the authorized officer.
10. The authorized officer shall provide a declaration about the capturing of the live photograph of customer and the
original document. For this purpose, the authorized official shall be verified with One Time Password (OTP) which will
be sent to his mobile number registered with the RE. Upon successful OTP validation, it shall be treated as authorized
officer’s signature on the declaration. The live photograph of the authorized official shall also be captured in this
authorized officer’s declaration.
11. Subsequent to all these activities, the Application shall give information about the completion of the process and
submission of activation request to activation officer of the RE, and also generate the transaction-id/reference-id
number of the process. The authorized officer shall intimate the details regarding transaction-id/reference-id number to
customer for future reference.
12. The authorized officer of the RE shall check and verify that: - (a) information available in the picture of document is
matching with the information entered by authorized officer in CAF. (b) live photograph of the customer matches with
the photo available in the document.; and (c) all of the necessary details in CAF including mandatory field are filled
properly.;
13. On Successful verification, the CAF shall be digitally signed by authorized officer of the RE who will take a print of
CAF, get signatures/thumb-impression of customer at appropriate place, then scan and upload the same in system.
Original hard copy may be returned to the customer.
Banks may use the services of Business Correspondent (BC) for this process.
“Video based Customer Identification Process (V-CIP)”: is an alternate method of customer identification with facial
recognition and customer due diligence by an authorised official of the RE by undertaking seamless, secure, live,
informed-consent based audio-visual interaction with the customer to obtain identification information required for CDD
purpose, and to ascertain the veracity of the information furnished by the customer through independent verification
and maintaining audit trail of the process. Such processes complying with prescribed standards and procedures is to
be treated on par with face-to-face CIP.
Reserve Bank of India has allowed to use the V-CIP functionality in following areas-
1. CDD in case of new customer on-boarding for-
a. Individual customers,
b. Proprietor in case of proprietorship firm,
c. Authorized signatories and Beneficial Owners (BOs) in case of Legal Entity (LE) customers.
Provided that in case of CDD of a proprietorship firm, Bank shall also obtain the equivalent e-document of the activity
proofs with respect to the proprietorship firm, apart from undertaking CDD of the proprietor.
Sunil SKA
52
(As we know that as per extant instructions in respect of the CDD of a proprietorship firm, in addition to the CDD of the
individual proprietor, any two documents in the name of the proprietary firm, from the given list of prescribed
documents, are also be obtained, as a proof of business/ activity.)
2. If there is a disruption in the V-CIP procedure, the same should be aborted and a fresh session initiated.
3. The sequence and/or type of questions, including those indicating the liveness of the interaction, during video
interactions shall be varied in order to establish that the interactions are real-time and not pre-recorded.
4. Any prompting, observed at end of customer shall lead to rejection of the account opening process.
5. The fact of the V-CIP customer being an existing or new customer, or if it relates to a case rejected earlier or if the
name appearing in some negative list should be factored in at appropriate stage of workflow.
6. The authorized official of the Bank performing the V-CIP shall record audio-video as well as capture photograph of
the customer present for identification and obtain the identification information using any one of the following:
* OTP based Aadhaar e-KYC authentication
* Offline Verification of Aadhaar for identification
* KYC records downloaded from CKYCR using the KYC identifier provided by the customer.
* Equivalent e-document of Officially Valid Documents (OVDs) including documents issued through Digi
locker.
Bank shall ensure to redact or blackout the Aadhaar number. In case of offline verification of Aadhaar using XML file or
Aadhaar Secure QR Code, it shall be ensured that the XML file or QR code generation date is not older than 3 days
from the date of carrying out V-CIP.
Further, in line with the prescribed period of three days for usage of Aadhaar XML file / Aadhaar QR code, Bank shall
ensure that the video process of the V-CIP is undertaken within three days of downloading / obtaining the identification
information through CKYCR / Aadhaar authentication / equivalent e-document, if in the rare cases, the entire process
cannot be completed at one go or seamlessly. However, REs shall ensure that no incremental risk is added due to
this.
7. If the address of the customer is different from that indicated in the OVD, suitable records of the current address
shall be captured, as per the existing requirement. It shall be ensured that the economic and financial
profile/information submitted by the customer is also confirmed from the customer undertaking the V-CIP in a suitable
manner.
8. Bank shall capture a clear image of PAN card to be displayed by the customer during the process, except in cases
where e-PAN is provided by the customer. The PAN details shall be verified from the database of the issuing authority
including through Digi locker.
9. Use of printed copy of equivalent e-document including e-PAN is not valid for the V-CIP.
Sunil SKA
53
10. The authorized official of the Bank shall ensure that photograph of the customer in the Aadhaar/OVD and PAN/e-
PAN matches with the customer undertaking the V-CIP and the identification details in Aadhaar/OVD and PAN/e-PAN
shall match with the details provided by the customer.
11. Assisted V-CIP shall be permissible when banks take help of Banking Correspondents (BCs) facilitating the
process only at the customer end. Banks shall maintain the details of the BC assisting the customer, where services of
BCs are utilized. The ultimate responsibility for customer due diligence will be with the bank.
12. All accounts opened through V-CIP shall be made operational only after being subject to concurrent audit, to
ensure the integrity of process and its acceptability of the outcome.
13. All matters not specified under the paragraph but required under other statutes such as the Information Technology
(IT) Act shall be appropriately complied with by the Bank.
It creates a win-win situation for the customer as well as the institution. On one hand, the onboarding costs for the
RE comes down by around90% making it extremely cost effective for Regulated Entities, on the other hand, due to
reduced turnaround time (TAT), it adds to customer delight.
Video- customer identification procedure (V-CIP) coupled with facial recognition/ matching software, automated data
extraction processes, along with state-of-the-art Machine Learning techniques is a more reliable and secured
onboarding technique.
The process for video KYC can be done from the comfort of the home of the customer. All that the customer needs
for onboarding, is a laptop or a smart phone, or a tablet with an active internet connection.
The process of Video-CIP shall be treated as face-to-face process, it means that the customer need not visit the
branch to complete any step of the process and customer will not be categorised or treated as ‘Non-Face to Face
customer’.
Reserve Bank of India has also extended the use of V-CIP functionality for updation/ Periodic updation of KYC of
eligible customers.
Sunil SKA
54
means an individual who ultimately owns or controls a client of a reporting entity or the person on whose behalf a
transaction is being conducted and includes a person who exercises ultimate effective control over a juridical person.
The Bank should determine whether a clients is acting an behalf of a beneficial owner, and identify the beneficial
owner and take all reasonable steps to verify the identity of the beneficial owner.
For opening an account of a Legal Person who is not a natural person, the beneficial owner (s) is to be identified &
all reasonable steps to verify his/her identity is to be undertaken.
As per section 34 of RBI Master Directions (KYC), 2016 “For opening an account of a Legal Person who is not a
natural person, the beneficial owner(s) shall be identified and all reasonable steps in terms of sub-rule (3) of Rule 9 of
the Rules to verify his/her identity shall be undertaken.”
As per Rule 9 (1) of PML Rules-2005, for CDD, Every reporting entity shall-
(a) at the time of commencement of an account-based relationship-
1. identify its clients, verify their identity, obtain information on the purpose and intended nature of the business
relationship; and
2. determine whether a client is acting on behalf of a beneficial owner and identify the beneficial owner and
take all steps to verify the identity of the beneficial owner.
Section 12 of PML act 2002, also inter-alia, casts obligation upon Bank/ other Reporting Entities to “identify the
beneficial owner, if any, of such of its clients, asmay be prescribed.”
Beneficial Owner
According to Chapter I, Section 2 (fa) of PMLA, 2002, Beneficial Owner means an individual who ultimately owns or
controls a client of a reporting entity or the person on whose behalf a transaction is being conducted and includes a
person who exercises ultimate effective control over a juridical person.
The Bank shall, according to Rule 9 (1) (a) (ii) of the PML (Maintenance of Records) Rules 2005, determine whether a
client is acting on behalf of a beneficial owner, and identify the beneficial owner and take all reasonable steps to verify
the identity of the beneficial owner.
For opening an account of a Legal Person who is not a natural person, the beneficial owner(s) is to be identified and all
reasonable steps to verify his/her identity is to be undertaken keeping in view the following:
1. Where the customer or the owner of the controlling interest is a company listed on a stock exchange, or is a
subsidiary of such a company, it is not necessary to identify and verify the identity of any shareholder or beneficial
owner of such companies.
2. In cases of trust/nominee or fiduciary accounts whether the customer is acting on behalf of another person as
trustee/nominee, or any other intermediary is determined. In such cases, satisfactory evidence of the identity of the
intermediaries and of the persons on whose behalf they are acting, as also details of the nature of the trust or other
arrangements in place shall be obtained.
Sunil SKA
55
1. Where the customer is a company, the beneficial owner is the natural person(s), who, whether acting alone or
together, or through one or more juridical persons, has/have a controlling ownership interest or who exercise control
through other means.
“Control” shall include the right to appoint majority of the directors or to control the management or policy
decisions including by virtue of their shareholding or management rights or shareholders agreements or voting
agreements.
2. Where the customer is a partnership firm, the beneficial owner is the natural person(s), who, whether acting
alone or together, or through one or more juridical person, has/ have ownership of/ entitlement to more than 15
percent of capital or profits of the partnership.
3. Where the customer is an unincorporated association or body of individuals, the beneficial owner is the
natural person (s), who, whether acting alone or together, or through one or more juridical person, has/ have
ownership of/ entitlement to more than 15 per cent of the property or capital or profits of the unincorporated association
or body of individuals.
Explanation: Term ‘body of individuals’ includes societies. Where no natural person is identified under (i), (ii) or (iii)
above, the beneficial owner is the relevant natural person who holds the position of senior managing official.
4. Where the customer is a trust, the identification of beneficial owner(s) shall include identification of the author of
the trust, the trustee, the beneficiaries with 15% or more interest in the trust and any other natural person exercising
ultimate effective control over the trust through a chain of control or ownership.
CDD of Beneficial owners has to be carried out at the time of on boarding and information should be collected in
Columns prescribed in CA AOF and fed in CBS.
Step 1 - Branches should obtain the Annexure I format along with the Account Opening Form (AOF) from the entities
and advise the entities to fill up the same in all the fields. Annexure I format contains the list of all the Beneficial
Owners of the entities as defined above.
Step 2 - Branches to verify and examine that the names of the Beneficial Owners as provided in Annexure I format
and their shares of capital or profit are as per the declaration made in the following documents:
Type of Entities Documents to be examined/verified
Company Memorandum and Article of Association.
Partnership Firm Partnership Deed.
Unincorporated association or a body Resolution of the managing body of such association
of Individuals
Trust Trust Deed
Step 3 - Once it is established that all the names of the Beneficial Owners along with their stake are made available,
the Branch should advise the entity to provide details of each such Beneficial Owner on Annexure II format (which is a
part as Annexure II of AOF for Non-Individuals) separately with Photograph and KYC documents for all of them as
required in case of an Individual.
Sunil SKA
56
Step 4 - Branch will examine that all the columns in Annexure II format are duly filled in, photograph pasted and KYC
documents attached. KYC documents provided as such are required to be verified with the originals thereof.
Step 5 - Consequent upon creation of CIF for entity, the Branch will create Individual CIFs for all the Beneficial Owners
separately based on the details of Annexure II format and KYC documents submitted to the Branch for each Beneficial
Owner.
Step 6 - Subsequent to creation of CIF for entity and Individual for Beneficial Owner, for opening the account of the
entity, the linking of the CIF of the entity and all the CIFs of Beneficial Owners should be done as it is done in case of a
joint account of Individuals.
Step 7 - After following up all the steps up to Step 6, opening of the account of the entity will be complete and then
only transactions to be allowed.
Step 8 - Each CIF, i.e. CIF of entity and CIFs of Beneficial Owners will have the separate distinct CKYCR number.
Existing Accounts : For existing accounts of entities, the proposed process is asunder:
Step 1 -IT Department (BID/IDSPM) to extract Circle/Network/Module/Region/Branch wise data of all types of entities
accounts, i.e. the accounts of companies, partnership, Trust, etc. where (a) names and percentage share of Beneficial
Owners are available and (b) names and percentage share of Beneficial Owners are not available.
Step 2 - After extraction of data as mentioned in Step 1, the same will be placed on the dashboard on SBITIMES
under Centralised Project Ganga: BOD initiatives.
Step 3 - The Circles/Branches will obtain data/details of names and percentage share of Beneficial Owners on
Annexure I and Annexure II from all the entities and follow the procedure as mentioned above for creation of CIFs of
the Beneficial Owners and the same will be linked with the concerned accounts of the entities.
Exemptions: The following categories of accounts are exempted from obtention of details of Beneficial Owners:
Company listed on a stock exchange, or a subsidiary of such a company,
Office accounts,
State Govt./Central Govt. accounts,
Accounts of Banks
Public Sector Undertakings (State/Central Govt.)
Sunil SKA
57
Module 2 - Assessment
Which one of the following is not an Officially Valid Document” (OVD)? B
a. Proof of possession of Aadhaar number
b. Aadhaar number/ card
c. Passport
d. Driving Licence
A well-designed KYC Policy complements the AML/ CFT systems deployed in a bank. Which one of the of the C
following is not true/ correct?
a. It helps in better understanding of customers and analysing the risk that they pose to the Bank and society at
large.
b. It provides the AML/ CFT cell with an accurate profile of the customers enabling a meaningful monitoring of
transaction patterns and better decision-making regarding reporting of a suspicious transaction.
c. It prevents the bank from lending to the persons with poor financials and saves the precious capital of bank.
d. It prevents on-boarding of persons who carry a dubious background. and who may be a potential threat to the
institution from the perspective of money laundering and financing of terrorism.
