Am LCF T Handbook Final Version D
Am LCF T Handbook Final Version D
Am LCF T Handbook Final Version D
AND
COUNTERING THE FINANCING OF TERRORISM
HANDBOOK
June 2019
Whilst this publication has been prepared by the Financial Services
Authority, it is not a legal document and should not be relied upon in
respect of points of law. Reference for that purpose should be made to
the appropriate statutory provisions.
Contact:
AML Unit, Enforcement Division
Financial Services Authority
PO Box 58,
Finch Hill House,
Bucks Road, Douglas
Isle of Man
IM99 1DT
Part 1 – Introductory 9
1.1 Foreword ........................................................................................................ 9
1.2 Status of Guidance ........................................................................................ 10
1.3 Purpose of the Handbook .............................................................................. 11
1.4 Failure to Comply with the AML/CFT Code ................................................... 11
1.5 FATF Recommendations .............................................................................. 12
1.6 Compliance Culture ....................................................................................... 12
1.7 Risk Based Approach .................................................................................... 15
1.7.1 What is risk?........................................................................................ 15
1.7.2 What is mitigation? .............................................................................. 16
1.8 Assessing Compliance with a Risk Based Approach ..................................... 16
2
AML/CFT Handbook Contents
3
AML/CFT Handbook Contents
4
AML/CFT Handbook Contents
5
AML/CFT Handbook Contents
Appendices
A Anti-Money Laundering and Countering the Financing of Terrorism Code 2019
B Proceeds of Crime (Business in the Regulated Sector) Order 2019
C LIST C: Equivalent Jurisdiction List
D(a) LIST A: Higher Risk Jurisdictions Lists
D(b) LIST B: Jurisdictions that May Pose a Higher Risk
E Eligible Introducers Certificate (includes terms of business)
F Acceptable Applicants Certificate
G Acting “on Behalf of” Certificate (includes terms of business)
H Wire Transfers
I Proforma Register of Money Laundering and Financing of Terrorism Disclosures
Made to the MLRO or Deputy MLRO
J Proforma Register of Money Laundering and Financing of Terrorism External
Disclosures Made to FIU
K Proforma Register of Money Laundering and Financing of Terrorism Enquiries
L Terrorist Financing Typologies and Countering the Financing of Terrorism
Guidance
6
AML/CFT Handbook Contents
Estate Agents
Money Lenders
Specified Non-Profit Organisations
High Value Goods Dealers
7
AML/CFT Handbook Contents
8
AML/CFT Handbook Part 1 Introductory
Part 1 – Introductory
1.1. Foreword
1.2. Status of Guidance
1.3. Purpose of the Handbook
1.4. Failure to Comply with AML/CFT Code
1.5 FATF Recommendations
1.6 Compliance Culture
1.7 Risk Based Approach
1.7.1 What is risk?
1.7.2 What is mitigation?
1.8 Assessing Compliance with a Risk Based Approach
1.1 Foreword
This document is designed to provide guidance to those businesses licensed under
the Financial Services Act 20081, or registered under the Designated Businesses
(Registration and Oversight) Act 2015. These persons, which are businesses in the
regulated sector as defined by Schedule 4 to the Proceeds of Crime Act 2008
(“POCA”) are referred to throughout this document as “relevant persons”. Other
persons included in Schedule 4 to POCA may also use this guidance as a reference
tool if they wish.
The Isle of Man has a reputation as a sound and well-regulated jurisdiction. This is
confirmed by the IMF report of August 2009, the MONEYVAL 2013 follow up report,
and the MONEYVAL's Mutual Assessment Report 2016 . It is essential for the Island
to maintain this reputation in order to continue attracting legitimate investors with funds
and assets that are clean and untainted by criminality. Anyone in the Isle of Man that
assists in laundering the proceeds of crime or is involved in the financing of terrorism
or proliferation2, whether knowingly, unintentionally, or without regard to what it may
be facilitating through the provision of its products or services, could face law
enforcement investigation, the loss of reputation and the possibility of regulatory
sanctions or criminal proceedings. Involvement of a relevant person with criminal or
terrorist property will also damage the reputation of the Isle of Man as a whole.
The Isle of Man legislative framework for anti-money laundering and countering the
financing of terrorism (“AML/CFT”) has been in place and effective since 19903. This
legislation has been regularly updated to deal with new threats that have emerged and
has strengthened the Isle of Man’s defences against all crimes money laundering and
international terrorism. In addition to the legislation being in place, the continued
1 If a fiduciary is part of a group which is subject to AML/CFT guidance issued under the Insurance
Act and / or the Retirement Benefits Schemes Act 2000 the fiduciary may follow that guidance as long
as the business can demonstrate compliance with the Code.
2 Note that where money laundering and the financing of terrorism (ML/FT) is stated this also refers to
proliferation, and where Anti-money laundering and countering the financing of terrorism is stated this
also refers to countering proliferation..
3 Criminal Justice Act 1990 and Prevention of Terrorism Act 1990.
9
AML/CFT Handbook Part 1 Introductory
The Island’s current anti-money laundering requirements are detailed in the Anti-
Money Laundering and Countering the Financing of Terrorism Code 2015 (as
amended 2018) (“the Code”) which applies to all relevant persons. The Code is made
under Section 157 of POCA and section 68 of the Terrorism and Other Crimes
(Financial Restrictions) Act 2014.
The Island’s anti-terrorism legislation can be found in the Anti-Terrorism and Crime
Act 2003 (“ATCA”), the Anti-Terrorism and Crime (Amendment) Act 2011 and the
Terrorism and Other Crimes (Financial Restrictions) Act 2014. Section 68 of the
Terrorism and Other Crimes (Financial Restrictions) Act 2014 requires the DHA to
publish a Code for the purposes of preventing and detecting the financing of terrorism
(“FT”) and proliferation. The Code also has provisions in relation to this area.
The Island’s National Risk Assessment (“NRA”) has now been completed. The
document can be found here.
The Authority issues guidance for various purposes including to illustrate best practice,
to assist relevant persons in complying with legislation and to provide examples or
illustrations. The guidance in this Handbook is not law, however it is persuasive.
Where a person follows guidance this would tend to indicate compliance with the
legislative provisions, and vice versa.
This Handbook is written to supplement the Code and assist relevant persons in their
compliance with the legislation. The main body of the Handbook, which consists of
Parts 1 to 9, applies to all businesses. Additional guidance which is specific to different
industries will be published separately on the Authority’s website, this is referred to in
this document as “sector specific guidance”.
The sector specific sections build on the core document for each business sector and
should not be read in isolation. The sector specific sections help those sectors identify
risk areas unique to that sector or provide refined guidance in respect of due diligence
measures where a one-size fits all approach may not work. Finally these areas are
illustrated with case studies to assist in providing context to these threats and
vulnerabilities.
If a relevant person has any particular areas that they would like to see included in the
Handbook or the sector specific guidance the Authority would welcome feedback on
this.
10
AML/CFT Handbook Part 1 Introductory
11
AML/CFT Handbook Part 1 Introductory
The Authority recognises that relevant persons may have systems and procedures in
place which, whilst not identical to those outlined in the Handbook, nevertheless
impose controls and procedures which are at least equal to if not higher than those
contained in the Handbook. This will be taken into account by the Authority when
assessing the adequacy of a business’s systems and controls.
Paragraph 41(2) of the Code states that a court may take account of any relevant
supervisory or regulatory guidance given by a competent authority that applies to that
person.
The Authority will take account of this Handbook in assessing the level of compliance
with the Code when conducting its supervisory or oversight visits / meetings. The level
12
AML/CFT Handbook Part 1 Introductory
This may therefore result in regulatory action at the discretion of the Authority and in
certain cases, it may result in revocation of a licence or de-registering of a business.
A link to the 2012 FATF 40 Recommendations, upon which our legislation and this
guidance is based, can be found here.
In October 2012, the Island joined the MONEYVAL mutual evaluation process.
MONEYVAL is a FATF style regional body. The aim of MONEYVAL is to ensure that
its member states have in place effective systems to counter ML and FT and comply
with the relevant international standards in these fields.
The reports published by MONEYVAL in relation to the Island can be found here.
13
AML/CFT Handbook Part 1 Introductory
with the industry and, accordingly, expects all relevant persons to ensure that they
establish an open and positive approach to compliance and AML/CFT issues amongst
all employees.
The board and senior management have a responsibility to ensure that a relevant
person’s systems and controls are appropriately designed and implemented, and are
effectively operated to reduce the risk of the business being used in connection with
ML/FT.
Relevant persons must adopt a robust approach and not refrain from asking their
customers “awkward” questions in circumstances of unusual activity. Any reluctance
or failure by the customer to provide credible and verifiable answers should lead the
relevant person to consider the reason for this reluctance, consider if this makes them
suspicious and then take appropriate action.
4 It should be noted that the Code defines a customer of a relevant person (excluding SNPOs) as a
person seeking to form a business relationship or to carry out an occasional transaction, or carrying on
a business relationship, or carrying out an occasional transaction. Where the term ‘customer’ is used in
this Handbook it should also be considered that it also refers to the ‘beneficial owner’; which is the
natural person owning or controlling the customer on or on whose behalf a transaction or activity is
being conducted.
14
AML/CFT Handbook Part 1 Introductory
1. senior management being unwilling to lead on the concept of the need for sound
corporate ethics;
2. more junior employees assuming that their concerns or suspicions are not
significant;
3. employees being unwilling to subject high value (therefore important) customers
to effective CDD checks;
4. management or customer relationship managers outside the Isle of Man
pressurising employees in the Isle of Man to transact without obtaining all
relevant CDD and business relationship information;
5. employees being unable to understand the commercial rationale for customer
relationships and the use of certain products / services, so that potentially
suspicious activity is not identified;
6. lack of time and/or resources to address concerns generating a tendency for line
managers to discourage employees from raising concerns; and
7. conflict between the desire on the part of employees to provide a confidential and
efficient customer service and the requirement for employee vigilance in respect
of prevention and detection of ML/FT.
The split of roles and responsibilities within the business should also be
considered. An MLRO who also has operational responsibilities, or a fee earning
role, could face a conflict of interest between these two roles. Such conflicts of
interest are most likely to arise in smaller firms where operational roles and control
functions are shared between a small number of staff.
Conflicts take many forms and it is for the relevant person to determine whether a
conflict exists and how to manage that conflict. Examples of conflicts include:
15
AML/CFT Handbook Part 1 Introductory
A relevant person should also ensure they address and record such conflicts of
interest through its conflicts of interest policy and register as may be required by
relevant rules, regulations or bye-laws (in the case of certain DNFBPs) if
applicable.
It is very important to note that POCA, ATCA and the Code do not prohibit or prevent
any streams of business, any customers or systems, unless they are undertaking
ML/FT. The legislation requires only that the risks posed by customers, products and
systems are identified, mitigated and the mitigating factors/controls are documented
and reviewed periodically.
This Handbook suggests ways in which the relevant person can comply with the
requirements of the AML/CFT legislation. The application of a risk based approach
provides a strategy for managing potential risks by enabling relevant persons to
subject customers to proportionate controls and oversight. Relevant persons will
always have to make their own determination as to the risks based on their respective
circumstances and should always avoid a “tick box” approach. An assessment of risk
should always be documented, reasonably and objectively justifiable and sufficiently
robust so as to demonstrate that the business acted reasonably. Finally, while a risk
based approach grants a wide degree of discretion, parameters set by law or
regulation may limit that discretion.
16
AML/CFT Handbook Part 1 Introductory
Systems and controls may not always prevent and detect all ML/FT. A risk-
based approach will, however, serve to balance the cost burden placed on
relevant persons and on their customers with a realistic assessment of the
threat of a business being used in connection with ML/FT. It focuses effort
where it is needed and has most impact.
Any risk assessment systems used by the relevant person should be reviewed
regularly to check the system is effective and action should be taken to remedy any
identified deficiencies.
17
AML/CFT Handbook Part 2 General Requirements
2. take appropriate measures for the purpose of making employees and workers
aware of —
3. monitor and test compliance with the Code in accordance with paragraph 29;
4. provide education and training to its staff in accordance with paragraph 31;
5. comply with paragraphs 38 and 40 which is the use of Shell Banks and
fictitious/anonymous/numbered accounts respectively; and;
Paragraph 4 of the Code also states that the ultimate responsibility for ensuring that
customer due diligence complies with the Code is that of the relevant person. This
remains the case regardless of any outsourcing or reliance on third parties during the
process.
The procedures and controls required by the Code and detailed in this part of the
Handbook must be approved by the senior management of the relevant person and
evidence of this approval should be made available to competent authorities upon
request. Examples of such evidence include board papers, minutes or similar
documentary evidence.
18
AML/CFT Handbook Part 2 General Requirements
It is a criminal offence for a relevant person to fail to establish, maintain and operate
the procedures listed above. Where such an offence is committed with the consent or
connivance of, or is attributable to neglect on the part of an officer of the business,
he/she too shall be deemed to have committed a criminal offence. The definition of
“officer” includes a director, manager, board member or secretary and a person
purporting to act as such.
19
AML/CFT Handbook Part 3 Risk Assessment and
Ongoing Monitoring
It should also consider the extent of its exposure to risk by reference to a number of
additional factors which are explained in this section. The examples provided are not
exhaustive and other factors may need to be considered depending on the nature of
the business and its activities.
20
AML/CFT Handbook Part 3 Risk Assessment and
Ongoing Monitoring
The relevant person must record and document its risk assessment in order to be able
to demonstrate its basis. The assessment must be undertaken as soon as reasonably
practicable after the relevant person commences business and regularly reviewed and
amended to keep it up to date. It is expected that this risk assessment is reviewed at
least annually and this review should be documented to evidence that an appropriate
review has taken place.
Any risks that have been identified should be properly mitigated by policies,
procedures and controls. The relevant person should also document the mitigating
factors and controls put in place to provide an audit trail of how the assessed risks
have been mitigated.
Note that relevant persons who are licensed under the Financial Services Act 2008
(“FSA”) are under a further obligation to conduct a business risk assessment under
Rule 8.6 of the Financial Services Rule Book (“FSRB”). It is acceptable for a relevant
person to cover the requirement of both paragraph 6 of the Code and Rule 8.6 in one
assessment; however, the overall AML/CFT score/assessment must not be impacted
by non-AML factors. The Authority suggests that a relevant person may wish to have
an overall risk score and a separate AML/CFT score
Paragraph 6(3) of the Code requires businesses to assess 5 key areas when
undertaking the business risk assessment:
(a) the nature, scale and complexity of the relevant person’s activities;
(b) the products and services provided by the relevant person;
(c) the persons to whom, and the manner in which the products and services are
provided, including whether the relevant person meets its customers;
(d) reliance on third parties for elements of the CDD process; and
(e) technological developments.
Businesses should also consider the findings of the NRA in their business risk
assessment.
Each of the areas specified by the Code, and examples of what factors a business
should consider as a part of assessing these areas, are detailed in the following
sections.
Consider the services provided by the business and how those services
might be abused for ML/FT.
Actively involve all members of senior management in determining the
risks (threats and vulnerabilities) posed by ML/FT within those areas for
which they have responsibility.
Consider any organisational factors that may increase exposure to the
risk of ML/FT e.g. business volumes and outsourcing aspects of
regulated activities or compliance functions.
Consider the nature, scale and complexity of its business including the
diversity of its operations, the volume and size of its transactions, and
the degree of risk associated with each area of its operation.
21
AML/CFT Handbook Part 3 Risk Assessment and
Ongoing Monitoring
22
AML/CFT Handbook Part 3 Risk Assessment and
Ongoing Monitoring
3.1.4 The reliance which is placed on any third parties for elements
of the CDD collected
23
AML/CFT Handbook Part 3 Risk Assessment and
Ongoing Monitoring
The relevant person should assess the use of developing technologies for both new
and pre-existing products such as:
For completeness, the assessment should consider the operational risks, reputational
risks and legal risks posed by the use of new technologies in the context of ML/FT.
Appropriate action should be taken to mitigate the risks that have been identified.
Also, the rapid pace of technological change carries risk in itself. For
example, staff may not fully understand the nature of new technology,
resulting in operational problems with new or updated systems. Channels for
distributing software updates could pose risks in that criminal or malicious
individuals could intercept and modify the software.
It will have to be considered whether any of the factors above would have
any impact in relation to the relevant person continuing to meet the AML/CFT
requirements.
24
AML/CFT Handbook Part 3 Risk Assessment and
Ongoing Monitoring
It is recognised that where relevant persons are part of a larger group, the
parent may introduce new products, systems or procedures without input
from the Isle of Man based branch. It is important to note that this paragraph
of the Code requires that the business identifies and mitigates any risks
arising from the proposed system rather than places a moratorium on new
technologies.
It should be noted that the Authority has no objection to a relevant person having
higher risk customers, provided that they have been adequately risk assessed and
any mitigating factors have been documented. If the customer is assessed as
presenting a higher risk EDD must be obtained. Also, it should be noted that where a
customer is assessed as posing a higher risk certain concessions within the Code no
longer apply. This is explained further in Part 6 of this Handbook.
Paragraph 7 of the Code states that the customer risk assessment should have regard
to all risk factors including:
25
AML/CFT Handbook Part 3 Risk Assessment and
Ongoing Monitoring
(a) the business risk assessment carried out under paragraph 6 of the Code;
(b) the nature, scale, complexity and location of the customer’s activities;
(c) the persons to whom and the manner in which the products and services are
provided;
(d) reliance on third parties for elements of the CDD process; and
(e) whether the relevant person and the customer have met during the business
relationship or its formation or in the course of an occasional transaction.
Paragraph 15(4) of the Code sets out details of certain matters that must pose a higher
risk and paragraph 15(5) sets out details of those matters that may pose a higher risk.
These must all be considered as part of the customer risk assessment.
The following diagram sets out the basic risk assessment process:
1
• Collect information
2
• Assess & Evaluate
3
• Determine initial risk rating
4
• Collect additional information and documentation
5
• Assess & Evaluate
6
• Confirm risk rating
7
• Conduct ongoing due diligence
When assessing the risks posed by a customer, the relevant person should consider
all risk factors that are known and ensure that all of these factors are included into the
customer’s risk profile taking care that any mitigating factors are fully documented. A
relevant person must be able to objectively and reasonably justify a risk assessment
classification and document those justifications. The relevant person should also
ensure that its internal sign off procedure in relation to customer risk assessments is
appropriate.
The Authority would expect relevant persons to avoid a tick box approach when
assessing risks and consider each customer on a case by case basis, looking at any
risks they pose along with any mitigating factors. These factors should be documented
and details provided of how any risks identified are then mitigated. The Authority would
have no objection to templates or forms being used during the risk assessment,
however it should be carefully considered how these work, what the scoring system is
and how the score is reviewed / overridden. It should also be ensured that the score
only takes into account factors relevant to ML/FT.
26
AML/CFT Handbook Part 3 Risk Assessment and
Ongoing Monitoring
Where a customer has been identified as posing a higher risk of ML/FT and the
relevant person is not satisfied that it is able to effectively mitigate those risks, the
relevant person may consider the prospective customer to be of ‘unacceptable risk’
and decline from entering into a business relationship with or carrying out an
occasional transaction for that customer. Where such risks give rise to a suspicion of
ML/FT then an internal disclosure must be made.
Relevant persons may use their own categories of risk classifications provided that
they are able to demonstrate a correlation between their own categories and those
listed below.
Where a suitable certifier certifies the copy documentation and provides the
documentation (and/or other elements of CDD) to the relevant person itself
rather than returning it to the customer, this would be Introduced Business per
paragraph 10A of the Code.
28
AML/CFT Handbook Part 3 Risk Assessment and
Ongoing Monitoring
documentation. For Eligibly Introduced Business the relevant person can rely
on the Eligible Introducer to hold evidence of customer identity on its behalf
(subject to the conditions set out in paragraph 23 of the Code).
Whatever system of organisation is used, relevant persons must be able to relate the
additional Introducer and third party specific elements of the customer risk
assessment to the relevant customers and vice versa on an ongoing basis.
As with the standard customer risk assessment, this broader customer risk
assessment should be viewed as a living document that is revisited, reviewed and
amended so as to keep it up to date. The Introducer risk assessment and third party
considerations are not conducted in isolation but are integral to the customer risk
assessment. Consequently, information may come to light about the Introducer /
third parties when taking on an introduced customer that affects the relevant
person’s views on that customer and/or on previously introduced customers.
Conversely, relevant persons should be mindful that during the course of a customer
29
AML/CFT Handbook Part 3 Risk Assessment and
Ongoing Monitoring
relationship, information may come to light about the introduced customer that
affects the relevant person’s view of the Introducer and other third parties that are or
were involved in the customer introduction. This may have a ripple effect on other
customers introduced by that Introducer or with connections to those third parties.
The frequency, extent and depth of the broader customer risk assessment and
associated reviews, will depend on the relationship between the relevant person and
the Introducer / third parties. For example, the risk assessment for an Introducer
who only provides elements of CDD for a one off introduction and has no further
involvement in the customer’s dealings with the relevant person may never need to
be reviewed. Whereas the risk assessment for an Introducer who provides elements
of CDD for regular customer introductions may need to be reviewed more frequently.
This will need to be determined on a case by case basis and will be affected by the
information already held, previous risk assessments and new information arising
from later customer introductions.
30
AML/CFT Handbook Part 3 Risk Assessment and
Ongoing Monitoring
What the Introducer’s relationship with the customer is and whether that
relationship is longstanding and/or ongoing;
What the Introducer’s relationship with the relevant person is and whether that
relationship is longstanding and/or ongoing;
Other customers the Introducer has introduced to the relevant person (for
example, have there been any problems encountered with previously
introduced customers?);
Whether the introduction seems in line with the “usual” types / customer
profile/ pattern of customers they introduce?
What processes the Introducer goes through when introducing customers and
whether / how these processes change according to the particular
circumstances (for example, does the Introducer meet all of the proposed
customers or only some of them?);
The quality of CDD obtained in respect of previous introductions.
(b) Indicate whether the introducer has met the customer, and if not identify
any third party that has met the customer
The primary aim of undertaking CDD is to establish that the customer is who they
say they are. Where a customer has not been met, the CDD paper trail may be
correct, but there is a risk that the CDD information / documentation is incomplete,
inaccurate and/or does not accurately reflect the customer and ultimately that the
customer is not who they claim to be. This may also be the case where the
customer has been met by an unreliable third party.
Where the relevant person has not met the customer, paragraph 15(5)(k) of the
Code lists this as a factor that may pose a higher risk of ML/FT. It is important that
the relevant person understands who exactly, if anybody, has met the customer, i.e.
whether this is the Introducer or another third party, and by what means the
customer has been met. In some cases a customer will not be met by the relevant
person, but also will not be introduced to the relevant person; the relationship will be
direct between the customer and the relevant person on a remote basis. There could
also be cases where the customer is introduced to the relevant person but the
Introducer does not meet the customer; in some cases the only person to meet the
customer may be the suitable certifier. Understanding who, if anyone, met the
customer is a vital part in the relevant person’s estimation of the ML/FT risk of the
introduced customer, whether there is a higher risk requiring enhanced CDD and the
extent of reliance to place on CDD provided by the Introducer, if at all.
Meeting a customer is not limited to in person face to face contact. It also includes
the use of visual communication mediums over the internet, such as full motion video
conferencing. The relevant person / Introducer or other third party must clearly see
the customer’s face and their image on a passport (or other acceptable means to
verify identity as per section 4.7.1) at the same time to demonstrate that the identity
31
AML/CFT Handbook Part 3 Risk Assessment and
Ongoing Monitoring
document actually belongs to the customer and the customer is who they claim to
be. A non-visual medium such as a telephone call does not qualify as meeting the
customer.
Paragraph 10A(3)(b) requires a relevant person to identify any third party that has
met the customer. To satisfy the requirement to identify in this context, it is not
necessary for the relevant person to undertake a full CDD process on every third
party. However, the relevant person needs to obtain enough information to
understand who the third parties are and what they do. Factors to consider include:
Where no one has met the customer, this should be considered as a relevant risk
factor in accordance with paragraph 15 of the Code. The relevant person should
consider whether there is a higher risk of ML/FT requiring enhanced CDD and
whether it is appropriate to place reliance on CDD provided by the Introducer or to
obtain that CDD directly from the customer.
Further guidance regarding whether the relevant person and the customer have met
can be found at section 3.3.6.
(c) Indicate whether third parties were involved in the process and if so –
Other third parties may not necessarily have been involved in the process of a
customer introduction to a relevant person.
Where other third parties are involved in the process of a customer introduction, it is
important that relevant persons understand their involvement, for example as part of
the conduit chain for the CDD information / verification and/or as someone who has
met the customer. This information is necessary in order for relevant persons to
32
AML/CFT Handbook Part 3 Risk Assessment and
Ongoing Monitoring
estimate the customer ML/FT risk, determine whether enhanced CDD may be
required and the appropriateness and extent of reliance on the CDD to be provided
by the Introducer, if at all.
