SlideShare a Scribd company logo
1 of 21
Precision Driven Confidence
Power smarter results with proven, global Sanctions, KYC, CIP,
AML and Anti-Corruption Solutions
Overview - Reed Elsevier & LexisNexis Risk Solutions
Leading provider of information solutions
• 28,000 employees; 250 locations; 32 countries
• Serving customers in 180 countries
In Scientific, Technical and Medical markets, we provide information and tools to
help customers improve scientific and healthcareoutcomes.
2
Risk Solutions
In Exhibitions, we are the world’s leading business events exhibitor with nearly 500
events in over 30 countries.
In Legal markets, we are a provider of legal, regulatory, news, business information
and analysis to legal, corporate, government and academic customers.
Legal & Professional
Listed on FTSE, NYSE and EURONEXT – (REL) (ENL/RUK) (REN)
In Risk Solutions, we provide data, analytics and insight that enables customers to
evaluate and manage risks, develop market intelligence, supporting more confident
decisions , improved economic outcomes and enhanced operationalefficiency.
• 2013 revenues $9.42bn, BBB Rating
• Invests $500m in technology every year
LexisNexis Risk Solutions (LNRS) – Fast Facts
• 6 of the world’s top 10 banks
• 100% of the top 50 U.S. banks
• 80% of the Fortune 500 companies
Customers in 139 countries
LNRS provides a combination of data, analytics and global expertise to enable customers to evaluate risk through
improved market intelligence to achieve greater economic results and enhanced operationalefficiency.
3
• Over 8,000 discreet customers and more than 100,000 online users
• Screening over 80 billion names against global watch lists per year
• Serving more than 500 million real-time transactions per year
Data and Content
4
Data + Technology + Professional Services
+2.5M profiles 1.5M PEPs
1200+ worldwide
government
sources
Relationships
Structured and
enhanced
profiles
+400 researchers
9 research
centers
Updated daily
240 Countries &
Territories
World Compliance Database
LexisNexis Risk Database - Category Coverage
Global Sanction and Enforcement List
Aggregation of the most important sanction lists around the world, e.g., OFAC, EU, UN, BoE, FBI, BIS.
In addition to over 1,000 enforcement lists and court filings worldwide, e.g., US SEC, UK FSA, German
Bafin, French Autorité des MarchesFinanciers.
Global Government -owned and Government -linkedList
Proprietary list of companies owned by or linked to government entities.
Global PEP List
Profiles of Politically Exposed Persons, their immediate family members and closeassociates.
Global Adverse Media List
Aggregation of information from over 30,000 newspapers and magazines in more than 70 languages.
• Multi-lingual profiles available and
searchable in English and local language.
Names are provided in non-romanised
character formats where required.
6
• As a matter of policy, every attempt is
made to find 3 different sources for all
profiles (with the exception of sanctioned
entities).
Over sixty risk categories
Aircraft hijacking
Antitrust violations
Arms trafficking
Asset freeze
Associate
Attorney
Bank fraud
Bribery
Burglary
Conspiracy
Corruption
Counterfeiting
Courts
Crime against humanity
Debarred
Diplomat
Disciplined
Disqualified
Drug trafficking
Embezzlement
Environmentalcrimes
Espionage
Explosives
Extort-Rack-Threats
Family member
Financial crimes
Forgery
Former PEP
Fraud
Fugitive
Gambling operations
Govt. branchmember
Healthcare fraud
Honoraryconsul
Piracy
Political candidate
Pollution
Pornography
Price manipulation
RICO
Securities fraud
Senior partymember
Smuggling
Stolen property
Tax evasion
Terrorism
Unauthorised
Union leadership
War crimes
WMD
Human rights abuse
Human trafficking
Insider trading
Interstate commerce
Investigation
Kidnapping
Labour violations
Mgmt. Govt. Corp.
Military
Money laundering
Mortgage fraud
Most wanted
Murder
Organised crime
Others
Peonage
Pharma trafficking
7
The following examples are intended to serve as aids to interpretation:
• Heads of state, government and cabinetministers
• Influential functionaries in nationalized industries and governmentadministration
• Senior judges
• Senior party functionaries
• Senior and/or influential officials, functionaries and military leaders and people with similar functions in
international or supranational organizations
• Members of ruling royal families*
• Senior and/or influential representatives of religious organizations (if these functions are connectedwith
political, judicial, military or administrative responsibilities
• Diplomats
Politically Exposed Persons (PEP)’s
8
Highlights - WorldCompliance Data
• Multilingual interface, search and name matching available in English,
Spanish, Russian, German, Portuguese, Chinese, Greek, Japanese,
Korean and Thai languages
• Ability to conduct name search in non-romanized languages (Arabic,
Chinese, Cyrillic, Farsi, French, Japanese, Swedish etc.)
• Configuration of rules, thresholds, risk categories and country risk
• Intelligent network presentation of relationships, associations and family
members within database
