Loading...
Contact us

Glossary

Learn more about our services

a

Abstract Syntax Notation One (ASN 1)

Abstract Syntax Notation One (ASN.1) is a standardized language used for describing data structures in a platform-independent and machine-readable format. It is widely used in telecommunications and computer networking to ensure that data exchanged between systems is interpreted consistently, regardless of the underlying hardware or software.

Account Information Service Provider (AISP)

An Account Information Service Provider (AISP) is a type of financial service provider that, with the customer's consent, accesses and consolidates information from one or more of the customer's payment accounts held with different banks or financial institutions. AISPs offer services that allow customers to view and manage their finances from multiple accounts in one place, typically through an app or online platform.

Accounting and Corporate Regulatory Authority (ACRA)

The Accounting and Corporate Regulatory Authority (ACRA) is the national regulator of business entities, public accountants, and corporate service providers in Singapore.

Account Takeover Fraud (ATO)

Account takeover fraud is a type of cybercrime where an unauthorized individual gains access to a victim's online account, such as banking, email, or social media, by stealing login credentials. Once access is obtained, the fraudster can change account details, make unauthorized transactions, or use the account for further fraudulent activities. This type of fraud often involves phishing, malware, or data breaches to acquire the necessary information. It poses significant risks to both individuals and organizations, leading to financial loss and compromised personal information.

Account Takeover Fraud (ATO)

Account Takeover Fraud (ATO) is a type of cybercrime where an unauthorized individual gains access to a victim's online account, such as banking, email, or social media, often through phishing, data breaches, or malware.

Address Ownership Proof Protocol (AOPP)

AOPP, or Address Ownership Proof Protocol, is a cryptographic standard used in the cryptocurrency industry to verify ownership of a specific blockchain address.

Advanced Data Analytics

Advanced Data Analytics refers to the use of sophisticated techniques and tools to analyze complex data sets, uncover patterns, and derive actionable insights. It involves methods such as machine learning, predictive modeling, and statistical analysis to process large volumes of data from various sources.

Advanced Persistent Threats (APTs)

Advanced Persistent Threats (APTs) are sophisticated and prolonged cyberattacks typically orchestrated by well-funded and skilled adversaries, such as nation-states or organized criminal groups. These threats aim to gain unauthorized access to a network and remain undetected for an extended period, allowing attackers to steal sensitive data, monitor activities, or disrupt operations.

Advance Fee Fraud

Advance Fee Fraud is a type of scam where the perpetrator convinces the victim to pay a fee upfront with the promise of receiving a larger sum of money or a valuable service in return.

Also Known As (AKA)

AKA (also known as) is an abbreviation used to indicate alternative names, nicknames, or aliases for a person, place, or thing. It’s widely used in both formal and informal contexts.

Alternative Investment Market (AIM)

The Alternative Investment Market (AIM) is a sub-market of the London Stock Exchange, established in 1995 to help smaller and growing companies access capital. AIM offers a more flexible regulatory environment compared to the main market, making it attractive for companies seeking to raise funds with fewer listing requirements.

American Depositary Receipt (ADR)

An American Depositary Receipt (ADR) is a financial instrument that represents shares in a foreign company, allowing U.S. investors to trade in international stocks on American stock exchanges. ADRs are issued by U.S. banks and provide a convenient way for investors to diversify their portfolios with foreign equities without dealing with the complexities of international trading.

AML Audit

An AML (Anti-Money Laundering) Audit is a comprehensive review and assessment of an organization's policies, procedures, and controls designed to prevent and detect money laundering activities. This audit ensures compliance with relevant laws and regulations, evaluates the effectiveness of the AML program, identifies potential risks, and recommends improvements.

AML Monitoring

AML Monitoring refers to the process of continuously observing and analyzing financial transactions and activities to detect and prevent money laundering activities. This involves the use of advanced software and analytical tools to identify suspicious patterns, unusual behaviors, and potential compliance violations. Financial institutions and regulatory bodies implement AML (Anti-Money Laundering) monitoring to ensure adherence to legal requirements, protect the integrity of the financial system, and mitigate the risk of financial crimes.

AML Trainings

AML Trainings refer to educational programs and courses designed to equip individuals and organizations with the knowledge and skills necessary to detect, prevent, and report money laundering activities.

Anti Corruption Practices

Anti-corruption practices refer to a set of measures and strategies implemented by governments, organizations, and individuals to prevent, detect, and combat corruption. These practices aim to promote transparency, accountability, and integrity in both public and private sectors.

Anti-Financial Crime (AFC)

Anti-Financial Crime (AFC) refers to the strategies, policies, and measures implemented to detect, prevent, and combat illegal activities related to finance, such as money laundering, fraud, corruption, and terrorist financing.

Anti-Financial Fraud (AFF)

Anti-Financial Fraud (AFF) refers to the strategies, practices, and technologies implemented to detect, prevent, and combat fraudulent activities in financial systems. This includes safeguarding against identity theft, credit card fraud, money laundering, and other illicit financial schemes.

Anti-Money Laundering Act (AMLA)

The Anti-Money Laundering Act (AMLA) is a legislative framework designed to prevent and combat money laundering activities. It establishes legal and regulatory measures that financial institutions and other entities must follow to detect and report suspicious financial transactions.

Anti-Money Laundering (AML)

Anti-Money Laundering (AML) refers to a set of laws, regulations, and procedures designed to prevent criminals from disguising illegally obtained funds as legitimate income. AML policies aim to detect and report suspicious financial activities, ensuring that financial institutions and other regulated entities identify and mitigate risks associated with money laundering.

Anti-Money Laundering Compliance (AMLC)

AMLC stands for Anti-Money Laundering Compliance. It refers to the set of procedures, laws, and regulations designed to prevent the practice of generating income through illegal actions. AMLC involves the implementation of policies and controls by financial institutions and other regulated entities to detect, report, and prevent money laundering activities.

Anti-Money Laundering Directive (AMLD)

AMLD stands for Anti-Money Laundering Directive. It is a set of regulations and guidelines established by the European Union to prevent money laundering and terrorist financing. The directive requires financial institutions and other regulated entities to implement robust customer due diligence, reporting, and record-keeping measures to detect and prevent illicit financial activities.

Anti-Money Laundering Program (AML Program)

An Anti-Money Laundering Program (AML Program) is a set of procedures, policies, and controls implemented by financial institutions and other regulated entities to detect, prevent, and report money laundering activities.

Anti-Phishing Group (APG)

The Anti-Phishing Group (APG) is an organization or collective initiative focused on combating phishing attacks, which are fraudulent attempts to obtain sensitive information such as usernames, passwords, and credit card details by disguising as a trustworthy entity in electronic communications.

Application Programming Interface (API)

An Application Programming Interface (API) is a set of rules and protocols that allows different software applications to communicate with each other. It defines the methods and data formats that applications can use to request and exchange information, enabling seamless integration and functionality across diverse systems.

Asset-Backed Token (ABT)

An Asset-Backed Token (ABT) is a type of digital token that represents ownership of a tangible or intangible asset, such as real estate, commodities, or financial instruments. These tokens are typically issued on blockchain platforms, providing a secure and transparent way to trade and manage assets.

Asset Freeze

An "Asset Freeze" is a legal measure that restricts an individual or entity from accessing or transferring their financial assets. This action is typically imposed by courts or regulatory authorities to prevent the dissipation of assets during legal proceedings, investigations, or sanctions.

Asset Protection Trusts

An Asset Protection Trust (APT) is a legal structure designed to safeguard an individual's assets from creditors, lawsuits, or other financial liabilities. Typically established in jurisdictions with favorable trust laws, such as certain U.S. states or offshore locations, APTs provide a high level of confidentiality and security.

Association of Certified Anti-Money Laundering Specialists (ACAMS)

The Association of Certified Anti-Money Laundering Specialists (ACAMS) is a leading international organization dedicated to enhancing the knowledge and skills of professionals in the field of anti-money laundering (AML) and financial crime prevention.

Association Of Chartered Certified Accountants (ACCA)

The Association of Chartered Certified Accountants (ACCA) is a globally recognized professional accounting body that offers the Chartered Certified Accountant qualification.

Auction Rate Securities (ARS)

Auction Rate Securities (ARS) are a type of long-term financial instrument with interest rates or dividend yields that are periodically reset through auctions, typically every 7, 28, or 35 days. These securities are often issued by municipalities, corporations, or student loan companies and are designed to act like short-term investments due to their frequent rate adjustments.

Australian Transaction Reports and Analysis Centre (AUSTRAC)

AUSTRAC, short for the Australian Transaction Reports and Analysis Centre, is Australia's financial intelligence agency and regulatory body. It is responsible for monitoring financial transactions to detect and prevent money laundering, terrorism financing, and other serious financial crimes. AUSTRAC works closely with law enforcement agencies, regulatory bodies, and international partners to ensure the integrity of Australia's financial system.

Authentication to Authorization (A2A)

Authentication to Authorization (A2A) refers to the process of securely verifying a user's identity (authentication) and then determining their access rights and permissions (authorization) within a system or application.

Authorized Deposit Taking Institution (ADI)

An Authorized Deposit-Taking Institution (ADI) is a financial entity that has been granted permission by a regulatory authority to accept deposits from the public.

Automated Clearing House (ACH)

The Automated Clearing House (ACH) is an electronic network used in the United States for financial transactions. It facilitates the transfer of funds between banks and financial institutions, enabling direct deposits, bill payments, and other types of electronic money transfers.

Automated Risk Tool (ART)

The Automated Risk Tool (ART) is a sophisticated software solution designed to identify, assess, and manage potential risks within an organization or project. By leveraging advanced algorithms and data analytics, ART provides real-time insights and predictive modeling to help decision-makers mitigate threats and enhance strategic planning. Its user-friendly interface and customizable features make it an essential tool for improving risk management efficiency and ensuring compliance with industry standards.

Automated Teller Machine (ATM)

An Automated Teller Machine (ATM) is an electronic banking device that allows customers to perform financial transactions without the need for a human teller.

b

Backtesting

Backtesting is a financial analysis process used to evaluate the effectiveness of a trading strategy or model by applying it to historical market data. This method helps traders and analysts assess how a strategy would have performed in the past, providing insights into its potential future performance.