To this end, the Code specifically requires the broader customer risk assessment to
indicate:
iii) Whether any third party was not a trusted person; and
Trusted persons (or in the case of a nominee company, the nominee’s parent) are
subject to AML/CFT requirements and are regulated or supervised for compliance
with those requirements either in the Isle of Man or in a List C jurisdiction.
Where a third party is not a trusted person, this may not be the case. They may not
be subject to AML/CFT requirements such as CDD gathering themselves or if they
are, they may not be subject to sufficient regulatory oversight to ensure that the CDD
they obtain is complete, accurate and trustworthy. Consequently, CDD channelling
through a non-trusted person may indicate a higher ML/FT risk and should be
treated cautiously.
iv) Whether any third party is in a jurisdiction which is for the time being
included in List A or List B.
Section 3.5 of the Handbook provides guidance on jurisdictional risk which is
relevant when considering third parties in the broader customer risk assessment. In
particular, any third party resident, located, or engaged in business activity in a
jurisdiction listed in List A must be treated as higher risk. Any third party resident,
located or engaged in activity involving a List B jurisdiction may pose a higher risk of
ML/FT.
33
AML/CFT Handbook Part 3 Risk Assessment and
Ongoing Monitoring
The Code (paragraph 10A(4)) requires that where the risk assessment indicates
higher risk the relevant person must undertake enhanced CDD on the customer per
paragraph 15 of the Code. This must include, but is not limited to, reasonable
measures to establish the source of wealth of the customer and any beneficial
owner. Section 4.3.5 provides guidance on undertaking enhanced CDD on the
customer. Guidance on establishing source of wealth is at section 4.14. Depending
on the specific circumstances behind the results of the risk assessment, this may
mean it is inappropriate to rely on CDD provided by the Introducer, and that CDD,
both standard and enhanced should be obtained directly from the customer. It may
also mean that it is inappropriate rely on the Introducer or other third party to have
met the customer and the relevant person should meet the customer itself.
Paragraph 10A(5) requires relevant persons to be satisfied that the CDD information
and any evidence produced complies with the Code and that there is no reason to
doubt the veracity of the documents produced to evidence the customer’s identity.
This means that there is no reason to doubt that the CDD documents provided by
the Introducer are genuine documents (or suitably certified copies of genuine
documents) corresponding to the introduced customer and that the information they
contain is accurate and complete.
Where a relevant person is not satisfied that this is the case in respect of CDD
provided by an Introducer, it is no longer appropriate to rely on the CDD provided by
the Introducer. Relevant persons must obtain the CDD (whether standard or
enhanced depending on the customer risk assessment) direct from the customer.
Furthermore, relevant persons must consider whether it is necessary for them to
meet the customer themselves, rather than relying on the Introducer or another third
party to have met the customer.
34
AML/CFT Handbook Part 3 Risk Assessment and
Ongoing Monitoring
The Code makes reference to both those customers presenting a higher risk
of ML/FT and to those customers that have not been identified as posing a
higher risk which are referred to in this Handbook as “standard risk”
customers. The Authority recognises that there may be exceptional
circumstances where a relevant person considers a particular customer as
presenting a lower risk of ML/FT than those customers assessed as standard
risk.
Lower risk should be limited to customers who do not present any high risk factors
(whether mitigated or not). Only customers that comply with all of the following factors
may be considered lower risk for the purposes of these verification concessions:
Natural person;
Local, resident and where the customer has been met;
Not High Net Worth;
Only dealing with low value transactions which would be described as standard
retail financial services;
No foreign business or personal interests;
Not cash based;
Not complex – no legal persons or arrangements such as trusts as asset
holding vehicles or part of more complex structures; and
No intermediary / introducer / agency involvement.
However, a customer’s compliance with all of the above factors does not necessarily
mean that a customer should be treated as lower risk. Where a relevant person
considers a customer to be a lower risk it must be able to objectively justify that the
customer presents a much lower than standard risk of ML/FT. This should be
considered on a case by case basis and should not be applied on a general basis (e.g.
blanket risk assessing all IOM resident customers or all children’s bank accounts as
lower risk).
If a relevant person wishes to classify a customer as lower risk for purposes other than
use of the verification concessions referred to above a customer risk assessment must
be undertaken as per paragraph 7 of the Code taking into account all relevant factors.
The requirements in the list above need not necessarily be met in such circumstances.
35
AML/CFT Handbook Part 3 Risk Assessment and
Ongoing Monitoring
A relevant person should consider its findings from its own business risk
assessment conducted under paragraph 6 of the Code. Any risk factors
which are identified by the business should be applied to the profile of the
customer.
As an example, the arms trade and the financing of the arms trade are
activities that pose multiple risks, such as:
The relevant person should compare the jurisdiction that the customer:
is resident in;
is located in; and
or is conducting business activity related to the lists below:
36
AML/CFT Handbook Part 3 Risk Assessment and
Ongoing Monitoring
Relevant persons should consider how the product will be delivered to the
customer and the extent to which this might increase the risk. Risks are likely
to be greater when the relationship has been established remotely (“non-face-
to-face”), or when it has been controlled remotely by the customer (“straight-
through” processing of transactions).
The highest risk products or services are those with high values and volumes;
those where significant or unlimited third party funds can be freely received;
or those where funds can regularly be paid to third parties without CDD on the
third parties being obtained.
Generally, any form of legal entity or related service that enables individuals
to divest themselves of ownership of property whilst retaining an element of
control over it, is vulnerable. Some examples include, but are not limited to
the following:
37
AML/CFT Handbook Part 3 Risk Assessment and
Ongoing Monitoring
3.3.5 The reliance which is placed on any third parties for elements
of the CDD collected
Where reliance is placed on a third party for elements of CDD, for example
introduced business or an eligible introducer relationship, the relevant person
must ensure that the identification information sought from the eligible
introducer (or other third party) is adequate and accurate. Relevant persons
should consider the extent of the information being provided by the third party
and also whether any third parties involved have met the customer.
3.3.6 Whether the relevant person and the customer have met
38
AML/CFT Handbook Part 3 Risk Assessment and
Ongoing Monitoring
In order to undertake such scrutiny a relevant person will need to know the
anticipated type, volume and value of activities prior to the business
relationship proceeding, in order to be able to monitor for differences and
fluctuations. These records relating to the customers should be kept up to
date.
5 Please note this is a typographical error in the Code and should state the customer’s business and
risk profile rather than the relevant person’s business and risk profile.
6 “Sanctions List” means the list of persons who are currently subject to international sanctions which
apply in the Isle of Man: this list is maintained by the Customs and Excise Division of the Treasury of
the Isle of Man.
39
AML/CFT Handbook Part 3 Risk Assessment and
Ongoing Monitoring
9(1)(a) a review of information held for the purpose of CDD to ensure that
it is up-to-date and appropriate (in particular where the
relationship poses a higher risk of ML/FT); and
9(1)(d) undertake appropriate scrutiny to determine whether the customer
is listed on the sanctions list.
40
AML/CFT Handbook Part 3 Risk Assessment and
Ongoing Monitoring
continue to build a profile of the customer, and will entail the ongoing
collection of CDD information.
This review must take account of the CDD and EDD obtained on the
customer, whether there have been any changes to the customer’s activity /
circumstances (e.g. has a customer who was not met at outset now been
met?). Where the basis of a relationship has changed the relevant person
should consider whether the risk rating of the customer needs amending and
carry out further CDD procedures to ensure that the revised risk rating and
basis of the relationship is fully understood. Ongoing monitoring procedures
must take account of these changes. If the risk changes significantly it should
be remembered that EDD may be required.
Relevant persons must ensure that any updated CDD information obtained
through meetings, discussions, or other methods of communication with the
customer is recorded and retained with the customer’s records. That
information must be available to the MLRO.
41
AML/CFT Handbook Part 3 Risk Assessment and
Ongoing Monitoring
Negative press is the term given to any negative information, whether alleged
or factual. This could be anything from an allegation of fraud by a disgruntled
former customer to an article in a newspaper relating to a criminal
investigation.
42
AML/CFT Handbook Part 3 Risk Assessment and
Ongoing Monitoring
Under paragraph 15 of the Code relevant persons must carry out EDD on
business relationships with customers that have been identified as posing a
higher risk of ML/FT. EDD includes giving consideration to what on-going
monitoring should be carried on.
For PEP and higher risk customers, relevant persons must consider:
A customer who is, or may be, attempting to launder money may frequently
structure his/her instructions in such a way that the economic or lawful
purpose of the instruction is not apparent or is absent entirely. When asked
to explain circumstances or transactions, the customer may be evasive or
may give explanations which do not stand up to reasonable scrutiny.
When faced with unreasonable customer instructions that lead the relevant
person to know or suspect ML/FT, the relevant person must make a
disclosure and also consider taking legal advice. The relevant person must
also contact the FIU prior to undertaking any such transactions for the
customer. Please see Part 7 of the Handbook for further information on
obtaining consent from the FIU and making a disclosure.
43
AML/CFT Handbook Part 3 Risk Assessment and
Ongoing Monitoring
instruments and BNIs there will likely be no clear audit trail and it may be
unclear where the funds have originated from.
Relevant persons should be especially robust when dealing with requests for
frequent or unusually large amounts of cash, monetary instrument or BNI by
customers, especially where the customer is resident in jurisdictions where
tax evasion is a known problem. Relevant persons should be vigilant for
explanations given by customers which do not stand up to scrutiny.
Where the relevant person has been unable to satisfy itself that the
transaction is legitimate activity, and therefore considers it suspicious, an
internal disclosure must be made.
A relevant person should also consider the ML/FT risks posed by jurisdictions not
included in the lists detailed below as there may be additional jurisdictions that pose a
higher risk to their particular sector or customer type. Relevant persons should take
into consideration typology reports for their business sector and their own experience
in the industry.
Any customer resident in, located in, or engaged in business activity in a jurisdiction
listed in List A must be treated as higher risk.
44
AML/CFT Handbook Part 3 Risk Assessment and
Ongoing Monitoring
LIST B – “the May-Be High Risk List” (a copy is provided at Appendix D(b))
List B specifies jurisdictions with strategic AML/CFT deficiencies or those considered
to pose a higher risk of ML/FT.
Any customer resident in, located in or engaged in activity involving a List B jurisdiction
may pose a higher risk of ML/FT. This means that the customer does not have to be
considered higher risk but the Authority would expect the relevant person to be able
to demonstrate why this higher risk factor did not result in the customer being classified
as higher risk.
45
AML/CFT Handbook Part 4 Customer Due Diligence
46
AML/CFT Handbook Part 4 Customer Due Diligence
4.1 Introduction
4.1.1 Definitions
For ease of reference some of the key terms from this part of the Handbook
are explained in this introductory section.
Know Your Customer (“KYC”)
KYC is a term used to describe the process of obtaining, retaining and using
information and documents about a customer to verify that they are who they
say they are.
CDD encompasses KYC but it goes further than knowing who your customer
is. It involves obtaining, documenting and using a broad range of information
relating to a customer relationship or an occasional transaction. Areas to be
considered include identity, address, source of funds and expected business
or transactional activity. Certain elements of this information must also be
verified. The term CDD also incorporates the ongoing monitoring of a
business relationship, including the due diligence information obtained, to
ensure it remains up to date and that the relationship is operating as
expected for that customer. CDD is required for all new or continuing
business relationships or occasional transactions.
EDD goes further than obtaining CDD. This involves considering whether
additional identification information needs to be obtained, considering
whether additional verification of identity is required, taking reasonable
measures to establish source of wealth (in addition to source of funds) of the
customer and beneficial owner and considering what ongoing monitoring of
this information should be undertaken. EDD is to be undertaken when a new
business relationship, occasional transaction, or a continuing business
relationship is assessed as posing a higher risk of ML/FT, or when unusual
activity is identified. When a suspicious activity is detected EDD should be
considered.
47
AML/CFT Handbook Part 4 Customer Due Diligence
Enhanced Monitoring
Robust CDD procedures are vital for all relevant persons because they:
help protect the relevant person and the integrity of the Isle of Man
financial and designated business sectors by reducing the likelihood of
relevant persons becoming a vehicle for, or victim of, financial crime;
assist law enforcement by providing available information on customers
or activities, funds or transactions being investigated;
constitute an essential part of sound risk management e.g. by providing
the basis for identifying, limiting and controlling risk exposures; and
help to guard against identity theft.
Inadequate CDD standards and controls can result in serious customer and
counterparty risks for relevant persons. Particularly in relation to reputational,
operational, legal and concentration risks, which can result in significant
financial cost to the business and potentially legal action being taken against
the relevant person.
48
AML/CFT Handbook Part 4 Customer Due Diligence
1. Cumulative approach:
CDD is generally a cumulative process with more than one document or data
source being required to verify all of the necessary components. The extent of
documentation and data which is required to be collected varies depending on
the customer’s risk rating. Relevant persons will need to be prepared to accept
a range of documents and data. However, relevant persons should be aware that
some documents are more easily forged than others.
2. Foreign documents:
Relevant persons should ensure that any key documents obtained as part of the
CDD process which are in a foreign language are adequately translated into
English, so that the true significance of the document can be appreciated. This
should be considered on a case by case basis as it may be obvious in certain
instances what a document is and what it means, however in other cases it may
not. If the decision is made not to translate a foreign document the relevant
person should document why it has not been translated and include a summary
of what they believe the document is. This should be appropriately signed off by
a staff member of appropriate seniority.
Where customers put forward documents with which the relevant person is
unfamiliar, either because of origin, format or language, the relevant person
should take reasonable steps to verify that the document is indeed genuine. This
may include contacting the relevant authorities. Consideration should be given
to the importance of the detail of the document. A copy of the translation of the
document should be obtained and kept with the original or copy document as
evidence.
3. Sanctions:
49
AML/CFT Handbook Part 4 Customer Due Diligence
9. Reporting suspicions:
50
AML/CFT Handbook Part 4 Customer Due Diligence
represent a lower risk of ML/FT, the minimum standard of CDD procedures in the
Handbook must be applied, as allowed for at section 4.6.1, 4.7.1 and 4.7.2.
Part 6 of the Handbook provides further detail on other Simplified CDD Measures
which may be permitted in certain circumstances.
There are additional Code requirements for any customer who is a Foreign PEP
(regardless of risk rating), or a domestic PEP who has been identified as posing a
higher risk of ML/FT. Information regarding the Code requirements for PEPs and how
to identify them is at section 4.16 of this Handbook.
51
AML/CFT Handbook Part 4 Customer Due Diligence
52
AML/CFT Handbook Part 4 Customer Due Diligence
Continuing business covers the scenario where new Code requirements are
introduced for existing sectors already subject to the Code requirements, and
also includes any business relationships held prior to AML/CFT requirements
53
AML/CFT Handbook Part 4 Customer Due Diligence
coming in for a particular business sector. It is anticipated this will only affect
a small number of relevant persons.
As per paragraph 11, if CDD has not already been obtained, or that which
was obtained is unsatisfactory (for example, because the CDD requirements
have been changed / enhanced since the original evidence was collected),
relevant persons must take steps to obtain satisfactory CDD. Where CDD
documentation obtained previously has subsequently expired a relevant
person does not automatically have to update this documentation.
The relevant person must keep records of any examination, steps, measures
or determination made and must, on request, make such findings available
to their competent authority or auditor.
the natural person who ultimately owns or controls the customer or on whose
behalf a transaction or activity is being conducted and includes but is not
restricted to:
54
AML/CFT Handbook Part 4 Customer Due Diligence
(a) in the case of a legal person other than a company whose securities
are listed on a recognised stock exchange, a natural person who
ultimately owns or controls (whether through direct or indirect
ownership or control, including through bearer share holdings) 25% or
more of the shares or voting rights in the legal person;
(2) in the case of any legal person, a natural person who otherwise
exercises ultimate effective control over the management of the legal
person;
(3) in the case of a legal arrangement, the trustee or other person who
exercises ultimate effective control over the legal arrangement; and
(4) in the case of a foundation, a natural person who otherwise exercises
ultimate effective control over the foundation;
Please note that the definition of beneficial owner in the Code differs from
the definition in the Beneficial Ownership Act 2017. The Beneficial
Ownership Act 2017 can be found here. The Authority has issued guidance
regarding the Beneficial Ownership Act 2017, which can be found here. This
part of the Handbook further explains some of the persons associated with
the customer that should be identified and their identity verified where
necessary. A relevant person must be satisfied it knows who the beneficial
owner of its customer is. Therefore where a person identified is not an
individual, it would be necessary to look through to the natural person(s) that
ultimately owns or exercises ultimate effective control of the customer.
The relevant person should consider whether any persons associated with
the customer that need to be ID&Vd would result in a higher risk rating for
that customer. This in turn may impact on the appropriateness of utilising any
simplified CDD measures for the customer and any associated persons as
explained in part 6 of the Handbook.
Where there is a change in any of the parties who are acting on behalf of a
customer or there is a change in beneficial ownership and control of a
customer, relevant persons should treat these persons as new relationships
and CDD requirements must be applied as required by paragraphs 10 and
13 of the Code.
55
AML/CFT Handbook Part 4 Customer Due Diligence
This is intended to ensure that any persons who your customer is acting
for, or on behalf of, are appropriately ID&Vd.
(a) verify that any person purporting to act on behalf of the customer
is authorised to do so;
56
AML/CFT Handbook Part 4 Customer Due Diligence
(b) identify that person and take reasonable measures to verify the
identity of that person, using reliable, independent source
documents;
57
AML/CFT Handbook Part 4 Customer Due Diligence
(f)
Persons exercising control over the management and having power to
direct the activities of a customer that may not deemed to be a
controller, or one of the parties referred to in (c) or (d) of this list such
as any remaining directors, persons with Powers of Attorney or account
signatories.
This may include structure charts and lists detailing the persons as
described above plus details of the group’s structure and any
connected entities as appropriate.
(i) Paragraph 13(5) of the Code requires that the relevant person
must not, in the case of a customer that is a legal person or legal
arrangement, make any payment or loan to a beneficial owner of
that person or beneficiary of that arrangement unless it has
58
AML/CFT Handbook Part 4 Customer Due Diligence
The relevant person must be satisfied with the CDD obtained before
making a payment to a third party. Instances include, but are not limited
to:
making a loan to a third party;
repaying a liability or loan on behalf of a beneficiary or beneficial
owner; or
paying an invoice on behalf of a beneficiary or beneficial owner.
Also, in the event of an unusual activity, EDD must be carried out to allow
further scrutiny of the activity, and if appropriate consideration given to
making an internal disclosure.
7 For the purposes of this paragraph “arrangement” is a collective terms which refers to a loan,
distribution, payment or similar transfer to a beneficiary. A “beneficiary” means the person who
will benefit from the arrangement in question rather than to the beneficiary of a legal arrangement.
59
AML/CFT Handbook Part 4 Customer Due Diligence
EDD procedures for new customers that are assessed as posing a higher
risk or ML/FT must be undertaken before or during the formation of that
relationship. There is no concession to delay the timing of obtaining the
identity information and verification of this.
If sufficient CDD and / or EDD is not obtained, the business relationship and
transaction is to proceed no further and the relevant person should consider
making an internal disclosure.
However, very exceptionally, where there is little risk of ML/FT occurring, the Code
allows at paragraph 10(4) for the verification of identification to be carried out after the
formation of a business relationship (this does not apply to an occasional transaction)
provided that:
(b) it is essential not to interrupt the normal course of business; (e.g. securities
transactions where companies may be required to perform transactions very
60
AML/CFT Handbook Part 4 Customer Due Diligence
rapidly, according to the market conditions at the time that the customer is
contacting them, and the performance of the transaction may be required before
the verification of identity is completed);
(c) the customer has not been identified as posing a higher risk of ML/FT and
the risks of ML/FT are effectively managed;
(d) the relevant person has not identified any suspicious activity;
(f) the relevant person must appropriately limit and monitor transactions; such
procedures must include a set of measures such as a limitation on the number,
types and/or amount of transactions that can be performed and the monitoring of
large or complex transactions being carried out outside of norms for that type of
relationship. As an absolute minimum we would not expect a relevant person to
repay funds to the customer or a third party until the identification has been
verified.
Relevant persons must satisfy themselves that the primary motive for the use of this
concession is not for the circumvention of CDD procedures. The relevant person
should document the justification for the use of this concession.
The CDD process (including the requirements of paragraphs 10, 12, 13 and 15), once
begun, should be pursued through to conclusion within a reasonable timeframe. If a
prospective customer does not pursue an application, or verification cannot be
concluded within a reasonable timeframe and without adequate explanation, the
business relationship shall not proceed any further and the relevant person must
terminate that relationship and consider whether an internal disclosure should be
made.
61
AML/CFT Handbook Part 4 Customer Due Diligence
In the event that a relevant person is unable to obtain satisfactory CDD within
a reasonable period of time, paragraph 11(5) of the Code requires that the
business must proceed no further and consideration should be given to the
termination of that relationship and whether an internal disclosure should be
made.
(a) legal name, any former names (e.g. maiden name) and any other
names used;
(b) permanent residential address including post code if possible;
(c) date of birth;
(d) place of birth;
(e) nationality;
(f) gender;
(g) an official personal identification number or other unique identifiers
contained in an un-expired official document; and
(h) identification information relating to any underlying customers or
persons purporting to act on behalf of the customer.
62
AML/CFT Handbook Part 4 Customer Due Diligence
63
AML/CFT Handbook Part 4 Customer Due Diligence
2) Verification of addresses:
(i) registered office address/business address; and
(ii) address of the principal place of business where this is different to
the registered office/business address.
8 The Authority would suggest that a risk based approach is taken and nationality is verified wherever
it is practical to do so. Nationality should always verified in the case of a higher risk customer.
64
AML/CFT Handbook Part 4 Customer Due Diligence
2) Verification of addresses:
(i) the mailing address(es) of trustee(s) (or other person controlling the
applicant)
In both higher and standard risk cases it is also expected that the relevant
person should obtain a list of (but not necessarily obtain full identification
information on or verify the identity of) all directors. A copy of the register of
directors would be sufficient for this. This information is important when
conducting the customer’s risk assessment in order to determine whether
there are any higher risk persons or PEPs associated with the customer.
For standard risk businesses, we would expect to see that those persons
with whom the relevant person has frequent interaction with or takes
instructions from (be they directors or signatories) to be ID&Vd (subject to a
minimum of 2 of the individuals).
In the case of a higher risk entity, we would usually expect a relevant person
to ID&V all of the directors and the signatories. Where this may be
impractical, for instance with a large multinational company, or a large
international charity, the relevant person should use a risk based approach
and should ID&V as many directors and signatories as is practical
documenting the rationale behind not obtaining all of them. As a minimum it
is expected that local directors and signatories or those from whom the
relevant person is accustomed to receiving instructions should be ID&Vd.
In exceptional cases, where none of the fully ID&Vd third parties are available
and in order not to disrupt essential business, another person from the list
may act as a signatory, on condition that they are fully ID&Vd as soon as
reasonably practical after the event, the customer has not been identified as
posing a higher risk of ML/FT, the risks of ML/FT are effectively managed,
the relevant person has not identified any suspicious activity, senior
management approval is obtained for this activity until adequate verification
of identity is received and the relevant person appropriately limits and
monitors the transactions.
65
AML/CFT Handbook Part 4 Customer Due Diligence
Where there are a large number of potential third parties, such as staff
members at a certain company, the Authority would expect the relevant
person to obtain a list of the names and accompanying signatures of all
potential third parties and fully ID&V those third parties that are expected to
exercise control.
In exceptional cases, where none of the fully ID&Vd third parties are available
and in order not to disrupt essential business, another person from the list
may act as third party, on condition that they are fully ID&V’d as soon as
reasonably practical after the event, the customer has not been identified as
posing a higher risk of ML/FT, the risks of ML/FT are effectively managed,
the relevant person has not identified any suspicious activity, senior
management approval is obtained for this activity until adequate verification
of identity is received and the relevant person appropriately limits and
monitors the transactions.
In exceptional cases, where none of the fully ID&V’d third parties are
available and in order not to disrupt essential business, another person from
the list may act for the entity, on condition that they are fully ID&V’d as soon
as reasonably practical after the event, the customer has not been identified
66
AML/CFT Handbook Part 4 Customer Due Diligence
as posing a higher risk of ML/FT, the risks of ML/FT are effectively managed,
the relevant person has not identified any suspicious activity, senior
management approval is obtained for this activity until adequate verification
of identity is received and the relevant person appropriately limits and
monitors the transactions.
Where hard copy documents are used these should be suitably certified for non-face-
to-face customers, where electronic documents are submitted appropriate measures
should be taken to verify their authenticity.
67
AML/CFT Handbook Part 4 Customer Due Diligence
Bearing photograph of
the individual
In such circumstances the relevant person should adopt a case by case approach in
determining what methods they will accept to verify the customer’s identity.
