You are on page 1of 31

Suspicious Transaction

Identification and Reporting

Transaction Monitoring
Techniques
1. MvnKi jb`b gwbUwis Kb t-

wbRi Rb: wbRi PvKzixi wbivcv wbwZ Kivi Rb GwU


cqvRbxq|

cwZvbi Rb : `xN gqv` cwZvbi mybvg iv I


SuywKgy ivLZ GwU AZvekK| GGgGj evsKi 6wU Kvi
wii GKwU| lvbvwmK wfwZ CAMELS Rating wbYq
GGgGj iwUsI Af iqQ| Gi gvag evsjv`k evsK Kvb
evsKi mse`bkxjZv I mgZv wbYq Ki|

`ki Rb: `ki wbivcv I mgwi ^v_ gvwb jvwis I


mvm A_vqb cwZiva Kiv cqvRb| mvmx iv ev
`ybxwZM ivi Kvjv ZvwjKv _K gywi jI GwU
cqvRbxq|

AvRvwZK wewaweavb cwicvjb: GdGwUGd Gi


mycvwik evevqb, BDGb Gi bvbvwea iRyjykb cwicvjb,
AvwjK I AvRvwZK mycvwik evevqbi Rb GwU AvekK|
2

Transaction Monitoring Techniques

2. jb`b gwbUwis Gi cwZ t wnmve Lvjvi h_vh_ I mvgmc~Yfve KYC


I TP bqv|
wnmve Lvjvi mgq MvnKi NvwlZ wUwc Zvi
vZ Avqi mv_ mvgmc~Y wKbv Zv hvPvB
Kiv|
MvnK Zvi cwiwPwZ I Avqi Z_ c`vb
Mwogwm KiQ wKbv Zv AejvKb Kiv|
MvnK KZK wnmve cwiPvjbvi KYC I TP
h_vh_fve AbymiY Kiv nQ wKbv Zv AejvKb Kiv|
KYC I TP nvjbvMv` Kivi nvjbvMv`KZ wUwc
vZ Avqi mv_ mvgmc~Y wKbv Zv hvPvB
Kiv|
3

Transaction Monitoring Techniques


nvjbvMv`KZ

KYC I TP Gi wfwZ wi MwWs

cZ Kiv|
DP SuywKhy MvnK`i ZvwjKv Zix KiZt Zv`i
jb`b wbqwgZ gwbUi Kiv|
NvwlZ wUwci mv_ jb`b A^vfvweKZv `Lv Mj
MvnKi wbKU _K D jb`bi MnYhvM eLv
Av`vq Kiv|
PEPs MvnK`i wnmve Lvjvi DaZb
eevcbvi Abygv`b MnY Ges jb`bi AwZwi
mZKZv Aej^b Kiv|
e`wkK iwgUn Abvb BbIqvW I AvDUIqvW
iwgU Gi MwZ-cKwZ, MvnKi eemv/Avqi
mv_ Gi mvgmZv, iwgU cvwi/ciYi
hwKZv BZvw` gwbUwis Kiv|
4

CTR Analysis
bM` jb`b wicvwUs (CTR)
evsjv`k evsK wicvU KiZ ne, hw`
GKwU wnmve
GKw`b
10 j UvKv
bM` Rgv ev bM` Dvjb nq|
(AbjvBb jb`bmn)
(CTR Gi Rb wbavwiZ dig iqQ)

CTR Analysis
Kvk

iwRvi/weeiYxi mv_ H gvm `vwLjKZ CTR


wicvU kvLv KZK cixvc~eK Gi mwVKZv
wbwZ KiZ ne|
`wbK wfwZ MvnKi wmwUAvi hvPvB I weklb
KiZ ne|
DP SuywKhy MvnKi wmwUAvi wbqwgZfve
hvPvB KiZ ne| jb`b A^vfvweKZv cwijwZ nj
MvnKi KvQ _K jb`bi hwKZvi NvlYv msMn
KiZ ne|
wmwUAvi weklY Kvb MvnKi jb`b A^vfvweK
gb nj MvnKi KvQ _K jb`bi KviY/eLv
msMn KiZ ne| MvnK c` eLv mvlRbK bv
nj Zv m`nRbK jb`b wnmve wPwnZ KiZt CAMLCO
Gi gvag evsjv`k evsK wicvU KiZ ne|
6

