This document discusses Know Your Customer (KYC) procedures and money laundering prevention. It outlines the objectives of understanding KYC forms, elements, requirements, and advantages. KYC involves obtaining customer identity and address information to prevent financial crimes like money laundering and terrorist financing. The document also discusses suspicious transaction monitoring, money laundering risks and stages, and the importance of KYC compliance for banks.
All clients are required to provide up-to-date identification details and apprise the company in any changes or modification. The Client must hand over current the following identification information, complete name, current residence, a document or proof of previous, history of online transaction and e-mail address.
All clients are required to provide up-to-date identification details and apprise the company in any changes or modification. The Client must hand over current the following identification information, complete name, current residence, a document or proof of previous, history of online transaction and e-mail address.
Financial ethical issues presentation by Ihsanullah mansoor from Afghanistan,currently enrolled student of the University of Haripur ,Haripur KPK,Pakistan
Financial ethical issues presentation by Ihsanullah mansoor from Afghanistan,currently enrolled student of the University of Haripur ,Haripur KPK,Pakistan
The Building Blocks of QuestDB, a Time Series Databasejavier ramirez
Talk Delivered at Valencia Codes Meetup 2024-06.
Traditionally, databases have treated timestamps just as another data type. However, when performing real-time analytics, timestamps should be first class citizens and we need rich time semantics to get the most out of our data. We also need to deal with ever growing datasets while keeping performant, which is as fun as it sounds.
It is no wonder time-series databases are now more popular than ever before. Join me in this session to learn about the internal architecture and building blocks of QuestDB, an open source time-series database designed for speed. We will also review a history of some of the changes we have gone over the past two years to deal with late and unordered data, non-blocking writes, read-replicas, or faster batch ingestion.
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdfEnterprise Wired
In this guide, we'll explore the key considerations and features to look for when choosing a Trusted analytics platform that meets your organization's needs and delivers actionable intelligence you can trust.
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...sameer shah
"Join us for STATATHON, a dynamic 2-day event dedicated to exploring statistical knowledge and its real-world applications. From theory to practice, participants engage in intensive learning sessions, workshops, and challenges, fostering a deeper understanding of statistical methodologies and their significance in various fields."
Analysis insight about a Flyball dog competition team's performanceroli9797
Insight of my analysis about a Flyball dog competition team's last year performance. Find more: https://github.com/rolandnagy-ds/flyball_race_analysis/tree/main
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdfGetInData
Recently we have observed the rise of open-source Large Language Models (LLMs) that are community-driven or developed by the AI market leaders, such as Meta (Llama3), Databricks (DBRX) and Snowflake (Arctic). On the other hand, there is a growth in interest in specialized, carefully fine-tuned yet relatively small models that can efficiently assist programmers in day-to-day tasks. Finally, Retrieval-Augmented Generation (RAG) architectures have gained a lot of traction as the preferred approach for LLMs context and prompt augmentation for building conversational SQL data copilots, code copilots and chatbots.
In this presentation, we will show how we built upon these three concepts a robust Data Copilot that can help to democratize access to company data assets and boost performance of everyone working with data platforms.
Why do we need yet another (open-source ) Copilot?
How can we build one?
Architecture and evaluation
State of Artificial intelligence Report 2023kuntobimo2016
Artificial intelligence (AI) is a multidisciplinary field of science and engineering whose goal is to create intelligent machines.
We believe that AI will be a force multiplier on technological progress in our increasingly digital, data-driven world. This is because everything around us today, ranging from culture to consumer products, is a product of intelligence.
The State of AI Report is now in its sixth year. Consider this report as a compilation of the most interesting things we’ve seen with a goal of triggering an informed conversation about the state of AI and its implication for the future.
We consider the following key dimensions in our report:
Research: Technology breakthroughs and their capabilities.
Industry: Areas of commercial application for AI and its business impact.
Politics: Regulation of AI, its economic implications and the evolving geopolitics of AI.
Safety: Identifying and mitigating catastrophic risks that highly-capable future AI systems could pose to us.
Predictions: What we believe will happen in the next 12 months and a 2022 performance review to keep us honest.
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeWalaa Eldin Moustafa
Dynamic policy enforcement is becoming an increasingly important topic in today’s world where data privacy and compliance is a top priority for companies, individuals, and regulators alike. In these slides, we discuss how LinkedIn implements a powerful dynamic policy enforcement engine, called ViewShift, and integrates it within its data lake. We show the query engine architecture and how catalog implementations can automatically route table resolutions to compliance-enforcing SQL views. Such views have a set of very interesting properties: (1) They are auto-generated from declarative data annotations. (2) They respect user-level consent and preferences (3) They are context-aware, encoding a different set of transformations for different use cases (4) They are portable; while the SQL logic is only implemented in one SQL dialect, it is accessible in all engines.