Which statement is NOT correct in respect of obtention of Aadhar number for CDD of an Individual? C
a. Banks can obtain the Aadhaar number from a customer where he is desirous of receiving any benefit or subsidy
in his account (DBT).
b. Banks can obtain the Aadhaar number from a customer where he decides to submit his Aadhaar number
voluntarily to a bank.
c. Banks must obtain the Aadhaar number/card from a customer whenever he is desirous of opening an account
with a Bank.
d. All the above statements are correct.
Some of the Customer categories may carry more than the ordinary risk of money laundering and terrorist D
financing and therefore warrant a be of the list given below, which Customer category does not fall under this
category?
a. Politically Exposed Persons (PEPs).
b. Multi-Level Marketing (‘MLM’) Companies.
c. Relatives of Politically Exposed Persons.
d. Account of NGOs promoted by UNO or its agencies.
Which one of the following is not an Officially Valid Document” (OVD)? A
a. Landline Telephone Bill
b. The Voter's Identity Card issued by the Election Commission of India,
c. Job card issued by NREGA duly signed by an officer of the State Government.
d. Letter issued by the National Population Register containing details of name and address.
Which of the following statements is correct regarding the requirement of the undertaking of customer due D
diligence (CDD) by the financial institutions?
a. Branches/ offices will undertake CDD while establishing business relationship.
b. Branches/ offices will undertake CDD while carrying out occasional transactions above the applicable
designated threshold for the account.
c. Branches/ offices will undertake CDD while there is a suspicion of money laundering or financing of terrorism,
regardless of any exemptions or thresholds.
d. All the statements are correct
What is the periodicity of Customer Risk Categorisation (CRC) for low risk individuals and entities? A
a. Every 10 Years
b. Every 8 Years
c. Every 5 years
d. Every 2 Years
An account becomes KYC Non-Compliant/ KYC discrepant, and the bank takes steps to make such accounts KYC C
Compliant. However, if the customer is not forthcoming to provide the necessary documents and/or information.
What steps bank will take?
a. Bank will immediately close the account.
b. Bank will convert the account to Small Account.
Sunil SKA
58
c. Bank will take the steps towards phased imposition of partial / full freeze and eventual closure of the account.
d. Bank will impose and recover a penalty on the customer till the account become KYC compliant
Which of the following statement is correct regarding identification of beneficial owner based on Controlling D
ownership interest in case of a company?
a. Controlling ownership interest means ownership of/entitlement to more than 51 per cent of the shares or capital
or profits of the company.
b. Controlling ownership interest means ownership of/entitlement to 25 per cent or more of the shares or capital or
profits of the company.
c. Controlling ownership interest means ownership of/entitlement to 51 per cent or more of the shares or capital or
profits of the company.
d. Controlling ownership interest means ownership of/ entitlement to more than 25 per cent of the shares or capital
or profits of the company.
Which of the following statements regarding Customer Identification Procedures (CIP) is correct? D
a. Carrying out transactions for a non-account-based customer, that is a walk-in customer, where the amount
involved is equal to or exceeds rupees twenty thousand, whether conducted as a single transaction or several
transactions that appear to be connected.
b. Branches shall undertake Customer Identification while carrying out transactions for a non-account-based
customer, that is a walk-in customer, where the amount involved is equal to or exceeds rupees one lakh, whether
conducted as a single transaction or several transactions that appear to be connected.
c. Branches shall undertake Customer Identification while carrying out transactions for a non-account-based
customer, that is a walk-in customer, where the amount involved is equal to or exceeds rupees two lakh, whether
conducted as a single transaction or several transactions that appear to be connected.
d. Branches shall undertake Customer Identification while carrying out transactions for a non-account-based
customer, that is a walk-in customer, where the amount involved is equal to or exceeds rupees fifty thousand,
whether conducted as a single transaction or several transactions that appear to be connected.
Which of the following statements regarding Customer Identification Procedures (CIP) is correct? D
a. Customer identification requires identifying the customer and verifying his/ her identity by using reliable,
independent source documents, data, or information.
b. The first requirement of Customer Identification Procedures (CIP) to be satisfied is that a prospective customer
is who he/ she claims to be.
c. Customer identification means undertaking client due diligence measures while commencing an account-based
relationship including identifying and verifying the customer and the beneficial owner.
d. All statements are correct.
What is the periodicity of Customer Risk Categorisation (CRC) for Medium risk individuals and entities? A
a. Every 8 Years
b. Every 5 years
c. Every 10 Years
d. Every 2 Years
Who is a “Non face to face” customer for bank? B
a. When a customer is a legal person.
b. A customer with whom the Branch or any branch official has no direct interaction at the time of opening of
account.
c. A customer who executes all his transactions through Net-Banking and rarely visits his home branch.
d. A customer entering branch premises with face covered with mask.
Which of the following statements regarding Customer Identification Procedures (CIP) is NOT correct? A
a. Branches shall undertake Customer Identification while selling of third-party products as agents, selling our own
products, payment of dues of credit cards/ sale and reloading of prepaid/ travel cards and any other product for
more than Rs. 500,000/-
b. Branches shall undertake Customer Identification while carrying out transactions for a non-account-based
customer, that is a walk-in customer, where the amount involved is equal to or exceeds Rs 50000/-, whether
conducted as a single transaction or several transactions that appear to be connected.
c. Branches shall undertake Customer Identification while selling of third-party products as agents, selling our own
products, payment of dues of credit cards/ sale and reloading of prepaid/ travel cards and any other product for
more than Rs. 50,000/-
Sunil SKA
59
b. Branches shall undertake Customer Identification while when the Bank has reason to believe that a customer
(account based or walk-in) is intentionally structuring a transaction into a series of transactions below the threshold
of Rs 50000/-.
In which of the following circumstances an account becomes KYC Non-Compliant/ KYC discrepant? D
a. Legacy Accounts found KYC non-compliant on re-examination/audit/ inspection.
b. Accounts opened with Deemed OVD but updated OVD is not provided within 3 months.
c. Accounts where customer does not co-operate to provide CDD or additional information, including Beneficial
Ownership information.
d. All of the above
What is Aadhaar Paperless Offline e-KYC/ Offline verification of Aadhaar? C
a. Aadhaar Paperless Offline e-KYC is an unsecure and non shareable document which can be used by specific
Aadhaar holders for offline verification of identification, by sharing Aadhar number or core biometrics.
b. Aadhaar Paperless Offline e-KYC is a secure and shareable document which can be used by any Aadhaar
holder for online verification of identification, without sharing Aadhar number or core biometrics.
c. Aadhaar Paperless Offline e-KYC is a secure and shareable document which can be used by any Aadhaar
holder for offline verification of identification, without sharing Aadhar number or core biometrics.
d. Aadhaar Paperless Offline e-KYC is a unsecure and shareable document which can be used by any Aadhaar
holder for offline verification of identification or through or core biometrics.
Which of the following statement is correct regarding the identification of a beneficial owner, where the customer is C
a trust?
a. Where the customer is a trust, the identification of beneficial owner(s) shall include identification of the author of
the trust, the trustee, the beneficiaries with more than 25% interest in the trust and any other natural person
exercising ultimate effective control over the trust through a chain of control or ownership.
b. Where the customer is a trust, the identification of beneficial owner(s) shall include identification of the author of
the trust, the trustee, the beneficiaries with 25% or more interest in the trust and any other natural person
exercising ultimate effective control over the trust through a chain of control or ownership.
c. Where the customer is a trust, the identification of beneficial owner(s) shall include identification of the author of
the trust, the trustee, the beneficiaries with 15% or more interest in the trust and any other natural person
exercising ultimate effective control over the trust through a chain of control or ownership.
In which of the following situations Customer Identification Procedure (CIP) is not required to be carried out, by the B
Branches/offices?
a. Carrying out any international money transfer operations for a person who is not an account holder.
b. While effecting remittance for a non-customer who has approached for remitting INR 20000 through NEFT in
cash.
c. When the Branch/ Office doubts the authenticity or adequacy of the customer identification data it has obtained.
d. While establishing an account-based relationship
In which of the following instances, Customer Due Diligence (CDD) Procedure in the case of an Individuals is D
required?
a. While establishing account-based relationship with an individual.
b. While establishing account-based relationship with a beneficial owner/ authorized signatory or the power of
attorney holder related to any
c. While establishing account-based relationship with an authorized signatory or the power of attorney holder
related to any legal entity.
d. All the statements are correct.
If, during Name Screening process, the ID of the applicant/customer is different from the ID of the corresponding A
person in the negative lists, then the name and other identifiers of the applicant/ customer are matched with those
of the corresponding person given in the negative lists. In case the name and at least ____________ other
identifiers match, it is considered a positive match.
a. two
b. three
c. one
d. four
An account which has been opened using Deemed OVD, for the limited purpose of current address, within what A
period the customer will provide the OVD updated with current address?
Sunil SKA
60
a. The customer shall submit OVD updated with current address within a period of three months of submitting the
deemed OVD.
b. The customer shall submit OVD updated with current address within a period of six months of submitting the
deemed OVD.
c. The customer shall submit OVD updated with current address within a period of nine months of submitting the
deemed OVD.
d. The customer shall submit OVD updated with current address within a period of twelve months of submitting the
deemed OVD.
Bank shall take steps to make KYC non-compliant accounts KYC Compliant first. However, if the customer is not D
forthcoming to provide the necessary documents and/or information, Bank will take the steps towards phased
imposition of partial / full freeze and eventual closure of the account. Who is the authority to permit closure of such
accounts?
a. The competent authority to permit closure of such accounts shall be the Branch Head of any scale.
b. The competent authority to permit closure of such accounts shall be the General Manager (Network), to permit
closure of such accounts.
c. The competent authority to permit closure of such accounts shall be the Branch Head, not below the rank of
Assistant General Manager. In all other cases, Regional Manager of the R.B.O shall be the competent authority to
permit closure of such accounts.
d. The competent authority to permit closure of such accounts shall be the Branch Head, not below the rank of
Chief Manager in Senior Management Grade. In all other cases, any Chief Manager of the R.B.O shall be the
competent authority to permit closure of such accounts.
“Where no natural person is identified in case the client is a Company / Partnership firm / Unincorporated A
Association or Body of Individuals, Who will be treated as ‘Beneficial Owner’ as per PML Amendment Rules 2013
?
a. The relevant natural person who holds the position of senior managing official.
b. Any one of the signatories to the account.
c. All of the signatories to the account.
d. None of the Above.
An account becomes KYC Non-Compliant/ KYC discrepant accounts in certain circumstances? Which of the B
following statement is NOT correct in this regard?
a. Accounts where KYC Updation is overdue.
b. Small accounts where OVD is not provided within a period of 12 months, subject to relaxations provided by RBI/
Govt. of India.
c. Accounts opened with Deemed OVD but updated OVD is not provided within 3 months.
d. Small accounts where OVD is not provided within a period of 24 months, subject to relaxations provided by RBI/
Govt. of India.
Which of the following is not true regarding the Video-based Customer Identification Process (V-CIP)? A
a. The official of the Bank performing the V-CIP shall record video as well as capture photograph of the customer
present for identification.
b. Video CIP is an alternate method of customer identification with facial recognition and customer due diligence
by an authorised official of the Reporting Entity.
c. Video based CIP will be treated as Non face-to-face CIP.
d. Video CIP is done by undertaking seamless, secure, live, informed consent based audio-visual interaction with
the customer to obtain identification information required for CDD purpose,
Which of the following documents are not required by the bank for opening an account of a Trust? C
a. Permanent Account Number or Form No.60 of the trust
b. Registration certificate and Trust deed
c. Memorandum and Articles of Association
d. Documents relating to beneficial owner managers officers or employees as the case may be holding an attorney
to transact on its behalf
If a customer, who has submitted Aadhar number voluntarily, wants to provide current address different from the C
address contained in Aadhaar records, which of the document required?
a. Identity card issued by the employer which is a listed company.
b. Letter from employer confirming his current address.
Sunil SKA
61
Sunil SKA
62
Information and data are the most strategic assets of an organization. It is critical to maintain correct business data for
effectual decision-making.
Erroneous data entered into CBS leads to data impurities which translates into Non-Compliance of Regulatory
guidelines. Bank is receiving heavy criticism from RBI on account of such avoidable errors caused due to lack of
awareness among the operating functionaries. Bank has released an advisory analysing the impact from regulatory
compliance perspective due to feeding of erroneous data in CBS fields at the time of onboarding of customer or
feeding additional data.
Wrong or inaccurate data: The information that has not been entered correctly or maintained.
Inappropriate data: Data which has been entered in the wrong field.
Non-conforming data: Data which has not been normalized as per the system of records.
Duplicate data: A single Account, Contact, etc. that occupies more than one record in the database.
Poor data entry: Misspellings, typo errors, transpositions, and variations in spelling, naming or formatting.
Though avoiding erroneous data completely from a system is very difficult, it should be the endeavor of every
institution and its employees to strive for most accurate data in the system.
Compliance risk is the threat that is posed to an organization’s financial, organizational, and reputational standing
resulting from non-compliances of laws, regulations, codes of conduct, or internal systems and procedures. An
organization, for understanding it’s risk exposure, may need to improve its risk assessment processes to fully
incorporate compliance risk exposure.
The KYC guidelines or compliances related to KYC primarily emanate from the provisions of Prevention of Money-
Laundering Act, 2002 and the Prevention of Money-Laundering (Maintenance of Records) Rules, 2005, as amended
from time to time by the Government of India. The regulators such as the Reserve Bank of India (RBI), the Securities
and Exchange Board of India (SEBI), and the Insurance Regulatory and Development Authority (IRDA) are required,
further to issue directions to the entities, which they regulate, as well as to ensure compliance of these directions.
RBI through its Master Directions, RBI (KYC) Directions, 2016, has issued instructions for the regulated entities to
follow the customer identification procedures while undertaking a transaction either by establishing an account-based
relationship or otherwise and monitor their transactions.
The RBI (KYC) directions, 2016 make it mandatory for REs to have a Know Your Customer (KYC) policy duly
approved by the Board of Directors of REs or any committee of the Board to which power has been delegated.
