NYDFS Final Rule Part 504 - TMS & AML Program Testing PDF
NYDFS Final Rule Part 504 - TMS & AML Program Testing PDF
Page 1
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
Conversely, many of the prescribed requirements noted were debated by Regulated Institutions
and supported by the American Bankers Association's rebuttal letter of March 31, 2016 that
strongly opposed implementation of the proposed Rule in its then current format. Although some
public comments were considered, analysis reveals very little difference between the ANPRM and
Final Rule which was formally adopted into law on June 30, 2016 and will be effective January 1,
2017.vi
The Part 504 Final Rule requires covered institutions to establish transaction monitoring and
filtering programs designed to address shortcomings in their AML programs. Additionally, on an
annual basis beginning April 15, 2018, either the Board of Directors as a governing body or a senior
officer personally must certify vii that the AML program is compliant and that the governing body
or individual certifying has undertaken the necessary steps to make such certification.
The Rule outlines the necessary steps that must be undertaken to address the prescriptive
Transaction Monitoring and Filtering Program requirements including documentation of remedial
efforts and an annual board resolution or senior officer compliance finding. The specific
requirements put into law under Part 504 are listed below.
§504.3 Transaction Monitoring and Filtering Program Requirementsviii
Transaction Monitoring Program
§504.3(a) Each Regulated Institution shall maintain a transaction monitoring program
reasonably designed for the purpose of monitoring transactions after their execution for
potential BSA/AML violations and Suspicious Activity Reporting, which system may be
manual or automated, and which shall include the following attributes, to the extent they
are applicable:
1. Be based on the risk assessment of the institution;
2. Be reviewed and periodically updated at risk‐based intervals to take into account and
reflect changes to applicable BSA/AML laws, regulations and regulatory warnings, as
well as any other information determined by the institution to be relevant from the
institution's related programs and initiatives
3. Appropriately match BSA/AML risks to the institution's businesses, products, services,
and customers/counterparties;
4. BSA/AML detection scenarios with threshold values and amounts designed to detect
potential money laundering or other suspicious or illegal activities;
5. End‐to‐end, pre‐and post‐implementation testing of the transaction monitoring
program, including, as relevant, a review of governance, data mapping, transaction
coding, detection scenario logic, model validation, data input and Program output;
6. Documentation that articulates the institution's current detection scenarios and the
underlying assumptions, parameters, and thresholds;
7. Protocols setting forth how alerts generated by the transaction monitoring program
will be investigated, the process for deciding which alerts will result in a filing or other
Page 2
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
action, the operating areas and individuals responsible for making such a decision, and
how the investigative and decision‐making process will be documented; and
8. Be subject to an on‐going analysis to assess the continued relevancy of the detection
scenarios, the underlying rules, threshold values, parameters, and assumptions.
Filtering Program
§504.3(b) Each regulated institution shall maintain a filtering program, which may be
manual or automated, reasonably designed for the purpose of interdicting transactions
that are prohibited by OFAC, and which shall include the following attributes, to the extent
applicable:
1. Be based on the risk assessment of the institution;
2. Be based on technology, processes or tools for matching names and accounts, in each
case based on the institution's particular risks, transaction and product profiles;
3. End‐to‐end, pre‐ and post‐implementation testing of the filtering program, including,
as relevant, a review of data matching, an evaluation of whether the OFAC sanctions
list and threshold settings map to the risks of the institution, the logic of matching
technology or tools, model validation, and data input and Program output;
4. Be subject to on‐going analysis to assess the logic and performance of the technology
or tools for matching names and accounts, as well as the OFAC sanctions list and the
threshold settings to see if they continue to map to the risks of the institution; and
5. Documentation that articulates the intent and design of the filtering program tools,
processes or technology.
Both the Transaction Monitoring and Filtering Programs
§504.3(c) each transaction monitoring and filtering program shall require the following, to
the extent applicable:
1. Identification of all data sources that contain relevant data;
2. Validation of the integrity, accuracy and quality of data to ensure that accurate and
complete data flows through the transaction monitoring and filtering program;
3. Data extraction and loading processes to ensure a complete and accurate transfer of
data from its source to automated monitoring and filtering systems, if automated
systems are used;
4. Governance and management oversight, including policies and procedures governing
changes to the transaction monitoring and filtering program to ensure that changes
are defined, managed, controlled, reported, and audited;
5. Vendor selection process if a third-party vendor is used to acquire, install, implement,
or test the transaction monitoring and filtering program or any aspect of it;
6. Funding to design, implement and maintain a transaction monitoring and filtering
program that complies with the requirements of this part;
Page 3
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
7. Qualified personnel or outside consultant responsible for the design, planning,
implementation, operation, testing, validation, and on‐going analysis, of the
transaction monitoring and filtering program, including automated systems if
applicable, as well as case management, review and decision making with respect to
generated alerts and potential filings; and
8. Periodic training of all stakeholders with respect to the transaction monitoring and
filtering program.
Documentation of Remedial Efforts
§504.3(d) To the extent a regulated institution has identified areas, systems, or processes
that require material improvement, updating or redesign, the regulated institution shall
document the identification and the remedial efforts planned and underway to address
such areas, systems or processes. Such documentation must be available for inspection by
the Superintendent.
§504.4 Annual Board Resolution or Senior Officer(s) Compliance Finding
§504.4 To ensure compliance with the requirements of this Part, each Regulated
Institution shall adopt and submit to the Superintendent a Board Resolution or Senior
Officer(s) Compliance Finding in the form set forth in Attachment A by April 15th of each
year. Each regulated institution shall maintain for examination by the Department all
records, schedules and data supporting adoption of the Board Resolution or Senior
Officer(s) Compliance Finding for a period of five years.ix
This paper assesses each of the requirements under the Rule including examples of program risks,
mitigating controls and testing measures that may be used to audit compliance with the Rule.
Testing is the cornerstone of auditing the effectiveness of controls of the BSA/AML program.
Controls are the system of internal controls (including policies, procedures, and systems) used to
mitigate BSA/AML risks. To ensure that the BSA/AML controls are effective the following types of
tests should be performed:x
1. reperformance using a "new transaction to see which controls are used by the client
and the effectiveness of those controls;"
2. observation of "a business process in action, and in particular the control elements of
the process;" and
3. inspection of "business documents for approval signatures," initials, signoffs or stamps
confirming that a particular control has been performed.
Page 4
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
TRANSACTION MONITORING PROGRAM (§504.3(a))
BSA/AML RISK ASSESSMENTS (§504.3(a) (1-3))
The Federal Financial Institutions Examination Council ("FFIEC") BSA/AML Examination Manual
does not state that an institution is required to have a BSA/AML risk assessment. In fact, it states
that "for the purposes of the examination, whenever the bank has not completed a risk
assessment, or the risk assessment is inadequate, the examiner must complete a risk assessment
based on available information."xi This ambiguity is clarified under the new Rule which requires
linkage between the BSA/AML risk assessment and the Transaction Monitoring program.xii For
example, the statement that the Transaction Monitoring program needs to "be based on a Risk
Assessment" prescribes there actually be a BSA/AML risk assessment from which to use in
identifying what detection scenarios best mitigate the inherent BSA/AML risks. xiii
There are numerous articles on BSA/AML risk assessments, and while the steps involved in
developing one are beyond the scope of this paper, the core components of a BSA/AML risk
assessment should include the identification of specific inherent risk categories (i.e. products,
services, customers / counterparties, transactions and geographic locations) specific to the
institution followed by a detailed assessment based upon both qualitative and quantitative
information. Overall, the assessment then considers the inherent BSA/AML risks and the mitigating
impact of controls (including policies, procedures and systems) toward residual risk assessments.
The institution's products and services may, by nature of their degree of anonymity or volume of
currency, pose increased risk of money laundering or terrorist financing. Certain types of
customers / counterparties may also subject the institution to increased risk based on the type of
customer / counterparty (e.g. nonbank financial institutions, senior foreign political figures,
nonresident aliens, etc.) or the geographic locations where the institution transacts business with
the customer / counterparty (e.g. OFAC sanctioned countries, jurisdictions considered to be of
primary money laundering concern, offshore financial centers, etc.).
Development of the qualitative and quantitative information for the risk assessment includes the
collection and analysis of metrics around the customer / counterparty base, transactions
processed and in which geographies customers / counterparties and transactions are processed.
Existing controls are then identified and assessed against the inherent risks to determine the
residual risks upon application of the effectiveness of controls and provides an overall risk profile
of the institution.
The risk assessment must be periodically updated to reflect changes to BSA/AML laws, regulations
and regulatory warnings and other relevant institutional information. The Rule does not specify
what is meant by periodic updates but a review of recent BSA/AML Consent Orders indicates that
documents, such as a risk assessment, in meeting this requirement should be reviewed and
updated annually or when material changes have occurred in the institution's products and
services, customers / counterparties and geographies (e.g. opening of a new branch in a high-risk
Page 5
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
geography, divestiture of a line of business, changes to the AML risk appetite, etc.) or when
BSA/AML laws, regulations or regulatory warnings have been issued.
