Compliance Hub

AML Reporting in the Philippines: Trends and Future Prospects

Site Logo
Tookitaki
10 min
read

In an increasingly globalized world, financial systems are under constant scrutiny to prevent illicit activities such as money laundering and terrorist financing. A key component in the battle against these illegal activities is Anti-Money Laundering (AML) reporting, a crucial process that helps regulators identify suspicious financial transactions and take appropriate action. This blog will delve into the importance of AML reporting, its current state in the Philippines, and the future prospects shaping this critical area of financial regulation.

AML reporting is more than just a regulatory requirement; it serves as a first line of defence in protecting the integrity of financial systems. By identifying and flagging potentially suspicious activities, AML reporting assists in detecting, preventing, and prosecuting financial crimes. It safeguards the financial sector from being exploited for illicit purposes and plays a significant role in maintaining public trust in the financial system.

In the Philippines, AML reporting is governed by the Anti-Money Laundering Act (AMLA) and is overseen by the Bangko Sentral ng Pilipinas (BSP). The existing AML reporting framework requires banks and other financial institutions to monitor transactions, maintain appropriate records, and promptly report any suspicious activities. Despite the comprehensive regulations in place, the AML reporting landscape in the Philippines faces numerous challenges, including the need for more efficient reporting processes and the integration of new technologies for more effective detection of illicit activities.

This blog aims to examine the trends and future prospects for AML reporting in the Philippines. It seeks to highlight the recent regulatory changes, their potential impact on financial institutions, and how these institutions can effectively navigate the evolving landscape of AML reporting. Through this exploration, we hope to contribute to the ongoing dialogue about the future of AML reporting in the Philippines and its crucial role in safeguarding the integrity of the country's financial system.

AML Reporting in the Philippines: The Current Scenario

As we delve into the state of AML reporting in the Philippines, it's essential to understand the existing framework, the role of the regulatory body, and the challenges that this sector currently faces.

The Existing AML Reporting Framework

The Anti-Money Laundering Act (AMLA) forms the backbone of the Philippines' AML reporting framework. Under this Act, banks and other financial institutions are required to:

  • Conduct customer due diligence: Financial institutions must identify and verify the identity of their customers, understand the nature of their business, and assess the risk they pose.
  • Maintain records: Detailed records of all transactions must be kept for five years. These records should be sufficient to facilitate the reconstruction of individual transactions, provide evidence for the prosecution of criminal activity, and assist with the bank's internal audit and high-risk account management.
  • Report suspicious transactions: All transactions deemed suspicious, regardless of the amount involved, must be reported to the Anti-Money Laundering Council (AMLC).
  • Report covered transactions: Transactions exceeding PHP 500,000 (or its equivalent in foreign currency) within one banking day must also be reported to the AMLC.
Philippines-Know Your Country

The Role of the Bangko Sentral ng Pilipinas (BSP)

The Bangko Sentral ng Pilipinas (BSP) plays a pivotal role in AML reporting in the Philippines. It supervises banks and other financial institutions to ensure compliance with the AMLA. It also issues circulars that provide guidelines on AML policies and procedures. This includes the identification and management of risks, the establishment of an internal AML control system, and the regular training of personnel. The BSP is empowered to impose sanctions for non-compliance and can conduct regular examinations to assess an institution's AML controls.

Challenges in AML Reporting

Despite the robust regulatory framework, AML reporting in the Philippines faces several challenges:

  • Technology integration: Many financial institutions are still in the process of fully integrating technology into their AML reporting processes. This can lead to inefficiencies and increase the chances of human error.
  • Data quality: Accurate AML reporting relies on the quality of data collected. Outdated or incorrect customer information can hinder effective monitoring and reporting.
  • Regulatory compliance: Keeping up with changing regulations can be a significant challenge for many institutions. Non-compliance can result in hefty penalties and reputational damage.
  • Training and capacity building: Ensuring that employees understand AML regulations and are trained to detect and report suspicious activities is a continuous challenge.

Understanding these challenges is the first step towards improving AML reporting in the Philippines. In the following sections, we will discuss recent regulatory changes and the future of AML reporting in the country.

Recent Developments in AML Reporting in the Philippines

The landscape of Anti-Money Laundering reporting in the Philippines is undergoing significant change. In a move to strengthen the country's AML regime, the Bangko Sentral ng Pilipinas (BSP) has released a draft circular outlining proposed amendments to the existing ML, TF, and PF risk reporting for banks and non-bank financial institutions. These proposed changes aim to increase the transparency and accountability of financial institutions in identifying and reporting financial crime risks.

Understanding the Proposed Amendments

The proposed changes put forward by the BSP are far-reaching and could potentially reshape how financial institutions handle ML, TF, and PF risk reporting. Here's a detailed exploration of these changes:

  • 24-Hour Notification Requirement: The amendments require supervised financial institutions (BSFIs) to notify the central bank within 24 hours from the “date of knowledge of any significant ML/TF/PF risk event.” This means that BSFIs, which include banks and fintech companies such as digital banks, payment services and e-wallets, must be prepared to identify and report any significant risks related to ML/TF/PF swiftly.
  • Annual Reporting Package: Another major proposed change is the requirement for covered entities to submit an annual anti-money laundering/countering terrorism and proliferation financing reporting package (ARP). The ARP must be submitted to the BSP within 30 banking days after the end of the reference year. This package is designed to provide the BSP with a comprehensive overview of an institution's AML/CFT/CPF measures, risk assessments and controls, customer due diligence procedures, transaction monitoring systems, and suspicious activity reports (SARs) filed during the year.

Implications for Financial Institutions

These changes are likely to have several implications for financial institutions:

  • Increased Operational Requirements: The new reporting requirements will necessitate a quicker turnaround for identifying and reporting risk events. Financial institutions may need to invest in advanced transaction monitoring systems to identify risks in real-time and report them within the stipulated 24-hour window.
  • Enhanced Compliance Obligations: The requirement to submit an annual ARP will place additional compliance obligations on financial institutions. They will need to develop a systematic way of compiling the ARP that includes all the necessary details about their AML/CFT/CPF measures.
  • Stricter Supervision: With the BSP receiving more frequent and detailed reports, financial institutions can expect stricter supervision and potentially more rigorous examinations of their AML/CFT/CPF controls.