Sunil SKA
63
Hence, Know Your Customer (KYC) procedures, are a critical function to assess customer risk and a legal as well as
regulatory requirement to comply with the Prevention of Money Laundering Act (PMLA) -2002 and the Prevention of
Money-Laundering (Maintenance of Records) Rules, 2005.
Most of the recent penalties imposed by RBI on banks have been due to non-compliance of AML, CFT, KYC
guidelines.
A financial institution ought to know its customers well enough, which is not possible without pure and authentic data.
A financial institution (FI) would face fines, sanctions, and reputational damage, if it deals with a money launderer or a
terrorist in the absence of correct data.
For financial institutions, following KYC guidelines is more than a financial risk –it’s the legal and regulatory
compliance.
“KYC” essentially refers to the steps taken by a financial institution (or business)to:
Establish customer identity.
Understand the nature of the customer’s business and activities, the primary goal being to satisfy that the
sources of the customer’s funds are legitimate.
Assess money laundering and terror financing risks associated with the customer.
For any financial institution, it is important to make sure that the data as well as the prospective customer is
trustworthy. Customer due diligence (CDD) coupled with correct data, is the critical tool of effectively managing the
related risks and protecting the FI against criminals, terrorists, and Politically Exposed Persons(PEPs) who might
present an enhanced risk.
Following are the probable impacts of erroneous data resulting in wrong reporting of data to Regulators, FIU –
IND and other Govt Agencies-
1. Erroneous data- ‘Name /First/ Last Name / Maiden Name/ Father/Mother’s Name’:
It is to be ensured that no account is opened in an anonymous or fictitious/benami name. The name Screening
process is done to ensure that the identity of the customer does not match with any person or entity, whose name
appears in the sanctions lists circulated by the Reserve Bank of India. The wrong name may -
Lead to On- boarding of a person whose name appears in the sanctions lists and bank may face
Regulatory punitive action.
Impact the quality and result of name screening against the negative lists.
Minor may open their accounts in major head category, may lead bank to land into trouble under Contract
Act.
Sunil SKA
64
May impact the quality and result of name screening against the negative lists
Conversion of accounts from minor to major, after the customer turns 18, will be impacted.
May impact monitoring as citizens of some specific countries are not permitted to open accounts in India.
May impact proper reporting to FIU-India in mandatory report i.e., the Cross Border Wire Transfer Reports-
(CBWTR).
9. Feeding of erroneous data regarding ‘Country code of jurisdiction of residence’: may have impact on
FATCA/CRS compliance related issues.
10. Feeding of erroneous data regarding ‘Permanent Account Number(PAN)/ Form No. 60’ - Where Permanent
Account Number (PAN) is obtained, the same is to be verified from the verification facility of the issuing authority.
Feeding of wrong PAN number may lead to deduction of Tax at incorrect rate, wrong filing of statutory
returns at Bank level, etc and it may invite penalty from IT Department & cause reputation risk.
Wrong feeding or non-feeding of PAN details may lead to wrong information to FIU-India.
we may not follow-up for completing KYC after prescribed period and that may lead to non-compliance.
Sunil SKA
65
Permitting all transaction, irrespective of value, will breach RBI Guidelineson ‘Small A/Cs’
12. Feeding of erroneous data regarding ‘Marital Status’: may lead to wrong filing of Regulatory returns.
13. Feeding of erroneous data regarding ‘Political exposed person (PEP)/Relative to PEP’:
Not categorising a PEP’s account properly may lead to non-compliance of guidelines of Money Laundering
under PMLA act 2002.
14. Feeding of erroneous data regarding ‘Address Details: Current/correspondence/local address (Address
type, Proof of Address, Country name, State, City, District etc.)’ - Wrong feeding of Address details-
Impacts the quality and result of name screening against the negative lists as per regulatory guidelines.
Important communication from Bank may not reach out the customer, despatch of ATM card, cheque book
etc. may fall into wrong hands.
Not exercising due diligence in identifying the customers based on prescribed documents as per bank’s
KYC policy may lead to punitive action of Regulators.
Effective KYC involves knowing customers’ identity, financial status, and the risk they pose to the bank and the society
at large.
Non-compliance with KYC/AML/CFT standards can lead to use of the different channels of the Bank for Money
Laundering/financing terrorism activities and thus expose the Bank to risks such as Operational Risk, Reputation Risk,
Compliance Risk and Legal Risk etc.
As we are aware ‘Name Screening’ is an essential part of Customer Acceptance Policy of a Financial Institution, to
ensure that the Financial Institution does not on-board any person or entity whose identity matches with any person or
entity in the Negative Lists, and to weed out those persons or entities already on board, and whose name
subsequently figures in any of the Negative Lists.
Name-Screening is a process by which a given Name of a person or entity is screened against various lists circulated
by National and International Organizations, Regulators, Agencies, and the Institution itself. The necessity of creating a
process of Name Screening at the time of customer on-boarding and at periodic intervals, arises from regulations/
guidelines by RBI and FIU-IND and bank’ own KYC/AML/ CFT policy.
Through Name Screening, a Financial Institution reduces the risk of misuse of its channels and facilities by
unscrupulous elements for Money Laundering and/ or Terrorist Financing, by filtering out persons of criminal and
dubious background at the on-boarding stage itself.
Sunil SKA
66
When a name match alert is displayed in CBS at the time of creating a new CIF or renewal of an existing CIF, the
name and ID details of the applicant / customer is matched with those of the corresponding name against which the
match has occurred in a negative list(s).
In such cases, where the Identity Document (ID) of the applicant/customer is different from the ID of the corresponding
person in the negative lists (for e.g. the customer has produced PAN card, but the available Id of the corresponding
person in the negative list is Passport), then, the name and other identifiers of the applicant/customer (date of birth,
father's name, address, mobile no.) are matched with those of the corresponding person given in the negative lists.
Incase the name and at least two other identifiers match, it is considered a positive match. (For e.g. if the name and
date of birth match but father's name/ address do not match, it cannot be taken as positive match).
If correct data related to the customers profile, such as name of the customer, name of father/ spouse, date of birth,
sex, profession, nationality etc is not available, the bank will not be able to decide the positive/ negative match as per
the afore mentioned procedure.
Thus, the bank may not be able to comply with the Master directions issued by RBI in this regard, as well as the rules
framed under UAPA. 1967, with the purpose of filtering out persons of criminal and dubious background.
Section 53 of RBI (KYC) Directions, 2016, amended up to 10.05.2021 especially directs the banks and other REs that
in case of a positive match - “The procedure laid down in the UAPA Order dated February 2, 2021, shall be strictly
followed and meticulous compliance with the Order issued by the Government shall been sured by REs.”
The “ISIL (Da’esh) &Al-Qaida Sanctions List”, which includes names of individuals and entities associated
with the Al-Qaida. The updated ISIL &Al-Qaida Sanctions List is available at
https://scsanctions.un.org/fop/fop?xml=htdocs/resources/xml/en/consolidated.xml&xslt=htdocs/resources/xsl/e
n/al-qaida-r.xsl
The “1988 Sanctions List”, consisting of individuals (Section A of the consolidated list) and entities (Section
B) associated with the Taliban which is available at
https://scsanctions.un.org/fop/fop?xml=htdocs/resources/xml/en/consolidated.xml&xslt=htdocs/resources/xsl/e
n/taliban-r.xsl.
As per section 52 of RBI (KYC) Direction, 2016, updated up to 10.05.2021, In addition to the above lists, other
UNSCRs (United Nations Security Council Resolutions), circulated by the Reserve Bank in respect of any other
jurisdictions/entities from time to time shall also be taken note of.
RBI directions make it mandatory for Banks and other REs, to report details of accounts resembling any of the
individuals/entities in the negative lists referred in the aforesaid direction, to FIU-IND apart from advising Ministry of
Home Affairs as required under UAPA notification dated the February 2, 2021.
In the absence of correct data, the bank will be running the risk of non-compliance of the regulatory instructions
regarding not allowing to, on-board any person or entity whose name / identity matches with the name/ identity of any
person or entity, whose name is appearing in the Negative Lists.
Sunil SKA
67
1. freeze, seize or attach funds and other financial assets or economic resources held by, on behalf of or at the
direction of the individuals or entities listed in the Schedule to the Order, or any other person engaged in or suspected
to be engaged in terrorism;
2. prohibit any individual or entity from making any funds, financial assets or economic resources or related services
available for the benefit of the individuals or entities listed in the Schedule to the Order or any other person engaged in
or suspected to be engaged in terrorism;
3. prevent the entry into or the transit through India of individuals listed in the Schedule to the Order or any other
person engaged in or suspected to be engaged in terrorism".
"Schedule to Order" means the Prevention and Suppression of Terrorism (Implementation of Security Council
Resolutions) Order, 2007, as may be amended from time to time.
In order to ensure expeditious and effective implementation of the provisions of Section 51A, Ministry of Home Affairs,
has issued revised procedural guideline on 2nd Feb 2021 for being followed by Banks and other Reporting Entities.
The details of the order, interalia, are as under -
On such revisions, the Ministry of External Affairs would electronically forward the changes without delay to
the designated Nodal Officers in the Ministry of Corporate Affairs, CBIC, Financial Regulators, FIU–IND,CTCR
Division and Foreigners Division in MHA.
The list of designated persons shall be forwarded by the Financial Regulators to the banks, stock exchanges/
depositories, intermediaries regulated by SEBI and insurance companies.
Procedure regarding funds, financial assets or economic resources or related services held in the
form of bank accounts, stocks or Insurance policies etc. (Compliance for Banks)
1. The Financial Regulators will issue necessary guidelines to banks, stock exchanges/depositories, intermediaries
regulated by the SEBI and insurance companies requiring them -
1. To maintain updated designated lists in electronic form and run a check on the given parameters on a daily
basis to verify whether individuals or entities listed are holding any funds, financial assets or economic
resources or related services held in the form of bank accounts, stocks, Insurance policies etc., with them.
2. In case, the particulars of any of their customers match with the particulars of designated
individuals/entities, the banks, stock exchanges/depositories, intermediaries regulated by SEBI, insurance
companies shall immediately inform full particulars of the funds, financial assets or economic resources or
related services held in the form of bank accounts, stocks or Insurance policies etc., held by such customer on
their books to the Central [designated] Nodal Officer for the UAPA, at Fax No.011-23092551 and also convey
over telephone No. 011-23092548.The particulars apart from being sent by post shall necessarily be conveyed
on email id: [email protected] .
3. The banks, stock exchanges/depositories, intermediaries regulated by SEBI and insurance companies shall
also send a copy of the communication mentioned above to the UAPA Nodal Officer of the State/UT where the
account is held and to Regulators and FIU-IND, as the case may be, without delay.
Sunil SKA
68
4. In case, the match of any of the customers with the particulars of designated individuals/entities is beyond
doubt, the banks, stock exchanges/depositories, intermediaries regulated by SEB Iand insurance companies
shall prevent such designated persons from conducting financial transactions, under intimation to the Central
[designated] Nodal Officer for the UAPA at Fax No.011-23092551 and also convey over telephoneNo.011-
23092548. The particulars apart from being sent by post should necessarily be conveyed on e-mail id: jsctcr-
[email protected] , without delay.
5. The banks, stock exchanges/depositories, intermediaries regulated by SEBI, and insurance companies shall
file a Suspicious Transaction Report (STR) with FIU-IND covering all transactions in the accounts, mentioned
above, carried through or attempted as per the prescribed format.
2. On receipt of the particulars, the Central [designated] Nodal Officer for the UAPA would cause a verification to be
conducted by the State Police and/or the Central Agencies so as to ensure that the individuals/ entities identified
by the banks, stock exchanges/depositories, intermediaries and insurance companies are the ones listed as
designated individuals/ entities and the funds, financial assets or economic resources or related services, reported
by banks, stock exchanges/depositories, intermediaries regulated by SEB Iand insurance companies are held by the
designated individuals/entities. This verification would be completed expeditiously from the date of receipt of
such particulars.
3. In case, the results of the verification indicate that the properties are owned by or are held for the benefit of
the designated individuals/entities, an order to freeze these assets under Section 51A of the UAPA would be
issued by the Central[designated] nodal officer for the UAPA without delay and conveyed electronically to the
concerned bank branch, depository and insurance company under intimation to respective Regulators and FIU-
IND.
The order shall be issued without prior notice to the designated individual/entity.
Procedure regarding implementation of requests received from foreign countries under U.N. Security
Council Resolution 1373 of2001:
1. The U.N. Security Council Resolution No.1373 of 2001 obligates countries to freeze without delay the funds or other
assets of persons who commit, or attempt to commit, terrorist acts or participate in or facilitate the commission of
terrorist acts; of entities owned or controlled directly or indirectly by such persons; and of persons and entities acting
on behalf of, or at the direction of such persons and entities, including funds or other assets derived or generated from
property owned or controlled, directly or indirectly, by such persons and associated persons and entities.
2. The Central [designated] Nodal Officer for the UAPA shall cause the request to be examined without delay, so as to
satisfy itself that on the basis of applicable legal principles, the requested designation is supported by reasonable
grounds, or a reasonable basis, to suspect or believe that the proposed designee is a terrorist, one who finances
terrorism or a terrorist organization, and upon his satisfaction, request would be electronically forwarded to the Nodal
Officers in Regulators, FIU-IND and to the Nodal Officers of the States/UTs. The proposed designee, as mentioned
above would be treated as designated individuals/entities.
