FCM Services Features
FCM Services Features
FCM Services Features
No part of this document may be reproduced or transmitted in any form or by any means, for any purpose,
without the express written permission of TEMENOS HEADQUARTERS SA.
No part of this document may be reproduced or transmitted in any form or by any means, for any purpose,
without the express written permission of TEMENOS HEADQUARTERS SA.
Table of Contents
Table of Contents
1. Introduction ............................................................................................................................................6
2. FCM Screen: Sanctions screening ........................................................................................................7
2.1 Support of public lists, data provider supplied lists and bank’s private lists ................................7
2.1.1 Watch Lists data separation per business unit ........................................................................7
2.1.2 Public lists supported: OFAC, EU, UN .....................................................................................7
2.1.3 Data providers supported lists: WorldCheck, Factiva / DowJones, Accuity ............................7
2.1.4 Private Lists .............................................................................................................................8
2.2 List management .........................................................................................................................9
2.2.1 Data imported from the lists .....................................................................................................9
2.2.2 Enrichment of data from the lists: permutations and variations ............................................ 11
2.3 Transactions screening and Customers screening .................................................................. 15
2.3.1 Transaction screening........................................................................................................... 15
2.3.2 Customer Information screening at on boarding time........................................................... 15
2.3.3 Ad Hoc Customer Information screening .............................................................................. 16
2.3.4 Customer Information database screening on a daily basis ................................................. 16
2.4 Scanning methods .................................................................................................................... 16
2.4.1 Normalization to compare apples to apples.......................................................................... 16
2.4.2 Exact match or literal scan .................................................................................................... 18
2.4.3 Approximate match or Relaxed Pattern Matching ................................................................ 19
2.4.4 Enhanced Recognition Module ERM .................................................................................... 23
2.4.5 Detect Banks, Cities and Countries aliases and identifiers .................................................. 23
2.4.6 Bank/City/Country Data Update Service ............................................................................... 26
2.4.7 Match Chinese Commercial Codes (CCC) to Pinyin name .................................................. 27
2.4.8 FATF R16 Scanning ............................................................................................................. 28
2.5 Reducing the number of false alerts ......................................................................................... 28
2.5.1 CRS (reducing number of false alerts based on the text morphology) ................................. 28
2.5.2 CSF (reducing number of alerts using entity types) ............................................................. 30
2.5.3 Reduction of Alerts on transactions: creating SKIPs that prevent recurrent alerts to be raised
on the same text against the same black listed entity ......................................................................... 30
2.5.4 CIF (Customer Information File) Screening .......................................................................... 31
2.6 Screen User Interfaces ............................................................................................................. 31
2.6.1 Alert Manager ....................................................................................................................... 31
2.6.2 Screen Watch List Manager ................................................................................................. 35
2.6.3 Reporting for FCM Screen .................................................................................................... 35
2.7 Case management: 2 eyes or 4 eyes principle ........................................................................ 38
2.7.1 Alert Manager ....................................................................................................................... 38
2.7.2 Flush operations ................................................................................................................... 38
3
FCM Services
User Guide for Business Functions
4
FCM Services
User Guide for Business Functions
5.2.1 Mandators: how to handle multiples companies, subsidiaries or business units within a
single FCM Screen instance ............................................................................................................... 79
5.2.2 Users belong to profiles giving access to a configured list of features in a configured list of
modules 80
5.2.3 The access to FCM Screen application modules is governed by rules ................................ 80
6. FCM Reporting: the Reporting Framework ........................................................................................ 82
6.1 Browsing tables ........................................................................................................................ 82
6.2 Filter .......................................................................................................................................... 82
6.2.1 Simple filter ........................................................................................................................... 82
6.2.2 Filter based on joint tables .................................................................................................... 82
6.3 Count statistics ......................................................................................................................... 82
6.4 Dashboards .............................................................................................................................. 82
6.5 Report generator ...................................................................................................................... 82
6.6 Report Scheduler ...................................................................................................................... 82
7. System administration ........................................................................................................................ 84
7.1 Screen parameter wizard ......................................................................................................... 84
8. FCM Integration with other systems ................................................................................................... 85
8.1 Screen Integration .................................................................................................................... 85
8.1.1 Transaction screening........................................................................................................... 85
8.1.2 Customer Information File (CIF) screening........................................................................... 85
8.2 Profile Integration ..................................................................................................................... 85
8.3 Out of the bow integration with T24 .......................................................................................... 85
9. What feature available form what release? ........................................................................................ 86
9.1 R201604 ................................................................................................................................... 86
9.2 R201607 ................................................................................................................................... 86
5
FCM Services
User Guide for Business Functions
1. Introduction
This document describes the set of the Standard Features available with the Financial Crime Mitigation
(FCM) Suite software:
The features can be regrouped as follow:
• the 3 main FCM modules
o FCM Screen
o FCM Profile
o FCM KC+
• The 3 common modules
o FCM Reporting Framework
o FCM Security module for authorisation
o FCM System administration module
Extended Features of FCM Suite are also available as chargeable options. These are described in
separate documents, each describing the features of a given module.
This document also describes
• The integration options
• The features and the releases
6
FCM Services
User Guide for Business Functions
Each of these functionalities are supported by a specific module and are described hereafter..
2.1 Support of public lists, data provider supplied lists and bank’s
private lists
2.1.1 Watch Lists data separation per business unit
FCM Suite is architected in the way that a single instance of the system can support multiple legal
entities, or within a legal entity multiple business units. Each such unit is called “mandator”.
It’s the bank’s decision on how its business is logically divided; a mandator can be a branch, an office,
a group of clients, a region, a country, and so on.
Each mandator has its own set of Watch Lists. Watch Lists can be grouped in 3 types: 1. public lists
(e.g. OFAC, EU, UN), 2. Global lists (bank’s own globally applicable names lists) and 3. Private lists
(mandator specific names lists). Global lists are applicable to all mandators, but private lists are only
applicable to a particular mandator.
2.1.3.1 WorldCheck
World-Check (http://www.world-check.com) offer services focused on several regulatory aspects..
This file integrates PEP and sanctioned entities records. WorldCheck is a subsidiary of the
Thomson Reuters company.
The WorldCheck data can be obtained in the “normal” format or in the “premium” format. The
premium format contains more detailed information and columns.
A record of the WorldCheck file represents an entity – a sanctioned entity, a PEP or another type
of entity. Such an entity can belong to several sanctions lists: e.g. a given entity can exist in the
OFAC, EU, US Treasury, Canadian sanctions lists. We therefore call the WorldCheck file a
7
FCM Services
User Guide for Business Functions
“grouped entity” file, whereas some other supplier’s files would provide a separate record for each
occurrence of the entity in a sanctions list.
Because of the file size, FCM Screen supports the import of the WorldCheck file in “delta” mode.
In this mode, a comparison is made between the current and the previous WorldCheck files, and
only the records where there is a difference or when there is no match are taken into
consideration. (While WorldCheck also publishes deltas, these specific files are not supported.)
2.1.3.3 Accuity
The Accuity file is published by Accuity a member of the Reed Elsevier Group. This company
is specialized in Data management for financial institutions. They are also delivering the well-
known Bankers Almanac. In the context of the compliance business, Accuity issues the
“Global Watch List” (http://www.accuity.com/compliance/global-watchlist/).
Accuity provides the lists in either the “single entity” or in the “grouped entity” formats.
In the case of “grouped entity” format, such an entity can belong to several discrete sanctions
lists: e.g. a given entity can exist in the OFAC, EU, US Treasury or Canadian sanctions lists.
In the case of “single entity” format, each record represents a sanctions list entry.
FCM Screen supports the Accuity provided files formats:
- PIDGWL “single entity” Global Watch List
- PIDETCGWL “grouped entity” Global Watch List
1
- UPIDGWL “single entity” Global Watch List using the UTF-8 character set
Accuity provides the PEP information in either the PIDGWL or the UPIDGWL format. FCM
Screen handles both sanctions lists and PEP lists in the same database.
The files are published every day. FCM Screen supports the import of the Accuity file in “delta”
mode. In this mode, a comparison is made between the current and the previous Accuity files, and
only the records where there is a difference or when there is no match are taken into
consideration.
2.1.3.4 WorldCompliance
The FCM Screen support the World compliance list format
1
In this format, an additional column is provided with the names expressed in native characters.
8
FCM Services
User Guide for Business Functions
Note that the specialised import for OFAC, EU, UN, WorldCheck, Factiva / Dow Jones and
Accuity supports the same type of data:
• Name of the entity
• Titles and honorific
2
• Events
• Addresses
2
Date of birth, Death date, Incorporation date, …
9
FCM Services
User Guide for Business Functions
• Aliases
3
• Identifiers of this entity
• Additional information
• Associations
Besides these data provided directly from imported file, the application maintains automatically
generated data and user-modified data.
Automatically generated data includes
• Permutations (alterations based on names and aliases using a set of algorithms
depending on the entity type – individual, company, organisation, …)
• Variations (alterations of people's names based on a set of algorithms taking usual name
usage into consideration, e.g. nicknames, abbreviations, language specific spelling
variations…)
Sometimes the data from the official list can be amended and adapted to the situation of the
bank. This can be done manually:
• Deactivation of aliases, permutations, variations
• Addition of SKIPs
• Additional private aliases, addresses, events, identifiers.