In the upcoming sections, we'll explore how financial institutions can navigate these changes and maintain compliance with the evolving AML regulations.

Impact of the New AML Reporting Requirements

The proposed amendments to the AML reporting requirements in the Philippines are set to have a profound impact on the operations and compliance functions of financial institutions. As we dive deeper into the implications, we see both challenges and opportunities emerging for these institutions and the broader AML regime in the Philippines.

Operational Impact on Financial Institutions

Real-time Risk Identification: The requirement for BSFIs to report any significant ML/TF/PF risk event within 24 hours necessitates the ability to identify risks in real-time. This will likely push financial institutions to enhance their risk identification and reporting capabilities, possibly incorporating advanced technologies such as AI and machine learning.

  • Increased Compliance Burden: The requirement to submit an ARP annually will increase the compliance burden on financial institutions. They will need to establish processes for compiling the necessary data and ensure that it is complete and accurate. This may involve revisiting their data management systems and possibly investing in technology solutions that can automate parts of the process.
  • Enhanced Training and Culture: Given the increased reporting requirements, there will be a need for appropriate training of staff to understand and manage these new obligations. This could lead to a stronger compliance culture within organizations as they adapt to the heightened regulatory expectations.

Implications for the AML Regime in the Philippines

  • Greater Transparency: With more frequent and detailed reporting, there will be greater transparency in the financial system. This could help regulators like the BSP to better understand the risk landscape and take more effective steps to mitigate ML/TF/PF risks.
  • Increased Accountability: The proposed changes could also lead to increased accountability of financial institutions for their AML/CFT/CPF controls. This could potentially raise the bar for compliance across the sector and discourage non-compliance.
  • Strengthened AML Framework: On a broader level, these amendments are an important step towards strengthening the AML regime in the Philippines. They align with international best practices and could help the country improve its standing with global bodies like the Financial Action Task Force (FATF).

As we move towards a future of enhanced AML reporting requirements, financial institutions will need to adapt and evolve. In the following section, we will discuss strategies that they can adopt to navigate these changes effectively.

{{cta-ebook}}

Future Prospects for AML Reporting in the Philippines

As we look ahead, the landscape of AML reporting in the Philippines is poised for significant evolution. The recent proposed amendments by BSP are just the starting point for a future that could be marked by advanced technologies, increased transparency, and tighter regulations. Let's dive deeper into these predicted trends and the potential benefits and challenges they bring.

Predicted Trends in AML Reporting

  • Technological Advancements: The new reporting requirements will likely drive financial institutions to adopt advanced technologies such as artificial intelligence and machine learning. These technologies can enable real-time risk identification and automation of compliance processes, helping institutions meet the stringent timelines set by the BSP.
  • Collaborative Efforts: In response to the heightened regulatory expectations, we could see an increase in collaborative efforts within the financial sector. Institutions might join forces to share best practices, develop industry-wide solutions, and engage in collective advocacy.
  • Risk-Based Approach: With the BSP's increased focus on understanding and mitigating ML/TF/PF risks, financial institutions will likely move towards a more risk-based approach to AML compliance. This approach involves identifying and assessing risks and tailoring controls accordingly, which can lead to more effective risk management.

Potential Benefits and Challenges

Each of these trends brings potential benefits and challenges:

  • Benefits: Technological advancements can streamline compliance processes and improve risk identification, potentially saving time and resources. Collaborative efforts can lead to industry-wide improvements and stronger advocacy. The risk-based approach, meanwhile, can enhance the effectiveness of AML controls and help institutions avoid regulatory penalties.
  • Challenges: While technology can automate many processes, it also requires significant investment and poses risks such as cybersecurity threats. Collaboration, though beneficial, can be challenging to coordinate and may raise issues related to data privacy. The risk-based approach, although more effective, is also more complex to implement than rule-based approaches and requires a good understanding of the institution's risk profile.

Navigating the Changing Landscape of AML Reporting

As the AML reporting landscape in the Philippines undergoes transformation, financial institutions must be proactive and strategic to effectively navigate the changes. Here are some key considerations and recommendations for adapting to the new AML reporting requirements.

Understanding the New Requirements

First and foremost, institutions must fully understand the new AML reporting requirements. This involves carefully reviewing the proposed amendments, consulting with legal and compliance experts, and participating in BSP’s consultations and training sessions. A clear understanding of the requirements is the foundation for effective compliance.

Risk Assessment and Management

Institutions should also revamp their risk assessment and management procedures. The proposed changes emphasize the importance of identifying and managing ML/TF/PF risks. Institutions should therefore ensure they have robust systems for risk assessment, including procedures for identifying high-risk customers and transactions, and for mitigating these risks.

Investing in Technology and Innovation

Technology will play a crucial role in facilitating compliance with the new AML reporting requirements. Innovative solutions can automate the compliance process, enabling institutions to quickly identify and report significant ML/TF/PF risk events. AI and machine learning, for instance, can be used to analyze vast amounts of data and detect suspicious activities that may not be easily identifiable by humans.

Investing in technology, however, is not just about buying the latest software. It also involves integrating the technology into the institution's operations and training staff to use it effectively. Institutions should therefore develop a technology implementation plan that includes staff training and ongoing support.

Collaborating and Sharing Best Practices

Finally, institutions can benefit from collaborating and sharing best practices. This could involve forming partnerships with other institutions to develop joint solutions, or participating in industry forums to share experiences and learn from others. Such collaboration can lead to more effective and efficient compliance strategies.

