Thursday, 30 December 2021

CYBER CRIME QUESTIONS OF IIBF EXAM (MEmoRY BaSed previous Years

 CYBER CRIME QUESTIONS OF IIBF EXAM (MEmoRY BaSed previous Years

Q1.what is honey pot.

Q2. What are steps involved in a Ecommerce transactions.

Q3. Difference between durability and consistency.

Q4. What is firewell.

Q5 .what is wankworm and NASA.

Q6. Eucp published in which year.

Q7.OLA is not a popular app store.

Q8.what is circumstantial evidences. 

Q9.BOSS (Bharat operating system solution) was developed by which organizations -CDAC 

Q10.what is malicious code writer's. 

Q11.What is multilayered security 

Q12. What is data. 

Q13.blackmailing is an example of cyber extortion. 

Q14 what is SCADA.

Q15.what is cryptolocker

Q16.smart card in metro railway stations are examples 

Q17.packet filter firewall.

Q18. micro ATM.

Q19.cross site Scripting.

Q20. What is A hectivist...

Q21. Rupay card is issued in which year. 

Q22. what is Trojan hourse. 

Q23. What is malware.

Q.24. data backup is an example of which type of control.

Q25. what is Lebance loop modus oprendi in atm card frauds.

Q26.CCTV is an example of which control.

Q27.what is Cyber Smearing.

Q28.what is operating system Vulnerability

Q29.what is full form of CISA cyber security information sharing Act.

Q30 what is Zeus viruses.

Q31.what is hashh value and integrity.

Q32.what difference between Authorization and Authentication.

Q33. What is INFO stealer?

Q34.what is A back End Access.

Q35.what is meaning of phrase of "Ab initio Unlawfully or Unlegally.

Q36.what is security Administration and Quality Assurance.

Q37.what is CAPTCHA.

Q38.Intentionally misrepresentation of Data is called A Fraud.

Q39.What is definition of Control.

Q40.What is John Deo Order. ...

Q41.what is payment walked and digital wallet

Q42 what is Anonymous.

Q43. What is trapdoor access.

Q44.Total branch automation TMA.

Q45. .com and .org are TLD.

Q46. TCS fraud in Andhra Pradesh is an example of reasonable security practises and procedures.

Q47. The PVCL case in India refers to which Act of IT act Act_69 power to moniter, intercept or Block URL.

Q48.one question on CBS and TBA total branch Automations.

Q49. Sys admin sys user or teller all are examples of Spoofing.

Q50.what is A network Analysis.

Q51.what is vulnerability

Q52.what is DNS sinkholding.

Q53.e.Contactless smart card are example of which.

Q54 . Lebance Loop card fraud rubber band type material inside Atm Fraud.

Q55.what is Contigency planning.

Q56.what is Nigrean 419 Fraud.

Q57.Dumpster Diving.

Q58.what is difference between Steersman and script kiddle ,

Q59.Staganography.

Q60. What is SSL injections and Cross Site Scripting......

Q61. Preventive detective and compensating contol.

Q62. DRONES ARE developed by Drdo.

Q63.income tax.

Q64.Director of DRDO and it's powers.

Q65 .differencebetween Cert india and nasscom.

Q66.TSP/IP. Q67.DDos Attack.

Q68. CyberSmearing and Cyber Defamation.

Q69. Cyberwarfare and Cyber terrorism.

Q70. BECKDOOR access.

Q71.digital signature.

Q72.symmetric and AsymmetricEncryption

Q73.public and private keys.

Q74.command Injections and SQL injections.

Q75.details of Masquerding Attack.

Q76. Trapdoor access and BYOT device.

Q77.Sec.43 and Sec 46 of IT act.....

Q78.Sec. 69 B deals with......

Q79.Blue Hat hackers are a Part of testing team.

Q80.what is crypyolocker and INFO Stealer

Q81.WHAT IS zeus virus

Q82.What do you understand by Mean rea or destructive Mindset.

Q83.what is DDL DATA definition language

Q84.what is packet filteration Firewall

Q85.what do you understand by the word ANONMOUS

Q85.what is computer vandalism

Q86.WHAT IS FRONT END validation control

Q87.what is DATA

Q88.WHAT IS Locard Exchange PRINCIPLE

Q89.WHAT is penalty under SECTION 46 AND 47 of IT AMENDMENT ACT

Q90.What is xss cross site scripting

Q91.what is TCS fraud IN andhrapredseh is EXAMPLE OF

Q92.WHAT is cybersmearing

Q93.what is STEERSMAN

Q94.WHAT do you mean by ALITE HECKER

Q95.IDS is palced between internet and firewell

Q96.what is PCIDSS

Q97.WHAT is Matrix code barcoding

Q98.WHAT is software Piarcy

Q99.what is DNS SINKHOLDING

Q100.WHAT do you understand by traditional criminals

Q101.WHAT is beck end access

Q102.IN WHICH year ekyc published and its detail

Q103.BYOD DEVICE q Q104.WHAT is trapdoor

Q105.what is PURPOSE OF FIREWELL

Q106. BATCH processing is an example of oltp online transition

Precessing

Q107.WHAT IS UTM

Q108. Loss of reputation is a serous adverse effect of DDOS ATTACK

Q109.THE discussion paper held on payment and settlement system of RBI held on 2013 was main focus on ENHANCED USE OF ENTERNET BANKING AND E COMMERCE Q110.what is B2G business to government E COMMERCE TRANSCTION

Q111.boss was developed by cdac

Q112.WHAT IS STAGANOGRAPHY Q113. WHAT IS ALGORITHM

Q114.WHT IS PKI Q.115 WHAT IS HONEY POT q116. WHAT IS MICROATM

Q117.DETAILS ABOUT I4C AND CERTIN Q118.SATYAM AND SIFY CASE

Q119.PUCL CASE IS AN example of sec.69 Q120.WHAT IS VBV THESE ARE

RECOLLECTED QUESTION OF PAPER ON 15 SEPTEMBER 2018

20.10.2018 cyber crime question

1.cyber crime definition

2.3 factor pressure, opportunity, rationalisation

3.cybernetics,kybernetes,steersman,governor,cyberpunk----given 4 option

4.honey pot

5.1st worm

6.denial of service

7.buffer overflow

8.shoulder surfing

9.access control

10.script kiddles

11.john doe order

12.nigrria419

13cyber warfare

14 email spoofing

15 cyber stalking

16 domain name .in represent

17.Satyam infoway ltd vs siffynet supreme court

18 cyber warfare

19 phishing

20 zeus

21.non repudiation

22 tailgating

23.trapdoor

24.captcha.

25 .blue hat hacker

26.phreaking

27. Ethical hacking

28.anonymous

29.bar code matrix code

30.RFID

31.data manipulation and data definition language

32.symmetic encryption

33.Encryption and decryption

34.lo-card exchange principle

35.C-Dac

36.payment getway

37.payment and settlements system 2007

38 acquiring bank

39 brute force attack

40.man in the middle attack

41session hijacking

42.digital wallet

43OLTP

44 Ucpdc

45.EMV card

46.netra drdo

47CBI Specialized structure

48.electonic signature

49.DSCI set up byNASSCOM

50.US Initiative -cyber security information sharing act

51.it act andit amendment act.

52.Pki

53 .authenticity

54.maximum value that can be stored in a prepaid card 50000

55. SWIFT


By pritee Hardiha

Cyber fraud management exam recollected questions on 17.11.2018

The regulator of uav,

Netra developed by,

Script kiddies,

Ethical hacking,

Blue hat hacking,

Nigeria 419,

Social engineering,

When a NRI contacted u by phone to transfer 500000 lakh rupee to another account

in another branch. what action will be taken by you as a Branch manager.

.org,.com are Tld or Sld,

Cyber crime definition,

Cyber smearing,

Masquerading attack,

Email spoofing,

In a software application at end of page we use to see "I agree with term and

conditions". what do you mean by that.

A.p case vs Tcs case,

Eucp started in which year- Approved in 2001& effective from 2002

Steps involved in online transfer processing.

Where scada is used.

Anonymous definition,

Tail gating,

Tress passing,

Harrasing a lady over mail comes under which crime,

Cyber warfare,

Definition of Durability,

Odd man out of the given below which is not an app

1.ola 2.google store.3.black berry.4.apple

Locard principle,

Malicious code writers,



By rama

Cyber crime definition

3 factors induce to commit fraud

Internet of things

Wank worm first hacktivist attack

Stuxnet

Script kiddies

Spoofing

CcTLD

Ransomware

SCADA

Vishing

Authorisation authentication difference

BYOD

authentication tech for e mail

Digital signature

Internet addiction disorder

CAPTCHA

blue hat hacker

2D bar coding known as matrix code

DML

Prevention control

Detection control

Digital footprints

Brute force attack

Payment wallets

SWIFT

prepaid cards

Shoulder surfing

PCIDSS

TCS vs state of AP case

IPC forgery of electronic records

3 domain servers of security initiative

Compulsive disorders

Stylometry

Jilani working group

FSDC

to combat computer related crimes, CBI has following specialized

structure

CBI Interpol

Cyber crime and fraud management recollected on 28.12.2019

Recollected questions:

Cyber crimes are handled by which organization in india

Type 1 crime

Preventive control

Detective control

Deterrent control

Logical control

Sections and their fine with imprisonment in years

Committes of it security ,it governance, it controls

Netra by which organisation

Fast flux

Stux net

Phising

Shoulder surfing

Digital signature

Oldest agency in india

Few questions on cert in

Passive attack

Active attack

Direct attack

In direct attack

Logic bomb

Zeus

India own operating system boss in under whom

Confidentiality

Availability

Integrity

Conventional crime

Cyber crime

Same features of conv and cyber crime

Tailgating


imp topics are

1differences between viruses and worm

2 it act

3 different types of cyber crimes

4 various types of cards

5 gate way payment

6 prevention and detection control

7 pss act

8 2 tier authentication

9 passive and active attacks

mostly questions from 2 and 3 and 4...units


Cyber terrorism

1. Who Coordinates with Interpol in India ? - CBI

2. Which department was designated as Nodal Agency for Cyber Crime prevention -

CERT-IN

3. What is the difference between Virus and Worm - Virus need human intervention

to activate or multiply whereas worm automatically get multiplied

4. Worms are mainly used by hackers to - Occupy more space in the system/heavy

usage of bandwidth in the network

5. One of the employee carefully watching the password entered by the Manager.

What type of threat it is - Shoulder Surfing

6. Leaving a Logged in Computer by an employee - is human negligence

7. Hackers scans the computer pre attack to identify - Vulnerability in the system

8. Hackers inject worms/virus into the network to reach the target system and it -

exploits the Vulnerability

9. Non updation of antivirus is - one of the major vunerability

10. One customer recieved a call in his mobile phone and the person posing himself

as a bank manager collected the card credentials from him.This type is called -

Phising

11. Online Banking sites are borne to what risk - Phising/IP spoofing

12. Data transfer between systems vide Network can be secured by - PKI

13. Customers can make sure that they deal with the authenticated website - by

checking the Lock icon near the address bar

14.In https, S denotes - Secured/Security

15.This kind of worms directly attacks the root directory - Rootkits

16. This worms are really hard to detuct and delete - Rootkits

17. The compromised systems in the network are commonly termes as - Zombies

18. Customer security credentials were compromised by way of fraudulent SMS is

called - smishing

19. The employees who try to hack their own company's site/find the vulnerabilities

are called - White hat hackers

20.DDos - Distributed Denial of Service

21.Ransomware which blocks the access to the website demanding ransom for the

same is - Denial of Service attack

22. Using same method for both encryption and decryption is called - symmetric

encryption

23. Providing Last Login detail in Internet banking site is to - to detect any

unauthorised usage earlier

24.Limits for retrying the passwords is - to avoid the unauthorised access

25. To safeguard from the Key Loggers attack - Use Virtual Key board to enter

passwords

26.UTM stands for - Unified Threat Management

27.Setting up smoke detectors in the branch is - Detective Method

28.Placing Security guard in system room to avoid - Physical damage/attack on

systems

29. Following the authorised person to enter into system room and making entry into

the room is - Tailgatting

30.Dumbster Driving is a method - Searching for vulnerability in deleted files and

data

31.FIrewall is - Intrusion Detection System

32.Authentication of electronic data/document can be assertained by - Digital

Signature

33. When two or more persons illegally tries to enter into a critical room with single

id/same id - Masquerading

34.Detection is normally - Post incedent

35. Post incident study mainly for the purpose of - study the impact of the attack and

lessons for future prevention

36. Indian Agency working on Digital Forensics and Cyber security - C-DAC

37. OLTP refers to - On line Transaction Processing

38. OLTP is also termed as - Payment Gateway

39. Payment Gateway the Acquiring Bank to - Issuing bank through the Card Scheme

to complete the transaction

40.Security Concerns arise in Payment Gateways are - At the User Level, Bank level

and Merchant POS

41. Credit Card data theft through POS is falls under - Merchant PoS Security

42.Data encrypted using Private key can be decrypted by the public key available

with - the Receiver

43. Cross verifying the Signature on the Slip against the Signature in the back side of

the ATM card is doen by - the Merchant

44.Data should be secured in the following stages - Saved, Transit and Retrival

45.Intruder software in a network which attacks the data while in trnasit and thus

commits data theft - Man in the Middle Attack

46. Captures a widows sessio for the purpose of data theft before it reaches the

recipient is - Session Hijacking

47. Limits set for retrying of password is to avoid - Brute Force attack

48. ISSP stands for - Information System Security Policy

49.ICANN stands for - International Corporation for Assigned Names and Numbers

50.TLD stands for - Top Level Domain

51.Globally recognized set of rules defined for electronic records is - e-UCP

52.Technique used to redirect traffic from the infected device is called - Sinkholding

53. The technique which can intercept unencrypted data transit of mobile apps is

called - Wi FI Snifing

54. This is one type of malware which doesnot affect the system/network - Ad-ware

55. This usually comes as a Pop up/add on screen which carries link for dubious

websites - Ad-ware

56.EMV cards follow standard of - ISO/IEC No 7816

57. EMV cards follow this standard for Contactless card - ISO/IEC 14443

58. NFC is the technique used in contactless cards - Near Field Communication

59.PCI - DSS stands for - Plastic Card Industries - Data Security Standards

60. NFC cards works under - RFID Technology

61. Providing Access controls to employess based on roles/need is - Risk based

Authentication

62. Seeking PIN to complete a transaction in PoS is - 2FA

63.SSL - Secure Socket Layering

64.SSL ensures - Encrypted link between a web server and a browser

65. Sending annoying messages to a person causing irritation/nuisance - Cyber

Stalking

66. Black mailing a person using Computer/or network is - Cyber Extortion

67. Ransomware is type of - Cyber Extortion

68. Disputes on Domain names and protest are redressed globally by - UDRP

69. Phising/Vishing is type of - Cyber Cheating

70. Group of people attacks a Computer/ group of computers for propagating a

objective - Cyber Terrorists

71. Hackers with common interest attack rival government's department site and

database are - Cyber terrorists

72. ____ refers to the quality of secrecy associated with the data and the state of

keeping an information asset secret - Confidentiality

73.____ refers to the state of remaining in the same format and not allowing for any

tampering/manipulation - Integrity

74. ____ refers to the state o confirmation that the user has the authority to issue the

command to the system - Authorisation

75. Quality of non denial, the stake holders are not permitted to denythe particular act

of doing the act is - Non-repudiation

76. CAPTCHA refers to - Completely Automated Public Turing test to Tell

Computers and Humans Apart

77. Placing letters in different sizes and styles which is hard to read by systems/robots

is called - CAPTCHA

78. _______ is an important component for study and analysis to under the modus

operandi of a Cyber Attack - Threat Vector

79. In cyber Crime, Threat landscape is denoted as - Study of entire overview of the

network which was attacked

80. Conventional Crimes are - Physical crimes that involve thet of systems and

hardware devices

81.Cyber Crimes are - System Crimes that involves data theft or tampering

82.Insider Attack Threat is - attack on the system/network by own employee without

any permission/authentication

83.______ is the most dangerous attack in cyber crimes - Insider Attack

84. An employee copied and sold the sensitive information to a competitor concern is

an example of - Insider Attack

85. Hackers scan the port/system and develop worm or codes to attack the same based

on this - Vulnerability

86. ____ does not wait for any executable file to run for getting activated in the target

system - Worm

87.____ refers to small piece of programs injected into the target system to spy on the

activities - Spyware

88. Drones are classified as - Spying Devices

89. UAV stands for - Unmanned Aerial Vehicle

90. Most of the UAV used by the polic/defence authorities for - Survelliance

purposes

91.The persons who are hired by companies to hack their own website/to identify the

Vulnerability are - Blue Hat Hackers

92. System of effectively taking care of URL filterig, web-filtering, anti-virus, as all

in one solution is referred as - Unified Threat Management

93. Force Log out option in Internet banking after certain time of Idleness is to guard

the system against - Session Hijacking

94. Installing anti virus into the system is - Preventive Method

95.A statement used to create, alter, drop objects in a database is called - Data

Definition Language

96. Fault Detection, isolation and recovery are closely associated wiht - Detection

Control

97. Installing Bio Metric devices to check unauthorised entry is - Physical Control

98. Unless properly logged, straightaway accessing the database through a SQL is

termed as - Back end Access

99.IT Act 2008 describes the activity of hacking as a criminal activity in section no

66

100. IT Act 2000 came in force on - 17 October 2000

101. IT Amendment Act came into force on - 27 October 2009

101. IT Act consists of - 13 Chapters and 90 Sections

102. The Section which deals with cyber crimes as civil offence - Section 43

103. The Section deals with cyber crimes as Criminal Offences - Section 66

104. IT Amendment Act included the following which is not in the IT Act 2000 -

Electronic Signature

105. Electronic Signature has been dealt in - Section 15

106. Under Section 43A, if any body corporate handling any sensitive personal data is

negligent in implementing and maintaining reasonable security the compensation may go upto - five crore rupees

107. Under Section 43, if one found guilty on Data theft/alters/destroys the same the

penalty/compensation may go upto - One Crore rupees

108. Tampering with Computer Source Documents - Section 65

109. Punishment under Section 65 may go upto - Three years imprisonment and

extend upto Two Lakhs Fine

110. Computer Related offences which were dealt under section 43 can also be dealt

as criminal offence under section - 66

111. Punishment under Section 66 may go upto - two three years and/or fine upto five

lakhs rupees

112. Crime of Cyber Stalking ( sending electronic messages for the purpose of

causing annoyance/inconvenience/decieve/mislead the recipient) may lead to - two

three years imprisonment

113. Identity Theft is dealt under Section - 66c

114. Punishment of Identity Theft - may extend to three years term and/or fine upto

One lakhs rupees

115. Puishment for Cyber Cheating - may extend to three years term and/or fine upto

One lakhs rupees

116. Cyber Cheating is dealt under - Section 66D

117. Punishment for Cyber Terrorism may extend upto - Life time Imprisonment

118. Cyber Terrorism is dealt under - Section 66F

119. Publishing obscene material in electronic form dealt under - Section 67

120. Punishment under Section 67 may extend upto - two three years term and/or five lakhs fine

121. Punishment for Sudsequent conviction of the same crime under section 67 is - 5

years term and/or ten lakhs rupees fine

122. Sexually explicit content in electronic form dealt under - Section 67A

123. Punishment under Section 67A is - Five years term with fine

124.Punishment for Sudsequent conviction of the same crime under section 67A is – 7 years term and/or ten lakhs rupees fine

125. CERT-IN has been designated as Nodal agency for Critical Information

Infrastructure Protection under Section - 70B

126. Mispresentation/Suppression of material Fact dealt under - Section 71

127. Penalty under Section 71 - Two years term and/or fine upto One lakh rupees

128. Breach of confidentiality and Privacy dealt under Section - 72

129. Analysing the style of writing or the langauage style for the purpose of Crime

Investigation is - Stylometry

130. RBI issues licenses for Payment Banks in India based on approval from - BPSS

131. NTRO stands for - National Technical Research Organisation

132. Netra, the light weight UAV was developed by - DRDO

133.NCIIPC stands for - National Critical Information Infrastructure Protection

Centre

134. DSCI - Data Security Council of India, established by NASSCOM

135. Digital Forensic tools used by our Police Department were developed by - CDAC

136. C-DAC stands for - Centre for Development of Advanced Computing

137. NTRO works under - Prime Minister's Office

138. Two acts which are mainly handled by ED - FEMA and PMLA

139. Money laundering using banking systems/Internet banking is – Conventional Crime

140. Obtaining an IP address similar to some other and demanding a ransom for

forego the same is - Cyber Squatting

141. Data Protection while in transit using non repudiation techniques can be

achieved through - Public Key Infrastructure

142. Card Skimming is a technique mostly used th steal the card details and it mostly

placed on - ATM manchines

143. Card Skimming Data Theft can be avoided using - Contactless Cards/NFC Cards

144. To avoid the Card Credentials in Online sites these cards were introduced -

Virtual Cards durability and consistency.