All the dependant information (title, date of birth, address, alias, identifier, further info) are linked
to the main entry in a 1 to n relationship; for one entity entry, there are several possible titles,
addresses, aliases, dates of birth, identifiers and additional information.
The name of the entity refers to the principal name of the person, organisation or company. If the
entity is known under other names, these are stored as aliases.
Events (like the date of birth) also include the place at which the event occurred. When several
places for the same event are mentioned in the input file, and if there is no direct link between the
place and the date, the locations are concatenated and associated with each date.
Sometimes, the date of an event is incomplete (month or day) but can still be parsed by the
import; the date will be flagged as “Approximate”. If the format of the date cannot be parsed, the
date is flagged as “Unparsed”.
The address needs to contain at least one of the components: address line, city, zip code, state,
country.
Aliases are a list of equivalent names provided for an entity. They are not generated
automatically.
Identifiers are attributed by official administrations: passport numbers, social security numbers,
driver licenses, VAT numbers, SWIFT codes, Clearing House Codes, …
Additional information contains references to the legal decisions, in text or via an URL. We can
also find Web links to external web-sites containing information related to an entry.
Associations are links between entities. An association is either a family link or a business link.
From one entity you can get the list of the linked entities. Currently, it is not possible to browse
the database links from one entity to another.
Note: Details about technical references and data attributes can be found in the Appendix in
chapter 6.
3
Social security number, passport numbers, …
10
FCM Services
User Guide for Business Functions
2.2.2.1 Variations
Variations are generated using the existing names and Temenos proprietary algorithms. The
generated alterations are based on statistically likely variants of the name components (e.g. a
variation of Robert Deblaere could be Bob Deblaere). Such additional variations allow to keep
a higher RPM (Relaxed Pattern Matching) threshold and hence reduce false hits but still be
able to detect potentially true hits.
2.2.2.2 Permutations
Permutations are generated using the existing names and Temenos proprietary algorithms. It
is possible to add the Variations to the set of permutations input data. The generated
alterations are permutations of the name and given name, valid initials, removal of
parentheses and company markers.. Based on the bank’s specific risk based approach and
screening requirements additional permutations types can be added to the lists entries.
Examples:
Entry / Alias Permutation: Last name only
GRAJALES LONDONO, JUAN RAUL GRAJALES LONDONO
CAICEDO VERGARA, NOEMY CAICEDO VERGARA
L EMIR N/A (conditions not met, too short)
2. Given names only: Technically the same feature as before with same (or even more
restrictive) conditions but only for first names applied.
Examples:
Entry / Alias Permutation: Given name only
GRAJALES LONDONO, JUAN RAUL JUAN RAUL
CAICEDO VERGARA, NOEMY N/A (too short, conditions not met)
CAZARES SALAZAR, BLANCA MARIA BLANCA MARIA
3. Glued entries: This feature generates permutations of names and aliases with any
spaces in between removed and allows to cope with cases where voluntary blanks
and spaces have been removed in transactions. Conditions refer to list name (e.g.
only for OFAC list) and minimum_size.
4
Standard names and aliases.
11
FCM Services
User Guide for Business Functions
Examples:
Entry / Alias Permutation: Glued
GRAJALES LONDONO, JUAN RAUL GRAJALESLONDONOJUANRAUL
Examples:
Entry / Alias Tokens and Cliques
NOURY, JEAN STEPHANE PAUL NOURY JEAN, NOURY STEPHANE
DUPONT LAJOIE, ANDRE DUPON ANDRE, LAJOIE ANDRE
In addition there is the table of given name cliques with additional variations of first
names, e.g. William, Guillermo, Bill.
Examples:
fr: GUILLAUME
en: WILLIAM, BILL, WILL, BILLIE, BILLY, LIAM, WILLY
es: GUILLERMO
5. Ordinals: This feature generates permutations for names that contain an ordinal value
in numerical (10th) or alphabetical order (tenth). Conditions refer again to list name,
minimum_size, minimum_word_size, minimum_word_count and entry type.
Examples:
Entry / Alias Permutation: Ordinal
8TH IMAM INDUSTRIES GROUP EIGHTH IMAM INDUSTRIES GROUP
RESISTANCE GROUP FIRST OCTOBER RESISTANCE GROUP 1ST OCTOBER
6. Main URL component: This features generates aliases extracted from main
components of URLs mentioned as aliases in interdict lists like OFAC. Conditions
refer to list name, minimum_word_size and minimum_word_count.
Examples:
Entry / Alias Permutation: Main URL component
www.no.gocubaplus.com GOCUBAPLUS
www.nuevocontinente.com.pe NUEVOCONTINENTE
www.kahanetzadak.com KAHANETZADAK
7. Segment Slice: This feature generates permutations by decomposing some words into
separate words when the systems considers the name was concatenated from 2
words, one of which with a frequent business-related suffix or prefix. Conditions refer
to entry type, list name and miminum sizes and word counts. The default set of values
contains INVEST, EXPORT, BANK, COMPANY, CORP
Examples:
Entry / Alias Permutation: Segment slice
BARAKAAT GLOBETELCOMPANY BARAKAAT GLOBETEL COMPANY
DISTRIEXPORT DISTRI EXPORT
12
FCM Services
User Guide for Business Functions
Examples:
Entry / Alias Permutation: Abbreviation swap
EURO COMPANY EURO CO
DISTRI IMPORT EXPORT DISTRI IMPEX
DISTRIBUTION SHPG DISTRIBUTION SHIPPING
9. Singleton Expand: This feature is a combination of Segment slice (see 7.) and
Abbreviation swap (see 8.) but works with single words only. Default set of values are
CO: COMPANY, EX: EXPORT, HOLD: HOLDING, INC: INCORPORATED; INVE:
INVESTMENT. Conditions refer to entry type, list name, suffixes, miminum sizes for
prefix, word and word count.
Examples:
Entry / Alias Permutation: Singleton expand
SCOTRACO SCOTRA CO, SCOTRA COMPANY
BELMEX BELM EXPORT, BELM EX
10. Alternation Symbol “/”: This feature generates permutations by extracting aliases
having the symbol. “/” in the name and is only applied to non-individual type entries.
Conditions refer to entry type, list name, minimum sizes for word and word count.
Examples:
Entry / Alias Permutation: Alternation name
7TH OF TIR ISFAHAN/ESFAHAN 7TH TIR ISFAHAN, 7TH TIR ESFAHAN
11. Person Initials: This feature splits standard person permutation generation in 2 parts
and is mainly applied to entry type individuals or similar. The system combines the
name and each given name of a person and generates permutations with the initials.
Conditions refer to entry type, minimum sizes for word and word count.
Examples:
Entry / Alias
CAZARES SALAZAR, BLANCA MARIA
12. Person Name: This features splits the standard person permutation generation in 2
parts. It combines the name and each given name of a person and creates
permutations but no new initials other than those present in source lists. Conditions
refer to list name, entry type, minimum sizes for word and word count.
Examples:
Entry / Alias
CAZARES SALAZAR, BLANCA MARIA
13. Standard Person: This features generates permutations for individuals by combining
name and given names of a person including initials. Conditions refer to entry types,
list name and minimum sizes for word and word count.
13
FCM Services
User Guide for Business Functions
Examples:
Entry / Alias
CAZARES SALAZAR, BLANCA MARIA
14. Company marker: This feature generate permutations for companies by removing
some frequent legal suffixes that are not always present in a screened transaction.
Conditions refer to entry types, list name, semicolon separated list of values for
suffixes, prefixes and infixes, minimum sizes for words and word count.
15. Possessive Mark, Remove Dot, Remove Parenthesis, Short Word: These features
normalize list entries and text in transactions for screening in order to make them
“similar” for screening.
Examples:
Entry / alias: Mohammed’s Army
Permutations Possessive Mark: MOHAMMED’S ARMY, MOHAMMEDS ARMY,
MOHAMMED ARMY
Entry / alias: I. B. M.
Permutations Remove Dot: IBM
16. Advanced Configuration: The Pipeline allows to configure a sequence in which the
various permutations are generated. It allows also to perform several rounds with
different so called permutations producers to generate permutations. The pipeline
stores in the generation path which smart variation led to a given result. Below is an
th
example of such a sequence with different rounds with interdict entry 7 OF TIR
INDUSTRIES OF ISFAHAN/ESFAHAN
14
FCM Services
User Guide for Business Functions
7THTIROFINDUSTRIESOFISFAHANESFAHAN glue
15
FCM Services
User Guide for Business Functions
This screening process takes place in the flow of the on boarding process. The customer on
boarding will be influenced by the result of the screening.
Besides checking for sanctioned entities, the Customer screening can check at the same time if the
customer is a Politically Exposed Person (PEP) or any other unwanted/no longer wanted banking
client relationship (e.g. name added in bank’s global list or mandator specific private list). This can
thereafter be flagged in the bank’s customer database.
The feature of CIF Dynamic Fields, as described in 4.3 CIF Dynamic Fields can also be used at
customer onboarding.