• Ability to request assistance from our leading research team
• 54% of the profiles contain Date of Birth as unique identifier
9
Increase visibility into critical elements of risk
Support the timely and accurate identification and resolution of potential
entities that may represent regulatory, reputational or financial risk to your
organization with robust access to critical details.
• Personally Identifiable Information: Access Date of birth, birth place, photograph, passport IDs,
national IDs, other forms of in country identification, gender, titles, roles, country affiliations and
addresses.
• Aliases: Understand different types of Aliases, including nick names, common names, weak
aliases, strong aliases and names represented in native script.
• Relationships: Examine relationships between organizations, individuals, companies, and vessels
are captured by our specialist research staff. The unique structure of the underlying relationship
trees allow for the recursive build out and discovery of 2nd, 3rd or any degree of indirect
relationships that may exist for the entity under review.
• Open Source Substantiation: All of the information in the WorldCompliance data is fully
substantiated with source links and references to the underlying source of the information.
Criticality of effective matching capabilities for sanction screening
Phonetics misspellings Typos
• Risk of overlooking a true hit must be balanced against cost of reviewing excessive false positives
• Exact match screening not sufficient
• “Fuzzy” matching has been given a bad name by poorimplementations
• Many different sources of variation in names
• Each source requires different techniques to matchappropriately
Transcription variants Derivatives names Structural
11
‫نمحرالدبع‬
• Abd al Rahman, Abd ur Rahman,
Abd ol Rahman, Abdul Rahman,
Abdel Rachman, Abderrahmane,
Abdurakhman, Abdorrahman…
English
• Steven, Stephen
• Write, Right, Wright
• Catherine, Kathryn Katherine
Italian
• Giuseppe:Beppe,
Peppe, Bepi
• Emanuele: Manu
• Omissions: Melanie > Melnie
• Additions: Rachel > Radchel
• Transpositions: Antonio > Atnonio
• Replacement: Elaine > Ekaine
• Choi Su-min, Su-min Choi
• Sadam Hussain, Sadam Hussain Al-Tikriti
• Faisal Bin Said, Faisal Bin Said Al Filistini
• George Bush, George WalkerBush
• Sarah Smith, Sarah Simpson-Smith
• Manuel Gomes Oliveira Da Costa e Silva, Manuel Da Costa
Technology – Access Options
12
Data + Technology + Professional Services
Access Options
WorldCompliance Online Search Tool Bridger Insight XG
13
Access Options
WorldCompliance Online Search Tool Bridger Insight XG
• Access to WorldCompliance Data
• Ability to screen 10 names / entities ata
time
• Identify risks in relationships toother
individuals and organizations
• Screen with YoB as secondary identifier to
reduce false positives
• Export to .pdf, .doc and email
• Create rules and adjustments to the
minimum % match on searches
• Pricing based on per user per year
14
• Access to WorldCompliance Data
• Enables real-time or automated screening(watch-list
triggered or risk-initiated screening)
• Ability to perform single search or full batchscreening
• Enables screening of custom lists (blacklist,accept
list, regulator control list)
• Identifies and flags positive hits anddistributes
automated alerts
• Bridger Insight XG provides robust audit trails for all
screenings performed and the changesmade
• Pricing based on number of names screened per
year. No limit to number of users – clients canassign
different access levels for each user in the company
(with full reporting functionality)
• API Integration
Thank you!
15
Types of Adverse Media: Unstructured
16
Types of Adverse Media: Unstructured
17
Disadvantages
• Boolean Search – No fuzzy matching
• Large number of false positives – No Accept List functionality, what’s on page
n + 1?
• Complicated search strings – Are you doing it right?
• Huge amounts of data to process
• Questionable reliability of information
LexisNexis Bridger Insight XG 18
How Structured Adverse Media is generated
Associates
Keywords
Additional
Information
Source and release
date
Risk Category:
FRAUD
These information elements found in the news releases are
used by LexisNexis® Research Teams around the world to
perform a comprehensive review of each of the individuals or
entities linked to the article. The outcome of such analysis will
be a “Structured Adverse Media Profile”
How Structured Adverse Media is generated
RiskCategory/UniqueIdentifiersSummaryConnectionsSources
How Structured Adverse Media is generated
• As noted, at the height of his notoriety a Google search for Bernard Madoff would
deliver 2.4 million results. Down to 500,000 today.
• One WorldCompliance profile.
21
Types of Adverse Media: Structured
Advantages
• A single global view of a normalize, link and structuring unstructured data
provided by the media into a structured report on a given individual.
• Possibility of cutting down on the sheer volume of information an analyst
needs to process.
• More focused and reliable key intelligence to assess financial risk