Procedure regarding unfreezing of funds, financial assets or economic resources or related services of
individuals/entities inadvertently affected by the freezing mechanism upon verification that the person or
entity is not a designated person:
1. Any individual or entity, if it has evidence to prove that the freezing of funds, financial assets or economic
resources or related services, owned/held by them has been inadvertently frozen, they shall move an
application giving the requisite evidence, in writing, to the concerned bank, stock exchanges/depositories,
intermediaries regulated by SEBI, insurance companies, Registrar of Immovable Properties, ROC, Regulators
of DNFBPs and the UAPA Nodal Officers of State/UT. \
Sunil SKA
69
3. The Central [designated] Nodal Officer for the UAPA shall verify on the basis of the evidence furnished by
the individual/entity, and, if satisfied, he/she shall pass an order, without delay, unfreezing the funds, financial
assets or economic resources or related services, owned/held by such applicant, under intimation to the
concerned bank, stock exchanges/depositories, intermediaries regulated by SEBI, insurance company,
Registrar of Immovable Properties, ROC, Regulators of DNFBPs and the UAPA Nodal Officer of State/UT.
However, if it is not possible for any reason to pass an Order unfreezing the assets within 5 working days, the
Central[designated] Nodal Officer for the UAPA shall inform the applicant expeditiously.
Procedure for communication of compliance of action taken under Section 51A: The Central [designated]
Nodal Officer for the UAPA and the Nodal Officer in the Foreigners Division, MHA shall furnish the details of funds,
financial assets or economic resources or related services of designated individuals/entities frozen by an order, and
details of the individuals whose entry into India or transit through India was prevented, respectively, to the Ministry of
External Affairs for onward communication to the United Nations.
Procedure regarding communication of the Order issued under Section 51A of Unlawful Activities
(Prevention) Act, 1967: The order issued by the Central [designated] Nodal Officer for the UAPA relating to funds,
financial assets or economic resources or related services, shall be communicated to all the UAPA nodal officers in the
country, the Regulators of Financial Services, FIU-IND and DNFBPs, banks, depositories/stock exchanges,
intermediaries regulated by SEBI, Registrars performing the work of registering immovable properties through the
UAPA Nodal Officer of the State/UT.
In absence of correct data regarding Name/ Spouse/ Father’s name, Date of Birth/ Date of Incorporation/ and
other identifier like correct identification documents, banks may fail to ensure proper compliance with above
procedural order and expose itself to operational, legal & compliance risk which in turn will cause huge
reputational loss to the bank.
RBI instructions on Money Laundering and Terrorist Financing Risk Assessment by Banks & other REs -
In terms of RBI (KYC) directions, 2016-
1. REs shall carry out ‘Money Laundering (ML) and Terrorist Financing (TF)Risk Assessment’ exercise
periodically to identify, assess and take effective measures to mitigate its money laundering and terrorist
financing risk for clients, countries or geographic areas, products, services, transactions or delivery channels,
etc.
2. The assessment process should consider all the relevant risk factors before determining the level of overall
risk and the appropriate level and type of mitigation to be applied. While preparing the internal risk
assessment, REs shall take cognizance of the overall sector-specific vulnerabilities, if any, that the
regulator/supervisor may share with Res from time to time.
3. The risk assessment by the RE shall be properly documented and be proportionate to the nature, size,
geographical presence, complexity of activities/structure, etc. of the RE. Further, the periodicity of risk
assessment exercise shall be determined by the Board of the RE, in alignment with the outcome of the risk
assessment exercise. However, it should be reviewed at least annually.
4. The outcome of the exercise shall be put up to the Board or any committee of the Board to which power in
this regard has been delegated and should be available to competent authorities and self-regulating bodies.
Sunil SKA
70
5. REs shall apply a Risk Based Approach (RBA) for mitigation and management of the identified risk and
should have Board approved policies, controls and procedures in this regard. Further, REs shall monitor the
implementation of the controls and enhance them if necessary.
A critical element to a successful risk mitigation, both at the institutional level anda t the micro level of each account, is
ensuring the compliance of KYC policy and guidelines at each step that is from the onboarding stage to the monitoring
of transactions in the account through customer due diligence. While the regulator may provide guidelines, it’s up to
the individual institution to determine the exact level of risk and applying Risk Based approach (RBA) for management
of the identified risk.
The correct data will only make it possible to manage the related risk and abide by regulatory and legal requirements.
Customer Risk Categorisation enables a bank to follow a risk-based approach on AML/CFT. The Risk categorisation
will not reflect the true state of affairs in case of erroneous data.
Erroneous data may lead to Improper classification of risk category of the customer- High risk customer may be
categorised as low risk or vice-versa.
For proper risk assessment of business relationship with customers and evolving suitable monitoring mechanism, all
customers, individuals and non individuals are to be categorised as High, Medium and Low risk based on correct data,
based on the assessment and risk perception of the Bank which will be erroneous in case of spurious data.
Risk categorisation is undertaken based on certain pre-approved parameters, already specified in the KYC policy,
such as customer’s identity, social/financial status, nature of business activity, and information about the customer’s
business and their location etc, hence correct and complete data is required for proper risk categorization.
In case the data is not correct, bank will not be able to undertake Enhanced Due diligence in respect of customers
qualifying for EDD.
Ongoing monitoring, which is an essential element of effective KYC/AML procedures, will not be effective in the
absence of correct data.
Ongoing due diligence is to be exercised in respect of customers to monitor transactions to ensure that they are
consistent with the customer’s personal profile, business / risk profile and source of funds.
Sunil SKA
71
1. The extent of monitoring depends on the risk category of the account.High risk accounts must be subjected to more
intensified monitoring.
3. Review of risk categorization of customers should be carried out at aperiodicity of not less than once in six months.
4. Transactions in accounts of Marketing firms especially accounts ofMultilevel Marketing Firms/ Companies should be
closely monitored
It’s not enough to just check the customer once at the time of onboarding, are porting entity, needs to have a system to
monitor the customer on an ongoing basis. The ongoing monitoring function includes oversight of financial transactions
and accounts based on thresholds and red flags developed as necessary part of a customer’s risk profile.
In case of reasonable ground of suspicion, a Suspicious Transaction Report (STR)/Suspicious Activity Report (SAR)
must be filed.
AML/CFT department undertakes monitoring of transactions to analyse unusual trend of transactions, un-matching
with the status of the account holder.
Wrong feeding or no feeding of data may lead to wrong conclusion and wrong reporting leading to penalties from FIU-
IND/ RBI.
Following are the probable impacts of erroneous data impacting Customer Risk Categorisation-
2. Feeding of erroneous data regarding ‘Customer Type’: Normal, Small or Minor - The wrong classification
impacts the Customer Risk Categorization.
3. Feeding of erroneous data regarding ‘Nationality’ also Impacts the Customer Risk Categorization.
4. Feeding of erroneous data regarding ‘Citizenship’: Impacts the classification of proper risk category of the
customer.
5. Feeding of erroneous data regarding ‘Country code of jurisdiction of residence’: May also lead to wrong
classification of risk of the customer.
6. Feeding of erroneous data regarding ‘Liberalized KYC-Yes/No’: Impacts the Customer Risk Categorization due
to wrong selection of customer profile customer profile.
Sunil SKA
72
These are high risk category accounts and need enhanced due diligence and up-dation of periodical risk
categorisation. Not categorising a PEP’s account properly may lead to non-compliance of guidelines of Money
Laundering under PMLA act 2002.
Analysing the transactions conducted by a customer/ non-customer, with a view to ensuring that the value, nature and
pattern of transaction is consistent with the customer profile and/ or to determine whether the transaction under
consideration has an economic rationale, is termed as transaction monitoring.
The Prevention of Money laundering Act, 2002 and the Rules there under require every banking company to furnish
details of suspicious transactions whether or not made in cash in the form of a suspicious transaction report.
The Customer Profile must be created as accurately as possible, as it determines the risk category of the customer.
The customer should be advised that correct profiling is in the customer’s interest to be compliant with various
directives from the bank, RBI and the relevant laws/ enactments issued from time to time by the Government.
For the purpose of monitoring individual transactions in accounts correct and updated profile of the customer is the key
requirement. Any error in the profile will lead to ineffective monitoring and wrong or non-reporting of suspicious
transactions.
1. “Customer Profile” of individual account holders is compiled from the information in the account opening forms,
covering information like Occupation/activity, Source of funds, Monthly Income, Annual turnover(in the case of
business), Date of Birth, Educational qualification, Details of existing credit facilities, if any, Assets (approximate value)
etc.
2. Customer profiles are to be prepared for all accounts: Customer profiles must be reviewed whenever the branch has
doubt about the authenticity/veracity or the adequacy of the previously obtained customer identification data.
In case of erroneous data, the customer profiling exercise will not be effective to manage the related risk.
Following are the probable impacts of erroneous data impacting monitoring and reporting of transactions-
AML/CFT department undertakes monitoring of transactions to analyse the unusual trend of transactions,
un-matching with the status of the accountholder. Wrong feeding of occupation code or no feeding may lead AML/CFT
department to draw wrong conclusions and wrong reporting to FIU-IND.
Sunil SKA
73
May lead to wrong reporting to FIU-India on the ground of suspicion while filing STR.
May impact the quality and result of name screening against the negative lists
May mislead the case manager at AML-CFT while analysing case/alert generated in the account (due to
wrong calculation of age such as students/ senior citizen etc.).
May mislead the case manager at AML-CFT while analysing case/alert generated in the account.
The case manager at AML-CFT department may draw wrong conclusion while analysing the case / alert
generated on the customer.
7. Feeding of erroneous data regarding ‘Permanent Account Number(PAN)/ Form No. 60’ -
Wrong feeding or non-feeding of PAN details may lead to wrong information to FIU-India.
Will result in permitting all transaction, irrespective of value, will breach RBI Guidelines on ‘Small A/Cs’
9. Feeding of erroneous data regarding ‘Marital Status’: may impact the transaction monitoring process (such as
single/married/widow).
10. Feeding of erroneous data regarding ‘Political exposed person (PEP)/Relative to PEP’:
May lead to wrong reporting to FIU-India in ground of suspicion while filing STR.
Sunil SKA
74
Impacts the quality and result of name screening against the negative lists.
11. Feeding of erroneous data regarding ‘Address Details: Current/correspondence/local address (Address
type, Proof of Address, Country name, State, City, District etc.)’ -
May impact the quality and result of name screening against the negative lists.
The bank has taken a strict instance in respect of feeding of correct information of the occupation of the customer, due
to importance of this information in preparing the correct profile of the customer as well as its vital role in effective
monitoring of transactions with a view to identify suspicious transactions.
For achieving data purity and feeding of correct description of the occupation of the customers, Bank has rationalized
the ‘Occupation’ codes in CBS and 27 Occupation codes have been made available under 04 categories –
1. Service,
2. Business,
3. Others, &
4. Not categorised
As per extant instructions of bank, in case, the operating Staff/Official, selects the category I CBS as “Not Categorised
type,” then the Maker/Checker has to mandatorily key in the occupation of the customer as mentioned in the
AOF in the description field.
As description field, cannot be validated by the system, while inputting the data due care should be taken by
maker/checker to input correct Occupation type.
Later-on, if it is found that junk/incorrect data has been keyed into the system, necessary action will be
initiated against the operating staff/official, for data infringement.
Sunil SKA
75
Module 3 - Assessment
Which of the following is a probable impact due to account opened with wrong name? C
a. On- boarding of a person whose name appears in the RBI Defaulter's list leading the bank to Regulatory
punitive action.
b. On- boarding of a person who is already a customer of another bank leading the bank to Regulatory Punitive
action.
c. On- boarding of a person whose name appears in various sanctions lists circulated by RBI leading the bank to
Regulatory punitive action
d. All of the above
Feeding of erroneous data regarding ‘Political exposed person (PEP) /Relative to PEP’ status may not result in to D
____
a. non-compliance of guidelines of Money Laundering under PMLA act 2002
b. wrong reporting to FIU-India in ground of suspicion while filing STR.
c. deduction of tax at source at incorrect rate.
d. All of the above
Which of the following actions banks are required to take in case the match of any of the customers with the C
particulars of designated individuals/entities is beyond doubt as per laid procedure for implementation of Section
51A of the Unlawful Activities (Prevention) Act, 1967?
a. The banks shall prevent such designated persons from conducting financial transactions under intimation to the
Central [designated] Nodal Officer for the UAPA.
b. The banks shall close the account of such designated persons and transfer the fund to the account of under
intimation to the Central [designated] Nodal Officer for the UAPA.
c. both of these
d. None of these
As per laid procedure for implementation of Section 51A of the Unlawful Activities (Prevention) Act, 1967, in case D
of which type of transaction(s), banks shall file Suspicious Transaction Report (STR) with FIU IND in case, the
particulars of any customers match with the particulars of designated individuals/entities?
a. Few Selected transaction which arise suspicion
b. All successful transactions only
c. All attempted transaction only
d. All transactions carried through or attempted
The 27 'Occupation codes' available in CBS have been divided in to _____ categories. B
a. 5
b. 4
c. 3
d. 9
RBI directions make it mandatory for Banks/REs to report details of accounts resembling any of the D
individuals/entities in the negative lists to various authorities. Which set of the institutions given in the following
options is the correct one?
a. Ministry of External Affairs & FIU-IND
b. RBI & Ministry of External Affairs
c. CBDT & Ministry of Home Affairs
d. FIU -IND & Ministry of Home Affairs
Which of the following statement is /are correct regarding RBI instructions on Money Laundering and Terrorist C
Financing Risk Assessment by Banks & other REs?
a. The regulator will determine the exact level of ‘Money Laundering (ML) and Terrorist Financing (TF) risk for
Individual institution/ RE.
b. The regulator may provide guidelines, but it’s up to the individual institution/ RE to determine the exact level of
‘Money Laundering (ML) and Terrorist Financing (TF) risk
c. Both the statements are correct.
d. Both the statements are false.
In the process of Name screening, a positive match is said to occur when_____ D
a. the name and at least five other identifiers as given in negative list match.
b. the name and at least one other identifiers as given in negative list match.
Sunil SKA
76
c. the name and at least three other identifiers as given in negative list match.
d. the name and at least two other identifiers as given in negative list match.