16
FCM Services
User Guide for Business Functions
entries (string 2) to be screened against are normalized to handle variations such as letter case,
presence of punctuations, initials, name and given name order, meaningless words (so called noise
words) and consistent handling of characters with diacritical signs. More details regarding data
enrichments, permutations and variations added to interdict entries that support hit detection can be
found in chapter Error! Reference source not found.
The same principle applies in the same manner for non-latin scripts:
“клмф” => “КЛМФ”
17
FCM Services
User Guide for Business Functions
SA DA TRADING SERVICES
This list is based on statistical analysis of interdict entries from public lists, as well as on
statistical analysis of huge sets of real-life transactions. This list cannot be modified.
18
FCM Services
User Guide for Business Functions
Interdict entry “JOHN DOE” will be detected in text to screen: “MR JOHN DOE”
Interdict entry “BAD GUYS COMPANY” will be detected in text to screen: “BAD GUYS”
Interdict entry “ARMY REVOLUTION” will be detected in text to screen: “ARMY OF
REVOLUTION”
Example:
“OMAR” will never match with “UMAR”, “OMIR”, “OMAC”, etc.
“ABDUL” will never match with “ABDEL”, “ABDIL”, etc.
The reason is that allowing approximate pattern matching on short entities always leads to an
unacceptable false positive rate.
For a given entry against a given candidate, the score, representing the syntactic and semantic
proximity, is calculated using several factors:
• Comparison of lengths (text pattern vs candidate)
• Number and nature of faults
• Nature of faults
19
FCM Services
User Guide for Business Functions
All these numbers are combined together with several weights to compute a global score.
Note that the same number and nature of faults in two entries with different length will give totally
different scores: the price for one single fault in a 7 characters string is much higher than in a 20
characters string. Due to rounding, it may happen that a RPM hit will have a 100% score.
20
FCM Services
User Guide for Business Functions
CATALIN CATALINA 95
GRENOBLE GRANOBLES 95
HERMAN HERMANN 95
UMBERTO HUMBERTO 95
21
FCM Services
User Guide for Business Functions
Remarks
The number of reported alerts depends on the threshold. The lower the threshold is, the higher the
number of reported hits is. Hence, it is recommended to use a phased and iterative approach to
determine the right RPM threshold. The function is not linear but more likely an exponential:
22
FCM Services
User Guide for Business Functions
2.4.5.1 Bank detection based on bank alias and bank identifiers like BIC, National Ids, IBAN
Banks can be identified by name, alias and bank identifiers such as BIC, National Ids or IBAN. The
interdict lists can contain financial institutions or banks, but will hardly ever contain all kind of
identifiers to detect an interdict bank in a transaction or financial message. The Knowledge Base
(KB) contains lexicons with Bank names and identifiers which will be used by the screening engine to
perform intelligent bank detections, based on names or identifiers.
An interdict bank can be detected by:
• Its name, as written in the interdict list or as one of the existing synonym (in the KB)
• One of its BIC or SWIFT codes
• One of its National Identifier, when preceded by a valid NATID marker
• One of its CHIPS code, when preceded by a CHIPS marker
• The presence of an IBAN which relates to this bank
CHIPS Markers are words, which must precede a CHIPS code for it to be identified. These markers
are industry standard. The following are valid CHIPS markers:
"CHIPS UID NO" "CHIPS U.I.D. NO" "CHIPS ID. NO."
"UID NO" "U.I.D. NO" "CHIPS UID." "CHIPS U.I.D."
"CH" "CHIPS" "UID" "U.I.D."
23
FCM Services
User Guide for Business Functions
NATID Markers are words, which must precede a NATID code for it to be identified. These markers
are industry standard. The following are valid NATID markers:
"BANKLEITZAHL" "BLZ" "B L Z" "BLZ NO" "HU" "LI" "PL" "BG" "AT" "BL" "PT" "RU" "CHAPS"
"BRANCH SORT CODE" "BANK SORT CODE" "SORT CODE" "SORTCODE" "YOUR SORT
CODE"
"S. CODE" "SCODE" "SORT" "CODE SORT" "NSC" "SORTING" "SORTING CODE" "GG" "GI" "IM"
"JE"
"BSB" "BSB NO" "AU" "HK" "IE" "IL" "NZ" "SC" "ZA" "CC" "REG NO" "DENMARK CODE NO"
"FEDERAL RESERVE ROUTING NUMBER" "FEDERAL RESERVE NO." "FED WIRE ROUTING
NO." "FEDWIRE ROUTING NO." "FEDWIRE" "FED. WIRE." "FED WIRE NO." "FEDWIRE NO."
"ABA ROUTING NO." "ROUTING NO." "ROUTING" "CA"
"FW NO." "ABA" "ABA NO." "ABA CODE" "CHIPS ABA" "ABA NO" "ROUTING ABA NO" "WIRE"
"BANK ROUTING NUMBER" "FW" "FR" "GR" "IN" "IT" "SIC" "SIC NO" "SW" "ES"
"ABI" "BANK" "BANK CODE" "BANKCODE" "BK CODE" "BANK PICASSENT" "BANQUE"
"CODE" "CODE NR" "CODE NO" "CODE NUMBER" "CODIGO" "CB" "C.B." "CBQUE" "C.BANQUE"
"CDE BANQUE" "CODE BANQUE" "BC" "CODE BANK" "COD. BANCA" "BANK NUMBER" "BANK
NO"
"ECO" "ENT" "ENTIDAD" "ENTIDAT" "ENTITAT" "ENTITE" "ENTITY" "ETAB" "CODE ETABL"
"ROUTING" "RTG" "BS" "BANK SORT CODE" "BRANCH CODE" "BRANCH NO" "BR NO" "NSC"
"SC"
"BANQ" "BQUE" "ET" "ETABLISSEMENT" "ETABL" "ETABLIS" "ETABLISS" "CODE BANQ" "CODE
ET"
"CODE ETABLISSEMENT" "CODE ETABLIS" "CODE ETABLISS"
"C. BANQ" "C. BQUE" "C. ET" "C. ETABLISSEMENT" "C. ETABL" "C. ETABLIS" "C. ETABLISS"
"C BANQ" "C BQUE" "C ET" "C ETABLISSEMENT" "C ETABL" "C ETABLIS" "C ETABLISS"
"NO. BANQ" "NO. ET" "NO. ETABLISSEMENT" "NO. ETABL" "NO. ETABLIS" "NO. ETABLISS"
"NO BANQ" "NO ET" "NO ETABLISSEMENT" "NO ETABL" "NO ETABLIS" "NO ETABLISS"
"NUMERO BANQ" "NUMERO ET" "NUMERO ETABLISSEMENT" "NUMERO ETABL" "NUMERO
ETABLIS" "NUMERO ETABLISS"
"NUM. BANQ" "NUM. ET" "NUM. ETABLISSEMENT" "NUM. ETABL" "NUM. ETABLIS" "NUM.
ETABLISS" "NUM BANQ" "NUM ET" "NUM ETABLISSEMENT" "NUM ETABL" "NUM ETABLIS"
"NUM ETABLISS"
"BANK NUM" "INSTITUTE NO" "INSTITUTION NO" "INSTITUTION NUMBER" "BRANCH"
"AG" "AGENCE" "AGENCIA" "AGENCY" "BRANCH" "BRANCH CODE" "BRANCH NO" "BRANCH
NUMBER" "BR NO" "CAB" "CDE" "CODE" "CODIGO" "CDE OFICINA" "CODE OFICINA" "CODICE
AVVIAMENTO BANCARIO"
"CG" "C.GUICHET" "CDE GUICHET" "CODE GUICHET" "FILIALE" "GUICHET"
"OF" "OFF" "OFC" "OFIC" "OFFIC" "OFICE" "OFFICE" "OFICINA" "OFFICINA"
"SUC" "SUCURSAL" "VENT" "GHT" "GUI" "GUICH"
"CODE GHT" "CODE GUI" "CODE GUICH" "CDE GHT" "CDE GUI" "CDE GUICH"
"C. GHT" "C. GUI" "C. GUICH" "C GHT" "C GUI" "C GUICH" "NO. GHT" "NO. GUI" "NO. GUICH"
"NO GHT" "NO GUI" "NO GUICH" "NUMERO GHT" "NUMERO GUI" "NUMERO GUICH"
"NUM. GHT" "NUM. GUI" "NUM. GUICH" "NUM GHT" "NUM GUI" "NUM GUICH"
"TRANSIT" "BANK CODE TRANSIT" "TRANSIT CODE" "TRANSIT NO" "TRANSIT NUMBER"
"BANK TRANSIT NUMBER" "BRANCH TRANSIT"
24
FCM Services
User Guide for Business Functions
Note on IBAN detection: IBANs are detected based on their format and then validated using their
check digit. Once the validation has been successfully performed, the “bank identifier” part of the
IBAN is extracted (according to Swift IBAN structure) and the knowledge base is used to identify the
corresponding bank.
Example Bank Synonym DETECTION:
Interdict Entry: “DEXIA BANK”
Field content: “BELFIUS BANK” will trigger an alert based on synonym bank name.