The risk assessment should be written to be easily understood by all appropriate parties in the
institution and communicated to all business lines, the Board of Directors, management and
appropriate staff.
There should be no mistake that the NYDFS now REQUIRES a comprehensive BSA/AML risk
assessment that lays the foundation for the required AML program controls the institution must
design and implement to mitigate its identified risks. In mitigating these risks, the institution, under
the Rule, must select and implement the appropriate detection scenarios to identify potentially
unusual and suspicious customer activity behavior to mitigate the identified inherent risks.
An example of a simplified BSA/AML and OFAC audit testing program including the risks, controls
and tests that can be performed to determine if the Transaction Monitoring BSA/AML risk
assessment addresses the Transaction Monitoring regulatory requirements is illustrated in the
table below:
BSA/AML Risk Assessment (§504.3(a) (1-3))
Risk Control Control Evidence of Tests of Control
Name Objectives Control
All products and Products / To ensure that all the Cross-referenced list Review the BSA/AML risk assessment and
services have not services relevant products and of the institution's confirm that all of the institution's
been identified in services have been products/services applicable products and services have
the risk identified been included and addressed in the risk
Job aid document
assessment assessment
Confirmation email
from each line of
business
All customer types Customer types To ensure that all the Cross-referenced list Review the BSA/AML risk assessment and
have not been relevant customer of the institution's confirm that all of the institution's
identified in the types have been customer types different customer types have been
risk assessment identified included and addressed in the risk
Job aid document
assessment
Confirmation email
from each line of
business
All relevant Geographies To ensure that all the Cross-referenced list Review the BSA/AML risk assessment and
geographies geographies served of the institution's confirm that all of the geographies served
served by the by the institution geographies served by the institution have been included and
institution have have been identified addressed in the risk assessment
Job aid document
not been identified
in the risk
assessment
Risk assessment Scenarios To ensure that each Coverage model Review the BSA/AML risk assessment and
does not indicate of the applicable assessment confirm there is a cross-reference of
what scenarios inherent risks have inherent risks to transaction monitoring
(models) should be been addressed by scenarios
implemented to one or more
Page 6
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
BSA/AML Risk Assessment (§504.3(a) (1-3))
Risk Control Control Evidence of Tests of Control
Name Objectives Control
mitigate the transaction
inherent risks monitoring scenarios
Inherent risks have Inherent risks To ensure that all the Inherent risk analysis Review the BSA/AML risk assessment and
not been fully relevant inherent confirm that the quantity of risk matrix
identified risks have been identifies the inherent risks to the
identified organization
Other qualitative Other To ensure that other Assessment of other Review the other qualitative risk factors
risk factors have qualitative risk qualitative risk factors qualitative risk assessment document and confirm that
not been factors that may impact factors and these have been considered in the overall
considered inherent risks have determination as to inherent risks. Other qualitative risk
been considered in use in the risk factors include:
the risk assessment assessment Client base stability
Integration of IT systems
Expected account/client growth
Expected revenue growth
Recent AML Compliance employee
turnover
Reliance on third party providers
Recent/planned introductions of new
products and/or services
Recent/planned acquisitions
Recent projects and initiatives related
to AML Compliance matters (e.g.
remediation, elimination of backlogs,
off-shoring)
Recent relevant enforcement actions
National Risk Assessments
Page 7
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
The Rule also specifies that the models must be designed to detect "other suspicious or illegal
activities"xiv which by definition include predicate offenses.xv These are referred to as specified
unlawful activities ("SUA") and includes those either "committed or attempted (1) with the intent
to promote further predicate offenses; (2) with the intent to evade taxation; (3) knowing the
transaction is designed to conceal laundering of the proceeds; or (4) knowing the transaction is
designed to avoid anti-laundering reporting requirements." xvi
An example of a simplified BSA/AML and OFAC audit program including the risks, controls and
tests that can be performed by internal audit to determine if the Transaction Monitoring detection
scenarios meet the regulatory requirements is illustrated in the table below:
Page 8
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
it is appropriately managed and staffed with qualified personnel, and that it is protecting the
institution from the threats of money laundering and terrorist financing.
The pre and post implementation testing steps should be performed to ensure that the required
activities were successfully completed and that the supporting programs around data, coding,
scenarios, model validation and data input/output are operating effectively and regularly
maintained.
As previously noted, testing is the cornerstone of auditing the effectiveness of the system of
controls used to mitigate BSA/AML risks of the Transaction Monitoring program. To ensure that
the BSA/AML controls are effective the following types of tests should be performed: (1)
reperformance using a "new transaction to see which controls are used and the effectiveness of
those controls;" (2) observation of "a business process in action and the control elements of the
process;" and (3) inspection of "business documents for approval signatures," initials, signoffs or
stamps confirming that a particular control has been performed.xvii
An example of a simplified BSA/AML and OFAC audit testing program including the risks, controls
and tests that can be performed to determine if the Transaction Monitoring end-to-end pre and
post implementation testing meets the regulatory requirements is illustrated in the table below:
Transaction Monitoring End-to-End Pre and Post Implementation Testing (§504.3(a)(5))
Risk Control Control Evidence of Tests of Control
Name Objectives Control
Pre- Implementation To ensure that Periodic reviews of: Obtain and review:
implementation project risks project scope and
project risks Adequate budgets and funding have
project risks not related
mitigated implementation risks "to be" design been approved
are mitigated data conversion Steering committee charter
integration testing PMO and milestone plans
readiness / go live QA/QC plans and results
Requirements documentation
Implementation staffing
Design model
System interfaces
Integration test plan and results
Training plan and attendance schedule
User acceptance testing plan
Level of vendor involvement
User and business sign-offs
Go live plan
Post implementation plan
Failure to perform Post- To ensure that the Post- Obtain, review and confirm:
post- implementation post-implementation implementation
Business, regulatory, IT and security
implementation activities plan is properly results
requirements were met
activities executed documentation
Controls were implemented as planned
Key controls were tested
Customers, accounts and transactions
were successfully processed through
integration tests
Page 9
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
Transaction Monitoring End-to-End Pre and Post Implementation Testing (§504.3(a)(5))
Risk Control Control Evidence of Tests of Control
Name Objectives Control
Approved changes were tested
Users and business have accepted the
system
System results map back to
requirements
System has appropriate levels of
internal and external (vendor) support
Service level agreements are in place
Appropriate BCP tiering (e.g. level 1, 2
or 3) has been assigned to the
applications
Page 10
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
Determining whether or not the change is appropriate
Assigning the change to resources for solution identification, sizing and risk analysis
Accepting or rejecting the requested change
Assigning the change to solution development resources
Reviewing the solution prior to implementation
Scheduling the change
Communicating change status as required to all interested parties
Closing the change request order."
An example of a simplified BSA/AML and OFAC audit testing program including the risks, controls
and tests that can be performed to determine if the Transaction Monitoring model documentation
meets the regulatory requirements is illustrated in the table below:
Page 11
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
ALERT INVESTIGATION AND DISPOSITION PROTOCOLS (§504.3(a) (7))
This subsection of the Rule prescribes that the institution has "protocols" xxi for the investigation
and disposition of Transaction Monitoring alerts. The focus of alert management is on the actual
processes in place required to investigate and evaluate unusual activity. Sources for the
identification of potentially unusual activity include:
Employee Identification / Escalation – unusual client activity and/or behavior observed.
The institution must have a written and communicated method of reporting unusual
activity to Compliance (e.g. email, hotline, documentation) and supported by periodic
training
Law Enforcement Requests – including grand jury subpoenas, National Security Letters and
314(a) requests. The institution should have procedures to:
Identify the subject of the request
Monitor transaction activity of the subject
Identify potential suspicious activity and submission of a SAR
National Security Letters – highly confidential requests submitted by local FBI and other
federal government authorities which cannot be disclosed to the subject of the
investigation by anyone in the institution
Manual Monitoring – to include employee identification of unusual activity and unusual
activity identified through a manual review of computer printouts, reports, logs, etc.
Transaction Monitoring (a.k.a. automated client account monitoring) – to identify
individual transaction, patterns of activity, or deviations from expected activity. Multiple
and overlapping rules may be applied creating a higher level of alert complexity. Uses
thresholds and parameters which may be tuned.
Institutions should ensure that their suspicious activity program includes an evaluation and, if
required, an escalation of any unusual activity regardless of how identified including referrals from
any and all areas of the bank. There should be sufficient staff assigned to the processes who are
also provided with ongoing targeted training in order to maintain their expertise in the
investigation process. Investigation staff should also have the necessary tools such that research
activities and the development of the narratives can be properly performed.
The escalation processes should encapsulate the point of initial detection to the final disposition
of the investigation and include the recommendation to file a suspicious activity report (SAR). The
key benefits of having a highly prescriptive set of protocols or instructions is consistency in the
investigation and disposition and quality of the evidence collected and narrative provided
supporting the disposition of each alert and case.