Feeding of erroneous data regarding ‘Date of Birth’ may lead to D
a. denial of Senior Citizen benefits by the system even if they have become a senior citizen
b. incorrect analysis to decide positive/ negative match in case of alert generated during name screening against
the negative lists.
c. erroneous conversion of accounts from minor to major.
d. All of the above
Non-conforming data is the data which … A
a. has not been normalized as per the system of records.
b. has been entered in two different fields, not confirming to each other.
c. has been entered in the wrong field.
d. has variation in naming, spelling.
Which of the following is NOT a probable impact due to account opened with misspelt name (Rahim/Raheem) ? B
a. Wrong reporting to FIU-India.
b. Impacts monitoring as citizens of some specific countries are not permitted to open accounts in India.
c. Impacts the quality and result of name screening against the negative lists.
d. Lack of exercising due diligence as per Customer Identification Procedure
Due diligence as per Customer Identification Procedure may not be exercised properly due to feeding of erroneous D
data regarding _____ .
a. Father's Name
b. Name of the customer
c. Date of Birth
d. All of the above
Bank may face Regulatory punitive action for which of the following? C
a. On- boarding of a person whose name appears in the RBI Defaulter's list.
b. On- boarding of a person who is already a customer of another bank.
c. On- boarding of a person whose name appears in the sanctions lists circulated by RBI.
d. All of the above
All customers, individuals and non individuals, are to be categorised as High, Medium and Low risk for the purpose C
of_____
a. proper transaction monitoring
b. proper regulatory reporting
c. Both of the above
d. None of the above
Enhanced due diligence is required to be undertaken in respect of which type of customers? C
a. Certain type of medium-risk customers & High risk customers
b. RBI selected list of customers
c. High-risk customers
d. Certain type of low-risk customers & High risk customers
Due diligence as per Customer Identification Procedure may not be exercised properly due to feeding of erroneous D
data regarding ______ .
a. Politically exposed person status
b. Residential Status (RI/NRI)
c. PAN/Form 60
d. All of the above
which of the following additional information need to be collected for risk categorization ? a) Father / Mother's B
maiden name, b) anticipated level and nature of the activity that is to be undertaken, c) Marital Status, d) details of
occupation / employment and sources of wealth or income.
a. Only a, b & d
b. Only b & d
c. Only a, c & d
d. All of the above
Sunil SKA
77
Section 51A of the Unlawful Activities (Prevention) (UAPA) Act, 1967 requires Banks/REs to ensure_____ C
a. filing of STRs in the accounts, where the transactions do not match with the customer profile.
b. that they do not have any account in the name of individuals/ entities appearing in the lists of individuals and
entities, suspected of having terrorist links, which are approved by UNSC.
c. Both of these
d. None of these
Which of the following statement is NOT correct? C
a. A financial institution ought to know its customers well enough, which is not possible without pure and authentic
data.
b. Customer due diligence (CDD) coupled with correct data, is the critical tool for effectively managing the related
risks and protecting the FI against criminals, terrorists, who might present an enhanced risk.
c. A financial institution (FI) would not face any fines, sanctions, and reputational damage, if it deals with a money
launderer or a terrorist in the absence of correct data.
d. For any financial institution, it is important to make sure that the data as well as the prospective customer is
trustworthy.
Which of the following statement is NOT correct regarding 'Small Account' opened under Liberalised KYC? B
a. We may not follow-up for completing KYC after prescribed initial period of 12 months and that may lead to non-
compliance.
b. There is no requirement of further regulatory compliance for such accounts opened under Liberalised KYC.
c. We may be permitting all transaction, irrespective of value, in such accounts breaching RBI Guidelines on ‘Small
A/Cs’
d. We may not follow-up for completing KYC after prescribed extended period of 24 months and that may lead to
non-compliance.
Mr Associate has selected 'Occupation Code' as 'Not Categorised" in CBS while creating a CIF. Further when D
keying in the details of the occupation of the customer, the Maker entered it as 'others" instead of keying in the
exact details of occupation as mentioned in the AOF in the description field. Is it a right practice, what are the
provisions in this regard?
a. Maker has selected 'Occupation Code' as 'Not Categorised" in CBS while creating a CIF. There is no provision
in CBS to further key in data manually regarding the Occupation of the customer, hence the action of the Maker is
justifiable.
b. Maker has selected 'Occupation Code' as 'Not Categorised" in CBS while creating a CIF. It is not mandatory to
further key in data manually regarding the Occupation of the customer to maintain the sanctity of the data in
system.
c. Maker has selected 'Occupation Code' as 'Not Categorised" in CBS while creating a CIF. As sufficient codes are
not available in CBS to map the occupation of the customer, it is not advisable key in data manually regarding the
Occupation of the customer to maintain the sanctity of the data in system.
d. If junk/ incorrect data is keyed into the system instead of keying in the details as mentioned in the AOF in the
description field, necessary action may be initiated against the Maker/Checker for data infringement.
Reporting Entities are NOT required to carry out ‘Money Laundering (ML) and Terrorist Financing (TF) Risk C
Assessment’ exercise periodically in respect of_____
a. Transactions or delivery channels
b. Services and products
c. Auditors
d. Clients, countries or geographical areas
Which of the following problems would be caused by erroneous feeding of Address proof details of Resident C
Indians?
a. Penalty from Income-tax department.
b. Errors in name screening by AMLOCK software.
c. Errors in alert generation for transaction monitoring.
d. None of these
Which of the following information is not required for creating customer profile? B
a. Monthly Income, Annual turnover (in the case of business)
b. Year of Graduation
c. Date of Birth Occupation/activity,
Sunil SKA
78
d. Source of funds,
As per section 51A of UAPA, 1967, for the prevention of, and for coping with terrorist activities Central Govt has B
been given certain powers. Please select all correct statement from the following-
a. freeze, seize or attach funds and other financial assets or economic resources held by listed individuals or
entities.
b. prohibit any individual or entity from making any funds, financial assets available for the benefit of the listed
individuals or entities.
c. prevent the entry into or the transit through India of listed individuals.
d. impose penalty equal to the value of funds/ assets held by such individuals or entities.
a. Only b & d
b. only a, b & c
c. only a & b
d. Only a, b & d
How many 'Occupation codes' are available in CBS? B
a. 25
b. 27
c. 33
d. 21
Data which has been entered in wrong field is called _______ D
a. non-conforming data.
b. Inaccurate data.
c. duplicate data.
d. inappropriate data.
Which type of erroneous data may NOT have impact on FATCA/CRS compliance related issues B
a. Data regarding ‘Citizenship’.
b. Data regarding Educational qualification.
c. Data regarding Country code of jurisdiction of residence
d. Data regarding ‘Nationality’.
Which of the following data error will impact result of name screening by AMLOCK software? A
a. Political exposed person
b. Name of the customer
c. Country code of jurisdiction of residence
d. Customer Type
The list of designated individuals and entities subject to the UN sanction measures, is updated by _____. C
a. FIU -Ind
b. Reserve Bank of India
c. Ministry of External Affairs
d. Ministry of Home Affairs
Sunil SKA
79
Preventive Vigilance
Vigilance: Vigilance is being watchful in day to day transactions in line with the laid down system and procedures.
Vigilance word is derived from root word vigil meaning wakefulness, being watchful and alert even during the time
given for rest or sleep. Vigilance is being watchful in day to day transactions in line with the laid down system and
procedures as well as being judicious, transparent, and disciplined in all the official dealings.
Vigilance is essential in every unit of the organization and that is why it is stressed that every manager & staff
becomes vigilant. Vigilance being a mechanism of control that kindles the senses and operative skills to ward off
mishaps.
Vigilance as a tool ensures:
Disciplining the wrong doers
Protecting honest performers
Increasing transparency and fairness
Ascertaining accountability
Reducing wastages/leakages
Promoting culture of honesty and integrity
Reforming systems for corruption-free delivery
Vigilance is a Management Tool
Detective vigilance: Detective vigilance aims at identifying & verifying the occurrence of Lapse. It is Fact Finding,
Investigation, ascertains causative factors, defines extent of accountability of officials, suggests measures to plug
loopholes in the system.
Corrective Vigilance: It covers analysis of results of detective vigilance. It looks into the reasons and contributory
factors and finds solution to stop recurrence of unwanted incidents.
Preventive Vigilance: It refers to the mechanism or branch of Vigilance activity which involves taking proactive steps
as against reactive which makes the prognosis as against diagnosis of the organizational environment. It defines/
delineates and delimits the systems & procedures and tests their robustness in an efficacious manner.
The role of Preventive Vigilance in creating an atmosphere of ethical environment at workplace is well established.
Preventive Vigilance is one area which involves deep understanding of the organization, its complexities and areas
which are vulnerable / susceptible to corruption, apart from employees holding specific posts who are vulnerable and
exposed to such temptations. It involves studying the organization, its policies, and its people; and implementing
effective measures so that these do not become vulnerable to corruption.
Preventive vigilance starts with the individual irrespective of his / her position in the administrative hierarchy and
everyone has a role to play in preventive vigilance.
Preventive Vigilance is the most important aspect in Vigilance Administration which needs participation of every
employee. It is the obligation of all stakeholders to be vigilant in their day-to-day activities to safeguard the interest of
the organisation and in the process protect themselves.
Sunil SKA
80
In this backdrop, preventive vigilance measures can, to a great extent, insulate the bank from probable loss of funds as
well as image. Preventive vigilance must cover every conceivable area of banking activity, be it deposits, remittances,
fee based transactions, credit related matters, Forex transactions, procurements, HR initiative, engaging premises for
offices, compliance of Government guidelines, Knowledge empowerment and training and sensitizing of workforce on
a continuous basis should be the key would on every bank related activity.
Preventive vigilance means exercising caution to prevent irregularities / lapses and frauds and in fact all administrative
instructions are nothing but preventive vigilance. The systems and procedures prevalent in the Bank have inbuilt
checks and controls. However non-observances at times facilitate unscrupulous employees / outsiders to perpetrate
frauds on the Bank.
Most of the organisations follow this mechanism / approach of Vigilance. It is the most effective among all the
approaches and cost effective also.
Cost Effective: Many Studies conducted in manufacturing sector which also apply to Service sector indicate the cost
of PV vis-a-vis Corrective maintenance and failure cost follow a ratio 1:10:100. Preventive Vigilance follows almost
similar pattern vis a vis other types of approach.
To minimise frauds, irregularities, lapses
To formulate remedial measures and initiate corrective actions
To follow systems and procedures meticulously
To enjoy faith and confidence of public
To prevent loss of business
2. Physical verification of cheques is to be carried out in a meticulous manner, even a smallest variance in feature to
be examined critically to avoid payment of cloned cheques.
3. Customer is to be called before making payment of cheque for amount ofRs.5 lakh and above, to ensure that the
cheque presented has not been stolen. In case of payment of non-Home cheque of Rs.5 lakh and above and any
suspicious transactions irrespective of amount involved, the drawer is to be contacted over registered mobile number
to ascertain genuineness of the instrument/ transaction.
Sunil SKA
81
4. Discreet enquiry to be made from the presenter of the cheque over counter for payment as to how he has received
the cheque from the drawer/ account holder.
5. In case of Multi City Cheque presented at non-home branches, amount of the cheque should be within the value cap
mentioned on the cheque.
6. In the event of contacting customer is not possible/ successful, home branch of the customer is to be contacted.
Record of such calls must be maintained.
7. A standardized mail should be sent to home branch in respect of cases where customer could not be contacted on
the registered mobile available in CBS and the cheque was paid. Home Branch should accordingly take up the matter
with the customer to prevent such cases.
8. All high value instruments must be referred to the Branch Head/ CCPC Head and, in case of suspicion, the drawer
branch/ customer drawing the cheque should be referred before releasing payment.
9. Correct and updated Mobile number is seeded in the current accounts to receive the SMS alerts and calls from
Bank, to ascertain genuineness of the instrument/ transaction and maintain the record of such calls.
10. Email is registered to receive the mail in respect of cases where the customer could not be contacted on the
registered mobile available in the CBS and the cheque was paid.
Sunil SKA
82
Sl What can be seen at the web site Websites for verification along with What to be
navigation path verified
3 Goods & Service Tax Registration No. https://cbec-easiest.gov.in/EST Select - GST Registration
Businessman/Self >Assessee Code Based Search > Assessee No. of the
Employed/Professional who have to Code > Image > Get Details borrower GST
pay Goods and Service Tax Registration No.
of the of dealer
4 Form 16 from Traces https://contents.tdscpc.gov.in/ Select from the verify with 7 digit
top-> Tax Payer >Select from the left-hand side certificate
column-> View TDS/TCS Credit>Select -> number on form
verification code -> verify TDS Certificate 16
7 Chartered Accountant membership (a) CA membership no: www.icai.org Select -> B/S & P/L of the
number verification: Balance sheet & members-> members Directory search -> As on borrower Contact
P/L should be signed by CA with his Date-> Search members database by CA to confirm.
membership number and submitted Membership No- As on date
along with ITR. (b) CA’s Firm Regd. Number –verify on :
www.icai.org Select -> members-> List of Firms
as on……..
Sunil SKA
83
SEARCH BY DETAILS
2. The identified official should ensure that the number of gold loan bags tally with the number of accounts reported in
Loan Balance file / CCOD file generated during the EoD process of the previous working day; and
3. On a random basis check the ornaments for purity (30% or maximum of100 gold loan accounts whichever is less) to
safeguard against frauds.
SME Business
a) Disposal of Collateral Security - Preventive Measures
1. Bank should file application for urgent hearing before DRAT to vacate the stay and after vacating the stay, the
properties should be sold under SARFAESI Act.
2. Details of property to be registered with CERSAI and CERSAI ID certificate for mortgaged properties to be kept on
record.
3. All original title deeds must be obtained at the time of creation of mortgage.
5. Pre and post sanction due diligence in advances advised vide Circular No. CCO/CPPD- ADV/100/2015-16 dated
07.10.2015.