25
FCM Services
User Guide for Business Functions
2.4.5.3 Country detection based on BIC, via the ISO Country Code in BIC
A BIC or Swift Code has the following structure: AAAACCBBDDD, where “CC” is an ISO Country
Code. When a valid BIC is present in one field, the Iso Country Code part is extracted, derived into a
country name and then can be used to detect an interdict country.
Example:
Interdict Entry: “IRAN”
Field content: “MELIIRTHXXX”
“MELIIRTHXXX” is a valid BIC, hence the ISO Country code is extracted (“IR”), derived into
a country name (IRAN). Then, an alert would be generated against this Country via the BIC.
BANK KARGOSHAEE
BANK MELLI IRAN INVESTMENT COMPANY (BMIIC)
BRUESSELS
BRUSELAS
BRUSSEL
BRUSSELS
BRUXELLES
26
FCM Services
User Guide for Business Functions
DE)
COREE DU NORD
DAVVI-KOREA
DEMIRGAZYK KOREYA
DEMOCRATIC PEOPLE'S REPUBLIC OF KOREA
DEMOKRATISCHE VOLKSREPUBLIK KOREA
SJEVERNA KOREJA
ZIEMELKOREJA
SCHWEDEN
SUECIA
SUEDE
SUEDSKO
SVERIGE
SWEDEN
SWEEDEN
ZWEDEN
Note: there is no guarantee that ALL possible city/country pairs will be present in the KB database.
This database contains city-country associations for the main cities and countries in the world but
does not pretend to be exhaustive. However, Temenos customers using the KB database provide
input with new, renamed or additional city/country pairs that helps to constantly enhance the content
of the database for the benefit of all users.
Example: The CCC 0006 represents the character 上 = shang, i.e. the pinyin translation from
Chinese characters into Latin characters
The mapping table, containing the CCC to Chinese characters mapping is provided with the
screening engine. Note that the provided table only corresponds to one of the possible flavours of
CCC: the CCC are not necessarily the same in all the Chinese regions. However, customers are free
to update this table (plain text file) so that it fits their needs.
27
FCM Services
User Guide for Business Functions
The engine will first scan the field content without translation and then will translate the CCC
according to the list for each group of 4 numerical digits as soon as there are at least 2 contiguous
groups. The engine will then scan a second time the translated field content, where CCC codes have
been replaced by their pinyin translation, according to the provided mapping table. Note that after
CCC replacements, all the defined screening methods are applied on the transformed text.
Example:
The field contains the following text
“PAYMENT FOR 0015 0004 TO BE DONE FOR 0004 0015”
Is converted in:
28
FCM Services
User Guide for Business Functions
It is not a scanning method but it automatically discards certain alerts if they are based just on a little
part of the entire field. As such CRS is used to prevent spurious hits on short search patterns.
The principle is to allow an alert to be reported if and only if the text triggering the alert is big enough
in size when compared to the entire field content. In other words, CRS is designed to ensure that the
detected text is a significant part of the whole text content.
CRS is only applicable in well-known fields, where one can guarantee that the field will only contain
one unique type of information, e.g. names only. Typically, CRS will be used in fields containing
ONLY an individual or company designation and nothing else, for example no additional information
such as an address or any additional free text. Under these conditions, CRS is useful and can safely
be used.
Note that CRS is a special filter which applies to all screening methods defined for a field.
Example:
“BIN” is an alias for an interdict company.
Without CRS, the text “MOHAMMED BIN RABAH” would trigger a hit against “BIN”. With CRS
activated, “BIN” will not trigger a hit, because the selected text “BIN” is too little in size compared to
the entire text provided.
From a technical perspective, the CRS mechanism is implemented as a “CRS score” comparison.
The CRS score is a number between 0 and 100. The score depends on the alert size compared to
the field size and also depends on the morphology of the alert compared to the morphology of the
field content, morphology being approximated by the count of words. The score is compared to a
threshold and the alert is reported if the computed score is bigger than a predefined (not modifiable)
internal threshold.
The choice for CRS value depends on the bank’s risk appetite. It also depends on the data, on how
“clean” and regular the data are.
The CRS default value for CRS_THRESHOLD is 75 (75%). Values between 65 and 75 are suitable.
Note: the lower the RPM_THRESHOLD and the CRS_THRESHOLD the more false hits are
generated.
Examples:
CRS
Interdict entry Text in field Score
ABDELLAH
X ABDELLAH 89
X ABDELLAH X 82
BIN ABDELLAH 73
MOHAMMED ABDELLAH BIN TAYEB 53
JACQUES
BROUGERE
JACQUES BROUGERE DUPONT 79
ABDELRAHMMAN
MOKTAR ABDELRAHMMAN 72
29
FCM Services
User Guide for Business Functions
30
FCM Services
User Guide for Business Functions
Robert Mugabe Flower Street Robert Mugabe Robert Mugabe Hyde Park N
Robert Mugabe Flower Street Robert Mugabe Robert Mugabe Flower Street Y
31
FCM Services
User Guide for Business Functions
opened by another user, the user can force open it, reassigning it to himself, provided the
rules engine allows that operation.
The actions available to the user depend on the set-up of the rules engine, his role, and the
state of the messages. It is possible to limit the actions of a user using any property of a
message (e.g. the customer could limit the high value transactions to a sub-set of users).
• Payload: this area displays the actual content of the message, formatted for readability.
Various formats are supported (SIC, FED, CHIPS, SWIFT, EGAV, EZAG, LSVP, BFA,
BOJNET, SIT, XML, ZENGIN, PACS). Support for other formats is easy to add. The parts
of the message which triggered the alerts are highlighted to allow the user to directly
focus on them.
• Alert navigation: this area displays all the hits detected by the Scanning engine in the
message and allows the user to switch the focus between them.
• Alert evaluation: this area displays the properties of the currently selected alert and
allows the user to make an evaluation of the alert, choose a pre-defined reason code and
add a manual comment. This area also contains the following sub-sections:
Skip proposal: if the user deems it appropriate, he may make a skip proposal which
will be reviewed later in the Watch List Management module by an authorized user.
Evaluation history: provided the user has the proper access rights, he is able to
see the evaluation of the alert made by the previous users (in a multi-level workflow)
Blacklisted entries: this section displays all the details of the blacklisted entries
linked to the alert (entry name, aliases, permutations, addresses, identifiers, …) that
will allow the user to make an informed decision concerning the alert.
• Message evaluation: this area allows the user to make a global evaluation for the
message (as a message could have triggered multiple alerts), choose a pre-defined
reason code and add a manual comment.
• Message Evaluation history: provided the user has the proper access rights, he is able
to see the evaluation of the message made by the previous users (in a multi-level
workflow)
• Evaluation Documents: provided the user has the proper access rights, he is able to
upload/attach external documents to his evaluation. These documents can be viewed by
later reviewers, provided they have the appropriate access rights.
32
FCM Services
User Guide for Business Functions
When the user has finished his evaluations, he can commit his work. The message will then be
released or will be kept for further evaluation according to the specified workflow. If the user has
insufficient information to complete work on the current message, he can reserve the message
("hold for investigation") in order to save his work, thus preventing other users from evaluating
that message.
Standard Flush will evaluate messages to the FLUSH status. They will be saved in statistical
tables and FLUSH notifications will be sent back to the Message Broker.
Flush for Rescan acts as Standard Flush, but it will send RESCAN notifications to the Message
Broker. Messages will be evaluated with RESCAN status and saved in statistical tables as usual.
The Message Broker will then resend the same message again with a new id.
Flush Suspect Messages page lists all message types for which the user is privileged to flush
messages.
The main page is the same for all messages and hit types. It consists of the following areas:
• Messages: this section looks and behaves exactly as the list of messages on the
Message Evaluation page, but the only action allowed is View.
• Flush Categories: this section allows the user to select the type of flush, extra filtering
options and to explain the reason behind the flush.
Flush is an asynchronous process which will start when the user confirms his request. This
process will release all messages complying with the filter defined by the user until there are no
such messages anymore.
Depending on the configuration of the system, a Flush operation can be triggered by one user
with special privileges, or may require an additional approval (4-eyes principle) before being run.
If this configuration is enabled, an extra section is available: Pending Requests where a user
33
FCM Services
User Guide for Business Functions
with the appropriate access rights can review, accept or reject Flush requests issued by other
users.
Once this is done, a request is sent to the scanning engine which will return a simple result: NO
HIT or HIT.
When the result is HIT, a detailed page can be opened, containing all the details of the blacklisted
entries (entry name, aliases, permutations, addresses, identifiers, …) related to the hit, which the
user can then use to assess whether the customer is blacklisted or not.
The tool is for consultation purposes only; nothing is persisted in the database.
34
FCM Services
User Guide for Business Functions
From the user perspective, handling alerts on customers follows the same principles as for
handling alerts on transactions. The user interface is similar and the possible actions are the
same.
The main differences are:
• No Message Overview panel in the main page
• No SKIP Proposal panel in the evaluation page – as this is not necessary here
• No Flush – as the reference data is the Customer database itself
The Watch List Manager user interface is split in the following pages, displayed as tags at the top of the
main page:
• Lists (views available on public or provider supplied lists and private local lists)
• Advanced Search (search for specific interdict entries, aliases, permutations)
• Skips Proposal Review (review and accept or reject skips proposals)
• Import Management (accept or reject records of imported public or provider supplied lists
• Batch Management (view status on import, acceptance and export of batch processes)
Note: More information on possible and allowed user actions in Watch List Manager can be found in the
appendix.