An example of a simplified BSA/AML and OFAC audit testing program including the risks, controls
and tests that can be performed to determine if the Transaction Monitoring alert investigation and
disposition protocols meet the regulatory requirements as illustrated in the table below:
Page 12
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
Transaction Monitoring Alert Investigation and Disposition Protocols (§504.3(a)(7))
Risk Control Control Evidence of Tests of Control
Name Objectives Control
Protocols are not Protocol To ensure that the Alert investigation Obtain and review the current version of
current, not implementation protocols are current, and disposition the investigation and disposition
written or not written and procedure procedure and confirm it matches the
understood understood by actual processes
investigators
Obtain and review the current version of
Quality control
the quality control procedure and confirm
procedures
it matches the actual processes
SAR
Obtain and review the current version of
recommendation
the SAR recommendation and submission
and submission
procedures and confirm they match the
procedures
actual processes
Protocols are not Protocol training To ensure that the Training log Obtain and review the training log to
understood and protocols are confirm all investigators have been
Case reject log
therefore not understood by the trained on the investigation and
followed investigators Aged report of disposition protocols
'unresolved' cases
Obtain and review the case reject log and
identify any investigators who have had
an unusually high number of cases
rejected due to lack of information or
quality or who have had an unusually low
number of cases escalated for SAR filing
Protocols are not Protocol detail To ensure that the Protocol process Obtain and review the protocol and
prescriptive protocols are review confirm each step in the process is clearly
prescriptive detailed in an easy to understand format
Page 13
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
Considering these three components the validation then needs to consider data for inputs,
calculations for processing and data outputs for reporting. Critical here is the quality of data which
correlates to the accuracy of calculations and output. Best practices for model validation include
an assessment of sourced data, assumptions and any data exclusions, design considerations and
logic, calculation routines including parameters, thresholds, and specific criteria, and alert output.
The primary purpose of performing the model validation is to ensure that the models are
performing as they were designed including the confirmation of model thresholds, limit settings
and parameters. This requires a review of model governance, model policies and procedures,
source data used by the models, model performance and alert output. The key activities in
performing a model validation assessment are:
Model governance – review of policy and procedures, change management processes,
prior model validation reports, management roles and responsibilities;
Model coverage – linkage of the detection scenario against red flags and the institution's
BSA/AML risk assessment and identification of any models that should be either added or
considered for decommissioning;
Model input analysis – review and confirm all applicable source systems are providing the
required customer, account, reference and transactional information to the Transaction
Monitoring platform and document where any information is being excluded in the
extraction and loading process;
Model logic analysis – review the model documentation and logic design, develop use
cases including test data and expected output, process against each model and document
results, and assess models from both a qualitative and quantitative basis; and
Model output analysis – assess the design output of each model and confirm through
testing that the output conforms to the design and that the results are accurate.
An example of a simplified BSA/AML and OFAC audit testing program including the risks, controls
and tests that can be performed to determine if the Transaction Monitoring model validation
program meets the regulatory requirements is illustrated in the table below:
Transaction Monitoring Model Validation Program (§504.3(a) (8)
Risk Control Control Evidence of Tests of Control
Name Objectives Control
Does not follow Regulatory To ensure that the References to OCC Obtain and review the model validation
regulatory guidance model validation Supervisory report and confirm it considers guidance
guidance program follows Guidance on Model from the OCC Supervisory Guidance on
regulatory guidance Risk Management Model Risk Management and the NYDFS
Rule 504
Does not Model To ensure that the Model validation Obtain and review the model validation
incorporate model governance model validation policy and governance documentation and confirm it
validation program contains a procedure includes contains policy and procedures, change
governance strong governance section on management processes, prior model
component governance validation reports, management roles and
responsibilities
Page 14
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
Transaction Monitoring Model Validation Program (§504.3(a) (8)
Risk Control Control Evidence of Tests of Control
Name Objectives Control
Does not assess if Model coverage To ensure that the Coverage model Obtain and review the coverage model
the models models address the assessment assessment and confirm that all inherent
address the risk inherent risks risks have been covered by one or more
assessment identified in the risk models or if not then rationale as to why
assessment not
Does not include Model To ensure that each Model validation Obtain and review the model validation
an analysis of component model in the model report report and confirm each model has an
model inputs, validation validation has a analysis of inputs, calculations and
calculations or detailed assessment outputs
outputs of the model inputs,
calculations and
outputs
Not supported by a Model To ensure that the Model validation Obtain and review the model validation
governance governance model validation policy and policy and procedure and confirm it
function program has a strong procedure incorporates a well-articulated
governance governance function
requirement
Page 15
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
FILTERING PROGRAM (§504.3(b))
OFAC RISK ASSESSMENT (§504.3(b) (1))
As is the case with BSA/AML, neither OFAC nor the FFIEC BSA/AML Examination Manual state that
an institution is required to have an OFAC risk assessment or even an OFAC Program, as OFAC is
not itself a bank regulator. However, OFAC requires that financial institutions not violate the laws
that it administers, and confirm with their regulators regarding the suitability of specific programs
to their unique situations. Therefore, any ambiguity on the requirements of an OFAC risk
assessment and Program is now clarified under the new Rule which requires linkage between the
OFAC risk assessment and the Filtering Program.xxv For example, the statement "that the Filtering
Program needs to be based on a risk assessment" prescribes there actually be an OFAC risk
assessment for use in identifying what detection scenarios best mitigate the inherent OFAC
sanctions risks.xxvi
Similar to what was discussed in the BSA/AML risk assessment section, the steps involved in
developing an OFAC risk assessment are also beyond the scope of this paper. However, the
components of an OFAC risk assessment should include the identification of specific risk categories
(i.e. products, services, customers/counterparties, transactions and geographic locations) specific
to the institution followed by a detailed assessment of both qualitative and quantitative
information toward identification of the institution’s inherent OFAC risks, the effectiveness and
impact of mitigating controls culminating in residual risk scores. The institution's products and
services may, by nature of their degree of anonymity or volume of currency, pose increased risk
of money laundering or terrorist financing. Certain types of customers / counterparties may also
subject the institution to increased risk based on the type of customer / counterparty (e.g.
nonbank financial institutions, senior foreign political figures, nonresident aliens, etc.), and the
geographic locations the institution does business in, where customers open accounts from, or
facilitating transactions involving high risk geographies (e.g. OFAC sanctioned countries,
jurisdictions consider to be of primary money laundering concern, offshore financial centers, etc.).
Development of the qualitative and quantitative information for the risk assessment includes the
collection and analysis of metrics around the customer / counterparty base, transactions
processed and in which geographies customers / counterparties and transactions are processed.
Existing controls are identified and assessed against the inherent risks to determine the residual
risks and overall risk profile of the institution.
The risk assessment process must be periodically updated to reflect changes to OFAC Program
prohibited entities and jurisdictions, regulations (e.g. applicability of OFAC licenses) and regulatory
warnings and other relevant institutional information. The Rule does not specify what is meant by
periodic updates but again, experience indicates that documents, such as a risk assessment, in
meeting this requirement should be reviewed and updated annually or when material changes
have occurred in the institution's products and services, customers / counterparties and
geographies (e.g. opening of a new branch in a high risk geography, divestiture of a line of business,
Page 16
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
changes to the AML risk appetite, etc.) or when OFAC laws, regulations or regulatory warnings
have been issued.
Finally, the OFAC risk assessment should be written to be easily understood by all appropriate
parties in the institution and communicated to all business lines, the Board of Directors,
management and appropriate staff.
There should be no mistake that the NYDFS now requires a comprehensive risk assessment that
lays the foundation for the required OFAC program controls the institution must design and
implement to mitigate its risks. In mitigating these risks, the institution under the Rule, must select
and implement the appropriate filters, lists and controls to identify sanctions violations.
