Streamline your AML compliance with NameScan's specialised PEP, Sanction and Adverse Media screening solution (2024)

Select Free Check Service

Politically Exposed Person (PEP)

Sanction

Adverse Media

Know Your Business (KYB)

Compromised Email

AML Risk Assessment

Find out what hackers already know about you. This free email compromise check allows you to analyse how secure your profile is on websites where you have shared your email.

Check if your email has been compromised in a data breach.

Good job!

your email address is not associated with any data breaches.

Streamline your AML compliance with NameScan's specialised PEP, Sanction and Adverse Media screening solution (1)

Source: haveibeenpwned.com {{#if has_paging}}

{{/if}}

Our Services

PEP Screening

Access our comprehensive data sets, which have been compiled from over 20,000 government sources, allowing you to identify politically exposed persons and their close associates.

Learn More

Sanction Screening

Screen against thousands of government regulatory and law enforcement watchlists, and over 100 International and National Sanctions lists that are updated daily.

Learn More

Know Your Business Check

Primary source company intelligence via Know Your Business (KYB) Solution. Access primary source,company intelligence to optimise your KYC processes.

Learn More

AML Consulting Service

Work with our accredited advisers to assess the money laundering and terrorism financing risk toyour business.

Learn More

ID Verification (IDV)

Reduce the time and effort associated with sighting and collecting physical copies of IDs by verifying them against their issuing sources using NameScan’s ID Verification service.

Learn More

What is a data breach?

Data breaches occur when personal information is accessed or disclosed without authorisation. Every year, millions of sensitive online details such as usernames, passwords and email addresses are compromised in cyber attacks from hundreds of sites around the world. These stolen details are published and sold on the dark web, where criminals can use them to gain access to your sensitive information. Other forms of this phenomenon include unintentional information disclosure, data and information leaks, and data spill.

Streamline your AML compliance with NameScan's specialised PEP, Sanction and Adverse Media screening solution (4)

How does a data breach affect you?

Being involved in a data privacy breach does not necessarily mean your identity has been stolen. It is important, however, to know what type of information may have been stolen and the impact such breaches can have on you. Name, Date of Birth, Email, Usernames, Phone Numbers, Residential Address. Your name and date of birth may seem like insignificant information but losing it to hackers can have a significant impact on your life. Hacked information can be used for social engineering attacks to gather additional information and build up a complete profile of you, and your identity has been stolen.

Streamline your AML compliance with NameScan's specialised PEP, Sanction and Adverse Media screening solution (5)

Financial Loss

Hackers can use the stolen data to potentially apply for credit cards, medical benefits, and lodge your tax returns.

Streamline your AML compliance with NameScan's specialised PEP, Sanction and Adverse Media screening solution (6)

Identity Theft

A more severe data breach can lead to identity theft. Hackers can utilise information found through data breaches to open bank accounts, set up utilities and tarnish your credit report.

Streamline your AML compliance with NameScan's specialised PEP, Sanction and Adverse Media screening solution (7)

Compromised Public Image

Hackers can also use this sensitive data to trick you into thinking they have videos and images of you in a compromising position, requesting payment to stop the content being uploaded.

How to create a strong password?

The key to your online security is to have a strong password, but the challenge is to create distinct passwords that reduce your risk of exposure to cyber attacks. When it comes to creating a strong password, there are several aspects to keep in mind.

Make It Long

This is the most critical factor when generating a new password. The longer the better, always try and create a password that is at least 15 characters long.

Mixed Characters

The more you mix characters, the tougher it is for hacking software to guess your password. Use a mixture of upper and lower case letters, numbers and special characters to make your password harder to crack.

Streamline your AML compliance with NameScan's specialised PEP, Sanction and Adverse Media screening solution (8)

What should you avoid when creating a password?

Streamline your AML compliance with NameScan's specialised PEP, Sanction and Adverse Media screening solution (9)

Memorable Keyboard Paths

Do not use sequential keyboard paths such as (qwerty, or asdfgh). These sequential passwords make it very easy for hacking software to decode your password.

Streamline your AML compliance with NameScan's specialised PEP, Sanction and Adverse Media screening solution (10)

Personal Information

Avoid using information that may be easily available. Information such as your date of birth, first and last names, children or pet names and phone numbers.

Streamline your AML compliance with NameScan's specialised PEP, Sanction and Adverse Media screening solution (11)

Common Passwords

Passwords such as 12345, password, abc123, and iloveyou are more common than you think. Avoid using passwords like the ones previously mentioned as they can be easy to decode.

Streamline your AML compliance with NameScan's specialised PEP, Sanction and Adverse Media screening solution (2024)

FAQs

What is sanction screening AML compliance? ›

Effective sanctions screening tools help comply with relevant regulations for Anti-Money Laundering (AML) and KYC by detecting financial risks and crimes. It should be performed at several key stages to prevent money laundering and maintain compliance.