145. Smart Cards which are loaded with Money prior to issue is called - Prepaid

Cards

146. Virtual Cards normally comes with a validity of - 24 hours to 48 hours

147. Maximum loading permitted in a Prepaid as per RBI instruction is - 50000/-

148. Hackers try to capture the login credentials by analysing the keys pressed in the

Key boards. the worms captures such data is called as - Key Loggers

149. By clicking unauthenticated link, customers may diverted to fake websites to

capture the sensitive personal. This is type of - Website spoofing/IP Spoofing

150. Ad wares are used not to harm the computers but to - make a catch by making

the user to click on the dubious link to fake websites

Q4. What is firewell.

Q5 .what is wankworm and NASA.

Q6. Eucp published in which year.

Q7.OLA is not a popularapp store.

Q8.what is circumstantial evidences


26-12-2021 Vishal

Mens Rea

FastFlux

Stuxnet

Wank Worm

ISO 27001

Digital Signature issued by

ITAA Sec 43

ITAA Sec 66

ITAA Sec 70

ITAA Sec 71

Masquarding

Tailgating

Blue Hat Hacker

White Hat Hacker

Script Kiddies

DDL

DML

Schema

Saturday, 25 December 2021

All IIBF 2022 Certifications ,JAIIB ,CAIIB PDFs in single link

  All IIBF Certifications PDFs in single link

Be safe ,stay safe during this covid pandemic

Read corresponding  IIBF book 1st Macmillan / Taxmann.

These all materials are extra information to get knowledge.

All the best

IIBFADDA4U:


Certified credit officer/Professionals
https://drive.google.com/file/d/1noDBuJjOoNhbJYO5ghbNdI_1-lbBEpH8/view?usp=sharing


MSME
https://drive.google.com/file/d/1i4H8NgpjCtlEefnPW1KTIKDj9BWdHLcg/view?usp=sharing

KYC AML:
https://drive.google.com/file/d/1ooohD2A7OO8UaO2WjUBLyRd1aD_Yco6s/view?usp=sharing

BCSBI
https://drive.google.com/file/d/1IN4SVWdxCCMZ9nRvSUwbI4O0kCGGKCic/view?usp=sharing

CAIIB ABM
https://drive.google.com/file/d/1XsZMX4Xfonqp_CVWz-PtfEZ6TxDEYb-n/view?usp=sharing

CAIIB IT
https://drive.google.com/file/d/1UO2x6ZP7jDmS2Q3GXEhoO1_NyNYgWT-d/view?usp=sharing

Certified Treasury Professionals:
https://drive.google.com/file/d/1T-P1FwMLVjsJRvuLybZnssvRqFt1D5E4/view?usp=sharing

Digital banking
https://drive.google.com/file/d/1dNOf3cwC9oHkrGyBozvmGZOmbXLZjV55/view?usp=sharing

Forex Individual
https://drive.google.com/file/d/1R6VPUzjNyiSGpf2f3aCAJZEPiY7fwOCW/view?usp=sharing

Forex Operations
https://drive.google.com/file/d/1h54CyU7wN14T2M4wHNZCNGDzrihHYUeE/view?usp=sharing

Cyber Crime and fraud management
https://drive.google.com/file/d/1EBffHoxmW8rNmG5Q-peY2wn5QNlH0Lot/view?usp=sharing

ALL JAIIB Materials:








Information system for bankers recollected questions on 18 Oct 2020

  Information system for bankers recollected questions on 18 Oct 2020

IDS..operators in SQL..steps involved in data warehouse..BCP..smart cards


Defence in depth


Chapter 6 of it act


Caat


Data about data


Section 46 of it act


Responsibility of database administrator


What is intellectual property


IPsec


Certifying authority related questions


Digital signature related questions


Electronic form


These are some of the recalled questions from information system banker

Recollected Question on Risk Management Date 23.08.2020

  Recollected Question on Risk Management Date 23.08.2020

01 Case study on Duration, Modified duration,& convexity

02 Case Study on Haircut, hair cut formulas based question on collateral asset ,haircut in risk mitigation

03 Case study on Interest rate

04 Numerical on Value at Risk, Calculate Geometric mean, NIIcalculation ,RWA Numerical on Tier 1 and tier 2 Case Study on Risk Weight ration ( unrated corporate Company , RWA on venture capital, exposure to foreign banks,RWA value on commercial infrastructure company) Numerical on BPV

05 Mark to model definitions

06 Beta value on risk free asset

07 Credit risk mitigation purpose not included choose from options

08 LTV is part of which type of risk Management

9 translational level risk not included

10 Loan review mechanism is used for

11 Definition of YTM

12 staff irritation and loss of appeal of employer is failed in which conditions

13 Rate of inertest swap for PEF

14 PD,EAD,LGD

15 Call Options Definitions

16 Monte carlo simulation method definitions

17 Embedded option risk

18 counterparty risk,SPV,

Most of the question of one-liner type, ratio of numerical & theory is 40 and 60

Theory was easy. All the question from book. read the book carefully 2 time.

Good luck.


Very Important Melegam committee recommendations ...Micro finance exam

 melegam committee recommendations ...Micro finance


The composition of the Sub-Committee was as under:-
1.  Shri Y.H. Malegam – Chairman
2.  Shri Kumar Mangalam Birla
3.  Dr. K. C. Chakrabarty
4.  Smt. Shashi Rajagopalan
5.  Prof. U.R. Rao
6.  Shri V. K. Sharma (Executive Director) – Member Secretary

1.3 The terms of reference of the Sub-Committee were as under:-
1. To review the definition of ‘microfinance’ and ‘Micro Finance Institutions (MFIs)’ for the
purpose of regulation of non-banking finance companies (NBFCs) undertaking microfinance
by the Reserve Bank of India and make appropriate recommendations.

2. To examine the prevalent practices of MFIs in regard to interest rates, lending and
recovery practices to identify trends that impinge on borrowers’ interests.

3. To delineate the objectives and scope of regulation of NBFCs undertaking microfinance by
the Reserve Bank and the regulatory framework needed to achieve those objectives.

4. To examine and make appropriate recommendations in regard to applicability of money
lending legislation of the States and other relevant laws to NBFCs/MFIs.

5. To examine the role that associations and bodies of MFIs could play in enhancing
transparency disclosure and best practices

6. To recommend a grievance redressal machinery that could be put in place for ensuring
adherence to the regulations recommended at 3 above.

7. To examine the conditions under which loans to MFIs can be classified as priority sector
lending and make appropriate recommendations.

8. To consider any other item that is relevant to the terms of reference.

Recommendations

Recommendation # 1: New Category of NBFCs Called NBFC MFIs…

We would therefore recommend that a separate category be created for NBFCs
operating in the Microfinance sector, such NBFCs being designated as NBFC-MFI.

The Sub-Committee recommends that a NBFC-MFI may be defined as

“A company (other than a company licensed under Section 25 of the Companies Act, 1956) which provides financial services pre-dominantly to low-income borrowers with loans of small amounts, for short-terms, on unsecured basis, mainly for income-generating activities, with repayment schedules which are more frequent than those normally stipulated by commercial banks and which further conforms to the regulations specified in that behalf”.

Recommendation # 2:  NBFC To Satisfy Certain Conditions (Non-Negotiables) To
Be Classified as NBFC MFI…

We would, therefore, recommend that a NBFC classified as a NBFC-MFI should
satisfy the following conditions:

a)      Not less than 90% of its total assets (other than cash and bank balances and money market instruments) are in the nature of “qualifying assets.”
b)      For the purpose of (a) above, a “qualifying asset” shall mean a loan which satisfies the following criteria:-
i.                 the loan is given to a borrower who is a member of a household whose annual income does not exceed Rs. 50,000;
ii.               the amount of the loan does not exceed Rs. 25,000 and the total outstanding indebtedness of the borrower including this loan also does not exceed Rs. 25,000;
iii.              the tenure of the loan is not less than 12 months where the loan amount does not exceed Rs. 15,000 and 24 months in other cases with a right to the borrower of prepayment without penalty in all cases;
iv.             the loan is without collateral;
v.               the aggregate amount of loans given for income generation purposes is not less than 75% of the total loans given by the MFIs;
vi.             the loan is repayable by weekly, fortnightly or monthly
  installments at the choice of the borrower.

c)      The income it derives from other services is in accordance with the
       regulation specified in that behalf.

We would also recommend that a NBFC which does not qualify as a NBFC-
MFI should not be permitted to give loans to the microfinance sector, which in
the aggregate exceed 10% of its total assets.

Areas of Concern

In particular, in the Indian context, specific areas of concern have been identified: These are:
a) unjustified high rates of interest
b) lack of transparency in interest rates and other charges.
c) multiple lending
d) upfront collection of security deposits
e) over-borrowing
f) ghost borrowers
g) coercive methods of recovery

The following recommendations are made with regard to these areas of concern…

Recommendation # 3: Measures (Including Margin Caps) Related To Pricing
Aspects…

We would, therefore, recommend that there should be a “margin cap” of 10% in respect
of MFIs which have an outstanding loan portfolio at the beginning of the year of Rs. 100
crores and a “margin cap” of 12% in respect of MFIs which have an outstanding loan
portfolio at the beginning of the year of an amount not exceeding Rs. 100 crores.  There
should also be a cap of 24% on individual loans. 

Recommendation # 4: Ensuring Transparency in Interest Charges…

We would, therefore, recommend that:-
a)      There should be only three components in the pricing of the loan, namely (i) a processing fee, not exceeding 1% of the gross loan amount (ii) the interest charge and (iii) the insurance premium.
b)      Only the actual cost of insurance should be recovered and no administrative charges should be levied.
c)      Every MFI should provide to the borrower a loan card which (i) shows the effective rate of interest (ii) the other terms and conditions attached to the loan (iii) information which adequately identifies the borrower and (iv) acknowledgements by the MFI of payments of installments received and the final discharge. The Card should show this information in the local language understood by the borrower.
d)      The effective rate of interest charged by the MFI should be prominently displayed in all its offices and in the literature issued by it and on its website.
e)      There should be adequate regulations regarding the manner in which insurance premium is computed and collected and policy proceeds disposed off.
f)        There should not be any recovery of security deposit. Security deposits already collected should be returned.
g)      There should be a standard form of loan agreement.

Recommendation # 5: Dealing With Multiple-lending, Over-borrowing and Ghost-borrowers

We would, therefore, recommend that:-
a)      MFIs should lend to an individual borrower only as a member of a JLG and should have the responsibility of ensuring that the borrower is not a member of another JLG.
b)     a borrower cannot be a member of more than one SHG/JLG.
c)      not more than two MFIs should lend to the same borrower.
d)     there must be a minimum period of moratorium between the grant of the loan and the commencement of its repayment.
e)     recovery of loan given in violation of the regulations should be deferred till all prior existing loans are fully repaid.

We would, therefore, recommend that all sanctioning and disbursement of loans should be done only at a central location and more than one individual should be involved in this function. In addition, there should be close supervision of the disbursement function.

Recommendation # 6: Establishing Credit information Bureaus and Populating Data…

We would therefore recommend that
a)      One or more Credit Information Bureaus be established and be operational as soon as possible and all MFIs be required to become members of such bureau.
b)     In the meantime, the responsibility to obtain information from potential borrowers regarding existing borrowings should be on the MFI.

Recommendation # 7: Measures Against Coercive Methods of Recovery

We would, therefore, recommend that:-
a)      The responsibility to ensure that coercive methods of recovery are not used should rest with the MFIs and they and their managements should be subject to severe penalties if such methods are used.
b)     The regulator should monitor whether MFIs have a proper Code of Conduct and proper systems for recruitment, training and supervision of field staff to ensure the prevention of coercive methods of recovery.
c)      Field staff should not be allowed to make recovery at the place of residence or work of the borrower and all recoveries should only be made at the Group level at a central place to be designated.
d)     MFIs should consider the experience of banks that faced similar problems in relation to retail loans in the past and profit by that experience.
e)     Each MFI must establish a proper Grievance Redressal Procedure.
f)       The institution of independent Ombudsmen should be examined and based on such examination, an appropriate mechanism may be recommended by RBI to lead banks.

Recommendation # 8: Regulator To Publish A Customer Protection Code

We would, therefore, recommend that the regulator should publish a Client Protection Code for MFIs and mandate its acceptance and observance by MFIs. This Code should incorporate the relevant provisions of the Fair Practices Guidelines prescribed by the Reserve Bank for NBFCs. Similar provision should also be made applicable to banks and financial institutions which provide credit to the microfinance sector.

Recommendation # 9: Measures To Be Undertaken To Improve Efficiencies

We would, therefore, recommend that MFIs review their back office operations and
make the necessary investments in Information Technology and systems to achieve
better control, simplify procedures and reduce costs.

Recommendation # 10: Actions To Build Capacity of SHGs/JLGs

We would, therefore, recommend that under both the SBLP model and the MFI
model greater resources be devoted to professional inputs both in the formation
of SHGs and JLGs as also in the imparting of skill development and training and generally in handholding after the group is formed. This would be in addition to and complementary to the efforts of the State Governments in this regard. The architecture suggested by the Ministry of Rural Development should also be explored.

Recommendation # 11: Corporate Size for NBFC MFIs

We would, therefore, recommend that all NBFC-MFIs should have a minimum Net
Worth of Rs.15 crores.

Recommendation # 12: Strengthening Corporate Governance Framework Aspects

MFIs have twin objectives, namely to act as the vehicle through which the poor can work their way out of poverty and to provide reasonable profits to their investors. These twin objectives can conflict unless a fair balance is maintained between both objectives. This makes it essential that MFIs have good systems of Corporate Governance.

Some of the areas in which good corporate governance can be mandated would be:-
a)      the composition of the board with provision for independent directors
b)     the responsibility of the board to put in place and monitor organisation level
policies for:-
i.         the growth of the loan portfolio including its dispersal in different
ii.       regions
iii.      the identification and formation of joint liability groups
iv.     borrower training and education programmes
v.       credit and assessment procedures
vi.     recovery methods
vii.    employee code of conduct
viii.  employee quality enhancement programmes
ix.     compensation system for employees including limits on variable
            pay and the limit therein on  weightage for business
development and collection efficiency
x.       customer grievance procedures
xi.     internal audit and inspection
xii.    whistle blowing
xiii.  sharing of information with industry bodies

c) disclosures to be made in the financial statements including:
(i)             the geographic distribution of the loan portfolio, both in terms of number of borrowers and outstanding loans
(ii)           analysis of overdues
(iii)         the average effective rate of interest, the average cost of funds and the average margin earned
(iv)         analysis of the outstanding loans by nature of purpose for which loans were granted
(v)           composition of shareholding including percentage shareholding held by private equity


We would, therefore, recommend that every MFI be required to have a system of
Corporate Governance in accordance with rules to be specified by the Regulator.

Recommendation # 13: Measures To Maintenance of Solvency

We would, therefore, recommend that provisioning for loans should not be maintained for individual loans but an MFI should be required to maintain at all times an aggregate provision for loan losses which shall be the higher of:
i.                 1% of the outstanding loan portfolio or
ii.               50% of the aggregate loan installments which are overdue for more than 90 days and less than 180 days and 100% of the aggregate loan installments which are overdue for 180 days or more.

We would, therefore, recommend that NBFC-MFIs be required to maintain Capital
Adequacy Ratio of 15% and subject to our comment in para. 21.3 in main report,
all of the Net Owned Funds should be in the form of Tier I Capital.

Recommendation # 14: Measures to Increase Competition

We would therefore recommend that bank lending to the Microfinance sector both
through the SHG-Bank Linkage programme and directly should be significantly
increased and this should result in a reduction in the lending interest rates.

Recommendation # 15: Eligibility for Priority Sector Lending Status

We would, therefore, recommend that bank advances to MFIs should continue to
enjoy “priority sector lending” status. However, advances to MFIs which do not
comply with the regulation should be denied “priority sector lending” status. It
may also be necessary for the Reserve Bank to revisit its existing guidelines for
lending to the priority sector.

Recommendation 16: Dealing With Assignment and Securitisation

We would, therefore, recommend that:-
a)      Disclosure is made in the financial statements of MFIs of the outstanding loan portfolio which has been assigned or securitised and the MFI continues as an agent for collection. The amounts assigned and securitised must be shown separately.
b)     Where assignment or securitisation is with recourse, the full value of the outstanding loan portfolio assigned or securitised should be considered as risk-based assets for calculation of Capital Adequacy.
c)      Where the assignment or securitisation   is without recourse but credit enhancement has been given, the value of the credit enhancement should be deducted from the Net Owned Funds for the purpose of calculation of Capital Adequacy.
d)     Before acquiring assigned or securitised loans, banks should ensure that the loans have been made in accordance with the terms of the specified regulations.

Recommendation # 17: Alternative Methods in Funding of MFIs

We would, therefore, recommend that:
a)      The creation of one or more "Domestic Social Capital Funds" may be examined in consultation with SEBI.
b)      MFIs should be encouraged to issue preference capital with a ceiling on the coupon rate and this can be treated as part of Tier II capital subject to capital adequacy norms.

Recommendation # 18: Methods And Measures of Monitoring Compliance

We would, therefore, recommend that:-
a)      The primary responsibility for ensuring compliance with the regulations should rest with the MFI itself and it and its management must be penalized in the event of non-compliance
b)      Industry associations must ensure compliance through the implementation of the Code of Conduct with penalties for non-compliance.
c)      Banks also must play a part in compliance by surveillance of MFIs through their branches.
d)      The Reserve Bank should have the responsibility for off-site and on-site supervision of MFIs but the on-site supervision may be confined to the larger MFIs and be restricted to the functioning of the organisational arrangements and systems with some supervision of branches. It should also include supervision of the industry associations in so far as their compliance mechanism is concerned. Reserve Bank should also explore the use of outside agencies for inspection.
e)      The Reserve Bank should have the power to remove from office the CEO and / or a director in the event of persistent violation of the regulations quite apart from the power to deregister an MFI and prevent it from operating in the microfinance sector.
f)        The Reserve Bank should considerably enhance its existing supervisory organisation dealing with NBFC-MFIs.

Recommendation # 19: Dealing With State Level Moneylending Acts

We, therefore, recommend that NBFC-MFIs should be exempted from the provisions of
the Money-Lending Acts, especially as we are recommending interest margin caps and
increased regulation.

We would, therefore, recommend that if our recommendations are accepted, the
need for a separate Andhra Pradesh Micro Finance Institutions (Regulation of
Money Lending) Act will not survive.

Recommendation 19: Transitory Provisions for Implementing report

We would therefore recommend that:
a)      1st April 2011 may be considered as a cut- off date by which time our recommendations, if accepted, must be implemented.  In particular, the recommendations as to the rate of interest must, in any case, be made effective to all loans given by an MFI after 31st March 2011.
b)     As regards the other arrangements, Reserve Bank may grant such extension of time as it considers appropriate in the circumstances.  In particular, this extension may become necessary for entities which currently have activities other than microfinance lending and which may need to form separate entities confined to microfinance activities. “ [ii]

Recollected Questions for MSME Exam 04.10.2020

Recollected Questions for MSME Exam 04.10.2020


Cluster Approach-6 Ques.