35
FCM Services
User Guide for Business Functions
The Reports application runs on a set of the statistics collected during the FCM Screen operation. The
statistical data include customer or transactions data as well as the different user actions that have been
exercised with the Alert Manager, Watch List Manager, Watch Batch processes, Rules Manager and
Security modules.
The Reports application consist in the following:
The reports can be exported in PDF or CSV format. Where applicable, reports are exportable in CSV
format, for use in other analysis tools, such as Microsoft Excel.
36
FCM Services
User Guide for Business Functions
The statistical reports can be generated as a summary or full report, both reports in PDF or CSV format.
Below are a couple of use cases for the Message Investigation Report:
• Investigate a specific message evaluated as ALLOW (all hits were evaluated as false)
• Investigate a specific message evaluated as CANCEL (at least one hit was evaluated to true)
• Investigate a specific message that was flushed / flushed for rescan
• Investigate a specific customer record from the customer database
37
FCM Services
User Guide for Business Functions
In both cases above, this refers to the way an alert evaluation is confirmed:
• 2 eyes evaluation: one user is completely evaluating the alert (close or follow-up). The
alert is evaluated by a single user .
• 4 eyes evaluation: 2 users evaluate the alert. In this case, the second evaluation is
st
required after the first one and the respective user can have another role than the 1
evaluating user, e.g. an Expert or Compliance role.
Note: The specific evaluation process is defined with the Rules Manager application with a
specific workflow.
2.7.4.1 Manage message alerts in Alert Manager with the 4 eyes principle
This situation occurs when the workflow is designed in such a manner that there are several
consecutive states, so that a first evaluation triggers a transition to a different state (that depends
on the first user decision: ALLOW or CANCEL). The second user has the final decision.
38
FCM Services
User Guide for Business Functions
2.7.4.2 Manage customer information alerts in Alert Manager with 4 eyes principle
In CIF screening, if the workflow is designed with several consecutive states, so that a second
evaluation is necessary, the final result will be given by a second user.
2.7.4.7 Manage modifications/additions in Watch List Manager with 4 eyes eyes principle
By contrast with the above solution, any addition/suppression/modification becomes a proposal
which needs the confirmation of a second user; he/she can accept or reject the proposal.
39
FCM Services
User Guide for Business Functions
40
FCM Services
User Guide for Business Functions
For example, the bank may want to be informed if the sum of all amounts received by a customer on the
last 5 days is bigger than 5000 USD. In order to do this, a profile summing all the incoming daily
transactions for the customers can be created.
41
FCM Services
User Guide for Business Functions
This allows FCM Profile to remember for example that during the last 6 month, a customer made in
average of 300 USD per ATM withdrawal.
3.1.2.3.1 An account
A profile on an account will calculate the 4 values described above for the transactions done on an
account. It can be calculated
• for each account meaning that each account known by FCM Profile will have its own profile
summarizing its activity;
• for a defined single account meaning that the profile will be calculated only for the chosen
account.
3.1.2.3.2 A customer
A profile on a customer will calculate the 4 values described above for the transactions done by a
customer. It can be calculated
• for each customer meaning that each customer known by FCM Profile will have its own profile
summarizing its activity;
• for a defined single customer meaning that the profile will be calculated only for the chosen
customer.
42
FCM Services
User Guide for Business Functions
A profile on a group of customers will calculate the 4 values described above for the transactions done by
all the members of the group. It can be calculated
• for each group of customers meaning that each group of customers defined in FCM Profile will
have its own profile summarizing its activity;
• for a defined single group of customers meaning that the profile will be calculated only for the
chosen group of customers.
43
FCM Services
User Guide for Business Functions
The rules on profiles compare a value calculated on one or more profiles against a reference value or a
value calculated from one or more profiles.
There are three types of profiles: ACCOUNT, CUSTOMER and GROUP. A profile rule will match one of
the types of the profile definition.
The source value is an aggregated value which can calculate: AVERAGE, COUNT, MAX, SUM.
3.1.3.1.2.1 Average
i) Case = Average
The application calculates the average (sum of all transactions divided by the number of transactions).
The interval is calculated as:
Source = Σ (SUMk / COUNTk) / PERIOD, k= 1 to PERIOD
The application calculates the sum of all transactions, and divides it by the number of all transactions. The
interval is calculated as:
Source = (ΣSUMk) / (ΣCOUNTk ) , k= 1 to PERIOD
Example:
You want to be alerted if a specific customer receives an average amount per day bigger than 500
USD on the last 3 days.
You will have to create a daily behaviour for that specific customer that will calculate the average of
all the incoming transactions for each day for all the customer’s accounts.
From here, you can create a rule that will calculate the average of the average of each day or you can
create a rule to calculate the sum of the average of each day.
Let’s suppose we have the following transactions:
• Day 1 – incoming amount 100
• Day 1 – incoming amount 300
• Day 2 – incoming amount 200
• Day 2 – incoming amount 150
• Day 2 – incoming amount 250
• Day 3 – incoming amount 600
• Day 3 – incoming amount 400
44
FCM Services
User Guide for Business Functions
If the rule calculates the average of the averages for each day, then it will calculate
(200 + 200 + 500) / 3 = 300. No alert will be raised
If the rule calculates the sum of the averages for each day, then it will calculate
200 + 200 + 500 = 900. The result is bigger than 500, so an alert will be generated.
3.1.3.1.2.2 Count
i) Case = Average
The application counts the number of all transactions, and divides the result by the number of periods
specified in the Period text box. The interval is calculated as:
Source = (ΣCOUNTk) / PERIOD, k= 1 to PERIOD
ii) Case = Sum
The application counts the number of all transactions. The interval is calculated as:
Source = ΣCOUNTk , k= 1 to PERIOD
Example:
You want to be alerted if a specific customer receives more than 3 transactions on his account on the
last 3 days.
You will have to create a daily behaviour for that specific customer that will calculate the number of all
the incoming transactions for each day for all the customer’s accounts.
From here, you can create a rule that will calculate the average of the number of transactions each
day or you can create a rule to calculate the sum of the number of transactions.
Let’s suppose we have the following transactions:
• Day 1 – incoming amount 100
• Day 2 – incoming amount 200
• Day 2 – incoming amount 150
• Day 2 – incoming amount 250
• Day 3 – incoming amount 600
• Day 3 – incoming amount 400
If the rule calculates the average of the number of transaction, then it will calculate
(1+ 3+ 2) / 3 = 2. No alert will be raised
If the rule calculates the sum of the number of transactions, then it will calculate
45
FCM Services
User Guide for Business Functions
3.1.3.1.2.3 Maximum
i) Case = Average
The application adds the maximum amount of each profile, and divides the result by the number of
periods specified in the Period text box. The interval is calculated as:
Source = (ΣMAXk) / PERIOD, k= 1 to PERIOD
The source is the maximum amount of all profiles specified in the Period text box. The interval is
calculated as:
Source = MAX (MAXk), k= 1 to PERIOD
Example:
You want to be alerted if a specific customer receives a transaction bigger than 2000 USD on the last
3 days.
You will have to create a daily behaviour for that specific customer that will calculate the maximum of
all the incoming transactions for each day for all the customer’s accounts.
From here, you can create a rule that will calculate the average of the maximum amount of
transactions for each day or you can create a rule to calculate the sum of the maximum amounts of
each day.
Let’s suppose we have the following transactions:
• Day 1 – incoming amount 1100
• Day 2 – incoming amount 1000
• Day 2 – incoming amount 1500
• Day 2 – incoming amount 500
• Day 3 – incoming amount 1000
• Day 3 – incoming amount 500
If the rule calculates the average of the maximum of the transaction, then it will calculate
(1100 + 1500 + 1000) / 3 = 1200. No alert will be raised
If the rule calculates the sum of the maximum of the amount of transactions, then it will calculate
46
FCM Services
User Guide for Business Functions
1100 + 1500 + 1000 = 3600. The result is bigger than 2000, so an alert will be generated.
3.1.3.1.2.4 Sum
i) Case = Average
The application adds the sum of each profile, and divides the result by the number of periods specified in
the Period text box. The interval is calculated as:
Source = (ΣSUMk) / PERIOD, k= 1 to PERIOD
The application adds the sum of each profile. The interval is calculated as:
Source = ΣSUMk, k= 1 to PERIOD
Example:
You want to be alerted if a specific customer receives an amount bigger than 2000 USD on the last 3
days.
You will have to create a daily behaviour for that specific customer that will calculate the sum of all
the incoming transactions for each day for all the customer’s accounts.
From here, you can create a rule that will calculate the average of the amounts for each day or you
can create a rule to calculate the sum of all amounts for all 3 days.