Looking Ahead: Embracing the Future of AML Reporting in the Philippines

As we wrap up our deep dive into the evolving landscape of AML reporting in the Philippines, let's recap some of the main points we've covered:

  • The Bangko Sentral ng Pilipinas (BSP) has proposed critical amendments to the AML reporting framework to enhance the transparency and accountability of financial institutions in identifying and reporting ML/TF/PF risks.
  • These changes aim to fortify the AML regime in the Philippines, having implications for the operations and compliance efforts of financial institutions.
  • We've also explored the future trends of AML reporting in the country, emphasizing the potential benefits and challenges that these trends could bring.
  • Lastly, we discussed how financial institutions can navigate these changes, emphasizing the importance of understanding the new requirements, effective risk management, leveraging technology, and collaborative efforts.

The future of AML reporting in the Philippines is bright, albeit not without its challenges. As the landscape continues to evolve, financial institutions that stay informed, adapt, and embrace innovation will be best positioned to meet these challenges head-on.

At Tookitaki, we understand the significance of these changes and the need for financial institutions to stay ahead. Our AML transaction monitoring solution is designed to automate and streamline the compliance process, making it easier for you to identify and report suspicious activities in a timely manner.

If you're a covered financial institution in the Philippines looking to bolster your AML reporting capabilities, we encourage you to book a demo of Tookitaki’s AML Suite. Our solution can help you navigate the changing landscape, ensure compliance, and contribute to the integrity and stability of the financial sector in the Philippines.

Talk to an Expert

Ready to Streamline Your Anti-Financial Crime Compliance?

Our Thought Leadership Guides

Blogs
04 May 2026
7 min
read

Reducing False Positives in Transaction Monitoring: A Practical Playbook

It is 9:30 on a Tuesday. The overnight batch run has finished. The alert queue shows 412 cases requiring review. Your team of five analysts has roughly six hours of productive investigation time between them today.

Do the arithmetic: each analyst needs to process 82 alerts to clear the queue before the next batch runs. At 20 minutes per alert — if the review is thorough — that is 27 hours of work for five people. It cannot be done properly. It will not be done properly.

And buried somewhere in those 412 alerts are the 20 or so that actually matter.

This is not a hypothetical. APAC compliance teams at banks, payment service providers, and fintechs describe exactly this operating reality. The false positive transaction monitoring problem is not a technical metric — it is a daily management failure that compounds over time. Analysts triage faster to survive the queue. The real signals get the same two-minute review as the noise. The programme that exists on paper bears no resemblance to what actually happens.

This article is not about what false positives are. If you are reading this, you know. It is about the cost of living with a high AML false positive rate — and the five practical steps that compliance teams use to bring it down.

Talk to an Expert

What a High False Positive Rate Actually Costs

The standard complaint about transaction monitoring alert fatigue is that it wastes analyst time. That framing understates the problem.

Analyst capacity: the numbers are stark. At a 95% false positive rate with 400 alerts per day, 380 are dead ends. At 20 minutes per alert — which is the minimum for a documented, defensible triage — that is 127 analyst-hours per day spent reviewing noise. A compliance team needs approximately 16 full-time analysts doing nothing but alert triage to manage that volume at an adequate standard. Most APAC institutions have two to five.

Missed genuine signals: the hidden cost. The real damage is not the wasted hours — it is what happens to the 20 genuine alerts buried in 380 false ones. When analysts are clearing a 400-alert queue with limited capacity, they cannot give each case appropriate attention. The suspicious transaction that warrants a 90-minute EDD review gets the same 3 minutes as the noise around it. Alert fatigue is not just inefficiency. It is a mechanism for missing financial crime.

Regulatory exposure: backlogs are a finding. AUSTRAC's examination methodology includes review of alert disposition quality and queue backlogs. A compliance programme with a permanent backlog — where cases are not being reviewed within a defensible timeframe — is a programme finding, not merely an operational concern. MAS Notice 626 similarly expects that suspicious transaction monitoring is effective, not just that a system exists. Regulators in both jurisdictions have cited inadequate alert review as an examination failure in enforcement actions. The AML false positive rate problem is a regulatory risk, not a process inefficiency.

Staff turnover: the compounding effect. AML analysts in APAC are in short supply, and the shortage is getting worse as the regulated population expands under frameworks like Australia's Tranche 2 reforms and Singapore's digital banking licensing regime. A team that spends 90% of its time closing dead-end alerts has a retention problem. The analysts who leave are the ones with enough experience to find a role where their work matters. The ones who stay become less effective over time. Institutional knowledge walks out the door.

Why Rule-Based Systems Generate High False Positive Rates

Before addressing the fix, the cause.

Most transaction monitoring platforms in production at APAC banks and payment firms are built primarily on rules — logic statements that fire when a transaction crosses a defined threshold. The problem is not that rules are wrong. Rules are appropriate for known, well-defined typologies. The problem is structural.

Rules go stale. A rule calibrated for the institution's customer population in 2022 reflects transaction patterns from 2022. Customer behaviour changes. New products get launched. Regulatory requirements shift what customers route through which channels. A threshold that was appropriately sensitive at go-live will generate noise within 18 months if it is not recalibrated.

Rules ignore the customer. A rule firing on any international wire above $50,000 treats every customer the same. A high-net-worth client sending a monthly transfer to an offshore investment account triggers the same alert as a newly opened retail account sending the same pattern. The transaction looks identical to the rule — the context is invisible.

Rules cannot anticipate new typologies. When authorised push payment (APP) scams emerged as a dominant fraud vector across Australia and Singapore, every existing rule threshold started triggering on the pattern before teams had time to tune. The spike in false positives from a new typology can last months before calibration catches up.

Vendor defaults are not institution-specific. A transaction monitoring system configured on vendor-default thresholds is calibrated for an imagined average institution — not the specific customer base, geography, and product mix of the institution running it. AUSTRAC has explicitly noted this in published guidance. Running on defaults is not a defensible position under examination.

Five Practical Steps to Reduce False Positives

Step 1: Measure What You Actually Have

You cannot reduce something you have not measured.

Most compliance teams know their total daily alert volume. Few have a breakdown of false positive rate by alert scenario, by customer segment, and by transaction channel. That breakdown is the starting point for any calibration effort.

