Compliance Hub

Mastering Fraud Prevention and Detection: A 7-Step Guide for Compliance Teams

Site Logo
Tookitaki
10 min
read

Fraud prevention and detection is no longer optional—it’s a frontline defence against escalating financial crime.

From sophisticated phishing scams to cross-border mule networks, the threats facing banks and fintechs are more varied and aggressive than ever. Traditional monitoring methods alone won’t cut it. Effective defence requires a layered strategy—one that blends technology, human expertise, and real-time insights.

In this article, we break down seven essential fraud prevention and detection tips that compliance teams can apply to stay ahead of risk while protecting customers and reputation.

Establish a Robust Governance Framework

Creating a strong governance framework is essential for any organisation looking to effectively prevent and detect fraud. A well-established governance structure provides a solid foundation for internal controls and accountability, ensuring that all aspects of fraud prevention are addressed systematically.

Setting Up Strong Internal Controls

Implementing strong internal controls is the first step in establishing a robust governance framework. These controls are essential for reducing the opportunity for fraud by creating checks and balances within the organisation. Effective internal controls include segregation of duties, regular audits, and strict access controls to sensitive information. By ensuring that no single individual has control over all aspects of a financial transaction, organisations can significantly reduce the risk of fraudulent activities.

Defining Roles and Responsibilities

Clear definition of roles and responsibilities within the governance framework is crucial for the success of fraud prevention and detection efforts. Each team member should understand their part in identifying and managing risks related to fraud. Establishing a fraud committee or designating a fraud prevention officer can help in overseeing the implementation of policies and procedures. Additionally, providing training and resources to employees empowers them to recognise and report suspicious activities, fostering a culture of vigilance and accountability.

Fraud Prevention Detection

 

Establish Robust Governance Framework

Creating a strong governance framework is essential for any organisation looking to effectively prevent and detect fraud. A well-established governance structure provides a solid foundation for internal controls and accountability, ensuring that all aspects of fraud prevention are addressed systematically.

Setting Up Strong Internal Controls

Implementing strong internal controls is the first step in establishing a robust governance framework. These controls are vital in minimising opportunities for fraud by instituting checks and balances within the organisation. Effective internal controls should include:

  • Segregation of Duties: Ensure that responsibilities are divided among different individuals so that no single person is in complete control of any financial transaction.
  • Regular Audits: Conduct frequent audits to assess compliance with internal policies and detect any irregularities early on.
  • Access Controls: Limit access to sensitive information and financial systems based on job functions to mitigate unauthorized access or manipulation.

By creating a structured environment of oversight, organisations can significantly reduce the likelihood of fraudulent activities and enhance their overall security posture.

Defining Roles and Responsibilities

A clear definition of roles and responsibilities is crucial for the success of fraud prevention and detection initiatives. Every team member should understand their part in identifying, managing, and mitigating fraud risks. Key strategies to define roles and responsibilities include:

  • Establishing a Fraud Committee: Appoint a dedicated team responsible for overseeing fraud prevention policies and strategies across the organisation.
  • Designating a Fraud Prevention Officer: Assign a single point of accountability to lead fraud detection efforts, ensuring focused efforts on addressing potential vulnerabilities.
  • Employee Training and Resources: Provide training sessions and resources to all employees to empower them with the knowledge needed to recognise and report suspicious activities.

Fostering a culture of accountability and awareness will promote vigilance among employees, ultimately strengthening the organisation’s defences against financial fraud.

Implement Effective Practices

To enhance fraud prevention and detection measures, organisations must adopt a variety of effective practices that address potential vulnerabilities and ensure a proactive approach to identifying threats. Below are key components to integrate into your fraud prevention strategy.

Conduct Regular Risk Assessments

Conducting regular risk assessments is vital for identifying potential fraud risks within the organization. By evaluating existing processes, systems, and controls, organisations can pinpoint weaknesses that could be exploited by fraudsters. Regular assessments should include:

  • Comprehensive Review: Evaluate the effectiveness of current fraud detection mechanisms and internal controls. Analyse past fraud incidents to determine patterns and areas for improvement.
  • Risk Prioritisation: Rank identified risks based on their potential impact and likelihood of occurrence. This allows organisations to focus their resources on the most critical threats.
  • Continuous Monitoring: Establish an ongoing monitoring process to reassess risks periodically and adapt to changing circumstances or newly emerging threats.

Develop a Comprehensive Fraud Response Plan

A well-defined fraud response plan ensures that organisations can react promptly and effectively to suspected fraud incidents. Key components of a robust response plan include:

  • Incident Reporting Procedures: Establish clear guidelines for employees to report suspected fraud. This should include a secure and confidential method for reporting and a designated point of contact for fraud inquiries.
  • Investigation Protocols: Outline the steps to be taken when fraud is suspected, including how investigations will be conducted, who will be involved, and timelines for resolution.
  • Communication Strategy: Develop a communication plan to inform stakeholders of the fraud incident and the organisation's response measures. Transparency is key to maintaining trust and credibility.

Foster a Culture of Awareness

Creating a culture of awareness within the organisation is essential for effective fraud prevention and detection. Employees should understand the importance of vigilance and be empowered to take action. To foster this culture, organisations should:

  • Training and Education: Provide ongoing training programs that educate employees about fraud risks, detection methods, and their role in preventing fraud. Regular workshops and seminars can help reinforce these concepts.
  • Promote Open Dialogue: Encourage open discussions about fraud-related topics and experiences. An environment where employees feel comfortable sharing concerns can lead to quicker identification of suspicious activities.
  • Recognise and Reward Vigilance: Acknowledge and reward employees who demonstrate proactive behaviour in identifying and reporting fraud risks. This reinforces positive actions and motivates others to be vigilant.

By implementing these effective practices, organisations can create a comprehensive approach to fraud prevention and detection, ultimately protecting their assets and maintaining consumer trust.

{{cta-first}}

Explore Fraud Prevention in the Banking Industry

The banking industry faces unique challenges when it comes to fraud prevention and detection, given the complexity of financial transactions and the sophisticated methods employed by fraudsters. Understanding these challenges is crucial for developing effective strategies tailored specifically for the banking sector.

