NATIONAL RISK ASSESSMENT TOOL GUIDANCE MANUAL MODULE 7 VULNERABILITY OF DESIGNATED NON-FINANCIAL BUSINESSES AND PROFESSIONS JUNE 2015 World Bank Group’s National Money Laundering and Terrorist Financing Risk Assessment Toolkit Disclaimer and Terms of Use The National Money Laundering/Terrorist Financing Risk Assessment (NRA) Toolkit has been developed by World Bank Group (WBG) staff members to support WBG client countries and jurisdictions in self- assessing their money laundering and terrorist financing risks. The NRA Toolkit contains guidance manuals, including this document; Excel worksheets and the formulas therein; PowerPoint presentations; and any other materials provided as part of the NRA Toolkit. Jurisdictions are advised to use the NRA Toolkit with technical assistance from the WBG to ensure proper application. The NRA Toolkit is supplied in good faith and is based on certain factors, assumptions, and expert opinions that the WBG may in its absolute discretion have considered appropriate at the time the toolkit was developed. Even if being done through the NRA Toolkit, an NRA is conducted as a self-assessment by a jurisdiction and not by the WBG staff. The user is responsible for any data, statistics, and other information put into the various NRA Toolkit templates, as well as for any interpretation and conclusion based on the results of the NRA Toolkit. The WBG provides the NRA Toolkit as is and disclaims all warranties, oral or written, express or implied. That disclaimer includes without limitation a warranty of the fitness for a particular purpose or noninfringement or accuracy, completeness, quality, timeliness, reliability, performance, or continued availability of the NRA Toolkit as a self-assessment tool. The WBG does not represent that the NRA Toolkit or any information or results derived from the NRA Toolkit are accurate or complete or applicable to a user’s circumstances and accepts no liability in relation thereto. The WBG shall not have any liability for errors, omissions, or interruptions of the NRA Toolkit. The WBG will not be responsible or liable to users of the NRA Toolkit or to any other party for any information or results derived from using the NRA Toolkit for any business or policy decisions made in connection with such usage. Without limiting the foregoing, in no event shall the WBG be liable for any lost profits—direct, indirect, special, incidental, or consequential—or any exemplary damages arising in connection with use of the NRA Toolkit, even if notified of the possibility thereof. By using the NRA Toolkit, the user acknowledges and agrees that such usage is at the user’s sole risk and responsibility. The NRA Toolkit does not constitute legal or other professional advice, but in particular it does constitute an interpretation of these Financial Action Task Force (FATF) documents: FATF 40 Recommendations and Methodology for Assessing Technical Compliance with the FATF Recommendations and the Effectiveness of AML/CFT Systems. The WBG shall not be responsible for any adverse findings, ratings, or criticisms from the FATF or FATF-style regional bodies arising from use of the NRA Toolkit. Nothing herein shall constitute or be considered a limitation on or a waiver of the privileges and immunities of the International Bank for Reconstruction and Development, which are specifically reserved. ii Acknowledgements The DNFBP Vulnerability Module of the National ML/TF Risk Assessment Tool has been developed by a World Bank team that was led by Emiko Todoroki and included Kuntay Celik, Louis de Koker, and Ameet Kaur. The module is based on the structure of the Banking Sector Module. The team thanks the staff and the management of the World Bank’s Financial Market Stability and Integrity team for their significant contributions, which played key role in the evolution of the module into its current state. iii CONTENTS 1. OBJECTIVES OF THE DNFBP SECTOR VULNERABILITY MODULE...................................................... 1 2. UNDERSTANDING THE DNFBP VULNERABILITY MODULE .............................................................. 2 2.1. DNFBP Vulnerability Module in the Big Picture ................................................................................ 2 2.2. Assessment of Products on a Needs Basis (Optional Module).......................................................... 4 2.3. Variables ............................................................................................................................................ 5 2.4. Module Structure (The Network) ...................................................................................................... 6 2.5. The Logic behind the Network .......................................................................................................... 7 3. GENERAL GUIDANCE FOR THE ASSESSMENT ................................................................................ 9 3.1. Introduction ....................................................................................................................................... 9 3.2. Organization of the Assessment Work .............................................................................................. 9 3.3. Period for Information and Data Collection .................................................................................... 10 3.4. Possible Sources of Information and Data ...................................................................................... 11 4. ASSESSMENT WORKSHEETS FOR INPUT VARIABLES ................................................................... 11 4.1. Assessment Worksheets for General Input Variables ..................................................................... 11 4.1.1. Comprehensiveness of AML Legal Framework ............................................................ 14 4.1.2. Effectiveness of Supervision/Oversight Activities ........................................................ 15 4.1.3. Availability and Enforcement of Administrative Sanctions .......................................... 16 4.1.4. Availability and Enforcement of Criminal Sanctions .................................................... 17 4.1.5. Availability and Effectiveness of Entry Controls ........................................................... 18 4.1.6. Integrity of Business/Profession Staff .......................................................................... 19 4.1.7. AML Knowledge of Business/Profession Staff .............................................................. 20 4.1.8. Effectiveness of Compliance Function (Organization) ................................................. 21 4.1.9. Effectiveness of Suspicious Activity Monitoring and Reporting ................................... 22 4.1.10. Availability and Access to Beneficial Ownership Information ...................................... 23 4.1.11. Availability of Reliable Identification Infrastructure .................................................... 24 4.1.12. Availability of Independent Information Sources......................................................... 25 4.2. Assessment Worksheets for the Inherent Vulnerability Variables ................................................. 26 4.2.1. Total size/volume of the business/profession ............................................................. 27 4.2.2. Client-base profile of the business/profession............................................................. 30 4.2.3. Level of cash activity associated with the business/profession ................................... 32 4.2.4. Other vulnerable factors of the business/profession................................................... 33 5. DESCRIPTION OF THE INTERMEDIATE VARIABLES ...................................................................... 37 ANNEX 1 – INSTRUCTIONS FOR USING THE EXCEL FILE ........................................................................ 39 ANNEX 2 – PRODUCT-BASED ASSESSMENT MODULE (MODULE 7.B) ..................................................... 58 iv Important Reminders for the Working Group • Base your assessments on group discussions to ensure inclusion of a wide array of perspectives. All the members of the Working Group should contribute to discussions, as well as to the overall assessment, as the inclusion of all viewpoints and perspectives will contribute to a higher-quality report. • Keep a record of the key arguments, findings, and conclusions of your discussions. These notes will be important in documenting the analysis and support for the conclusions and findings that will feature in the final report. Assign a note-taker for this task. • The quality of the output depends on the quality of the input. An unrealistic assessment will reduce the credibility of the assessment and will limit the benefits the jurisdiction can derive from the assessment. • During the assessment please clearly identify any problems, weaknesses, or gaps by determining what is missing and what is not working. Such an approach will help you draw up the action plans following the assessment. • Support all your findings and conclusions with clear analysis and documented evidence, in order to demonstrate the basis for each rating. • Prepare team reports on the key findings and conclusions that are clearly based on references to underlying sources. These reports will become the building blocks of the overall National Risk Assessment report. • For the assessment of the DNFPB sector, separately assess each of the businesses and professions that make up the overall DNFPB sector. Save each assessment in a separate Excel file. 1. OBJECTIVES OF THE DNFBP SECTOR VULNERABILITY MODULE The main objectives of this module are to: • Identify the vulnerability of each of the (relevant) businesses and professions that make up the country’s designated non-financial businesses and professions (DNFBP) sector • Identify businesses/professions of high vulnerability in the DNFBP sector • Identify, on a needs basis, the products/services1 offered by the businesses/professions with high ML vulnerability (see Annex 2) • Prioritize action plans that will strengthen anti-money laundering controls (AML controls) in the DNFBP sector. 1The assessment may include products or services. For simplicity, this document will subsequently refer only to “products.” This reference should be understood as “products or services.” 1 The outcome of the DNFBP vulnerability assessment is necessary for: • Designing action plans for more effective AML policies and practices in the sector • Evaluating the impact of different interventions by regulatory (and other relevant) authorities • Comparing the level of vulnerability of a business/profession in the DNFBP sector with other businesses/professions, and the vulnerability level of each of the assessed business/profession in relation to other financial sectors • Ensuring efficient resource allocation • Developing specific AML controls for high-risk businesses/professions in the DNFBP sector and their products. 2. UNDERSTANDING THE DNFBP VULNERABILITY MODULE 2.1. DNFBP Vulnerability Module in the Big Picture It is important to understand the module’s place and function in the bigger picture of the National Risk Assessment Tool (the tool). As shown in Figure 1, the vulnerability of a certain sector to money laundering and the money laundering threat to that sector together cause the money laundering risk for the sector. In addition to the risk at sector level, the vulnerability of a sector has an impact on the national vulnerability. Figure 1: DNFBP Vulnerability Module in the Big Picture of National Risk Assessment Tool MODULE 7 2 In terms of money laundering (ML), many factors contribute to the overall vulnerability of a country. Some factors have a direct impact, while others are more indirect. The importance and impact of a single factor often depends on the existence, or absence, of other factors. This National Risk Assessment Tool, which has been developed to determine country vulnerability, reflects the various key factors and their relationships. In this tool, these factors are called “variables.” For example, in this module, the variable Comprehensiveness of AML Legal Framework indicates the extent to which such laws and regulations of a jurisdiction contribute to the strength of anti-money laundering controls. The ratings assigned to these variables by the Working Group (which carries out the National Risk Assessment) consequently determine the overall vulnerability of the businesses and professions in the DNFBP sector. Please note that the module should be run separately for each of the identified businesses and professions in the DNFBP sector. The final rating of vulnerability for each business/profession will also serve as a separate input to the National Vulnerability module. Figure 1, shows only four sectors as examples. But the number of the sectors that feed into the national vulnerability can be up to 20. Begin this exercise by making a list of the businesses/professions in the DNFBP sector in your country. Suggested list of DNFBP businesses/professions The suggested list of DNFBP businesses/professions has been designed to provide a starting point to the Working Group (WG). The WG is encouraged to modify the list, depending on the country context and the type of businesses/professions present in the country. Table 1: Proposed list of DNFBP businesses/professions DNFBP BUSINESSES/ SUGGESTED PRODUCTS TO BE ASSESSED (IF NECESSARY): SEE 2.1 FOR MORE DETAILS PROFESSIONS • Land-based casinos and gambling houses Casinos • On-line (web) gambling. Real estate agents Transactions for their clients in buying and selling of real estate Real estate investors When conducting transactions for themselves or clients Dealers in precious Cash transactions with a customer equal to or above the applicable designated threshold metals and stones When they prepare for or carry out transactions for their client concerning the following activities: • Buying and selling of real estate • Managing of client money, securities, or other assets Lawyers, notaries, and • Management of bank, savings, or securities accounts other independent • Organization of contributions for the creation, operation or management of companies legal professionals • Creation, operation, or management of legal persons or arrangements, and buying and selling of business entities. When they prepare for or carry out transactions for their client concerning the following activities: • Buying and selling of real estate • Managing of client money, securities, or other assets Accountants, auditors, • Management of bank, savings, or securities accounts tax advisers • Organization of contributions for the creation, operation, or management of companies • Creation, operation, or management of legal persons or arrangements, and buying and selling of business entities. 3 When they prepare for or carry out transactions for a client concerning the following activities: • Acting as a formation agent of legal persons • Acting as (or arranging for another person to act as) a director or secretary of a company, a partner of a partnership, or a similar position in relation to other legal persons • Providing a registered office, business address or accommodation, correspondence, or Trusts and Company administrative address for a company, a partnership, or any other legal person or Service Providers arrangement (TCSPs) • Acting as (or arranging for another person to act as) a trustee of an express trust or performing the equivalent function for another form of legal arrangement • Acting as (or arranging for another person to act as) a nominee shareholder for another person. Other businesses and Products (specify) professions, specific to the country Some sub-categories within a product may pose significantly different ML risks. This may be due to factors such as inherent characteristics, client profile or volume, or it may be due to a lack of adequate AML controls for the product. In such cases, the WG may decide to break down these products still further. For example, in the case of the TCSPs and “acting as formation agent of legal persons,” the WG will need to consider which forms of legal entity and legal arrangements available in the country are most vulnerable to ML risks (due to their characteristics, and the criteria as laid out in the specific input variables), as well as the AML Controls. Particular attention should be given to products (and services) that allow clients to create “legal distance” between themselves and the assets (e.g., private limited liability companies and express trusts). 