Which two actions should Financial Intelligence Units (FIUs) take when submitting a request to another FIU? (Choose two.)
Correct Answer: B,C
According to the Egmont Group of Financial Intelligence Units, which is a global network of FIUs that promotes information exchange and cooperation, FIUs making requests to another FIU should disclose the reason and purpose for the request, andprovide feedback on how the information was used12. These actions are intended to enhance mutual trust, transparency, and accountability between FIUs, and to facilitate the effective use of financial intelligence and information for combating money laundering, terrorist financing, and other financial crimes12. FIUs making requests should also respect the confidentiality and data protection requirements of the FIU receiving the request, and avoid imposing unreasonable or unduly restrictive conditions12. FIUs making requests should not send the same request to all FIUs, as this would be inefficient, unnecessary, and potentially harmful. FIUs should only send requests to FIUs that are relevant and competent to provide the information they need, based on the nature and scope of the case12. Sending the same request to all FIUs could overload the system, create duplication, and compromise the security and confidentiality of the information12. FIUs making requests should also make best efforts to provide complete andfactual information, but this is not an action they should take when submitting a request, but rather when responding to a request from another FIU12. Egmont Group of Financial Intelligence Units Operational Guidance for FIU Activities and the Exchange of Information Principles for Information Exchange Between Financial Intelligence Units
CAMS Exam Question 212
A new compliance officer is reviewing the bank's anti-money laundering program and notices that the risk assessment was completed six months ago. Since that time, the bank acquired another financial institution, renamed the internal records group, and streamlined cash handling procedures. Which factor causes the compliance officer to update the bank's risk assessment?
Correct Answer: A
Assessing AML/CFT is an ongoing and evolving component of maintaining a compliant AML/CFT program. Evaluating the risk-scoring model and conducting the risk assessment itself may need to be performed annually, every 18 to 24 months, before the launch of a new product or when an acquisition of another financial institution occurs.
CAMS Exam Question 213
A potential client calls a broker-dealer wishing to purchase securities. The client does not appear to be concerned with any fees associated with the account or price of the securities. Further information provided by the potential client indicates the individual may have relatives working for a company in which the potential client wants to invest. Which type of activity is the potential client attempting to commit?
Correct Answer: C
The potential client is attempting to commit the illegal activity of using insider information to trade securities. Insider information is any material, non-public information that could affect the price or value of a security, such as earnings reports, mergers, acquisitions, or regulatory actions. Insider trading is the act of buying or selling securities based on insider information, which gives the trader an unfair advantage over other investors who do not have access to such information. Insider trading violates the principles of market integrity, fairness, and transparency, and can undermine investor confidence and trust. Insider trading is also a form of market abuse and financial crime, and is subject to civil and criminal penalties. ACAMS Study Guide for the CAMS Certification Examination - 6th Edition, Chapter 1: Risks and Methods of Money Laundering and Terrorism Financing, Section 1.3: Financial Crime, Subsection 1.3.3: Market Abuse, pp. 25-26 ACAMS CAMS Certification Video Training Course, Module 1: Risks and Methods of Money Laundering and Terrorism Financing, Lesson 1.3: Financial Crime, Sublesson 1.3.3: Market Abuse, Video Time: 2:00-3: 30 Exam CAMS: Certified Anti-Money Laundering Specialist (the 6th edition), Question 12, Answer C
CAMS Exam Question 214
An anti-money laundering specialist has just developed and implemented an anti-money laundering program. What is the most effective resource to evaluate the effectiveness of the program?
Correct Answer: D
A qualified independent party/auditor is the most effective resource to evaluate the effectiveness of an anti- money laundering program. This is because an independent auditor can provide an objective and unbiased assessment of the program, identify any weaknesses or gaps, and make recommendations for improvement. An independent auditor can also verify the compliance of the program with the relevant regulations and best practices, and test the adequacy and functionality of the internal controls, customer due diligence processes, and transaction monitoring systems. An independent auditor can also help an organization prepare for regulatory examinations and audits, and avoid potential penalties or sanctions. = The main references for this question are the following sources: The document titled "Frequently Asked Questions Conducting Independent Reviews of Money Services Business Anti-Money Laundering Programs" published by the Financial Crimes Enforcement Network (FinCEN) in July 2010. You can access it by clicking here. The document titled "AML Audit: How to Effectively Assess Your Compliance Program" published by Alessa in May 2023. You can access it by clicking here. The document titled "Mutual Evaluations" published by the Financial Action Task Force (FATF). You can access it by clicking here.
CAMS Exam Question 215
What are four key elements that a KYC program should contain according to the Basel Committee requirements?
Correct Answer: B
According to the Basel Committee on Banking Supervision (BCBS), a sound KYC program should contain four essential elements: (i) customer acceptance policy; (ii) customer identification; (iii) on-going monitoring of higher risk accounts; and (iv) risk management1. These elements correspond to the options B in the question, as customer identification involves verifying the identity and beneficial ownership of the customers, risk assessment involves determining the level of risk posed by the customers and their activities, customer screening involves checking the customers against relevant sanctions and watch lists, and monitoring involves reviewing the customers' transactions and behavior for any anomalies or red flags. Consolidated KYC Risk Management - Bank for International Settlements Reference: https://www.bis.org/publ/bcbs77.pdf