An example of a simplified BSA/AML and OFAC audit testing program including the risks, controls
and tests that can be performed to determine if the OFAC risk assessment meets the regulatory
requirements is illustrated in the table below:
OFAC RISK ASSESSMENT (§504.3(b)(1))
Risk Control Name Control Evidence of Tests of Control
Objectives Control
All products and Products / services To ensure that all Cross-referenced list Review the OFAC risk assessment
services have not been the relevant of the institution's and confirm that all of the
identified in the risk products and products/services institution's applicable products
assessment services have been and services have been included
identified and addressed in the risk
Job aid document assessment
Confirmation email
from each line of
business
All customer types have Customer types To ensure that all Cross-referenced list Review the OFAC risk assessment
not been identified in the relevant of the institution's and confirm that all of the
the risk assessment customer types customer types institution's different customer
have been types have been included and
identified addressed in the risk assessment
Job aid document
Confirmation email
from each line of
business
All relevant geographies Geographies To ensure that all Cross-referenced list Review the OFAC risk assessment
served by the institution the geographies of the institution's and confirm that all of the
have not been identified served by the geographies served geographies served by the
in the risk assessment institution have institution have been included and
been identified addressed in the risk assessment
Job aid document
Page 17
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
OFAC RISK ASSESSMENT (§504.3(b)(1))
Risk Control Name Control Evidence of Tests of Control
Objectives Control
Risk assessment does Scenarios To ensure that Coverage model Review the OFAC risk assessment
not indicate what each of the assessment and confirm there is a cross-
scenarios (models) applicable inherent reference of inherent risks to
should be implemented risks have been transaction monitoring scenarios
to mitigate the inherent addressed by one
risks or more
transaction
monitoring
scenarios
Inherent risks have not Inherent risks To ensure that all Quantity of risk Review the OFAC risk assessment
been fully identified the relevant matrix in risk and confirm that the quantity of
inherent risks have assessment risk matrix identifies the inherent
been identified risks to the organization
Other qualitative risk Other qualitative risk To ensure that Assessment of other Review the other qualitative risk
factors have not been factors other qualitative qualitative risk factors assessment document and
considered risk factors that factors and confirm that these have been
may impact determination as to considered in the overall inherent
inherent risks have use in the risk risks. Other qualitative risk factors
been considered in assessment include:
the risk assessment Client base stability
Integration of IT systems
Expected account/client growth
Expected revenue growth
Recent AML Compliance
employee turnover
Reliance on third party
providers
Recent/planned introductions
of new products and/or
services
Recent/planned acquisitions
Recent projects and initiatives
related to AML Compliance
matters (e.g. remediation,
elimination of backlogs, off-
shoring)
Recent relevant enforcement
actions
National Risk Assessments
Page 18
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
Other official watch lists (e.g. Interpol most wanted, etc.);
Country sanction lists;
Geographic sanction lists;
Business specific sanction list (e.g. exporters); and
Internal lists of the institution's high risk customers.
Filter programs detection scenarios (often also referred to as "filters", "screening" or "matching
models") include algorithms for name-matching. These algorithms may include deterministic
(exact match) and indirect match (no direct match relationship), or probabilistic matching which
could include partial matches, fuzzy logic matching or phonetic matching. The matching algorithms
process language translations, misspellings, alternate spellings, abbreviations, synonyms,
acronyms, initials, concatenated words, compound words and special search terms.
No matter the solution used, institutions need to establish policies, procedures and processes to
review transactions and parties on those transactions. "The program should include written
policies and procedures, establish protocols for screening customers and transactions, blocking,
rejecting and reporting transactions to OFAC, designated OFAC Compliance Officer, Governance
and Oversight Committees, training for employees and independent testing for compliance." xxvii
Institutions are required to perform OFAC filtering during the initial customer on-boarding,
subsequently when processing transactions, and periodically even when there are no transactions
requiring another screening. When on-boarding a new customer, institutions must compare the
customer or account name and if applicable any legal entity beneficial owners against applicable
OFAC listsxxviii prior to the account being opened or shortly thereafter. It is the institution's
responsibility to decide whether the review of potential OFAC violations should be performed
manually or through interdiction software or through some combination of both. In those
instances where the number of funds transfers is extremely low (e.g. 5 per day) then a manual
review might be in order otherwise an automated interdiction software solution should be used.
An example of a simplified BSA/AML and OFAC audit testing program including the risks, controls
and tests that can be performed to determine if the Filtering Program name and account matching
meets the regulatory requirements is illustrated in the table below:
FILTERING PROGRAM NAME AND ACCOUNT MATCHING (§504.3(b)(2))
Risk Control Control Evidence of Tests of Control
Name Objectives Control
Matching Threshold To ensure that the Model validation Obtain and review the model validation
threshold set too name matching report report and confirm the threshold tuning
high threshold is not too was tested
limiting
Tuning report
Filter does not List To ensure that all Filter program Obtain and review the filter program
consider all relevant lists are requirements requirements document to identify the
appropriate lists being referenced by document required program lists
the filter
Page 19
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
FILTERING PROGRAM NAME AND ACCOUNT MATCHING (§504.3(b)(2))
Risk Control Control Evidence of Tests of Control
Name Objectives Control
Page 20
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
FILTERING PROGRAM END-TO-END PRE- AND POST-IMPLEMENTATION TESTING (§504.3(b)(3))
Risk Control Control Evidence of Tests of Control
Name Objectives Control
Pre- Implementation To ensure that Periodic reviews of: Obtain and review:
implementation project risks project scope and
project risks Adequate budgets and funding have
project risks not related
mitigated implementation risks "to be" design been approved
are mitigated data conversion Steering committee charter
integration testing PMO and milestone plans
QA/QC plans and results
readiness / go live
Requirements documentation
Implementation staffing
Design model
System interfaces
Integration test plan and results
Training plan and attendance schedule
User acceptance testing plan
Level of vendor involvement
User and business sign-offs
Go live plan
Post implementation plan
Failure to perform Post- To ensure that the Post- Obtain, review and confirm:
post- implementation post-implementation implementation
Business, regulatory, IT and security
implementation activities plan is properly results
activities executed documentation requirements were met
Controls were implemented as planned
Key controls were tested
Customers, accounts and transactions
were successfully processed through
integration tests
Approved changes were tested
Users and business have accepted the
system
System results map back to
requirements
System has appropriate levels of
internal and external (vendor) support
Service level agreements are in place
Appropriate BCP tiering (e.g. level 1, 2
or 3) have been assigned to the
applications
Page 21
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
MODEL VALIDATION (§504.3(b) (4))
Also applicable to OFAC models is the "Supervisory Guidance on Model Risk Management"
published by the Office of the Comptroller of the Currency (OCC) and Federal Reserve's SR letter
11-7 which describes the term 'model' as "a quantitative method, system, or approach that applies
statistical, economic, financial, or mathematical theories, techniques, and assumptions to process
input data into quantitative estimates." xxx In layman's terms it can be thought of more simply as
an OFAC filter designed to identify individuals on the SDN and Blocked Person list such that they
are not on-boarded as customers to the institution. These models are also used to scan business
activity to identify transactions that are for or on behalf of individuals on the SDN or Blocked
Person list or which originate, pass through or conclude in a listed country covered under
economic sanctions, embargo programs or targeted geographic regions and governments.
The Rule prescribes that periodic independent model validation to assess relevancy of scenarios,
underlying rules, threshold values, parameters and assumptions be performed. Where the
vendor's solution is proprietary and access to the mathematical routines and logic are not exposed
a separate process can be utilized to test these filters. One such method is to develop a test bed
of data that contains transactions designed to not have any information that should hit on an OFAC
Sanctions list and transactions that should hit. Running these both through the vendor's
proprietary filter and evaluating the results will assess the accuracy of the filter logic and matching
processing.
There are three components of a model including "an information input component, which
delivers assumptions and data to the model; a processing component, which transforms inputs
into estimates; and a reporting component, which translates the estimates into useful business
information."xxxi Considering the three components then the validation needs to consider data for
inputs, calculations for processing and data outputs for reporting. Critical here is the quality of
data which is directly correlated to the accuracy of calculations and output. Best practices for
model validation include an assessment of sourced data, assumptions and any data exclusions,
design considerations and logic, calculation routines including parameters, thresholds, and specific
criteria, and alert output.
The primary purpose of performing the OFAC model validation is to ensure that the OFAC filters
are performing as they were designed including the confirmation of filter thresholds, limit settings
and parameters. This requires a review of model governance, model policies and procedures,
source data used by the models, model performance and alert output.
An example of a simplified BSA/AML and OFAC audit testing program including the risks, controls
and tests that can be performed to determine if the Filtering Program model validation meets the
regulatory requirements is illustrated in the table below:
Page 22
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
FILTERING PROGRAM MODEL VALIDATION (§504.3(b)(4))
Risk Control Control Evidence of Tests of Control
Name Objectives Control
Does not follow Regulatory To ensure that the References to OCC Obtain and review the model validation
regulatory guidance model validation Supervisory report and confirm it considers guidance
guidance program follows Guidance on Model from the OCC Supervisory Guidance on
regulatory guidance Risk Management Model Risk Management and the NYDFS
Rule 504
Does not Model To ensure that the Model validation Obtain and review the model validation
incorporate model governance model validation policy and governance documentation and confirm it
validation program contains a procedure includes contains policy and procedures, change
governance strong governance section on management processes, prior model
component governance validation reports, management roles and
responsibilities
Exact match filter Exact match To ensure that the Exact match filter Test the filter's capabilities to match
not performing as exact matching filter design logic and sanctioned names as they appear on the
designed is performing as current settings sanction lists
designed
Risk information Risk information To ensure that the Risk information Test the filter's capabilities to match
match filter not match risk information match filter design additional risk information correctly such
performing as match filter is logic and current as BICs and country names
designed performing as settings
designed
Fuzzy logic match Fuzzy logic To ensure that the Fuzzy logic filter Using a pre-developed set of transactional
filter not match fuzzy logic filter is design logic and data with fuzzy name variations in
performing as performing as current settings different transactions, test the filter's
designed designed capabilities to match the test set of name
variants.