Pull the last 90 days of alert data. For each alert scenario, calculate the ratio of alerts closed without further action to alerts that progressed to an STR or EDD. That ratio is your scenario-level false positive rate. You will find three or four scenarios generating the majority of your noise — and those are the calibration targets.

This analysis also tells you which scenarios are genuinely earning their place in the rule library and which are generating alerts that no analyst has been able to explain in 12 months. You need that data before you touch a single threshold.

Step 2: Segment by Customer Risk Profile

The same transaction looks different depending on who is sending it.

A rule that fires on any international wire above $50,000 will generate noise for high-net-worth clients and genuine signals for retail customers. The rule is not wrong — it is not differentiated. Risk-segmenting your alert thresholds means applying different parameters to different customer risk tiers.

For a high-net-worth client with a documented wealth source, a history of international transactions, and a stated investment mandate, the threshold for that wire scenario should be materially higher than for a retail account with six months of history. A single institution-wide threshold is a blunt instrument.

This is one of the highest-impact single changes a compliance team can make without replacing its transaction monitoring platform. It requires access to customer risk classification data and the ability to apply segmented parameters — which most modern TM systems support but which most institutions have not configured.

Step 3: Retire Stale Rules

Most transaction monitoring systems accumulate rules over time. New typologies get added. Old ones are almost never removed.

A rule written in 2019 for a fraud pattern that no longer applies is generating alerts that analysts close on sight — and generating them reliably, every batch run, because the condition is always met. That rule is not protecting the institution. It is consuming analyst capacity.

Run an audit of the full rule library. For any scenario with a false positive rate above 98% and zero genuine catches in the past 12 months, retire the rule. Document the decision, the data that supports it, and the review date. AUSTRAC expects evidence that alert thresholds are actively managed — a retirement decision with supporting data is better evidence than a rule that has been silently ignored for three years.

This is standard hygiene. Most compliance teams have not done it because calibration work is not glamorous and implementation backlogs are long.

Step 4: Move from Rules-Only to Hybrid Detection

Rules are deterministic. They fire when conditions are met, regardless of context. A hybrid system combines rules for known, well-defined typologies with behaviour-based models that evaluate the transaction in context.

Machine learning models can factor in variables that rules cannot: the customer's transaction history, peer group behaviour, time-of-day patterns, the channel the transaction is moving through, and the relationship between recent account activity and the triggering transaction. A $50,000 international wire from an account that has never sent an international wire before looks different from the same wire from an account where this is the 12th such transfer this quarter.

The evidence for hybrid detection is not theoretical. Institutions that have moved from rules-only to hybrid architectures consistently report lower false positive rates and higher genuine detection rates simultaneously. Reducing false positives and improving detection quality are not in tension — they move together when the underlying detection logic is more precise.

Both AUSTRAC and MAS have signalled that rules-only monitoring is no longer sufficient for modern financial crime patterns. MAS's guidance on technology risk management and the application of technology-enabled controls is explicit on this point. AUSTRAC's 2023–24 enforcement priorities referenced the need for institutions to move beyond static threshold monitoring. For a complete picture of what modern detection architecture looks like, the complete guide to transaction monitoring covers the detection models in detail.

Step 5: Build Calibration Into Operations, Not Just Implementation

False positive rates drift upward when thresholds are not actively maintained. The calibration done at go-live will not hold for two years.

Build a quarterly calibration review into the compliance programme as a standing process. The review should cover the 10 highest-volume alert scenarios, compare the false positive rate trend over the past quarter, and document threshold adjustments with supporting rationale. The output of each review should be a calibration log entry — a record that the programme is being actively managed.

This documentation serves two purposes. First, it reduces false positive rates by catching threshold drift early. Second, it provides examination evidence. When AUSTRAC or MAS asks for evidence that alert thresholds are calibrated to the institution's risk profile, a quarterly calibration log with supporting data is a substantive answer. A vendor configuration file from 2022 is not.

ChatGPT Image May 4, 2026, 05_12_59 PM

What Good Looks Like

A well-calibrated AI-augmented transaction monitoring system should achieve below 85% false positive rate in production. That is not a theoretical benchmark — it is the range that production deployments demonstrate when detection architecture combines rules with behaviour-based models and thresholds are actively maintained.

Tookitaki's FinCense has reduced false positive rates by up to 50% compared to legacy rule-based systems in production deployments across APAC institutions. For a compliance team managing 400 alerts per day, a 50% reduction means approximately 200 fewer dead-end investigations daily. That capacity does not disappear — it goes to genuine risk review, EDD interviews, and STR quality.

The federated learning architecture behind FinCense addresses a detection gap that no single institution can close alone. Coordinated mule account activity typically moves between institutions — a pattern no individual bank can see in its own data. Detection models trained across a network of institutions make that cross-institution pattern visible. This is why the reduction in false positives and the improvement in genuine detection occur together: the models are trained on a broader signal set than any single institution's transaction history.

For the full vendor evaluation framework — including the specific questions to ask about false positive performance benchmarks, calibration support, and APAC regulatory alignment — see our Transaction Monitoring Software Buyer's Guide.

If your team is managing a 90%+ false positive rate and the operational picture described in this article is familiar, the starting point is a benchmarking conversation — not a full platform replacement. Book a demo to see FinCense's false positive benchmarks from comparable APAC deployments and get a calibration assessment against your current alert volumes.

Reducing False Positives in Transaction Monitoring: A Practical Playbook
Blogs
04 May 2026
6 min
read

Transaction Monitoring for Payment Companies and E-Wallets: A Practical Guide

Your alert queue is 800 deep. Your compliance team is three people. It is Monday morning, and PayNow settlements have been running since 6 AM.

This is not a bank CCO's problem. A bank CCO has a 30-person team, a legacy core banking system that batches transactions overnight, and customers whose transactions average thousands of dollars. You have real-time rails, high-volume low-value transactions, and customers who are often more anonymous at onboarding than any bank customer would be. The regulator, however, is looking at both of you with the same rulebook.

