-
What's new
- All What's new
-
European
- What's new - All
- <hr>
- What's new - last 24 hrs
- What's new - last 7 days
- What's new - last 30 days
- <hr>
- New EU Legislation
- European Commission
- European Banking Authority
- European Securities and Markets Authority
- European Insurance and Occupational Pensions Authority
- <hr>
- Consultations and similar
- Commentaries
- <hr>
- Downloads and Exports
- Latest news by Topics
-
International
- What's new - All
- <hr>
- What's new - last 24 hrs
- What's new - last 7 days
- What's new - last 30 days
- <hr>
- Bank for International Settlements
- Basel Committee on Banking Supervision
- Egmont Group
- International Association of Insurance Supervisors
- International Monetary Fund
- <hr>
- Consultations and similar
- Commentaries
- <hr>
- Downloads and Exports
- Latest news by Topics
- Downloads and Exports
- Legislation
- Organisations
-
Commentaries
- Consultations
- Sanctioned regimes
- IFRSs
- Regulatory calendar
- Quicklinks
-
More
Table of Contents
Document Overview
AI Disclaimer
Please note that AI-generated content should not be considered legal advice. Users are encouraged to consult with qualified professionals or legal advisors where specific legal guidance is required.
We are committed to transparency and responsible use of AI in a way that supports, but never replaces, human expertise.
If you have any questions or concerns about the use of AI on our platform, please feel free to contact us.
10.14
Examples of the types of monitoring systems firms should put in place include:
a) transaction monitoring systems that detect anomalies or suspicious patterns of behaviour, including the unexpected use of the product in a way for which it was not designed; the firm may be able to disable the product either manually or through on- chip controls until it has been able to satisfy itself that there are no grounds for suspicion;
b) systems that identify discrepancies between submitted and detected information, for example, between submitted country of origin information and the electronically detected IP address;
c) systems that compare data submitted with data held on other business relationships and that can identify patterns such as the same funding instrument or the same contact details;
d) systems that identify whether the product is used with merchants dealing in goods and services that are associated with a high risk of financial crime;
e) systems that link e-money products to devices or IP addresses for web-based transactions.