Structuring Monitoring
gvwbjvwis

cwZiva AvBb, 2012 Gi 2(d)(C)


aviv Abyhvqx Structuring GKwU gvwb jvwis
Aciva|
Structuring ejZ eySvq, Kvb Avw_K jb`b
Gicfve mb Kiv ev mb Kivi Pv Kiv
hvZ AvBbi Aaxb Zv wicvU Kivi cqvRb bv
nq|
kvLv Ggb GKwU cwqv Aej^b Kie hvZ
Kvb wnmve Structuring cKwZi jb`b
cwijwZ nj Zv mnR D`&&NvUb I wbweo
Z`viwKi AvIZvq Avbv hvq|
mevcwi Structuring mbv nj Zv m`nRbK
jb`b wnme wPwnZ KiZt CAMLCO Gi gvag
evsjv`k evsK wicvU KiZ ne|
7

m`nRbK jb`b wK?


MvnKi

eemvwqK, Avw_K I Abvb KgKvi


mv_ Amvgmc~Y AvPiY/jb`bK m`nRbK
jb`b/Kvhg wnmve weePbv Kiv nq|

gvwbjvwis

cwZiva AvBb, 2012 Gi 2(h)

aviv
m`nRbK jb`b A_ GBic jb`b--(1) hvnv ^vfvweK jb`bi aib nBZ wfb;
(2) h jb`b mK GBic aviYv nq h,
(K) Bnv Kvb Aciva nBZ AwRZ m`,
(L) Bnv Kvb mvmx Kvh, Kvb mvmx
msMVbK ev Kvb
mvmxK A_vqb;
8

Unusual vs. suspicious


activity
Unusual Activity
Something out of the normal pattern.
It may require additional investigation
to conclude whether the transaction is
suspicious or genuine.
All unusual transactions are not
suspicious.
Suspicious Activity
Any activity/ transaction where a
dishonest action may be involved.
Suspicious activity can be identified
through various red flags ( indicators of
suspicious activity).

Indicators of unusual activity

10

Indicators of suspicious activity

11

m`nRbK jb`b

12

A^vfvweK jb`b
^vfvwe
K jb`b

A^vfvw
eK
jb`b

wnmve Lvjvi dig


c` Z_
mieivnKZ KvMRc
c` wUwc
KIqvBwm
wnmve Lvjvi dig
c` Z_
mieivnKZ KvMRc
c` wUwc
KIqvBwm

mwZ
c~Y

AmwZ
c~Y

13

A^vfvweK jb`b
A^vf
vweK
jb`b

m
vlRbK
Di/
WKzgU
cvIqv
Mj

MvnKi mv_ hvMvhvM


jb`b
Kiv
wU
A^vfvweK jb`bi KviY
m`n
mK wRvmv Kiv
RbK
jb`bi ^c WKzgU
msMn Kiv
mvlRbK
Di/WKzgU bv
cvIqv Mj
^vfv
MvnK
weK
hvMvhvM bv
jb`b
Kij
MvnKK cvIqv
bv Mj

14

m`nRbK jb`b
wicvwUs
gvwb jvwis cwZiva AvBb-2012 Gi
25(N) aviv
Abyhvqx evwYwRK evsK GBic m`RbK
jb`b
mwKZ Z_ ^-D`vM evsjv`k
evsK wicvU Kie|
G Gg Gj mvKyjvi bs 2 I 19 Gi wb`kbv
Abymvi evsKmg~n m`nRbK jb`b
mwKZ Z_
h_vh_fve evsjv`k evsKK wicvU
Kie|
15

m`nRbK jb`b
wicvwUs
cwqv
G Gg Gj mvKyjvi bs 2 G mec_g GmwUAvi
wicvwUs dig `qv nq| evsjvq gyw`Z H dig
wicvUKvix KgKZvi bvg jLvi evaZvaKZv
wQj hv cieZxZ cwieZb Kiv nqQ|
H mvKyjvi GmwUAvi mbvKiY jbxq
welqvw`i wb`kK (Indicative) ZvwjKv `qv nq|
G Gg Gj mvKyjvi bs 8 G GmwUAvi
wicvwUs dig wKQzUv cwieZb mvab Ki
digwU BsiwRZ cPjb Kiv nq|
mekl G Gg Gj mvKyjvi bs 19 G GmwUAvi
wicvwUs dig bZzbfve `qv nqQ| G dig
wicvUKvix KgKZvi bvg bB|
16