What are key components of the AML and Sanctions compliance Program? ›

What are the 6 components of an AML compliance program?
  • Appointing a compliance officer,
  • Employee training,
  • Risk assessment,
  • Detection and reporting of suspicious activity,
  • Internal practices,
  • Internal audits.
Mar 29, 2024

What is adverse media screening in AML? ›

What is Adverse Media in AML? In the context of Anti-Money Laundering (AML), Adverse media refers to negative or unfavorable information about individuals, entities, or organizations that could indicate potential involvement in financial crimes, corruption, or other illicit activities.

How do you ensure AML compliance? ›

AML Compliance Checklist
  1. Conduct a risk assessment and take customer due diligence measures.
  2. Train staff on AML regulations and best practices.
  3. Perform independent testing regularly to ensure your program is effective.
  4. Put systems in place to monitor transactions and detect suspicious activity.

What is a PEP screening? ›

Politically exposed persons screening or PEP screening is a process that helps prevent financial institutions (FI) from becoming involved with illegal financial activities. PEPs are individuals with significant political influence, such as government officials or their family members.

What is PEP in AML? ›

As part of AML regulations, many countries have established rules for identifying Politically Exposed Persons (PEP). In Europe, this is mandated as part of the Anti-Money Laundering Directive (AMLD).

What are the 5 principles of AML? ›

The five pillars of AML compliance offer a holistic approach, emphasizing internal controls, assigned roles, training and awareness, independent testing, and a risk-based strategy for ongoing Customer Due Diligence (CDD).

What is an AML checklist? ›

This checklist summarises good practices in managing anti-money laundering (AML) compliance for firms and other organisations, including due diligence, risk assessment, policies and procedures and the role of the Money Laundering Reporting Officer (MLRO).

What is PEP in adverse media? ›

PEPs, or politically exposed persons, are individuals with significant political influence or those who have close associations with high-ranking government officials. Due to their position and relationships, PEPs may have an increased risk of being involved in activities that make them vulnerable to financial crime.

How is AML screening done? ›

How Does The AML Screening Process Work? The AML screening process involves gathering and analyzing customer information, such as identities and transactions, to assess whether customers are legitimate or potentially suspicious.

How to conduct adverse media screening? ›

An adverse media check typically involves the following four steps.
  1. Step 1: Collect and verify customer information. ...
  2. Step 2: Conduct the adverse media search. ...
  3. Step 3: If adverse coverage is found, assess the risk it presents. ...
  4. Step 4: Take appropriate action and report on the screening.
Mar 4, 2024

What are the 4 ingredients of AML compliance? ›

The Four (4) Pillars Of BSA/AML Compliance
  • PILLAR #1. DESIGNATION OF A COMPLIANCE OFFICER.
  • PILLAR #2. DEVELOPMENT OF INTERNAL POLICIES, PROCEDURES AND CONTROLS.
  • PILLAR #3. ONGOING, RELEVANT TRAINING OF EMPLOYEES.
  • PILLAR #4. INDEPENDENT TESTING AND REVIEW.
  • CONCLUSION.
Mar 24, 2016

Who needs AML compliance? ›

The AML/CTF Act regulates financial, gambling, remittance, digital currency exchange providers and bullion sectors that provide designated services listed in the AML/CTF Act.

What are AML compliance requirements? ›

The program must include appropriate risk-based procedures for conducting ongoing customer due diligence, including (i) understanding the nature and purpose of customer relationships for the purpose of developing a customer risk profile; and, (ii) conducting ongoing monitoring to identify and report suspicious ...

What is screening process in AML? ›

The AML screening process involves gathering and analyzing customer information, such as identities and transactions, to assess whether customers are legitimate or potentially suspicious.

What is the OFAC sanction screening process? ›

Export Compliance

OFAC screening involves checking entities against the denied party lists maintained by the United States Treasury Department's Office of Foreign Assets Control (OFAC). Additionally, OFAC compliance can also include identifying sanctions and embargoes placed on nations and political jurisdictions.

What is the AML sanction policy? ›

The AML and Sanctions Policy – Minimum standards

Establishing and maintaining Risk-based customer due diligence, identification, verification and know your customer (KYC) procedures, including enhanced due diligence for those customers presenting higher risk, such as Politically Exposed Persons (PEPs);

What does a sanction check look for? ›

A sanctions check is a specialized search of government databases — such as those maintained by the Office of Foreign Assets Control (OFAC) — to identify individuals who are prohibited from certain activities or industries or may pose a risk to organizations if their requested transactions are allowed to proceed.

References

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Maia Crooks Jr

Last Updated:

Views: 6191

Rating: 4.2 / 5 (43 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Maia Crooks Jr

Birthday: 1997-09-21

Address: 93119 Joseph Street, Peggyfurt, NC 11582

Phone: +2983088926881

Job: Principal Design Liaison

Hobby: Web surfing, Skiing, role-playing games, Sketching, Polo, Sewing, Genealogy

Introduction: My name is Maia Crooks Jr, I am a homely, joyous, shiny, successful, hilarious, thoughtful, joyous person who loves writing and wants to share my knowledge and understanding with you.