Unique Challenges and Solutions

Banks often deal with large volumes of transactions and a diverse range of customers, which can make it difficult to identify suspicious activity. The primary challenges include:

  • Diverse Fraud Schemes: Fraudsters continuously evolve their tactics, employing methods such as identity theft, account takeovers, and phishing scams. Banks must adapt to these changing methods to protect their assets and customers effectively.
  • Data Privacy Concerns: Balancing fraud prevention with customer privacy is a delicate task. Implementing robust fraud detection systems can raise concerns over data misuse and consumer privacy.
  • Resource Constraints: Many financial institutions face limitations in budget and personnel dedicated to fraud prevention. This can hinder their ability to deploy advanced technologies and conduct thorough training for employees.

To address these challenges, banks can implement various solutions:

  • Advanced Analytics and AI: Utilising machine learning and data analytics can help banks identify patterns indicative of fraud, allowing for quicker detection and response.
  • Multi-Factor Authentication: Implementing multi-layered authentication methods can add additional security layers, making it more difficult for fraudsters to gain unauthorised access.
  • Collaboration with Law Enforcement: Establishing partnerships with law enforcement agencies and sharing information can enhance the ability to combat fraud on a larger scale.

Regulatory Compliance and Standards

Adhering to regulatory compliance and standards is paramount in the banking industry, especially concerning fraud prevention. Regulatory bodies enforce specific guidelines that banks must follow to safeguard their operations and protect customer information. Key aspects include:

  • Know Your Customer (KYC) Regulations: Banks must implement KYC processes to verify the identity of their customers, ensuring they are not facilitating fraudulent activities.
  • Anti-Money Laundering (AML) Policies: Robust AML practices are crucial for identifying and mitigating risks associated with money laundering and other illicit activities.
  • Data Protection Regulations: Compliance with data protection laws, such as the General Data Protection Regulation (GDPR), is essential for maintaining consumer trust and safeguarding sensitive information.

By actively addressing these regulatory requirements, banks can enhance their fraud prevention strategies while ensuring compliance, ultimately protecting both their interests and their customers.

Leverage Fraud Detection Software

In the modern banking landscape, leveraging advanced fraud detection software is critical for staying ahead of increasingly sophisticated fraud schemes. These tools not only enhance the efficiency of fraud detection efforts but also provide essential data insights that can help institutions mitigate risks more effectively.

Key Features to Look For

When selecting fraud detection software, organisations should consider several key features that enable robust fraud prevention capabilities:

  • Real-Time Monitoring: Look for software that offers continuous monitoring of transactions and activities, allowing for immediate detection of suspicious behaviour as it occurs.
  • Machine Learning Algorithms: Advanced fraud detection systems employ machine learning to adapt and improve their accuracy over time, learning from historical data to identify potential fraud patterns.
  • Customizable Alerts: The software should allow for customizable alert settings based on the organisation’s specific risk profiles and operational needs. This enables quicker responses to potential threats.
  • User-Friendly Interface: A user-friendly interface is crucial for ensuring that staff can efficiently utilise the software, minimising training time and improving overall operational effectiveness.

Integration with Existing Systems

To maximise the effectiveness of fraud detection software, seamless integration with existing systems is vital. This includes:

  • Core Banking Systems: The fraud detection solution should easily integrate with the bank's core banking platform to access transactional data and relevant customer information in real-time.
  • Customer Relationship Management (CRM) Systems: Integrating with CRM systems helps in better understanding customer behaviour, allowing for more informed fraud detection and prevention strategies.
  • Third-Party Platforms: Integration with third-party services, such as payment processors and data analytics platforms, can enhance the software's capabilities, providing a broader view of potential fraud risks across various channels.

By leveraging the right fraud detection software and ensuring it integrates smoothly with existing systems, financial institutions can enhance their ability to detect, prevent, and respond to fraud incidents, thereby safeguarding their assets and maintaining consumer trust.

Harness Fraud Prevention Software

Fraud prevention software plays a pivotal role in helping organisations proactively safeguard their assets against fraudulent activities. By implementing advanced technologies, businesses can significantly enhance their fraud detection capabilities, ensuring rapid responses to suspicious activities.

Real-Time Monitoring Capabilities

One of the most crucial features of effective fraud prevention software is its ability to monitor transactions and activities in real time. This capability allows organisations to:

  • Immediately Identify Suspicious Behaviour: Real-time monitoring enables the software to detect anomalies and unusual patterns as they occur, allowing for prompt intervention before significant damage can be done.
  • Reduce False Positives: By continuously analysing data streams, advanced systems can filter out benign transactions, lowering the occurrence of false alerts and allowing teams to focus on genuine threats.
  • Provide Instant Notifications: Automated alerts can be generated for transactions that meet predefined risk criteria, ensuring that relevant personnel can take immediate action to investigate or block the transaction.

Automating the Detection Process

Automating the detection process is another key benefit of utilising fraud prevention software. Automation streamlines various aspects of fraud detection and response, including:

  • Enhanced Efficiency: By automating routine monitoring and analysis tasks, organisations can free up valuable resources, allowing staff to concentrate on more strategic fraud prevention efforts.
  • Consistency in Monitoring: Automated systems perform consistently, ensuring that all transactions undergo the same level of scrutiny, thereby maintaining a high standard of fraud prevention.
  • Machine Learning for Continuous Improvement: Many advanced fraud prevention tools incorporate machine learning algorithms that allow the system to learn from historical data. This means that as fraud patterns evolve, the software can adapt and enhance its detection capabilities over time.

By harnessing the capabilities of robust fraud prevention software, organisations can effectively defend against fraud, ensuring the security of their operations and instilling confidence among their customers.

{{cta-ebook}}

Stay Informed and Adaptive

In the ever-evolving landscape of financial fraud, staying informed and adaptive is crucial for organisations aiming to maintain robust fraud prevention and detection strategies. As new threats emerge, businesses must continuously evolve their practices to mitigate risks effectively.

Keeping Up with Emerging Trends

The financial industry must remain vigilant in tracking emerging trends in fraud tactics and technologies. Organisations can implement the following strategies to stay current:

  • Industry Research: Regularly conduct research and analysis on the latest trends in fraud schemes and prevention measures. This can include subscribing to relevant publications, following industry experts, and attending conferences focused on fraud detection.
  • Networking and Collaboration: Engaging with peers in the industry can provide valuable insights into innovative approaches to fraud prevention. Consider forming alliances with other financial institutions to share best practices and knowledge regarding trends in fraud.
  • Technology Updates: Continuously evaluate the latest advancements in fraud detection technologies. This involves keeping abreast of software updates and new tools that can improve fraud detection and prevention capabilities.