2.2. Assessment of Products on a Needs Basis (Optional Module) The WG can decide whether or not to undertake a more detailed assessment of the products provided by each business/profession. This decision should be based on following criteria: • Does the business/profession provide a single type of product or various products? • If a business/profession provides various products, does the ML/TF risk differ significantly among the products? • Is the business/profession significant in the country context? The more detailed product-based assessment is especially encouraged for legal professionals and TCSPs in financial centers. Up to five different products for each DNFBP business/profession may be assessed. The assessment of products is carried out in the same way as the assessment of DNFPB business/profession categories. Please note that the assessment criteria detailed in Section 4 also apply in the case of the product-based assessment. For more details on the product-based assessment module, please refer to Annex 2. Note that two options of the Excel assessment files are provided. The WG must first choose which Excel assessment file is most appropriate for each DNFPB business/profession. The options are: • Category Vulnerability Assessment • Detailed Product-Based Assessment. In case of Category Vulnerability Assessment, use Excel File 7.A DNFBPs Vulnerability. If Detailed Product-Based Assessment is undertaken for the business/profession, use Excel File 7.B DNFPBs Vulnerability Product-Based. 4 2.3. Variables In order to build a foundation for the next discussion, it is important to first understand the variables on which the module is based. There are two types of variables in the module: (1) input variables, and (2) intermediate variables. 1. Input variables require the Working Group to input an assessment rating. This type of variable breaks down into two subtypes: (1) AML control variables, and (2) inherent vulnerability variables. a. AML control variables. These factors apply to all assessed businesses/professions in the DNFBP sector, and should be assessed at the business/profession level. These input variables relate to the quality and effectiveness of the AML controls and therefore affect the vulnerability of the entire business/profession being assessed. b. Inherent vulnerability variables. These factors relate to specific features and users of a particular business/profession. An example is the client-base profile. Because the client-base profile for each business/profession may vary (and consequently affect its vulnerability), it is necessary to assess the risks related to the client profile separately for each business/profession. 2. Intermediate variables are broad, high-level factors that cannot be assessed directly. They therefore need to be disaggregated into their constituent parts in order to be assessed. The module determines intermediate variables automatically, based on the ratings entered for the input variable. Though assessment is undertaken at the input variable level, intermediate variables are very important in the network structure. The next section explains the roles of input variables and intermediate variables in more detail. Descriptions of intermediate variables can be found in Section 5. Figure 2: Variables in the DNFBP Vulnerability Module Default: Category Vulnerability (Non-product-based assessment) TYPES OF VARIABLES INPUT VARIABLES INTERMEDIATE VARIABLES AML Control Variables Inherent Vulnerability Variables The relationship between this breakdown and the module structure in Figure 3.a is as follows: • Intermediate variables (pink boxes) do not require assessment. • AML control variables (green boxes) need to be assessed for the entire DNFBP sector. • Inherent vulnerability variables (blue boxes) need to be assessed for each business/profession in the DNFBP sector. 5 2.4. Module Structure (The Network) As illustrated in Figure 3.a, the vulnerability of the assessed business/profession in the DNFBP sector is determined by a range of inherent vulnerability factors related to the assessed business/profession and a range of AML control factors applied to the assessed business/profession. Figure 3.a: DNFBPs Business/Profession (Category) Vulnerability Module (Excel file 7.A) 6 2.5. The Logic behind the Network In Figure 3.b, a small part of this structure is highlighted in order to clarify the logic of the module. In particular, this refers to how the input variables and intermediate variables contribute to determining overall vulnerability. Compare Figure 3.b with Figure 3.a to see how this segment fits into the whole network structure. Figure 3.b: Part of the Network Structure In order to demonstrate how input variables work, this example will focus on Availability and Enforcement of Administrative Sanctions. Consider how, in the assessed DNFBP business/profession, the availability and enforcement of administrative sanctions affect the quality of AML controls. Clearly there is an impact, but not a direct impact. Availability and Enforcement of Administrative Sanctions improves the supervisory authority’s ability to apply pressure on an assessed business /profession’s managements. This supervisory pressure strengthens the assessed business/profession’s managements’ commitment to AML compliance and to show leadership in the matter. As a result, the managements take action to improve the quality of their internal AML policies and procedures. As a result, the business/profession starts having better AML controls and its vulnerability decreases. 7 However, the input variable Availability and Enforcement of Administrative Sanctions is not the only factor that determines the quality of supervision. Other factors are also need to be taken into account, such as powers, capacity and the effectiveness of the supervisory agency. These other factors are captured in another input variable, Effectiveness of Supervision/Oversight Activities. Assessing these two variables will provide a good assessment of the Quality of AML Supervision. Note that the Availability and Enforcement of Administrative Sanctions and Effectiveness of Supervision/Oversight Activities are both input variables to the Quality of AML Supervision, which is an intermediate variable. Input variables require direct inputs from the WG, while the intermediate variables do not – as illustrated in Figure 3.a (i.e., intermediate variables have arrows feeding into them, while the input variables do not). For descriptions of intermediate variables, see Section 5. Factors that determine the vulnerability of the business/profession of the DNFBP sector There are four factors that determine the vulnerability of the business/profession. These are: 1. The network structure of the module 2. The relative weights of the input variables and intermediate variables 3. The defined conditions (prerequisites) for intermediate variables 4. The assessment ratings of the input variables. The assessment ratings of input variables are assigned by the National Risk Assessment Working Groups of the country. The other three items are based on the underlying assumptions and structural components of the module as developed by the World Bank. These modules contain default (pre-requisite) formulas determined by the World Bank which provide assessment results of intermediate variables based on weighted linking of the underlying relationships of input variables. These formulas can be viewed (i.e., “unhidden”) – see Annex 1 for further information. Changes to these formulas can only be made by the World Bank. If changes are required, contact the World Bank NRA Team for further information. The calculation The formulas that have been built into the module make it possible to combine the assessment results of input variables and calculate the ratings for intermediate variables. Each variable in the module has been assigned a weight, and the underlying relationships between the variables of various levels have been determined by setting up certain pre-conditions. To make the use of the tool relatively easy, the default settings of the module hide the tab that gives details of the weights and pre-conditions. However, the user can make them visible again with a simple Excel procedure. (For more details, see the Excel instructions in the Annex. More on the logic and design of the tool can be found in the PowerPoint presentation “The Logic behind the Tool”, which is included in the NRA training package.) 8 3. GENERAL GUIDANCE FOR THE ASSESSMENT 3.1. Introduction The assessments need to be made using the assessment worksheets (see Section 4). Each assessment worksheet describes one input variable and the criteria to consider in assigning ratings. For example, to determine the assessment rating for the input variable Comprehensiveness of AML Legal Framework, the WG would assess the degree of comprehensiveness of AML laws and regulations. If all the criteria are met fully and perfectly, it can be rated as Excellent (1.0). The WG should use its professional judgment and expertise to determine what ratings to assign when one or more assessment criteria are not satisfied. The ratings of the input variables influence the business/profession’s vulnerability in various directions: • AML Controls. Higher ratings reduce the business/profession’s vulnerability; lower ratings increase the business/profession’s vulnerability. • Inherent Vulnerability Variables. Higher ratings increase the business/profession’s vulnerability; lower ratings decrease the business/profession’s vulnerability. Each assessment worksheet includes the definition of the variables, a list of assessment criteria, and guidance on how to support the assessment The WG should avoid simply averaging the ratings if some of the assessment criteria are met while others are not. This is because an important deficiency in one of the assessment criteria may offset the positive ratings, or impact, of other items. Ratings should therefore be decided on the basis of professional judgment, experience, and group discussion, with all viewpoints being taken into account. The most important thing to keep in mind is that the resulting National AML/CFT Risk Assessment Report will be one of the most important, foundational, and closely scrutinized documents during an AML/CFT evaluation. The AML/CFT Evaluation team will view the evidence, analysis, and justification that support the ratings as being far more important than the ratings themselves. Any input variable rating will therefore be meaningful only to the extent that it is supported with adequate and credible analysis and evidence. The worksheets in Section 4 have been provided to enable the WG to document the reasons and basis for ratings, including the supporting data and information on each of the input variables. The group work during the assessment generates valuable discussions and perspectives. A note-taker in each group should record these in the working papers. Such records are important because they highlight the specific problems that will inform the design of the action plan in the next steps. These working papers will also be used to compile the National ML/TF Risk Assessment Report when the assessment is repeated at some point in the future. 3.2. Organization of the Assessment Work The assessment consists of two main stages: • Stage 1. Assessing and rating the input variables, and supporting the assessment with data and information. • Stage 2. Filling in the Excel file, and obtaining and interpreting the outputs. 9 Stage 1 is the most important and time-consuming, and therefore calls for good time management. During the first workshop, preliminary ratings can be inserted in the Excel file. In this way, the WG can obtain a good understanding of how the Excel tool works. The preliminary ratings can, and should, be amended as the WG conducts additional fact-finding. Section 4 and 5 relate to the first stage, while the Annex 1 provides detailed instructions on how to use the Excel file (Stage 2). During the sessions in the first workshop, allocate most of your time to Stage 1, and save the final two hours for Stage 2. Common input variables that appear in all modules The input variables Availability and Access to Beneficial Ownership Information, Availability of Reliable Identification Infrastructure, and Availability of Independent Information Sources are included in various modules of the tool, including the DNFBP vulnerability module, and are assessed at a national level. Their assessment ratings should be consistent across all modules, and should be based on systematic and logical reasoning. Although it is sufficient for one WG to assess the ratings of these input variables, it is advised that both the National Vulnerability and Banking Sector Vulnerability WGs assess these variables. It will be useful to compare the assessment ratings assigned by the two groups and to resolve any conflicts that might occur. It is necessary to ensure that assessment ratings are agreed for these three input variables. Unless there is sufficient rationale to assess these separately, the DNFBP Working Group can obtain the ratings for these variables from the National Vulnerability or Banking Sector Working Groups. 3.3. Period for Information and Data Collection The World Bank’s National Risk Assessment methodology is based on informed expert judgment. The purpose of the data and information collection is to inform and facilitate sound judgment. The most appropriate period over which data and information should be collected depends on what can better support the judgment as of the assessment date. For some indicators, data from the past twelve months can provide the most meaningful insight. In other cases, however, it may be necessary to collect data and information from the previous five years, as only then may it be possible to discern relevant trends and cumulative amounts. Table 2: Guidance on information and data collection period INDICATORS INFORMATION AND DATA COLLECTION PERIOD Quantitative indicators of Ten, five, or three years, depending on the availability of the data. vulnerabilities Do not require a strict timeframe. The most meaningful information is Qualitative indicators of the most recent information. Obtain as much information from the vulnerabilities last five years as possible. Since this is not a statistical model, it is not strictly necessary that the data collection period be the same for all indicators. Using different data collection periods in different sections will not be problematic. The indicators for each jurisdiction are to be analyzed, and judgments should be made regarding the current situation. 10 3.4. Possible Sources of Information and Data The following list provides guidance on the data and information sources that can be used for completing the assessment: • Statistics (national and international) • Intelligence • Interviews with relevant authorities/interest groups/market participants • Focus group meetings with relevant authorities/interest groups/market participants • Surveys of general public or focus groups • Reports by international organizations (e.g., United Nations, World Bank Group, International Monetary Fund, World Customs Organization, and World Trade Organization) • Reports by international standard-setting bodies (e.g., Financial Action Task Force and FATF Style Regional Bodies) • Reports by governments/think-tanks/civil society organizations/private institutions • Books/articles/reports based on academic research • Press/internet/other sources of public information. The above general sources are applicable to all of the input variables to be assessed. In addition to these general sources, the worksheet for each indicator contains specific guidance on the information and data collection for that specific indicator. 