PMEGP Scheme helps in creating -Self Employement

CGTMSE Claim % for Women Enterpreneurs

DER Ratio

DSCR Ratio

Interest Coverage Ratio

Sick Unit

MSME act 2006

many ques from Women Enterpreneur schemes etc

INTERNATIONAL TRADE FINANCE recollected on 20.09.2020

  INTERNATIONAL TRADE FINANCE recollected on 20.09.2020

1.B/L ladding types

2.Trade blocks types

3.Forex brokers who approach accreditation

4.Parties in Channel financing

5.Bill of entry submission in  case of  Import  D/A

6.ECGC (ECB-WTPC) 2 MARKS QUESTION

7.Exim bank working group parties

8. Channel financing parties

9.forign trade polices 2015-2020

10.Realisation of export bills 6 mark 2m*3

11.Packing credit study 8 marks  2m*4

12. Bank Guarantee Types

13. Limitation clause in BG 4marks

14.Status holder export based question

15.LC/BG comparison based case study

16.AD bank allowing payment for  export of software question

17. Airway bill characters


Most of the questions out of syllabus .conceptual clarity important 


Forex operations recollected questions on 11.10.2020 Recalled questions

 Forex operations recollected questions on 11.10.2020  Recalled questions

1.Strike price=market price is known as

2.Esop scheme for nri employees

3.Benchmark rates by fedai

4.permissible credits in eefc account

5. Question on Call back service

6. Penal interest on premature closure of fcnr deposit

7.Trade transaction with *Myanmar* may be settled in any freely convertible currency, 

8.for benefits under ftp which date is considered

9.how is foreign trade policy announced in india

10. Schedule 2 of itc hs

11. Marine cargo insurance

12.percentage of cover to exporters under consignment exports policy

13.limit of reporting outstanding import remittance into idpms in lieu with bef statement

14.ntp for foreing currency bills is

15.for export of cardamom pcfc would be

16.in view of covid pandemic the maximum permissible period for pre shipment export credit

17.ispb para a 21

18. if there is no indication in credit of insurance coverage required cif

19.interest equalisation rate for export by msme

20. Article 13 of urdg 758

21.reimbursement bank in lc

22.ispb para a21

23.currency of the insurance policy under letter of credit be same as

24.ucp 600 article 31

25.permissible way of opening rfc domestic account

26. Scrutinizing bill of exchange in lc

27. Urr 725 article 11

28.in case of fdi by investment in equity of an indian company the max period of time for issue of share

29.fiis are are allowed to borrow equity

30. Sat is not a working day as per fedai

31. Max amt for education in foreign country

32. Permissible transactions in Captial account 

33. Conditions to grant loan to nris

34. Travel proceeds to libya

KYC AML Main notes

 

KYC AML



1 PREFACE
This policy and procedure document is a comprehensive source of reference for all the concerned and relevant activities of the Bank towards Know Your Customer (KYC), Anti Money Laundering (AML) and Combating the Financing of Terrorism (CFT) compliance. The policies and procedures developed are designed to ensure that the Bank is committed to the prevention of the use of its facilities for laundering the proceeds of crime and financing terrorist activities. It consists of the following sections:
− Risk based acceptance model to facilitate the classification of current and existing customers on the basis of money laundering and terrorist financing risk;
− Account opening procedures including customer classification, verification of customer information using documentary and non-documentary methods and escalation processes;
− Policy for customer information updates based on the risk level of the individual or entity;
− Internal controls to measure the risk levels of products, services and customers accepted and to measure the effectiveness of current policies and procedures;
− Policies and procedures for the monitoring and reporting of transactions;
− Policies and procedures for customer record maintenance, retention and their sharing with government agencies; and
− Recommendation for a training programme for Bank officials geared towards customer identification and acceptance, customer risk ranking and detection of money laundering instances.

1.1 Statement of commitment
The goals and objectives of this KYC, AML & CFT programme are to (1) deter individuals and entities from using the Bank to launder the proceeds of illegal activities; (2) enable member branches of the Bank to comply with their obligations under the Prevention of Money Laundering Act, Unlawful Activities Prevention Act (ULPA) and regulations from Reserve Bank of India (RBI) and National Bank for Agriculture and Rural Development (NABARD), regulatory bodies for the banks; (3) manage and mitigate money laundering and terrorist financing related risks; (4) allow banks to cooperate with regulatory bodies and government agencies in detecting and deterring money laundering and terrorist financing; and (5) provide employees with guidance for actions to be taken to comply with the Bank’s obligations under the law and the Bank’s policies.

2 Definitions
2.1 Customer
RBI defines a customer1 as any one of the following:
− A person or entity that maintains an account and/or has a business relationship with the Bank.
− One on whose behalf the account is maintained (i.e., the beneficial owner) or beneficiary of transactions conducted by professional intermediaries, such as stock brokers, chartered accountants, solicitors, etc. as permitted under the law.
− Any person or entity connected with a financial transaction or any other product offered by the Bank including walk-in customers.

2.2 High Net-Worth Individual
An individual is designated as a High Net-Worth Individual (HNI) for the purposes of the Bank if the sum of all the credits for the individual at the Bank across all products exceeds Rupees 15 lakhs (Rs. 15,00,000)
2.3 Beneficial Owners
The Beneficial Owner for an entity constitution type is any individual or entity that owns or controls over 20% of the entity. For an individual constitution type the beneficial owner refers to the individual itself or all the operators of the account.
2.4 Controlling Parties
Controlling parties are individuals or entities with direct or indirect control over the account created. For KYC purposes, the controlling parties are defined as authorized signatories, power of attorney holders, executive management (e.g. CEO, CFO, Directors) and Board of Directors. Different account types and transactions could involve different controlling parties.

2.5 Money Laundering
Money Laundering is a process by which illegal sources of money are disguised to make it appear as if they were the proceeds of legal activities. It usually occurs in three steps:
1. The placement step involving the introduction of the money into the financial system;
2. The second step known as layering involves performing complex financial transactions to hide the illegal source; and

3. Finally, the integration step, during which the previously illegal proceeds enter the economy and are converted into apparently legitimate earnings.


2.6 Terrorist Financing
Terrorist Financing relates to the use of financial institutions to launder money or misdirect clean money for illegal and illegitimate terrorist activities. Terrorist financing, unlike money laundering, cares little about the source of the funds and its purpose is what defines the scope.
2.7 Small Account
A small account refers to a savings bank account where:
1. The aggregate of all credits in a financial year does not exceed Rupees one lakh (Rs. 1,00,000);
2. The aggregate of all withdrawals and transfers in a month does not exceed Rupees ten thousand (Rs. 10,000); and
3. The balance at any point of time does not exceed Rupees fifty thousand (Rs. 50,000)
2.8 Financial Intermediary
For the purposes of this document, a financial intermediary is a person or institution that acts on behalf of its customers to conduct a transaction or open an account with the Bank.
As per the RBI, the term Financial Intermediary includes following persons or entities registered under Section 12 of the Securities and Exchange Board of India (SEBI) Act,
1992:
1. Stock brokers
2. Sub-brokers
3. Share transfer agents
4. Bankers to an issue
5. Trustees to trust deed
6. Registrars to issue
7. Merchant bankers
8. Underwriters
9. Portfolio Managers
10. Depositories and Participants
11. Custodian of securities
12. Credit rating agencies
13. Venture capital funds
14. Collective investment schemes including mutual funds
2.9 Ordering Bank
In relation with wire transfers, an Ordering Bank is a Bank that originates a wire transfer as per the order placed by its customers
2.10 Intermediary Bank
In relation with wire transfers, an Intermediary Bank provides business services on behalf of another financial institution (ordering and beneficiary bank). Intermediary Banks are also known as Correspondent Banks and are used by domestic banks in order to service transactions originating in different cities, states or foreign countries, and act as a domestic bank's agent. This is done because the domestic bank may have limited access to markets outside of its geography, and cannot service its client accounts without opening up a branch in that particular city, state or country.
2.11 Beneficiary Bank
In relation with wire transfers, a Beneficiary Bank refers to the bank identified in a payment order in which an account of the beneficiary is to be credited pursuant to the order or which otherwise is to make payment to the beneficiary if the order does not provide for payment to an account.


3 Legislative and Regulatory Framework
3.1 Defined legal frameworks
3.1.1 Prevention of Money Laundering Act 2002
The Prevention of Money Laundering Act (PMLA) of 20022 is the legislation that forms the core of the legal framework put in to place to combat money laundering. The PMLA came into effect from 1st July 2005 with two amendments passed in May 2005 and March 2009. The act criminalises money laundering and also provides for freezing and confiscation of assets associated in money laundering. It requires financial institutions and intermediaries to verify the identity of clients, maintain records and furnish prescribed transactional information to the FIU-IND.
3.1.2 Rules under PMLA
In addition, the Government of India has strengthened the PMLA through the notification of various rules, known as Prevention of Money Laundering Rules (PMLR), to enforce the PMLA which includes defining an adjudicating authority and appellate tribunal, conferring exclusive and concurrent powers, specifying rules for receipt and management of confiscated properties, etc. A complete listing of the rules and their purpose is available on the FIU-IND website3

3.1.3 Unlawful Activities (Prevention) Act, 1967
The Unlawful Activities Prevention Act of 1967, amended in 2008, relates to the purposes of prevention, and for coping with terrorist activities. The Government of India has issued an order dated August 27 2009 detailing the procedure for implementing of section 51A of the Act and it empowers the Central Government to freeze, seize or attach funds and other financial assets or economic resources held by:
− On behalf of or at the direction of the individuals or entities listed in the Schedule to the Order, or
− Any other person engaged in or suspected to be in engaged in terrorism ,or
− Prohibit any individual or entity from making any funds ,financial assets or economic resources or related services available for the benefit of the individuals or entities listed in the Schedule or Order.
3.2 Applicable Regulatory Authorities
3.2.1 Reserve Bank of India

The RBI is the central banking institution in India and controls the monetary policy of the rupee and the currency reserves. Through its Master Circular on Know Your Customer (KYC) norms/Anti Money Laundering (AML) Standards/Combating of Financing of Terrorism/Obligations of Banks under PMLA, 2002 the RBI introduced KYC guidelines for all banks which it has since updated yearly. The RBI also has the authority to penalize banking institutions for violations in KYC, AML and CFT norms.
3.2.2 National Bank for Agriculture and Rural Development
NABARD is the apex development bank in India and is accredited with matters regarding policy, planning and operations in the field of credit for agriculture and other economic activities in rural regions in India. In discharging its role as a facilitator for rural prosperity, NABARD is also entrusted with acting as a regulator for Cooperative Banks and Regional Rural Banks (RRBs). NABARD created a model KYC policy for its member banks with a stipulation that it be tailored to the individual needs of the bank.
3.2.3 Financial Intelligence Unit – India
FIU-IND is the central national agency responsible for receiving, processing, analysing and disseminating information relating to suspicious financial transactions and is responsible for domestic and global efforts against money laundering and related crimes. Any reports regarding financial transactions such as Suspicious Transaction Reports (STRs) and Cash Transaction Reports (CTRs) must be filed with the agency. FIU-IND also has the authority to request additional information on individuals or entities from banks and other financial institutions.

3.3 Consequences of Non-Compliance
3.3.1 Penalties for Non-Compliance
Any contravention or non-compliance with RBI’s instructions relating to KYC, AML and CFT guidelines shall attract penalties under the provisions of Section 47(A) (1) (b) read with Section 46(4) of the Banking Regulation Act, 1949. The RBI has imposed fines on various public and private sector banks for non-compliance with KYC norms. In the first six months of 2011, over 48 cooperative banks had been fined between Rupees one lakh (Rs. 1, 00,000) and Rupees five lakh (Rs. 5, 00,000) for various KYC, AML and CFT related offences. Additionally, the PMLA specifies punishments of up to ten years of rigorous imprisonment on whosoever willingly commits the offence of money laundering.


3.3.2 Reputational Risk
If the Bank is penalised for non-compliance, it can create a negative perception of the institution on customers, investors and regulators and can adversely affect the Bank’s ability to raise capital and to maintain and create business relationships. RBI has stepped up its actions against non-compliant banks and in addition to fiscal penalties, also issues notifications and press releases5 on the banks that have been fined for violation of KYC, AML and CFT guidelines. These press releases are picked up by national and international news media which can result in a severe reputational damage to the banks.






SHORT NOTES ON ANTI MONEY LAUNDERING

1. The conversion or transfer of property, the concealment or disguising of the nature of the proceeds, the acquisition, possession or use of property, knowing that these are derived from criminal activity and participate or assist the movement of funds to make the proceeds appear legitimate is money laundering.
Money obtained from certain crimes, such as extortioninsider tradingdrug trafficking, and illegal gambling is "dirty" and needs to be "cleaned" to appear to have been derived from legal activities, so that banks and other financial institutions will deal with it without suspicion. Money can be laundered by many methods which vary in complexity and sophistication.
Money laundering involves three steps: The first involves introducing cash into the financial system by some means ("placement"); the second involves carrying out complex financial transactions to camouflage the illegal source of the cash ("layering"); and finally, acquiring wealth generated from the transactions of the illicit funds ("integration"). Some of these steps may be omitted, depending upon the circumstances. For example, non-cash proceeds that are already in the financial system would not need to be placed.[8]
Money laundering is the process of making illegally-gained proceeds (i.e., "dirty money") appear legal (i.e., "clean"). Typically, it involves three steps: placement, layering, and integration. First, the illegitimate funds are furtively introduced into the legitimate financial system. Then, the money is moved around to create confusion, sometimes by wiring or transferring through numerous accounts. Finally, it is integrated into the financial system through additional transactions until the "dirty money" appears "clean".

2.Money laundering involves taking criminal proceeds and disguising their illegal source in anticipation of ultimately using the criminal proceeds to perform legal and illegal activities.
Simply put, money laundering is the process of making dirty money look clean.

3. Money laundering methods
Money laundering:
The money laundering cycle can be broken down into three distinct stages; however, it is important to remember that money laundering is a single process. The stages of money laundering include the:
Placement Stage
Layering Stage
Integration Stage
The Placement Stage

The placement stage represents the initial entry of the "dirty" cash or proceeds of crime into the financial system. Generally, this stage serves two purposes: (a) it relieves the criminal of holding and guarding large amounts of bulky of cash; and (b) it places the money into the legitimate financial system. It is during the placement stage that money launderers are the most vulnerable to being caught. This is due to the fact that placing large amounts of money (cash) into the legitimate financial system may raise suspicions of officials.
The placement of the proceeds of crime can be done in a number of ways. For example, cash could be packed into a suitcase and smuggled to a country, or the launderer could use smurfs to defeat reporting threshold laws and avoid suspicion. Some other common methods include:
Loan Repayment
Repayment of loans or credit cards with illegal proceeds Gambling
Purchase of gambling chips or placing bets on sporting events
Currency Smuggling
The physical movement of illegal currency or monetary instruments over the border
Currency Exchanges
Purchasing foreign money with illegal funds through foreign currency exchanges
Blending Funds
Using a legitimate cash focused business to co-mingle dirty funds with the day's legitimate sales receipts
This environment has resulted in a situation where officials in these jurisdictions are either unwilling due to regulations, or refuse to cooperate in requests for assistance during international money laundering investigations.
To combat this and other international impediments to effective money laundering investigations, many like-minded countries have met to develop, coordinate, and share model legislation, multilateral agreements, trends & intelligence, and other information. For example, such international watchdogs as the Financial Action Task Force (FATF) evolved out of these discussions.
The Layering Stage

After placement comes the layering stage (sometimes referred to as structuring). The layering stage is the most complex and often entails the international movement of the funds. The primary purpose of this stage is to separate the illicit money from its source. This is done by the sophisticated layering of financial transactions that obscure the audit trail and sever the link with the original crime.
During this stage, for example, the money launderers may begin by moving funds electronically from one country to another, then divide them into investments placed in advanced financial options or overseas markets; constantly moving them to elude detection; each time, exploiting loopholes or discrepancies in legislation and taking advantage of delays in judicial or police cooperation.
The Integration Stage

The final stage of the money laundering process is termed the integration stage. It is at the integration stage where the money is returned to the criminal from what seem to be legitimate sources. Having been placed initially as cash and layered through a number of financial transactions, the criminal proceeds are now fully integrated into the financial system and can be used for any purpose.
There are many different ways in which the laundered money can be integrated back with the criminal; however, the major objective at this stage is to reunite the money with the criminal in a manner that does not draw attention and appears to result from a legitimate source. For example, the purchases of property, art work, jewellery, or high-end automobiles are common ways for the launderer to enjoy their illegal profits without necessarily drawing attention to themselves
Smurfs - A popular method used to launder cash in the placement stage. This technique involves the use of many individuals (the"smurfs") who exchange illicit funds (in smaller, less conspicuous amounts) for highly liquid items such as traveller cheques, bank drafts, or deposited directly into savings accounts. These instruments are then given to the launderer who then begins the layering stage.
For example, ten smurfs could "place" $1 million into financial institutions using this technique in less than two weeks








Image from UNODC




3. Case study:
Online or Internet Banking ( Special Case study how Money laundering 3 steps Happens):: Very important
Placement — Launderers want to get their proceeds into legitimate repositories such as banks, securities or real estate, with as little trace of the source and beneficial ownership as possible. Often, cyberspace banks do not accept conventional deposits. However,cyberbanks could be organized to take custodial-like forms — holding, reconciling and transferring rights to assets held in different forms around the world. Money launderers can create their own systems shadowing traditional commercial banks in order to acceptdeposits, perhaps as warehouses for cash or otherbulk commodities. Thus, cyberspace banks have thepotential to offer highly secure, uncommonly private“placement” vehicles for money launderersLayering — Electronic mail messages, aided by encryption and cyberspace banking transfers, enablelaunderers to transfer assets around the world manytimes a day.
 Integration — Once layered, cyberspace bankingtechnologies may facilitate integration in two ways.If cyberbanking permits person-to-person cash-like transfers, with no actual cash involvement, existing currency reporting regulations do not apply. Using“super smart-card” technologies, money can be movedaround the world through ATM transactions. These smart cards permit easy retrieval of the “account”balance by the use of an ATM card


 Terrorism Financing are 3 types

A. State financing: Separate entities are created with organizational and financial support of the state
B. Legimate modes : Donations by business,individuals and charity funds
C. Private funding:by criminal activities by bank robberies, drug trafficking, kidnaps,exortion..