More Related Content

What's hot

Fraud Management ppt.pptx
Fraud Management ppt.pptxFraud Management ppt.pptx
Fraud Management ppt.pptx
jaramulat
 
Trade based money laundering dr. arefin , dg (prevention ) acc) on 23 may 2017
Trade based money laundering dr. arefin , dg (prevention ) acc) on 23 may 2017Trade based money laundering dr. arefin , dg (prevention ) acc) on 23 may 2017
Trade based money laundering dr. arefin , dg (prevention ) acc) on 23 may 2017
Shamsul Arefin
 
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
PECB
 
Financial crime anti-money laundering - bovill briefing
Financial crime   anti-money laundering - bovill briefingFinancial crime   anti-money laundering - bovill briefing
Financial crime anti-money laundering - bovill briefing
Bovill
 
Understanding Its Suspicious Activity Reporting (SAR) Requirement
Understanding Its Suspicious Activity Reporting (SAR) RequirementUnderstanding Its Suspicious Activity Reporting (SAR) Requirement
Understanding Its Suspicious Activity Reporting (SAR) Requirement
complianceonline123
 

What's hot (20)

Presentation AML
Presentation AMLPresentation AML
Presentation AML
 
Phishing Incident Response Playbook
Phishing Incident Response PlaybookPhishing Incident Response Playbook
Phishing Incident Response Playbook
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 
Splunk workshop-Threat Hunting
Splunk workshop-Threat HuntingSplunk workshop-Threat Hunting
Splunk workshop-Threat Hunting
 
Fraud Management ppt.pptx
Fraud Management ppt.pptxFraud Management ppt.pptx
Fraud Management ppt.pptx
 
Sanctions Risk - What's the Problem?
Sanctions Risk - What's the Problem? Sanctions Risk - What's the Problem?
Sanctions Risk - What's the Problem?
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Trade based money laundering dr. arefin , dg (prevention ) acc) on 23 may 2017
Trade based money laundering dr. arefin , dg (prevention ) acc) on 23 may 2017Trade based money laundering dr. arefin , dg (prevention ) acc) on 23 may 2017
Trade based money laundering dr. arefin , dg (prevention ) acc) on 23 may 2017
 
AML presentation
AML presentationAML presentation
AML presentation
 
Effective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat Intelligence
 
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
 
Cyber Threat hunting workshop
Cyber Threat hunting workshopCyber Threat hunting workshop
Cyber Threat hunting workshop
 