Page 23
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
thresholds. These changes may be required due to changes in the BSA/AML risk assessment,
regulatory changes, industry standards or simply due to the fact that the model is producing alerts
of minimal suspicious activity value. When changes are required it is critical to adhere to strict
change management processes to document all of the activities and approvals involved. In
addition to the necessary governance functions around this process there are several key activities
that should be performed. The Information Technology Service Managementxxxii ("ITSM")
organization defines the core activities of a change management process as: xxxiii
"Receiving change requests from appropriate parties
Determining whether or not the change is appropriate
Assigning the change to resources within IT for solution identification, sizing and risk
analysis
Accepting or rejecting the requested change
Assigning the change to solution development resources
Reviewing the solution prior to implementation
Scheduling the change
Communicating change status as required to all interested parties
Closing the change."
An example of a simplified BSA/AML and OFAC audit testing program including the risks, controls
and tests that can be performed to determine if the Filtering Program model documentation meets
the regulatory requirements is illustrated in the table below:
FILTERING PROGRAM MODEL DOCUMENTATION (§504.3(b)(5))
Risk Control Control Evidence of Tests of Control
Name Objectives Control
Source systems Source systems To ensure that all the Source systems Review the source systems diagram to
not documented documentation systems of record diagram understand and confirm the feeds to the
applicable to the OFAC platforms have been documented
OFAC program have
been documented
Data from source Source systems To ensure that all the Data flow diagram Review the data flow diagrams
systems not data required data from documentation to understand and
documented documentation all the applicable confirm that the data feeds from each of
source systems has the source systems has been
been documented documented
ETL not ETL To ensure that the ETL documentation Review the ETL documentation to ensure
documented documentation ETL process has been it clearly describes the extraction,
documented transformation and loading processes
including any assumptions made.
Filter models not Model To ensure that the Filter model Review the filter model documentation
documented documentation Filtering Program documentation to ensure it clearly describes the input,
Page 24
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
FILTERING PROGRAM MODEL DOCUMENTATION (§504.3(b)(5))
Risk Control Control Evidence of Tests of Control
Name Objectives Control
model(s) have been calculation and logic, and output steps
documented involved in each model
Change control Change To ensure that Change control Review the filter program change control
procedure not management changes to the filter procedure to ensure it covers all the
documented program models necessary activities from initiating a
follow a prescriptive change request through final
process implementation
Page 25
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
EACH TRANSACTION MONITORING AND FILTERING PROGRAM (§504.3(c))
IDENTIFICATION OF ALL RELEVANT DATA SOURCES (§504.3(C)(1))
To identify the relevant data sources per this subsection of the Rule, the institution must reference
the technical specifications documents ("TSDs") or similar documentation for both the Transaction
Monitoring and Filtering Programs. The TSDs describe how the system functions have been
designed to perform and what data from each of the systems of record are required. For solutions
purchased from third-party vendors, the data requirements will be documented and available
from the vendor, who will generally be available to provide assistance in identifying the
institution's data sources that contain the required relevant data. It is the institution's
responsibility to ensure that the data meets the data quality requirements and is obtained from
"systems of record."xxxiv.
An example of a simplified BSA/AML and OFAC audit testing program including the risks, controls
and tests that can be performed to determine if the identification of all relevant data sources for
both the Transaction Monitoring and Filtering Program meets the regulatory requirements is
illustrated in the table below:
IDENTIFICATION OF ALL RELEVANT DATA SOURCES (§504.3(C)(1))
Risk Control Control Evidence of Tests of Control
Name Objectives Control
Extraction and Data To confirm that all of Control report from For each system of record (e.g. feeder
loading programs completeness the required data each system of system) develop and execute a query to
may exclude or from each of the record select and calculate the number of
drop required identified systems of transactions that are extracted and sent
information record are submitted to the BSA/AML and OFAC platforms for
to the BSA/AML and Control report for subsequent loading
OFAC platforms data loaded to
BSA/AML and OFAC
platforms
A source system Data quality To confirm data Operational and Review the error recovery system
may have an quality is not system procedure documentation and holiday processing
extract error, may compromised due to for data extraction procedures
send duplicate an unexpected source and loading
data or may not system event
send data due to a
holiday
Source system Data availability To confirm that Service Level Review the service level agreements and
functions and source system Agreement (SLA) confirm they are current, include a
processes may owners don't make commitment to provide required data and
change impacting changes that impact require agreement from Compliance in
the data required the data extracts for order to change any of the data extracts
BSA/AML and OFAC for BSA/AML and OFAC
Page 26
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
determine the quality of data. Within the context of the Transaction Monitoring and Filtering
Programs, data quality is understood to have six core dimensions:xxxv
1. Completeness – the Transaction Monitoring and Filter Programs contain all of the data that
are required to perform their respective functions
2. Uniqueness – data is recorded only once
3. Timeliness – data is available to the Transaction Monitoring and Filter Programs in the time
period required
4. Validity – data conforms to its required syntax (format, type, range)
5. Accuracy – data correctly represents the object or event being described
6. Consistency – the data from the source systems is the same as the data received and used
by the Transaction Monitoring and Filtering Programs
Data integrity, however, refers to the assurance of accuracy and consistency of data used by the
Transaction Monitoring and Filter Programs over its entire life-cycle (e.g. across all the different
processes involved). The intent of a data integrity technique is to "ensure data is recorded exactly
as intended," and, when subsequently reviewed, "the data is the same as it was when originally
recorded."xxxvi
An example of a simplified BSA/AML and OFAC audit testing program including the risks, controls
and tests that can be performed to determine if the data validation for both the Transaction
Monitoring and Filtering Program meet the regulatory requirements is illustrated in the table
below:
DATA VALIDATION (INTEGRITY, ACCURACY AND QUALITY) (§504.3(C)(2))
Risk Control Control Evidence of Tests of Control
Name Objectives Control
Data extracted Data To confirm that the Data quality report Compare the total number of records
from source completeness data to be sourced sent by source systems to the total
systems may have from systems of number of records received by the
poor quality record does not have Transaction Monitoring and Filter
data quality Programs
problems
Duplicate data Data uniqueness To confirm that the Data quality report Sample data from the Transaction
data in the Monitoring and Filter Programs and
Transaction search to confirm the data record only
Monitoring and Filter occurs once in the system
Programs occurs only
once
Transactions from Data timeliness To confirm that the Data quality report Sample data from source systems to
incorrect time sourced data is confirm that the extracted data are in the
periods current with respect appropriate reference period as required
to the processing by the Transaction Monitoring and Filter
requirements of the Programs
Transaction
Monitoring and Filter
Programs
Data not valid Data validity To confirm that the Data quality report Sample data to confirm that data sourced
data is in the correct from the systems of record and loaded to
Page 27
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
DATA VALIDATION (INTEGRITY, ACCURACY AND QUALITY) (§504.3(C)(2))
Risk Control Control Evidence of Tests of Control
Name Objectives Control
format, represent the the Transaction Monitoring and Filter
correct type of data Programs is valid
and are in the range
expected
Data not accurate Data accuracy To confirm that the Data quality report Sample data to confirm that the data in
data present in the the Transaction Monitoring and Filter
information sourced Programs is accurate
is accurate in its
representation of the
information
Data is not Data To confirm that the Data quality report Sample data from both the source
consistent consistency data extracted from systems and the Transaction Monitoring
between the the source systems is and Filter Program systems and compare
various systems the same as the data to ensure consistency
received by the
Transaction
Monitoring and Filter
Programs
DATA EXTRACTION AND LOADING PROCESSES FOR AUTOMATED SYSTEMS (§504.3(C) (3))
Data extraction and loading is commonly referred to as the process of extract, transform and load
("ETL"), and includes all of the activities involved in obtaining data from each of the respective
source systems, transforming that data from its native format to a required format, then ingesting
the transformed data into the Transaction Monitoring and Filter Program systems. Characteristics
of data quality need to be considered in addition to the ETL processes.