Let’s suppose we have the following transactions:
• Day 1 – incoming amount 1000
• Day 2 – incoming amount 1000
• Day 2 – incoming amount 1500
• Day 2 – incoming amount 500
• Day 3 – incoming amount 1000
• Day 3 – incoming amount 1000
If the rule calculates the average of the maximum of the transaction, then it will calculate
(1000 + 3000 + 2000) / 3 = 2000. No alert will be raised
If the rule calculates the sum of all amounts of transactions, then it will calculate
1000 + 3000 + 2000 = 6000. The result is bigger than 2000, so an alert will be generated.
47
FCM Services
User Guide for Business Functions
Example:
• If the cash deposit is higher than 1000 EUR
• If the customer income for the last week is higher than 20.000 EUR
To test if the amount is a round number, the amount of the transaction is divided by the multiple of 10
defined in Rounded selection list. The comparator is not used in this case. In this example the amount
must be divisible to 100.
Possible values are
• 1
48
FCM Services
User Guide for Business Functions
• 10
• 100
• 1000
• 10.000
• 100.000
49
FCM Services
User Guide for Business Functions
On top of this, the application allows to define on which set of customers, groups of customers or
accounts the rule will be applied.
3.1.4.1 Customer
A rule on profile can apply to every customer having a risk rate higher or equals than a defined value.
Example:
“This rule applies only to medium and high risk customers”
This risk factor can be applied on top of the preview scopes defined.
Examples:
“This rule applies to all customers with medium and high risk”
“This rule applies to all employees with medium and high risk”
50
FCM Services
User Guide for Business Functions
3.1.4.2 Account
51
FCM Services
User Guide for Business Functions
A rule on transaction can apply only on the transactions done on specific account identified by its account
ID.
Example:
“This rule applies only on the cash deposit transactions done on the account 112233”
A rule on transaction can apply only on the transactions coming from or going to countries with a risk level
higher or equals than a defined value. The transaction country will be picked up from the transaction
external party country containing the Iso Country Code of the external party.
Example:
“This rule applies only on the wired out to countries with a medium or higher risk”
“This rule applies only on the wired in coming from foreign countries”
52
FCM Services
User Guide for Business Functions
To prevent this, FCM Profile provides the threshold mechanism allowing defining a minimum value for the
rule to apply. For such scenario, the threshold could be for example set to 750 EUR.
• If a customer does a cash deposit of at least 750 EUR and twice higher than the maximum cash
deposit of the last 2 months
Example :
• Rule : If a customer does more than 5000 EUR outcome during the last 7 days
nd
• Context: Let’s say it’s Friday 2 of May 2014
o Don’t ignore bank holidays : then the customer outcome from Saturday 26th of April to
nd
Friday 2 of May will considered
o Ignore bank holidays : then the customer outcome for the following days will be
considered
nd
1 - Friday 2 of May
53
FCM Services
User Guide for Business Functions
st
Thursday 1 of May (If defined as such in the calendar)
th th
2 4 – from Monday 28 April to Wednesday 30 April
th
Saturday 26th April and Sunday 27 April
rd th h
5->7 – from Wednesday 23 April to Friday 25 April
Note: the scope limitation based on attributes applies only for customers and accounts.
54
FCM Services
User Guide for Business Functions
Examples:
• Have an alert if a flower reseller sells less the 14th of Feb as the system sees that other flower
resellers obviously sell more.
• Having an alert on employees that get more incoming cash transactions that the other
employees.
• Not having an alert when an employee gets paid his end of year bonus, where everyone else also
has
55
FCM Services
User Guide for Business Functions
Operational efficiency may require to filter and order the messages list for resource allocation. In the View
Preferences a user can organize own workload in order to meet operational needs and priorities but also
to support personal efficiency and performance. Following fields are available in the Simple Filter:
• The Entity Name – the name for the entity who generated the alert
• The Entity Type – the type of the entity for which the alert was generated: CUSTOMER,
ACCOUNT, GROUP, EXTERNAL
• The Entity Code – the customer id
• The Alert Code – a code for alert type, defined by the bank
• The Score – the severity of the alert
• The period : From Date / To Date
• Branch – the bank branch were the alert was generated
Using the Advanced Filter allows for more complex filter rules with the use of operators and values and by
linking rules.
The Messages List can be also ordered by the selected fields in ascending or descending order, or can
be customized by selecting the fields to be displayeThe Columns filter is used to define the information to
be displayed and its order.The arrows indicate the sequence of the columns from the left to the right, i.e.
moving up means to the left, moving down means to the right.
The Messages List section shows the list of transactions which generated the alerts.Note: The alert type
"OPERATION"is an alert on transaction, whereas "PROFILE"refers to behaviour (profile).
An alert can be viewed or opened. Viewing an alert means that all the information is only read, and
cannot be modified. If the alert is opened, then it can be followed up or closed. .
56
FCM Services
User Guide for Business Functions
In certain cases, it may be necessary to force open an alert. Only a user with the appropriate
authorization can force open it, and the original user is not able to complete the evaluation. An error
message is displayed to the original user, issuing a warning when he tries to commit.
57
FCM Services
User Guide for Business Functions
If the alert is considered false, then the user selects a "reason code" and clicks on “Evaluation Complete”,
and the alert will be out of the list.
In case 2 users need to evaluate the alert (it’s working on the 4 eyes principle. See chapter 3.3Case
management : 2 eyes or 4 eyes principle), the first user should hold the alert for more investigation, in
order to let the second one also evaluate the alert.
58
FCM Services
User Guide for Business Functions
If the user clicks on “Close” then the alert remains in initial state and can be evaluated by another user
and the user is back on the Messages List.
When evaluating alerts, users can attach related documents to justify an action. Attachments remain in
the DB when the message goes to output, and can be linked to the statistics tables. Another user can
view the attachments, as long as he/she can view the state of message evaluation history the
attachments are linked to.
Once a user started with aler evaluation, he/she can decide whether an alert can be set as completed,
closed without saving or it must be hold for investigation.
59
FCM Services
User Guide for Business Functions
If the alert is considered false, the user set it as completed and the alert will be out of the list. In case of a
second user need to evaluate the alert, the first user should hold the alert for investigation in order to let
the second one also to evaluate the alert.
Here can also be attached documents, the same as described in the previous subchapter.
4 eyes principle means 2 users are needed for the process. In this case, the second evaluation is
required regardless of the final decision of the first one. A choice can be made in configuration whether to
use one or the other principle.
After the first evaluation the alert goes to another stage (configurable) and it needs to be reviewed by
another evaluator than the one who did the first evaluation. Once the second evaluation is done, the alert
60
FCM Services
User Guide for Business Functions
exits the Profiling Evaluation to go to Statistics. The 2nd evaluator has access to the first evaluation
details.
It is important to mention that the 2 users are different and they must be logged into the application
separately. While the user evaluates an alert, this is no longer accessible by the others. Also, after the
first user evaluates an alert, he will no longer see it in the list. If he decides that Evaluation is completed,
no other user can see it anymore, but if he decides it should be followed up, only the other users are able
to see it and evaluate it.
To define the fields’ format a mapping file is used to specify field length, position in the file or, if it’s the
case, the delimiter used.
Note: Import of Customer data, also known as FCM CIF Loader, as a batch process is also used in FCM
Screen for CIF Screening and in FCM KC+ for customer risk rating.
61
FCM Services
User Guide for Business Functions
The customers can be grouped in a group of customers, where specific customers are added by name or
by id, or in a segment conform to the customers file.
3.4.1.2 Data used for information: Given name, Address (Address line 1, Address line 2,
City, zipcode, State, country), Social security number, Social security country,
Passport number, Birth date, Birth country, Birth city, Fiscal country, Country of
nationality, Entity type (Individual, company, bank,…)
State String 64 No
ZipCode String 32 No
Country String 2 No
FiscalCountry String 2 No
62
FCM Services
User Guide for Business Functions
BirthDate Date No
BirthCountry String 2 No
PassportNumber String 32 No
NatCountry String 2 No
SocialSecurityNumber String 32 No
SsnCountry String 2 No
Segment String 32 No
The Entity type can have one of the values (the left side represents source file entity type and right side
the corresponding VWatch value)
0=BANK
1=COMPANY
2=GOVERNMENT/COUNTRY
3=INDIVIDUAL
4=MINISTER/GOVERNMENT OFFICIAL
5=OTHER
6=POLITICAL/RELIGIOUS ORGANIZATION
7=PRINCIPAL CITY
8=VESSEL
More information about the detailed functions can be found in 4.3 CIF Dynamic Fields.
63
FCM Services
User Guide for Business Functions
3.4.1.6.1 The correlation with the fields from T24 R11 version
The values extracted from T24 from CUSTOMER table are as follows:
3.4.1.6.2 The correlation with the fields from T24 R12 version or higher
The values extracted from T24 from CUSTOMER table are as follows:
CUST_ID ACCOUNT.NUMBER>ACCOUNT>CUSTOMER
NAME Short.Name
64
FCM Services
User Guide for Business Functions
FIRST_NAME Name.1
TITLE Title
ADDRESS1 Street
ADDRESS2 Address
CITY Town.Country
STATE Country
ZIPCODE Post.Code
COUNTRY Residence
FISCAL_COUNTRY Residence
ENTITY_TYPE
TELNO_FIX
TELNO_MOB Phone.1
BIRTH_DATE Date.of.birth
BIRTH_CITY
BIRTH_COUNTRY Country
PASSPORT_NR
NAT_COUNTRY Nationlaity
NAT_ID
SSN_ID
SSN_COUNTRY
OCCUPATION Occupation
PEP
CAREOF Mail.Domicile
RISK_LEVEL
SEGMENT_ID Sector
ONBOARDING_DATE
MANAGER ACCOUNT.NUMBER>ACCOUNT>ACCOUNT.OFFICER
BRANCH Account.Number>Account>Co.Code>Company>Sub.Division.Code
COMPANY
65
FCM Services
User Guide for Business Functions
To define the fields’ format, a mapping file is used to specify field length, position in the file, or the
delimiter used if it’s the case.