Financial crime anti-money laundering - bovill briefing
Financial crime   anti-money laundering - bovill briefingFinancial crime   anti-money laundering - bovill briefing
Financial crime anti-money laundering - bovill briefing
 
Understanding Its Suspicious Activity Reporting (SAR) Requirement
Understanding Its Suspicious Activity Reporting (SAR) RequirementUnderstanding Its Suspicious Activity Reporting (SAR) Requirement
Understanding Its Suspicious Activity Reporting (SAR) Requirement
 
Money Laundering and Terrorist Financing in a Nutshell: Chapter One
Money Laundering and Terrorist Financing in a Nutshell: Chapter OneMoney Laundering and Terrorist Financing in a Nutshell: Chapter One
Money Laundering and Terrorist Financing in a Nutshell: Chapter One
 
RPで受け入れる認証器を選択する ~Idance lesson 2~
RPで受け入れる認証器を選択する ~Idance lesson 2~RPで受け入れる認証器を選択する ~Idance lesson 2~
RPで受け入れる認証器を選択する ~Idance lesson 2~
 
AML Training uba capital
AML Training uba capitalAML Training uba capital
AML Training uba capital
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...
SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...
SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...
 

Similar to Financial Crime Compliance

Global Sanction Search Sales Slick 2012
Global Sanction Search Sales Slick   2012Global Sanction Search Sales Slick   2012
Global Sanction Search Sales Slick 2012
tessamiller1
 
BIS Capabilities Presentation
BIS Capabilities PresentationBIS Capabilities Presentation
BIS Capabilities Presentation
Tim Bayer
 

Similar to Financial Crime Compliance (20)

National Preparedness, Lawbreaker Identification, Patient Engagement, Discove...
National Preparedness, Lawbreaker Identification, Patient Engagement, Discove...National Preparedness, Lawbreaker Identification, Patient Engagement, Discove...
National Preparedness, Lawbreaker Identification, Patient Engagement, Discove...
 
Global Sanction Search Sales Slick 2012
Global Sanction Search Sales Slick   2012Global Sanction Search Sales Slick   2012
Global Sanction Search Sales Slick 2012
 
Christchurch presentation
Christchurch presentationChristchurch presentation
Christchurch presentation
 
Using cognitive computing to better analyze human communication
Using cognitive computing to better analyze human communicationUsing cognitive computing to better analyze human communication
Using cognitive computing to better analyze human communication
 
SMARTLINX
SMARTLINXSMARTLINX
SMARTLINX
 
FHIR for implementers in New Zealand
FHIR for implementers in New ZealandFHIR for implementers in New Zealand
FHIR for implementers in New Zealand
 
Cortellis for CI Slides
Cortellis for CI SlidesCortellis for CI Slides
Cortellis for CI Slides
 
IBM Watson Content Analytics: Discover Hidden Value in Your Unstructured Data
IBM Watson Content Analytics: Discover Hidden Value in Your Unstructured DataIBM Watson Content Analytics: Discover Hidden Value in Your Unstructured Data
IBM Watson Content Analytics: Discover Hidden Value in Your Unstructured Data
 
Brochure: Lexis Diligence
Brochure: Lexis Diligence Brochure: Lexis Diligence
Brochure: Lexis Diligence
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity Theft
 
Brochure: Nexis, Access to int 36.000 sources, online and offline
Brochure: Nexis, Access to int 36.000 sources, online and offlineBrochure: Nexis, Access to int 36.000 sources, online and offline
Brochure: Nexis, Access to int 36.000 sources, online and offline
 
Smartlinx
SmartlinxSmartlinx
Smartlinx
 
Lexis Diligence overview
Lexis Diligence overview Lexis Diligence overview
Lexis Diligence overview
 
Behavioral Analytics for Financial Intelligence
Behavioral Analytics for Financial IntelligenceBehavioral Analytics for Financial Intelligence
Behavioral Analytics for Financial Intelligence
 
Big Data & Taxonomies for Actionable Intelligence
Big Data & Taxonomies for Actionable IntelligenceBig Data & Taxonomies for Actionable Intelligence
Big Data & Taxonomies for Actionable Intelligence
 
Rethinking The Conventions Of Market Research_Orc Consumer Deck presented to ...
Rethinking The Conventions Of Market Research_Orc Consumer Deck presented to ...Rethinking The Conventions Of Market Research_Orc Consumer Deck presented to ...
Rethinking The Conventions Of Market Research_Orc Consumer Deck presented to ...
 