6. i) Certified copy of Title Deed to be obtained from Sub-Registrar’s Office and compared with the original submitted
for creation of mortgage by the panel Advocate before issuing TIR & ii) Search to find out any prior encumbrances be
done by the Advocate and certify in TIR to be complied with.
2. TIRs should be obtained as per Bank’s guidelines. SOP on Title Deeds & Title Investigation Report (TIR) states that
a Search Report/ encumbrance certificate for the intervening period, i.e. from the date of TIR to the date of deposit of
original Title Deeds/ creation of EM should be obtained and held on record, as part of equitable mortgage documents.
3. End use of funds to be ensured at the time of disbursement of loan, and through inspection/ verification of purchase
bills, etc. In addition, QOD(Quarterly Operational Data) cum status working capital funds statement to be obtained from
the borrower to confirm the level of current assets and end use of funds.
4. Physical verification of the property must be done personally by the concerned officials. Submission/ uploading of
security inspection report along with snapshots through e LLMS App to be carried out as per extant guidelines.
5. Search report encumbrance certificate for the intervening period, i.e. from the date of TIR to the date of deposit of
original Title deeds /creation of EM should be obtained and held on record, as part of equitable mortgage documents.
6. Black listing of empaneled valuer who had done the wrong valuation to be done.
Sunil SKA
84
8. Obtention of two separate valuation reports and verification from market bourses to be ensured without fail.
3. CIBIL report to be periodically generated and scrutinized to ascertain borrowing from other banks/ FIs
5. Assessment and appraisal of the credit needs of the borrowers to be done properly and sanctioning process must
be followed.
6. Meaningful post disbursement inspection to be carried out and end use of funds to be ensured.
7. High value transactions in CC account to be scrutinized to ensure against possible diversion / siphoning.
8. Stock Audit to be carried out as per Bank’s laid down instructions andreport to be scrutinised properly, put up for
closure to appropriate authority.
10. Business model/ need for all sister concerns and justification/ need for limits to be established on approval.
Transfer of funds among the family concerns to be probed with extra due diligence.
11. Credit limit to be sanctioned after detailed appraisal/ assessment duly supported by the documentary evidence.
12. Irregularity report to be submitted periodically and comments thereon to be acted upon.
13. Noting of charge with revenue authority on mortgaged property to be ensured immediately after creation of EM.
14. The immovable security (Primary or Collateral) to be inspected at the time of accepting the property for the first
time and yearly there after. & Ownership & Possession status of the property to be ascertained by making enquiries
with the neighborhood and occupant of the property.
16. Instructions are in place for conduct of post sanction inspection of stocks and receivables in a diligent manner.
1. Detailed due diligence before sanction be carried out including past record with CIC for loans availed.
2. Physical verification of property must be done without fail by concerned official. Photograph of the property along
with the borrower should be taken as an integral part of inspection.
3. check the authenticity of the documents/ reports/ certificates etc. with UDIN and the key fields provided by the
certifying Chartered Accountants.
4. Need based credit facilities and ability to discharge the obligation to be ensured.
Sunil SKA
85
5. Pre-sanction survey and post sanction inspection should be carried out in meaningful manner to ascertain
antecedents and credential of borrowers / units / securities etc.
6. Justification of limits for the group concerns, proper assessment, satisfying about business model is essential to
avoid accommodation loans.
7. Conduct of periodic stock audit to be ensured and due closure of Audit report.
2. Due diligence on the supplier to be done and opinion report to be obtained. Funds to be disbursed directly to
suppliers.
3. During post disbursement inspection, details of machineries purchased to be verified and periodic inspection to be
done at irregular intervals.
4. Deficiencies pointed out in various audit reports to be promptly attended and rectified.
2. Obtaining certified copies of title deeds by Advocate and comparison with original title deeds to be ensured.
4. Charge on Collateral securities (mortgaged properties) to be recorded in revenue record. Periodic Encumbrance
Certificate to be obtained.
6. Pre-sanction due diligence including physical verification of the property needs to be ensured meaningfully.
10. Noting of charge with revenue authority on mortgaged property to be ensured immediately after creation of EM.
Sunil SKA
86
3. Sanctioning officer to visit the unit, meet promoters and carry out proper due diligence before sanctioning the loan.
6. During visit by controller/ periodic review, reasons for spurt in advances to be examined in detail.
2. Registration of vehicle and noting of Bank’s hypothecation charge in the books of RTO to be done and verified from
“vahan.nic.in” site.
3. Inspection of the vehicles and borrower to be done immediately after default of one instalment and procedure for
Seizure to be initiated so that fraud if any, get unearthed immediately.
2. EPC to be released after obtaining copies of confirmed orders and to be liquidated out of export proceeds.
3. Proposal for sanction of pre-shipment should cover detailed examination/ comments of sources of liquidation of EPC
with proper justification.
4. Goods meant for export to be segregated from stocks meant for domestic sale.
6. Export order register to be maintained and updated. Validity of orders/submission of export bills to be diarised and
followed up.
2. Immediate inspection after purchase of machinery to be done to ensure proper utilization of funds.
3. Regular inspection and follow up including scrutiny of books should be made to ensure that the funds are not
diverted.
5. Certificate from Chartered account and Architect to be submitted by the company on quarterly basis for progress of
construction of the said project in respect of amount incurred on the project.
Sunil SKA
87
6. Transfer to associate/ related parties should be done only after satisfying on genuineness of the transaction
documentary evidence.
7. Physical verification of the property must be done personally by the concerned officials. Submission/ uploading of
security inspection report along with snapshots through e LLMS App to be carried out.
10. Post sanction inspection to be done at periodic interval to ensure end use of funds.
4. As per Circular No. CCO/CPPD- ADV/136/2018-19 dated 18.12.2018,check the authenticity of the documents/
reports/ certificates etc. with UDIN and the key fields provided by the certifying Chartered Accountants.
2. Warehouse/ Godowns to be visited and stocks to be verified periodically. It is to be ensured that underlying stocks
are segregated/ properly tagged with Bank’s name. Market Price advised by Collateral Manager to be cross-checked
with local Mandi/ MCX.
4. Adequate Insurance Cover for the commodity / stock to be ensured, due date of insurance to be diarized.
5. Any adverse report on Collateral Manager to be shared immediately with Corporate Centre.
2. Genuineness of the buyers should be verified to ascertain their capability of huge buying
3. Direct visits should be made to major debtors and confirmation should be obtained from them
5. Past track record and status of the customers should be critically analysed
6. Financial statements and other documents should be thoroughly checked for their genuineness through various
online sources e.g., ROC website, UDIN, GSTN network etc. End use of the funds to be ensured. Staff accountability
should be examined for staff who had certified end use of funds
Sunil SKA
88
11. End use of funds should be monitored and due diligence procedures to be applied to identify instances of utilisation
of funds for the purpose, other than business.
Some of the precautions that may be exercised at operating units are mentioned below:
New Accounts containing “COVID / CORONA” or related words: Fraudsters may try to open new accounts
containing terms such as COVID / CORONA etc. This may be done either to resemble an existing genuine account for
public benefit or with the intention of defrauding people by bogus fundraising / diversion / misdirection of funds etc.
Extra Due Diligence should be applied while opening such accounts and KYC check must be performed thoroughly. A
list of such accounts opened since February 2020 may be extracted and verified.
Vigilance should be exercised while dealing with FCRA / NPO / Charitable institutions / other accounts in
which donations in the name of COVID are being credited.
While the country is busy fighting the COVID-19 Pandemic, some of the states continue to face terrorist
activities. Therefore, Branches situated in terrorist sensitive locations should exercise vigilance against suspicious
financing activities and scrutinize KYC in all those accounts where any suspicious transactions are observed as
criminals / terrorists may try to open accounts through fake Names and IDs.
Impersonation of Government Officials: Criminals may impersonate as government / police/ health officials
and try to obtain personal banking information from banks and misuse it for personal gains. Due care should be taken
to properly identify the persons claiming to be government officials and seeking information which is normally not
provided
The miscreants may misuse account of Money mules to receive grants from Government. Sudden increase
of Government credit observed in accounts of the person who may not be entitled for such grants, should be discreetly
enquired into, before allowing withdrawal.
Instances of malicious or fraudulent activities, cybercrimes, fund raising in the name of renowned
organizations/ NGOs, fake charities targeting gullible persons may increase in the COVID-19 Pandemic environment.
Branches should be more vigilant while opening accounts in the name of charitable institutions/ NGOs. KYC and
customer due diligence measures should be strictly followed while onboarding customers.
Customers should be made aware of the increasing risk of online frauds through phishing emails, SMS,
fraudulent loan and moratorium offers, fakeCOVID-19 sites and apps, fake banking and insurance websites etc. The
possible risks and measures suggested above are illustrative only and not exhaustive.
OBJECTIVE
The objective of ‘Whistle Blower Policy’ is to ensure highest ethical, moral and business standards in the course of
functioning and to build a lasting and strong culture of Corporate Governance within the Bank. In terms of Policy, an
internal mechanism is established for staff members to report to the management, concerns about unethical
behaviour, actual or suspected fraud or violation of the Bank's Code of Conduct policy. The Policy is intended to
encourage all employees of the Bank to report suspected or actual occurrence of illegal, unethical or inappropriate
actions, behaviours or practices by staff members without fear of retribution. The employees can voice their concerns
Sunil SKA
89
on irregularities, malpractices and other misdemeanours through this policy. It also provides necessary safeguard and
protection to the employees who disclose the instances of unethical practices/ behaviour observed in the Bank.
The Whistle Blower Policy has been modified as per relevant Notifications of RBI, Section 177 of Companies Act, 2013
& relevant rules thereon and SEBI (Listing Obligations and Disclosure Requirements) Regulations, 2015 and existing
instructions of the Bank as well as Government of India/Central Vigilance Commission/RBI/SEBI in this matter issued
from time to time, including but not limited to Circular NO. 02/03/2019 issued by the Central Vigilance Commission.
DEFINITIONS
The definitions of some of the key terms used in this policy are given below:
Whistle Blower - The Employees of the Bank making the disclosure under this policy. The Whistle Blower’s role is
that of a reporting party. Whistle blowers are not investigators or finders of facts; neither can they determine the
appropriate corrective or remedial action that may be warranted.
Designated Official – Deputy General Manager & CFO at Local Head Offices for staff members posted in the
respective Circles and General Manager (Fraud Monitoring Deptt.) at Corporate Centre for staff members posted at
Corporate Centre, its establishments and other business groups.
Subject – Branch / Employee – The specific branch and/or employee in respect of whom disclosure is being made.
Employees – All employees of the Bank, including officer and award staff members, as also those under contract
service in the Bank.
Disclosure – Any communication, whether by letter/ email/ on designated portalor over telephone, relating to unethical
practice or behaviour or violation of service rules, made in good faith by the Whistle Blower.
Reviewing Authority – Chief General Manager (Fraud Monitoring Deptt.) at Corporate Centre for all staff members
posted at Corporate Centre/ its establishments/Circles/ Other Business Groups. Upon receiving the remarks and
recommendation, he may take a view on closure of the complaint or forward the same to the concerned department for
initiation of disciplinary proceedings.
Appropriate Departmental Action – Departmental action as per the applicable service rules of the
Employees/Officers.
Investigators - mean any person(s) duly appointed/consulted by the Designated Official to conduct an investigation
under this policy.
COVERAGE
All employees of the Bank posted at domestic branches/offices are covered under this policy. The Policy covers
malpractices and events which have taken place/suspected to have taken place in the Bank involving:
Corruption
Frauds
Misuse/ abuse of official position,
Manipulation of data / documents,
Any other act of an employee which affects the interest of the Bank adversely and has the potential to cause
financial or reputational loss to the Bank.
REPORTING MECHANISM
The Fraud Monitoring Department at Corporate Centre and Fraud Monitoring Cells in the Circles will arrange to
circulate name, telephone number, and e-mail address of the Designated Officer(s) in the Bank/Circles to enable the
Sunil SKA
90
staff members to register their complaints under Whistle Blower Policy. Any employee(officer / award) willing to
disclose information may do so in any of the following manner.
1. In writing on prescribed format, duly addressed to the Designated Officer(s) in a sealed envelope specifically super
scribed in capital letters “Disclosure under Whistle Blower Policy”.
2. The envelope containing the complaint to be sent to the related Designated Official i.e. General Manager (Fraud
Monitoring Deptt.) ,Corporate Centre or to Deputy General Manager & CFO of the respective Circles. Efforts should be
made not to disclose the identity of Whistle Blower on the top of the envelope containing the disclosure. The
whistleblower may submit his application directly to the Chairman of Audit Committee of Board (ACB) in
exceptional or appropriate cases only.
3. Suitable proof of his identity / contact numbers / address so that additional information, if any, can be obtained. In
case identity cannot be ensured, the complaints will be treated as anonymous/ pseudonymous complaints and may not
attract further action.
4. Complaints can also be sent to the designated e-mail ID created for the purpose from the official e-mail ID of the
employee. The contact details /address of the Whistle Blower should however be provided. In case of
absence/incorrectness of the same the complaints will be treated as anonymous/pseudonymous complaints and may
not attract further action.
6. Disclosures can also be made over a dedicated Telephone number. The Whistle Blower would, however, be
required to disclose his identity and furnish sufficient information for verifying his identity by the Designated Official.
Additional information, as deemed necessary, will be sought for by the designated official attending the call.
7. The disclosure whether by letter / email/ telephone, should provide specific and verifiable information in respect of
the “Subject – Branch / Employee”
1. The complaints received under Whistle Blower on the prescribed format, will be opened by the addressee only.
2. Upon receipt of Complaint, the Designated Authority will enter the particulars of Complaint in the Register and allot a
code number on all the pages of the complaint. The first page containing the whereabouts of Whistle Blower along with
the envelope will be retained with the custody of Designated Authority. The subsequent pages containing the details of
Whistle Blower case will be handed over to concerned desk official for investigation purpose. The Designated Officer
will strive to ensure that identity of Whistle Blower is not disclosed. The register will be confidential and retained with
the Designated Official.