4. ASSESSMENT WORKSHEETS FOR INPUT VARIABLES 4.1. Assessment Worksheets for General Input Variables This section includes guidance for the assessment of each AML Controls variable. Each assessment worksheet contains the description of the variable, the assessment criteria, brief guidance on how to support the assessment and a section to record the rating. The AML control variables of this module relate to the strength of the AML controls. These variables affect the vulnerabilities of all firms and individuals operating within the assessed business/profession. This assessment applies to each DNFBP business and profession as a whole. Please note: This means that all the firms and individuals in the assessed business/profession need to be assessed together per business/profession type. The AML control variables are as follows: 1. Comprehensiveness of AML Legal Framework 2. Effectiveness of Supervision/Oversight Activities 3. Availability and Enforcement of Administrative Sanctions 4. Availability and Enforcement of Criminal Sanctions 11 5. Availability and Effectiveness of Entry Controls 6. Integrity of Business/Profession Staff 7. AML Knowledge of Business/Profession Staff 8. Effectiveness of Compliance Function (Organization) 9. Effectiveness of Suspicious Activity Monitoring and Reporting 10. Availability and Access to Beneficial Ownership Information 11. Availability of Reliable Identification Infrastructure 12. Availability of Independent Information Sources. In order to better understand how these variables impact the vulnerability of the assessed business/profession, please refer to Figure 3.a. At this stage, the assessment does not focus on vulnerability directly. Rather, the assessment is more about the quality, effectiveness, or level of these variables. Based on these inputs, vulnerability is determined by the module. For example, the assessment should rate how effective the supervisory body is, not how that effectiveness impacts the vulnerability of the assessed business/profession. This basic principle applies to all of the input variables. The input variables are designed to capture the main drivers of vulnerability within a jurisdiction, and do not necessarily overlap with FATF Recommendations. Still, this self-assessment can be partially supported by the mutual evaluation report (MER) findings, if relevant. However, this does not mean that the MER findings are binding on the WG. The WG is encouraged to make use of these and other reports and analyses that assess the ML risks of the country. Recording the grounds of the assessment The assessment worksheets are in the following pages of this section. In addition to assigning a rating to each of the input variables, the WG should record the justification for these ratings by using a copy of the table below. The table should be extended as necessary. 12 Name of input the variable: Assigned rating and brief reasoning behind it: Discussion of assessment criteria, and the data and information that supports the assessment: Deficiencies/problems/room for improvement: Completing the Entry Page tab in the Excel file The results of the AML controls assessment should be filled in on the Entry Page tab in the assessed business/profession Excel file. This should be done only after the assessments of all the variables are completed. Please refer to the Annex 1 for detailed instructions on how to use the Excel file. 13 4.1.1. Comprehensiveness of AML Legal Framework Variable description This variable assesses whether a country has comprehensive AML laws and regulations regarding AML preventive measures and AML supervision for the assessed business/profession. (This input variable does not assess the implementation of AML laws and regulations, which is assessed by other input variables. Rather, it is related to the AML legal and regulatory framework.) Assessment criteria A country has comprehensive AML laws and regulations on preventive measures and supervision in force for the assessed business/profession if they conform to international standards on: • Customer Due Diligence (risk-based, including verification of beneficial ownership of customers that are natural persons and legal entities and legal arrangements) • Record-keeping • Enhanced Due Diligence for Politically Exposed Persons (PEPs) and high-risk countries • Reliance on Customer Due Diligence by third parties, including introduced business • Suspicious Transaction Reporting (STR) • Tipping-off and confidentiality • Internal controls, foreign branches, and subsidiaries • Licensing and supervision for AML compliance. Possible sources of information and data • Relevant laws, regulations, and enforceable guidance related to the above assessment criteria • Interviews/consultations with regulatory/supervisory authority (may be a Self-Regulatory Body [SRB]) and other competent authorities • Interviews/consultations with assessed business/profession’s representatives, including a SRB an d professional associations • Surveys of management and staff of firms that make up the assessed business/profession. Assessment Based on the assessment criteria and collected information/data, decide the appropriate rating for this variable. Excellent Close to Very High High Medium Medium Medium Low Very Close to Does not Excellent High Low Low Nothing Exist 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 14 4.1.2. Effectiveness of Supervision/Oversight Activities Variable Description This variable assesses the effectiveness of AML supervision/oversight activities for the assessed business/profession. An effective supervisory regime is one that has a comprehensive legal and regulatory framework and is supported by appropriate powers and is well resourced, and which employs risk-based approach to on-site and off-site monitoring and inspections. (This variable does not assess the availability and enforcement of sanctions. Sanctions are assessed below as two separate variables on administrative and criminal sanctions.) Assessment Criteria The AML supervision/oversight activities are effective where the supervisory body (which can be a self-regulatory body or both, depending on country practice): • Is clearly identified in the laws and regulations and has appropriate authority and mandate to conduct AML compliance supervision • Carries out its supervisory activities within a comprehensive supervisory framework that includes clear supervision policies, procedures, and manuals • Possesses good understanding and appreciation for the ML risks of the assessed business/profession • Has sufficient number of staff and trains the staff and equips them with necessary skills and up-to-date knowledge– including understanding of the nature of the firms and clients and the products of the assessed business/profession–to carry out AML supervision • Has other necessary resources to ensure AML compliance (such as the technical capacity, budget, and tools) • Carries out a comprehensive, risk-based supervisory program that consists of on-site and off-site monitoring and on- site inspections on both regularly scheduled cycles and periodic spot-checks (risk-based and as necessary) • Reports and records the examination results in a systematic way and is able to effectively use these records for policy purposes • Exercises moral suasion that has a significant impact on the assessed business/profession’s management and is sufficient to positively influence behavior patterns • Can demonstrate that supervisory powers are exercised effectively and impartially. Possible Sources of Information and Data • Relevant laws and regulations, policies, procedures, and manuals (including how the risk-based approach is determined) • Statistics on the number of supervisory staff, and information on their training, knowledge, and skills • Information on the type(s) and methods of off-site supervision activities and findings • Statistics on the number of firms/professionals actually being monitored or inspected (on-site/off-site), and information as to scope, frequency, and intensity of the supervision/ oversight activities • Statistics and information on main findings of on-site/off-site inspections • Interviews/consultations with regulatory/supervisory authority (may be a Self-Regulatory Body [SRB]) and other competent authorities • Interviews/consultations with assessed business/profession’s representatives, including a SRB and profess ional associations • Surveys of management and staff of firms that make up the assessed business/profession. Assessment Based on the assessment criteria and collected information/data, decide the appropriate rating for this variable. Excellent Close to Very High High Medium Medium Medium Low Very Close to Does not Excellent High Low Low Nothing Exist 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 15 4.1.3. Availability and Enforcement of Administrative Sanctions Variable Description This variable assesses whether the country has a wide range of effective, proportionate and dissuasive administrative sanctions applicable to natural or legal persons in case of noncompliance with AML laws and regulations. Sanctions should be applicable to firms as well as individual directors, management and staff. The more the sanctions are effective, proportionate and dissuasive, the more likely it is that management and staff members will comply with AML laws and obligations. This variable also assesses whether the country takes administrative enforcement actions against a firm or individual members of management or staff in case of noncompliance with AML obligations. Consider the number of administrative actions taken against the firms and their staff (of the assessed business/profession) in the last few years for non-compliance of AML obligations. Assessment Criteria The following criteria indicate that effective, proportionate, and dissuasive administrative sanctions are in place: • There is a wide range of administrative sanctions (such as monetary penalties, administrative actions and removal of critical staff, and suspension/revocation of business/professional licenses) in force for noncompliance with AML obligations • The administrative sanctions are sufficient to positively influence the assessed business/profession’s firms’ management and staff behavior. The following criteria indicate that a country enforces its AML obligations in case of noncompliance: • Most persons working in the assessed business/profession believe that administrative enforcement action would be initiated in case of noncompliance with AML requirements • There is a record of administrative enforcement actions taken in the past by law enforcement authorities regarding noncompliance with AML requirements in the assessed business/profession. *The adequacy of the administrative sanctions may need to be assessed in context with the criminal sanctions. The balance and preference between the administrative and criminal sanctions may differ among countries. Possible Sources of Information and Data • Specific legal and regulatory provisions on administrative sanctions • Statistics on numbers (by type) of past administrative enforcement actions by relevant authorities • Information as to steps taken (or not taken) by the assessed business/profession to remedy infractions • Interviews/consultations with regulatory/supervisory authority (may be a Self-Regulatory Body [SRB]) and other competent authorities • Interviews/consultations with assessed business/profession’s representatives, includin g a SRB and professional associations (including as to forms of sanctions they enforce, such as disciplinary hearings or revocation of membership) • Surveys of management and staff of firms that make up the assessed business/profession. Assessment Based on the assessment criteria and collected information/data, decide the appropriate rating for this variable. Excellent Close to Very High High Medium Medium Medium Low Very Close to Does not Excellent High Low Low Nothing Exist 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 16 4.1.4. Availability and Enforcement of Criminal Sanctions Variable Description This variable assesses whether the country has a range of effective, proportionate and dissuasive criminal sanctions applicable to natural or legal persons in case of noncompliance with AML laws and regulations. This should include sanctions for serious and deliberate (or criminally negligent) breaches that can be ancillary to the money laundering offense. Sanctions should be applicable to firms (legal persons) and to individual managers and staff in relation to the conduct of their activities within or from the country. This variable assesses not only the legal framework, but also the actual enforcement actions against firms and individual members of management or staff (of the assessed business/profession) in cases of noncompliance with AML obligations. Assessment Criteria The following criteria indicate that effective, proportionate, and dissuasive criminal sanctions are available and effective: • There are appropriate criminal sanctions in force for noncompliance with AML obligations. • Persons in the assessed business/profession regard the criminal sanctions regime as sufficiently dissuasive to positively influence individual behavior patterns. • Criminal sanctions are also applicable for appropriate ancillary offenses to the offense of money laundering. The following criteria indicate that a country enforces its AML obligations in case of noncompliance: • Most persons working in the business/profession believe that criminal enforcement action would be initiated in case of noncompliance with AML requirements. • There is a record of convictions, and criminal enforcement actions taken in the past by law enforcement authorities regarding noncompliance with AML requirements in the assessed business/profession. Consider the number of investigations, prosecutions, and convictions, as well as other available evidence on enforcement. • The criminal enforcement against the business/profession’s firms and their staff with regard to other financial crimes (such as fraud) may also give an idea of the “enforcement perception” of the assessed business/profession . Possible Sources of Information and Data • Relevant laws (specific provisions on criminal sanctions and enforcement), including relevant ancillary offenses to ML • Statistics on past and ongoing criminal investigations, prosecutions, and convictions by domestic law enforcement and other relevant authorities with respect to the assessed business/profession • Statistics on criminal enforcement actions carried out by foreign law enforcement and other relevant authorities against the firms and individual members or staff of the assessed business/profession, and whether (and in what form and to what extent) the country provided informal or formal assistance to the investigation and prosecution • Interviews/consultations with regulatory/supervisory authority (e.g., a Self-Regulatory Body [SRB], law enforcement agency, or prosecuting agency) • Interviews/consultations with assessed business/profession’s representatives, including an SRB an d professional associations • Surveys of management and staff of firms that make up the assessed business/profession. Assessment Based on the assessment criteria and collected information/data, decide the appropriate rating for this variable. Excellent Close to Very High High Medium Medium Medium Low Very Close to Does not Excellent High Low Low Nothing Exist 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 17 4.1.5. Availability and Effectiveness of Entry Controls Variable Description This variable assesses the availability and effectiveness of entry controls, including licensing, registration or other forms of authorization to operate. A country has effective entry controls if there is a comprehensive legal and regulatory framework, which provides authorities with appropriate powers and sufficient level of staff and other resources to carry out their duties vis-à-vis the assessed business/profession. Effective entry controls help reduce money-laundering vulnerabilities and ensure a higher level of compliance with AML requirements, including preventing systemic problems in the assessed business/profession. Assessment Criteria The entry controls are effective if the licensing body: • Is clearly identified in the laws and regulations • Possesses good understanding and appreciation for the ML risks of the assessed business/profession • Effectively carries out its licensing and entry controls duties • Has a clear and comprehensive framework for licensing and registration requirements for the assessed business/profession, including: - A fit and proper test designed to prevent criminals or their associates from being granted a business or professional license or being the beneficial owner of a significant controlling interest in the business or holding a significant management position - Appropriate educational and professional certification requirements for key directors and senior management - Requirement for all licensees to have adequate AML compliance controls in place, including compliance manuals and appointment of well-qualified internal controls/compliance staff - Possesses adequate resources to ensure the quality implementation of entry controls for the assessed business/profession, including a