Beruflich Dokumente
Kultur Dokumente
I. INTRODUCTION ………………………………………………………………..............................….....1
II. DEFINITION OF TERMS…………………………………………………………………………..............1-5
III. RISK ASSESSMENT AND MANAGEMENT SYSTEM…………………………………..................6
A. Risk-Based Approach…………….…………………………………………………………................6
1. Product Risk.................................................................................................7
2. Interface/Delivery Channel Risk....................................................................7
3. Jurisdiction Risk...........................................................................................8
4. Customer Risk..............................................................................................9
B. Customer Risk Assessment……………………………………....…………………….............. 10
1. Risk Profiling…………………………………………………………………………………............10
2. Customer Due Diligence(CDD)……………………………………………………….............10
a. Customer Identification….……………………….…………….............…...........11
b. Prohibited Accounts………………………………………………………..................12
c. Legal Arrangements………………………………………………...........……….......12
d. New Technologies……………………………………………………….....................12
e. Renewal of Client’s Identification………………………………............…........12
f. Simplified/ Reduced CDD..................................................................12
C. Risk Mitigation……………………………………………………………………………..........……...13
1. Verification without Face-to-Face Contact…………………………………..........……13
2. Third Party Reliance………………………………………………………….........................14
3. Corporate Accounts……………………………………………………………......................14
4. Trust, Nominee, Agent & Fiduciary Accounts……………………….......................14
5. High-Risk Customers..…………………………………………………….......................…..15
6. Shell Companies……………………………………………………….................................15
7. Enhanced Due Diligence (EDD)……………………………………….........……………….. 15
D. Customer’s Documentation…………………………………………………………..........……...16
1. Record Keeping.…………………………………………………………….........…………….... 16
2. Access to Data………………………………………………………………........……………….....18