BIS Capabilities Presentation
BIS Capabilities PresentationBIS Capabilities Presentation
BIS Capabilities Presentation
 
WGI
WGIWGI
WGI
 

Recently uploaded

Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
riyasharma00119
 
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls In {Connaught Place Delhi} 9667938988 IndianRussian High Profile E...
Call Girls In {Connaught Place Delhi} 9667938988 IndianRussian High Profile E...Call Girls In {Connaught Place Delhi} 9667938988 IndianRussian High Profile E...
Call Girls In {Connaught Place Delhi} 9667938988 IndianRussian High Profile E...
aakahthapa70
 
Girls For Night in Islamabad | 03274100048 🔞
Girls For Night in Islamabad | 03274100048 🔞Girls For Night in Islamabad | 03274100048 🔞
Girls For Night in Islamabad | 03274100048 🔞
Ifra Zohaib
 
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Sana Rajpoot
 
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Sana Rajpoot
 
Call Girls in Pakistan || 🥵 03280288848 || Pakistan Escorts
Call Girls in Pakistan || 🥵 03280288848 || Pakistan EscortsCall Girls in Pakistan || 🥵 03280288848 || Pakistan Escorts
Call Girls in Pakistan || 🥵 03280288848 || Pakistan Escorts
Ifra Zohaib
 

Recently uploaded (20)

Nagpur ❤CALL GIRL 9874883814 ❤CALL GIRLS IN nagpur ESCORT SERVICE❤CALL GIRL I...
Nagpur ❤CALL GIRL 9874883814 ❤CALL GIRLS IN nagpur ESCORT SERVICE❤CALL GIRL I...Nagpur ❤CALL GIRL 9874883814 ❤CALL GIRLS IN nagpur ESCORT SERVICE❤CALL GIRL I...
Nagpur ❤CALL GIRL 9874883814 ❤CALL GIRLS IN nagpur ESCORT SERVICE❤CALL GIRL I...
 
Hire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls Agency
Hire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls AgencyHire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls Agency
Hire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls Agency
 
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
 
Digha Call Girl Service 97487*63073 Call Girls in Digha Escort service book...
Digha  Call Girl Service 97487*63073 Call Girls in Digha  Escort service book...Digha  Call Girl Service 97487*63073 Call Girls in Digha  Escort service book...
Digha Call Girl Service 97487*63073 Call Girls in Digha Escort service book...
 
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
 
Vip profile Call Girls In Hyderabad 9748763073 For Genuine Sex Service At Jus...
Vip profile Call Girls In Hyderabad 9748763073 For Genuine Sex Service At Jus...Vip profile Call Girls In Hyderabad 9748763073 For Genuine Sex Service At Jus...
Vip profile Call Girls In Hyderabad 9748763073 For Genuine Sex Service At Jus...
 
Rajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
Rajkot Call Girls Contact Number +919358341802 Call Girls In RajkotRajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
Rajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
 
Indore ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
Indore  ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book nowIndore  ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
Indore ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
 
Call Girls In {Connaught Place Delhi} 9667938988 IndianRussian High Profile E...
Call Girls In {Connaught Place Delhi} 9667938988 IndianRussian High Profile E...Call Girls In {Connaught Place Delhi} 9667938988 IndianRussian High Profile E...
Call Girls In {Connaught Place Delhi} 9667938988 IndianRussian High Profile E...
 