The relevant person should clearly document why they have been unable to verify the
customer’s identity using the methods listed above, what alternative measures they
have taken to verify their customer's identity and why they feel that this is sufficient to
satisfy the requirements of the Code. Senior management approval should be
obtained for all such cases.
9Please note that a driving licence does not always verify nationality therefore care must be taken to
ensure appropriate verification of nationality takes place for the customer if required. A further
document may need to be obtained from the customer to ensure nationality is verified where
necessary.
68
AML/CFT Handbook Part 4 Customer Due Diligence
International Drivers Permits can be genuine documents, but only when issued by
competent national authorities to the holder of a valid domestic driving permit (i.e.
national full driving licence) issued for use in the country of residence. The permit
effectively converts a national licence into one for international use in other countries
where the national licence is not recognised. An International Drivers’ Permit is not a
stand-alone document.
Table 1 below sets out the standard acceptable methods for verifying a
natural person’s address (this applies regardless of risk). Table 2 sets out
alternative verification methods that may be considered. However this should
only be used where the standard methods are not possible rather than as
default methods.
69
AML/CFT Handbook Part 4 Customer Due Diligence
Where the suggested validation checks are unable to be undertaken the relevant
person should use a cumulative approach to ensure they are comfortable with the
verification of the customer’s address. This should be clearly documented explaining
alternative measures they have taken to verify their customer's address and why they
feel that this is sufficient to satisfy the requirements of the Code. Senior management
approval should be obtained for all such cases.
70
AML/CFT Handbook Part 4 Customer Due Diligence
2 Tenancy agreement
Lower risk & face-to-face
3 Checking a phone directory only
71
AML/CFT Handbook Part 4 Customer Due Diligence
Where hard copy documents are used these should be suitably certified for non-face-
to-face customers, where electronic documents are submitted appropriate measures
should be taken to verify their authenticity.
72
AML/CFT Handbook Part 4 Customer Due Diligence
At least one from this section, ensuring that the identity, address and legal status are
verified.
Method What does this Conditions
verify?
1 Certificate of Incorporation ID Must be either a certified
Memorandum & Articles of copy or sourced directly
Association (or equivalent) from an independent
public registry
2 Bank statement or utility bill Address No more than 6 months
old. Received by the
customer in the post
3 Latest Annual Return ID and Address Must be in date and
sourced directly from an
independent public
registry in an equivalent
jurisdiction
4 Audited financial statements All Must be audited and
which displays the company signed by the auditor
name, directors and registered (photocopies or
address documents sourced from
an independent public
registry are acceptable)
5 Prepared accounts by a reporting All Must be signed by the
accountant which displays the reporting accountant
company name, directors and
registered address
6 Conducting and recording an All None
enquiry by a business information
service, or an undertaking from a
reputable and known firm of
lawyers or accountants
confirming the documents
submitted
7 Undertaking a company registry Legal Status Company registry must
search, including confirmation be in an equivalent
that the institution has not been, jurisdiction
or is not in the process of being
dissolved, struck off, wound up or
terminated
PLUS… on a risk based approach, consider the following additional checks…
1 Require payment for the product or service to be drawn from an account in the
customer’s name at a credit institution in an equivalent jurisdiction
2 Use independent data sources, including electronic sources
When documentation cannot be provided
The relevant person should clearly document why they have been unable to verify the
legal person’s identity using the methods listed above, what alternative measures they
have taken to verify the identity and why they feel that this is sufficient to satisfy the
requirements of the Code. Senior management approval should be obtained for all such
cases.
73
AML/CFT Handbook Part 4 Customer Due Diligence
Where hard copy documents are used these should be suitably certified for non-face-
to-face customers, where electronic documents are submitted appropriate measures
should be taken to verify their authenticity.
At least one from this section, ensuring that the identity, address and legal status of
the parties are verified as per 4.7 and 4.8 as appropriate.
Method What does this Conditions
verify?
1 Trust Deed (or relevant extracts Evidences the Must be a certified copy
of the trust deed) and any formation of
subsequent deeds of the
appointment and retirement (or arrangement
equivalent). and confirms
that the
persons in
question are
the trustees (or
equivalent) of
the
arrangement.
2 Bank statement (if applicable) Trustees No more than 6 months
Mailing old
Address Received by the
customer in the post
PLUS… on a risk based approach, consider the following additional checks…
1 Require payment for the product or service to be drawn from an account in the
customer’s name at a credit institution in an equivalent jurisdiction
2 Use independent data sources, including electronic sources
3. Consider obtaining sight of the letter of wishes, or other relevant documents of
the trust, to confirm the beneficiaries / potential beneficiaries to the trust.
When documentation cannot be provided
The relevant person should clearly document why they have been unable to verify
the person’s identity using the methods listed above, what alternative measures they
have taken to verify the identity and why they feel that this is sufficient to satisfy the
requirements of the Code. Senior management approval should be obtained for all
such cases.
74
AML/CFT Handbook Part 4 Customer Due Diligence
The certifier should sign and date the copy document (printing his/her name clearly in
capitals underneath) and clearly indicate his/her position or capacity on it and provide
contact details. The certifier should check the photograph represents a good likeness
of the customer and should also state that it is a true copy of the original. There is no
exact wording that has to be used, however the relevant person should ensure it
covers the aforementioned areas.
The certifier may complete a covering letter or document, which is then attached to
the copy identification document(s) i.e. the certification is not written on the copy
identification document itself as long as the covering document contains the
information specified in the paragraph above, and it is clear in the letter itself that it
refers to the attached document.
In order to comply with the Code, relevant persons should satisfy themselves as to the
suitability of a certifier based on the assessed risk of the business relationship and the
reliance to be placed on the certified documents. In determining the certifier’s
suitability, a relevant person may consider factors such as the stature and track record
of the certifier, previous experience of accepting certifications from certifiers in that
profession or jurisdiction, the adequacy of the AML/CFT framework in place in the
jurisdiction in which the certifier is located and the extent to which the AML/CFT
framework applies to the certifier.
Relevant persons should ensure that any certified documents they have received are
accurate and up-to-date. In any circumstance where a relevant person is unsure of the
authenticity of certified documents, or that the documents actually relate to the
customer, a cumulative approach should be taken and additional measures or checks
75
AML/CFT Handbook Part 4 Customer Due Diligence
undertaken to gain comfort. If still unsatisfied with the verification of identity or address
the business relationship must proceed no further, the relevant person must terminate
the business relationship and consideration be given to making an internal disclosure.
Please see part 8.4 of this Handbook for details of the record keeping requirements in
relation to these documents.
Below are some examples of electronic documentation that could be accepted, please
note this is not an exhaustive list:
2. A scanned copy of a certified document i.e. where a document has been certified
in hard copy and is then scanned and emailed to the relevant person.
Please see part 8.4 of this Handbook for details of the record keeping requirements in
relation to these documents.
76
AML/CFT Handbook Part 4 Customer Due Diligence
Independent electronic data sources can provide a wide range of confirmatory material
without involving a customer and are becoming increasingly accessible. However, an
understanding of the depth, breadth and quality of the data accessed will be important.
The sources that are often used by electronic systems include the passport issuing
office, driving licence issuing authority, companies registry, the electoral roll and other
commercial / electronic databases.
1. uses a range of positive information sources that can be called upon to link a
customer to both current and historical data;
2. accesses negative information sources such as databases relating to fraud and
deceased persons;
3. accesses a wide range of alert data sources; and
4. has transparent processes that enable a relevant person to know what checks
have been carried out, and what the results of these checks are.
1. the source, scope and quality of the data are satisfactory. At least two matches
of each component of an individual’s identity or address should be obtained
(careful thought should be given to searching with variations on spelling of the
individual’s name); and
2. the processes allow the business to capture or store the information used to
verify identity and/or address.
Unless it is obvious from the product being provided, the following information should
be established to assist in meeting the Code requirements:
77
AML/CFT Handbook Part 4 Customer Due Diligence
In all situations:
Paragraphs 14 and 15 of the Code also state that relevant persons must take
reasonable steps to establish the source of wealth for higher risk customers (including
higher risk domestic PEPs) and all foreign PEPs and also when unusual activity
occurs.
Source of funds will sometimes be a bank account that can be directly related to the
customer. Where this is not the case, for example when third party funding is involved,
the relevant person may take a risk based approach and where appropriate make
further enquiries about the relationship between the ultimate underlying owner of the
funds and the customer and consider beneficial ownership requirements. In addition,
consideration must be given to verifying the identity of the identity of the ultimate
underlying owner, i.e. the provider of the funds.
78
AML/CFT Handbook Part 4 Customer Due Diligence
Where it appears that the customer is acting on behalf of someone else there is further
guidance relating to how to determine this under section 4.3.4 of the AML/CFT
Handbook.
Source of wealth is distinct from source of funds and describes the origins of a
customer’s financial standing or total net worth i.e. those activities which have
generated a customer’s funds and property. Information sufficient to establish the
source of income or wealth must be obtained for all higher risk customers (including
higher risk domestic PEPs) and all foreign PEPs and all other relationships where the
type of product or service being offered makes it appropriate to do so because of its
risk profile. This will also include where the product or service is not consistent with
the customer relationship.
Much international attention has been paid in recent years to the ‘politically
exposed person’ (“PEP”), with the Financial Action Task Force (“FATF”)
having produced a guidance document relating to PEPs. PEP risk refers to
the risks associated with providing financial and business services to those
with a high political profile or who hold public office. The increased risk stems
from the possibility of the PEP misusing their position and power for personal
gain through bribery or corruption. Family members and close associates of
PEPs may also pose a higher risk as PEPs may use family members and/or
close associates to hide any misappropriated funds or assets gained through
abuses of power, bribery or corruption. Investigations regarding proceeds of
corruption often gain publicity and can damage the reputation of both the
businesses and countries involved therefore it is important that a relevant
person takes their responsibility to identify PEPs seriously.
79
AML/CFT Handbook Part 4 Customer Due Diligence
Being a PEP does not mean that the individual should automatically be
classified as higher risk of ML. This is because a large percentage of PEPs
do not abuse their power nor are they in a position to abuse their power.
However, relevant persons should be aware that an individual who has been
entrusted with a prominent public function is likely to have a greater exposure
to bribery and corruption.
The risks relating to PEPs increase when the person concerned has been
entrusted with a political or public office role by a jurisdiction with known
problems of bribery, corruption or financial irregularity within their
government or society. The risk is even more acute where such countries
do not have adequate AML/CFT standards, or where they do not meet
financial transparency standards. Relevant persons should take appropriate
measures to mitigate those risks.
Foreign PEP – a PEP who is or has been entrusted with prominent public
functions outside the Isle of Man and any family members or close associates
of that person regardless of the location of those family members or close
associates.
80
AML/CFT Handbook Part 4 Customer Due Diligence
(a) a spouse;
(b) a partner considered by national law as equivalent to a spouse;
(c) a child or the spouse or partner of a child;
(d) a brother or sister (including a half-brother or half-sister);
(e) a parent;
(f) a parent-in-law;
(g) a grandparent; or
(h) a grandchild.
81
AML/CFT Handbook Part 4 Customer Due Diligence
In respect of all foreign PEPs and higher risk domestic PEPs, the relevant
person must:
Where a PEP has not been identified as posing a higher risk of ML/FT they
can treated like any other customer and the normal Code requirements
apply.
The requirements of paragraphs 14(2), (3) and (4) of the Code apply to all
foreign PEPs or domestic PEPs that have been assessed as posing a higher
risk. It is important to recognise that the definitions of domestic PEP and
foreign PEP are based on where the PEP’s prominent function relates to
rather than the residency of the individual.
82
AML/CFT Handbook Part 4 Customer Due Diligence
For the avoidance of doubt, where a PEP is not considered higher risk, the
reasons for this should be documented, and the individual must still be
identified as a PEP.
83
AML/CFT Handbook Part 4 Customer Due Diligence
The obligation to identify PEPs does not end once the customer relationship
has been established. Paragraph 9 of the Code requires a relevant person
to perform ongoing and effective monitoring of any business relationship.
Relevant persons should ensure that the procedures for identifying PEPs
and ongoing monitoring are clear regarding identifying if any individuals have
become PEPs since the business relationship was established.
There is also a common misconception is that PEPs who have immunity from
prosecution or conviction, such as Heads of State immunity in office for
actions committed prior to taking office or diplomats, are not subject to PEP
requirements. It is important to understand that this is not the case; having
knowledge of a PEP with immunity could lead to discovering information
used in a SAR which in turn could trigger an investigation into individuals
who do not have immunity.
The FATF has developed a list of indicators and red flags which can assist
in the detection of any potential misuse of the financial system by PEPs.
These red flags have not been developed to stigmatise all PEPs, rather they
are an aid to detect PEPs who are abusing the financial system. Matching
one or more red flags may only raise the risk of doing business with the
relevant PEP however in certain circumstances, matching one or more red
flags could lead to a direct money laundering or terrorist financing suspicion.
84
AML/CFT Handbook Part 4 Customer Due Diligence
The above is not an exhaustive list. Any decision to rate a PEP as lower risk
should have a clear rationale and be clearly documented.
Paragraph 3 of the Code states that a PEP is a natural person who is or has
been entrusted with a prominent public function, their family members and
close associates.
85
AML/CFT Handbook Part 4 Customer Due Diligence
by the fact that the PEP continues to deal with the same substantive
matters);
The level of inherent corruption risk in the jurisdiction of their political
exposure;
The level of transparency about the source of wealth and origin of funds;
and
Links to higher risk industries.
This risk based approach can also be used where a PEP is deceased but
this individual was the source of funds/source of wealth for family members
and close associates who have been identified as high risk domestic or
foreign PEPs. In such circumstances, an individual assessment should be
conducted to determine whether the relationship still merits EDD measures.
Whilst a risk based approach can be utilised once a PEP is no longer in the
prominent public function, it is important for a relevant person to understand
that a PEPs influence and prominence may not have diminished; PEPs in
prominent roles may continue to have influence and power after they have
left the role and thus be potentially more susceptible to bribery and
corruption. In addition, a PEP may have been in a position to acquire their
wealth illicitly when in the relevant role or function, therefore high level
scrutiny may be warranted once they are no longer a PEP. A relevant person
should be aware that the risks associated with PEPs are closely linked to the
inherent corruption risk of the jurisdiction in which they held the role, the
relevant role or function and the influence held during their post.
86
AML/CFT Handbook Part 4 Customer Due Diligence
87
AML/CFT Handbook Part 5 Specified Non-Profit Organisations
A “higher risk jurisdiction” is a jurisdiction which the business in the regulated sector
determines presents a higher risk of ML/FT or of proliferation having considered any
relevant guidance. The relevant guidance in this case would be the list maintained by
the Department of Home Affairs on its website which is replicated at Appendix D of
this Handbook.
Please refer to the sector guidance for further detail of requirements specific to the
activities of SNPOs.
88
AML/CFT Handbook Part 5 Specified Non-Profit Organisations
89
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
6.1 Introduction
The FATF’s Recommendations allow for jurisdictions to permit simplified CDD
measures under certain conditions such as where lower risks are identified. They state
that jurisdictions should understand that the discretion afforded and the responsibility
imposed on relevant persons by the risk based approach is more appropriate in
sectors with greater AML/CFT controls and experience. It also states that this should
not exempt relevant persons from the requirement to apply EDD measures where
higher risks are identified.
90
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
There are 3 main concessions detailed within Part 6 of the Code “Simplified Customer
Due Diligence”:
Eligible Introducers;
Acceptable Applicants; and
Persons in a regulated sector acting on behalf of a third party (“acting on behalf of”);
Each of these will be discussed in detail later in this part. Below is a table which
summarises the fundamental differences between the 3 main concessions:
10 Prior to the Code being amended in 2018 paragraph 23 also included details of the “non-eligible
introducer” this is now covered in paragraph 10A of the Code and section 3.3A of this Handbook.
91
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
92
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
If there is suspicious
activity identified.
Written Terms of Yes – must contain the No – but need to Yes – must contain the
Business required? items listed in the Code. ensure that the items listed in the Code.
There is a template of the customer qualifies as There is an acting on
EI certificate and terms of an acceptable behalf of terms of
business at Appendix E applicant. business template at
of this Handbook. There is an acceptable Appendix G of this
applicant certificate Handbook.
template at Appendix F
of this Handbook.
Testing of their CDD Yes No Yes
procedures required?
93
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
Although the relevant person can rely on the eligible introducer to verify the
customer’s identity and hold this documentation, the ultimate responsibility
for ensuring CDD procedures are carried out and that AML/CFT
requirements are met remains with the relevant person. This includes the
requirement to undertake a customer risk assessment at paragraph 7 of the
Code.
(a) have identified the customer and the beneficial owner (if any) and
have no reason to doubt those identities;
See 6.2.5 of this Handbook for further detail on the disapplication of the EI
concession.
94
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
(e) have satisfied itself that the eligible introducer does not pose a
higher risk of ML/FT;
The risk assessment should consider the suitability of the CDD checks
being undertaken by the introducer (see part “g” below),
See 3.3A of this Handbook for details regarding the risk assessing of
introducers.
See 6.2.5 of this Handbook for further detail on the disapplication of the
EI concession.
(g) ensure that the procedures for obtaining evidence of identity from
the eligible introducer, and likewise that the eligible introducer’s
procedures are satisfactory and fit for purpose to obtain adequate
evidence of the identity of the customer;
95
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
(h) test that the procedures are effective by testing them on a random
and periodic basis no less than once every 12 months; and
Paragraph 23(8) of the Code requires the relevant person to test that
the procedures are compliant.
On a random and periodic basis (at least once every 12 months), the
relevant person should request details of any changes in the
aforementioned procedures and a copy of CDD on a sample of
customers which should include:
(i) take measures to satisfy itself that the introducer is not itself
reliant upon a third party for the evidence of identity of the
customer.
96
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
Paragraph 33(1) of the Code requires CDD to be retained for at least 5 years
from the end of the business relationship.
The relevant person may request copies in order to satisfy the requirement
to test the eligible introducer’s procedures or in relation to the appropriate
scrutiny of unusual activity, the investigation of suspicious activity or in
connection to a request from a competent authorities.
(g) inform the relevant person specifically of each case where the
eligible introducer is not required or has been unable to verify the
identity of the customer or the beneficial owner (if any); in such a
case -
97
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
Relevant persons can either put written terms of business in place with an
eligible introducer without EICs having to be produced for each customer or
a block of customers; or relevant persons can use EICs for each customer
or block of customers. Whichever format is used it must comply with the
requirements of the Code. Where one EIC is being used for a block of
customers a schedule should be added to the EIC listing the relevant
customers.
A template for an EIC which complies with the requirements of the Code for
a written terms of business is contained at Appendix E. The EIC at Appendix
E is intended as an example / template for relevant persons to use all, or
part, as they see appropriate and to tailor to their individual needs, design,
corporate style, identity etc.
98
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
The Authority recognises that some businesses may have designed their
own forms to obtain the relevant information. Provided all the relevant
information is collected these forms will be just as acceptable to use as the
example in Appendix E.
Where the customer has been assessed as posing a higher risk of ML/FT,
paragraph 15(3) of the Code disapplies paragraph 23(5) of the Code which
states that the verification documentation of the customer does not have to
be produced. Therefore, the relevant person has to ID&V the customer and
has to obtain the verification documentation, it cannot rely on the eligible
introducer to hold this. Also, as the customer has been assessed as posing
a higher risk paragraph 15(1) of the Code states that the relevant person
must obtain EDD in relation to the customer.
the eligible introducer must be located on the Isle of Man (or in Jersey or
Guernsey where the relevant person operates in these jurisdictions);
the conditions in section 6.2.2 of this Handbook must have been met;
the eligible introducer must not be considered higher risk by the relevant
person;
expired documents are not acceptable as verification of the identity of an
individual (relevant persons should not accept expired documents from
a direct customer as a form of identity verification); and
the eligible introducer must be able to confirm to the relevant person that
they are satisfied with the suitability of the certifier of the document(s).
99
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
Where the conditions detailed under 6.2.2 have not been met
100
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
6.3.3 AA Certificate
Relevant persons must obtain and retain documentation establishing that the
customer is entitled to benefit from the concession. An AA Certificate may be
used for this purpose. A template is provided at Appendix F of this Handbook.
11 For a stock exchange to be considered as “recognised” the entities listed on it must be subject to appropriate
disclosure requirements. For entities listed within Europe, this means regulated markets within the meaning of the
Directive on Markets in Financial Instruments 2004/39/EC (“MiFID”). For entities listed outside Europe, this means
regulated markets subject to disclosure requirements consistent with MiFID. For example, in the context of the
London Stock Exchange, this would include the Main Market but would not include the Alternative Investment
Market.
101
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
The person using the concession is referred to in this part of the Handbook
as the “regulated person”.
102
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
It may only be used where the customer is an “allowed business” defined as:
The Handbook uses this term “allowed business” to refer to the customer in
this part.
(a) the regulated person has satisfied itself that the customer
[allowed business] is a person specified in sub-paragraph 21(6) of
the Code;
103
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
(c) the customer [allowed business] has identified and verified the
identity of the underlying client in accordance with paragraphs 10
to 13 (or to AML/CFT requirements at least equivalent to those in
the Code) and has no reason to doubt those identities;
As per Code paragraphs 21(4) and 21(5) the regulated person must
take reasonable measures to satisfy itself that the customer’s
procedures are fit for purpose and include AML/CFT requirements that
are at least equivalent to the Code. One way to do this is by testing of
those procedures. When reviewing the customer’s procedures it should
be checked that they cover off how to identify and verify the underlying
clients in line with the Island’s AML/CFT requirements.
There must not be any higher risk underlying clients (as assessed by
the customer) in the arrangement. The relevant person must have
received appropriate confirmation from the customer of this. The
Authority would expect this to be in a written format. In relation to
existing relationships, where there may already be higher risk clients in
an arrangement, please see 6.4.4.1 for further details of action to be
taken.
104
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
(e) the regulated person and the customer [allowed business] know
the nature and intended purpose of the business relationship;
(g) neither the regulated person nor the customer has identified any
suspicious activity; and
(h) written terms of business are in place between the regulated person and the
customer [allowed business] in accordance with sub-paragraph (3);
The regulated person must put in place terms of business between themselves and
the customer [allowed business] as required under paragraphs 21(2)(h) and 21(3) of
the Code. The requirements of the terms of business are explained further under
section 6.4.4 of this Handbook.
And…
105
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
Paragraph 21(5) of the Code requires the regulated person to test that the
procedures are compliant. On a random and periodic basis (at least once
every 12 months), the regulated person should request details of any
changes in the aforementioned procedures and a copy of CDD on a sample
of underlying clients which should include:
the most recent copy of the allowed business’ risk assessment on the
underlying client along with any relevant supporting documentation or
information if available.
the identification information on the underlying client required by Part 4
of the Code and copies of the verification of that identification. And;
evidence that the record keeping requirements under paragraphs 32, 33
and 34 of the Code are being complied with. If the allowed business can
provide all of the above within 7 working days, this part would be deemed
to have been complied with.
If transactions are pooled before receipt by the relevant person and the
relevant person is therefore unable to identify an underlying customer by
name or by transaction size and date, the relevant person should request
information, such as a reconciliation, from their customer to assist in
identifying a test sample.
If the customer cannot provide this information, the rationale for this must be
documented and the relevant person must carry out alternate methods to
satisfy itself of the effectiveness of the terms of business. The relevant
person should review the CDD procedures of their customer and consider
speaking to their customer’s staff or conducting a visit to their premises for
further comfort.
Paragraph 21(3) of the code states that there must be a written terms of
business in place which requires the allowed business to:
12 Where the manager or administrator of the scheme is a regulated person, or where the scheme is an
equivalent scheme in a jurisdiction in List C where the manager or administrator falls within the definition
of external regulated business.
13 Except for an entity conducting activities equivalent to either or both of Class 4 (corporate services)
106
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
This also includes where the regulated person may seek confirmation
that a named underlying client is in a pool. For example; where a bank
asks a TCSP whether an underlying client by the name of “Mr X” is, or
has been, in a pooled account operated by the bank for that TCSP.
Also, the regulated person may request copies in order to satisfy the
requirement to test the allowed business’s procedures or in relation to
the appropriate scrutiny of unusual activity, the investigation of
suspicious activity or in connection to a request from competent
authorities.
The underlying client(s) in the arrangement must not pose a higher risk
of ML/FT. If there are existing underlying clients that have been
assessed as high risk please see 6.4.4.1 for further details of the action
to be taken.
(d) inform the regulated person specifically of each case where the
customer [allowed business] is not required or has been unable
to verify the identity of an underlying client;
107
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
As set out in paragraph 21(8) of the Code, if the regulated person is unable to comply
with any of the provisions above, the concession no longer applies and the regulated
person must comply with part 4 of the Code.
Due to the Code amendment that took place in September 2018 there are a number
of significant changes to the requirements of the written terms of business mandated
by paragraph 21(3) of the Code. In particular, both the customer and the underlying
client involved in an acting on behalf of relationship are no longer permitted to be
higher risk. Also, customer due diligence information has to now be provided
immediately where the customer [allowed business] is a non-IOM regulated entity
(explained further at 6.4.4 of this Handbook).