That asymmetry — same obligations, entirely different operating context — is where transaction monitoring for payment companies breaks down. The systems that banks deploy were built for bank-shaped problems. Payment companies have different transaction patterns, different fraud vectors, and different compliance team capacities. A system calibrated for a retail bank will generate noise at a scale that makes genuine detection nearly impossible for a small compliance team.

This guide covers what AML transaction monitoring for payment companies and e-wallet operators actually requires in the APAC context — and where the gaps are most likely to cause problems.

Talk to an Expert

Why Payment Companies Face Different TM Challenges Than Banks

The difference is not just volume. It is the combination of volume, speed, transaction size, customer anonymity, and team size — all at once.

Transaction volumes and per-transaction values create a false-positive problem at scale. A rule-based system set to flag transactions above a threshold will generate a manageable number of alerts for a bank processing 50,000 transactions per day at an average value of SGD 3,000. Apply the same logic to an e-wallet operator processing 500,000 transactions per day at an average value of SGD 45, and the alert volume scales disproportionately. Most of those alerts are noise. At 95% false positive rates — which is not unusual for legacy rule-based systems applied to high-frequency, low-value transaction patterns — a three-person compliance team cannot triage what the system produces.

B2C and B2B exposure run simultaneously. Many payment companies serve both retail customers and merchants. The transaction patterns for each are completely different. A merchant receiving 300 settlements in a day looks anomalous by consumer account standards. A retail customer sending five PayNow transfers to five different individuals looks like normal bill-splitting. When both populations sit in the same monitoring environment with the same rules, the rules are wrong for everyone.

Real-time rails are irrevocable. NPP in Australia, PayNow and FAST in Singapore, FPX and DuitNow in Malaysia, InstaPay in the Philippines — all of these settle within seconds. There is no post-settlement hold. If a transaction is suspicious, the only point of intervention is before the money moves. Batch monitoring systems — which review transactions after they have settled — are structurally inadequate for payment companies operating on instant rails. This is not a performance issue; it is an architecture issue.

Mule account layering and APP scams concentrate at payment companies. Payment companies are often the first point of fund movement after a victim transfers money. Authorised push payment (APP) scams work because the victim initiates the transfer themselves — the transaction looks legitimate from a technical standpoint. The only way to detect it is by identifying the pattern: transaction to a new payee, atypical transfer amount for this customer, inconsistent with the customer's normal behaviour. At scale, across an anonymised customer base, this requires behavioural monitoring that most rule-based systems cannot do.

A three-person compliance team cannot triage 800 alerts per day. This is arithmetic. At 8 hours per working day, 800 alerts means 36 seconds per alert. That is not compliance — it is box-ticking.

APAC Regulatory Obligations for Payment Companies

The headline fact here is this: in most APAC jurisdictions, the AML monitoring obligation for licensed payment companies is functionally equivalent to the obligation for banks. What differs is the compliance infrastructure available to meet it.

Singapore (MAS). Payment service providers licensed under the Payment Services Act 2019 — both Major Payment Institutions (MPIs) and Standard Payment Institutions (SPIs) — must comply with MAS Notice PSN01 (for digital payment token services) and MAS Notice PSN02 (for other payment services). The CDD threshold for e-money accounts is SGD 5,000 on a cumulative basis — lower than the threshold applied to bank accounts. MAS expects real-time monitoring capability for account takeover and mule account detection. For detail on the PSA licensing framework and its AML implications, see our article on the Payment Services Act Singapore AML requirements.

Australia (AUSTRAC). Non-bank payment providers registered as remittance dealers or under a Designated Service category face the same Chapter 16 obligations as banks under the AML/CTF Act 2006. The monitoring obligation — transaction monitoring, threshold-based reporting, suspicious matter reports — is identical. The compliance team at the payment provider is not.

Malaysia (BNM). E-money issuers under the Financial Services Act 2013 must comply with BNM's AML/CFT Policy Document. Tier 1 e-money accounts — which carry a wallet balance limit of MYR 5,000 — still require CDD and ongoing transaction monitoring for anomalies. Tier 1 status does not reduce monitoring obligations; it limits what the customer can hold, not what the institution must do.

Philippines (BSP). Electronic money issuers (EMIs) are classified as covered persons under the Anti-Money Laundering Act (AMLA). BSP Circular 706 applies. EMIs must file suspicious transaction reports (STRs) with the Anti-Money Laundering Council (AMLC). The compliance infrastructure that most Philippine EMIs operate with is substantially smaller than what large banks field — but the reporting obligation is the same.

Five Specific TM Requirements for Payment Companies

Generic TM system documentation lists capabilities. What payment companies actually need is more specific.

1. Pre-settlement transaction screening. Payment companies on instant rails need to screen transactions before they clear. This is not optional — it is the only window where intervention is possible. A system that reviews yesterday's transactions overnight is useless for a PayNow or FAST operator. The architecture requirement is real-time, pre-settlement processing.

2. Velocity monitoring across account networks. Mule networks do not operate through single accounts making large individual transfers. They operate through networks of accounts making many small transfers in tight time windows. Detecting this requires monitoring velocity patterns across linked accounts — not just flagging individual transactions that exceed a threshold. Account-to-account linkage analysis, combined with velocity monitoring over rolling time windows, is the detection mechanism. Rule-based systems that operate on individual transaction thresholds miss this pattern entirely.

3. Merchant monitoring. Payment companies providing B2B settlement services need to monitor merchant accounts separately from retail customer accounts. A merchant processing 400 transactions per day with a consistent average transaction value is normal. The same merchant processing 400 transactions per day where 30% are refunds, or where the transaction pattern shifts abruptly over a 48-hour window, is not. Merchant monitoring requires typologies and thresholds built specifically for merchant transaction patterns.

4. Account takeover detection. Payment companies — particularly fintechs and e-wallet operators — face account takeover attempts at higher rates than traditional banks because authentication standards at many providers are weaker. Account takeover detection requires monitoring for behavioural deviations: new device, new location, unusual transfer amount, transfer to a payee the account has never used. These signals need to be evaluated in combination, in real time, before settlement occurs.

