{"id":787,"date":"2011-11-17T13:13:46","date_gmt":"2011-11-17T13:13:46","guid":{"rendered":"http:\/\/www.holdingpage.co\/?page_id=787"},"modified":"2011-11-17T13:13:50","modified_gmt":"2011-11-17T13:13:50","slug":"nature-of-evidence","status":"publish","type":"page","link":"https:\/\/www.moneylaunderingcompliance.com\/index.php\/ml-compliancy-training\/nature-of-evidence","title":{"rendered":"Nature of Evidence"},"content":{"rendered":"<p>&nbsp;<\/p>\n<h3><span class=\"Apple-style-span\" style=\"font-size: 13px; font-weight: normal;\"><a href=\"http:\/\/www.holdingpage.co\/index.php\/compliancy-training\/client-due-diligence-measures\/attachment\/9\" rel=\"attachment wp-att-772\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-772\" title=\"9\" src=\"http:\/\/www.holdingpage.co\/wp-content\/uploads\/2011\/11\/9.jpeg\" alt=\"\" width=\"253\" height=\"190\" srcset=\"https:\/\/www.moneylaunderingcompliance.com\/wp-content\/uploads\/2011\/11\/9.jpeg 253w, https:\/\/www.moneylaunderingcompliance.com\/wp-content\/uploads\/2011\/11\/9-200x150.jpg 200w\" sizes=\"auto, (max-width: 253px) 100vw, 253px\" \/><\/a>Electronic verification is now a major tool of the verification process across all regulated sectors. The guidance notes inform that for the verification process firms can use documents, electronic verification or a combination of both.<\/span><\/h3>\n<p><span>There is a hierarchy of reliable sources of documentation or information for verification. The Guidance notes state;<\/span><span><br \/>\n<\/span><\/p>\n<p align=\"justify\">&#8220;Documentation purporting to offer evidence of identity may emanate from a number of sources. These documents differ in their integrity, reliability and independence. Some are issued after due diligence on an individual\u2019s identity has been undertaken; others are issued on request, without any such checks being carried out. Therefore there\u00a0is a broad hierarchy of documents:<\/p>\n<ul>\n<li>\n<div align=\"justify\">Certain documents issued by government departments and agencies, or by a court; then<\/div>\n<\/li>\n<li>\n<div align=\"justify\">Certain documents issued by other public sector bodies or local authorities; then<\/div>\n<\/li>\n<li>\n<div align=\"justify\">Certain documents issued by regulated firms in the financial services sector; then<\/div>\n<\/li>\n<li>\n<div align=\"justify\">Those issued by other firms subject to the ML Regulations, or to comparable legislation; then<\/div>\n<\/li>\n<li>\n<div align=\"justify\">Those issued by other organisations.<\/div>\n<\/li>\n<\/ul>\n<p align=\"justify\">In many instances ID theft is committed by the theft or forgery of documentation, firms should recognise that some documents are more easily forged than others. Utility bills, for example, are in the lowest category. These are \u2018documents on request\u2019 that is no real checks are done to ascertain by these companies that the person named on the bill is the person it is supposed to be. They have not been subjected to any anti-money checks, whereas a credit card statement or a bank statement issued by an FSA regulated firm will give you more certainty that it is that person you are dealing with. Utility bills should not be taken as a general rule for verification purposes unless backed up by \u2018personal knowledge\u2019 of the applicant. If paper is your preferred route of verification where possible try a bank or credit card statement, not a utility bill. If suspicions are raised in relation to any document offered, firms should take whatever practical and proportionate steps are available to establish whether the document offered has been reported as lost or stolen.&#8221;<\/p>\n<p align=\"justify\">Your firm will have a range of procedures in place to cope with the different circumstances and complexities posed by the verification of different entities or types of clients. However they are all based around the simple \u2018KYC\u2019 requirements discussed in this section.<\/p>\n<p align=\"justify\">\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Electronic verification is now a major tool of the verification process across all regulated sectors. The guidance notes inform that for the verification process firms can use documents, electronic verification or a combination of both. There is a hierarchy of reliable sources of documentation or information for verification. The Guidance notes state; &#8220;Documentation purporting [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":612,"menu_order":48,"comment_status":"open","ping_status":"open","template":"training-page.php","meta":{"footnotes":""},"class_list":["post-787","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.moneylaunderingcompliance.com\/index.php\/wp-json\/wp\/v2\/pages\/787","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.moneylaunderingcompliance.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.moneylaunderingcompliance.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.moneylaunderingcompliance.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.moneylaunderingcompliance.com\/index.php\/wp-json\/wp\/v2\/comments?post=787"}],"version-history":[{"count":2,"href":"https:\/\/www.moneylaunderingcompliance.com\/index.php\/wp-json\/wp\/v2\/pages\/787\/revisions"}],"predecessor-version":[{"id":789,"href":"https:\/\/www.moneylaunderingcompliance.com\/index.php\/wp-json\/wp\/v2\/pages\/787\/revisions\/789"}],"up":[{"embeddable":true,"href":"https:\/\/www.moneylaunderingcompliance.com\/index.php\/wp-json\/wp\/v2\/pages\/612"}],"wp:attachment":[{"href":"https:\/\/www.moneylaunderingcompliance.com\/index.php\/wp-json\/wp\/v2\/media?parent=787"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}