3.4.2.2 Data used for information: Account name, Account currency, Opening date,
Closure date, Last operation date, Balance
The information needed for an account is:
• Account name - The name of the account
• Account currency - Currency of the account
• Opening date is the date when the account was created
• Closure date is the date when the account was closed
• Last operation date is the date when the last operation was executed on that account
• Balance is the current amount of the account
• Category code is the code of the application that is exporting the accounts
OpeningDate Date No
ClosureDate Date No
LastOperationDate Date No
WorkingBalance Numeric 18 No
CategoryCode String 50 No
AccountCurrency String 3 No
The date fields may specify their own format, e.g. dd-MM-yyyy:
<delimitedField name="openingDate" index="81" type="date" format="dd-MM-
yyyy"/>
66
FCM Services
User Guide for Business Functions
If no format is specified, the default one is used yyyyMMdd (this is stored into database as a preference
and can be changed if needed):
<delimitedField name="openingDate" index="81" type="date"/> (no format at all)
is the same with:
<delimitedField name="openingDate" index="81" type="date" format="yyyyMMdd"/>
Also the double fields may specify their own format, e.g. #.##:
<delimitedField name="amount" index="23" type="double" format="#.##"/>
If no format is specified, the default number of decimals is used: 3 (this is stored into database as a
preference and can be changed if needed), which is equivalent to #.### format:
<delimitedField name="amount" index="23" type="double"/>
Is the same with:
<delimitedField name="amount" index="23" type="double" format="#.###"/>
For each source field you can have type and format, only one of them or even none. Depending on the
destination field which refers the source, the implicit format can be yyyyMMdd for date, or #.### for duble.
3.4.2.5.1 The correlation with the fields from T24 R11 version
67
FCM Services
User Guide for Business Functions
3.4.2.5.2 The correlation with the fields from T24 R12 version or higher
The values extracted from T24 from ACCOUNT table are as follows:
FCM Profile fields T24 R12 fields
COMPANY Co.code
ACCOUNT_CODE Account.Number
ACCOUNT_NAME Account.Title.1
MANAGER Account.Officer>Dept.Acct.Officer>Name
OPEN_DATE Opening.Date
CLOSE_DATE Closure.Date
LASTOP_DATE Date.Last.Update
BALANCE Working.Balance
PRODUCT_CODE
CURRENCY Currency
The payments system is responsible of giving this information to the FCM Profiling system, which imports
the file of transactions received. This file should contain all the necessary data in the profiling application.
The file can be:
• Delimited – the fields are delimited by a delimiter character, like , ~ ‘
1~1.67832E+14~FT~ BANK NAME~~1003~OFFICE NAME~213~20130704~EUR~~-10.15~1.1E+11~~CUSTOMER NAME~101010~Leto II Atreides
To define the fields’ format, a mapping file is used to specify field length, position in the file, or the
delimiter used if it’s the case.
The transactions are checked against the operation rules in order to find out if any of them should raise
an alert. The rules are defined by the bank.
3.4.3.1 Data used for processing: Transaction ID, amount converted in the reference
currency, operation code, customer ID, account ID, external party ID, External
party ISO Country Code
A transaction is uniquely identified in a bank by the transaction ID. The transaction amount is the amount
sent/ received by the customer.
The transaction can be made using a different currency than the account currency, and in this case the
transaction will have a value specifying the amount in the currency used when the transaction was made,
and another value for the amount converted in the reference account currency.
A transaction is described by an operation code (also the name “transaction code” is used) that is
specifying the type of the operation: WIRED IN, WIRED OUT, CASH IN, CASH OUT, etc.
68
FCM Services
User Guide for Business Functions
A transaction is made for a customer that is specified by a customer ID and in the account specified by
the account ID.
The external party is a customer from another bank that is sending/ receiving money to/from a customer
of the bank that registered this operation. This external party is uniquely identified by the external party
ID, and his country is specified by the external party ISO country code.
3.4.3.2 Data used for information: Currency, amount, operation date, customer name,
customer segment, External party name, External party account ID, external
party address (Address line 1, Address line 2, country), External party BIC
The file can also contain the data used to describe the transaction, as follows:
• Currency used for the transaction
• The amount of money transferred in the current transaction on the specified currency
• Operation date –the date when the transaction was made
• Customer name – the name of the customer
• Customer segment – the segment to which the customer belongs to
Some other fields that can be filled in for an external party are the following:
• External party name – the name
• External party account id – the identifier of the external party’s account
• External address: address line 1, address line2, country
• External BIC – the code of the third party bank that is implied in the transaction
Currency String 3 No
“xxxxxxyyy” representing a
AmountCurrency Numeric 18 floating point value as No
“xxxxxx.yyy”
“xxxxxxyyy” representing a
AmountRefCurrency Numeric 18 floating point value as Yes
“xxxxxx.yyy”
ApplicationId String 32 No
ExternalPartyId String 32 No
69
FCM Services
User Guide for Business Functions
ExternalPartyName String 50 No
ExternalPartyAddress String 50 No
ExternalPartyCountry String 2 No
The date fields may specify their own format, e.g. dd-MM-yyyy:
<delimitedField name="openingDate" index="81" type="date" format="dd-MM-
yyyy"/>
If no format is specified, the default one is used yyyyMMdd (this is stored into database as a preference
and can be changed if needed):
<delimitedField name="openingDate" index="81" type="date"/> (no format at all)
is the same with:
<delimitedField name="openingDate" index="81" type="date" format="yyyyMMdd"/>
Also the double fields may specify their own format, e.g. #.##:
<delimitedField name="amount" index="23" type="double" format="#.##"/>
If no format is specified, the default number of decimals is used: 3 (this is stored into database as a
preference and can be changed if needed), which is equivalent to #.### format:
<delimitedField name="amount" index="23" type="double"/>
Is the same with:
<delimitedField name="amount" index="23" type="double" format="#.###"/>
For each source field you can have type and format, only one of them or even none. Depending on the
destination field which refers the source, the implicit format can be yyyyMMdd for date, or #.### for duble.
70
FCM Services
User Guide for Business Functions
3.4.3.5.1 The correlation with the fields from T24 R11 version
The values extracted from T24 from STMT table are as follows:
COMPANY
BRANCH Account.Number>Account>Co.Code>Company>Sub.Division.Code
OPERATION_CORE_ID Get.Trans.Ref.Num
PRODUCT_ID System.ID
OPERATION_CODE Transaction.Code
OPERATION_DATE Value.Date
CURRENCY Currency
CURRENCY_AMOUNT Get.Txn.Amt.Ccy
AMOUNT Get.Lccy.Amt
MANAGER
ACCOUNT_ID Account.Number
CUST_ID Account.Number>Account>Customer
EXTERNAL_ID Get.Third.Party.Dets
EXTERNAL_NAME
EXTERNAL_BIC
EXTERNAL_ADDRESS1
EXTERNAL_ADDRESS2
EXTERNAL_COUNTRY
3.4.3.5.2 The correlation with the fields from T24 R12 version or higher
The values extracted from T24 from STMT table are as follows:
FCM Profile fields T24 R12 fields
COMPANY ACCOUNT.NUMBER>ACCOUNT>CO.CODE
BRANCH ACCOUNT.NUMBER>ACCOUNT>CO.CODE>COMPANY>SUB.DI
VISION.CODE
OPERATION_CORE_ID STMT.NO
PRODUCT_ID SYSTEM.ID
OPERATION_CODE TRANSACTION.CODE
OPERATION_DATE VALUE.DATE
71
FCM Services
User Guide for Business Functions
CURRENCY CURRENCY
CURRENCY_AMOUNT AMOUNT.FCY
AMOUNT AMOUNT.LCY
MANAGER Account.number>Account>Account.Officer>Dept.Acct.Officer>Nam
e
ACCOUNT_ID
CUST_ID
EXTERNAL_ID
EXTERNAL_NAME ORD.CUST.ACCT>ACCOUNT>CUSTOMER>CUSTOMER>SHOR
T.NAME
EXTERNAL_BIC
EXTERNAL_ADDRESS1 ORD.CUST.ACCT>ACCOUNT>CUSTOMER>CUSTOMER>STRE
ET
EXTERNAL_ADDRESS2 ORD.CUST.ACCT>ACCOUNT>CUSTOMER>CUSTOMER>ADDR
ESS
EXTERNAL_COUNTRY ORD.CUST.ACCT>ACCOUNT>CUSTOMER>CUSTOMER>COUN
TRY
72
FCM Services
User Guide for Business Functions
KC+ can be used standalone (independently from any of the other FCM Suite modules) or in combination
with the other modules. In particular, when the application is installed with the FCM Profile module, the
risk score calculated for each customer can be used, as part of the monitoring rules.