In relation to any existing business relationships that utilise this concession it will take
time for relevant persons to update the terms of business that are currently in place. It
is expected that this must be done in line with the next scheduled review of that
particular relationship, or at the time a trigger event (e.g. unusual activity) occurs on
that relationship.
If the risk assessment indicates the customer poses a higher risk, the relevant person
must undertake enhanced due diligence of the customer in line with paragraph 15 of
the Code and the relationship must be monitored appropriately. If suspicious activity
occurs the concession no longer applies, also an internal disclosure must be made.
Where a customer is assessed as posing a higher risk, no new business relationships
should be entered into with that customer.
A risk assessment will also need to be undertaken on the underlying clients, the
customer must advise the relevant person of any higher risk underlying clients in any
existing relationships. Where any underlying clients in the arrangement are
determined as higher risk the underlying client’s funds may remain in the arrangement,
108
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
however there must be a clear mechanism in place by which to segregate these funds
of these underlying clients if requested to do so by law enforcement agencies.
Additionally, where any underlying clients are assessed as higher risk the relevant
person should gain ID&V for that underlying client from the customer.
For any new relationships established since the Code was amended in September
2018 there must not be any acting on behalf of relationships with higher risk customers
or underlying clients and the written terms of business issued must be in compliance
with the amended Code requirements as explained in this part of the Handbook. Also,
where the customer is a non-IOM entity, the customer due diligence information must
be obtained immediately as in accordance with the Code.
Where the allowed business has been identified as posing a higher risk
of ML/FT
109
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
Where the underlying client has been identified as posing a higher risk
of ML/FT
The concession may not be used where the underlying client has been
identified (by the allowed business) as posing a higher risk of ML/FT.
Procedures must be in place to ensure that CDD procedures are conducted in line
with the requirements of the Code in respect of occasional transactions. If satisfactory
CDD is not obtained the occasional transaction must not be carried out and the
relevant person must consider making an internal disclosure.
(a) €3,000 in the case of a transaction entered into in the course of business referred
to in paragraph 1(l) (casinos) or 1(n) (bookmakers) of Schedule 4 to the Proceeds
of Crime Act 2008; or
(b) €5,000 in the case of a transaction entered into in the course of business referred
to in paragraph 1(x) (bureau de change) or 1(z) (cheque encashment only) of
Schedule 4 to the Proceeds of Crime Act 2008; or
(c) €1,000 in the case of a transaction entered into in the course of business referred
to in paragraph 1(z) (money transmission services apart from cheque
110
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
Paragraph 12(5) of the Code disapplies the requirement to verify the identity of the
customer if the transaction is an exempted occasional transaction. The relevant
person must however comply with the other CDD requirements in paragraph 12 such
as knowing the identity of the customer, having relevant information about the purpose
and intended nature of the transaction and taking reasonable measures to establish
the source of funds. Requirements under other paragraphs also still apply such as
those in paragraph 7 (customer risk assessment), 13 (beneficial ownership and
control), 14 (politically exposed persons) and 15 (enhanced due diligence).
A relevant person should be vigilant at all times that the total of a series of linked
transactions does not exceed the exempted limits. Where the limits are exceeded, full
CDD procedures must be applied immediately. The Authority recognises the difficulty
in defining a timescale that linked transactions may fall within, and would recommend
three months is used as the minimum acceptable standard.
The purchaser may acquire the business or block of business for consideration or with
no consideration. In either circumstance paragraph 24(11) of the Code still applies and
the relevant person remains referred to as a “purchaser”
111
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
Where any of the conditions at 2 above are not met in respect of a customer (whether
alone or within a block of customers) being acquired (including where the purchaser
determines that the customer poses a higher risk of ML/FT) the concession at 24(11)
does not apply in respect of that customer and the purchaser must obtain its own CDD
on that customer. The concession may still be applied in respect of other customers
to be acquired in the same block where they meet the conditions.
Where there are deficiencies identified in the CDD information and verification
documentation the relevant person must determine and implement a programme to
apply CDD and verification procedures on each customer to remedy deficiencies as
soon as is practicable.
112
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
under the insurance Act 2008 for further details on these particular
concessions.
(a) may treat the employer, the trustee and any other person who has
control over the business relationship including the administrator or the
scheme manager, as the customer; and
(b) need not comply with the provisions of 13(2)(c) of the Code (the
requirement for relevant persons to identify and take reasonable
measures to verify the identity of any person on whose behalf the
customer is acting).
113
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
However, if certain conditions are met, paragraph 24(8) of the Code provides
a concession to the Code requirement at paragraph 13(2)(c). This
concession may be used where a relevant person’s customer is a collective
investment scheme (except exempt schemes), or an equivalent arrangement
in a jurisdiction in List C (Appendix C) of the AML/CFT Handbook and if the
manager or administrator of the scheme is a regulated person or a person
acting in the course of external regulated business carrying on equivalent
regulated activities in a List C jurisdiction.
Therefore, if these conditions are met the business does not have to comply
with paragraph 13(2)(c) and it can treat the collective investment scheme as
its customer, meaning it does not have to identify and verify the identity of
the underlying investors in the scheme.
The remaining provisions of the Code such as the requirement to conduct a
risk assessment, ongoing monitoring provisions etc. continue to apply.
Please refer to the Isle of Man Post Office specific guidance for further details
of this concession.
114
AML/CFT Handbook Part 6 Simplified Customer Due Diligence
(a) the relevant person has identified the customer (any beneficial owners) and has
no reason to doubt those identities;
(b) the customer has not been identified as posing a higher risk of ML/FT
(c) the relevant person knows the nature and intended purpose of the business
relationship;
(d) the relevant person has not identified any suspicious activity; and;
(e) the relevant person has identified the source of funds.
Certain businesses such as accountants and tax advisors may seldom “participate in”
financial transactions, albeit they will frequently advise on aspects of a financial
transaction, such advice would reasonably be assessed as generic designated
business.
Where a customer poses a higher risk of ML/FT as assessed by the customer risk
assessment the concession does not apply under 15(3) of the Code.
115
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
116
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
7.1 Introduction
Relevant persons have the opportunity to observe the day to day transactions of their
customers. Law enforcement agencies do not have unlimited resources to monitor
every transaction performed in the financial system by every individual or business but
do have access to confidential information relating to known or suspected criminals
and terrorists.
2. operationally,
Relevant persons can assist the authorities by ensuring that any reports they submit
and the records they keep refer to credible suspicions and are detailed enough to allow
the authorities to efficiently bracket individuals or businesses on their databases and
to establish audit trails of the suspects’ transactions.
117
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
(b) have a right of direct access to the directors or the managing board (as
the case may be) of the relevant person; and
(c) have sufficient time and resources to properly discharge the
responsibilities of the position,
Whilst not a requirement under the Code, the Authority would expect all
relevant persons to appoint an MLRO who is normally resident on the Island.
This is also a requirement for licenceholders subject to the FSRB under rule
8.21.
The principal objective of the MLRO is to act as the focal point within a
relevant person for the oversight of all activity relating to the prevention and
detection of ML/FT. The responsibilities of the MLRO will normally include:
118
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
(i) complex;
(ii) both large and unusual; or
(iii) of an unusual pattern.
Unusual activity also includes anything that causes the relevant person to
doubt the identity of the customer (including beneficial owners and
controllers or introducer where appropriate) or anything that causes the
relevant person to doubt the good faith of the customer (including beneficial
owners and controllers or introducer where appropriate).
119
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
(a) enable all its directors, management and all appropriate employees
and workers to know to whom they should report any knowledge or
suspicion of ML/FT activity;
(b) ensure that there is a clear reporting chain to the MLRO14;
(c) require reports to be made to the MLRO (“internal disclosures”) of
any information or other matters that come to the attention of the person
handling that business and which in that person’s opinion gives rise to
any knowledge or suspicion that another person is engaged in ML/FT
activity;
(d) require the MLRO to then consider these reports in the light of all other
relevant information available to determine whether or not it gives rise
to any knowledge or suspicion of ML/FT activity;
(e) ensure that the MLRO has full access to any other available information
that may be of assistance; and
(f) enable the information or other matters contained in a report (“external
disclosure”) to be provided as soon as is practicable the Financial
Intelligence Unit if the MLRO knows or suspects that another is
engaged in ML/FT activity.
The recording of internal and external disclosures are covered further in 7.2.6
of this Handbook.
14 By way of additional guidance the Authority would expect that a clear reporting chain would not allow for reports
to be filtered or delayed. Reports could be referred to supervisors or a technical expert for guidance but a staff
member must ensure if they have a suspicion the STR must be made in accordance with the Code and POCA.
120
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
Failure by the MLRO to diligently consider all relevant material may lead to
vital information being overlooked and the suspicious transaction or activity
not being externally disclosed to the FIU in accordance with the requirements
of the legislation. Alternatively, it may lead to vital information being
overlooked which may have made it clear that a disclosure would have been
unnecessary. As a result, the MLRO must document internal disclosures
made by employees to record the results of the assessment of each
disclosure.
Relevant persons must ensure that all employees are made aware of the
identity of the MLRO and his/her Deputy, and the procedure to follow when
making an internal disclosure report to the MLRO. Reporting lines should be
as short as possible with the minimum number of people between the
employee with suspicion and the MLRO. This ensures speed, confidentiality
and accessibility to the MLRO. All disclosure reports must reach the MLRO
without any undue delay. Under no circumstances should reports be filtered
out by supervisors or managers such that they do not reach the MLRO.
All suspicions reported to the MLRO must be documented (in urgent cases
this may follow an initial discussion by telephone). The report must include
the full details of the customer and as full a statement as possible of the
information giving rise to the suspicion.
The MLRO should acknowledge receipt of the internal disclosure and at the
same time, provide a reminder of the obligation to do nothing that might
prejudice enquiries i.e. tipping off the customer or any other third party.
121
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
Paragraph 28(2) requires the MLRO to make an external disclosure (in line
with their reporting procedures established under paragraph 26) as soon as
is practicable to the Financial Intelligence Unit if the MLRO-
Paragraph 35(2) of the Code states that the registers of internal and external
disclosures may be contained in a single document if the details included in
the registers can be presented separately for internal and external
disclosures upon request by a competent authority.
122
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
Illegal arms sales, smuggling, and the activities of organised crime, including
for example, drug trafficking and prostitution, can generate huge profits.
Embezzlement, insider trading, bribery and computer fraud schemes can
also produce large profits and create the incentive to "legitimise" the ill-gotten
gains through ML. When a criminal activity generates substantial profits, the
individual or group involved must find a way to control the funds without
attracting attention to the underlying activity or the persons involved.
Criminals do this by disguising the sources, changing the form, or moving
the funds or assets to a place where they are less likely to attract attention.
15Defined in the Code as all Isle of Man administrative or law enforcement authorities concerned with
AML/CFT, including in particular the Financial Services Authority, the Isle of Man Gambling Supervision
Commission, the Department of Home Affairs, the Economic Crime Unit of the Isle of Man Constabulary,
the Financial Intelligence Unit, the Office of Fair Trading, the Attorney General and the Customs and
Excise and Income Tax Divisions of the Treasury.
123
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
Placement: Where the proceeds of crime are placed into the financial
system.
Layering: Where funds are converted from one form to another, e.g.
moved between various accounts and/or jurisdictions to
disguise the audit trail and the illegitimate source of the funds.
Integration: Where funds that now appear legitimate re-enter the economy
for what would appear to be normal business or personal
transactions.
Usually, the focus of scrutiny for potential terrorist financing activity will be
the end beneficiary and intended use of the money or assets. A terrorist
financier may only need to disguise the origin of the property if it was
generated from criminal activity but in the vast majority of cases they will
seek to disguise the intended use i.e. the act of terrorism.
124
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
Like the traditional three phase model for money laundering, this model is
rather simplistic and outdated. Rather than getting caught up in trying to
establish whether activity relates to a particular phase of the traditional
model, the relevant person should ask themselves – “do I know, suspect or
have reasonable cause to suspect that the property in question is terrorist
property?”
Further detail on the ATCA offences including the ATCA definition of terrorist
property can be found at 7.4.2 of the Handbook.
125
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
126
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
2. practical - businesses that operate in the IOM and the UK should not have to
refer to different sanctions measures.
The sanctions lists relevant persons should refer to are those maintained by
HM Treasury’s Office of Financial Sanctions Implementation (OFSI):
127
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
More information about sanctions, import and export and trade controls can
be found on the Isle of Man Customs and Excise website. The Authority
recommend that all regulated entities sign up to the Isle of Man Customs and
Excise News RSS feed. Isle of Man Customs and Excise have a number of
notices and documents which may be of use to regulated entities, these
include:
Any funds should be blocked or frozen and the details reported to the FIU
using Themis.
128
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
If a relevant person knows or has ‘reasonable cause to suspect’ that they are
in possession or control of, or are otherwise dealing with, the funds or
economic resources of a designated person the relevant person must:
• freeze them;
• not deal with them or make them available to, or for the benefit of,
the designated person, unless:
o there is an exemption in the relevant legislation that you can
rely on;
o you have a licence;
• report them to the FIU.
An asset freeze does not involve a change in ownership of the frozen funds
or economic resources, nor are they confiscated or transferred to the
Treasury for safekeeping.
Any person, entity or body with information that would facilitate compliance
with the sanctions Regulation(s) must supply such information to the
Financial Intelligence Unit and co-operate in any verification of the
information
The Proceeds of Crime Act 2008 (“POCA”) clarifies the activities that
constitute ML and which need to be reported
129
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
(4) It is immaterial-
(a) who carried out the conduct;
(b) who benefited from it;
(c) whether the conduct occurred before or after the passing of
this Act.
...
The money laundering offences are set out in sections 139, 140 and 141:
140 Arrangements
130
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
Please note that in relation to the offences under 139, 140 and 141, there is
a de minimis threshold of £250 for deposit taking bodies only. This threshold
provides a defence to a ML offence but does not remove the requirement to
make an external disclosure.
142 Failure to disclose: regulated sector (and also see 143 Failure
to disclose: nominated officers in the regulated sector and 144
Failure to disclose: other nominated officers)
(5) The fourth condition is that the person does not make the required
disclosures to –
(a) a nominated officer; or
(b) the FIU;
131
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
(2) The matters are that the person or other person has made a
disclosure under this part (Part 3 POCA 2008) –
(a) to the Financial Intelligence Unit; or
(b) to a nominated officer.
Please see part 7.6 of this Handbook for further detail on tipping off.
1 Terrorism: interpretation
(1) In this act “terrorism” means the use or threat of action including
outside the Island) where –
(a) the action falls within subsection (2),
(b) the use or threat is designed to influence the government or
an international organisation or to intimidate the public or a
section of the public, and
(c) the use or threat is made for the purpose of advancing a
political, religious, racial or ideological cause.
132
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
(5) In this Act reference to action taken for the purposes of terrorism
includes a reference to action taken for the benefit of a proscribed
organisation**
...
- Explosive offences
- Biological weapons
- Offences against internationally protected persons
- Hostage-taking
- Hijacking and other offences against aircraft
- Offences including nuclear material
- Offences relating to aviation and maritime security
- Offences involving chemical weapons
- Terrorist funds
- Directing a terrorist organisation
- Offences involving nuclear weapons
- Conspiracy etc.
6 Terrorist Property
133
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
Note that the definition of terrorist property above includes property derived
from acts of terror in addition to those used for the purpose of terrorism.
Property could be derived from terrorism, for example, through the payment
of ransoms.
ATCA clarifies the activities that constitute FT and which need to be reported:
7 Fund raising
(1) A person commits an offence if he -
(a) invites another to provide money or other property, and
9 Facilitating funding
134
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
10 Money laundering
(4) The third condition is that he does not disclose the information or
other matter to the FIU or nominated officer as soon as is
practicable after it comes to him.
135
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
...
27 Disclosure of information to prejudice terrorist investigations
136
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
knowing or having reason to believe that his or her act has (or will have)
that effect.
(2) For this purpose a relevant act is an act that would constitute an
offence under any of the following provisions –
(a) section 1 of the Biological Weapons Act 1974 (offences
relating to biological agents and toxins) (of Parliament), as
that Act has effect in the Island.
(b) section 2 of the Chemical Weapons Act 1996 (offences
relating to chemical weapons) (of Parliament), as that Act has
effect in the Island; or
(c) section 49B (use etc. of nuclear weapons)
...
You should note, however, that unlawful acts relating to sanctions and
individuals, entities, organisations, countries and territories subject to
sanctions may also be breaches of export control law (see Notice 279 MAN),
trade control law (see Notice 279T MAN), the Proceeds of Crime Act 2008 ,
the Anti-Terrorism and Crime Act 2003 or other provisions in criminal law.
–
3 Interpretation
...
“designated person” means –
137
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
(2) No offence is committed if the person took all reasonable steps and
exercised all due diligence to ensure that the requirement would be
complied with.
...
(1) A person (“P”) must not deal with funds or economic resources
owned, held or controlled by a designated person if P knows, or
138
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
(1) A person (“P”) must not make funds or financial services available
(directly or indirectly) to a designated person if P knows, or has
reasonable cause to suspect, that P is making the funds or financial
services so available.
(1) A person (“P”) must not make funds or financial services available
to any person for the benefit of a designated person if P knows, or
has reasonable cause to suspect, that P is making the funds or
financial services so available.
139
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
(1) A person (“P”) must not make economic resources available to any
person for the benefit of a designated person if P knows, or has
reasonable cause to suspect, that P is making the economic
resources so available.
140
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
A freezing order may be issued where funds are suspected of being related
to terrorism. The order may prevent the financial institution from allowing a
person to withdraw from an account, honouring cheques, making payments
etc. The freezing order must include the provision for the financial institution
to request a licence to authorise a transaction. The order may include
requirements relating to the disclosure of information. A person commits an
offence if they fail to comply with the Order, if they engage in an activity that
would facilitate another person to commit the aforementioned offence or if
they fail to provide (or provide false) information or materials as requested
by them to assist with an investigation following the freezing order.
The nature and scale of the scrutiny required will vary greatly depending on
the type of activity, the risk factors involved and the size and scope of the
activity. Regardless of the methods adopted, it is essential that the
investigation and outcome are clearly documented. The consequences of
failing to do so are summarised in part 7.7 of the Handbook.
141
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
142
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
Below are some tips that should be borne in mind when conducting
‘appropriate scrutiny’
143
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
Unusual Activity
Detected
Business decision –
Maintain
relationship?
Conduct appropriate Monitor? Etc.
scrutiny of
transactions / activity
and obtain EDD
OK Still
Re-evaluate
unusual
Suspicious
Internal disclosure
to MLRO
Suspicious
Protected Authorised
disclosure to disclosure to
FIU (ATCA or FIU (POCA)
POCA)
144
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
In some cases restrictions such as legal professional privilege may still allow an entity
bound by such restrictions to provide sufficient information to allow the relevant person
to meet the requirements of the Code without breaching the restrictions. For example
a lawyer (bound by legal professional privilege) providing a bank with customer due
diligence in a pooled account or eligible introducer arrangement.
Under POCA and ATCA, a relevant person has to make a disclosure where
it knows or suspects ML/FT is attempted, or has taken place (sections
142/143 POCA / section 14 ATCA).
Please see part 7.7 of the Handbook for details on the potential
consequences for failing to implement effective suspicious activity reporting
procedures.
The reporting of a suspicion does not remove the need to report further
suspicions that arise subsequently in respect of that customer. If other
suspicious transactions occur, whether of the same nature or different to the
previous suspicion, these new suspicions must continue to be reported to
the MLRO/FIU as they arise. The requirement to report also covers situations
where the business or transaction has not proceeded and there is a suspicion
of ML/FT.
145
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
Failure to provide sufficient information to the FIU at the outset may hinder
the commencement or progress of an investigation by the authorities, and,
where consent has been sought to carry out a transaction, may result in a
“consent letter” being initially withheld or delayed.
146
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
The FIU may go back to the relevant person to request further information or
clarification in relation to the disclosure. Please note that if the relevant
person fails to cooperate with a request for additional information the report
may not be accepted as an authorised disclosure and action could be taken
by the FIU against the relevant person.
Relevant persons that routinely send copies of any disclosures to their Head
Office in the UK should note that where a disclosure contains any
investigable information, regardless of whether there is a UK connection, the
MLRO or nominated officer in the UK will be obliged under UK legislation to
pass on to the National Crime Agency (NCA) any copy of the disclosure that
he receives. It should be noted that the legal responsibility for reporting
suspicious transactions in the Isle of Man to the FIU rests with the Isle of Man
relevant person rather than with its Head Office.
(a) knowledge;
(b) suspicion; or
(c) reasonable grounds/cause for knowledge or suspicion
Knowledge:
Suspicion:
16 case law:
Da Silva (EWCA 1996)
Shah & Anor vs HSBC 2010
Commission for Corporate Affairs v Guardian Investments PTY Limited 1985
K Ltd vs Natwest Bank 2006
R vs ML [2009] crim.952
147
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
Further, as in cases such as Shah & Anor vs HSBC, this evidence may be
required to defend against civil action from the customer who is the subject
of an external disclosure.
The Act uses the above terms explicitly in relation to reporting requirements,
and also implies knowledge or suspicion as key criteria in certain clauses. It
is important for relevant persons to understand when these terms apply.
148
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
The FIU expects to see information included in each report which explains
the reasons why suspicion or knowledge has been established. Similarly if
an MLRO upon consideration concludes that a report need not be made, it
is important that a record of the decision not to report is made along with the
reasons why the report was not made.
Under the rules governing authorised disclosures, the discloser knows they
are performing a prohibited act. This gives them the status of an alleged
offender.
Depending on the timing of the transaction, the alleged offender has one of
three opportunities to obtain a defence using criteria specified in section 154:
(a) if the ML has yet to take place, a notification prescribed by section 155
of POCA and seeking consent under 151 can be made;
149
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
(b) if the ML is in progress AND the alleged offender didn’t know (or
suspect) the property was criminal property when the transaction was
started AND the alleged offender discloses of his/her own initiative,
then a notification in the format prescribed in section 155 can be made
and consent can be sought under section 151;
(c) if the ML has occurred AND the alleged offender has a reasonable
excuse for performing the prohibited act AND the alleged offender
discloses of his/he own initiative then a notification in the format
prescribed in section 155 and can be made and consent can be sought
under section 151 .
When seeking consent, the relevant person should locate and tick the
appropriate box on the disclosure form. On version 9 of the FIU form, this is
located at the foot of page 1 with the question, “Is this request for appropriate
consent as required by section 151 of The Proceeds of Crime Act 2008?”
Once consent has been obtained either directly from the FIU or by virtue of
the expiry of either the 7 working day period (the notice period) or the 31
elapsed day period (the moratorium period), the relevant person may
perform activity with the criminal property without committing an offence of
ML.
150
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
Please note that section 156(3) of POCA, states that the FIU may provide a
threshold for consent. This means that in exceptional circumstances, rather
than a simple “yes” or “no” to consent, a relevant person may be given
consent for transactions meeting certain requirements or under a certain
value limit.
The law does not specify an absolute time limit before a disclosure is made.
The timing of a disclosure is a subjective decision made by the MLRO or
other person making the report. Relevant persons must make the submission
a priority, whilst at the same time ensuring the disclosure itself is
comprehensive and meaningful. The Authority offers the following guidance
on what it deems to be “as soon as practicable” and what it deems to not be
“as soon as practicable”:
(The column on the left provides examples of justifiable situations that may
cause a delay in an external disclosure being made. The column on the right
provides examples of situations that are not justifiable to cause a delay.
151
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
- Further information is being gathered to assist - MLRO unavailable and no deputy appointed.
the FIU to identify a person or the whereabouts - No MLRO or deputy available (for example,
of criminal property. both persons on annual leave).
- The circumstances of suspicion are being - Confusion exists over the reporting
investigated to determine whether they constitute requirements.
grounds for disclosure. - An investigation into whether a report should
- The relevant person has received specific be made has stalled.
instructions from the FIU which must be - Workload is preventing reports from being
processed before the disclosure is submitted. made quickly enough and the relevant person
- Holidays and non-work days prevent the is chronically understaffed.
disclosure from being made. - All reports must be done manually and there is
- Ongoing discussions with the FIU are insufficient resource.
determining the format of the disclosure. - Internal sign-off by management is blocking
- Ongoing discussions with the FIU are reporting (note that relevant persons should
determining whether a disclosure is justified. ensure that MLROs are able to report directly
- The organisation is experiencing a disaster and to the FIU without interference from
systems are temporarily unavailable to the management).
MLRO and deputies. - The MLRO has multiple duties and other work
- The MLRO and deputies are unavailable under is preventing access to the MLRO workload.
extraordinary and unexpected circumstances. - Preferred channel (say internet or electronic
- A large number of cases where suspicious submission) not available and preference not
transactions may need to be processed has to report until preferred channel becomes
unexpectedly occurred and the relevant person’s available again.
systems are gearing up to handle them. (The
Authority would expect a dialogue between the
relevant person and the FIU in this instance).