Girls For Night in Islamabad | 03274100048 🔞
Girls For Night in Islamabad | 03274100048 🔞Girls For Night in Islamabad | 03274100048 🔞
Girls For Night in Islamabad | 03274100048 🔞
 
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
 
Mysore Call girl service 6289102337 Mysore escort service
Mysore Call girl service 6289102337 Mysore escort serviceMysore Call girl service 6289102337 Mysore escort service
Mysore Call girl service 6289102337 Mysore escort service
 
Haldwani call girls 📞 8617697112 At Low Cost Cash Payment Booking
Haldwani call girls 📞 8617697112 At Low Cost Cash Payment BookingHaldwani call girls 📞 8617697112 At Low Cost Cash Payment Booking
Haldwani call girls 📞 8617697112 At Low Cost Cash Payment Booking
 
Hyderabad ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Hyderabad ESCORT SERVICE❤CALL ...
Hyderabad ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Hyderabad ESCORT SERVICE❤CALL ...Hyderabad ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Hyderabad ESCORT SERVICE❤CALL ...
Hyderabad ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Hyderabad ESCORT SERVICE❤CALL ...
 
FARIDABAD CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
FARIDABAD CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICEFARIDABAD CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
FARIDABAD CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
Mysore 💋 Call Girl 9748763073 Call Girls in Mysore Escort service book now
Mysore 💋 Call Girl 9748763073 Call Girls in Mysore Escort service book nowMysore 💋 Call Girl 9748763073 Call Girls in Mysore Escort service book now
Mysore 💋 Call Girl 9748763073 Call Girls in Mysore Escort service book now
 
Kolkata 💋 Call Girl 9748763073 Call Girls in Kolkata Escort service book now
Kolkata 💋 Call Girl 9748763073 Call Girls in Kolkata Escort service book nowKolkata 💋 Call Girl 9748763073 Call Girls in Kolkata Escort service book now
Kolkata 💋 Call Girl 9748763073 Call Girls in Kolkata Escort service book now
 
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
 
Call Girls in Pakistan || 🥵 03280288848 || Pakistan Escorts
Call Girls in Pakistan || 🥵 03280288848 || Pakistan EscortsCall Girls in Pakistan || 🥵 03280288848 || Pakistan Escorts
Call Girls in Pakistan || 🥵 03280288848 || Pakistan Escorts
 
Bhubaneswar ❣️ Call Girl 9748763073 Call Girls in Bhubaneswar Escort service ...
Bhubaneswar ❣️ Call Girl 9748763073 Call Girls in Bhubaneswar Escort service ...Bhubaneswar ❣️ Call Girl 9748763073 Call Girls in Bhubaneswar Escort service ...
Bhubaneswar ❣️ Call Girl 9748763073 Call Girls in Bhubaneswar Escort service ...
 