sufficient number of well-trained and highly skilled personnel to screen, vet, and approve all applications and supporting documentation. Possible Sources of Information and Data • Licensing and registration laws and regulations, policies, procedures (including application forms and supporting documentation) and manual for supervisory staff • Statistics on license applications received and actually granted • Statistics and information on licenses not granted or later suspended or revoked for failure to meet AML controls • Interviews/consultations with regulatory/supervisory authority (may be a Self-Regulatory Body [SRB]) and other competent authorities • Interviews/consultations with assessed business/profession’s representatives, including a SRB an d professional associations • Surveys of management and staff of firms that make up the assessed business/profession. Assessment Based on the assessment criteria and collected information/data, decide the appropriate rating for this variable. Excellent Close to Very High High Medium Medium Medium Low Very Close to Does not Excellent High Low Low Nothing Exist 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 18 4.1.6. Integrity of Business/Profession Staff Variable Description This variable assesses whether the directors, managers and staff of the firms (including sole practitioners) act with integrity. This means that the staff does not act in a willfully blind manner or collude with criminals or act corruptly. In addition, they take care that they do not become unwittingly involved as “innocent agents” on behalf of criminals seeking to use their products and specialized knowledge and skills. If staff members collude with criminals or undermine AML controls by acting corruptly, firms are vulnerable to money laundering abuse. Consider the effectiveness of staff vetting programs in the assessed business/profession; the incidence of disciplinary action for breach of integrity-related rules; and the number of criminal cases against staff members. Assessment Criteria Professionals and staff of firms of the assessed business/profession act with integrity if: • Firms generally regard their staff members as secure from corruption by criminals. • The incidence of integrity failure (e.g., negligent or “willful blindness” to suspicious transactions) involving the business/profession’s staff is low (but consider whether there is underreporting of incid ences of integrity failure). • There is an appropriate mechanism in place to protect the business/profession’s managers and staff against any negative consequences as a result of reporting suspicious transactions or other actions to comply with AML obligations. Possible Sources of Information and Data • Relevant laws/regulations (including specific provisions on confidentiality mechanisms in place for the staff when reporting suspicious or other relevant transactions) • Information as to staff vetting and training programs (of the assessed business/profession) • Statistics on integrity breaches by the managers and staff in firms (of the assessed business/profession) and information on disciplinary actions taken • Statistics on the number of criminal cases, including money laundering cases, concerning staff of the firms in the assessed business/profession • Findings of firms’ (of the assessed business/profession) AML on-site inspections and off-site monitoring • Statistics on number (and types) of administrative enforcement actions against firms and individuals working in the assessed business/profession • Review of reports/records of internal control/compliance units in firms of the assessed business/profession • Historical data of incidents /breaches by staff (kept by firms for operational risk management purposes) • General levels of integrity or the operating environment in the country (refer, for instance, to the Transparency International Corruption Perceptions Index) • Assessed business/profession’s reputation on involvement in financial crimes, including tax evasion • Interviews/consultations with a regulatory/supervisory authority, which may be a Self-Regulatory Body (SRB) or other competent authority • Interviews/consultations with assessed business/profession’s representatives, including an SRB (particularly internal control or compliance units) and professional bodies • Surveys of management and staff of firms that make up the assessed business/profession. Assessment Based on the assessment criteria and collected information/data, decide the appropriate rating for this variable. Excellent Close to Very High High Medium Medium Medium Low Very Close to Does not Excellent High Low Low Nothing Exist 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 19 4.1.7. AML Knowledge of Business/Profession Staff Variable Description This variable assesses how well the professionals and staff of firms in the assessed business/profession know and understand their duties and responsibilities. Assessment Criteria Professionals and staff of firms in the assessed business/profession have the required AML knowledge if: • There are appropriate AML training programs and materials for professionals/staff. • Training programs are designed to ensure that all appropriate staff members are trained. • All professionals and staff members are required to undergo ongoing training to ensure that their knowledge of AML laws, policies, and procedures is appropriate and up-to-date. Keep in mind that if the firm conducts business with clients and professional intermediary firms in other jurisdictions, their knowledge should also extend to AML laws and regulations of those jurisdictions. Professionals/staff have a good knowledge of and are regularly updated on domestic and transnational money laundering schemes and typologies, including those involving the misuse of the business/profession and specialized knowledge and skills of its professionals and its products and services. • Professionals/staff are aware of AML compliance and reporting procedures and obligations. Possible Sources of Information and Data • Relevant legal and regulatory framework pertaining to professionals and staff knowledge, including as part of entry controls/renewal of business or professional licenses or certifications • Statistics and information on overall quality of AML training activities by the firms of the assessed business/profession and whether such training is mandatory or voluntary • Data on frequency of training, hours of training, number of trainees, level and type of staff/professionals trained • Statistics on AML training given by authorities to individuals in the assessed business/profession • Information on AML training programs and training materials of firms (of the assessed business/profession) • Findings of business/profession’s AML on-site/off-site inspections and monitoring • Interviews/consultations with regulatory/supervisory authorities (e.g., an SRB or other competent authority) • Interviews/consultations with assessed business/profession’s representatives, including an SRB and professional associations • Surveys of management and staff of firms that make up the assessed business/profession. Assessment Based on the assessment criteria and collected information/data, decide the appropriate rating for this variable. Excellent Close to Very High High Medium Medium Medium Low Very Close to Does not Excellent High Low Low Nothing Exist 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 20 4.1.8. Effectiveness of Compliance Function (Organization) Variable Description This variable assesses whether firms (including sole practitioners) in the assessed business/profession have an effective compliance function that is comprehensive, risk-based, and well resourced, with an independent AML compliance function. Assessment Criteria The assessed business/profession possesses effective internal AML compliance functions if most firms (including sole practitioners): • Have internal compliance programs that are commensurate to the level of the risk of the firms, taking into account factors such as jurisdictions of end user and professional intermediary clients, clients that have complex or opaque legal structures, the volume and nature of products provided, client-base profile transaction patterns, and cross- border nature of transactions • Have appointed a sufficiently resourced, independent AML compliance officer at the senior management level • Take disciplinary actions against their staff in cases of breaches of compliance policy • Perform internal and/or external AML audits. Possible Sources of Information and Data • Relevant regulatory framework in relation to the compliance function • Information on internal compliance function and policies of firms in the assessed business/profession • Findings of the AML on-site inspections and off-site monitoring • External (if any) and internal audit reports on adequacy and effectiveness of compliance function • Statistics on disciplinary actions taken by the firms (of the assessed business/profession) against their staff for breaches of compliance policy • Statistics on new clients or business declined or business relationship terminated, based on recommendations of the compliance staff • Interviews/consultations with regulatory/supervisory authority (e.g., an SRB or other competent authority) • Interviews/consultations with assessed business/profession’s representatives, including an SRB an d professional associations • Surveys of management and staff of firms that make up the assessed business/profession. Assessment Based on the assessment criteria and collected information/data, decide the appropriate rating for this variable. Excellent Close to Very High High Medium Medium Medium Low Very Close to Does not Excellent High Low Low Nothing Exist 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 21 4.1.9. Effectiveness of Suspicious Activity Monitoring and Reporting Variable Description This variable assesses whether the firms of the assessed business/profession have effective and appropriate systems for record keeping, monitoring and STR reporting to support their AML policies and procedures. A well-designed manual system may be adequate for a small firm with a single branch or for a sole practitioner, while large businesses and firms will require more sophisticated systems. A good record-keeping system is a pre-requisite for an effective monitoring system. Any problems and deficiencies in record keeping should therefore be assessed under this variable. Assessment Criteria The firms of the assessed business/profession have adequate and appropriate AML-monitoring and STR reporting systems if: • The firms have information systems that enable and facilitate the monitoring of client transactions and comparing them against the client’s profile. • Transactional records are available in a format that facilitates AML screening and monitoring. • The systems support the firms in the assessed business/profession in performing effective PEP screening. • The systems assist the business/profession and its staff to effectively identify and record all complex, unusual large transactions. • The systems assist the business/profession and its staff to effectively identify and report suspicious transactions. Staff should have a good understanding of the scope of their reporting obligations on suspicious transactions and activities, including what activities are covered or not covered under laws or rules on professional secrecy and professional/client privilege. Possible Sources of Information and Data • Relevant legal and regulatory framework in relation to AML monitoring, record-keeping, and STR reporting obligations of the assessed business/profession • Findings of AML monitoring and supervision with regard to the effectiveness of the firms’ (of the assessed business/profession) STR systems (for example, how many firms are compliant, how many are not compliant, and how this affects the overall effectiveness of the STR system for the assessed business/profession) • Statistics on the number and quality of STRs filed by the firms/professionals (of the assessed business/profession), including numbers filed “defensively” (after being alerted to suspicious activity or investigation by authorities) • Statistics on numbers of STRs relating to monitoring lapses, etc., originating from the firms/ professionals (of the assessed business/profession) • Statistics on numbers of STRs by the firms/professionals (of the assessed business/profession) referred to law enforcement agencies • Statistics on number of detected complex, unusually large transactions that were recorded by the reporting entity and not reported • Information on quality and accessibility of the firms’ (of the assessed business/profession) transaction and CDD records • Findings of firms/professionals’ AML on-site/off-site supervision • Interviews/consultations with regulatory/supervisory authority (e.g., an SRB or other competent authority) • Interviews/consultations with assessed business/profession’s representatives, including an SRB an d professional associations • Surveys of management and staff of firms that make up the assessed business/profession. Assessment Based on the assessment criteria and collected information/data, decide the appropriate rating for this variable. Excellent Close to Very High High Medium Medium Medium Low Very Close to Does not Excellent High Low Low Nothing Exist 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 22 4.1.10. Availability and Access to Beneficial Ownership Information Variable description This variable assesses whether it is easy for criminals to hide their beneficial ownership in corporations, trusts or similar structures registered in or administered from within the country. Assessment criteria Transparency relating to beneficial interests in corporations, trusts or similar entities is in place if comprehensive information on the structure, management, control, and beneficial ownership in corporations, trusts and similar vehicles is readily available and can be accessed in a timely manner by competent authorities and is available to AML-regulated institutions and businesses and professions to facilitate their Customer Due Diligence requirements. *This variable is also assessed by the National Vulnerability and Banking Sector Vulnerability Working Groups. Assessment ratings can be obtained from these Working Groups. Possible sources of information and data • Information as to whether regulated businesses or professions (e.g., lawyers, notaries, or Trust and Company Service Providers) are required to form, register or administer a legal entity or legal arrangement • Information as to the mechanism chosen by the country to collect and maintain basic and beneficial ownership information of legal entities formed or registered in the country, and beneficial ownership information of legal arrangements formed or administered in or from the country • The relevant regulatory framework and the effectiveness of beneficial ownership information Customer Due Diligence requirements (pertaining to natural persons and legal entities and legal arrangements) • Statistics or information on crimes (including money laundering involving the use of shell companies or other opaque structures) and whether accurate, adequate, and current beneficial ownership information can be accessed in a timely manner by competent authorities • Interviews/consultations with the reporting entities and their supervisory authorities, law enforcement agencies, tax authorities, and, if applicable, the supervisors of Trust and Company Service Providers • Interviews/consultations with Trust and Company Service Providers, law firms, and accountancy firms • Surveys of reporting entities’ management and staff • Experience and opinion of the public authority or private agency that registers corporations and other legal entities. Assessment Based on the assessment criteria and collected information/data, decide the appropriate rating for this variable. Excellent Close to Very High High Medium Medium Medium Low Very Close to Does not Excellent High Low Low Nothing Exist 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 23 4.1.11. Availability of Reliable Identification Infrastructure Variable description Financial transparency and customer identification and verification processes are enhanced when AML-regulated institutions are able to verify the identity of customers using reliable, independent source documents, data or information. A good identification infrastructure will also prevent the use of fake documents and false identities. Fake