Money laundering can take several forms, although most methods can be categorized into one of a few types. These include "bank methods, smurfing [also known as structuring], currency exchanges, and double-invoicing".
 Structuring: Often known as smurfing, this is a method of placement whereby cash is broken into smaller deposits of money, used to defeat suspicion of money laundering and to avoid anti-money laundering reporting requirements. A sub-component of this is to use smaller amounts of cash to purchase bearer instruments, such as money orders, and then ultimately deposit those, again in small amounts.
· Bulk cash smuggling: This involves physically smuggling cash to another jurisdiction and depositing it in a financial institution, such as an offshore bank, with greater bank secrecy or less rigorous money laundering enforcement
· Cash-intensive businesses: In this method, a business typically expected to receive a large proportion of its revenue as cash uses its accounts to deposit criminally derived cash. Such enterprises often operate openly and in doing so generate cash revenue from incidental legitimate business in addition to the illicit cash – in such cases the business will usually claim all cash received as legitimate earnings. Service businesses are best suited to this method, as such enterprises have little or no variable costs and/or a large ratio between revenue and variable costs, which makes it difficult to detect discrepancies between revenues and costs. Examples are parking structures, strip clubstanning salonscar washesarcadesbars, restaurants, and casinos.
· Trade-based laundering: This involves under- or over-valuing invoices to disguise the movement of money. For example, the art market has been accused of being an ideal vehicle for money laundering due to several unique aspects of art such as the subjective value of artworks as well as the secrecy of auction houses about the identity of the buyer and seller.
· Shell companies and trusts: Trusts and shell companies disguise the true owners of money. Trusts and corporate vehicles, depending on the jurisdiction, need not disclose their true owner. Sometimes referred to by the slang term rathole, though that term usually refers to a person acting as the fictitious owner rather than the business entity.
· Round-tripping: Here, money is deposited in a controlled foreign corporation offshore, preferably in a tax haven where minimal records are kept, and then shipped back as a foreign direct investment, exempt from taxation. A variant on this is to transfer money to a law firm or similar organization as funds on account of fees, then to cancel the retainer and, when the money is remitted, represent the sums received from the lawyers as a legacy under a will or proceeds of litigation.
· Bank capture: In this case, money launderers or criminals buy a controlling interest in a bank, preferably in a jurisdiction with weak money laundering controls, and then move money through the bank without scrutiny.
· Casinos: In this method, an individual walks into a casino and buys chips with illicit cash. The individual will then play for a relatively short time. When the person cashes in the chips, they will expect to take payment in a check, or at least get a receipt so they can claim the proceeds as gambling winnings.
· Other gambling: Money is spent on gambling, preferably on high odds games. One way to minimize risk with this method is to bet on every possible outcome of some event that has many possible outcomes, so no outcome(s) have short odds, and the bettor will lose only the vigorish and will have one or more winning bets that can be shown as the source of money. The losing bets will remain hidden.
· Real estate: Someone purchases real estate with illegal proceeds and then sells the property. To outsiders, the proceeds from the sale look like legitimate income. Alternatively, the price of the property is manipulated: the seller agrees to a contract that underrepresents the value of the property, and receives criminal proceeds to make up the difference.
· Black salaries: A company may have unregistered employees without written contracts and pay them cash salaries. Dirty money might be used to pay them.
· Tax amnesties: For example, those that legalize unreported assets and cash in tax havens.
· Life insurance business: Assignment of policies to unidentified third parties and for which no plausible reasons can be ascertained.
· By using national banking services smurfing, Muiltiple tier of accounts,funnel accounts,Contra transactions,DD,cash depost and transfer fund connected accounts, front companies, legimate accounts, dormant accounts(Mostly used by terrorists) and wire transfer
· Using remittance ,prepaid cards, money changers,credit and debit cards


By using The credit card industry includes: case study

 Credit card associations, such as American Express,MasterCard and Visa, which license member banks toissue bankcards, authorize merchants to accept thosecards, or bothIssuing banks, which solicit potential customers and issue the credit cards.Acquiring banks, which process transactions for merchants who accept credit cards.
 Third-party processors, which contract with issuing or acquiring banks to provide transaction processing andother credit card–related services for the banks.Credit card accounts are not likely to be used in the initialplacement stage of money laundering because the industrygenerally restricts cash payments. They are more likely to be usedin the layering or integration stages.
Example
Money launderer Josh prepays his credit card using illicit funds that he has already introduced into thebanking system, creating a credit balance on his account. Josh then requests a credit refund, whichenables him to further obscure the origin of the funds, which constitutes layering. Josh then uses the illicitmoney he placed in his bank account and the creditcard refund to pay for a new kitchen that he bought.Through these steps he has integrated his illicit fundsinto the financial system.
· A money launderer could put ill-gotten funds in accounts at banksoffshore and then access these funds using credit and debitcards associated with the offshore account. Alternatively, he couldsmuggle the cash out of one country into an offshore jurisdictionwith lax regulatory oversight, place the cash in offshore banks and— again — access the illicit funds using credit or debit cards.In a 2002 Report called “Extent of Money Laundering throughCredit Cards Is Unknown,” the U.S. Government AccountabilityOffice, the Congressional watchdog of the United States, offered hypothetical money laundering scenarios using credit cards. One
example was: “[Money launderers establish a legitimate businessin the U.S. as a ‘front’ for their illicit activity. They establish a bank account with a U.S.-based bank and obtain credit cards and ATM cards under the name of the ‘front business.’ Funds from theirillicit activities are deposited into the bank account in the United States. While in another country, where their U.S.-based bank hasaffiliates, they make withdrawals from their U.S. bank account,using credit cards and ATM cards. Money is deposited by one of their cohorts in the U.S. and is transferred to pay off the credit cardloan or even prepay the credit card. The bank’s online services make it possible to transfer funds between checking and creditcard accounts.”

ML Global measures can be achieved by

A. Engagement of international organizations
B. UNO initiatives like Vienna convention in 1988, Political declaration in 1998  , The Palermo convention in 2003
C. International monetary fund
D. Financial intelligence units (In india 15th nov 2004 , Director EIU economic intelligence council, Headed by finance Minister)
E. Egmont group of FIUs..1995 (151  FIUs)



7. FATF:::
The Financial Action Task Force (FATF) is an inter-governmental body established in 1989 by the Ministers of its Member jurisdictions. The objectives of the FATF are to set standards and promote effective implementation of legal, regulatory and operational measures for combating money laundering, terrorist financing and other related threats to the integrity of the international financial system. The FATF is therefore a “policy-making body” which works to generate the necessary political will to bring about national legislative and regulatory reforms in these areas.
The FATF has developed a series of Recommendations that are recognised as the international standard for combating of money laundering and the financing of terrorism and proliferation of weapons of mass destruction. They form the basis for a co-ordinated response to these threats to the integrity of the financial system and help ensure a level playing field. First issued in 1990, the FATF Recommendations were revised in 1996, 2001, 2003 and most recently in 2012 to ensure that they remain up to date and relevant, and they are intended to be of universal application.
The FATF monitors the progress of its members in implementing necessary measures, reviews money laundering and terrorist financing techniques and counter-measures, and promotes the adoption and implementation of appropriate measures globally. In collaboration with other international stakeholders, the FATF works to identify national-level vulnerabilities with the aim of protecting the international financial system from misuse.
The FATF's decision making body, the FATF Plenary, meets three times per year.

FATF HQ in Paris
FATF currently comprises 34 member jurisdictions and 12 regional organizations

FATF RECOMMENDATIONS. ::
Money laundering, terrorist financing, and the financing of the proliferation of weapons of mass destruction are serious threats to security and the integrity of the financial system.
The FATF Standards have been revised to strengthen global safeguards and further protect the integrity of the financial system by providing governments with stronger tools to take action against financial crime. At the same time, these new standards will address new priority areas such as corruption and tax crimes.
The revision of the Recommendations aims at achieving a balance:
On the one hand, the requirements have been specifically strengthened in areas which are higher risk or where implementation could be enhanced. They have been expanded to deal with new threats such as the financing of proliferation of weapons of mass destruction, and to be clearer on transparency and tougher on corruption.
On the other, they are also better targeted – there is more flexibility for simplified measures to be applied in low risk areas. This risk-based approach will allow financial institutions and other designated sectors to apply their resources to higher risk areas.
The FATF Recommendations are the basis on which all countries should meet the shared objective of tackling money laundering, terrorist financing and the financing of proliferation. The FATF calls upon all countries to effectively implement these measures in their national systems.
FATF Recommendations 2012
A – AML/CFT POLICIES AND COORDINATION
1 - Assessing risks & applying a risk-based approach
2 - National cooperation and coordination
B – MONEY LAUNDERING AND CONFISCATION
3.Moneylaundering offence
4 - Confiscation and provisional measures
C – TERRORIST FINANCING AND FINANCING OF PROLIFERATION
5 - SRII Terrorist financing offence
6 - SRIII Targeted financial sanctions related to terrorism & terrorist financing
7 - Targeted financial sanctions related to proliferation
8 - Non-profit organisations
D – PREVENTIVE MEASURES
9 - Financial institution secrecy laws
Customer due diligence and record keeping
10 - Customer due diligence
11 - Record keeping
Additional measures for specific customers and activities
12 - Politically exposed persons
13 - Correspondent banking
14 - Money or value transfer services
15 - New technologies
16 - Wire transfers
Reliance, Controls and Financial Groups
17 - Reliance on third parties
18 - Internal controls and foreign branches and subsidiaries
19 - Higher-risk countries
Reporting of suspicious transactions
20 - Reporting of suspicious transactions
21 - Tipping-off and confidentiality
Designated non-financial Businesses and Professions (DNFBPs)
22 - DNFBPs: Customer due diligence
23 - DNFBPs: Other measures
E – TRANSPARENCY AND BENEFICIAL OWNERSHIP OF LEGAL PERSONS AND ARRANGEMENTS
24 - Transparency and beneficial ownership of legal persons
25 - Transparency and beneficial ownership of legal arrangements
F – POWERS AND RESPONSIBILITIES OF COMPETENT AUTHORITIES AND OTHER INSTITUTIONAL MEASURES
Regulation and Supervision
26 - Regulation and supervision of financial institutions
27 - Powers of supervisors
28 - Regulation and supervision of DNFBPs
Operational and Law Enforcement
29 - Financial intelligence units
30 - Responsibilities of law enforcement and investigative authorities
31 - Powers of law enforcement and investigative authorities
32 - Cash couriers

General Requirements
33 - Statistics
34 - Guidance and feedback
Sanctions
35 - Sanctions
G – INTERNATIONAL COOPERATION
36 - International instruments
37 - Mutual legal assistance
38 - Mutual legal assistance: freezing and confiscation
39 - Extradition
40 - Other forms of international cooperation


8.FATF IX Special Recommendations on Terrorist Financing:::
Recognising the vital importance of taking action to combat the financing of terrorism, the FATF has  agreed these Recommendations, which, when combined with the FATF Forty Recommendations on  money laundering, set out the basic framework to detect, prevent and suppress the financing of  terrorism and terrorist acts.
I. Ratification and implementation of UN instruments Each country should take immediate steps to ratify and to implement fully the 1999 United Nations 
International Convention for the Suppression of the Financing of Terrorism.
Countries should also immediately implement the United Nations resolutions relating to the 
prevention and suppression of the financing of terrorist acts, particularly United Nations Security  Council Resolution 1373. 

II. Criminalising the financing of terrorism and associated money laundering
Each country should criminalise the financing of terrorism, terrorist acts and terrorist organisations.  Countries should ensure that such offences are designated as money laundering predicate offences.

III. Freezing and confiscating terrorist assets Each country should implement measures to freeze without delay funds or other assets of terrorists,  those who finance terrorism and terrorist organisations in accordance with the United Nations  resolutions relating to the prevention and suppression of the financing of terrorist acts. Each country should also adopt and implement measures, including legislative ones, which would  enable the competent authorities to seize and confiscate property that is the proceeds of, or used in, or  intended or allocated for use in, the financing of terrorism, terrorist acts or terrorist organisations.

IV. Reporting suspicious transactions related to terrorism If financial institutions, or other businesses or entities subject to anti-money laundering obligations,  suspect or have reasonable grounds to suspect that funds are linked or related to, or are to be used for  terrorism, terrorist acts or by terrorist organisations, they should be required to report promptly their  suspicions to the competent authorities.

V. International Co-operation Each country should afford another country, on the basis of a treaty, arrangement or other mechanism  for mutual legal assistance or information exchange, the greatest possible measure of assistance in  connection with criminal, civil enforcement, and administrative investigations, inquiries and  proceedings relating to the financing of terrorism, terrorist acts and terrorist organisations. 
Countries should also take all possible measures to ensure that they do not provide safe havens for  individuals charged with the financing of terrorism, terrorist acts or terrorist organisations, and should  have procedures in place to extradite, where possible, such individuals.
VI. Alternative Remittance Each country should take measures to ensure that persons or legal entities, including agents, that  provide a service for the transmission of money or value, including transmission through an informal  money or value transfer system or network, should be licensed or registered and subject to all the  FATF Recommendations that apply to banks and non-bank financial institutions. Each country  should ensure that persons or legal entities that carry out this service illegally are subject to administrative, civil or criminal sanctions.
VII. Wire transfers Countries should take measures to require financial institutions, including money remitters, to include  accurate and meaningful originator information (name, address and account number) on funds  transfers and related messages that are sent, and the information should remain with the transfer or 
related message through the payment chain. Countries should take measures to ensure that financial institutions, including money remitters,  conduct enhanced scrutiny of and monitor for suspicious activity funds transfers which do not contain  complete originator information (name, address and account number).

VIII. Non-profit organi sations Countries should review the adequacy of laws and regulations that relate to entities that can be abused for the financing of terrorism. Non-profit organisations are particularly vulnerable, and countries  should ensure that they cannot be misused:

(i) by terrorist organisations posing as legitimate entities;

(ii) to exploit legitimate entities as conduits for terrorist financing, including for the purpose of escaping asset freezing measures; and (iii) to conceal or obscure the clandestine diversion of funds intended for legitimate purposes to  terrorist organisations. IX. Cash Couriers Countries should have measures in place to detect the physical cross-border transportation of currency  and bearer negotiable instruments, including a declaration system or other disclosure obligation. Countries should ensure that their competent authorities have the legal authority to stop or restrain  currency or bearer negotiable instruments that are suspected to be related to terrorist financing or  money laundering, or that are falsely declared or disclosed. Countries should ensure that effective, proportionate and dissuasive sanctions are available to deal  with persons who make false declaration(s) or disclosure(s). In cases where the currency or bearer  negotiable instruments are related to terrorist financing or money laundering, countries should also  adopt measures, including legislative ones consistent with Recommendation 3 and Special  Recommendation III, which would enable the confiscation of such currency or instruments.
9.FATF Regional bodies
There are eight regional FATF-style bodies and FATF Associate
Members that have similar form and functions to those of FATF.
Many FATF member countries are also members of these bodies.
 Asia/Pacific Group on Money Laundering (APG).
 Caribbean Financial Action Task Force (CFATF).
 Council of Europe Select Committee of Experts on
the Evaluation of Anti-Money Laundering Measures
(MONEYVAL) (formerly PC-R-EV).
 Eastern and Southern Africa Anti-Money Laundering
Group (ESAAMLG).
 Eurasian Group (EAG).
 Financial Action Task Force of South America against
Money Laundering (GAFISUD – Grupo de Acción
Financiera de Sudamérica)
 Intergovernmental Action Group against Money-
Laundering in West Africa (GIABA – Groupe Intergouvernemental d’Action contre le Blanchiment
d’Argent en Afrique de l’Quest)
 Middle East and North Africa Financial Action Task
Force (MENAFATF)
10. cuckoo smurfing.::
In 2005, FATF added a new term to the vast money laundering lexicon – “cuckoo smurfing.
The term, mentioned in the organization’s 2005 Typologies Report,refers to a form of money laundering linked to alternativeremittance systems, in which criminal funds are transferred through the accounts of unwitting persons who are expecting genuinefunds or payments from overseas. The term cuckoo smurfing firstoriginated in investigations in the United Kingdom, where it is asignificant money laundering technique.The cuckoo is a European bird that is a parasite because it laysits eggs in the nests of other birds, which hatch them and rearthe offspring. The main difference between traditional structurerand cuckoo smurfing is that in the latter the third parties who holdthe bank accounts being used are not aware of the fact that illicitmoney is being deposited into their accounts.Cuckoo smurfing requires the work of an insider within a financialinstitution and is generally a four step process:
 The first step occurs when a customer provides fundsto an alternative remitter for transfer to a beneficiary,generally in another country.
 The next step involves the insider, who will provide the transaction details (beneficiary name, bank, accountnumber and amount) of the transfer to an associatein the foreign country where the beneficiary of thetransfer is located. The associate in the foreign countrywill have cash that needs to be placed into the financialsystem.
 The associate in the foreign country will then depositcash into the bank account of the intended beneficiary.The beneficiary will receive the full amount of thetransfer and the associate in the foreign country will be able to place some of its cash into the financial system
 The associate in the foreign country then arranges to get the funds from the alternate remitter, using oneof the methods by which alternate remitters transferfunds. In this case, the associate in the foreign countrywill have laundered the funds and will have legitimate funds to replace the criminally derived ones depositedinto the beneficiary’s account.


11. Wolfsberg Group:: 13 Banks
Banco Santander
Bank of America
Bank of Tokyo-Mitsubishi UFJ
Barclays
Citigroup
Credit Suisse
Deutsche Bank
Goldman Sachs
HSBC
J.P. Morgan Chase
Société Générale
Standard Chartered Bank
UBS
The Wolfsberg Group is an association of 13 global banks that aims to develop financial services industry standards and related products for Know Your Customer, Anti-Money Laundering and  Counter Terrorist Financing policiesThe Group first came together in 2000 at the Wolfsberg castle in  Switzerland, accompanied by representatives of Transparency International, to draft anti-money laundering guidelines for private banking that, when implemented, would mark an unprecedented  private-sector assault on the laundering of corruption proceeds. Their principles hold no force of law and carry no penalties for those who do not abide by them. The Wolfsberg Anti-Money Laundering Principles for Private Banking was published in October 2000 and was revised in May  2002. These principles recommend controls for private banking that range from the basic, such as customer identification, to enhanced due diligence, such as heightened scrutiny of individuals who “have or have had positions of public trust.” The banks that released the principles with Transparency International said that the principles would “make it harder for corrupt people to deposit their ill-gotten  gains in the world’s banking system.” The principles say banks will “endeavor to accept only those clients whose source of wealth and funds can be reasonably established to be legitimate.” They highlight the need to identify the beneficial owner of funds “for all accounts” when that person is someone other than the client, and urge private bankers to perform due diligence on “money managers and similar intermediaries” to determine that the middlemen have a “satisfactory” due diligence process for their clients or a regulatory obligation to conduct such due diligence. The principles recommend that “at least one person other than the private banker” should approve all new clients and accounts.
The principles list several situations that require further due diligence, including activities that involve:
 Public officials, including individuals holding, or having held, positions of public trust, as well as their families and close associates.  High-risk countries, including countries “identified by credible sources as having inadequate anti-moneylaundering standards or representing high-risk for crime and corruption.”  High-risk activities, involving clients and beneficial owners whose source of wealth “emanates from activities known to be susceptible to money laundering.” The Wolfsberg principles say that banks should have written policies on the “identification of and follow-up on unusual or
suspicious activities,” and should include a definition of what is suspicious, as well as examples of such activity. They recommend a “sufficient” monitoring system that uses the private banker’s  knowledge of the types of activity that would be suspicious for particular clients. They also outline mechanisms that can be used to identify suspicious activity, including meetings, discussions and  in-country visits with clients and steps that should be taken when suspicious activity is detected.  The principles also address: Reporting to manageMent of money laundering issues.  AML training.  Retention of relevant documents. Deviations from policy. Creation of an anti-money laundering department and  an AML policy.
In May 2002, the Wolfsberg Principles for Private Banking were revised. A section was added prohibiting the use of internal non-client accounts (sometimes referred to as “concentration”  accounts) to keep clients from being linked to the movement of funds on their behalf (i.e., banks should forbid the use of such internal accounts in a manner that would prevent officials from appropriately monitoring movements of client funds). The Wolfsberg Group also issued guidelines in early 2002 on “The Suppression of the Financing of Terrorism,” outlining the roles of financial institutions in the fight against money laundering and terrorism financing. The Wolfsberg recommendations include:
Providing official lists of suspected terrorists on a globally coordinated basis by relevant authorities.
 Including adequate information in the lists to help institutions search customer databases efficiently.
 Providing prompt feedback to institutions following circulation of the official lists.  Providing information on the manner, means and  methods used by terrorists.  Developing government guidelines for business sectors and activities identified as high-risk for terrorism financing.  Developing uniform global formats for funds transfers  that assist in the detection of terrorism financing. The group also recommends that financial institutions be protected by a safe harbor immunity to encourage them to share information and to report to authorities. The Wolfsberg Group also committed itself to recommending enhanced due diligence for “business relationships with remittance businesses, exchange houses, casas de cambio, bureaux de change and money transfer agents…” and committed its members to taking enhanced due diligence steps for high-risk customers or those in high-risk sectors, and activities “such as underground  banking businesses or alternative remittance systems.” In 2002, Wolfsberg issued guidelines on “Anti-Money Laundering Principles for Correspondent Banking” that outlined steps financial institutions should take to combat money laundering and terrorism financing through correspondent banking


12.AML/CFT legislation in Major countries
A. EUROPE  a) European convention on the suppression of terrorism 1977 b)EC on laundering ,search , Seizure from crime 1993 B.US a) Bank secrecy act 1970 b)Money laundering control Act 1986 c) Anti drug abuse act 1988 d)Annuzio –Wylie AML act 1992 d)ML Suppression Act 1994 f)ML and Financial crimes strategy act 1998 G) USA PETRIOT ACT 2001
C. UK

13.AML/CFT IN INDIA

In 2002, the Parliament of India passed an act called the Prevention of Money Laundering Act, 2002. The main objectives of this act are to prevent money-laundering as well as to provide for confiscation of property either derived from or involved in, money-laundering.
Section 12 (1) describes the obligations that banks, other financial institutions, and intermediaries have to
a. Maintain records that detail the nature and value of transactions, whether such transactions comprise a single transaction or a series of connected transactions, and where these transactions take place within a month.
b. Furnish information on transactions referred to in clause (a) to the Director within the time prescribed, including records of the identity of all its clients.
a. Section 12 (2) prescribes that the records referred to in sub-section (1) as mentioned above, must be maintained for ten years after the transactions finished. It is handled by the Indian Income Tax Department.
b. The provisions of the Act are frequently reviewed and various amendments have been passed from time to time.[
c. Most money laundering activities in India are through political parties, corporate companies and the shares market. These are investigated by the Enforcement Directorate and Indian Income Tax Department.[ According to Government of India, out of the total tax arrears of ₹2,480 billion (US$37 billion) about ₹1,300 billion (US$19 billion) pertain to money laundering and securities scam cases.
d. Bank accountants must record all transactions over Rs. 1 million and maintain such records for 10 years. Banks must also make cash transaction reports (CTRs) and suspicious transaction reports over Rs. 1 million within 7 days of initial suspicion. They must submit their reports to the Enforcement Directorate and Income Tax Department.[

14.THE PREVENTION OF MONEY LAUNDERING ACT
The Prevention of Money Laundering Act, 2002 (PMLA) forms the core of the legal framework put in place by India to combat money laundering. PMLA and the Rules notified there under came into force with effect from July 1, 2005 . Director, FIU-IND and Director (Enforcement) have been conferred with exclusive and concurrent powers under relevant sections of the Act to implement the provisions of the Act.
The PMLA and rules notified thereunder impose obligation on banking companies, financial institutions and intermediaries to verify identity of clients, maintain records and furnish information to FIU-IND. PMLA defines money laundering offence and provides for the freezing, seizure and confiscation of the proceeds of crime.


