top of page

Transaction Monitoring

Complygenics can help your organization maximize the effectiveness and efficiency of your transaction monitoring system. We can ensure that the AML model rules cover all your identified scenarios that are known as “red flags”. We can also ensure that your system is tuned to match your organization’s risk appetite and the data provided to the system is of the best possible quality and that there is no data lost or unintentionally transformed from source to destination.

Our Expertise

  • We will work with your team on implementing or upgrading your transaction monitoring system

  • Identify the solution detection model/rules that best fit your organization product and services

  • Confirm that your organization identified risks are being appropriately monitored

  • Validate that all transaction generating systems are identified and their transaction activity sourced, that controls are in place to identify potential data failures, and that data provided is consistent and within the expected range.

  • Incorporate a risk-based approach on ongoing monitoring of customer transaction activities and account/customer relationships

  • Pre-production analysis of above and below the line alerts and adjustment of parameter thresholds.

  • Supports design and delivery of training

  • Follow up on generated alerts quality and review alert resolution


Quality Control

  • Perform quality review on generated alerts quality and resolution

  • Provide feedback to your team on generated alert quality, effectiveness, and efficiency.

  • Assist alert review analysts on understanding the logic used in the generation of alerts and how they may be an indication of suspicious activity.

  • Coach and train analysts on how analysis performance can be improved.

ComplyGenics' Process

to Conduct an Investigation

Step 1:
Information Gathering

Customer and counterparties: Bank source system including KYC files, public domain search, credit bureau, customer reporting agency due diligence documentation and criminal searches if applicable

Step 2:
Information Management

Document all research. The audit trail should contain profile information, public domain search results, alert and transaction analysis, sanction screening and recommendations

Step 3:
Information Analysis

Profile of customer: Verify name, location, nature of business, KYC rating, years of relationship accounts

Profile of counterparties:  Verify name, location, line of business

Transactions: Review value and volume, payment details, remittance reference, transaction documents available

Logo Comply.png
bottom of page