suspicious activity investigation lifecycle
best practices in identifying and managing suspicious activity
download the infographic
An alert has occurred but how do you know if it’s a legitimate problem? Knowing when to trip the alarm and investigate can be a daunting task for any organisation with an AML programme in place.
Understanding each step and utilising opportunities for technology and automation, as well as understanding signs of suspicious activity can help your business protect itself.
What are the best practices in identifying and managing suspicious activity? Take a look at best practice, common mistakes and how to avoid them, and see how technology can help you to triage, investigate, action and review.
Fill out the form to download the infographic and learn more.
This illustration, developed by OCEG in collaboration with Refinitiv and Encompass, is part of the ‘AML illustrated’ series.