- Legal advice is being sought on the correct
procedure for complying with the AML/CFT
requirements.
- The FIU are unavailable to receive the
disclosure.
152
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
need to understand if either of those actions are likely to constitute a tipping-off offence
by referring to the criteria below. The same criteria apply to asking the customer for
further information or documentation regarding any unusual activity.
In order to tip off, all three of the below criteria must be fulfilled:
If the answer is ‘no’ then no disclosure to an MLRO or the FIU should have
been made and it will therefore be impossible to commit an offence of tipping
off.
If the answer is ‘yes’ then a report to the MLRO and possibly the FIU will
need to be made, and in these cases, the relevant person will need to
consider the following points when interacting with its customer:
153
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
Relevant persons can reduce the potential threat of civil proceedings being
instigated by customers suspected of ML/FT for breach of contract, by
ensuring that the terms of business governing their customer relationships
specifically exclude breaches in such circumstances whereby following a
customer instruction may lead to the commission of a criminal offence.
154
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
Such back office functions may be for example the processing of account
opening documentation or the establishment of legal persons, albeit that the
account or client company may to be operated or administered by another
entity in another jurisdiction. In such circumstances, the AML/CFT rules and
regulations applicable to the processing of the application would be those of
the other jurisdiction.
In the event of a disclosure, relevant persons need to consider how they will
handle the relationship with the other entity. While it is inevitable that
suspicious transactions or suspicious attempted transactions do occur from
time to time, frequent disclosures or disclosures that appear to highlight
AML/CFT deficiencies by that other entity should be considered with a view
to re-evaluating the business relationship with that other entity.
The relevant person may wish to inform the other entity of the disclosure,
particularly where the other entity is part of the same corporate group. Whilst
each relevant person must decide their own position on this point, they
should approach such situations with caution, perhaps under legal advice
and remain mindful of the “tipping off” offence.
155
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
Code Breaches:
POCA/ATCA breaches:
For other offences such as those relating to information orders and freezing, please
refer to the legislation.
Sanctions breaches:
As detailed in part 7.3.5 of the Handbook there are various types of sanctions. The
offences and related consequences may vary. This table refers to the offences under
the Terrorist and Other Crimes (Financial Restrictions) Act 2014 (“TOCFRA”), which
primarily governs terrorism-related financial sanctions.
156
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
157
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
There are various proliferation related offences, please refer to the Terrorism and other
Crime Financial Restrictions Act 2014.
Civil Litigation:
Relevant persons should be mindful of the threshold for making an external disclosure
and avoid ‘defence reporting’ where no knowledge, suspicion or reasonable grounds
exists. A customer who is the subject of a disclosure may take civil action against you
if you have failed to comply with a transaction request and they have faced losses.
See section 7.6.4 for further detail on knowledge and suspicion.
The Authority’s General Licensing Policy (which can be found here) details the
Authority’s “fit and proper” person criteria. The “fit and proper” criteria applies to all
licence applicants and licenceholders, as well as persons acting or seeking to act as
controller, director, or “key person”. The “fit and proper” criteria cover integrity,
competence and solvency, both on initial license application, or vetting, and on a
continuous basis.
There are a suite of remediation, disciplinary and enforcement tools available to the
Authority under the FSA that could be used in cases where a relevant person has not
complied with the AML/CFT requirements including:
Individual:
o Section 11 Warning notice
o Section 10 Not fit and proper directions
o Section 10A Prohibitions
Firm:
o Fixed penalties
o Directions
o Licence conditions
o Licence suspension
o Skilled persons report
o Public notice
o Discretionary civil penalties
o Manager appointments
o Licence revocation
o Prosecution
158
AML/CFT Handbook Part 7 Unusual and Suspicious Activity
There are a suite of remediation, disciplinary and enforcement tools available to the
Authority under the DBRO Act that could be used in cases where a relevant person
has not complied with the AML/CFT requirements including:
159
AML/CFT Handbook Part 8 Compliance
Part 8 – Compliance
8.1 Monitoring
8.2 Staff Appointments
8.3 Training
8.3.1 Training requirements
8.3.2 Awareness of legislation and procedures
8.3.3 New employees
8.3.4 Customer facing staff
8.3.5 Training for management
8.3.6 Training for Money Laundering Reporting Officers (“MLROs”)
8.4 Record Keeping
8.4.1 Due diligence and transaction records
8.4.2 Electronically stored records
8.4.3 Retention of records
8.4.4 Training records
8.4.5 Format and retrieval of records
8.4.6 Responding to Production Orders
8.5 Registers
8.1 Monitoring
Paragraph 29 of the Code states that a relevant person must have appropriate
procedures to monitor and test the implementation and operation of all AML/CFT
procedures and controls. The nature and scale of this testing should be based on the
business risk assessment undertaken in accordance with paragraph 6 of the Code.
Any deficiencies should be remediated as soon as practicable. The effectiveness of
training for appropriate staff should also be monitored and tested on a regular basis.
If appropriate, having regard to the risk of ML/FT and the size of the business, the
board or senior management should commission a periodic report (the Authority would
expect this to be at least annually) from the MLRO (or Compliance Officer if appointed).
This report is to ensure that AML/CFT compliance is being undertaken to the required
standards and should specify the details of the compliance of the relevant person with
the Code.
1. the means by which the effectiveness of the relevant person systems, controls
and procedures have been managed and tested;
2. any significant compliance deficiencies identified and details of action taken or
proposed to address any such deficiencies;
3. details of any failures to apply the Isle of Man AML/CFT requirements in branches
and subsidiaries;
160
AML/CFT Handbook Part 8 Compliance
4. the number of internal disclosures to the MLRO and the number of subsequent
external disclosures submitted to the FIU, any perceived deficiencies in internal
or external reporting procedures, and the nature of changes proposed or
implemented to address any such deficiencies;
5. information concerning the training programme for the preceding year, which
staff have received training, the methods of training and the nature of the training;
6. changes made or proposed in respect of new legislation, regulatory requirements
or guidance;
7. a risk assessment of any new types of product or service, or new distribution
channels, and the proposed or implemented measures to counter ML/FT in line
with paragraph 8 of the Code;
8. the nature of actions taken in response to notices highlighting jurisdictions which
are the subject of international countermeasures, and the measures taken to
manage and monitor business relationships connected with such jurisdictions or
such jurisdictions that have been highlighted as posing a higher risk of ML/FT;
and
9. any recommendations concerning additional resource requirements to ensure
effective compliance with the relevant person’s statutory and regulatory
obligations.
The terms “appropriate employees” and “workers” are not unique to high level staff
such as MLROs, or Deputy MLRO’s and Compliance Officers (where appointed), it
may also include other members of staff such as customer facing staff where there
are ML/FT risks.
Relevant persons should document the steps taken to satisfy these requirements
including the information and confirmations obtained. Relevant persons should also
document where it has not been possible to obtain such information including the
reasons why this is the case.
161
AML/CFT Handbook Part 8 Compliance
8.3 Training
Successful AML/CFT strategies rely on effective communication of a relevant persons’
policies and procedures to prevent and detect ML/FT. Communication of these policies
and procedures and training in how to apply those procedures is key in ensuring
compliance with the Code.
This training must be provided at least annually and it should be ensured the
training being provided is up-to-date and keeps employees aware of
AML/CFT developments. The effectiveness of training provided should be
monitored.
Relevant persons should have a clear and well-articulated policy for ensuring
that their appropriate employees are:
162
AML/CFT Handbook Part 8 Compliance
Note that “Employee” and “Worker” are defined in the Code as:
163
AML/CFT Handbook Part 8 Compliance
The Authority expects that this training should be provided prior to them
becoming actively involved in day-to-day operations.
Employees and workers who are responsible for forming new customer
relationships, opening new accounts, forming new client entities or dealing
with new customers or occasional transactions should receive relevant
training in:
(1) the need to obtain satisfactory information and verification for all areas
of CDD including documentary evidence of the customer’s identity;
(2) the identification of unusual activity and the scrutiny of this activity;
(3) factors that may give rise to suspicions about a customer or client
entity’s activities;
(4) their obligation to make disclosures even if the transaction, activity or
business relationship does not proceed, in respect of both new and
existing business relationships; and
(5) the procedures to follow when a transaction, activity or attempted
transaction or activity is considered to be suspicious.
164
AML/CFT Handbook Part 8 Compliance
(1) offences and penalties arising from relevant primary legislation for non-
reporting or for assisting money launderers or those involved in terrorist
financing;
(2) procedures for dealing with Production and Restraint Orders;
(3) requirements for CDD including verification of identity and retention of
records; and
(4) in particular, the application of the relevant persons’ risk-based strategy
and procedures.
165
AML/CFT Handbook Part 8 Compliance
The role of the MLRO is critical. The MLRO acts as the final arbiter on
whether internal disclosures have substance and thus whether they should
form the basis of external disclosures to the Isle of Man FIU. The MLRO also
has an important record-keeping role and acts as the point of communication
with the competent authorities in relation to investigations and information
requests. MLRO training should therefore reflect the seriousness of the role.
Please see part 7.7 of this Handbook for a summary of the consequences
for failing to implement effective suspicious activity reporting.
To comply with the requirements of the Code the records prepared and maintained by
a relevant person should be such that:
166
AML/CFT Handbook Part 8 Compliance
167
AML/CFT Handbook Part 8 Compliance
11. whether the investments were held in safe custody by the business or
sent to the customer or to his/her order and, if so, to what name and
address;
12. activities of the client entity; and
13. any large item/exception reports created in the course of transaction
monitoring.
transaction records must be retained for at least five years from the date
when all activities relating to the transaction were completed;
CDD records must be retained for five years from the time of the
occasional transaction or the end of the business relationship;
where any reliance has been placed on a third party for elements of the
CDD process, relevant persons must ensure that the third party is aware
of the requirements under paragraphs 32 to 34 of the Code concerning
record keeping;
where an external disclosure has been made, or a relevant person knows
or believes that a matter is under investigation, the relevant person must
retain the records for as long as required by the constable or competent
authority; and / or
168
AML/CFT Handbook Part 8 Compliance
(a) if the records are in the form of hard copies kept in the Island, they must
be capable of retrieval without undue delay;
(b) if the records are in the form of hard copies kept outside the Island, they
must be available within 7 working days; and
(c) in the case of other records (e.g. copies kept on a computer system),
they must be readily accessible in or from the Island and capable of
retrieval without undue delay.
Paragraph 34(2) of the Code permits a relevant person to rely on the records
of a third party in respect of details of payments and transactions by
customers, if it is satisfied that the third party will produce copies on request.
Also, the third party must notify the relevant person if they are no longer able
to comply with this requirement.
169
AML/CFT Handbook Part 8 Compliance
8.5 Registers
Paragraph 35 and 36 of the Code require a relevant person to operate and maintain 3
registers:
(a) internal Disclosures – Paragraph 35 (1) (a) – see part 7.2.4 of this Handbook
(b) external Disclosures – Paragraph 35 (1) (b) – see part 7.2.5 of this Handbook
(c) ML and FT Enquiries – Paragraph 36 (1) – see part 7.2.7 of this Handbook
These registers must be readily accessible to Authority’s officers as these will usually
be examined during a supervisory visit.
Appendices I, J and K contain proforma registers which may be used as templates for
this purpose.
170
AML/CFT Handbook Part 8 Compliance
171
AML/CFT Handbook Part 9 Miscellaneous
Part 9 – Miscellaneous
9.1 Foreign Branches and Subsidiaries
9.2 Shell Banks
9.3 Correspondent Services
9.4 Fictitious, Anonymous and Numbered Accounts
Paragraph 37(1) of the Code requires an Isle of Man relevant person to ensure that
any branch or subsidiary in a jurisdiction outside the Island takes measures consistent
with the Code and guidance (including the AML/CFT Handbook) in any branch or
subsidiary outside the Island.
This is not intended to mean that the measures must mirror those of the Isle of Man in
every detail, rather, that the measures should be of an equivalent or consistent
standard to those in the Isle of Man. In such cases, a relevant person should consider
establishing a group AML/CFT strategy to protect its global reputation as well as its
Isle of Man business.
Where the law of the jurisdiction in which the branch is situated or the subsidiary is
carrying on business, imposes requirements and procedures that are lower than those
set by the Code and Handbook, the branch or subsidiary must apply the higher Isle of
Man standard as explained in paragraph 37(2) of the Code. Reporting procedures and
the offences to which the ML/FT legislation in the host country relates must be adhered
to in accordance with local laws and procedures.
In accordance with paragraph 37(3) of the Code relevant persons must advise the
Authority of any failure to apply the Isle of Man requirements in branches and
subsidiaries, including where legislation in place in any host country prevents
compliance that is at least in line with the Code. Additionally, where a host county
prevents compliance that is at least in line with the Code relevant persons should apply
appropriate additional measures to manage ML/TF risks. Relevant persons who have
informed the Authority of such a failure should follow any advice, recommendations or
directions the Authority or another competent authority provides as to the action to
take.
172
AML/CFT Handbook Part 9 Miscellaneous
The jurisdiction is unlikely to be able to exercise adequate supervision over the shell
bank’s compliance with AML/CFT requirements. In addition, within some jurisdictions,
the licensing requirements for shell banks have historically been weak, permitting
some shell banks to be operated by, or controlled by, individuals who are not fit and
proper to do so.
As required by paragraph 38 of the Code, relevant persons must not enter into or
continue relationships with shell banks. Relevant persons must also take adequate
measures to ensure that they do not enter into or continue a relationship with a
respondent institution that permits its accounts to be used by a shell bank.
Relevant persons must not enter into or continue correspondent relationships with
shell banks (see above re shell banks). In addition, relevant persons must be satisfied
that the respondent institutions with which they have a correspondent relationship do
not permit their accounts to be used by shell banks.
(a) obtain sufficient information about the respondent institution to understand fully
the nature of its business;
(b) determine from publicly available information the respondent institution’s
reputation and quality of supervision including whether it has been subject of a
ML/FT investigation or regulatory action;
(c) assess the respondent institution’s AML/CFT procedures and controls, and
ascertain that they are adequate and effective;
(d) obtain senior management approval, i.e. sign off before establishing new
correspondent relationships; and
(e) clearly understand and document the respective AML/CFT responsibilities of the
relevant person and the respondent institution with respect to measures to
prevent and detect ML/FT.
17The FATF requirements of Recommendations 10 and 11 are transpired in the AML/CFT Code at
paragraphs 10-15 (customer due diligence), 32-34 (record keeping) and 40 (anonymous accounts).
173
AML/CFT Handbook Part 9 Miscellaneous
Where numbered accounts exist, relevant persons must maintain them in such a way
that full compliance can be achieved with the Code, the FSRB and this Handbook.
Relevant persons must properly ID&V the customer in accordance with the Code and
be able to demonstrate compliance when requested by a competent authority.
In all cases, whether the relationship involves numbered accounts or not, the customer
identification and verification records should be available to the Compliance Officer,
MLRO, other appropriate staff and competent authorities.
174
AML/CFT Handbook Part 9 Miscellaneous
175
AML/CFT Handbook Glossary & Acronyms
‘Account’ usually refers to bank accounts but should be read as including other similar
business relationships between relevant persons and their customers.
‘Agent’ means any natural or legal person providing services to a customer on behalf
of a regulated or designated person, whether by contract or under the direction of a
regulated or designated person.
‘Allowed business’ is the customer of a regulated person using the 'acting on behalf
of' concession and must meet the criteria of 21(6) of the Code as detailed in section
6.4.2.
‘AML/CFT Code’ means the Anti-Money Laundering and Countering the Financing of
Terrorism Code 2015.
‘Appropriate scrutiny’ is the term used to describe the scrutiny of unusual activity
with the aim of determining whether the activity is in fact suspicious. Appropriate
scrutiny will involve comparing the unusual activity to the customer's profile and
expected activity and may require further investigation such as querying the source of
funds or rationale for the activity with the customer as detailed in section 7.5.1.
‘Beneficial owner’ has the same meaning as paragraph 3 of the Code (as detailed in
section 4.3.4.
176
AML/CFT Handbook Glossary & Acronyms
‘beneficiary’ (general) written with a lower case "b" means any person that receives
benefit from something.
‘Beneficiary’ (of a trust) means a person who is or may be entitled to the benefit of
a trust and includes fixed beneficiaries (who have a fixed entitlement) and
discretionary beneficiaries (whose entitlement is at the discretion of the trustees).
‘Blind trust’ means a trust in which the executors have full discretion over the assets,
and the trust beneficiaries have no knowledge of the holdings of the trust. Blind trusts
are generally used when a trustee wishes to keep the beneficiary unaware of the
specific assets in the trust, such as to avoid conflict of interest between the beneficiary
and the investments.
‘Code’ (the) means the Anti-Money Laundering and Countering the Financing of
Terrorism Code 2015.
‘Collective investment scheme’ has the meaning given in section 1 of the Collective
Investment Schemes Act 2008.
‘Competent authority’ means all Isle of Man administrative and law enforcement
authorities concerned with AML/CFT, including in particular the Isle of Man Financial
Services Authority, the Isle of Man Gambling Supervision Commission, the
Department of Home Affairs, the Financial Intelligence Unit, the Office of Fair Trading,
the Attorney General, and the Customs and Excise and Income Tax Division of the
Treasury.
‘Concentration risk’ means the probability of loss arising from heavily lopsided
exposure to a particular group of counterparties.
177
AML/CFT Handbook Glossary & Acronyms
‘Consent’ means consent of a nominated officer or of the FIU as provided for under
sections 151 and 152 of the Proceeds of Crime Act 2008.
‘Constable’ includes any officer appointed under section 1(2) of the Customs and
Excise Management Act 1986.
‘Constructive trust’ means a relationship by which a person who has obtained title
to property has an equitable duty to transfer it to another, to whom it rightfully belongs,
on the basis that the acquisition or retention of it is wrongful and would unjustly enrich
the person if he or she were allowed to retain it.
‘Co-trustee’ means a trustee of a trust when there is more than one trustee serving
at the same time, usually with the same powers and obligations. Occasionally a co-
trustee may be a temporary fill-in, as when the original trustee is ill but recovers. The
co-trustee must act in consultation with the other trustee(s), unless the language of
the trust allows one co-trustee to act alone.
‘Customer due diligence’ encompasses KYC but it goes further than knowing who
your customer is. It involves obtaining, documenting and using a broad range of
information relating to a customer relationship or an occasional transaction. Areas to
be considered include identity, address, source of funds and expected business or
transactional activity. Certain elements of this information must also be verified. The
term CDD also incorporates the ongoing monitoring of a business relationship,
including the due diligence information obtained, to ensure it remains up to date and
that the relationship is operating as expected for that customer. CDD is required for all
new or continuing business relationships or occasional transactions.
178
AML/CFT Handbook Glossary & Acronyms
‘Director’ and ‘Officer’ have the same meaning as paragraph 3 of the Code.
‘Domestic PEP’ means a natural person who is or has been entrusted with prominent
public functions in the Isle of Man and any family members or close associates of that
person, regardless of the location of those family members or close associates.
‘Dummy settlor(s)’ may be used in an attempt to disguise the identity of the real
settlor. This person would usually be a friend or a relative of the real settlor and his
would be the name which appeared on the face of the trust deed as ‘the original
settlor’, the person who initially established the trust. The only requirement was that
the dummy settlor provided the original trust fund which was usually a nominal amount,
thus perfecting the requirement of certainty of subject. The recitals would state that
other assets would be later transferred to the trustees. In this way, the real settlor could
add whatever assets he chose, without disclosing his identity. It would also be possible
for the real settlor to be appointed as the protector. The illusion of the dummy settlor
also allowed the real settlor to be recommended to the trustees in the settlor’s Letter
of Wishes. This would allow the real settlor to retain some element of influence over
the trustees, something which the settlor was not supposed to be able to do.
179
AML/CFT Handbook Glossary & Acronyms
‘Employee’ and ‘Worker’ have the same meaning as paragraph 3 of the Code.
‘Enhanced due diligence’ goes further than obtaining CDD. This involves
considering whether additional identification information needs to be obtained,
considering whether additional verification of identity is required, taking reasonable
measures to establish source of wealth (in addition to source of funds) of the customer
and beneficial owner and considering what ongoing monitoring of this information
should be undertaken. EDD is to be undertaken when a new business relationship,
occasional transaction, or a continuing business relationship is assessed as posing a
high risk of ML/FT, or when unusual activity is identified. When a suspicious activity is
detected EDD should be considered.
‘European Economic Area’ unites the EU Member States and the three EEA EFTA
States (Iceland, Liechtenstein, and Norway) into an Internal Market governed by the
same basic rules. These rules aim to enable goods, services, capital, and persons to
move freely about the EEA in an open and competitive environment, a concept
referred to as the four freedoms. For further information, refer to
http://www.efta.int/eea/eea-agreement.
‘External disclosure’ means a report made under paragraphs 26(1)(f) and 28 (of the
Code, as detailed in 7.2.5).
‘External regulated business’ means business outside the Island that is regulated
or supervised for AML/CFT purposes by an authority (whether a governmental or
180
AML/CFT Handbook Glossary & Acronyms
‘Fit and proper’ refers to the initial and ongoing test of a business or individual's
fitness and propriety in relation to carrying out a regulated activity.
‘Foreign PEP’ means a natural person who is or has been entrusted with prominent
public functions outside the Isle of Man and any family members or close associates
of that person, regardless of the location of those family members or close associates.
‘ID & V’ refers to establishing a customer’s identity and verifying that customer’s
identity. Identity includes; name, address, date of birth, nationality, place of birth,
gender, a personal identification number and any other identification information
relating to any underlying customers or persons purporting to act on behalf of the
customer. Verification refers to the verification of elements of the identification
information by using independent reliable sources, such sources may be obtained
from the customer such as a passport to verify the customer’s name.
181
AML/CFT Handbook Glossary & Acronyms
‘Independent source’ is a source that has no vested interest in a certain matter and
is therefore expected to describe the matter from a disinterested perspective.
‘Internal disclosure’ means a report made under paragraphs 26(1)(c) and 27 (of the
Code, as detailed in 7.2.4).
‘Introducer’ means any person who introduces a customer to a relevant person other
than an eligible introducer as defined above. Where customers are introduced to
relevant persons the relevant person must identify and verify the identity of the
customer themselves. However, the relevant person may request introducers to obtain
documentation from the customer and pass it to them. However, the relevant person
cannot rely on the introducer to have verified the information or documentation. The
introducer essentially acts as a facilitator between the relevant person and the
customer.
‘Key person’ is defined in the FSA and includes individuals with significant powers or
responsibilities in an IOMFSA Licenceholder. For the purposes of the Handbook, a
key person is a person that has significant powers and responsibilities within any
business in the regulated sector regardless of their status as a regulated business or
designated business.
‘KYC’ is short for "know your customer" and is the term used to describe the process
of obtaining, retaining and using information about a customer to verify that they are
who they say they are.
‘List A’ is a list maintained by the Department of Home Affairs on its website specifying
jurisdictions regarding which the FATF (or a FATF-style regional body) has made a
call on its members and other jurisdictions to apply countermeasures to protect the
international financial system from the on-going and substantial risks of ML/FT
emanating from the jurisdiction (as detailed in section 3.5).
‘List B’ is a list maintained by the Department of Home Affairs on its website specifying
jurisdictions with strategic AML/CFT deficiencies or those considered to pose a higher
risk of ML/FT (as detailed in section 3.5).
‘List C’ is a list maintained by the Department of Home Affairs on its website specifying
jurisdictions which are considered to operate CDD and record keeping requirements
182
AML/CFT Handbook Glossary & Acronyms
under their AML/CFT legislation at least equivalent to those of the Isle of Man (as
detailed in section 3.5).
‘Mitigation’ is the term given to determining the necessary controls or procedures that
need to be in place in relation to a particular part of the business in order to reduce
the risk identified.
‘ML/FT’ means money laundering and financing of terrorism, or both, and includes
attempted transactions in relation to ML/FT.
‘Money laundering’ means an act that falls within section 158(11) of the Proceeds of
Crime Act 2008 (as detailed in section 7.3.1 and 7.4.1).
‘Nominated officer’ means the natural person that has been appointed as the person
who may receive internal disclosures from colleagues. In the case of a regulated or
designated business, this would be the MLRO.
‘Nominee shareholder’ means the ostensible or registered owner who holds shares
(stock) on behalf of the actual owner (beneficial owner) under a custodial agreement.
‘Nominee company’ means a wholly owned subsidiary that complies with paragraphs
2.7 or 3.1 of Schedule 1 to the Financial Services (Exemptions) Regulations 2011 or
similar legislation in a jurisdiction in List C.
‘Non-profit organisation’ means a body corporate or other legal person, the trustees
of a trust, a partnership, other unincorporated association or organisation or any
equivalent or similar structure or arrangement, established solely or primarily to raise
or distribute funds for charitable, religious, cultural, educational, political, social or
fraternal purposes with the intention of benefiting the public or a section of the public.
