Completing and Documenting a Suspicious Activity Investigation

Financial Institutions

July 01, 2014
by Teri Downey, CRCM, CAMS, CFSA, CFIRS

Bookmark and Share
Teri Downey Teri Downey, CRCM, CAMS, CFSA, CFIRS

View Profile
Financial institutions may become aware of unusual or suspicious activity from a variety of sources, including manual transaction monitoring, automated Anti-Money Laundering (AML) software systems, law enforcement inquiries, and requests such as 314a requests, subpoenas, national security letters, or employee notifications. Once such activity has been identified, the incident or alert must be reviewed and investigated.
Some alerts require limited investigation and documentation, while others require expanded investigations and detailed documentation of the results. Alerting management is not a one-size-fits-all process, but enough information must be gathered, analyzed, and documented to make a determination whether a Suspicious Activity Report (SAR) should be filed or whether a “no SAR” file is necessary.

Average Rating:

Length: 2 pages (PDF 89 kB)

Rate this Article
*  =  required fields
Your Rating*
E-mail Address*