For its operation, the KC+ application needs the following FCM Suite modules:
- FCM Suite Database
- FCM Suite Rules Manager
- FCM Suite Security
- FCM CIF Loader
4.1.1 Calculator
The calculation procedure loops through all the functions of the active risk matrix and checks if the
function matches to the type of the customer.
For each function that applies to the customer, the procedure loops through its definitions and checks
whether the definition is satisfied. If a definition is indeed satisfied then it would add the weight of the
definition to the total weight of the calculation.
In order to determine if a definition is satisfied, the appropriate value for the attribute is extracted and
compared to the value of the definition. Depending on the comparison operator, the definition is satisfied if
they match or not.
The total weight calculated for each function is factored using the weight of each function (called the
function’s factored weight).
The factored weights of all the functions that apply are then added together to calculate the risk level for
the customer.
73
FCM Services
User Guide for Business Functions
Note: Management of attributes and associated values is provided in the KC+ Base Data Management
area.
4.2.1 Customer
4.2.1.3 Country
It is possible to add a value, operator and weight that will be compared with the Customer’s country.
Example: if Customer. Country = Cuba then add 10
74
FCM Services
User Guide for Business Functions
4.2.1.10 Occupation
It is possible to add a value, operator and weight that will be compared with the customer’s occupation.
Example: if Customer.Occupation = Lawyer then add 15
4.2.1.12 Pep
It is possible to add a value, operator and weight that will be compared based on the customer’s PEP
status.
Example: if Customer.isPep = yes then add 30
75
FCM Services
User Guide for Business Functions
4.2.1.14 Sector
It is possible to add a value, operator and weight that will be compared with the customer’s occupation.
Example: if Customer.Sector = Farming then add 20
4.2.1.16 Segment
It is possible to add a value, operator and weight that will be compared with the customer’s segment
(using the Customer.BankId1 field).
Example: if Customer.BankId1 = Individual then add 2
76
FCM Services
User Guide for Business Functions
4.2.2 Checks
It is possible to use the status of a check when calculating the risk level for a customer.
The options are:
• Check.NotOk
• Check.Outstanding
• Check.Investigating
• Check.Ok
Examples:
If “Identification Verification” equals “Outstanding” then add 10
If “Information Discrepancy” equals “NotOk” then add 100
4.2.3 Assessments
4.2.3.1 Selection
It is possible to add a weight for any assessment selection.
Example: Assessment.Selection = “Account Type.Credit Card” add 10
4.2.4 Account
4.2.4.1 ProductCode
It is possible to add a weight for a product code.
Example: Account.ProductCode = ABCD add 5
4.2.4.2 AccountName
It is possible to add a weight for a product code.
Example: Account.AccountName = Loan add 5
Example 2:
Name: Compliance Checks
77
FCM Services
User Guide for Business Functions
Type: Individuals
Weight: 50
Definitions:
1. If “Identification Verification” equals “Outstanding” then add 10
2. If “Information Discrepancy” equals “NotOk” then add 100
In the above two examples, example 1’s first definition has a weight of 10 and example 2’s first definition
has a weight of 10. However the fact that the two functions have different overall weights (25 and 50)
implies that the end value that contribute to the overall risk level are different.
4.3 CIF Dynamic Fields: ability to add new fields on the fly
Any attribute of a customer can be used to assign a risk against or to define a Profiling rule. These
attributes are directly linked to the CIF_RECORD. The CIF_RECORD fields are a very small subset of
fields that exist in a core banking system (i.e. T24).
The feature of CIF Dynamic Fields allows the bank to be able to assign risk against ANY field available in
the core banking system. These additional fields’ values can be used in future for the Link Analysis in
Profiling.
The main functions of this feature are:
• The bank defines and configures what fields should be persisted for a customer
• There isn’t any restriction to the amount of fields that can be persisted for a customer.
• It allows to save additional field values during all stages of a customer lifecycle.
• It allows to import multiple values for a field.
• It allows to keep the history (insert, update, delete) of any dynamic CIF field.
• It allows to configure options of a dynamic field, e.g. to assign weights against certain values for a
customer’s field.
• It allows to assign weights for certain values for a dynamic field
78
FCM Services
User Guide for Business Functions
5. FCM Security
5.1 Authentication
5.1.1 Build-in authentication module
The FCM suite has a build in authentication module.
This module has the following characteristics
• User name and password are stored in the database
• The password is encrypted
• The user can change the password via a dedicated interface
An instance of FCM Screen can be implemented to run on behalf of multiple “business units”, be them
companies, subsidiaries or branch offices. Business Units are identified by a “mandator” code.
Technically, “mandator” is an identifier. A special one is ALL, which covers all business units managed by
the FCM Screen instance. In other words, ALL applies to the scope of the whole business.
The mandator concept allow for sharing all common resources and common data by all business units,
while segregating mandator specific data in separate “data silos” or even allowing specific processes.
The mandator concept is used in all FCM Screen applications mostly as a filter, enabling authorised users
access to mandator specific actions or data, specific rules, specific amount of information displayed, etc..
In Watch List Manager (WLM), the interdict entries imported from official providers (as public lists), are
associated with the ALL mandator. The entries of private global and private local lists are the bank’s
responsibility; private local lists are associated with different mandators.
At new entries import/acceptance, WLM generates permutations and variations (depending on some
specific settings). Another WLM feature is the possibility to define/add new aliases (perhaps with a limited
scope, i.e. for a specific mandator). For the mentioned sub-components (permutations, variations,
aliases), WLM also offers the possibility to deactivate the selected element for a particular mandator.
The same flexibility is available also for the SKIPs:
- a skip can be defined/added for the mandator ALL;
- one can define/add a new skip for a particular mandator only;
- the skip’s mandator can be modified.
The mandator concept is taken into account in the Rule Manager: rules may be mandator dependent.
79
FCM Services
User Guide for Business Functions
The Reports application uses the mandator as a main criterion in filtering the source information used to
generate the report(s).
KC+ operates with context mandator, which enables the user to focus on a specific business division.
The Web Inquiry Tool limits the investigations to a particular mandator.
The Security application enables the bank to manage the access rights to various FCM Screen
applications and one of the key elements managed is the mandators (see below).
In order to manage the controlled access to various modules and/or features of FCM Screen, the users
are given sets of privileges and access rights. The basic concepts are:
• Role a capability to access a feature; examples:
o COMPLIANCE allow the access to Alert Manager and give the primary
evaluation
o REVIEW allow the access to Alert Manager and give the final
evaluation
o SECURITY_ADMIN allow the access to Security module
• Mandator a “business scope”, a means to logically divide the business (in
branches, companies, regions, groups of countries …); examples:
o ALL all business flow
o 001 a (local) division of business
o GB business flow to/from Great Britain
• Profile a collection of (role, mandator) tuples; examples:
o Superuser
o Reviewer
o Reports
• User an authentication identity belonging to one and only one profile;
examples:
o Fict_001
o Fict_002
The Security module is the FCM Screen application which offers the means to manage the Users,
Profiles, Roles and Mandators. The Rule Manager uses the mentioned elements to create and modify
rules that govern the access to various FCM Screen modules.
A rule is a logical expression operating with roles and various elements of the entity to control.
Rules are organized in rule bases associated with each application. The Rule Manager is the
specialized application which allows creating, modifying, exporting and importing the rule bases.
Depending of the application structure, in a rule base there are interface rules, action rules and transition
rules.
In workflow management is possible to define/eliminate states (referred in transition rules).
80
FCM Services
User Guide for Business Functions
The rules allow a fine tuning of accesses permitted to different user categories to FCM Screen application
modules. The rules makes intensive use of roles; as users are associated with profiles, which pair roles
with mandators, an effective access control is obtained.
The 4-eyes paradigm ensures that a change is approved/rejected by a second user which appropriate
privileges.
81
FCM Services
User Guide for Business Functions
6.2 Filter
6.2.1 Simple filter
The user can apply filters on a single table.
6.4 Dashboards
The dashboards functionality allows to have on a single page different view based on filter and count
statistics.
82
FCM Services
User Guide for Business Functions
83
FCM Services
User Guide for Business Functions
7. System administration
The FCM suite offers and build in module to manage different aspect of the configuration.
84
FCM Services
User Guide for Business Functions
85
FCM Services
User Guide for Business Functions
9.1 R201604
• Profile: Scoping, Include/exclude entities and select pre-defined filters
• Profile: Peer Groups: Detect deviating behaviour of customers
• New module: the Reporting Framework
• Screen integration -> Transaction Screening: the input message can be mapped via XSLT
9.2 R201607
• Reporting framework: Dashboards
• Reporting framework: Exportable reports on risk
• Reporting framework: Report Scheduler
• FCM Screen -> Data providers supported lists: Support of WorldCompliance
9.3 R201610
• New look and feel
• Screen: Screening for dynamic CIF fields
• Screen: additional info returned in the immediate Screen response.
• Profile: handling of reverse transactions
• Reporting framework: Email notification
86