Bankers' Automated Clearing Services (BACS)

Bankers' Automated Clearing Services (BACS) is a UK-based electronic system that facilitates the transfer of funds between banks. It is commonly used for processing direct debits and direct credits, such as salary payments, pensions, and other regular financial transactions.

Bank For International Settlements (BIS)

The Bank for International Settlements (BIS) is an international financial institution that serves as a bank for central banks, promoting global monetary and financial stability.

Bank Identifier Code (BIC)

The Bank Identifier Code (BIC) is an international standard used to uniquely identify banks and financial institutions worldwide. It is an 8 or 11-character code that facilitates secure and efficient communication and transactions between banks, particularly in international transfers.

Banking As A Service (BaaS)

Banking as a Service (BaaS) is a financial technology model that enables third-party companies, such as fintech firms or non-banking businesses, to offer banking services by integrating with traditional banks' infrastructure via APIs.

Banking Secrecy Regulation

Banking Secrecy Regulation refers to the legal framework that governs the confidentiality of client information held by financial institutions. These regulations are designed to protect the privacy of individuals and businesses by restricting the disclosure of their financial data without consent.

Bank of England (BOE)

The Bank of England (BOE) is the central bank of the United Kingdom, established in 1694. It is responsible for issuing currency, maintaining monetary stability, and overseeing the country's financial system. The BOE sets interest rates to control inflation and support economic growth, and it acts as a lender of last resort to the banking sector.

Bank Secrecy

Bank secrecy refers to the legal principle and practice that ensures the confidentiality of clients' financial information held by banks.

Bank Secrecy Act (BSA)

The Bank Secrecy Act (BSA), enacted in 1970, is a U.S. law designed to combat money laundering and other financial crimes. It requires financial institutions to maintain records and file reports on certain transactions, particularly those exceeding $10,000, to help detect and prevent illegal activities.

Bar Council

The Bar Council is a professional body responsible for regulating and representing barristers, who are specialist legal advocates, in certain jurisdictions. It ensures the maintenance of professional standards, provides guidance and support to its members, and works to uphold the rule of law and access to justice.

Basel Committee on Banking Supervision

The Basel Committee on Banking Supervision (BCBS) is an international regulatory body that formulates broad supervisory standards and guidelines for banks. Established by the central bank governors of the Group of Ten (G10) countries in 1974, the committee aims to enhance financial stability by improving the quality of banking supervision worldwide.

Batch Processing

Batch processing in data refers to the execution of a series of tasks or transactions on a large volume of data as a single group or "batch." This approach is typically used when the data processing does not need to occur in real-time and can be scheduled to run at specific intervals.

Behavioral Biometrics

Behavioral biometrics refers to the identification and verification of individuals based on their unique patterns of behavior. Unlike traditional biometrics, which rely on physical characteristics like fingerprints or facial features, behavioral biometrics analyze actions such as typing rhythm, mouse movements, gait, and even voice patterns.

Beneficial Owner

A beneficial owner is an individual or entity that ultimately owns, controls, or benefits from an asset, property, or company, even if the title or legal ownership is in another name.

Beneficial Ownership

Beneficial Ownership refers to the rights and privileges of ownership over an asset or property, even if the title is in another name. A Beneficial Owner is the individual or entity that ultimately benefits from or has control over an asset, such as shares in a company, despite not being the nominal owner. This concept is crucial in financial and legal contexts to ensure transparency, prevent fraud, and combat money laundering by identifying the true individuals who hold significant influence or control over an entity.

Blacklist

Blacklist refers to a list of individuals, entities, or items that are denied access, privileges, or recognition due to specific reasons such as security concerns, non-compliance, or misconduct. This list is used in various contexts, including cybersecurity, finance, and employment, to prevent unauthorized or undesirable actions.

Black Market Peso Exchange

The Black Market Peso Exchange (BMPE) is an underground financial system primarily used in Latin America, particularly Colombia, to launder money derived from illegal activities such as drug trafficking. In this scheme, drug traffickers sell their U.S. dollars to brokers at a discounted rate.

Blockchain Analysis

Blockchain Analysis refers to the process of examining, interpreting, and visualizing data on blockchain networks. This involves tracking transactions, identifying patterns, and understanding the flow of digital assets to uncover insights, detect fraudulent activities, ensure regulatory compliance, and enhance security.

Blockchain Analytics

Blockchain analytics refers to the process of examining, interpreting, and visualizing data on blockchain networks. It involves using specialized tools and techniques to track transactions, monitor network activity, and gain insights into patterns and trends. This analysis helps in enhancing transparency, ensuring compliance, detecting fraudulent activities, and making informed decisions in various sectors such as finance, supply chain, and cybersecurity.

Block List

A block list is a compilation of entities, such as email addresses, phone numbers, IP addresses, or user accounts, that are restricted or denied access to a particular service, platform, or network. This list is often used to prevent unwanted communication, enhance security, and protect against spam, fraud, or other malicious activities.

Bureau Of Industry And Security (BIS)

The Bureau of Industry and Security (BIS) is a U.S. government agency within the Department of Commerce. It is responsible for advancing national security, foreign policy, and economic objectives by regulating the export of sensitive goods, technologies, and software.

Business Continuity (BC)

Business Continuity (BC) refers to the strategic and tactical capability of an organization to plan for and respond to incidents and disruptions in order to continue business operations at an acceptable predefined level.

Business Email Compromise (BEC)

Business Email Compromise (BEC) is a type of cybercrime where attackers use email fraud to target businesses, often with the goal of tricking employees into transferring money or revealing sensitive information.

Business Risk Management System (BRMS)

A Business Risk Management System (BRMS) is a structured framework designed to identify, assess, and mitigate risks that could potentially impact an organization's operations and objectives. It integrates risk management practices into business processes, enabling companies to proactively address uncertainties and minimize potential threats.

Business Rule

A Business Rule is a specific, actionable directive or guideline that defines or constrains some aspect of business operations.

Business Rules Management System

A Business Rules Management System (BRMS) is a software solution designed to define, deploy, monitor, and maintain the complex decision logic used by an organization. It allows businesses to automate decision-making processes by managing and executing business rules, which are the specific conditions and actions that guide business operations.

Buy Now

Buy Now is a call-to-action phrase commonly used in marketing and e-commerce to prompt customers to make an immediate purchase. It is designed to create a sense of urgency and encourage quick decision-making by highlighting the availability of a product or service for immediate acquisition.

Buy Now Pay Later (BNPL)

Buy Now Pay Later (BNPL) is a financial service that allows consumers to purchase goods or services immediately and pay for them over time through a series of interest-free installments. This payment option is often integrated into online and in-store checkout processes, providing a flexible alternative to traditional credit cards.

c

Capital Requirements Regulation (CRR)

The Capital Requirements Regulation (CRR) is a key component of the European Union's financial regulatory framework, aimed at ensuring the stability and resilience of financial institutions. It sets out the minimum capital requirements that banks and other financial entities must hold to cover their risks and safeguard against financial distress.

Card not present

"Card not present" refers to a type of transaction where the physical credit or debit card is not physically presented to the merchant at the time of the transaction. This typically occurs in online purchases, phone orders, or mail orders.

Card Not Present Fraud

Card Not Present (CNP) Fraud refers to a type of fraudulent activity that occurs when a transaction is made without the physical presence of a credit or debit card.

Cash Transaction Report (CTR)

A Cash Transaction Report (CTR) is a mandatory financial document that financial institutions in the United States must file with the Financial Crimes Enforcement Network (FinCEN) for any cash transaction exceeding $10,000.

Central Bank (CB)

A Central Bank (CB) is a national financial institution responsible for managing a country's currency, money supply, and interest rates. It plays a crucial role in maintaining economic stability by implementing monetary policy, regulating and supervising the banking industry, and serving as a lender of last resort to banks during financial crises.

Central Bank Digital Currency (CBDC)

Central Bank Digital Currency (CBDC) is a digital form of a country's national currency issued and regulated by its central bank. Unlike cryptocurrencies, CBDCs are centralized and aim to combine the efficiency and security of digital transactions with the trust and stability of traditional fiat currencies.

Certified Anti-Money Laundering Specialist (CAMS)

The Certified Anti-Money Laundering Specialist (CAMS) is a globally recognized certification for professionals in the financial industry who specialize in detecting and preventing money laundering and financial crimes.

Certified Financial Analyst (CFA)

The Certified Financial Analyst (CFA) designation is a prestigious professional credential offered by the CFA Institute, primarily for investment and financial professionals. It is recognized globally and signifies a high level of expertise in investment management, financial analysis, and ethical standards.

Chargeback Fraud

Chargeback fraud, also known as friendly fraud, occurs when a consumer makes a legitimate purchase with their credit card and then disputes the charge with their bank, falsely claiming the transaction was unauthorized or that the goods or services were not received.

Chief Executive Officer (CEO)

A Chief Executive Officer (CEO) is the highest-ranking executive in a company, responsible for making major corporate decisions, managing overall operations, and serving as the main point of communication between the board of directors and corporate operations.

Chief Financial Officer (CFO)

The Chief Financial Officer (CFO) is a senior executive responsible for managing the financial actions of a company. This role involves overseeing financial planning, risk management, record-keeping, and financial reporting.

Client Due Diligence (CDD)

Client Due Diligence (CDD) is a process used by financial institutions and businesses to verify the identity and assess the risk profile of their clients.

Client Lifecycle Compliance (CLC)

Client Lifecycle Compliance (CLC) refers to the systematic approach of ensuring that a company's interactions with its clients adhere to regulatory and legal standards throughout the entire client relationship.

Client Lifecycle Management (CLM)

Client Lifecycle Management (CLM) refers to the comprehensive approach businesses use to manage and optimize their interactions with clients throughout the entire duration of their relationship. This process encompasses various stages, including client acquisition, onboarding, engagement, retention, and renewal or termination.

Commission de Surveillance du Secteur Financier (CSSF)

CSSF stands for the Commission de Surveillance du Secteur Financier, which is the financial regulatory authority in Luxembourg. It oversees and ensures the stability, transparency, and proper functioning of the financial sector, including banks, investment firms, and other financial institutions.

Committee on Foreign Affairs (COFA)

The Committee on Foreign Affairs (COFA) is a legislative body typically found within governmental structures, such as parliaments or congresses, responsible for overseeing and shaping foreign policy and international relations.