5. Cross-border corridor monitoring. A large proportion of payment companies in APAC serve remittance customers. Cross-border flows require corridor-specific typologies — the risk profile of a transfer from Singapore to a Philippines bank account is different from a transfer within Singapore, and different again from a transfer to a jurisdiction with elevated FATF risk ratings. A single generic threshold applied to all cross-border transfers produces alerts that reflect geography rather than actual risk patterns.

ChatGPT Image May 4, 2026, 03_38_49 PM

What Good TM Looks Like for a Payment Company

The gap between what most payment companies are running and what good transaction monitoring looks like is large. Here is what it actually requires.

Pre-settlement processing across all major APAC instant rails. NPP, PayNow, FAST, FPX, DuitNow, InstaPay. The system needs to operate on the same timeline as the rail — which means pre-settlement, not batch.

False positive rates below 85% in production. Many legacy systems running on payment company transaction data operate at 95% false positive rates or above. At a three-person compliance team, the difference between 95% and 80% is the difference between a team that is permanently behind and a team that can do actual investigations. For a detailed overview of the technical factors that drive false positive rates, see our complete guide to transaction monitoring.

Explainable alert logic. When a compliance analyst opens an alert, they need to understand within 60 seconds why the system flagged it. Opaque model outputs — "risk score: 87" with no explanation — require the analyst to reconstruct the reasoning from raw transaction data. That adds 5–10 minutes per alert. At 100 alerts per day, that is 8–16 hours of analyst time that could be spent on actual investigation. Alert explanations should name the specific pattern or scenario that triggered the flag.

Thresholds calibrated to payment company transaction patterns. A threshold set for a retail bank will fail in a payment company environment. The average transaction value, velocity norms, and customer behaviour patterns at an e-wallet operator are structurally different from a savings account holder at a bank. Thresholds need to be set against the institution's own transaction data — and they need to be adjustable by compliance staff without requiring a vendor engagement.

Scenario coverage for the specific vectors that payment companies face. APP scam detection, mule account network identification, account takeover, cross-border corridor monitoring, and merchant anomaly detection. These are not edge cases for payment companies — they are the primary financial crime exposure.

See the Transaction Monitoring Software Buyer's Guide for a structured framework on evaluating vendors against these criteria.

How Tookitaki FinCense Fits the Payment Company Context

FinCense is deployed at payment institutions across APAC — e-wallet operators, licensed payment service providers, and remittance companies. The architecture was built for the payment company context, not adapted from a bank deployment.

Pre-settlement processing. FinCense processes transactions in real time across NPP, PayNow, FAST, FPX, DuitNow, and InstaPay. The system evaluates each transaction before settlement against the full scenario library — not as a batch job at the end of the day.

Trained on payment institution data. FinCense's detection models are trained using federated learning across a network that includes payment institutions, not only bank data. A model trained exclusively on bank transaction patterns will misread the normal behaviour of an e-wallet customer base. The training data matters for false positive rates — which is why FinCense has reduced false positives by up to 50% compared to legacy rule-based systems in production deployments at payment companies.

Over 50 scenarios covering payment-specific vectors. APP scam detection, mule account network analysis, account takeover patterns, cross-border corridor typologies, and merchant anomaly detection are all in the standard scenario library. These are not add-ons; they are part of the base deployment.

No in-house quant team required. Compliance staff can configure thresholds and adjust scenario parameters directly. The system generates plain-language alert explanations that a compliance analyst — not a data scientist — can act on. At a three-person compliance team, this is the difference between a usable system and a system that is technically running but practically unmanageable.

Scales from licensed payment institutions to large e-wallet operators. The architecture does not require a different deployment for a 50,000-transaction-per-day provider versus a 5,000,000-transaction-per-day operator. The monitoring logic, the scenario library, and the compliance workflows are the same.

If you run compliance at a payment company, an e-wallet operator, or a licensed payment service provider in APAC and your current TM system was either built for a bank or has never been calibrated against your actual transaction data — the problem is not going away on its own.

Book a demo to see FinCense running against payment company transaction patterns, on the specific rails your institution operates, in the regulatory environment you are actually accountable to. The conversation takes 30 minutes and is specific to your payment rails and jurisdiction — not a generic product walkthrough.

Transaction Monitoring for Payment Companies and E-Wallets: A Practical Guide
Blogs
30 Apr 2026
6 min
read

AML Compliance for Tier 2 Banks: What Smaller Institutions Need to Get Right

AUSTRAC publishes its examination priorities for the year. The CCO at a regional Australian bank reads the list. Calibrated alert thresholds. Documentation of alert dispositions. EDD for high-risk customers. Periodic re-screening for PEPs.

The list looks the same as last year. And the year before.

The difference is that her team is 8 people — not 80. The obligation does not scale down with the headcount.

This is the operating reality for AML compliance at Tier 2 banks across Australia, Singapore, and Malaysia. Regional banks, digital banks, foreign bank branches, credit unions with banking licences — institutions that are fully regulated, fully examined, and fully liable, but are not Commonwealth Bank, DBS, or Maybank. The same rules apply. The resources do not.

This article covers where Tier 2 AML programmes most commonly fail examination, what "proportionate" compliance actually requires in practice, and how mid-size institutions build programmes that hold up without the 50-person compliance team.

Talk to an Expert

The Regulatory Reality: Same Obligations, Different Resources

AUSTRAC, MAS, and BNM do not operate two-tier AML standards. The AML/CTF Act 2006 applies to every reporting entity in Australia regardless of asset size. MAS Notice 626 applies to every bank licensed in Singapore. BNM's AML/CFT Policy Document applies to every licensed institution in Malaysia.

The only concession regulators make is proportionality. A risk-based approach means the scale of an AML programme should reflect the scale of the risk — the volume and nature of transactions, the customer risk profile, the jurisdictions involved. But the programme must exist, be effective, and produce documentation that survives examination.

Proportionality is not a waiver.

Westpac's AUD 1.3 billion penalty in 2020 was for a major bank. But AUSTRAC has also pursued civil penalty orders against smaller ADIs and credit unions for the same category of failures: uncalibrated monitoring thresholds, inadequate EDD, insufficient transaction reporting. The regulator's methodology does not change based on the institution's size. The fine may differ; the finding does not.