PMLA 2002 Overview::
Section 1 - Short title, extent and commencement
Section 2 - Definitions
Section 3 - Offence of Money-Laundering
Section 4 - Punishment for Money Laundering
Section 12 - Obligations-Reporting Entity to maintain records
Section 12A - Obligations-Access to information
Section 13 - Powers of the Director
Section 14 - No civil proceedings
Section 15 - Powers to prescribe procedure
Section 26 - Appellate Tribunal
Section 39 - Right of Appellant
Section 40 - Deemed to be Public Servants
Section 41 - Restriction on Civil Courts
Section 42 - Appeal to High Court
Section 44 - Offences triable by Special Courts
Section 48 - Authorities under the Act
Section 49 - Appointment of Authorities and Other Officers
Section 50 - Summons, production of documents etc.
Section 54 - Other authorities empowered and required to assist
Section 56 - Agreements with foreign countries
Section 66 - Disclosure of information
Section 69 - Recovery of fines
Section 75 - Power to remove difficulties


15.FIU –IND

Overview of FIU-IND
Financial Intelligence Unit – India (FIU-IND) was set by the Government of India vide O.M. dated 18th November 2004 as the central national agency responsible for receiving, processing, analyzing and disseminating information relating to suspect financial transactions. FIU-IND is also responsible for coordinating and strengthening efforts of national and international intelligence, investigation and enforcement agencies in pursuing the global efforts against money laundering and related crimes. FIU-IND is an independent body reporting directly to the Economic Intelligence Council (EIC) headed by the Finance Minister.


Functions of FIU-IND::
The main function of FIU-IND is to receive cash/suspicious transaction reports, analyse them and, as appropriate, disseminate valuable financial information to intelligence/enforcement agencies and regulatory authorities . The functions of FIU-IND are: Collection of Information: Act as the central reception point for receiving Cash Transaction reports (CTRs), Cross Border Wire Transfer Reports (CBWTRs), Reports on Purchase or Sale of Immovable Property (IPRs) and Suspicious Transaction Reports (STRs) from various reporting entities.
Analysis of Information: Analyze received information in order to uncover patterns of transactions suggesting suspicion of money laundering and related crimes.
Sharing of Information:Share information with national intelligence/law enforcement agencies, national regulatory authorities and foreign Financial Intelligence Units. Act as Central Repository:Establish and maintain national data base on cash transactions and suspicious transactions on the basis of reports received from reporting entities.
Coordination:Coordinate and strengthen collection and sharing of financial intelligence through an effective national, regional and global network to combat money laundering and related crimes.
Research and Analysis:Monitor and identify strategic key areas on money laundering trends, typologies and developments.



Organization Strength of FIU-IND
FIU-IND is a multi disciplinary body with a sanctioned strength of 74 personnel. These are being inducted from different organizations namely Central Board of Direct Taxes (CBDT), Central Board of Excise and Customs (CBEC), Reserve Bank of India (RBI), Securities Exchange Board of India (SEBI), Department of Legal Affairs and Intelligence agencies



Organizational structure

 





Financial Intelligence Unit – India (FIU-IND)
Financial Intelligence Unit – India (FIU-IND) was set by the Government of India in 2004 as the central national agency responsible for receiving, processing, analyzing and disseminating information relating to suspect financial transactions. FIU-IND is also responsible for coordinating and strengthening efforts of national and international intelligence, investigation and enforcement agencies in pursuing the global efforts against money laundering and related crimes. FIU-IND is an independent body reporting directly to the Economic Intelligence Council (EIC) headed by the Finance Minister.
Functions of FIU-IND
The main function of FIU-IND is to receive cash/suspicious transaction reports, analyse them and, as appropriate, disseminate valuable financial information to intelligence/enforcement agencies and regulatory authorities . The functions of FIU-IND are:
 Collection of Information: Act as the central reception point for receiving Cash Transaction reports (CTRs) and Suspicious Transaction Reports (STRs) from various reporting entities.
 Analysis of Information: Analyze received information in order to uncover patterns of transactions suggesting suspicion of money laundering and related crimes.
 Sharing of Information: Share information with national intelligence/law enforcement agencies, national regulatory authorities and foreign Financial Intelligence Units.
 Act as Central Repository: Establish and maintain national data base on cash  transactions and suspicious transactions on the basis of reports received from reporting entities.
 Coordination: Coordinate and strengthen collection and sharing of financial intelligence through an effective national, regional and global network to combat money laundering and related crimes.
 Research and Analysis: Monitor and identify strategic key areas on money laundering trends, typologies and developments.
Organisational Set-up
FIU-IND is a multi disciplinary body headed by a Director. Personnel in this Unit are being inducted from different organizations namely Central Board of Direct Taxes (CBDT), Central Board of Excise and Customs (CBEC), Reserve Bank of India (RBI), Securities Exchange Board of India (SEBI), Department of Legal Affairs and Intelligence agencies.
Authorities at FIU-IND
According to Section 48 of the Prevention of Money Laundering Act, 2002 there shall be the following classes of authorities for the purposes of this Act, namely:-
(a) Director or Additional Director or Joint Director,
(b) Deputy Director,
(c) Assistant Director, and
(d) such other class of officers as may be appointed for the purposes of this Act.
Appointment of Authorities
As per Section 49 of the Prevention of Money Laundering Act, 2002:
(1) The Central Government may appoint such persons as it thinks fit to be authorities for the purposes of this Act.
(2) Without prejudice to the provisions of sub-section (1), the Central Government may authorise the Director or an Additional Director or a Joint Director or a Deputy Director or an Assistant Director appointed under that sub-section to appoint other authorities below the rank of an Assistant Director.
(3) Subject to such conditions and limitations as the Central Government may impose, an authority may exercise the powers and discharge the duties conferred or imposed on it under this Act.
Director and officers subordinate to him deemed to be public servants Section 40 of the Prevention of Money Laundering Act, 2002 declares the Chairperson, Members  and other officers and employees of the Appellate Tribunal, the Adjudicating
Authority, Director and the officers subordinate to him shall be deemed to be public servants within the meaning of section 21 of the Indian Penal Code, 1860 (45 of 1860).
Powers of the Director
Section 13 of the Prevention of Money Laundering Act, 2002 confers following powers on the Director to ensure compliance:
(1) The Director may, either of his own motion or on an application made by any authority, officer or person, call for records referred to in sub-section (1) of section 12 and may make such inquiry or cause such inquiry to be made, as he thinks fit.
(2) If the Director, in the course of any inquiry, finds that a banking company, financial institution or an intermediary or any of its officers has failed to comply with the provisions contained in section 12, then, without prejudice to any other action that may be taken under any other provisions of this Act, he may, by an order, levy a fine on such banking company
or financial institution or intermediary which shall not be less than ten thousand rupees but may extend to one lakh rupees for each failure.
(3) The Director shall forward a copy of the order passed under sub-section (2) to every banking company, financial institution or intermediary or person who is a party to the proceedings under that sub-section. Powers of authorities regarding summons, production of documents and to give evidence: Section 50 of the Prevention of Money Laundering Act, 2002 confers following powers of summons, production of documents and to give evidence etc.:
(1) The Director shall, for the purposes of section 13, have the same powers as are vested in a civil court under the Code of Civil Procedure, 1908 (5 of 1908) while trying a suit in respect of the following matters, namely:-
(a) discovery and inspection;
(b) enforcing the attendance of any person, including any officer of a banking company,
financial institution or a company, and examining him on oath;
(c) compelling the production of records;
(d) receiving evidence on affidavits;
(e) issuing commissions for examination of witnesses and documents; and
(f) any other matter which may be prescribed
(2) The Director, Additional Director, Joint Director, Deputy Director or Assistant Director shall have power to summon any person whose attendance he considers necessary whether to give evidence or to produce any records during the course of any investigation or proceeding under this Act.
(3) All the persons so summoned shall be bound to attend in person or through authorized agents, as such officer may direct, and shall be bound to state the truth upon any subject which they are examined or make statements, and produce such documents as may be required.
(4) Every proceeding under sub-sections (2) and (3) shall be deemed to be a judicial proceeding within the meaning of sections 193 and 228 of the Indian Penal Code, 1860 (45 of 1860).
(5) Subject to any rules made in this behalf by the Central Government, any officer referred to in sub-section (2) may impound and retain in his custody for such period, as he thinks fit, any records produced before him in any proceedings under this Act:
Provided that an Assistant Director or a Deputy Director shall not -
(a) impound any records without recording his reasons for so doing; or
(b) retain in his custody any such records for a period exceeding three months, without obtaining the prior approval of the Director. Assistance from other authorities for enforcement of the Act Section 54 of the Prevention of Money Laundering Act, 2002 empowers and requires various authorities to assist in the enforcement of the act. The following officers are empowered and required to assist the authorities in the enforcement of this Act, namely:-
(a) officers of the Customs and Central Excise Departments;
(b) officers appointed under sub-section (1) of section 5 of the Narcotic Drugs and
Psychotropic Substances Act, 1985 (61 of 1985);
(c) income-tax authorities under sub-section (1) of section 117 of the Income-tax Act, 1961 (43 of 1961);
(d) officers of the stock exchange recognised under section 4 of the Securities Contracts (Regulation) Act, 1956 (42 of 1956);
(e) officers of the Reserve Bank of India constituted under sub-section (1) of section 3 of the Reserve Bank of India Act, 1934 (2 of 1934);
(f) officers of Police;
(g) officers of enforcement appointed under sub-section (1) of section 36 of the Foreign Exchange Management Act, 1973 (40 of 1999);
(h) officers of the Securities and Exchange Board of India established under section 3 of the Securities and Exchange Board of India Act, 1992 (15 of 1992);
(i) officers of any other body corporate constituted or established under a Central Act or a State Act;
(j) such other officers of the Central Government, State Government, local authorities or banking companies as the Central Government may, by notification, specify, in this behalf.
Agreements with foreign countries
Section 56 of the Prevention of Money Laundering Act, 2002 provides for agreements with foreign countries to facilitate exchange of information with them:
(1) The Central Government may enter into an agreement with the Government of any country outside India for-
(a) enforcing the provisions of this Act;
(b) exchange of information for the prevention of any offence under this Act or under the
corresponding law in force in that country or investigation of cases relating to any offence under this Act. and may, by notification in the Official Gazette, make such provisions as may be necessary for implementing the agreement.
(2) The Central Government may, by notification in the Official Gazette, direct that the application of this Chapter in relation to a contracting State with which reciprocal arrangements have been made, shall be subject to such conditions, exceptions or qualifications as are specified in the said notification.
Disclosure of information
Section 66 of the Prevention of Money Laundering Act, 2002 provides for disclosure of information to other officers, authority or body:
The Director or any other authority specified by him by a general or special order in this behalf may furnish or cause to be furnished to-
(i) any officer, authority or body performing any functions under any law relating to imposition of any tax, duty or cess or to dealings in foreign exchange, or prevention of illicit traffic in the narcotic drugs and psychotropic substances under the Narcotic Drugs and Psychotropic Substances Act, 1985 (61 of 1985); or
(ii) such other officer, authority or body performing functions under any other law as the Central Government may, if in its opinion it is necessary so to do in the public interest, specify by notification in the Official Gazette in this behalf, any information received or obtained by such Director or any other authority, specified by him in the performance of their functions under this Act, as may, in the opinion of the Director or the other authority so specified by him, be necessary for the purpose of the officer, authority or body specified in clause (i) or clause (ii) to perform his or its functions under that law.

Recovery of fines
Section 69 of the Prevention of Money Laundering Act, 2002 refers to recovery of fines. Where any fine imposed on any person under section 13 or section 63 is not paid within six months from the day of imposition of fine, the Director or any other officer authorised by him in this behalf may proceed to recover the amount from the said person in the same manner as
prescribed in Schedule 11 of the Income-tax Act, 1961 (43 of 1961) for the recovery of arrears and he or any officer authorised by him in this behalf shall have all the powers of the Tax Recovery Officer mentioned in the said Schedule for the said purpose. The new network, called FINnet (Financial Intelligence Network), is a technology-based secure platform for bringing together investigative and enforcement agencies to collect, analyse and disseminate valuable financial information for combating money laundering and related crimes.
Restriction on Civil Court Jurisdiction
Section 41 of the Prevention of Money Laundering Act, 2002 says that no civil court shall have jurisdiction to entertain any suit or proceeding in respect of any matter which the Director, an Adjudicating Authority or the Appellate Tribunal is empowered by or under this Act to determine and no injunction shall be granted by any court or other authority in respect
of any action taken or to be taken in pursuance of any power conferred by or under this Act."
Appeal to Appellate Tribunal Section 26 of the Prevention of Money Laundering Act, 2002 deals with appeal to Appellate
Tribunal.
(1) Save as otherwise provided in sub-section (3), the Director or any person aggrieved by an order made by the Adjudicating Authority under this Act, may prefer an appeal to the Appellate Tribunal.
(2) Any banking company, financial institution or intermediary aggrieved by any order of the Director made under sub-section (2) of section 13, may prefer an appeal to the Appellate Tribunal.
(3) Every appeal preferred under sub-section (1) or sub-section (2) shall be filed within a period of forty-five days from the date on which a copy of the order made by the Adjudicating Authority or Director is received and it shall be in such form and be accompanied by such fee as may be prescribed:
Provided that the Appellate Tribunal may, after giving an opportunity of being heard, entertain an appeal after the expiry of the said period of forty-five days if it is satisfied that there was sufficient cause for not filing it within that period.
(4) On receipt of an appeal under sub-section (1), or sub-section (2), the Appellate Tribunal may, after giving the parties to the appeal an opportunity of being heard, pass such orders thereon as it thinks fit, confirming, modifying or setting aside the order appealed against.
(5) The Appellate Tribunal shall send a copy of every order made


Right of Appellant
Section 39 of the Prevention of Money Laundering Act, 2002 provides for the right of the appellant.
(1) A person preferring an appeal to the Appellate Tribunal under this Act may either appear in person or take the assistance of an authorised representative of his choice to present his case before the Appellate Tribunal.
Explanation - For the purposes of this sub-section, the expression "authorized representative" shall have the same meaning as assigned to it under sub-section (2) of section 288 of the Income Tax Act, 1961.
(2) The Central Government or the Director may authorise one or more authorized representatives or any of its officers to act as presenting officers and every person so authorised may present the case with respect to any appeal before the Appellate Tribunal.
Appeal to High Court
Section 42 of the Prevention of Money Laundering Act, 2002 provides for appeal to High Court:
“Any person aggrieved by any decision or order of the Appellate Tribunal may file an appeal to the High Court within sixty days from the date of communication of the decision or order of the Appellate Tribunal to him on any question of law or fact arising out of such order: Provided that the High Court may, if it is satisfied that the appellant was prevented by sufficient cause from filing the appeal within the said period, allow it to be filed within a further period not exceeding sixty days.
Explanation.-For the purposes of this section, "High Court" means-
(i) the High Court within the jurisdiction of which the aggrieved party ordinarily resides or carries on business or personally works for gain; and
(ii) where the Central Government is the aggrieved party, the High Court within the jurisdiction of which the respondent, or in a case where there are more than one respondent, any of the respondents, ordinarily resides or carries on business or personally works for gain.
Offences which can be seen by Special Courts
Section 44 of the Prevention of Money Laundering Act, 2002 provides for trial by Special Courts:
(1) Notwithstanding anything contained in the Code of Criminal Procedure, 1973 (2 of 1974),-
a. the schedule offence and the offence punishable under section 4 shall be tried only by the Special Court constituted for the area in which the offence has been committed; Provided that the Special Court , trying a schedule offence before the commencement of this Act, shall continue to try such scheduled offence, or
b. a Special Court may, upon a complaint made by an authority authorised in this behalf under this Act take cognizance of the offence for which the accused is committed to it for trial.
(2) Nothing contained in this section shall be deemed to affect the special powers of the High Court regarding bail under section 439 of the Code of Criminal Procedure, 1973 (2 of 1974) and the High Court may exercise such powers including the power under clause (b) of sub-section (1) of that section as if the reference to "Magistrate" in that section includes also a reference to a "Special Court" designated under section 43.