Common Foreign and Security Policy (CFSP)

CFSP stands for Common Foreign and Security Policy. It is a key component of the European Union's external action, aimed at promoting international peace and security, democracy, and the rule of law.

Common Reporting Standard

The Common Reporting Standard (CRS) is an international framework developed by the Organisation for Economic Co-operation and Development (OECD) to facilitate the automatic exchange of financial account information between participating countries.

Compliance

Compliance refers to the act of adhering to and following established rules, regulations, standards, or laws set by governing bodies, organizations, or industry standards. It involves ensuring that business operations, processes, and practices meet legal and ethical requirements to avoid penalties, legal issues, or reputational damage.

Compliance Monitoring Program

A Compliance Monitoring Program is a systematic approach used by organizations to ensure adherence to legal, regulatory, and internal policy requirements. It involves the continuous review and assessment of processes, activities, and systems to identify and rectify non-compliance issues.

Compliance Officer

A Compliance Officer is a professional responsible for ensuring that an organization adheres to legal standards, regulatory requirements, and internal policies. They develop and implement compliance programs, conduct audits, and provide training to staff to prevent violations.

Compliance Officer for Legal Practice (COLP)

A Compliance Officer for Legal Practice (COLP) is responsible for ensuring that a law firm complies with all relevant legal and regulatory requirements. The COLP's duties include monitoring the firm’s adherence to professional standards, managing risk, and reporting any serious breaches of compliance to regulatory bodies such as the Solicitors Regulation Authority (SRA).

Compliance Policy Framework

A Compliance Policy Framework is a structured set of guidelines and procedures designed to ensure that an organization adheres to legal, regulatory, and ethical standards. It provides a systematic approach for managing compliance risks, establishing accountability, and promoting a culture of integrity within the organization.

Compliance Risk Assessment

Compliance Risk Assessment is a systematic process used by organizations to identify, evaluate, and manage the risk of non-compliance with legal, regulatory, and internal policy requirements. This assessment helps organizations understand potential vulnerabilities and the impact of non-compliance on their operations, reputation, and financial standing.

Conflict Of Interest

A conflict of interest occurs when an individual or organization has competing interests or loyalties that could potentially influence their decision-making or actions. This situation often arises when personal, financial, or other considerations have the potential to compromise professional judgment and objectivity.

Consumer Fraud

Consumer fraud refers to deceptive practices that result in financial or personal losses for consumers. This type of fraud can occur through various means, such as false advertising, identity theft, pyramid schemes, or selling counterfeit goods.

Continuing Professional Development (CPD)

Continuing Professional Development (CPD) refers to the ongoing process of learning and development that professionals engage in to enhance their skills, knowledge, and competencies throughout their careers.

Corporate Alternative Minimum Tax (CAMT)

The Corporate Alternative Minimum Tax (CAMT) is a tax provision designed to ensure that large corporations pay a minimum level of tax, regardless of deductions, credits, or other tax benefits that might otherwise reduce their tax liability.

Corporate Social Responsibility (CSR)

Corporate Social Responsibility (CSR) refers to a business model in which companies integrate social and environmental concerns into their operations and interactions with stakeholders. It involves going beyond legal obligations to voluntarily contribute to a better society and a cleaner environment.

Corporate Transparency Act

The Corporate Transparency Act is a U.S. law enacted to enhance financial transparency and combat illicit activities such as money laundering and tax evasion. It requires certain corporations and limited liability companies to disclose information about their beneficial owners to the Financial Crimes Enforcement Network (FinCEN).

Correspondent Bank

A Correspondent Bank is a financial institution that provides services on behalf of another bank, typically in a different country. These services can include facilitating wire transfers, conducting business transactions, accepting deposits, and gathering documents. Correspondent banks act as intermediaries, enabling domestic banks to access international financial markets and conduct cross-border transactions efficiently.

Countering Proliferation Financing (CPF)

Countering Proliferation Financing (CPF) refers to the strategies and measures implemented to prevent and disrupt the flow of financial resources that support the proliferation of weapons of mass destruction (WMD) and their delivery systems.

Countering The Financing Of Terrorism (CFT)

Countering the Financing of Terrorism (CFT) refers to the strategies and measures implemented to detect, prevent, and disrupt the financial networks that support terrorist activities.

Counterparty

Counterparty refers to the other party involved in a financial transaction or contract. In the context of trading, investing, or financial agreements, the counterparty is the entity on the opposite side of the deal, such as a buyer if you are selling, or a seller if you are buying.

Counter-Terrorism Financing (CTF)

Counter-Terrorism Financing (CTF) refers to the strategies and measures implemented to detect, prevent, and disrupt the flow of funds to terrorist organizations. This involves monitoring financial transactions, enhancing regulatory frameworks, and fostering international cooperation to identify and block sources of funding.

Credit card fraud

Credit card fraud is a form of identity theft that involves unauthorized use of someone else's credit card information to make purchases or access funds. This type of fraud can occur through various methods, such as phishing scams, data breaches, or physical theft of the card.

Credit Cards

Credit cards are financial tools issued by banks or financial institutions that allow cardholders to borrow funds to pay for goods and services. They offer a convenient way to make purchases, both in-person and online, and often come with benefits such as rewards, cashback, and travel perks.

Credit Card Skimming

Credit card skimming is a form of theft where criminals use a small device to illegally capture and store the data from the magnetic stripe of a credit card during a legitimate transaction. This device, often discreetly attached to ATMs, gas station pumps, or point-of-sale terminals, allows the thief to clone the card and make unauthorized purchases.

Criminal Law

Criminal Law is a branch of law that deals with behaviors and actions that are considered offenses against the state or public, distinguishing them from civil wrongs. It involves the prosecution by the government of a person for an act that has been classified as a crime.

Criminal Organizations

Criminal organizations are structured groups engaged in illegal activities for profit, power, or influence. These entities often operate in a hierarchical manner and may be involved in various illicit activities such as drug trafficking, money laundering, extortion, and human trafficking.

Critical Threat Intelligence

Critical Threat Intelligence refers to the process of gathering, analyzing, and interpreting information about potential or existing threats that pose significant risks to an organization's security.

Cross Border Payments

Cross Border Payments refer to financial transactions where the payer and the recipient are located in different countries. These payments can involve individuals, businesses, or financial institutions and typically require currency conversion, compliance with international regulations, and the use of intermediary banks or payment networks.

Crypto Asset Service Provider (CASP)

A Crypto Asset Service Provider (CASP) is an entity or organization that offers services related to cryptocurrencies and digital assets. These services can include the exchange, transfer, custody, or management of crypto assets.

Cryptocurrency Fraud

Cryptocurrency fraud refers to illegal activities involving digital currencies, where scammers deceive individuals or organizations to steal funds or sensitive information. Common types include Ponzi schemes, phishing attacks, fake initial coin offerings (ICOs), and pump-and-dump schemes.

Crypto Mixer

Crypto mixers enhance privacy by obscuring the origin of cryptocurrency transactions, but they raise significant regulatory concerns, especially around money laundering. This article explores how crypto mixers work, their risks, regulatory challenges, and the evolving legal landscape surrounding their use.

Crypto Scam

A crypto scam is a fraudulent scheme involving cryptocurrencies, where scammers deceive individuals into investing in fake or non-existent digital assets, promising high returns with little risk.

Cuckoo Smurfing

Cuckoo Smurfing is a sophisticated money laundering technique where illicit funds are disguised as legitimate transactions. This method involves depositing small amounts of dirty money into the bank accounts of unsuspecting individuals or businesses, often through international transfers.

Currency Transaction Report (CTR)

A Currency Transaction Report (CTR) is a mandatory financial document that U.S. financial institutions must file with the Financial Crimes Enforcement Network (FinCEN) for any transaction exceeding $10,000.

Custodial Wallet

A custodial wallet is a type of digital wallet where a third party, such as a cryptocurrency exchange or financial institution, holds and manages the private keys on behalf of the user. This means that the custodian has control over the user's funds and is responsible for securing them.

Custodian

A custodian is an individual or entity responsible for the care, management, and oversight of assets or property on behalf of another party. This role often involves safeguarding financial assets, maintaining records, and ensuring compliance with relevant regulations. In a broader context, custodians can also refer to individuals responsible for the maintenance and cleanliness of a physical space, such as a building or facility.

Customer Due Diligence (CDD)

Customer Due Diligence (CDD) is a critical process used by financial institutions and businesses to verify the identity of their clients and assess potential risks of illegal activities, such as money laundering or terrorist financing.

Customer Identification Program (CIP)

The Customer Identification Program (CIP) is a regulatory requirement for financial institutions to verify the identity of their customers.

Cybercrime Prevention Framework

The Cybercrime Prevention Framework is a structured approach designed to protect individuals, organizations, and governments from cyber threats and criminal activities conducted via the internet. It encompasses a range of strategies, policies, and technologies aimed at identifying, mitigating, and responding to cybercrime.

Cybersecurity Maturity Model Certification (CMMC)

The Cybersecurity Maturity Model Certification (CMMC) is a framework developed by the U.S. Department of Defense (DoD) to enhance the protection of sensitive information within the Defense Industrial Base (DIB) sector.

d

Data Protection Act 2018 (DPA 2018)

The Data Protection Act 2018 (DPA 2018) is a UK law that governs the processing of personal data. It implements the General Data Protection Regulation (GDPR) into UK law, providing a framework for data protection and privacy rights.

Data Protection Officer (DPO)

A Data Protection Officer (DPO) is a designated individual responsible for overseeing an organization's data protection strategy and ensuring compliance with data protection laws and regulations, such as the General Data Protection Regulation (GDPR) in the European Union.

Data Transfer Initiative (DTI)

The Data Transfer Initiative (DTI) is a collaborative effort aimed at facilitating the seamless and secure exchange of data between different systems, platforms, or organizations.

Dealer In Precious Metals And Stones (DPMS)

A Dealer in Precious Metals and Stones (DPMS) is a business or individual engaged in the buying, selling, or trading of valuable commodities such as gold, silver, platinum, diamonds, and other gemstones. These dealers often operate in markets that require expertise in assessing the quality, authenticity, and market value of these precious items.

Debit Cards

Debit cards are financial tools linked directly to a user's bank account, allowing for electronic transactions and cash withdrawals.

Debt Collection Agency (DCA)

Debt Collection Agency (DCA) is a specialized organization that acts on behalf of creditors to recover unpaid debts from individuals or businessesYou can cancel the execution by clearing this cell.