1. The Bank will protect the confidentiality of the complainants and their names / identity will not be disclosed except as
statutorily required under law.
2. No adverse penal action shall be taken or recommended against an employee in retaliation to his disclosure in good
faith of any unethical and improper practices or alleged wrongful conduct. It will be ensured that the Whistle Blower is
not victimized for making the disclosure.
3. In case of victimization in such cases, serious view will be taken including departmental action on such persons
victimizing the Whistle Blower.
Sunil SKA
91
4. Identity of the Whistle Blower will not be disclosed to the Investigating Official.
5. If any person is aggrieved by any action on the ground that he is being victimized due to the fact that he had filed a
complaint or disclosure, he may file an application before the Reviewing Authority i.e. Chief General Manager- Fraud
Monitoring Deptt., Corporate Centre seeking redressal in the matter, wherein the Reviewing Authority may give
suitable directions to the concerned person or the authority.
6. To protect the interest of the Whistle Blower for any adverse reporting in Annual Appraisal/Performance report,
he/she may be given an option to request for a review of his/her Annual Report by the next higher Authority of the
Reviewing Authority of his/her Report within three (03) months after the closure of the relevant financial year ending
31st March.
1. Protection under the Policy would not mean protection from departmental action arising out of false or bogus
disclosure made with malafide intention or complaints made to settle personal grievance.
2. Whistle Blowers, who make any disclosures, which have been subsequently found to be malafide or frivolous or
malicious shall be liable to be prosecuted and appropriate disciplinary action will be taken against them under Service
Rules/ bipartite settlements only when it is established that the Complaint has been made with intention of malice.
3. This policy does not protect an employee from an adverse action which occurs independent of his disclosure under
this policy or for alleged wrongful conduct, poor job performance, any other disciplinary action, etc. unrelated to a
disclosure made pursuant to this policy.
1. The designated official shall, on receipt of the complaint, arrange to verify the identity of the Whistle Blower.
2. Proper record will be kept of all disclosures received. The action taken against each disclosure will be also noted
and put up to the Reviewing Authority within 7 days of receipt of complaint.
3. Only on being satisfied that the disclosure has verifiable information, necessary enquiry / investigation will be done
with regard to the complaint. The Designated Official will also have the authority to seek the assistance /support from
other departments/ offices to conduct enquiry /investigation. The process of investigation will be completed within 45
days of receipt of the Complaint.
4. The identity of the Whistle Blower will not be disclosed to the officials conducting the enquiry / investigation. In case
additional information is required to be collected from the Whistle Blower, it will be through the Designated Official.
5. Any inquiry/ investigation conducted against any Subject shall not be construed by itself as an act of accusation and
shall be carried out as a neutral fact-finding process, without presumption of any guilt.
6. The inquiry/ investigation shall be conducted in a fair manner and provide adequate opportunity for hearing to the
affected party and a written report of the findings should be prepared for submission.
7. A time frame of maximum 45 days will be permitted to complete the investigation / enquiry. In case the same cannot
be completed within the stipulated period, interim report should be mandatorily submitted by the Investigating Officer,
giving, inter- alia, the tentative date of completion.
8. Depending upon the nature of disclosure and its gravity, the Designated Official will take a view to take up
investigation on a priority basis and fix shorter time frame for its completion.
Sunil SKA
92
9. In case the disclosure made does not have any specific & verifiable information, the Designated Official will be
authorized not to take any action. This would be suitably recorded and placed before the Reviewing Authority.
10. In case the allegations made in the disclosure are substantiated, appropriate departmental action as per the
provisions of service conditions in vogue will be taken against the employee (officer/award) concerned on whose part
the lapses are observed.
11. The action taken against the subject/employee as stated in the above paragraph will be in addition to any other
action or prosecution which maybe initiated against said subject/employee under any statute or law in force.
12. Roles and Responsibilities of Designated Authority and Reviewing Authority– Annexure –1
1. Functioning of the Policy will be reviewed by the Reviewing Authority at quarterly basis.
2. The Designated Officer shall submit a status report on the prescribed format to the Reviewing Authority and any
other information relating to the disclosures received under the Whistle Blower Policy on quarterly basis. The status
report would include the following:
The status of the disclosure received during the present and prior period and the action taken thereon.
The Reviewing Authority, Chief General Manager (Fraud Prevention & Monitoring Deptt), Corporate Centre shall
submit consolidated status report of the bank, to the Audit Committee of the Board (ACB) on quarterly basis with action
taken report.
The General Manager (Fraud Prevention & Monitoring Deptt.) at Corporate Centre and the Deputy General Manager &
CFO at Local Head Offices will ensure that the revised Policy is known to all employees. A copy of the Policy shall be
uploaded in the SBI Times.
This policy can be changed, modified, rescinded or abrogated at any time by the Bank in accordance with law.
However, the Fraud Prevention & Monitoring Deptt at Corporate Centre will review the Policy every twelve months.
1. Encourage all employees of the Bank to report suspected or actual occurrence of illegal, unethical or inappropriate
actions, behaviours or practices by staff members without fear of retribution. To circulate name, telephone number, e-
mail address of the Designated Officer(s) in the Bank to enable the staff members to register their complaints under
Whistle Blower Policy.
2. The Designated Authority will be the focal point to receive the complaint from Whistle Blower.
3. Ensure that the identity of Whistle Blower is not disclosed. It also provides necessary safeguard and protection to
the employees who disclose the instances of unethical practices/ behaviour observed in the Bank.
Sunil SKA
93
4. Appoint/ authorise any official to conduct an investigation under this Policy and submit the report to Designated
Authority.
5. On the basis of investigation report, Designated Authority will forward the same to Reviewing Authority with his/her
remark and recommendation.
6. The Designated Officer shall submit a status report on the prescribed format to the Reviewing Authority and any
other information relating to the disclosures received under the Whistle Blower Policy on quarterly basis.
7. The Designated Authority will be responsible to implement the Policy and ensure that the Policy is known to all
employees.
2. Upon receiving the investigation report along with Designated Authority’s remark and recommendation, Reviewing
Authority may take a view on closure of the complaint or forward the same to the concerned department for initiation of
disciplinary proceedings.
3. If any person (Whistle Blower) is aggrieved by any action on the ground that he is being victimized due to the fact
that he had filed a complaint or disclosure, he may file an application before the Reviewing Authority, seeking
redressal in the matter, wherein the Reviewing Authority may give suitable directions to the concerned person or the
authority.
4. The Reviewing Authority, Chief General Manager (Fraud Monitoring),Corporate Centre shall submit consolidated
status report of the bank, to the Audit committee of the Board (ACB) on quarterly basis, with Action Taken Report.
(The whistle blower may submit his/her application directly to the Chairman of Audit Committee of Board (ACB) in
exceptional or appropriate cases only.)
Designated Authority: The designated authority shall, on receipt of the complaint, arrange to verify the identity of
the Whistle Blower.
Only on being satisfied that the disclosure has verifiable information, investigator will be appointed and entrusted for
investigation.
Investigator: Investigator will investigate into the matter and submit his/her report to Designated Authority within 45
days of receipt of complaint.
Designated Authority: Report with suitable remark & recommendation will be submitted to Reviewing Authority for
closure or for initiation of disciplinary proceedings.
Reviewing Authority: If allegations made in disclosure are substantiated, Reviewing Authority will take decision on
appropriate departmental action as per service condition.
The Reviewing Authority shall submit consolidated status report of the Bank to the Audit Committee of the Board
(ACB) on quarterly basis.
Sunil SKA
94
Audit Committee of the Board (ACB): The Audit Committee of the Board (ACB) will review the status report
submitted by Reviewing Authority on quarterly basis and place their observation /direction for taking corrective
measures to prevent recurrence of such events in future.
If any Whistle Blower submits the application directly to the chairman of the ACB, he may forward the application to the
Reviewing Authority with his direction/observation to take appropriate action and submit his Action Taken Report with
remarks and recommendation.
2. Maintaining proper surveillance on officers of doubtful integrity and those in “Agreed List”.
4. Regular transfer of officers, job rotation for award staff at regular intervals and transfer of award staff as per extant
instructions and service rules.
6. Use of the branch visits by controllers to detect danger signals so that steps can be taken either to prevent frauds or
other acts of malfeasance or to contain the damage where such act has already been perpetrated.
7. Rotation of officers working in sensitive positions for more than 2/3 years.
8. During periodical visits to the branches, the Controllers must hold meetings of branch staff and brief them on the
features and importance of the Whistle Blower Scheme as a fraud / malfeasance preventive measure. Controllers
should particularly try to remove any apprehensions in the mind of staff that their identity may get disclosed in the
process of whistle blowing by clearly emphasising the protection that is mandated by the Scheme from any sort of
identity leakage and consequent victimisation, direct or indirect.
9. It should be ensured that all staff members maintain secrecy of their passwords and also keep changing them as
frequently as possible. Instances of casual approach by any password holder should be dealt with ruthlessly as the
same may put huge funds at risk. Controllers during their periodic visit to the branches should verify whether the
employees are changing their passwords at stipulated intervals or not. Any deviation in this regard may be dealt with
deterrent action.
A few other areas of Preventive Vigilance where special focus is needed to improve the quality of operations are:
1. Critical analysis of Complaints before closure, in particular, where verifiable facts are available.
Sunil SKA
95
4. Conducting of PVC meetings at Branches and presence of Controllers /Vigilance Department officials.
6. Reconciliation of all office accounts at regular intervals and monitoring of long pending entries.
7. Observance of KYC / AML guidelines while opening accounts as per extant instructions.
12. Surprise / Random check of ATM cash balances by Channel Managers as stipulated.
14. Migrating customers to Alternate Channels proactively as in such cases the transactions are originated and
terminated by customers only.
15. Scrutiny of Exception Reports. All near miss events must also be included as an integral part of Preventive
Vigilance Meetings as their proper &timely identification, reporting, collection and root-cause analysis is crucial for
development of a robust Operational Risk Management System. (Near Miss Event is a risk event that otherwise meets
the definition of an operational loss event but did not materialize in financial loss to the Bank, e.g. attempt to encash a
forged cheque, attempted fraud, failed controls etc.) It is the responsibility of the Controllers at all levels to spread the
message of ‘Zero Tolerance’ to malafide and violation of systems and procedures among the staff working under their
control.
The system of submission of control return by the authority exercising the discretionary powers to the next higher
authority forms an important part of preventive vigilance exercise. While it is incumbent upon the officer exercising
discretionary power to submit the control return, the controller is equally responsible for obtaining / scrutinizing and
approving or otherwise of the control returns to the branches/offices. The controllers are also responsible for
monitoring the warning signals emanated from the CBS reports and keep an overview on the unusual/suspicious
growth in any of the areas.
Another important source available to the controllers is the various audit /inspection reports. In addition to initiating
steps to rectify the irregularities pointed out in the reports, the controller should also analyse the reasons for such
irregularities having taken place and take steps to ensure that such irregularities do not take place in other branches
under his control.
Sunil SKA
96
With a view to augmenting the support and involvement of staff at operating unit level in curbing irregularities by
creating all round awareness, a ‘Preventive Vigilance Committee’ is required to be formed. The Committee consisting
of two or three members from different sections/ departments at the branch, will act as a catalyst in spreading the
concept and practice of preventive vigilance at the Branch / operating units. It may clearly be noted that the Preventive
Vigilance Committee is neither a ‘power center’ nor the sole means for exercising preventive vigilance. It is akin to the
‘Knowledge Circle’, aimed at prevention of loss and enhancement of performance. It will endeavor to properly ‘educate’
the staff on preventive measures and also identify the ‘weak spots’ to plug the loopholes, if any, in the functioning of
the operating unit.
Preventive Vigilance Committees have to be formed at the following branches /operating units of the Bank:
5. Once a fraud is detected at a branch, (irrespective of the staff strength), till such time the branch undergoes the next
RFIA.
Constitution of PVC:
30% of staff members, minimum 3 officers / employees should be co-opted on the PVC of each unit. The head of the
Branch / Unit and official dealing with operational risk would be permanent members and other members to be rotated
at yearly intervals.
Periodicity of Meeting
1. The meetings of PVCs be held at least once in a quarter.
2. The controllers (any officer from controlling office-designated for the purpose) to guide the staff in identifying the
areas of vulnerability to frauds / malpractices, visit the branches / units periodically and if possible, to attend meetings
of PVCs, at least once in 6 months.
3. The DGM (Vig.) or a staff identified by him at the Circle to visit the branches/ units and guide the PVCs thereat.
4. A summary of such meetings by way of a self-contained Note enumerating important observations / suggestions
should be submitted by LHOs to Vigilance Department, Corporate Centre on a quarterly basis. Sharing of such
information shall benefit the Bank as a whole.
Although the areas vulnerable to frauds / malpractices may not be exactly the same for all branches / other operational
units, the PVCs may have to identify the same for sharing the information with the other colleagues at the Branch /
Units etc. The gist of the discussions that took place in the PVC meetings are to be shared with other staff at the
Branch / Unit.
The Branch / Unit may oversee the functioning of the PVC and the suggestions made by the PVC may be examined.
During their Branch visits, the Controllers should also make it a point to ensure that the PVC are functioning as
envisaged and also that the meaningful analysis of the suggestions is being carried out. They may also participate in
the meetings of PVC as observers, where possible.
It needs hardly any emphasis that in all the matters enumerated in the foregoing paragraphs, constant interaction
between the DGM (Vigilance) at the Circles and the controllers is absolutely essential. The control and guidance of the
Sunil SKA
97
CMC in these matters in particular and vigilance matters in general, is a sine qua non for improving all round vigilance
awareness.