documents and false identities hamper the ability to detect and investigate money laundering and trace the proceeds of crime. Assessment criteria A good identification infrastructure exists and information is available if AML-regulated institutions can rely on the country’s identification infrastructure. For instance, there is reliable and secure government or private sector documentation, data or information to identify and verify the identity of the clients. The infrastructure may consist of: • A secure national identification system with government-issued identity documents, whether issued by the national or a local authority, and/or • Comprehensive and reliable public information systems that assist in the verification of details of clients’ details. *This variable is also assessed by the National Vulnerability and Banking Sector Vulnerability Working Groups. Assessment ratings can be obtained from these Working Groups. Possible sources of information and data • Information about the national identification system • Information on national identification (ID) infrastructure database and its suitability and availability for ID verification purposes (if available) • Information on available identification documents and installed anti-counterfeit measures • Statistics (or experience) concerning the frequency of cases that involve the use of fraudulent ID documents • Statistics relating to the part of the population that lacks proper ID documents • Information on any community, social group (such as immigrant communities, tribes, etc.) whose members have no ID documents or have no access to ID documents • Discussions with reporting institutions on the usefulness of the identification infrastructure • Discussion of reasons why the national identification system and practices are not working ideally. Assessment Based on the assessment criteria and collected information/data, decide the appropriate rating for this variable. Excellent Close to Very High Medium Medium Medium Low Very Close to Does not Excellent High High Low Low Nothing Exist 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 24 4.1.12. Availability of Independent Information Sources Variable description This variable assesses the availability of independent and reliable sources of information to determine transaction patterns of clients. Customer due diligence processes are easier to perform, and are generally of a higher quality, if such sources are available. They can be used to identify or verify clients’ transactional patterns and commercial history. Such information may include data held by credit bureaus, details of previous banking relationships, accessibility to former employers, and the availability of utility bills. Assessment criteria Independent and reliable information sources are available if sources of comprehensive and reliable historical financial information and other information about clients are available and can easily be accessed by AML-regulated institutions. *This variable is also assessed by the National Vulnerability and Banking Sector Vulnerability Working Groups. Assessment ratings can be obtained from these Working Groups. Possible sources of information and data • Interviews/consultations with the reporting entities and their respective supervisory authorities • Surveys of reporting entities’ management and staff • Interviews with credit bureaus, utility companies, etc., with regard to information available on clients. Assessment Based on the assessment criteria and collected information/data, decide the appropriate rating for this variable. Excellent Close to Very High Medium Medium Medium Low Very Close to Does not Excellent High High Low Low Nothing Exist 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 25 4.2. Assessment Worksheets for the Inherent Vulnerability Variables This section provides guidance for the assessment of the inherent factors that are specific to each of the assessed business/profession. These factors are called “inherent vulnerability variables”. Each assessment worksheet contains the description of the variable, the assessment criteria, brief guidance on how to support the assessment, and an assessment section to record the decided ratings. Note: WGs can also decide to assess each business/profession on product-specific input variables. The criteria for assessing these product-specific input variables are the same as the criteria for assessing the broader inherent vulnerability factors for the specific business/profession as a whole. See Annex 2 for more detailed product-based assessment. This section includes guidance on four inherent vulnerability variables. Inherent Vulnerability Factors The following input variables reflect the inherent vulnerability factors: 1. Total size/volume of the business/profession 2. Client-base profile of the business/profession 3. Level of cash activity associated with the business/profession 4. Other vulnerable factors, including a. Non-face-to-face engagement of services and ongoing relationship b. Use of agents c. Anonymous use of the product d. Difficult to trace transactions (e.g., use of pooled client trust accounts; professional secrecy laws or ethics rules; attorney/client privilege; legal/professional privilege and work [document]/product privilege) e. ML typologies on the abuse of the business/profession f. Use of the business/profession in fraud or tax evasion schemes g. Other relevant features (specify up to three). An important relevant feature that should also be considered is whether the business/profession is not licensed or is unregulated for AML, or whether a particular product can be obtained from (1) an unlicensed, unregulated business/profession, or (2) need not involve any regulated business/profession. For example, some countries require that, in order to form and register a certain type of company, one must use the services of a regulated entity/service provider in that country. In other countries, some types of companies or partnerships may be registered without the involvement of any professional intermediary. These four inherent vulnerability input variables determine the vulnerability for each assessed business/profession. The assessment of these four inputs should be performed for each business/profession separately. Therefore, if the country is assessing 10 businesses/professions, there are (4*10=) 40 inherent variables that will need to be assessed. Complete the “Entry Page (Vulnerability)” Tab in the Excel file The results of the assessments of the inherent vulnerability variables need to be entered into the “Entry Page (Vulnerability)” tab of the DNFBP Vulnerability Excel file 7.A/7.B. This should be done only after the assessments of all the variables have been completed. Please refer to Annex 1 for detailed instructions on how to use the Excel file. 26 4.2.1. Total size/volume of the business/profession Determine the total size or volume of the business/profession. The total size/volume can be measured by using one or more of the three indicators listed below, depending on the nature of the business/profession being assessed. It is up to the Working Group to decide which indicators to take into consideration. Ultimately one or a combination of the indicators should lead the Working Group towards one assessment rating for the total size/volume of the business/profession. The indicators are: • 1.A Total Number of Providers • 1.B Total Number of the Product Provided • 1.C Total Turnover/Value of the Business/Profession. 1.A Total Number of Providers Variable Description This variable assesses the total number of providers (firms and individuals) in the business/profession. This information is taken to be indicative of the level of ML vulnerability that they can introduce into the business/profession (if the relevant risks are not mitigated). For some categories (especially unregulated ones), the actual number of providers may be difficult to determine. In that case, what is required is a judgment as to whether or not the providers are significant to the country’s economy. Assessment Criteria The objective of this indicator is to assess the importance of a business/profession in the country’s economy (compared to the other sectors that are being assessed). The most appropriate indicator of the total number of providers within the business/profession depends on the nature of the product being provided. In other words, if the country licenses company service providers, but unlicensed company services firms or individuals are also permitted to provide such services, efforts should be made to ascertain (even if only a best estimate) the number of both licensed and unlicensed providers. For lawyers and other professionals, consider only the number of those that provide financial intermediary services. It may indicate a problem itself, if the country is not able to identify the number of providers. Possible Sources of Information and Data • Data on total number of providers (firms and individuals, licensed and unlicensed) within the assessed business/profession • Interviews/consultations with regulatory/supervisory authority (e.g., an SRB or other competent authority) • Interviews/consultations with assessed business/profession’s representatives, including an SRB and professional associations • Surveys of management and staff of firms that make up the assessed business/profession • Interviews with and data compiled by private sector research or consulting firms. Additional Guidance Consider also whether the particular product can be provided in the jurisdiction only by licensed businesses or professionals, or (1) Are permitted to be provided by “informal” or unlicensed firms and individuals (including informal trustees such as friends and family who serve as trustees of wills/estates or a business providing company secretarial services without a need for licensing as such); and/or (2) Are not permitted within the jurisdiction, but the product is being provided by “informal” or unlicensed firms and individuals (because of lack of clarity in the laws or regulations or lack of effective enforcement against unlicensed firms or individuals). While assessing the total number of providers, please try to decide whether it is significant or not. If it is significant, rate it as high, if not significant, rate it as low. If you think that it is moderately significant, rate it as medium. 27 1.B Total Number of the Product provided (if applicable) Variable Description This variable assesses the total number of a particular product provided by the assessed business/profession (if applicable). The total number of a particular product may be indicative of the level of ML vulnerability that this product can introduce into the assessed business/profession (if the relevant risks are not mitigated). The actual number of product provided may be very difficult to determine. What is required is a judgment as to whether or not the scale of the number of the product provided is significant in the assessed country’s economy. Assessment Criteria The objective of this indicator is to assess the importance of a particular product within the assessed business/profession, in comparison to other products offered by the assessed business/profession. The most appropriate indicator of the total number of a product in the business/profession depends on the nature of the product being assessed. For some products, the number of transactions, number of clients, number of products created or administered associated with the product can be used as an indicator of the total number of product provided. For example, for real estate agents, the number of properties bought and sold on behalf of clients; for trust service providers, the number of express trusts (product) formed and/or administered (service); for company service providers, the number of legal persons formed (by type of legal person), managed or served as professional nominee shareholders or directors. Possible Sources of Information and Data • Data on total number of product provided (official and informal estimates) drawn from official agencies and registries (company, land, property, etc.) • National statistical office • Interviews with or data from private sector firms that track the business/profession • Interviews/consultations with a regulatory/supervisory authority (e.g., an SRB or other competent authority) • Interviews/consultations with assessed business/profession’s representatives, including an SRB and professional associations • Surveys of management and staff of firms that make up the assessed business/profession • Interviews with and data compiled by private sector research or consulting firms. Additional Guidance While assessing the total number of a product, please try to decide whether it is significant or not. If it is significant, give it a high rating, if it is not significant, give it a low rating (if you think it is moderately significant, give it a medium rating). 28 1.C Total Turnover/Value of the Business/Profession Variable Description This variable assesses the total turnover or the total value or amount of transactions handled by a particular business/profession, which is indicative of the level of ML vulnerability that this business/profession can introduce into DNFBP sector if the relevant risks are not mitigated. In the cases where the total turnover of the assessed business/profession will be difficult to determine, the assessment may require a judgment as to whether or not the total turnover of the business/profession is significant to the country’s economy. Assessment Criteria The objective of this indicator is to assess the importance of a particular business/profession in country’s economy (compared to the other sectors that are being assessed). For some categories of businesses/professions, the turnover or in other words the total value of the transactions they are handling may be a more meaningful indicator than the others. In addition to the financial statements, tax records of the country, and business/profession’s contribution of the sector to GD P may also give good idea of this indicator. Although, asset size is less meaningful for DNFBPs compared to financial institutions, it may also give an impression of the total value they are handling. The most appropriate indicator of the total turnover or the value of a business/profession may depend on the nature of the business/profession being assessed. For business/profession (such as legal professionals and accountants in their management of client money, securities or other assets or acting as trustees of express trusts), it may be more appropriate to use “total assets managed” as an indicator of the total value for such services. Possible Sources of Information and Data • Data on total value associated with the business/profession • Data on total turnover associated with the business/profession • Data on total assets managed associated with the business/profession • Data on total amount of fund flows associated with the assessed business/profession • Interviews/consultations with regulatory/supervisory authority (e.g., an SRB) and other competent authorities • Interviews/consultations with assessed business/profession’s representatives, including an SRB and professional associations • Surveys of management and staff of firms that make up the assessed business/profession • Interviews with and data compiled by private sector research or consulting firms. Additional Guidance During the assessment, the Working Group needs to refer to both official data and best available estimates from reliable sources. While assessing the total turnover or value of a business/profession, please try to decide whether it is significant or not. If it is significant, rate it as high; if it is not significant, rate it as low. If you think that it is moderately significant, rate it as medium. 