An example of a simplified BSA/AML and OFAC audit testing program including the risks, controls
and tests that can be performed to determine if the data extraction and loading processes for both
the Transaction Monitoring and Filtering Program meet the regulatory requirements is illustrated
in the table below:
DATA EXTRACTION AND LOADING PROCESSES FOR AUTOMATED SYSTEMS (§504.3(C)(3))
Risk Control Control Evidence of Tests of Control
Name Objectives Control
Data extraction Data To confirm that the Data quality report Compare the total number of records
does not contain completeness data sourced from available for extraction in each source
all of the required systems of record is system to the total number of records
data complete extracted and received by the
Transaction Monitoring and Filter
Programs
Incorrect Data To confirm that the Data quality report Take a sample of transactions that have
transformation of transformation data subject to data elements transformed. Compare the
data from one transformation rules data elements before and after the
format to another is correctly transformation and confirm the result is
transformed as expected
Page 28
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
DATA EXTRACTION AND LOADING PROCESSES FOR AUTOMATED SYSTEMS (§504.3(C)(3))
Risk Control Control Evidence of Tests of Control
Name Objectives Control
Ingestion of Data ingestion To confirm that the Data quality report Compare the total number of
transformed data transformed data is transactions transformed with the total
drops or excludes completely ingested number of transactions ingested by the
data by the Transaction Transaction Monitoring and Filter
Monitoring and Filter Programs to ensure equal data
Programs
Page 29
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
GOVERNANCE AND MANAGEMENT OVERSIGHT (§504.3(C)(4))
Risk Control Control Evidence of Tests of Control
Name Objectives Control
The Board of BSA/AML To ensure the board Board of directors Review Board Meeting minutes to
Directors is not compliance oversees both the meeting agenda and determine if the board takes an active
taking an active functions structure and notes role in overseeing the structure and
role in management of the management of the institution's
management BSA/AML compliance BSA/AML compliance functions
oversight of the functions
BSA/AML
compliance
functions
No or weak tone Tone at the top To ensure the board Corporate Determine if the board sets an
at the top communicates a communications appropriate tone at the top by reviewing
culture of compliance corporate communications:
- Frequent company communications
about the AML regulatory
requirements
- Publicized risk appetite statement
- Prominent support for AML education
- Authorization to fund new
technologies or major enhancements
to the AML program
- Authorization to fund sufficient levels
of qualified staff to the AML program
- Employee incentives/disincentives for
support and compliance with the AML
program
BSA/AML policies Policy approval To ensure that the Board of directors Determine if the board approves all
are not board board has reviewed meeting agenda and BSA/AML policies
approved and agreed with the notes
BSA/AML policies
The board has not Empowerment To ensure that the Organization Determine if the board has ensured
empowered senior board has qualified structure and roles senior management are empowered and
management to management to carry and responsibilities qualified to carry out their duties
perform their out the BSA/AML (position
duties duties description)
Organizational Organization To ensure that the Organization Determine if BSA/AML compliance
structure does not structure board has structured structure and roles management and compliance personnel
provide required the organization such and responsibilities in lines of business have required
level of authority that the BSA/AML (position authority to carry out their duties
compliance officer description)
and compliance
personnel have
required authority
Board does not Culture of To ensure there are HR policy Determine if the annual performance
penalize or reward compliance rewards and plan incentivizes management for
staff based on penalties for staff BSA/AML compliance successes and
BSA/AML based on BSA/AML failures
performance program
performance
Page 30
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
VENDOR SELECTION PROCESS (§504.3(C)(5))
If a third-party vendor is used to acquire, install, implement or test the Transaction Monitoring or
Filtering Program or any aspect of it then this subsection of the Rule prescribes there be written
documentation supporting the vendor selection process used by the institution. The type, format
or content needed to support the vendor selection process, however, is not described in the Rule.
In practice, there are several methods used by institutions to select BSA/AML and OFAC consulting
and/or solution vendors.
In general, the following activities should be included in the vendor selection process supported
by formal written documentation:
Project approval from senior management;
Business and regulatory requirements (must haves and nice to haves);
Technology and security requirements (must haves);
Market assessment of potential vendors and solutions;
Request for proposal ("RFP") and scoring model;
Vendor proposals and costs;
Short-list of vendors;
Vendor presentations and reference checks;
Legal and IT security clearances;
Vendor selection; and
Contracting
An example of a simplified BSA/AML and OFAC audit testing program including the risks, controls
and tests that can be performed to determine if the vendor selection process for both the
Transaction Monitoring and Filtering Program meets the regulatory requirements is illustrated in
the table below:
VENDOR SELECTION PROCESS (§504.3(C)(5))
Risk Control Control Evidence of Tests of Control
Name Objectives Control
Program Requirements To ensure that the Business Review the business and technical
requirements have documentation program requirements documentation for the program to
not been requirements have document ("BRD") confirm that the requirements were
identified and been identified and developed and documented
documented documented
RFP not submitted RFP To ensure that RFP responses Review the RFP distribution list to
several vendors were confirm that several vendors who offer
evaluated for the types of solutions applicable to the
consideration institution were considered
Vendor selection Scoring and To ensure that the Pricing model Review the selected vendor's pricing
process weighted selection criteria selected vendor was model and criteria used for final vendor
to highly on not determined selection to confirm primary qualification
solution cost primarily through was not cost
cost of the solution
Page 31
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
VENDOR SELECTION PROCESS (§504.3(C)(5))
Risk Control Control Evidence of Tests of Control
Name Objectives Control
Vendor solution is Representative To ensure that the Market assessment Review the market assessment report to
used by usage selected vendor confirm that each of the vendor solutions
institution's peers solution is used by being considered are recognized market
peer institutions and solutions
recognized by the
institution's
regulators
Page 32
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
APPROPRIATE PROGRAM FUNDING (§504.3(C)(6))
Risk Control Control Evidence of Tests of Control
Name Objectives Control
- Review unworked alerts at end of
month
Insufficient Transaction To ensure that the Number of Review the volume of transactional
funding for monitoring funding to support transactions activity and confirm that it can be
transaction technology or the identification and processed by the properly dispositioned by the means in
monitoring staffing funding clearing of suspicious monitoring function place (manual or automated)
technology activity is sufficient are manageable
- Review backlog
- Review unworked alerts at end of
month
Insufficient Customer on- To ensure that the Number of Review the volume of customers on-
funding for boarding funding to support customers on- boarded during an average month and
customer on- technology or the on-boarding of boarded in an confirm that the process supports
boarding staffing funding customers is average month sufficient due diligence and enhanced
sufficient due diligence
- Review backlog of customers in on-
Number of high-risk
boarding queue
customers on-
- Review volumes of negative news
boarded in an
- Review volume of high risk
average month
customers
Page 33
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
QUALIFIED PERSONNEL TO PERFORM THE PROGRAM REQUIREMENTS (§504.3(C)(7))
Risk Control Control Evidence of Tests of Control
Name Objectives Control
Suspicious Position To ensure that Certifications and Review the position descriptions for
transactions or qualification individuals working in training records: employees in each area of the
transactions the Transaction Transaction Monitoring and Filter
- CAMS
involving Monitoring and Filter Program and confirm that employees
- KYC CDD
names/countries Programs have have appropriate certifications and
- Counter
on sanctions lists sufficient knowledge attended regular targeted training
Terrorist
are not identified and qualifications to programs
Financing
recognize suspicious
- CAMS AUDIT
money laundering
- CAMS FSI
and terrorist
financing activities - Annual training
records
BSA Compliance BSA Compliance To ensure that the Certifications and Review the BSA Compliance Officer's
Officer unqualified Officer BSA Compliance training records; employment background, position
qualifications Officer is qualified to prior employment history, AML certifications and AML
perform the required and position history training to confirm they have the core
duties qualifications to perform the required
program duties
No appropriate Segregation of To ensure that there Organization chart Review the organization chart including
segregation of duties is a clear segregation the roles and responsibilities of
duties between of duties between employees involved in model tuning and
employees employees tuning Roles and alert investigation. Confirm that the
responsible for models and those responsibilities reporting structure and duties are clearly
tuning models and investigating the separate from each other
those investigating resulting alerts
the alerts
Number of Escalation To ensure that Escalation and Review the quality control logs and
unusual activity investigators are quality control logs determine if there are an abnormally high
transactions escalating all unusual number of alerts that an employee did
escalated are low transactions that not recognize as suspicious
while number of require further
requests for investigation
information Review the escalation log and determine
("RFIs") are high if the employee has not escalation for
further investigation the number of alerts
similar to other investigative staff
Number of alerts Alert re-work To ensure that the Number of alerts Compare the number of alerts that
that require re- investigators requiring re-work is required re-work during the month to the
work are excessive assigned to clear less than the control average of all investigators or a control
alerts have the level established level set.
requisite knowledge
and training
SARs are filed late Late SAR filing To ensure that once a SAR filing log Review the SAR filing log and identify
case has been investigators who are late filing SARs.
determined to be Determine if this is a pattern and if they
suspicious a SAR is require targeted training.
filed within the
allowed timeframe
Page 34
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
PERIODIC TRAINING OF ALL STAKEHOLDERS (§504.3(C)(8))
The failure to conduct periodic employee training on the BSA/AML and OFAC program will render
the Program ineffective over the course of time. All employees should have an understanding of
the institution's BSA/AML and OFAC requirements, while those employees whose duties include
on-boarding customers and transacting business or who are responsible for various aspects of the
BSA/AML and OFAC programs should have targeted training to ensure they receive updated
guidance on evolving laws, regulations and best practices.
Training for both new employees and those with BSA/AML and OFAC experience at the institution
should receive periodic targeted training, including training on related policies and procedures,
current BSA/AML and OFAC laws and regulation and best practices within their specific areas of
the anti-money laundering programs.
The training program should be supported by the collection and retention of training program
records including employees who have received different types of training, when training
occurred, content of training, training and testing materials and attendance records. Follow up
after training should also be performed to ensure that the training was effective and that
employees benefited from the training and are utilizing the knowledge gained.