Continuous Training and Education

Fostering a culture of continuous learning is essential for empowering employees to effectively combat fraud. Organisations should prioritise ongoing training and education initiatives, which can include:

  • Regular Training Sessions: Conduct frequent training sessions that educate employees about the latest fraud risks, detection techniques, and internal policies regarding fraud prevention. This ensures that all staff are equipped to recognise and respond to potential fraud incidents.
  • Workshops and Simulations: Organise hands-on workshops and simulation exercises to provide employees with practical experience in identifying and handling fraud-related situations. This can improve their ability to act promptly and effectively when faced with real-world scenarios.
  • Knowledge Sharing: Encourage employees to share their experiences and insights related to fraud detection, allowing for collective knowledge-building within the organisation. Creating an open forum for discussions and feedback can enhance awareness and vigilance among staff.

By remaining informed about emerging trends and investing in continuous training and education, organisations can adapt their fraud prevention strategies to address new challenges effectively, ultimately safeguarding their assets and maintaining consumer trust.

Conclusion

As financial fraud continues to evolve, organisations must leverage advanced solutions to protect their assets and maintain consumer trust. Tookitaki's FinCense for Fraud Prevention offers a comprehensive approach to combatting fraud effectively, ensuring that your financial institution stays ahead of emerging threats.

With FinCense, you can safeguard your customers against over 50 different fraud scenarios, such as account takeovers and money mules, all supported by our robust AFC Ecosystem. Our platform harnesses advanced AI and machine learning technologies tailored specifically to your organisation's needs, allowing for accurate, real-time fraud prevention that is crucial in today’s fast-paced financial landscape.

Moreover, FinCense enables monitoring of suspicious activity across billions of transactions, empowering you to maintain security and protect customer data. By adopting Tookitaki's innovative fraud prevention solution, you can enhance your defences against fraudulent activities and ensure a safe banking experience for your customers. Trust in FinCense for comprehensive, real-time fraud prevention designed for banks and fintechs alike, and take a proactive step toward securing your financial institution against future threats.

Talk to an Expert

Ready to Streamline Your Anti-Financial Crime Compliance?

Our Thought Leadership Guides

Blogs
29 Apr 2026
6 min
read

AML Compliance in Malaysia: A Complete Guide to BNM Requirements and AMLATFPUAA

Picture a compliance officer at a Malaysian licensed bank three weeks out from a BNM AML/CFT examination. She has read AMLATFPUAA. She knows the Act was amended in 2014 and again in 2020. What she needs now is not another legislative summary. She needs to know what BNM's examiners will actually open on their laptops when they arrive — which files, which logs, which policy documents — and where programmes at institutions like hers most commonly fall short.

That is what this guide covers.

The legislative history of AMLATFPUAA and its impact on Malaysia's financial sector is covered in our [overview of AMLA and its impact on the Malaysian financial landscape](/compliance-hub/understanding-amla-impact-on-malaysia-financial-landscape). This article focuses on the operational layer: the ongoing compliance obligations that BNM-supervised institutions must meet, the specific thresholds and timelines that govern reporting, and the recurring examination gaps that BNM has identified in practice.

Talk to an Expert

The Regulatory Framework in Brief

Two instruments govern AML/CFT compliance for BNM-supervised institutions in Malaysia.

AMLATFPUAA 2001 is the primary legislation. The 2014 amendment expanded the list of predicate offences and brought Designated Non-Financial Businesses and Professions (DNFBPs) into the compliance perimeter. The 2020 amendment strengthened beneficial ownership requirements and raised maximum penalties to MYR 3 million per offence, or 5 years imprisonment, or both. For financial institutions, the penalties can run per transaction or per day of non-compliance — which changes the risk calculus considerably.

BNM's AML/CFT and TF Policy Document (2023) is where the day-to-day compliance standards sit. The Policy Document translates AMLATFPUAA's obligations into specific programme requirements: who must be screened, how, at what intervals, and with what documentation. BNM's Financial Intelligence and Enforcement Department (FIED) is the enforcement arm that reviews STR filings and leads enforcement action.

When a BNM examiner cites a deficiency, the reference is almost always to the Policy Document, not to the Act itself. Knowing the Act is necessary; knowing the Policy Document is what keeps a programme compliant.

Who Must Comply: Reporting Institutions Under AMLATFPUAA

AMLATFPUAA defines "Reporting Institutions" across three categories, each carrying distinct obligations.

Category 1 covers licensed banks, Islamic banks, and development financial institutions. These institutions carry the fullest set of AML/CFT obligations under the Policy Document, including mandatory enterprise-wide risk assessments and comprehensive transaction monitoring programmes.

Category 2 covers money service businesses (MSBs), remittance operators, and e-money issuers. The obligations are materially equivalent to Category 1 for CDD and reporting, but the Policy Document recognises that the risk typologies differ — particularly for remittance operators processing high-frequency, lower-value cross-border transfers.

Category 3 covers DNFBPs: lawyers, accountants, and real estate agents, brought in under the 2014 amendment. DNFBP obligations are threshold-triggered — they apply when a transaction reaches a defined cash value or when the DNFBP is facilitating a category of activity specified in the Act.

The DNFBP category matters for banks because banks deal with these professionals as customers. When a law firm holds a client account at your institution, BNM expects you to recognise that relationship as carrying elevated risk — and to apply the CDD standards appropriate to it.

Customer Due Diligence: Three Tiers, Different Standards

BNM's AML/CFT Policy Document sets three CDD tiers. Which tier applies depends on the risk profile of the customer and the nature of the business relationship — not on an institution's convenience.

Standard CDD

Standard CDD applies to all new customers unless simplified CDD conditions are met. It requires identification and verification of the customer, documentation of the purpose and intended nature of the business relationship, and a customer risk assessment at onboarding. Verification must be based on independent and reliable sources — a customer self-certifying their identity is not sufficient.

For individual customers, verification typically involves government-issued identification. For corporate customers, it extends to directors, authorised signatories, and ultimate beneficial owners (UBOs).

Simplified CDD

Simplified CDD is available for customers assessed as low-risk: listed companies on a regulated exchange, government entities, and FIs supervised by BNM or an equivalent foreign regulator. Under simplified CDD, identification is still required but the depth of verification can be reduced, and ongoing monitoring can operate at lower intensity.

The Policy Document is explicit that simplified CDD is a risk-based determination — not a category exemption. An institution cannot apply simplified CDD to a listed company without first concluding that the specific company and the specific transaction type present low money laundering risk.