29 4.2.2. Client-base profile of the business/profession Variable Description This variable assesses whether the type of client that generally uses the business/profession being assessed increases the risks of money laundering abuse of the assessed business/profession. Note: The tern “client” here may refer to natural persons or legal persons or arrangements; they may also be end- users of the business/profession or professional intermediary firms through which products are provided to the end- users. All forms of clients should be considered in the assessment. Assessment Criteria The client-base profile of the business/profession should be assessed to carry a higher risk if it involves: • Domestic/international PEPs • High net-worth individuals • Nonresident clients, particularly from high-risk jurisdictions • Clients with foreign business or personal interests • Clients with business links to known high-risk jurisdictions • Clients with criminal records or past administrative and/or supervisory actions against them • Clients that are legal entities or arrangements with a complex, opaque ownership and control structure (including layered ownership and control, multijurisdictional or involve high-risk jurisdictions) • Clients obtained through introduced business, particularly from unregulated professional intermediaries or regulated PIs in jurisdictions with low AML controls (including CDD and recordkeeping, availability and timely access to beneficial ownership of legal entities and legal arrangements, licensing and supervision, and enforcement) • Professional intermediaries in jurisdictions with low or no CDD requirements • Professional intermediaries in high-risk businesses/professions in country context. Possible Sources of Information and Data • Regulatory framework for risk-based classification of clients • Regulatory framework for identifying and monitoring foreign and domestic PEPs • Any product-related statistics on PEPs and other higher-risk clients • Data on jurisdictions of origin of end-user clients and professional intermediary firms • DNFBP sector data by business/profession on transactions with high-risk jurisdictions • Data on clients obtained through introduced business • Interviews/consultations with regulatory/supervisory authority (e.g., an SRB or other competent authority) • Interviews/consultations with assessed business/profession’s representatives, including an SRB and professional associations • Surveys of management and staff of firms that make up the assessed business/profession • Interviews with and data compiled by private sector research or consulting firms • Criminal data, including typologies on high-risk clients and ML cases where a business/profession was used for ML by high-risk clients • Statistics on and information from STRs originating from the business/profession with regard to high-risk clients • Statistics on the foreign jurisdictions where MLA or informal information sharing requests were received and sent by relevant authorities, including by supervisors, law enforcement, the FIU, and tax authorities. Additional Guidance While assessing the client-base profile for each business/profession, please assess whether this business/profession is being used by clients who pose a higher ML risk, when compared to “standard” clients. These high -risk clients will include, politically exposed persons (PEPs), non-residents, high net-worth individuals, opaque or complex legal structures, and so on. It would be useful to look at the geographical breakdown of the clients and the transactions, including those categorized as “high-risk jurisdictions.” Clients and transactions associated with high -risk jurisdictions are likely to be 30 more vulnerable to money laundering as they are not subjected to adequate AML requirements and it is easier for criminals to move illicit funds to and from these centers into the global financial system. To assess this variable, the country should determine if the assessed business/profession has put in place appropriate mechanisms to identify and monitor high-risk individuals (including PEPs). If such monitoring/analysis mechanisms are not in place, the business/profession may not be able to provide such information. Under international standards and national legal frameworks of most countries, DNFBPs, when carrying out certain activities (including acting as financial intermediaries and incorporation services), are required to undertake customer due diligence, which includes verification of the beneficial ownership of legal persons and legal arrangements. Thus, DNFBPs should be able to identify nonresident clients, and determine which kinds of products they use. A more advanced analysis, based on the countries that such non-resident clients originate from, will provide further insight into the risk level. In some cases, the nature of the product will determine the client-base profile. For example the client-base profile of trusts would be high net-worth individuals. While assessing this indicator, please question how likely it is that this type of business/profession will be abused by criminals, compared to other businesses/professions in the sector. If the likelihood is high, the assessment rating for the client-base profile for this business/profession should be relatively side. Assessment of this indicator will require judgment, unless the country has appropriate mechanisms for identifying and monitoring high-risk clients (including PEPs). If there is no data that can support the assessment, the Working Group should work on the basis of the worst-case scenario and be conservative in its assessment. One of the multiple choices of this item in the Excel file is “Not analyzed”. Please note that the Excel file penalizes this, since the lack of ability to analyze the client-base profile will pose a risk in itself. 31 4.2.3. Level of cash activity associated with the business/profession Variable Description This variable assesses the level of cash activity associated with a specific business/profession, both whether the use of cash is permitted and to what extent that occurs. Assessment Criteria Assess whether the use of cash is permitted for the business/profession and the level of cash associated with it. The more the business/profession being assessed is cash-based, the greater its vulnerability to money laundering. Possible Sources of Information and Data • Interviews/consultations with regulatory/supervisory authority (e.g., an SRB or other competent authority) • Interviews/consultations with assessed business/profession’s representatives, including an SRB and professional associations • Surveys of management and staff of firms that make up the assessed business/profession • Interviews with and data compiled by private-sector research or consulting firms • Criminal data, including ML cases where a business/profession was used for ML because of the possibility of transacting in cash (including payment of fees for service provided). 32 4.2.4. Other vulnerable factors of the business/profession Variable Description This variable assesses whether there are any additional factors that render a particular business/profession vulnerable to the risk of money laundering. Assessment Criteria The presence of the following typical factors may increase the ML vulnerability of the assessed business/profession: • Use of agents • Possible anonymous use of the product in the business/profession • Difficulty in tracing the transactions (including attorney/client privilege and professional secrecy for lawyers and accountants; work [document]/product privilege) • Existence of ML typologies on the abuse of the business/profession • Use of the business/profession in tax/fraud schemes • Non-face-to-face interaction with the client. For all of the above factors, consider whether there is also an international dimension and how that may increase the vulnerability of the business/profession to ML risks. Examples: ML typologies that involve transnational financial crime schemes; and introduced business from professional intermediaries located in foreign jurisdictions. Possible Sources of Information and Data • Criminal data, including ML cases where a business/profession was used for ML, indicating vulnerability due to the above- mentioned factors • Data or statistics and qualitative information from MLA and formal or informal requests from supervisory authorities, law enforcement, the FIU, and tax and other relevant authorities to share information/intelligence • Interviews/consultations with regulatory/supervisory authority (e.g., an SRB) and other competent authorities • Interviews/consultations with assessed business/profession’s representatives, including an SRB and professional associations • Surveys of management and staff of firms that make up the assessed business/profession • Interviews with and data compiled by private-sector research or consulting firms. Additional Guidance Please note that existence of one or a few of these factors may render a business/profession vulnerable to money laundering. Use of Agents: A further example of a vulnerability factor is the use of agents or other professional intermediaries to deliver the product. In this case, ML vulnerability may be increased due to the weak AML systems of the agents or professional intermediaries (including weak systems of the countries in which they operate or reside). To limit vulnerability, the agents or professional intermediaries should be subjected to adequate AML controls and monitoring/supervision by the principal business/profession in the country providing the product. Possible anonymous use of the product in the business/profession: Assess whether anonymous use of the product is possible for the assessed business/profession. Also, please consider whether the beneficial owner of the transaction is always identified and verified. Does the business/profession allow for anonymous use (where a firm or an individual known to the assessed business/profession uses the product on behalf of several firms or individuals who are unknown to the business/profession)? Anonymous transactions are vulnerable to money laundering, as the beneficial owner(s) of the funds involved in the transaction is/are not known or are unverified. The transaction is executed for the client on behalf of others. The real owners are not known and hence not subjected to customer due diligence. Difficulty in tracing the transaction records of the business/profession: Please assess whether transactions executed in the course of delivery of a product by the business/profession are properly recorded and whether access to those records can be readily obtained for CDD/EDD. The difficulty in tracing the records would depend on the quality of the assessed business/profession’s AML CDD and record-keeping systems. Consider also, for example, the overbroad application or misuse of professional secrecy and privilege provisions, which may also hinder timely access to relevant records by competent authorities. Existence of ML typologies on the abuse of the business/profession: Assess whether the business/profession is known for abuse for ML purposes. This does not necessarily need to be in the country context. Please look at the typologies at the global level, regardless of whether it was detected or not detected in the country. Use of the business/profession in fraud or tax evasion schemes: Assess the use of the business/profession in fraud or tax evasion schemes or other predicate offenses. For this purpose, it may be useful to refer to crime and tax enforcement data to 33 find the businesses/professions that are most vulnerable to actual and potential misuse. The use of the business/profession in tax evasion or fraud schemes or other predicate offenses may indicate a vulnerability to ML abuse as well. Non-face-to-face use of the product of the business/profession: Availability of non-face-to-face initiation of a business relationship with respect to a business/profession (or product) raises ML vulnerability. If, for example, an individual is able to secure the product via the internet or telephone with no face-to-face contact with the professional or business, there is ML vulnerability. Even in the cases where non-face-to-face initiation of a product is not allowed, but non-face-to-face use of the product is, there is a possibility of ML vulnerability. But in the second case, the vulnerability of the product can be less, depending on the quality of CDD done during the face-to-face product initiation and existence of other controls that limit the use of the product by persons other than the account holder. Any other vulnerability factors: Please provide any other factor(s) that may render a particular business/profession vulnerable to money laundering. For example, are there complexity features to a product that present challenges in conducting CDD, including verifying beneficial ownership? 34 Business/Profession (Module 7.A) Summary of the assessment of the Business/Profession: Considering the assessment criteria and guidance, assess the Product 1 (Module 7.B) Product 2 (Module 7.B) Product 3 (Module 7.B) Product 4 (Module 7.B) Product 5 (Module 7.B) inherent vulnerability variables associated with the assessed business/profession. For each business/profession, check (✓) the appropriate option in the table. Repeat this for each business/profession assessed. 1. A, B, C High Total size/volume Medium High Medium Medium Low Low Not Analyzed 2. Client base profile Very High Risk High Risk Medium Risk Low Risk Very Low Risk Not Analyzed 3. Cash activity High Medium High Medium Medium Low Low Does Not Exist Not Analyzed 4. Other vulnerable Non-face-to-face Available and factors Prominent Available Available but Limited Not Available Use of agents High Medium High Medium Medium Low Low Does Not Exist Not Analyzed Anonymity (use) Available Not Available Difficult to trace records Records not available Difficult/Time Consuming Easy to trace Existence of ML Exist and Significant typologies Exist Exist but Limited Does Not Exist Exist and Significant Exist 35 Business/Profession (Module 7.A) Summary of the assessment of the Business/Profession: Considering the assessment criteria and guidance, assess the Product 1 (Module 7.B) Product 2 (Module 7.B) Product 3 (Module 7.B) Product 4 (Module 7.B) Product 5 (Module 7.B) inherent vulnerability variables associated with the assessed business/profession. For each business/profession, check (✓) the appropriate option in the table. Repeat this for each business/profession assessed. Use in tax/fraud Exist but Limited schemes Does Not Exist Other factor (specify) High Medium High Medium Medium Low Low Does Not Exist Not Analyzed Other factor (specify) High Medium High Medium Medium Low Low Does Not Exist Not Analyzed Other factor (specify) High Medium High Medium Medium Low Low Does Not Exist In case of a product-based assessment of a business/profession, please assess the inherent vulnerability variables associated with each product of the assessed business/profession. Repeat the assessment for all the products of assessed businesses/professions. Refer to Annex 2 for more details. 36 5. DESCRIPTION OF THE INTERMEDIATE VARIABLES (Ranging from lower level intermediate variables to higher level variables – Cf. Figure 3.a) VARIABLE DESCRIPTION Quality of AML This variable assesses whether the assessed business/profession has a Supervision comprehensive AML supervision regime supported by appropriate powers, staff and other resources. This variable depends on the: • Effectiveness of Supervision/Oversight Activities • Availability and Enforcement of Administrative Sanctions. Commitment and This variable assesses firms’ (of the assessed business/profession) management Leadership of commitment and leadership in AML, and how management is influenced by the Managements following variables: • Availability and Effectiveness of Entry Controls • Quality of AML Supervision (intermediate variable) • Availability and Enforcement of Criminal Sanctions. Quality of AML Policies This variable assesses the quality of firms’ internal AML policies and compliance and Procedures procedures in the assessed business/profession, which depends on the: • Comprehensiveness of AML Legal Framework • Effectiveness of Compliance Function • Commitment and Leadership of Managements (intermediate variable). Compliance Level of This variable assesses the compliance level of staff in firms (of the assessed Staff business/profession) with the AML legal framework and their institutional obligations. This variable considers how this is influenced by factors such as the: • Availability and Enforcement of Criminal Sanctions • Effectiveness of Compliance Function • AML Knowledge of Business/Profession Staff • Integrity of Business/Profession Staff. Quality of CDD This variable assesses whether the country has the legal, institutional and technical Framework framework to identify and verify the identities of natural and legal persons, to store the identification records and to facilitate the use of this information by authorized parties for AML purposes. This variable depends on the: • Availability and Access to Beneficial Ownership Information • Availability of Reliable Identification Infrastructure • Availability of Independent Information Sources. Quality of Operations This variable assesses the quality of operations in firms in preventing the abuse of the assessed business/profession for money laundering. This variable depends on the: • Commitment and Leadership of Managements (intermediate variable) • Compliance Level of Staff (intermediate variable) • Quality of CDD Framework (intermediate variable) • Effectiveness of Suspicious Activity Monitoring and Reporting. Quality of AML Controls This variable assesses the quality of AML controls in the assessed business/profession, which are the standard AML controls that apply to the business/profession as a whole or to all of its products. This variable depends on the: • Quality of AML Policies and Procedures (intermediate variable) • Quality of Operations (intermediate variable). 