Decentralized Finance (DeFi)

Decentralized Finance (DeFi) refers to a financial ecosystem built on blockchain technology that aims to recreate and improve upon traditional financial systems without the need for centralized intermediaries like banks or brokerages.

Decentralized Identifiers (DIDs)

Decentralized Identifiers (DIDs) are a new type of identifier that enables verifiable, self-sovereign digital identities. Unlike traditional identifiers, such as email addresses or usernames, DIDs are not tied to a centralized registry, authority, or intermediary.

Defence Against Money Laundering (DAML)

Defence Against Money Laundering refers to the measures and practices implemented by financial institutions, businesses, and regulatory bodies to detect, prevent, and report money laundering activities.

Deferred Prosecution Agreement (DPA)

A Deferred Prosecution Agreement (DPA) is a legal arrangement between a prosecutor and a corporation or individual accused of wrongdoing. Under a DPA, the prosecution agrees to grant amnesty or defer prosecution for a specified period, provided the accused meets certain conditions, such as paying fines, implementing compliance measures, or cooperating with ongoing investigations.

Denied Persons List

The Denied Persons List (DPL) is a roster maintained by the U.S. Department of Commerce that includes individuals and entities who are prohibited from participating in export transactions. These restrictions are typically imposed due to violations of export control regulations, national security concerns, or other legal infractions.

Designated Premises License (DPL)

A Designated Premises License (DPL) is a legal authorization required in certain jurisdictions for venues that intend to sell or supply alcohol, provide regulated entertainment, or serve late-night refreshments.

Digital Operational Resilience Act

The Digital Operational Resilience Act (DORA) is a regulatory framework established by the European Union aimed at enhancing the digital resilience of financial institutions.

Distributed Applications (DAPP)

Distributed Applications (DApps) are software applications that run on a decentralized network, typically leveraging blockchain technology. Unlike traditional applications that rely on a centralized server, DApps operate on a peer-to-peer network, ensuring greater transparency, security, and resilience against single points of failure.

Double Taxation Agreement (DTA)

A Double Taxation Agreement (DTA) is a treaty between two or more countries designed to prevent individuals and businesses from being taxed twice on the same income.

Dubai International Financial Centre (DIFC)

Dubai International Financial Centre (DIFC) is a leading global financial hub in the Middle East, Africa, and South Asia (MEASA) region. Established in 2004, it provides a world-class platform for financial institutions and businesses to operate, offering a robust regulatory framework, a common law system, and a tax-friendly environment.

Due Diligence

Due diligence is a comprehensive appraisal or investigation conducted to assess the value, risks, and potential of a business or investment opportunity. It involves a thorough examination of financial records, legal obligations, operational practices, and other critical factors to ensure informed decision-making and mitigate potential risks. This process is commonly used in mergers and acquisitions, real estate transactions, and other significant business dealings.

Due Diligence Documentation

Due Diligence Documentation refers to the comprehensive set of documents and information collected and reviewed during the due diligence process.

e

Electronic Bank Account Management (eBAM)

eBAM (electronic Bank Account Management) is a digital solution designed to streamline and automate the management of bank accounts for businesses.

Electronic Data Interchange (EDI)

Electronic Data Interchange (EDI) is a standardized method for exchanging business documents and data between organizations in a digital format. It replaces traditional paper-based communication, enabling faster, more accurate, and efficient transactions.

Electronic Data Interchange for Administration, Commerce, and Transport (EDIFACT)

EDIFACT (Electronic Data Interchange for Administration, Commerce, and Transport) is an international standard developed by the United Nations for the electronic exchange of business documents. It facilitates the automated, standardized communication of data between organizations, enhancing efficiency and reducing errors in transactions such as orders, invoices, and shipping notices. EDIFACT is widely used across various industries to streamline operations and improve interoperability in global trade.

Electronic Funds Transfer (EFT)

Electronic Funds Transfer (EFT) is a digital payment system that enables the transfer of money between bank accounts without the need for paper-based transactions. This method facilitates quick and secure financial transactions, such as direct deposits, online bill payments, and wire transfers, by using electronic networks.

Electronic Identification and Verification (EIV)

Electronic Identification and Verification (EIV) refers to processes or systems used to electronically verify the identity of individuals or entities. These systems typically involve using various data sources, such as government databases, credit bureaus, or other trusted data providers, to confirm a person's identity.

Electronic Know Your Customer (eKYC)

eKYC, or electronic Know Your Customer, is a digital process used by businesses and financial institutions to verify the identity of their clients. This method leverages technology to streamline and automate the traditional KYC procedures, making it faster, more efficient, and secure.

Electronic Money Institution (EMI)

An Electronic Money Institution (EMI) is a financial entity authorized to issue electronic money, which is a digital alternative to cash. EMIs provide services such as electronic payment solutions, digital wallets, and prepaid cards, enabling users to store, transfer, and manage money electronically.

Electronic Payment Interface (EPI)

The Electronic Payment Interface (EPI) is a digital platform that facilitates seamless financial transactions between consumers and businesses. It enables the transfer of funds electronically, eliminating the need for physical cash or checks.

Electronic Verification

Electronic Verification is a digital process used to confirm the authenticity of a person's identity or the validity of a document. This method leverages electronic databases and technologies to cross-check information, ensuring accuracy and reducing the risk of fraud.

Embargo

An embargo is a government-imposed restriction or ban on trade or the exchange of goods, services, or information with a particular country or entity. It is often used as a political tool to exert pressure or influence, typically in response to political disagreements, human rights violations, or security concerns.

Enhanced Customer Due Diligence

Enhanced Customer Due Diligence (ECDD) is a comprehensive process used by financial institutions and businesses to assess and manage the risk associated with high-risk customers or transactions.

Enhanced Due Diligence

Enhanced Due Diligence (EDD) refers to a rigorous and comprehensive process of investigating and assessing potential risks associated with high-risk customers or transactions.

Eurasian Group On Combating Money Laundering And Terrorist Financing (EAG)

The Eurasian Group on Combating Money Laundering and Terrorist Financing (EAG) is a regional intergovernmental organization focused on enhancing cooperation and implementing international standards to combat money laundering and the financing of terrorism.

European Banking Authority (EBA)

The European Banking Authority (EBA) is a regulatory agency of the European Union established in 2011. Its primary role is to ensure effective and consistent prudential regulation and supervision across the European banking sector.

European Economic Area (EEA)

The European Economic Area (EEA) is a regional trade agreement that extends the European Union's single market to non-EU countries, specifically Iceland, Liechtenstein, and Norway. Established in 1994, the EEA allows these countries to participate in the EU's internal market, enabling the free movement of goods, services, capital, and people.

European Payments Council (EPC)

The European Payments Council (EPC) is a coordination and decision-making body that represents the European banking industry in relation to payments. It is responsible for developing and promoting the Single Euro Payments Area (SEPA), which aims to simplify and harmonize euro transactions across Europe.

European Union (EU)

The European Union (EU) is a political and economic union of 27 European countries that are located primarily in Europe. Established to foster economic cooperation and prevent conflict, the EU has developed a single market allowing for the free movement of goods, services, capital, and people. It also implements common policies on trade, agriculture, fisheries, and regional development.

Europol

Europol, or the European Union Agency for Law Enforcement Cooperation, is an EU agency that assists member states in their fight against serious international crime and terrorism. Established in 1999 and headquartered in The Hague, Netherlands, Europol facilitates information exchange, intelligence analysis, and operational coordination among law enforcement authorities across Europe.

Evasion

Evasion refers to the act of avoiding or escaping from something, often through cleverness or deceit. It can apply to various contexts, such as evading taxes, eluding capture, or sidestepping questions. Evasion typically involves strategies or tactics to circumvent rules, responsibilities, or confrontations.

Export Administration Regulations (EAR)

The Export Administration Regulations (EAR) are a set of rules administered by the U.S. Department of Commerce's Bureau of Industry and Security (BIS).

f

FATF Recommendations

The FATF Recommendations are a set of international standards developed by the Financial Action Task Force (FATF) to combat money laundering, terrorist financing, and other related threats to the integrity of the international financial system.

Fiat Money

Fiat money is a type of currency that is issued by a government and holds value not because it is backed by a physical commodity like gold or silver, but because of the trust and confidence that people have in the issuing authority.

Financial Action Plan

A Financial Action Plan is a strategic roadmap designed to help individuals or organizations achieve their financial goals. It outlines specific actions, timelines, and resources needed to manage finances effectively, including budgeting, saving, investing, and debt management.

Financial Action Task Force (FATF)

The Financial Action Task Force (FATF) is an intergovernmental organization established in 1989 to develop and promote policies aimed at combating money laundering, terrorist financing, and other related threats to the integrity of the international financial system.

Financial Action Task Force Recommendations

The Financial Action Task Force Recommendations are a set of international standards aimed at combating money laundering, terrorist financing, and other related threats to the integrity of the global financial system.

Financial Conduct Authority (FCA)

The Financial Conduct Authority (FCA) is a regulatory body in the United Kingdom responsible for overseeing the financial services industry. Its primary objectives are to protect consumers, ensure market integrity, and promote effective competition. The FCA regulates financial firms, sets standards for conduct, and enforces compliance to maintain trust and stability in the financial markets.

Financial Crimes Enforcement Network (FinCEN)

The Financial Crimes Enforcement Network (FinCEN) is a bureau of the U.S. Department of the Treasury that aims to safeguard the financial system from illicit use, combat money laundering, and promote national security through the collection, analysis, and dissemination of financial intelligence.

Financial Institution

A financial institution is an organization that provides financial services to individuals, businesses, and governments. These services can include accepting deposits, providing loans, managing investments, and offering financial advice.

Financial Institutions Reform

Financial Institutions Reform refers to the process of implementing changes and improvements in the regulatory and operational frameworks governing financial institutions.

Financial Intelligence Unit (FIU)

A Financial Intelligence Unit (FIU) is a government agency responsible for collecting, analyzing, and disseminating financial information to combat money laundering, terrorist financing, and other financial crimes.

Financially Exposed Persons (FEPs)

Financially Exposed Persons (FEPs) are individuals who, due to their position or influence, have greater exposure to financial risks, such as corruption, money laundering, or bribery.