Enhanced Due Diligence

Enhanced Due Diligence (EDD) is mandatory for four customer categories:

  • Politically Exposed Persons (PEPs) — domestic and foreign
  • Customers from FATF-identified jurisdictions with strategic AML/CFT deficiencies
  • Corporate customers with complex or non-transparent ownership structures
  • Customers engaged in cash-intensive businesses

EDD requirements under the Policy Document are specific. For PEPs, the institution must verify source of funds and source of wealth — not just identify the customer's occupation. Senior management approval is required before establishing or continuing a relationship with a PEP. The approval must be documented, with a named approver. Periodic review of PEP relationships is mandatory at least every 2 years.

For all EDD customers, monitoring intensity must be increased. What "increased" means in practice is calibrated monitoring rules, not a generic note in the file that the customer is high-risk.

Beneficial ownership threshold: BNM sets the threshold for identifying UBOs at 25% ownership or control — consistent with the FATF standard. Institutions must trace ownership to natural persons. Nominee structures, trusts, and multi-layer corporate arrangements are not a legitimate stopping point. If your CDD file shows a holding company as the UBO rather than the individuals who own it, the file is incomplete.

For institutions operating digital onboarding channels, the BNM eKYC Policy Document sets out the technical requirements that must be met for remote CDD to carry the same assurance as face-to-face verification. The specifics for digital banks and e-money issuers are covered in our eKYC Malaysia guide.

Ongoing Monitoring Requirements

Onboarding CDD is not a one-time event. BNM's Policy Document requires institutions to monitor the business relationship throughout its duration — which means monitoring transactions for consistency with the customer's risk profile, stated purpose, and expected transaction patterns.

When Re-KYC Is Required

The Policy Document specifies triggers that require re-assessment of a customer's KYC data:

  • A material change in the customer's circumstances (change in business activity, change in ownership structure, change in country of domicile)
  • A change in the customer's risk rating — either triggered by a system alert or a periodic review
  • Reactivation of a dormant account (inactive for 12 months or more)
  • Scheduled periodic review for high-risk customers — at minimum every 2 years

The 12-month dormancy trigger and the 2-year PEP review cycle are not recommendations. They are requirements. BNM examiners check whether these cycles are documented and whether the reviews are substantive — not whether a checkbox was ticked.

Transaction Monitoring Calibration

BNM's examination findings have repeatedly cited one gap above others: institutions running transaction monitoring with default threshold settings that have not been calibrated to the institution's own customer risk profile.

Default thresholds — those that come with a monitoring system out of the box — are designed to be functional across a broad range of institutions. They are not designed to reflect the specific risk profile of your customer book. A licensed bank whose retail clients are primarily salaried employees in Klang Valley has a different expected transaction pattern than an MSB processing remittances to Southeast Asian labour markets. Their monitoring should look different.

BNM expects institutions to document why their thresholds are set where they are, when they were last reviewed, and who approved the current calibration. If the answer is "these are the system defaults," that is a finding waiting to be written.

To understand what an effective transaction monitoring programme should look like — and what to evaluate when selecting or upgrading a system — see our Transaction Monitoring Software Buyer's Guide and What Is Transaction Monitoring.

ChatGPT Image Apr 29, 2026, 11_14_44 AM

Reporting Obligations: Timelines and Thresholds

BNM-supervised institutions have two primary reporting obligations to FIED. Both have defined timelines that examination teams check.

Cash Threshold Reports (CTRs)

Any cash transaction — or series of related cash transactions — of MYR 25,000 or above must be reported to FIED via the goAML system (Malaysia adopted the UNODC goAML platform in 2020). The filing deadline is 3 business days from the date of the transaction.

CTR filing is largely mechanical for institutions with core banking systems capable of automated flagging. Where BNM has found gaps is in the manual detection of structured transactions — multiple sub-MYR 25,000 cash deposits by the same customer within a short period, designed to stay below the CTR threshold. Structuring is a predicate offence under AMLATFPUAA. Failing to detect it is a monitoring failure, not just a reporting failure.

Suspicious Transaction Reports (STRs)

An STR must be filed when a staff member or system alert produces grounds to suspect that a transaction involves the proceeds of a scheduled offence or is connected to terrorist financing. The deadline is 3 working days from the point at which suspicion is formed — not from when the transaction occurred.

That distinction matters. If a transaction alerts in your monitoring system on Monday and a compliance analyst forms a reasonable suspicion on Wednesday, the STR clock started on Wednesday, not Monday.

BNM examination findings have identified a specific quality gap in STR filings: reports submitted without an adequate documented basis for suspicion. An STR that records "transaction appeared unusual" without specifying what pattern triggered the suspicion, what investigation was conducted, and why the analyst concluded suspicion was warranted, does not meet the standard. The goAML system requires structured data fields to be completed — but the narrative quality of what goes into those fields is what BNM examiners assess.

The internal pathway matters too. Institutions must have a documented process for staff to escalate concerns to the MLRO via an Internal Suspicious Transaction Report (ISTR). Frontline staff who identify red flags and have no clear escalation route — or who fear that escalating will reflect poorly on them — are a systemic gap. BNM expects staff training to address this directly.

AML/CFT Programme Governance

A compliant AML/CFT programme is not a set of policies in a folder. BNM's Policy Document specifies the governance structure that must be in place.

Board-approved compliance programme. The institution's AML/CFT programme must be documented, formally approved by the Board of Directors, and reviewed at minimum annually. A programme that exists only in the compliance officer's head — or that was last updated before the 2020 AMLATFPUAA amendments — is non-compliant.

Designated Compliance Officer (DCO). The DCO must sit at senior management level and must have direct access to the Board or Board Audit Committee when escalation is required. BNM examiners specifically check whether the DCO has the seniority and independence to escalate concerns without internal obstruction. An institution where the MLRO reports upward through the business line whose clients they are monitoring has a structural governance problem.

Independent AML/CFT audit. The audit function — whether internal or conducted by a qualified external party — must assess the AML/CFT programme at least once per year. The scope must cover policy adequacy, operational effectiveness, and staff training outcomes. An audit that confirms the policies exist but does not test whether they work is not what BNM requires.

Staff training. Training must be documented, with records of attendance and assessment results. BNM examiners have cited institutions where training records were incomplete or where training had not been updated to reflect regulatory changes — including the goAML transition and the 2020 AMLATFPUAA amendments.

Common BNM Examination Gaps

Based on publicly available BNM guidance and supervisory feedback, five gaps recur across examinations of Malaysian institutions.