37 VARIABLE DESCRIPTION Inherent Vulnerability of This variable assesses the susceptibility of a particular assessed business/profession a Particular as a whole or its product to money laundering solely based on key inherent factors of Business/Profession the business/profession or its products without taking into account its AML controls. An assessed business/profession or its product is inherently vulnerable when its characteristics render it open to abuse for money laundering. This relies on inherent Product Inherent vulnerability variables, namely: Vulnerability • Total size/volume of the business/profession (or product) (Applicable for Product- • Client base profile of the business/profession (or product) Based Assessment Only) • Level of cash activity associated with the business/profession (or product) • Other vulnerable factors of the business/profession (or product). (Overall) Product This variable assesses the overall susceptibility of a particular business/profession’s Vulnerability product to money laundering given its inherent vulnerability and the AML control mechanisms put in place to address that vulnerability. The more susceptible the product is, the more money laundering transactions can occur undetected. The (Applicable for Product- overall product vulnerability depends on the: Based Assessment only) • Inherent Vulnerability of the Product (intermediate variable) • Quality of AML Controls (intermediate variable). The ratings of all the product vulnerability assessments (of the assessed business/profession) determine the vulnerability of the assessed business/profession. Business/Profession The overall vulnerability of the assessed business/profession is determined by its Vulnerability inherent vulnerabilities being assessed in conjunction with the quality of AML controls for the assessed business/profession. 38 ANNEX 1 – INSTRUCTIONS FOR USING THE EXCEL FILE At this stage, the input variables have been assessed, and assigned a rating. These ratings now need to be entered into the Excel file. This Annex provides step-by-step instructions for using the Excel files (7.A/7.B) to assess the vulnerabilities of the businesses/professions in the DNFBP sector. The WG should use Excel file 7.A if assessment is undertaken without detailed product assessment. In case of product-based assessment, use Excel file 7.B. • While reading these instructions, open and try to use the Excel file in parallel to aid your understanding. • Please make sure that you have a recent and full version of Windows Office Excel installed. The Excel file works only with Office Professional 2007 and later versions. Earlier versions or home/student versions of Excel, which have limited functions, do not support the file. • Do not work in the original Excel file. Always create a copy of it and work in the copied (working) version. This way, if the macros in the working version become corrupted, you will still have an intact version of the file. • Do not add or delete any rows/columns in the Excel file, as this can corrupt the macros or formulas in it. Step 1: Before you start After opening the Excel file, first enable macros. A security warning will appear in the top left-hand corner of the first tab (Entry Page), warning you that macros are disabled – as shown in Figure 4.a. Click on the Options icon and select the Enable this Content option. Click OK, or (depending on which version of Excel is being used) click on the Enable Content icon in the toolbar. This is an important step, because without it the Excel file will not function properly. Figure 4.a: Macro security warning 39 If the macro security warning (Figure 4.a) does not appear, change the macro settings. To change the macro settings, click the Microsoft Office Button (in the top left corner) and select Excel Options. In the Excel Options window, select the Trust Center option and click on Trust Center Settings (see Figure 4.b). When the Trust Center window opens, select the Macro Settings option (Figure 4.b). In this list, select the option Enable all Macros and click OK. Figure 4.b: Macro settings 40 Step 2: Entries for general input variables (in the Entry Page tab) For each general input variable, select your chosen rating in the drop-down list. The options range from (1.0) Excellent to (0.0) Does Not Exist. Notice that higher assessment ratings for general input variables implies that the country has better AML controls in place, which will lead to a lower overall vulnerability for the assessed DNFBP business/profession. The Excel file automatically colors the entries according to their level of desirability (i.e., green=desirable, red=undesirable, etc.) – as shown in Figure 5. For both the Excel files (7.A and 7.B), the Entry (page) tab is similar. Figure 5: Entries for general input variables (in the Entry Page tab) (applicable to both Excel files, 7.A and 7.B) To complete the assessment, assessment ratings need to be entered for all twelve general input variables. 41 Bear in mind that the assessment of the general input variables is applicable to the assessed DNFBP business/profession as a whole, and will influence the vulnerabilities of all the firms and individuals operating within the assessed business/profession. In case of product-based assessment (Excel file 7.B), it will also influence the vulnerabilities of all the products offered by the firms and individuals operating within the assessed business/profession. Step 3: Entries for inherent vulnerability variables (in the Entry Page (Vulnerability) tab) Once all the general input variables assessment ratings have been entered into the Entry Page tab, move to the next tab, which is Entry Page (Vulnerability). This is where the entries for inherent vulnerability factors for the assessed DNFBP business/profession are entered. During the assessment, you will decide which types of businesses/professions to include. Use separate Excel files for each type of DNFBP business/profession to be assessed. Enter the assessment ratings for each of the inherent vulnerability variables related to the assessed business/profession by clicking on the drop-down list in Column B (see Figure 6). Figure 6: Entries for inherent vulnerability variables (in the Entry Page (Vulnerability) tab), Excel File 7.A If the rating for any inherent vulnerability variable has not been entered, a warning that the file is incomplete will appear in row 20 of the Entry Page (Vulnerability) tab. 42 Step 3: Entries for inherent vulnerability variables (in the Entry Page (Products) tab) (applicable in case of product-based assessment, Excel File 7.B) Once all the general input variables assessment ratings have been entered into the Entry Page tab, move to the next tab, which is Entry Page (Products). This is where the entries for product-specific input variables are entered. During the assessment, you will decide which products to include. The design of the Excel file allows you to change the names of the products. The names of the products that are to be assessed should be inserted in row 2. Click on the cells that read Product/Service #, and enter the name of the product to be assessed. Please note that product-based assessment is undertaken for a specific DNFBP business/profession. Enter the assessment ratings for each of the specific input variables by clicking on the drop-down list in Column B/Column C, respectively for each of the products. In this tab, the specific input variables (Column A) will be assessed for each of the selected products for the assessed DNFBP business/profession (see Figure 7). The Excel file is designed to facilitate the assessment of up to 5 products. However, if needed, you can use a second file to assess additional products. In this case, to assess the vulnerability of the DNFBP business/profession, the Working Group should use a third file as the master file. This master file should include only the 5 products with the highest vulnerability in two working files. Figure 7: Entries for product-specific input variables (in the Entry Page (Products) tab), (Excel File 7.B) 43 If the rating for any specific input variable has not been entered for a product, a warning that the file is incomplete will appear in row 20 of the Entry Page (Products) tab. The Working Group may choose one of two approaches in assessing the impact of a given product’s vulnerability to money laundering: (1) The Weighted Average Approach. This straightforward approach calculates the overall vulnerability of the assessed DNFBP business/profession on the basis of the weighted averages of all the products assessed. Weights are determined by the total size/volume entries of each of the assessed products. (2) The Open Door Approach. This approach calculates the vulnerability score of the assessed DNFBP business/profession, not by focusing on weighted averages of products but rather on those products that are most vulnerable. It can perhaps best be illustrated by using the metaphor of a house. Suppose a building has ten doors (products), one of which is open. Using the Weighted Average Approach, the overall vulnerability of the building would end up as relatively low (10 percent). However, in practice, we know that one open door may make the building highly vulnerable. To take account of this, therefore, in determining vulnerability, the Open Door Approach focuses on the products with higher vulnerability. The Open Door Approach has been chosen as the default option in the Excel file 7.B. Thus, the entry in cell B 21 is “OD” (see Figure 7). If you prefer the Weighted Average Approach, switch to the weighted average option by entering “W” in this cell. In order to compare the outcomes of the two approaches, it is suggested that the Working Group try the Open Door Approach first and then try the Weighted Average Approach, working as follows. First, make the assessment using the Open Door Approach and save the file. Then create a copy of this file and change the option from “OD” to “W” in cell B 21, as discussed above. Save this file under another name. Compare the overall vulnerability of the assessed DNFBP business/profession using each option and decide which results make more sense. Whichever approach and result is finally chosen, the outcome must be supported with documentation of the underlying argument. Step 4: Saving the entries After the results for the input variables (step 2 and step 3) have been entered, save the entries by clicking the Save the Original Case icon on the Entry Page (Vulnerability) tab – as shown in Figure 8 or Entry Page (Products) tab – as shown in Figure 9 (applicable in case of product-based assessment, Excel file 7.B). This is an important step as the case needs to be saved before you can proceed. Otherwise, the output charts will not show the results of the assessment. (Bear in mind that this saves only your entries, not the file. You still have to save the Excel file to not lose your data.) 44 Figure 8: Icons on the Entry Page (Vulnerability) tab, Excel File 7.A Figure 9: Icons on the Entry Page (Products) tab (applicable in case of product-based assessment, Excel File 7.B) 45 Step 5: The outputs of the assessment After the case has been saved, the Excel file automatically generates the outputs of the assessment. There are three outputs, which are captured in three separate tabs: • Output Charts • Vulnerability Map (Network Diagram) • Prioritization. (1) Output Charts tab The Output Charts tab shows the final and inherent vulnerability score of the assessed DNFBP business/profession, and the assessment results for intermediate variables such as Quality of AML Controls, in a visual format (see Figure 10). For output charts, click on the Output Charts icon in the Entry Page (Vulnerability) tab to view the assessment results (as shown in Figure 8). The inherent vulnerability score of the assessed DNFBP business/profession does not take into account the impact of AML controls on the vulnerability of the business/profession. On the other hand, the final vulnerability score is calculated after taking into account the impact of AML controls. The more effective and comprehensive the AML controls, the lower the final vulnerability of the assessed DNFBP business/profession. Figure 10: Output charts (Excel File 7.A) 46 For both the vulnerability charts, a higher score implies a higher vulnerability to ML. On the other hand, for intermediate variables that relate to controls (such as Quality of AML Controls, Quality of CDD Framework, and Quality of Operations) a higher score indicates a higher combating ability, which lowers the vulnerability of the assessed DNFBP business/profession to ML. Output Charts tab – For Product-Based Assessment (Excel File 7.B) The Output Charts tab shows the final vulnerability of the assessed DNFBP business/profession, the vulnerability of each assessed product for the business/profession, and the assessment results for intermediate variables such as Quality of AML Controls, in a visual format (see Figure 11.a and Figure 11.b). For output charts, click on the Output Charts icon in the Entry Page (Products) tab to view the assessment results (as shown in Figure 9). The product vulnerability chart shows both the inherent vulnerability scores (light blue bar) and the final vulnerability scores (dark blue bar) of each product assessed. The inherent vulnerability score does not take into account the impact of AML controls on the vulnerability of a product. On the other hand, the final vulnerability score is calculated after taking into account the impact of AML controls. The more effective and comprehensive the AML controls, the lower the final vulnerability of the product. Figure 11.a: Output charts (applicable in case of product-based assessment, Excel File 7.B) 47 Figure 11.b: Product Vulnerability Output chart (applicable in case of product-based assessment, Excel File 7.B) For both the product vulnerability chart and the final vulnerability of the assessed DNFBP business/profession chart, a higher score implies a higher vulnerability to ML. Similarly; a higher product vulnerability score increases the vulnerability score of the assessed DNFBP business/profession. On the other hand, for intermediate variables that relate to controls (such as Quality of AML Controls, Quality of CDD Framework, and Quality of Operations) a higher score indicates a higher combating ability, which lowers the vulnerability of the assessed DNFBP business/profession to ML. Applicable to both the Excel files (7.A and 7.B) For vulnerability-related charts, a lower score is indicated by shades of green, implying lower ML vulnerability. On the other hand, for intermediate variables related to AML controls, a lower score is indicated by shades of red, implying a lower combating ability, and hence higher ML vulnerability. Please pay attention to the names and the colors of the inputs and outputs while interpreting the scores. • When the reference is to “vulnerability” a low score is desired; therefore low corresponds to green and high corresponds to red. • When the reference is to “controls” or related inputs; a high score, which means better controls, is desired. Therefore, for control related inputs and outputs high corresponds to green and low corresponds to red. 48 (2) Vulnerability Map tab Vulnerability Map is a visual summary of the assessment, which shows how the assessment inputs cause impact on the outputs. To view the vulnerability map of the assessed DNFBP business/profession, click on the Vulnerability Map icon on the Entry Page (Vulnerability) tab (as shown in Figure 8) or Entry Page (Products) tab (as shown in Figure 9) for product-based assessment – Excel file 7.B. This tab provides a visual summary of the assessment ratings of all the variables (see Figure 12). Note that the vulnerability map