Financially Significant Entity (FSE)

A Financially Significant Entity (FSE) refers to an organization or institution whose financial activities, size, or market influence are substantial enough to impact the broader financial system or economy.

Financial Stability Oversight Council (FSOC)

The Financial Stability Oversight Council (FSOC) is a U.S. government organization established under the Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010. Its primary purpose is to identify and monitor risks to the financial stability of the United States, promote market discipline, and respond to emerging threats to the financial system. The FSOC is composed of key financial regulators, including the Secretary of the Treasury, who serves as the chairperson, and representatives from various federal and state financial regulatory agencies. The council has the authority to designate certain non-bank financial institutions as systemically important, subjecting them to enhanced regulatory oversight.

Financial Technology (Fintech)

Financial Technology, commonly known as Fintech, refers to the innovative use of technology to deliver financial services and solutions. It encompasses a wide range of applications, including mobile banking, online payment systems, peer-to-peer lending, cryptocurrency, and robo-advisors.

Foreign Account Tax Compliance Act (FATCA)

The Foreign Account Tax Compliance Act (FATCA) is a U.S. federal law enacted in 2010 aimed at combating tax evasion by U.S. taxpayers holding financial assets outside the United States.

Foreign Corrupt Practices Act (FCPA)

The Foreign Corrupt Practices Act (FCPA) is a United States federal law enacted in 1977 aimed at preventing bribery and corruption in international business transactions. It prohibits U.S. individuals and entities from offering, paying, or authorizing payments to foreign government officials for the purpose of obtaining or retaining business.

Foreign Exchange (FX)

Foreign Exchange (FX) refers to the global marketplace where currencies are traded. It is the largest and most liquid financial market in the world, operating 24 hours a day, five days a week. Participants in the FX market include banks, financial institutions, corporations, governments, and individual traders.

Foreign Investment in Real Property Tax Act (FIRPTA)

The Foreign Investment in Real Property Tax Act (FIRPTA) is a United States tax law enacted in 1980 that imposes income tax on foreign individuals and entities selling real estate located in the U.S.

Fraud Detection, Anti-Money Laundering, and Compliance (FRAML)

FRAML stands for Fraud Detection, Anti-Money Laundering, and Compliance. It is a comprehensive approach used by financial institutions and businesses to identify, prevent, and manage fraudulent activities and money laundering schemes.

Fraud Prevention

Fraud prevention refers to the strategies and measures implemented to detect, deter, and mitigate fraudulent activities. It involves using technology, policies, and procedures to protect individuals and organizations from financial and reputational harm.

Fraudulent charities

Fraudulent charities are deceptive organizations that pose as legitimate charitable entities to exploit the goodwill of donors for personal gain.

g

Gambling Commission

The Gambling Commission is a regulatory body in the United Kingdom responsible for overseeing and regulating gambling activities. Established under the Gambling Act 2005, its primary role is to ensure that gambling is conducted fairly and openly, to prevent crime associated with gambling, and to protect vulnerable individuals from being harmed or exploited by gambling.

Gatekeepers

Gatekeepers are individuals or entities that control access to resources, information, or opportunities. They play a crucial role in various fields, such as media, publishing, business, and academia, by determining what content or individuals gain visibility or entry.

Geldwäschegesetz (GwG)

The German Money Laundering Act (GwG) is legislation designed to prevent money laundering and terrorism financing in Germany. It requires businesses, financial institutions, and certain professionals to implement measures to detect and report suspicious activities.

General Counsel (GC)

The General Counsel (GC) is the chief legal officer of a company or organization, responsible for overseeing and managing all legal matters.

General Data Protection Regulation (GDPR)

The General Data Protection Regulation (GDPR) is a comprehensive data protection law enacted by the European Union (EU) that came into effect on May 25, 2018. It aims to safeguard the privacy and personal data of individuals within the EU and the European Economic Area (EEA).

Glass-Steagall Act

The Glass-Steagall Act, enacted in 1933 during the Great Depression, was a piece of U.S. legislation that separated commercial and investment banking activities. Its primary aim was to prevent the excessive risk-taking that contributed to the financial crash of 1929.

Global Financial Services Company (GFSC)

Global Financial Services Company (GFSC) is a multinational corporation that provides a wide range of financial products and services to individuals, businesses, and governments worldwide. These services typically include investment banking, asset management, insurance, wealth management, and financial advisory.

Global Payments Innovation (GPI)

Global Payments Innovation (GPI) is a transformative initiative by the Society for Worldwide Interbank Financial Telecommunication (SWIFT) aimed at enhancing the speed, transparency, and traceability of cross-border payments.

Global systemically important bank (GSB)

A Global Systemically Important Bank (GSIB) is a financial institution whose failure could trigger a widespread economic crisis due to its size, interconnectedness, and significance in the global financial system. These banks are subject to stricter regulatory standards and oversight to mitigate risks and ensure financial stability. The designation is determined by the Financial Stability Board (FSB) and involves criteria such as cross-jurisdictional activity, complexity, and substitutability. GSIBs are required to hold additional capital buffers and adhere to enhanced risk management practices to reduce the likelihood of financial disruptions.

Global Transaction Banking (GTB)

Global Transaction Banking (GTB) refers to a suite of banking services provided by financial institutions to support businesses in managing their international and domestic transactions.

Governance

Governance refers to the processes, structures, and systems by which organizations, institutions, or societies are directed, controlled, and held accountable.

Greylist

Greylist, also known as graylisting, is a technique used in email filtering to temporarily reject or delay messages from unknown or suspicious senders. When an email is received from an unrecognized source, the server initially rejects it with a temporary error.

Gulf Cooperation Council (GCC)

The Gulf Cooperation Council (GCC) is a regional political and economic alliance established in 1981, comprising six Middle Eastern countries: Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, and the United Arab Emirates.

h

Hawala

Hawala is an informal value transfer system that operates outside traditional banking networks. It is based on trust and personal connections, allowing individuals to transfer money across borders without the physical movement of cash.

Her Majesty's Revenue And Customs (HMRC)

Her Majesty's Revenue and Customs (HMRC) is the United Kingdom's tax authority responsible for collecting taxes, administering various welfare programs, and enforcing compliance with tax laws.

Her Majesty's Treasury (HMT)

Her Majesty's Treasury (HMT) is the United Kingdom's government department responsible for overseeing the nation's economic and financial matters.

Her Majesty's Treasury (HMT)

Her Majesty's Treasury (HMT) is the United Kingdom's economic and finance ministry, responsible for developing and executing the government's public finance policy and economic policy. It oversees the management of public revenue and expenditure, aiming to ensure economic stability and growth. HMT plays a crucial role in formulating fiscal policies, managing the national debt, and setting the framework for taxation and public spending.

High Net Worth Individual (HNWI)

A High Net Worth Individual (HNWI) is a person who possesses significant financial assets, typically defined as having investable assets exceeding a certain threshold, often around $1 million or more, excluding primary residence.

HM Revenue & Customs

HM Revenue & Customs (HMRC) is the United Kingdom's tax authority responsible for collecting taxes, administering various welfare programs, and enforcing compliance with tax laws. Established in 2005, HMRC oversees the collection of income tax, corporation tax, VAT, and other duties, while also managing services like National Insurance and Child Benefit.

i

Identification & Verification

Identification and verification are processes used to confirm the identity of an individual or entity. Identification involves recognizing and establishing who someone is, often through personal information or credentials. Verification, on the other hand, is the process of validating that the provided identification is accurate and authentic, typically using methods such as passwords, biometric data, or official documents. These processes are crucial in various fields, including security, finance, and online services, to ensure trust and prevent fraud.

Identifier

An identifier is a name used to uniquely distinguish entities within a system, such as variables, functions, or objects in programming. It allows for clear reference and manipulation of these entities within code, databases, or other structured environments.

Identity Provider

An Identity Provider (IdP) is a service or system that creates, manages, and verifies digital identities for users. It authenticates users by confirming their credentials, such as usernames and passwords, and provides them with access to various applications and services.

Identity Theft

Identity theft is a form of fraud where an individual's personal information, such as their name, Social Security number, credit card details, or other identifying data, is stolen and used without their permission.

Independent Review

An Independent Review is an objective evaluation conducted by an impartial third party to assess the quality, performance, or compliance of a product, service, process, or organization.

Information Sharing

Information sharing refers to the exchange of data, knowledge, or insights between individuals, organizations, or systems. It is a crucial process in various contexts, such as business, education, healthcare, and technology, facilitating collaboration, decision-making, and innovation.

Inherent Risk

Inherent risk refers to the level of risk that exists in the absence of any controls or mitigating factors. It is the natural level of risk that is present in a process, activity, or environment due to its inherent characteristics.

Initial Coin Offering (ICO)

An Initial Coin Offering (ICO) is a fundraising method used primarily by startups to raise capital for new cryptocurrency projects. In an ICO, a company offers digital tokens or coins to investors in exchange for established cryptocurrencies like Bitcoin or Ethereum, or sometimes fiat currency.

Insider Trading Prevention

Insider Trading Prevention refers to the regulatory measures and practices designed to prevent the illegal buying or selling of securities based on non-public, material information. These measures aim to ensure a fair and transparent financial market by prohibiting individuals with privileged access to confidential information from exploiting it for personal gain.

Institute of Chartered Accountants in England and Wales (ICAEW)

The Institute of Chartered Accountants in England and Wales (ICAEW) is a professional membership organization that provides qualifications and support for chartered accountants. Established in 1880, ICAEW promotes high standards, ethical practices, and continuous professional development within the accounting profession. It offers the prestigious ACA qualification, which is recognized globally, and serves as a leading authority on financial and business issues, influencing policy and regulation.

Insurance Technology (Insurtech)

Insurance Technology, commonly referred to as Insurtech, is the innovative application of technology to enhance and streamline the insurance industry. It involves the use of advanced tools such as artificial intelligence, big data analytics, blockchain, and the Internet of Things (IoT) to improve the efficiency, accuracy, and customer experience of insurance services.

Inter-American Drug Abuse Control Commission (CICAD)

The Inter-American Drug Abuse Control Commission (CICAD) is a specialized agency of the Organization of American States (OAS) focused on addressing drug-related issues in the Americas. Established in 1986, CICAD works to promote cooperation and coordination among member states to combat drug trafficking, abuse, and related crimes.