Financial Crime Compliance

  • 1. Precision Driven Confidence Power smarter results with proven, global Sanctions, KYC, CIP, AML and Anti-Corruption Solutions
  • 2. Overview - Reed Elsevier & LexisNexis Risk Solutions Leading provider of information solutions • 28,000 employees; 250 locations; 32 countries • Serving customers in 180 countries In Scientific, Technical and Medical markets, we provide information and tools to help customers improve scientific and healthcareoutcomes. 2 Risk Solutions In Exhibitions, we are the world’s leading business events exhibitor with nearly 500 events in over 30 countries. In Legal markets, we are a provider of legal, regulatory, news, business information and analysis to legal, corporate, government and academic customers. Legal & Professional Listed on FTSE, NYSE and EURONEXT – (REL) (ENL/RUK) (REN) In Risk Solutions, we provide data, analytics and insight that enables customers to evaluate and manage risks, develop market intelligence, supporting more confident decisions , improved economic outcomes and enhanced operationalefficiency. • 2013 revenues $9.42bn, BBB Rating • Invests $500m in technology every year
  • 3. LexisNexis Risk Solutions (LNRS) – Fast Facts • 6 of the world’s top 10 banks • 100% of the top 50 U.S. banks • 80% of the Fortune 500 companies Customers in 139 countries LNRS provides a combination of data, analytics and global expertise to enable customers to evaluate risk through improved market intelligence to achieve greater economic results and enhanced operationalefficiency. 3 • Over 8,000 discreet customers and more than 100,000 online users • Screening over 80 billion names against global watch lists per year • Serving more than 500 million real-time transactions per year
  • 4. Data and Content 4 Data + Technology + Professional Services
  • 5. +2.5M profiles 1.5M PEPs 1200+ worldwide government sources Relationships Structured and enhanced profiles +400 researchers 9 research centers Updated daily 240 Countries & Territories World Compliance Database
  • 6. LexisNexis Risk Database - Category Coverage Global Sanction and Enforcement List Aggregation of the most important sanction lists around the world, e.g., OFAC, EU, UN, BoE, FBI, BIS. In addition to over 1,000 enforcement lists and court filings worldwide, e.g., US SEC, UK FSA, German Bafin, French Autorité des MarchesFinanciers. Global Government -owned and Government -linkedList Proprietary list of companies owned by or linked to government entities. Global PEP List Profiles of Politically Exposed Persons, their immediate family members and closeassociates. Global Adverse Media List Aggregation of information from over 30,000 newspapers and magazines in more than 70 languages. • Multi-lingual profiles available and searchable in English and local language. Names are provided in non-romanised character formats where required. 6 • As a matter of policy, every attempt is made to find 3 different sources for all profiles (with the exception of sanctioned entities).
  • 7. Over sixty risk categories Aircraft hijacking Antitrust violations Arms trafficking Asset freeze Associate Attorney Bank fraud Bribery Burglary Conspiracy Corruption Counterfeiting Courts Crime against humanity Debarred Diplomat Disciplined Disqualified Drug trafficking Embezzlement Environmentalcrimes Espionage Explosives Extort-Rack-Threats Family member Financial crimes Forgery Former PEP Fraud Fugitive Gambling operations Govt. branchmember Healthcare fraud Honoraryconsul Piracy Political candidate Pollution Pornography Price manipulation RICO Securities fraud Senior partymember Smuggling Stolen property Tax evasion Terrorism Unauthorised Union leadership War crimes WMD Human rights abuse Human trafficking Insider trading Interstate commerce Investigation Kidnapping Labour violations Mgmt. Govt. Corp. Military Money laundering Mortgage fraud Most wanted Murder Organised crime Others Peonage Pharma trafficking 7
  • 8. The following examples are intended to serve as aids to interpretation: • Heads of state, government and cabinetministers • Influential functionaries in nationalized industries and governmentadministration • Senior judges • Senior party functionaries • Senior and/or influential officials, functionaries and military leaders and people with similar functions in international or supranational organizations • Members of ruling royal families* • Senior and/or influential representatives of religious organizations (if these functions are connectedwith political, judicial, military or administrative responsibilities • Diplomats Politically Exposed Persons (PEP)’s 8
  • 9. Highlights - WorldCompliance Data • Multilingual interface, search and name matching available in English, Spanish, Russian, German, Portuguese, Chinese, Greek, Japanese, Korean and Thai languages • Ability to conduct name search in non-romanized languages (Arabic, Chinese, Cyrillic, Farsi, French, Japanese, Swedish etc.) • Configuration of rules, thresholds, risk categories and country risk • Intelligent network presentation of relationships, associations and family members within database • Ability to request assistance from our leading research team • 54% of the profiles contain Date of Birth as unique identifier 9