only shows the network diagram for the assigned assessment ratings of general input variables, and the corresponding assessment results of the intermediate variables, which affect the degree to which the assessed DNFBP business/profession is able to combat ML. This diagram does not show the effect of general input variables on product vulnerability, or the impact of product vulnerabilities on the final vulnerability of the assessed DNFBP business/profession (applicable only in case of product-based assessment – Excel file 7.B). Figure 12: Vulnerability Map (applicable to both the Excel files, 7.A and 7.B) The assessment results in Figure 12 show that the quality of AML controls is weak. This can be seen in the low score and the red color of the box, both of which indicate weak AML controls. Although the Quality of AML Policies and Procedures is good (this type of green indicates a medium-high score), the Quality of Operations in businesses/professions is weak (the low score and the color red indicating weak operations). The problem area is therefore Quality of Operations. Low Compliance Level of Staff and weak Suspicious Activity Monitoring and Reporting Systems in the businesses/professions underlie the deficiencies in operations. Furthermore, low Integrity of Business/Profession Staff and low AML Knowledge of 49 Business/Profession Staff are the factors underlying Low Compliance Level of Staff in businesses/professions. (3) Prioritization tab A priority ranking can be generated to help guide relevant authorities to prioritize actions to strengthen AML controls within the assessed DNFBP business/profession. Click on the Prioritization icon in the Entry Page (Vulnerability) tab (Figure 8) or in the Output Charts tab (Figure 10) to go to the Prioritization tab. In case of product-based assessment (Excel file 7.B), Click on the Prioritization icon in the Entry Page (Products) tab (Figure 9) or in the Output Charts tab (Figure 11.a) to go to the Prioritization tab. The table in the Prioritization tab ranks the general input variables with respect to their impact on the AML controls and consequently the vulnerability of the assessed DNFBP business/profession (see Figure 13). Figure 13: Prioritization table (applicable to both the Excel files, 7.A and 7.B) • A low number, highlighted in a darker color/dark red, signifies that the general input variable merits a high priority in the action plan. • A high number, highlighted in a lighter red (or pink), means that the corresponding input variable still has severe deficiencies and is in the priority list, although it has less priority than the ones with darker colors. • Blank cell (in light blue) indicates that the corresponding input variable does not have priority. There may still be deficiencies related to variable, but these are not severe and do not require urgent action. For example, in Figure 13, the input variable AML Knowledge of Business/Profession Staff has a priority ranking of one, implying that mitigating the deficiency related to this variable is the first item at the top of the priority list. The prioritization table results should be used as a starting point for developing action plans. 50 Please note that the variable that has the lowest rating in the Entry Page tab may not have the highest priority rating in most cases. Priority rankings do not necessarily run parallel with the ratings in the Entry Page tab. Sometimes an item that is rated as medium may turn out to have the highest priority. Such results are fully consistent with the logic of the tool; as the assessment rating is just one of the four factors that have an impact on priority ranking. As previously explained, the other three factors are: • The network structure of the module • The weights of the input and intermediate variables • The defined conditions (prerequisites) for intermediate variables. Applicable to product-based assessment (Excel File 7.B) Whether an Open Door Approach or a Weighted Average Approach (or a combination of both approaches) is used to assess the vulnerability of the DNFBP business/profession, all the outputs and assessment results discussed in Step 5 will be the same for all three approaches. Only the final vulnerability of the assessed DNFBP business/profession will vary for the three different approaches. Step 6: Saving the file Save the file. It is important to save the file as a macro-enabled workbook (as shown in Figure 14). If it is not saved as a macro-enabled workbook, the macros will be disabled and the Excel file will not function properly. Figure 14: Save Excel file as a macro-enabled workbook (Excel Files 7.A and 7.B) Changing entries after the original case has been saved If any changes have been made to the original case entries, remember to save those entries by clicking on the Save the Original Case icon on the Entry Page (Vulnerability) tab (see Figure 8) or Entry Page (Products) tab (see Figure 9) in case of product-based assessment – Excel file 7.B. The assessment outputs will not reflect the changes unless the entries have been saved. Erase all the entries and restart the process Click the Reset Inherent Vulnerability Entries icon on the Entry Page (Vulnerability) tab (Figure 8), and click the Reset General Input Variables icon on the Entry Page tab (Figure 15) to erase all the previous entries. Also click the Clean Charts icon on the Output Charts tab (Figure 10) to erase the previous entries on the Output Charts tab. 51 Applicable to product-based assessment (Excel File 7.B) Click the Reset Product Entries icon on the Entry Page (Products) tab (Figure 9), and click the Reset General Input Variables icon on the Entry Page tab (Figure 15) to erase all the previous entries. Also click the Clean Charts icon on the Output Charts tab (Figure 11.a) to erase the previous entries on the Output Charts tab. Figure 15: Icons on the Entry Page tab– (applicable to both the Excel files, 7.A and 7.B) Step 7: Using the Excel file for scenario analysis (optional) The Excel file can also be used for scenario analysis. It can be used either for comparing the vulnerability of the assessed DNFBP business/profession over a period of time, or for observing and analyzing the effects of various policy options, based on scenarios. For example, it is possible to see what impact policy actions (individually or collectively) may have on reducing vulnerability. Similarly, the assessment ratings for general input variables, final and inherent vulnerability of the assessed DNFBP business/profession, assessment results for intermediate variables, and priority ranking for the general input variables for different years or scenarios can all be compared using the scenario analysis option. In case of product-based assessment (Excel file 7.B), it can also be used for comparing the final and inherent vulnerabilities of the products for different years or scenarios. It is also possible to use the scenario analysis function for comparing the results of Open Door and Weighted Average Approaches. Instructions for using the scenario analysis option – Excel File 7.A To use the scenario analysis option, first be sure to save the Excel file with the original entries, and then create a new copy of the file for scenario analysis. Then go to the Entry Page tab, and make sure you do not reset the entries. Insert the new assessment ratings for the general input variables and inherent vulnerability variables for the second year, or for Scenario 2, in the Entry Page tab and Entry Page (Vulnerability) tab respectively and save the entries as Scenario 2 (as shown in Figure 8). As in Step 5, assessment results are generated in the Output Charts tab (as shown in Figure 16). Note that in a scenario analysis, the original case results are shown in brown while all scenario 2/second year results are shown in gray (see Figure 16). Scenario analysis can be performed for 10 years, or for 10 different scenarios. The assessment results for the final and inherent vulnerability of the assessed DNFBP 52 business/profession and the intermediate variables (such as Quality of AML Controls and Quality of Operations) are available for all the years (as shown in Figure 16). Figure 16: Output charts – Scenario Analysis (Excel File 7.A) Instructions for using the scenario analysis option for product-based assessment – Excel File 7.B To use the scenario analysis option, first be sure to save the Excel file with the original entries, and then create a new copy of the file for scenario analysis. Then go to the Entry Page tab, and make sure you do not reset the entries. Insert the new assessment ratings for the general input variables and product specific input variables for the second year, or for scenario 2, in the Entry Page tab and Entry Page (Products) tab respectively and save the entries as Scenario 2 (as shown in Figure 9). As in Step 5, assessment results are generated in the Output Charts tab (as shown in Figure 17.a and Figure 17.b). Note that in a scenario analysis, the original case results are shown in brown while all scenario 2/second year results are shown in gray (see Figure 17.a). Scenario analysis can be performed for 10 years, or for 10 different scenarios. In Figure 17.b, the vulnerability assessment results of the products are produced only for the last case (i.e., the third year/Scenario 3). The assessment results for the vulnerability of the assessed DNFBP business/profession and the intermediate variables (such as Quality of AML Controls and Quality of Operations) are available for all the previous cases, as well as the last case (as shown in Figure 17.a). 53 Figure 17.a: Output charts – Scenario Analysis (Excel File 7.B) Figure 17.b: Product Vulnerability Output chart– Scenario Analysis (Excel File 7.B) 54 Scenario Analysis results – screen display (Excel Files 7.A and 7.B) The Scenario Analysis tab provides the assessment results for the different years or scenarios (Figure 18). The Scenario Analysis tab shows the assigned assessment ratings for the general input variables, the assessment results for intermediate variables, the final and inherent vulnerability of the assessed DNFBP business/profession, and the priority rankings of the general input variables for the various years/scenarios. These tables are helpful in understanding where changes in the vulnerability of the assessed DNFBP business/profession originate, as well as the impact of policy actions on vulnerability, the combating ability/AML controls and the priority ranking of general input variables. The tables show how policy actions have an impact on the various components of vulnerability over a period of time, or in different scenarios. Figure 18: Scenario Analysis tab (Excel Files 7.A and 7.B) 55 Scenario Analysis results–screen display for product-based assessment (Excel File 7.B) The Scenario Analysis and Scenario Analysis (Products) tabs provide the assessment results for the different years or scenarios The Scenario Analysis tab shows the assigned assessment ratings for the general input variables, the assessment results for intermediate variables, the final vulnerability of the assessed DNFBP business/profession, and the priority rankings of the general input variables for the various years/scenarios (Figure 18). The Scenario Analysis (Products) tab shows the inherent and final vulnerability for the products assessed for the various years/scenarios (Figure 19). These tables are helpful in understanding where changes in the vulnerability of the assessed DNFBP business/profession originate, as well as the impact of policy actions on vulnerability, the combating ability/AML controls, the product vulnerability, and the priority ranking of general input variables. The tables show how policy actions have an impact on the various components of vulnerability over a period of time, or in different scenarios. Figure 19: Scenario Analysis (Products) tab (Excel File 7.B) How to “unhide” the Weights tab The default weights of the variables and pre-requisites of the intermediate variables reflect the assumptions that underlie the module. In the default version of the Excel file, the weights, the defined pre-requisites cannot be changed by users, but can be viewed. These weights can be revealed by clicking on the Weights tab. To reveal the Weights tab, select any tab, right click on the name of the tab, and click the Unhide option. When the Unhide window opens, click on the Weights option and press OK. Note that the Weights tab is protected and no changes can be made to this sheet. Contact the World Bank NRA Team if changes to the weights and pre-requisites are required. In Figure 20, Column B shows the weights for the variables in the Excel file. The weights assigned to the variables are relative. For example, the variable Quality of Operations (line 5) is determined by four variables: • Quality of CDD Framework (line 6) • Effectiveness of Suspicious Activity Monitoring and Reporting (line 10) • Compliance Level of Staff (line 11) • Commitment and Leadership of Managements (line 19). 56 Figure 20: Weights tab (applicable to both the Excel files, 7.A and 7.B) The weights on these four variables in determining the Quality of Operations (line 5) are relative to one another, as follows. The weight of the variable Compliance Level of Staff (line 11) is three times that of the variable Quality of CDD Framework (line 6), while the variable Quality of AML Controls (line 3) is determined equally by the variables Quality of Operations (line 5) and Quality of AML Policies and Procedures (line 25) (both have an assigned weight of 1). The defined pre-requisites for the intermediate variables are shown in Column C (see Figure 21). If a variable has a weight of 1 assigned to it in Column C, then it is a pre-requisite. For example, for the variable Quality of CDD Framework (line 6), the variable Availability of Reliable Identification Infrastructure (line 7) is a pre-requisite. This means that the variable Quality of CDD Framework cannot be better than the variable Availability of Reliable Identification Infrastructure. In other words, the score of the lower-level variable defines a cap on the score of the higher-level variable. 57 ANNEX 2 – PRODUCT-BASED ASSESSMENT MODULE (Module 7.B) The Working Group can decide to undertake a more detailed assessment of the products being offered by the assessed business/profession. This is to be decided on a needs basis as discussed in Section 2.1. Assess different products in the business/profession only if the products have different money laundering risks and there are benefits to be derived from detailed separate product analysis. Why perform an assessment of certain products? Certain products are inherently more vulnerable to money laundering. This increased vulnerability may arise from the characteristics of the product – such as the availability of anonymous use, non-face-to-face interactions, frequent use of cash – or the characteristics of the clients such as PEPs or high-wealth-individuals who are likely to make use of the product. Since the inherent factors may differ among the products, we need to assess the inherent vulnerability of each product separately. Module Structure (The Network) As illustrated in Figure 22, the overall vulnerability of the business/profession is determined by the vulnerabilities of the various products assessed for the business/profession. This module assumes that product vulnerability can be measured by two main factors, which are determined by underlying sub- factors: (1) inherent vulnerability (of the product) and (2) quality of AML controls. “Product 1” is used as example in Figure 22. Similar assessments can be performed for other businesses/professions, and up to 5 products for each business/profession can be assessed. Guidance for Assessment of Variables For the assessment of AML control variables, refer to Section 4.1, where you can find assessment worksheets for AML control variables. The criteria for assessing AML control variables in product-based module are the same as the criteria for assessing the AML control variables for the specific business/profession. Similarly, the criteria for assessing inherent vulnerability variables for each product are the same as the criteria for assessing broader inherent vulnerability factors for the specific business/profession. For assessment worksheets on inherent vulnerability variables, refer to Section 4.2. Suggested list of products to assess Please refer to Table 1 for a suggested list of products to assess. 58 Figure 22: Product-Based DNFBP Vulnerability Module Structure (Excel File 7.B) 59