Internal Revenue Service (IRS)

The Internal Revenue Service (IRS) is a U.S. government agency responsible for administering and enforcing federal tax laws. It oversees the collection of taxes, processes tax returns, issues refunds, and ensures compliance with tax regulations. The IRS also provides guidance and resources to help individuals and businesses understand their tax obligations.

International Business Company

An International Business Company (IBC) is a type of corporate entity commonly used in international trade and investment. It is typically registered in a jurisdiction that offers favorable tax treatment, minimal reporting requirements, and a high degree of confidentiality.

International Chamber of Commerce

The International Chamber of Commerce (ICC) is a global business organization that represents enterprises of all sizes and sectors from around the world. Founded in 1919, the ICC works to promote international trade, responsible business conduct, and a global approach to regulation through advocacy, standard-setting, and dispute resolution services.

International Monetary Fund (IMF)

The International Monetary Fund (IMF) is a global financial institution established in 1944 to promote international monetary cooperation, secure financial stability, facilitate international trade, promote high employment and sustainable economic growth, and reduce poverty around the world.

International Organization for Standardization 20022 (ISO 20022)

ISO 20022 is an international standard for electronic data interchange between financial institutions. It provides a common platform for developing messages in a standardized format, facilitating efficient communication and interoperability across global financial systems.

International Phonetic Alphabet (IPA)

The International Phonetic Alphabet (IPA) is a standardized system of phonetic notation designed to accurately and uniquely represent the sounds of spoken language. Developed by the International Phonetic Association, it uses a set of symbols, primarily derived from the Latin and Greek alphabets, to denote each distinct sound, or phoneme, across different languages.

International Standards on Auditing (ISA)

International Standards on Auditing (ISA) are a set of professional guidelines developed by the International Auditing and Assurance Standards Board (IAASB) to ensure the quality and consistency of audits worldwide.

International Traffic In Arms Regulations (ITAR)

The International Traffic in Arms Regulations (ITAR) is a set of United States government regulations that control the export and import of defense-related articles and services. Managed by the U.S. Department of State, ITAR aims to safeguard national security and further U.S. foreign policy objectives by ensuring that defense technology and information do not fall into the hands of foreign adversaries.

Investigative Journalism

Investigative journalism is a form of journalism in which reporters deeply explore a single topic of interest, often involving crime, political corruption, or corporate wrongdoing.

Investment Fraud

Investment fraud refers to illegal schemes or deceptive practices designed to trick individuals into making financial investments under false pretenses.

Investor Relations (IR)

Investor Relations (IR) is a strategic management responsibility that integrates finance, communication, marketing, and securities law compliance to enable effective communication between a company, its shareholders, and the financial community.

Islamic State Of Iraq And The Levant (ISIL)

The Islamic State of Iraq and the Levant (ISIL), also known as ISIS (Islamic State of Iraq and Syria) or Daesh, is a militant extremist group that emerged in the early 21st century.

k

Know Your Business (KYB)

Know Your Business (KYB) is a regulatory and compliance process used by companies to verify the identity and legitimacy of other businesses they engage with.

Know Your Customer's Customer (KYCC)

KYCC stands for Know Your Customer's Customer. It is an extension of the traditional Know Your Customer (KYC) process, which involves verifying the identity and assessing the risk of a financial institution's direct clients. KYCC goes a step further by scrutinizing the customers of those clients to ensure compliance with anti-money laundering (AML) regulations and to mitigate risks associated with financial crimes.

Know Your Employee (KYE)

KYE, or Know Your Employee, is a process companies use to verify and monitor the identity and background of employees to ensure compliance, security, and mitigate potential risks.

Know Your Supplier (KYS)

Know Your Supplier is a due diligence process used by businesses to verify and assess the credibility, reliability, and compliance of their suppliers. This process involves gathering and analyzing information about a supplier's financial stability, legal standing, ethical practices, and overall reputation.

Know Your Transaction (KYT)

KYT, or Know Your Transaction, is a compliance and risk management process used primarily in the financial and cryptocurrency sectors. It involves monitoring and analyzing transactions to detect suspicious activities, prevent fraud, and ensure adherence to regulatory requirements. By leveraging advanced technologies like machine learning and data analytics, KYT helps institutions maintain the integrity of their financial operations and protect against money laundering and other illicit activities.

l

Legal Entity Identifier (LEI)

A Legal Entity Identifier (LEI) is a unique 20-character alphanumeric code used to identify distinct legal entities participating in financial transactions globally.

Legal Ombudsman (LEO)

The Legal Ombudsman (LEO) is an independent and impartial organization in the UK responsible for addressing complaints about legal services. It provides a free service to help resolve disputes between consumers and legal service providers, ensuring fair treatment and accountability within the legal profession.

Legal Risk

Legal risk refers to the potential for financial loss or other negative consequences that arise from legal actions, disputes, or non-compliance with laws and regulations. This type of risk can stem from various sources, including changes in legislation, litigation, contractual breaches, or regulatory penalties.

Limited Liability Partnership (LLP)

A Limited Liability Partnership (LLP) is a business structure that combines elements of partnerships and corporations. It allows partners to benefit from limited personal liability, meaning they are not personally responsible for the business's debts or liabilities beyond their investment in the LLP.

m

Machine Learning (ML)

Machine Learning (ML) is a subset of artificial intelligence that involves the development of algorithms and statistical models enabling computers to perform tasks without explicit instructions. By analyzing and learning from patterns in data, ML systems can make predictions, recognize patterns, and improve their performance over time. It is widely used in various applications, including image and speech recognition, recommendation systems, and autonomous vehicles.

Malta Financial Services Authority

The Malta Financial Services Authority (MFSA) is the regulatory body responsible for overseeing and ensuring the integrity, stability, and proper functioning of Malta's financial services sector. Established to safeguard the interests of consumers, investors, and the broader economy, the MFSA regulates a wide range of financial activities, including banking, insurance, securities, and investment services.

Management Expense Ratio (MER)

The Management Expense Ratio (MER) is a financial metric used to assess the cost of managing an investment fund, such as a mutual fund or exchange-traded fund (ETF). It is expressed as a percentage of the fund's average net assets and includes management fees, administrative fees, and other operational expenses.

Man In The Middle (MITM)

A Man In The Middle (MITM) attack is a cybersecurity threat where an attacker secretly intercepts and relays communications between two parties who believe they are directly communicating with each other.

Markets in Crypto-Assets Regulation (MiCA)

The Markets in Crypto-Assets Regulation (MiCA) is a comprehensive regulatory framework developed by the European Union to oversee the cryptocurrency and digital asset markets. It aims to provide legal clarity, enhance consumer protection, and ensure financial stability within the EU by establishing uniform rules for crypto-asset issuers and service providers.

Markets in Financial Instruments Directive (MiFID)

The Markets in Financial Instruments Directive (MiFID) is a regulatory framework established by the European Union to standardize and enhance the transparency and efficiency of financial markets across member states.

Message Type (MT)

Message Type (MT) refers to a standardized format used in financial messaging systems, particularly within the SWIFT network, to categorize and identify different types of financial transactions and communications.

Monetary Authority Of Singapore (MAS)

The Monetary Authority of Singapore (MAS) is the central bank and financial regulatory authority of Singapore. Established in 1971, MAS is responsible for overseeing the country's monetary policy, managing its official foreign reserves, and ensuring the stability and integrity of its financial system.

Money Laundering

Money laundering is the illegal process of concealing the origins of money obtained through criminal activities, making it appear as though it has been earned legitimately.

Money Laundering Compliance Officer (MLCO)

A Money Laundering Compliance Officer (MLCO) is a professional responsible for ensuring that a financial institution or organization adheres to legal and regulatory requirements related to preventing money laundering and terrorist financing.

Money Laundering Directive (MLD)

The Money Laundering Directive (MLD) is a set of regulations established by the European Union aimed at preventing money laundering and terrorist financing. It provides a framework for member states to implement measures that enhance transparency and accountability in financial transactions.

Money Laundering Regulations (MLR)

MLR 2017 stands for Money Laundering Regulations 2017, a set of rules designed to prevent money laundering and terrorist financing.

Money Laundering Reporting Officer (MLRO)

MLRO stands for Money Laundering Reporting Officer. This is a designated role within an organization, typically a financial institution, responsible for overseeing and ensuring compliance with anti-money laundering (AML) regulations. The MLRO's duties include monitoring transactions for suspicious activity, reporting any such activities to the relevant authorities, implementing AML policies and procedures, and providing training to staff on recognizing and preventing money laundering.

Money Laundering Stages

Money laundering is the process of making illegally-gained proceeds appear legal.

Money Mule

A money mule is a person who transfers or moves illegally acquired money on behalf of others, often as part of a money laundering scheme. These individuals may be knowingly or unknowingly involved in criminal activities, such as fraud or cybercrime, and are used to obscure the true origin and destination of illicit funds.

Money Service Business (MSB)

A Money Service Business (MSB) is a type of financial institution that provides various money-related services, including currency exchange, money transfers, check cashing, and issuing or redeeming money orders or traveler's checks.

Money Transfer Operator

A Money Transfer Operator (MTO) is a financial service provider that facilitates the transfer of funds from one individual or entity to another, often across different countries. These operators offer a secure and efficient way to send money, typically leveraging digital platforms, mobile apps, or physical locations.

MT 103

The MT 103 is a standardized SWIFT (Society for Worldwide Interbank Financial Telecommunication) message format used for international wire transfers. It is a single customer credit transfer message that facilitates the movement of funds between banks across different countries.

Multi Factor Authentication (MFA)

Multi-Factor Authentication (MFA) is a security process that requires users to provide two or more verification factors to gain access to a system, application, or account.

MyBank

MyBank is a modern financial institution that offers a wide range of banking services, including personal and business accounts, loans, mortgages, and investment options.

n

National Crime Agency (NCA)

The National Crime Agency (NCA) is a UK law enforcement agency responsible for tackling serious and organized crime. It works to protect the public by targeting criminal activities such as drug trafficking, human trafficking, cybercrime, and economic crime. The NCA collaborates with various domestic and international partners to disrupt and dismantle criminal networks, ensuring national security and safety.

Nominee Director

A Nominee Director is an individual appointed to the board of a company to represent the interests of a specific stakeholder, such as a shareholder, creditor, or parent company. Unlike regular directors, nominee directors may not have a direct personal stake in the company but are expected to act in the best interests of the party they represent. Their role often involves monitoring the company's activities, ensuring compliance with agreements, and providing strategic input aligned with the interests of the appointing entity.