The second aspect at the Branch level which can have serious implications is the possibility of the Branch Manager
himself indulging in fraudulent activities which becomes difficult to detect for lack of further ‘supervision’ over his
activities at the Branch level. For such contingencies, it is already laid down that the next junior functionary is duty-
bound to report to the controller about any act of suspicious nature by the Branch Manager. Failure to do so would be
treated as a misconduct attracting disciplinary action.
Since Preventive Vigilance Committee meeting and suo-moto investigations are aimed to oversee and to ensure
adherence of systems and procedures by Branches and Outfits, each official of Vigilance Department is entrusted with
the responsibility to attend at least 4 PVC meetings and conduct 6 suo- moto investigations during the year.
Title: The scheme shall be called the “Alertness Award for Near Miss Events including Prevention/Detection/Foiling of
Frauds”.
Scope:
The magnitude and diversity of frauds has assumed serious proportions, with both the number and amount involved
rising alarmingly. Incidence of staff involvement is also on the increase. There are several instances where frauds
could be averted due to the alertness of staff members. However, the efforts of such employees have gone, more or
less, un-noticed. In this background, there is a felt need for affirmative action to create a culture for alertness and a
healthy respect for observance of laid down systems and procedures.
Near Miss Events (NMEs) are important for management purposes for promptly detecting failures/ errors in processes
or internal control systems. It is also relevant for measurement purpose as per RBI Guidelines on Operational Risk
Loss Events forming part of “implementation of the Advanced Measurement Approach(AMA) for calculation of capital
charge for operational risk.” The good work done by Staff members in this area also needs recognition.
Objective: The objective of the scheme is to recognize and reward the contributions of staff members in prevention,
detection, foiling of frauds and "Near Miss Events‟.
Coverage: The scheme will be applicable to all staff members, including regular, part-time and contract employees in
the service of the Bank.
Definitions:
Fraud:
“A fraud may be defined as a deliberate act of omission or commission by any person, carried out in the course of a
banking transaction or in the books of account maintained (manually or under computer system) in the Bank, resulting
into wrongful gain to any person for a temporary period or otherwise, with or without any monetary loss to the Bank,
either by way of concealment of facts or otherwise.”
NME:
Near Miss Event is a risk event that otherwise meets the definition of an operational loss event, but for which no
financial loss has been incurred not because of effective controls but due to fortuitous circumstances. NME is an
operational risk event that could have but did not result in a financial loss either by chance or on account of existing
control measures but are required for internal modeling purposes. Broadly, it is an undesired event or sequence of
events with potential to cause serious damage. Some of the examples of NMEs are attempted fraud, attempted
theft/burglary, attempt to encash a forged / fake cheque, attempt to obtain credit facility by submitting fake/forged
KYC/Income/financial documents, etc.
Prevention/Detection/Foiling of Frauds:
Sunil SKA
98
“Any action or set of actions taken by staff member(s) that directly results in averting a fraud and preventing any loss
to the Bank”. This would not imply simple adherence to laid- down rules and regulations.
“Discovering a set of fraudulent activities and/ or a transaction or series of transactions that have taken place in the
Bank which is/ are fraudulent in nature”.
“Staving off an attempt by any person or persons to defraud the Bank, which results in prevention of fraud”. In other
words, it means prevention of a fraud while an attempt is being made, without any loss caused to the Bank.
Capturing NME as many as possible even though not all of them will have the same importance. Simple reporting
format complete reporting to encourage everyone for filling out a report without spending much time and developing
culture and enriching the data base.
Determining the NME which requires immediate attention, analysis, evaluation and escalation. Prioritization will be
based on the following aspects:
* Worst case events require estimation of maximum but realistic damage that could have impacted or can
impact in future if similar incidents takes place again.
* Repeating events require knowledge of past incidents so as to give higher priority for similar events occurring
multiple times.
* Incident reach - events that can impact a larger region or area of operation, etc. need to be prioritized with
view to control their happening into other areas.
The NMEs, based on priority, identify the cause(s) and action plan initiated for elimination of recurrence. High
priority incidents to be given thorough causal analysis such as identification of root cause etc.
Process:
As soon as a fraud is detected, averted or an attempt of fraud is foiled, the Branch Manager will immediately advise
the Controlling Authority concerned, furnishing details of the modus operandi and the specific contribution, if any,
made by staff member(s) in such prevention/ detection/foiling of the fraud. The Local Head Office will forward the
information to the Central Office, thereafter, in a specific format detailing the contribution of the staff member(s) and
recommending sanction of the Alertness Award. The Fraud Monitoring Cell in the Banking Operations Department
(R&DB), depending upon the recommendations of the Circle, will put up such cases with details of the contribution of
staff member(s) in prevention/ detection/ foiling of the fraud, for consideration, to the Alertness Award Committee.
Once an NME is identified the same should be reported without spending much time. Operational Risk (OR) Managers
at Circles and at Business and Support Groups will collect top and critical NMEs from operating functionaries and will
maintain updated inventory / library of NMEs. OR Manger in consultation with DGMs & CFO in Circles and DGMs
(Risk) at Business and Support Groups will identify NMEs that are required to be placed before Risk Management
Committee of the Circle (RMCC) and Risk Management Committee (RMC)respectively. In addition, OR Manager will
also identify the NMEs for the purpose of recognition and reporting to the Alertness Award Committee.
The Alertness Award Committee shall be constituted at Central Office, comprising following functionaries:
1. Chief General Manager, Banking Operations (R&DB), Chairman
2. Dy. General Manager, Systems & Procedures
3. Dy. General Manager, Vigilance
4. Dy. General Manager, Cadre Management Department
5. Dy. General Manager, ITSS
Sunil SKA
99
The Alertness Award Committee may meet at least once in a calendar quarter and examine the proposals prepared by
the Fraud Monitoring Cell and / or Risk Management Committee to decide the quantum of reward. For the purpose of
valid quorum, minimum three members must be present in addition to the Chairman of the Committee. The committee
may invite other officials, who have expertise in certain areas as special invitees. These special invitees, however, will
not have any voting rights. The committee may frame additional rules for its proper functioning, including development
of a matrix for deciding the quantum of the award. Based on the decision of the Committee, proposals for sanction of
the reward will be put up by the Chairman, Alertness Award Committee to the Managing Director (R&DB), who may be
designated as the „competent authority‟ for the purpose of sanction of cash rewards under the Scheme.
Criteria
The following criteria would have to be considered / kept in mind to determine the contribution made by a staff member
in prevention/ detection /foiling of fraud:
1. The contribution made by the staff members in prevention of frauds/detection of frauds/ foiling attempts of
fraud/Near Miss Events should be significant and exemplary. The prize and its quantum would depend upon whether
the contribution was made during checking / verification of documents, signatures etc. or the staff member was alert to
other signals such as suspicious behaviour, circumstances surrounding the case, awareness of similar cases and
spotting the linkages etc. and identifying / nabbing the culprits and action taken for recovery etc.
2. The role assigned to the staff member in relation to prevention/detection/ foiling of fraud and detection / identification
of NMEs should have a bearing on the award and quantum of reward.
3. The amount saved by such contribution by the staff member(s), may be a guiding factor in determining the quantum
of award, though it need not be the deciding factor. However, in case of NMEs as a tool for Operational Risk
Management, promptness in detecting failures/errors in process or internal control systems need to be the deciding
factor.
4. The initiative taken by the staff member(s) to probe deeper in to transactions, which prima-facie appear to be
irregular, their persevering efforts as also the exemplary presence of mind displayed in foiling attempt(s) to defraud,
identifying NMEs etc. will be major factors to be borne in mind while determining the quantum of reward.
5. Detection of income leakage by staff members will not fall under the purview of this scheme unless such income
leakage was of fraudulent nature.
The Awards
Staff members selected for recognition and reward under the scheme may be given one of the following combinations
of rewards:
Category II: A citation or certificate of merit and a specially designed memento (to be standardised), containing a
suitable legend.
Category III: A citation or certificate of merit, a specially designed memento(to be standardised) containing a suitable
legend along with cash rewards ranging from Rs 5,000/- to Rs 2,00,000/- (depending on the contribution of the staff
member(s) in prevention / detection/ foiling of frauds, identification of NMEs). Besides, suitable remarks will be made in
the personal files/ service records of the staff members selected under the Scheme. Special mention about the
recognition will also be made in the Annual Appraisal Report of the staff members concerned.
Presentation:
Sunil SKA
100
The Alertness Awards will be presented to the staff members on the 1st of July - State Bank Day. Awards falling under
category I and Category II can be presented at the Module level and awards falling under Category III can be
presented at the LHO level.
Sunil SKA
101
Module 4 - Assessment
According to Bank’s guidelines on fraud prevention in collateral security which of the following statement is/are B
correct :
I) Obtaining certified copies of title deeds by Advocate and comparison with original title deeds to be ensured.
II) Noting of charge with revenue authority on mortgaged property to be ensured within one year of EM creation.
III) To make post-sanction inspection on appointment basis.
IV) Charge on Collateral securities (mortgaged properties) to be recorded in revenue record. Periodic
Encumbrance Certificate to be obtained.
a. Only II, III and IV
b. Only I and IV
c. Only I, II and IV
d. Only I and III
According to Bank’s guidelines on fraud prevention in term loan, which of the following statement is/are incorrect : B
I) Disbursement to be made to the account of supplier
II) Immediate inspection after purchase of machinery to be done to ensure proper utilization of funds.
III) Physical progress / status of project to be monitored on an ongoing basis
IV) Certificate from Chartered account and Architect to be submitted by the company on annual basis for progress
of construction of the said project in respect of amount incurred on the project.
a. Only I
b. Only IV
c. Only II
d. Only III
According to Bank’s guidelines on fraud prevention in SME loans relating to disposal of collateral security which of B
the following statement is/are correct :
I) Bank should file application for urgent hearing before DRAT to vacate the stay to be complied/ ensured, and
after vacating the stay, the properties should be sold under SARFAESI Act,
II) Details of property to be registered with CERSAI and CERSAI ID certificate for mortgaged properties to be kept
on record,
III) Copies of title deeds must be obtained at the time of creation of mortgage, IV) Independent verification of
mortgaged properties to be carried out only once
a. Only I, II and IV
b. Only I and II
c. Only I and IV
d. Only II and IV
Bank’s guidelines are in place for fraud prevention and mitigation measures in SME loans. which of the following D
statement is/are correct in respect of frauds owing to overvaluation of collateral and diversion of fund :
I) Value of the property offered as security to be independently verified by the Bank official and to be duly
recorded.
II) Due diligence on the supplier to be done and opinion report to be obtained. Funds to be disbursed directly to
borrower.
III) Deficiencies pointed out in various audit reports to be promptly attended and rectified.
IV) Account with other Bank to be closed as and when detected.
a. Only I and III
b. Only I, II and IV
c. Only I and IV
d. Only I, III and IV
Bank’s guidelines are in place for fraud prevention and mitigation measures in SME loans. which of the following C
statement is/are incorrect in respect of frauds owing to overvaluation of collateral and diversion of fund :
I) Value of the property offered as security to be independently verified by the Bank official and to be duly
recorded.
II) Due diligence on the supplier to be done and opinion report to be obtained. Funds to be disbursed directly to
borrower.
III) During post disbursement inspection, details of machineries purchased to be verified and periodic inspection to
be done at regular intervals.
Sunil SKA
102
According to Bank’s guidelines on fraud prevention in Cash Credit Limits which of the following statement is/are B
correct :
I) Transfer of funds among the family concerns to be permitted without any limit.
II) TIR to be obtained after every 3 years or at the time of enhancement.
III) Noting of charge with revenue authority on mortgaged property to be ensured immediately after creation of EM.
IV) CIBIL report to be periodically generated and scrutinized to ascertain borrowing from other banks/ FIs
a. Only I and IV
b. Only II, III and IV
c. Only I, II and IV
d. Only I and III
Preventive Vigilance Committee (PVC) is one of the tools for exercising preventive vigilance. Which of the A
following statement is/are correct :
I) 30% of staff members, minimum 3 officers / employees should be co-opted on the PVC of each unit.
II) The head of the Branch / Unit and official dealing with operational risk would be permanent members and other
members to be rotated at yearly intervals.
III) The meetings of PVCs be held at least once in 6 months.
IV) The controllers (any officer from controlling office-designated for the purpose) to guide the staff in identifying
the areas of vulnerability to frauds / malpractices, visit the branches / units periodically and if possible, to attend
meetings of PVCs, at least once in 6 months.
a. Only I, II and IV
b. Only II and IV
c. Only I and II
d. Only I and IV
Fraud Mitigation Measures include surprise verification of Agri gold loans. Surprise verification of gold loans is D
done by?
a. Joint Custodian
b. Regional Manager
c. Branch Manager
d. An officer other than the Joint Custodians
Which of the following is not a security feature in Cheque Truncation System (CTS-2010) for Fraud Mitigation C
Measures?
a. CTS India Watermark paper
b. Account Number Field
c. Telephone number field
d. Micro Lettering
Which among the following is/are among roles and responsibilities of Reviewing Authority under Whistle Blower D
Policy :
I) Functioning of the Policy will be reviewed by the Reviewing Authority on quarterly basis
II) Upon receiving the investigation report along with Designated Authority’s remark and recommendation,
Reviewing Authority may take a view on closure of the complaint or forward the same to the concerned department
for initiation of disciplinary proceedings.
III) The Reviewing Authority will be responsible to implement the Policy and ensure that the Policy is known to all
employees
IV) If any person (Whistle Blower) is aggrieved by any action on the ground that he is being victimized due to the
fact that he had filed a complaint or disclosure, he may file an application before the Reviewing Authority, seeking
redressal in the matter, wherein the Reviewing Authority may give suitable directions to the concerned person or
the authority.
a. Only I and IV
b. Only II and IV
c. Only I and II
d. Only I, II and IV
PIDPI means B
a. Public Interest Disclosure & Prevention of Incidents
b. Public Interest Disclosure & Protection of Informer
Sunil SKA
104
Sunil SKA