m`nRbK jb`b
wicvwUs
cwqv
evsKi Kvb kvLvq m`nRbK jb`b j Kiv Mj
mv_ mv_ Zv wicvU KiZ ne;
kvLvi h KgKZv m`nRbK jb`b j Kieb
wZwbB
kvLv gv. j. c. cwicvjb KgKZvi KvQ
wicvU Kieb|
kvLv gv. j. c. cwicvjb KgKZv welqwU
hvPvB Ki gemn
cavb Kvhvjq cvVveb ev bw_f~ Kieb|
cavb gv. j. c. cwicvjb KgKZv welqwU
cybt Z` I hvPvB
Ki gemn evsjv`k evsK cvVveb ev
bw_f~ Kieb|
17

m`nRbK jb`b
wicvwUs cwqv
Four Stages-

Identification - of Suspicious activity


Investigation - through

appropriate questioning

Evaluation - against previous account activity


Disclosure - if doubt/suspicious, report to

BFIU of Bangladesh bank through CCU.

18

Procedures
ABNORMA
L
TRANSACT
ION

Compari
ng

Information provided
in AOF
Transaction Profile
KYC Profile
Other relevant
documents
Findi
ng

Inconsist
ent
SUSPICIOU
S
TRANSACT
ION

Consiste
nt

Normal/
Expected
Transacti
on

Procedures
Detect unusual
transaction/activ
ity (any officer
or BAMLCO)

Evaluate
by
BAMLCO

Not suspicious

Findi
ng

Close with
proper
records

Suspicious
Sent to CCU
& Keep
record

Evaluate
by CCU
Not suspicious

Finding
s
Suspiciou
s
Report to
BB & keep
records

Close with
proper
records

m`nRbK Kvhg
wicvwUs (SAR)
Check fraud
Check kitting
Commercial/consumer loan fraud
Embezzlement
Suspicious Wire Transfer
Suspicious act. in safe deposit box
Suspicious act. In mc/ins/security
jb`b
wU
m`n
RbK

Terrorist Financing
Debit/Credit Card fraud
Structuring
Mortgage fraud
Suspicious act. Trade fina.

m`nRbK jb`b/Kvhg
mbvKiY (Identification)

m`nRbK jb`bi m
ve wb`kKmg~n

1. bvbv welqvw` MvcbKiY, Dn ivLv, QveiY


Zix ev Gwoq hvIqvi cqvm Ges MvnK c`
wewfb Z_ AmvgmZv cwijwZ nIqv|
2. wnmve Lvjvi mgq cqvRbxq AZvekKxq
Z_ c`vb Abxnv c`kb, Am`ycvq Aej^b
ev cZviYv Kiv|
3. fzj wVKvbv c`vb Kiv ev wVKvbvwU Ggbfve
c`vb Kiv hv mZ ev wg_v bq, wK cixv Kiv
me nq bv|
4. Kvb KviY QvovB wbKUeZx evsK kvLv iL
`~ieZx evsK kvLvq wnmve cwiPvjbv Kiv|
5. Ab Kvb evsK wnmve AvQ wKbv Zv
RvbvZ Abxnv c`kb|
23

m`nRbK jb`bi m
ve
wb`kKmg~n
6. jb`bi AbygwZ gvvq DwjwLZ Z_ Zvi
eemvi cwiwai mv_ mvgmc~b bq|
7. MvnKi eemvqj cwi`kb Ki
mvlRbK gb bv nIqv|
8. eemvqi cKwZMZ KviY PK ev Ab
BbygU jb`b mvw`Z njI nVvr Ki
A^vfvweK eo AsKi bM` jb`b eo hvIqv|
9. Kvb wnmve bM` ev QvU QvU PK
Rgv njI gvU Rgvi cwigvb hw` AbywgZ
gvv ev ^vfvweKi Pq AwaK nq|
10.wnmvei ^vfvweK MwZ cKwZ
AbymiY bv Ki bM` jb`b AvMn c`kb|
24

m`nRbK jb`bi m
ve
wb`kKmg~n
11. MvnKi wnmve Rvj/fyqv BUyygU Rgv `qv|
12. MvnKi wewfb bvg ev wewfb cwZvbi
bvg AbKwj wnmve _vKv Ges mejv wnmve wgj
cwiPvwjZ jb`b A^vfvweKZv cwijwZ nIqv|
13.evsKi AvZ AbKjv evsK/wicvwUs
GRwZ wnmve cwiPvjbv Kiv; wK Znwej
GKxKiYi KviY ev evisevi Znwej vbvi Kivi dj
evsK KZK Ab wnmvejv mK AewnZ
nIqv|
14. hywmZ KviY QvovB Ab ewi PK evievi eo
AsKi RgvKiY|
15. nVvr evsK GK ev GKvwaK jKvi MnY, NY NY
eenvi Ges mxj Kiv cvKU evievi ivLv Ges DVvbv|