Non Resident Alien (NRA)

A Non-Resident Alien (NRA) is an individual who is not a U.S. citizen and does not pass the green card or substantial presence tests, which are used to determine residency status for tax purposes in the United States.

o

Office of Financial Sanctions Implementation (OFSI)

The Office of Financial Sanctions Implementation (OFSI) is a UK government body responsible for ensuring that financial sanctions are effectively implemented and enforced.

Office Of Foreign Assets Control (OFAC)

The Office of Foreign Assets Control (OFAC) is a financial intelligence and enforcement agency of the U.S. Department of the Treasury.

Office of the Superintendent of Financial Institutions (OSFI)

The Office of the Superintendent of Financial Institutions (OSFI) is a Canadian federal agency responsible for regulating and supervising financial institutions, including banks, insurance companies, and pension plans.

Offshore Banking Operations (OBO)

Offshore Banking Operations (OBO) refer to the management and execution of banking activities conducted outside a customer's home country, typically in jurisdictions with favorable financial regulations, tax benefits, and privacy laws.

Offshore Company

An offshore company is a business entity registered in a jurisdiction outside of the country where its primary operations or owners are located. These companies are often established in regions known for favorable tax laws, regulatory environments, and privacy protections.

Open Banking

Open Banking is a financial services model that allows third-party developers to access consumer banking, transaction, and other financial data through the use of application programming interfaces (APIs).

Open Network

Open Network refers to a type of network architecture that is designed to be accessible, interoperable, and flexible. It allows for seamless integration and communication between different systems and devices, often using open standards and protocols.

Open Protocol

An Open Protocol is a set of rules and standards that are publicly available and can be used by anyone to ensure interoperability and communication between different systems and devices. Unlike proprietary protocols, open protocols are not owned by any single entity, allowing for greater collaboration, innovation, and integration across various platforms and technologies.

Open Source Intelligence (OSINT)

Open Source Intelligence (OSINT) refers to the process of collecting, analyzing, and utilizing information from publicly available sources to support decision-making and gain insights. This can include data from the internet, social media, news outlets, public records, and other accessible platforms.

Operational Resilience Framework

The Operational Resilience Framework is a structured approach designed to help organizations anticipate, prepare for, respond to, and recover from disruptions to their operations. It focuses on ensuring that critical business functions continue to operate during and after unexpected events, such as natural disasters, cyberattacks, or system failures.

Operational Risk

Operational risk refers to the potential for losses resulting from inadequate or failed internal processes, people, systems, or external events. This type of risk encompasses a wide range of issues, including human errors, system failures, fraud, and natural disasters, which can disrupt business operations and impact an organization's financial health and reputation.

Organization For Economic Cooperation And Development (OECD)

The Organization for Economic Cooperation and Development (OECD) is an international organization that promotes policies aimed at improving the economic and social well-being of people around the world.

p

Parser

A parser is a software component that takes input data (often text) and builds a data structure – typically some form of parse tree, abstract syntax tree, or other hierarchical structure – giving a structural representation of the input while checking for correct syntax.

Pay Link

Pay Link is a digital payment solution that allows businesses and individuals to send and receive payments through a secure, shareable link. This service simplifies transactions by enabling users to generate a unique URL that can be shared via email, text, or social media, facilitating quick and easy payment processing without the need for complex integrations or additional software.

Payment Card Industry Data Security Standard (PCI DSS)

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that all companies that accept, process, store, or transmit credit card information maintain a secure environment.

Payment Card Industry Security Standards Council (PCI SSC)

The Payment Card Industry Security Standards Council (PCI SSC) is a global organization founded in 2006 by major credit card companies, including Visa, MasterCard, American Express, Discover, and JCB. Its primary mission is to develop, enhance, and promote security standards and resources for the protection of cardholder data.

Payment Fraud

Payment fraud refers to any type of illegal or unauthorized transaction conducted by a cybercriminal or fraudster to steal money or sensitive financial information. This can include activities such as credit card fraud, identity theft, phishing scams, and fraudulent chargebacks.

Payment Initiation Service Provider (PISP)

PISP, or Payment Initiation Service Provider, is a type of financial service that allows third-party providers to initiate payments directly from a user's bank account with their consent. This service is part of the broader framework of Open Banking, which aims to increase competition and innovation in the financial sector by enabling secure and efficient access to banking services.

Payment Service Provider (PSP)

A Payment Service Provider (PSP) is a third-party company that facilitates online transactions between merchants and customers by providing a secure platform for processing payments. PSPs offer a range of services, including payment gateway integration, fraud detection, and multi-currency support, enabling businesses to accept various payment methods such as credit cards, digital wallets, and bank transfers.

Payment Services Directive 2 (PSD2)

The Payment Services Directive 2 (PSD2) is a European Union regulation that came into effect in January 2018, aimed at enhancing innovation, competition, and security in the financial services sector. It mandates banks to open their payment services and customer data to third-party providers through open APIs, fostering the development of new payment solutions and services.

Peer-To-Peer (P2P)

Peer-to-Peer (P2P) is a decentralized network model where each participant, or "peer," has equal privileges and can initiate or complete transactions directly with other peers without the need for a central authority or intermediary. This architecture is commonly used in file-sharing systems, cryptocurrency networks, and collaborative platforms, allowing for efficient resource sharing, enhanced privacy, and increased resilience against failures or censorship.

Personally Identifiable Information (PII)

Personally Identifiable Information (PII) refers to any data that can be used to identify a specific individual. This includes information such as names, addresses, phone numbers, social security numbers, email addresses, and biometric data.

Person Of Significant Control (PSC)

A Person of Significant Control (PSC) is an individual or entity that holds significant influence or control over a company. This typically includes those who own more than 25% of the company's shares or voting rights, have the power to appoint or remove a majority of the board of directors, or otherwise exercise significant influence or control over the company.

Phishing Scam

A phishing scam is a fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in electronic communications.

Pig Butchering

Pig Butchering is a term used to describe a type of online scam where fraudsters build a relationship with their victims over time, often through social media or dating apps, before convincing them to invest in fake cryptocurrency schemes or other fraudulent financial opportunities.

Placement Stage Of Money Laundering

The placement stage of money laundering is the initial phase in the process of disguising illegal proceeds. During this stage, illicit funds are introduced into the financial system, often through methods such as depositing small amounts into bank accounts, purchasing assets, or using front businesses.

Politically Exposed Person (PEP)

A Politically Exposed Person (PEP) is an individual who holds or has held a prominent public position, such as a government official, senior executive in a state-owned enterprise, or a high-ranking political party member.

Politically Exposed Persons Risk Assessment

A Politically Exposed Persons (PEP) Risk Assessment is a process used by financial institutions and other organizations to identify and evaluate the potential risks associated with doing business with individuals who hold or have held prominent public positions.

Ponzi Scheme

A Ponzi scheme is a fraudulent investment scam that promises high returns with little risk to investors. It generates returns for earlier investors using the capital from newer investors, rather than from profit earned by the operation of a legitimate business.

Predicate Crime

Predicate crime refers to a criminal offense that is a component of a larger, more complex crime, often serving as a basis for further criminal activities. For example, in the context of money laundering, a predicate crime could be drug trafficking, fraud, or embezzlement, which generates the illicit funds that are subsequently laundered. Identifying and prosecuting predicate crimes is crucial for dismantling broader criminal enterprises and preventing further illegal activities.

Preferential Trade Agreement (PTA)

A Preferential Trade Agreement (PTA) is a trade pact between countries that provides for reduced tariffs or other trade barriers on certain products from the participating nations. Unlike free trade agreements, PTAs do not eliminate all tariffs but offer preferential access to specific goods, fostering increased trade and economic cooperation among the member countries.

Pretty Good Privacy (PGP)

Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. Developed by Phil Zimmermann in 1991, PGP is used to secure emails, files, and other forms of digital communication by encrypting the content, ensuring that only intended recipients can read it.

Private Banking

Private banking is a personalized financial service offered by banks to high-net-worth individuals (HNWIs). It provides tailored financial solutions, including wealth management, investment advice, estate planning, and tax optimization.

Private Key

A private key is a cryptographic tool used in encryption and decryption processes to ensure secure communication and data protection. It is a secret, randomly generated string of characters that is used in conjunction with a public key in asymmetric encryption systems.

Proceeds of Crime Act (POCA)

POCA, or Proceeds of Crime Act, is a legislative framework designed to combat money laundering and other financial crimes by allowing authorities to confiscate assets and profits obtained through illegal activities. The act provides law enforcement agencies with the tools to trace, freeze, and seize criminal proceeds, thereby disrupting the financial incentives that drive criminal enterprises.

Proliferation Control Plan (PCP)

The Proliferation Control Plan (PCP) is a strategic framework designed to prevent the spread of weapons of mass destruction (WMD) and related technologies.

Proliferation Financing

Proliferation Financing refers to the financial support provided for the development, acquisition, and proliferation of weapons of mass destruction (WMDs) and their delivery systems.

Proliferation financing (PF)

Proliferation financing (PF) refers to the provision of funds or financial services that are used to support the development, acquisition, or proliferation of weapons of mass destruction (WMD) and their delivery systems.

Proof of Address

Proof of Address is a document or set of documents used to verify an individual's residential address. Common examples include utility bills, bank statements, lease agreements, or official government correspondence.

Pump And Dump

Pump and Dump is a fraudulent investment scheme where the price of a stock or cryptocurrency is artificially inflated ("pumped") through false, misleading, or exaggerated statements. Once the price has been driven up, the perpetrators sell off their holdings at the inflated prices, leading to a sharp price decline ("dump"), and leaving other investors with significant losses.

r

Ransomware

Ransomware is a type of malicious software designed to block access to a computer system or encrypt its data until a sum of money, or ransom, is paid to the attacker. It often spreads through phishing emails, malicious downloads, or exploiting system vulnerabilities.

Real Time Monitoring

Real-time monitoring refers to the continuous tracking and analysis of data as it is generated, allowing for immediate insights and responses.

Refund Fraud

Refund fraud is a deceptive practice where individuals or entities exploit return policies to illegitimately obtain refunds or replacements for goods or services. This can involve returning stolen merchandise, using counterfeit receipts, or manipulating return systems to receive money or products without a valid purchase.