An example of a simplified BSA/AML and OFAC audit testing program including the risks, controls
and tests that can be performed to determine if the periodic training of all stakeholders for both
the Transaction Monitoring and Filtering Program meets the regulatory requirements is illustrated
in the table below:
PERIODIC TRAINING OF ALL STAKEHOLDERS (§504.3(C)(8))
Risk Control Control Evidence of Tests of Control
Name Objectives Control
All stakeholders General training To ensure that all Training log Review training log and compare the
have not received employees have total number of employees who attended
general BSA/AML received basic the general annual BSA/AML and OFAC
and OFAC training information about training program to the number of
the institution's employees on staff during that year
BSA/AML and OFAC
requirements
Applicable Targeted To ensure that Training log Review training log and compare the
stakeholders did training employees in each of total number of employees involved with
not receive the areas of the Transaction Monitoring and Filter
targeted training Transaction Program with the records of attendance
Monitoring and Filter for targeted training delivered during the
Program receive year
targeted training
Training records Training record To ensure that the Training log Review the training log and confirm that
not maintained or keeping institution maintains it is current and reflects attendance
not properly records of employee records for all employees attending each
maintained attendance for of the different types of Transaction
training Monitoring and Filter Program training
taken each year
Page 35
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
IDENTIFICATION OF REMEDIAL EFFORTS PLANNED AND/OR UNDERWAY (§504.3(d))
This subsection of the Rule prescribes that "to the extent that the institution has identified areas,
systems, or processes that require material improvement, updating or redesign, the institution
shall document the identification and the remedial efforts planned and underway to address such
areas, systems or processes."xxxix This documentation must be available to the Superintendent
upon request.
The certifying officer must therefore identify any remedial efforts planned and/or underway
however, the format of the corrective actions response required to support this requirement was
not described in the Rule. Guidance can be obtained from Sarbanes Oxley, which requires that the
certifying officer must disclose any corrective actions with regard to significant deficiencies and
material weaknessesxl. In this regard, the corrective actions are those process and control
improvements that management institutes in order to correct a significant deficiency or material
weakness in the Transaction Monitoring or Filter Programs.
An example template for the corrective actions response is illustrated below:
Issue Impact Priority Agreed Management Action Due R-A-G
Plan Date
The Branch's Risk Assessment will be re- A key purpose of the BSA/AML and High Identification of Part 504 risk Q2, GREEN
performed using a more detailed and OFAC Risk Assessments is to identify assessment requirements 2017
granular risk assessment methodology to controls to mitigate inherent risks,
Develop 'gap' between current
address the Part 504 requirements by the provide a view of the effectiveness of
risk assessments and
end of Q2 2017 and in response to the those controls and to drive
requirements
prior regulatory findings. improvements in the BSA/AML and
OFAC risk management program Identify required changes to risk
through the identification of money assessments and other linked
During the review period the enhanced laundering risks faced by the Branch – programs
Branch BSA/AML and OFAC Risk its customers, products and services,
Remediate risk assessment
Assessments were not completed or and geographies served.
methodologies and assessments
implemented. After a review of the
proposed additions to the Risk Remediate associated policy,
Assessments it was noted that they do Without updated risk assessments procedures and processes
not fully address all of the Part 504 that support and comply with Part
Communicate risk assessments to
requirements. 504 requirements, the Branch will not
all Branch personnel
be properly identifying the risk profile
and effectively delegating its Establish training calendar and
The Risk Assessment should also be resources to reasonably manage the roster
updated with relevant quantitative data Branch's overall BSA/AML and OFAC
Develop and deliver targeted
including year-over-year comparisons. risks.
training
Page 36
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
(§504.4) ANNUAL BOARD RESOLUTION OR SENIOR OFFICER COMPLIANCE FINDING
An annual Board resolution or Senior Officer Compliance finding is required by each Regulated
Institution which attests to the best knowledge of its Board or Senior Officer that the institution is
in compliance with the requirements of the Rule. The institution must determine if the Board of
Directors will be required to adopt a certifying resolution to be submitted to the Supervisor or if a
Senior Officer will be required to submit a finding that the Transaction Monitoring and Filtering
Programs satisfies the requirements of the Rule. This requirement is fulfilled through the
submission of an annual certification (Attachment A to Rule 504 xli), which must be either signed
by each member of the Board of Directors or a senior officer(s) and submitted to the Department
of Financial Services on April 15th of each year beginning in 2018.
The certification by the Board of Directors or Senior Officer(s) requires that:xlii
the Board of Directors or Senior Officer(s) "have reviewed documents, reports,
certifications and opinions of such officers, employees, representatives, outside vendors
and other individuals as necessary" to provide the certification;
the Board of Directors or Senior Officer(s) have "taken all steps necessary to confirm" that
the New York Regulated Institution has a Transaction Monitoring and Filtering Program
that complies with the Program requirements; and
to the best of the Board's or Senior Officer(s)' knowledge, the Transaction Monitoring and
Filtering Program of the Regulated Institution for the prior calendar year complies with
the Program requirements.
(§504.5) PENALTIES / ENFORCEMENT ACTIONS
Interestingly, the Rule does not specifically impose penalties for the failure to maintain an
adequate transaction monitoring and filtering program, failure to file the annual certification or
criminal penalty for filing an incorrect or false annual certification. However, it is likely that the
NYDFS will continue to step up its enforcement actions and monetary penalties toward ensuring
Regulated Institutions fully comply with the Rule.xliii
CONCLUSION
The NYDFS Part 504 Rule implements TWO significant challenges toward compliance program
standards and governance of control deficiency issues related to the BSA/AML and OFAC program
requirements that Regulated Institutions must adhere to beginning January 1, 2017.
First, the Rule creates stringent control standards through implementing prescriptive
requirements and detailed attributes for the BSA/AML and OFAC transaction monitoring, filter
program and related program elements such as transaction monitoring, OFAC sanctions filtering,
governance, data, model validation, vendor selection, funding, use of qualified personnel and
training.
Second, program testing is critical to document and detail that the institution is performing to the
standards which is then required to be attested to on the annual certification. Without significant
Page 37
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
testing, senior management and the BSA Compliance, Officers cannot fully understand the gaps
between their existing BSA/AML and OFAC programs and the new requirements to identify
deficiencies and develop remediation action plans with ownership and target completion dates
clearly spelled out. These remediation action plans then must be available, attested to and
presented to the NYDFS, or the institutions face the risk of additional potential program violations,
enforcement actions, and/or monetary penalties can be imposed strictly for failure to adequately
govern and provide oversight and ownership of the BSA/AML Program and remediation efforts.
Part 504 essentially requires an institution to build, maintain, and test BSA/AML/OFAC control
environments that comply with the NYDFS prescriptive standards that exceed the regulatory
guidance provided by the FFIEC and OFAC. Furthermore, the Rule permits the NYDFS to levy fines,
penalties, and/or actions against an institution for the inability of senior management to identify,
address, and remediate any prescribed control deficiencies and further requires management to
disclose and attest to these documented efforts to the DFS upon request.
While the Rule is specific to New York DFS Regulated Institutions, it is quite possible that other
regulators in New York, such as the OCC, FDIC, FINRA, etc. may adopt these new certification
requirements for their regulated institutions. Additionally, and depending upon the success of this
new regulation, other states may adopt these or similar measures for their own respective
regulated institutions.
Page 38
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
REFERENCES
i
Section 302 of the Sarbanes-Oxley Act, titled Corporate Responsibility for Financial Reports,
requires: a) CEOs and CFOs must review all financial reports; b) financial reports must not
contain any misrepresentations; c) information on financial reports must be "fairly presented"; d)
CEOs and CFOs must be responsible for the internal accounting controls; e) CEOs and CFOs must
report any deficiencies in internal accounting controls, or any fraud involving the management of
the audit committee; and f) CEOs and CFOs must indicate any material changes in internal
accounting controls. Sarbanes-Oxley Act §302, 15 U.S.C.A. § 7241 (West 2002).
ii
SEC Requires CEO and CFO Certification of Quarterly and Annual Reports, Morrison Foerster (Sept. 4,
2002), https://www.mofo.com/resources/publications/sec-requires-ceo-and-cfo-certification-of-
quarterly-and-annual-reports.html#.
iii
"Maria T. Vullo was confirmed by the New York State Senate as Superintendent Financial
Services on June 15, 2016." Maria T. Vullo, New York State Department of Financial Services,
http://www.dfs.ny.gov/about/mvullo.htm (last visited Sept. 27, 2016).
iv
NYDFS has identified "regulated institutions" to include "all Bank Regulated Institutions and all
Nonbank Regulated Institutions." Banking Division Transaction Monitoring and Filtering Program
Requirements and Certifications, 3 N.Y.C.R.R §504, Dept. of Financial Services Superintendent
Regulations, (June 30, 2016), available at
http://www.dfs.ny.gov/legal/regulations/adoptions/dfsp504t.pdf. "Bank regulated institutions"
include "banks, trust companies, private bankers, savings banks, and savings and loan
associations chartered pursuant to the New York Banking Law (the “Banking Law”) and all
branches and agencies of foreign banking corporations licensed pursuant to the Banking Law to
conduct banking operations in New York." Id. "Nonbank regulated institutions" include "check
cashers and money transmitters licensed pursuant to the Banking law." Id.
v
Christopher L. Allen, Robert C. Azarow, David F. Freeman, Jr., Michael A. Mancusi, Brian C.
