suspicious activity investigation lifecycle

best practices in identifying and managing suspicious activity

download the infographic

An alert has occurred but how do you know if it’s a legitimate problem? Knowing when to trip the alarm and investigate can be a daunting task for any organisation with an AML programme in place.

Understanding each step and utilising opportunities for technology and automation, as well as understanding signs of suspicious activity can help your business protect itself.

What are the best practices in identifying and managing suspicious activity? Take a look at best practice, common mistakes and how to avoid them, and see how technology can help you to triage, investigate, action and review.

Fill out the form to download the infographic and learn more.

This illustration, developed by OCEG in collaboration with Refinitiv and Encompass, is part of the ‘AML illustrated’ series.

Click here to view all Encompass infographics.

related content

building an effective AML programme

effective business risk assessment

effective customer risk assessment