Outdated customer risk assessments. Customers onboarded years ago under different risk criteria and never re-assessed — even when their transaction patterns have materially changed.

Incomplete beneficial ownership documentation for corporate customers. Files that identify a corporate structure but stop at the holding company level, without tracing to the natural persons who ultimately control it.

STRs filed without documented analytical basis. The filing exists, but the rationale is absent. This satisfies neither the spirit nor the operational requirement of the obligation.

Default monitoring thresholds. System thresholds not calibrated to the institution's specific customer risk profile — and no documentation that the calibration question was ever asked.

Inadequate scrutiny of DNFBPs as customers. Banks treating law firm client accounts or real estate agent trust accounts the same as ordinary business accounts, without recognising the elevated risk profile those relationships carry under AMLATFPUAA.

Malaysia's FATF Context: Why Examination Intensity Has Increased

Malaysia's FATF Mutual Evaluation in 2023 assessed both technical compliance and effectiveness — two different standards. Technical compliance measures whether the laws and regulations are in place. Effectiveness measures whether they work.

Malaysia's technical compliance ratings were largely Compliant or Largely Compliant. Its effectiveness ratings were lower — particularly for the transparency of corporate beneficial ownership, where the evaluation found that beneficial ownership information was not always available to competent authorities in a timely way.

For BNM-supervised institutions, the practical effect is this: BNM is under pressure to demonstrate that AML controls are operationally effective, not just formally present. Examination intensity has increased since 2023. The scrutiny on beneficial ownership documentation, on monitoring calibration, and on STR quality is not coincidental. These are the areas the FATF evaluation identified as weakest, and they are the areas BNM examiners are examining most carefully.

Preparing for What Examiners Actually Review

The compliance officer three weeks out from her BNM examination should be checking seven things:

  1. Are customer risk assessments current — specifically for dormant accounts and for customers whose transaction patterns have changed?
  2. Do all corporate customer files trace beneficial ownership to natural persons at the 25% threshold?
  3. Are monitoring thresholds documented with a calibration rationale — and reviewed within the last 12 months?
  4. Do STR files contain a structured basis for suspicion, not just a transaction reference?
  5. Is the DCO's seniority and Board access documented?
  6. Was the AML/CFT audit conducted in the past year, and did its scope include operational testing?
  7. Are staff training records complete and current for all frontline and compliance staff?

These are not abstract compliance questions. They are the specific items that BNM examinations have produced findings on. Getting them right before the examination is considerably easier than explaining gaps during it.

If you want to see how Tookitaki's platform supports CDD, transaction monitoring calibration, and STR quality management for BNM-supervised institutions, book a demo. Or download our Malaysia AML compliance checklist for a full pre-examination review framework tailored to AMLATFPUAA and the BNM AML/CFT Policy Document. For institutions evaluating or upgrading their monitoring systems, the Transaction Monitoring Software Buyer's Guide covers what to look for and what to ask vendors about calibration and alert management. If you're new to the foundations of KYC and CDD, our What Is KYC guide provides the conceptual grounding the Policy Document assumes you have.

AML Compliance in Malaysia: A Complete Guide to BNM Requirements and AMLATFPUAA
Blogs
29 Apr 2026
6 min
read

Payment Services Act Singapore: AML Obligations for Licensed Payment Institutions

The MAS approval letter arrives. The Major Payment Institution licence is granted. The founders celebrate. The press release goes out.

Then the compliance team sits down.

The PSA licence covers seven categories of payment service activity, and the AML/CFT obligations attached to each are substantive. Unlike MAS Notice 626 for banks, which has years of published guidance, examination findings, and industry interpretation built around it, the PSA AML framework is less documented. The notices exist. The obligations are real. But the compliance team at a newly licensed MPI often has to build from scratch, without the institutional knowledge that banks have accumulated since 2002.

This guide covers what the Payment Services Act requires from licensed payment institutions in Singapore, specifically on AML/CFT. It is written for compliance officers, MLROs, and legal teams at standard payment institutions (SPIs) and major payment institutions (MPIs) who know what the PSA is but need to understand their specific obligations in detail.

Talk to an Expert

The PSA Framework: Scope and Licence Tiers

The Payment Services Act 2019 (PSA) came into force on 28 January 2020 and was substantially amended by the Payment Services (Amendment) Act 2021 (PS(A)A 2021), which extended regulatory coverage to previously unregulated services and introduced stricter obligations for digital payment token providers.

The PSA regulates seven categories of payment service:

  1. Account issuance services
  2. Domestic money transfer services
  3. Cross-border money transfer services
  4. Merchant acquisition services
  5. E-money issuance services
  6. Digital payment token (DPT) services
  7. Money-changing services

A firm does not need to offer all seven to be licensed. Many MPIs hold licences for two or three categories — a cross-border remittance operator with an e-money issuance component is common. Each service category the firm is licensed for carries AML/CFT obligations independently.

Two Licence Tiers, Different AML Exposure

The PSA creates two licence tiers that determine the depth of AML obligations.

Standard Payment Institutions (SPIs) are subject to monthly transaction thresholds: SGD 3 million per month across all regulated services, or SGD 1.5 million per month for any single regulated service. At these volumes, SPIs can apply simplified CDD in some circumstances and face lighter ongoing monitoring requirements.

Major Payment Institutions (MPIs) exceed those thresholds. MPIs face the full suite of AML/CFT obligations under MAS Notice PSN01 (or PSN02 for DPT services). MAS expects MPI-level controls to be equivalent in standard to those at licensed banks — the fact that a firm is a payment institution rather than a bank does not reduce the expectation.

One important clarification on scope: the PSA exempts certain intra-group transfers and specific corporate treasury services from its regulated activities. Whether a firm's particular activity falls within an exemption requires analysis of the specific transaction flows — MAS has not published a comprehensive list, and several firms have sought clarification through the licensing process itself.

MAS Notice PSN01: The Core AML Obligations

MAS Notice PSN01 — "Prevention of Money Laundering and Countering the Financing of Terrorism — Holders of a Standard Payment Institution Licence or a Major Payment Institution Licence (Non-DPT Services)" — was issued under section 103 of the PSA and took effect when the Act commenced in January 2020.

PSN01 applies to payment institutions providing any of the seven regulated services except DPT services (which fall under PSN02, covered below). Its structure mirrors MAS Notice 626 for banks, adapted for the payment context.