183
AML/CFT Handbook Glossary & Acronyms
‘Ongoing monitoring’ is the term used to describe monitoring the conduct and
activities of any business relationship, this covers the entire relationship including
information held and transactions undertaken by the customer, as detailed in section
3.4.
‘Politically exposed person’ has the same meaning as paragraph 3 of the Code, as
detailed in section 4.16
‘Pooled client accounts’ exist where funds belonging to more than one person are
combined in a single account owned or controlled by a relevant person or their
customer. Examples include —
‘Production order’ is the legal term for using powers under POCA/ATCA (or other
legislation including Police Powers and Procedures Act 1998) to require the custodian
of documents to deliver or make available the documents to persons such as law
enforcement officials within a specified period.
184
AML/CFT Handbook Glossary & Acronyms
(a) any person holding a financial services licence issued under section 7 of the
Financial Services Act 2008;
(b) any person authorised under section 8 the Insurance Act 2008;
(c) any person registered under section 25 of the Insurance Act 2008;
(d) a retirement benefits schemes administrator registered under section 36 of the
Retirement Benefits Schemes Act 2000; or
(e) a person holding an online gambling licence issued under section 4 of the Online
Gambling Regulation Act 2001.
‘Restraint order’ is an order made under POCA which has the effect of freezing the
assets and bank accounts of the persons against whom it is directed, in consequence
of a belief by the authorities the assets concerned represent in whole or in part the
proceeds of crime
‘Risk’ - all references to risk refer to the risk of money laundering and terrorist
financing unless otherwise specified. Risk is the general term to describe threat,
likelihood and consequence.
185
AML/CFT Handbook Glossary & Acronyms
‘Senior management’ means the directors or key persons who are nominated to
ensure that the relevant person is effectively controlled on a day-to-day basis and who
have responsibility for overseeing the relevant person’s proper conduct.
‘Settlor’ in relation to a trust means and includes each and every person who, directly
or indirectly, on behalf of himself or on behalf of any other or others, as owner or as
the holder of a power in that behalf, makes a disposition of property to be held in such
trust or declares or otherwise creates such trust, and includes a person who assigns
property to a trust.
‘Signatory’ is a natural person who signs a document and is subject to it. Reference
to signatories in the Handbook means a person with signing authority over the affairs
of a customer unless otherwise stated.
‘Source of funds’ includes the immediate source of funds from which property has
derived e.g. a bank account in the name of Mr X.
‘Source of wealth’ is distinct from source of funds and describes the origins of a
customer’s financial standing or total net worth i.e. those activities which have
generated a customer’s funds and property.
‘Subsidiary’ means a company whose voting stock is more than 50% controlled by
another company, usually referred to as the parent company or holding company. A
subsidiary is a company that is partly or completely owned by another company that
holds a controlling interest in the subsidiary company.
186
AML/CFT Handbook Glossary & Acronyms
‘Tamper resistant format’ is the term used to describe a type of electronic file that is
of low risk of being tampered with, for example an image file with a time and date
stamp is much more secure than a Microsoft word document.
‘Terrorism’ has the same meaning as Section 1 of ATCA, as detailed in section 7.4.2.
‘Tipping off’ has the same meaning as 145 of POCA and 27 of ATCA, as detailed in
section 7.6.9.
‘Trustee’ means a person or firm that holds or administers property or assets for the
benefit of a third party. A trustee may be appointed for a wide variety of purposes,
such as in the case of bankruptcy, for a charity, a trust fund or for certain types of
retirement plans or pensions. They are trusted to make decisions in the beneficiary's
best interests.
‘Underlying client’ is the name given to the person on whose behalf a customer may
be acting.
(a) there are transactions that have no apparent economic or lawful purpose,
examples of which include transactions that are —
(i) complex;
(ii) both large and unusual; or
(iii) of an unusual pattern;
(b) the relevant person becomes aware of anything that causes the relevant person
to doubt the identity of a person it is obliged to identify under this Code.
(c) the relevant person becomes aware of anything that causes the relevant person
to doubt the good faith of a customer, beneficial owner, beneficiary or introducer.
187
AML/CFT Handbook Glossary & Acronyms
destruction has the same meaning of Section VIA of ATCA, as detailed in section 7.3.4
and 7.4.3.
188
AML/CFT Handbook Appendix A
Appendix A
Anti-Money Laundering and Countering the Financing of
Terrorism Code 2019
Disclaimer: This document was created by the Isle of Man Financial Services Authority
(“the Authority”) to assist relevant persons and other readers. The Authority accepts
no liability for the document’s completeness and accuracy. Original legislation should
always be consulted for legal purposes.
c
ANTI-MONEY LAUNDERING AND COUNTERING THE
FINANCING OF TERRORISM CODE 2019
Index
Paragraph Page
189
AML/CFT Handbook Appendix A
190
AML/CFT Handbook Appendix A
c
Proceeds of Crime Act 2008,
Terrorism and Other Crime (Financial Restrictions) Act 2014
The Department of Home Affairs makes the following Code under section 157 of the
Proceeds of Crime Act 2008 and section 68 of the Terrorism and Other Crime (Financial
Restrictions) Act 2014, after carrying out the consultation required by those sections18.
PART 1 - INTRODUCTORY
1 Title
This Code is the Anti-Money Laundering and Countering the Financing of
Terrorism Code 2019.
2 Commencement
This Code comes into operation on 1 June 201919.
3 Interpretation
(1) In this Code —
“acceptable applicant” means a customer in relation to whom the conditions of
paragraph 16(3) (acceptable applicants) are met;
“AML/CFT” means anti-money laundering and countering the financing of
terrorism;
“AML/CFT legislation” means the requirements of —
(a) sections 7 to 11 and 14 of the Anti-Terrorism and Crime Act 2003;
18 Section 157(4) of the Proceeds of Crime Act 2008 and section 68(4) of the Terrorism and
Other Crime (Financial Restrictions) Act 2014 require the Department of Home Affairs to consult
any body or person that appears to it to be appropriate, before making a Code under those
sections.
19 Section 223(5) of the Proceeds of Crime Act 2008 and section 68(5) of the Terrorism and
Other Crime (Financial Restrictions) Act 2014 require a Code made under section 157 of the
Proceeds of Crime Act 2008 or section 68 of the Terrorism and Other Crime (Financial
Restrictions) Act 2014 to be laid before Tynwald as soon as practicable after it is made, and if
Tynwald at the sitting at which the Code is laid or at the next following sitting so resolves, the
Code ceases to have effect.
191
AML/CFT Handbook Appendix A
192
AML/CFT Handbook Appendix A
193
AML/CFT Handbook Appendix A
194
AML/CFT Handbook Appendix A
20 SD 2018/0192
195
AML/CFT Handbook Appendix A
“money laundering” means an act that falls within section 158(11) of the
Proceeds of Crime Act 2008;
“Money Laundering Reporting Officer” or “MLRO” means an individual
appointed under paragraph 23 (Money Laundering Reporting Officer) and
paragraph 24 (Money Laundering Reporting Officer – insurers, insurance
managers and insurance intermediaries) and includes a deputy MLRO
appointed under paragraph 23(3);
“National Risk Assessment” is a jurisdiction’s evaluation of its ML/FT risks
which aims to ensure that actions are co-ordinated domestically to combat
ML/FT and proliferation, as required under the FATF Recommendations;
“nominee company” means a wholly-owned subsidiary that complies with
paragraphs 2.7 or 3.1 of Schedule 1 to the Financial Services
(Exemptions) Regulations 201121 as it has effect from time to time and any
instrument or enactment from time to time amending or replacing those
regulations or similar legislation in a jurisdiction included in List C;
“occasional transaction” means any transaction (whether a single transaction
or series of linked transactions), other than a transaction carried out in the
course of an established business relationship, formed by a relevant
person and for the purposes of this definition, a business relationship is an
established business relationship if it is formed by a relevant person where
that person has identified, and taken reasonable measures to verify the
identity of the person who, in relation to the formation of that business
relationship, was the customer;
“officer” includes —
(a) a director or secretary;
(b) in relation to a limited liability company to which the Limited Liability
Companies Act 1996 applies, a member, manager or registered
agent of such a company;
(c) in relation to a company to which the Companies Act 2006 applies,
a member, manager or registered agent of such a company;
(d) in relation to a limited partnership with legal personality to which
sections 48B to 48D of the Partnership Act 1909 apply —
(i) if a general partner is a natural person, that person;
(ii) if a general partner is a body corporate, the directors and
officers of that body corporate;
(iii) if a general partner is a foundation, the council members (or
equivalent) of that foundation;
(e) in relation to a foundation, a member of the council (or equivalent)
of the foundation; and
(f) in relation to a legal arrangement, a trustee;
(g) any person in accordance with whose directions or instructions any
of the officers are accustomed to act unless the officer is
accustomed so to act by reason only that they do so on advice
given by that person in a professional capacity;
196
AML/CFT Handbook Appendix A
197
AML/CFT Handbook Appendix A
198
AML/CFT Handbook Appendix A
199
AML/CFT Handbook Appendix A
(i) complex;
(ii) both large and unusual; or
(iii) of an unusual pattern;
(b) the relevant person becomes aware of anything that causes the
relevant person to doubt the identity of a person it is obliged to
identify; or
(c) the relevant person becomes aware of anything that causes the
relevant person to doubt the good faith of a customer, beneficial
owner, beneficiary, introducer or eligible introducer.
(2) In this Code, a reference to an amount of currency expressed in euros is
to be construed as meaning that amount converted into, and expressed
as, an amount of any other currency, including fiat or convertible virtual
currency.
200
AML/CFT Handbook Appendix A
(3) The ultimate responsibility for ensuring compliance with this Code is that
of the relevant person, regardless of any outsourcing or reliance on third
parties during the process.
201
AML/CFT Handbook Appendix A
(g) whether the relevant person and the customer have met during the
business relationship, or its formation, or in the course of an
occasional transaction.
202
AML/CFT Handbook Appendix A
203
AML/CFT Handbook Appendix A
(g) the relevant person ensures that the amount, type and number of
transactions is appropriately limited and monitored.
(5) Except as provided in sub-paragraph (4) and Part 6, where the
requirements of this paragraph are not met, the procedures and controls
must provide that—
(a) the business relationship must proceed no further;
(b) the relevant person must terminate the business relationship; and
(c) the relevant person must consider making an internal disclosure.
9 Introduced business
(1) This paragraph applies where a customer is introduced to a relevant
person by a person who provides elements of the customer due diligence
(the “introducer”).
(2) The relevant person must comply with —
(a) this paragraph; and
(b) paragraph 8 or 11 (whichever is applicable).
(3) The relevant person must carry out a customer risk assessment in
accordance with paragraph 6 and sub-paragraph (4).
(4) The risk assessment must include and take into account —
(a) a risk assessment of the introducer;
(b) whether the introducer has met the customer;
(c) whether any elements of customer due diligence provided by the
introducer have been obtained by the introducer —
(i) directly from the customer; or
(ii) from any third parties; and
(d) if sub-paragraph (4)(c)(ii) applies, indicate —
(i) how many third parties were involved in the process;
(ii) who those third parties were;
(iii) whether any of those third parties have met the customer;
(iv) whether any third party is a trusted person; and
(v) whether in the case of any third parties located outside of
the Island, they are located in a List C jurisdiction.
(5) If the risk assessment indicates higher risk, the relevant person must
undertake enhanced customer due diligence on the customer in
accordance with paragraph 15 including, taking reasonable measures to
establish the source of wealth of the customer and any beneficial owner of
the customer.
(6) If more than one third party located outside of the Island is involved in the
process, as specified in sub-paragraph (4), sub-paragraph (7) applies.
(7) Without limiting paragraph 8 or 11 (whichever is applicable), the relevant
person must verify the identity of the customer using reliable, independent
source documents, data or information obtained, either –
204
AML/CFT Handbook Appendix A
205
AML/CFT Handbook Appendix A
11 Occasional transactions
(1) A relevant person must, in relation to an occasional transaction, establish,
record, maintain and operate the procedures and controls specified in sub-
paragraph (3).
(2) The procedures and controls must be undertaken before the occasional
transaction is entered into.
(3) Those procedures and controls are —
(a) identifying the customer;
(b) verifying the identity of the customer using reliable, independent
source documents, data or information;
(c) verifying the legal status of the customer using reliable,
independent source documents, data or information;
(d) obtaining information on the nature and intended purpose of the
occasional transaction; and
(e) taking reasonable measures to establish the source of funds
including, where the funds are received from an account not in the
name of the customer —
(i) understanding and recording the reasons for this;
(ii) identifying the account holder and on the basis of materiality
and risk of ML/FT taking reasonable measures to verify the
identity of the account holders using reliable, independent
source documents, data or information; and
(iii) if the account holder is assessed as posing a higher risk of
ML/FT, satisfying the requirements in paragraph 15.
(4) Subject to sub-paragraph (6), if the transaction is an exempted occasional
transaction the requirements of sub-paragraphs (3)(b) and (c) cease to
apply.
(5) Subject to sub-paragraph (6), if the transaction is an exempted occasional
transaction the requirements of paragraph 12(2)(a)(ii) cease to apply.
206
AML/CFT Handbook Appendix A
207
AML/CFT Handbook Appendix A
208
AML/CFT Handbook Appendix A
(b) obtain information concerning the person by whom, and the method
by which, binding obligations may be entered into or imposed on
the customer; and
(c) obtain information to understand the nature of the customer’s
business and the ownership and control structure of the customer.
(7) Subject to paragraph 21(1) and without limiting sub-paragraphs (2) to (6),
the relevant person must not, in the case of a customer that is a legal
person or a legal arrangement, make any payment or loan to, or on behalf
of, a beneficial owner of that person or for the benefit of a beneficiary of
that arrangement unless it has —
(a) identified the recipient or beneficiary of the payment or loan;
(b) on the basis of materiality and risk of ML/FT, verified the identity of
the recipient or beneficiary using reliable, independent source
documents, data or information; and
(c) understood the nature and purpose of that payment or loan in
accordance with paragraph 13.
(8) Without limiting sub-paragraphs (2) to (7) in the case of a life assurance
policy, an insurer must —
(a) identify any named beneficiary;
(b) in respect of a class of beneficiaries where it is not reasonably
practicable to identify each beneficiary, obtain details sufficient to
identify and describe the class of persons who are beneficiaries, to
satisfy the insurer that it will be able to verify the identity of the
beneficiaries at the time of pay-out; and
(c) where a policy is assigned to an assignee, identify the assignee
and take reasonable measures to verify their identity using reliable,
independent source documents, data or information.
(9) Without limiting sub-paragraphs (2) to (8) in the case of a life assurance
policy, an insurer must not make any payment or loan to a beneficiary or
assignee of a life assurance policy unless it has verified the identity of each
beneficiary or assignee using reliable, independent source documents,
data or information.
(10) Without limiting sub-paragraphs (2) to (9) in the case of a life assurance
policy where a payment is to be made by an insurer to an account not in
the name of the customer or beneficiary —
(a) the reasons for this must be understood and recorded; and
(b) this account holder must be identified, and on the basis of
materiality and risk of ML/FT reasonable measures must be taken
to verify the identity of the account holder using reliable,
independent source documents, data or information.
(11) Except as provided in Part 6, where the requirements of this paragraph are
not met within a reasonable timeframe, the procedures and controls must
provide that —
(a) the business relationship must proceed no further;
(b) the relevant person must consider terminating the business
relationship; and
(c) the relevant person must consider making an internal disclosure.
209
AML/CFT Handbook Appendix A
13 Ongoing monitoring
(1) A relevant person must perform ongoing and effective monitoring of any
business relationship or occasional transaction, including —
(a) a review of information and documents held for the purpose of
customer due diligence and enhanced customer due diligence to
ensure they are up-to-date, accurate and appropriate, in particular
where the transaction or relationship poses a higher risk of ML/FT;
(b) appropriate scrutiny of transactions and other activities to ensure
that they are consistent with —
(i) the relevant person’s knowledge of the customer, the
customer’s business and risk profile and source of funds of
the transaction;
(ii) the business risk assessment carried out under paragraph
5;
(iii) the customer risk assessment carried out under paragraph
6; and
(iv) any technology risk assessments carried out under
paragraph 7; and
(c) monitoring whether the customer, beneficial owner, beneficiary,
introducer or eligible introducer is listed on the sanctions list.
(2) Where a relevant person identifies any unusual activity in the course of a
business relationship or occasional transaction the relevant person must
—
(a) perform appropriate scrutiny of the activity;
(b) conduct enhanced customer due diligence in accordance with
paragraph 15; and
(c) consider whether to make an internal disclosure.
(3) Where a relevant person identifies any suspicious activity in the course of
a business relationship or occasional transaction the relevant person must
–
(a) conduct enhanced customer due diligence in accordance with
paragraph 15, unless the relevant person reasonably believes
conducting enhanced customer due diligence will tip off the
customer; and
(b) make an internal disclosure.
(4) The extent and frequency of any monitoring under this paragraph must be
determined —
(a) on the basis of materiality and risk of ML/FT;
(b) in accordance with the risk assessments carried out under Part 3;
and
(c) having particular regard to whether a customer poses a higher risk
of ML/FT.
(5) A relevant person must record the date when each review of the business
relationship takes place and details of any examination, steps, measures
or determination made or taken under this paragraph.
210
AML/CFT Handbook Appendix A
211
AML/CFT Handbook Appendix A
“foreign PEP” means a PEP who is or has been entrusted with prominent
public functions outside of the Island and any family members or close
associates of the PEP, regardless of the location of that PEP, those family
members or close associates.
212
AML/CFT Handbook Appendix A
16 Acceptable applicants
(1) If each of the conditions in sub-paragraph (3) are met, verification of the
identity of a customer is not required to be produced for —
(a) a new business relationship in accordance with paragraph 8(3)(b)
and (c); or
(b) an occasional transaction in accordance with paragraph 11(3)(b)
and (c).
(2) If each of the conditions in sub-paragraph (3) are met, paragraph 12(2)(a)
ceases to apply.
(3) The conditions referred to in sub-paragraphs (1) and (2) are that the
relevant person —
(a) has identified the customer and has no reason to doubt that identity;
(b) has not identified the customer as posing a higher risk of ML/FT:
(c) knows the nature and intended purpose of the business relationship
or occasional transaction;
213
AML/CFT Handbook Appendix A
214
AML/CFT Handbook Appendix A
215
AML/CFT Handbook Appendix A
216
AML/CFT Handbook Appendix A
19 Eligible introducers
(1) If a customer is introduced to a relevant person by a third party, other than
an introducer to which paragraph 9 applies, the relevant person may, if it
thinks fit, comply with this paragraph, instead of paragraphs 8 or 11
provided —
(a) the eligible introducer agrees to the relevant person doing so; and
(b) each of the conditions in sub-paragraphs (4) and (5) are met.
(2) The relevant person must establish, maintain and operate a customer risk
assessment procedures in accordance with paragraph 6.
(3) The procedures and controls of this paragraph must be undertaken before
a business relationship or occasional transaction is entered into.
(4) Verification of a customer’s identity is not required to be produced by the
eligible introducer if the relevant person —
(a) has identified the customer and any beneficial owner and has no
reason to doubt those identities;
(b) has not identified the customer as posing a higher risk of ML/FT;
(c) knows the nature and intended purpose of the business
relationship;
(d) has taken reasonable steps to establish the source of funds
including the measures specified in paragraph 8(3)(e);
(e) has not identified any suspicious activity;
(f) is satisfied that —
(i) the eligible introducer is a trusted person other than a
nominee company of either a regulated person or a person
who acts in the course of external regulated business; or
(ii) each of the conditions in sub-paragraph (5) are met; and
(g) has conducted a risk assessment of the eligible introducer and is
satisfied that the eligible introducer does not pose a higher risk of
ML/FT.
(5) The conditions referred to in sub-paragraph (4)(f)(ii) are that —
(a) the relevant person and the eligible introducer are bodies corporate
in the same group;
(b) the group operates AML/CFT programmes and procedures which
conform to Parts 4 and 5 and paragraphs 33 to 37;
217
AML/CFT Handbook Appendix A
218
AML/CFT Handbook Appendix A
20 Insurance
(1) This paragraph applies to —
219
AML/CFT Handbook Appendix A
220
AML/CFT Handbook Appendix A
21 Miscellaneous
(1) In respect of a pension, superannuation or similar scheme that provides
retirement benefits to employees, if contributions are made by way of
deduction from wages and the scheme rules do not permit the assignment
of a member’s interest under the scheme, the relevant person —
(a) may treat the employer, trustee or any other person who has control
over the business relationship, including the administrator or the
scheme manager, as the customer; and
(b) need not comply with paragraph 12(2)(b).
(2) Where —
(a) a customer is —
(i) a collective investment scheme (except for a scheme within
the meaning of Schedule 3 (exempt schemes) to the
Collective Investment Schemes Act 2008), or
(ii) an equivalent arrangement in a jurisdiction in List C; and
(b) the manager or administrator of such a scheme or equivalent
arrangement is —
(i) a regulated person; or
(ii) a person who acts in the course of external regulated
business,
the relevant person need not comply with paragraph 12(2)(b).
(3) The Isle of Man Post Office need not comply with Part 4, if it sees fit,
when—
(a) it issues or redeems a postal order up to the value of £50;
(b) it issues or administers funds on behalf of other Government
Departments or Statutory Boards;
(c) the value of up to £650 in cash of £5,000 by other means of
payment is accepted in relation to —
(i) payment for services provided by a Government
Department or Statutory Board;
(ii) payments on behalf of utilities and telecom service
providers;
(iii) payments on behalf of a third party from customers of that
party in respect of provision by that third party of goods or
services; or
(iv) donations on or behalf of a charity, provided that the charity
is registered in the Island.
(4) Sub-paragraphs (1), (2) and (3) do not apply if —
(a) the customer is assessed as posing higher risk of ML/FT or;
(b) the relevant person has identified any suspicious activity.
(5) If the relevant person has identified any suspicious activity the relevant
person must make an internal disclosure.
221
AML/CFT Handbook Appendix A
222
AML/CFT Handbook Appendix A
25 Reporting procedures
A relevant person must establish, record, maintain and operate reporting
procedures and controls that —
(a) enable its officers and all other persons involved in its management,
and all appropriate employees and workers to know to whom any
suspicious activity is to be disclosed;
(b) ensure that there is a clear reporting chain to the MLRO;
(c) require an internal disclosure to be made to the MLRO if any
information, or other matters that come to the attention of the
223
AML/CFT Handbook Appendix A
26 Internal disclosures
Where a relevant person identifies any suspicious activity in the course of a
business relationship or occasional transaction the relevant person must —
(a) conduct enhanced customer due diligence in accordance with
paragraph 15, unless the relevant person reasonably believes
conducting enhanced customer due diligence will tip off the
customer; and
(b) make an internal disclosure.
27 External disclosures
(1) Where an internal disclosure has been made, the MLRO must assess the
information contained within the disclosure to determine whether there are
reasonable grounds for knowing or suspecting that the activity is ML/FT.
(2) The MLRO must make an external disclosure to the Financial Intelligence
Unit in accordance with the reporting procedures and controls established
under paragraph 25 as soon as is practicable if the MLRO —
(a) knows or suspects; or
(b) has reasonable grounds for knowing or suspecting,
that the activity is ML/FT.
(3) A disclosure under sub-paragraph (2) does not breach —
(a) any obligation of confidence owed by the MLRO; or
(b) any other restriction on the disclosure of information (however
imposed).
28 Registers of disclosures
(1) A relevant person must establish and maintain separate registers of —
(a) all internal disclosures;
(b) all external disclosures; and
(c) any other disclosures to the Financial Intelligence Unit.
224
AML/CFT Handbook Appendix A
225
AML/CFT Handbook Appendix A
(c) any activities relating to compliance with this Code that have been
undertaken by the relevant person during the period covered by the
report; and
(d) the results of any testing undertaken in accordance with sub-
paragraph (1).
(3) A relevant person must ensure that there is a suitable person at
management level that is responsible for the functions specified in this
paragraph.
(4) To be effective in the exercise of the functions the suitable person must —
(a) be sufficiently senior in the organisation of the relevant person or
have sufficient experience and authority;
(b) have a right of direct access to the officers of the relevant person;
and
(c) have sufficient time and resources to properly discharge the
responsibilities of the position.
32 Staff training
(1) A relevant person must provide or arrange education and training,
including refresher training, at least annually, for —
(a) all officers;
(b) any other persons involved in its senior management; and
(c) appropriate employees and workers.
(2) The education and training referred to in sub-paragraph (1) must make
those persons aware of —
(a) the provisions of the AML/CFT legislation;
(b) any personal obligations in relation to the AML/CFT legislation;
(c) the reporting procedures and controls established under Part 7;
(d) the relevant person’s policies and procedures and controls for
AML/CFT as required by paragraph 4;
(e) the recognition and handling of unusual activity and suspicious
activity;
(f) their personal liability for failure to report information or suspicions
in accordance with internal procedures and controls, including the
offence of tipping off; and
(g) new methods and developments, including information on current
techniques, methods and trends in ML/FT.