For Tier 2 banks in Singapore, MAS has been direct: digital banks licensed under the 2020 digital banking framework should reach AML maturity equivalent to established banks within 2–3 years of licensing. "We are new" has a shelf life. For Tier 2 institutions in Malaysia, BNM's Policy Document draws no distinction between Maybank and a smaller licensed Islamic bank on the core obligations for CDD, transaction monitoring, and suspicious transaction reporting.

Five Gaps Where Tier 2 Banks Fail Examination

Gap 1: Default Threshold Settings on Transaction Monitoring

The most common finding across AUSTRAC and MAS examinations of smaller institutions is transaction monitoring software running on vendor-default alert thresholds.

Default thresholds are calibrated for a generic customer population. A regional Australian bank with 80% SME customers needs different alert logic than a consumer retail bank. A digital bank in Singapore whose customers are predominantly salaried individuals transferring payroll needs different parameters than a trade finance operation. When the thresholds do not reflect the institution's actual customer base, two things happen: analysts receive alerts that are irrelevant to real risk, and the transactions that represent genuine risk pass without triggering review.

AUSTRAC's published guidance on transaction monitoring is explicit on this point. MAS expects institutions to document their threshold calibration rationale and demonstrate that calibration is reviewed periodically against the institution's current risk profile. An undated configuration file from the vendor implementation three years ago does not meet that standard.

See our transaction monitoring software buyer's guide for the evaluation criteria that matter when institutions are selecting a platform — threshold configurability is one of five criteria that directly affect examination outcomes.

Gap 2: Alert Backlogs from High False Positive Rates

A Tier 2 bank running a legacy rules-only transaction monitoring system at a 97% false positive rate and processing 200 alerts per day needs 2–3 full-time analysts to do nothing except clear the alert queue. For a compliance team of 8, that is 25–37% of total capacity consumed by alert triage before a single investigation has started.

The consequence is not just inefficiency. It is a programme that cannot function as designed. Analysts clearing high-volume, low-quality alert queues develop pattern fatigue. Genuine risk signals get the same 30-second review as the 97% of alerts that will be closed as false positives. EDD interviews do not happen because there is no analyst capacity to conduct them. Examination preparation is squeezed into the two weeks before the examiner arrives.

False positive rates are not a fixed cost of running a transaction monitoring programme. Legacy rules-only systems produce high false positive rates because they apply static thresholds to dynamic customer behaviour. Typology-driven, behaviour-based detection — which incorporates how a customer's transaction patterns change over time, not just whether a single transaction crosses a threshold — consistently produces lower false positive rates. The technology gap between rule-based and behaviour-based monitoring is the single largest source of operational inefficiency for Tier 2 compliance teams.

For background on how transaction monitoring works and why the architecture matters, see what is transaction monitoring.

Gap 3: Inconsistent EDD Application

Large banks have EDD workflows automated into their CRM and compliance systems. When a customer's risk rating changes, the system triggers an EDD task, assigns it to an analyst, and tracks completion. The process is not dependent on an individual's memory.

Tier 2 banks frequently run manual EDD processes. PEP screening happens at onboarding. Periodic re-screening often does not — or it happens for some customers and not others, depending on which analyst handles the review. Corporate customers with complex beneficial ownership structures receive initial CDD at onboarding; the review when the ultimate beneficial owner changes is missed because there is no system trigger.

BNM's Policy Document, MAS Notice 626, and AUSTRAC's rules all require EDD to be applied to high-risk customers on an ongoing basis, not just at the point of relationship establishment. "Ongoing" is not annual if the customer's risk profile changes quarterly. An examination finding in this area typically cites specific customer accounts where EDD was not conducted after a risk rating change — not a policy gap, but an execution gap.

Gap 4: Inadequate Documentation of Alert Dispositions

Alert closed. No SAR filed. No written rationale recorded.

In a team under sustained volume pressure, documentation shortcuts are predictable. An analyst who closes 40 alerts in a day and writes a full rationale for 15 of them is not cutting corners deliberately — the queue does not allow otherwise.

AUSTRAC and MAS treat undocumented alert closures as programme failures. Not because the disposition decision was necessarily wrong, but because there is no evidence that a human reviewed the alert and made a considered decision. From an examination standpoint, an alert with no documented rationale is indistinguishable from an alert that was never reviewed. The regulator cannot distinguish between "reviewed and correctly closed" and "bypassed."

This is a systems problem, not a people problem. Alert documentation should be generated as part of the disposition workflow, not as a separate manual step. Every alert closure should require a rationale field — even if the rationale is a structured selection from a drop-down of standard reasons. The documentation burden should be close to zero per alert for straightforward dispositions.

Gap 5: No Model Validation for ML-Based Detection

Tier 2 banks that have moved to AI-augmented transaction monitoring frequently lack the model governance infrastructure to validate that detection models are performing correctly over time.

A model trained on transaction data from 2022 that has never been retrained is not performing at specification in 2026. Customer behaviour shifts. Payment methods change. New typologies emerge. Without periodic model validation — testing whether the model's detection performance against current transaction patterns matches its baseline specification — the institution cannot make the assertion that its monitoring programme is effective.

MAS has flagged model governance as an emerging examination area. For Tier 2 banks, the challenge is that model validation at large banks is done by internal quant teams with the expertise to run performance tests, backtesting, and drift analysis. A 10-person compliance team at a regional bank does not have that capability in-house.

The answer is not to avoid AI-augmented monitoring. It is to select platforms where model validation documentation is generated automatically, and where retraining and recalibration is a vendor-supported function, not a requirement to build internal data science capability.

ChatGPT Image Apr 30, 2026, 10_04_33 AM

What "Proportionate" AML Compliance Actually Means

Proportionality is frequently misread as a licence to do less. It is not. It is permission to concentrate compliance resources where the actual risk is — rather than spreading equal effort across all customers regardless of their risk profile.

For a Tier 2 bank, proportionate compliance means three things in practice.