KYC SHORT NOTES:

1. The objective of KYC/AML/CFT guidelines is to prevent banks/FIs from being used, intentionally or unintentionally, by criminal elements for money laundering or terrorist financing activities.
2. The PMLA came into effect from 1st July 2005. Necessary Notifications / Rules under the said Act were published in the Gazette of India on 1st July, 2005 by the Department of Revenue, Ministry of Finance, Government of India. The PMLA has been further amended vide notification dated March 6, 2009 and inter alia provides that violating the prohibitions on manipulative and deceptive devices, insider trading and substantial acquisition of securities or control as prescribed in Section 12 A read with Section 24 of the Securities and Exchange Board of India Act, 1992 (SEBI Act) will now be treated as a scheduled offence under schedule B of the PMLA.
3. KYC procedures also enable banks/FIs to know/understand their customers and their financial dealings better and manage their risks prudently.
4. For the purpose of KYC Norms, a ‘Customer’ is defined as a person who is engaged in a financial transaction or activity with a reporting entity and includes a person on whose behalf the person who is engaged in the transaction or activity, is acting.
5. “Designated Director" means a person designated by the reporting entity (bank, financial institution, etc.) to ensure overall compliance with the obligations imposed under chapter IV of the PML Act.
6. In terms of PML Act a ‘person’ includes: (i) an individual, (ii) a Hindu undivided family, (iii) a company, (iv) a firm, (v) an association of persons or a body of individuals, whether incorporated or not, (vi) every artificial juridical person, not falling within any one of the above persons (i to v), and (vii) any agency, office or branch owned or controlled by any of the above persons (i to vi).
7. “Transaction” means a purchase, sale, loan, pledge, gift, transfer, delivery or the arrangement thereof and includes- (i) opening of an account; (ii) deposits, withdrawal, exchange or transfer of funds in whatever currency, whether in cash or by cheque, payment order or other instruments or by electronic or other non-physical means; (iii) the use of a safety deposit box or any other form of safe deposit; (iv) entering into any fiduciary relationship; (v) any payment made or received in whole or in part of any contractual or other legal obligation; or (vi) establishing or creating a legal person or legal arrangement.
8. Banks/FIs should frame their KYC policies incorporating the following four key elements: (i) Customer Acceptance Policy (CAP); (ii) Customer Identification Procedures (CIP); (iii) Monitoring of Transactions; and (iv) Risk Management.
9. Documents and other information to be collected from different categories of customers depending on perceived risk and the requirements of PML Act, 2002 and instructions/guidelines issued by Reserve Bank from time to time.
10. Customer Identification Procedure (CIP) : Customer identification means undertaking client due diligence measures while commencing an account-based relationship including identifying and verifying the customer and the beneficial owner on the basis of one of the OVDs
11. Customer Due Diligence requirements (CDD) while opening accounts
12. introduction is not necessary for opening of accounts under PML Act and Rules or the Reserve Bank’s extant instructions, banks/FIs should not insist on introduction for opening of bank accounts
1. Small Accounts If an individual customer does not possess either any of the OVDs or the documents applicable in respect of simplified procedure (as detailed at paragraph 2.3 above), then ‘Small Accounts’ may be opened for such an individual. A ‘Small Account' means a savings account in which the aggregate of all credits in a financial year does not exceed rupees one lakh; the aggregate of all withdrawals and transfers in a month does not exceed rupees ten thousand and the balance at any point of time does not exceed rupees fifty thousand. A ‘small account’ maybe opened on the basis of a self-attested photograph and affixation of signature or thumb print.
2. a small account shall be opened only at Core Banking Solution (CBS) linked branches or in a branch where it is possible to manually monitor and ensure that foreign remittances are not credited to the account and that the stipulated monthly and annual limits on aggregate of transactions and balance requirements in such accounts are not breached, before a transaction is allowed to take place;
3. a small account shall remain operational initially for a period of twelve months, and thereafter for a further period of twelve months if the holder of such an account provides evidence before the banking company of having applied for any of the officially valid documents within twelve months of the opening of the said account, with the entire relaxation provisions to be reviewed in respect of the said account after twenty four months.
4. Where a customer categorised as low risk expresses inability to complete the documentation requirements on account of any reason that the bank considers to be genuine, and where it is essential not to interrupt the normal conduct of business, the bank may complete the verification of identity within a period of six months from the date of establishment of the relationship.
5. Procedure to be followed in respect of foreign students : Banks should follow the following procedure for foreign students studying in India: 1) Banks may open a Non Resident Ordinary (NRO) bank account of a foreign student on the basis of his/her passport (with visa & immigration endorsement) bearing the proof of identity and address in the home country together with a photograph and a letter offering admission from the educational institution in India. 2) Banks should obtain a declaration about the local address within a period of 30 days of opening the account and verify the said local address. 3) During the 30 days period, the account should be operated with a condition of allowing foreign remittances not exceeding USD 1,000 or equivalent into the account and a cap of monthly withdrawal to Rs. 50,000/-, pending verification of address. 4) The account would be treated as a normal NRO account, and will be operated in terms of instructions contained in the Reserve Bank of India’s instructions on Non-Resident Ordinary Rupee (NRO) Account. Students with Pakistani and Bangladesh nationality will need prior approval of the Reserve Bank for opening the account.

Where the customer is a company, one certified copy each of the following documents are required for customer identification: (a) Certificate of incorporation; (b) Memorandum and Articles of Association; (c) A resolution from the Board of Directors and power of attorney granted to its managers, officers or employees to transact on its behalf and (d) An officially valid document in respect of managers, officers or employees holding an attorney to transact on its behalf
13. Where the customer is a partnership firm, one certified copy of the following documents is required for customer identification: (a) registration certificate; (b) partnership deed and (c) an officially valid document in respect of the person holding an attorney to transact on its behalf.

14. Where the customer is a trust, one certified copy of the following documents is required for customer identification: (a) registration certificate; (b) trust deed and (c) an officially valid document in respect of the person holding a power of attorney to transact on its behalf.
15. Where the customer is an unincorporated association or a body of individuals, one certified copy of the following documents is required for customer identification: (a) resolution of the managing body of such association or body of individuals; (b) power of attorney granted to transact on its behalf; (c) an officially valid document in respect of the person holding an attorney to transact on its behalf and (d) such information as may be required by the bank/FI to collectively establish the legal existence of such an association or body of individuals.
16. Proprietary concerns: (1) For proprietary concerns, in addition to the OVD applicable to the individual (proprietor), any two of the following documents in the name of the proprietary concern are required to be submitted: (a) Registration certificate (b) Certificate/licence issued by the municipal authorities under Shop and Establishment Act. (c) Sales and income tax returns. (d) CST/VAT certificate. (e) Certificate/registration document issued by Sales Tax/Service Tax/Professional Tax authorities. (f) Licence/certificate of practice issued in the name of the proprietary concern by any professional body incorporated under a statute. (g) Complete Income Tax Return (not just the acknowledgement) in the name of the sole proprietor where the firm's income is reflected, duly authenticated/acknowledged by the Income Tax authorities. (h) Utility bills such as electricity, water, and landline telephone bills.
17. When the client accounts are opened by professional intermediaries: When the bank has knowledge or reason to believe that the client account opened by a professional intermediary is on behalf of a single client, that client must be identified. Banks may hold 'pooled' accounts managed by professional intermediaries on behalf of entities like mutual funds, pension funds or other types of funds. Banks, however, should not open accounts of such professional intermediaries who are bound by any client confidentiality that prohibits disclosure of the client details to the banks.
18. Where funds held by the intermediaries are not co-mingled at the bank and there are 'sub-accounts', each of them attributable to a beneficial owner, all the beneficial owners must be identified. Where such funds are co-mingled at the bank, the bank should still look into the beneficial owners. Where the banks rely on the 'customer due diligence' (CDD) done by an intermediary, they should satisfy themselves that the intermediary is a regulated and supervised entity and has adequate systems in place to comply with the KYC requirements of the customers. It should be understood that the ultimate responsibility for knowing the customer lies with the bank.
19. Beneficial ownership :When a bank/FI identifies a customer for opening an account, it should identify the beneficial owner(s) and take all reasonable steps in terms of Rule 9(3) of the PML Rules to verify his identity, as per guidelines provided below:
(a) Where the client is a company, the beneficial owner is the natural person(s), who, whether acting alone or together, or through one or more juridical person, has/have a controlling ownership interest or who exercises control through other meansExplanation- For the purpose of this sub-clause- 1. “Controlling ownership interest” means ownership of/entitlement to more than 25 per cent of the shares or capital or profits of the company. 2. “Control” shall include the right to appoint majority of the directors or to control the management or policy decisions including by virtue of their shareholding or management rights or shareholders agreements or voting agreements.
(b) Where the client is a partnership firm, the beneficial owner is the natural person(s), who, whether acting alone or together, or through one or more juridical person, has/have ownership of/entitlement to more than 15 per cent of capital or profits of the partnership.
(c) Where the client is an unincorporated association or body of individuals, the beneficial owner is the natural person(s), who, whether acting alone or together, or through one or more juridical person, has/have ownership of/entitlement to more than 15 per cent of the property or capital or profits of the unincorporated association or body of individuals.
(d) Where no natural person is identified under (a), (b) or (c) above, the beneficial owner is the relevant natural person who holds the position of senior managing official.
(e) Where the client is a trust, the identification of beneficial owner(s) shall include identification of the author of the trust, the trustee, the beneficiaries with 15% or more interest in the trust and any other natural person. exercising ultimate effective control over the trust through a chain of control or ownership.
(f) Where the client or the owner of the controlling interest is a company listed on a stock exchange, or is a subsidiary of such a company, it is not necessary to identify and verify the identity of any shareholder or beneficial owner of such companies.

20. KYC exercise should be done at least every two years for high risk customers, every eight years for medium risk customers and every ten years for low risk customers. Such KYC exercise may include all measures for confirming the identity and address and other particulars of the customer that the bank/FI may consider reasonable and necessary based on the risk profile of the customer, taking into account whether and when client due diligence measures were last undertaken and the adequacy of data obtained.

21. Freezing and closure of accounts :
(i) In case of non-compliance of KYC requirements by the customers despite repeated reminders by banks/FIs, banks/FIs may impose ‘partial freezing’ on such KYC non-compliant accounts in a phased manner.
(ai) During the course of such partial freezing, the account holders can revive their accounts by submitting the KYC documents as per instructions in force.
(bi) While imposing ‘partial freezing’, banks/FIs have to ensure that the option of ‘partial freezing’ is exercised after giving due notice of three months initially to the customers to comply with KYC requirements to be followed by a reminder giving a further period of three months.
(v) (iv) Thereafter, banks/FIs may impose ‘partial freezing’ by allowing all credits and disallowing all debits with the freedom to close the accounts If the accounts are still KYC non-compliant after six months of imposing initial ‘partial freezing’ banks/FIs should disallow all debits and credits from/to the accounts thereby, rendering them inoperative.
(vi) Further, it would always be open to the bank/FI to close the account of such customers after issuing due notice to the customer explaining the reasons for taking such a decision. Such decisions, however, need to be taken at a reasonably senior level. In the circumstances when a bank/FI believes that it would no longer be satisfied about the true identity of the account holder, the bank/FI should file a Suspicious Transaction Report (STR) with Financial Intelligence Unit – India (FIU-IND) under Department of Revenue, Ministry of Finance, Government of India.

22. At-par cheque facility availed by co-operative banks : Some commercial banks have arrangements with co-operative banks under which the latter open current accounts with the commercial banks and use the cheque book facility to issue ‘at par’ cheques to their constituents and walk-in- customers for effecting their remittances and payments. Since theb‘at par’ cheque facility offered by commercial banks to co-operative banks is in the nature of correspondent banking arrangement, banks should monitor and review such arrangements to assess the risks including credit risk and reputational risk arising there from. For this purpose, banks should retain the right to verify the records maintained by the client cooperative banks/ societies for compliance with the extant instructions on KYC and AML under such arrangements.
23. In this regard, Urban Cooperative Banks (UCBs) are advised to utilize the ‘at par’ cheque facility only for the following purposes:
(i) For their own use.
(ii) For their account holders who are KYC complaint provided that all transactions of Rs.50,000/- or more should be strictly by debit to the customer’s account.
(ii) For walk-in customers against cash for less than Rs.50,000/- per individual. In order to utilise the ‘at par’ cheque facility in the above manner, UCBs should maintain the following:
(i) Records pertaining to issuance of ‘at par’ cheques covering inter alia applicant’s name and account number, beneficiary’s details and date of issuance of the ‘at par’ cheque

. (ii)Sufficient balances/drawing arrangements with the commercial bank extending such facility for purpose of honouring such instruments. UCBs should also ensure that all ‘at par’ cheques issued by them are crossed ‘account payee’ irrespective of the amount involved.
30. Simplified norms for Self Help Groups (SHGs) : KYC verification of all the members of SHG need not be done while opening the savings bank account of the SHG and KYC verification of all the office bearers would suffice. As regards KYC verification at the time of credit linking of SHGs, no separate KYC verification of the members or office bearers is necessary
31. Walk-in Customer : In case of transactions carried out by a non-account based customer, that is a walk in customer, where the amount of transaction is equal to or exceeds Rs. 50,000/-, whether conducted as a single transaction or several transactions that appear to be connected, the customer's identity and address should be verified. If a bank has reason to believe that a customer is intentionally structuring a transaction into a series of transactions below the threshold of Rs.50,000/- the bank should verify the identity and address of the customer and also consider filing a Suspicious Transactions Report (STR) to Financial Intelligence Unit – India (FIU-IND). In terms of Clause (b) (ii) of sub-Rule (1) of Rule 9 of the PML Rules, 2005 banks and financial institutions are required to verify the identity of the customers for all international money transfer operations.
32. Issue of Demand Drafts, etc, for more than Rs.50,000/- : Banks should ensure that any remittance of funds by way of demand draft, mail/telegraphic transfer or any other mode and issue of travellers’ cheques for value of Rs.50,000/- and above is effected by debit to the customer’s account or against cheques and not against cash payment. Banks should not make payment of cheques/drafts/pay orders/banker’s cheques if they are presented beyond the period of three months from the date of such instrument.
33. Unique Customer Identification Code : A Unique Customer Identification Code (UCIC) will help banks to identify the customers, avoid multiple identities, track the facilities availed, monitor financial transactions in a holistic manner and enable banks to have a better approach to risk profiling of customers. Banks have been advised to allot UCIC while entering into new relationships with individual customers as also the existing customers.
34. Banks/FIs should put in place a system of periodical review of risk categorization of accounts and the need for applying enhanced due diligence measures. Such review of risk categorisation of customers should be carried out at a periodicity of not less than once in six months.
35. Banks should closely monitor the transactions in accounts of marketing firms, especially accounts of Multi-level Marketing (MLM) Companies. Banks should analyse data in cases where a large number of cheque books are sought by the company, there are multiple small deposits (generally in cash) across the country in one bank account and where a large number of cheques are issued bearing similar amounts/dates. Where such features are noticed by the bank and in case they find such unusual operations in their accounts, the matter should be immediately reported to Reserve Bank and other appropriate authorities such as FIU-IND.
36. Banks/FIs should exercise ongoing due diligence with respect to the business relationship with every client and closely examine the transactions in order to ensure that they are consistent with their knowledge about the clients, their business and risk profile and where necessary, the source of funds.
37. The Board of Directors should ensure that an effective AML/CFT programme is in place by establishing appropriate procedures and ensuring their effective implementation. It should cover proper management oversight, systems and controls, segregation of duties, training of staff and other related matters.
38. Customers who are likely to pose a higher than average risk should be categorised as medium or high risk depending on the background, nature and location of activity, country of origin, sources of funds, customer profile, etc. Customers requiring very high level of monitoring, e.g., those involved in cash intensive business, Politically Exposed Persons (PEPs) of foreign origin, may, if considered necessary, be categorised as high risk.

39. Correspondent banking is the provision of banking services by one bank (the “correspondent bank”) to another bank (the “respondent bank”). These services may include cash/funds management, international wire transfers, drawing arrangements for demand drafts and mail transfers, payable-through-accounts, cheques clearing etc.
40. In case of payable-through-accounts, the correspondent bank should be satisfied that the respondent bank has verified the identity of the customers having direct access to the accounts and is undertaking ongoing 'due diligence' on them. The correspondent bank should ensure that the respondent bank is able to provide the relevant customer identification data immediately on request.
41. Banks should ensure that their respondent banks have KYC/AML policies and procedures in place and apply enhanced 'due diligence' procedures for transactions carried out through the correspondent accounts. Banks should not enter into a correspondent relationship with a “shell bank” (i.e., a bank which is incorporated in a country where it has no physical presence and is not affiliated to any regulated financial group). The correspondent bank should not permit its accounts to be used by shell banks.
42. Wire Transfer : Banks/FIs use wire transfers as an expeditious method for transferring funds between bank accounts. Wire transfers include transactions occurring within the national boundaries of a country or from one country to another. As wire transfers do not involve actual movement of currency, they are considered as rapid and secure method for transferring value from one location to another.
43. (a) The salient features of a wire transfer transaction are as under: (i) Wire transfer is a transaction carried out on behalf of an originator person (both natural and legal) through a bank by electronic means with a view to making an amount of money available to a beneficiary person at a bank. The originator and the beneficiary could be the same person. (ii) Domestic wire transfer means any wire transfer where the originator and receiver are located in the same country. It may also include a chain of wire transfers that takes place entirely within the borders of a single country even though the system used to effect the wire transfer may be located in another country. (iii) Cross-border transfer means any wire transfer where the originator and the beneficiary bank or financial institutions are located in different countries. It may include any chain of wire transfers that has at least one cross-border element. (iv) The originator is the account holder, or where there is no account, the person (natural or legal) that places the order with the bank to perform the wire transfer.
44. Accordingly, banks/FIs must ensure that all wire transfers are accompanied by the following information: 1. Cross-border wire transfers 2. Domestic wire transfers
45. Cross-border wire transfers (i) All cross-border wire transfers must be accompanied by accurate and meaningful originator information. (ii) Information accompanying cross-border wire transfers must contain the name and address of the originator and where an account exists, the number of that account. In the absence of an account, a unique reference number, as prevalent in the country concerned, must be included. (iii) Where several individual transfers from a single originator are bundled in a batch file for transmission to beneficiaries in another country, they may be exempted from including full originator information, provided they include the originator’s account number or unique reference number as at (ii) above.
46. Domestic wire transfers (i) Information accompanying all domestic wire transfers of Rs.50000/- (Rupees Fifty Thousand) and above must include complete originator information i.e. name, address and account number etc., unless full originator information can be made available to the beneficiary bank by other means. (ii) If a bank has reason to believe that a customer is intentionally structuring wire transfer to below Rs.50,000/- (Rupees Fifty Thousand) to several beneficiaries in order to avoid reporting or monitoring, the bank must insist on complete customer identification before effecting the transfer. In case of non-cooperation from the customer, efforts should be made to establish his identity and Suspicious Transaction Report (STR) should be made to FIU-IND. (iii) When a credit or debit card is used to effect money transfer, necessary information as at (i) above should be included in the message.

47. Role of Ordering, Intermediary and Beneficiary banks

(i) Ordering Bank : An ordering bank is the one that originates a wire transfer as per the order placed by its customer. The ordering bank must ensure that qualifying wire transfers contain complete originator information. The bank must also verify and preserve the information at least for a period of five years.
(ii) Intermediary bank : For both cross-border and domestic wire transfers, a bank processing an intermediary element of a chain of wire transfers must ensure that all originator information accompanying a wire transfer is retained with the transfer. Where technical limitations prevent full originator information accompanying a cross-border wire transfer from remaining with a related domestic wire transfer, a record must be kept at least for five years (as required under Prevention of Money Laundering Act, 2002) by the receiving intermediary bank of all the information received from the ordering bank.
(iii) Beneficiary bank :A beneficiary bank should have effective risk-based procedures in place to identify wire transfers lacking complete originator information. The lack of complete originator information may be considered as a factor in assessing whether a wire transfer or related transactions are suspicious and whether they should be reported to the Financial Intelligence Unit-India. The beneficiary bank should also take up the matter with the ordering bank if a transaction is not accompanied by detailed information of the fund remitter. If the ordering bank fails to furnish information on the remitter, the beneficiary bank should consider restricting or even terminating its business relationship with the ordering bank.