(3) Where there have been significant changes to AML/CFT legislation, or the
relevant person’s policies and procedures, the relevant person must
226
AML/CFT Handbook Appendix A
33 Record keeping
A relevant person must keep —
(a) a copy of the documents obtained or produced under Parts 3 to 6,
paragraphs 37 and 39, including identification information, account
files, business correspondence records and the results of any
analysis undertaken (or information that enables a copy of such
documents to be obtained);
(b) a record of all transactions carried out in the course of business in
the regulated sector, including identification information, account
files, business correspondence records and the results of any
analysis undertaken (or information that enables a copy of such
records to be obtained); and
(c) such other records as are sufficient to permit reconstruction of
individual transactions and compliance with this Code.
34 Record retention
(1) A relevant person must keep the records required by this Code for at least
the period specified in sub-paragraph (3) or (4).
(2) To avoid doubt, the obligation in sub-paragraph (1) continues to apply after
a person ceases to be a relevant person.
(3) In the case of records required to be kept under sub-paragraph 33(b), the
records must be kept for a period of 5 years from the date of the completion
of the transaction.
(4) In the case of records to which sub-paragraph (3) does not apply, the
records must be kept for a period of 5 years beginning on the date on
which —
(a) all activities relating to an occasional transaction or a series of
linked transactions were completed; or
(b) in respect of all other activities —
(i) the business relationship was formally ended; or
(ii) if the business relationship was not formally ended, when all
activities relating to the relationship were completed.
(5) Without limiting sub-paragraph (1), if —
(a) an external disclosure has been made to the Financial Intelligence
Unit under paragraphs 25(f) and 27;
(b) the relevant person knows or believes that a matter is under
investigation by a competent authority; or
(c) the relevant person becomes aware that a request for information
or an enquiry is underway by a competent authority,
227
AML/CFT Handbook Appendix A
the relevant person must retain all relevant records for as long as required
by the competent authority.
PART 9 – MISCELLANEOUS
36 Financial groups
(1) This paragraph applies to a relevant person if —
(a) the relevant person is the head office of a financial group; and
(b) the relevant person is—
(i) licensed under Class 1 (deposit taking) or Class 2
(investment business) of the Regulated Activities Order; or
(ii) is an insurer.
(2) If sub-paragraph (1) applies —
(a) the financial group must have group wide programmes in respect
of AML/CFT which are applicable to all branches and majority
owned subsidiaries of the financial group that include —
(i) requirements in accordance with paragraphs 30, 31 and 32;
(ii) policies and procedures for sharing information required for
the purposes of customer due diligence and ML/FT risk
management;
(iii) the provision at group level of compliance, audit and
AML/CFT functions;
228
AML/CFT Handbook Appendix A
38 Shell banks
(1) A relevant person must not —
(a) enter into or continue a business relationship; or
229
AML/CFT Handbook Appendix A
39 Correspondent services
(1) This paragraph applies to a business relationship or an occasional
transaction, which involves correspondent services or similar
arrangements.
(2) A relevant person must not enter into or continue a business relationship
or carry out an occasional transaction to which this paragraph applies with
a respondent institution in another jurisdiction unless it is satisfied that the
respondent institution does not permit its accounts to be used by shell
banks.
(3) Before entering into a business relationship or carrying out an occasional
transaction to which this paragraph applies, a relevant person must —
(a) obtain and document sufficient information about the respondent
institution to fully understand and risk assess the nature of its
business and its customer base;
(b) determine from publically available information —
(i) the reputation of the respondent institution;
(ii) the quality of supervision to which it is subject;
(iii) whether it has been subject to investigation or regulatory
action in respect of ML/FT; and
(iv) whether the respondent institution is included on the
sanctions list.
(c) assess and document the AML/CFT procedures and controls
maintained by the respondent institution, and ascertain that they
are adequate and effective;
(d) ensure that the approval of the relevant person’s senior
management is obtained; and
(e) clearly understand and document the respective responsibilities of
each institution including the relevant person and the respondent
institution with respect to AML/CFT measures.
(4) If a business relationship or occasional transaction to which this paragraph
applies involves a payable-through account, a relevant person must be
satisfied that the respondent institution—
(a) has taken measures that comply with the requirements of the FATF
Recommendations 10 (Customer due diligence) and 11 (Record
keeping) with respect to every customer having direct access to the
account; and
230
AML/CFT Handbook Appendix A
(b) will provide on request the relevant person with relevant verification
of the identity of the customer in accordance with this Code or to
AML/CFT requirements at least equivalent to those in this Code.
(5) In this paragraph —
“correspondent services” means banking, money or value transfer
services or other similar relationships provided by a financial
institution in one jurisdiction (“the correspondent institution”) to a
financial institution or designated business in another jurisdiction
(“the respondent institution”); and
“payable-through account” means an account maintained by a
correspondent institution that may be operated directly by the
customer of the respondent institution.
231
AML/CFT Handbook Appendix A
42 Offences
(1) A person who contravenes the requirements of this Code is guilty of an
offence and liable —
(a) on summary conviction to custody for a term not exceeding 12
months or to a fine not exceeding level 5 on the standard scale, or
to both; or
(b) on conviction on information, to custody not exceeding 2 years or
to a fine, or to both24.
(2) In determining whether a person has complied with any of the
requirements of this Code, a court may take account of —
(a) any relevant supervisory or regulatory guidance given by a
competent authority that applies to that person; or
(b) in a case where no guidance falling within head (a) applies, any
other relevant guidance issued by a body that regulates, or is
representative of, any trade, business, profession or employment
carried on by that person.
(3) In proceedings against a person for an offence under this paragraph, it is
a defence for the person to show that it took all reasonable measures to
avoid committing the offence.
(4) If an offence under this paragraph is committed by a body corporate or
foundation and it is proved that the offence —
(a) was committed with the consent or connivance of; or
(b) was attributable to neglect on the part of,
24Under section 157(2ZA) of the Proceeds of Crime Act 2008 and section 68(2ZA) of the Terrorism
and Other Crime (Financial Restrictions) Act 2014 the Isle of Man Financial Services Authority
may by regulations require a person whom it is satisfied has contravened a provision of this code
to pay a civil penalty in respect of the contravention, provided that criminal proceedings have
not been commenced in respect of the contravention.
232
AML/CFT Handbook Appendix A
an officer of the body, the officer, as well as the body, is guilty of the offence
and liable to the penalty provided for it.
(5) If an offence under this paragraph is committed by a partnership that does
not have legal personality, or by an association other than a partnership or
body corporate, and it is proved that the offence —
(a) was committed with the consent or connivance of; or
(b) was attributable to neglect on the part of,
a partner in the partnership or a person concerned in the management or
control of the association, the partner or the person concerned, as well as
the partnership or association, is guilty of the offence and liable to the
penalty provided for it.
43 Revocations
The following are revoked —
(a) the Anti-Money Laundering and Countering the Financing of
Terrorism Code 201525;
(b) the Anti-Money Laundering and Countering the Financing of
Terrorism (Amendment) Code 201826;
(c) Insurance (Anti-Money Laundering) Regulations 200827; and
(d) Guidance Notes on Anti-Money Laundering and Preventing the
Financing of Terrorism for Insurers (Long-Term Business)28.
W M MALARKEY
Minister for Home Affairs
25 SD 2015/0102
26 SD 2018/0242
27 SD144/08
28 SD 2015/0316
233
AML/CFT Handbook Appendix A
EXPLANATORY NOTE
(This note is not part of the Code)
This Code revokes and replaces the Anti-Money Laundering and Countering the Financing of
Terrorism Code 2015 (SD 2015/0102) for businesses in the regulated sector other than those
to which the Gambling (Anti-Money Laundering and Countering the Financing of Terrorism)
Code 2019 (SD 2019/0219) and the Anti-Money Laundering and Countering the Financing of
Terrorism (Specified Non-Profit Organisations) Code 2019 (SD 2019/0200) applies.
This Code is made jointly under section 157 of the Proceeds of Crime Act 2008 and section
68 of the Terrorism and Other Crime (Financial Restrictions) Act 2014. It contains provisions
in line with the Financial Action Task Force’s Recommendations on preventing money
laundering and the financing of terrorism.
This Code also revokes the Insurance Anti-Money Laundering Regulations 2008 (SD144/08)
and Guidance Notes on Anti-Money Laundering and Preventing the Financing of Terrorism for
Insurers (Long-Term Business) 2008 (SD 2015/0316). Where appropriate provisions specific
to insurance business have been incorporated into this Code.
Failure to comply with the requirements of this Code is an offence for which this Code specifies
the penalties. In addition section 157 of the Proceeds of Crime Act 2008 and section 68 of the
Terrorism and Other Crime (Financial Restrictions) Act 2014 enable the Isle of Man Financial
Services Authority to make regulations under which a civil penalty may be imposed in respect
of a contravention of this Code.
234
AML/CFT Handbook Appendix B
Appendix B
Proceeds of Crime (Business in the Regulated Sector) Order
2019
Disclaimer: This document was created by the Isle of Man Financial Services
Authority (“the Authority”) to assist relevant persons and other readers. The
Authority accepts no liability for the document’s completeness and accuracy.
Original legislation should always be consulted for legal purposes.
c
i
e
SD 2019/0204
235
AML/CFT Handbook Appendix B
c
PROCEEDS OF CRIME ACT (BUSINESS IN THE
REGULATED SECTOR) ORDER 2019
Index
Article Page
1 Title ............................................................................................................................... 237
2 Commencement .......................................................................................................... 237
3 Substitution of Schedule 4 to the Proceeds of Crime Act 2008 ............................. 237
SCHEDULE 238
INTERPRETATION 238
CODES 240
EXEMPTIONS 245
236
AML/CFT Handbook Appendix B
c
Proceeds of Crime Act 2008
The Department of Home Affairs makes the following Order under paragraph 3 of
Schedule 4 to the Proceeds of Crime Act 2008.
1 Title
This Order is the Proceeds of Crime Act (Business in the Regulated Sector) Order
2019.
2 Commencement
If approved by Tynwald, this Order comes into operation on 1 June 2019.29
W M MALARKEY
Minister for Home Affairs
29Section 223(3) of the Proceeds of Crime Act 2008 specified that an order made under
paragraph 3 of Schedule 4 to the Act must be approved by Tynwald.
237
AML/CFT Handbook Appendix B
SCHEDULE
[Article 3]
Interpretation
2 Interpretation
In this Schedule –
the “AML/CFT Code” means the Anti-Money Laundering and Countering the
Financing of Terrorism Code 201930, as it has effect from time to time and
any instrument or enactment from time to time amending or replacing that
Code;
“convertible virtual currency activity” means issuing, transmitting,
transferring, providing safe custody or storage of, administering,
managing, lending, buying, selling, exchanging or otherwise trading or
intermediating convertible virtual currencies, including crypto-currencies,
virtual assets or similar concepts where the concept is accepted by
persons as a means of payment of goods or services, a unit of account, a
store of value or a commodity;
“estate agent” means a person who practices, or carries on business, as an
estate agent, within the meaning of section 15 of the Estate Agents Act
1975;
“external accountant” means a person who provides accountancy services to a
third party –
(a) including audit services in respect of a body corporate and
insolvency services; but
(b) excluding a person who provides those services if –
(i) that person is employed by a public authority;
(ii) that person is employed by an undertaking which does not
provide accountancy services to a third party by way of
business; or
(iii) that person’s duties relate solely to the provision of
accountancy services to his or her employer;
the “Gambling Code” means the Gambling (Anti-Money Laundering and
Countering the Financing of Terrorism) Code 201931, as it has effect from
time to time and any instrument or enactment from time to time amending
or replacing that Code;
“legal professional” means a person who is –
30 SD 2019/0202
31 SD 2019/0219
238
AML/CFT Handbook Appendix B
239
AML/CFT Handbook Appendix B
(b) has been appointed to give such advice either by the third party in
relation to whose tax affairs the person advises or by another tax
adviser to the third party.
Regulated Sectors
Codes
(3) The AML/CFT Code applies to a business or an activity to which sub-
paragraph (6) applies.
(4) The Gambling Code applies to a business or an activity to which sub-
paragraph (11) applies.
(5) The Specified Non-Profit Organisations Code applies to an organisation
undertaking any activity to which sub-paragraph (12) applies.
34
SD 0885/11 as amended by SD 0374/13, SD 2016/0100, SD 2016/0186, SD 2017/0262 and
SD 2017/0345
240
AML/CFT Handbook Appendix B
241
AML/CFT Handbook Appendix B
242
AML/CFT Handbook Appendix B
Exemptions
(13) Sub-paragraph (6)(a) does not apply where the services provided relate
only to the service of the conveyance of letters, documents or parcels or
communication by post or any other means.
(14) Sub-paragraph (6)(h) does not apply to a legal professional where the
assets belonging to a client being managed represent only advance
payment of fees.
(15) Sub-paragraph (6)(l), (m) or (n) does not apply where the lending, leasing
or provision of guarantees or commitments (as the case may be) is made
by –
(a) a parent undertaking to a subsidiary of that parent undertaking;
(b) a subsidiary of a parent undertaking to the parent undertaking; or
(c) a subsidiary of a parent undertaking to another subsidiary of that
parent undertaking.
(16) For the purposes of sub-paragraph (15) “parent undertaking” means an
undertaking which, in relation to another undertaking (a “subsidiary” (“S”))
–
(a) owns or controls, whether directly or indirectly, shares or other
interests in S together aggregating in excess of 50% of the votes
exercisable at general or other meetings of S on any or all matters;
(b) has a right to appoint or remove a majority of S’s board of directors,
or other governing body;
(c) has the right to exercise a dominant influence over S –
(i) by virtue of the provisions contained in S’s constitutional
documents, or
(ii) by virtue of a control contract; or
(d) controls, alone or pursuant to an agreement with other persons, a
majority of the voting rights in S; and
“undertaking” means a natural person, body corporate, trustees of
a trust, partnership, foundation or unincorporated association.
(17) For the purposes of sub-paragraph (16) –
(a) a parent undertaking (“X”) is taken to have the right to exercise a
dominant influence over a subsidiary undertaking (“Y”) only if X has
a right to give directions with respect to the operating and financial
policies of Y with which Y’s directors are, or governing body is,
obliged to comply whether or not they are for the benefit of Y;
(b) a “control contract” means a contract in writing conferring a
dominant influence right which –
(i) is of a kind authorised by the constitutional documents of the
undertaking in relation to which the right is exercisable;
243
AML/CFT Handbook Appendix B
4 Supervisory authorities
(1) The following bodies are supervisory authorities –
(a) the Treasury;
(b) the Department of Home Affairs;
(c) the Isle of Man Financial Services Authority;
(d) the Isle of Man Gambling Supervision Commission; and
(e) the professional bodies listed in sub-paragraph (2).
(2) The professional bodies referred to in sub-paragraph (1)(e) are –
(a) the Association of Accounting Technicians;
(b) the Association of Chartered Certified Accountants;
(c) the Association of International Accountants;
(d) the Association of Taxation Technicians;
(e) the Chartered Institute of Management Accountants;
(f) the Chartered Institute of Public Finance and Accountancy;
(g) the Chartered Institute of Taxation;
(h) the Council for Licenced Conveyancers;
(i) the Faculty of Advocates;
(j) the Faculty Office of the Archbishop of Canterbury;
(k) the General Council of the Bar;
(l) the General Council of the Bar of Northern Ireland;
244
AML/CFT Handbook Appendix B
Amendment
5 Power to amend
The Department of Home Affairs may by order amend this Schedule.
245
AML/CFT Handbook Appendix B
EXPLANATORY NOTE
(This note is not part of the Order)
This Order replaces Schedule 4 to the Proceeds of Crime Act 2008 (“the Schedule”). The
Schedule has effect for the purpose of determining business in the regulated sector and what
is a supervisory authority for the purposes of that Act.
Section 157 of that Act and section 68 of the Terrorism and Other Crime (Financial
Restrictions) Act 2014 require a person carrying on a business in the regulated sector to
institute and operate systems, procedures, record-keeping, controls and training specified in
a code made by the Department of Home Affairs for the purposes of preventing and detecting
money laundering and the financing of proliferation and terrorism. They also require persons
carrying on, employed in or otherwise concerned in a business in the regulated sector to
comply with such systems, procedures, record-keeping, controls and training.
The new Schedule provides that one of three Anti-Money Laundering and Countering the
Financing of Terrorism Codes applies to a business in the regulated sector, depending on its
activities. A number of definitions have also been amended to address scope gaps that have
been identified.
246
AML/CFT Handbook Appendix C
Appendix C
LIST C: Equivalent Jurisdiction List
Below is a list of countries which the Island has judged to have equivalent AML/CFT
controls to our framework. Customers resident in, or carrying on business from,
countries on this list may be subject to simplified due diligence concessions as outlined
in Part 6 of the Code.
Australia Japan
Austria Jersey
Belgium Liechtenstein
Bermuda Luxembourg
British Virgin Islands Malta
Canada Mauritius
Cayman Islands Monaco
Cyprus Netherlands
Denmark New Zealand
Finland Norway
France Portugal
Germany Singapore
Gibraltar South Africa
Guernsey Spain
Hong Kong Sweden
Iceland Switzerland
Ireland Taiwan
Italy United Kingdom
United States
247
AML/CFT Handbook Appendix C
248
AML/CFT Handbook Appendix D(a)
Appendix D(a)
LIST A: High Risk Jurisdiction List
This Appendix covers countries and territories that are to be treated as countries and
territories that do not apply, or insufficiently apply, the FATF Recommendations.
Consequently, business relationships and occasional transactions with persons or
legal arrangements resident or located in such jurisdictions pose a higher risk and
must be subject to enhanced customer due diligence.
This Appendix is not intended to provide an exhaustive list and no conclusion should
be drawn from the omission of a particular jurisdiction. Furthermore, there may be
additional jurisdictions where the FATF Recommendations are not applied or
insufficiently applied in respect of particular transactions or business relationships.
This Appendix will be updated as and when the IOMFSA becomes aware of necessary
amendments.
FATF Countermeasures
The following are jurisdictions subject to a FATF call on its members and other
jurisdictions to apply counter-measures to protect the international financial system
from the ongoing and substantial money laundering and terrorist financing risks
emanating from the jurisdictions.
249
AML/CFT Handbook Appendix D(a)
The following are jurisdictions subject to a FATF call on its members and other
jurisdictions to apply enhanced due diligence measures proportionate to the risks
arising from the jurisdictions.
Iran
250
AML/CFT Handbook Appendix D(b)
Appendix D(b)
List B: Jurisdictions that May Pose a Higher Risk
This Appendix covers countries and territories that may pose a higher risk of money
laundering or terrorist financing. Relevant persons should consider the statements
issued as part of their risk assessment and consider whether enhanced due diligence
would be appropriate.
Ongoing process
251
AML/CFT Handbook Appendix D(b)
The following jurisdictions listed below have also been identified as those that may
pose a higher risk of money laundering (“ML”) or terrorist financing (“TF”). This
list is as of April 2019.
252
AML/CFT Handbook Appendix D(b)
253
AML/CFT Handbook Appendix E
Appendix E
Eligible Introducers Certificate (includes terms of business)
EIC 1.1 - ELIGIBLE INTRODUCER’S CERTIFICATE
Telephone: E-mail:
Eligible Introducer’s
Regulatory / Supervisory /
Professional Body
1 A regulated person*
2 An advocate within the meaning of the Advocates Act 1976, a registered legal
practitioner within the meaning of the Legal Practitioners Registration Act 1986, or
an accountant carrying on business in or from the Isle of Man, where the
professional body’s rules embody requirements and procedures equivalent to the
Anti-Money Laundering and Terrorist Financing Code 2015 (“the Code”).
3 A person who acts in the course of external regulated business and is regulated
under the law of a jurisdiction in List C of the Code, unless the relevant person has
reason to believe that the jurisdiction in question does not apply, or insufficiently
applies, the FATF recommendations in respect of the business of that person.
254
AML/CFT Handbook Appendix E
The Eligible Introducer also certifies that in respect of this customer it has
obtained the verification required to satisfy the requirements of the Code and
this Handbook. The information disclosed for this customer by the Eligible
Introducer accurately reflects the information held and is being given for
business opening and maintenance purposes only. The Eligible Introducer
undertakes to supply suitably certified copies*, originals of the verification
documentation or copies of verified electronic documents* forthwith upon
request. The Eligible Introducer confirms that he/she will comply with the
requirements of paragraph 23(6) and 23(8) of the Code. The Eligible Introducer
also confirms that it is not itself reliant upon a third party for the evidence of
identity of the customer.
Signature*:
Full Name:
Official Position:
Date:
Telephone: E-mail:
255
AML/CFT Handbook Appendix E
Individual 1 Individual 2
To be completed for applicants for business who are legal persons or legal
arrangements.
256
AML/CFT Handbook Appendix E
Yes No
Initials of signatory
completing EIC1
257
AML/CFT Handbook Appendix E
Names of Directors / Trustees (or equivalent if a foundation) (including those who are officers
of the Eligible Introducer)
Full name
Full name
Full name
Full name
Full name
Full name
Details of all principal(s)* including beneficial owners but excluding officers of the Eligible
Introducer
1 2
Date
258
AML/CFT Handbook Appendix E
Details of all principal(s)* including beneficial owners but excluding officers of the Eligible
Introducer
(Please complete section below and attach additional copies of this sheet as required)
3 4
Initials of signatory
completing EIC1
259
AML/CFT Handbook Appendix E
Source of funds*
Should the space provided be insufficient, please continue using EIC 5.1.
* - Please refer to the Notes and Guidance at EIC 6.1 to 6.4 Initials of signatory
completing EIC1
Date
260
AML/CFT Handbook Appendix E
This section is to be used by the accepting business to identify any additional information or
documentation that they require over and above the stated minimum and/or for the Eligible
Introducer to provide additional information to supplement the details already provided.
Initials of signatory
completing EIC1
261
AML/CFT Handbook Appendix E
These notes and the definitions below are intended to provide guidance to assist the Eligible Introducer
in completing the required forms and to enable greater consistency to be achieved.
“Associated entities or Other business relationships established by the Eligible Introducer with the
relationships” accepting business which are associated with the applicant for business or
any of its principals.
“Bearer Shares” Should bearer shares be subsequently issued (after the opening of the
account) such that the “Yes” box needs ticking in EIC 2.1, an updated form
should be supplied to the accepting financial services business without delay.
“Certified copy” An officer or authorised signatory of a regulated financial service business will
be a suitable certifier. An acceptable “certified copy” document should be an
accurate and complete copy of the original such that the certifier will sign and
date the copy document (printing his name clearly in capitals underneath) and
clearly indicate his position or capacity on it and provide his contact details.
The certifier must state that it is a true copy of the original as per Section 4.10
of the AML/CFT Handbook.
“Paragraphs 23(6) and 23(8) Paragraph 23(6) of the Code reads as follows:
Isle of Man’s Anti-Money
Laundering and Countering The relevant person must not enter into a business relationship with a
the Financing of Terrorism customer that is introduced by an introducer unless written terms of business
Code 2015” are in place between the relevant person and the introducer and, despite sub-
paragraphs (4) and (5), those terms of business require in all cases the
introducer to —
(a) verify the identity of all customers introduced to the relevant person
sufficiently to comply with the AML/CFT requirements;
(b) take reasonable measures to verify the identity of the beneficial owner (if
any);
(c) establish and maintain a record of the evidence of identity for at least 5
years calculated in accordance with paragraph 33(1);
(d) establish and maintain records of all transactions between the introducer
and the customer if the records are concerned with or arise out of the
introduction (whether directly or indirectly) for at least 5 years calculated
in accordance with paragraph 33(1);
(e) supply to the relevant person immediately on request, copies of the
evidence verifying the identity of the customer and the beneficial owner
(if any) and all other customer due diligence information held by the
introducer in any particular case;
(f) supply to the relevant person immediately copies of the evidence
verifying the identity of the customer and the beneficial owner (if any)
and all other customer due diligence information, in accordance with
paragraphs 10(1), 12(1), 17(1) or 19(1) (as applicable), held by the
introducer in any particular case if —
(i) the introducer is to cease trading;
(ii) the introducer is to cease doing business with the customer;
(iii) the relevant person informs the introducer that it no longer intends
to rely on the terms of business entered into under this paragraph;
262
AML/CFT Handbook Appendix E
(g) inform the relevant person specifically of each case where the introducer
is not required or has been unable to verify the identity of the customer
or the beneficial owner (if any);
(h) inform the relevant person if the introducer is no longer able to comply
with the provisions of the written terms of business because of a change
of the law applicable to the introducer; and
(i) do all such things as may be required by the relevant person to enable
the relevant person to comply with its obligation under sub-paragraph
(8).