The four core obligation areas under PSN01 are:

1. Customer Due Diligence (CDD)

Payment institutions must identify and verify customers, understand the nature and purpose of the business relationship, and conduct ongoing monitoring. The CDD threshold for occasional transactions is SGD 1,500 — lower than the SGD 5,000 threshold that applies to banks under Notice 626. This difference reflects the higher anonymity risk in payment services, where customer relationships are typically shorter and account history shallower than in traditional banking.

Enhanced due diligence (EDD) is required for:

  • Any transaction above SGD 5,000
  • Cross-border transfers to or from jurisdictions on the FATF grey or black list
  • Customers who present higher-risk indicators under the institution's risk assessment

Simplified CDD is available only for SPI-tier products with capped e-money balances — the maximum cap for simplified CDD to apply is SGD 5,000 in stored value.

2. Ongoing Monitoring

PSN01 requires payment institutions to monitor transactions for unusual or suspicious patterns. The monitoring standard is explicitly equivalent to that imposed on banks under Notice 626. There is no licence-tier carve-out for MPIs: a major payment institution must run monitoring that meets bank-grade expectations.

In practice, this is where many payment institutions fall short. [Transaction monitoring in the MAS context](/compliance-hub/transaction-monitoring-singapore-mas-requirements) requires calibrated alert logic, documented investigation workflows, and audit trails that MAS can review. Payment institutions often have none of these at the point of licence grant — they have the licence, but not the infrastructure.

3. Suspicious Transaction Reporting (STR)

STR obligations do not come from the PSA itself — they come from the Corruption, Drug Trafficking and Other Serious Crimes (Confiscation of Benefits) Act (CDSA). Section 39 of the CDSA requires any person who knows or has reasonable grounds to suspect that property represents proceeds of drug trafficking or other serious crimes to file a report with the Suspicious Transaction Reporting Office (STRO).

The practical timeline is one business day from the point at which suspicion forms. That formation date matters: MAS examination findings have treated cases where the suspicion formation date was left blank or set to the date of filing (rather than the date of the underlying discovery) as incomplete reports — even where the filing itself was technically made within the window.

4. Record-Keeping

CDD documents and transaction records must be retained for five years from the date the transaction was conducted or the business relationship ended. MAS can request records going back up to five years in the course of an examination.

One PSN01 Obligation Per Service

PSN01 contains a provision that compliance teams at multi-service payment institutions sometimes miss: a firm licensed to provide both cross-border money transfer services and e-money issuance services must comply with PSN01 separately for each service. CDD performed for a customer under the cross-border transfer service does not automatically satisfy CDD requirements for the same customer's e-money transactions. The records, processes, and monitoring must address each licensed service independently.

MAS Notice PSN02: DPT Service Providers

MAS Notice PSN02 — "Prevention of Money Laundering and Countering the Financing of Terrorism — Holders of a Standard Payment Institution Licence or Major Payment Institution Licence Carrying on Digital Payment Token Service" — applies to firms licensed to offer DPT services: crypto exchanges, digital asset custodians, and related providers.

PSN02 carries higher-risk obligations than PSN01, reflecting MAS's view that DPT services present specific money laundering and terrorism financing risks not present in traditional payment services.

The additional obligations under PSN02 include:

Travel Rule compliance: PSN02 implements FATF Recommendation 16 for virtual assets. Licensed DPT service providers must collect, verify, and transmit originator and beneficiary information for DPT transfers above SGD 1,500. For transfers to or from unhosted wallets (wallets not held at a licensed provider), enhanced procedures apply. MAS has not mandated a specific technical standard for travel rule compliance, but expects firms to use an approved solution with documented coverage for the counterparty jurisdictions they transact with.

Blockchain-specific monitoring: Alert logic for DPT transactions must address blockchain-native risk indicators — rapid multi-hop transfers across wallets, use of mixing or tumbling services, high-velocity micro-transactions consistent with layering, and activity consistent with known illicit addresses. Standard bank transaction monitoring typologies do not map cleanly to on-chain behaviour, and PSN02 examiners expect DPT-specific rule sets.

Heightened examination intensity post-2022: Following the collapse of FTX in November 2022 and MAS's subsequent review of licensed DPT providers, MAS substantially increased the frequency and depth of PSN02 examinations. Several DPT licence holders received remediation requirements in 2023 and 2024. STR filing quality and travel rule implementation were the two most commonly cited deficiencies.

ChatGPT Image Apr 29, 2026, 10_38_38 AM

CDD Under the PSA: What the Thresholds Mean in Practice

The SGD 1,500 occasional transaction threshold in PSN01 is one of the more misunderstood elements of the PSA framework.

Under Notice 626, banks do not need to apply full CDD to occasional transactions below SGD 5,000. Payment institutions under PSN01 must apply CDD at SGD 1,500. That is not a minor administrative difference. In a remittance business processing hundreds of transactions daily, a significant proportion of transactions will fall between SGD 1,500 and SGD 5,000. Each of those requires customer identification and verification under PSN01 — which requires a technology and process infrastructure that can handle that volume.

In examination, MAS specifically checks whether SGD 1,500 thresholds are being applied in practice — not just whether the institution's CDD policy says they should be. The gap between policy and operational execution is a recurring finding.

For KYC processes at licensed payment institutions, the relevant question is not just whether the institution can identify a customer, but whether the identification is being triggered at the correct transaction threshold, documented correctly, and linked to the transaction monitoring record.

Transaction Monitoring: Where Payment Institutions Fall Short

MAS's 2024 supervisory expectations document specifically noted that transaction monitoring at payment institutions is "less mature" than at banks. This is both a diagnostic and a warning — MAS has signalled that payment institution TM controls are now an examination priority.

Three factors make transaction monitoring operationally harder for payment institutions than for banks:

Shorter customer history: Banks accumulate years of transaction history per customer before alerts are calibrated. Many payment institution customers have been active for months. Baseline behaviour is harder to establish, which means both that unusual patterns are harder to identify and that alert false positive rates tend to be higher.

Faster transaction cycles: Payment transactions settle in minutes or seconds. A structuring pattern that would take weeks to manifest in a bank account can appear and disappear in a payment institution in 48 hours. Monitoring rules must be configured to detect compressed timescales.

Higher cross-border exposure: Cross-border money transfer services, by definition, move funds across jurisdictions — often to markets with weaker AML frameworks. Alert rules for cross-border transfers need jurisdiction-specific calibration, not a single global threshold.