48. Maintenance of records of transactions : Banks/FIs should introduce a system of maintaining proper record of transactions prescribed under Rule 3 of Prevention of Money Laundering (Maintenance of Records) Rules, 2005 (PML Rules, 2005), as mentioned below:
(i) All cash transactions of the value of more than Rupees Ten Lakh or its equivalent in foreign currency.
(ii)Series of all cash transactions individually valued below Rupees Ten Lakh, or its equivalent in foreign currency which are that have taken place within a month and the monthly aggregate which exceeds rupees ten lakhs or its equivalent in foreign currency. It is clarified that for determining ‘integrally connected transactions’ ‘all accounts of the same customer’ should be taken into account.
1. All transactions involving receipts by non-profit organisations of value more than rupees ten lakh or its equivalent in foreign currency [Ref: Government of India Notification dated November 12, 2009- Rule 3,subrule (1) clause (BA) of PML Rules]
2. All cash transactions ; where forged or counterfeit currency notes or bank notes have been used as genuine and where any forgery of a valuable security or a document has taken place facilitating the transaction and
3. All suspicious transactions, whether or not in cash, made as mentioned in the Rules
49. Banks/FIs are required to maintain all necessary information in respect of transactions prescribed under PML Rule 3 so as to permit reconstruction of individual transaction, including the following information: (i) the nature of the transactions; (ii) the amount of the transaction and the currency in which it was denominated; (iii) the date on which the transaction was conducted; and (iv) the parties to the transaction.
50. In terms of PML Amendment Act 2012, banks/FIs should maintain for at least five years from the date of transaction between the bank/FI and the client, all necessary records of transactions, both domestic or international, which will permit reconstruction of individual transactions (including the amounts and types of currency involved, if any) so as to provide, if necessary, evidence for prosecution of persons involved in criminal activity.
51. Banks/FIs should ensure that records pertaining to the identification of the customers and their address (e.g. copies of documents like passports, identity cards, driving licenses, PAN card, utility bills, etc.) obtained while opening the account and during the course of business relationship, are properly preserved for at least five years after the business relationship is ended as required under Rule 10 of the Rules ibid. The identification of records and transaction data should be made available to the competent authorities upon request.
52. Banks/FIs may maintain records of the identity of their clients, and records in respect of transactions referred to in Rule 3 in hard or soft format.
53. Combating Financing of Terrorism : The United Nations periodically circulates the following two lists of individuals and entities, suspected of having terrorist links, and as approved by its Security Council (UNSC).
(a) The “Al-Qaida Sanctions List”, includes names of individuals and entities associated with the Al-Qaida.
(b) The “1988 Sanctions List”, consisting of individuals (Section A of the consolidated list) and entities.
54. The United Nations Security Council Resolutions (UNSCRs), received from Government of India, are circulated by the Reserve Bank to all banks and FIs. Banks/FIs are required to update the lists and take them into account for implementation of Section 51A of the Unlawful Activities (Prevention) (UAPA) Act, 1967, discussed below. Banks/FIs should ensure that they do not have any account in the name of individuals/entities appearing in the above lists. Details of accounts resembling any of the individuals/entities in the list should be reported to FIUIND.
55. Freezing of Assets under Section 51A of Unlawful Activities (Prevention) Act, 1967 :

(a) The Unlawful Activities (Prevention) Act, 1967 (UAPA) has been amended by the Unlawful Activities (Prevention) Amendment Act, 2008. Government has issued an Order dated August 27, 2009 (Annex II of this circular) detailing the procedure for implementation of Section 51A of the Unlawful Activities (Prevention) Act, 1967 for prevention of, and for coping with terrorist activities.
In terms of Section 51A, the Central Government is empowered to freeze, seize or attach funds and other financial assets or economic resources held by, on behalf of or at the direction of the individuals or entities listed in the Schedule to the Order, or any other person engaged in or suspected to be engaged in terrorism and prohibit any individual or entity from making any funds, financial assets or economic resources or related servicesavailable for the benefit of the individuals or entities listed in the Schedule to the Order or any other person engaged in or suspected to be engaged in terrorism.
57. Jurisdictions that do not or insufficiently apply the FATF Recommendations:
(a) Banks/FIs are required to take into account risks arising from the deficiencies in AML/CFT regime of the jurisdictions included in the FATF Statement. In addition to FATF Statements circulated by Reserve Bank of India from time to time, banks/FIs should also consider publicly available information for identifying countries, which do not or insufficiently apply the FATF Recommendations. It is clarified that banks/FIs should also give special attention to business relationships and transactions with persons (including legal persons and other financial institutions) from or in countries that do not or insufficiently apply the FATF Recommendations and jurisdictions included in FATF Statements. (b) Banks/FIs should examine the background and purpose of transactions with persons (including legal persons and other financial institutions) from jurisdictions included in FATF Statements and countries that do not or insufficiently apply the FATF Recommendations. Further, if the transactions have no apparent economic or visible lawful purpose, the background and purpose of such transactions should, as far as possible be examined, and written findings together with all documents should be retained and made available to Reserve Bank/other relevant authorities, on request.
58. In terms of the Rule 3 of the PML (Maintenance of Records) Rules, 2005, banks/FIs are required to furnish information relating to cash transactions, cash transactions integrally connected to each other, and all transactions involving receipts by non-profit organisations (NPO means any entity or organisation that is registered as a trust or a society under the Societies Registration Act, 1860 or any similar State legislation or a company registered (erstwhile Section 25 of Companies Act, 1956 ) under Section 8 of the Companies Act, 2013), cash transactions ;where forged or counterfeit currency notes or bank notes have been used as genuine, cross border wire transfer, etc. to the Director, Financial Intelligence Unit-India (FIU-IND).

59. FIU-IND has released a comprehensive reporting format guide to describe the specifications of prescribed reports to FIU-IND. FIU-IND has also developed a Report Generation Utility and Report Validation Utility to assist reporting entities in the preparation of prescribed reports. The Office Memorandum issued on Reporting Formats under Project FINnet dated 31st March, 2011 by FIU containing all relevant details are available on FIU’s website. Banks/FIs should carefully go through all the reporting formats prescribed by FIU-IND.
60. FIU-IND have placed on their website editable electronic utilities to file electronic Cash Transactions Report (CTR)/ Suspicious Transactions Report (STR) to enable banks/FIs which are yet to install/adopt suitable technological tools for extracting CTR/STR from their live transaction data base. It is, therefore, advised that in cases of those banks/FIs, where all the branches are not fully computerized, the Principal Officer of the bank/FI should cull out the transaction details from branches which are not yet computerized and suitably arrange to feed the data into an electronic file with the help of the editable electronic utilities of CTR/STR as have been made available by FIU-IND on their website http://fiuindia.gov.in.
In terms of Rule 8, while furnishing information to the Director, FIU-IND, delay of each day in not reporting a transaction or delay of each day in rectifying a misrepresented transaction beyond the time limit as specified in the Rule shall constitute a separate violation. Banks/FIs are advised to take note of the timeliness of the reporting requirements.
62. Reports to be furnished to FIU-IND :
1) Cash Transaction Report (CTR)
2) Suspicious Transaction Reports (STR)
3) Non-Profit Organisation
4) Cross-border Wire Transfer
63. The CTR for each month should be submitted to FIU-IND by 15th of the succeeding month. Cash transaction reporting by branches to their controlling offices should, therefore, invariably be submitted on monthly basis and banks/FIs should ensure to submit CTR for every month to FIU-IND within the prescribed time schedule.
64. All cash transactions, where forged or counterfeit Indian currency notes have been used as genuine should be reported by the Principal Officer of the bank to FIU-IND in the specified format(Counterfeit Currency Report – CCR), by 15thday of the next month. These cash transactions should also include transactions where forgery of valuable security or documents has taken place and may be reported to FIU-IND in plain text form.
65. While filing CTR, details of individual transactions below Rupees Fifty thousand need not be furnished. CTR should contain only the transactions carried out by the bank on behalf of their clients/customers excluding transactions between the internal accounts of the bank.
66. A summary of cash transaction reports for the bank as a whole should be compiled by the Principal Officer of the bank every month in physical form as per the format specified. The summary should be signed by the Principal Officer and submitted to FIU-IND. In case of CTRs compiled centrally by banks for the branches having Core Banking Solution (CBS) at their central data centre, banks may generate centralised CTRs in respect of the branches under core banking solution at one point for onward transmission to FIU-IND, provided the CTR is to be generated in the format prescribed by FIU-IND.
67. A copy of the monthly CTR submitted to FIU-India in respect of the branches should be available at the branches for production to auditors/inspectors, when asked for; and instruction on ‘Maintenance of records of transactions’; and ‘Preservation of records’ should be scrupulously followed by the branches. However, in respect of branches not under CBS, the monthly CTR should continue to be compiled and forwarded by the branch to the Principal Officer for onward transmission to FIU-IND.

68. It is likely that in some cases transactions are abandoned/aborted by customers on being asked to give some details or to provide documents. It is clarified that banks/FIs should report all such attempted transactions in STRs, even if not completed by the customers, irrespective of the amount of the transaction.
69. The STR should be furnished within seven days of arriving at a conclusion that any transaction, whether cash or non-cash, or a series of transactions integrally connected are of suspicious nature. The Principal Officer should record his reasons for treating any transaction or a series of transactions as suspicious. It should be ensured that there is no undue delay in arriving at such a conclusion once a suspicious transaction report is received from a branch or any other office. Such report should be made available to the competent authorities on request.
70. Banks/FIs should not put any restrictions on operations in the accounts where an STR has been filed. Banks/FIs and their employees should keep the fact of furnishing of STR strictly confidential, as required under PML Rules. It should be ensured that there is no tipping off to the customer at any level.
71. The report of all transactions involving receipts by non- profit organizations of value more than rupees ten lakh or its equivalent in foreign currency should be submitted every month to the Director, FIU-IND by 15th of the succeeding month in the prescribed format.
72. Cross-border Wire Transfer Report (CWTR) is required to be filed with FIU-IND by 15th of succeeding month for all cross border wire transfers of the value of more than five lakh rupees or its equivalent in foreign currency where either the origin or destination of fund is in India.
73. Banks/FIs may nominate a Director on their Boards as “designated Director”, as required under provisions of the Prevention of Money Laundering (Maintenance of Records) Rules, 2005 (Rules), to ensure compliance with the obligations under the Act and Rules. The name, designation and address of the Designated Director may be communicated to the FIU-IND. UCBs/ State Cooperative Banks / Central Cooperative Banks can also designate a person who holds the position of senior management or equivalent as a 'Designated Director'. However, in no case, the Principal Officer should be nominated as the 'Designated Director'.
74. Principal Officer: Banks/FIs may appoint a senior officer as Principal Officer (PO). The PO should be independent and report directly to the senior management or to the Board of Directors. The PO shall be responsible for ensuring compliance, monitoring transactions, and sharing and reporting information as required under the law/regulations. The name, designation and address of the Principal Officer may be communicated to the FIU-IND.
75. The Unlawful Activities (Prevention) Act, 1967 (UAPA) has been amended and notified on 31.12.2008, which, inter-alia, inserted Section 51A to the Act. Section 51A reads as under:-"51A. For the prevention of, and for coping with terrorist activities, the Central Government shall have power to – (a) freeze, seize or attach funds and other financial assets or economic resources held by, on behalf of or at the direction of the individuals or entities Listed in the Schedule to the Order, or any other person engaged in or suspected to be engaged in terrorism; (b) prohibit any individual or entity from making any funds, financial assets or economic resources or related services available for the benefit of the individuals or entities Listed in the Schedule to the Order or any other person engaged in or suspected to be engaged in terrorism; (c) prevent the entry into or the transit through India of individuals Listed in the Schedule to the Order or any other person engaged in or suspected to be engaged in terrorism.
76. The Unlawful Activities (Prevention) Act define "Order" as under:- "Order" means the Prevention and Suppression of Terrorism (Implementation of Security Council Resolutions) Order, 2007, as may be amended from time to time. In order to expeditiously and effectively implement the provisions of Section 51A, the following procedures shall be followed:-
77. Appointment and Communication of details of UAPA nodal officers
As regards appointment and communication of details of UAPA nodal officers -

(i) The UAPA nodal officer for IS-I division would be the Joint Secretary (IS.I), Ministry of Home Affairs. His contact details are 01123092736(Tel), 011-23092569(Fax) and e-mail. (ii) The Ministry of External Affairs, Department of Economic Affairs, Foreigners Division of MHA, FIU-IND; and RBI, SEBI, IRDA (hereinafter referred to as Regulators) shall appoint a UAPA nodal officer and communicate the name and contact details to the IS-I Division in MHA. (iii) The States and UTs should appoint a UAPA nodal officer preferably of the rank of the Principal Secretary/Secretary, Home Department and communicate the name and contact details to the IS-I Division in MHA. (iv) The IS-I Division in MHA would maintain the consolidated list of all UAPA nodal officers and forward the list to all other UAPA nodal officers. (v) The RBI, SEBI, IRDA should forward the consolidated list of UAPA nodal officers to the banks, stock exchanges/depositories, intermediaries regulated by SEBI and insurance companies respectively. (vi) The consolidated list of the UAPA nodal officers should be circulated to the nodal officer of IS-I Division of MHA in July every year and on every change. Joint Secretary(IS-I), being the nodal officer of IS-I Division of MHA, shall cause the amended list of UAPA nodal officers to be circulated to the nodal officers of Ministry of External Affairs, Department of Economic Affairs, Foreigners Division of MHA, RBI, SEBI, IRDA and FIU-IND.

78. Regarding funds, financial assets or economic resources or related services held in the form of bank accounts, stocks or insurance policies etc.

(i) Maintain updated designated lists in electronic form and run a check on the given parameters on a regular basis to verify whether individuals or entities listed in the schedule to the Order (referred to as designated individuals/entities) are holding any funds, financial assets or economic resources or related services held in the form of bank accounts, stocks or insurance policies etc. with them.
(ii) In case, the particulars of any of their customers match with the particulars of designated individuals/entities, the banks, stock exchanges/ depositories, intermediaries regulated by SEBI and insurance companies shall immediately, not later than 24 hours from the time of finding out such customer, inform full particulars of the funds, financial assets or economic resources or related services held in the form of bank accounts, stocks or insurance policies etc.
(iii) The banks, stock exchanges/ depositories, intermediaries regulated by SEBI and insurance companies shall also send by post a copy of the communication mentioned in (ii) above to the UAPA nodal officer of the state/ UT where the account is held and Regulators and FIU-IND, as the case may be.
(iv) In case, the match of any of the customers with the particulars of designated individuals/entities is beyond doubt, the banks stock exchanges / depositories, intermediaries regulated by SEBI and insurance companies would prevent designated persons from conducting financial transactions, under intimation to Joint Secretary (IS.I), Ministry of Home Affairs.
(v) The banks, stock exchanges/depositories, intermediaries regulated by SEBI and insurance companies shall file a Suspicious Transaction Report (STR) with FIU-IND covering all transactions in the accounts

79. In case, the results of the verification indicate that the properties are owned by or held for the benefit of the designated individuals/entities, an order to freeze these assets under section 51A of the UAPA would be issued within 24 hours of such verification and conveyed electronically to the concerned bank branch, depository, branch of insurance company branch under intimation to respective Regulators and FIU-IND.
80. In case, the designated individuals/entities are holding financial assets or economic resources of the nature of immovable property and if any match with the designated individuals/entities is found, the UAPA nodal officer of the State/UT would cause communication of the complete particulars of such individual/entity along with complete details of the financial assets or economic resources of the nature of immovable property to the Joint Secretary (IS.I), Ministry of Home Affairs, immediately within 24 hours.

81. The UAPA nodal officer of the State/UT may cause such inquiry to be conducted by the State Police so as to ensure that the particulars sent by the Registrar performing the work of registering immovable properties are indeed of these designated individuals/entities. This verification would be completed within a maximum of 5 working days and should be conveyed within 24 hours of the verification, if it matches with the particulars of the designated individual/entity to Joint Secretary(IS-I), Ministry of Home Affairs at the Fax telephone numbers and also on the e-mail id given below.

82. In case, the results of the verification indicate that the particulars match with those of designated individuals/entities, an order under Section 51A of the UAPA would be issued within 24 hours, by the nodal officer of IS-I Division of MHA and conveyed to the concerned Registrar performing the work of registering immovable properties and to FIU-IND under intimation to the concerned UAPA nodal officer of the State/UT.

83. Implementation of requests received from foreign countries under U.N. Security Council Resolution 1373 of 2001. : U.N. Security Council Resolution 1373 obligates countries to freeze without delay the funds or other assets of persons who commit, or attempt to commit, terrorist acts or participate in or facilitate the commission of terrorist acts; of entities owned or controlled directly or indirectly by such persons; and of persons and entities acting on behalf of, or at the direction of such persons and entities, including funds or other assets derived or generated from property owned or controlled, directly or indirectly, by such persons and associated persons and entities. Each individual country has the authority to designate the persons and entities that should have their funds or other assets frozen. Additionally, to ensure that effective cooperation is developed among countries, countries should examine and give effect to, if appropriate, the actions initiated under the freezing mechanisms of other countries.
To give effect to the requests of foreign countries under U.N. Security Council Resolution 1373, the Ministry of External Affairs shall examine the requests made by the foreign countries and forward it electronically, with their comments, to the UAPA nodal officer for IS-I Division for freezing of funds or other assets. The UAPA nodal officer of IS-I Division of MHA, shall cause the request to be examined, within 5 working days so as to satisfy itself that on the basis of applicable legal principles, the requested designation is supported by reasonable grounds, or a reasonable basis, to suspect or believe that the proposed designee is a terrorist, one who finances terrorism or a terrorist organization, and upon his satisfaction, request would be electronically forwarded to the nodal officers in Regulators. FIU-IND and to the nodal officers of the States/UTs. The proposed designee, as mentioned above would be treated as designated individuals/entities. The freezing orders shall take place without prior notice to the designated persons involved.

84. Procedure for unfreezing of funds, financial assets or economic resources or related services of individuals/entities inadvertently affected by the freezing mechanism upon verification that the person or entity is not a designated person

· Any individual or entity, if it has evidence to prove that the freezing of funds, financial assets or economic resources or related services, owned/held by them has been inadvertently frozen, they shall move an application giving the requisite evidence, in writing, to the concerned bank, stock exchanges/depositories, intermediaries regulated by SEBI, insurance companies, Registrar of Immovable Properties and the State/UT nodal officers.

· The banks stock exchanges/depositories, intermediaries regulated by SEBI, insurance companies, Registrar of Immovable Properties and the State/UT nodal officers shall inform and forward a copy of the application together with full details of the asset frozen given by any individual or entity informing of the funds, financial assets or economic resources or related services have been frozen inadvertently, to the nodal officer of IS-I Division of MHA as per the contact details within two working days.

· The Joint Secretary (IS-I), MHA, being the nodal officer for (IS-I) Division of MHA, shall cause such verification as may be required on the basis of the evidence furnished by the individual/entity and if he is satisfied, he shall pass an order, within 15 working days, unfreezing the funds, financial assets or economic resources or related services, owned/held by such applicant under intimation to the concerned bank, stock exchanges/depositories, intermediaries regulated by SEBI, insurance company and the nodal officers of States/UTs. However, if it is not possible for any reason to pass an order unfreezing the assets within fifteen working days, the nodal officer of IS-I Division shall inform the applicant.

84. Communication of Orders under section 51A of Unlawful Activities (Prevention) Act.: All Orders under section 51A of Unlawful Activities (Prevention) Act, relating to funds, financial assets or economic resources or related services, would be communicated to all banks, depositories/stock exchanges, intermediaries regulated by SEBI, insurance companies through respective Regulators, and to all the Registrars performing the work of registering immovable properties, through the State/UT nodal officer by IS-I Division of MHA.

85. Regarding prevention of entry into or transit through India :As regards prevention of entry into or transit through India of the designated individuals, the Foreigners Division of MHA, shall forward the designated lists to the immigration authorities and security agencies with a request to prevent the entry into or the transit through India. The order shall take place without prior notice to the designated individuals/entities. The immigration authorities shall ensure strict compliance of the Orders and also communicate the details of entry or transit through India of the designated individuals as prevented by them to the Foreigners' Division of MHA.


86. Procedure for communication of compliance of action taken under Section 51A :

The nodal officers of IS-I Division and Foreigners Division of MHA shall furnish the details of funds, financial assets or economic resources or related services of designated individuals/entities frozen by an order, and details of the individuals whose entry into India or transit through India was prevented, respectively, to the Ministry of External Affairs for onward communication to the United Nations.

