Anti Money Laundering & Countering of Terrorist Financing course

Requirements

You need basic device with video viewing capability This course is for working professionals with basic understanding of business, banking and financial subjects , even freshers & student already in Pre and Graduation level aspiring for a Career in Compliance related field in the Financial Industry Globally

The FICA Awareness Training is aimed at employees of accountable institutions and covers basic money-laundering and terrorist financing concepts, anti-money-laundering legislation in South Africa, the risk-based approach, and looks at the requirements for customer due diligence, reporting of certain transactions and record-keeping requirements.

WHAT WILL THE FICA COURSE ENABLE YOU TO DO?

The course deals with Anti-Money Laundering (AML) and Countering the Financing of Terrorism (CFT), the Financial Intelligence Centre Act, POCA and POCDATARA, risk-management and compliance programmes (RMCP), customer due diligence, cash threshold and suspicious transaction reporting, terrorist property reporting and record-keeping.

Terrorist Financing
This topic provides and explanation of Terrorism, Sources of Terrorist financing, the objectives of Terrorist organisations, and the impact of Money-laundering and financing terrorism.

 

Anti-money laundering legislation
This topic looks at the various Anti-Money Laundering (AML) and Countering the Financing of Terrorism (CFT) legislation in South Africa. Legislation covered include FICA, POCA and POCDATARA.

Role players and their responsibilities
This topic focuses on the various players in the AML/CFT arena and explains their responsibilities in terms of Reporting, Risk Management, Internal Controls,

Outcomes

At the end of the course, the student should be able to:

1. Appraise, analyse and synthesize the concepts of anti-money laundering/counter financing of terrorism (AML/CFT).

2. Identify typologies and incidences of  money laundering and financing of terrorism.

3. Examine measures against money laundering and initiatives taken by various organizations to combat terrorism.

4. Examine the implications of offshore financial centers and non-cooperative countries on AML/CFT.

5. Comprehend regulations applicable to the financial sector.

6. Recognize the implications and penalties for non-compliance with Anti-Money Laundering legislations.

7. Identify and be able to comply with requirements ushered in by the latest legislation in AML/CFT.

8. Undertake due diligence measures to deter money laundering and terrorist financing.

9. Implement relevant AML/CFT measures in their particular sectors.

This Anti- Money Laundering  and Counter Financing of Terrorism course seeks to equip participants with knowledge pertaining to regulatory and structural requirements needed to comply with Anti-Money Laundering/Counter Financing of Terrorism requirements.

COURSE CONTENT:

1. INTRODUCTION TO MONEY LAUNDERING

MONEY LAUNDERING HISTORY
KEY TAKEAWAYS
MONEY LAUNDERING A MASSIVE PROBLEM
REGULATION REQUIREMENTS

2. ANTI-MONEY LAUNDERING LEGISLATION AND REGULATORY FRAMEWORK

INTRODUCTION
UNITED NATION CONVENTIONS
ANTI-MONEY LAUNDERING LEGISLATION IN THE UK

3. ANTI-MONEY LAUNDERING ORGANISATIONS RESPONSIBILITIES

INTRODUCTION
COMMON TERMINOLOGY USED
COMPANY COMPLIANCE
REPORTING OFFICER
EMPLOYEE SCREENING
EMPLOYEE RESPONSIBILITIES
ANTI-LAUNDERING POLICIES

4. ANTI-MONEY LAUNDERING RISK BASED APPROACH

COMMON TERMINOLOGY USED
TYPES OF BUSINESS TO BE IDENTIFIED
YOUR CUSTOMERS
LOCATION
SECTOR
DEVELOPING A RISK BASED APPROACH

5. CUSTOMER DUE DILIGENCE

INTRODUCTION
COMMON TERMINOLOGY USED
CUSTOMER DUE DILIGENCE
SITUATIONS TO APPLY TO
CUSTOMER IDENTIFICATION OF BENEFICIAL OWNERS
CUSTOMER DUE DILIGENCE MEASURES
ENHANCED DUE DILIGENCE (E.D.D.)
SIMPLIFIED DUE DILIGENCE (S.D.D.)
POLITICALLY EXPOSED PERSONS (P.E.P.)
RECORD KEEPING
HIGH RISK COUNTRIES

6. RECORD KEEPING

INTRODUCTION
COMMON TERMINOLOGY USED
DUE DILIGENCE RECORDS
SUSPICIOUS ACTIVITY REPORTS (S.A.R.)
TRAINING RECORDS AND AWARENESS
GENERAL RECORDS OF INTERNAL A.M.L. CONTROLS
USE OF ELECTRONIC DATA
DELETION OF PERSONAL DATA

7. IDENTIFYING AND REPORTING SUSPICIOUS ACTIVITY

IDENTIFYING SUSPICIOUS ACTIVITY
SUSPICIOUS ACTIVITY REPORTING
INCLUDED IN EXTERNAL SAR
CONFIDENTIALITY
CONSENT NEEDED
BUSINESS OPERATION AFTER SUBMISSION OF SAR
REPORTING SUSPICIOUS ACTIVITY
WHISTLE-BLOWING

8. STAFF TRAINING

RELEVANT BUSINESS
TRAINING PROGRAMS
TRAINING REQUIREMENTS
NOMINATED OFFICER
WHEN TO TRAIN
WHEN SHOULD TRAINING BE COMPLETED?
CPD TRAINING

Leave a Reply

Your email address will not be published. Required fields are marked *

Comment moderation is enabled. Your comment may take some time to appear.