The full MAS transaction monitoring framework covers how these factors should be addressed in a Singapore-compliant monitoring programme.

What MAS Examines at PSA-Licensed Firms

Based on published MAS supervisory findings and the 2024 expectations document, PSA examinations focus on five areas:

CDD threshold application: Are SGD 1,500 triggers actually running in production? Examiners test this by pulling a sample of transactions in the SGD 1,500–5,000 range and checking whether CDD was conducted and documented.

Travel rule compliance for cross-border transfers: For MPI-licensed firms providing cross-border money transfer services, examiners check whether FATF Recommendation 16 originator/beneficiary information is being collected, verified, and transmitted — and whether the institution has procedures for counterparties who cannot receive travel rule data.

STR filing quality: MAS does not measure STR performance primarily by volume. Examiners look at the narrative content of individual STR filings — specifically whether the filing documents the basis for suspicion, the investigation steps taken, and the transaction evidence reviewed. Filings that state "suspicious activity detected" without specifying what made the activity suspicious are treated as incomplete, regardless of whether they were filed on time.

Alert calibration for payment-specific typologies: Generic bank-derived alert rules applied without adaptation are a common finding. Examiners look for rules that address mule account patterns in remittance flows (rapid inbound/outbound cycling with no retention), sub-threshold structuring designed to avoid PSN01 CDD triggers, and rapid account turnover in payment accounts.

PS(A)A 2021 compliance: The 2021 amendment extended PSA coverage to previously unregulated services and increased MAS supervisory powers, including the ability to impose restrictions on MPI licence holders mid-licence. Firms that were operating before the amendment took effect and were brought within scope had a transition period — but that period has elapsed. Any firm that believes its legacy service structure still falls outside the PSA framework should obtain current legal advice.

The 2021 Amendment: What Changed

The Payment Services (Amendment) Act 2021 made three changes relevant to AML compliance:

First, it extended the PSA's regulated activity definitions to capture services previously argued to be outside scope — in particular, certain token-based payment services and digital representation of fiat currency.

Second, it introduced new obligations for DPT service providers, bringing Singapore into alignment with FATF's revised Recommendation 15 on virtual assets. This is the legislative foundation for PSN02 and its enhanced requirements.

Third, it expanded MAS's supervisory toolkit. Under the amended Act, MAS can impose conditions on MPI licences that restrict specific product lines or transaction types while an investigation or remediation is ongoing. This is a more targeted instrument than suspension, and MAS has used it in at least two disclosed cases since 2022.

Building Compliance Infrastructure That Meets PSA Expectations

A PSA licence is not a compliance programme. The licence grants permission to operate; the AML/CFT framework is built after that.

For newly licensed MPIs and SPIs, the gap between what MAS requires and what most firms have at licence grant is significant. PSN01 requires calibrated transaction monitoring, documented CDD at SGD 1,500 thresholds, investigation workflows that leave auditable records, and STR filings with substantive narrative content. These are not features that come pre-configured — they require technology, process design, and trained personnel.

If you are building or evaluating a transaction monitoring programme for a Singapore-licensed payment institution, the Transaction Monitoring Software Buyer's Guide covers what to look for in a system designed for payment services risk — including alert calibration for remittance typologies, travel rule integration, and MAS-examination-ready documentation.

For compliance teams at payment institutions assessing whether their current controls meet MAS's 2024 supervisory expectations, Tookitaki works with licensed payment institutions in Singapore to implement AML/CFT programmes built for PSN01 and PSN02 requirements. Book a demo to see how FinCense addresses payment-specific transaction monitoring and STR documentation.

Payment Services Act Singapore: AML Obligations for Licensed Payment Institutions
Blogs
23 Apr 2026
5 min
read

Understanding the Source of Funds in Financial Transactions

In today's financial landscape, understanding the source of funds (SOF) is crucial for ensuring compliance and preventing financial crimes. Financial institutions must verify the origin of funds to comply with regulations and mitigate risks. This blog post delves into the meaning, importance, best practices, and challenges of verifying the source of funds.

Source of Funds in AML: What It Is and How Banks Verify It

Source of Funds Meaning

The term "source of funds" refers to the origin of the money used in a transaction. This can include earnings from employment, business revenue, investments, or other legitimate income sources.

{{cta-first}}

Source of Funds Example

For instance, if someone deposits a large sum of money into their bank account, the bank needs to verify whether this money came from a legitimate source, such as a property sale, inheritance, or salary.

Here are some common sources of funds:

  • Salary: Imagine you've been saving up from your job to buy a new gaming console. When you finally get it, your salary is the Source of Funds for that purchase. In the grown-up world, this could mean someone buying a house with the money they've saved from their job.
  • Inheritance: Now, let's say your grandma left you some money when she passed away (may she rest in peace), and you use it to start a college fund. The inheritance is your Source of Funds for that college account.
  • Business Profits: If you have a lemonade stand and make some serious cash, and then you use that money to buy a new bike, the profits from your business are your Source of Funds for the bike.
  • Selling Assets: Let's say your family decides to sell your old car to buy a new one. The money you get from selling the old car becomes the Source of Funds for the new car purchase.
  • Investments and Dividends: Suppose you've invested in some stocks, and you make a nice profit. If you use that money to, say, go on vacation, then the money you made from your investments is the Source of Funds for your trip.

Difference Between Source of Funds and Source of Wealth

Source of Funds (SOF) refers to the origin of the specific money involved in a transaction, such as income from employment, sales, or loans. It is focused on the immediate funds used in a particular financial activity.

Source of Wealth (SOW), on the other hand, pertains to the overall origin of an individual’s total assets, including accumulated wealth over time from various sources like investments, inheritances, or business ownership. It provides a broader view of the person's financial background.

Importance of Source of Funds Verification

Regulatory Requirements and Compliance

Verifying the source of funds is essential for financial institutions to comply with regulations such as anti-money laundering (AML) laws. Regulatory bodies like the Financial Action Task Force (FATF) mandate stringent checks to ensure that funds do not originate from illegal activities.

Financial and Reputational Risks

Failure to verify the source of funds can result in significant financial penalties and damage to an institution's reputation. Banks and other financial entities must implement robust verification processes to avoid involvement in financial crimes and maintain public trust.

Best Practices for Source of Funds Verification

Risk-Based Approach

Implementing a risk-based approach means assessing the risk level of each transaction and customer. Higher-risk transactions require more rigorous verification, ensuring that resources are allocated efficiently and effectively.