#SQL #Views #Privacy #Compliance #DataLake
2. Objectives of the study
To understand in detail the meaning of KYC.
To take a look at the KYC forms maintained by different banks.
To analyse the core elements of KYC and when it is required.
To show the Dos and Don’ts for bank officers.
To highlight the advantages of KYC norms.
To discuss about Money Laundering.
3. What is KYC...??
KYC stands for ‘Know Your Customer’
In the year 2002, RBI instructed that all the banks must obtain information about
their customers’ identity and address. From that time onwards, it has been carried
out by a process called KYC.
It is a process by which banks obtain information about the identity and address of
the customers and helps to ensure that banks’ services are not misused
Banks are also required to periodically update their customers’ KYC details
It enables banks to know / understand their customers and their financial dealings
so as to be able to serve them better.
Know your customer (KYC) policy is an important step developed globally to
prevent:
Identity theft
Financial fraud
Money laundering and
Terrorist financing
5. Defining a Customer
Individual
Company/ Business Entity
Professional Intermediaries such as Stock
Broker
CharteredAccountants, Solicitors etc
Any person or entity connected with a
financial transaction
Asks ’KYC’
Customer
6. Core elements of KYC
CustomerAcceptance Policy
Customer Identification Procedure- Customer Profile
Monitoring of a customer’s transactions against their expected behavior and
recorded profile as well as that of the customer’s peers
Risk Management
Determination of the customer’s risk in terms of propensity to commit
money laundering, terrorist finance or identity theft
Reporting of cash and suspicious transactions
7. When KYC is required…??
• Opening an account in a bank
• Applying for a Credit card or Loan
• Opening a subsequent account
• Opening a Locker facility
• While investing in a Mutual fund
• Financial institutes may ask for a mandatory KYC process in other instances too
• When there are not enough documents with the Bank in existing account
• When there are changes in Signatories, Beneficial owners, etc
• When the bank feels it necessary to obtain additional information from existing
customers based on conduct of the account
8. Bank officers- do’s & don’ts
▶ Exercise constant vigilance right from opening of new accounts
▶ Know your customer & know your colleagues
▶ Separate legitimate business & illegitimate /irregular/ suspicious business
▶ Always think of bank’s reputation/clean image
▶ Develop risk aware culture- – a good customer today may not be good
tomorrow
▶ Do not exercise willful blindness
▶ Involve in public awareness of KYC issues
9. KYC does not mean
▶ Denial of Service to the Common Person
▶ Intrusive Behavior
▶ Use of information for cross selling
▶ Harassment of customers- threatening to close down the accounts
arbitrarily
10. Advantages of KYC norms
Sound KYC procedures have particular relevance to the safety and
soundness of banks, in that:
They help to protect banks’ reputation and the integrity of banking
systems by reducing the likelihood of banks becoming a vehicle for or a
victim of financial crime and suffering consequential reputational damage;
They provide an essential part of sound risk management system (basis
for identifying, limiting and controlling risk exposures in assets &
liabilities)
11. Suspicious Transactions
▶ Providing misleading information / information not easily verifiable while
opening an Account
▶ Large cash withdrawals from: a dormant or inactive account or account
with unexpected large credit from abroad
▶ Sudden increase in cash deposits of an individual with no justification
▶ Employees leading lavish lifestyles that do not match their known income
sources
12. Stages of the Money Laundering
1. Placement
Induction of illegal money into the
financial system
2. Layering
Multiple transactions to confuse the
audit trail and distance the original
source of funds (e.g. successive
transactions, international transfers).
3. Integration
than integrating funds back into the real
economy as “clean and
Respectable money
13. Money Laundering
Risks to banks?
(I) Reputational risk
(ii) Legal risk
(iii) Operational risk
All risks are inter-related and together have the potential of causing
serious threat to the survival of the bank
14. Risk Category
o High Risk Customers (CDD – Every Transaction)
i) non-resident customers
ii) private banking customers
iii) legal persons
o Medium risk customers ( CDD – Only on High amount)
i) documentary businesses
o Low risk customers ( CDD – Yearly )
15. Prevention of Money Laundering
Observing Rules for
Bankers
Customer
due Diligence
Identifying
Irregular / Suspicious
Transactions
Compliance with
Laws
Money Laundering
Prevention
16. Conclusion
▶ The objectives of KYC guidelines is to prevent banks from being used,
intentionally or unintentionally, by criminal elements for money laundering
activities.
▶ The main objective of this policy is to prevent money laundering, identity
theft, terrorist financing, and financial frauds.
▶ Related procedures of KYC also enable banks to better understand their
customers and their financial dealings. This helps them manage their risks
prudently.
▶ KYC policy is an indispensable part of banking operation, whether it’s
about account opening or advancement of loans. Because it helps to
ensure that the services are not misused.