25

m`nRbK jb`bi m
ve
wb`kKmg~n
16. evsK KZK KZb Kiv PvRmg~n,
evsK my`, wewfb myhvM-myweav
BZvw` mK J`vwmb c`kb|
17. Kvb vZ KviY QvovB e msLK jvK
KZK Kvb wnmve UvKv Rgv
Kiv|
18. `xNw`bi mgmv RRwiZ FY vZ
KviY QvovB nVvr cwikva Kiv|
19. vZ Kvb KviY Qvov ZZxq ci m`i
wecixZ FY cvevi cve `qv|
20.eemvwqK cqvRb Qvov eo AsKi
iwgUv ciY I MnY Kiv| ciYi
Drm Aby ivLv|
26

m`nRbK jb`bi m
ve
wb`kKmg~n
21. Avg`vbxi AwZ-g~jvqb Ges ivbxi
Ae-g~jvqb Kiv|
22. Avg`vbx ev ivbxi evRvi `i Acv Kg
ev ekx g~j q/weq Pzw mv`b Kiv|
23. Avg`vbx cYi mis-declaration c`vbi
gvag cY g~ji ZviZg NUvbv I duvwK
`qv|
24. ivbxi f~qv ARy&nvZ `wLq
ivbxg~j cZvevmb bv Kiv|
25. gvjvgvj `k cek eZxZ f~qv `wjj
evsK Rgv w`q jUvi Ae wWUi UvKv
we`k cvVvbv|
27

m`nRbK jb`bi m
ve
wb`kKmg~n
26. Abygvw`Z wWjvi ev gvwb Pvi jvBm bv
_vKv mI e`wkK gy`v q-weq Kiv
wKsev jvBm _vKv mI Aeafve jb`b
Kiv|
27. PvivPvjvbi mv_ cZ ev civfve hy
_vKv|
28. Awbevmx`i wnmve Aeafve eenvi Kiv|
29. f~qv wej Ae GwU `vwLj Kiv|
30. FY bqvi ci Kvb KviY eZxZ AwZ ZvovZvwo
Zv cwikva Kiv|
31. mxgv GjvKvq cvqkt A_ ciY|
32.cPzi jb`b wK ^ evj _vKv Ges
ekxifvM jb`b Round Figure G Kiv|
28

m`nRbK jb`bi m
ve
wb`kKmg~n
33. MvnK wbR DcwZ bv nq me`v
wewfb jvK viv evswKs Kg mv`b|
34. cPzi jb`b Ki jb`bi Dk RwUj Kiv ev
a~gRvj mw Kiv|
35. MvnKi mv_ mswkZv bq Gic
Abvb ci bvg wewfb Me A_ ciY|
36. MvnKi vZ AvBbwm Avqi mv_
msMwZnxb enrgvvi wmwKDwiwUR q I
weq|
37. WvM Drcv`bKvix I UvbwRU `k ev
mvmx iv _K iwgU Avmv|
38. Cash Transaction Reporting(CTR) _K invB cvIqvi
(jyKvbvi) Rb Structuring Kiv|
29

m`nRbK jb`bi m
ve wb`kKmg~n
39. AbjvBb `ki wewfb cv _K
MvnKi wnmve UvKv Rgv nIqv|
40. MvnKi wnmve QvU QvU cwigvb
Rgv wKQzw`b ci ci enr cwigvY
MvnKi ev Zvi ^v_ mswk ewMZ
wnmve GdwWAvi Kivi Rb vbvi Kiv|
41. hwK KviY Qvov ewMZ wnmve
eemvwqK jb`b Kiv|
42. cqvRb QvovB GKB A_ wewfb
wnmve vbvii gvag AnZzK
jb`bi ayRvj Zix Kiv|

30

31

You might also like