Advanced Technology Utilization

Utilizing advanced technologies such as artificial intelligence and machine learning can enhance the efficiency and accuracy of source of funds verification. These technologies can analyze large datasets quickly, identifying potential red flags.

Regular Updates and Audits

Maintaining updated records and conducting regular audits are crucial for an effective source of funds verification. This ensures that the verification processes remain robust and compliant with the latest regulations.

Source of Funds Requirements Across APAC

FATF Recommendation 13 requires financial institutions to apply enhanced due diligence, including source of funds verification for high-risk customers and transactions. In practice, each APAC regulator has translated this into specific obligations.

Australia (AUSTRAC)

Under the AML/CTF Rules Part 7, AUSTRAC requires ongoing customer due diligence that includes verifying source of funds when a transaction or customer profile is inconsistent with prior behaviour or stated purpose. Enhanced customer due diligence — triggered by high-risk customer classification, PEP status, or unusual transaction patterns — requires documented source of funds evidence before the transaction proceeds or the relationship continues.

Acceptable documentation under AUSTRAC guidance includes: recent pay slips (last 3 months), business financial statements, tax returns, property sale contracts, or investment account statements. For inheritance-sourced funds, a grant of probate or solicitor letter is required.

Singapore (MAS)

MAS Notice 626 requires Singapore-licensed FIs to verify source of funds as part of enhanced due diligence for high-risk customers and any customer whose funds originate from high-risk jurisdictions. MAS examination findings have consistently cited inadequate SOF documentation as a gap — specifically, accepting verbal declarations without supporting evidence.

Malaysia (BNM)

BNM's AML/CFT Policy Document requires source of funds verification for EDD-triggered customers, high-value transactions above MYR 50,000 in cash-equivalent form, and corporate accounts where beneficial ownership is complex. BNM specifically requires that SOF evidence be independently verifiable — a customer's own declaration is not sufficient for high-risk accounts.

Philippines (BSP)

BSP Circular 706 and its amendments require source of funds verification for customers classified as high-risk under the institution's risk assessment, and for any transaction that appears inconsistent with the customer's known financial profile. AMLC's guidance notes that source of funds documentation must be retained for a minimum of 5 years.

Common Sources of Funds

Legitimate Sources

Legitimate sources of funds include earnings from employment, business income, investment returns, loans, and inheritances. These sources are generally verifiable through official documentation such as pay slips, tax returns, and bank statements.

Illegitimate Sources

Illegitimate sources of funds might include money from illegal activities such as drug trafficking, fraud, corruption, or money laundering. These sources often lack proper documentation and can pose significant risks to financial institutions if not properly identified and reported.

Challenges in Verifying Source of Funds

Complex Transactions

Complex transactions, involving multiple parties and jurisdictions, pose significant challenges in verifying the source of funds. Tracing the origin of such funds requires comprehensive analysis and robust systems to track and verify all related transactions.

Privacy and Data Protection Concerns

Verifying the source of funds often involves handling sensitive personal data. Financial institutions must balance the need for thorough verification with strict adherence to privacy and data protection regulations, ensuring that customer information is secure.

{{cta-guide}}

What Good Source of Funds Verification Looks Like in Practice

The institutions that handle SOF verification most effectively treat it as a tiered process, not a one-size-all checklist.

For standard-risk customers, verification at onboarding is enough — pay slips, a bank statement, or a tax return. For high-risk customers, EDD-triggered accounts, or transactions that don't fit the pattern, that standard is higher: independently verifiable documentation, a paper trail that shows the funds' journey from origin to arrival, and a compliance officer's written sign-off.

The documentation requirement is not the hard part. The hard part is knowing when to apply it — and that is a transaction monitoring question as much as a KYC question. A source of funds issue that doesn't get flagged at monitoring never reaches the verification stage.

For more on building the monitoring programme that surfaces these cases, see our Transaction Monitoring Software Buyer's Guide and our complete guide to KYC and customer due diligence.

Talk to Tookitaki's team about how FinCense handles source of funds flags as part of an integrated AML and transaction monitoring programme.

Frequently Asked Questions

1. What is source of funds in AML?
Source of funds refers to where the money used in a specific transaction or business relationship comes from. In AML compliance, financial institutions review source of funds to understand whether the money is legitimate and whether it matches the customer’s profile and declared activity.

2. Why is source of funds important in AML compliance?
Source of funds is important because it helps financial institutions assess whether the money involved in a transaction is consistent with what they know about the customer. It supports due diligence, helps identify unusual activity, and reduces the risk of money laundering or other financial crime.

3. What is the difference between source of funds and source of wealth?
Source of funds refers to the origin of the money used in a particular transaction or account activity. Source of wealth refers to how a customer built their overall wealth over time. In simple terms, source of funds looks at where this money came from, while source of wealth looks at how the person became wealthy in general.

4. How do financial institutions verify source of funds?
Financial institutions may verify source of funds using documents such as bank statements, salary slips, business income records, property sale agreements, inheritance papers, dividend records, or other documents that explain where the money originated. The exact documents required depend on the customer, the transaction, and the level of risk involved.

5. When is source of funds verification required?
Source of funds verification is commonly required during customer onboarding, enhanced due diligence, high-risk transactions, or periodic reviews. It may also be requested when a transaction appears unusual or does not match the customer’s known financial behaviour.

6. Is source of funds verification required for every customer?
Not always. The depth of source of funds verification usually depends on the customer’s risk level, the nature of the transaction, and applicable AML regulations. Higher-risk customers and more complex transactions generally require closer scrutiny.

7. What source of funds documentation does AUSTRAC accept?
AUSTRAC's AML/CTF guidance accepts: recent pay slips (last 3 months), business financial statements or tax returns, property sale contracts with settlement documentation, investment account statements, and for inherited funds, a grant of probate or solicitor's letter. Verbal declarations are not sufficient for high-risk customers or transactions triggering enhanced due diligence.

8. Is source of funds verification required for every transaction?No. Source of funds verification is triggered by risk level, not transaction volume. Standard-risk retail customers verified at onboarding do not require SOF documentation for routine transactions. The trigger points are: EDD classification, PEP status, transactions inconsistent with the customer's stated financial profile, high-value cash transactions above reporting thresholds, and periodic review of high-risk accounts. See your regulator's specific guidance — AUSTRAC's Part 7, MAS Notice 626, or BNM's AML/CFT Policy Document — for the applicable triggers in your jurisdiction.

Understanding the Source of Funds in Financial Transactions