87. Clients of special category (CSC): Such clients include the following-

i. Non resident clients

ii. High net-worth clients,

iii. Trust, Charities, Non-Governmental Organizations (NGOs) and organizations receiving donations

a. Companies having close family shareholdings or beneficial ownershipPolitically Exposed Persons (PEP) are individuals who are or have been entrusted with prominent public functions in a foreign country, e.g., Heads of States or of Governments, senior politicians, senior government/judicial/military officers, senior executives of state-owned corporations, important political party officials, etc.

b. Companies offering foreign exchange offerings

vii. Clients in high risk countries where existence / effectiveness of money laundering controls is suspect, where there is unusual banking secrecy, countries active in narcotics production, countries where corruption (as per Transparency International Corruption Perception Index) is highly prevalent, countries against which government sanctions are applied, countries reputed to be any of the following – Havens/ sponsors of international terrorism, offshore financial centers, tax havens, countries where fraud is highly prevalent. While dealing with clients in high risk countries where the existence/effectiveness of money laundering control is suspect, intermediaries apart from being guided by the Financial Action Task Force (FATF) statements that identify countries that do not or insufficiently apply the FATF Recommendations, published by the FATF on its website (www.fatf- gafi.org), shall also independently access and consider other publicly available information.

viii. Non face to face clients

Clients with dubious reputation as per public information available etc. The above mentioned list is only illustrative and the intermediary shall exercise independent judgment to ascertain whether any other set of clients shall be classified as CSC or not

AMLKYC   Recollected Questions and Exam Tips::::

Kindly focus on case studies in Macmillan, international organization for AML, FATF  latest recommendations,PMLA act latest developments, Reports sent to FIU_IND

 1.high medium low risk categories kyc review period 3 questions came directly
2.Gave example of transactions and asked wat type of money laundering is that-funnel accts,deposit structuring,multiple tier account 3ques
3.IBA study group paper published 3 questions from that
4.Placment,layering, integration 1 case study each topic
5.hawala is wat type of ml
6.ml word is coined by the guardian in -watergate scandal
7.FIU IND based questions 6-8
8.5-7case studies one came from text book itself
9.OVD based questions 3
10.given options with type of customer and the documents they submit and asked which customer is eligible for opening sb
11.reporting entity have-designated director
12.designated director is appointed by
13.report submission questions 3
STR within 7 days
CTR within 15th of next month
14.kyc policy is revised by n within
15.key elements of STR
All 2 marks from case studies.
(Placement
Layering
Integration)
Funnel account
Copy of byelaws
Trust company percentage in shars or.profits
Ration card valid or not
Money laundering acts
Str
Ccr
Ftr
Max punishment for money laundering
Wolfsburg principle
Penality for pmla maintainance of records
How many years records to be maintained
Counterfeit notes more than 5
Dormant accounts
Customer not giving info abt the account, what action we have to take
Fatf
Banks under Wolfsburg grp
Small accounts max limits
Thresholds 3 questions
Reports around 4 to 5
Fiu ind, fatf around 5
Wire transfer direct questions like max limit, originator information
Front company
Red flag indicator
Risk category 3 questions around
Some direct questions like
Customer definition in kyc norms
Key elements in kyc policy
Non profit organization
Ckycr
Company trust partnership
Overall if we go though MacMillan book it's good enough to clear the exam..
Case studies are scoring part



MCQs
1. .The amount beyond which cash transactions (Receipts & Payments) are to be monitored by the Commercial Banks as stipulated by the RBI in its guidelines is -

A.Rs.5 lacs & above  B. Rs.8 lacs & above C. Rs.10 lacs & above D. No such limit

2. Submission of details of PAN (Permanent Account Number) is compulsory for Fixed Deposits, Remittances, such as, DDs / TTs/ Rupee TCs, etc., if the amount exceeds –

A. Rs.10,000/- B. Rs.25,000/- C. Rs.50,000/- D. No such limit

3. Branches should not open deposit/advances accounts of banned/ terrorist organisations as circulated by -

A.IRDA  B. SEBI  C. AMFI D. FIU

4. .FCRA means - Foreign Contribution Regulation Act

5. .Maximum punishment by way of imprisonment for the offence committed under Money Laundering Act is -

A. 7 years B. 9 years C. 10 years D. 12 years

6. “Smurfing” means -

A. large number of cash deposits into same account



B. one voucher for high value deposit
C. low value denominations of cash



D. None of the above



7. .The objective of verifying the employee life-styles by the employer is -

to know the source of income

to ascertain whether the employee is having any contacts with illegal organisations

C. to ascertain whether the employee is assisting organisations banned by statutory authorities D. All of these
8. .Role of the concurrent auditors / Internal auditors with KYC is to -

(g) Review of compliance of KYC guidelines

Effectiveness of the implementation of the KYC

Verification of newly opened accounts and their transactions

All of the above
.Strict adherence to KYC norms is achieved through -

(c) following the statutory authority guidelines

identification of customers with appropriate documents

strict Implementation of the Banks Systems and procedures while opening the accounts

D. All of the above

10.Name the software available in the market for KYC implementation -

A. Bank Master B. Tally C. Bank Alert D. Bank Call

11. Which of the following transactions is/are not consistent with a salaried customer’s account?

Frequent deposits of cash in large sums by third parties

Deposit of cheques issued by foreign companies

High value transactions routed through the account with high frequency

D. All of the above

12. Which of the following transactions is/are suspicious from AML angle -

Large volume of credits happen through DDs/TTs/BC etC.,

Deposit of several small values of cheques

Frequent deposits of cash into the account by persons other than the account holder or his authorised representative

All of the above

13. While accounts are transferred from one branch to another, the receiving branch is expected to comply with KYC Norms. Which one of the following is/are correct in this regard?

Detailed verification of Customer Profile as received from the earlier branch is to be done with caution

Detailed verification is not needed but the account is opened immediately and informed to the customer

Fresh details are to be obtained and a fresh customer profile is to be prepared

No transaction is to be permitted for the first six months till the customer is fully know to the bank
 

14.One of the sources that is available to identify the correctness of the information given by the New Customer of the Commercial Bank is –
A.Introduction given by the existing customer of the Bank

B. By studying the account opening form

C. By providing information by the agencies like CRISIL

D. None of the above

15 Which of the following is a source of identification of new customer who is not having any valid documents such as, passport, etC.

Introduction from the third person having an account with the bank /branch

Introduction given the Safe deposit locker holder of the bank

Self–declaration given by the new customer along with other opening forms

None of the above




16 Is India a member of FATF?



A. Yes  B. No C. Has applied for inclusion
D. Is likely to be made a member



17. Is adopting Anti Money Laundering practices compulsory for Banks in India?

A. Yes  B. No C. Not Sure D. Will be made compulsory soon

18 Letter of thanks is sent to introducer/s because it is -

a. laid down in the banks’ manual

b. a routine practice followed by banks for years
     C. recommended by the Auditors of banks

    D. assisting banks in verification of genuineness or otherwise of the address

19. Which of the following is the cardinal rule for bankers in anti-money laundering efforts -

A. Know Your Customer & Know Your Employee

B Know the Customer of the other Banks

C. Know the income of the Customers of your Bank

D. Know the Assets Position of the customers of the Bank

20 Money Laundering means -

a. Conversion of assets to invest in Laundromats

b. Conversion of money which is illegally obtained to make them legitimate

c. Conversion of cash into gold to make them legitimate

d. Conversion of assets into cash to make them legitimate

21 While opening an account in the name of a company, the following document/s is/are to be obtained -

a. Organisation Chart of the company

b. Roles and responsibilities of the Company

c. Memorandum and Articles of Association of the Company

d. Instructions of the Registrar of the Compan

22 How many recommendations were made by FATF on anti money laundering -

A. 65 recommendations B. NIL C. 40 recommendations D. Yet to be finalised

23. For opening accounts in the case of Joint Hindu Undivided Family (JHUF), the following document/s is/are important -

a. Declaration of all family members

b. Declaration of the Karta of the family

c. Declaration of all guardians on behalf of minors

d. Declaration can be exempted as per Hindu Succession Act

24. While opening an account in case of partnership firm, one of the vital document to be produced by the firm is -

A. Partners MOU
B. Partnership Deedd
d

C. Registration certificate of Partnership
D. Signatures of the partners
25.
Cash cannot be accepted for issue of DDs/TTs/Rupee TCs from the customers for Rs. ____

A. Rs.50,000/- & above

B. Rs.75,000/- & above

C. Rs.1,00,000/- & above
D. Rs.1,50,000/- & above
26.
The branches of commercial banks should report suspicious transactions to -

A. Bank’s respective authority
B. RBI  C. Ministry of Finance  D. None of the above


27.
Maximum punishment by way of imprisonment for the offence committed under Money Laundering Act is -

A. 7 years
B.9 years
C. 10 years
D. 12 years





28. Maximum retention period of the bank records in case of suspicious transactions is -

A. 5 years B. 7 years C. 10 years D. 15 years

29. .Four eyes concept means -

A. opening and verifying of account by one person two times

B. opening and verifying of account by electronic device/s

C. opening and verifying of account by two different persons

D. none of the above

30 Role of the concurrent auditors / Internal auditors with KYC is to -

(i) Review of compliance of KYC guidelines

(ii) Effectiveness of the implementation of the KYC

(iii) Verification of newly opened accounts and their transactions

(iv) All of the above


31 Role of the front line employees of a bank in respect of KYC guidelines is to -

(i) Identify customers as per the existing instructions

(ii) Serve with Smile while opening the customer accounts

(iii) Assist the customer in filling-up the account opening forms

(iv) Provide efficient customer service

32 Which of the following transactions is/are not consistent with a salaried customer’s account?

(i) Frequent deposits of cash in large sums by third parties

(ii) Deposit of cheques issued by foreign companies

(iii) High value transactions routed through the account with high frequency

(iv) All of the above

33 .Which of the following transactions is/are suspicious from AML angle –
A. Large volume of credits happen through DDs/TTs/BC etC.,
B. Deposit of several small values of cheques
C. Frequent deposits of cash into the account by persons other than the account holder or his authorized representative
D. All of the above

34. While accounts are transferred from one branch to another, the receiving branch is expected to comply with KYC Norms. Which one of the following is/are correct in this regard?

A. Detailed verification of Customer Profile as received from the earlier branch is to be done with caution

B. Detailed verification is not needed but the account is opened immediately and informed to the customer

C. Fresh details are to be obtained and a fresh customer profile is to be prepared

D. No transaction is to be permitted for the first six months till the customer is fully know to the bank

35. Unusual activities in respect of an customers account is/are -

A. Opening of account at a place other than the place of work

B. Frequent deposits of large sums of money bearing labels of other banks into the account
C. Request for closure of newly opened accounts where high value transactions are routed through
D. All of the above

36. For effective implementation of “Know Your Employee”, measures to be adopted by the banks are -

摡 Verification of the life-styles of the employees

摡 Proper Job-rotation in work environment

摡 Not allowing frequent cheque purchase to the employees by the employer

摡 All of the above

37. .Indicator/s about the suspicious transactions of a customer accounts is/are -

A. Depositing high value third party cheques endorsed in favour the account holder B. Sudden increase in cash deposits

C. Receipt or payment of large sums of cash, which have no obvious purpose D. All of the above

38. .Which of the following document/s that can be accepted by the Banks as a proof of Customer Identification -

A. Electricity Bill
B. Salary Slip
C. Income/Wealth Tax Assessment Order
D. All of the above



39. .Which of the following is a source of identification of new customer who is not having any valid documents such as, passport, etC.

A. Introduction from the third person having an account with the bank /branch

B. Introduction given the Safe deposit locker holder of the bank

C. Self–declaration given by the new customer along with other opening forms

D. None of the above

40. .
KYC is --





A. A One-time project

B. To be carried out every 5 years

C. To be carried out every 2 years
D. An ongoing process

41. .
Is India a member of FATF?





A. Yes  B. No  C. Has applied for inclusion
D. Is likely to be made a member
42. .What is the level of risk of Money Laundering in a Liability product (e.g., deposits)?

A. Generally High
B.Medium
  C. Generally Low
D. Cannot say

43. .Letter of thanks is sent to introducer/s because it is -

A. laid down in the banks’ manual B. a routine practice followed by banks for years

C. recommended by the Auditors of banks
D. assisting banks in verification of genuineness or otherwise of the address



44. .While company Opening an account in the name of a company, the following document/s is/are to be obtained
               A. Organisation Chart of the Company
               B. Roles and responsibilities of the Company





C. Memorandum and Articles of Association of the Company

D. Instructions of the Registrar of the Company

45. .Due diligence is done at the time of opening an account to enable banks to ensure –
 A. identification of the customer at the time of opening an account

B. correctness of the various denominations of notes given by the customer while opening an account

C. authenticity of the signatures of the customer at the time of opening an account

D. speeding up the process of account opening of the new customers

46. For opening accounts in the case of Joint Hindu Undivided Family (JHUF), the following document/s is/are important –
A. Declaration of all family members B. Declaration of the Karta of the family
C. Declaration of all guardians on behalf of minors
D. Declaration can be exempted as per Hindu Succession Act
47. . While opening an account in case of partnership firm, one of the vital document to be produced by the firm is -

A. Partners MOU B. Partnership Deed C. Registration certificate of Partnership D. Signatures of the partners

48. The amount beyond which cash transactions (Receipts & Payments) are to be monitored by the Commercial Banks as stipulated by the RBI in its guidelines is -

A. Rs.5 lacs & above B. Rs.8 lacs & above C. Rs.10 lacs & above D. No such limit

49. Submission of details of PAN (Permanent Account Number) is compulsory for Fixed Deposits, Remittances, such as, DDs / TTs/ Rupee TCs, etc., if the amount exceeds -
A. Rs.10,000/-  B. Rs.25,000/-  C. Rs.50,000/- D. No such limit
50. The branches of commercial banks should report suspicious transactions to -
A. Bank’s respective authority  B. RBI C. Ministry of Finance D. None of the above

.
51. Banks are made accountable for opening an account in the name of terrorist organisation under ------
of POTA 2002

A. Section 16   B. Section 20
C. Section 18   D. None of the above

52. Which of the following is/are the terrorist organisation/s notified under POTA, 2002


A. Khalistan Zindabad Force
B. Deendar Anjuman
C. All Tripura Tiger Forc D. All of these

53. .
FCRA means -





A. Foreign Currency Regulation Act
B. Foreign Contribution Regulation Act


C. Foreign Cheques / Commodities Regulation Act
D. None of the above

 


54. Dormant / In-operative account means -

(a) No debits / credits in account for certain period

(b) A dead account not operated for over 10 years

(c) No debit entries, but certain credit entries for certain period D. A fixed asset account

55. The objective of verifying the employee life-styles by the employer is -

(a) to know the source of income

(b) to ascertain whether the employee is having any contacts with illegal organisations

(c) to ascertain whether the employee is assisting organisations banned by statutory authorities

(d) All of these

56. Maximum retention period of the bank records in case of suspicious transactions is -

A. 5 years B. 7 years C. 10 years D. 15 years

57. Role of the front line employees of a bank in respect of KYC guidelines is to -

(a) Identify customers as per the existing instructions

(b) Serve with Smile while opening the customer accounts

(c) Assist the customer in filling-up the account opening forms

(d) Provide efficient customer service


58. Name the software available in the market for KYC implementation -

A. Bank Master B. Tally C. Bank Alert D. Bank Call

59. Unusual activities in respect of an customers account is/are -

1) Opening of account at a place other than the place of work

2) Frequent deposits of large sums of money bearing labels of other banks into the account



C. Request for closure of newly opened accounts where high value transactions are routed through
D. All of the above



60. . A new customer may be identified through -



A. Passport B. Election ID Card
C, PAN Card
D. All of the above



61. One of the sources that is available to identify the correctness of the information given by the New Customer of the Commercial Bank is -

(i) Introduction given by the existing customer of the Bank

(ii) By studying the account opening form

(iii) By providing information by the agencies like CRISIL D. None of the above



62. Objective of KYC guidelines issued by RBI is -

(i) To control the financial frauds/money laundering

(ii) To discourage opening of new accounts

(iii) To increase competition among the public sector and private sector banks

(iv) To check / control over the new accounts

63. Which of the following document/s that can be accepted by the Banks as a proof of Customer Identification -

(i) Electricity Bill B. Salary Slip C. Income/Wealth Tax Assessment OrderD. All of the above

64. Which of the following is a source of identification of new customer who is not having any valid documents such as, passport, etC.

(i) Introduction from the third person having an account with the bank /branch

(ii) Introduction given the Safe deposit locker holder of the bank

(iii) Self–declaration given by the new customer along with other opening forms

(iv) None of the above

65. Is adopting Anti Money Laundering practices compulsory for Banks in India?

A. Yes  B. No C. Not Sure D. Will be made compulsory soon

66. Letter of thanks is sent to introducer/s because it is -

(i) laid down in the banks’ manual

(ii) a routine practice followed by banks for years

(iii) recommended by the Auditors of banks

(iv) assisting banks in verification of genuineness or otherwise of the address

67. Which of the following is the cardinal rule for bankers in anti-money laundering efforts -
 
A. Know Your Customer & Know Your Employee

B. Know the Customer of the other Banks

C. Know the income of the Customers of your Bank

D. Know the Assets Position of the customers of the Bank

68. . While opening an account in the name of a company, the following document/s is/are to be obtained - A. Organisation Chart of the company B. Roles and responsibilities of the Company

C. Memorandum and Articles of Association of the Company

D. Instructions of the Registrar of the Company

69. FATF means - Financial Action Task force

70. One of the important steps to be taken while opening NRI accounts is ……… by the bank branch

a. Authentication / verification of signature by Indian Embassy

b. Authentication / verification of signature made by the relative of NRI in India



C. Authentication / verification of signature made by friends of the NRI who are staying
abroad




d. All of the above



71.In case of societies, the important document to be verified is -

A. Copy of Bye-Laws B. Certificate given by the ROC

C. Certificate given by the Local Authorities

D. No document is to be verified in case of societies, as it is exempted

72. The amount beyond which cash transactions (Receipts & Payments) are to be monitored by the Commercial Banks as stipulated by the RBI in its guidelines is -

A. Rs.5 lacs & above B. Rs.8 lacs & above C. Rs.10 lacs & above D. No such limit

73. .In computerised branches, suitable filters are required in the software for the purpose of -

A. calculating the correct rate of interest B. printing out the customer profiles

C. monitoring the suspicious transactions  D. sharing information/data to the Head Office

74. .Banks are made accountable for opening an account in the name of terrorist organisation under ------
of POTA 2002

A.Section16
B. Section20
C. Section 18
D. None of the above

75. .
FCRA means -






A. Foreign Currency Regulation Act
B. Foreign Contribution Regulation Act


C. Foreign Cheques / Commodities Regulation Act
D. None of the above


76. Maximum punishment by way of imprisonment for the offence committed under Money Laundering Act is -

A. 7 years
B.9 years
C.10 years
D. 12 years


77. Dormant / In-operative account means -

c. No debits / credits in account for certain period

d. A dead account not operated for over 10 years

e. No debit entries, but certain credit entries for certain period D. A fixed asset account



78. .The objective of verifying the employee life-styles by the employer is -



A. to know the source of income

B. to ascertain whether the employee is having any contacts with illegal organisations

C. to ascertain whether the employee is assisting organisations banned by statutory authorities



D. All of these



79. . Maximum retention period of the bank records in case of suspicious transactions is -

A. 5 years B. 7 years C. 10 years D. 15 years



80.
Role of the concurrent auditors / Internal auditors with KYC is to -


A. Review of compliance of KYC guidelines


B. Effectiveness of the implementation of the KYC


C. Verification of newly opened accounts and their transactions
D. All of the above



81.
Strict adherence to KYC norms is achieved through -


A. following the statutory authority guidelines



B. identification of customers with appropriate documents

C. strict Implementation of the Banks Systems and procedures while opening the accounts

D. All of the above

ix. For effective implementation of “Know Your Employee”, measures to be adopted by the banks are -

A. Verification of the life-styles of the employees

B. Proper Job-rotation in work environment

C. Not allowing frequent cheque purchase to the employees by the employer

D. All of the above

f) Indicator/s about the suspicious transactions of a customer accounts is/are -

Depositing high value third party cheques endorsed in favour the account holder

Sudden increase in cash deposits

Receipt or payment of large sums of cash, which have no obvious purpose

All of the above




g) Which of the following objective/s is/are important under new KYC Norms?

A. To curb Money Laundering B. To curb the specious activities

C. To monitor/check the transactions of the bank customers

D. All of the above

89.The main objective of KYC is to -

A. Prevent Money Laundering activities B. Improve Customer Service

C. Improve Customer Documentation Standards D. None of these

90. Is adopting Anti Money Laundering practices compulsory for Banks in India?

A. Yes  B. No C. Not Sure D. Will be made compulsory soon

91. Letter of thanks is sent to introducer/s because it is -

A. laid down in the banks’ manual B. a routine practice followed by banks for years C. recommended by the Auditors of banks

D. assisting banks in verification of genuineness or otherwise of the address



92. Money Laundering measures were originally introduced by? A. DICGC B. EXIM Bank C. FDIC

D. SEBI




93.FATF is located at -



A.Mumbai
 B.New York
C. Paris
D. Japan




94. One of the important steps to be taken while opening NRI accounts is ……… by the bank branch

ii) Authentication / verification of signature by Indian Embassy

iii) Authentication / verification of signature made by the relative of NRI in India

iv) Authentication / verification of signature made by friends of the NRI who are staying abroad

v) All of the above

95. In case of societies, the important document to be verified is -

i) Copy of Bye-Laws   B. Certificate given by the ROC