“Politically Exposed Politically Exposed Person is the term given to the risk associated with
Person” providing financial and business services to those with a high political profile
or who hold public office. “Politically Exposed Persons” include senior political
figures and their immediate family, and close associates. Please see
Paragraph 14 of the Code and Section 4.16 of the AML/CFT Handbook for
further guidance.
“Principal(s)” Includes the natural person who ultimately owns or controls the applicant for
business or on whose behalf a transaction or activity is being conducted.
For a trust, this also would also include the:
(a) the trustee(s) or other persons controlling or having power to direct the
activities of the applicant in line with the guidance for individuals and
legal persons.
(b) any person(s) whose wishes the trustees may be expected to take into
account;
(c) any other parties including the protector(s) and enforcer(s);
(d) any person(s) purporting to act on behalf of the trustee(s)
(e) any person(s) by whom binding obligations may be imposed on the
applicant and verify that that person is authorised to do so;
(f) the settlor(s) (or other person making the arrangement) i.e. the initial
settlors and any persons subsequently settling funds into the trust;
(g) beneficiaries at the time they come to benefit from the trust.
(h) any potential beneficiaries that the trustee has identified as presenting
higher risk, including those presenting increased money laundering,
terrorist financing, reputational or other risk.
263
AML/CFT Handbook Appendix E
(c) any person(s) purporting to act on behalf of the legal person or by whom
binding obligations may be imposed on the legal person.
“Purpose / intended nature A sufficient description should be provided of the reason for the business
of business relationship” relationship. For example: provision of current account facilities to the entity;
investment of cash assets in equity
“Related Parties” This includes Directors, Trustees and all principals* where the applicant for
business is a company, trust or foundation.
“Role This might include, for example: a shareholder, beneficiary, settlor, partner
etc.
“Source of funds” This relates to the source of the customer’s funds that will be involved in the
transaction with the accepting business as per Section 4.13 of the AML/CFT
Handbook.
1 AT 8 of 2008
2 AT 14 of 2000
3 AT 10 of 2001
264
AML/CFT Handbook Appendix E
“Source of wealth” The origins of a customer’s financial standing or total net worth i.e. those
activities which have generate a customer’s funds and property as per
section 4.13 of the AML/CFT Handbook.
“Type of trust / foundation For example: private limited company, public limited company, limited
/ company” partnership, discretionary trust, fixed interest trust, testamentary trust.
Please refer to the accepting business should you have any doubt or queries about completing
the Eligible Introducer Certificate Forms.
265
AML/CFT Handbook Appendix F
Appendix F
Acceptable Applicants Certificate
__________________________________________________________________
I/We confirm that I/We am/are one of the following persons [Please tick as
appropriate]
2. A person (or nominee of) authorised under section 8 of the Insurance Act 2008
3. Any person (or nominee of) registered under section 25 of the Insurance Act
2008
5. A person (or nominee of) holding an online gambling licence issued under
section 4 of the Online Gambling Regulation Act 2001.
6. An advocate within the meaning of the Advocates Act 1976, a registered legal
practioner within the meaning of the Legal Practitioners Registration Act 1986
or an accountant carrying on business in or from the Isle of Man.
7. A person (or nominee of) who acts in the course of external regulated
business and is regulated under the law of a jurisdiction in List C
I/We confirm that I/We am/are overseen for AML/CFT compliance by:
Signature __________________________________________________________
Job/position ________________________________________________________
Date _____________________________________________________________________
266
AML/CFT Handbook Appendix F
267
AML/CFT Handbook Appendix G
Appendix G
Acting “on Behalf of” Certificate (includes terms of business)
In order to use the concession we can confirm that we hold a financial services
licence covering Class 1 (deposit taking), Class 2 (investment business), Class 3
(services to collective investment schemes) or Class 8 (money transmission)
services of the Regulated Activities Order 2011. We also confirm the following:
Item Yes No
The nature / intended purpose of the relationship with the
underlying clients is known to us.
We have not identified any suspicious activity.
Written terms of business are in place covering all areas of
paragraph 21 (3) of the Code.
Confirmation has been received from the third party that there
are no underlying clients who have been assessed as higher
risk in the arrangement.
The customer is regulated and supervised in respect of
AML/CFT and has appropriate record keeping and customer
due diligence procedures in place which are fit for purpose.
The procedures of the customer will be tested at least
annually.
Signature:
Full Name:
Official Position:
Date:
Email:
268
AML/CFT Handbook Appendix G
Telephone:
269
AML/CFT Handbook Appendix G
Name of Customer:
Telephone: E-mail:
Customer’s Regulatory or
Supervisory body:
1 A regulated person.*
4 A designated business.
270
AML/CFT Handbook Appendix G
Item Yes No
The customer confirms that it will comply with the
requirements of paragraph 21(3) and 21(5)* of the Code.
It has obtained customer identification information on the
underlying client (in accordance with Paragraphs 10-13 of the
Code or to AML/CFT requirements at least equivalent to
those in the Code) and has no reason to doubt the identifies.
It has verified the underlying client’s identity (in accordance
with Paragraphs 10-13 of the Code or to AML/CFT
requirements at least equivalent to those in the Code) and
has no reason to doubt the identities.
The customer has risk assessed the underlying client in
accordance with paragraph 7 of the Code (or to AML/CFT
requirements at least equivalent to those in the Code) and
confirms there are no higher risk underlying clients in the
arrangement.
The customer confirms it is regulated and supervised in
respect of AML/CFT and has appropriate procedures in place
particularly in relation to FATF recommendations 10 and 11
(CDD and record keeping)
If the customer is not located in the Isle of Man it undertakes
to supply information on the identity of the underlying client,
suitably certified copies* or originals of the verification
documentation immediately.
Where the customer is located in the Isle of Man the
customer undertakes to supply information on the identity of
the underlying client, suitably certified copies* or originals of
the verification documentation forthwith upon request.
It has obtained details relating to the purpose / intended
nature of business relationship with the underlying client.
The source of funds of the underlying client have been
identified.
The customer confirms it has not identified any suspicious
activity.
Signature:
271
AML/CFT Handbook Appendix G
Full Name:
Official Position:
Date:
Telephone: E-mail:
272
AML/CFT Handbook Appendix G
This acting on behalf of certificate aims to streamline and provide a standard format
for the use of the concession in paragraph 21 of the Code.
These notes and the definitions below are intended to provide guidance to assist the
parties in completing the required forms and to enable greater consistency to be
achieved.
“Certified copy” An officer or authorised signatory of a regulated financial service business will
be a suitable certifier. An acceptable “certified copy” document should be an
accurate and complete copy of the original such that the certifier will sign and
date the copy document (printing his name clearly in capitals underneath) and
clearly indicate his position or capacity on it and provide his contact details.
The certifier must state that it is a true copy of the original as per Section 4.10
of the AML/CFT Handbook. Please see the main body of the Handbook in
relation to the use of electronic verification.
“Paragraphs 21(3) and 21(5) Paragraph 21(3) of the Code reads as follows:
Isle of Man’s Anti-Money
Laundering and Countering The written terms of business required to be in place in accordance with sub-
the Financing of Terrorism paragraph (2)(h) must in all cases require the customer to —
Code 2015”
(a) supply to the regulated person, information concerning the identity of the
underlying clients,
(i) in relation to persons to whom any of heads (a) to (d) of
subparagraph (6) applies, on request; and
(ii) in relation to persons to whom head (e) or (f) of that
subparagraph applies, immediately;
(d) inform the regulated person specifically of each case where the
customer is not required or has been unable to verify the identity of an
underlying client;
(e) inform the regulated person if the customer is no longer able to comply
with the provisions of the written terms of business because of a change
of the law applicable to the customer; and
(f) do all such things as may be required by the regulated person to enable
the regulated person to comply with its obligations under sub-paragraph
(2).
The regulated person must take reasonable measures to satisfy itself that —
(a) the procedures for implementing this paragraph are effective by testing
them on a random and periodic basis no less than once every 12 months;
and
273
AML/CFT Handbook Appendix G
(b) the written terms of business confer the necessary rights on the
regulated person.
“Regulated person”
(a) any person holding a financial services licence issued under section 7 of
the Financial Services Act 200838;
(b) any person authorised under section 8 the Insurance Act 2008;
(c) any person registered under section 25 of the Insurance Act 2008;
(d) a retirement benefits schemes administrator registered under section 36
of the Retirement Benefits Schemes Act 200039; or
(e) a person holding an online gambling licence issued under section 4 of
the Online Gambling Regulation Act 200140;
Signature” This must be signed by an authorised signatory of the Customer and the
Regulated person
“Source of funds” This relates to the source of the underlying client’s funds as per Section 4.13 of
the AML/CFT Handbook.
38 AT 8 of 2008
39 AT 14 of 2000
40 AT 10 of 2001
274
AML/CFT Handbook Appendix G
275
AML/CFT Handbook Appendix H
Appendix H
Wire Transfers
The EU’s legislation which had implemented measures to prevent electronic transfers
of funds (“wire transfers”) being abused for money laundering or the financing of
terrorism was strengthened with effect from 26 June 2017 when Regulation (EU)
2015/847 repealed and replaced Regulation (EU) No 1781/2006.
It was published in the Official Journal of the European Union (OJ L 141) on 5 June
2015. It is available at:
http://eur-lex.europa.eu/legal-
content/EN/ALL/?uri=CELEX:32015R0847&qid=1500371387186
The Regulation requires the ordering financial institution to ensure that all wire
transfers carry specified information about the originator (Payer) who gives the
instruction for the payment to be made and the Payee who receives the payment. The
core requirement is that the Payer information consists of name, address, account
number, official personal document number, customer identification number or date
and place of birth; and that the Payee information consists of name and account
number. There are also requirements imposed on any intermediary payment service
provider. However, there are a number of permitted variations and concessions and
those relevant to the Handbook are set out in below.
To maintain the position where wire transfers between the Island and the UK can be
treated as if they were transfers within the UK, Regulation (EU) 2015/847 was applied
(with appropriate modifications) as part of the law of the Island by the European Union
(Information Accompany Transfers of Funds) Order 2016 as amended by the
European Union (Information Accompanying Transfers of Funds) (Amendment) Order
2017. The text of the EU Regulation as modified in its application to the Island is
attached to the amendment Order. The Information Accompanying Transfers of Funds
Regulations 2016 were made to implement the Order. These Isle of Man Regulations
contain enforcement provisions and sanctions for non-compliance, and came into
force on 26 June 2017.
References to the British Islands in this Section are to an area that comprises the
United Kingdom, the Bailiwick of Guernsey, the Bailiwick of Jersey and the Isle of Man.
To ensure that the data protection position is beyond any doubt, it may be advisable
276
AML/CFT Handbook Appendix H
for a payer Payment Service Provider (“PSP”) to ensure that terms and conditions of
business include reference to the information that will be provided.
The Regulation is widely drawn and intended to cover all types of funds transfer falling
within its definition as made “by electronic means” other than those specifically
exempted wholly or partially by the Regulation. For British Islands based PSPs it
therefore includes, but is not necessarily limited to, international payment transfers
made via SWIFT, including various Euro payment systems, and domestic transfers via
CHAPS and BACS.
The Regulation specifically exempts transfers where both Payer and Payee are PSPs
acting on their own behalf, i.e. this will apply to MT 200 series payments via SWIFT.
This exemption will include MT 400 and MT 700 series messages when they are used
to settle trade finance obligations between banks.
The UK credit clearing system is out of scope of the Regulation as it is paper based
and hence transfers are not carried out “by electronic means”. Cash and cheque
deposits over the counter via bank giro credits are not therefore affected by the
Regulation.
Relevant persons must ensure that the Payer information conveyed in the payment
relating to account holding customers is accurate and has been verified. The
verification requirement is deemed to be met for account holding customers of the
relevant person whose identity has been verified in accordance with the Code. No
further verification of such account holders is required, although relevant persons may
wish to exercise discretion to do so in individual cases.
Information Requirements
277
AML/CFT Handbook Appendix H
(a) Address ONLY may be substituted with the Payer’s official personal document
number, date and place of birth, national identity number or customer
identification number. In the event a Payee PSP demands the Payer’s address,
where one of the alternatives had initially been provided, the response to the
enquiry should point that out. Only with the Payer’s consent or under judicial
compulsion should the address be additionally provided.
(b) Where the payment is not made from a payment account, the requirement for an
account number must be substituted by a unique transaction identifier which
permits the payment to be traced back to the Payer. The Regulation defines a
unique identifier as “a combination of letters, numbers or symbols, determined
by the payment service provider, in accordance with the protocols of the payment
and settlement systems or messaging systems used for the transfer of funds,
which permits the traceability of the transaction back to the payer and the payee.”
(c) The extent of the information supplied in each field will be subject to the
conventions of the messaging system in question and is not prescribed in detail
in the Regulation.
(d) The account number could be, but is not required to be, expressed as the IBAN
(International Bank Account Number).
(e) Where a bank is itself the Payer, as will sometimes be the case even for SWIFT
MT 102 and 103 messages, this Guidance considers that supplying the Bank
Identifier Code (BIC) constitutes complete Payer information for the purposes of
the Regulation, although it is also preferable for the account number to be
included where available. The same applies to Business Entity Identifiers (BEIs),
although in that case the account number should always be included. As the use
of BICs and BEIs is not specified in the Regulation, there may be requests from
Payee PSPs for address information.
(f) Where payment instructions are received manually, e.g. over the counter, the
Payer name and address (or permitted alternative) should correspond to the
account holder. Any request to override customer information should be
processed within a rigorous referral and approval mechanism to ensure that only
in cases where a relevant person is entirely satisfied that the reason is legitimate
should the instruction be exceptionally dealt with on that basis. Any suspicion of
improper motive by a customer must be reported to the relevant person’s MLRO.
278
AML/CFT Handbook Appendix H
Where the payment is not made from a payment account, the requirement for an
account number must be substituted by a unique transaction identifier which permits
the payment to be traced back to the Payee. The Regulation defines a unique identifier
as “a combination of letters, numbers or symbols, determined by the payment service
provider, in accordance with the protocols of the payment and settlement systems or
messaging systems used for the transfer of funds, which permits the traceability of the
transaction back to the payer and the payee.”
A table detailing the information needed for different types of payment is below:
Payment type Payer Payee
Outside the British Name Name
Islands, over €1,000 Account number/transaction ID Account number/transaction ID
Address*
Outside the British Name Name
Islands, under €1,000 Account number/transaction ID Account number/transaction ID
Inside the British Islands Account number/transaction ID Account number/transaction ID
* Or official personal document number, customer identification number or date and
place of birth.
Relevant persons must have effective risk based procedures for checking that
incoming wire transfers are compliant with the relevant information requirement. These
procedures must include, where appropriate, ex-post monitoring or real time
monitoring in order to detect whether the required information on the payer or payee
is missing. Additionally, the Regulation requires PSPs to take remedial action when
they become aware that an incoming payment is not compliant.
(a) the sampling could normally be restricted to payments emanating from PSPs
outside the British Islands where the complete information requirement applies;
(b) the sampling could be weighted towards non FATF member jurisdictions,
particularly those deemed high risk under a PSP’s own country risk assessment,
279
AML/CFT Handbook Appendix H
Where a relevant person becomes aware subsequent to processing the payment that
it contains meaningless or incomplete information either as a result of random
checking or other monitoring mechanisms under its risk based approach, it must:
(a) seek the necessary information on the Payer and/or Payee; and/or,
(b) take any necessary action under any applicable law, regulation or administrative
provisions relating to money laundering or terrorist financing.
Where a PSP is identified as having regularly failed to comply with the information
requirements, a relevant person must take steps, which may initially include issuing
warnings and setting deadlines, prior to either refusing to accept further transfers from
that PSP or deciding whether to terminate its relationship with that PSP either
completely or in respect of funds transfers.
With regard to transfers from PSPs located in non-member countries of FATF, relevant
persons should endeavour to transact only with those PSPs with whom they have a
relationship that has been subject to a satisfactory risk-based assessment of their
AML/CFT culture and policy and who accept the standards set out in the Interpretative
Note to FATF Recommendation 16.
It should be borne in mind when querying incomplete payments that some FATF
member countries outside the EU may have framed their own regulations to
incorporate a threshold of Euro or US Dollars 1000 below which the provision of
complete information on outgoing payments is not required. This is permitted by the
Interpretative Note to FATF Recommendation 16. The USA is a case in point. This
does not preclude Isle of Man PSPs from calling for the complete information where it
has not been provided, but it is reasonable for a risk-based view to be taken on
whether, or how far, to press the point.
280
AML/CFT Handbook Appendix H
Links to legislation
281
AML/CFT Handbook Appendix I
Appendix I
Proforma Register of Money Laundering and Financing of Terrorism Disclosures Made to the MLRO or
Deputy MLRO
This pro-forma is a guidance document, based on paragraph 35 of the Anti-Money Laundering and Countering the Financing of Terrorism Code
(“AML/CFT Code”) 2015 which may be used as a template by Relevant Persons.
“A Relevant Person must establish and maintain separate registers of all external disclosures and internal disclosures.”
Paragraph 35(1) of the AML/CFT Code 2015
282
AML/CFT Handbook Appendix I
283
AML/CFT Handbook Appendix J
Appendix J
Proforma Register of Money Laundering and Financing of Terrorism External Disclosures Made to FIU
This pro-forma is a guidance document, based on sub-paragraph 35 of the Anti-Money Laundering and Countering the Financing of Terrorism
Code (“AML/CFT Code”) 2015 which may be used as a template by Relevant Persons.
“A Relevant Person must establish and maintain separate registers of all external disclosures and internal disclosures.”
Paragraph 35(1) of the AML/CFT Code 2015
284
AML/CFT Handbook Appendix J
285
AML/CFT Handbook Appendix K
Appendix K
Proforma Register of Money Laundering and Financing of Terrorism Enquiries
This pro-forma is a guidance document, based on -paragraphs 36 of the Anti-Money Laundering and Countering the Financing of Terrorism Code
(“AML/CFT Code”) 2015 which may be used as a template by Relevant Persons.
“A Relevant Person must establish and maintain a register of all money laundering and financing of terrorism enquiries made of it by law
enforcement or other competent authorities.”
Paragraph 36 of the AML/CFT Code 2015
Para 36(2)(a) Para 36(2)(b) Para 36(2)(c) Para 36(2)(d) Para 36(2)(e)
Date when the Nature of the Name of the Powers being Details of the accounts Comments and further action#
enquiry was enquiry enquiring officer exercised or transactions involved
received and agency (e.g. name of customer,
account number and
date of transactions
286
AML/CFT Handbook Appendix K
287
AML/CFT Handbook Appendix L
Appendix L
Terrorist Financing Typologies and Countering the Financing of
Terrorism Guidance
Introduction
The purpose of this document is to provide specific guidance for all businesses in the
regulated sector which may be vulnerable to misuse by those who wish to finance
terrorism. The document will provide some detail of the ways in which terrorist
financing takes place building from the brief definition of the term found at 7.3.2 of the
main body of the Handbook. A number of typologies are set out along with a
description of countermeasures which businesses in the regulated sector should
adopt. This guidance should be read in conjunction with the main body of the
Handbook. As with all guidance in the Handbook, this guidance is not law, however it
is persuasive. Where a person follows guidance this would tend to indicate compliance
with the legislative provisions and vice versa.
288
AML/CFT Handbook Appendix L
The direct (estimated) costs involved in carrying out terror attacks have been quite
widely reported. The table below gives an indication of the approximate costs of some
of the more recent high profile attacks.
As can be seen the direct cost of each of these attacks is relatively low and appears
to be decreasing, particularly with the recent use of unsophisticated, inexpensive but
effective modus operendi.
Because of the high profile given to the direct costs, it is easy to obscure the bigger
picture. The broader operational costs which underpin terrorist activity are significantly
higher and include:
289
AML/CFT Handbook Appendix L
http://www.fatf-gafi.org/media/fatf/documents/reports/Emerging-Terrorist-Financing-
Risks.pdf
The need for terrorist groups to obtain funds, move and use them has always been
there, but as terrorist groups have evolved, so too have the methods they use in order
to do this. The FATF refer to these recent developments as “emerging TF risks”.
Although there is much overlap between the methods used by large terrorist
organisations, small terrorist cells, lone actors and foreign terrorist fighters (“FTFs”),
some distinctly different patterns can be seen which will be outlined below. For more
detail on these, please refer to the FATF paper above.
Fund raising
The mainstream methods used by terrorist organisations to raise funds include the
following:
This is one of the most important methods by which mainstream terrorist organisations
use to raise funds. A 2014 FATF study found that the abuse or misuse of NPOs
occurred in five different ways:
290
AML/CFT Handbook Appendix L
Movement of funds
Any method which can be used to transfer funds is potentially vulnerable to misuse for
terrorist financing including the following:
The banking sector remains vulnerable to misuse for terrorist financing as it remains
the most efficient and reliable way to transfer funds internationally and several FATF
reports have commented on the use of the bank accounts of NPOs to move funds to
terrorist organisations. It is attractive to terrorist groups because of the speed and ease
by which it can be used to transfer funds within the global financial system. The global
banking system is so large that terrorist fund movements have the opportunity to blend
in with normal financial activity and avoid attracting attention. Terrorist fund
movements may often be relatively small in comparison with legitimate commercial
fund movements and therefore not arouse suspicion. Studies have found typologies
including the deposit of cash in a personal bank account followed by international fund
transfers, the use of legitimate and shell business accounts and the use of debit cards
by terrorist groups to withdraw funds from accounts opened by terrorist sympathisers.
This sector is also vulnerable to misuse for terrorist financing, particularly in those
regions where access to banking services is limited. As migrant communities and
families rely heavily on money transmission services to send funds home, this provides
an opportunity to mingle terrorist financing fund movements with legitimate family
transfers making them difficult to detect. Studies have also reported the use of money
transmission services to finance foreign terrorist fighters.
Cash remains the medium most used by terrorist organisations. Funds may be raised
in many ways and transferred globally using the international banking system or
291
AML/CFT Handbook Appendix L
money transmitters, but they are often converted into cash before being taken into
conflict zones and used.
In September 2014 the United Nations Security Council defined foreign terrorist
fighters as individuals who travel or attempt to travel to a state other than their state of
residence or nationality “for the purpose of the perpetration, planning or preparation of
or participation in terrorist acts or the providing or receiving of terrorist training”.
FTFs are not new, but the conflict in Syria and Iraq has led to a significant escalation
in their involvement in terrorist activity. An estimated 30,000 FTFs currently operate in
this region. Returning FTFs also represent a new and dangerous threat of terrorist
activity in their country of origin. Self-funding by individuals and funding by recruitment
and facilitation networks are considered to be the main methods used to raise funds
for FTFs.
The funding levels required by FTFs are relatively low and are required to support
transportation, accommodation whilst en-route to areas of conflict, outdoor clothing,
camping equipment, mobile phones, food and general living expenses.
FTFs often use funds from legitimate sources such as employment income, family
support, social assistance, student grants and the sale of personal belongings and
assets purchased on credit just before their planned travel. Other typologies include
the FTF taking out small short-term loans, often from multiple lenders that they have
no intention of ever repaying.
FTFs fund movements usually involve the physical transportation of cash, the use of
ATMs to access funds held in bank accounts and money transmission services.
Virtual currencies;
Prepaid cards; and
Internet-based payment services
To transfer and/or access funds.
292
AML/CFT Handbook Appendix L
No businesses in the regulated sector are immune from being used for terrorist
financing, but the following sectors may be particularly vulnerable:
Banking sector;
Money transmission Services;
Non-profit organisations:
Corporate service providers.
It is essential that businesses apply effective customer due diligence, not only to
determine who their customers are; but also, probably of more importance, to
determine the nature and intended purpose of the business relationship. If that
business relationship is likely to involve remittance of funds to or business activity in
other jurisdictions, further enquiries should be pursued at the onset of the relationship
as to the nature, level, frequency and purpose of such remittances or business activity.
These enquiries will also form part of the customer risk assessment and if remittances
or activity are likely to involve jurisdictions which bear a higher risk of terrorist
financing, areas of conflict or neighbouring regions, consideration should be given to
raising the risk rating of the customer to higher risk and obtaining enhanced due
diligence as per paragraph 15 of the Code. The customer risk assessment and
customer due diligence should give the relevant person a baseline view of what is
likely to be normal and effective ongoing monitoring should identify unusual or
suspicious activity. Remittance of funds to or business activity in higher risk
jurisdictions may lead the relevant person to perform further scrutiny and institute
further enquiries as to the nature and purpose of those remittances or activity.
Proper screening of the screening of both the customer and any proposed or actual
recipient of funds or business services may be appropriate in the circumstances
detailed above.
293
AML/CFT Handbook Appendix L
Customers who may have banked for a long time, even have a dormant account
which has been suddenly reactivated;
Lots of money for transport expenditure to higher risk locations;
Consumer loans which are not then repaid;
Contributions to relevant charities;
On social media, lots of “new friends” especially over a wide geographical area;
Funds in from crowd funding or donation sites.
294