Automate the process work. Alert generation, threshold calibration triggers, EDD workflow initiation, documentation of alert dispositions — none of these should require analyst decision-making at each step. Every manual step is a point where volume pressure leads to shortcuts, and shortcuts are what examination findings are made of.

Free analyst capacity for work that requires judgement. Complex alert investigations, EDD interviews, SAR filing decisions, examination preparation — these require an experienced analyst's attention and cannot be automated. A team of 8 can do this work well, but only if they are not consuming 3–4 hours per day clearing a backlog of 200 low-quality alerts.

The arithmetic is specific: at a 97% false positive rate on 200 daily alerts, an analyst spends approximately 2.5 minutes on each alert just to clear the queue — that is 500 analyst-minutes, or roughly 8.3 hours, across a team. At a 50% false positive rate on the same 200 alerts, 100 alerts require substantive review. The remaining 100 are flagged for quick closure. Total review time drops to approximately 4–5 hours — returning 3–4 hours of analyst capacity daily for investigation and EDD work. At a 10-person team, that is 30–40% of daily compliance capacity returned to meaningful work.

Build documentation in, not on. Every compliance workflow should generate examination-ready records as a byproduct of normal operation, not as a separate documentation task.

Technology Requirements Specific to Tier 2

The enterprise transaction monitoring systems built for Tier 1 banks assume implementation resources that Tier 2 banks do not have. Multi-month professional services engagements, dedicated data engineering teams, internal model governance functions — these are not realistic for a regional bank with a 5-person technology team and a compliance budget that was set before the current regulatory environment.

Four technology requirements are specific to Tier 2:

Integration simplicity. Many Tier 2 banks run legacy core banking platforms. Cloud-native transaction monitoring platforms with standard API connectivity can connect to core banking data in weeks, not months, without requiring a custom integration project.

Compliance-configurable thresholds. Compliance staff should be able to adjust alert thresholds and add detection scenarios without vendor involvement. Calibration is a compliance function. If it requires a professional services engagement every time a threshold needs updating, calibration will not happen at the frequency regulators expect.

Predictable pricing. Per-transaction pricing models become unpredictable as transaction volumes grow. Tier 2 banks should look for flat-fee or tiered pricing that is budget-predictable against their transaction volume — one less variable in a constrained budget environment.

Exam-ready documentation, automatically. Alert audit trails, calibration records, and model validation documentation should be outputs of the platform's standard operation, not custom report builds. If producing the documentation package for an examination requires a week of manual compilation, the documentation package will always be incomplete.

For a structured framework on evaluating transaction monitoring vendors against these criteria, see the TM Software Buyer's Guide.

APAC-Specific Regulatory Context for Tier 2

Australia. AUSTRAC's risk-based approach explicitly accommodates proportionality — but AUSTRAC has examined and found against credit unions and smaller ADIs for the same monitoring failures as major banks. The AUSTRAC transaction monitoring requirements cover the specific obligations that apply to all reporting entities, regardless of size.

Singapore. MAS Notice 626 applies to all banks licensed in Singapore. For digital banks — which are structurally Tier 2 in Singapore's context — MAS has set explicit expectations that AML maturity should reach equivalence with established banks within 2–3 years of licensing. The MAS transaction monitoring requirements article covers the specific MAS standards in detail.

Malaysia. BNM's AML/CFT Policy Document applies to all licensed institutions. Smaller licensed banks, Islamic banks, and regionally focused institutions have the same CDD, monitoring, and reporting obligations as the major domestic banks. BNM's examination methodology does not grade on institution size.

What an Examination-Ready Tier 2 AML Programme Looks Like

Six elements characterise programmes that hold up to examination at Tier 2 institutions:

  1. A written AML/CTF programme, Board-approved and reviewed annually
  2. Transaction monitoring thresholds documented and calibrated against the institution's own customer risk assessment — with a dated record of when calibration was last reviewed and by whom
  3. An alert investigation workflow that generates a written rationale for every closed alert, including a structured reason code for dispositions that do not result in SAR filing
  4. EDD workflows triggered automatically by risk rating changes, not by analyst memory
  5. Annual model validation or rule-set review with documented outcomes, even where the outcome is "no changes required"
  6. Staff training records, including dates, completion rates, and assessment outcomes by employee

None of these six elements require a large compliance team. They require systems configured to produce the right outputs and workflows designed to generate documentation as a byproduct of normal operation.

How Tookitaki FinCense Fits the Tier 2 Context

Tookitaki's FinCense AML suite is deployed across institution sizes, including Tier 2 banks, digital banks, and licensed challengers in Australia, Singapore, and Malaysia.

FinCense is cloud-native with standard API connectivity, which reduces integration time for institutions that do not have dedicated implementation teams. Compliance staff can configure alert thresholds and detection scenarios without vendor support — calibration happens on the institution's schedule, not when a professional services engagement can be arranged.

APAC-specific typologies and pre-built documentation for AUSTRAC, MAS Notice 626, and BNM's Policy Document are included in the platform. These are not professional services add-ons; they are part of the standard deployment.

In production deployments, FinCense has reduced false positive rates by up to 50% compared to legacy rule-based systems. At a 10-person compliance team processing 200 daily alerts, that returns approximately 3–4 hours of analyst capacity per day — enough to run substantive investigations, keep EDD current, and arrive at examination with documentation that was built during normal operations, not assembled in a panic the week before.

See FinCense in a Tier 2 Bank Context

If your institution is carrying the same AML obligations as the major banks with a fraction of the compliance resources, the question is not whether you need a programme that works — it is whether your current programme will hold up when the examiner arrives.

Book a demo to see FinCense configured for a Tier 2 bank: realistic transaction volumes, a compliance team of fewer than 20, and the documentation outputs that AUSTRAC, MAS, and BNM expect.

If you are still evaluating options, the TM Software Buyer's Guide provides a structured framework for comparing platforms on the criteria that matter most for smaller compliance teams.

AML Compliance for Tier 2 Banks: What Smaller Institutions Need to Get Right