Regulations

Regulations are official rules or directives made and maintained by an authority to control or govern conduct within a specific area or industry. They are designed to ensure compliance, protect public interests, maintain safety standards, and promote fairness and transparency. Regulations can apply to various sectors, including finance, healthcare, environment, and more, and are enforced by governmental or regulatory bodies.

Regulatory Agency

A regulatory agency is a governmental body responsible for creating, implementing, and enforcing rules and regulations within a specific industry or sector. These agencies ensure compliance with laws, protect public interests, maintain safety standards, and promote fair practices.

Regulatory Technology (RegTech)

Regulatory Technology (RegTech) refers to the use of innovative technology solutions to help businesses comply with regulatory requirements more efficiently and effectively. It encompasses a range of tools and applications designed to streamline compliance processes, manage risk, and ensure adherence to laws and regulations.

Remittance

Remittance refers to the transfer of money, typically by a foreign worker, to an individual or family in their home country.

Responsibility to Protect (R2P)

The Responsibility to Protect (R2P) is a global political commitment adopted by United Nations member states in 2005 to prevent genocide, war crimes, ethnic cleansing, and crimes against humanity. It is based on the principle that sovereignty is not a privilege, but a responsibility.

Risk and Compliance

Risk and Compliance refers to the strategic approach organizations take to identify, assess, and manage potential risks while ensuring adherence to laws, regulations, and internal policies. This discipline involves implementing frameworks and controls to mitigate risks, prevent legal violations, and promote ethical conduct, thereby safeguarding the organization's assets, reputation, and operational integrity.

Risk Assessment (RA)

Risk Assessment (RA) is a systematic process used to identify, evaluate, and prioritize potential hazards or threats that could negatively impact an organization, project, or individual. It involves analyzing the likelihood and consequences of adverse events, enabling decision-makers to implement strategies to mitigate or manage risks effectively.

Risk Based Approach (RBA)

A Risk Based Approach (RBA) is a strategic framework used to identify, assess, and prioritize risks in order to allocate resources effectively and mitigate potential negative impacts.

s

Sanctions Compliance Program

A Sanctions Compliance Program is a structured framework implemented by organizations to ensure adherence to international, national, and local sanctions laws and regulations. These programs are designed to prevent businesses from engaging in prohibited transactions with sanctioned entities or individuals, thereby mitigating legal and financial risks.

Sanctions Evasion

Sanctions evasion refers to the deliberate actions taken by individuals, companies, or countries to circumvent economic or trade restrictions imposed by governments or international bodies.

Sanctions Screening

Sanctions screening is a compliance process used by financial institutions and businesses to identify and prevent transactions involving individuals, entities, or countries subject to economic or trade sanctions.

Securities Industry Essentials (SIE)

The Securities Industry Essentials (SIE) Exam is an entry-level assessment administered by the Financial Industry Regulatory Authority (FINRA) for prospective securities industry professionals.

Self-Hosted Wallet

A self-hosted wallet is a type of crypto wallet where users maintain full control over their private keys and digital assets, without relying on a third party.

Serious Fraud Office (SFO)

The Serious Fraud Office (SFO) is a specialized government agency in the United Kingdom responsible for investigating and prosecuting complex cases of serious or high-value fraud, bribery, and corruption.

Service Level Agreement (SLA)

A Service Level Agreement (SLA) is a formal contract between a service provider and a client that outlines the expected level of service, performance metrics, and responsibilities.

Simplified Due Diligence (SDD)

Simplified Due Diligence (SDD) is a risk-based approach in compliance procedures where reduced levels of scrutiny are applied to customers or transactions that are considered low risk. SDD allows for less rigorous verification processes compared to standard due diligence, while still ensuring compliance with regulatory requirements.

Social Security Number (SSN)

A Social Security Number (SSN) is a unique nine-digit identifier issued by the U.S. government to citizens, permanent residents, and certain temporary residents. It is primarily used to track individuals for Social Security purposes, including retirement and disability benefits.

Solicitors Regulation Authority (SRA)

The Solicitors Regulation Authority (SRA) is the regulatory body responsible for overseeing solicitors and law firms in England and Wales. It sets professional standards, enforces compliance with legal and ethical obligations, and ensures the protection of clients and the public.

Source of Funds (SOF)

Source of Funds refers to the origin of the money used in a financial transaction or investment. It is a critical concept in finance and compliance, particularly in the context of anti-money laundering (AML) and counter-terrorism financing (CTF) regulations.

Source Of Wealth (SOW)

Source of Wealth (SOW) refers to the origin of an individual's or entity's accumulated financial resources. It encompasses the activities, investments, or transactions that have contributed to the growth of their wealth over time. Understanding the SOW is crucial in financial and legal contexts, particularly for compliance with regulations related to anti-money laundering and financial transparency.

State-Owned Enterprise (SOE)

A State-Owned Enterprise (SOE) is a business entity that is owned and operated by a government. These enterprises are established to undertake commercial activities on behalf of the government and can be found in various sectors such as energy, transportation, and telecommunications.

Suspicious Activity Report (SAR)

A Suspicious Activity Report (SAR) is a document that financial institutions and certain businesses are required to file with government authorities to report any observed or suspected activities that might indicate money laundering, fraud, or other financial crimes.

Suspicious Incident Reports (SIPs)

Suspicious Incident Reports (SIPs) are formal documents used to record and communicate details about activities or behaviors that appear unusual or potentially indicative of criminal or harmful intent. These reports are typically filed by individuals or organizations, such as security personnel, law enforcement, or employees, who observe suspicious actions that may require further investigation.

Suspicious Matter Report (SMR)

A Suspicious Matter Report (SMR) is a document submitted by financial institutions and other entities to regulatory authorities when they detect or suspect that a transaction or activity may be linked to money laundering, terrorism financing, or other illegal activities.

Suspicious Transaction Report (STR)

A Suspicious Transaction Report (STR) is a document submitted by financial institutions to regulatory authorities to report any transactions that appear unusual or potentially linked to illegal activities, such as money laundering or terrorist financing.

Swiss Financial Market Supervisory Authority (FINMA)

The Swiss Financial Market Supervisory Authority (FINMA) is the independent regulatory body responsible for overseeing and regulating Switzerland's financial markets. Its primary role is to ensure the stability, integrity, and transparency of the financial system, protect investors, and maintain the country's reputation as a global financial hub.

t

Tax Compliance Strategy

A Tax Compliance Strategy is a structured approach that individuals or businesses use to ensure adherence to tax laws and regulations. This strategy involves planning, organizing, and managing financial activities to meet legal tax obligations while optimizing tax efficiency.

Tax Identification Number (TIN)

A Tax Identification Number (TIN) is a unique identifier assigned to individuals and entities for tax purposes. It is used by tax authorities to track tax obligations and payments. TINs are essential for filing tax returns, claiming tax benefits, and conducting financial transactions that require tax reporting.

Terrorism Act (TACT)

The Terrorism Act (TACT) refers to a series of legislative measures enacted in the United Kingdom aimed at preventing and responding to acts of terrorism. These laws provide the legal framework for defining terrorism, proscribing terrorist organizations, and granting law enforcement agencies powers to investigate, detain, and prosecute individuals suspected of terrorist activities.

Terrorist Financing (TF)

Terrorist Financing (TF) refers to the process of providing funds or financial support to individuals or groups engaged in terrorist activities. This can involve the collection, movement, and use of money to facilitate acts of terrorism, including planning, recruitment, and execution.

Trade Based Money Laundering (TBML)

Trade Based Money Laundering (TBML) is a method of disguising the proceeds of crime and moving value through the use of trade transactions in an attempt to legitimize their illicit origins. This complex form of money laundering involves manipulating trade documents, such as invoices and shipping records, to misrepresent the price, quantity, or quality of goods and services.

Trust and Company Service Providers (TCSP)

TCSP stands for Trust and Company Service Providers. These are entities or individuals that offer a range of services related to the formation, management, and administration of companies, trusts, and other legal entities.

m

Type 1 SWIFT Message

The SWIFT Message Type 1 is a category of financial messages used within the SWIFT network, which is a global provider of secure financial messaging services. MT 1 messages are typically used for customer payments and cheques.

u

Ultimate Beneficial Owner(ship)

Ultimate beneficial owner (UBO) refers to the individual or entity that ultimately owns or controls a company or asset, even if the ownership is exercised through a chain of intermediary entities or legal structures.

Ultimate Beneficial Owner (UBO)

The Ultimate Beneficial Owner (UBO) refers to the individual(s) who ultimately own or control a company or legal entity, either directly or indirectly. The UBO is the person who benefits from or has significant influence over the entity, typically holding a certain percentage of ownership or voting rights (commonly 25% or more).

United Nations Association (UNA)

The United Nations Association (UNA) is a non-governmental organization that works to support and promote the goals and principles of the United Nations. It aims to foster public understanding of international issues, encourage global cooperation, and advocate for peace, human rights, and sustainable development.

United States Department of Justice (DOJ)

The United States Department of Justice (DOJ) is a federal executive department responsible for enforcing the laws of the United States, ensuring public safety against foreign and domestic threats, and providing leadership in preventing and controlling crime.

USA Patriot Act 2001

The USA PATRIOT Act of 2001 is a legislative act passed in response to the September 11 terrorist attacks. Its full name is the "Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act."

US Department Of Justice

The U.S. Department of Justice (DOJ) is a federal executive department responsible for enforcing the laws of the United States, ensuring public safety against foreign and domestic threats, and providing federal leadership in preventing and controlling crime.

v

Virtual Asset Service Provider (VASP)

VASPs, or Virtual Asset Service Providers, are entities that facilitate the exchange, transfer, and custody of virtual assets such as cryptocurrencies. They play a crucial role in the digital financial ecosystem by offering services like trading platforms, digital wallets, and payment processing. VASPs are subject to regulatory frameworks to ensure compliance with anti-money laundering (AML) and counter-terrorism financing (CTF) measures, thereby promoting transparency and security in the virtual asset market.

x

xPub

An xPub (Extended Public Key) is a type of cryptographic key used in hierarchical deterministic (HD) wallets for cryptocurrencies like Bitcoin. It allows users to generate an unlimited number of public addresses from a single master key, facilitating easier management of multiple addresses without compromising security. xPubs are particularly useful for businesses and services that need to track multiple transactions and balances without exposing their private keys.