McCormally & Kevin M. Toomey, New York’s New AML Rule: Strategic Considerations and
Alternatives, Arnold & Porter (July 11, 2016),
http://www.arnoldporter.com/en/perspectives/publications/2016/07/new-yorks-new-aml-rule.
vi
Banking Division Transaction Monitoring and Filtering Program Requirements and
Certifications, 3 N.Y.C.R.R §504.6.
vii
Id. §504.4.
viii
Id. §504.3
ix
Id. §504, Attachment A.
x
Steven Bragg, What are Tests of Controls?, Accounting Tools (April 16, 2014, 9:47 AM),
http://www.accountingtools.com/questions-and-answers/what-are-tests-of-controls.html.
Page 39
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
xi
Bank Secrecy Act Anti-Money Laundering Examination Manual, Federal Financial Institutions
Examination Council Bank Secrecy Act/ Anti-Money Laundering InfoBase 11 (2015),
https://www.ffiec.gov/bsa_aml_infobase/documents/BSA_AML_Man_2014_v2.pdf.
xii
Banking Division Transaction Monitoring and Filtering Program Requirements and
Certifications, 3 N.Y.C.R.R §504.4.
xiii
Id. §504.3(a)(1).
xiv
Id. §504.3(a)(4).
xv
"A predicate offense is a crime that is a component of a more serious criminal offence. For
example, producing unlawful funds is the main offence and money laundering is the predicate
offense." Robert Charles Lee, What Is The Meaning Of 'Predicate' in the Following Sentence,
'Government Should Make Tax Evasion Of Rs. 50 Lakh and Above, a Predicate Offence?', Quora
(Dec. 16, 2014), https://www.quora.com/What-is-the-meaning-of-predicate-in-the-following-
sentence-Government-should-make-tax-evasion-of-Rs-50-lakh-and-above-a-predicate-offence.
xvi
Charles Doyle, Cong. Research Serv., RL33315, Money Laundering: An Overview of 18 U.S.C.
1956 and Related Federal Criminal Law 2 (2012), available at
https://www.fas.org/sgp/crs/misc/RL33315.pdf.
xvii
Bragg, supra.
xviii
Banking Division Transaction Monitoring and Filtering Program Requirements and
Certifications, 3 N.Y.C.R.R §504.3(a)(6).
xix
ITSM refers to the "entirety of activities performed by an IT service provider to plan, deliver,
operate and control IT services offered to customers. Note: the activities carried out in the ITSM
context should be directed by policies and structured and organised by processes and supporting
procedures." Part 0: Overview and Vocabulary, FitSM Standards for Lightweight IT Service
Management 7 (Version 2.4, 2016), http://fitsm.itemo.org/sites/default/files/FitSM-
0_Overview_and_vocabulary.pdf.
xx
ITSM, IT Change Management Procedure, (last visited Sept. 29, 2016),
http://www.itsmcommunity.org/downloads/Sample_Process_Guide_-
_Change_Management.pdf
xxi
Protocol Definition, Merriam-Webster, http://www.merriam-webster.com/dictionary/protocol
xxii
Supervisory Guidance on Model Risk Management, Office of the Comptroller of the Currency,
U.S. Dept. of Treasury 3 (April 4, 2011), https://occ.gov/news-issuances/bulletins/2011/bulletin-
2011-12a.pdf; Guidance on Model Risk Management, Board of Governors of the Federal Reserve
System 2 (April 4, 2011), https://www.federalreserve.gov/bankinforeg/srletters/sr1107.pdf.
Page 40
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
xxiii
Bank Secrecy Act Anti-Money Laundering Examination Manual, supra, at F-1.
xxiv
Supervisory Guidance on Model Risk Management, supra, at 3.
xxv
Banking Division Transaction Monitoring and Filtering Program Requirements and
Certifications, 3 N.Y.C.R.R §504.3(b)(1).
xxvi
Id.
xxvii
Tara Johnston, OFAC and the Role of the Three Lines of Defense, Advancing Financial Crime
Professionals Worldwide 7 (last visited Sept. 30, 2016), http://www.acams.org/wp-
content/uploads/2015/08/OFAC-and-the-Role-of-the-Three-Lines-of-Defense-Tara-Johnston.pdf.
xxviii
Lists include the Specially Designated Nationals and Blocked Persons list ("SDN List") at
www.ustreas.gov/offices/enforcement/ofac/sdn and economic sanction and embargo programs
that target geographic regions and governments at
www.ustreas.gov/offices/enforcement/ofac/programs. Specially Designated Nationals List (SDN),
U.S. Dept. of Treasury (Sept. 29, 2016), https://www.treasury.gov/resource-
center/sanctions/SDN-List/Pages/default.aspx; Sanctions Programs and Country Information,
U.S. Dept. of Treasury (Sept. 29, 2016, 11:02 AM), https://www.treasury.gov/resource-
center/sanctions/Programs/Pages/Programs.aspx.
xxix
Bragg, supra.
xxx
Supervisory Guidance on Model Risk Management, Office of the Comptroller of the Currency,
supra, at 3; Guidance on Model Risk Management, Board of Governors of the Federal Reserve
System, supra, at 2.
xxxi
Supervisory Guidance on Model Risk Management, Office of the Comptroller of the Currency,
supra, at 3.
xxxii
ITSM refers to the "entirety of activities performed by an IT service provider to plan, deliver,
operate and control IT services offered to customers. Note: the activities carried out in the ITSM
context should be directed by policies and structured and organised by processes and supporting
procedures." Part 0: Overview and Vocabulary, FitSM Standards for Lightweight IT Service
Management 7 (Version 2.4, 2016), http://fitsm.itemo.org/sites/default/files/FitSM-
0_Overview_and_vocabulary.pdf.
xxxiii
Change Management Process Guide, ITSM Community (Aug. 1, 2006),
http://www.itsmcommunity.org/downloads/Sample_Process_Guide_-
_Change_Management.pdf.
xxxiv
"A system of record (SOR) or Source System of Record (SSoR) is a data management term for
an information storage system (commonly implemented on a computer system) that is the
Page 41
Understanding the New DFS Part 504 Regulations and the Associated AML Program Testing Challenges
authoritative data source for a given data element or piece of information." System of Record,
Wikipedia (last visited Sept. 29, 2016), https://en.wikipedia.org/wiki/System_of_record.
xxxv
DAMA UK Working Group, The Six Primary Dimensions for Data Quality Assessment 8-13
(October, 2013), available at https://www.em360tech.com/wp-
content/files_mf/1407250286DAMAUKDQDimensionsWhitePaperR37.pdf.
xxxvi
Data integrity, Wikipedia (last visited Sept. 29, 2016),
https://en.wikipedia.org/wiki/Data_integrity.
xxxvii
Russell J. Bruemmer & Elijah M. Alper, AML: A Corporate Governance Issue, The Banking Law
Journal, November/December 2013 867, 868, available at
https://www.wilmerhale.com/uploadedFiles/WilmerHale_Shared_Content/Files/PDFs/bruemme
r-alper-banking-law-journal.pdf.
xxxviii
Kathe Dunne, The Expanded Expectations of Corporate Governance in BSA/AML and the
Impact on the Audit Function, Advancing Financial Crime Professionals Worldwide 4 (March
2014), http://www.acams.org/wp-content/uploads/2015/08/The-Expanded-Expectations-of-
Corporate-Governance-in-BSA-AML-and-the-Impact-on-the-A.pdf.
xxxix
Banking Division Transaction Monitoring and Filtering Program Requirements and
Certifications, 3 N.Y.C.R.R §504.3(d).
xl
Management’s Report on Internal Control Over Financial Reporting and Certification of
Disclosure in Exchange Act Periodic Reports, U.S. Securities and Exchange Commission (Aug. 14,
2003), available at https://www.sec.gov/rules/final/33-8238.htm.
xli
Banking Division Transaction Monitoring and Filtering Program Requirements and
Certifications, 3 N.Y.C.R.R §504. Attachment A.
xlii
New York Banking Regulator Issues Anti-Money Laundering Rules for Transaction Monitoring
and Filtering Programs, Sidley (July 7, 2016), http://www.sidley.com/news/2016-07-07-banking-
and-financial-services-update.
xliii
Alistair Gray, New York’s Top Finance Regulator is No 'Clint Eastwood', Financial Times (June
22, 2016), https://www.ft.com/content/64a00f68-388b-11e6-9a05-82a9b15a8ee7.
Page 42