  • 10. Increase visibility into critical elements of risk Support the timely and accurate identification and resolution of potential entities that may represent regulatory, reputational or financial risk to your organization with robust access to critical details. • Personally Identifiable Information: Access Date of birth, birth place, photograph, passport IDs, national IDs, other forms of in country identification, gender, titles, roles, country affiliations and addresses. • Aliases: Understand different types of Aliases, including nick names, common names, weak aliases, strong aliases and names represented in native script. • Relationships: Examine relationships between organizations, individuals, companies, and vessels are captured by our specialist research staff. The unique structure of the underlying relationship trees allow for the recursive build out and discovery of 2nd, 3rd or any degree of indirect relationships that may exist for the entity under review. • Open Source Substantiation: All of the information in the WorldCompliance data is fully substantiated with source links and references to the underlying source of the information.
  • 11. Criticality of effective matching capabilities for sanction screening Phonetics misspellings Typos • Risk of overlooking a true hit must be balanced against cost of reviewing excessive false positives • Exact match screening not sufficient • “Fuzzy” matching has been given a bad name by poorimplementations • Many different sources of variation in names • Each source requires different techniques to matchappropriately Transcription variants Derivatives names Structural 11 ‫نمحرالدبع‬ • Abd al Rahman, Abd ur Rahman, Abd ol Rahman, Abdul Rahman, Abdel Rachman, Abderrahmane, Abdurakhman, Abdorrahman… English • Steven, Stephen • Write, Right, Wright • Catherine, Kathryn Katherine Italian • Giuseppe:Beppe, Peppe, Bepi • Emanuele: Manu • Omissions: Melanie > Melnie • Additions: Rachel > Radchel • Transpositions: Antonio > Atnonio • Replacement: Elaine > Ekaine • Choi Su-min, Su-min Choi • Sadam Hussain, Sadam Hussain Al-Tikriti • Faisal Bin Said, Faisal Bin Said Al Filistini • George Bush, George WalkerBush • Sarah Smith, Sarah Simpson-Smith • Manuel Gomes Oliveira Da Costa e Silva, Manuel Da Costa
  • 12. Technology – Access Options 12 Data + Technology + Professional Services
  • 13. Access Options WorldCompliance Online Search Tool Bridger Insight XG 13
  • 14. Access Options WorldCompliance Online Search Tool Bridger Insight XG • Access to WorldCompliance Data • Ability to screen 10 names / entities ata time • Identify risks in relationships toother individuals and organizations • Screen with YoB as secondary identifier to reduce false positives • Export to .pdf, .doc and email • Create rules and adjustments to the minimum % match on searches • Pricing based on per user per year 14 • Access to WorldCompliance Data • Enables real-time or automated screening(watch-list triggered or risk-initiated screening) • Ability to perform single search or full batchscreening • Enables screening of custom lists (blacklist,accept list, regulator control list) • Identifies and flags positive hits anddistributes automated alerts • Bridger Insight XG provides robust audit trails for all screenings performed and the changesmade • Pricing based on number of names screened per year. No limit to number of users – clients canassign different access levels for each user in the company (with full reporting functionality) • API Integration
  • 16. Types of Adverse Media: Unstructured 16
  • 17. Types of Adverse Media: Unstructured 17 Disadvantages • Boolean Search – No fuzzy matching • Large number of false positives – No Accept List functionality, what’s on page n + 1? • Complicated search strings – Are you doing it right? • Huge amounts of data to process • Questionable reliability of information
  • 18. LexisNexis Bridger Insight XG 18 How Structured Adverse Media is generated Associates Keywords Additional Information Source and release date Risk Category: FRAUD These information elements found in the news releases are used by LexisNexis® Research Teams around the world to perform a comprehensive review of each of the individuals or entities linked to the article. The outcome of such analysis will be a “Structured Adverse Media Profile”
  • 19. How Structured Adverse Media is generated RiskCategory/UniqueIdentifiersSummaryConnectionsSources
  • 20. How Structured Adverse Media is generated • As noted, at the height of his notoriety a Google search for Bernard Madoff would deliver 2.4 million results. Down to 500,000 today. • One WorldCompliance profile.
  • 21. 21 Types of Adverse Media: Structured Advantages • A single global view of a normalize, link and structuring unstructured data provided by the media into a structured report on a given individual. • Possibility of cutting down on the sheer volume of information an analyst needs to process. • More focused and reliable key intelligence to assess financial risk